
Table of Contents
RUGGEDCOM ROS
User Guide
vi
1.8.3.8TruthValues .......................................................................................................... 25
1.9SSH and SSL Keys and Certificates ................................................................................................ 26
1.9.1Certificate and Keys Life Cycle ........................................................................................... 26
1.9.2Certificate and Key Requirements ...................................................................................... 27
Chapter 2
Using ROS ....................................................................................................... 29
2.1Connecting to ROS ...................................................................................................................... 29
2.1.1Connecting Directly .......................................................................................................... 29
2.1.2Connecting via the Network ............................................................................................. 30
2.2Logging In .................................................................................................................................. 31
2.3Logging Out ............................................................................................................................... 32
2.4Using the Web Interface .............................................................................................................. 33
2.5Using the Console Interface ......................................................................................................... 34
2.6Using the Command Line Interface .............................................................................................. 36
2.6.1Available CLI Commands .................................................................................................. 36
2.6.2Tracing Events ................................................................................................................. 39
2.6.3Executing Commands Remotely via RSH ............................................................................ 40
2.6.4Using SQL Commands ...................................................................................................... 40
2.6.4.1Finding the Correct Table ....................................................................................... 41
2.6.4.2Retrieving Information ........................................................................................... 41
2.6.4.3Changing Values in a Table .................................................................................... 43
2.6.4.4Resetting a Table ................................................................................................... 44
2.6.4.5Using RSH and SQL ............................................................................................... 44
2.7Selecting Ports in RUGGEDCOM ROS ............................................................................................. 44
2.8Managing the Flash File System ................................................................................................... 45
2.8.1Viewing a List of Flash Files .............................................................................................. 45
2.8.2Viewing Flash File Details ................................................................................................. 45
2.8.3Defragmenting the Flash File System ................................................................................. 46
2.9Accessing BIST Mode ................................................................................................................... 46
2.10Managing SSH Public Keys ......................................................................................................... 47
2.10.1Adding a Public Key ....................................................................................................... 47
2.10.2Viewing a List of Public Keys ........................................................................................... 49
2.10.3Updating a Public Key .................................................................................................... 49
2.10.4Deleting a Public Key ...................................................................................................... 50
Chapter 3
Device Management ....................................................................................... 51
3.1Viewing Product Information ....................................................................................................... 51
3.2Viewing CPU Diagnostics ............................................................................................................. 53
3.3Restoring Factory Defaults ........................................................................................................... 54