EasyManua.ls Logo

RuggedCom RMC30 - Page 6

Default Icon
138 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Rugged Operating System
ROS® v3.11User Guide 6 RMC30
6.1. Files Of Interest ................................................................................................. 105
6.2. File Transfer Mechanisms ................................................................................. 105
6.3. Console Sessions .............................................................................................. 105
6.4. Upgrading Firmware .......................................................................................... 105
6.4.1. Applying the Upgrade ............................................................................. 106
6.4.2. Security Considerations .......................................................................... 106
6.4.3. Upgrading Firmware Using XModem ...................................................... 106
6.4.4. Upgrading Firmware Using the ROS® TFTP Server .............................. 107
6.4.5. Upgrading Firmware Using the ROS® TFTP Client ............................... 107
6.4.6. Upgrading Firmware Using SFTP ........................................................... 108
6.5. Updating Configuration ...................................................................................... 108
6.6. Backing Up ROS®System Files ........................................................................ 109
6.6.1. Backing Up Files Using SFTP ................................................................ 110
6.7. Using SQL Commands ..................................................................................... 110
6.7.1. Getting Started ....................................................................................... 110
6.7.2. Finding the Correct Table ....................................................................... 110
6.7.3. Retrieving Information ............................................................................. 111
6.7.4. Changing Values in a Table ................................................................... 112
6.7.5. Setting Default Values in a Table ........................................................... 112
6.7.6. Using RSH and SQL .............................................................................. 112
A. SNMP MIB Support ..................................................................................................... 114
A.1. Standard MIBs .................................................................................................. 114
A.2. RuggedCom proprietary MIBs .......................................................................... 115
A.3. RuggedCom Supported Agent Capabilities MIBs ............................................. 115
B. SNMP Trap Summary ................................................................................................. 119
C. List of Objects Eligible for RMON Alarms ................................................................... 120
D. ModBus Management Support and Memory Map ....................................................... 125
D.1. Modbus Memory Map ....................................................................................... 126
D.1.1. Text ........................................................................................................ 129
D.1.2. Cmd ........................................................................................................ 129
D.1.3. Uint16 ..................................................................................................... 130
D.1.4. Uint32 ..................................................................................................... 130
D.1.5. PortCmd ................................................................................................. 130
D.1.6. Alarm ...................................................................................................... 131
D.1.7. PSStatusCmd ......................................................................................... 131
D.1.8. TruthValue .............................................................................................. 132
E. Command Line Listing ................................................................................................. 133
F. Security Messages for Authentication .......................................................................... 135
F.1. Security Messages for Login Authentication ..................................................... 135
F.2. Security Messages for Port Authentication ....................................................... 137

Table of Contents