Rugged Operating System
ROS® v3.11User Guide
6
RMC30
6.1. Files Of Interest ................................................................................................. 105
6.2. File Transfer Mechanisms ................................................................................. 105
6.3. Console Sessions .............................................................................................. 105
6.4. Upgrading Firmware .......................................................................................... 105
6.4.1. Applying the Upgrade ............................................................................. 106
6.4.2. Security Considerations .......................................................................... 106
6.4.3. Upgrading Firmware Using XModem ...................................................... 106
6.4.4. Upgrading Firmware Using the ROS® TFTP Server .............................. 107
6.4.5. Upgrading Firmware Using the ROS® TFTP Client ............................... 107
6.4.6. Upgrading Firmware Using SFTP ........................................................... 108
6.5. Updating Configuration ...................................................................................... 108
6.6. Backing Up ROS®System Files ........................................................................ 109
6.6.1. Backing Up Files Using SFTP ................................................................ 110
6.7. Using SQL Commands ..................................................................................... 110
6.7.1. Getting Started ....................................................................................... 110
6.7.2. Finding the Correct Table ....................................................................... 110
6.7.3. Retrieving Information ............................................................................. 111
6.7.4. Changing Values in a Table ................................................................... 112
6.7.5. Setting Default Values in a Table ........................................................... 112
6.7.6. Using RSH and SQL .............................................................................. 112
A. SNMP MIB Support ..................................................................................................... 114
A.1. Standard MIBs .................................................................................................. 114
A.2. RuggedCom proprietary MIBs .......................................................................... 115
A.3. RuggedCom Supported Agent Capabilities MIBs ............................................. 115
B. SNMP Trap Summary ................................................................................................. 119
C. List of Objects Eligible for RMON Alarms ................................................................... 120
D. ModBus Management Support and Memory Map ....................................................... 125
D.1. Modbus Memory Map ....................................................................................... 126
D.1.1. Text ........................................................................................................ 129
D.1.2. Cmd ........................................................................................................ 129
D.1.3. Uint16 ..................................................................................................... 130
D.1.4. Uint32 ..................................................................................................... 130
D.1.5. PortCmd ................................................................................................. 130
D.1.6. Alarm ...................................................................................................... 131
D.1.7. PSStatusCmd ......................................................................................... 131
D.1.8. TruthValue .............................................................................................. 132
E. Command Line Listing ................................................................................................. 133
F. Security Messages for Authentication .......................................................................... 135
F.1. Security Messages for Login Authentication ..................................................... 135
F.2. Security Messages for Port Authentication ....................................................... 137