Rugged Operating System (ROS)®
RUGGEDCOM RSG2488
User Guide
vi
3.11.3 Managing RMON Events ................................................................................................ 87
3.11.3.1 Viewing a List of RMON Events ........................................................................... 87
3.11.3.2 Adding an RMON Event ...................................................................................... 87
3.11.3.3 Deleting an RMON Event .................................................................................... 89
3.12 Upgrading/Downgrading Firmware ............................................................................................. 90
3.12.1 Upgrading Firmware ...................................................................................................... 90
3.12.2 Downgrading Firmware .................................................................................................. 90
3.13 Resetting the Device ................................................................................................................ 91
Chapter 4
System Administration ....................................................................................... 93
4.1 Configuring the System Information ............................................................................................. 93
4.2 Customizing the Login Screen (Web Interface Only) ..................................................................... 94
4.3 Configuring Passwords ............................................................................................................... 94
4.4 Managing Alarms ....................................................................................................................... 97
4.4.1 Viewing a List of Pre-Configured Alarms ........................................................................... 97
4.4.2 Viewing and Clearing Latched Alarms ............................................................................... 98
4.4.3 Configuring an Alarm ....................................................................................................... 99
4.4.4 Authentication Related Security Alarms ........................................................................... 101
4.4.4.1 Security Alarms for Login Authentication ............................................................... 102
4.5 Managing the Configuration File ................................................................................................ 104
4.5.1 Configuring Data Encryption ........................................................................................... 104
4.5.2 Updating the Configuration File ...................................................................................... 105
4.6 Managing an Authentication Server ........................................................................................... 106
4.6.1 Managing RADIUS Authentication ................................................................................... 106
4.6.1.1 Configuring the RADIUS Server ........................................................................... 107
4.6.1.2 Configuring the RADIUS Client ............................................................................ 107
4.6.2 Managing TACACS+ Authentication ................................................................................ 108
4.6.2.1 Configuring TACACS+ ......................................................................................... 108
4.6.2.2 Configuring User Priviliges ................................................................................... 110
Chapter 5
Setup and Configuration .................................................................................. 111
5.1 Managing Virtual LANs ............................................................................................................. 111
5.1.1 VLAN Concepts ............................................................................................................. 112
5.1.1.1 Tagged vs. Untagged Frames .............................................................................. 112
5.1.1.2 Native VLAN ....................................................................................................... 112
5.1.1.3 The Management VLAN ...................................................................................... 112
5.1.1.4 Edge and Trunk Port Types ................................................................................. 112
5.1.1.5 Ingress and Egress Rules ................................................................................... 113
5.1.1.6 Forbidden Ports List ............................................................................................ 114