User guide

Table of Contents
RUGGEDCOM ROS
User Guide
vi
4.4.4 Authentication Related Security Alarms ............................................................................. 86
4.4.4.1 Security Alarms for Login Authentication ................................................................ 86
4.4.4.2 Security Messages for Port Authentication .............................................................. 88
4.5 Managing the Configuration File .................................................................................................. 89
4.5.1 Configuring Data Encryption ............................................................................................. 89
4.5.2 Updating the Configuration File ........................................................................................ 90
4.6 Managing an Authentication Server ............................................................................................. 91
4.6.1 Managing RADIUS Authentication .................................................................................... 91
4.6.1.1 Configuring the RADIUS Server ............................................................................. 92
4.6.1.2 Configuring the RADIUS Client .............................................................................. 92
4.6.2 Managing TACACS+ Authentication .................................................................................. 94
4.6.2.1 Configuring TACACS+ ........................................................................................... 94
4.6.2.2 Configuring User Priviliges .................................................................................... 95
Chapter 5
Setup and Configuration .................................................................................... 97
5.1 Managing Time Services ............................................................................................................ 97
5.1.1 Configuring the Time and Date ......................................................................................... 97
5.1.2 Configuring NTP .............................................................................................................. 98
5.2 Managing SNMP ...................................................................................................................... 100
5.2.1 Managing SNMP Users .................................................................................................. 100
5.2.1.1 Viewing a List of SNMP Users ............................................................................. 101
5.2.1.2 Adding an SNMP User ........................................................................................ 101
5.2.1.3 Deleting an SNMP User ...................................................................................... 104
5.2.2 Managing Security-to-Group Mapping ............................................................................. 105
5.2.2.1 Viewing a List of Security-to-Group Maps ............................................................. 105
5.2.2.2 Adding a Security-to-Group Map .......................................................................... 105
5.2.2.3 Deleting a Security-to-Group Map ........................................................................ 107
5.2.3 Managing SNMP Groups ............................................................................................... 107
5.2.3.1 Viewing a List of SNMP Groups ........................................................................... 108
5.2.3.2 Adding an SNMP Group ...................................................................................... 108
5.2.3.3 Deleting an SNMP Group .................................................................................... 110
5.3 Managing Network Discovery .................................................................................................... 110
5.4 Managing Serial Protocols ........................................................................................................ 111
5.4.1 Encapsulation Concepts ................................................................................................. 113
5.4.1.1 Raw Socket Character Encapsulation ................................................................... 114
5.4.1.2 RTU Polling ........................................................................................................ 114
5.4.1.3 Broadcast RTU Polling ........................................................................................ 115
5.4.1.4 Preemptive Raw Socket ...................................................................................... 116
5.4.1.5 Port Redirectors .................................................................................................. 117
5.4.1.6 Message Packetization ........................................................................................ 118