Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
RuggedCom Inc.
64 Jardin Dr. (Unit 3G)
Concord, Ontario Canada
L4K 3P3
Web: www.ruggedcom.com
Tel: (905) 760-7799
Fax: (905) 760-9909
Toll Free: (888) 264 0006
RMC30 User Guide
Concord, Ontario RuggedCom shall not be liable for errors contained herein or for
consequential damages in connection with the furnishing,
Canada L4K 3P3 performance, or use of this material.
RuggedCom
About this User Guide
It is recommended that you use this guide along with the RMC30 Installation Guide
Document Conventions
This publication uses the following conventions:
Note: Means reader take note. Notes contain helpful suggestions or references to materials not
contained in this guide.
RuggedCom i
RMC30 User Guide
ii RuggedCom
Table Of Contents
Table Of Contents
About this User Guide............................................................................................................................ i
Applicable Firmware Revision........................................................................................................... i
Who Should Use This User Guide......................................................................................................i
How To Use This User Guide.............................................................................................................i
Document Conventions.......................................................................................................................i
Quick Start Recommendations.......................................................................................................... ii
Table Of Contents.................................................................................................................................iii
RuggedCom iii
RMC30 User Guide
Introduction...................................................................................................................................... 65
Upgrading Firmware........................................................................................................................ 65
Capturing Configurations.................................................................................................................68
Using SQL Commands.................................................................................................................... 69
Index.....................................................................................................................................................76
4 RuggedCom
Table Of Contents
TABLE O F FIGURES
Figure 1: Main Menu With Screen Elements Identified........................................................................ ii
Figure 14: Sources of Delay and Error in an End to End Exchange ................................................... 27
RuggedCom v
RMC30 User Guide
6 RuggedCom
Chapter 1 Setting Up And Administering The Server
This chapter familiarizes the user with the RuggedCom user interface and Web
Server interface as well as describes the following procedures:
Configuring Passwords
Attach a terminal (or PC running terminal emulation software) to the RS232 port
on the rear of the chassis. The terminal should be configured for 8 bits, no parity
operation at 57.6 Kbps. Hardware and software flow control must be disabled.
Select a terminal type of VT100.
Once the terminal is connected, pressing <CR> will prompt for the password to
be entered. The server is shipped with a default administrator password of
admin. Once successfully logged in, the user will be presented with the main
menu.
RuggedCom vii
RMC30 User Guide
Sub-menus are entered by selecting the desired menu with the arrow keys and
Administration
Serial Protocols
Diagnostics
The command bar offers a list of commands that apply to the currently displayed
menu. These commands include:
The main menu also provides a <CTRL> X command, which will terminate the
session.
8 RuggedCom
Chapter 1 Setting Up And Administering The Server
When changing a data item the user selects the data item by the cursor keys and
then pressing the enter key. The cursor will change position to allow editing of
the data item.
Typing a new value after pressing enter always erases the old parameter value. The
left and right cursor keys may be used to position the edit point without erasing
the old parameter value. The up and down cursor keys may be used to cycle
through the next higher and lower values for the parameter.
After the parameter has been edited, press enter again to change other parameters.
When all desired parameters have been modified, press <CTRL> A to apply
changes. The server will automatically prompt you to save changes when you
leave a menu in which changes have been made.
Some menus will require you to press <CTRL> I to insert a new record of
information and <CTRL> L to delete a record.
All configuration and display menus present the values at the current instant,
automatically updating if changed from other user interface sessions or SNMP. All
statistics menus will display changes to statistics as they occur.
Alarms are events for which the user is notified through the Diagnostics menu
View Alarms command. All configuration and display menus present an
indication of the number of alarms (in the upper right hand corner of the screen)
as they occur, automatically updating as alarms are posted and cleared.
The user interface provides a shell for operations that are more easily performed at
the command line. You may server back and forth from the menu system and
shell by pressing <CTRL> S. For more information on the capabilities of the
shell consult Chapter 4 Using The CLI Shell.
RuggedCom 9
RMC30 User Guide
Start a web browser session and open a connection to the server by entering a
URL that specifies its hostname or IP address (e.g. h ttp://192.168.0.1). Once the
server is contacted, start the login process by clicking on the Login link. The
resulting page should be similar to that presented below.
Enter the admin user name and the appropriate password for the admin user,
then click on the OK button. The server is shipped with a default administrator
password of admin. Once successfully logged in, the user will be presented with
the main menu.
Session Aging
The Server will close any sessions that have not been active within a given period.
The period is given by the value of the inactivity timer (IP Services Menu,
Inactivity Timeout command) or 30 minutes, whichever is less.
10 RuggedCom
Chapter 1 Setting Up And Administering The Server
The user interface is organized as a series of linked web pages. The main menu
provides the links and allows them to be expanded to display lower level pages for
a particular configuration system.
Each web page presents the server name (as proved by the System Identification
parameter), Menu Title link and Alarms link.
The Menu title link takes you to a page that provides help for the configuration
parameters provided by that page.
Alarms are events for which the user is notified of by following the Alarms link
(these alarms may also be viewed and cleared through the Diagnostics menu View
Alarms and Clear Alarms commands). All configuration and display menus
present an indication of the number of alarms (in the upper right hand corner of
the screen) as they occur, automatically updating as alarms are posted and cleared.
RuggedCom 11
RMC30 User Guide
When changing a data item the user selects the data item by selecting the field to
edit with the mouse, entering a new value and clicking on the apply field. More
than one parameter may be modified at a time.
Some menus will require you to create or delete new records of information.
12 RuggedCom
Chapter 1 Setting Up And Administering The Server
Administration Menu
The Administration command provides the menu shown in the following Figure.
My Server Administration Admin Access
Configure IP Services
Configure System Identification
Configure Passwords
Configure Time and Date
Configure SNMP Management Stations
Configure IP Services
Note: IP Address Type, IP Address, Subnet and Gateway parameters are not changed during
a factory reload. The following figure shows the settings as shipped from the factory.
IP Address Type
RuggedCom 13
RMC30 User Guide
Address, Subnet and Gateway fields will become unavailable for editing and will
not be displayed. These values will be loaded via Dynamic Host Configuration
Protocol (DHCP) and may be viewed using the ipconfig shell command.
IP Address
Note: Changes to the IP Address take effect immediately upon being saved. Telnet and Web
Server connections in place at the time of an address change will be closed.
Subnet
Gateway
This parameter specifies the gateway IP address. This is the address to use when
forwarding packets to a network other than the one the server belongs to. It is
only required if you intend to manage the server from a management station that is
separated from the server by a router. local PPP link address
Note: If the PPP connection is the only way of accessing hosts on the local LAN, configure the
gateway to point at the local PPP link address.
Inactivity Timeout
This parameter specifies the amount of time after keystrokes have been pressed
before a management connection will be automatically broken. A value of zero
disables timeouts altogether.
Telnet Sessions
This parameter limits the number of Telnet sessions. A value of zero prevents any
Telnet access.
Note: If you disable Inactivity Timeouts and reduce the number of Telnet sessions to one, you
will not be able to connect via Telnet until your current connection closes.
14 RuggedCom
Chapter 1 Setting Up And Administering The Server
This parameter limits the number of simultaneous web server users. Set this value
to zero to disable the web server.
TFTP Server
This parameter controls how a TFTP client can access the built-in TFTP server. A
setting of Disabled prevents all access, Get Only allows retrieval of files and
Enabled allows storing and retrieval of files.
This string determines the community string that may be used by any management
station for SNMP read-only access of settings. Delete this string if you wish to
prevent read-only access.
The system identification is displayed in the sign-on screen and in the upper left
hand corner of all RuggedServer menu screens. Setting the system identification
can make it easier to identify the servers within your network.
Setting the location and contact fields can provide information about where the
server is located and who to contact in order to resolve problems.
Configure Passwords
The guest, operator and admin passwords provide differing levels of access to the
server. Guest users can view most settings but may not change settings or run
commands. Operators cannot change settings but can reset alarms, statistics and
logs. Admin users can change settings and run commands.
RuggedCom 15
RMC30 User Guide
The Configure Time and Date command provides the ability to change the server
time, date and time zone. The server can also be configured to periodically
contact an NTP server to correct for drift in the onboard clock.
My Server Time and Date Admin
Access
Time 14:05:41
Date Jan 7, 2003
Time Zone UTC-5:00 (New York, Toronto)
NTP Server Address 0.0.0.0
NTP Update Period 60 min
Time
The time parameter allows configuration of the local time in local 24-hour format.
Date
Time Zone
The time zone setting allows for the conversion of UTC (Universal Coordinated
Time) to local time.
This parameter specifies the IP address of the NTP (Network Time Protocol)
server used to set the on-board real time clock. Programming an address of
0.0.0.0 disables the use of NTP. The current time setting will be overwritten at
every NTP sync time interval, as specified by the NTP update period parameter.
This parameter determines how frequently the time is updated from the NTP
server. If the update attempt fails the server will make two more attempts (at one-
minute intervals) after which an alarm is generated. The programmed update rate
will then be resumed.
16 RuggedCom
Chapter 1 Setting Up And Administering The Server
This command identifies management stations that may configure the server
through SNMP and receive Traps from the server.
At shipping time and after factory reloads the server is configured not to allow
remote management or raise Traps. Identify a management station to the server
by executing the Configure SNMP Management Stations command and
My Server SNMP Management Stations Admin
Access
You may create up to eight management stations, each of which may have
individual settings for community strings, set access permission and sending of
traps. Note that all management stations created this way inherently allow get
access and disable set access.
Community String
Address
Note: If this address does not lie in the same network as the servers IP address then the
gateway address must be configured.
Set Access
RuggedCom 17
RMC30 User Guide
Send Traps
The management station will be sent SNMP traps if this setting is enabled. The
traps issued are summarized in Appendix B SNMP Trap Summary.
18 RuggedCom
Chapter 1 Setting Up And Administering The Server
Troubleshooting
Problem One
Is the server being pinged through a router? If so, the server gateway address
must be configured. The following figure illustrates the problem.
Router RuggedSwitchTM
192.168.0.1 10.0.0.1 10.0.0.2
Workstation
192.168.0.2
The router is configured with the appropriate IP subnets and will forward the ping
from the workstation to the server. When the server responds, however, it will not
know which its interfaces to use in order to reach the workstation and will drop
the response. Programming a gateway of 10.0.0.1 will cause the server to forward
un-resolvable frames to the router.
This problem will also occur if the gateway address is not configured and the
server tries to raise an SNMP trap to a host that is not on the local subnet
Problem Two
At the server where the management station is located, configure a port to use the
new management VLAN as its native VLAN. Configure a host computer to act as
a temporary management station.
At each server, configure the management VLAN to the new value. As each
server is configured you will immediately lose contact with it, but should be able to
re-establish communications from the temporary management station. After all
servers have been taken to the new management VLAN, configure the ports of all
attached management devices to use the new VLAN.
RuggedCom 19
RMC30 User Guide
Baud rates of 1200, 2400, 9600, 19200, 38400, 57600, 115200 or 230400
bps.
20 RuggedCom
Chapter 2 Configuring Serial Encapsulation And TcpModbus Ports
Baud rates of 1200, 2400, 9600, 19200, 38400, 57600, 115200 or 230400
bps.
RuggedCom 21
RMC30 User Guide
Serial IP Applications
Character Encapsulation
The character streams can be created by any type of device. The baud rates
supported at either server need not be the same. If configured, the server will
obey XON/XOFF flow control from the end devices.
RuggedServer RuggedServer
The RuggedServer can be used to connect to any device supporting TCP (e.g. a
host computers TCP stack or a serial application on a host using port redirection
software).
RTU Polling
Note: Users of TcpModbus are advised to use the Server and Client Gateway application.
The host equipment may connect to a RuggedServer via a serial port, may use a
port redirection package or may connect natively to the network. As with
character encapsulation, connections must be made by only one side.
22 RuggedCom
Chapter 2 Configuring Serial Encapsulation And TcpModbus Ports
RuggedServer RuggedServer
RTU
RuggedServer
RTU
Host with Port Redirection Software
If a RuggedServer is used at the host end, it will wait for a request from the host,
encapsulate it in a TCP message and send it to the remote side. There, the remote
RuggedServer will forward the original request to the RTU. When the RTU
replies the RuggedServer will forward the encapsulated reply back to the host
end.
ModBus does not employ flow-control so XON/XOFF flow control should not
be configured.
The RuggedServer will also handle the process of line-turnaround when used
with RS485.
RuggedServer
RTU 1
RuggedServer RuggedServer
RTU 2
Host polling RTUs 1-3
RuggedServer
RTU 3
Figure 12: Broadcast RTU Polling
RuggedCom 23
RMC30 User Guide
Initially, the remote servers will place connections to the host server. The host
server in turn is configured to accept a maximum of three incoming connections.
The host will sequentially poll each RTU. Each poll received by the host server is
forwarded (i.e. broadcast) to all of the remote servers. All RTUs will receive the
request and the appropriate RTU will issue a reply. The reply is returned to the
host server, where it is forwarded to the host.
24 RuggedCom
Chapter 2 Configuring Serial Encapsulation And TcpModbus Ports
The TcpModbus Server and Client applications are used to transport Modbus
requests and responses across IP networks.
The TcpModbus Client application accepts Modbus polls from a master and
determines the IP address of the corresponding RTU. The client then
encapsulates the message in TCP and forwards the frame to a Server Gateway or
native TcpModbus RTU. Returning responses are stripped of their TCP headers
and issued to the master.
RuggedServer
Client Gateway RuggedServer
Master polling RTUs 1 and 2 Server Gateway
RTU 1
RuggedServer
RuggedServer Server Gateway
RTU 2
Client Gateway
Master polling RTUs 1,2 and 4 RuggedServer
Server Gateway
RTU 3
RTU 4
Native TcpModbus Master polling all RTUs
Gateways and native TcpModbus devices.
The Server Gateway supports up to 32 RTUs on any of its two ports. When a
request for a specific RTU arrives the server will route it to the correct port.
RuggedCom 25
RMC30 User Guide
MultiMaster Capability
It is possible for multiple masters to simultaneously issue requests for the same
RTU. The Server Gateway will queue the requests and deliver them to the RTU in
turn. This multimaster capability allows widely distributed masters to configure
and extract information from the RTU.
26 RuggedCom
Chapter 2 Configuring Serial Encapsulation And TcpModbus Ports
When a software package uses one of the virtual COM ports, a TCP connection is
placed to a remote IP address and TCP port that has been programmed into the
redirector. Some redirectors also offer the ability to receive connections.
Message Packetization
The server buffers received characters into packets in order to improve network
efficiency and demarcate messages.
The server uses three methods to decide when to packetize and forward the
buffered characters to the network:
Packetize on Specific Character,
Packetize on timeout and
Packetize on full packet.
RuggedCom 27
RMC30 User Guide
Note: Some polling software packages which perform well over DOS have been known to
experience problems when used over Windows based software or port redirection software. If the
OS does not expedite the transmission of characters in a timely fashion, pauses in transmission
can be interpreted as the end of the message. Messages can be split into separate TCP packets.
A locally attached RuggedServer or a port redirector could packetize and forward the message
incorrectly. Solutions include tuning the OS to prevent the problem or increasing the packetizing
timer.
Finally, the server will always packetize and forward on a full packet, i.e. when the
number of characters fills its communications buffer (1024 bytes).
Some RTU protocols (such as ModBus) use the concept of a turnaround delay.
When the host sends a message (such as a broadcast) that does not invoke an RTU
response, it waits a turnaround delay time. This delay ensures that the RTU has
time to process the broadcast message before it has to receive the next poll.
When polling is performed over TCP, network delays may cause the broadcast and
next poll to arrive at the remote server at the same time. Configuring a
turnaround delay at the server will enforce a minimum separation time between
each message written out the serial port.
Note that turnaround delays do not need to be configured at the host computer
side and may be disabled there.
28 RuggedCom
Chapter 2 Configuring Serial Encapsulation And TcpModbus Ports
The RuggedServer Client Gateway always makes the TCP connection to the
Server Gateway. The Server Gateway can only accept a connection.
The client begins making its connections at start up and whenever a new RTU is
configured. The client will retry the connection at 2-30 second intervals until it
establishes.
Port Numbers
The TCP port number dedicated to Modbus use is port 502. The Server Gateway
can also be configured to accept a connection on a configurable port number.
This auxiliary port can be used by masters that do not support port 502.
Retransmissions
The Server Gateway offers the ability to resend a request to an RTU should the
RTU receive the request in error or the Server Gateway receives the RTU response
in error.
The decision to use retransmissions, and the number to use depends upon factors
such as:
The probability of a line failure
The number of RTUs and amount of traffic on the port
The cost of retransmitting the request from the server vs. timing-out and
retransmitting at the master. This cost is affected by the speed of the ports and
of the network.
If the Server Gateway receives a request for an unconfigured RTU, it will respond
to the originator with a special message called an exception (type 10). A type 11
exception is returned by the server if the RTU fails to respond to requests.
RuggedCom 29
RMC30 User Guide
Exception information can be passed along to the Modbus host by the Client
Gateway in the form of an exception response message. Some legacy Modbus
hosts may not be capable of processing the new TcpModbus originated exception
codes. The Client Gateway may be programmed to discard the information and
allow the host to time-out.
The following description provides some insight into the possible sources of delay
and error in an end-to-end TcpModbus exchange.
Client Server
Master RTU
Gateway Gateway
1 Transmission time from
1a 2
Master to Client Gateway
Network transmission time
3a
4
3b Queuing time
5 Transmission time from
Server Gateway to RTU
In step 1 the master issues a request to the Client Gateway. If the Client Gateway
validates the message it will forward it to the network as step 2.
30 RuggedCom
Chapter 2 Configuring Serial Encapsulation And TcpModbus Ports
Steps 3a and 3b represents the possibility that the Server Gateway does not have
configuration for the specified RTU. The Server Gateway will always respond
with a type 10 (No Path) in step 3a, which the client will forward in step 3b.
Step 4 represents the possibility of queuing delay. The Server Gateway may have
to queue the request while it awaits the response to a previous request. The worst
case occurs when a number of requests are queued for an RTU that has gone
offline, especially when the server is programmed to retry the request upon failure.
Steps 5-8 represent the case where the request is responded to by the RTU and is
forwarded successfully to the master. It includes the think time for the RTU to
process the request and build the response.
Step 9a represents the possibility that the RTU is offline, the RTU receives the
request in error or that the Server Gateway receives the RTU response in error. If
the Server Gateway does not retry the request, it will issue an exception to the
originator.
A Worked Example
A network is constructed with two Masters and 48 RTUs on four Server Gateways.
Each of the Master is connected to a Client Gateway with a 115.2 Kbps line. The
RTUs are restricted to 9600 bps lines. The network is Ethernet based and
introduces an on average 3 ms of latency. Analysis of traces of the remote sites
has determined that the min/max RTU think times were found to be 10/100 ms.
What time-out should be used by the Master?
The maximum sized Modbus message is 256 bytes in length. This leads to a
transmission time of about 25 ms at the Master and 250 ms at the RTU. Under
ideal circumstances the maximum round trip time is given by: 25 ms (Master-
>client) + 3 ms (network delay) + 250 ms (server->RTU) + 100 ms (Think time)
+ 250 ms (RTU->server) + 3 ms (network delay) + 25 ms (client->Master). This
delay totals about 650 ms.
Contrast this delay with that of a quick operation such as reading a single
register. Both request and response are less than 10 bytes in length and complete
(for this example) in 1 and 10 ms at the client and server. Assuming the RTU
responds quickly, the total latency will approach 35 ms.
It is also necessary to take account such factors as the possibility of line errors and
collisions between masters at the server.
The server may be configured to recover from a line error by retransmitting the
request. Given a maximum frame transmission time of 250 ms and an RTU
latency of 100 ms, it would be wise to budget 350 ms for each attempt to send to
the RTU. Configuring a single retransmission would increase the end-to-end delay
from about 650 ms to about 1000 ms.
RuggedCom 31
RMC30 User Guide
The server can already be busy sending a request when the request of our example
arrives. Using the figures from the above paragraph, the server being busy would
increase the end-to-end delay from 1000 to 1350 ms.
The preceding analysis suggests that the Master should time-out at some time after
1350 ms from the start of transmission.
The following set of tables lists default configuration parameters for each port.
For each parameter the parameter name, recommended setting and possible range
are included.
32 RuggedCom
Chapter 2 Configuring Serial Encapsulation And TcpModbus Ports
The Serial Protocols menu is accessible from the main menu Serial Protocols
command. The Serial Protocols menu will lead you to all the other available
menus for configuring and obtaining the status of serial IP and TcpModbus ports.
My Server Serial Protocols Admin
Access
The Serial Protocol Assignment menu is accessible from the Serial Protocols
menu. The Serial Protocol Assignment menu determines the protocol that will run
on each port.
My Server Serial Protocol Assignment Admin
Access
Port Protocol
1 Serial IP
2 TCP ModBus Server Gateway
Note: You must configure protocols for the ports in this menu for the ports to appear in the
Serial IP, TCP Modbus Server and Client menus.
RuggedCom 33
RMC30 User Guide
The Serial IP Configuration menu is accessible from the Serial Protocols menu.
This menu presents the configuration of the Serial IP Ports.
My Server Serial IP Configuration Admin
Access
Port Name Status Baud Data Bits Stop Parity Flow Control Pack
Char
1 Alarm 6 Enabled 19200 8 1 None None Off
More right ...
Name
A descriptive name that may be used to identify the device connected on that port.
Status
Whether the port is disabled or enabled. Disabled ports will not accept or place
connections.
Baud
Data Bits
Stop
Parity
Flow Control
34 RuggedCom
Chapter 2 Configuring Serial Encapsulation And TcpModbus Ports
Pack Char
The character to which can be used to force forwarding of accumulated data to the
network. If a packetization character is not configured, accumulated data will be
forwarded based upon the packetization timeout parameter.
Pack Timer
The delay from the last received character until when data is forwarded.
Turnaround
The amount of delay (if any) to insert between the transmissions of individual
messages out the serial port.
Call Dir
Max Conns
The maximum number of incoming connections to permit when the call direction
is incoming.
Remote IP
Remote Port
Local Port
Retry Timer
The time to wait after an outgoing connection fails before the next attempt.
RuggedCom 35
RMC30 User Guide
The TCP Modbus Server Configuration menu is accessible from the Serial
Protocols menu. This menu presents the commands to configure the port for TCP
Modbus Server Gateway operation and to specify RTUs.
My Server TCP Modbus Server Configuration Admin
Access
The TCP Modbus Server Configuration menu is accessible from the TCP Modbus
Server Configuration menu. This menu presents the configuration of the TCP
Modbus Server ports.
My Server TCP Modbus Server Configuration Admin
Access
Port Name Status Baud Data Bits Stop Parity Flow Control
2 Port x Enabled 57600 8 1 None None
More right ...
Name
A descriptive name that may be used to identify the device connected on that port.
Status
Baud
Data Bits
36 RuggedCom
Chapter 2 Configuring Serial Encapsulation And TcpModbus Ports
Stop
Parity
Response Timer
The maximum allowable time to wait for the RTU to start to respond, after which
the request is retransmitted or the exchange deemed failed.
Pack Timer
Turnaround
The amount of delay (if any) to insert after the transmissions of Modbus broadcast
messages out the serial port.
TCP Modbus always listens on TCP port 502. It may be additionally configured to
listen on this auxiliary port number, accepting calls on both.
Retransmits
The number of times to retransmit the request to the RTU before giving up,
should the original attempt fail.
RuggedCom 37
RMC30 User Guide
The TCP Modbus Server Gateway RTU Assignment menu is accessible from the
TCP Modbus Server Configuration menu. This menu presents the configuration
of the Modbus RTUs.
My Server TCP Modbus Server Gateway RTU Assignment Admin
Access
RTU List
38 RuggedCom
Chapter 2 Configuring Serial Encapsulation And TcpModbus Ports
The TCP Modbus Client Configuration menu is accessible from the Serial
Protocols menu. This menu presents the commands to configure the port for TCP
Modbus Client Gateway operation and to specify RTUs.
My Server TCP Modbus Client Configuration Admin
Access
The TCP Modbus Client Configuration menu is accessible from the TCP Modbus
Client Configuration menu. This menu presents the configuration of the TCP
Modbus Client ports.
My Server TCP Modbus Client Configuration Admin
Access
Port Name Status Baud Stop Parity Pack Timer Forward Exceptions
3 Port x Enabled 19200 1 None 352 ms Enabled
Name
A descriptive name that may be used to identify the device connected on that port.
Status
Baud
Data Bits
RuggedCom 39
RMC30 User Guide
Stop
Parity
Pack Timer
Note: Some versions of the Windows OS have been observed to pause in the middle of
transmitting requests, resuming transmission afterwards. This behaviour was related to the load
placed upon the host.
Forward Exceptions
When the Master polls for an unconfigured RTU or the remote TcpMobdus Server
receives a poll for an RTU which is not configured or is timing out, it returns an
exception message. When enabled this feature forwards these messages to the
client as exception codes 10 (no path) and 11 (no response). Disable this feature if
your client is confused by these codes and would prefer to time-out when a failure
occurs.
The TCP Modbus Client Gateway RTU Assignment menu is accessible from the
TCP Modbus Client Configuration menu. This menu presents the configuration of
the Modbus RTUs. Delete an RTU by selecting an entry and pressing <CTRL
D>. Configure a new RTU by entering <CTRL I>.
40 RuggedCom
Chapter 2 Configuring Serial Encapsulation And TcpModbus Ports
Port 3
RTU 1
Remote IP 10.17.0.1
Remote Port 502
RTU
Remote IP
The network address of the Server Gateway where this RTU can be found.
Remote Port
RuggedCom 41
RMC30 User Guide
The Connection Statistics menu is accessed from the Serial Protocols menu and
displays all TCP connections.
My Server Connection Statistics Admin Access
Remote IP
Remote Port
Local Port
This field presents the TCP port number used by the server.
Ports
The serial ports for which the connection applies. Note that TcpModbus Server
Gateway ports share TCP port 502.
Rx Packets
The cumulative number of received packets for this connection since it became
active.
Tx Packets
The cumulative number of transmitted packets for this connection since it became
active.
42 RuggedCom
Chapter 2 Configuring Serial Encapsulation And TcpModbus Ports
The Serial Summary Statistics menu is accessed from the Serial Protocols menu. It
presents a summary of active connections and per-second byte and packet counts.
My Server Serial Summary Statistics Admin
Access
Type
This parameter identifies the protocol running on the port and is one of SIP (Serial
IP), TMBS (TcpModbus Server Gateway) or TMBC (TcpModbus Client Gateway).
State
The state of the port is active if there are connections established and inactive
otherwise.
Rx Chars
Tx Chars
Rx Packets
The number of received packets for all connections to this port in the last second.
Tx Packets
The number of transmitted packets on connections to this port in the last second.
Errors
RuggedCom 43
RMC30 User Guide
The Serial Port Statistics menu is accessed from the Serial Protocols menu. It
presents connection management and cumulative byte-level statistics.
My Server Serial Port Statistics Admin
Access
Type
This parameter identifies the protocol running on the port and is one of SIP (Serial
IP), TMBS (TcpModbus Server Gateway) or TMBC (TcpModbus Client Gateway).
Active Conns
The number of active connections on this port. If the call direction is outgoing,
there can be at most one connection. If the call direction is incoming, there can
be at most 32 connections.
A display of the IP addresses and TCP port numbers held by active connections
can be viewed from the View Connection Statistics menu.
Rx Chars
Tx Chars
Rx Packets
The cumulative number of received packets for all connections on this port since
reboot.
44 RuggedCom
Chapter 2 Configuring Serial Encapsulation And TcpModbus Ports
Tx Packets
The cumulative number of transmitted packets all connections on this port since
reboot.
Parity Errors
Framing Errors
Overrun Errors
Clearing the statistics of one or all ports will cause serial port statistics counts for
Rx Chars, Tx Chars, Rx Packets, Tx Packets, Parity Errors, Framing Errors and
Overrun Errors to be cleared:
Resetting one or all serial ports will cause any active TCP connection to be
dropped. The port will begin wait for new incoming connections or pause for the
configured call retry time and attempt to reconnect outgoing connections.
RuggedCom 45
RMC30 User Guide
Troubleshooting
Problem One
The peer may not be opening (accepting) connections. The Serial Port Statistics
Menu will display whether the connection is active or not.
The peer may not be sending data. The Serial Port Statistics Menu will display the
counts of transmitted and received data.
Watch the connection activity. For a detailed description of the TCP connection
activity, turn on tracing at the TCPCONN level (See the section on tracing in
Chapter 4 Using The CLI Shell).
Problem Two
If two ports (on the same or different RuggedServers) are configured to call the
same IP/TCP port in the network, only the first one to call will be successful. All
other ports will fail, displaying the attempts as brief periods of connection in the
Serial Port Statistics Menu.
Problem Three
Start by installing one server at the Modbus Master and the other two at the RTUs.
Ensure basic network connectivity by pinging or telnetting into each device.
On the server at the Master, assign a TcpModbus Client Gateway to a port using
the Serial Protocol Assignment menu. Connect the Master to the port. Use the
TCP Modbus Client Gateway Parameters menu to configure the line
parameters to support the Masters maximum speed and enable the port. Use the
46 RuggedCom
Chapter 2 Configuring Serial Encapsulation And TcpModbus Ports
TCP Modbus Client Gateway RTU Assignment menu to create RTU entries
for each of the RTUs, providing the IP address of the site at which the RTU is
located.
On the servers at the RTUs, assign TcpModbus Server Gateways to each port.
Group the RTUs by their level of performance, balancing them across the four
ports. Use the TCP Modbus Server Gateway Parameters menu to configure the
line parameters for each port according to the capabilities of the RTUs on that
port, enable the ports and connect the RTUs. Use the TCP Modbus Server
Gateway RTU Assignment menu to map the RTUs to their respective ports.
Verify that the Master can now poll each RTU. Use the tracing package to tune
performance at the client and server ports. You may need to length time-outs for
particularly slow ports and may want to shorten timeouts for particularly fast
ports.
Problem Three
Are framing, parity or overrun errors reported at either the client or server?
Is the Server Gateway set up for the correct baud, parity and stop bits? Is the
RTU online?
Is an adequate pack timer configured at the server? Is the Masters time-out long
enough? Is the Master pausing in the middle of transmitting the request? Some
versions of the Windows OS have been observed to display this behaviour as load
is increased.
Could the IP network be splitting the ModBus message into two TCP segments?
Problem Four
RuggedCom 47
RMC30 User Guide
Activate tracing at the IP level and serial port level. The trace package displays
timestamps, packet sizes and types as well as providing measured response times.
The response time displayed for Server Gateways is the time from when the last
character of the request is transmitted until the first character of the response
arrives (i.e. the RTUs think time).
Similarly, the response time displayed for Client Gateways is the time from the last
character of the request as transmitted by the Master until the first character of the
response as transmitted by the Client Gateway. This figure measures the end-to-
end delay through the network.
48 RuggedCom
Chapter 2 Configuring Serial Encapsulation And TcpModbus Ports
RuggedCom 49
RuggedServer User Guide
Alarms are the occurrence of events of interest that are logged by the server. If
alarms have occurred the server will indicate the number of alarms in the top right
corner of all menu screens.
My Server Diagnostics 5
ALARMS!
View Alarms
Clear Alarms
View System Log
Clear System Log
View CPU Diagnostics
View Product Identification
Load Factory Default Configuration
Reset Unit
Types Of Alarms
There are two broad types of alarms, active and passive alarms.
Active Alarms
Active alarms are ongoing. They signify states of operation that are not in
accordance with normal operation. Examples of active alarms include links that
50 RuggedCom
Chapter 3 Using Diagnostics
should be active but are not or error rates that are continuously exceeding a certain
threshold.
Active alarms are removed (cleared) either by solving the original cause of the
alarm or by disabling the alarm itself.
Passive Alarms
Passive alarms are historic in nature. They signify events that represented
abnormal conditions in the past, and do not affect the current operational status.
Examples of passive alarms include authentication failures or error rates that
temporarily exceeded a certain threshold.
Passive alarms are cleared through the diagnostics menu Clear Alarms command.
RMON generated alarms are passive.
Note: Alarms are volatile in nature. All alarms (active and passive) are cleared at startup.
Format of Alarms
Alarm Time
The alarm time provides the month, hour and minute at which the alarm occurred.
Alarm Level
The alarm level provides an indication of the severity of the alarm. The possible
levels correspond to those described in the UNIX SysLog facility.
RuggedCom 51
RuggedServer User Guide
Alarm Description
Each alarm has an associated description string. The string will include a port
number if it is relevant. The description may also provide an indication of the
recent rate at which this alarm is occurring (if the alarm has occurred previously).
All active alarms will immediately de-energize the critical fail relay (thus signifying
a problem). The relay will be re-energized when the last outstanding active alarm
is cleared.
Viewing Alarms
The Alarms Menu is available from the Diagnostics menu View Alarms command.
Alarms are displayed in the order in which they occurred, even if the real time
clock was incorrect at the time of the alarm.
My Server Alarms 6
ALARMS!
Clearing Alarms
The Diagnostics menu Clear Alarms command will clear all alarms.
52 RuggedCom
Chapter 3 Using Diagnostics
The CPU Diagnostics Menu is available from the Diagnostics menu View CPU
Diagnostics command. The parameters presented in this menu are read-only.
My Server CPU Diagnostics Admin Access
Running Time
This parameter presents the time since reboot in days and hours.
CPU Usage
RAM Total
This parameter presents the total amount of memory available to the servers
processor.
RAM Available
Temperature
RuggedCom 53
RuggedServer User Guide
The View System Log command displays entries made in the system log. The
system log records various events including reboots, user sign-ons, alarms and
configuration saves.
My Server syslog.txt Admin
Access
The system log will continue to accumulate information until becomes full. There
is enough room in the file to accumulate logs for months or years under normal
operation.
The Clear System Log command will clear the log. Clearing the log is
recommended after a firmware upgrade.
The product base MAC Address (i.e. the MAC address of port 1).
The version of the Boot code that has been loaded onto the product.
The version of the Main Application code that has been loaded onto the
product.
54 RuggedCom
Chapter 3 Using Diagnostics
The Load Factory Default Configuration command will re-load all configuration
parameters to factory default values. Configuration parameters that affect the
connection to the server (as provided by the Configure IP Services menu) will not
be modified. A prompt will be displayed requesting confirmation of this action.
The Reset Device command will close all open Telnet connections and warm
start the unit.
RuggedCom 55
RMC30 User Guide
Note: The operations described in this chapter are available to users at the guest, operator or
administrator security level. The XModem and TFTP file transfer utilities are available only
to operators and administrators and are described in the chapter Upgrading Firmware And
Managing Configurations. The SQL command is available to users at the administrator level
and is also described in Upgrading Firmware And Managing Configurations.
You may enter the Command Line Interface (CLI) shell from any and all menus by
pressing <CTRL> S. Any menu operation in progress (such as changing a
configuration parameter) will be terminated. You may return to the menu system
by pressing <CTRL> S or entering exit<CR> at the shell prompt.
56 RuggedCom
Chapter 4 Using The CLI Shell
Summary Of Commands
Note that this chapter describes only the most useful of the above commands.
RuggedCom 57
RMC30 User Guide
Viewing Files
Dir command
Note: Each file has associated attributes, as described under the Attr column. Files marked
R are readable, i.e. may be uploaded by the user. Files marked W are writable, i.e. may
be modified (downloaded) by the user. Files marked B are binary files, i.e. may be upgraded
by the user.
The most useful files include config.csv, crashlog.txt and syslog.txt. These files
may be viewed by using the type command, specifying the desired filename.
The config.csv file contains the current configuration settings. The use of this file
is described in the chapter Upgrading Firmware And Managing Configurations.
The crashlog.txt and syslog.txt files contain historical information about events
that have occurred.
The crashlog.txt file will contain debugging information relating to problems that
have resulted in unplanned restarts of the server. A file size of 0 bytes indicates
that no untoward events have occurred.
The clearlogs command will reset these logs. It is recommended to run the
clearlogs command after every firmware upgrade.
58 RuggedCom
Chapter 4 Using The CLI Shell
The ping command sends an ICMP echo request to a remotely connected device.
For each reply received the round trip time is displayed.
The ping command can be used to ensure connectivity to the next connected
device. The command ping 192.168.0.1 will send a small number of pings to
this device and display the results.
The ping command is a useful tool for testing commissioned links. The command
also includes the ability to send a specific number of pings with specified time with
which to wait for a response.
The specification of a large number of pings and a short response time can flood
a link, stressing it more than a usual ping sequence. The command ping
192.168.0.1 500 2 can be used to issue 500 pings each separated by 2 milliseconds
to the next server. If the link used is of high quality then no pings should be lost
and the average round trip time should be small.
RuggedCom 59
RMC30 User Guide
Tracing Events
The CLI trace command provides a means to trace the operation of various
protocols. The trace provides detailed information including RSTP packet
decodes, IGMP activity and MAC address displays.
Notes: Tracing has been designed to provide detailed information to expert users.
Note that all tracing is disabled upon server startup.
In order to display the current trace settings and discover the systems that be
>trace ?
Supported commands:
noclear Starts the log without clearing it first
alloff Disables all trace subsystems from tracing
allon Enables all flags in all trace subsystems
stp Traces STP operations
link Displays server fabric statistics
mac Displays MAC Events
forward Forwards trace messages to an IP:UDP address
ip Traces IP communications
ppp Traces PPP communications
tcpconn Traces TCP Connections
serial Traces Serial communications
igmp Displays IGMP Snooping events
60 RuggedCom
Chapter 4 Using The CLI Shell
Enabling Tracing
>trace link ?
trace link syntax
link changes | stats | allon | alloff | statsonce
LINK : Logging is disabled
>trace ip decodes
IP : decodes>
RuggedCom 61
RMC30 User Guide
The trace is be started by entering trace<CR>. All historical trace messages will
be displayed. Since this may include many messages it may be more desirable to
use the trace clear<CR> command instead. This command will automatically
clear the trace buffer as it starts the trace.
>trace
Note: The trace package includes the forward subsystem, a remote reporting facility intended
to be used only under the direction of RuggedCom service personnel.
The CLI command ipconfig will provide the current IP address, subnet mask
and default gateway. This command provides the only way of determining these
values when DHCP is used.
62 RuggedCom
Chapter 4 Using The CLI Shell
The Unix/Dos Remote Shell Facility can be used at the workstation to cause the
product to act upon commands as if they were entered at the CLI prompt. The
syntax of the RSH command is usually of the form:
rsh ipadd l password command_string
where ipadd = The address or resolved name of the product
password = The password for the access level you wish to
issue the command at
command_string = The command to execute
Any output from the command will be returned to the workstation submitting the
command. Commands that start interactive dialogs (such as trace) cannot be used.
RuggedCom 63
RMC30 User Guide
Upgrading firmware using the XModem protocol and Trivial File Transfer
Protocol (TFTP)
Capturing and restoring the server configuration using XModem and TFTP
Upgrading Firmware
You may be required to upgrade the server firmware in order to take advantage of
new features or bug fixes.
Your RuggedServer has two firmware components, the boot binary and the main
application binary. In normal practice only the main application will have to be
upgraded. Your RuggedCom representative will provide you with this file. It will
be of the form RuggedServer_Main_v1.x.y.bin.
You may upgrade using either an XModem or TFTP protocol utility. If you will
use XModem you upgrade from the RS232 port or through a Telnet session.
TFTP transfers may be performed in one of two ways. A TFTP client upon a
Unix/Dos workstation can be used to contact the RuggedServer TFTP server.
This method is very convenient, but will not provide control over who is allowed
to upgrade the server.
Alternatively, the TFTP client in the RuggedServer CLI shell can be used to
contact a Unix/Dos host supporting a TFTP server. You must set up a TFTP
server on your network, but only admin level users can then perform upgrades.
Note: Security during file transfer by XModem and TFTP is established in the following
ways. Transfers from the CLI shell XModem and TFTP clients are determined by the access
level of the user. Downloads may only be performed by administrators while uploads may be
performed by operators and administrators.
TFTP transfers to the RuggedServer TFTP Server are controlled by the IP Services
Configuration Menu, TFTP Server parameter.
64 RuggedCom
Chapter 5 Upgrading Firmware And Managing Configurations
Connect to the server, either through the RS232 port or through a Telnet
connection. Press <CTRL S> to enter the shell. Enter the command xmodem
receive main.bin<CR>. Open the XModem utility in your terminal package. If
possible select the XModem1K protocol, otherwise select the Xmodem protocol.
>xmodem receive main.bin
Press Ctrl-X to cancel
Receiving data now ...
Received 982298 bytes. Closing file ...
Flash programming results for main.bin
Transfer complete
Start sending the RuggedServer_Main file. After the file transfer completes the
server will provide an indication that the server was properly upgraded.
The server must be reset in order for the new software to take effect. If you want
to reset the server immediately enter reset<CR>. The server will begin its
reboot within a few seconds.
This method of TFTP transfer relies upon the use of a TFTP client upon a
Unix/Dos workstation to contact the products TFTP server.
Note: The IP Services Configuration Menu, TFTP Server parameter controls how a
TFTP client can access the servers built-in TFTP server. A setting of Disabled prevents all
access, Get Only allows retrieval of files and Enabled allows storing and retrieval of files.
Ensure that this parameter is appropriate for the type of access you wish to perform.
RuggedCom 65
RMC30 User Guide
The utility will provide an indication that the file was transferred properly, but you
must also query the server in order to determine if it was correctly programmed.
Use the command rsh hostname l password version to obtain the revision
levels of the software. If the download was successful the version will be
indicated as the next firmware (i.e. the firmware that will run after the next
C:\>ping 10.1.0.1
C:\>
reboot).
Identify the IP address of the host providing the TFTP server capability. Ensure
that the firmware revision to be downloaded (e.g. RuggedServer_Main_v1.4.1.bin)
is present there.
Telnet to or connect to the console of the server. Enter the CLI shell and run the
command tftp host_addr get main.bin RuggedServer_Main_v1.4.1.bin.
Alternatively the download could also be started by the rsh command rsh
C:\>telnet 10.1.0.1, sign-on and <CTRL S> to enter CLI shell..
>ping 10.1.0.254 1
Reply 1 from 10.0.0.28: time<4ms
Packets: Sent = 1, Received = 1, Lost = 0 (0.00% loss)
Approximate average round trip time in milli-seconds: 4
>version
Current RuggedServer Boot Software v1.2.0 (Nov 03 2003 15:27)
Current RuggedServer Main Software v1.4.0 (Nov 25 2003 17:54)
Next RuggedServer Main Software v1.4.1 (Nov 27 2003 16:43)
>
server_add l admin tftp host_addr get main.bin RuggedServer_Main_v1.4.1.bin.
66 RuggedCom
Chapter 5 Upgrading Firmware And Managing Configurations
Capturing Configurations
The same file can be downloaded to the server at a later date in order to restore
the server to its previous configuration.
Connect to the server, either through the RS232 port or through a Telnet
connection. Press <CTRL S> to enter the shell. Enter the command xmodem
send config.csv<CR>. Open the XModem utility in your terminal package and
start an XModem receive to the desired local filename. Open the file to verify that
it contains the appropriate configuration.
Note: You may wish to include date and node address/name information in the local filename.
Alternatively, sign-on to the product and use the CLI shells tftp command to send
the configuration file to your TFTP server.
RuggedCom 67
RMC30 User Guide
The RuggedServer provides an SQL like command facility that allows expert
users to perform several operations not possible under the user interface, namely:
Restoring the contents of a specific table, but not the whole configuration,
to their factory defaults,
When combined with RSH, SQL commands provide a means to query and
configure large numbers of servers from a central location.
Getting Started
The SQL command provides an 'sql like' interface for manipulating all system
configuration and status parameters. Entering 'SQL HELP command-name' displays
detailed help for a specific command. Commands, clauses, table, and column
names are all case insensitive.
68 RuggedCom
Chapter 5 Upgrading Firmware And Managing Configurations
Many sql commands operate upon specific tables in the database, and require the
table name to be specified. The name can easily be determined by navigating the
menu system to the desired menu and pressing <CTRL Z>. The menu name and
the corresponding database table name will be cited.
Another way to find a table name is to run the sql info tables command. This
command also displays menu names and their corresponding database table names.
>sql info tables
Table Description
-------------------------------------------------------------------------------
alarms Alarms
cpuDiags CPU Diagnostics
ethPortCfg Port Parameters
ethPortStats Ethernet Statistics
ethPortStatus Port Status
ipCfg IP Services
...
Retrieving Information
Retrieving A Table
The sql select subcommand is used to retrieve table information. The command
sql select from tablename provides a summary of the parameters within the
table, as well as their values.
>sql select from ipcfg
A particular parameter from a table can be retrieved by selecting it, e.g. sql select
parameter_name from tablename. The parameter name is always the same as
those displayed in the menu system. If the parameter name has spaces in it (e.g.
IP Address) the spaces must be replaced with underscores or the name must be
quoted.
>sql select ip address from ipcfg
IP Address
10.9.0.2
RuggedCom 69
RMC30 User Guide
It is useful to be able to display specific rows of a table predicated upon the row
having parameters of a specific value. The addition of a where clause to the
select will limit the returned results. As an example, suppose that it desirable to
identify all ports on the server operating in Auto Select mode.
> sql select from ethportcfg where Media_Type = Auto_Select
Port Name Status Media Type Flow Control FEFI Link Alarms
1 Port 7 Enabled Auto Select Enabled Disabled Enabled
2 Port 8 Enabled Auto Select Disabled Disabled Enabled
2 records selected
It is also possible to select rows based upon multiple parameters by and-ing or or-
ing comparisons in the where clause. Ensure that parentheses are used to enclose
the full where clause.
> sql select from ethportcfg where Media_Type = Auto_Select and Flow_control =
Disabled
Port Name Status Media Type Flow Control FEFI Link Alarms
2 Port 8 Enabled Auto Select Disabled Disabled Enabled
1 records selected
1 records updated
Defaulting A Table
70 RuggedCom
Chapter 5 Upgrading Firmware And Managing Configurations
The combination of remote shell scripting and sql commands offer a means to
interrogate and maintain large numbers of servers. Consistency of configuration
across sites may be verified by this method. The following presents a simple
example where the servers to interrogate are drawn from the file servers.
C:> type servers
10.0.1.1
10.0.1.2
10.0.1.3
c:\> for /F %i in (servers) do rsh %i -l admin sql select from ethportcfg where
flow_control = disabled
Port Name Status Media Type Flow Control FEFI Link Alarms
4 Port 4 Enabled Auto Select Disabled Disabled Enabled
1 records selected
0 records selected
Port Name Status Media Type Flow Control FEFI Link Alarms
1 Port 1 Enabled Auto Select Disabled Disabled Enabled
2 Port 2 Enabled Auto Select Disabled Disabled Enabled
3 Port 3 Enabled Auto Select Disabled Disabled Enabled
4 Port 4 Enabled Auto Select Disabled Disabled Enabled
4 records selected
C:\
RuggedCom 71
RuggedServer User Guide
The server also generates the proprietary traps summarized in the following table.
These traps are described in the RC-TRAPS-MIB.
72 RuggedCom
UDP-MIB (RFC 2013)
udpInDatagrams The total number of UDP datagrams received and delivered to
UDP users.
udpNoPorts The total number of received UDP datagrams for which there
was no application at the destination port.
udpInErrors The number of received UDP datagrams that could not be
delivered for reasons other than the lack of an application at the
destination port.
udpOutDatagrams The number of sent UDP datagrams.
SNMPv2-MIB
snmpInPkts The number of messages delivered to the SNMP Agent.
snmpInBadVersions The total number of SNMP messages which were delivered to
the SNMP Agent and were for an unsupported SNMP version.
snmpInBadCommunityNames The total number of SNMP messages delivered to the SNMP
Agent which used a unknown SNMP community name.
snmpInBadCommunityUses The total number of SNMP messages delivered to the SNMP
Agent which represented an SNMP operation which was not
allowed by the SNMP community named in the message.
snmpInASNParseErrs The total number of ASN.1 or BER errors encountered by the
SNMP Agent decoding received SNMP messages.
RuggedCom 73
RuggedServer User Guide
INDEX
Alarms Indicator ii
Character Encapsulation 19
Console port 1
Gateway Address, Configuring viii
Password, Default 1, iv
Serial Encapsulation 16
Serial IP Parameter Ranges & Default Settings 29
Serial IP, Configuration 29
Serial Port, Clearing Statistics 42
Serial Port, Resetting 42
TcpModbus 18
Turnaround Delays 25
Alarms, Active 46
Alarms, Clearing 48
Alarms, Critical Failure Relay 48
Alarms, Level 47
Alarms, Passive 47
Alarms, Using 46
Alarms, Viewing 48
Broadcast RTU Polling 20
CLI Shell ii
CLI Shell, CLEARLOGS command 54
CLI Shell, Command Summary 53
CLI Shell, DIR command 54
CLI Shell, Entering And Leaving 52
CLI Shell, PING command 55
CLI Shell, RESET command 59
CLI Shell, TRACE command 56
CLI Shell, TYPE command 54
Configurations, Capturing 63
DHCP, Configuring vii
Firmware, Upgrading 60
Firmware, Versions 50
Inactivity Timeout, Configuring ix
IP Address, Configuring viii
Load Factory Default Configuration 51
Management VLAN, Configuring viii
Menu Tree 68
Menu, Administration vii
Menu, Connection Statistics 39
Menu, CPU Dignostics 49
Menu, IP Services Configuration vii
Menu, Serial IP Configuration 31
Menu, Serial Port Statistics 41
Menu, Serial Protocols 30
Menu, Serial Summary Statistics 40
Menu, SNMP Management Stations xii
Menu, TCP Modbus Client Configuration 36
Menu, TCP Modbus Client Gateway Parameters 36
Menu, TCP Modbus Client Gateway RTU Assignment 37
Menu, TCP Modbus Server Configuration 33
Menu, TCP Modbus Server Gateway Parameters 33
74 RuggedCom
Index
RuggedCom 75