Ruggedcom Switch
Ruggedcom Switch
SIMATIC NET
Industrial Ethernet Switches
RUGGEDCOM ROS v5.4
For RS920P
Introduction 1
Using ROS 2
SIMATIC NET
Getting Started 3
Industrial Ethernet Switches
RUGGEDCOM ROS v5.4 Device Management 4
System Administration 5
Configuration Manual
Security 6
Layer 2 7
Layer 3 8
Redundancy 9
Traffic Control and
Classification 10
Time Services 11
Network Discovery and
Management 12
IP Address Assignment 13
For RS920P
Troubleshooting 14
12/2019
C79000-G8976-1445-01
Legal Information
Warning Notice System
This manual contains notices you have to observe in order to ensure your personal safety, as well as to prevent
damage to property. The notices referring to your personal safety are highlighted in the manual by a safety
alert symbol, notices referring only to property damage have no safety alert symbol. These notices shown be-
low are graded according to the degree of danger.
DANGER
indicates that death or severe personal injury will result if proper precautions are not taken.
WARNING
indicates that death or severe personal injury may result if proper precautions are not taken.
CAUTION
indicates that minor personal injury can result if proper precautions are not taken.
NOTICE
indicates that property damage can result if proper precautions are not taken.
If more than one degree of danger is present, the warning notice representing the highest degree of danger
will be used. A notice warning of injury to persons with a safety alert symbol may also include a warning relat-
ing to property damage.
Qualified Personnel
The product/system described in this documentation may be operated only by personnel qualified for the
specific task in accordance with the relevant documentation, in particular its warning notices and safety in-
structions. Qualified personnel are those who, based on their training and experience, are capable of identify-
ing risks and avoiding potential hazards when working with these products/systems.
Proper Use of Siemens Products
Note the following:
WARNING
Siemens products may only be used for the applications described in the catalog and in the relevant technical
documentation. If products and components from other manufacturers are used, these must be recommend-
ed or approved by Siemens. Proper transport, storage, installation, assembly, commissioning, operation and
maintenance are required to ensure that the products operate safely and without any problems. The permis-
sible ambient conditions must be complied with. The information in the relevant documentation must be ob-
served.
Trademarks
All names identified by ® are registered trademarks of Siemens AG. The remaining trademarks in this publica-
tion may be trademarks whose use by third parties for their own purposes could violate the rights of the own-
er.
Disclaimer of Liability
We have reviewed the contents of this publication to ensure consistency with the hardware and software de-
scribed. Since variance cannot be precluded entirely, we cannot guarantee full consistency. However, the in-
formation in this publication is reviewed regularly and any necessary corrections are included in subsequent
editions.
10.1.2 Configuring Classes of Service for Specific Ethernet Ports ................................... 235
10.1.3 Configuring Priority to CoS Mapping .................................................................. 236
10.1.4 Configuring DSCP to CoS Mapping ..................................................................... 236
11 Time Services .................................................................................................................... 239
11.1 Configuring the Time and Date ......................................................................... 239
11.2 Managing NTP ................................................................................................... 240
11.2.1 Enabling/Disabling NTP Service .......................................................................... 240
11.2.2 Configuring NTP Servers .................................................................................... 240
12 Network Discovery and Management .............................................................................. 243
12.1 Enabling/Disabling RCDP .................................................................................... 243
12.2 Managing LLDP ................................................................................................. 244
12.2.1 Configuring LLDP Globally ................................................................................. 245
12.2.2 Configuring LLDP for an Ethernet Port ............................................................... 246
12.2.3 Viewing Global Statistics and Advertised System Information ............................. 246
12.2.4 Viewing Statistics for LLDP Neighbors ................................................................ 247
12.2.5 Viewing Statistics for LLDP Ports ........................................................................ 247
12.3 Managing SNMP ................................................................................................ 248
12.3.1 SNMP Management Interface Base (MIB) Support .............................................. 249
12.3.1.1 Supported Standard MIBs .................................................................................. 249
12.3.1.2 Supported Proprietary RUGGEDCOM MIBs .......................................................... 250
12.3.1.3 Supported Agent Capabilities ............................................................................. 250
12.3.2 SNMP Traps ....................................................................................................... 251
12.3.3 Managing SNMP Users ...................................................................................... 253
12.3.3.1 Viewing a List of SNMP Users ............................................................................ 253
12.3.3.2 Adding an SNMP User ....................................................................................... 253
12.3.3.3 Deleting an SNMP User ..................................................................................... 255
12.3.4 Managing Security-to-Group Mapping ............................................................... 255
12.3.4.1 Viewing a List of Security-to-Group Maps ........................................................... 256
12.3.4.2 Adding a Security-to-Group Map ........................................................................ 256
12.3.4.3 Deleting a Security-to-Group Map ...................................................................... 256
12.3.5 Managing SNMP Groups .................................................................................... 257
12.3.5.1 Viewing a List of SNMP Groups ......................................................................... 257
12.3.5.2 Adding an SNMP Group ..................................................................................... 257
12.3.5.3 Deleting an SNMP Group ................................................................................... 258
12.4 ModBus Management Support .......................................................................... 258
12.4.1 ModBus Function Codes .................................................................................... 259
12.4.2 ModBus Memory Map ....................................................................................... 260
12.4.3 Modbus Memory Formats .................................................................................. 264
12.4.3.1 Text .................................................................................................................. 264
12.4.3.2 Cmd .................................................................................................................. 264
12.4.3.3 Uint16 ............................................................................................................... 265
12.4.3.4 Uint32 ............................................................................................................... 265
12.4.3.5 PortCmd ............................................................................................................ 265
12.4.3.6 Alarm ................................................................................................................ 266
12.4.3.7 PSStatusCmd ..................................................................................................... 266
This guide describes v5.4 of ROS (Rugged Operating System) running on the
RUGGEDCOM RS920P. It contains instructions and guidelines on how to use the soft-
ware, as well as some general theory.
It is intended for use by network technical support personnel who are familiar with
the operation of networks. It is also recommended for use by network and system
planners, system programmers, and line technicians.
NOTICE
Some of the parameters and options described may not be available depending on
variations in the device hardware. While every attempt is made to accurately de-
scribe the specific parameters and options available, this Guide should be used as a
companion to the Help text included in the software.
Command Formatting
CLI commands are displayed in this document according to the following syntax
rules:
Convention Description Example
Font All commands, parameters, and options command parameter
are displayed in a monospace font.
User-Defined Val- Some parameters require a user-de- command parameter { val
ues fined value. Values that need to be de- ue }
fined by you are wrapped in braces
(curly brackets).
The value can be a string, such as a
name or description.
The value may be a system component,
such as an ID or interface.
Related Documents
The following are other documents related to this product that may be of interest.
Unless indicated otherwise, each document is available on the Siemens Industry On-
line Support (SIOS) [https://support.industry.siemens.com] website.
Documents listed are those available at the time of publication. Newer versions of
these documents or their associated products may be available. For more informa-
tion, visit SIOS or consult a Siemens Customer Support representative.
Product Notes
Product notes are available online via SIOS [https://support.industry.siemens.com/cs/-
ca/en/ps/16008/pm].
User/Reference Guides
Document Title Link
RUGGEDCOM NMS v2.1 User Guide for Windows https://support.industry.siemens.com/cs/ww/en/-
view/109737564
RUGGEDCOM NMS v2.1 User Guide for Linux https://support.industry.siemens.com/cs/ww/en/-
view/109737563
RUGGEDCOM DIRECTOR v1.4 User Guide https://support.industry.siemens.com/cs/ww/en/-
view/97691648
RUGGEDCOM EXPLORER v1.5 User Guide https://support.industry.siemens.com/cs/ww/en/-
view/109480804
RUGGEDCOM PING v1.2 User Guide https://support.industry.siemens.com/cs/ww/en/-
view/97674073
Catalogs
Document Title Link
RUGGEDCOM SFP Transceivers Catalog https://support.industry.siemens.com/cs/ww/en/-
view/109482309
FAQs
Document Title Link
How Do You Configure the SMP Function in a https://support.industry.siemens.com/cs/ww/en/-
RUGGEDCOM Switch with RUGGEDCOM ROS? view/109474615
How to Secure RUGGEDCOM ROS Devices Before https://support.industry.siemens.com/cs/ww/en/-
and After Field Deployment view/99858806
How to Reset Passwords https://support.industry.siemens.com/cs/ww/en/-
view/109738242
How to Implement Robust Ring Networks Using https://support.industry.siemens.com/cs/ww/en/-
RSTP and eRSTP view/109738240
How to Implement Secure, Unattended Logging in https://support.industry.siemens.com/cs/ww/en/-
ROS view/109756843
How to Control Bidirectional Traffic when Using https://support.industry.siemens.com/cs/ww/en/-
Port Mirroring view/109759351
Installation Guides
Document Title Link
RUGGEDCOM RSG920P Installation Guide https://support.industry.siemens.com/cs/ww/en/-
view/109477144
System Requirements
Each workstation used to connect to the RUGGEDCOM ROS interface must meet the
following system requirements:
• Must have a working Ethernet interface compatible with at least one of the port
types on the RUGGEDCOM device
• The ability to configure an IP address and netmask on the computer’s Ethernet in-
terface
Accessing Documentation
The latest user documentation for RUGGEDCOM ROS v5.4 is available online at
https://www.siemens.com. To request or inquire about a user document, contact
Siemens Customer Support.
Training
Siemens offers a wide range of educational services ranging from in-house training
of standard courses on networking, Ethernet switches and routers, to on-site cus-
tomized courses tailored to the customer's needs, experience and application.
Siemens' Educational Services team thrives on providing our customers with the es-
sential practical skills to make sure users have the right knowledge and expertise to
understand the various technologies associated with critical communications net-
work infrastructure technologies.
Siemens' unique mix of IT/Telecommunications expertise combined with domain
knowledge in the utility, transportation and industrial markets, allows Siemens to
provide training specific to the customer's application.
For more information about training services and course availability, visit https://-
www.siemens.com or contact a Siemens Sales representative.
Customer Support
Customer support is available 24 hours, 7 days a week for all Siemens customers.
For technical support or general information, contact Siemens Customer Support
through any of the following methods:
Online
Visit http://www.siemens.com/automation/support-request to submit a
Support Request (SR) or check on the status of an existing SR.
Telephone
Call a local hotline center to submit a Support Request (SR). To locate a lo-
cal hotline center, visit https://w3.siemens.com/aspa_app/?lang=en.
Mobile App
Install the Industry Online Support app by Siemens AG on any Android,
Apple iOS or Windows mobile device and be able to:
• Access Siemens' extensive library of support documentation, includ-
ing FAQs and manuals
• Submit SRs or check on the status of an existing SR
• Contact a local Siemens representative from Sales, Technical Support,
Training, etc.
• Ask questions or share knowledge with fellow Siemens customers
and the support community
queue, thus minimizing latency and reducing jitter to allow such demanding ap-
plications to operate correctly. RUGGEDCOM ROS allows priority classification by
port, tags, MAC address, and IP Type of Service (ToS). A configurable weighted
fair queuing algorithm controls how frames are emptied from the queues.
• VLAN (IEEE 802.1Q)
Virtual Local Area Networks (VLAN) allow the segregation of a physical network
into separate logical networks with independent broadcast domains. A measure
of security is provided since hosts can only access other hosts on the same VLAN
and traffic storms are isolated. RUGGEDCOM ROS supports 802.1Q tagged Ether-
net frames and VLAN trunks. Port based classification allows legacy devices to be
assigned to the correct VLAN. GVRP support is also provided to simplify the con-
figuration of the switches on the VLAN.
• Simple Network Management Protocol (SNMP)
SNMP provides a standardized method, for network management stations, to in-
terrogate devices from different vendors. SNMP versions supported by RUGGED-
COM ROS are v1, v2c and v3. SNMPv3 in particular provides security features
(such as authentication, privacy, and access control) not present in earlier SN-
MP versions. RUGGEDCOM ROS also supports numerous standard MIBs (Manage-
ment Information Base) allowing for easy integration with any Network Manage-
ment System (NMS). A feature of SNMP is the ability to generate traps upon sys-
tem events. RUGGEDCOM NMS, the Siemens management solution, can record
traps from multiple devices providing a powerful network troubleshooting tool. It
also provides a graphical visualization of the network and is fully integrated with
all Siemens products.
• Remote Monitoring and Configuration with RUGGEDCOM NMS
RUGGEDCOM NMS (RNMS) is Siemens's Network Management System software
for the discovery, monitoring and management of RUGGEDCOM products and
other IP enabled devices on a network. This highly configurable, full-featured
product records and reports on the availability and performance of network com-
ponents and services. Device, network and service failures are quickly detected
and reported to reduce downtime.
RNMS is especially suited for remotely monitoring and configuring RUGGEDCOM
routers, switches, serial servers and WiMAX wireless network equipment. For
more information, contact a Siemens Sales representative.
• NTP (Network Time Protocol)
NTP automatically synchronizes the internal clock of all RUGGEDCOM ROS de-
vices on the network. This allows for correlation of time stamped events for trou-
bleshooting.
• Port Rate Limiting
RUGGEDCOM ROS supports configurable rate limiting per port to limit unicast
and multicast traffic. This can be essential to managing precious network band-
width for service providers. It also provides edge security for Denial of Service
(DoS) attacks.
Authentication
• Replace the default passwords for all user accounts and processes (where applic-
able) before the device is deployed.
• Use strong passwords with high randomization (i.e. entropy), without repetition
of characters. Avoid weak passwords such as password1, 123456789, abcdefgh,
and any dictionary words or proper names in any combination. For more infor-
mation about creating strong passwords, refer to the password requirements in
"Configuring Passwords (Page 113)".
• Make sure passwords are protected and not shared with unauthorized personnel.
• Passwords should not be re-used across different user names and systems, or af-
ter they expire.
• If RADIUS authentication is done remotely, make sure all communications are
within the security perimeter or on a secure channel.
• Generate and provision a custom SSL certificate and SSH host key pair before
commissioning the device. For more information, refer to "Managing SSH/SSL
Keys and Certificates (Page 129)".
• Use SSH public key authentication. For more information, refer to "Managing
SSH/SSL Keys and Certificates (Page 129)".
Physical/Remote Access
• Do not connect the device to the Internet. Deploy the device only within a secure
network perimeter.
• Restrict physical access to the device to only authorized personnel. A person with
malicious intent could extract critical information, such as certificates, keys, etc.
(user passwords are protected by hash codes), or reprogram the device.
• Unless required, automatic access to removable memory should be disabled to
prevent unauthorized access. For more information about disabling access to re-
movable memory, refer to "Enabling/Disabling Automatic Access to Removable
Memory (Page 40)".
• Control access to the serial console to the same degree as any physical access to
the device. Access to the serial console allows for potential unauthorized access
to the RUGGEDCOM ROS boot loader, which includes tools that may be used to
gain complete access to the device. For more information about restricting ac-
cess to the boot loader interface, refer to "Managing Access to the Boot Loader
Interface (Page 38)".
• Only enable services that will be used on the device, including physical ports. Un-
used physical ports could potentially be used to gain access to the network be-
hind the device.
• Mirror ports allow bidirectional traffic (i.e. the device will not block incoming
traffic to the mirror port or ports). For increased security, configure ingress fil-
tering to control traffic flow when port mirroring is enabled. For more informa-
tion about enabling port mirroring, refer to "Configuring Port Mirroring (Page
67)". For more information about enabling ingress filtering, refer to "Configur-
ing VLANs Globally (Page 147)".
• For increased security, enable ingress filtering on all ports by default. For more
information about enabling ingress filtering, refer to "Configuring VLANs Globally
(Page 147)".
• If SNMP is enabled, limit the number of IP addresses that can connect to the de-
vice and change the community names. Also configure SNMP to raise a trap up-
on authentication failures. For more information, refer to "Managing SNMP (Page
248)".
• Avoid using insecure services such as Telnet and TFTP, or disable them complete-
ly if possible. These services are available for historical reasons and are disabled
by default.
• Disable RCDP if it is not intended for use.
• Limit the number of simultaneous Web Server, Telnet and SSH sessions allowed.
• Configure remote system logging to forward all logs to a central location. For
more information, refer to "Managing Logs (Page 55)" and the FAQ How to
Implement Secure, Unattended Logging in ROS (https://support.industry.siemen-
s.com/cs/ww/en/view/109756843).
• Configuration files are provided in the CSV (comma separated values) format for
ease of use. Make sure configuration files are properly protected when they ex-
ist outside of the device. For instance, encrypt the files, store them in a secure
place, and do not transfer them via insecure communication channels.
• Management of the configuration file, certificates and keys is the responsibility
of the device owner. Consider using RSA key sizes of at least 2048 bits in length
and certificates signed with SHA256 for increased cryptographic strength. Before
returning the device to Siemens for repair, make sure encryption is disabled (to
create a cleartext version of the configuration file) and replace the current certifi-
cates and keys with temporary throwaway certificates and keys that can be de-
stroyed upon the device's return.
• Be aware of any non-secure protocols enabled on the device. While some proto-
cols such as HTTPS and SSH are secure, others such as HTTP, MMS, Telnet, and
RSH were not designed for this purpose. Appropriate safeguards against non-se-
cure protocols should be taken to prevent unauthorized access to the device/net-
work.
• Configure port security features on access ports to prevent an unauthorized
third-party from physically connecting to the device. For more information, refer
to "Managing Port Security (Page 121)".
Hardware/Software
• Make sure the latest firmware version is installed, including all security-relat-
ed patches. For the latest information on security patches for Siemens prod-
ucts, visit the Industrial Security website [https://www.siemens.com/global/en/-
home/company/topic-areas/future-of-manufacturing/industrial-security.html] or
the ProductCERT Security Advisories website [http://www.siemens.com/innova-
tion/en/technology-focus/siemens-cert/cert-security-advisories.htm]. Updates to
Siemens Product Security Advisories can be obtained by subscribing to the RSS
feed on the Siemens ProductCERT Security Advisories website, or by following
@ProductCert on Twitter.
• Enable BPDU Guard on ports where RSTP BPDUs are not expected.
• Use the latest Web browser version compatible with RUGGEDCOM ROS to make
sure the most secure Transport Layer Security (TLS) versions and ciphers avail-
able are employed.
• Modbus can be deactivated if not required by the user. If Modbus activation is re-
quired, then it is recommended to follow the security recommendations outlined
in this User Guide and to configure the environment according to defense-in-
depth best practices.
• Prevent access to external, untrusted Web pages while accessing the device via a
Web browser. This can assist in preventing potential security threats, such as ses-
sion hijacking.
• For optimal security, use SNMPv3 whenever possible. Use strong authentica-
tion keys and private keys without repetitive strings ( e.g. abc or abcabc) with
this feature. For more information about creating strong passwords, refer to the
password requirements in "Configuring Passwords (Page 113)".
• Unless required for a particular network topology, the IP Forward setting should
be set to Disabled to prevent the routing of packets.
Policy
• Periodically audit the device to make sure it complies with these recommenda-
tions and/or any internal security policies.
• Review the user documentation for other Siemens products used in coordination
with device for further security recommendations.
1 Classification Box
Figure 1.1 Product Information Form (Example)
2001:0db8:3c4d:0015:0000:0000:1a2f:1a2b
1 2 3
1 Site Prefix
2 Subnet ID
3 Interface ID
Figure 1.2 IPv6 Global Unicast Address Example
20
18
19
17
1-8 9-16
• Port Open
The port state, whether it is always open and cannot be closed, or open only, but
can be configured.
Note
In certain cases, the service might be disabled, but the port can still be open (e.g.
TFTP).
• Port Default
The default state of the port (i.e. open or closed).
• Access Authorized
Denotes whether the ports/services are authenticated during access.
Services Port Number Service En- Access Authorized Note
abled/Disabled
Telnet TCP/23 Disabled Yes Only available through
management inter-
faces.
HTTP TCP/80 Enabled, redirects to — Only redirects to 443
443 on Controlled versions
HTTPS TCP/443 Enabled (configurable) Yes Only applicable to Con-
trolled versions
RSH TCP/514 Disabled (configurable) Yes Only available through
management inter-
faces.
TFTP UDP/69 Disabled (configurable) No Only available through
management inter-
faces.
SFTP TCP/22 Enabled Yes Only available through
management inter-
faces.
SNMP UDP/161 Disabled (configurable) Yes Only available through
management inter-
faces.
SNTP UDP/123 Enabled (configurable) No Only available through
management inter-
faces.
SSH TCP/22 Enabled Yes Only available through
management inter-
faces.
ICMP — Enabled No
TACACS+ TCP/49 (configurable) Disabled (configurable) Yes
RADIUS UDP/1812 to send Disabled (configurable) Yes Only available through
(configurable), opens management inter-
random port to listen faces.
to
Remote Syslog UDP/514 (config- Disabled (configurable) No Only available through
urable) management inter-
faces.
Note
The microSD/microSDHC card will be automatically formatted to the FAT16 or FAT32
file system if any file system other than FAT16 or FAT32 is loaded on the card.
Note
For instructions on how to disable automatic access to the microSD/microSDHC card ,
refer to "Enabling/Disabling Automatic Access to Removable Memory (Page 40)".
2.1 Logging In
To log in to the device, do the following:
1. Connect to the device either directly or through a Web browser. For more infor-
mation about how to connect to the device, refer to "Connecting to ROS (Page
43)".
Once the connection is established, the login form appears.
1 2
1 Username Box
2 Password Box
3 Submit Button
Figure 2.2 Login Screen (Web Interface)
Note
The following default user name and password is set on the device:
User Name Password
admin admin
CAUTION
To prevent unauthorized access to the device, make sure to change the default
admin password before commissioning the device.
For more information about changing passwords, refer to "Configuring Pass-
words (Page 113)".
2. In the User Name field, type the user name for an account setup on the device.
3. In the Password field, type the password for the account.
4. Click Enter or click Submit (Web interface only).
1 Logout
Figure 2.3 Web Interface (Example)
Note
If any pending configuration changes have not been committed, RUGGEDCOM ROS
will request confirmation before discarding the changes and logging out of the de-
vice.
2
3
1 Top Frame
2 Side Frame
3 Main Frame
Figure 2.4 Web Interface Layout (Example)
Frame Description
Top The top frame displays the system name for the device.
Side The side frame contains a logout option and a collapsible list of
links that open various screens in the main frame. For information
about logging out of RUGGEDCOM ROS, refer to "Logging Out (Page
19)".
Main The main frame displays the parameters and/or data related to the
selected feature.
Each screen consists of a title, the current user's access level, parameters and/or data
(in form or table format), and controls (e.g. add, delete, refresh, etc.). The title pro-
vides access to context-specific Help for the screen that provides important informa-
tion about the available parameters and/or data. Click on the link to open the Help in-
formation in a new window.
When an alarm is generated, an alarm notification replaces the current user's access
level on each screen until the alarm is cleared. The notification indicates how many
alarms are currently active. For more information about alarms, refer to "Managing
Alarms (Page 98)".
1 3
1 Title
2 Parameters and/or Data
3 Access Level or Alarm Notification
4 Reload Button
Figure 2.5 Elements of a Typical Screen (Example)
Note
If desired, the web interface can be disabled. For more information, refer to "En-
abling/Disabling the Web Interface (Page 98)".
Note
IP services can be restricted to control access to the device. For more information, re-
fer to "Configuring IP Services (Page 84)".
Each screen consists of a system identifier, the name of the current menu, and a
command bar. Alarms are also indicated on each screen in the upper right corner.
1 5
1 System Identification
2 Menus
3 Command Bar
4 Menu Name
5 Alarms Indicator
Figure 2.6 Console Interface (Example)
Note
The system identifier is user configurable. For more information about setting the
system name, refer to "Configuring the System Information (Page 97)".
Configuring Parameters
Use the following controls to select and configure parameters in the Console inter-
face:
Up/Down Arrow Use the up and down arrow keys to select parameters.
Keys
Enter Select a parameter and press Enter to start editing a parameter. Press Enter again
to commit the change.
Commands
The command bar lists the various commands that can be issued in the Console inter-
face. Some commands are specific to select screens. The standard commands include
the following:
Ctrl + A Commits configuration changes made on the current screen.
Note
Before exiting a screen, RUGGEDCOM ROS will automatically prompt the user to
save any changes that have not been committed.
Note
If removable memory (i.e. microSD/microSDHC card ) is present, configuration
changes will update both config.csv on the flash and on the removable mem-
ory.
CAUTION
Misuse of the factory commands may corrupt the opera-
tional state of device and/or may permanently damage the
ability to recover the device without manufacturer interven-
tion.
Note
The device to be pinged must support ICMP echo. Upon com-
mencing the ping, an ARP request for the MAC address of the
device is issued. If the device to be pinged is not on the same
network as the device pinging the other device, the default
gateway must be programmed.
Note
Tracing has been designed to provide detailed information to expert users. Note that
all tracing is disabled upon device startup.
Note
If required, expand the trace scope by stringing protocols and their associated
options together using a vertical bar (|).
Where:
• { protocol } is the protocol to trace
• { option } is the option to use during the trace
Example:
>trace transport allon
TRANSPORT: Logging is enabled
Where:
• { ipaddr } is the address or resolved name of the device.
• { auth_token } is the user name (i.e. guest, operator or admin) and corre-
sponding password separated by a comma. For example, admin,secret.
• { command_string } is the RUGGEDCOM ROS CLI command to execute.
Note
The access level (corresponding to the user name) selected must support the given
command.
Note
Any output from the command will be returned to the workstation submitting the
command. Commands that start interactive dialogs (such as trace) cannot be used.
Note
For a list of parameters available under the sql command, refer to "Available CLI
Commands (Page 23)".
Note
Read/write access to tables containing passwords or shared secrets is unavailable us-
ing SQL commands.
This command also displays menu names and their corresponding database table
names depending upon the features supported by the device. For example:
Table Description
-------------------------------------------------------------------------------
alarms Alarms
cpuDiags CPU Diagnostics
ethPortCfg Port Parameters
ethPortStats Ethernet Statistics
ethPortStatus Port Status
ipCfg IP Services
Where:
• { table } is the name of the table
Example:
>sql select from ipAddrtable
1 records selected
Note
The parameter name must be the same as it is displayed in the menu system, un-
less the name contains spaces (e.g. ip address). Spaces must be replaced with under-
scores (e.g. ip_address) or the parameter name must be wrapped in double quotes
(e.g. "ip address").
Where:
• { parameter } is the name of the parameter
• { table } is the name of the table
Example:
>sql select "ip address" from ipSwitchIfCfg
IP Address
192.168.0.1
1 records selected
Where:
• { table } is the name of the table
• { parameter } is the name of the parameter
• { value } is the value of the parameter
Example:
>sql select from ethportcfg where media = 1000T
4 records selected
Where:
• { table } is the name of the table
• { parameter } is the name of the parameter
• { value } is the value of the parameter
Example:
>sql select from ethportcfg where media = 1000T and State = enabled
4 records selected
Where:
• { table } is the name of the table
• { parameter } is the name of the parameter
• { value } is the value of the parameter
Example:
>sql update iplcfg set IP_Address_Type = static
1 records updated
Conditions can also be included in the command to apply changes only to parame-
ters that meet specific criteria. In the following example, flow control is enabled on
ports that are operating in 100 Mbps full-duplex mode with flow control disabled:
>sql update ethportcfg set FlowCtrl = Off where ( Media = 100TX and FlowCtrl = On )
2 records updated
Where:
• { table } is the name of the table
1 records selected
Select a range of ports using a dash (-) between the first port and the last port in the
list:
1-4
Use the All option to select all ports in the device, or, if available, use the None op-
tion to select none of the ports.
Where:
• { filename } is the name of the file stored in Flash memory
Details, similar to the following, are displayed.
>flashfiles info main.bin
Platform : ROS-MPC83
File name : main.bin
Firmware version : v5.4.0
Build date : Sep 27 2014 15:50
File length : 2624659
Board IDs : 3d
CAUTION
Mechanical hazard – risk of damage to the device
Excessive use of BIST functions may cause increase wear on the device, which may
void the warranty. Avoid using BIST functions unless instructed by a Siemens Cus-
tomer Support representative.
Note
Access to BIST mode is disabled at the factory by default. All console inputs are ig-
nored and users are directed automatically to the RUGGEDCOM ROS user interface.
Note
Access to BIST and the boot loader can be later revoked by changing no to yes.
NOTICE
Do not connect the device to the network when it is in BIST mode. The device will
generate excess multicast traffic in this mode.
Note
Access to the boot loader interface is disabled at the factory by default on all devices
running RUGGEDCOM ROS v5.4. All console inputs are ignored and users are directed
automatically to the RUGGEDCOM ROS user interface.
Note
Siemens recommends disabling access to the boot loader interface following an up-
grade from an earlier version of RUGGEDCOM ROS to RUGGEDCOM ROS v5.4. For
more information about disabling the boot loader, refer to "Enabling/Disabling Access
to the Boot Loader Interface (Page 39)".
to
Security=no
to
Security=yes
IMPORTANT
To allow boot up from the microSD/microSDHC card , automatic access to the re-
movable memory must be enabled. For more information, refer to "Enabling/Dis-
abling Automatic Access to Removable Memory (Page 40)".
1. Using a PC/laptop, create a file named bootoption.txt and include the fol-
lowing line in the file:
BootOrderFirstRemovable=[no | yes]
WARNING
Security hazard – risk of unauthorized access and/or exploitation. Unless required,
automatic access to removable memory should be disabled.
2. To disable automatic access to removable memory, add the following line to the
file:
DisableAutoAccessRemovable = yes
Note
The DisableAutoAccessRemovable command only affects automatic ac-
tions. Even when automatic access to removable memory is disabled, users can
manually copy files between a device and its microSD/microSDHC card .
NOTICE
Siemens recommends the following actions before commissioning the device:
• Replace the factory-provisioned, self-signed SSL certificate with one signed by a
trusted Certificate Authority (CA)
• Configure the SSH client to use diffie-hellman-group14-sha1 or better
Note
For Microsoft Windows users, the RUGGEDCOM USB Serial Console driver must be in-
stalled on the users workstation before connecting via the USB Type-B console port.
For more information, refer to "Installing the RUGGEDCOM USB Serial Console Driver
(Windows Only) (Page 46)".
Note
When the USB Type-B console port is in use, the RJ-45 console port will echo the con-
sole output but not accept any user input.
2. Open a Web browser. For a list of recommended Web browsers, refer to "System
Requirements (Page xv)".
NOTICE
Upon connecting to the device, some Web browsers may report the Web serv-
er's certificate cannot be verified against any known certificates. This is expect-
ed behavior, and it is safe to instruct the browser to accept the certificate. Once
the certificate is accepted, all communications with the Web server through
that browser will be secure.
NOTICE
IPv6 addresses must be wrapped in square brackets (e.g. https://
[2001:db8:123::2228]).
3. In the address bar, type the IP address for the port that is connected to the net-
work. For example, to access the device using its factory default IP address, type
https://192.168.0.1 and press Enter. Once the connection is established,
the login screen for the Web interface appears.
For more information about logging in to the device, refer to "Logging In (Page
18)". For more information about the Web interface, refer to "Using the Web In-
terface (Page 19)".
Note
IP services can be restricted to control access to the device. For more information, re-
fer to "Configuring IP Services (Page 84)".
Hardware ID Shows the type, part number, and revision level of the hardware.
Example: RSG920P, RSG920Pv2
Parameter Description
Note
MRMs or MRAs acting as Manager must be either physically disconnected or have the
ring port disabled (i.e. MRP ring open) before restoring factory defaults, otherwise
default configurations may not be restored for the following parameters:
• Port RSTP Parameters
• Global MRP Parameters
• MRP Instances
For more information about MRP rings, refer to "Managing the Media Redundancy
Protocol (MRP) (Page 214)".
For more information about configuring port parameters, refer to "Configuring an
Ethernet Port (Page 64)".
Note
If the VLAN ID for the Management IP interface is not 1, setting Defaults Choice
to Selected will automatically set it to 1.
Parameter Description
3. Click Apply.
NOTICE
Scripts can be used to automate the management of files on the device. However,
depending on the size of the target file(s), a delay between any concurrent write
and read commands may be required, as the file may not have been fully saved be-
fore the read command is issued. A general delay of five seconds is recommended,
but testing is encouraged to optimize the delay for the target file(s) and operating
environment.
Note
The contents of the internal file system are fixed. New files and directories cannot be
created, and existing files cannot be deleted. Only the files that can be uploaded to
the device can be overwritten.
Note
Multiple versions of the standard files can be saved on the microSD/microSDHC card .
However, if any file resides in the root directory of the microSD/microSDHC card and
has the same filename as a file in the internal memory, RUGGEDCOM ROS will auto-
matically load the file during the next boot up.
Note
This method requires a host computer that has terminal emulation or Telnet software
installed, and the ability to perform XMODEM transfers.
1. Establish a connection between the device and the host computer. For more in-
formation, refer to "Connecting to ROS (Page 43)".
2. Log in to the device as an admin user and access the CLI shell. For more informa-
tion about accessing the CLI shell, refer to "Using the Command Line Interface
(Page 23)".
Where:
• send sends the file to the host computer
• receive pulls the file from the host computer
• { filename } is the name of the file (i.e. main.bin)
Note
If available in the terminal emulation or Telnet software, select the XModem 1K
protocol for transmission over the standard XModem option.
4. When the device responds with Press Ctrl-X to cancel, launch the XMO-
DEM transfer from the host computer. The device will indicate when the transfer
is complete.
Note
When SSH is used to establish a connection between the RSG920P device and
the host computer, XMODEM can take a long time to download an image.
The following is an example from the CLI shell of a successful XMODEM file
transfer:
>xmodem receive main.bin
Press Ctrl-X to cancel
Receiving data now ...C
Received 1428480 bytes. Closing file main.bin ...
main.bin transferred successfully
5. If the file has been uploaded, reset the device. For more information, refer to
"Resetting the Device (Page 95)"
NOTICE
TFTP does not define an authentication scheme. Any use of the TFTP client or server
is considered highly insecure.
Note
This method requires a TFTP server that is accessible over the network.
3. Log in to the device as an admin user and access the CLI shell. For more informa-
tion about accessing the CLI shell, refer to "Using the Command Line Interface
(Page 23)".
4. At the CLI prompt, type:
tftp { address } [ get | put ] { source-filename }
{ destination-filename }
Where:
• get copies files from the host computer to the device
• put copies files from the device to the host computer
• { address } is the IP address of the computer running the TFTP server
• { source-filename } is the name of the file to be transferred
• { destination-filename } is the name of the file (on the device or
the TFTP server) that will be replaced during the transfer
The following is an example of a successful TFTP client file transfer:
>tftp 10.0.0.1 get ROS-MPC83_Main_v5.4.0.bin main.bin
TFTP CMD: main.bin transfer ok. Please wait, closing file ...
TFTP CMD: main.bin loading successful.
5. If the file has been uploaded, reset the device. For more information, refer to
"Resetting the Device (Page 95)"
NOTICE
TFTP does not define an authentication scheme. Any use of the TFTP client or server
is considered highly insecure.
Note
This method requires a host computer that has TFTP server software installed.
NOTICE
Interaction with TFTP servers is strictly controlled within the device to prevent unau-
thorized access. Make sure the device is configured to accept the TFTP connection.
For more information, refer to "Configuring IP Services (Page 84)".
1. Establish a connection between the device and the host computer. For more in-
formation, refer to "Connecting to ROS (Page 43)".
2. Initialize the TFTP server on the host computer and launch the TFTP transfer. The
server will indicate when the transfer is complete.
The following is an example of a successful TFTP server exchange:
C:\>tftp -i 10.1.0.1 put C:\files\ROS-MPC83_Main_v5.4.0.bin main.bin
Transfer successful: 1428480 bytes in 4 seconds, 375617 bytes/s
3. If the file has been uploaded, reset the device. For more information, refer to
"Resetting the Device (Page 95)"
Note
The device does not have an SFTP client and, therefore, can only receive SFTP files
from an external source. SFTP requires authentication for the file transfer.
Note
This method requires a host computer that has SFTP client software installed.
1. Establish an SFTP connection between the device and the host computer.
2. Launch the SFTP transfer. The client will indicate when the transfer is complete.
The following is an example of a successful SFTP server exchange:
user@host$ sftp admin@ros_ip
Connecting to ros_ip...
admin@ros_ip's password:
sftp>
3. If the file has been uploaded, reset the device. For more information, refer to
"Resetting the Device (Page 95)"
NOTICE
Before sharing an encrypted configuration file with another device, make sure both
devices share the same password/passphrase for deciphering encrypted configura-
tion files. For more information on how to enable data encryption, refer to "Config-
uring Data Encryption (Page 104)".
NOTICE
After uploading or downloading a file, allow at least twenty seconds before remov-
ing the microSD/microSDHC card to ensure the data has been fully transferred.
Note
The files on the microSD/microSDHC card and the device can be renamed during the
transfer. This is useful, for instance, when multiple versions of the firmware binary
file are available on the microSD/microSDHC card. The correct version can be trans-
ferred to the device and renamed main.bin to replace the version currently on the
device.
Note
The file bootoption.txt cannot be uploaded/downloaded using the microSD/mi-
croSDHC card.
To updload a file to the device or download a file from the device, do the following:
1. Insert the microSD/microSDHC card in the device. For more information, refer to
the Installation Guide for the device.
2. Log in to the device as an admin user and access the CLI shell. For more informa-
tion about accessing the CLI shell, refer to "Using the Command Line Interface
(Page 23)".
3. At the CLI prompt, type:
• Uploading
copy a:\{ sourceFile } { destinationFile }
• Downloading
copy { sourceFile } a:\{ destinationFile }
4. If the file has been uploaded, reset the device. For more information, refer to
"Resetting the Device (Page 95)"
Note
Syslog files backed up to the microSD/microSDHC card are timestamped in the format
of year, month and date (e.g. syslog.txt.20140101). This allows for multiple syslog
files to be saved on the same card.
To clear only the local system log, log in to the Web interface and do the following:
1. Navigate to Diagnostics » Clear System Log. The Clear System Log form ap-
pears.
2. Click Confirm.
Note
For maximum reliability, use remote logging. For more information, refer to "Manag-
ing Remote Logging (Page 57)".
3. Click Apply.
3. Click Apply.
4. Click Apply.
Note
For information about configuring remote monitoring for Ethernet ports, refer to
"Managing Remote Monitoring (Page 86)".
1 2
3 4
1 Switch A
2 Switch B
3 Main Transmit Path
4 Backup Transmit Path
5 Controller
Figure 4.1 Example
If the transmit path from the controller to Switch A fails, Switch A still generates a
link signal to the controller through the receive path. The controller still detects the
link with Switch A and does not failover to the backup port.
This situation illustrates the need for a notification method that tells a link partner
when the link integrity signal has stopped. Such a method natively exists in some link
media, but not all.
100Base-TX, 1000Base-T, Includes a built-in auto-negotiation feature (i.e. a special flag called
1000Base-X Remote Fault Indication is set in the transmitted auto-negotiation
signal).
100Base-FX Links Includes a standard Far-End-Fault-Indication (FEFI) feature defined
by the IEEE 802.3 standard for this link type. This feature includes:
• Transmitting FEFI
Transmits a modified link integrity signal in case a link failure is
detected (i.e. no link signal is received from the link partner)
• Detecting FEFI
Indicates link loss in case an FEFI signal is received from the link
partner
10Base-FL LInks No standard support.
10Base-FL links do not have a native link partner notification mechanism and FEFI
support in 100Base-FX links is optional according to the IEEE 802.3 standard, which
means that some links partners may not support it.
Siemens offers an advanced Link-Fault-Indication (LFI) feature for the links that do
not have a native link partner notification mechanism. With LFI enabled, the device
bases the generation of a link integrity signal upon its reception of a link signal. In
the example described previously, if switch A fails to receive a link signal from the
controller, it will stop generating a link signal. The controller will detect the link fail-
ure and failover to the backkup port.
NOTICE
If both link partners have the LFI feature, it must not be enabled on both sides of
the link. If it is enabled on both sides, the link will never be established, as each link
partner will be waiting for the other to transmit a link signal.
The switch can also be configured to flush the MAC address table for the controller
port. Frames destined for the controller will be flooded to Switch B where they will
be forwarded to the controller (after the controller transmits its first frame).
Parameter Description
Parameter Description
Parameter Description
• Packet has valid CRC
Note
Depending on the required link media type, an SFP port may require some explicit
configuration. Before configuring an SFP port, refer to "SFP Transceiver Requirements
(Page 71)".
Parameter Description
not sent so that the link/activity LED will never be lit. You may
want to disable a port for troubleshooting or to secure it from
unauthorized connections.
Note
Disabling a port whose media type is set to 802.11g disables
the corresponding wireless module.
Note
This feature must not be enabled at both ends of a fiber link.
Parameter Description
Note
If one end of the link is fixed to a specific speed and duplex type and the peer
auto-negotiates, there is a strong possibility the link will either fail to raise, or
raise with the wrong settings on the auto-negotiating side. The auto-negotiat-
ing peer will fall back to half-duplex operation, even when the fixed side is full
duplex. Full-duplex operation requires that both ends are configured as such or
else severe frame loss will occur during heavy network traffic. At lower traffic
volumes the link may display few, if any, errors. As the traffic volume rises, the
fixed negotiation side will begin to experience dropped packets, while the au-
to-negotiating side will experience excessive collisions. Ultimately, as traffic load
approaches 100%, the link will become entirely unusable. These problems can
be avoided by always configuring ports to the appropriate fixed values.
4. Click Apply.
Parameter Description
4. Click Apply.
NOTICE
Select a target port that has a higher speed than the source port. Mirroring a 100
Mbps port onto a 10 Mbps port may result in an improperly mirrored stream.
NOTICE
Frames will be dropped if the full-duplex rate of frames on the source port exceeds
the transmission speed of the target port. Since both transmitted and received
frames on the source port are mirrored to the target port, frames will be discarded if
the sum traffic exceeds the target port’s transmission rate. This problem reaches its
extreme in the case where traffic on a 100 Mbps full-duplex port is mirrored onto a
10 Mbps half-duplex port.
NOTICE
Before configuring port mirroring, note the following:
• Mirror ports allow bidirectional traffic, i.e. the device will not block incoming
traffic to the mirror port(s). For increased security, configure ingress filtering to
control traffic flow when port mirroring is enabled. For more information about
enabling ingress filtering, refer to "Configuring VLANs Globally (Page 147)".
• Traffic will be mirrored onto the target port irrespective of its VLAN member-
ship. It could be the same as or different from the source port's membership.
• Network management frames (such as RSTP, GVRP etc.) cannot be mirrored.
• Switch management frames generated by the switch (such as Telnet, HTTP, SN-
MP, etc.) cannot be mirrored.
Note
Invalid frames received on the source port will not be mirrored. These include CRC er-
rors, oversize and undersize packets, fragments, jabbers, collisions, late collisions and
dropped events.
3. Click Apply.
Note
When Fast Link Detection is enabled, the system prevents link state change pro-
cessing from consuming all available CPU resources. However, if Port Guard is
not used, it is possible for almost all available CPU time to be consumed by fre-
quent link state changes, which could have a negative impact on overall system
responsiveness.
Parameter Description
Parameter Description
in a longer network recovery time of up to 2s. Once Port
Guard disables FAST LINK DETECTION of a particular port,
user can re-enable FAST LINK DETECTION on the port by
clearing the alarm.
3. Click Apply.
Note
Since 1000Base-X fiber SFP transceivers are standardized, RUGGEDCOM ROS supports
most models of this type. For more information, refer to the RUGGEDCOM SFP Trans-
ceivers Catalog [https://support.industry.siemens.com/cs/ww/en/view/109482309].
It is strongly recommended to use SFP transceiver models approved by Siemens
only. Siemens performs extensive testing on these transceivers to make sure they
can withstand harsh conditions. If a different SFP transceiver model is used, it is the
user’s responsibility to verify it meets environmental and usage requirements.
1000Base-T copper SFP transceivers are not standardized. RUGGEDCOM ROS sup-
ports only selected models of this type.
Note
SFP transceivers are hot swappable.
When an SFP transceiver is inserted in to the SFP cage, the speed and auto-negoti-
ation settings for the port are automatically adjusted to the appropriate values. For
example, if a 1 G SFP transceiver is installed, the speed of the port is automatically
changed to 1 G and auto-negotiation is set to On.
Note
Due to the uncertain latency introduced by the built-in PHY, the time accuracy of IEEE
1588 may be significantly degraded on a copper SFP port.
If the transceiver is accepted, the Media parameter under Ethernet Ports » Config-
ure Port Parameters shows detailed information about the SFP transceiver, includ-
ing Gigabit Ethernet Compliance Code, transmission media, connector type, and link
length. For example:
SFP 1000LX SM LC 10 km
SFP 1000T 100 m
If the transceiver is not recognized, it is rejected. An alarm is also generated and the
port is blocked so that no link can be established until the transceiver is replaced. The
Media parameter shows the rejected SFP transceiver is unidentified. For example:
SFP Unidentified
If no transceiver is installed on an SFP port, the Media parameter shows the SFP
transceiver is unplugged:
SFP Unplugged
Where:
• { port } is the port number
Information about the SFP port is displayed. For example:
>sfp
17
ID: SFP
Extended ID: GBIC/SFP function is defined by serial ID only
Connector: LC
Transceiver:
Gigabit Ethernet Compliance Codes:
1000LX
Fibre Channel link length:
Long Distance (L)
Fibre Channel transmitter technology:
Longwave laser (LC)
Fibre Channel transmission media:
Single Mode (SM)
Fibre Channel speed:
100 MBytes/Sec
Baud Rate, nominal: 1300 MBits/sec
Encoding type: 8B10B
Length(9um): 10 km
Length(9um): 10000 m
Length(50um): 550 m
Length(62.5um): 550 m
Length(Copper): Not specified
Vendor: xxxxxxx
IEEE company ID: xxxxxxx
Part number: xxxxxxxxxx
Revision: 0000
Laser wavelength: 1310 nm
>
Parameter Description
3. Click Apply.
Parameter Description
0 = 15.4 W (default)
1 = 4.0 W
2 = 7.0 W
3 = 15.4 W
4 = 34.2 W
4. Click Apply.
Parameter Description
4. Click Apply.
Note
For information about how to start a diagnostic test, refer to "Performing Cable Diag-
nostics (Page 78)".
Parameter Description
Note
For each successful diagnostic test, the values for Good, Open, Short or Imped will
increment based on the number of cable pairs connected to the port. For a 100Base-
T port, which has two cable pairs, the number will increase by two. For a 1000Base-T
port, which has four cable pairs, the number will increase by four.
Note
When a cable fault is detected, an estimated distance-to-fault is calculated and
recorded in the system log. The log lists the cable pair, the fault that was detected,
and the distance-to-fault value. For more information about the system log, refer to
"Viewing Local and System Logs (Page 56)".
NOTICE
Both the selected Ethernet port and its partner port can be configured to run
in Enabled mode with auto-negotiation, or in Disabled mode. Other modes are
not recommended, as they may interfere with the cable diagnostics procedure.
2. Connect the other end of the cable to a similar network port. For example, con-
nect a 100Base-T port to a 100Base-T port, or a 1000Base-T port to a 1000Base-T
port.
3. In RUGGEDCOM ROS, navigate to Ethernet Ports » Configure/View Cable Diag-
nostics Parameters. The Cable Diagnostics Parameters table appears.
4. Select an Ethernet port. The Cable Diagnostics Parameters form appears.
5. Under Runs, enter the number of consecutive diagnostic tests to perform. A val-
ue of 0 indicates the test will run continuously until stopped by the user.
6. Under Calib., enter the estimated Distance To Fault (DTF) value. For information
about how to determine the DTF value, refer to "Determining the Estimated Dis-
tance To Fault (DTF) (Page 79)".
7. Select Started.
NOTICE
A diagnostic test can be stopped by selecting Stopped and clicking Apply. How-
ever, if the test is stopped in the middle of a diagnostic run, the test will run to
completion.
8. Click Apply. The state of the Ethernet port will automatically change to
Stopped when the test is complete. For information about how to monitor
the test and view the results, refer to "Viewing Cable Diagnostics Results (Page
77)".
length of the cable. The Distance To Fault (DTF) is now calibrated for the select-
ed Ethernet port.
CAUTION
Configuration hazard – risk of communication disruption
Changing the ID for the management VLAN will break any active Raw Socket TCP
connections. If this occurs, reset all serial ports.
WARNING
Security hazard – risk of unauthorized access and/or exploitation
IP interfaces that belong to a management or auxiliary management VLAN must
be connected to a trusted network.
CAUTION
Configuration hazard – risk of communication disruption.
Changing the ID for the management VLAN will break any active Raw Socket
TCP connections. If this occurs, reset all serial ports.
Note
The IP address and mask configured for the management VLAN are not changed
when resetting all configuration parameters to defaults and will be assigned a
Note
For IPv4, if a dotted decimal notation is configured for the subnet prefix (e.g.
255.255.255.0) it will be automatically converted to the equivalent number of
bits (e.g. 24 bits).
Parameter Description
Parameter Description
NOTICE
Each IP interface must have a unique network address.
4. Click Apply.
NOTICE
The default gateway will not be changed if the selected factory default configuration
is reloaded.
4. Click Apply.
Parameter Description
Note
When upgrading to RUGGEDCOM ROS v5.4, the default will be
set to { Enabled }.
Note
When Layer 3 switching is enabled and Unicast Mode is set to
"Auto", IP forwarding must be enabled.
3. Click Apply.
4. Click Apply.
Parameter Description
INTEGER (INTEGER, Integer32,Counter32, Counter64, Gauge,
or TimeTicks) may be sampled. A list of objects can be printed
using shell command 'rmon'. The OID format: objectName.in-
dex1.index2... where index format depends on index object
type.
Parameter Description
4. Click Apply.
If events have not been configured, add events as needed. For more information, re-
fer to "Adding an RMON Event (Page 92)".
4. Click Apply.
NOTICE
If a microSD/microSDHC card is installed during the upgrade, the new firmware will
be stored to both the internal Flash and the microSD/microSDHC card .
Note
In the event the upgrade process is interrupted, possibly due to a power disrup-
tion, RUGGEDCOM ROS is able to recover if a microSD/microSDHC card with a valid
firmware image (main.bin) is installed before the next reboot. RUGGEDCOM ROS
will copy the firmware image to the internal memory and boot up from it.
Note
The IP address set for the device will not be changed following a firmware upgrade.
IMPORTANT
It is recommended to enable access to the bootloader interface during this proce-
dure in case emergency recovery is needed (e.g. power interruption during the up-
grade). For increased security, Siemens recommends disabling bootloader access
following the upgrade. For more information about managing bootloader access, re-
fer to "Enabling/Disabling Access to the Boot Loader Interface (Page 39)".
5. Disable access to the bootloader interface. For more information, refer to "En-
abling/Disabling Access to the Boot Loader Interface (Page 39)".
NOTICE
Before downgrading the firmware, make sure the hardware and FPGA code types
installed in the device are supported by the older firmware version. Refer to the Re-
lease Notes for the older firmware version to confirm.
CAUTION
Do not downgrade the RUGGEDCOM ROS boot version.
NOTICE
Never downgrade the firmware with encryption enabled to a version that does
not support encryption.
4. Restore the device to its factory defaults. For more information, refer to "Restor-
ing Factory Defaults (Page 49)".
5. Upload and apply the older firmware version and its associated FPGA files using
the same methods used to install newer firmware versions. For more informa-
tion , refer to "Upgrading Firmware (Page 93)".
6. Press Ctrl-S to access the CLI.
7. Clear all logs by typing:
clearlogs
NOTICE
After downgrading the firmware and FPGA files, be aware that some settings
from the previous configuration may be lost or reverted back to the factory de-
faults (including user passwords if downgrading from a security related ver-
sion), as those particular tables or fields may not exist in the older firmware ver-
sion. Because of this, the unit must be configured after the downgrade.
This may take several minutes to complete. To verify the certificate has been
generated, type:
type syslog.txt
When the phrase Generated ssl.crt was saved appears in the log, the
SSL certificate has been generated.
9. Generate random SSH keys by typing:
sshkeygen
This may take several minutes to complete. To verify the keys have been gener-
ated, type:
type syslog.txt
When the phrase Generated ssh.keys was saved appears in the log,
the SSH keys have been generated.
10. De-fragment and erase all free flash memory by typing:
flashfile defrag
3. Click Apply.
To update the banner.txt file, download the file from the device, modify it and
then load it back on to the device. For information about uploading and downloading
files, refer to "Uploading/Downloading Files (Page 50)".
Alternatively, the banner.txt file can be updated using the banner CLI command.
For more information, refer to "Available CLI Commands (Page 23)".
Note
The Web interface can be disabled via the Web UI by configuring the Web Server
Users Allowed parameter in the IP Services form. For more information, refer to
"Configuring IP Services (Page 84)".
1. Log in to the device as an admin user and access the CLI shell. For more informa-
tion about accessing the CLI shell, refer to "Using the Command Line Interface
(Page 23)".
2. Navigate to Administration » Configure IP Services » Web Server Users Al-
lowed.
3. Select Disabled to disable the Web interface, or select the desired number of
Web server users allowed to enable the interface.
Note
For more information about RMON alarms, refer to "Managing RMON Alarms (Page
88)".
When either type of alarm occurs, a message appears in the top right corner of the
user interface. If more than one alarm has occurred, the message will indicate the
number of alarms. Active alarms also trip the Critical Failure Relay LED on the device.
The message and the LED will remain active until the alarm is cleared.
Note
Alarms are volatile in nature. All alarms (active and passive) are cleared at startup.
Note
This list of alarms (configurable and non-configurable) is accessible through the
Command Line Interface (CLI) using the alarms command. For more information,
refer to "Available CLI Commands (Page 23)".
NOTICE
Critical and Alert level alarms are not configurable and cannot be disabled.
4. Click Apply.
Note
For more information about connecting digital inputs to the RUGGEDCOMRS920P, re-
fer to the RUGGEDCOM RS920P Installation Guide.
4. Click Apply.
Note
All alarms and log messages related to login authentication are configurable. For
more information about configuring alarms, refer to "Configuring an Alarm (Page
99)".
Note
For Non-Controlled (NC) versions of RUGGEDCOM ROS, this alarm is only generated
when default SSL keys are in use.
Note
Data encryption is not available in Non-Controlled (NC) versions of RUGGEDCOM
ROS. When switching between Controlled and Non-Controlled (NC) versions of
RUGGEDCOM ROS, make sure data encryption is disabled. Otherwise, the NC version
of RUGGEDCOM ROS will ignore the encrypted configuration file and load the factory
defaults.
Note
Only configuration data is encrypted. All comments and table names in the configu-
ration file are saved as clear text.
Note
When sharing a configuration file between devices, make sure both devices have the
same passphrase configured. Otherwise, the configuration file will be rejected.
Note
Encryption must be disabled before the device is returned to Siemens or the configu-
ration file is shared with Customer Support.
NOTICE
Never downgrade the RUGGEDCOM ROS software version beyond RUGGEDCOM ROS
v5.4 when encryption is enabled. Make sure the device has been restored to factory
defaults before downgrading.
3. Click Apply.
Note
For information about uploading/downloading files, refer to "Uploading/Downloading
Files (Page 50)".
• Any text editing program capable of reading and writing ASCII files
• Difference/patching tools (e.g. the UNIX diff and patch command line utilities)
• Source Code Control systems (e.g. CVS, SVN)
CAUTION
Configuration hazard – risk of data loss. Do not edit an encrypted configuration file.
Any line that has been modified manually will be ignored.
RUGGEDCOM ROS also has the ability to accept partial configuration updates. For ex-
ample, to update only the parameters for Ethernet port 1 and leave all other parame-
ters unchanged, transfer a file containing only the following lines to the device:
# Port Parameters
ethPortCfg
Port,Name,Media,State,AutoN,Speed,Dupx,FlowCtrl,LFI,Alarm,
1,Port 1,100TX,Enabled,On,Auto,Auto,Off,Off,On,
Note
The files ruggedcom.icd (IEC61850 IED Capability Description of the device) and
ruggedcom.iid (IEC61850 Instantiated IED Description of the device) list the logi-
cal nodes supported by RUGGEDCOM ROS. For information about downloading these
files, refer to "Uploading/Downloading Files (Page 50)".
For information about modifying an MMS report, refer to "Configuring an MMS Re-
port (Page 109)".
4. Click Apply.
The following topology depicts a scenario where four clients on a LAN are being sent
MMS reports from RUGGEDCOM ROS:
MMS
1 2 3
1 RUGGEDCOM ROS
2 MMS Report
3 LAN
4 Client
Figure 5.1 Topology – MMS
Note
Client configuartion is dependent on the MMS client being used. Refer to the
OEM's operating instructions for specific configuration details.
a. Enable or disable specific MMS reports, as desired. For a list of available re-
ports in RUGGEDCOM ROS, refer to "Reports/Data Sets (Page 107)".
b. Configure the device to provide either event-based or time-based reports, as
desired.
2. In RUGGEDCOM ROS, do the following:
a. Configure the number of MMS sessions allowed, to specify how many
clients will be receiving reports. Per the topology, 4 sessions are allowed.
For more information about configuring MMS sessions, refer to "Configur-
ing IP Services (Page 84)".
b. If time-based reports are selected on the client side, configure the repor-
ing time interval as desired. For more information, refer to "Configuring an
MMS Report (Page 109)".
3. To verify the configuration, make sure each client receives MMS reports from the
device per the configuration.
Note
RUGGEDCOM ROS requires that all user passwords meet strict guidelines to pre-
vent the use of weak passwords. When creating a new password, make sure it
adheres to the following rules:
• Must not be less than 8 characters in length.
• Must not include the username or any 4 continous characters found in the
username. For example, if the username is Subnet25, the password may not
be subnet25admin, subnetadmin or net25admin. However, net-25admin or
Sub25admin is permitted.
• Must have at least one alphabetic character and one number. Special char-
acters are permitted.
• Must not have more than 3 continuously incrementing or decrementing
numbers. For example, Sub123 and Sub19826 are permitted, but Sub12345
is not.
An alarm will generate if a weak password is configured. The weak password
alarm can be disabled by the user. For more information about disabling alarms,
refer to "Managing Alarms (Page 98)".
Parameter Description
Settings:
• Local – Authentication from the local Password Table.
• RADIUS – Authentication using a RADIUS server for net-
work access only (HTTP/HTTPS, SSH, RSH, Telnet). For con-
sole access, authenticate from the local Password Table. If
local authentication fails, then authenticate using RADIUS
server.
• TACACS+ – Authentication using a TACACS+ server for net-
work access only (HTTP/HTTPS, SSH, RSH, Telnet). For con-
sole access, authenticate from the local Password Table. If
local authentication fails, then authenticate using TACACS+
server.
• RADIUSOrLocal – Authentication using RADIUS. If the
server cannot be reached, authenticate from the local Pass-
word Table.
• TACACS+OrLocal – Authentication using TACACS+. If the
server cannot be reached, authenticate from the local Pass-
word Table.
Parameter Description
3. Click Apply.
Note
The commands used in the following procedure are time-sensitive. If the specified
time limits are exceeded before providing the appropriate response, the device will
continue normal boot up.
1. Connect to the device via the RS-232 serial console port. For more information,
refer to "Connecting Directly (Page 43)".
2. Cycle power to the device. As the device is booting up, the following prompt will
appear:
Press any key to start
3. Within four seconds, press CTRL + r. The access banner will appear, followed by
the command prompt:
>
5. When prompted "Do you want to clear private data (Yes/No)?", answer yes and
press Enter within five seconds. All configuration and keys in flash will be ze-
roized. An entry in the event log will be created. Crashlog.txt files (if existing)
and syslog.txt files will be preserved. The device will reboot automatically.
Note
Extensions are ignored when IEEE 802.1x port-based authentication is enabled.
RUGGEDCOM ROS will remain transparent and not make any changes to the user-
name. For more information about IEEE 802.1x authentication, refer to "Port Security
Concepts (Page 121)".
3. Click Apply.
NOTICE
RADIUS messages are sent as UDP messages. The switch and the RADIUS server must
use the same authentication and encryption key.
NOTICE
RUGGEDCOM ROS supports both Protected Extensible Authentication Protocol
(PEAP) and EAP-MD5. PEAP is more secure and is recommended if available in the
supplicant.
Note
For more information about the RADIUS protocol, refer to RFC 2865 [http://tools.iet-
f.org/html/rfc2865].
For more information about the Extensible Authentication Protocol (EAP), refer to
RFC 3748 [http://tools.ietf.org/html/rfc3748].
Note
For information about configuring the RADIUS server, refer to the manufacturer's in-
structions of the server being configured.
The Vendor-Specific attribute (or VSA) sent to the RADIUS server as part of the
RADIUS request is used to determine the access level from the RADIUS server. This at-
tribute may be configured within the RADIUS server with the following information:
Attribute Value
Vendor-Specific Vendor-ID: 15004
Format: String
Number: 2
Attribute: { Guest, Operator, Admin }
Note
If no access level is received in the response packet from the RADIUS server, access is
denied.
Note
The RADIUS client uses the Password Authentication Protocol (PAP) to verify access.
For CLI commands related to configuring the RADIUS client on the device, refer to
"Available CLI Commands (Page 23)".
To configure access to either the primary or backup RADIUS servers, do the following:
1. Navigate to Administration » Configure Security Server » Configure RADIUS
Server. The RADIUS Server Table appears.
2. Select either Primary or Backup from the table. The RADIUS Server form ap-
pears.
3. Configure the following parameter(s) as required:
Parameter Description
4. Click Apply.
Parameter Description
4. Set the privilege levels for each user type (i.e. admin, operator and guest). For
more information, refer to "Configuring User Privileges (Page 120)".
5. Click Apply.
Parameter Description
3. Click Apply.
ed into the Static MAC Address Table and remain there until explicitly removed by the
user.
1 2 3 4
1 Supplicant
2 Authenticator Switch
3 LAN
4 Authentication Server
Figure 6.1 IEEE 802.1x General Topology
NOTICE
RUGGEDCOM ROS supports Protected Extensible Authentication Protocol (PEAP), EAP
Transport Layer Security (EAP-TLS) and EAP-MD5. PEAP and EAP-TLS are more secure
and are recommended if available in the supplicant.
IEEE 802.1x makes use of the Extensible Authentication Protocol (EAP), which is a
generic PPP authentication protocol that supports various authentication methods.
IEEE 802.1x defines a protocol for communication between the Supplicant and the
Authenticator, referred to as EAP over LAN (EAPOL).
RUGGEDCOM ROS communicates with the Authentication Server using EAP over
RADIUS.
Note
The switch supports authentication of one host per port.
Note
If the host’s MAC address is configured in the Static MAC Address Table, it will be au-
thorized, even if the host authentication is rejected by the authentication server.
In some cases, it may be desirable to allow a port to be placed into a particular VLAN,
based on the authentication result. For example:
• To allow a particular device, based on its MAC address, to remain on the same
VLAN as it moves within a network, configure the switches for 802.1X/MAC-Auth
mode
• To allow a particular user, based on the user’s login credentials, to remain on the
same VLAN when the user logs in from different locations, configure the switch-
es for 802.1X mode
If the RADIUS server wants to use this feature, it indicates the desired VLAN by includ-
ing tunnel attributes in the Access-Accept message. The RADIUS server uses the fol-
lowing tunnel attributes for VLAN assignment:
• Tunnel-Type=VLAN (13)
• Tunnel-Medium-Type=802
• Tunnel-Private-Group-ID=VLANID
Note that VLANID is 12-bits and takes a value between 1 and 4094, inclusive. The
Tunnel-Private-Group-ID is a string as defined in RFC 2868 [http://tools.ietf.org/html/-
rfc2868], so the VLANID integer value is encoded as a string.
If the tunnel attributes are not returned by the authentication server, the VLAN as-
signed to the switch port remains unchanged.
Note
Only MAC addresses authorized on a static MAC port(s) are shown. MAC addresses
authorized with IEEE 802.1X are not shown.
Parameter Description
Parameter Description
Parameter Description
Note
There are a few scenarios in which static MAC addresses can move:
• When the link is up/down on a non-sticky secured port
• When traffic switches from or to a non-sticky secured port
Note
Traffic is lost until the source MAC Address of the incoming traffic is authorized
against the static MAC address table.
4. Click Apply.
Parameter Description
4. Click Apply.
NOTICE
Siemens recommends the following actions before commissioning the device:
• Replace the factory-provisioned, self-signed SSL certificate with one signed by a
trusted Certificate Authority (CA)
• Configure the SSH client to use diffie-hellman-group14-sha1 or better
Note
Only admin users can write certificates and keys to the device.
Each RUGGEDCOM ROS device is shipped with a unique ECC 256 self-signed SSL cer-
tificate and an RSA 2048 SSH host key pair that are generated at and provisioned by
the factory. The administrator may upload a new certificate and keys to the system at
any time, which will overwrite the existing ones. In addition, CLI commands are avail-
able to regenerate SSL certificate and key pair as well as the SSH host key pair.
There are three types of certificates and keys used in RUGGEDCOM ROS:
Note
Network exposure to a ROS unit operating with the default keys, although always on-
ly temporary by design, should be avoided. The best way to reduce or eliminate this
exposure is to provision user-created certificate and keys as quickly as possible, and
preferably before the unit is placed in network service.
Note
The default certificate and keys are common to all RUGGEDCOM ROS versions with-
out a certificate or key files. That is why it is important to either allow the key au-
to-generation to complete or to provision custom keys. In this way, one has at least
unique, and at best, traceable and verifiable keys installed when establishing secure
communication with the unit.
• Default
A default certificate and SSL/SSH keys are built in to RUGGEDCOM ROS and are
common across all RUGGEDCOM ROS units sharing the same firmware image. In
the event that valid SSL certificate or SSL/SSH key files are not available on the
device (as is usually only the case when upgrading from an old ROS version that
does not support user-configurable keys and therefore does was not shipped
with unique, factory-generated keys), the default certificate and keys are put into
service temporarily so that SSH and SSL (HTTPS) sessions can be served until gen-
erated or provisioned keys are available.
• Auto-Generated
If a default SSL certificate and SSL/SSH keys are in use, RUGGEDCOM ROS imme-
diately begins to generate a unique certificate and SSL/SSH keys for the device in
the background. If a custom certificate and keys are loaded while auto-generated
certificates and keys are being generated, the generator will abort and the cus-
tom certificate and keys and will be used.
• Custom (Recommended)
Custom certificates and keys are the most secure option. They give the user com-
plete control over certificate and key management, allow for the provision of cer-
tificates signed by a public or local certificate authority, enable strictly controlled
access to private keys, and allow authoritative distribution of SSL certificates, any
CA certificates, and public SSH keys.
Note
The RSA or EC private key corresponding to the SSL certificate must be appended to
the certificate in the ssl.crt file.
Note
RSA keys smaller than 2048 bits in length are not recommended. Support is only in-
cluded here for compatibility with legacy equipment.
Two standard PEM files are required: the SSL certificate and the corresponding RSA
private key file. These are concatenated into the resulting ssl.crt file, which may
then be uploaded to RUGGEDCOM ROS. For more information about transferring
files between the device and a host computer, refer to "Uploading/Downloading Files
(Page 50)".
While RUGGEDCOM ROS is capable of using self-signed certificates created using the
sslkeygen command, Siemens recommends using an X.509 certificate issued by an
organization's own Certificate Authority (CA).
Controlled versions of RUGGEDCOM ROS support SSH public/private key pairs that
conform to the following specifications:
• PEM format
• DSA key pair, 1024, 2048 or 3072 bits in length
• RSA key pair, 1024, 2048 or 3072 bits in length
Note
DSA or RSA key generation times increase depending on the key length. 1024 bit RSA
keys take less than 5 minutes to generate on a lightly loaded unit, whereas 2048 bit
keys may take significantly longer. A typical modern PC system, however, can gener-
ate these keys in seconds.
The following (bash) shell script fragment uses the ssh-keygen command line utili-
ty to generate a 2048 bit RSA key suitable for use in RUGGEDCOM ROS. The resulting
ssh.keys file may then be uploaded to RUGGEDCOM ROS:
# RSA key size:
BITS=2048
The following is an example of a valid entry in the sshpub.keys file in PEM format:
1,userkey,admin,active,alice
---- BEGIN SSH2 PUBLIC KEY ----
AAAAB3NzaC1yc2EAAAABIwAAAQEA4mRrqfk+RKXnmGRvzMyWVDsbq5VwpGGrlLQYCrjVEa
NdbXsphqYKop8V5VUeXFRAUFzOy82yk8TF/5JxGPWq6wRNjhnYR7IY2AiMBq0+K8XeURl/
z5K2XNRjnqTZSFwkhaUVJeduvjGgOlNN4yvgUwF3n0idU9k3E1q/na+LmYIeGhOwzCqoAc
ipHAdR4fhD5u0jbmvjv+gDikTSZIbj9eFJfP09ekImMLHwbBry0SSBpqAKbwVdWEXIKQ47
zz7ao2/rs3rSV16IXSq3Qe8VZh2irah0Md6JFMOX2qm9fo1I62q1DDgheCOsOiGPf4xerH
rI2cs6FT31rAdx2JOjvw==
---- END SSH2 PUBLIC KEY ----
The following is an example of a valid entry in the sshpub.keys file in in RFC4716 for-
mat:
2,userkey,admin,active,bob
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDH0NivR8zzbTxlecvFPzR/GR24N
rRJa0Lc7scNsWRgi0XulHuGrRLRB5RoQ39+spdig88Y8CqhRI49XJx7uL
Je0Su3RvyNYz1jkdSwHq2hSZCpukJxJ6CK95Po/sVa5Gq2gMaHowiYDSkcx+AJywzK/eM6i/jc125l
RxFPdfkj74u+ob3PCvmIWz5z3WAJBrQU1IDPHDets511WMu8O9/mAPZRwjqrWhRsqmcXZuv5oo54wIop
CAZSo20SPzM2VmXFuUsEwDkvYMXLJK1koJPbDjH7yFFC7mwK2eMU/oMFFn934cbO5N6etsJSvplYQ4pM
Cw6Ok8Q/bB5cPSOa/rAt bob@work
RUGGEDCOM ROS allows only 16 user key entries to be stored. Each key entry must
meet the following limits:
• Key type must be either RSA 2048 bits or RSA 3072 bits
• Key size must not exceed 4000 base64 encoded characters
• Entry Type in the header must not exceed 8 ASCII characters
• Access Level in the header must not exceed 8 ASCII characters (operator is maxi-
mum)
• Revocation status in the header must not exceed 8 ASCII characters (inactive is
maximum)
• User Name must not exceed 12 ASCII characters
NOTICE
The content of the sshaddpub.keys file must follow the same syntax as the ssh-
pub.keys file.
4. Check the system log to make sure the files were properly transferred. For more
information about viewing the system log, refer to "Viewing Local and System
Logs (Page 56)".
A list of public keys will appear, including their key ID, access level, revocation
status, user name and key fingerprint.
A list of public keys will appear, including their key ID, access level, revocation
status, user name and key fingerprint.
3. Type the following commands to update the public keys:
Command Description
sshpubkey update_id Updates the ID of user public key.
{ current_ID }
{ new_ID } Note
The user public key ID must be a number between 0 and 9999.
Command Description
sshpubkey update_rs Updates the revocation status (active, inactive) of a user public
{ RS } key.
• { RS } is the revocation status of the public key to be up-
dated
sshpubkey update_un Updates the user name of a user public key.
{ UN }
• { UN } is the user name of the public key to be updated
A list of public keys will appear, including access level, revocation status, user
name and key fingerprint.
3. Type the following commands to delete the public key(s):
Command Description
sshpubkey remove Removes a key from the non-volatile storage.
{ ID }
• { ID } is the ID of the public key to be removed
DQEBBQUAA4GBAHtBsNZuh8tB3kdqR7Pn+XidCsD70YnI7w0tiy9yiRRhARmVXH8h
5Q1rOeHceri3JFFIOxIxQt4KgCUYJLu+c9Esk/nXQQar3zR7IQCt0qOABPkviiY8
c3ibVbhJjLpR2vNW4xRAJ+HkNNtBOg1xUlp4vOmJ2syYZR+7XAy/OP/S
-----END CERTIFICATE-----
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
For SSH, DSA or RSA host key pairs must meet the requirements outlined in "SSH Host
Key (Page 131)".
The following is an example of a PEM formatted SSH key:
-----BEGIN DSA PRIVATE KEY-----
MIIBuwIBAAKBgQD0gcGbXx/rrEMu2913UW4cYo1OlcbnuUz7OZyd2mBLDx/GYbD8
X5TnRcMraJ0RuuGK+chqQJW5k3zQmZa/BS6q9U7wYwIAx8JSxxpwfPfl/t09VwKG
rtSJIMpLRoDq3qEwEVyR4kDUo4LFQDsljtiyhcz1n6kd6gqsd5Xu1vdh4wIVANXb
SBi97GmZ6/9f4UCvIIBtXLEjAoGAAfmhkcCCEnRJitUTiCE+MurxdFUr3mFs/d31
4cUDaLStQEhYYmx5dbFdQuapl4Y32B7lZQkohi5q1T1iUAa40/nUnJx1hFvblkYT
8DLwxcuDAaiu0VqsaPtJ+baL2dYNp96tFisj/475PEEWBGbP6GSe5kKa1Zdgwuie
9LyPb+ACgYBv856v5tb9UVG5+tX5Crfv/Nd8FFlSSFKmVWW3yzguhHajg2LQg8UU
sm1/zPSwYQ0SbQ9aOAJnpLc2HUkK0lji/0oKVI7y9MMc4B+bGu4W4OnryP7oFpnp
YYHt5PJY+zvLw/Wa+u3NOVFHkF1tGyfVBMXeV36nowPo+wrVMolAEgIVALLTnfpW
maV6uh6RxeE1d4XoxSg2
-----END DSA PRIVATE KEY-----
WARNING
Security hazard – risk of unauthorized access and/or exploitation. IP interfaces that
belong to the management VLAN must be connected to a trusted network.
WARNING
Security hazard – risk of unauthorized access and/or exploitation. IP interfaces that
belong to an auxiliary management VLAN must be connected to a trusted network.
Note
It may be desirable to manually restrict the traffic on the trunk to a specific group of
VLANs. For example, when the trunk connects to a device, such as a Layer 3 router,
that supports a subset of the available LANs. To prevent the trunk port from being a
member of the VLAN, include it in the VLAN's Forbidden Ports list.
For more information about the Forbidden Ports list, refer to "Forbidden Ports List
(Page 140)".
Ingress rules are applied as follows to all frame when they are received by the switch:
• If an incoming frame is untagged or has a VID of 0 (priority tagged), the frame is
associated with the ingress port's PVID
• If an incoming frame is tagged, the frame is allowed to pass, while keeping its
VID
• Incoming frames are only dropped if ingress filtering is enabled and the frame is
tagged with a VID that does not match any VLAN to which the ingress port is a
member
Egress rules are applied as follows to all frames when they are transmitted by the
switch.
• If PVID tagging is enabled, outgoing frames are tagged if they are associated with
the egress port's native VLAN, regardless of the egress port's membership type
(edge or trunk)
• Frames egressing on an edge interface are dropped if they are associated with a
VLAN other than the egress port's native VLAN
• Frames egressing on a trunk interface are tagged if they are associated with a
VLAN to which the egress port is a member
Note
Some applications have requirements conflicting with IEEE 802.Q1 native mode of
operation. For example, some applications explicitly require priority-tagged frames to
be received by end devices.
To avoid conflicts and provide full compatibility with legacy (VLAN-unaware) devices,
RUGGEDCOM ROS can be configured to work in VLAN-unaware mode.
In that mode:
• Frames ingressing a VLAN-unaware device are not associated with any VLAN
• Frames egressing a VLAN-unaware device are sent out unmodified (i.e. in the
same untagged, 802.1Q-tagged or priority-tagged format as they were received)
D2 D
D1
B3 B
B1
B2
B4
A1 A E1 E C1 C
1
A2 E2 C2
A E C 2
1 Switch
2 End Node
Figure 7.1 Using GVRP
Note
This feature is strictly local to the switch. PVLAN Edge ports are not prevented from
communicating with ports outside of the switch, whether protected (remotely) or
not.
7.1.1.11 QinQ
QinQ, also referred to as Stacked VLANs, port bridging, double VLAN-tagging and
Nested VLANs, is used to overlay a private Layer 2 network over a public Layer 2 net-
work.
A large network service provider, for example, might have several clients whose
networks each use multiple VLANs. It is likely the VLAN IDs used by these different
client networks would conflict with one another, were they mixed together in the
provider's network. Using double QinQ, each client network could be further tagged
using a client-specific VID at the edges where the clients' networks are connected to
the network service provider's infrastructure.
Any tagged frames ingressing an edge port of the service provider's switch are
tagged with VIDs of the customer’s private network. When those frames egress the
switch's QinQ-enabled port into the service provider network, the switch always adds
an extra tag (called an outer tag) on top of the frame's original VLAN tag (called an
inner tag). The outer tag VID is the PVID of the frame's ingress edge port. This means
that traffic from an individual customer is tagged with their unique VID and is thus
segregated from other customers' traffic. For untagged ingress frames, the switch
will only add the outer VLAN tag.
Within the service provider network, switching is based on the VID in the outer tag.
The service provider strips the outer VID from the frame on egress, leaving the frame
with its original VLAN ID tag. Those frames are then forwarded on the appropriate
VLANs.
The following figure shows an example of traffic flow using QinQ.
For tagged frames:
• Frames received from customer 1 with VID 100 would carry an inner tag of 100
and an outer tag of VID X (i.e. VLAN 110) which is configured on the edge port
connected to customer 1.
• Next, the frames from customer 1 are forwarded through the QinQ port carrying
an inner and an outer tag.
• Finally, upon arrival of the frames in the peer switch, the outer VLAN tag is re-
moved and the frames are forwarded with the inner VLAN tag towards customer
1.
For untagged frames:
• Frames received from customer 2 would carry an outer tag of VID Y(i.e VLAN
220) which is configured on the edge port connected to customer 2.
• Next, the frames from customer 2 are forwarded through the QinQ port carrying
the outer tag.
• Finally, upon arrival of the frames in the peer switch, the outer VLAN tag is re-
moved before the frames are forwarded to customer 2.
2 1
5 5
4 4
1 2
1 Customer 1 (PVID is X)
2 Customer 2 (PVID is Y)
3 Network Service Provider Infrastructure
4 Switch
5 QinQ
Figure 7.2 Using QinQ
Note
Depending on the hardware installed, some switch models allow only one switch
port be configured to QinQ mode at a time.
Note
When QinQ is enabled, all non-QinQ ports will be untagged and cannot be changed,
and all QinQ ports will be tagged, and cannot be changed.
1 3
2 4
5
1 VLAN
2 Switch
Figure 7.3 Multiple Overlapping VLANs
Administrative Convenience
VLANs enable equipment moves to be handled by software reconfiguration instead
of by physical cable management. When a host's physical location is changed, its
connection point is often changed as well. With VLANs, the host's VLAN membership
and priority are simply copied to the new port.
Reduced Hardware
Without VLANs, traffic domain isolation requires the use of separate bridges for sepa-
rate networks. VLANs eliminate the need for separate bridges.
The number of network hosts may often be reduced. Often, a server is assigned to
provide services for independent networks. These hosts may be replaced by a single,
multi-horned host supporting each network on its own VLAN. This host can perform
routing between VLANs.
Multi-VLAN hosts can assign different traffic types to different VLANs.
199.85.245.1/25
1 4
199.85.245.128/26
199.85.245.192/26
Note
Ingress filtering has no effect when ports are in either VLAN-un-
aware mode or Q-in-Q mode.
Note
When QinQ is enabled, all non-QinQ ports will be untagged and
cannot be changed, and all QinQ ports will be tagged, and can-
not be changed.
3. Click Apply.
Note
Depending on the hardware installed, some switch models
allow only one switch port be configured to QinQ mode at a
time.
Parameter Description
Note
When QinQ is enabled, all non-QinQ ports will be untagged and
cannot be changed, and all QinQ ports will be tagged, and can-
not be changed.
4. Click Apply.
Note
If IGMP Options is not enabled for the VLAN, both IGMP messages and multicast
streams will be forwarded directly to all members of the VLAN. If any one mem-
ber of the VLAN joins a multicast group, then all members of the VLAN will re-
ceive the multicast traffic.
Parameter Description
Forbidden Ports Synopsis: Any combination of numbers valid for this parameter
or [ None ]
These are ports that are not allowed to be members of the
VLAN.
Examples:
• None – All ports of the switch are allowed to be members
of the VLAN
• 2,4-6,8 – All ports except ports 2, 4, 6, 7 and 8 are al-
lowed to be members of the VLAN
4. Click Apply.
NOTICE
The values shown are specific to the provided topology. Actual values can vary
based on the user's configuration.
1
2 2 3
2
P1 VLAN1 P2 P3 VLAN2 P4
192.168.0.1/24 192.168.0.2/24 2001:db8::2/64 2001:db8::3/65
NTP Client A NTP Server A NTP Client B NTP Server B
S1 S2 S3
1 Switch S1
2 Switch S2
3 Switch S3
Figure 7.5 Topology – Management Support on Multiple VLANs
3. Click Apply.
4. Click Apply.
Note
A MAC address cannot be learned on a VLAN that has not been configured in the
Static VLAN table. If a frame with an unknown VLAN tag arrives on a secured port, it
is considered a security violation and RUGGEDCOM ROS will generate a port security
alarm.
4. Click Apply.
NOTICE
RUGGEDCOM ROS restricts IGMP hosts from subscribing to the following special mul-
ticast addresses:
• 224.0.0.0 to 224.0.0.255
• 224.0.1.129
These addresses are reserved for routing protocols and IEEE 1588. If an IGMP mem-
bership report contains one of these addresses, the report is forwarded by the
switch without learning about the host.
IGMP In Operation
The following network diagram provides a simple example of the use of IGMP.
P1
2 M1 M2 2
3 3
C3 C4 C1 C2
4 4 5 4 4
1 Producer
2 Membership Queries
3 Membership Reports
4 Consumer
5 Multicast Router
Figure 7.6 Example – IGMP In Operation
One producer IP host (P1) is generating two IP multicast streams, M1 and M2. There
are four potential consumers of these streams, C1 through C4. The multicast router
discovers which host wishes to subscribe to which stream by sending general mem-
bership queries to each segment.
In this example, the general membership query sent to the C1-C2 segment is an-
swered by a membership report (or join) indicating the desire to subscribe to stream
M2. The router will forward the M2 stream to the C1-C2 segment. In a similar fash-
ion, the router discovers that it must forward stream M1 to segment C3-C4.
A consumer may join any number of multicast groups, issuing a membership report
for each group. When a host issues a membership report, other hosts on the same
network segment that also require membership to the same group suppress their
own requests, since they would be redundant. In this way, the IGMP protocol guaran-
tees the segment will issue only one membership report for each group.
The router periodically queries each of its segments in order to determine whether at
least one consumer still subscribes to a given stream. If it receives no responses with-
in a given time period (usually two query intervals), the router will prune the multi-
cast stream from the given segment.
A more common method of pruning occurs when consumers wishing to unsubscribe
issue an IGMP leave group message. The router will immediately issue a group-spe-
cific membership query to determine whether there are any remaining subscribers of
that group on the segment. After the last consumer of a group has unsubscribed, the
router will prune the multicast stream from the given segment.
Note
A switch running in passive mode requires the presence of a multicast router or it will
be unable to forward multicast streams at all if no multicast routers are present.
Note
At least one IGMP Snooping switch must be in active mode to make IGMP functional.
• The switch will only send IGMP membership reports out of those ports where
multicast routers are attached, as sending membership reports to hosts could re-
sult in unintentionally preventing a host from joining a specific group.
• Multicast routers use IGMP to elect a master router known as the querier. The
querier is the router with the lowest IP address. All other routers become non-
queriers, participating only in forwarding multicast traffic. Switches running in
active mode participate in the querier election the same as multicast routers.
• When the querier election process is complete, the switch simply relays IGMP
queries received from the querier.
• When sending IGMP packets, the switch uses its own IP address, if it has one, for
the VLAN on which packets are sent, or an address of 0.0.0.0, if it does not have
an assigned IP address.
Note
IGMP Snooping switches perform multicast pruning using a multicast frames’ destina-
tion MAC multicast address, which depends on the group IP multicast address. IP ad-
dress W.X.Y.Z corresponds to MAC address 01-00-5E-XX-YY-ZZ where XX is the lower
7 bits of X, and YY and ZZ are simply Y and Z coded in hexadecimal.
One can note that IP multicast addresses, such as 224.1.1.1 and 225.1.1.1, will both
map onto the same MAC address 01-00-5E-01-01-01. This is a problem for which the
IETF Network Working Group currently has offered no solution. Users are advised to
be aware of and avoid this problem.
P1 2 3
P2 4
C1 C2 C3
1 Producer
2 Multicast Router 1
3 Multicast Router 2
4 Switch
5 Host
Figure 7.7 Example – Combined Router and Switch IGMP In Operation
In this example:
• P1, Router 1, Router 2 and C3 are on VLAN 2
• P2 and C2 are on VLAN 3
• C1 is on both VLAN 2 and 3
Assuming that router 1 is the querier for VLAN 2 and router 2 is simply a non-querier,
the switch will periodically receive queries from router 1 and maintain the informa-
tion concerning which port links to the multicast router. However, the switch port
that links to router 2 must be manually configured as a router port. Otherwise, the
switch will send neither multicast streams nor joins/leaves to router 2.
Note that VLAN 3 does not have an external multicast router. The switch should be
configured to operate in its routerless mode and issue general membership queries
as if it is the router.
• Processing Joins
If host C1 wants to subscribe to the multicast streams for both P1 and P2, it will
generate two membership reports. The membership report from C1 on VLAN 2
will cause the switch to immediately initiate its own membership report to multi-
cast router 1 (and to issue its own membership report as a response to queries).
The membership report from host C1 for VLAN 3 will cause the switch to immedi-
ately begin forwarding multicast traffic from producer P2 to host C2.
• Processing Leaves
When host C1 decides to leave a multicast group, it will issue a leave request to
the switch. The switch will poll the port to determine if host C1 is the last mem-
ber of the group on that port. If host C1 is the last (or only) member, the group
will immediately be pruned from the port.
Should host C1 leave the multicast group without issuing a leave group message
and then fail to respond to a general membership query, the switch will stop for-
warding traffic after two queries.
When the last port in a multicast group leaves the group (or is aged-out), the
switch will issue an IGMP leave report to the router.
Ver Synopsis: [ v3 | v2 | v1 ]
Specifies the IGMP version of the learnt multicast group.
Note
This parameter also affects the Group Membership Interval (i.e.
the group subscriber aging time), therefore, it takes effect even
in PASSIVE mode.
Parameter Description
detection. Such flooding is desirable, if guaranteed multicast
stream delivery after topology change is most important.
4. Click Apply.
switch receives a leave message or receives no response from the host for a timeout
period, the switch removes the host from the multicast group.
1 S1
D1
D
D2
B3
B1
B B2
B4
A1 E1 C1
A E C 2
A2 E2 C2
H1 H2 3
1 S2
1 Multicast Source
2 Switch
3 Multicast Host
Figure 7.8 Example – Establishing Membership with GMRP
The hosts and switches establish membership with the Multicast Group 1 and 2 as
follows:
1. Host H1 is GMRP unaware, but needs to see traffic for Multicast Group 1. There-
fore, Port E2 on Switch E is statically configured to forward traffic for Multicast
Group 1.
2. Switch E advertises membership in Multicast Group 1 to the network through
Port E1, making Port B4 on Switch B a member of Multicast Group 1.
3. Switch B propagates the join message, causing Ports A1, C1 and D1 to become
members of Multicast Group 1.
4. Host H2 is GMRP-aware and sends a join request for Multicast Group 2 to Port C2,
which thereby becomes a member of Multicast Group 2.
5. Switch C propagates the join message, causing Ports A1, B2, D1 and E1 to be-
come members of Multicast Group 2.
Once GMRP-based registration has propagated through the network, multicast traffic
from S1 and S2 can reach its destination as follows:
• Source S1 transmits multicast traffic to Port D2 which is forwarded via Port D1,
which has previously become a member of Multicast Group 1.
• Switch B forwards the Group 1 multicast via Port B4 towards Switch E.
• Switch E forwards the Group 1 multicast via Port E2, which has been statically
configured for membership in Multicast Group 1.
• Host H1, connected to Port E2, thus receives the Group 1 multicast.
• Source S2 transmits multicast traffic to Port A2, which is then forwarded via port
A1, which has previously become a member of Multicast Group 2.
• Switch B forwards the Group 2 multicast via Port B2 towards Switch C.
• Switch C forwards the Group 2 multicast via Port C2, which has previously be-
come a member of Group 2.
• Ultimately, Host H2, connected to Port C2, receives the Group 2 multicast.
Static Ports Synopsis: Any combination of numbers valid for this parameter
Ports that joined this group statically through static configuration
in Static MAC Table and to which the multicast group traffic is for-
warded.
GMRP Dynamic Ports Synopsis: Any combination of numbers valid for this parameter
Ports that joined this group dynamically through GMRP Application
and to which the multicast group traffic is forwarded.
3. Click Apply.
5. Click Apply.
4. Click Apply.
Note
Layer 3 switching only supports IPv4 addresses (not IPv6 addresses).
Note
Layer 3 switching only supports unicast traffic. Layer 3 switching for multicast and
broadcast traffic is not supported.
Note
In a Layer 2 switched network segment, a VLAN constitutes an IP subnet.
Note
If the next hop is the destination subnet itself, then the destination host MAC ad-
dress is required.
Layer 3 switching translates this routing information into Layer 3 switching rules.
These rules are known as the Layer 3 Switch Forwarding Information Base (FIB) or
the Layer 3 Switch Forwarding Table. A Layer 3 switching rule defines how to switch
a specific traffic flow.
Layer 3 switching Application-Specific Integrated Circuits (ASICs) store Layer 3
switching rules in seperate Ternary Content Addressable Memory (TCAM) tables for
hosts and subnets. Layer 3 switching rules can be statically configured or dynamically
learned (or auto-learned).
Note
Layer 3 switching rules can only be dynamically learned for neighbor hosts. Rules
must be statically configured for remote hosts and subnets.
Note
The maximum number of Layer 3 switching rules is 2560 , including 2048 for hosts
and 512 for subnets.
Note
Only ICMP, TCP, and UDP traffic flows will be accelerated by the IP/Layer 3 switching
ASIC.
Note
When using statically configured Layer 3 switching rules, IP forwarding may be en-
abled or disabled. For information on how to configure IP forwarding, refer to "Con-
figuring IP Services (Page 84)".
After a certain amount of traffic for the same flow is successfully routed, the Layer 3
switching ASIC begins switching the rest of the packets belonging to the same flow.
A flow is unidirectional traffic between two hosts. For example, traffic flowing be-
tween ports from one host to another is considered a flow. Traffic flowing in the op-
posite direction between the same ports is considered a different flow.
RUGGEDCOM ROS supports the host-oriented auto-learning method, where the de-
vice uses the source and destination IP addresses to identify a traffic flow.
Each flow constitutes one rule.
The Layer 3 switch continuously monitors activity (this is, the presence of traffic)
for dynamically learned rules. Because of this, dynamically learned rules may be re-
moved after a configurable time due to inactivity.
Note
ARP entries can be statically configured and resolved if the static MAC addresses to
which they correspond are configured in the Static MAC Address Table. Otherwise,
ARP entries will be dynamically resolved every 60 seconds (s).
The destination or gateway MAC address is usually obtained through ARP. However,
ARP entries can also be statically configured in the Layer 3 Switch so they do not time
out. When configuring a static ARP entry, if no value is entered for the MAC Address
parameter, the address is automatically resolved through ARP and then saved stati-
cally. This is preserved across reboots of the device.
If no static ARP entry is configured for a specific destination, a dynamic ARP entry will
be created and the destination MAC address will be resolved automatically.
YES NO
YES NO
YES NO
ARP entry is
dynamically resolved. ARP entry is unresolved.
YES NO
YES NO
Note
Avoid configuring Link Aggregation Groups (LAGs) when Layer 3 switching is en-
abled. For more information, refer to "Managing Link Aggregation Groups (Page
226)".
1. Add VLANs as required. For more information, refer to "Adding a Static VLAN
(Page 149)".
2. Assign IP addresses to the configured VLANs. For more information, refer to
"Adding an IP Interface (Page 81)".
3. Assign desired ports to the configured VLANs. For more information, refer to
"Configuring VLANs for Specific Ethernet Ports (Page 147)".
4. Configure the unicast mode and aging time. For more information, refer to
"Configuring Layer 3 Switching Options (Page 176)".
5. If static unicast mode is selected, add destination IP addresses and next hop
gateways as needed. For more information, refer to "Managing Static Unicast
Rules (Page 177)".
6. If static unicast mode is selected, add static ARP table entries as needed. For
more information, refer to "Managing Static ARP Table Entries (Page 178)".
7. Test the configuration by sending traffic and verifying the following:
a. ARP entries are resolved in the ARP Table. For more information, refer to
"Viewing a List of ARP Table Entries (Page 178)".
b. Rules are active in the Rule Summary Table. For more information, refer to
"Viewing Routing Rules (Page 180)".
c. Traffic is being sent and received. For more information, refer to "Viewing
Statistics for Specific Ethernet Ports (Page 61)".
For configuration examples, refer to "Example: Configuring Layer 3 Switching (Page
181)" and "Example: Configuring Layer 3 Switching Using Multiple Switches (Page
182)".
3. Click Apply.
Note
If the Destination is a directly connected neighbor, no value
should be supplied for the Gateway parameter.
4. Click Apply.
4. Click Apply.
Note
Only dynamic rules can be flushed. Static rules, configured in the Layer 3 Switch
Forwarding Table, never age out. For more information about enabling hardware
acceleration, refer to "Understanding Layer 3 Switching (Page 171)".
NOTICE
The values shown are specific to the provided topology. Actual values can vary
based on the user's configuration.
P1 P2 P3 P4
192.168.0.48 192.168.0.28 192.168.2.28 192.168.2.92
HOST 1 HOST 2
1 2 3
1 Host 1
2 RUGGEDCOM ROS device
3 Host 2
Figure 8.1 Basic Layer 3 Switching Topology
Note
Host 1 and Host 2 can be either a Layer 2 device or a PC. For specific configuration in-
structions consult the original equipment manufacturer (OEM) documentation.
For more information about configuring static unicast rules, refer to "Adding
a Static Unicast Rule (Page 177)".
f. Send multiple ARP requests/replies from Host 1 and Host 2 to the RUGGED-
COM ROS device.
4. Send bidirectional traffic (i.e. UDP, TCP, ICMP) between Host 1 and Host 2, and
verify the following:
a. ARP entries are resolved in the ARP Table. For more information, refer to
"Viewing a List of ARP Table Entries (Page 178)".
b. Rules are active in the Rule Summary Table. For more information, refer to
"Viewing Routing Rules (Page 180)".
c. Traffic is being sent and received between the two end hosts. For more in-
formation, refer to "Viewing Statistics for Specific Ethernet Ports (Page 61)".
NOTICE
The values shown are specific to the provided topology. Actual values can vary
based on the user's configuration.
1 4
2 3
HOST 1 S1 S2 HOST 2
1 Host 1
2 S1
3 S2
4 Host 2
Figure 8.2 Topology – Layer 3 Switching Using Two Switches
Note
Host 1 and Host 2 can be either a Layer 2 device or a PC. For specific configuration in-
structions, consult the OEM documentation.
For more information about configuring static unicast rules, refer to "Adding
a Static Unicast Rule (Page 177)".
4. Configure S2 as a Layer 3 switch:
a. Add VLAN 3 and VLAN 2. For more information, refer to "Adding a Static
VLAN (Page 149)".
b. Assign IP address 192.168.3.92 to VLAN 3, and IP address 192.168.2.92 to
VLAN 2. For more information, refer to "Adding an IP Interface (Page 81)".
c. Set the unicast mode to Auto. For more information, refer to "Configuring
Layer 3 Switching Options (Page 176)".
d. Configure destination and default gateway static unicast rules as follows:
Destination Gateway
192.168.0.0/24 192.168.3.28
For more information about configuring static unicast rules, refer to "Adding
a Static Unicast Rule (Page 177)".
5. Send multiple ARP requests/replies from Host 1 to S1, and from Host 2 to S2.
6. Send bidirectional traffic (i.e. UDP, TCP, ICMP) between Host 1 and Host 2, and
verify the following:
a. ARP entries are resolved in the ARP Table. For more information, refer to
"Viewing a List of ARP Table Entries (Page 178)".
b. Rules are active in the Rule Summary Table. For more information, refer to
"Viewing Routing Rules (Page 180)".
c. Traffic is being sent and received between the two end hosts. For more in-
formation, refer to "Viewing Statistics for Specific Ethernet Ports (Page 61)".
While providing much better performance than STP, IEEE 802.1w RSTP still required
up to several seconds to restore network connectivity when a topology change oc-
curred.
A revised and highly optimized RSTP version was defined in the IEEE standard
802.1D-2004 edition. IEEE 802.1D-2004 RSTP reduces network recovery times to just
milliseconds and optimizes RSTP operation for various scenarios.
RUGGEDCOM ROS supports IEEE 802.1D-2004 RSTP.
State
There are three RSTP states: Discarding, Learning and Forwarding.
The discarding state is entered when the port is first put into service. The port does
not learn addresses in this state and does not participate in frame transfer. The port
looks for RSTP traffic to determine its role in the network. When it is determined that
the port will play an active part in the network, the state will change to learning.
The learning state is entered when the port is preparing to play an active part in the
network. The port learns addresses in this state but does not participate in frame
transfer. In a network of RSTP bridges, the time spent in this state is usually quite
short. RSTP bridges operating in STP compatibility mode will spend six to 40 seconds
in this state.
After learning, the bridge will place the port in the forwarding state. The port both
learns addresses and participates in frame transfer while in this state.
NOTICE
RUGGEDCOM ROS introduces two more states - Disabled and Link Down. Introduced
purely for purposes of management, these states may be considered subclasses of
the RSTP Discarding state. The Disabled state refers to links for which RSTP has been
disabled. The Link Down state refers to links for which RSTP is enabled but are cur-
rently down.
Role
There are four RSTP port roles: Root, Designated, Alternate and Backup. If the bridge
is not the root bridge, it must have a single Root Port. The Root Port is the "best” (i.e.
quickest) way to send traffic to the root bridge.
A port is marked as Designated if it is the best port to serve the LAN segment it is
connected to. All bridges on the same LAN segment listen to each others’ messages
and agree on which bridge is the Designated Bridge. The ports of other bridges on
the segment must become either Root, Alternate or Backup ports.
1
C 3
1 2
3 3
4 4
1 1
2 2
2 3 2
5 6 3
1 Root Bridge
2 Designated Bridge
3 Designated Port
4 Root Port
5 Alternate Port
6 Backup Port
Figure 9.1 Bridge and Port Roles
A port is alternate when it receives a better message from another bridge on the LAN
segment it is connected to. The message that an Alternate Port receives is better than
the port itself would generate, but not good enough to convince it to become the
Root Port. The port becomes the alternate to the current Root Port and will become
the new Root Port should the current Root Port fail. The Alternate Port does not par-
ticipate in the network.
A port is a Backup Port when it receives a better message from the LAN segment it is
connected to, originating from another port on the same bridge. The port is a back-
up for another port on the bridge and will become active if that port fails. The Backup
Port does not participate in the network.
Note
In actuality the primary determinant for root port selection is the root bridge ID.
Bridge ID is important mainly at network startup when the bridge with the lowest
ID is elected as the root bridge. After startup (when all bridges agree on the root
bridge’s ID) the path cost is used to select root ports. If the path costs of candidates
for the root port are the same, the ID of the peer bridge is used to select the port. Fi-
nally, if candidate root ports have the same path cost and peer bridge ID, the port ID
of the peer bridge is used to select the root port. In all cases the lower ID, path cost
or port ID is selected as the best.
Note
The RSTP algorithm is as follows:
• STP configuration messages contain age information.
• Messages transmitted by the root bridge have an age of 0. As each subsequent
designated bridge transmits the configuration message it must increase the age
by at least 1 second.
• When the age exceeds the value of the maximum age parameter the next bridge
to receive the message immediately discards it.
NOTICE
Raise the value of the maximum age parameter if implementing very large bridged
networks or rings.
9.1.1.6 eRSTP
Siemens's enhanced Rapid Spanning Tree Protocol (eRSTP) improves the performance
of RSTP in two ways:
• Improves the fault recovery time performance (< 5 ms per hop)
• Improves performance for large ring network topologies (up to 160 switches)
eRSTP is also compatible with standard RSTP for interoperability with commercial
switches.
NOTICE
In networks mixing RUGGEDCOM and non-RUGGEDCOM switches, or in those mix-
ing Fast Root Failover algorithms, RSTP Fast Root Failover will not function properly
and root bridge failure will result in an unpredictable failover time. To avoid poten-
tial issues, note the following:
• When using the Robust algorithm, all switches must be RUGGEDCOM switches
• When using the Relaxed algorithm, all switches must be RUGGEDCOM switches,
with the exception of the root switch
• All RUGGEDCOM switches in the network must use the same Fast Root Failover
algorithm
Note
The minimum interval for root failures is one second. Multiple, near simultaneous
root failures (within less than one second of each other) are not supported by Fast
Root Failover.
1 A 1
111 222
2 B 2
4 3 4 3
C F
D E
1 2 1 2
444 555
6 3 6 3
5 4 5 4
G I H K J M L N
1 2 1 2 1 2 1 2
4 3 4 3 4 3 4 3
A 1
111 222
B 1 2 C
3 3
L D
1
K 3
666 333
2 E
2 3
J F
1 1
I 3 2 H 3
555 444
2 G
1 2
4 3
MSTI
An MSTI (Multiple Spanning Tree Instance) is one of sixteen independent spanning
tree instances that may be defined in an MST region (not including the IST – see be-
low). An MSTI is created by mapping a set of VLANs (in RUGGEDCOM ROS, via the
VLAN configuration) to a given MSTI ID. The same mapping must be configured on
all bridges that are intended to be part of the MSTI. Moreover, all VLAN to MSTI map-
pings must be identical for all bridges in an MST region.
RUGGEDCOM ROS supports 16 MSTIs in addition to the IST.
Each MSTI has a topology that is independent of every other. Data traffic originating
from the same source and bound to the same destination but on different VLANs on
different MSTIs may therefore travel a different path across the network.
IST
An MST region always defines an IST (Internal Spanning Tree). The IST spans the en-
tire MST region, and carries all data traffic that is not specifically allocated (by VLAN)
to a specific MSTI. The IST is always computed and is defined to be MSTI zero.
The IST is also the extension inside the MST region of the CIST (see below), which
spans the entire bridged network, inside and outside of the MST region and all other
RSTP and STP bridges, as well as any other MST regions.
CST
The CST (Common Spanning Tree) spans the entire bridged network, including MST
regions and any connected STP or RSTP bridges. An MST region is seen by the CST as
an individual bridge, with a single cost associated with its traversal.
CIST
The CIST (Common and Internal Spanning Tree) is the union of the CST and the ISTs
in all MST regions. The CIST therefore spans the entire bridged network, reaching in-
to each MST region via the latter’s IST to reach every bridge on the network.
Bridge Roles
Role Description
CIST Root The CIST Root is the elected root bridge of the
CIST (Common and Internal Spanning Tree),
which spans all connected STP and RSTP bridges
and MSTP regions.
CIST Regional Root The root bridge of the IST within an MSTP region.
The CIST Regional Root is the bridge within an
Role Description
MSTP region with the lowest cost path to the CIST
Root. Note that the CIST Regional Root will be at
the boundary of an MSTP region. Note also that
it is possible for the CIST Regional Root to be the
CIST Root.
MSTI Regional Root The root bridge for an MSTI within an MSTP re-
gion. A root bridge is independently elected for
each MSTI in an MSTP region.
Port Roles
Each port on an MSTP bridge may have more than one CIST role depending on the
number and topology of spanning tree instances defined on the port.
Role Description
CIST Port Roles • The Root Port provides the minimum cost
path from the bridge to the CIST Root via the
CIST Regional Root. If the bridge itself hap-
pens to be the CIST Regional Root, the Root
Port is also the Master Port for all MSTIs, and
provides the minimum cost path to a CIST
Root located outside the region.
• A Designated Port provides the minimum cost
path from an attached LAN, via the bridge to
the CIST Regional Root.
• Alternate and Backup Ports function the same
as they do in RSTP, but relative to the CIST Re-
gional Root.
MSTI Port Roles For each MSTI on a bridge:
• The Root Port provides the minimum cost
path from the bridge to the MSTI Regional
Root, if the bridge itself is not the MSTI Re-
gional Root.
• A Designated Port provides the minimum cost
path from an attached LAN, via the bridge to
the MSTI Regional Root.
• Alternate and Backup Ports function the same
as they do in RSTP, but relative to the MSTI Re-
gional Root.
The Master Port, which is unique in an MSTP re-
gion, is the CIST Root Port of the CIST Regional
Root, and provides the minimum cost path to the
CIST Root for all MSTIs.
Boundary Ports A Boundary Port is a port on a bridge in an MSTP
region that connects to either: a bridge belonging
to a different MSTP region, or a bridge supporting
only RSTP or legacy STP. A Boundary Port blocks
or forwards all VLANs from all MSTIs and the CIST
alike.
A Boundary Port may be:
• The CIST Root Port of the CIST Regional Root
(and therefore also the MSTI Master Port).
Role Description
• A CIST Designated Port, CIST Alternate/Backup
Port, or Disabled. At the MSTP region bound-
ary, the MSTI Port Role is the same as the CIST
Port Role.
A Boundary Port connected to an STP bridge will
send only STP BPDUs. One connected to an RSTP
bridge need not refrain from sending MSTP BP-
DUs. This is made possible by the fact that the
MSTP carries the CIST Regional Root Identifier in
the field that RSTP parses as the Designated Bridge
Identifier.
Load Balancing
MSTP can be used to balance data traffic load among sets of VLANs, enabling more
complete utilization of a multiply interconnected bridged network.
A bridged network controlled by a single spanning tree will block redundant links
by design, to avoid harmful loops. Using MSTP, however, any given link may have a
different blocking state for MSTI, as maintained by MSTP. Any given link, therefore,
might be in blocking state for some VLANs, and in forwarding state for other VLANs,
depending on the mapping of VLANs to MSTIs.
It is possible to control the spanning tree solution for each MSTI, especially the set of
active links for each tree, by manipulating, per MSTI, the bridge priority and the port
costs of links in the network. If traffic is allocated judiciously to multiple VLANs, re-
dundant interconnections in a bridged network which, using a single spanning tree,
would have gone unused, can now be made to carry traffic.
each spanning tree requires processing and memory, the expense of keeping track of
an increasing number of VLANs increases much more rapidly for PVST than for MSTP.
Note
MSTP does not need to be enabled to map a VLAN to an MSTI. However, the mapping
must be identical for each bridge that belongs to the MSTP region.
1. Configure and enable STP globally and/or for specific Ethernet ports. For more
information, refer to "Configuring STP Globally (Page 201)" or "Configuring STP
for Specific Ethernet Ports (Page 202)".
Note
Static VLANs must be used in an MSTP configuration. GVRP is not supported.
2. Add static VLANs and map them to MSTIs. For more information, refer to
"Adding a Static VLAN (Page 149)".
Note
The Region Identifier and Revision Level must be the same for each bridge in the
MST region.
3. Configure the revision level for the MST Region Identifier. For more information,
refer to "Configuring the MST Region Identifier (Page 212)".
4. Make sure the read-only digest for the MST Region Identifier is identical for each
bridge in the MST region. If the digest is different, the set of mappings from
VLANs to MSTIs differs.
5. Configure the Bridge Priority for the global MSTI. For more information, refer to
"Configuring a Global MSTI (Page 212)".
6. Configure the Port Cost and Priority per Port for each MSTI. For more informa-
tion, refer to "Configuring an MSTI for an Ethernet Port (Page 213)".
7. Set the STP Protocol Version to MSTP and enable STP. For more information, re-
fer to "Configuring STP Globally (Page 201)"
Parameter Description
3. Click Apply.
Parameter Description
abling STP would be a port that services only a single host com-
puter.
Parameter Description
lows this behavior or overrides it, forcing point-to-point to be
true or false. Force the parameter true when the port operates a
point-to-point link but cannot run the link in full-duplex mode.
Force the parameter false when the port operates the link in
full-duplex mode, but is still not point-to-point (e.g. a full-du-
plex link to an unmanaged bridge that concentrates two other
STP bridges).
4. Click Apply.
Parameter Description
RSTP BPDUs have to traverse. The standard supported maximum
network diameter is equal to the value of the 'MaxAgeTime'
RSTP configuration parameter.
eRSTP offers an enhancement to RSTP which allows it to cover
networks larger than ones defined by the standard.
This configuration parameter selects the maximum supported
network size.
BPDU Guard Timeout Synopsis: An integer between 1 and 86400 or [ Until reset |
Don't shutdown ]
Default: Don't shutdown
The RSTP standard does not address network security. RSTP
must process every received BPDU and take an appropriate ac-
tion. This opens a way for an attacker to influence RSTP topolo-
gy by injecting RSTP BPDUs into the network.
BPDU Guard is a feature that protects the network from BPDUs
received by a port where RSTP capable devices are not expected
to be attached. If a BPDU is received by a port for which 'Edge'
parameter is set to 'TRUE' or RSTP is disabled, the port will be
shutdown for the time period specified by this parameter.
• Don't shutdown – BPDU Guard is disabled
• Until reset – port will remain shutdown until the port
reset command is issued by the user
Note
• This feature is only available in RSTP mode. In MSTP mode,
the configuration parameter is ignored.
• In a single ring topology, this feature is not needed and
should be disabled to avoid longer network recovery times
due to extra RSTP processing.
Parameter Description
These are the supported configuration options:
• Off – Fast Root Failover algorithm is disabled and hence a
root switch failure may result in excessive connectivity re-
covery time.
• On – Fast Root Failover is enabled and the most robust algo-
rithm is used, which requires the appropriate support in the
root switch.
• On with standard root – Fast Root Failover is enabled
but a "relaxed" algorithm is used, allowing the use of a stan-
dard switch in the root role.
3. Click Apply.
Bridge Status Synopsis: [ Designated Bridge | Not Designated For Any LAN | Root
Bridge ]
Spanning Tree status of the bridge. The status may be root or desig-
nated. This field may show text saying not designated for any LAN
if the bridge is not designated for any of its ports.
Parameter Description
Parameter Description
• Master – Only exists in MSTP. The port is an MST region
boundary port and the single port on the bridge, which pro-
vides connectivity for the Multiple Spanning Tree Instance to-
wards the Common Spanning Tree root bridge (i.e. this port is
the root port for the Common Spanning Tree Instance).
Bridge Status Synopsis: [ Designated Bridge | Not Designated For Any LAN | Root
Bridge ]
Spanning Tree status of the bridge. The status may be root or desig-
nated. This field may show text saying not designated for any LAN
if the bridge is not designated for any of its ports.
3. Click Apply.
4. Click Apply.
Parameter Description
tially select specific ports to carry traffic over others. Leave this
field set to "auto" to use the standard STP port costs as negoti-
ated (4 for 1Gbps, 19 for 100 Mbps links and 100 for 10 Mbps
links).
For MSTP, this parameter applies to both external and internal
path cost.
5. Click Apply.
7 6
4 3
8 4
1
3
5 2
1 2
In case of failure, the network works in the ring-open state. In this state, when a link
connecting two devices fails, both ring ports of the MRM are now forwarding. The
MRCs adjacent to the failure have a blocked and a forwarding ring port and the other
MRCs have both ring ports forwarding.
7 6
4 3
8 4
1
3
5 2
1 2
3. Click Apply.
Ring Status The status of the MRP ring. Possible values include:
• N/A – The status of the ring is unknown. This is displayed when
the device is an MRC.
• Open – The MRP ring is open. Both ring ports are forwarding
packets.
Parameter Description
• Closed – The MRP ring is closed. One ring port is forwarding
packets, while the other is blocking packets.
PRM Port The port number and state of the MRP ring port. Possible values in-
clude:
• { port }-OFF – MRP not running.
• { port }-DWN – The ring port is down.
• { port }-BLK – The ring port is blocking packets.
• { port }-FWD – The ring port is forwarding packets.
SEC Port The port number and state of the MRP ring port. Possible values in-
clude:
• { port }-OFF – MRP not running.
• { port }-DWN – The ring port is down.
• { port }-BLK – The ring port is blocking packets.
• { port }-FWD – The ring port is forwarding packets.
Multi-MRM Err Error indicated by an MRM when more than one MRM are active in
the MRP ring. Possible values include:
• false – No Multi-MRM error.
• true – More than one MRM present in the ring.
One Side Rx Err Error indicated by an MRM when the test frames of an MRM have
been seen, but only on one ring port. Possible values include:
• false – No One Side Rx error.
• true – Test frame received only on one ring port.
NOTICE
RUGGEDCOM ROS only allows multiple MRP instances if all instances are Man-
agers. A device can have up to four Manager instances.
NOTICE
MRMs or MRAs acting as Manager must be either physically disconnected or
have the ring port disabled (i.e. MRP ring open) before the MRM instance con-
figuration can be changed.
For more information about configuring port parameters, refer to "Configuring
an Ethernet Port (Page 64)".
For more information about open and closed MRP rings, refer to "Managing the
Media Redundancy Protocol (MRP) (Page 214)".
Note
To avoid potential misconfiguration issues which can result in loss of network
access, Siemens recommends disabling the ring port of an MRC before configur-
ing it. For more information about configuring port parameters, refer to "Config-
uring an Ethernet Port (Page 64)".
Note
When using port security in an MRP ring, the MAC addresses of devices in the
ring must be configured to allow communication between them. Also, the
MRM's ring port must be configured in the Static MAC Addresses table for the
ring to remain in a closed state. For more information, refer to "Static MAC Ad-
dress-Based Authentication in an MRP Ring (Page 122)".
Parameter Description
4. Click Apply.
NOTICE
MRMs or MRAs acting as Manager must be either physically disconnected or
have the ring port disabled (i.e. MRP ring open) before the MRM instance con-
figuration can be changed.
For more information about configuring port parameters, refer to "Configuring
an Ethernet Port (Page 64)".
For more information about open and closed MRP rings, refer to "Managing the
Media Redundancy Protocol (MRP) (Page 214)".
Note
To avoid potential misconfiguration issues which can result in loss of network
access, Siemens recommends disabling the ring port of an MRC before configur-
ing it. For more information about configuring port parameters, refer to "Config-
uring an Ethernet Port (Page 64)".
3. Click Delete.
NOTICE
The values shown are specific to the provided topology. Actual values can vary
based on the user's configuration.
7 6
4 3
8 4
1
3
5 2
1 2
1 MRP Manager
2 MRP Client 1
3 MRP Client 2
4 MRP Client 3
Figure 9.7 Topology – MRP Ring
For more information about configuring MRP instances, refer to "Adding an MRP
Instance (Page 218)".
4. Configure an MRP instance for each MRP Client device as follows:
Note
In this example, three devices are being used. MRP is supported in ring topolo-
gies with up to 50 devices.
For more information about configuring MRP instances, refer to "Adding an MRP
Instance (Page 218)".
5. To verify the configuration, make sure the MRP Instance ID is generated auto-
matically on the MRP Manager device and each MRP client device. For more in-
formation about the MRP Instance ID, refer to "Adding an MRP Instance (Page
218)".
1 1
1 Device
2 Link Aggregation Group (LAG)
Figure 9.8 Basic Link Aggregation Topography
Static link aggregation is ideal for switch-to-switch configurations, but lacks the fol-
lowing key features offered by dynamic link aggregation:
• Failover
In static link aggregation, devices are unable to communicate the status of their
LAGs. Should all ports in a LAG go down and there is a media converter between
both devices, the device at the other end will not know and continue to send
traffic to its partner. Dynamic link aggregation, however, will detect the failed
link and stop sending traffic to the other device.
• Renegotiation
Should all ports on the partner device go down and/or the Signal-to-Noise Ratio
(SNR) be too high, LACP will automatically seek another LACP-enabled device on
the network with which to form a new port channel.
• Standby
If more ports are added to a LAG than the device supports, LACP will automatical-
ly put the excess ports on standby. It determines which ports to put on standby
based on criteria defined by the user. These standby ports will wait until an ac-
tive port fails and then take its place.
• Link Verification
In dynamic link aggregation, both partners can mutually verify the port channel
between them, making it easy for users to confirm the configuration. Static link
aggregation offers no such verification.
Choosing between static or dynamic link aggregation is dependent on the capabili-
ties of the devices available on the network.
• The IEEE 802.1AX (formerly IEEE 802.3ad) Link Aggregation standard requires all
physical links in the LAG to run at the same speed and in full-duplex mode. If this
requirement is violated, the performance of the LAG will drop.
The switch will raise an appropriate alarm, if such a speed/duplex mismatch is de-
tected.
• The Spanning Tree Protocol (STP) dynamically calculates the path cost of the LAG
based on its aggregated bandwidth. However, if the aggregated ports are run-
ning at different speeds, the path cost may not be calculated correctly.
• Enabling STP is the best way for handling link redundancy in switch-to-switch
connections composed of more than one physical link. If STP is enabled and in-
creased bandwidth is not required, link aggregation should not be used, as it
may lead to a longer fail-over time.
Note
Avoid configuring LAGs when Layer 3 switching is enabled. For more information on
enabling or disabling Layer 3 switching, refer to "Layer 3 (Page 171)".
Note
The maximum number of LAGs for each device depends on the number of ports
available. At least two ports are required to configure a LAG.
Note
The aggregated port with the lowest port number is called the Primary port. Other
ports in the LAG are called Secondary ports.
NOTICE
The LAG must be properly configured on both sides of the port channel. In switch-
to-switch connections, if the configuration of both sides does not match (i.e. some
ports are mistakenly not included in the port trunk), it will result in a loop. There-
fore, the following procedure is strongly recommended to configure a LAG:
1. Disconnect or disable all the ports involved in the configuration, i.e. either be-
ing added to or removed from the LAG.
2. Configure the LAG on both switches.
3. Double-check the LAG configuration on both switches.
4. Reconnect or re-enable the ports.
If the LAG is being configured while the ports are not disconnected or disabled, the
port will be automatically disabled for a few seconds.
NOTICE
Make sure only ports with the same speed and duplex settings are aggregated. If au-
to-negotiation is used, make sure it is resolved to the same speed for all ports in the
LAG.
1. Navigate to Link Aggregation » Configure Port Trunks. The Port Trunks table
appears.
2. Click InsertRecord. The Port Trunks form appears.
3. Configure the following parameter(s) as required:
Parameter Description
4. Click Apply.
Trunk ID The ID for the Link Aggregation Group (LAG), or port trunk.
State The operational state of the Link Aggregation Group (LAG), or port
trunk..
Ports Aggregated A comma-separated list or range of ports that are aggregated and
operational in the Link Aggregation Group (LAG), or port trunk.
Note
Avoid configuring LACP when Layer 3 switching is enabled. For more information on
enabling or disabling Layer 3 switching, refer to "Layer 3 (Page 171)".
NOTICE
At least one LACP-enabled device must have a port configured to run LACP in Ac
tive mode. Ports configured to run in Passive mode participate in the negotia-
tion process, but will not initiate it.
Configure LACP when the Mode parameter for any port trunk is set to LACP.
Port The port number as seen on the front plate silkscreen of the device.
Key The LACP key assigned to the partner port by the partner system.
State The LACP operational state of the partner port. The state is ex-
pressed as an eight character string. For example:
ASAO----
From left to right, each character in the string has the following
meaning:
1. LACP Activity: A=Active LACP, P=Passive LACP
2. LACP Timeout: S=Short Timeout, L=Long Timeout
3. Aggregation: A=Aggregateable, I=Individual
4. Synchronization: S=In Sync, O=Out Of Sync
5. Collecting: C=Collecting, -=Not Collecting
6. Distributing: D=Distributing, -=Not Distributing
7. Defaulted: D=Defaulted Info, -=Received Info
8. Expired: E=Expired, -=Not Expired
3. Click Apply.
Parameter Description
Note
For each physical link in the Link Aggregation Group (LAG), or
port trunk, one partner port must be in Active mode.
Note
The Timeout setting should be the same for all ports in a Link
Aggregation Group (LAG), or port trunk.
4. Click Apply.
Port The port number as seen on the front plate silkscreen of the device.
From left to right, each character in the string has the following
meaning:
1. LACP Activity: A=Active LACP, P=Passive LACP
2. LACP Timeout: S=Short Timeout, L=Long Timeout
3. Aggregation: A=Aggregateable, I=Individual
4. Synchronization: S=In Sync, O=Out Of Sync
5. Collecting: C=Collecting, -=Not Collecting
6. Distributing: D=Distributing, -=Not Distributing
7. Defaulted: D=Defaulted Info, -=Received Info
8. Expired: E=Expired, -=Not Expired
NOTICE
Use the highest supported CoS with caution, as it is always used by the switch for
handling network management traffic, such as RSTP BPDUs.
If this CoS is used for regular network traffic, upon traffic bursts, it may result in the
loss of some network management frames, which in turn may result in the loss of
connectivity over the network.
The process of controlling traffic based on CoS occurs over two phases:
1. Inspection Phase
In the inspection phase, the CoS priority of a received frame is determined from
either:
• A specific CoS based upon the source and destination MAC address (as set in
the Static MAC Address Table)
• The priority field in the IEEE 802.1Q tags
• The Differentiated Services Code Point (DSCP) component of the Type Of Ser-
vice (TOS) field in the IP header, if the frame is IP
• The default CoS for the port
Each frame’s CoS will be determined once the first examined parameter is found
in the frame.
Note
For information on how to configure the Inspect TOS parameter, refer to "Con-
figuring Classes of Service for Specific Ethernet Ports (Page 235)".
The header of each received frame is first examined to determine if the frame is
an IP packet and if Inspect TOS is enabled in RUGGEDCOM ROS. The CoS is deter-
mined from the DSCP field.
If the frame is not an IP packet or if Inspect TOS is disabled, the frame is exam-
ined to determine if its destination or source MAC address is found in the Static
MAC address table. If it is, the CoS configured for the static Mac address is used.
If neither destination or source MAC address is in the Static MAC Address table,
the frame is then examined for 802.1Q tags and the priority field is mapped to a
CoS. If a tag is not present, the default CoS for the port is used.
After inspection, the frame is forwarded to the egress port for transmission.
2. Forwarding Phase
Once the CoS of the frame is determined, the frame is forwarded to the egress
port, where it is collected into one of the priority queues according to the as-
signed CoS.
CoS weighting selects the degree of preferential treatment that is attached to
different priority queues. The ratio of the number of higher CoS to lower CoS
frames transmitted can be configured. If desired, lower CoS frames can be trans-
mitted only after all higher CoS frames have been serviced.
3. Click Apply.
4. If necessary, configure CoS mapping based on either the IEEE 802.1p priority or
Differentiated Services (DS) field set in the IP header for each packet. For more
information, refer to "Configuring Priority to CoS Mapping (Page 236)" or "Con-
figuring DSCP to CoS Mapping (Page 236)".
Parameter Description
parsing is enabled the switch will use the Differentiated Ser-
vices bits in the TOS field.
4. Click Apply.
4. Click Apply.
4. Click Apply.
5. Configure the CoS parameters on select switched Ethernet ports as needed. For
more information, refer to "Configuring Classes of Service for Specific Ethernet
Ports (Page 235)".
Parameter Description
• mm – Month of the year (01 = January, 12 = December)
• n – nth d-day in the month (1 = 1st d-day, 5 = 5th/last d-
day)
• d – day of the week (0 = Sunday, 6 = Saturday)
• HH – hour of the day (0 - 24)
• MM – minute of the hour (0- 59)
• SS – second of the minute (0 - 59)
Example: The following rule applies in most part of USA and
Canada:
03.2.0/02:00:00 11.1.0/02:00:00
Note
If the device is running as an NTP server, NTP service must be enabled.
4. Click Apply.
Additionally, RUGGEDCOM EXPLORER will set all devices to Get Only mode in the fol-
lowing conditions:
• 60 minutes after the last RCDP frame has been received.
• The IP address, subnet, gateway or any passwords are changed for the device via
SSH, RSH, Telnet, serial console or SNMP.
NOTICE
For increased security, Siemens recommends disabling RCDP if it is not intended for
use.
Note
RCDP is not compatible with VLAN-based network configurations. For correct opera-
tion of RUGGEDCOM EXPLORER, no VLANs (tagged or untagged) must be configured.
All VLAN configuration items must be at their default settings.
Note
RUGGEDCOM ROS responds to RCDP requests only. It does not under any circum-
stances initiate any RCDP-based communication.
NOTICE
The Enabled option is only available for devices loaded with factory default
settings. This option will not be selectable once a device has been configured.
Whenever the transmit module is disabled, it transmits an LLDPDU (LLDP data unit)
with a time-to-live (TTL) type-length-value (TLV) containing 0 in the information
field. This enables remote devices to remove the information associated with the lo-
cal device in their databases. The LLDP receive module, when enabled, receives re-
mote devices’ information and updates its LLDP database of remote systems. When
new or updated information is received, the receive module initiates a timer for the
valid duration indicated by the TTL TLV in the received LLDPDU. A remote system’s
information is removed from the database when an LLDPDU is received from it with
TTL TLV containing 0 in its information field.
Note
LLDP is implemented to keep a record of only one device per Ethernet port. There-
fore, if there are multiple devices sending LLDP information to a switch port on which
LLDP is enabled, information about the neighbor on that port will change constantly.
Parameter Description
3. Click Apply.
4. Click Apply.
SNMPv3 provides security models and security levels. A security model is an authen-
tication strategy setup for a user and the group in which the user resides. A security
level is a permitted level of security within a security model. A combination of a se-
curity model and level will determine which security mechanism is employed when
handling an SNMP packet.
Note
For information about agent capabilities for SNMPv2, refer to RFC 2580 [http://tool-
s.ietf.org/html/rfc2580].
Standard Traps
Trap MIB
linkDown IF-MIB
linkUp
authenticationFailure SNMPv2-MIB
coldStart
newRoot BRIDGE-MIB
topologyChage
risingAlarm RMON-MIB
fallingAlarm
lldpRemoteTablesChange LLDP-MIB
Trap MIB
unknownRouteSerialProto
incopatibleFpgaTrap
clockMngrTrap
ieee1588Trap
rcLoopedBpduRcvd
rcBpduGuardActivated
rcGMRPCannotLearMoreAddresses
rcGVRPCannotLearMoreAddresses
rcMcastCpuFiltTblFull
rcIgmpGroupMembershipTblFull
rcIgmpMcastForwardTblFull
rcMacAddressNotLearned
excessLoginFailureTrap
loginInfoTrap
loginFailureTrap
radiusServiceAvailableChange
tacacsServiceAvailableChange
rcDeviceError
rcPortSecurityViolatedTrap
rcMacAddrAuthFailedTrap
rcRstpNewTopology
rcChgPswdAdminTrap
rcChgPswdOperTrap
rcChgPswdGuestTrap
rcChgPswdRadiusTrap
rcChgPswdTacplusTrap
rcChgPswdDataStoreTrap
rcChgPswdSnmpCommunityTrap
rcChgPswdSnmpAuthKeyTrap
rcChgPswdSnmpPrivKeyTrap
Note
Information about generic traps can be retrieved using the CLI command alarms.
For more information about the alarms command, refer to "Available CLI Com-
mands (Page 23)".
Trap Severity
TACACS+ response invalid Warning
Unable to obtain IP address Critical
SPP is rejected on Port 1 Error
received two consecutive confusing BPDUs on Error
port, forcing down
Note
When employing the SNMPv1 or SNMPv2c security level, the User Name parameter
maps the community name with the security group and access level.
For CLI commands related to adding an SNMP user, refer to "Available CLI Commands
(Page 23)".
To add a new SNMP user, do the following:
1. Navigate to Administration » Configure SNMP » Configure SNMP Users. The
SNMP Users Table appears.
Note
RUGGEDCOM ROS requires that all user passwords meet strict guidelines to pre-
vent the use of weak passwords. When creating a new password, make sure it
adheres to the following rules:
• Must not be less than 6 characters in length.
• Must not include the username or any 4 continuous alphanumeric charac-
ters found in the username. For example, if the username is Subnet25, the
password may not be subnet25admin or subnetadmin. However, net25ad-
min or Sub25admin is permitted.
• Must have at least one alphabetic character and one number. Special char-
acters are permitted.
• Must not have more than 3 continuously incrementing or decrementing
numbers. For example, Sub123 and Sub19826 are permitted, but Sub12345
is not.
An alarm will generate if a weak password is configured. The weak password
alarm can be disabled by the user. For more information about disabling alarms,
refer to "Managing Alarms (Page 98)".
Parameter Description
4. Click Apply.
4. Click Apply.
2. Select the map from the table. The SNMP Security to Group Maps form ap-
pears.
3. Click Delete.
Parameter Description
4. Click Apply.
Note
While RUGGEDCOM devices have a variable number of ports, not all registers and bits
apply to all products.
Registers that are not applicable to a particular device return a zero (0) value. For ex-
ample, registers referring to serial ports are not applicable to RUGGEDCOM switch de-
vices.
Product Info
The following data is mapped to the Productinfo table:
Address #Registers Description (Reference Table in UI) R/W Format
0000 16 Product Identification R Text
0010 32 Firmware Identification R Text
0040 1 Number of Ethernet Ports R Uint16
0042 1 Number of Alarms R Uint16
0043 1 Power Supply Status R PSStatusCmd
0044 1 FailSafe Relay Status R TruthValue
0045 1 ErrorAlarm Status R TruthValue
Alarms
The following data is mapped to the alarms table:
Address #Registers Description (Reference Table in UI) R/W Format
0100 64 Alarm 1 R Alarm
0140 64 Alarm 2 R Alarm
0180 64 Alarm 3 R Alarm
01C0 64 Alarm 4 R Alarm
0200 64 Alarm 5 R Alarm
0240 64 Alarm 6 R Alarm
0280 64 Alarm 7 R Alarm
02C0 64 Alarm 8 R Alarm
Ethernet Statistics
The following data is mapped to the rmonStats table:
Address #Registers Description (Refer- R/W Format
ence Table in UI)
0400 2 Port 1 Statistics - Ethernet In Packets R Uint32
0402 2 Port 2 Statistics - Ethernet In Packets R Uint32
0404 2 Port 3 Statistics - Ethernet In Packets R Uint32
0406 2 Port 4 Statistics - Ethernet In Packets R Uint32
0408 2 Port 5 Statistics - Ethernet In Packets R Uint32
040A 2 Port 6 Statistics - Ethernet In Packets R Uint32
040C 2 Port 7 Statistics - Ethernet In Packets R Uint32
040E 2 Port 8 Statistics - Ethernet In Packets R Uint32
0410 2 Port 9 Statistics - Ethernet In Packets R Uint32
0412 2 Port 10 Statistics - Ethernet In Pack- R Uint32
ets
0414 2 Port 11 Statistics - Ethernet In Pack- R Uint32
ets
0416 2 Port 12 Statistics - Ethernet In Pack- R Uint32
ets
0418 2 Port 13 Statistics - Ethernet In Pack- R Uint32
ets
041A 2 Port 14 Statistics - Ethernet In Pack- R Uint32
ets
041C 2 Port 15 Statistics - Ethernet In Pack- R Uint32
ets
041E 2 Port 16 Statistics - Ethernet In Pack- R Uint32
ets
0420 2 Port 17 Statistics - Ethernet In Pack- R Uint32
ets
0422 2 Port 18 Statistics - Ethernet In Pack- R Uint32
ets
0424 2 Port 19 Statistics - Ethernet In Pack- R Uint32
ets
0426 2 Port 20 Statistics - Ethernet In Pack- R Uint32
ets
0440 2 Port 1 Statistics - Ethernet Out Pack- R Uint32
ets
0442 2 Port 2 Statistics - Ethernet Out Pack- R Uint32
ets
0444 2 Port 3 Statistics - Ethernet Out Pack- R Uint32
ets
0446 2 Port 4 Statistics - Ethernet Out Pack- R Uint32
ets
0448 2 Port 5 Statistics - Ethernet Out Pack- R Uint32
ets
044A 2 Port 6 Statistics - Ethernet Out Pack- R Uint32
ets
12.4.3.1 Text
The Text format provides a simple ASCII representation of the information related to
the product. The most significant register byte of an ASCII characters comes first.
For example, consider a Read Multiple Registers request to read Product Identifica-
tion from location 0x0000.
0x04 0x00 0x00 0x00 0x08
In this example, starting from byte 3 until the end, the response presents an ASCII
representation of the characters for the product identification, which reads as
SYSTEM NAME. Since the length of this field is smaller than eight registers, the rest of
the field is filled with zeros (0).
12.4.3.2 Cmd
The Cmd format instructs the device to set the output to either true or false. The
most significant byte comes first.
• FF 00 hex requests output to be True
• 00 00 hex requests output to be False
• Any value other than the suggested values does not affect the requested opera-
tion
For example, consider a Write Multiple Registers request to clear alarms in the device.
0x10 0x00 0x80 0x00 0x01 2 0xFF 0x00
12.4.3.3 Uint16
The Uint16 format describes a Standard ModBus 16 bit register.
12.4.3.4 Uint32
The Uint32 format describes Standard 2 ModBus 16 bit registers. The first register
holds the most significant 16 bits of a 32 bit value. The second register holds the
least significant 16 bits of a 32 bit value.
12.4.3.5 PortCmd
The PortCmd format describes a bit layout per port, where 1 indicates the requested
action is true, and 0 indicates the requested action is false.
PortCmd provides a bit layout of a maximum of 32 ports. Therefore, it uses two Mod-
Bus regsiters:
• The first ModBus register corresponds to ports 1 – 16
• The second ModBus register corresponds to ports 17 – 32 for a particular action
Bits that do not apply to a particular product are always set to zero (0).
A bit value of 1 indicates that the requested action is true. For example, the port is
up.
A bit value of 0 indicates that the requested action is false. For example, the port is
down.
The response depends on how many ports are available on the device. For example,
if the maximum number of ports on a connected RUGGEDCOM device is 20, the re-
sponse would be similar to the following:
0x04 0x04 0xF2 0x76 0x00 0x05
In this example, bytes 3 and 4 refer to register 1 at location 0x03FE, and represent
the status of ports 1 – 16. Bytes 5 and 6 refer to register 2 at location 0x03FF, and
represent the status of ports 17 – 32. The device only has 20 ports, so byte 6 con-
tains the status for ports 17 – 20 starting from right to left. The rest of the bites in
register 2 corresponding to the non-existing ports 21 – 31 are zero (0).
A bit value of 1 clears Ethernet statistics on the corresponding port. A bit value of 0
does not clear the Ethernet statistics.
0x10 0x00 0x81 0x00 0x02
12.4.3.6 Alarm
The Alarm format is another form of text description. Alarm text corresponds to the
alarm description from the table holding all of the alarms. Similar to the Text format,
this format returns an ASCII representation of alarms.
Note
Alarms are stacked in the device in the sequence of their occurence (i.e. Alarm 1,
Alarm 2, Alarm 3, etc.).
The first eight alarms from the stack can be returned, if they exist. A zero (0) value is
returned if an alarm does not exist.
12.4.3.7 PSStatusCmd
The PSStatusCmd format describes a bit layout for providing the status of available
power supplies. Bits 0-4 of the lower byte of the register are used for this purpose.
• Bits 0-1: Power Supply 1 Status
• Bits 2-3: Power Supply 2 Status
Other bits in the register do not provide any system status information.
Bit Value Description
01 Power Supply not present (01 = 1)
10 Power Supply is functional (10 = 2)
11 Power Supply is not functional (11 = 3)
The values used for power supply status are derived from the RUGGEDCOM-specific
SNMP MIB.
The lower byte of the register displays the power supply's status. In this example,
both power supplies in the unit are functional.
12.4.3.8 TruthValues
The Truthvalues format represents a true or false status in the device:
• 1 indicates the corresponding status for the device to be true
• 2 indicates the corresponding status for the device to be false
The register's lower byte shows the FailSafe Relay status. In this example, the FailSafe
Relay is energized.
The register's lower byte shows the ErrorAlarm status. In this example, there is no ac-
tive ERROR, ALERT or CRITICAL alarm in the device.
Note
DHCP Snooping is enabled on the device on a per-VLAN basis. For more information
about enabling DHCP snooping on individual VLANs, refer to "Managing Static VLANs
(Page 149)".
From a deployment perspective, it is also expected the user configures network ports
as trusted. Network ports typically connect to another switch or a router. This is nec-
essary because a DHCP server may not be directly connected to a switch port.
For more information about configuring ports as trusted or untrusted, refer to "Con-
figuring Trusted/Untrusted Ports (Page 276)".
Note
Dynamic ARP Inspection can only be enabled if DHCP snooping is enabled on the de-
vice.
ARP request and reply packets ingressing on untrusted ports are intercepted by the
device and subject to validation. ARP packets are not intercepted on ports that are
configured as trusted. The user is expected to configure the network ports as trusted,
so that ARP traffic between devices is not subject to inspection.
The sender MAC and sender IP address fields in an ARP request/reply packets are vali-
dated against the MAC-IP binding entry present in the DHCP snooping binding table.
If a binding entry is not present in the table, or if the information in the entry does
not match, the ARP request/reply packet is dropped.
For more information about ARP inspection statistics, refer to "Viewing ARP Inspec-
tion Statistics (Page 277)".
messages from a rogue DHCP server and block these messages in the switch it-
self.
1 3
1 DHCP Client
2 Switch
3 DHCP Server
4 Rogue DHCP Server
Figure 13.1 Misconfiguration by a Rogue DHCP Server
1 4
3
2
1 DHCP Client
2 Attacker Host
3 Switch
4 DHCP Server
Figure 13.2 DHCP Client Attack
1 4
3
2
1 DHCP Client
2 Attacker
3 Switch
4 DHCP Server
Figure 13.3 DHCP Starvation/Consumption Attack
network by poisoning the ARP caches of systems connected to the subnet and by
intercepting traffic intended for other hosts on the subnet.
An ARP spoofing attack can be prevented by enabling Dynamic ARP Inspection on
the switch. For more information about enabling Dynamic ARP Inspection, refer
to "Configuring DHCP Snooping (Page 275)".
1 1
3
2
1 Host
2 Attacker
3 Switch
Figure 13.4 ARP Cache Poisoning
3. Click Apply.
4. Enable DHCP Relay Agent (Option 82) on ports connected to a DHCP client. For
more information, refer to "Enabling DHCP Relay Agent Information (Option 82)
for Specific Ports (Page 274)".
13.1.3 Enabling DHCP Relay Agent Information (Option 82) for Specific Ports
DHCP Relay Agent (Option 82) can be enabled for any Ethernet port connected to a
DHCP client.
To enable DHCP Relay Agent (Option 82) for a specific port, do the following:
1. Navigate to Network Access Control » DHCP Snooping » Configure DHCP Port
Parameters. The DHCP Port Parameters table appears.
2. Select a port. The DHCP Port Parameters form appears.
Note
The Trusted parameter is configured as part of the DHCP snooping feature. For
more information, refer to "Configuring Trusted/Untrusted Ports (Page 276)".
4. Click Apply.
Note
DHCP Snooping is enabled on the device on a per-VLAN basis. For more information
about enabling DHCP snooping on individual VLANs, refer to "Managing Static VLANs
(Page 149)".
Note
For information about the ARP Inspection parameter, refer to "Enabling/Dis-
abling Dynamic ARP Inspection (Page 277)"
Parameter Description
3. Click Apply.
4. Configure individual ports as trusted or untrusted. For more information, refer to
"Configuring Trusted/Untrusted Ports (Page 276)".
Note
The Option-82 parameter is configured as part of the DHCP Relay Agent fea-
ture. For more information, refer to "Enabling DHCP Relay Agent Information
(Option 82) for Specific Ports (Page 274)".
4. Click Apply.
3. Click Apply.
4. Click Apply.
4. Click Apply.
the DHCP relay agent using different VLANs. The DHCP relay agent manages the re-
quests and responses between the clients and the DHCP server.
NOTICE
The values shown are specific to the provided topology. Actual values can vary
based on the user's configuration.
192.168.0.52
P2, switch.0001
192.168.0.8
P4, PVID=1
10.10.10.1/24 172.16.10.1/24
P2, PVID=3 P1, PVID=2
3 4 5 6 7
1 DHCP Server
2 LAN A
3 Client 2
4 LAN B
5 DHCP Relay Agent (RUGGEDCOM ROS Device)
6 LAN C
7 Client 1
Figure 13.5 Topology – Device as a Relay Agent
To configure the device as a DHCP relay agent per the topology, do the following:
1. Configure a separate device as the DHCP Server. If the DHCP server being used
is a RUGGEDCOM ROX II device, refer to the device-specific RUGGEDCOM ROX II
User Guide for more information.
For more information about configuring the DHCP relay agent (Option 82)
for a specific port, refer to "Enabling DHCP Relay Agent Information (Option
82) for Specific Ports (Page 274)".
f. To verify the configuration, make sure Client 1 has IP address
172.16.10.1/24 and Client 2 has IP address 10.10.10.1/24.
3. [Optional] Configure DHCP snooping:
a. Enable DHCP snooping on the DHCP server. If the DHCP server being used is
a RUGGEDCOM ROX II device, refer to the device-specific RUGGEDCOM ROX
II User Guide for more information.
b. Make sure DHCP option is enabled on VLANs 1, 2, and 3. For more informa-
tion about enabling DHCP for a specific VLAN, refer to "Adding a Static VLAN
(Page 149)".
c. Configure DHCP client and server ports:
For more information about configuring DHCP port parameters, refer to
"Configuring Trusted/Untrusted Ports (Page 276)".
Port Trusted
1 No
2 No
4 Yes
NOTICE
For further assistance, contact a Customer Service representative.
14.1 General
The following describes common problems.
Problem Solution
The switch is not responding to Is the switch being pinged through a router? If so, the switch gate-
ping attempts, even though the way address must be configured as well. The following figure illus-
IP address and gateway have trates the problem.
been configured. The switch is
receiving the ping because the
LEDs are flashing and the device 1 2 3
statistics are logging the pings.
What is going on?
192.168.0.1 10.10.0.2
10.10.0.1
192.168.0.2
1 Work Station
2 Router
3 Switch
Figure 14.1 Using a Router As a Gateway
Problem Solution
port status LEDs are flashing connects to another switch? If this has occurred, then a traffic loop
rapidly. has been formed.
Occasionally, the ports seem to If the problem appears to be transient in nature, it is possible that
experience significant flooding ports that are part of the spanning tree have been configured as
for a brief period of time. edge ports. After the link layers have come up on edge ports, STP
A switch displays a strange be- will directly transition them (perhaps improperly) to the forwarding
havior where the root port hops state. If an RSTP configuration message is then received, the port
back and forth between two will be returned to blocking. A traffic loop may be formed for the
switch ports and never settles length of time the port was in forwarding.
down. If one of the switches appears to flip the root from one port to an-
other, the problem may be one of traffic prioritization. For more in-
formation refer to "The network becomes unstable when a specific
application is started."(page 286).
Another possible cause of intermittent operation is that of an au-
to-negotiation mismatch. If one end of the link is fixed to full-du-
plex mode and the peer auto-negotiates, the auto-negotiating end
will fall back to half-duplex operation. At lower traffic, the volumes
the link may display few if any errors. As the traffic volume rises,
the fixed negotiation side will begin to experience dropped pack-
ets while the auto-negotiating side will experience collisions. Ulti-
mately, as traffic loads approach 100%, the link will become entire-
ly unusable. At this point, RSTP will not be able to transmit config-
uration messages over the link and the spanning tree topology will
break down. If an alternate trunk exists, RSTP will activate it in the
place of the congested port. Since activation of the alternate port
often relieves the congested port of its traffic, the congested port
will once again become reliable. RSTP will promptly enter it back
into service, beginning the cycle once again. The root port will flip
back and forth between two ports on the switch.
A computer or device is connect- Is it possible that the RSTP edge setting for this port is set to false?
ed to a switch. After the switch If Edge is set to false, the bridge will make the port go through two
is reset, it takes a long time for it forward delay times before the port can send or receive frames. If
to come up. Edge is set to true, the bridge will transition the port directly to for-
warding upon link up.
Another possible explanation is that some links in the network run
in half-duplex mode. RSTP uses a peer-to-peer protocol called Pro-
posal-Agreement to ensure transitioning in the event of a link fail-
ure. This protocol requires full-duplex operation. When RSTP detects
a non-full duplex port, it cannot rely on Proposal-Agreement pro-
tocol and must make the port transition the slow (i.e. STP) way. If
possible, configure the port for full-duplex operation. Otherwise,
configure the port’s point-to-point setting to true.
Either one will allow the Proposal-Agreement protocol to be used.
When the switch is tested by de- Is it possible that some ports participating in the topology have
liberately breaking a link, it takes been configured to STP mode or that the port’s point-to-point para-
a long time before devices be- meter is set to false? STP and multipoint ports converge slowly after
yond the switch can be polled. failures occur.
Is it possible that the port has migrated to STP? If the port is con-
nected to the LAN segment by shared media and STP bridges are
connected to that media, then convergence after link failure will be
slow.
Delays on the order of tens or hundreds of milliseconds can result
in circumstances where the link broken is the sole link to the root
bridge and the secondary root bridge is poorly chosen. The worst of
all possible designs occurs when the secondary root bridge is locat-
Problem Solution
ed at the farthest edge of the network from the root. In this case, a
configuration message will have to propagate out to the edge and
then back to reestablish the topology.
The network is composed of a A properly operating unmanaged bridge is transparent to STP con-
ring of bridges, of which two figuration messages. The managed bridges will exchange configu-
(connected to each other) are ration messages through the unmanaged bridge part of the ring as
managed and the rest are un- if it is non-existent. When a link in the unmanaged part of the ring
managed. Why does the RSTP fails however, the managed bridges will only be able to detect the
protocol work quickly when a failure through timing out of hello messages. Full connectivity will
link is broken between the man- require three hello times plus two forwarding times to be restored.
aged bridges, but not in the un-
managed bridge part of the ring?
The network becomes unstable RSTP sends its configuration messages using the highest possible
when a specific application is priority level. If CoS is configured to allow traffic flows at the high-
started. The network returns to est priority level and these traffic flows burst continuously to 100%
normal when the application is of the line bandwidth, STP may be disrupted. It is therefore advised
stopped. not to use the highest CoS.
When a new port is brought Is it possible that the port cost is incorrectly programmed or that
up, the root moves on to that auto-negotiation derives an undesired value? Inspect the port and
port instead of the port it should path costs with each port active as root.
move to or stay on.
An Intelligent Electronic Device Certain low CPU bandwidth controllers have been found to behave
(IED) or controller does not work less than perfectly when they receive unexpected traffic. Try dis-
with the device. abling STP for the port.
If the controller fails around the time of a link outage, there is the
remote possibility that frame disordering or duplication may be the
cause of the problem. Try setting the root port of the failing con-
troller’s bridge to STP.
Polls to other devices are occa- Review the network statistics to determine whether the root bridge
sionally lost. is receiving Topology Change Notifications (TCNs) around the time
of observed frame loss. It may be possible there are problems with
intermittent links in the network.
The root is receiving a number Examine the RSTP port statistics to determine the port from which
of TCNs. Where are they coming the TCNs are arriving. Sign-on to the switch at the other end of the
from? link attached to that port. Repeat this step until the switch gener-
ating the TCNs is found (i.e. the switch that is itself not receiving a
large number of TCNs). Determine the problem at that switch.
14.4 VLANs
The following describes common problems related to the VLANs.
Problem Solution
VLANs are not needed on the Yes. Simply leave all ports set to type edge and leave the native
network. Can they be turned off? VLAN set to 1. This is the default configuration for the switch.
Two VLANs were created and If the devices need to communicate at the physical address layer,
a number of ports were made they must be members of the same VLAN. If they can communi-
members of them. Now some of cate in a Layer 3 fashion (i.e. using a protocol such as IP or IPX), use
the devices in one VLAN need to a router. The router will treat each VLAN as a separate interface,
send messages to devices in the which will have its own associated IP address space.
other VLAN.
Problem Solution
On a network of 30 switches, At the switch where the management station is located, configure a
management traffic needs to be port to use the new management VLAN as its native VLAN. Config-
restricted to a separate domain. ure a host computer to act as a temporary management station.
What is the best method for do- At each switch, configure the management VLAN to the new value.
ing this while staying in contact Contact with each individual switch will be lost immediately as they
with these switches? are being configured, but it should be possible re-establish commu-
nication from the temporary management station. After all switch-
es have been taken to the new management VLAN, configure the
ports of all attached management devices to use the new VLAN.
Note
Establishing a management domain is often accompanied with the
establishment of an IP subnet specifically for the managed devices.
Siemens
https://www.siemens.com
Industry Mall
https://mall.industry.siemens.com
Siemens AG
Digital Industry
Process Automation
Postfach 48 48
90026 NÜRNBERG
GERMANY