Mds Orbit MCR
Mds Orbit MCR
Mds Orbit MCR
Technical Manual
Technical Manual
MDS™ ORBIT ECR
Edge Connect Router
RF Regulatory Information
RF Safety Notice (English and French)
RF Exposure
Concentrated energy from a directional antenna may pose a health hazard to humans.
Do not allow people to come closer to the antenna than the distances listed in the
table below when the transmitter is operating. More information on RF exposure can
be found online at the following website:
www.fcc.gov/oet/info/documents/bulletins
Concentré d'énergie à partir d'une antenne directionnelle peut poser un risque pour
l’exposition aux RF
la santé humaine. Ne pas permettre aux gens de se rapprocher de l'antenne que les
distances indiquées dans le tableau ci-dessous lorsque l'émetteur est en marche. Plus
d'informations sur l'exposition aux RF peut être trouvé en ligne à l'adresse suivante:
www.fcc.gov/oet/info/documents/bulletins
Antennas must not be co-located. All transmission antennas must be at least 20 cm apart to comply with
FCC co-location rules.
Cell 33 cm
NX915 23 cm
When servicing energized equipment, be sure to wear appropriate Personal Protective Equipment (PPE).
During internal service, situations could arise where objects accidentally contact or short circuit
components and the appropriate PPE would alleviate or decrease the severity of potential injury. When
servicing equipment, all workplace regulations and other applicable standards for live electrical work
should be followed to ensure personal safety.
Manual Revision and Accuracy
This manual was updated to cover a specific version of firmware code. Accordingly, some screens and
features may differ from the actual unit you are working with. While every reasonable effort has been
made to ensure the accuracy of this publication, product improvements may also result in minor
differences between the manual and the product shipped to you. If you have additional questions or need
an exact specification for a product, please contact GE MDS using the information at the back of this
guide. In addition, manual updates can be found on our web site at www.gemds.com .
Environmental Information
The manufacture of this equipment has required the extraction and use of natural resources. Improper
disposal may contaminate the environment and present a health risk due to hazardous substances
contained within. To avoid dissemination of these substances into our environment, and to limit the
demand on natural resources, we encourage you to use the appropriate recycling systems for disposal.
These systems will reuse or recycle most of the materials found in this equipment in a sound way. Please
contact GE MDS or your supplier for more information on the proper disposal of this equipment.
Battery Disposal—This product may contain a battery. Batteries must be disposed of properly, and may
not be disposed of as unsorted municipal waste in the European Union. See the product documentation for
specific battery information. Batteries are marked with a symbol, which may include lettering to indicate
cadmium (Cd), lead (Pb), or mercury (Hg). For proper recycling return the battery to your supplier or to a
designated collection point. For more information see:
www.weeerohsinfo.com.
Product Test Data Sheets
Test Data Sheets showing the original factory test results for this unit are available upon request from the
GE MDS Quality Leader. Contact the factory using the information at the back of this manual. Serial
numbers must be provided for each product where a Test Data Sheet is required.
When the ATEX mark is present on the label, the Orbit MCR is ATEX Compliant with the “Zone 2, Cat
3" requirements pending the proper installation requirements listed below.
All RF modules contained within an ATEX compliant Orbit MCR have a conducted RF power maximum
limit of 2W.
The MCR products were evaluated based on the following ratings as per SIRA 14ATEX4119X:
II 3 G
Ex nA IIC T4 Gc
Amb -30°C to +70°C
T4 (max surface temp 70°C)
Decoded:
II - Equipment Group - Electrical equipment intended for use in places with an explosive gas
atmosphere other than mines susceptible to firedamp
3 G - Zone 2 - Normal Protection level Gas - Provides a low level of protection and is intended for
use in a Zone 2 hazardous area
Ex nA - Gas & Air Mixture Zone 2 protection - Non-Sparking
IIC - Gas Group IIC - Hydrogen/Acetylene
T4 - temperature classification (max surface temp 70°C)
Gc - Gas atmospheres - assured level of protection against becoming an ignition source in normal
operation
ETSI/CE Standards: (subject to revision)
- EN 55022: 2010
- EN 55024: 2010
- EN 60950-1 2006 +A1:2010; +A11:2009; +A12:2011
- EN 62311: 2008
- EN 300 328: V1.7.1
- EN 300 440-2: V1.4.1
- EN 301 489-1: V1.9.2
- EN 301 489-3: V1.4.1
- EN 301 489-7: V1.3.1
- EN 301 489-17: V2.2.1
- EN 301 489-24: V1.5.1
- EN 301 511: V9.0.2
- EN 301 908-1: V5.2.1
- EN 301 908-2: V5.2.1
ATEX Special Conditions for Safe Use as per SIRA 14ATEX4119X:
MDS 05-6632A01, Rev. F MDS Orbit MCR/ECR Technical Manual 11
Tighten wire clamps to 5 in-lb (0.6 Nm)
The 60Vdc rated supply shall be protected such that transients are limited to a maximum of 84Vdc;
no such protection is required for the signal lines.
The device shall be installed in an enclosure that maintains an ingress protection rating of at least
IP54 and meets the enclosure requirements of EN 60079-0 and EN 60079-15. The installer shall
ensure that the maximum ambient temperature of the module when installed is not exceeded.
The USB connection shall only be used in an unclassified (non-hazardous) area.
The SIM card shall be connected / disconnected only in a non-hazardous area or when the device is
not energized.
Brazil
Homologation Number and UCC/EAN-128 Code = (01) 0789 8934163051 vary based on the model and
model options chosen.
Este equipamento opera em caráter secundário, isto é, não tem direito a proteção contra interferência
prejudicial, mesmo de estações do mesmo tipo, e não pode causar interferência a sistemas operando em
caráter primário.
Este produto está homologado pela Anatel, de acordo com os procedimentos regulamentados pela
Resolução nº 242/2000 e atende aos requisitos técnicos aplicados, incluindo os limites de exposição da
Taxa de Absorção Específica referente a campos elétricos, magnéticos e eletromagnéticos de
radiofreqüência, de acordo com as Resoluçãos nº 303/2002 e 533/2009.
Este dispositivo está em conformidade com as diretrizes de exposição à radiofreqüência quando
posicionado a pelo menos 20 centímetro de distância do corpo. Para maiores informações, consulte o site
da ANATEL – www.anatel.gov.br
Japan
Mexico
Philippines
Conformity Number: ESD-GEC-1402584
South Africa
UAE
Registered number = ER0133084/14
Dealer number = DA0132013/14
In the Device Management section of this manual (Page 36), there are a number of command strings
where information is presented by the unit and a reply is required from the user. In such cases,
information from the unit is shown in a non-bolded font and the user response is shown in bold. For
example:
(none) login: admin
Further, in some cases, command lines will be shown with non-bolded, italicized text contained within
the string. Such text indicates the need for user-supplied variable parameters, such as the name of an item.
For example:
% set interfaces interface myBridge type bridge
In the above example, you would enter the specific name of your bridge to complete the entry.
NOTE The LAN port should be assigned IP addresses only if it is a routed interface (that is, not in a
bridge).
NOTE The software commands and responses shown in this manual were obtained from a unit
operating in a lab environment. The information displayed may differ from field service
conditions.
Ret aining
Sc rew s (2 )
W ire Port s (2 )
(Polarity: Left +, Right –)
Figure 2-4. DC Power Connector (P/N 73-1194A39)
4 Unused 8 Unused
USB Port—This port allows for connection of a laptop or PC. The port provides a local console for
management of the device. A standard host-to-mini device USB 2.0 cable may be used.
COM1/COM2 Port—This connector serves as the serial interface port for both console management and
payload data. Depending on ordered options, the unit may have one or two COM ports. By default, the
port is enabled for local console control. The COM port serves as the primary interface for connecting the
unit to an external DTE serial device supporting RS-232 or RS-485. If necessary, an adapter may be used
to convert the unit’s RJ-45 serial jack to a DB-9F type (GE MDS 73-2434A12).
NOTE Not all PCs include a serial port. If one is not available, the unit’s USB port may be used to
access the device management interface. Alternatively, a PC’s USB port may be used with a
USB-to-Serial adapter and appropriate driver software. These devices are available from several
manufacturers. A video covering USB driver installation may be accessed from the following
link: http://tinyurl.com/pey2ull
The COM port supports a serial data rate of 1200-230400 bps (115200 default, asynchronous only). The
unit is hardwired as a DCE device. Supported data formats for the COM port are:
8N1 - 8 char bits, no parity, 1 stop bit (Default setting)
8N2 - 8 char bits, no parity, 2 stop bits
24 MDS Orbit MCR/ECR Technical Manual MDS 05-6632A01, Rev. F
8O1 - 8 char bits, odd parity, 1 stop bit
8O2 - 8 char bits, odd parity, 2 stop bits
8E1 - 8 char bits, even parity, 1 stop bit
8E2 - 8 char bits, even parity, 2 stop bits
7N1 - 7 char bits, no parity, 1 stop bit
7N2 - 7 char bits, no parity, 2 stop bits
7O1 - 7 char bits, odd parity, 1 stop bit
7O2 - 7 char bits, odd parity, 2 stop bits
7E1 - 7 char bits, even parity, 1 stop bit
7E2 - 7 char bits, even parity, 2 stop bits.
The tables on the following page provide pin descriptions for the COM1 data port in RS-232 mode and
RS-485 modes, respectively.
NOTE The COM2 port, if present, is restricted to RS-232 mode; it cannot be used for RS-485.
WIRING CHART
RJ-45 PIN FUNCTION DB9 PIN
1 DSR 6
2 DCD 1
3 DTR 4
4 GND 5
5 RXD 2
6 TXD 3
7 CTS 8
8 RTS 7
LED Status Indicators—The LEDs on the unit provide visual indications of the status of the device as
shown in the following chart:
NOTE In addition to the LEDs above, the Ethernet connector has two embedded LEDs. A yellow
indicates a link at 100 Mbps operation. A flashing green indicates Ethernet data traffic.
4.81"
2.75" (2X) 1.5" (2X)
.75" (2X)
8.0"
8.5"
9.25"
Figure 7 . Flat
Figure Mounting
2-7. MCR Bracket
Flat Mounting Dimensions
Bracket Dimensions
NOTE To prevent moisture from entering the unit, do not mount the case with the cable connectors
pointing up. Also, dress all cables to prevent moisture from running along the cables and into
the unit.
2.7.1 Optional DIN Rail Mounting
If ordered with the DIN rail mounting option, the unit is supplied with a DIN rail clip attached to the case.
The integrated bracket on the unit’s case allows for quick installation and removal from a DIN mounting
rail as shown in Figure 2-9.
NOTE For Australia and New Zealand the maximum EIRP must be limited to 30 dBm. If ((antenna
gain - feed line loss) + power output setting) > 30), then the power output of the
NX915 must be reduced.
NOTE For regions governed by FCC/IC compliance the maximum EIRP must be limited to 36 dBm. If
((antenna gain - feed line loss) + power output setting) >36), then the power
output of the NX915 must be reduced.
Licensed Narrowband Antennas —Antenna connection is a TNC connector. Multiple options are
available based on radio type and site-specific licensing rules.
To connect to the unit and manage it via the Device Manager, you will need the following:
A PC with a web browser program installed.
An Ethernet cable connected between the PC and the MCR as shown in PC Connection for
Web Management.
The unit’s IP address. Check with your Network Administrator, or determine the address via a
command line interface connection. The default address for a factory supplied unit is
192.168.1.1.
The user name and password for the unit. Check with your Network Administrator, or, if a
username and password have not been set, use the factory defaults of admin for both entries.
(For security, a new password should be established as soon as possible after login.)
Logging On
1. Connect the unit to a PC via an Ethernet connection.
2. Configure your PC network settings to an IP address on the same subnet as the unit. The default
subnet mask is 255.255.255.0.
NOTE For IP addressing the Orbit MCR uses a routing prefix expressed in CIDR notation instead of
the specifying a subnet mask. The CIDR notation is the first address of a network, followed by
a slash character (/), and ending with the bit-length (max 32) of the prefix. A subnet mask is
expressed in dot-decimal notation. For example, 192.168.1.0/24 is equivalent to specifying
192.168.1.0 with a subnet mask of 255.255.255.0.
3. Enter the unit’s IP address in a web browser window, just as you would enter a website address.
When the login screen appears (Figure 3-2. Login Screen), enter the User Name and Password for
the unit. The default entries for a new unit are both admin. Click OK.
From the Web UI changes made on the screens are not saved or implemented until via the save button or
commit command. The Save button in the banner on the top left of every page. Normally this is not
highlighted and blue in color as shown below:
Other defaults
WiFi (hotspot):
- Set as Access Point (AP)
- SSID = GEMDS_<SERNUM> SERNUM refers to the unit’s serial number, printed on a
chassis sticker.
- The Ethernet ports are bridged with the WiFi AP.
- SSID broadcast enabled
- Security = WPA2-PSK, CCMP with passphrase: GEMDS_ORBIT
Cellular modem:
- 4G Cellular interface is enabled by default since network can enable connectivity on default
APN.
- 3G Cellular interface is disabled by default since it requires carrier specific APN to be
configured.
ISM Unlicensed 900 MHz radio (NX915):
- Radio Mode set to Remote
- Modem Mode 500kbps
- Power at 30 dBm
Licensed Narrowband radio (LN400/LN900):
Set Date /Time or NTP 3.7.1 - Date, Time and NTP Note - this is part of the
Server Initial Setup Wizard
Configuring for 900MHz 3.5.4 - Unlicensed 900 MHz ISM (NX915) NX915 is the hardware
operation (if present) module that provides the
900 MHz operations. It is
factory configured based
on country codes for legal
operations.
Figure 3-12. Example 1: Unit Providing Laptop and Handheld Device Connectivity
By default the unit is configured in this basic configuration. Refer to Preconfigured Settings for accessing
the unit using the default setting for the Ethernet ports, WiFi and the bridge.
The following chart lists the required steps to configure the MCR for this specific scenario. Note that for
each step the linked manual section is provided as well as detailed information for use in recreating the
example.
Configure network 3.8.5 - Bridging Add ETH1 and WiFi to the bridge
Figure 3-13. Example 2: Units Providing Wireless Bridge Between Laptop & SCADA Device
Step Comment / Additional
Applicable Manual Section
Information
Orbit MCR #1: Configure 3.5.3 - WiFi Enable Access Point mode
WiFi as an Access Point Create SSID of myssid
Orbit MCR #1: Configure to 3.8.5 - Bridging Add ETH1 and WiFi to the bridge
bridge traffic from ETH1 and
WiFi
Orbit MCR #1: Set bridge IP 3.8.5 - Bridging Set to 192.168.1.21
address prefix-length 24
Orbit MCR #1: Enable 3.8.13 - DHCP Service Set v4subnet 192.168.1.0/24
DHCP Server on bridge Set domain-name: gemds
Set range-start: 192.168.1.10
Set range-end:192.168.1.19
Set router: 192.168.1.1
Set broadcast-address:
192.168.1.255
Orbit MCR #2: Configure 3.5.3 - WiFi Enable Station mode
WiFi as an Station Connect to AP SSID of myssid
connecting to Orbit MCR #1
Orbit MCR #2: Configure to 3.8.5 - Bridging Add ETH1 and WiFi to the bridge
bridge traffic from ETH1 and
WiFi
Orbit MCR #2: Set bridge IP 3.8.5 - Bridging Set to 192.168.1.22
address prefix-length 24
Figure 3-14. Example 3: Unit Providing Connectivity to Serial-Based SCADA Device via UDP
NOTE The configuration for Orbit MCR #1 in Example 3: Unit Providing Connectivity to Serial-
Based SCADA Device via UDP is identical to the configuration shown in the previous example
(Example #2).
Orbit MCR #1: Configure 3.5.3 - WiFi Enable Access Point mode
WiFi as an Access Point Create SSID of myssid
Orbit MCR #1: Configure to Add ETH1 and WiFi to the bridge
bridge traffic from ETH1 and 3.8.5 - Bridging
WiFi
Orbit MCR #1: Set bridge IP Set to 192.168.1.21
3.8.5 - Bridging
address prefix-length 24
Set v4subnet 192.168.1.0/24
Set domain-name gemds
Set range-start 192.168.1.10
Orbit MCR #1: Enable
3.8.13 - DHCP Service Set range-end 192.168.1.19
DHCP Server on bridge
Set router 192.168.1.1
Set broadcast-address
192.168.1.255
Orbit MCR #2: Configure 3.5.3 - WiFi Enable Station mode
WiFi as an Station
connecting to Orbit MCR #1 connect to AP SSID of myssid
Orbit MCR #2: Configure to Add ETH1 and WiFi to the bridge
bridge traffic from ETH1 and 3.8.5 - Bridging
WiFi
Orbit MCR #2: Set bridge IP
3.8.5 - Bridging Set to 192.168.1.22 prefix-length 24
address
Set mode udp
Set up Terminal Server port 30000
3.8.14 - Terminal Service
COM1 remote addr: 192.168.1.11
port 30001
Apply Firewall 3.8.8 - Access Control List (Packet Set Cell input filter to
IN_UNTRUSTED and Filtering / Firewall) IN_UNTRUSTED
OUT_UNTRUSTED Set Cell output filer to
filters to Cell interface OUT_UNTRUSTED
Set NAT on Cell 3.8.9 - Source NAT (Masquerading) Set cell NAT source to MASQ
interface to
masquerade
NOTE If the COM port has been configured for terminal server operation, pressing +++ switches it to
console (management) mode. Serial console mode is required for the following steps.
Launch a terminal communications program, such as HyperTerminal, with the following
communication parameters: 115200 bps (default speed), 8 bits, no parity, one stop bit (8N1) and
flow control disabled. Incorrect parameter settings are a frequent cause of connection difficulties.
Double check to be sure they are correct.
An adapter may be used to convert the unit’s RJ-45 serial jack to a DB-9F type (GE MDS part no.
73-2434A12). If no serial port exist on the PC, a Mini-USB cable may be connected between the
MCR’s USB device port and the PC.
Step 2: Instruct the device to enter configuration mode by typing configure and pressing the enter key:
> configure
Entering configuration mode private
Step 3: Change the device name by typing in the following, followed by enter: set system name
Device539
% set system name Device539
Step 4: Verify the change looks correct by reading the data back, using the following, followed by the
enter key: show system name
% show system name
name Device539;
Step 5: Commit the change by typing in the following, followed by the enter key: commit
% commit
Commit complete.
Step 6: Exit the configuration mode by typing the following, followed by the enter key: exit
% exit
Step 7: Exit the login session by typing the following, followed by the enter key: exit
> exit
Device539 login:
Figure 3-17. Example 1: Unit Providing Laptop and Handheld Device Connectivity
The following commands will configure the MCR for this scenario.
% set interfaces interface Wi-Fi type wifi
% set interfaces interface Wi-Fi wifi-config mode access-point ap-config ap myssid enabled
true
% set interfaces interface Bridge type bridge
% set interfaces interface Bridge bridge-settings members port ETH1
% set interfaces interface Bridge bridge-settings members wifi-ap myssid
% set interfaces interface Bridge ipv4 address 192.168.1.21 prefix-length 24
% set services dhcp enabled true v4subnet 192.168.1.0/24 domain-name gemds range-start
192.168.1.10 range-end 192.168.1.19 router 192.168.1.1 broadcast-address 192.168.1.255
Figure 3-18. Example 2: Units Providing Wireless Bridge Between Laptop & SCADA Device
The following commands will configure the Orbit MCR #1 for this scenario.
% set interfaces interface Wi-Fi type wifi
% set interfaces interface Wi-Fi wifi-config mode access-point ap-config ap myssid enabled
true
% set interfaces interface Bridge bridge-settings members wifi-ap myssid
% set interfaces interface Bridge ipv4 address 192.168.1.21 prefix-length 24
% set services dhcp enabled true v4subnet 192.168.1.0/24 domain-name gemds range-start
192.168.1.10 range-end 192.168.1.19 router 192.168.1.1 broadcast-address 192.168.1.255
The following commands will configure the Orbit MCR #2 for this scenario.
% set interfaces interface Wi-Fi type wifi
% set interfaces interface Wi-Fi wifi-config mode access-point ap-config ap myssid enabled
true
% set interfaces interface Bridge type bridge
% set interfaces interface Bridge bridge-settings members port ETH1
% set interfaces interface Bridge bridge-settings members wifi-station interface Wi-Fi
% set interfaces interface Bridge ipv4 address 192.168.1.22 prefix-length 24
Figure 3-19. Example 3: Unit Providing Connectivity to Serial-Based SCADA Device via UDP
The following commands will configure the Orbit MCR #2 for this scenario.
% set interfaces interface Wi-Fi type wifi
% set interfaces interface Wi-Fi wifi-config mode access-point ap-config ap myssid enabled
true
% set interfaces interface Bridge type bridge
% set interfaces interface Bridge bridge-settings members port ETH1
% set interfaces interface Bridge bridge-settings members wifi-station interface Wi-Fi
% set interfaces interface Bridge ipv4 address 192.168.1.22 prefix-length 24
% set services serial terminal-server server COM1 mode udp port 30000 remote address
192.168.1.11 port 30001
NOTE The commands that follow in this section vary depending on the Orbit MCR options ordered.
Monitoring
From the Web UI, the Serial Ports screen shows the settings:
Navigate to: Serial ---> Basic Config / Ports
ports COM2 {
line-mode rs232;
baud-rate b19200;
byte-format bf8n1;
hw-flow-control false;
vmin 255;
vtime 1;
capability "";
}
console {
serial-ports [ COM1 COM2 ];
}
3.5.2 Cell
Understanding
Orbit MCR product family is available with following cellular modem options:
Verizon Wireless 4G LTE modem
3G GSM/UMTS/HSPA+ modem
4G LTE GSM (EMEA/APAC)
4G LTE GSM (North America)
Table 3-5 describes the Orbit MCR’s LED behavior when using the cellular interface.
Table 3-5. Cell Interface LED Descriptions
SIM Port(s) - These ports accept a mini SIM card (2FF type) for cell operation. The unit’s cellular
interface will not function without a valid SIM card installed. Users are responsible for obtaining a
provisioned SIM card for the appropriate service plan from their cellular provider. Information on
determining the cell module’s IMSI/IMEI (typically required for provisioning) is provided on Page 75 of
this manual.
CAUTION: Do not insert the SIM card when the unit is powered on.
Card Insertion: The SIM card only inserts one way; do not force it. It should be inserted with the printed
label facing up and the cut-off corner on the left side (see figure below). A small instrument, such as a
flathead screwdriver, may be helpful to gently push the SIM all the way in until it locks.
NOTE Dual SIM functionality is a selective order-entry feature. Default units are shipped with only
SIM-A enabled; SIM-B is not supported.
Configuring
A Connection Profile must be configured for the unit to establish a data connection with the cellular
network. A connection profile allows the user to configure various parameters related to the cellular
connection. One or more connection profiles can be configured on the unit. The order of the connection
profiles can be chosen by the user. The unit will use the first connection profile to establish connection
with the cellular network. If connection profile switching (described later) is enabled, then the unit will
switch to second profile in the list if it is unable to establish a connection using the first profile after a
configurable, specified timeout.
An Orbit MCR equipped with a Verizon 4G LTE modem is shipped out of the factory with the cellular
interface enabled and a connection profile (named PROFILE-1) configured to connect with Verizon's
Internet Packet Data Network (PDN).
An Orbit MCR equipped with a 3G GSM modem is shipped out of the factory with the cellular interface
disabled. The user will need to create a connection profile with the cellular network specific parameters
prior to enabling the interface to allow unit to connect to the network.
In the UI, start on the following page: Interfaces / Cell ---> Basic Config / Cellular
LINK LAYER
IP ADDRESS ORIGIN STATE
---------------------------------------------------------------------------------------------------------------
0.0.0.0 19:00:00:00:d0:60 dynamic reachable
Firmware compatible with Europe, Middle East and APAC MCR/ECR 4G LTE modules:
cell-e4s-x.x.x.mpk = Orbit cell firmware image (E4S*), international - not carrier specific
cell-e42-x.x.x.mpk = Orbit cell firmware image (E42*), international - Telstra Specific
*Online store configuration string code corresponding to a 4G LTE carrier specific configuration
Configuring
To start reprogramming the cell modem firmware, navigate to the Reprogram Cellular Modem section.
The following example shows how to upload a cell modem firmware image file through the web browser
and reprogram the cel modem with that image file.
Navigate to Interfaces / Cell ---> Actions / Reprogram
Click on the Begin Reprogramming button once the file source is configured.
Monitoring - Reprogram
Once the reprogramming is begun, the process may be cancelled by clicking the Cancel
Reprogramming button. The current status of the reprogramming process is displayed on the web page.
Note that the web page does not display the current status if the device has not been instructed to
reprogram (in other words, if the state is “inactive”).
3.5.3 WiFi
Understanding
The Orbit MCR device may be configured to have an internal WiFi module that has FCC/CE modular
approval. The WiFi module can be configured to operate as an 802.11b/g/n Access Point or Station. The
specifications for the WiFi module are covered in “LN400 – 101D-LN400
LN900 – 101D-LN900
2.4 GHz WiFi Specifications” on Page 385. The table below contains the list of GE MDS approved
antennas.
Table 3-6. Approved Cell Antenna Types
Frequency GE MDS Part
Application Location Gain Antenna Description
Range Number
Direct Connect, RP SMA, Dipole
WiFi Indoor 2.4-2.5 GHz 3.2 dBi 97-4278A34
Whip
AES/CCMP
AES/CCMP
AES/CCMP + TKIP
TKIP
TKIP
AES/CCMP + TKIP
TKIP
AES/CCMP + TKIP
AES/CCMP + TKIP
Access Point Mode Solid Green Operating as AP and at least one client connection
Solid Red Operating as an AP and no client connection
Configuring
Configuring the WiFi begins with the following UI:
Navigate to: Interfaces / Wi-Fi ---> Basic Config / Wi-Fi / Wifi Config
Other configurations
The following configures the device to broadcast its SSID, support 802.11b/g/n modes and operate on
channel 3.
% set interfaces interface Wi-Fi wifi-config ap-config operation-mode 80211n channel 3 ap
somessid broadcast-ssid true privacy-mode wpa2-personal psk-config psk somepassphrase
encryption ccmp-tkip
Station Mode
The following shows status when connected to a configured Wi-Fi AP.
> show interfaces-state interface Wi-Fi wifi-status
wifi-status serial-number N722M33NU000628
wifi-status mode Station
wifi-status tx-power 15
wifi-status channel 4
wifi-status station-status ssid somessid
wifi-status station-status bssid 00:19:70:2c:40:3f
wifi-status station-status rssi -58
wifi-status station-status authenticated true
wifi-status station-status authorized true
wifi-status station-status inactive 29270
wifi-status station-status rxbytes 27119
Channels 80 80 80 80 80 80
Modulation 2-GFSK 2-GFSK 2-GFSK 4-GFSK 4-GFSK 4-GFSK
RF Bandwidth 152 kHz 300 kHz 505 kHz 680 kHz 933 kHz 1320 kHz
(20dB) (20dB) (6 dB) (6 dB) (6 dB) (6 dB)
Sensitivity 1x10- -105 dBm -103 dBm -99 dBm -92 dBm -95 dBm -95 dBm
6
*1000N occupies 250 kHz less spectrum bandwidth than 1000W which is why it has a "narrower bandwidth", this
comes with a ~2-3 dBm reduction in sensitivity when compared to 1000W kbps. For clear spectrum, use 1000W, for
unknown or busy spectrum it's safer to use the narrow 1000N modem.
Table 3-10. Approved NxRadio Antenna Types
Frequency GE MDS Part
Application Location Gain Antenna Description
Range Number
900 MHz
Indoor 902-928MHz 2 dBi Omni Indoor Flex 97-2952A01
(NX915)
900 MHz Omni with 16” N-F Connect and
Indoor 902-928MHz 5 dBi 97-3194A16
(NX915) Mount
10 dBd
900 MHz
Outdoor 902-960MHz (12.15 Yagi 6 Element, N-Female - no cable 97-3194A14
(NX915)
dBi)
10 dBd
900 MHz Yagi 6 Element, N-Female - with 10’
Outdoor 902-960MHz (12.15 97-3194A14A
(NX915) Jumper N-M and Mount
dBi)
10 dBd
900 MHz Yagi 6 Element, N-Female - with 15’
Outdoor 902-960MHz (12.15 97-3194A14B
(NX915) Jumper N-M and Mount
dBi)
900 MHz 6.4 dBd
Outdoor 902-960MHz Yagi 3 Element N-Female - no cable 97-3194A13
(NX915) (8.55 dBi)
900 MHz 6.4 dBd Yagi 3 Element N-Female – with 10’
Outdoor 902-960MHz 97-3194A13A
(NX915) (8.55 dBi) Jumper N-M and Mount
For the 900MHz radio (NX915) – If the installed antenna network does not provide the proper load matching, an
alarm is generated by the unit to indicate a VSWR Error condition. This must be corrected in order for the radio to
operate properly and to ensure optimal operation.
NOTE The only required steps for basic configuration are programing a network name in all units and
establishing one unit as the AP.
Minimal configuration is necessary but several advanced tuning facilities are provided.
Frequency operating range is restricted by pre-set factory calibration to ensure compliance with
applicable country-specific regulatory requirements. Frequency operating range can be further restricted
by user input to avoid select portions of the operating band. This is sometimes helpful when attempting to
collocate a network with another 900MHz network, such as the MDS iNET or TransNET. For example
the iNET network can be configured to operate in the top half of the band while the Orbit can have its
NX915 module configured for the lower half.
By default the radio ships from the factory with the 500kbps modem selected. Dwell time is set to 50ms
and Hop Set A is enabled. For typical configuration (e.g., North America) this provides 27 discrete
channels over which to hop.
Hop Sets provide a way of specifying the minimum channel spacing within the band and implicitly define
the maximum number of hops. Hop Set A uses 307.5 kHz spacing and provides 80 channels. (Required
for Modem selections 125kbps and 250kbps).
Table 3-11. Selected Modem Modes
Selected Modem Modes
A 80 80 27 20 17 14
B 0 0 27 20 15 14
C 0 0 26 20 16 13
D 0 0 0 20 16 13
E 0 0 0 0 16 13
F 0 0 0 0 0 13
See “APPENDIX F – NX915 Module Frequencies” on Page 418 for a chart listing RF
channels/frequencies in each hop set, as they apply to each modem selection.
Other items of interest for tuning configuration include Modem Mode (125kbps, 250kbps, 500kbps, etc.)
and dwell time. For remotes, setting modem mode to “auto” allows remotes to automatically follow the
configuration of the AP. Setting the remote to use a specific modem trades faster sync times for system
flexibility. Dwell time determines how frequently the radio switches channels. Longer dwell times are
more efficient for data transport and provide higher throughput; but smaller dwell times provide faster
synchronization and are more robust in weak signal environments or in the presence of interferers.
Remote Mode Blink Red NIC Initialization / Not linked to an Access Point
Solid Green Linked with Access Point
Again, the LQI on modem's 1000W and 1250 are usually low. Display of an LQI value indicates a signal
is present. Due to the Receiver's wide bandwidth in 1000/1000W/1250 Modems, the dynamic range is
lower which typically resolves on a low LQI.
For the remaining modems, "Pristine" means in an absolutely perfect signal environment the best LQI
will be less than or equal to the number in the table.
"Usable" means the signal quality is good and the radio should be able to demodulate correctly, however
if LQI averages are approaching this limit then errors would be expected. Ideally average LQI should fall
somewhere in between the two values shown for each modem.
Lastly, keep in mind this is a "relative" measurement. Please do not make any hard decisions based on
this metric. Systems (obviously) are not all the same and optimizing the system may take a little
configuring based on Noise Floor/Data Type/Data Volume…
An LQI of 255 is reported (on a given channel/s) during the setup sequence and might also be reported
after the remote unit is “associated” with the AP. This does not necessarily imply poor RF conditions;
only that no user traffic has been received by the remote from the AP on that specific channel.
As mentioned above since the LQI is a dynamic value that varies upon the environment and is only
updated when data is received on the RF interface. It is recommended that to obtain a “good” LQI reading
the user enable some traffic to/from the RF interface (where the LQI is being read). Example: If at a
remote site, ping the AP and refresh LQI readings at the remote to get most updated LQI reading.
Another note on Modems and distance. The lower the kbps the further the units may be separated (lower
the sensitivity). A 125kbps modem can reach out the farthest and the 1250kbps Modem would be the
shortest. The Orbit will support up to 8 Hop Store-and-Forward to extend these distances (although
Latency must be considered with each additional hop).
Adaptive Data Rate
The adaptive data rate mode allows the uplink traffic to adjust which modem is used on a per remote basis
and also works in Store and Forward networks. The mode selection allows the modem to vary over two
ranges. It can vary over either 125 kbps to 250 kbps for FHSS operation or 500 kbps to 1250 kbps for
DTS operation. When a remote’s RSSI is stronger than the ADR threshold it will attempt to transmit with
a faster modem. The downstream traffic is only sent at the lower data rate, either 125 kbps or 500kbps
depending on the mode.
security {
security-mode none;
encryption none;
}
Security configuration
The default security mode, as shown above, is none.
The following configures the NX915 module to use data compression, pre-shared key authentication with
the passphrase 'mypassphrase' and aes128-ccm encryption.
% set interfaces interface NxRadio nx-config data-compression lzo security encryption
aes128-ccm security-mode psk passphrase mypassphrase
% show interfaces interface NxRadio nx-config | details
modem-mode 500kbps;
device-mode access-point;
network-name MyNetwork;
data-compression lzo;
header compression false;
power 30;
dwell-time 50;
beacon-interval 150;
hop-set a;
security {
security-mode psk;
encryption aes128-ccm;
passphrase mypassphrase;
}
advanced-config {
lna-state high-sensitivity;
stale-packet-timeout 1500;
propagation-delay 40miles;
mcast-repeat 3;
data-retries 3;
fragment-threshold 0;
remote-age-time 600;
endpoint-age-time 300;
allow-retransmit true;
arp-cache false;
adr-mode none;
adr-threshold -70;
encryption-protocol 2.0;
Other configuration
The following will configure the NX915 module to operate at 20 dBm on hop-set b, with a beacon
interval of 25 ms and a dwell time of 75 ms. It also setups several advanced configuration parameters to
move the propagation delay to 60 miles, disabled the data retries and multicast/broadcast repeats. It
configures the LNA to operate in a high immunity mode, fragments data frames to 50 bytes, set a stale
packet timeout to 1250 ms and avoids operating in the band from 915 to 920 MHz.
% set interfaces interface NxRadio nx-config power 20 hop-set b beacon-interval 25 dwell-
time 75 advanced-config propagation-delay 60miles data-retries 0 mcast-repeat 0 lna-state
high-immunity fragment-threshold 50 stale-packet-timeout 1250 avoided-frequencies 915-
920
% show interfaces interface NxRadio nx-config | details
modem-mode 500kbps;
device-mode access-point;
network-name MyNetwork;
MDS 05-6632A01, Rev. F MDS Orbit MCR/ECR Technical Manual 117
data-compression lzo;
header compression false;
power 20;
dwell-time 75;
beacon-interval 25;
hop-set b;
security {
security-mode psk;
encryption aes128-ccm;
passphrase mypassphrase;
}
advanced-config {
lna-state high-immunity;
avoided-frequencies [ 915-920 ];
stale-packet-timeout 1250;
propagation-delay 60miles;
mcast-repeat 0;
data-retries 0;
fragment-threshold 50;
remote-age-time 600;
endpoint-age-time 300;
allow-retransmit true;
arp-cache false;
adr-mode none;
adr-threshold -70;
encryption-protocol 2.0;
}
Remote Mode
The following will configure the NX915 module as a Remote with the network name of 'MyNetwork' and
default settings.
% set interfaces interface NxRadio nx-config device-mode remote network-name MyNetwork
% show interfaces interface NxRadio nx-config | details
modem-mode 500kbps;
device-mode remote;
network-name MyNetwork;
data-compression none;
header-compression false;
power 30;
security {
security-mode none;
encryption none;
}
advanced-config {
lna-state high-sensitivity;
stale-packet-timeout 1500;
data-retries 3;
nic-id 0;
gateway-id 0;
arp-cache false;
adr-mode none;
Security Configuration
The default security mode, as shown above, is none. The following configures the NX915 module to use
data compression, pre-shared key authentication with the passphrase “mypassphrase” and aes128-ccm
encryption.
% set interfaces interface NxRadio nx-config data-compression lzo security encryption
aes128-ccm security-mode psk passphrase mypassphrase
% show interfaces interface NxRadio nx-config | details
modem-mode 500kbps;
device-mode remote;
network-name MyNetwork;
data-compression lzo;
header-compression false;
power 30;
security {
security-mode psk;
encryption aes128-ccm;
passphrase mypassphrase;
}
advanced-config {
lna-state high-sensitivity;
stale-packet-timeout 1500;
data-retries 3;
nic-id 0;
gateway-id 0;
arp-cache false;
adr-mode none;
adr-threshold -70;
encryption-protocol 2.0;
}
The following configures the NX915 module to use data compression, EAP authentication and aes128-
ccm encryption. The EAP mode currently supports only EAP-TLS. This requires configuring the
appropriate PKI Certificates and Keys to use in the TLS authentication. This information is selected from
the PKI configuration.
% set interfaces interface NxRadio nx-config data-compression lzo security encryption
aes128-ccm security-mode eap eap-mode eap-tls pki ca-cert-id CACert key-id DevicePrivKey
cert-id DevicePubCert
% show interfaces interface NxRadio nx-config | details
modem-mode 500kbps;
device-mode remote;
network-name MyNetwork;
data-compression lzo;
header-compression false;
power 30;
security {
security-mode eap;
encryption aes128-ccm;
eap-mode eap-tls;
MDS 05-6632A01, Rev. F MDS Orbit MCR/ECR Technical Manual 119
pki {
cert-id DevicePubCert;
key-id DevicePrivKey;
ca-cert-id CACert;
}
}
advanced-config {
lna-state high-sensitivity;
stale-packet-timeout 1500;
data-retries 3;
nic-id 0;
gateway-id 0;
arp-cache false;
adr-mode none;
adr-threshold -70;
encryption-protocol 2.0;
}
Other configuration
The advanced configuration on an NX915 module operating as a Remote, shares the same configuration
for LNA stat, stale packets timeout and data retries as an Access Point. The NIC and Gateway Identifier
are for use in manually configuring link paths a station will use in the network. The default value of 0 for
the identifiers configured the module to automatically obtain a path in the network. This is particularly
useful in a network that contains Store-and-Forward devices.
Store-and-Forward Mode
Basic configuration with defaults
The following will configure the NX915 module as a Store-and-Forward (SAF) device with the network
name of “MyNetwork” and default settings.
% set interfaces interface NxRadio nx-config device-mode store-and-forward network-name
MyNetwork
% show interfaces interface NxRadio nx-config | details
modem-mode 500kbps;
device-mode store-and-forward;
network-name MyNetwork;
data-compression none;
header-compression false;
power 30;
security {
security-mode none;
encryption none;
}
advanced-config {
lna-state high-sensitivity;
stale-packet-timeout 1500;
propagation-delay 40miles;
mcast-repeat 3;
data-retries 3;
fragment-threshold 0;
remote-age-time 600;
endpoint-age-time 300;
Security configuration
The default security mode, as shown above, is none. The configuration options are the same as an NX915
module operating in remote mode.
Other configuration
The advanced configuration on an NX915 module operating as a Store-and-Forward device, shares the
same configuration as a Remote. The NIC and Gateway Identifier are for use in manually configuring
link paths a station will use in the network. The default value of 0 for the identifiers configured the NIC
module to automatically obtain a path in the network. Manually setting the NIC ID to a specific value,
allows you to configure Remotes to use that value as their Gateway ID. Doing so will cause the Remote
to only synchronize with this Store-and-Forward device to gain network access.
Monitoring
Ensure the CLI is in operational mode.
Access Point Mode
The following shows status with two remotes connected.
> show interfaces-state interface NxRadio nx-status | tab
nx-status init-status complete
nx-status current-device-mode access-point
nx-status current-modem 500kbps
nx-status alarms ""
nx-status serial-number 2652308
nx-status firmware-revision 0.6.0
nx-status hardware-id 14
nx-status hardware-revision 3
nx-status temperature 46
nx-status mac-stats tx-success 5903
nx-status mac-stats tx-fail 1
nx-status mac-stats tx-queue-full 0
nx-status mac-stats tx-no-sync 0
nx-status mac-stats tx-no-assoc 0
nx-status mac-stats tx-error 0
nx-status mac-stats tx-retry 1253
nx-status mac-stats rx-success 6940
nx-status mac-stats sync-check-error 0
nx-status mac-stats sync-change 0
TIME
TO LINK NIC AVG AVG TX TX RX RX TX RX TX RX
ADDRESS IP ADDRESS LIVE STATUS ID RSSI LQI PACKETS BYTES PACKETS BYTES ERROR ERROR DROP DROP
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
00:06:3d:07:3e:3a 10.15.65.184 179 associated 1 -70 7 13 780 435 22933 0 0 0 0
00:06:3d:07:67:f9 10.15.65.182 179 associated 2 -69 9 1597 285716 2431 2444359 0 0 0 0
6.25 KHz 4800 sps 9600 bps 19200 bps 28800 bps
12.5 KHz 9600 sps 19200 bps 38400 bps 57600 bps
12.5 KHz 10000 sps 20000 bps 40000 bps 60000 bps
NOTE The only required steps for basic configuration are: Program transmit and receive frequencies
per user licensing; program a network name in all units; establish one unit as the AP
Minimal configuration is necessary but several advanced tuning facilities are provided.
By default the radio ships from the factory with a 12.5KHz bandwidth and 10k-symbol/sec data rate.
Modem operation is configured for Adaptive Modulation with FEC enabled. Transmit and Receive
frequencies are unprogrammed and left to field installation personel to prevent inadvertant operation on
the wrong channel.
For the advanced user, the module supports configuring more items including:
Data Retries - Number of times to retry unicast data before declaring NACK.
Power – RF output power control.
ARP Cache – Feature that limits over-the-air ARP traffic
Data and Header Compression – facilities to use LZO data compression for payload and robust
header compression to reduce packet overhead
FEC – facility to selectively enable Forward Error Correction trading off speed and robustness
Allow Retransmit – facility to enable peer-to-peer traffic
In general, it is recommended that users start with the simplest configuration and then make parameter
changes as necessary to meet specific needs.
NOTE To meet country specific regulatory requirements, parameter restrictions may be configured by
the factory. These settings can NOT be changed or modified by the user. See the table above:
Remote Mode Blink Red NIC Initialization / Not linked to an Access Point
Solid Green Linked with Access Point
Figure 3-64. Licensed Narrowband (LN) EAP on an access point Security Settings
Security Mode - The type of over the air authentication to perform
- none - Provide no device authentication or data privacy (DEFAULT)
- psk - Use pre-shared key authentication protocol
- eap - Use Encapsulated Authentication Protocol - will change the fields displayed and
give the user the ability to enter radius info on the AP and certificate info on the remote.
MDS 05-6632A01, Rev. F MDS Orbit MCR/ECR Technical Manual 129
Encryption - The type of over the air encryption to perform
- none - No data privacy (DEFAULT)
- aes128-ccm - Protect data with 128-bit AES encryption using CCM mode
- aes256-ccm - Protect data with 256-bit AES encryption using CCM mode
Passphrase - The passphrase used in PSK mode, 8 to 64 letters. (DEFAULT=blank)
Certificate ID, Key ID, CA Certificate ID (Remote EAP mode only) – Reference to the
remotes certificate material loaded through the Certificate Management side menu (section
3.9).
Radius Server (AP EAP mode only) – A reference to the RADIUS server configuration
configured through the System – RADIUS side menu item (section 3.7.4).
Rekey Interval (AP only) – The session key for an active secure link changes at a regular
basis. You may increase the length of the rekey interval in order to reduce overhead caused by
the rekeying communications between radios on a narrowband channel. Valid values:
- 0 – Rekeying will not be time-based, but will instead occur every one million packets.
- 30-525600 minutes, DEFAULT 180.
NOTE Remember to click on the Save button when finished.
Advanced Configuration
Modem Stats
Last RSSI – The RSSI measured at the time of the last received packet.
Last Error Vector Magnitude – The EVM measured at the time of the last received packet. For more
information, refer to Important Notes and Information Regarding EVM
Last Modulation – The modulation measured at the time of the last received packet.
Rate – The calculated over the air rate from Table 3-15.
Hardware Info
NOTE Highlighting a MAC address of a Connected Remote and clicking Remote Web Connect will
open a remote web UI session to the selected remote. See Section 3.8.16, Remote Management
Service, for more information.
Test Mode provides a way to place the transmitter on the air to check the measured RF power output,
measure reflected power from an antenna system, or to provide a signal at a receiving station so that RSSI
can be checked. While in Test Mode, a radio will not operate normally and does not communicate with
the narrowband network.
To enter or exit Test Mode, select the desired test state from the State drop-down box and click Perform
Action.
Time – The time, in minutes, to remain in test mode before automatically resuming normal
operation. We recommend that you remain in test mode 10 minutes or less.
State -
- Receive – Enter Receive mode to check the RSSI of a received signal.
- Keyed – Key the transmitter. To prevent damage to the radio, the unit will stop keying
after one minute and automatically transition to the Receive state.
- Stop – Stop all test operations and exit test mode.
Test Values
Test Mode Time – The length of time test mode has been running.
Test State – Receive, Keyed, Stop. The current test state.
Test RSSI (Receive Mode only) – The current signal RSSI.
CLI Configuration Examples
AP Mode
On the next page, the example will display how to configure the LN module as an access point with the
network name of ‘MyNetwork’ and default settings. For this example we assume a transmit frequency of
MDS 05-6632A01, Rev. F MDS Orbit MCR/ECR Technical Manual 137
451.4 MHz and a receive frequency of 456.4 MHz. Your own LN frequencies must be set according to
your user license.
% set interfaces interface LnRadio ln-config device-mode access-point network-name MyNetwork
tx-frequency 451.4 rx-frequency 456.4
% show interfaces interface LnRadio ln-config | details
radio-mode standard;
device-mode access-point;
network-name MyNetwork;
data-compression lzo;
header-compression true;
power 40;
tx-frequency 451.4;
rx-frequency 456.4;
channel 12.5KHz-9.6ksps;
modulation automatic;
fec false;
security {
security-mode none;
encryption none;
}
advanced-config {
data-retries 3;
packet-ttl 600;
remote-age-time 600;
endpoint-age-time 300;
allow-retransmit true;
arp-cache false;
qam16-threshold -85;
qam64-threshold -70;
Security configuration
The default security mode, as shown above, is none.
The following configures the LN module to use pre-shared key authentication with the passphrase
'mypassphrase' and aes256-ccm encryption.
NOTE When viewing the configuration, the passphrase that you entered is not displayed in plaintext.
This is a security measure.
% set interfaces interface LnRadio ln-config security encryption aes256-ccm security-mode
psk passphrase mypassphrase
% show interfaces interface LnRadio ln-config | details
radio-mode standard;
device-mode access-point;
network-name MyNetwork;
data-compression lzo;
header-compression true;
power 40;
tx-frequency 451.4;
rx-frequency 456.4;
channel 12.5KHz-9.6ksps;
}
The following configures the LN module to use data compression, EAP authentication and aes256-ccm
encryption. The radius server used by the EAP authentication is selected from a list of configured Radius
servers.
% set interfaces interface LnRadio ln-config security encryption aes256-ccm security-mode
eap radius-server RADIUS_SERVER
% show interfaces interface LnRadio ln-config | details
radio-mode standard;
device-mode access-point;
network-name MyNetwork;
data-compression lzo;
header-compression true;
power 40;
tx-frequency 451.4;
rx-frequency 456.4;
channel 12.5KHz-9.6ksps;
modulation automatic;
fec false;
security {
security-mode eap;
encryption aes256-ccm;
radius-server RADIUS_SERVER;
}
advanced-config {
data-retries 3;
packet-ttl 600;
remote-age-time 600;
endpoint-age-time 300;
allow-retransmit true;
arp-cache false;
qam16-threshold -85;
qam64-threshold -70;
}
Security Configuration
The default security mode, as shown above, is none. The following configures the LN module to use pre-
shared key authentication with the passphrase “mypassphrase” and aes256-ccm encryption.
NOTE When viewing the configuration, the passphrase that you entered is not displayed in plaintext.
This is a security measure.
% set interfaces interface LnRadio ln-config security encryption aes256-ccm security-mode
psk passphrase mypassphrase
% show interfaces interface LnRadio ln-config | details
radio-mode standard;
device-mode remote;
network-name MyNetwork;
data-compression lzo;
header-compression true;
power 40;
tx-frequency 456.4;
rx-frequency 451.4;
;
Monitoring
Ensure the CLI is in operational mode.
Also the device supports external logging using SysLog or the Netconf - as described below.
Administrators can override the default event handling of the unit.
Click on Add… and the Event Rules Details option will appear.
Click on the button to the right of the Name field to locate the event rule to configure. This will
automatically bring up the popup shown on the previous page.
Clicking on the add buton will display the Event Rule Details option. Clicking the Finish button will add
the event rule.
From the CLI this modification can be made with the commands:
% set logging event-rule cell_disconnected local true
% set logging event-rule cell_connected local true
MDS 05-6632A01, Rev. F MDS Orbit MCR/ECR Technical Manual 149
NETCONF-notifications
The events generated by the unit are converted to NETCONF notifications. NETCONF clients can
subscribe to the unit to receive those notifications.
Syslog Server Setup
The events generated by the unit can be sent to remote syslog servers. The connection to the syslog server
can be made secure using syslog over TLS.
For example:
Alarms
Events can be configured by Event Rules to be Alarms which can causes the Power Light and external
signal to go “high” state. Refer to Section 2.5 for further details.
Alarms have factory default settings that control the behavior of the alarm outputs timing in terms of
period and duration. These values can be overridden to adjust for local requirements.
Modification of the alarm behavior can be adjusted adding entries to the Default Alarm Output table.
Clearing the Event Log
The user may explicitly clear the event log. To clear the event log, navigate to Logging ---> Actions /
Clear Event Log and click on the Perform Action button.
Monitoring
Once the export of the event log is begun, the process may be cancelled by clicking the Cancel
Exporting button. The current status of the export process is displayed on the web page. Note that the
web page does not display the current status if the device has not been instructed to export an event log
(in other words, if the state is “inactive”).
Figure 3-76. Setup using iperf for throughput testing in a private network
Iperf features:
TCP
- Measure bandwidth
- Report MSS/MTU size and observed read sizes.
- Support for TCP window size via socket buffers.
- Multi-threaded if pthreads or Win32 threads are available. Client and server can have
multiple simultaneous connections.
UDP
- Client can create UDP streams of specified bandwidth.
- Measure packet loss
- Measure delay jitter
- Multicast capable
- Multi-threaded if pthreads are available. Client and server can have multiple
simultaneous connections (this doesn't work in Windows).
Iperf is available on many platforms, and there are also open source graphical front-ends available. For
further information on iperf, see the iperf homepage at http://software.es.net/iperf/.
Enabling the Iperf service allows the unit to receive TCP traffic from remote host running iperf.
Currently, iperf service running v2.0.5 and is hardcoded to act only as a TCP server listening on port
5001.
Configuring
The following shows how to enable iperf service – Services / Iperf Server ---> Basic Config:
NOTE If firewall is enabled, then it must be configured to permit incoming TCP traffic on port 5001.
Monitoring
From the Services Screen the iPerf status can be checked by navigating to IPerf Server
> show services
NAME STATUS
---------------------------------------------------------
DHCP Server running
Firewall running
IPerf Server running
NETCONF Server running
Quality of Service running
Serial running
SNMP Server running
SSH Server running
VPN disabled
Web Server running
Factory No Yes
Auto No No
User Yes No
Rollback to a snapshot
To rollback to one of the unit’s snapshots, first expand the Recovery menu.
The Snapshot dropdown box lists all the snapshots available on the device. Select the desired snapshot,
and the image that you wish to reboot to.
Initiating a rollback operation immediately reboots the unit to the specified firmware image and restores
the unit’s configuration to the specified snapshot. This operation cannot be undone.
The User Snapshots menu, found under the Rollback menu, allows you to create, delete, and set the
default user snapshot. You cannot delete or modify the unit’s Factory or Auto snapshots.
You may create up to two user snapshots. These snapshots contain the system’s current configuration
and can be rolled back to at any time. User snapshots do not restore passwords. You can also specify a
default user snapshot. The system may use the default user snapshot as a recovery point in the event that
the unit fails to boot properly.
Create Snapshot
Identifier – The name of the user snapshot. Up to 30 characters, including letters, numbers, dashes,
underscores, and spaces.
Description - Description of this user snapshot. Up to 127 characters, including letters, numbers,
dashes, underscores, and spaces. Optional.
Default - Set the default user snapshot used in error recovery. Optional.
Delete Snapshot
Identifier – The user snapshot to delete. Once a snapshot is deleted, it cannot be recovered.
Status
Navigate to System->Troubleshooting->Status.
The system will prompt you for confirmation before the unit proceeds with the operation. Once
confirmed, the rollback cannot be undone.
The current system configuration will be erased and replaced with the snapshot.
Proceed? [no,yes]
You can set an existing snapshot as the default user snapshot with the following command.
% request system recovery user-snapshots set-default identifier Snapshot1
Monitoring
To view the device’s snapshots, ensure that the CLI is in operational mode.
% show system recovery snapshot
system recovery snapshots Factory
description "Factory Default Configuration"
date 2013-01-01T00:14:27+00:00
version 4.0.0
hash 0x158debb6d7eaec2068166370ace53581
user-default false
system recovery snapshots Auto
description "Automatic snapshot for 4.0.8"
date 2016-01-13T17:20:54+00:00
version 4.0.8
hash 0xa13ceb2d5d267341d5067d975e39131e
user-default false
system recovery snapshots Snapshot1
description "Example snapshot"
date 2016-01-13T19:53:44+00:00
version 4.5.5
hash 0x579b9fa00303ceb9eeb3981cc429d31b
user-default true
To manually set the date and time, use the request set-current-datetime:
> request system clock set-current-datetime current-datetime 2013-10-01T8:33:45
Enable NTP or SNTP by clicking the Use NTP checkbox. Click on the Mode option to choose which
type of time server desired; NTP or SNTP and then add a server configuration by clicking the Add
button:
From the CLI, the NTP settings on the Orbit can be configured:
% set system ntp use-ntp true mode ntp ntp-server time.nist.gov
To configure a SNTP server from the CLI, use the following command as an example;
% set system ntp use-ntp true mode sntp ntp-server server-address
Monitoring
Ensure the CLI is in operational mode. Follow the example below to view the state and statistics:
> show system clock
system clock current-datetime 2012-06-19T00:20:34+00:00
system clock boot-datetime 2012-06-19T00:18:01+00:00
3.7.2 Geographical-location
The geographical-location of the unit can be manually. This information can be configured using the
initial setup wizard.
Latitude - in degrees
Longitude - in degrees
Altitude - in meters
From the CLI:
% set system geographical-location altitude 1.0 latitude 43.117807 longitude -77.611896
The password for each user account can also be changed using a CLI request:
> request system authentication change-password user admin password new_password
NOTE If the admin password is forgotten, the method to recover the unit is by using the login One-
Time-Password. This will give the user the ability to change the forgotten password. See “One-
Time “Recovery” Passwords” on Page 39.
Orbit user authentication provides the capability to manage the rules regarding logins and the setup rules
regarding password strength.
The unit has protections against repeated login attempts. The max-login-attempts configuration
determines the number of failed logins that can occur in succession before the unit disables the ability to
login for a specified amount of time. The amount of time is determined by failed-login-lockout-time,
which represents the time in seconds.
Start by viewing the current users at System / User Authentication ---> Status
Monitoring
Navigate to Logging. Scroll Down to Event Log. Click on the magnifier to filter the data. Default is “ID
is {nothing}” Each portion is adjustable to tailor the search. For example to find all web_login events set
up the filter as shown.
To do similar operations from the CLI in operational mode, follow the example below to see the history
of login attempts by reviewing the event log:
> show logging event-log event-type web_login
logging event-log 62625
time-stamp 2011-12-21T01:18:08.985996+00:00
priority notice
event-type web_login
status success
message “user_name oper, “
logging event-log 62627
time-stamp 2011-12-21T01:23:00.288046+00:00
priority notice
event-type web_login
status failure
message “msg noauth, user_name admin, “
NOTE All approved networked devices are required to be identified in the server's client file.
Configuring
Navigate to: System / User Authentication ---> Basic Config / RADIUS the main interface for adding
RADIUS servers.
Timeout - The number of seconds the device will wait for a response from a RADIUS server
before trying with a different server. Default = 5 - max value 255.
Monitoring - Reprogram
Once the reprogramming is begun, the process may be cancelled by clicking the Cancel
Reprogramming button. The current status of the reprogramming process is displayed on the web page.
Note that the web page does not display the current status if the device has not been instructed to
reprogram (in other words, if the state is “inactive”).
Monitoring - Verifying
Once the verification is begun, the current status of the verification process is displayed on the web page.
Note that the web page does not display the current status if the device has not been instructed to verify a
firmware image (in other words, if the state is “inactive”).
Configuring - Copy
To copy the active firmware image to the inactive firmware image, navigate to the Copy Image section
and click on the Begin Copying button to begin.
Monitoring - Copy
Once the copying is begun, the current status of the copying process is displayed on the web page. Note
that the web page does not display the current status if the device has not been instructed to copy the
firmware image (in other words, if the state is “inactive”).
Configuring – Power
To restart the device to a specified firmware image, navigate to the Power section and select the
appropriate image (1 or 2) to restart into. Once an image is selected, click on the Restart to selected
button to begin.
Allow approximately 2 minutes for the unit to complete the restarting process and refresh the screen.
File Servers
External file servers can be pre-configured in the CLI so that the configuration can easily be referenced in
other services without the need to re-enter the information. File Server Configurations can be used for
reprogramming, downloading certificates, configuration script import and export and sending support
bundles for debugging.
The following shows how to add a file server configuration named “GE File Server 1”:
% set file-servers GE_file_server_1 tftp address 192.168.1.10
% commit
Configuring
Set trigger thresholds and enable the device. This will start the calibration process. Use the Web UI as
show above, change the values, enable the device and press Save.
Monitoring
Example of device status during calibration period:
From the CLI the Device status when operational (after calibration) could be:
> show system tamper-detection magnetometer
system tamper-detection magnetometer calibration-offsets x-axis -916
system tamper-detection magnetometer calibration-offsets y-axis 840
system tamper-detection magnetometer calibration-offsets z-axis 1648
system tamper-detection magnetometer current-offsets x-axis -2
system tamper-detection magnetometer current-offsets y-axis -0
system tamper-detection magnetometer current-offsets z-axis -2
Tamper Alarms
Once tamper detection is enabled the alarm will be triggered when the magnetometer readings exceed the
configurable offsets. To clear the alarm, navigate to System / Tamper Detection / ---> Actions / Clear
Alarms and press Perform Action. After confirmation, the following screen will show.
Monitoring - Export
Once the export of the configuration file is begun, the process may be cancelled by clicking the Cancel
Exporting button. The current status of the configuration file export process is displayed on the web
page. Note that the web page does not display the current status if the device has not been instructed to
export a configuration file (in other words, if the state is “inactive”).
Configuring - Import
The following example shows how to have the device import a set of configuration parameters by
uploading a local file through the web browser.
Navigate to System / Config Files ---> Actions / Import Configuration
Click on the Begin Importing button once the file source is configured.
Monitoring - Import
Once the import of a configuration file is begun, the process may be cancelled by clicking the Cancel
Import button. The current status of the import process is displayed on the web page. Note that the web
page does not display the current status if the device has not been instructed to import a configuration file
(in other words, if the state is “inactive”).
3.7.8 DNS
Understanding
Domain Name System (DNS) servers can be configured on the unit to facilitate the resolution of domain
names to IP addresses.
NOTE Manual configuration of DNS overrides any DNS settings obtained via DHCP.
Configuring
Using the Web UI
The following example shows how to configure a DNS server with IP address 192.168.1.2 on the MCR.
Navigate to System / DNS ---> Basic Config
Monitoring
Ensure the CLI is in operational mode. Follow the example below to view the state and statistics.
The ping utility can be used on the CLI when it is in operational mode to verify that DNS is working
properly. If ping can resolve a name on the connected network to an IP address then DNS settings are
working properly. The example below shows the resolution of the name “example.com” to the IP address
“192.0.43.10” on a unit that is connected to the Internet.
Use the control sequence “CTRL-C” to stop the ping utility.
> ping example.com
PING example.com (192.0.43.10) 56(84) bytes of data.
64 bytes from 43-10.any.icann.org (192.0.43.10): icmp_req=1 ttl=128 time=184 ms
64 bytes from 43-10.any.icann.org (192.0.43.10): icmp_req=2 ttl=128 time=132 ms
64 bytes from 43-10.any.icann.org (192.0.43.10): icmp_req=3 ttl=128 time=172 ms
LINK LAYER
IP ADDRESS ORIGIN STATE
-----------------------------------------------------
10.10.10.109 00:11:11:e0:2e:70 dynamic stale
10.10.10.98 80:c1:6e:f0:3b:7a dynamic reachable
3.8.2 LAN
Understanding
The unit has external Local Area Network (LAN) ports (ETH1/2 ports) that can be used to connect to a
local (wired) LAN. It supports both IPv4 and IPv6 addresses and may be assigned multiple IP addresses.
The LAN port can be assigned static IP addresses or a dynamically allocated address can be assigned
using DHCP.
NOTE The LAN port should be assigned IP addresses only if it is a routed interface (that is, not in a
bridge).
Configuring
From the Interfaces screen the status may be displayed by clicking on the interface and scrolling down to
the statistics information:
Navigate to: Interfaces / Add/Delete Interfaces
In both security-modes, the NAS-IP address in the RADIUS request can be static or dynamic. A static
NAS-IP is used when the Orbit’s RADIUS configuration contains the NAS settings. If the static NAS
settings are not set, the Orbit uses one its IP addresses that is able to route to the RADIUS server’s
address.
Configuring
Configuration of port authentication first requires a RADIUS server configuration to be added to the
Orbit. For example:
% set system mds-radius servers MyServer address 192.168.10.100 shared-secret
RadiusSharedSecret
% commit
Ethernet security settings are not set by default so Ethernet traffic is unobstructed until security is
enabled. Ethernet security settings include:
security-mode – either EAP, MAB, or none
radius-server – The name of a RADIUS server configuration in system settings
Monitoring
Read-only parameters for Ethernet ports show the state of the security on the port:
Output - Use for selecting and applying a QoS policy (from the available QoS policies) to the
outgoing traffic on this interface. See "Quality of Service (QoS)" on Page 203, for more
information on creating QoS policies.
The following sequence shows how to configure the ETH1 port with a static IPv4 address:
> configure
Entering configuration mode private
% set interfaces interface ETH1 ipv4 address 192.168.1.11 prefix-length 24
% commit
Monitoring
Ensure the CLI is in Operational mode. Follow the example below to view the state and statistics of the
ETH1 port:
> show interfaces-state interface ETH1
interfaces-state interface ETH1
type ethernet
admin-status up
oper-status up
if-index 3
phys-address 00:06:3d:07:96:82
statistics discontinuity-time 2014-02-12T14:29:35-05:00
statistics in-octets 497076597
statistics in-unicast-pkts 6457046
statistics in-multicast-pkts 0
statistics in-discards 17
statistics in-errors 0
statistics out-octets 1002105
statistics out-unicast-pkts 6480
statistics out-discards 0
statistics out-errors 0
eth-phy-status "10 Mb, Half Duplex"
ipv4 forwarding true
ipv4 mtu 1500
PREFIX
IP LENGTH ORIGIN
-------------------------------------------------------------
10.10.10.147 23 static
LINK LAYER
IP ADDRESS ORIGIN STATE
In both security-modes, the NAS-IP address in the RADIUS request can be static or dynamic. A static
NAS-IP is used when the Orbit’s RADIUS configuration contains the NAS settings. If the static NAS
settings are not set, the Orbit uses one its IP addresses that is able to route to the RADIUS server’s
address.
Configuring
Configuration of port authentication first requires a RADIUS server configuration to be added to the
Orbit. For example:
% set system mds-radius servers MyServer address 192.168.10.100 shared-secret
RadiusSharedSecret
% commit
Monitoring
Read-only parameters for Ethernet ports show the state of the security on the port:
Create the VLAN as an interface with a name by clicking on the Add button.
Operational Modes
As previously shown in previous sections, interfaces can have three separate VLAN modes: none
(default), trunk, or access. These modes are used to set interface behavior, and examples of their use are
provided below.
Trunk: To add ETH1 as a trunk (tagged) port in both defined VLANs above, the command is:
% set interfaces interface ETH1 vlan-mode trunk vlans [video_vlan mgmt_vlan]
Access: To set ETH2 as an access port for video_vlan the command is:
% set interfaces interface ETH2 vlan-mode access vlan video_vlan
Native VLANs
A VLAN device may also be specified as a “native” VLAN by checking the Native Vlan box.
Monitoring
Ensure the CLI is in operational mode. Follow the example below to view the state and statistics of a
bridge. In this example, bridge (Bridge) is bridging the LAN (ETH1).
> show interfaces-state interface Bridge
interfaces-state interface Bridge
MDS 05-6632A01, Rev. F MDS Orbit MCR/ECR Technical Manual 205
type bridge
admin-status up
oper-status up
if-index 1
phys-address 00:06:3d:07:96:82
statistics discontinuity-time 2014-02-12T14:29:35-05:00
statistics in-octets 263244716
statistics in-unicast-pkts 3231995
statistics in-multicast-pkts 0
statistics in-discards 4126
statistics in-errors 0
statistics out-octets 785224
statistics out-unicast-pkts 1362
statistics out-discards 0
statistics out-errors 0
ipv4 forwarding true
ipv4 mtu 1500
PREFIX
IP LENGTH ORIGIN
------------------------------------------------------------
10.10.10.141 23 static
LINK LAYER
IP ADDRESS ORIGIN STATE
--------------------------------------------------------------------------------
10.10.10.98 80:c1:6e:f0:3b:7a dynamic delay
3.8.6 Routing
Understanding
The Orbit MCR can forward IP packets between routed interfaces, using a network path defined by the
user. These user-defined network paths are known as static routes. A static route may be configured if
data intended for a specific subnet or IP address must egress a particular onboard NIC.
As an example, consider a case where the unit is connected to a local network, 10.10.0.0/24, through its
ETH2 port. This network contains a gateway at IP address 10.10.10.101. This gateway is also connected
to another network 216.171.112.0/24, which has a NTP server. The Orbit MCR must use this network
path to access an NTP server at IP address 216.171.112.36. A static route to network 216.171.112.0/24
via next-hop 10.10.10.101 (or a host-only route to 216.171.112.36/24 via next-hop 10.10.10.101) ensures
that the unit can communicate with the NTP servers.
ETH2
Interface
Create a numeric ID for the new route, and click Add. The ID acts as a label, is for reference only, and
has no bearing on the route itself.
Monitoring
As mentioned in Configuring, the unit's routes may be viewed on the web UI by navigating to Routing.
To view the list of routes in the CLI, first ensure the CLI is in operational mode. Follow the example
below to view the state of the routing table:
> show routing
OUTGOING
DEST PREFIX NEXT HOP INTERFACE SOURCE
------------------------------------------------------------------------------------------
10.10.10.0/23 - ETH2 kernel
192.110.11.0/24 - Wi-Fi kernel
192.168.0.0/24 - Bridge kernel
216.171.112.36/32 10.10.10.101 ETH2 static
fe80::/64 - kernel
fe80::/64 - Bridge kernel
fe80::/64 - ETH1 kernel
fe80::/64 - Wi-Fi kernel
210 MDS Orbit MCR/ECR Technical Manual MDS 05-6632A01, Rev. F
3.8.7 Static Neighbor Entries
Understanding
The Orbit MCR allows the configuration of static layer-2 MAC addresses. Normally IP neighbors are
learned through protocols such as ARP or IPv6 neighbor discovery, however sometimes there is a need to
statically configure an IP address to use a specific MAC address. This may occur if a neighbor does not
respond to ARPs or neighbor solicitations, or responds incorrectly.
Configuration
To add a static IPv4 neighbor to the Wi-Fi interface that maps the IP address 192.168.2.99 to the MAC
address 00:11:22:33:44:55, first navigate to Interfaces / Wi-Fi.
Monitoring
As mentioned above in Configuring, all of the user-defined neighbors on the web UI may be viewed by
navigating to Interfaces / Interface Name ---> Basic Config / Ipv4 viewing the Neighbor list.
To view the entire list of known IPv4 neighbors, including those learned automatically by the unit, the
following CLI command would be used in operational mode:
> show interfaces-state interface ipv4 neighbor
LINK LAYER
NAME IP ADDRESS ORIGIN STATE
-----------------------------------------------------------------------------------------------------------------------------
Bridge 192.168.1.3 00:80:c8:3b:97:bb dynamic reachable
192.168.1.2 00:12:17:5c:4f:2d dynamic reachable
Wi-Fi 192.168.2.65 74:de:2b:a7:15:0a static reachable
192.168.2.99 00:11:22:33:44:55 static reachable
The following information is available.
Name - Name of the interface.
IP - The neighbor's IP address.
Link Layer Address - The neighbor's link-layer address.
Origin - Dynamic, static.
- Dynamic neighbors are learned by the unit automatically through ARPs or neighbor
solicitations.
- Static neighbors are those added by the user.
State - Incomplete, reachable, stale, delay, probe.
- Incomplete - Address resolution is still in progress and the neighbor's link-layer address
is unknown.
- Reachable - The neighbor is currently reachable.
If the Firewall service is enabled, filters specifying ingress and egress rules must be applied to each
network interface on the device. The MCR's network interfaces allow no traffic to pass unless a filter is
applied to each one allowing them to do so. Except for the Cell, each network interface on the MCR is
preconfigured with IN_TRUSTED as an input filter, and OUT_TRUSTED as an output filter. This allows
all traffic to enter and exit the unit.
The diagrams below provide a simplified view of packet flow for various categories of traffic flows going
in and out of the MCR unit when packet filtering is enabled.
Figure 3-120 shows the flow of packets terminating at the unit, such as device management traffic using
SSH or NETCONF protocol terminating at local device management process within the unit.
Figure 3-128. Creation of a packet filter rule for inbound UDP traffic
The next rule in this example will be used for the TCP services SSH and NETCONF. Click Add new
rule and select Protocol TCP. Since SSH and NETCONF traffic is used to manage the MCR, the traffic
terminates at the MCR. This means that the incoming traffic will have these well-known service ports as
its destination port. Set Destination Port to Services, and enter netconf, Ssh in the textbox next to
Services. Again, ensure that Actions is set to Accept, and Log Level can be set to Debug.
Figure 3-129. Creation of a packet filter rule for inbound TCP traffic
The last step in the creation of a restrictive filter is a default rule to deny all traffic that does not match
any of the previous rules. To do this, click Add new rule, select Protocol All, and set Actions to Drop.
The Log Level is once again set to Debug. This rule must be at the last on the rule list. Any rules added
after this last rule will have no effect, as they would match “any” traffic and be dropped.
Figure 3-130. Creation of a default restrictive packet filter rule for inbound traffic
Once all changes are finished, click Back to return to the list of packet filters and create another.
NOTE The rule stated in step 5 permits SSH or NETCONF connection addressed to the cellular
interface’s IP address. If it is desired that SSH or NETCONF connection only be allowed via
the VPN tunnel, then remove rule 3 and instead apply appropriate filter to IPsec connection.
6. Create the last rule for this “restrictive” filter to deny everything else. Note that rules are applied in
ascending order using rule IDs. Any rules added after this last rule will have no effect, as they
would match “any” traffic and be dropped. In this example rule ID 10 is chosen. This facilitates the
insertion of new rules prior to this last one to support future new traffic types.
% set services firewall filter Cell_Inbound_Traffic rule 10 match protocol all
% set services firewall filter Cell_Inbound_Traffic rule 10 actions action drop
7. Apply this filter to incoming direction on cellular interface “Cell”.
% set interfaces interface Cell filter input Cell_Inbound_Traffic
8. Create a “permissive” filter that permits all traffic. Later on, if needed, this filter can be enhanced to
deny certain traffic from getting out of the cellular interface.
% set services firewall filter Cell_Outbound_Filter rule 10 match protocol all
% set services firewall filter Cell_Outbound_Filter rule 10 actions action accept
9. Apply this filter to outgoing direction on cellular interface “Cell”.
% set interfaces interface Cell filter output Cell_Outbound_Filter
10. Commit configuration and exit configuration mode.
% commit
Commit complete.
Monitoring
At this time there are no commands to monitor traffic statistics for packets being dropped or permitted by
the firewall. This feature may be added to future revisions of firmware.
MDS 05-6632A01, Rev. F MDS Orbit MCR/ECR Technical Manual 225
3.8.9 Source NAT (Masquerading)
Understanding
Network address translation is a component of the firewall service provided on the Orbit MCR. NAT
allows mapping of private IP addresses to public IP addresses and vice versa. There are three basic kinds
of network address translation:
Source NAT
Destination NAT
Static NAT
Source NAT
Source NAT performs translation of source IP address of the traffic egressing an interface. This is
typically used to provide many-to-one translation (also called masquerading) of a private network behind
the MCR to allow hosts on that private network to access a host on the public network. (See Figure
3-136.) In the figure below, this host is HOST-B. From HOST-B's point of view, all traffic originating
from hosts in the private network will appear to have originated from a single IP address: The IP address
of the public interface of the MCR, typically the cellular interface. To allow return IP traffic for
UDP/TCP connections to be delivered to the right private host, the MCR also performs source port
translation. Therefore, masquerading consists of Network Address and Port Translation (NAPT).
Now, the rule set must be applied to the desired interface. Navigate to Interfaces and click on Cell to
proceed to the cell interface’s menu. From there, navigate to Basic Config / NAT.
Monitoring
At this time there are no commands to monitor traffic statistics for packets being masqueraded by the
firewall. This feature may be added in future revisions of firmware.
3.8.10 Destination NAT (Port Forwarding)
Destination NAT performs translation of destination IP address (and, optionally, destination port) of the
traffic ingressing an interface. This is typically used to allow a host on the public network (HOST-B) to
access a service running on a host in the private network (HOST-1). This is also called port forwarding.
Figure 3-153 shows the flow of packets being port-forwarded (DNAT’ed) through the MCR unit. For
example, TCP traffic arriving at the cellular interface and getting port forwarded to a private host
connected to the local Ethernet interface.
Click Add to create a new rule-set and enter name for the new rule set. Spaces are not allowed; use the
underscore character instead. Click OK to continue.
Figure 3-158. Destination NAT rules list for the new rule-set
The Destination NAT screen lists all rules contained within the new rule set. Since this is a new rule set,
there are currently none. Click Add New Rule to add one. The rule creation menu appears.
Monitoring
At this time there are no commands to monitor traffic statistics for packets masqueraded by the firewall.
This feature may be added in future revisions of firmware.
The next menu shows all rules contained within the newly named rule set. You may edit existing rules,
delete them, or add new ones. Since the rule set is new, it contains no rules at first. Click Add New Rule
to add one. The rule creation menu appears.
Figure 3-165 Adding a static NAT rule with the Static NAT Wizard
The following options are available within the rule creation menu.
Order – Click the arrows to sort rules in order of priority. Rules with higher priority are applied
before rules with lower priority; rule sets containing more than one rule should be sorted accordingly.
External Address - The external address is the address that is translated to an internal address. (This
is the rule{1}/match/dst-address in the CLI).
Internal Address - The internal address is the address that is translated to the external address. This
is the rule{1}/static-nat/address in the CLI).
In Network A above, this is 192.168.1.0/24.
Once the rule is complete, click Next to continue. The Interface Selection screen appears.
A summary page appears that displays the items in the configuration’s data model that were changed, and
type of changes that occurred. To save and apply the changes, click Submit.
To view the list of destination NAT rule sets that exist on the device at any time, navigate to Firewall --->
Basic Config / Static NAT.
3.8.12 VPN
Understanding
Orbit supports following types of Virtual Private Network (VPN) setups:
1. Site-to-Site Policy-Based IPsec L3VPN – This is enables routing of traffic to/from single local LAN of
Orbit from/to single remote LAN on the other side of the Remote IPsec router through an IPsec
tunnel. Only unicast IP traffic matching the local and remote subnets can be sent over this tunnel. If
more than a single pair of local or remote subnets need to exchange data then each pair requires its
own tunnel. This is called a policy based VPN since the traffic selector/policy i.e. the local and
remote IP subnets is included in the IPsec configuration.
Customer
Cellular Network/
network Internet
Remote IPsec
Orbit Gateway/Router
IPsec Tunnel
Local LAN carrying traffic Remote LAN
192.168.1.0/24 between local 10.1.1.0/24
and remote
LANs
In this setup, there is single LAN behind Orbit and traffic from this LAN needs to
be routed towards a single remote LAN on the other side of the remote router
through an IPsec tunnel. If the remote LAN is configured as 0.0.0.0/0, then Orbit
will route traffic from local LAN to any other destination through this tunnel.
Remote LAN#1
Local LAN#1 192.168.3.0/24
192.168.1.0/24
Customer
Cellular
Network/
network
Internet
Remote IPsec
Orbit
Gateway/Router
3. Site-to-Site GRE/IPsec L2VPN – This enables bridging of traffic to/from one or more local LANs of
Orbit from/to one or more remote LANs on the other side of the Remote IPsec router through a
single GRE tunnel protected by transport mode IPsec connection. Orbit also supports VLAN trunking
over GRE tunnel for a case where there is more than one LAN behind Orbit and remote router.
Remote LAN
Local LAN
192.168.1.0/24
192.168.1.0/24
Customer
Cellular
Network/
network
Internet
Remote IPsec
Orbit
Gateway/Router
In this setup, there is single LAN behind Orbit and traffic from this LAN needs to be bridged with
single remote LAN on the other side of the remote router through a GRE tunnel protected by
IPsec transport mode connection. In this mode, the GRE tunnel is in Ethernet-over-GRE mode and
simulates a point-to-point layer-2 VPN enabling MAC visibility and learning between the two
sites. Orbit also supports VLAN trunking over the GRE tunnel in a case there is more than one
LAN behind Orbit and Remote router.
4. Dynamic Multipoint/Mesh VPN (DMVPN) - DMVPN combines multipoint GRE (mGRE) Tunnels,
IPSec encryption and NHRP (Next Hop Resolution Protocol) functionality to enable easier
configuration of hub-to-spoke VPN deployments. In addition, it enables formation of on-demand
dynamic tunnels between spokes for a full or partial mesh VPN network. The routes are added for
In a a hub-n-spoke deployment, where there is one hub router in central office and large number of
spoke router at remote sites, if site-to-site VPN setup is used then each spoke requires its own
tunnel configuration on the hub router. This can make hub configuration unwieldy. Also, everytime
a new spoke site is added to the deployment, the hub configuration needs to be updated. This can
become cumbersome from management perspective. DMVPN uses simgle multipoint GRE tunnel
interface on the hub which needs to be configured only once initially and is used to terminate all the
spoke tunnels. Addition of new spoke site doesnot require update of hub configuration if dynamic
routing protocols are used to add routes towards remote LANs at the spoke site. Although, DMVPN
technology is based on open standards, it was created by Cisco and hence is primarily only
supported by Cisco routers designed for use as IPsec hub routers.
LAN
10.0.1.0/24
HUB Router
Cellular network
IPSec Overview
IPsec, Internet Protocol Security, is a set of protocols defined by the IETF, Internet Engineering Task
Force, to provide IP security at the network layer.
An IPsec based VPN is made up by two parts:
Internet Key Exchange protocol (IKE)
IPsec protocols (ESP, AH)
Configuration
Click Next to continue. The next screen provides a list of VPN setups that one can choose from for a
particular use case. For this example, we’ll select “Configure Site-to-Site IPsec VPN”.
Click Next to continue. The next screen requires one to specify a name for this VPN connection.
Local Endpoint – any (default), address, FQDN. This is an optional setting and hence not available
for configuration via the VPN wizard. This can be configured from Services->VPN service->Basic
Config menu.
- Any – Local address is chosen automatically during negotiation.
- Address – Force local address for this connection to a specified IP address.
- FQDN – Force local address for this connection to an IP address resolved by the specified
fully qualified domain name (FQDN).
Local Identity – Default, address, FQDN, user-FQDN, DN.
- Default – Defaults to local IP address when using pre-shared key based authentication and to
the DN of the local certificate when using certificated-based authentication.
- Address – Use the specified IP address as the local IKE identity.
- FQDN – Use the specified fully qualified domain name (FQDN) as the local IKE identity
- User-FQDN – Use user-fully qualified domain name (user-FQDN) as the local IKE identity.
- DN – Use the specified distinguished name as the local IKE identity.
Peer Endpoint – Address, FQDN. Required setting.
- Address – Specify the IP address of the IKE peer.
Cipher suites used for phase-1 and phase-2 must match corresponding configuration on the peer.
Encryption algorithm – 3des, Aes 128 Cbc, Aes 192 Cbc, Aes 256 Cbc, Aes 128 Ctr, Aes 192 Ctr,
Aes 256 Ctr, Aes 128 Ccm 8, Aes 192 Ccm 8, Aes 256 Ccm8, Aes 128 Ccm 12, Aes 192 Ccm 12,
Aes 256 Ccm12, Aes 128 Ccm 16, Aes 192 Ccm 16, Aes 256 Ccm16, Aes 128 Gcm 8, Aes 192 Gcm
8, Aes 256 Gcm8, Aes 128 Gcm 12, Aes 192 Gcm 12, Aes 256 Gcm12, Aes 128 Gcm 16, Aes 192
Gcm 16, Aes 256 Gcm16.
The local and remote subnets should also match those configured on the peer.
Local IP Subnet – The local IP subnet behind Orbit.
Remote IP Subnet – The remote IP subnet behind the peer IPsec VPN router.
Click Next to continue. The next screen requires one to select the interface over which this connection
will be established. This is almost always the Cell interface.
Click Next to continue. The next screen provides some general information.
Click Next to continue. The next screen lists all the changes that have been made by this wizard. Click
Submit to commit these changes on Orbit.
The IPsec panel includes configuration for IPsec policy and connection settings. When VPN wizard is
used for configuration, it automatically configures the IPsec policy (<name>_<type>_ipsec_policy), IPsec
connection (<name>_<type>) based on specified VPN name.
Following additional parameters are available for configuration in IPsec policy and connection entries:
Connection Type – net-to-net or host-to-host.The net-to-net type signifies IPsec tunnel mode. The
host-to-host type signifies the IPsec transport mode.
Life Time – 15-1440. The time interval, in minutes, after which the IPsec security association
expires.
Failure Retry Interval – 1-255. The number of minutes to wait after repeated failed VPN
connections before retrying.
Periodic Retry Interval – 15-255. The periodic attestation time, in minutes. Used only in IMA
connections. See APPENDIX B – Integrity Measurement Authority (IMA).
Inbound Firewall Filter – Apply an existing packet filter to the incoming traffic on this connection.
See section 3.8.8 Access Control List (Packet Filtering / Firewall) for more information. An inbound
filter to the connection must be applied, or no traffic will pass. If a filter hasn’t been created
specifically for the VPN connection, use the preconfigured filter IN_TRUSTED, which allows all
inbound traffic.
Outbound Firewall Filter – Apply an existing packet filter to the outgoing traffic on this connection.
See section 3.8.8 Access Control List (Packet Filtering / Firewall) for more information. An outbound
filter to the connection must be applied, or no traffic will pass. If a filter hasn’t been specifically
created for the VPN connection, use the preconfigured filter OUT_TRUSTED, which allows all
outbound traffic.
Static NAT – Apply an existing static Network Address Translation (NAT) rule set to the connection.
See 3.8.11 Static NAT for more information
NOTE The VPN connections that are configured using the VPN service menu cannot be modified
using the VPN wizard.
During initial configuration set failure-retry-interval to lowest value of 1 min, to have Orbit attempt
connection more quickly. This allows debugging of any connection-related issue by watching logs on
peer side etc. Be sure to change this value to 5 minutes or higher to prevent excessive attempts and traffic.
Commit configuration to save the changes.
% commit
Following shows IKE policy configuration for public-key encryption based authentication method:
1. Create IKE policy with auth-method “public-key encryption”.
% set services vpn ike policy IKE-POLICY-1 auth-method pub-key
2. Configure Public Key Infrastructure (PKI) security credentials.
d. Certificate type as “rsa” if RSA public key encryption based certificates are being used.
e. Client certificate ID – This is the ID that was assigned to the client certificate obtained via
SCEP or loaded manually (assumed to be ID-1).
f. Client private key ID – This is the ID that was assigned to the client private key generated
during SCEP procedure or loaded manually (assumed to be ID-1).
g. Certificate Authority (CA) certificate ID – This is the ID that was assigned to the CA certificate
obtained via SCEP or loaded manually (assumed to be CA-1).
% set services vpn ike policy IKE-POLICY-1 pki cert-type rsa
% set services vpn ike policy IKE-POLICY-1 pki cert-id ID-1
% set services vpn ike policy IKE-POLICY-1 pki key-id ID-1
% set services vpn ike policy IKE-POLICY-1 pki ca-cert-id CA-1
Firewall Configuration
The VPN wizard automatically configures the firewall to allow incoming and outgoing IKE/IPsec traffic
over the Cell/WAN interface. However, when VPN is configured manually via Services->VPN->Basic
Config menu or via CLI, the firewall needs to be manually configured as well:
1. Add following rules to IN_UNTRUSTED filter that is applied to the Cell interface in the incoming
direction:
% set services firewall filter IN_UNTRUSTED rule 1 match protocol icmp
2. Add following rules to OUT_UNTRUSTED filter that is applied to the Cell interface in the outgoing
direction:
% set services firewall address-set CELL-IP
% set services firewall filter OUT_UNTRUSTED rule 1 match src-address address-set CELL-IP
% set services firewall filter OUT_UNTRUSTED rule 1 match src-address add-interface-address
true
% set services firewall filter OUT_UNTRUSTED rule 1 actions action accept
% set services firewall filter OUT_UNTRUSTED rule 2 match protocol all
% set services firewall filter OUT_UNTRUSTED rule 2 actions action drop
NOTE See section 3.8.20 Network Link failover/failback for GRE/IPsec VPN configuration examples.
See section 12.0 APPENDIX G for more VPN configuration examples like DMVPN etc.
Monitoring
Using the Web UI
To view the VPN status, navigate to Services->VPN-> Status.
Under IPsec panel, click on the IPsec security association row to view the detailed status.
Ping the back-office PC from the local device to make sure the traffic is passing between device and PC.
> ping 192.168.2.1
PING 192.168.1.2 (192.168.2.1) 56(84) bytes of data.
64 bytes from 192.168.2.1: icmp_req=1 ttl=63 time=389 ms
64 bytes from 192.168.2.1: icmp_req=2 ttl=63 time=161 ms
Troubleshooting
The following are common reasons for VPN connection failure:
1. Invalid certificate or keys loaded on the device
2. Time not synchronized on the device. Note that after cell connection is established, device can take
few minutes to sync time from NTP server. VPN connection will not succeed until time is
synchronized.
3. Mismatch in cipher suites configured for IKE policy on device and peer VPN gateway.
4. Mismatch in cipher suites configured for IPsec policy on device and peer VPN gateway.
5. Mismatch in remote and local IP subnets configured for IPsec connection on device and peer VPN
gateway. Note the following:
For device
- remote ip subnet = back-office subnet
- local ip subnet = local LAN or WIFI subnet on device
For VPN gateway
- remote ip subnet = device’s local LAN or WIFI subnet
- local ip subnet = back-office subnet on device
3.8.13 DHCP Service
Understanding
The unit can be configured to act as a DHCP server. When enabled, this service will respond to DHCP
requests from any interface.
As a DHCP server, the unit can assign either IPv4 or IPv6 addresses to clients
NOTE At least one of the unit’s interfaces (ETH1, ETH2, WiFi or Bridge if the interface is bridged)
must be configured with an IP address from the subnet of the configured DHCP.
Monitoring
For the WebUI refer to the DHCP Menu as illustrated in Figure
From the CLI in operational mode. Follow the example below to view the DHCP leases.
NOTE Once a terminal-server is enabled on a COM port, the port stays in data mode and the CLI will
not be available on that port. To break out of data mode, the escape sequence +++ can be
entered on the PC’s keyboard. The baud rate and format must match on the PC and on the unit
for the escape sequence to be detected. Once the sequence is detected, the login prompt is
presented as long as the port is enabled for console access.
Basic Setup of UDP Terminal Server
Configuring
The following shows how to enable a UDP terminal server on COM1. Navigate to Serial ---> Basic
Config / Terminal Server
Monitoring
Each Terminal server has the same statistic information. Navigate to terminal server and select the server.
For example for a COM1 server - navigate to Serial ---> Basic Config / Terminal Server and then click
on COM1. The Terminal Service Status will be located at the end of the Server Details.
Configuration
Using the WebUI
Navigate to Services->Remote Management and click the Basic Config tab.
Firmware Reprogramming
Address 230.4.4.1 UDP Port 1044
Address Range 230.5.5.0 – 230.5.5.255 UDP Port 1044
UDP Port 40010
Web Proxy
TCP Port 4580
TCP Port 8080
The following options are present on the Basic Config menu.
General
Enabled – Enables the Remote Management Service. Enabled by DEFAULT.
Interfaces – Enter one or more network interfaces on which the Remote Management Service
should run. If a desired network interface is present in a bridge, you must enter the bridge’s
name in this field.
Shared Secret – A shared secret used to allow remote connections to or from the device. It
must be the same on both sides of the connection. For greater security, we recommend that
you change this password and do not use the default. DEFAULT rmadmin
Firmware
Enabled – Enables the unit to either push firmware to other Orbit devices on the network, or
receive firmware pushed by other devices. This feature must be enabled on both sending and
receiving devices. Enabled by DEFAULT.
Web Proxy Client
Enabled – Enables the unit to open a web UI session on a remote Orbit device. The remote
device must have the Web Proxy Server feature enabled. Enabled by DEFAULT.
Web Proxy Server
Allow Client Connection – Allows other Orbit devices on the network that have enabled the
Web Proxy Client to open a remote web UI session to this unit. Enabled by DEFAULT.
To initiate a remote web proxy or over the air reprogramming session, access the Actions menu at
Services->Remote Management->Actions.
Figure 3-202 Cancel Remote Session and Reboot Remote Devices options
To cancel an active remote reprogramming or web proxy session, expand the Cancel Session menu and
click Perform Action.
Reboot Remote Devices sends a request across the selected interface for all Orbit units on the network to
reboot to the specified image version. The Remote Management Service must be enabled on each remote
radio in order for them to receive the request.
Interface – The network interface on which to transmit the reboot request. If a desired
network interface is present in a bridge, you must enter the bridge’s name in this field.
Image Version – Select either onboard firmware version. Each remote Orbit unit that receives
the request will reboot to this version of firmware if it is present. If the remote unit does not
currently have the specified firmware version, it will ignore the reboot request.
Monitoring
To view the current Remote Management status, ensure that the CLI is in operational mode.
% show services remote-management-status
services remote-management-status web-proxy-client status disabled
services remote-management status web-proxy-server status operating
Ingress Egress
IPv4 Classifiers Packet Queue
Interface Interface
Configuring
In the web UI, the QoS service is configured under QoS Services ---> Basic Config.
% set services qos policy HTB shaping-htb class GOOSE priority 0 committed-rate 100 max-
rate 800 classifier [ GOOSE ]
% set services qos policy HTB shaping-htb class VIDEO priority 1 committed-rate 200 max-rate
400 classifier [ VIDEO ]
% set services qos policy HTB shaping-htb class OTHER priority 16 committed-rate 500 max-
rate 800
% set services qos policy HTB shaping-htb committed-rate 800 max-rate 800 default-class
OTHER
% set services qos enabled true
% commit
% set services qos classifier DST-IP match 1 ipv4 dst-address address 192.168.2.10/32
% set services qos policy DSCP-POLICY modify dscp value 16
% commit
In the Web UI these are provided on the screen by Navigating to: SNMP Agent ---> Advanced Config.
Filling in the parameter values can be accomplished via the CLI using the following commands:
% set services snmp community public sec-name public
2. Create VACM group named “all-rights” and a view named “internet”
The VACM determines whether a SNMP request that has been authenticated by matching community
security name (in case of SNMP v1/v2c) or by USM (in case SNMP v3) is authorized to access the
MIB object that is contained in the request.
VACM view: A VACM view is a MIB view that includes an OID subtree value and a type that
determines if the OID subtree is included or excluded from the view. For example in the case below,
the view name is “internet” with subtree OID value of 1.3.6.1 and type “included”. This view
basically includes all OIDs at or below 1.3.6.1 OID subtree.
MDS 05-6632A01, Rev. F MDS Orbit MCR/ECR Technical Manual 305
On the Web UI, on the SNMP main screen scroll down to the bottom and click on VACM and
set/verify the parameters. These parameters are nested and an example shown below:
Type: Choices: (click on the box or select from the choices pulldown)
- Included (DEFAULT) – The family of subtrees is included in the MIB view
- Excluded – The family of subtrees is excluded in the MIB view
Filling in the VACM View parameter values can be accomplished via the CLI using the following
commands:
% set services snmp vacm view internet subtree 1.3.6.1 included
VACM group - A VACM group is used to organize a set of users (in case of SNMP v3) or a set of
community security names (in case of SNMP v1 and v2c) for the purpose of managing their access
rights to MIB parameters (OIDs). For example in the case below, the group name is “all-rights” with
one member whose security name is “public” (as defined in snmp community configuration earlier)
and whose “security model “ is v1 and v2c. In addition, the “all-rights” group has access to “internet”
view under “any” security model and “no-auth-no-priv” security level. That is, the members of “all-
rights” group can access internet view without any authentication (auth) or encryption (priv).
Filling in the VACM Group parameter values can be accomplished via the CLI using the following
commands:
% set services snmp vacm group all-rights member public sec-model [v1 v2c ]
% set services snmp vacm group all-rights access any no-auth-no-priv read-view internet
3. Click “Save” on the Web UI.
Via the CLI using the following commands:
% commit
Configuring the SNMP agent for v3-only operation (w/ Authentication and
Encryption)
The example below assumes SNMP agent has factory default configuration (see section “Default
Configuration on Page 303”).
1. Disable v2c and enable v3
Click on the Add button in the User table and then enter “User 1”. Once done, click the Add button. This
will then prompt the user for additional information.
5. Once finished, click the Add button, which will present additional configurable fields.
Sec Model - The security models under which this security Name (i.e. USM) is a member of this
group.
7. Next, assign the “internet” SNMP view as the Read View of the “usm” Access Sec Model.
Read View - The name of the MIB view of the SNMP context authorizing read access.
Write View - The name of the MIB view of the SNMP context authorizing write access.
Notify View - The name of the MIB view of the SNMP context authorizing notify access.
8. Filling in the VACM Group parameter values can be accomplished via the CLI using the following
commands:
% set services snmp vacm group secure member User1 sec-model [usm]
% set services snmp vacm group secure access usm auth-priv read-view internet
9. Commit configuration
Each entry above specifies a SNMP notify name (e.g. std_v1_trap), the tag (e.g. std_v1_trap) and the type
of notification (trap or inform). The notify and tag names are kept the same for ease of configuration of
SNMP targets. The SNMP notify name is used to lookup up the tag (in notify table) that in turns is used
to look up all the SNMP targets (in target table) to which the SNMP notification needs to be sent.
Each event in the Orbit system can be configured to send an SNMP notification (trap/inform). By default,
all events are configured to send SNMP notification with SNMP notify name of “” (empty string). This
selects all tags in the notify table and attempts to lookup the targets that have been configured for these
tags. The user can also configure the SNMP notify name to be used for each event.
Sending all system events as SNMP v1 traps
Following example shows how to configure the unit to send v1 traps for all the events in the system to a
specified SNMP target:
1. Ensure version v1 is enabled.
Filling in values can be accomplished via the CLI using the following commands:
% set services snmp vacm group all-rights access any no-auth-no-priv notify-view internet
4. Click “Save” on the Web UI.
Via the CLI using the following commands:
% commit
To test above configuration, start an SNMP trap receiver (like “snmptrapd” with configuration file as
shown below) and generate “ssh_login” event by logging into the Orbit via SSH.
snmptrapd.conf:
engineID testing
snmpTrapdAddr 0.0.0.0:5000
authCommunity log,execute,net public
doNotFork yes
$ snmptrapd -M +./ -Lo -c snmptrapd.conf
NET-SNMP version 5.4.3
Monitoring
Ensure the CLI is in operational mode. Check SNMP agent status
> show SNMPv2-MIB
The above configuration will indicate that the link is down (or up) if 6 successive pings fail (or succeed).
Enabled - Whether or not to run this operation
Type - Type of monitor operation
Icmp Echo Monitor
- Dst Host - Destination IP address or DNS name to send icmp-echo to.
- Src Address - Source address to use for icmp-echo request
- Interval - Time interval (in seconds) between icmp-echo requests. Value range [1..86400]
DEFAULT=5
- Timeout - Time to wait (in milliseconds) for icmp-echo response. Value range [1..5000]
DEFAULT=2000
SCADA Master
BACKOFFICE
R1 configured to terminate GRE (and IPsec) 10.10.1.0/24
tunnels from remotes over cell.
Static routes configured for REMOTE#1:
10.10.6.0/24 -> towards AP (primary) 192.168.1.0/24
192.168.1.4 10.150.1.1
10.10.6.0/24 -> towards GRE-TUN (backup)
Static routes configured for REMOTE#2: R1
10.10.7.0/24 -> towards AP (primary)
10.10.7.0/24 -> towards GRE-TUN (backup)
Failover to Cell enabled by checking primary
route’s reachability by pinging remote’s NX
interface.
ETH
AP
Bridge Cellular Network
NX
Figure 3-226. SCADA Back-office to Remote MCR NX+CELL redundant setup using routing
In above use case, the SCADA back-office application sends/receives data to/from a remote asset
connected to remote MCR (called REMOTE hereafter) that has both 900 MHz radio (NX) and Cellular
radio options. The IP packets sent by back-office application to the remote asset are normally routed by
the back-office router (R1) towards MCR configured as the NX AP (called AP hereafter). The IP packets
sent by remote asset to the back-office application are normally routed by the REMOTE towards the AP.
Both R1 and REMOTE verify the primary link (NX) connectivity by sending periodic ICMP echo
requests (pings). In the event that N (configurable) successive pings are lost, both R1 and REMOTE
update their routing tables to direct traffic over cellular network instead. Both still keep checking the
primary link connectivity. Once primary link connectivity is restored (i.e. N successful pings), both R1
and REMOTE update their routing tables to direct traffic back over NX network.
The above setup on remote MCR is facilitated by following functionality available on the unit:
1. Ability to configure multiple routes towards back-office network with different preference values.
The primary route towards back-office network over NX is configured with lower preference value
(lower the value more preferred the route) than secondary route towards back-office network over
Cellular.
2. Ability to associate the primary route with verify-reachability operation, which checks the
reachability of the back-office network via this route. The reachability check is done by configuring
a NETMON service operation, which checks connectivity based on either the link status of the
primary interface (NX) or on ICMP ECHO requests (pings) towards a host reachable via the
Figure 3-227. MCR to MCR NX+CELL redundant network (layer-3) setup using routing
In above use case, a remote asset (e.g. RTU) connected to AP can send/receive data to/from another
remote asset connected to a REMOTE. Both, AP and REMOTE MCR have 900 MHz radio (NX) and
Cellular radio options. The NX interface is configured as a routed interface (i.e. outside of the Bridge).
All REMOTEs have non-overlapping LAN subnet configuration. The IP packets sent by remote asset
connected to AP are normally routed by the AP towards the REMOTE over the NX interface. The IP
packets sent by remote asset connected to REMOTE are normally routed by the REMOTE towards the
AP over the NX interface. Both AP and REMOTE verify the primary link (NX) connectivity by sending
periodic ICMP echo requests (pings). In the event that N (configurable) successive pings are lost, both AP
and REMOTE update their routing tables to direct traffic over cellular network instead. Both still keep
checking the primary link connectivity. Once primary link connectivity is restored (i.e. N successful
pings), both AP and REMOTE update their routing tables to direct traffic over NX network.
The above setup is facilitated by same functionality as described in previous section.
RTU
NX configured as layer-2 interface in the bridge
with ETH (192.168.1.0/24 network).
Cell configured with APN that provides static IP 192.168.1.0/24
address.
ETH
GRE configured as layer-2 interface over Cell in
the bridge with NX and ETH (192.168.1.0/24
BRIDGING FUNCTION
network).
STP disabled on Bridge. AP
(Optional) IPsec configured over Cell to provide GRE-TUN
security.
NX CELL
The failover happens at the remote.
Cellular Network
Figure 3-228. MCR to MCR NX+CELL redundant network (layer-2) setup using Bridging and
Bonding
In above use case, a remote asset (e.g. RTU) connected to AP can send/receive data to/from another
remote asset connected to a REMOTE. Both, AP and REMOTE MCR have 900 MHz radio (NX) and
Cellular radio options. This is a typical NX setup where LAN networks connected to both AP and
REMOTEs are bridged to enable Ethernet communication between any remote assets on the LAN
networks. A layer-2 GRE tunnel (ETHERNET-OVER-GRE mode) is setup over Cell. The redundant
layer-2 link between AP and REMOTE is achieved by use of a BOND interface on the REMOTE.
A BOND interface bonds two layer-2 interfaces together and presents them as a single layer-2 interface to
the rest of the system. Specifically, the BOND interface in active-backup mode enables redundancy
between the enslaved interfaces by activating the secondary member link when primary link goes down.
On each REMOTE, the BOND interface bonds NX interface (primary) with GRE layer-2 tunnel interface
(secondary) and is itself bridged with the LAN interface. On the AP, the NX and layer-2 GRE tunnel
interfaces are bridged with the LAN interface.
NOTE Since the AP and REMOTEs are now part of a single layer-2 network, the bridge interfaces
need to be assigned distinct IP addresses.
REMOTE#1 Configuration
Configure IPsec tunnel
% set services vpn enabled true
% set services vpn ike policy AP_ike_policy auth-method pre-shared-key
% set services vpn ike policy AP_ike_policy pre-shared-key remote1
% set services vpn ike policy AP_ike_policy ciphersuite ike_policy_cipher0
% set services vpn ike policy AP_ike_policy life-time 180
% set services vpn ike policy AP_ike_policy reauth true
% set services vpn ike peer AP_ike_peer ike-policy AP_ike_policy
% set services vpn ike peer AP_ike_peer local-endpoint address 10.150.1.10
% set services vpn ike peer AP_ike_peer local-identity default
% set services vpn ike peer AP_ike_peer peer-endpoint address 10.150.1.1
% set services vpn ike peer AP_ike_peer peer-identity default
% set services vpn ike peer AP_ike_peer role initiator
% set services vpn ike peer AP_ike_peer initiator-mode on-demand
% set services vpn ipsec policy AP_ipsec_policy ciphersuite ipsec_policy_cipher0
% set services vpn ipsec policy AP_ipsec_policy life-time 60
% set services vpn ipsec connection AP ike-peer AP_ike_peer
% set services vpn ipsec connection AP ipsec-policy AP_ipsec_policy
% set services vpn ipsec connection AP host-to-host
% set services vpn ipsec connection AP filter input IN_TRUSTED
% set services vpn ipsec connection AP filter output OUT_TRUSTED
Configure GRE tunnel interface
% set interfaces interface GRE-AP type gre
% set interfaces interface GRE-AP gre-config mode ethernet-over-gre
REMOTE#2 Configuration
Configuration is similar to REMOTE#1.
The user can control the routes that are imported into the routing table from the routing protocol and those
that are exported into the routing protocol from the routing table by using route filters.
The import route filter controls the routes that are imported into the routing table by the routing protocol.
By default, the routing protocol allows all routes received from the peer router to be imported into the
routing table. That is, if no import filter is configured, default action is ACCEPT.
The export route filter controls the routes that are exported into the routing protocol from the routing
table. By default, the routing protocol prevents export of any routes from the local routing table to the
peer router. That is, if no export filter is configured, default action is NONE.
A route filter consists of one or more rules sorted by a numeric identifier. Each rule in route filter consists
of ‘match’ and ‘actions’ configuration. The parameters in the match are compared against the route being
imported (if this route filter is used as import filter) or exported (if this route filter is used as export filter)
into/from the routing table. If the route matches, the action (ACCEPT OR REJECT) specified in the
actions configuration is applied.
When routing protocol receives a route from the peer router it checks whether the route is allowed by the
import filter by comparing it against one or more rules configured in the filter (in order of their
configuration). If any rule matches, the corresponding action (ACCEPT or REJECT) is applied. Similarly,
for each route in the routing table, the routing protocol checks whether it is allowed by the export filter
before exporting it to the peer routers. In addition, some general attributes of the route like NEXT-HOP or
routing protocol specific attributes like BGP AS-PATH, LOCAl-PREF etc can be modified when
exporting routes using ‘set’.
Use Cases
The figure below describes one of the use cases for dynamic routing on the unit. In this case, dynamic a
routing protocol is used to exchange locally connected LAN route with a router in the back-office (and
vice versa) over the Cellular WAN interface. Both OSPF and RIP exchange routing updates with peers
SCADA Master
BACKOFFICE
10.10.40.1.0/24
Cellular Network
CELL CELL
GRE configured as routed interface over Cell
(Optional) IPsec transport mode configured REMOTE-1 GRE-TUN REMOTE-2 GRE-TUN
over Cell to secure GRE traffic.
RIP or OSPF configured to export LOCAL ROUTER FUNCTION ROUTER FUNCTION
LAN route (10.10.6.0/24) and import routes
ETH ETH
sent by back-office router.
10.10.6.0/24 10.10.7.0/24
RTU RTU
Configuring
Following example shows how to create a route filter to export route for a directly connected local LAN
(i.e. direct/interface route for Bridge interface for a unit with factory default configuration).
Navigate to Routing-> Basic Config->Route filters
Click ‘Add’ to create a route filter named LOCAL_LAN.
Monitoring
Navigate to Routing-> Status
The user can check the routing table in the ‘General’ panel to ensure a dynamic route for the back-office
has been received from the back-office router.
The ‘RIP’ panel, displays the state of RIP routing protocol including route import/export statistics.
Using CLI
In operational mode, enter following commands:
OSPF
The basic OSPF configuration consists of enabling the protocol, creating backbone area 0.0.0.0 and
adding interfaces to this area on which the protocol should operate and configuring an export filter. In
addition, MD5 authentication can be used to secure routing protocol updates on per-interface basis. In the
example below, OSPF is enabled with area 0.0.0.0 containing GRE interface along with LOCAL_LAN as
the export filter.
Navigate to Routing-> Basic Config->OSPF
Select ‘LOCAL_LAN’ as the export filter.
Using CLI
In configuration mode, enter following commands:
348 MDS Orbit MCR/ECR Technical Manual MDS 05-6632A01, Rev. F
% set routing ospf enabled true
% set routing ospf export-filter LOCAL_LAN
% set routing ospf area 0.0.0.0 interface GRE
% commit
Monitoring
Navigate to Routing-> Status
The user can check the routing table in the ‘General’ panel to ensure a dynamic route for the back-office
has been received from the back-office router.
The ‘OSPF’ panel, displays the state of OSPF routing protocol including route import/export statistics and
other OSPF protocol status.
The ‘Lsa’ table displays all link state advertisements (LSAs) received by this router.
Using CLI
In operational mode, enter following commands:
> show routing-state routes
OUTGOING
DEST PREFIX NEXT HOP INTERFACE SOURCE
---------------------------------------------------------------------------------------------------------
0.0.0.0/0 172.18.175.129 Cell kernel
10.10.6.0/24 - Bridge kernel
10.10.40.0/24 - GRE dynamic
172.18.175.128/28 - Cell kernel
ADV
SCOPE TYPE LS ID ROUTER AGE SEQUENCE CHECKSUM
-------------------------------------------------------------------------------------------------------------------------------------
Global 0005 10.10.40.0 2.2.2.2 1012 80000001 105e
Global 0005 10.10.6.255 10.10.6.1 1014 80000001 cb9a
Area 0.0.0.0 0002 192.168.1.4 2.2.2.2 966 80000002 049b
Area 0.0.0.0 0001 2.2.2.2 2.2.2.2 966 80000004 8785
Area 0.0.0.0 0001 10.10.6.1 10.10.6.1 967 80000002 d25b
BGP
The basic BGP configuration consists of adding a neighbor entry for each peer and configuring an export
filter. BGP can operate in two modes: External BGP (EBGP) and Internal (IBGP). EBGP is used between
BGP routers that are in different Autonomous (AS) systems and IBGP is used between BGP routers in the
same ASes (to redistribute routes learned from external BGP routers to internal BGP routers). The mode
is not configured explicitly but is activated based on AS number configuration for the local BGP router
and the neighbor. When the AS number is different, BGP operates in EBGP mode and when it is the same
it operates in IBGP mode. In the example below, BGP is configured with one external neighbor with
LOCAL_LAN as the export filter.
Navigate to Routing-> Basic Config->BGP
Select ‘LOCAL_LAN’ as the export filter.
NOTE Please see section 12.2.2.1 for an example on use of BGP to exchange routes over DMVPN
network.
Using CLI
In configuration mode, enter following commands:
% set routing bgp neighbor PRIMARY-HUB peer-address 172.16.0.1
% set routing bgp neighbor PRIMARY-HUB enabled true
MDS 05-6632A01, Rev. F MDS Orbit MCR/ECR Technical Manual 353
% set routing bgp neighbor PRIMARY-HUB export-filter LOCAL_LAN
% set routing bgp neighbor PRIMARY-HUB local-as 65550
% set routing bgp neighbor PRIMARY-HUB peer-as 65500
% set routing bgp neighbor PRIMARY-HUB hold-time 30
% set routing bgp neighbor PRIMARY-HUB keepalive-time 10
Monitoring
Navigate to Routing-> Status
The user can check the routing table in the ‘General’ panel to ensure a dynamic route for the back-office
has been received from the back-office router.
Using CLI
In operational mode, enter following commands:
>show routing-state bgp
GPS 97-3194A25
GPS 97-3194A33
NOTE A GPS equipped unit has a dedicated GPS antenna port which provides 3.3V, 100mA max DC
bias and can be used with active GPS antennas.
Configuring
Navigate to Services->GPS Service--> Basic Config
The GPS service has very minimal configuration. The user simply has to enable the GPS service for it to
start collecting data from the first detected GPS data source in the system. If there are more sources in the
system, then user can select the specific data source by configuring the ‘source’ parameter.
To apply configuration, click Save.
Using CLI
% set services gps enabled true
% commit
Monitoring
Navigate to Services --> GPS Service --> Status
NOTE In firmware versions prior to 4.x.x, the user might need to click the refresh symbol next to
‘DDNS service’ to make the URL field show up after Provider = ‘Other’ is selected.
To apply configuration, click Save.
Using CLI
% set services ddns enabled true
% set services ddns provider dyn.com
% set services ddns hostname pump1.dyndns.org
% set services ddns username test
% set services ddns password test123
% set services ddns interface Cell
Monitoring
Navigate to Services--> DDNS Service--> Status
Office
Backup
Configuration
VRRP can be enabled on select interfaces, including Ethernet, Bridge, and VLAN interfaces. For
example:
configure
The following items are configurable VRRP settings for each interface:
enabled – whether or not VRRP is enabled on the interface
address – the Virtual IP (VIP) assigned to the physical routers in a VRRP group.
subnet-mask – corresponding subnet-mask to the VIP
id – a numeric value that indicates which VRRP group this router belongs to.
priority – each physical router in a group gets its own priority. The higher the number, the
higher the priority that the physical router will be become the Master during negotiation.
advertisement-interval – The Master router advertises its presence to the Backups. This
controls the frequency of those advertisements.
preemption – whether or not to allow higher priority routers become Master when they come
online.
All physical routers in a VRRP group must be configured with same VIP address/subnet and id. Each
router should have a unique priority value. Lastly, each router could have an additional, unique, IP/subnet
on the same interface that VRRP is running on to facilitate administration and diagnostics.
Monitoring
Read-only parameters for interfaces with VRRP show the state of the router:
show interfaces-state interface ETH2 vrrp
3.8.25 IP Passthrough
Understanding
This service enables an outside interface's (e.g. Cell) IP address to be passed through to a device
connected to an inside interface (e.g. Bridge) of Orbit, making Orbit act as a simple modem (like a
traditional cable modem). The pass through service also enables user to configure certain traffic to be
terminated at Orbit (for example, management) instead getting passed through. This service is typically
used for Orbit devices with cellular interfaces where the Orbit is connected to the end-device via LAN
and the IP address received from the cellular network needs to be passed to the end-device so it can be
accessed using that address from the network.
Configuration
Using Web UI
Navigate to Services->IP Passthrough->Basic Config.
Click ‘Enable” to enable the passtrough service.
Add any local service that needs to be captured and terminated at the Orbit itself instead of getting passed
through to the attached end-device. This is typically required to enable remote management of Orbit
itself. The example below shows, SSH service being added as a local service. With this configuration any
traffic destined for the cellular address on port 22 will be routed to Orbit instead of getting passed through
to the end device. One can similarly configure entries for HTTP (TCP port 80) or HTTPS (tcp port 443)
to enable remote access to Orbit’s Web UI.
Using CLI
In configuration mode, enter following commands:
% set services ip-passthrough enabled true
% set services ip-passthrough local-service SSH protocol tcp port 22
% set services ip-passthrough local-service HTTP protocol tcp port 80
% set services ip-passthrough local-service HTTPS protocol tcp port 443
% commit
Monitoring
Using Web UI
Navigate to Services->IP Passthrough->Status
Deleting
The device may delete a private key by clicking the Delete button on the web user interface or using the
CLI in operational mode. See the following example for deleting private keys via the CLI:
> request pki private-keys delete key-identity generated_key_2048
Monitoring - Generation
Once the generation is begun, the process may be cancelled by clicking the Cancel Generation button.
The current status of the generation process is displayed on the web page. Note that the web page does not
display the current status if the device has not been instructed to generate a private key (in other words, if
the state is “inactive”).
Configuring - Import
The following example shows how to have the device import a private key by uploading a local file
through the web browser.
Navigate to the Private Keys section in Certificate Management / Basic Config.
Click on the Add button, and then click on the Begin Importing button once the key identity, the
optional key passphrase, and the file source are configured.
Monitoring - Import
Once the import of a private key is begun, the process may be cancelled by clicking the Cancel Import
button. The current status of the import process is displayed on the web page. Note that the web page does
not display the current status if the device has not been instructed to import a private key (in other words,
if the state is “inactive”).
3.9.3 CA Certificates
The device can manually import CA certificates or obtain them via the SCEP protocol.
From the WebUI, navigate to Certificate Management / Basic Config. The CA Certificates section
shows the CA certificates currently loaded into the device.
Configuring
The following example shows how to have the device import a CA certificate by uploading a local file
through the web browser.
Navigate to the CA Certificates section in Certificate Management / Basic Config.
Click on the Add button, and then click on the Begin Importing button once the certificate identity and
the file source are configured.
Monitoring - Import
Once the import of a CA certificate is begun, the process may be cancelled by clicking the Cancel
Import button. The current status of the import process is displayed on the web page. Note that the web
page does not display the current status if the device has not been instructed to import a CA certificate (in
other words, if the state is “inactive”).
Deleting
The device may delete a client certificate by clicking the Delete button on the web user interface or using
the CLI in operational mode. See the following example for deleting CA certificates via the CLI:
> request pki client-certs delete cert-identity imported_client_cert_2048
Configuring
The following example shows how to have the device import a client certificate by uploading a local file
through the web browser.
Navigate to the Client Certificates section in Certificate Management / Basic Config.
Click on the Add button, and then click on the Begin Importing button once the certificate identity and
the file source are configured.
Monitoring - Import
Once the import of a client certificate is begun, the process may be cancelled by clicking the Cancel
Import button. The current status of the import process is displayed on the web page. Note that the web
MDS 05-6632A01, Rev. F MDS Orbit MCR/ECR Technical Manual 373
page does not display the current status if the device has not been instructed to import a CA certificate (in
other words, if the state is “inactive”).
Deleting
The device may delete a firmware certificate by clicking the Delete button on the web user interface or
using the CLI in operational mode. See the following example for deleting CA certificates via the CLI:
> request pki firmware-certs delete cert-identity firmware_cert_2048_delete_me
Configuring
The following example shows how to have the device import a firmware certificate by uploading a local
file through the web browser.
Navigate to the Firmware Certificates section in Certificate Management / Basic Config.
Click on the Add button, and then click on the Begin Importing button once the certificate identity and
the file source are configured.
Monitoring - Import
Once the import of a firmware certificate is begun, the process may be cancelled by clicking the Cancel
Import button. The current status of the import process is displayed on the web page. Note that the web
page does not display the current status if the device has not been instructed to import a firmware
certificate (in other words, if the state is “inactive”).
NOTE In addition to the LEDs listed on the previous page, the Ethernet connector has two embedded
LEDs. A yellow indicates a link at 100 Mbps operation. A flashing green indicates Ethernet
data traffic.
Ethernet Port(s)
RJ-45 10/100 Mbps Auto-MDIX
Serial Port(s)
RJ-45, supporting RS-232/RS-485
LAN Protocols
802.3 (Ethernet) 802.1D (Spanning Tree) TCP/IP, DHCP, ICMP, IGMP, FTP, TFTP,
SFTP, UDP, SNMP, VPN, VLAN
Networking
DHCP, Port Forwarding, NAT, VLAN, SNMP
Configuration
Serial console, SSH, HTTP/HTTPS, Configuration files
Security
Encryption, Password access, Radius, Firewall, SCEP, VPN
Physical
Size
8.0” long (20.32 cm), 4.8” wide (12.192 cm), 1.75” High (4.445 cm)
Housing
Die-cast Aluminum
Weight
2 lbs. (without mounting hardware)
Environmental
Operating Temperature Range
-40°C to +70°C
NOTE Operating temperature range may be reduced based on model configuration. See product label
for detail.
Caution: This device may exceed safe handling temperatures when operated in an ambient temperature
above 55°.
Agency/Regulatory Approvals
FCC
WiFi – M4Y-ZCN722MV1
4G cell (E4V) – PKRNVWE362
3G Cell – RI7HE910
4G cell (4G1..4G5) – N7NMC7355
4G cell (4GP) – N7NMC7354B
NX915 – E5MDS-NX915
LN400 – E5MDS-LN400
LN900 – E5MDS-LN900
IC - Industry
WiFi – 3195A-ZCN722MV1
4G cell (E4V) - 3229B-E362
3G Cell – 5131A-HE910
NX915 – 101D-NX915
LN400 – 101D-LN400
LN900 – 101D-LN900
3G Cell
GSM/GPRS/EDGE 850/900/1800/1900 MHz
UMTS/HSPA/HSPA+ 800/850, 900, AWS1700, 1900, 2100 MHz
FCC ID
E5MDS-LN400
IC
101D-LN400
FCC ID
E5MDS-LN900
IC
101D-LN900
[edit]
% commit
Commit complete.
[ok][2012-06-19 00:57:01]
6.6 Tab-Completion
Tab-completion is a powerful feature that presents CLI users with assistance while typing. Depending on
the text that was already typed, tab-completion will display different possible completions.
When the tab key is pressed and no text has been typed, the CLI shows all of the possible commands that
can be typed, as shown below. In this example, the CLI is in configuration mode and the following
commands are relevant to configuration mode only.
%
Possible completions:
annotate - Add a comment to a statement
commit - Commit current set of changes
compare - Show configuration differences
copy - Copy a dynamic element
delete - Delete a data element
edit - Edit a sub-element
exit - Exit from this level
help - Provide help information
insert - Insert a parameter
move - Move a parameter
quit - Exit from this level
rename - Rename an identifier
request - Make system-level requests
resolved - Conflicts have been resolved
revert - Copy configuration from running
rollback - Roll back database to last committed version
run - Run an operational-mode command
set - Set a parameter
show - Show a parameter
status - Display users currently editing the configuration
tag - Manipulate statement tags
top - Exit to top level and optionally run command
up - Exit one level of configuration
validate - Validate current configuration
When the tab key is pressed after a typed command, then the CLI will show the user all the possible
options that are pertinent to that command. In the example below the tab key was pressed after the word
“set“. The list of possible completions is shown to user.
% set
Possible completions:
SNMP-Community-MIB
SNMP-Target-MIB
MDS 05-6632A01, Rev. F MDS Orbit MCR/ECR Technical Manual 395
SNMP-User-Based-SM-MIB
SNMP-View-Based-ACM-MIB
file-servers -
interfaces - Interface parameters.
logging -
pki - Public Key and Certificate Options
routing -
services - Services which are configurable on this system
system - System group configuration
When the tab is key is pressed after the name of a data node that the user is trying to configure, then the
CLI will show the user the format of the data that is acceptable for that data node. In the example below,
the tab key was pressed after the word “search”. In this case, the node “search” can take a list of values
that are IP addresses or strings, each with 0-255 characters.
% set system dns search
Possible completions:
<IP address> <string, min: 1 chars, max: 253 chars>
For example, to only display uid and gid you can do the following:
> show configuration | match "(uid) | (gid)"
uid 1000;
gid 100;
uid 1000;
gid 100;
uid 1000;
gid 100;
uid 1000;
gid 100;
6.15 Commands
The commands available to the user differs, depending on whether the CLI is in operational mode or
configuration mode. The following commands are describe in the next sections:
Operational Mode Commands Configuration Mode Commands
commit annotate
configure commit
exit compare
help copy
ping delete
set
show
status
tag
top
up
validate
exit
show [path]
- Display CLI properties..
run
- Run an operational-mode command.
set
- Set a parameter.
show
- Show a parameter.
status
- Display users currently editing the configuration.
tag <add|clear|del>
tag add <statement> <tag> - Add a tag to a configuration statement.
tag del <statement> <tag> - Remove a tag from a configuration statement.
tag clear <statement> - Remove all tags from a configuration statement.
top
- Exit to top level and optionally run command.
up
- Exit one level of configuration.
validate
- Validates current configuration. This is the same operation as commit check.
7.2 Configuring
The out of band IMA configuration is exactly similar to VPN configuration described in VPN section
except that the IPsec connection is designated specifically as out-of-band IMA connection and local and
remote ip subnet are all set 0.0.0.0/0 as shown below:
% set services vpn ipsec connection IMA-CONN-1 is-out-of-band-ima true
% set services vpn ipsec connection IMA-CONN-1 local-ip-subnet 0.0.0.0/0
% set services vpn ipsec connection IMA-CONN-1 remote-ip-subnet 0.0.0.0/0
% set services vpn ipsec connection IMA-CONN-1 periodic-retry-interval 60
The “periodic-retry-interval” applies only to the IPsec connection designated as an “out-of-band” IMA
connection. The MCR attempts attestation every “periodic-retry-interval” if the previous attempt to
connect with IMA server was unsuccessful.
In case of an out of band IMA server setup, the MCR needs to be configured with an IMA IPsec
connection and a VPN-GWY IPsec connection. An example follows:
connection IMA-CONN-1 {
ike-peer IMA-SERVER;
ipsec-policy IPSEC-POLICY-IMA;
local-ip-subnet 0.0.0.0/0;
remote-ip-subnet 0.0.0.0/0;
is-out-of-band-ima true;
7.3 Monitoring
The current attestation status of the IMA connection is displayed using same command as used to display
regular VPN data connection status. The example on the following page shows that the IMA connection
succeeded but the IMA Evaluation was “non-compliant” and IMA recommendation was “Quarantined”.
This will happen is the system configuration file hash loaded in IMA does not match the actual hash of
the current system configuration, indicating that system configuration was changed since last time the
hash was loaded in the IMA database.
> show services vpn
services vpn ipsec ipsec-status connections connection IMA-CONN-1
state disconnected
failure-reason none
last-timestamp 2013-01-18T21:24:26+00:00
ima-evaluation “non-compliant major”
ima-recommendation Quarantined
8.4 Configuring
The following shows how to configure the unit with a server to which events will be sent:
% set logging syslog server my_syslog_server ip 192.168.1.1 port 1999 protocol tls version
RFC5424 tls-options tls-ca-certificate my_ca_cert tls-client-certificate my_client_cert tls-
client-key my_client_key
8.5 Monitoring
Ensure the CLI is in operational mode. Follow the example below to view the state and statistics:
% show logging event-rules cell_connected
description "cell connection established";
local true;
priority notice;
syslog-facility user;
syslog true;
snmp-notification true;
netconf-notification true;
Usage:
To verify and sign a package:
pkgsigner -v verifycert -k privkey -P password -p pubcert -f infile -o outfile
Channels/Hop Set
A 80 80 27 20 17 14
B 0 0 27 20 15 14
C 0 0 26 20 16 13
D 0 0 0 20 16 13
E 0 0 0 0 16 13
F 0 0 0 0 0 13
Customer
Cellular Network/
network Internet
JUNOS SRX
Orbit
IPsec Tunnel
Local LAN carrying traffic Remote LAN
192.168.1.0/24 between local 192.168.2.0/24
and remote
LANs
The WAN IP address of SRX240 is 172.18.175.40 and Orbit cell ip address is 172.18.175.138.
12.1.1 Orbit
12.1.1.1 Configuration
# Bridge/LAN interface configuration
set interfaces interface Bridge type bridge
set interfaces interface Bridge ipv4 address 192.168.1.1 prefix-length 24
set interfaces interface Bridge filter input IN_TRUSTED
set interfaces interface Bridge filter output OUT_TRUSTED
set interfaces interface Bridge bridge-settings members port ETH1
set interfaces interface Bridge bridge-settings members port ETH2
# IKE/IPsec configuration
set services vpn enabled true
set services vpn ike policy SRX240-IKE-POLICY auth-method pre-shared-key
set services vpn ike policy SRX240-IKE-POLICY pre-shared-key test123
set services vpn ike policy SRX240-IKE-POLICY ciphersuite CS1 encryption-algo aes128-cbc
set services vpn ike policy SRX240-IKE-POLICY ciphersuite CS1 mac-algo sha256-hmac
set services vpn ike policy SRX240-IKE-POLICY ciphersuite CS1 dh-group dh14
set services vpn ike peer SRX240-IKE-PEER ike-policy SRX240-IKE-POLICY
set services vpn ike peer SRX240-IKE-PEER local-identity default
set services vpn ike peer SRX240-IKE-PEER peer-endpoint address 172.18.175.40
set services vpn ike peer SRX240-IKE-PEER peer-identity default
set services vpn ike peer SRX240-IKE-PEER role initiator
set services vpn ipsec policy SRX240-IPSEC-POLICY ciphersuite CS1 encryption-algo aes128-cbc
set services vpn ipsec policy SRX240-IPSEC-POLICY ciphersuite CS1 mac-algo sha256-hmac
set services vpn ipsec policy SRX240-IPSEC-POLICY ciphersuite CS1 dh-group dh14
set services vpn ipsec connection SRX240 ike-peer SRX240-IKE-PEER
set services vpn ipsec connection SRX240 ipsec-policy SRX240-IPSEC-POLICY
set services vpn ipsec connection SRX240 local-ip-subnet 192.168.1.0/24
set services vpn ipsec connection SRX240 remote-ip-subnets [ 192.168.2.0/24 ]
set services vpn ipsec connection SRX240 filter input IN_TRUSTED
set services vpn ipsec connection SRX240 filter output OUT_TRUSTED
# Firewall configuration
set services firewall enabled true
set services firewall address-set CELL-IP
set services firewall filter IN_TRUSTED rule 10 match protocol all
set services firewall filter IN_TRUSTED rule 10 actions
set services firewall filter IN_TRUSTED rule 10 actions action accept
set services firewall filter IN_UNTRUSTED rule 1 match protocol icmp
set services firewall filter IN_UNTRUSTED rule 1 actions
set services firewall filter IN_UNTRUSTED rule 1 actions action accept
set services firewall filter IN_UNTRUSTED rule 2 match protocol udp
set services firewall filter IN_UNTRUSTED rule 2 match src-port
set services firewall filter IN_UNTRUSTED rule 2 match src-port services [ dns ]
set services firewall filter IN_UNTRUSTED rule 10 match protocol udp
set services firewall filter IN_UNTRUSTED rule 10 match dst-port
set services firewall filter IN_UNTRUSTED rule 10 match dst-port services [ ike ntp ]
422 MDS Orbit MCR/ECR Technical Manual MDS 05-6632A01, Rev. F
set services firewall filter IN_UNTRUSTED rule 10 actions
set services firewall filter IN_UNTRUSTED rule 10 actions action accept
set services firewall filter IN_UNTRUSTED rule 11 match protocol esp
set services firewall filter IN_UNTRUSTED rule 11 actions
set services firewall filter IN_UNTRUSTED rule 11 actions action accept
set services firewall filter IN_UNTRUSTED rule 12 match protocol all
set services firewall filter IN_UNTRUSTED rule 12 actions
set services firewall filter IN_UNTRUSTED rule 12 actions action drop
set services firewall filter OUT_TRUSTED rule 10 match protocol all
set services firewall filter OUT_TRUSTED rule 10 actions
set services firewall filter OUT_TRUSTED rule 10 actions action accept
set services firewall filter OUT_UNTRUSTED rule 1 match src-address
set services firewall filter OUT_UNTRUSTED rule 1 match src-address address-set CELL-IP
set services firewall filter OUT_UNTRUSTED rule 1 match src-address add-interface-address true
set services firewall filter OUT_UNTRUSTED rule 1 actions
set services firewall filter OUT_UNTRUSTED rule 1 actions action accept
set services firewall filter OUT_UNTRUSTED rule 2 match protocol all
set services firewall filter OUT_UNTRUSTED rule 2 actions
set services firewall filter OUT_UNTRUSTED rule 2 actions action drop
12.1.1.2 Status
> show services vpn
services vpn ike security-associations security-association 1
name SRX240
state ESTABLISHED
local-host 172.18.175.138
local-id 172.18.175.138
remote-host 172.18.175.40
remote-id 172.18.175.40
initiator true
initiator-spi 6fae9c7ca839c195
responder-spi 63568d4ca1c3d071
ciphersuite AES_CBC-128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
established-time 1
rekey-time 9899
reauth-time 0
services vpn ipsec security-associations security-association 1
name SRX240
state INSTALLED
mode TUNNEL
12.1.2 JUNOS
12.1.2.1 Configuration
The configuration below assumes that interface ge-0/0/0 is the external WAN interface and vlan.0 is the
VLAN interface that includes all LAN ports.
# IKE/IPsec configuration
set security ike proposal IKE-PROP-PSK authentication-method pre-shared-keys
set security ike proposal IKE-PROP-PSK dh-group group14
set security ike proposal IKE-PROP-PSK authentication-algorithm sha-256
set security ike proposal IKE-PROP-PSK encryption-algorithm aes-128-cbc
set security ike policy IKE-POLICY-PSK proposals IKE-PROP-PSK
set security ike policy IKE-POLICY-PSK pre-shared-key ascii-text test123
set security ike gateway ORBIT138 ike-policy IKE-POLICY-PSK
set security ike gateway ORBIT138 address 172.18.175.138
set security ike gateway ORBIT138 local-identity inet 172.18.175.40
set security ike gateway ORBIT138 external-interface ge-0/0/0
set security ike gateway ORBIT138 version v2-only
set security ipsec proposal IPSEC-PROP protocol esp
set security ipsec proposal IPSEC-PROP authentication-algorithm hmac-sha-256-128
set security ipsec proposal IPSEC-PROP encryption-algorithm aes-128-cbc
set security ipsec policy IPSEC-POLICY perfect-forward-secrecy keys group14
set security ipsec policy IPSEC-POLICY proposals IPSEC-PROP
set security ipsec vpn ORBIT138 ike gateway ORBIT138
set security ipsec vpn ORBIT138 ike ipsec-policy IPSEC-POLICY
# Security policies
set security policies from-zone TRUST to-zone UNTRUST policy ORBIT138-NET-1-SA match source-address
LOCAL-NET-1
set security policies from-zone TRUST to-zone UNTRUST policy ORBIT138-NET-1-SA match destination-
address ORBIT138-NET-1
set security policies from-zone TRUST to-zone UNTRUST policy ORBIT138-NET-1-SA match application any
set security policies from-zone TRUST to-zone UNTRUST policy ORBIT138-NET-1-SA then permit tunnel
ipsec-vpn ORBIT138
set security policies from-zone UNTRUST to-zone TRUST policy ORBIT138-NET-1-SA match source-address
ORBIT138-NET-1
set security policies from-zone UNTRUST to-zone TRUST policy ORBIT138-NET-1-SA match destination-
address LOCAL-NET-1
set security policies from-zone UNTRUST to-zone TRUST policy ORBIT138-NET-1-SA match application any
set security policies from-zone UNTRUST to-zone TRUST policy ORBIT138-NET-1-SA then permit tunnel
ipsec-vpn ORBIT138
12.1.2.2 Status
> show security ike security-associations
Index State Initiator cookie Responder cookie Mode Remote Address
1948863 UP 95c139a87c9cae6f 71d0c3a14c8d5663 IKEv2 172.18.175.138
LAN
10.0.1.0/24
Cisco IOS
Cellular network
In example below, we disable default route over Cell and instead setup BGP dynamic routing that
advertises the local LAN network to the IOS router and received default route over the GRE tunnel form
IOS router.
12.2.1 Orbit
12.2.1.1 Configuration
# NTP configuration
set system ntp use-ntp true
set system ntp ntp-server 172.18.175.62
# IKE/IPsec Configuration
set services vpn enabled true
set services vpn ike policy DMVPN-CERT version ikev2
set services vpn ike policy DMVPN-CERT auth-method pub-key
set services vpn ike policy DMVPN-CERT pki cert-type rsa
# Client certificate is installed as ID1
set services vpn ike policy DMVPN-CERT pki cert-id ID1
# Client private key pair is generated as ID1
set services vpn ike policy DMVPN-CERT pki key-id ID1
# Root CA certificayte is installed as CA1
set services vpn ike policy DMVPN-CERT pki ca-cert-id CA1
# Sub CA certificates are installed as SUBCA1 and SUBCA2.
set services vpn ike policy DMVPN-CERT pki sub-ca-cert-ids [SUBCA1 SUBCA2 ]
set services vpn ike policy DMVPN-CERT ciphersuite CS1 encryption-algo aes256-cbc
set services vpn ike policy DMVPN-CERT ciphersuite CS1 mac-algo sha1-hmac
set services vpn ike policy DMVPN-CERT ciphersuite CS1 dh-group dh5
set services vpn ike peer DMVPN ike-policy DMVPN-CERT
set services vpn ike peer DMVPN peer-endpoint any
set services vpn ike peer DMVPN role responder
set services vpn ipsec policy DMVPN ciphersuite CS1 encryption-algo aes256-cbc
set services vpn ipsec policy DMVPN ciphersuite CS1 mac-algo sha1-hmac
set services vpn ipsec connection DMVPN ike-peer DMVPN
set services vpn ipsec connection DMVPN ipsec-policy DMVPN
set services vpn ipsec connection DMVPN host-to-host
set services vpn ipsec connection DMVPN filter input IN_TRUSTED
set services vpn ipsec connection DMVPN filter output OUT_TRUSTED
12.2.1.2 Status
# IKE/IPsec status
> show services vpn
services vpn ike security-associations security-association 5
# NHRP status
> show services nhrp
EXPIRES
NBMA ADDRESS PROTOCOL ADDRESS STATE TYPE IN
-----------------------------------------------------------
0.0.0.0 192.168.1.255/32 up local
0.0.0.0 192.168.1.11/32 up local
# Routing status
# The highlighted default route is received from the IOS router via BGP.
> show routing-state routes
OUTGOING
DEST PREFIX NEXT HOP INTERFACE SOURCE
--------------------------------------------------
0.0.0.0/0 172.16.0.1 GRE1 dynamic
10.0.3.0/24 - Bridge kernel
172.16.0.0/24 - GRE1 kernel
172.18.175.0/24 - Cell static
# NTP configuration
ntp server 172.18.175.62
!
# Certificate configuration
crypto pki trustpoint DMVPN-3-TIER-SUBCA-2
enrollment terminal pem
subject-name C=US, ST=NY, L=Rochester, O=GE MDS, OU=ENGG, CN=DMVPN-HUB.com
revocation-check none
rsakeypair DMVPN-3-TIER-SUBCA-2 2048
!
# Below assumes that Orbit client certificates have ‘orbit’ string in the common name. This enables
this ceritificate map to be used for all Orbits that connect to this router.
crypto pki certificate map ORBIT_CERT_MAP 1
subject-name co cn = orbit
!
432 MDS Orbit MCR/ECR Technical Manual MDS 05-6632A01, Rev. F
# NOTE: Only client certificate and SUB CA-2 certificate needs to be installed.
crypto pki certificate chain DMVPN-3-TIER-SUBCA-2
certificate 0B
<CONTENTS REMOVED FOR BREVITY>
quit
certificate ca 02
<CONTENTS REMOVED FOR BREVITY>
quit
# IKE/IPsec configuration
crypto ikev2 proposal DMVPN_IKEV2_PROPOSAL
encryption aes-cbc-256
integrity sha1
group 5
!
crypto ikev2 policy DMVPN_IKEV2_POLICY
match fvrf any
proposal DMVPN_IKEV2_PROPOSAL
!
crypto ikev2 profile DMVPN_IKEV2_PROFILE
match certificate ORBIT_CERT_MAP
identity local dn
authentication remote rsa-sig
authentication local rsa-sig
pki trustpoint DMVPN-3-TIER-SUBCA-2
dpd 10 3 periodic
!
crypto ipsec transform-set DMVPN_TRANSFORM esp-aes 256 esp-sha-hmac
mode transport
!
crypto ipsec profile DMVPN
set transform-set DMVPN_TRANSFORM
set ikev2-profile DMVPN_IKEV2_PROFILE
!
12.2.2.2 Status
#IKE/IPsec status
DMVPN-HUB#show crypto ikev2 sa
IPv4 Crypto IKEv2 SA
inbound ah sas:
outbound ah sas:
# NHRP status
DMVPN-HUB#show dmvpn
Legend: Attrb --> S - Static, D - Dynamic, I - Incomplete
N - NATed, L - Local, X - No Socket
# Ent --> Number of NHRP entries with same NBMA peer
NHS Status: E --> Expecting Replies, R --> Responding, W --> Waiting
UpDn Time --> Up or Down Time for a Tunnel
==========================================================================
# Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb
----- --------------- --------------- ----- -------- -----
1 172.18.175.138 172.16.0.3 UP 16:55:28 D
# Routing status
# The highlighted route is the LAN network route received from Orbit via BGP.
DMVPN-HUB#show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
+ - replicated route, % - next hop override
NOTE The Juniper JUNOS based devices do not support IPsec transport mode for data traffic.
Therefore, to protect GRE traffic one needs to setup IPsec tunnel instead of IPsec transport
mode connection. This leads to double tunneling- GRE tunnel within IPsec tunnel. Also, GRE
tunneling over IPsec tunnel is only supported for route-based tunnel setup.
Remote LAN#1
Local LAN#1 192.168.3.0/24
192.168.1.0/24
Customer
Cellular
Network/
network
Internet
JUNOS SRX
Orbit
12.3.1 Orbit
12.3.1.1 Configuration
# Bridge/LAN#1 interface configuration
set interfaces interface Bridge type bridge
set interfaces interface Bridge ipv4 address 192.168.1.1 prefix-length 24
set interfaces interface Bridge filter input IN_TRUSTED
set interfaces interface Bridge filter output OUT_TRUSTED
set interfaces interface Bridge bridge-settings members port ETH1
# Loopback interface used as source address for GRE tunnels towards JUNOS
# This is required for GRE traffic to ride on IPsec tunnel
set interfaces interface LO-SRX240 type loopback
set interfaces interface LO-SRX240 ipv4 address 172.16.1.2 prefix-length 32
# IKE/IPsec configuration
set services vpn enabled true
set services vpn ike policy SRX240-IKE-POLICY auth-method pre-shared-key
set services vpn ike policy SRX240-IKE-POLICY pre-shared-key test123
set services vpn ike policy SRX240-IKE-POLICY ciphersuite CS1 encryption-algo aes128-cbc
set services vpn ike policy SRX240-IKE-POLICY ciphersuite CS1 mac-algo sha256-hmac
set services vpn ike policy SRX240-IKE-POLICY ciphersuite CS1 dh-group dh14
set services vpn ike peer SRX240-IKE-PEER ike-policy SRX240-IKE-POLICY
set services vpn ike peer SRX240-IKE-PEER local-identity default
set services vpn ike peer SRX240-IKE-PEER peer-endpoint address 172.18.175.40
set services vpn ike peer SRX240-IKE-PEER peer-identity default
set services vpn ike peer SRX240-IKE-PEER role initiator
set services vpn ipsec policy SRX240-IPSEC-POLICY ciphersuite CS1 encryption-algo aes128-cbc
set services vpn ipsec policy SRX240-IPSEC-POLICY ciphersuite CS1 mac-algo sha256-hmac
set services vpn ipsec policy SRX240-IPSEC-POLICY ciphersuite CS1 dh-group dh14
set services vpn ipsec connection SRX240 ike-peer SRX240-IKE-PEER
set services vpn ipsec connection SRX240 ipsec-policy SRX240-IPSEC-POLICY
set services vpn ipsec connection SRX240 local-ip-subnet 172.16.1.2/32
set services vpn ipsec connection SRX240 remote-ip-subnets 172.16.1.1/32
set services vpn ipsec connection SRX240 filter input IN_TRUSTED
# Routing configuration
set routing static-routes ipv4 route 1 dest-prefix 192.168.3.0/24
set routing static-routes ipv4 route 1 outgoing-interface GRE-SRX240
set routing static-routes ipv4 route 1 dest-prefix 192.168.4.0/24
set routing static-routes ipv4 route 1 outgoing-interface GRE-SRX240
# Firewall configuration
set services firewall enabled true
set services firewall address-set CELL-IP
set services firewall filter IN_TRUSTED rule 10 match protocol all
set services firewall filter IN_TRUSTED rule 10 actions
set services firewall filter IN_TRUSTED rule 10 actions action accept
set services firewall filter IN_UNTRUSTED rule 1 match protocol icmp
set services firewall filter IN_UNTRUSTED rule 1 actions
set services firewall filter IN_UNTRUSTED rule 1 actions action accept
set services firewall filter IN_UNTRUSTED rule 2 match protocol udp
set services firewall filter IN_UNTRUSTED rule 2 match src-port
set services firewall filter IN_UNTRUSTED rule 2 match src-port services [ dns ]
set services firewall filter IN_UNTRUSTED rule 10 match protocol udp
set services firewall filter IN_UNTRUSTED rule 10 match dst-port
set services firewall filter IN_UNTRUSTED rule 10 match dst-port services [ ike ntp ]
set services firewall filter IN_UNTRUSTED rule 10 actions
set services firewall filter IN_UNTRUSTED rule 10 actions action accept
set services firewall filter IN_UNTRUSTED rule 11 match protocol esp
set services firewall filter IN_UNTRUSTED rule 11 actions
set services firewall filter IN_UNTRUSTED rule 11 actions action accept
set services firewall filter IN_UNTRUSTED rule 12 match protocol all
set services firewall filter IN_UNTRUSTED rule 12 actions
12.3.1.2 Status
#IKE/IPsec status
> show services vpn
services vpn ike security-associations security-association 54
name SRX240_SA
state ESTABLISHED
local-host 172.18.175.135
local-id 172.18.175.135
remote-host 172.18.175.40
remote-id 172.18.175.40
initiator true
initiator-spi 78c786f79094ac55
responder-spi c5aa90f242499e8d
ciphersuite AES_CBC-128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
established-time 694
rekey-time 9143
reauth-time 1852140901
services vpn ipsec security-associations security-association 196
name SRX240_SA
state INSTALLED
mode TUNNEL
udp-encap false
in-spi cce4cde5
out-spi 4c84f08c
ciphersuite AES_CBC-128/HMAC_SHA2_256_128/MODP_2048
in-bytes 0
in-packets 0
in-last-use 1621200
440 MDS Orbit MCR/ECR Technical Manual MDS 05-6632A01, Rev. F
out-bytes 0
out-packets 0
out-last-use 0
rekey-time 708
life-time 1590
install-time 2010
local-ts 172.16.1.2/32
remote-ts 172.16.1.1/32
# Routing status
> show routing-state routes
OUTGOING
DEST PREFIX NEXT HOP INTERFACE SOURCE
-------------------------------------------------------
0.0.0.0/0 - Cell kernel
10.1.1.0/30 - GRE-SRX240 kernel
192.168.1.0/24 - Bridge kernel
192.168.2.0/24 - Bridge2 kernel
172.16.1.1/32 172.18.175.40 Cell static
12.3.2 JUNOS
12.3.2.1 Configuration
# WAN external interface
# NOTE: Ensure that MTU value matches that configured on Cell interface on Orbit (default=1428).
set interfaces ge-0/0/0 unit 0 family inet mtu 1428
set interfaces ge-0/0/0 unit 0 family inet address 172.18.175.40/26
# Loopback interface used as source address for GRE tunnels towards Orbits
MDS 05-6632A01, Rev. F MDS Orbit MCR/ECR Technical Manual 441
set interfaces lo0 unit 0 family inet address 172.16.1.1/32
# Common routing
set routing-options static route 0.0.0.0/0 next-hop 172.18.175.62
# Common IKE
set security ike proposal IKE-PROP-PSK authentication-method pre-shared-keys
set security ike proposal IKE-PROP-PSK dh-group group14
set security ike proposal IKE-PROP-PSK authentication-algorithm sha-256
set security ike proposal IKE-PROP-PSK encryption-algorithm aes-128-cbc
set security ike policy IKE-POLICY-PSK proposals IKE-PROP-PSK
set security ike policy IKE-POLICY-PSK pre-shared-key ascii-text test123
# Common IPsec
set security ipsec proposal IPSEC-PROP protocol esp
set security ipsec proposal IPSEC-PROP authentication-algorithm hmac-sha-256-128
set security ipsec proposal IPSEC-PROP encryption-algorithm aes-128-cbc
set security ipsec policy IPSEC-POLICY perfect-forward-secrecy keys group14
set security ipsec policy IPSEC-POLICY proposals IPSEC-PROP
# Common Policies
set security policies from-zone TRUST to-zone TRUST policy TTT match source-address any
set security policies from-zone TRUST to-zone TRUST policy TTT match destination-address any
set security policies from-zone TRUST to-zone TRUST policy TTT match application any
set security policies from-zone TRUST to-zone TRUST policy TTT then permit
# Common zones
set security zones security-zone TRUST address-book address LOCAL-NET-1 172.16.1.1/32
set security zones security-zone TRUST host-inbound-traffic system-services all
set security zones security-zone TRUST interfaces vlan.0
set security zones security-zone TRUST interfaces vlan.1
set security zones security-zone TRUST interfaces lo0.0
# IKE
set security ike gateway ORBIT135 ike-policy IKE-POLICY-PSK
set security ike gateway ORBIT135 address 172.18.175.135
set security ike gateway ORBIT135 local-identity inet 172.18.175.40
set security ike gateway ORBIT135 external-interface ge-0/0/0
set security ike gateway ORBIT135 version v2-only
# IPsec
set security ipsec vpn ORBIT135 bind-interface st0.0
set security ipsec vpn ORBIT135 ike gateway ORBIT135
set security ipsec vpn ORBIT135 ike ipsec-policy IPSEC-POLICY
# IPsec policies
set security policies from-zone TRUST to-zone VPN-ORBIT135 policy ORBIT135 match source-address
LOCAL-NET-1
set security policies from-zone TRUST to-zone VPN-ORBIT135 policy ORBIT135 match destination-address
ORBIT135-NET-1
set security policies from-zone TRUST to-zone VPN-ORBIT135 policy ORBIT135 match application any
set security policies from-zone TRUST to-zone VPN-ORBIT135 policy ORBIT135 then permit
set security policies from-zone VPN-ORBIT135 to-zone TRUST policy ORBIT135 match source-address
ORBIT135-NET-1
set security policies from-zone VPN-ORBIT135 to-zone TRUST policy ORBIT135 match destination-address
LOCAL-NET-1
set security policies from-zone VPN-ORBIT135 to-zone TRUST policy ORBIT135 match application any
set security policies from-zone VPN-ORBIT135 to-zone TRUST policy ORBIT135 then permit
set security zones security-zone VPN-ORBIT135 address-book address ORBIT135-NET-1 176.16.1.2/32
set security zones security-zone VPN-ORBIT135 interfaces st0.0
MDS 05-6632A01, Rev. F MDS Orbit MCR/ECR Technical Manual 443
set security zones security-zone TRUST interfaces gr-0/0/0.0
12.3.2.2 Status
# IKE/IPsec status
> show security ike security-associations
Index State Initiator cookie Responder cookie Mode Remote Address
1948872 UP 55ac9490f786c778 8d9e4942f290aac5 IKEv2 172.18.175.135
# Routing status
> show route
The Orbit blocks all traffic (except EAP frames) on the Ethernet port until it can authenticate the peer
connected to that port. The Orbit must be able to communicate with the RADIUS authentication server
through a non-authenticating Ethernet port or other backhaul network interface like the cellular modem.
ETH1
Wireless
backhaul
Windows7 802.1x Peer
GEMDS Orbit
802.1x
Freeradius authenticator
ETH2
authentication
server
Kubuntu Linux 802.1x Peer
13.2.2 Freeradius
Setup freeradius with server and device certificates, users, and network clients. The following shows only
a snippet of the configuration but has the most important sections listed.
/etc/freeradius/users
# Username/password example
joe Cleartext-Password := password
/etc/freeradius/eap.conf
Setup tls { } section with your certificates, key and key password
/etc/freeradius/clients.conf
# Allow connections from devices in this network
client 192.168.1.0/24 {
secret = password
shortname = ghost
}
The wired interface is configured as shown in the next few diagrams on the following pages:
Running Wireshark in administrator mode on the Windows peer captures the EAP-TLS conversation
between the Orbit and Windows. This tool can be used to diagnose communication errors on the peer.
Switch#show configuration
Using 2061 out of 524288 bytes
!
version 12.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
hostname Switch
boot-start-marker
boot-end-marker
enable secret 5 $1$sP31$MR/SumVvQhHlirgeef3gY0
username login privilege 15 nopassword
aaa new-model
aaa authentication dot1x default group radius
aaa authorization network default group radius
aaa authorization network mylist none
aaa session-id common
switch 1 provision ws-c2960s-24ts-l
dot1x system-auth-control
spanning-tree mode pvst
spanning-tree extend system-id
vlan internal allocation policy ascending
interface FastEthernet0
no ip address
interface GigabitEthernet1/0/1
switchport mode access
interface GigabitEthernet1/0/2
switchport mode access
authentication order dot1x
authentication port-control auto
dot1x pae authenticator
interface GigabitEthernet1/0/3
….
interface Vlan1
ip address 192.168.1.100 255.255.0.0
interface Vlan2
no ip address
ip http server
ip http secure-server
radius-server host 192.168.1.200 auth-port 1812 acct-port 1646
radius-server key password
line con 0
line vty 0 4
password cisco
line vty 5 15
password cisco
end
Switch#
Australia
For professional use only, not for sale to the
general public.
Hot surface—this product is only suitable for
installation In restricted access locations.
TECHNICAL ASSISTANCE
Technical assistance for GE MDS products is available from our Technical Support Department during
business hours (8:30 A.M.–6:00 P.M. Eastern Time). When calling, please give the complete model
number of the product, along with a description of the trouble/symptom(s) that you are experiencing. In
many cases, problems can be resolved over the telephone, without the need for returning the unit to the
factory. Please use one of the following means for product assistance:
Phone: 585 241-5510 E-Mail: [email protected]
FAX: 585 242-8369 Web: www.gemds.com
REPAIR SERVICE
Component level repair of this equipment is not recommended in the field. Many components are
installed using surface mount technology, which requires specialized training and equipment for proper
servicing. For this reason, the equipment should be returned to the factory for any PC board repairs. The
factory is best equipped to diagnose, repair and align your unit to its proper operating specifications.
If return of the equipment is necessary, you must obtain a return authorization number before shipment.
This number helps expedite the repair so that the equipment can be returned to you as quickly as possible.
Please be sure to include the number on the outside of the shipping box, and on any correspondence
relating to the repair. No equipment will be accepted for repair without an authorization number.
Return authorization numbers are issued online at www.gedigitalenergy.com/Communications.htm. On
the left side of the page, click “Login to my MDS” and once logged in, click “Service Request Order”.
Your number will be issued immediately after the required information is entered. Please be sure to have
the model number(s), serial number(s), detailed reason for return, “ship to” address, “bill to” address, and
contact name, phone number, and fax number available when requesting a number. A purchase order
number or pre-payment will be required for any units that are out of warranty, or for product conversion.
If you prefer, you may contact our Product Services department to obtain an authorization number:
Telephone Number: 585-241-5540
Fax Number: 585-242-8400
E-mail Address: [email protected]
The radio must be properly packed for return to the factory. The original shipping container and
packaging materials should be used whenever possible. All factory returns should be addressed to:
GE MDS LLC
Product Services Department
(Auth. No. XXXX)
175 Science Parkway
Rochester, NY 14620 USA
When repairs have been completed, the equipment will be returned to you by the same shipping method
used to send it to the factory. Please specify if you wish to make different shipping arrangements. To
inquire about an in-process repair, you may contact our Product Services department using the telephone,
Fax, or E-mail information given above.
REPLACEMENT PARTS
Many spare and replacement items are available for purchase by contacting your factory sales
representative, or by visiting our online store at http://store.gedigitalenergy.com/front.asp
GE MDS, LLC
175 Science Parkway
Rochester, NY 14620
Telephone: +1 585 242-9600
FAX: +1 585 242-9620
www.gemds.com