05-6632A01 RevM MCR Tech Manual
05-6632A01 RevM MCR Tech Manual
05-6632A01 RevM MCR Tech Manual
Technical Manual
Technical Manual
MDS™ ORBIT ECR
Edge Connect Router
RF Regulatory Information
RF Safety Notice (English and French)
RF Exposure
Concentrated energy from a directional antenna may pose a health hazard to humans.
Do not allow people to come closer to the antenna than the distances listed in the
table below when the transmitter is operating. More information on RF exposure can
be found online at the following website:
www.fcc.gov/oet/info/documents/bulletins
Concentré d'énergie à partir d'une antenne directionnelle peut poser un risque pour
l’exposition aux RF
la santé humaine. Ne pas permettre aux gens de se rapprocher de l'antenne que les
distances indiquées dans le tableau ci-dessous lorsque l'émetteur est en marche. Plus
d'informations sur l'exposition aux RF peut être trouvé en ligne à l'adresse suivante:
www.fcc.gov/oet/info/documents/bulletins
Professional installation required. Antennas must not be co-located. All transmission antennas must be at
least 20 cm apart to comply with FCC co-location rules.
Cell 33 cm
NX915 23 cm
Regulatory Limitations
Some product options including hardware and software configuration settings may be restricted based on
applicable region-specific regulatory constraints. Professional installation required.
When servicing energized equipment, be sure to wear appropriate Personal Protective Equipment (PPE).
During internal service, situations could arise where objects accidentally contact or short circuit
components and the appropriate PPE would alleviate or decrease the severity of potential injury. When
servicing equipment, all workplace regulations and other applicable standards for live electrical work
should be followed to ensure personal safety.
Manual Revision and Accuracy
This manual was updated to cover a range of firmware releases. Accordingly, some screens and features
may differ from the actual unit you are working with. While every reasonable effort has been made to
ensure the accuracy of this publication, product improvements may also result in minor differences
between the manual and the product shipped to you. If you have additional questions or need an exact
specification for a product, please contact GE MDS using the information at the back of this guide. In
addition, manual updates can be found on our website at www.gemds.com .
Environmental Information
The manufacture of this equipment has required the extraction and use of natural resources. Improper
disposal may contaminate the environment and present a health risk due to hazardous substances
contained within. To avoid dissemination of these substances into our environment, and to limit the
demand on natural resources, we encourage you to use the appropriate recycling systems for disposal.
These systems will reuse or recycle most of the materials found in this equipment in a sound way. Please
contact GE MDS or your supplier for more information on the proper disposal of this equipment.
Battery Disposal—This product may contain a battery. Batteries must be disposed of properly and may
not be disposed of as unsorted municipal waste in the European Union. See the product documentation for
specific battery information. Batteries are marked with a symbol, which may include lettering to indicate
cadmium (Cd), lead (Pb), or mercury (Hg). For proper recycling return the battery to your supplier or to a
designated collection point. For more information see:
www.weeerohsinfo.com.
Cyber Security Policy
As part of GE’s commitment to product safety, quality and reliability and to reduce risk exposure for GE
and our customers, the “GE Product Cyber Security Standard” (the Policy) outlines the requirements that
GE Business Units must meet. The Policy, requires each GE Business Unit to implement reasonable,
industry-specific measures designed to protect all GE products and services, including all relevant
components and services sourced from third parties, from cyber security threats throughout their
supported life cycle.
Product Test Data Sheets
Test Data Sheets showing the original factory test results for this unit are available upon request from the
GE MDS Quality Leader. Contact the factory using the information at the back of this manual. Serial
numbers must be provided for each product where a Test Data Sheet is required.
Use of this product in a manner not specified by GE MDS may cause impairments to protection.
Integrated heatsink surface may be hot while in operation. Do not handle in high
ambient environments.
Brazil
Homologation Number varies based on the model and model options chosen.
Este equipamento não tem direito à proteção contra interferência prejudicial e não pode causar
interferência em sistemas devidamente autorizados.
Este dispositivo está em conformidade com as diretrizes de exposição à radiofreqüência quando
posicionado a pelo menos 20 centímetro de distância do corpo. Para maiores informações, consulte o site
da ANATEL – www.anatel.gov.br
Japan
Mexico
• IFT Homologation Number varies based on the model and model options chosen.
La operación de este equipo está sujeta a las siguientes dos condiciones:
1. es posible que este equipo o dispositivo no cause interferencia perjudicial y
Philippines
Conformity Number: ESD-GEC-1402584
South Africa
UAE
• Registered number = ER0133084/14
• Dealer number = DA0132013/14
•
In the Device Management section of this manual (Page 39), there are a number of command strings
where information is presented by the unit and a reply is required from the user. In such cases,
information from the unit is shown in a non-bolded font and the user response is shown in bold. For
example:
Further, in some cases, command lines will be shown with non-bolded, italicized text contained within
the string. Such text indicates the need for user-supplied variable parameters, such as the name of an item.
For example:
% set interfaces interface myBridge type bridge
In the above example, you would enter the specific name of your bridge to complete the entry.
NOTE The LAN port should be assigned IP addresses only if it is a routed interface (that is, not in a
bridge).
NOTE The software commands and responses shown in this manual were obtained from a unit
operating in a lab environment. The information displayed may differ from field service
conditions.
Key Benefits
• Simple configuration
• Auto discovery allows remotes to learn network modulation and channel plan
• Over 20 miles LOS (Line of Sight)
Ret aining
Sc rew s (2 )
W ire Port s (2 )
(Polarity: Left +, Right –)
Figure 2-4. DC Power Connector (P/N 73-1194A53)
4 Unused 8 Unused
SFP— The SFP port on Orbit is a socket that accepts standard small-pluggable-form-factor transceiver
modules. These are typically used for Fiber connections but can support copper connections as well. SFP
ports behave similar to ethernet and support both device management and payload data transport. Digital
Diagnostic Monitoring (DDM) is supported for standard interfaces. Contact your sales representative for
information on available SFP module offerings.
USB Port—This port allows for connection of a laptop or PC. The port provides a local console for
management of the device. A standard host-to-mini device USB 2.0 cable may be used.
COM1/COM2 Port—This connector serves as the serial interface port for both console management and
payload data. Depending on ordered options, the unit may have one or two COM ports. By default, the
port is enabled for local console control. The COM port serves as the primary interface for connecting the
unit to an external DTE serial device supporting RS-232 or RS-485. If necessary, an adapter may be used
to convert the unit’s RJ-45 serial jack to a DB-9F type (GE MDS 73-2434A25).
NOTE Not all PCs include a serial port. If one is not available, the unit’s USB port may be used to
access the device management interface. Alternatively, a PC’s USB port may be used with a
USB-to-Serial adapter and appropriate driver software. These devices are available from several
3 Reserved --
4 Ground Connects to ground (negative supply potential) on chassis
5 OUT RXD (Received Data)—Supplies received data to the connected device
6 IN TXD (Transmitted Data)—Accepts TX data from the connected device
7 OUT CTS (Clear to Send)
8 IN RTS (Request to Send)
3 Reserved --
4 Ground Connects to ground (negative supply potential) on chassis
5 OUT TXD+/TXB (Transmitted Data +)—Non-inverting driver output. Supplies
received payload data to the connected device.
6 IN RXD+/RXB (Received Data +) — Non-inverting receiver input. Accepts
payload data from the connected device.
7 OUT TXD-/TXA (Transmitted Data -)—Inverting driver output. Supplies
received payload data to the connected device.
8 IN RXD-/RXA (Received Data -) — Inverting receiver input. Accepts
payload data from the connected device.
NOTE GE MDS part number 73-2434A25 provides a custom RJ45 to DB9 Adapter for use with the
Orbit and other GE MDS products. The chart below provides details for connections made
using this adapter.
28 MDS Orbit MCR/ECR Technical Manual MDS 05-6632A01, Rev. M
WIRING CHART
RJ-45 PIN FUNCTION DB9 PIN
1 DSR 6
2 DCD 1
3 DTR 4
4 GND 5
5 RXD 2
6 TXD 3
7 CTS 8
8 RTS 7
LED Status Indicators—The LEDs on the unit provide visual indications of the status of the device as
shown in the following chart:
NOTE In addition to the LEDs above, the Ethernet connector has two embedded LEDs. A yellow
indicates a link at 100 Mbps operation. A flashing green indicates Ethernet data traffic.
Depending on the interfaces ordered, the NIC1 and NIC2 slot can be populated with a Cellular modem, a
WiFi interface, LnRadio interface, or an NxRadio interface. LED associations for NIC1 and NIC2 follow
the physical left-to-right order of the physical connector positions as labeled on the faceplate.
See detail described in Table 2-5 and Table 2-6 below, based on the product configuration ordered.
4.81"
2.75" (2X) 1.5" (2X)
.75" (2X)
8.0"
8.5"
9.25"
Figure 7 . Flat
Figure Mounting
2-7. MCR Bracket
Flat Mounting Dimensions
Bracket Dimensions
NOTE To prevent moisture from entering the unit, do not mount the case with the cable connectors
pointing up. Also, dress all cables to prevent moisture from running along the cables and into
the unit.
MDS 05-6632A01, Rev. M MDS Orbit MCR/ECR Technical Manual 31
2.7.1 Optional DIN Rail Mounting
If ordered with the DIN rail mounting option, the unit is supplied with a DIN rail clip attached to the case.
The integrated bracket on the unit’s case allows for quick installation and removal from a DIN mounting
rail as shown in Figure 2-9.
NOTE For Australia and New Zealand, the maximum EIRP must be limited to 30 dBm. If ((antenna
gain - feed line loss) + power output setting) > 30), then the power output of the
NX915 must be reduced.
NOTE For regions governed by FCC/IC compliance the maximum EIRP must be limited to 36 dBm. If
((antenna gain - feed line loss) + power output setting) >36), then the power
output of the NX915 must be reduced.
Licensed Narrowband Antennas —Antenna connection is a TNC connector. Multiple options are
available based on radio type and site-specific licensing rules.
To connect to the unit and manage it via the Device Manager, you will need the following:
• A PC with a web browser program installed.
• An Ethernet cable connected between the PC and the Orbit as shown in PC Connection for Web
Management.
• The unit’s IP address. Check with your Network Administrator, or determine the address via a
command line interface connection. The default address for a factory supplied unit is 192.168.1.1.
• The user name and password for the unit. Check with your Network Administrator, or, if a
username and password have not been set, use the factory defaults of admin for both entries. (For
security, a new password may be required immediately before allowing any other actions. If the
default of “admin” is used it should be changed as soon as possible after login.)
Logging On
Connect the unit to a PC via an Ethernet connection.
Configure your PC network settings to an IP address on the same subnet as the unit. The default
subnet mask is 255.255.255.0.
NOTE For IP addressing the Orbit uses a routing prefix expressed in CIDR notation instead of the
specifying a subnet mask. The CIDR notation is the first address of a network, followed by a
slash character (/), and ending with the bit-length (max 32) of the prefix. A subnet mask is
expressed in dot-decimal notation. For example, 192.168.1.0/24 is equivalent to specifying
192.168.1.0 with a subnet mask of 255.255.255.0.
Enter the unit’s IP address in a web browser window, just as you would enter a website address.
When the login screen appears (Figure 3-2. Login Screen), enter the User Name and Password for
the unit. The default entries for a new unit are typically both admin. Click OK.
Starting at the top left (underneath the GE logo) icons are presented for notifications, alarm state, and
radio connectivity, respectively. The alarm state, represented by the alarm clock icon, goes red when an
alarm is active. Radio connectivity, represented by the tower icon, mirrors the state of the NIC LED for
the primary radio. Clicking on an icon brings up the corresponding information associated with that icon.
Continuing right, the pull-down menu allows the choice of Basic or Advanced web operating mode. By
default, Orbit units equipped with a proprietary licensed (LN) or unlicensed (NX) radio automatically
select the Basic mode.
On the top right, an Orbit photo icon displays the general type of device. The current running firmware
version is shown directly below the icon. Clicking on the firmware version brings the user to the
firmware update page.
In both Basic and Advanced modes a navigational panel appears on the left; detail appears immediately to
the right.
Advanced mode presents the device as fully featured industrial router with layer 2/3 functionality.
Advanced mode uses an accordion style presentation to allow the user to expand and collapse subsets of
the configuration based on the current area of focus.
Basic mode strives for a radio-centric view and appears more like a layer-2 switch (supporting bridging
and VLAN operation). The navigation pane is typically simplified to 5 items (Radio, Serial, Security,
Logging, and System) with Radio appearing first. If WiFi is present it will appear as an additional
navigation pane element. Simple and intuitive menus allow configuration of basic firewall rules and
operating functionality. Basic mode presents all content as fully exploded and scrollable to more quickly
get to the most commonly used items.
The Device Manager allows switching between Basic to Advanced mode so that configuration of most
items can use the simpler menu, while still providing access to full functionality for more complex items.
If the user creates a more complex configuration in Advance mode, transitioning to Basic mode may
generate an informational warning that a complex configuration is in use and some items will not be
visible.
The majority of this manual uses Advanced mode for configuration examples. Users are encouraged to
explore the intuitive nature of the Basic mode for faster configuration of less complex systems.
From the Web UI changes made on the screens are not saved or implemented until via the save button or
commit command. The Save button in the banner on the top left of every page. Normally this is not
highlighted and blue in color as shown below:
Other defaults
• WiFi (hotspot):
- Set as Access Point (AP)
- SSID = GEMDS_<SERNUM> SERNUM refers to the unit’s serial number, printed on a
chassis sticker.
- The Ethernet ports are bridged with the WiFi AP.
- SSID broadcast enabled
- Security = WPA2-PSK, CCMP with passphrase: GEMDS_ORBIT
• Cellular modem:
- 4G Cellular interface is enabled by default since network can enable connectivity on default
APN.
- 3G Cellular interface is disabled by default since it requires carrier specific APN to be
configured.
• ISM Unlicensed 900 MHz radio (NX915):
48 MDS Orbit MCR/ECR Technical Manual MDS 05-6632A01, Rev. M
- Radio Mode set to Remote
- Modem Mode 500kbps
- Power at 30 dBm
• Licensed Narrowband radio (LN100/LN200/LN400/LN700/LN900):
- Radio Mode set to Remote
- Adaptive Modulation enabled
- FEC set to disabled
- Power at 40 dBm
• Licensed Wide radio (LW700):
- Radio Mode set to Remote
- AP is set to channel 1, bandwidth 315KHz
- Remote is set to AutoDiscover
- Power at 30 dBm
-
These configuration settings allow a connection to a PC to the unit via WiFi or the LAN port and access
to the Internet via cellular, if equipped and supported by a suitable service plan.
Set Date /Time or NTP 3.7.1 - Date, Time and NTP Note - this is part of the
Server Initial Setup Wizard
Configuring for 900MHz 3.5.5 - Unlicensed 900 MHz ISM (NX915) NX915 is the hardware
operation (if present) module that provides the
900 MHz operations. It is
factory configured based
on country codes for legal
operations.
Figure 3-12. Example 1: Unit Providing Laptop and Handheld Device Connectivity
By default, the unit is configured in this basic configuration. Refer to Preconfigured Settings for accessing
the unit using the default setting for the Ethernet ports, WiFi and the bridge.
The following chart lists the required steps to configure the Orbit for this specific scenario. Note that for
each step the linked manual section is provided as well as detailed information for use in recreating the
example.
Configure network 3.8.5 - Bridging Add ETH1 and WiFi to the bridge
Figure 3-13. Example 2: Units Providing Wireless Bridge Between Laptop & SCADA Device
Step Comment / Additional
Applicable Manual Section
Information
Orbit MCR #1: Configure 3.5.3 - WiFi Enable Access Point mode
WiFi as an Access Point Create SSID of myssid
Orbit MCR #1: Configure to 3.8.5 - Bridging Add ETH1 and WiFi to the bridge
bridge traffic from ETH1 and
WiFi
Orbit MCR #1: Set bridge IP 3.8.5 - Bridging Set to 192.168.1.21
address prefix-length 24
Orbit MCR #1: Enable 3.8.15 - DHCP Service Set v4subnet 192.168.1.0/24
DHCP Server on bridge Set domain-name: gemds
Set range-start: 192.168.1.10
Set range-end:192.168.1.19
Set router: 192.168.1.1
Set broadcast-address:
192.168.1.255
Orbit MCR #2: Configure 3.5.3 - WiFi Enable Station mode
WiFi as a Station connecting Connect to AP SSID of myssid
to Orbit MCR #1
Orbit MCR #2: Configure to 3.8.5 - Bridging Add ETH1 and WiFi to the bridge
bridge traffic from ETH1 and
WiFi
Orbit MCR #2: Set bridge IP 3.8.5 - Bridging Set to 192.168.1.22
address prefix-length 24
Figure 3-14. Example 3: Unit Providing Connectivity to Serial-Based SCADA Device via UDP
NOTE The configuration for Orbit MCR #1 in Example 3: Unit Providing Connectivity to Serial-
Based SCADA Device via UDP is identical to the configuration shown in the previous example
(Example #2).
Orbit MCR #1: Configure 3.5.3 - WiFi Enable Access Point mode
WiFi as an Access Point Create SSID of myssid
Orbit MCR #1: Configure to Add ETH1 and WiFi to the bridge
bridge traffic from ETH1 and 3.8.5 - Bridging
WiFi
Orbit MCR #1: Set bridge IP Set to 192.168.1.21
3.8.5 - Bridging
address prefix-length 24
Set v4subnet 192.168.1.0/24
Set domain-name gemds
Set range-start 192.168.1.10
Orbit MCR #1: Enable
3.8.15 - DHCP Service Set range-end 192.168.1.19
DHCP Server on bridge
Set router 192.168.1.1
Set broadcast-address
192.168.1.255
Orbit MCR #2: Configure 3.5.3 - WiFi Enable Station mode
WiFi as a Station connecting
to Orbit MCR #1 connect to AP SSID of myssid
Orbit MCR #2: Configure to Add ETH1 and WiFi to the bridge
bridge traffic from ETH1 and 3.8.5 - Bridging
WiFi
Orbit MCR #2: Set bridge IP
3.8.5 - Bridging Set to 192.168.1.22 prefix-length 24
address
Set mode udp
Set up Terminal Server 3.8.16 - Terminal Service port 30000
COM1 remote addr: 192.168.1.11
port 30001
Apply Firewall 3.8.9 - Access Control List (Packet Set Cell input filter to
IN_UNTRUSTED and Filtering / Firewall) IN_UNTRUSTED
OUT_UNTRUSTED Set Cell output filer to
filters to Cell interface OUT_UNTRUSTED
Set NAT on Cell 3.8.10 - Source NAT (Masquerading) Set cell NAT source to MASQ
interface to
masquerade
Orbit MCR#2
Orbit MCR#1 serial
LN Remote
over-the-air
LN AP
NOTE If the COM port has been configured for terminal server operation, pressing +++ switches it to
console (management) mode. Serial console mode is required for the following steps.
Launch a terminal communications program, such as HyperTerminal or PuTTY, with the
following communication parameters: 115200 bps (default speed), 8 bits, no parity, one stop bit
(8N1) and flow control disabled. Incorrect parameter settings are a frequent cause of connection
difficulties. Double check to be sure they are correct.
An adapter may be used to convert the unit’s RJ-45 serial jack to a DB-9F type (GE MDS part no.
73-2434A25). If no serial port exists on the PC, a Mini-USB cable may be connected between the
Orbit’s USB device port and the PC.
Step 2: Instruct the device to enter configuration mode by typing configure and pressing the enter key:
> configure
Entering configuration mode private
Step 3: Change the device name by typing in the following, followed by enter: set system name
Device539
% set system name Device539
Step 4: Verify the change looks correct by reading the data back, using the following, followed by the
enter key: show system name
% show system name
name Device539;
Step 5: Commit the change by typing in the following, followed by the enter key: commit
% commit
Commit complete.
Step 6: Exit the configuration mode by typing the following, followed by the enter key: exit
% exit
Step 7: Exit the login session by typing the following, followed by the enter key: exit
> exit
Device539 login:
Figure 3-18. Example 1: Unit Providing Laptop and Handheld Device Connectivity
The following commands will configure the Orbit for this scenario.
% set interfaces interface Wi-Fi type wifi
% set interfaces interface Wi-Fi wifi-config mode access-point ap-config ap myssid enabled
true
Figure 3-19. Example 2: Units Providing Wireless Bridge Between Laptop & SCADA Device
The following commands will configure the Orbit MCR #1 for this scenario.
% set interfaces interface Wi-Fi type wifi
% set interfaces interface Wi-Fi wifi-config mode access-point ap-config ap myssid enabled
true
Figure 3-20. Example 3: Unit Providing Connectivity to Serial-Based SCADA Device via UDP
The following commands will configure the Orbit MCR #2 for this scenario.
% set interfaces interface Wi-Fi type wifi
% set interfaces interface Wi-Fi wifi-config mode access-point ap-config ap myssid enabled
true
NOTE The commands that follow in this section vary depending on the Orbit options ordered.
Configuring
The screens below shows examples for how to configure the COM1 and USB serial ports:
Navigate to: Serial ---> Basic Config / Ports
• Line Mode - Selection of the operation line mode of the serial port. Choices are:
- RS232 (DEFAULT)
- RS485 - 2 Wire
- RS485 - 4 Wire
• Baud Rate - The serial port baud rate in bps. Choices are 300, 1200, 2400, 4800, 9600, 19200,
38400, 57600, 115200 (DEFAULT), 230400.
• Byte Format - The data byte format in bits, parity and stop bits: Choices are:
- 7N1 - 7 char bits, no parity, 1 stop bit
- 7E1 - 7 char bits, even parity, 1 stop bit
- 7O1 - 7 char bits, odd parity, 1 stop bit
- 7N2 - 7 char bits, no parity, 2 stop bits
- 7E2 - 7 char bits, even parity, 2 stop bits
- 7O2 - 7 char bits, odd parity, 2 stop bits
- 8N1 - 8 char bits, no parity, 1 stop bit (DEFAULT)
- 8E1 - 8 char bits, even parity, 1 stop bit
- 8O1 - 8 char bits, odd parity, 1 stop bit
- 8N2 - 8 char bits, no parity, 2 stop bits
- 8E2 - 8 char bits, even parity, 2 stop bits
- 8O2 - 8 char bits, odd parity, 2 stop bits
• Hw Flow Control - Hardware flow control enable/disable (DEFAULT) using RTS/CTS lines
• Vmin - Receive Buffer Size - The minimum number of data bytes that will be buffered by the serial
port before handling of the data to be processed by the terminal server. (255 = DEFAULT).
• Vtime - Receive Inter-Byte Timeout - The amount of time between bytes of data on the serial port in
milliseconds, that indicate the end of a serial message ready to be processed by the terminal
server. (10 = DEFAULT)
NOTE For serial ports other than physical COM ports, the only useful attributes are Vmin and Vtime.
Other settings like line mode, baud rate, and flow control are ignored.
• Vmin- Receive Buffer Size - The minimum number of data bytes that will be buffered by the serial
port before handling of the data to be processed by the terminal server. (255 = DEFAULT).
• Vtime- Receive Inter-Byte Timeout - The amount of time between bytes of data on the serial port in
milliseconds that indicates the end of a serial message ready to be processed by the terminal
server. (10 = DEFAULT)
Console Settings
Any physical serial port can be set up as a console port by adding the port under the Console tab.
Navigate to: Serial ---> Basic Config / Console
From the CLI, this sequence shows how to add console access to the COM1 and COM2 serial ports and
set the COM2 baud rate to 19200 bps:
% set services serial console serial-ports [COM1 COM2]
% set services serial ports COM2 baud-rate b19200
% commit
Pass-Through Settings
Orbit offers Serial Pass-Through operation as a low-overhead means to transport serial data. Unlike
Terminal Server operation, there is no need to convert the serial data to IP.
A Pass-Through Instance defines the connection between the two serial ports.
The example below defines a Pass-Through Instance to connect COM1 to an Orbit LN operating in
transparent-serial mode (backward compatible to x710). First the instance is named as shown:
Clicking the “…” button provides the serial port choices. In this example, COM1 is the physical serial
port; LnRadio-serial is the virtual serial port created automatically when an Orbit LN interface is
configured for “transparent-serial” operation.
The last image below shows the final configuration prior to selecting the “Finish” button.
Monitoring
From the Web UI, the Serial Ports screen shows the settings:
Navigate to: Serial ---> Basic Config / Ports
ports COM2 {
line-mode rs232;
baud-rate b19200;
byte-format bf8n1;
hw-flow-control false;
vmin 255;
vtime 10;
}
console {
serial-ports [ COM1 COM2 ];
}
3.5.2 Cell
3.5.2.1 Understanding
The Orbit product family is available with 4G LTE/3G UMTS cellular modem options for various regions
around the world.
NOTE GE MDS is continually certifying the product for different countries and carriers, please contact
GE MDS sales or technical support to inquire about the current certification status for particular
country/carrier.
Orbit supports routing of TCP/UDP/IP data from the Cellular WAN network interface to any of the other
network interfaces (including WiFi or LAN) using the IPsec VPN or network address and port translation
(NAPT) feature and to the COM1 (or COM2) serial port using the terminal server service. The
Table 3-5 describes the Orbit’s LED behavior when using the cellular interface.
Table 3-5. Cell Interface LED Descriptions
SIM Port(s) - These ports accept a mini SIM card (2FF type) for cell operation. The unit’s cellular
interface will not function without at least one valid SIM card installed. Users are responsible for
obtaining provisioned SIM cards for the appropriate service plan from their cellular provider. Information
on determining the cell module’s IMSI/IMEI (typically required for provisioning) is provided on Page 87
of this manual.
Effective February 2019, standard Orbit 4G LTE offerings now provide two SIM ports labeled SIM-A
and SIM-B. SIM port locations vary based on the specific Orbit model configuration. The figures below
show proper alignment of the SIM card for both orientations.
CAUTION: Do not insert the SIM card when the unit is powered on.
Card Insertion: SIM cards only insert one way; do not force it. Each SIM should be inserted with the
printed label and the cut-off corner matching the orientation described in the figures below. A small
instrument, such as a flathead screwdriver, may be helpful to gently push the SIM all the way in until it
locks.
Figure 3-23. Steps for Inserting SIM Cards on MCR with horizontal alignment
Orbit ECR and Orbit MCR with 2 Serial + 4 Ethernet ports have SIM-A and SIM-B diagonal to each
other. The SIM card orientation is opposite the case above. The printed label for SIM A faces down with
the cut-off corner on the right side; the printed labeled for SIM B faces up with the cut-off corner on the
left side.
Figure 3-24. Steps for Inserting SIM Cards on ECR and MCR with diagonal alignment
Orbit MCR with Dual Cell modem options have three SIM slots, with SIM-A and SIM-B connected to
cellular modem in NIC slot 1 and SIM-C slot connected to cellular modem in NIC slot2. Cellular modem
can use either SIM-A or SIM-B slot (configurable under connection-profile setting as detailed in later
sections).
3.5.2.2 Configuring
A Connection Profile must be configured for the unit to establish a data connection with the cellular
network. A connection profile allows the user to configure various parameters related to the cellular
connection. One or more connection profiles can be configured on the unit. The order of the connection
profiles can be chosen by the user. The unit will use the first connection profile to establish connection
with the cellular network. If connection profile switching (described later) is enabled, then the unit will
switch to second profile in the list if it is unable to establish a connection using the first profile after a
configurable, specified timeout.
An Orbit equipped with a 4G LTE modem is shipped out of the factory with the cellular interface enabled
and a connection profile (named PROFILE-1).
In the UI, start on the following page: Interfaces / Cell ---> Basic Config / Cellular
The cellular configuration is configured by creating a “Connection Profile” to describe the connection and
consists of four major groups of information:
• Network Configuration - contains various parameters related to how the modem registers with the
cellular network.
• Bearer Configuration - parameters related to data connection with the cellular network.
• Keep Alive - Keep alive configuration for sending ICMP Echo messages to a remote host/server
periodically to keep the connection alive (i.e. prevent any network initiated disconnect due to no
data activity). This functionality can also to detect and recover connectivity by resetting the
modem.
• Service Recovery – Parameters related to built-in connectivity recovery configuration.
If multiple cellular providers are supported, the “Connection Profile Switching” choices may need to be
configured.
The following is an example UI screen to create a connection profile named PROFILE-1 by clicking on the
ADD button and naming the profile as such.
Older Orbits equipped with a 3G GSM modem shipped out of factory with cellular interface
disabled. The following example shows how to create a connection profile to allow it to
connect to, for example, AT&T's 3G GSM network with an APN entitled "Broadband":
% set interfaces interface Cell cell-config connection-profile PROFILE-1 bearer-config
apn Broadband
% set interfaces interface Cell enable true
% commit
NOTE In Orbit MCR/ECR firmware version 7.6.5 and above, if the APN field is empty and the
modem is not running Verizon carrier image, the APN is cleared from the modem. This ensures
that modem sends LTE attach without any APN, which enables the network to setup the default
bearer on default APN associated with the SIM card.
• Clear APN – This field should be selected to remove APN from the modem. When modem does
not provide APN during LTE attach, the network can activate the default bearer on APN
associated with the SIM card. This is often desirable as it obviates the need to configure APN
explicitly. However, this is dependent on network policy as some LTE networks may require
configuration of APN on the device.
NOTE In Orbit MCR/ECR firmware version 7.6.5 and above, clear-apn field does NOT have any
effect and has been obsoleted. To achieve the same effect, delete APN from the bearer config as
explained in the earlier note.
• Protocol - This parameter specifies the Packet Data Protocol (PDP) type. DEFAULT - “IP”.
• Auth-type, Username, Password - These parameters should be set if the cellular network
provider requires a username and a password along with authentication protocol (PAP, CHAP or
PAP/CHAP) to be specified. The user does not need to configure the Orbit with 4G LTE modem
with these parameters. The user may need to configure Orbit with 3G GSM modem parameters,
depending on the cellular network.
NOTE In FIPS mode, use of PAP/CHAP with user/password authentication is disabled
• Mtu - Maximum Transmission Unit in bytes - leave at the default value of 1500, unless directed
by technical support to change.
NOTE This MTU parameter applies only to 3G1 modem type that uses PPP to connect to the network.
For all other modem types, MTU configuration under IPv4 settings is used.
• Keep Alive - The keep-alive feature allows the cellular modem to maintain connection in
situations where no traffic is passed over the cellular link for long periods of time or when the
traffic is traversing through a NAT middle box in the network and where the mobile terminated
traffic can be sent only if the NAT entries exist for corresponding mobile originated traffic. The
keep-alive mechanism sends an ICMP echo message to the configured address/name at the
configured interval. This feature should be used only if an application is passing data very
infrequently over a cellular connection (i.e., if data is passed at a rate of less than once per hour).
• Address - This parameter specifies the address or DNS name of the destination host to which
keep-alive messages should be sent
76 MDS Orbit MCR/ECR Technical Manual MDS 05-6632A01, Rev. M
• Interval - This parameter specifies the time interval (in minutes) between keep-alive messages
• Recovery on Timeout - This parameter enables the connectivity recovery mechanism to reset the
cellular modem if no response to the keep-alive messages are received up to max-num-retries
attempts. DEFAULT - true if the keep-alive feature is configured
• Max Num Retries - This parameter specifies the number of keep-alive messages that are sent
before modem recovery is attempted. DEFAULT - 15 - configurable only when recovery-on-
timeout is enabled.
• Service Recovery - The service recovery configuration contains various parameters related to
connectivity recovery features. The service recovery mechanism is meant as a watchdog
mechanism for the cellular connection, where the cellular modem is reset under following
conditions:
- The unit is unable to get connected to the network.
- The unit is unable to register specifically for the LTE service.
• General Recovery Interval - This parameter specifies the time interval after which the cellular
modem is reset if the modem-state does transition into ‘connected’ state. DEFAULT - 300 sec (5
min).
• Lte Recovery – For an Orbit equipped with an LTE modem, this parameter enables LTE service
recovery. The LTE service recovery mechanism resets the cellular modem if it is stuck in 3G
service-state (EV-DO or UMTS) for more than the lte-recovery-interval. This is enabled by
default. This parameter affects only units with LTE capable modem.
• Lte Recovery Interval - For an Orbit with an LTE modem, this parameter specifies the time
interval (in sec) after which, the cellular modem is reset if the modem-state does not transition to
'LTE' service-state. DEFAULT - 900 sec (15 min).
% set interfaces interface Cell cell-config service-recovery lte-recovery false
% commit
NOTE The Lte Recovery mechanism should be disabled if the unit is deployed in areas that either lack
or have poor LTE coverage. Otherwise, the cellular modem and hence the cellular data
connection will be unnecessarily reset every 'lte-recovery-interval' seconds.
•
Netmon – The connection profile can be associated with one or more NETMON service
operations. This enables following functionality: a.) Use of NETMON operation status to trigger
modem reset for connectivity recovery. This is an alternative to using keep alive feature for
connectivity recovery. b.) Use of NETMON operation status to trigger connection profile
switching. Please see section on DUAL SIM for further information.
• Init Delay – After cellular modem starts (or restarts after a reset), the NETMON status is
checked after this initial delay. This is necessary to give the NETMON operation enough
time to change status to UP (true) after modem has been reset. Otherwise, the action
associated with NETMON operation status being down like modem reset or connection
profile switch could be executed prematurely.
• Operation – This is a list of NETMON operations that can be associated with this
profile. The action will be taken when the status of ALL the operations is DOWN (false).
• sim-slot - This parameter specifies the SIM slot that should be used to read the SIM card. Orbit
units equipped with cell modems may have one or two SIM slots: SIM-A and SIM-B. DEFAULT
- SIM-A. The slots are located on the outside of the case, on the front panel. If multiple slots are
provided, the upper slot will be labeled SIM-B and the lower slot will be labeled SIM-A.
NOTE The sim-slot option will not be visible on older Orbit devices.
The Connection Profile Switching feature allows a user to enable switching between one or more
connection profiles automatically. This feature can be used to implement SIM switching functionality,
where the user obtains and configures a unit with two SIM cards, each from a different cellular provider.
MDS 05-6632A01, Rev. M MDS Orbit MCR/ECR Technical Manual 77
This can help increase the reliability of the connection by allowing the unit to switch to a different SIM
card if data connection with the other SIM card fails for any reason (for example, due to reduced signal
strength etc).
For example, the UI screen for a Connection Profile Switching is shown below:
Interfaces / Cell ---> Basic Config / Cellular
Following example shows a sample configuration for SIM switching based on failure to establish
connection, where SIM card from carrier A is inserted in SIM-A and the SIM card from carrier B is
inserted in SIM-B.
• Configure a profile for carrier A to use SIM-A:
set interfaces interface Cell cell-config connection-profile CARRIER-A bearer-config apn carrierA.apn
set interfaces interface Cell cell-config connection-profile CARRIER-A sim-slot SIM-A
• Commit configuration
commit
Following example shows a sample configuration for SIM switching based on NETMON icmp operation
status:
• Configure NETMON operation to ping a remote host (8.8.8.8) that should be reachable through
either carrier network.
set services netmon operation PROBE-1 enabled true
set services netmon operation PROBE-1 type icmp-echo-monitor
set services netmon operation PROBE-1 icmp-echo-monitor dst-host 8.8.8.8
set services netmon operation PROBE-1 icmp-echo-monitor interval 5
set services netmon operation PROBE-1 icmp-echo-monitor timeout 2000
set services netmon operation PROBE-1 icmp-echo-monitor successive-loss-threshold 12
set services netmon operation PROBE-1 icmp-echo-monitor successive-gain-threshold 6
• Commit configuration
commit
The Orbit cell interface uses DHCP to retrieve IPv4 address (assigned by the network) from the modem.
• Request DNS – If enabled, the DNS servers provided by the network are used by the system.
• Request Routers - If enabled, default route is added automatically over the Cell interface.
• Point-to-Point Connection – If enabled, the IP address assigned by the network is added to the
Cell interface with /32 prefix. This should almost always be selected.
NOTE If multiple interfaces on orbit are configured to obtain addresses using DHCP, only one of the
interfaces should enable request-dns and request-routers parameters.
Interfaces / Cell ---> Basic Config / Filter
Following describes the firewall filters applied to the Cell interface:
A cellular interface named ‘Cell-HPUE” will be be automatically created upon first detection of the
HPUE external modem connected to the mini-USB connector on the Orbit. The cellular configuration can
be performed on this interface just like any other internal cellular interface as described in earlier sections.
In the dual cellular modem Orbit MCR, the cellular interface in NIC SLOT-1 is named ‘Cell’ and the
cellular interface in NIC SLOT-2 is named ‘Cell2’. The cellular configuration can be performed on these
interfaces as described in earlier sections.
The default factory configuration (relevant snippet listed below) on the dual cellular modem Orbit MCR,
configures the ‘Cell’ interface as the preferred default path:
# Following is the lower preference fallback route over ‘Cell2’. When ‘Cell’ is up, default route with
preference=254 (i.e. higher preference than below) is added over ‘Cell’.
set routing static-routes ipv4 route 1 dest-prefix 0.0.0.0/0
set routing static-routes ipv4 route 1 outgoing-interface Cell2
set routing static-routes ipv4 route 1 preference 255
3.5.2.3 Monitoring
From the Web UI, status of the cell module can be reviewed on the page:
Interfaces / Cell ---> Status / General
When provisioning the cell module for network service, the cellular provider typically requires the
International Mobile Subscriber Identity code (IMSI) or International Mobile Station Equipment Identity
code (IMEI) to be provided. The Cell Status page contains this information.
Navigate to Interfaces / Cell ---> Status / Cellular
The example below shows cell status of a unit with 4G LTE modem operating on Test network:
> show interfaces-state interface Cell cell-status
cell-status imsi 001012345678901
cell-status imei 359072061603383
cell-status iccid 89860000502000180722
cell-status mdn ""
cell-status apn www.dau.dau
cell-status app-sw-version 0.0.6
cell-status modem-sw-version "Carrier:GENERIC, App:02.30.01.01, PRI:002.045_001"
cell-status modem-package-version 1.0.0
cell-status sim-state ready
cell-status active-sim-slot SIM-A
cell-status sim-a-slot-state inserted
where Cell is the configured name for the cellular device. Cell is the factory default name, but it may have
been changed by a previous user.
When the previous command is entered, a number of items are returned as shown in the example below.
The first two items (highlighted blue) show the IMSI and IMEI codes. These are unique for each unit.
> show interfaces-state interface Cell cell-status
cell-status imsi 001012345678901
cell-status imei 359072061603383
...
NOTE Effective in 2019, each for 4Gx-lte-na modem’s cell firmware MPK files listed above are
available in TWO different configurations, matching the security level of signed firmware in
the Orbit device. For Orbit units running code 7.x and higher, use the corresponding cell MPK
with the -SHA256 suffix. For Orbit units running code early than 7.x, use the corresponding
cell MPK with a -SHA1 suffix.
To start reprogramming the cell modem firmware, navigate to the Reprogram Cellular Modem section.
The following example shows how to upload a cell modem firmware image file through the web browser
and reprogram the cell modem with that image file.
Navigate to Interfaces / Cell ---> Actions / Reprogram
Click on the Begin Reprogramming button once the file source is configured.
MDS 05-6632A01, Rev. M MDS Orbit MCR/ECR Technical Manual 87
Figure 3-31. Reprogram Cellular Modem
The Orbit supports file uploads through a web browser from a local file on the user’s PC. The Orbit also
supports HTTP, FTP, TFTP, and SFTP file downloads using external remote servers.
NOTE In FIPS mode, only SFTP and local file (HTTPS) are allowed for file transfers.
• File Source - File transfer method to use. Available choices are From Local File (DEFAULT),
From HTTP Server, From FTP Server, From TFTP Server, and From SFTP Server. Local file
uploads are only available through the web UI and not through the CLI
• Local File - For a local file, the file to upload as chosen by the file dialog popped up by the
Select File... button
• URL - For HTTP, the location of the source file
• Server Address - For FTP, TFTP, and SFTP, the remote server's host name or IP address
• File Path - For FTP, TFTP, and SFTP, the path to the source file on the remote server
• User Name - For FTP and SFTP, the user name on the remote server
• Password - For FTP and SFTP, the password on the remote server
• Control Port - For FTP, the TCP control port (advanced setting - use default)
• Data Port - For FTP, the TCP data port (advanced setting - use default)
• Block Size - For TFTP, the block size as defined in RFP 2348 (advanced setting - use default)
• Timeout - For FTP, TFTP, and SFTP, the timeout in seconds (advanced setting - use default)
The following example shows how to have the device download a cell modem firmware image (named
cell-4g5-1.0.2.mpk) from a TFTP server running on a host (address 192.168.1.10) that is accessible from
the Orbit (e.g. a locally connected host or remote host accessible via cellular interface). To start
reprogramming the cell modem firmware from the CLI, enter the following command to download the
firmware image from the TFTP server:
> request interfaces interface Cell firmware reprogram filename cell-4g5-1.0.2.mpk manual-
file-server { tftp { address 192.168.1.10 } }
Monitoring - Reprogram
Once the reprogramming is begun, the process may be cancelled by clicking the Cancel
Reprogramming button. The current status of the reprogramming process is displayed on the web page.
Note that the web page does not display the current status if the device has not been instructed to
reprogram (in other words, if the state is “inactive”).
3.5.3 WiFi
3.5.3.1 Understanding
The Orbit can be ordered with following WiFi module options that have FCC/CE modular approval:
MDS 05-6632A01, Rev. M MDS Orbit MCR/ECR Technical Manual 89
• Standard – IEEE 802.11b/g/n 2.4Ghz 1x1 SISO
• Enhanced– IEEE 802.11a/b/g/n 2.4/5Ghz 2x2 MIMO
The content specified in following sections is applicable to both of the above options unless specifically
indicated otherwise. The specifications for the WiFi module options are covered in “WiFi Specifications”
on Page 484.
The tables below contain the list of GE MDS approved antennas for standard WiFi.
The standard WiFi module can be configured to operate as an Access Point (AP) or Station (Client) and
the enhanced WiFi module can be configured to operate as an Access Point (AP), Station or Access
Point+Station (to extend coverage).
AES/CCMP AES/CCMP
TKIP
AES/CCMP + TKIP
AES/CCMP + TKIP
The default SSID is based on the unit’s serial number and takes the form of: GEMDS_<SERNUM> (the
serial number is printed on the chassis sticker). The default password for WiFi operation is
GEMDS_ORBIT.
The table below describes the Orbit MCR’s LED behavior when using the WiFi interface. The LED for
the NIC varies, depending on the configuration of the device. When equipped with 900 MHz support,
WiFi information is in NIC 1; otherwise, it is in NIC 2.
Access Point Mode Solid Green Operating as AP and at least one client connection
Solid Red Operating as an AP and no client connection
3.5.3.2 Configuring
Configuring the WiFi begins with the following UI:
Navigate to: Interfaces / Wi-Fi ---> Basic Config / Wi-Fi / Wifi Config
3.5.3.2.1 AP Mode
To configure the parameters necessary for Access Point mode, start by using the following section of the
web UI:
Navigate to: Interfaces / Wi-Fi ---> Basic Config / Wi-Fi
Enhanced WiFi:
• 2.4Ghz (HT20): 1-11
• 2.4Ghz (HT40-): 5-11
• 2.4Ghz (HT40+): 1-7
• 5Ghz (HT20):36,40,44,48,149,153,157,161,165
• 5Ghz (HT40-): 40,48,153,161
• 5Ghz (HT40+): 36,44,149,157
DEFAULT - 6.
MDS 05-6632A01, Rev. M MDS Orbit MCR/ECR Technical Manual 93
NOTE When channel is set to 0, automatic channel selection is enabled. This is supported only for
enhanced WiFi.
• Channel Width- Channel bandwidth:
• HT20 - 20 MHz channels only.
• HT40+ - Both 20Mhz and 40Mhz channels with secondary channel above primary
channel.
• HT40- - Both 20Mhz and 40Mhz channels with secondary channel below primary
channel.
• Operation Mode - IEEE 802.11 mode to operate in.
• 802.11a (5Ghz OFDM) - Enhanced WiFi only
• 802.11b (2.4Ghz, CCK)
• 802.11g (2.4Ghz, OFDM)
• 802.11n (2.4Ghz, OFDM with 802.11n)
• 802.11an (5Ghz, OFDM with 802.11n) - Enhanced WiFi only
NOTE The following are advanced WiFi network settings and should only be modified with the
assistance of a network engineer.
• Dtim Period – DTIM (delivery traffic information message) period. The number of beacons
between DTIMs. Valid Values: 1-255, DEFAULT - 2.
• Rts Threshold – RTS/CTS Threshold. Valid Values 0-2347, DEFAULT - 2347 (disabled).
• Fragm Threshold –Fragmentation Threshold. Valid Values 0-2346, DEFAULT - 2346
(disabled).
To add an AP, click on the ADD button, or to delete an AP, click on the SSID and then the Delete button.
By default, an access point will be configured with the SSID, GEMDS <SERNUM> and the WiFi
password, GEMDS-ORBIT. To edit an AP, click on the SSID of the configured network. In the
following example, the SSID is GEMDS_2344676.
commit
• Configure Wi-Fi
set interfaces interface Wi-Fi type wifi
set interfaces interface Wi-Fi wifi-config mode access-point
set interfaces interface Wi-Fi wifi-config ap-config operation-mode 80211n
set interfaces interface Wi-Fi wifi-config ap-config channel 11
set interfaces interface Wi-Fi wifi-config ap-config ap SOMESSID privacy-mode wpa2-enterprise
set interfaces interface Wi-Fi wifi-config ap-config ap SOMESSID eap-config encryption ccmp
set interfaces interface Wi-Fi wifi-config ap-config ap SOMESSID radius-server RADIUS-1
• Configure VLAN200
set interfaces interface VLAN200 type vlan
set interfaces interface VLAN200 vlan-config vlan-id 200
set interfaces interface VLAN200 filter input IN_TRUSTED
set interfaces interface VLAN200 filter output OUT_TRUSTED
set interfaces interface VLAN200 ipv4 address 2.2.2.2 prefix-length 24
• Configure Wi-Fi
set interfaces interface Wi-Fi type wifi
set interfaces interface Wi-Fi wifi-config mode access-point
set interfaces interface Wi-Fi wifi-config ap-config operation-mode 80211n
set interfaces interface Wi-Fi wifi-config ap-config channel 0
set interfaces interface Wi-Fi wifi-config ap-config ap SOMESSID privacy-mode wpa2-personal
set interfaces interface Wi-Fi wifi-config ap-config ap SOMESSID psk-config encryption ccmp
set interfaces interface Wi-Fi wifi-config ap-config ap SOMESSID psk-config psk test123456
set interfaces interface Wi-Fi wifi-config ap-config ap SOMESSID vlan-mode access
set interfaces interface Wi-Fi wifi-config ap-config ap SOMESSID vlan VLAN100
set interfaces interface Wi-Fi wifi-config ap-config ap GUESTSSID privacy-mode wpa2-personal
set interfaces interface Wi-Fi wifi-config ap-config ap GUESTSSID psk-config encryption ccmp
WPA2-Personal
The following CLI commands will configure the Wi-Fi in station/client mode to connect to an access
point with an SSID of SOMESSID with WPA2-Personal (w/ CCMP encryption):
WPA2-Enterprise
The following CLI commands will configure the Wi-Fi in station/client mode to connect to an access
point with an SSID of SOMESSID with WPA2-Enterprise (w/ CCMP encryption):
NOTE The CLIENT-CERT, CLIENT-KEY and CA-CERT are the identifiers given to the client
certificate, client key and CA certificate when loading them into unit either manually or through
SCEP. Please refer to section 3.9 Public Key and Certificates.
3.5.3.2.3 Access-Point-Station Mode
The enhanced WiFi can be configured to operate as station/client and AP simultaneously (a.k.a store-n-
forward mode) by selecting the mode as “access-point-station”. When this mode is selected, both AP and
station configuration as described in previous sections is applicable. The unit connects to configured
upstream APs as a client and acts AP for other downstream clients. This mode can be used for extending
network coverage.
Following should be considered when using this mode for extending network coverage:
• The operation-mode of the AP should be the same as the one for upstream AP.
• The AP channel should be set to 0. With this setting, the AP is started on the same channel as the
one on which the client connects to the upstream AP. Therefore, if the upstream AP’s channel is
changed, the local AP will be automatically restarted on the same channel.
• If more there is more than one device with this mode in the network, the SSID for the AP should
be different than the one configured for upstream AP. Otherwise, two devices in this mode can
end up connecting to each other instead of connecting to upstream AP. In such a case, the client-
only devices can be configured with SSIDs of both upstream and intermediate APs, in order to
allow them to connect to either of them based on signal strength.
3.5.4 Monitoring
3.5.4.1 General
The following UI screens are read-only. Navigate to: Interfaces / Wi-Fi ---> Status / General
Channels 80 80 27 18 15 13
Modulation 2-GFSK 2-GFSK 2-GFSK 4-GFSK 4-GFSK 4-GFSK
RF Bandwidth 152 kHz 300 kHz 505 kHz 680 kHz 933 kHz 1320 kHz
(20dB) (20dB) (6 dB) (6 dB) (6 dB) (6 dB)
Sensitivity 1x10- -105 dBm -103 dBm -99 dBm -92 dBm -95 dBm -95 dBm
6
*1000N occupies 250 kHz less spectrum bandwidth than 1000W which is why it has a "narrower bandwidth", this
comes with a ~2-3 dBm reduction in sensitivity when compared to 1000W kbps. For clear spectrum, use 1000W, for
unknown or busy spectrum it's safer to use the narrow 1000N modem.
Table 3-11. Approved NxRadio Antenna Types
Frequency GE MDS Part
Application Location Gain Antenna Description
Range Number
900 MHz
Indoor 902-928MHz 2 dBi Omni Indoor Flex 97-2952A01
(NX915)
900 MHz Omni with 16” N-F Connect and
Indoor 902-928MHz 5 dBi 97-3194A16
(NX915) Mount
10 dBd
900 MHz
Outdoor 902-960MHz (12.15 Yagi 6 Element, N-Female - no cable 97-3194A14
(NX915)
dBi)
10 dBd
900 MHz Yagi 6 Element, N-Female - with 10’
Outdoor 902-960MHz (12.15 97-3194A14A
(NX915) Jumper N-M and Mount
dBi)
10 dBd
900 MHz Yagi 6 Element, N-Female - with 15’
Outdoor 902-960MHz (12.15 97-3194A14B
(NX915) Jumper N-M and Mount
dBi)
900 MHz 6.4 dBd
Outdoor 902-960MHz Yagi 3 Element N-Female - no cable 97-3194A13
(NX915) (8.55 dBi)
900 MHz 6.4 dBd Yagi 3 Element N-Female – with 10’
Outdoor 902-960MHz 97-3194A13A
(NX915) (8.55 dBi) Jumper N-M and Mount
For the 900MHz radio (NX915) – If the installed antenna network does not provide the proper load matching, an
alarm is generated by the unit to indicate a VSWR Error condition. This must be corrected in order for the radio to
operate properly and to ensure optimal operation.
NOTE The only required steps for basic configuration are programing a network name in all units and
establishing one unit as the AP.
Minimal configuration is necessary, but several advanced tuning facilities are provided.
108 MDS Orbit MCR/ECR Technical Manual MDS 05-6632A01, Rev. M
Frequency operating range is restricted by pre-set factory calibration to ensure compliance with
applicable country-specific regulatory requirements. Frequency operating range can be further restricted
by user input to avoid select portions of the operating band. This is sometimes helpful when attempting to
collocate a network with another 900MHz network, such as the MDS iNET or TransNET. For example,
the iNET network can be configured to operate in the top half of the band while the Orbit can have its
NX915 module configured for the lower half.
By default, the radio ships from the factory with the 500kbps modem selected. Dwell time is set to 50ms
and Hop Set A is enabled. For typical configuration (e.g., North America) this provides 27 discrete
channels over which to hop.
Hop Sets provide a way of specifying the minimum channel spacing within the band and implicitly define
the maximum number of hops. Hop Set A uses 307.5 kHz spacing and provides 80 channels. (Required
for Modem selections 125kbps and 250kbps).
Table 3-12. Selected Modem Modes
Selected Modem Modes
A 80 80 27 18 15 13
B 0 0 27 20 15 12
C 0 0 26 20 16 12
D 0 0 0 20 16 13
E 0 0 0 0 16 13
F 0 0 0 0 0 13
See “APPENDIX F – NX915 Module Frequencies” on Page 529 for a chart listing RF
channels/frequencies in each hop set, as they apply to each modem selection.
Other items of interest for tuning configuration include Modem Mode (125kbps, 250kbps, 500kbps, etc.)
and dwell time. For remotes, setting modem mode to “auto” allows remotes to automatically follow the
configuration of the AP. Setting the remote to use a specific modem trades faster sync times for system
flexibility. Dwell time determines how frequently the radio switches channels. Longer dwell times are
more efficient for data transport and provide higher throughput; but smaller dwell times provide faster
synchronization and are more robust in weak signal environments or in the presence of interferers.
For the advanced user, the module supports configuring more items including:
• Data Retries - Number of times to retry unicast data before declaring NACK.
• Fragment Threshold - Fragmentation threshold
• Lna State - Controls the low noise amplifier
• Mcast Repeat - Number of times to repeat downstream broadcast and multicast data.
• Propagation Delay - Correction for the propagation delay of the RF signal.
• Stale Packet Timeout - If the MAC is unable to transmit a packet in this time, it will drop the
packet.
In general, it is recommended that users start with the simplest configuration and then make parameter
changes as necessary to meet specific needs.
Remote Mode Blink Red NIC Initialization / Not linked to an Access Point
Solid Green Linked with Access Point
Again, the LQI on modem's 1000W and 1250 are usually low. Display of an LQI value indicates a signal
is present. Due to the Receiver's wide bandwidth in 1000/1000W/1250 Modems, the dynamic range is
lower which typically resolves on a low LQI.
For the remaining modems, "Pristine" means in an absolutely perfect signal environment the best LQI
will be less than or equal to the number in the table.
"Usable" means the signal quality is good and the radio should be able to demodulate correctly, however
if LQI averages are approaching this limit then errors would be expected. Ideally average LQI should fall
somewhere in between the two values shown for each modem.
Lastly, keep in mind this is a "relative" measurement. Please do not make any hard decisions based on
this metric. Systems (obviously) are not all the same and optimizing the system may take a little
configuring based on Noise Floor/Data Type/Data Volume…
An LQI of 255 is reported (on a given channel/s) during the setup sequence and might also be reported
after the remote unit is “associated” with the AP. This does not necessarily imply poor RF conditions;
only that no user traffic has been received by the remote from the AP on that specific channel.
As mentioned above since the LQI is a dynamic value that varies upon the environment and is only
updated when data is received on the RF interface. It is recommended that to obtain a “good” LQI reading
the user enable some traffic to/from the RF interface (where the LQI is being read). Example: If at a
remote site, ping the AP and refresh LQI readings at the remote to get most updated LQI reading.
Another note on Modems and distance. The lower the kbps the further the units may be separated (lower
the sensitivity). A 125kbps modem can reach out the farthest and the 1250kbps Modem would be the
shortest. The Orbit will support up to 8 Hop Store-and-Forward to extend these distances (although
Latency must be considered with each additional hop).
Adaptive Data Rate
The adaptive data rate mode allows the uplink traffic to adjust which modem is used on a per remote basis
and also works in Store and Forward networks. The mode selection allows the modem to vary over two
ranges. It can vary over either 125 kbps to 250 kbps for FHSS operation or 500 kbps to 1250 kbps for
DTS operation. When a remote’s RSSI is stronger than the ADR threshold it will attempt to transmit with
a faster modem. The downstream traffic is only sent at the lower data rate, either 125 kbps or 500kbps
depending on the mode.
The primary use case for this feature is if an AP has some remotes that are close to the AP and could
support a higher data rate and some farther away that can only support a lower data rate. This mode
allows the close remotes to take advantage of the higher data rate for the uplink, when otherwise the
whole network would have had to be run at the lower data rate. This feature will not give the optimal data
rates if all remotes can support the higher data rate, because all downlink traffic will be sent at a lower
data rate.
Security
Setting the security mode to EAP or PSK will enable device authentication. When enabled, the remotes
will authenticate with the AP (PSK) or a backend RADIUS server (EAP) before they are allowed to pass
MDS 05-6632A01, Rev. M MDS Orbit MCR/ECR Technical Manual 111
data on the network. The authentication protocol is compliant with IEEE 802.1X. If device
authentication is enabled, over the air data encryption can also be enabled. This ensures all over the air
traffic is protected. When encryption is enabled, the device must occasionally rotate the encryption keys.
This rotation is logged in the event log with event type nx_auth. These events can be suppressed in the
event log configuration to prevent them from filling the event log. See section 3.6.2 for instruction on
controlling the event log.
Configuring
AP Mode
Basic configuration with defaults
Navigate to: Interfaces / NxRadio ---> Basic Config / Nx Radio
• Lna State – Low Noise Amplifier in the High Sensitivity setting will amplify the incoming signal
and increase the chance of detecting weak signals. This is the default mode for the LNA. In a
high noise environment, such as at main tower where an AP might be located, it can help to turn
the LNA to High Immunity, which disables the LNA amplification. This means the radio will not
be trying extra to amplify the collocated RF noise. It will be more difficult to detect weak
signals, if at all, but enhance the probability to detect the stronger ones.
- High Sensitivity – set when operating in a low noise environment with minimal radio
interference
- High Immunity - set when operating in an environment with radio interference
• Stale Packet Timeout - If the MAC is unable to transmit a packet in this time, it will drop the
packet. Milliseconds, DEFAULT = 1500, range from 0 to 65535.
• Data Retries - Number of times to retry unicast data before declaring NACK. Valid values: 0—
15, DEFAULT = 3.
• NIC ID – ADVANCED SETTING – TYPICALLY DO NOT CHANGE - Manual overrides of
the NIC identifier: DEFAULT = 0, means auto, not manual. Range of 0 or 400-500
• Gateway ID - ADVANCED SETTING – TYPICALLY DO NOT CHANGE - Manual
overrides of the NIC’s gateway identifier: DEFAULT = 0, means auto, not manual Range of 0 or
65535.
• ARP Cache – Disabled by DEFAULT. When enabled, the radio will respond to ARP requests
intended for other network devices with known addresses. It will not forward the ARP to the
intended device. See APPENDIX L – Understanding ARP Cache
• ADR Mode – Adaptive data rate mode controls whether the NIC will attempt to use different
modem speeds for different remotes. All downstream traffic uses the lowest rate; only upstream
traffic can use the variable rate. ADR setting is automatically learned by remotes, but remotes
modem must be set to Auto, or 125 for 125-250kbps, or 500 for 500-1250 kbps operation.
- 125-250kbps – ADR will attempt to use the FHSS modems (125kbps and 250kbps) when
trying to determine the best modem for the remote.
- 500-1250kbps – ADR will use the DTS modems (500kbps, 1000kbps, 1000W kbps, and
1250 kbps) when attempting to determine the optimal rate.
- none – ADR is not used and the static modem setting in nx-config is used for the modem.
• ADR Threshold – The threshold is an RSSI threshold. If the received signal is stronger than the
threshold the NIC will attempt to use a faster modem. ADR Threshold must be set for each radio
(Remotes and AP). This is advantageous in that you can run the majority of the network in ADR
mode, but if a particular remote has strong RSSI but difficult channel conditions, you can
effectively disable ADR on that specific remote by setting the ADR threshold artificially low.
DEFAULT = -70, range from -127 to 0.
• Encryption Protocol – Encryption Protocol 2.0 provides the highest level of over the air
encryption security with a strong encryption key but is not compatible with Orbit radios running
firmware earlier than 3.1.0. Encryption Protocol 1.0 provides compatibility with older firmware
by using the strong key when talking to units with firmware 3.1.0 and later, and a less strong key
when talking to units with firmware earlier than 3.1.0. DEFAULT 2.0. For more information,
refer to Product Bulletin PB15001_A, MCR-900 Encryption Issue Resolution, available at
http://www.gemds.com
security {
security-mode none;
encryption none;
}
advanced-config {
lna-state high-sensitivity;
stale-packet-timeout 1500;
propagation-delay 40miles;
mcast-repeat 3;
data-retries 3;
fragment-threshold 0;
remote-age-time 600;
endpoint-age-time 300;
allow-retransmit true;
arp-cache false;
adr-mode none;
adr-threshold -70;
encryption-protocol 2.0;
}
Security configuration
The default security mode, as shown above, is none.
The following configures the NX915 module to use data compression, pre-shared key authentication with
the passphrase 'mypassphrase' and aes128-ccm encryption.
% set interfaces interface NxRadio nx-config data-compression lzo security encryption
aes128-ccm security-mode psk passphrase mypassphrase
% show interfaces interface NxRadio nx-config | details
modem-mode 500kbps;
device-mode access-point;
network-name MyNetwork;
data-compression lzo;
header compression false;
power 30;
dwell-time 50;
beacon-interval 150;
hop-set a;
security {
security-mode psk;
encryption aes128-ccm;
passphrase mypassphrase;
}
advanced-config {
lna-state high-sensitivity;
stale-packet-timeout 1500;
propagation-delay 40miles;
mcast-repeat 3;
data-retries 3;
The following configures the NX915 module to use data compression, EAP authentication and aes128-
ccm encryption. The radius server used by the EAP authentication is selected from a list of configured
Radius servers.
% set interfaces interface NxRadio nx-config data-compression lzo security encryption
aes128-ccm security-mode eap radius-server RADIUS_SERVER
% show interfaces interface NxRadio nx-config | details
modem-mode 500kbps;
device-mode access-point;
network-name MyNetwork;
data-compression lzo;
header compression false;
power 30;
dwell-time 50;
beacon-interval 150;
hop-set a;
security {
security-mode eap;
encryption aes128-ccm;
radius-server RADIUS_SERVER;
}
advanced-config {
lna-state high-sensitivity;
stale-packet-timeout 1500;
propagation-delay 40miles;
mcast-repeat 3;
data-retries 3;
fragment-threshold 0;
remote-age-time 600;
endpoint-age-time 300;
allow-retransmit true;
arp-cache false;
adr-mode none;
adr-threshold -70;
encryption-protocol 2.0;
}
Other configuration
The following will configure the NX915 module to operate at 20 dBm on hop-set b, with a beacon
interval of 25 ms and a dwell time of 75 ms. It also setups several advanced configuration parameters to
move the propagation delay to 60 miles, disabled the data retries and multicast/broadcast repeats. It
configures the LNA to operate in a high immunity mode, fragments data frames to 50 bytes, set a stale
packet timeout to 1250 ms and avoids operating in the band from 915 to 920 MHz.
MDS 05-6632A01, Rev. M MDS Orbit MCR/ECR Technical Manual 131
% set interfaces interface NxRadio nx-config power 20 hop-set b beacon-interval 25 dwell-
time 75 advanced-config propagation-delay 60miles data-retries 0 mcast-repeat 0 lna-state
high-immunity fragment-threshold 50 stale-packet-timeout 1250 avoided-frequencies 915-
920
% show interfaces interface NxRadio nx-config | details
modem-mode 500kbps;
device-mode access-point;
network-name MyNetwork;
data-compression lzo;
header compression false;
power 20;
dwell-time 75;
beacon-interval 25;
hop-set b;
security {
security-mode psk;
encryption aes128-ccm;
passphrase mypassphrase;
}
advanced-config {
lna-state high-immunity;
avoided-frequencies [ 915-920 ];
stale-packet-timeout 1250;
propagation-delay 60miles;
mcast-repeat 0;
data-retries 0;
fragment-threshold 50;
remote-age-time 600;
endpoint-age-time 300;
allow-retransmit true;
arp-cache false;
adr-mode none;
adr-threshold -70;
encryption-protocol 2.0;
}
Remote Mode
The following will configure the NX915 module as a Remote with the network name of 'MyNetwork' and
default settings.
% set interfaces interface NxRadio nx-config device-mode remote network-name MyNetwork
% show interfaces interface NxRadio nx-config | details
modem-mode 500kbps;
device-mode remote;
network-name MyNetwork;
data-compression none;
header-compression false;
power 30;
security {
security-mode none;
encryption none;
}
advanced-config {
Security Configuration
The default security mode, as shown above, is none. The following configures the NX915 module to use
data compression, pre-shared key authentication with the passphrase “mypassphrase” and aes128-ccm
encryption.
% set interfaces interface NxRadio nx-config data-compression lzo security encryption
aes128-ccm security-mode psk passphrase mypassphrase
% show interfaces interface NxRadio nx-config | details
modem-mode 500kbps;
device-mode remote;
network-name MyNetwork;
data-compression lzo;
header-compression false;
power 30;
security {
security-mode psk;
encryption aes128-ccm;
passphrase mypassphrase;
}
advanced-config {
lna-state high-sensitivity;
stale-packet-timeout 1500;
data-retries 3;
nic-id 0;
gateway-id 0;
arp-cache false;
adr-mode none;
adr-threshold -70;
encryption-protocol 2.0;
}
The following configures the NX915 module to use data compression, EAP authentication and aes128-
ccm encryption. The EAP mode currently supports only EAP-TLS. This requires configuring the
appropriate PKI Certificates and Keys to use in the TLS authentication. This information is selected from
the PKI configuration.
% set interfaces interface NxRadio nx-config data-compression lzo security encryption
aes128-ccm security-mode eap eap-mode eap-tls pki ca-cert-id CACert key-id DevicePrivKey
cert-id DevicePubCert
% show interfaces interface NxRadio nx-config | details
modem-mode 500kbps;
device-mode remote;
network-name MyNetwork;
MDS 05-6632A01, Rev. M MDS Orbit MCR/ECR Technical Manual 133
data-compression lzo;
header-compression false;
power 30;
security {
security-mode eap;
encryption aes128-ccm;
eap-mode eap-tls;
pki {
cert-id DevicePubCert;
key-id DevicePrivKey;
ca-cert-id CACert;
}
}
advanced-config {
lna-state high-sensitivity;
stale-packet-timeout 1500;
data-retries 3;
nic-id 0;
gateway-id 0;
arp-cache false;
adr-mode none;
adr-threshold -70;
encryption-protocol 2.0;
}
Other configuration
The advanced configuration on an NX915 module operating as a Remote, shares the same configuration
for LNA stat, stale packets timeout and data retries as an Access Point. The NIC and Gateway Identifier
are for use in manually configuring link paths a station will use in the network. The default value of 0 for
the identifiers configured the module to automatically obtain a path in the network. This is particularly
useful in a network that contains Store-and-Forward devices.
Store-and-Forward Mode
Basic configuration with defaults
The following will configure the NX915 module as a Store-and-Forward (SAF) device with the network
name of “MyNetwork” and default settings.
% set interfaces interface NxRadio nx-config device-mode store-and-forward network-name
MyNetwork
% show interfaces interface NxRadio nx-config | details
modem-mode 500kbps;
device-mode store-and-forward;
network-name MyNetwork;
data-compression none;
header-compression false;
power 30;
security {
security-mode none;
encryption none;
}
advanced-config {
lna-state high-sensitivity;
Security configuration
The default security mode, as shown above, is none. The configuration options are the same as an NX915
module operating in remote mode.
Other configuration
The advanced configuration on an NX915 module operating as a Store-and-Forward device, shares the
same configuration as a Remote. The NIC and Gateway Identifier are for use in manually configuring
link paths a station will use in the network. The default value of 0 for the identifiers configured the NIC
module to automatically obtain a path in the network. Manually setting the NIC ID to a specific value,
allows you to configure Remotes to use that value as their Gateway ID. Doing so will cause the Remote
to only synchronize with this Store-and-Forward device to gain network access.
Monitoring
Ensure the CLI is in operational mode.
Access Point Mode
The following shows status with two remotes connected.
> show interfaces-state interface NxRadio nx-status | tab
nx-status init-status complete
nx-status current-device-mode access-point
nx-status current-modem 500kbps
nx-status alarms ""
nx-status serial-number 2652308
nx-status firmware-revision 0.6.0
nx-status hardware-id 14
nx-status hardware-revision 3
nx-status temperature 46
nx-status mac-stats tx-success 5903
nx-status mac-stats tx-fail 1
nx-status mac-stats tx-queue-full 0
nx-status mac-stats tx-no-sync 0
nx-status mac-stats tx-no-assoc 0
nx-status mac-stats tx-error 0
nx-status mac-stats tx-retry 1253
nx-status mac-stats rx-success 6940
nx-status mac-stats sync-check-error 0
nx-status mac-stats sync-change 0
AVG
CHANNEL FREQUENCY RSSI LQI
--------------------------------------------------------------
0 902.700000 -66 8
3 903.622500 -66 9
6 904.545000 -66 8
9 905.467500 -67 8
12 906.390000 -67 8
15 907.312500 -68 7
18 908.235000 -69 9
21 909.157500 -69 8
24 910.080000 -70 8
27 911.002500 -70 8
30 911.925000 -70 8
33 912.847500 -70 8
36 913.770000 -70 9
39 914.692500 -70 7
42 915.615000 -69 9
45 916.537500 -69 8
48 917.460000 -69 8
51 918.382500 -68 8
54 919.305000 -68 8
57 920.227500 -68 10
60 921.150000 -69 7
63 922.072500 -69 8
66 922.995000 -70 9
69 923.917500 -71 10
72 924.840000 -72 8
75 925.762500 -72 7
78 926.685000 -73 7
NOTE To meet country specific regulatory requirements, parameter restrictions may be configured by
the factory. These settings can NOT be changed or modified by the user. See the table below:
Minimal configuration is necessary, but several advanced tuning facilities are provided.
Radio Mode is a key configuration parameter because it defines the operating characteristics of the radio.
• Radio Mode
- standard - Orbit native mode supporting QAM operation
- store-and-forward - variation of Orbit native mode supporting Store-and-Forward
- transparent-serial – FSK mode supporting x710 backward compatibility
- packet-with-mac – FSK mode supporting SD backward compatibility
- advanced – Newest evolution of QAM operation providing highest performance
NOTE For standard QAM operation. the only required steps for basic configuration are: Program
transmit and receive frequencies per user licensing; program a network name in all units;
establish one unit as the AP
NOTE LN radios are shipped from the factory without set frequencies. The LN radio module will not
power on until you enter a valid TX and RX frequency.
Once profiles are configured, Switch to Next settings can be configured to control how the system
advances to the next profile. The On Failure check box will cause the profile to advance whenever the
radio fails to connect to another for the configured time.
If On Netmon is selected, the profile will advance based on any configured Netmon trigger.
Profiles behave as a prioritized, ordered list. After successfully connecting on a given profile the radio
will maintain that profile, unless connectivity is lost or unless Switch to First on Timeout is selected. If
Switch to First on Timeout is selected the radio will to go back to the first profile after the specified
Switch to First Timeout duration elapses.
Remote Mode Blink Red NIC Initialization / Not linked to an Access Point
Solid Green Linked with Access Point
Multiple QAM modulation rate / bandwidth combinations are provided below. Some options may be
restricted due to regulatory controls or hardware type .
Table 3-18. QAM Modulation and Bandwidth for LN radios
12.5 KHz 10000 sps 20000 bps 40000 bps 50000 bps 60000 bps
25.0KHz 16000 sps 32000 bps 64000 bps 80000 bps 96000 bps
25.0KHz 20000 sps 40000 bps 80000 bps 100000 bps 120000 bps
50.0KHz 40000 sps 80000 bps 160000 bps 200000 bps 240000 bps
Adaptive Modulation
The adaptive modulation mode (modulation automatic) allows directed traffic to adjust which modem is
used on a per-transmission basis. Adaptive modulation works in both upstream and downstream
directions. Modem selection varies between QPSK, 16QAM, and 64QAM. A signal metric score is used
to decide which modem selection to use. The score is determined based on signal strength and packets
received. Advanced configuration can be used to provide some control over the adaptive modulation
thresholds.
The primary use case for this feature is if an AP has some remotes that are close to the AP and could
support a higher data rate and some farther away (or obstructed) that can only support a lower data rate.
This mode allows the close remotes to take advantage of the higher data rate for the directed messages,
when otherwise the whole network would have had to be run at the lower data rate. Note that broadcast
or multicast data must always be transmitted at the lowest rate.
We recommend keeping adaptive modulation set for most installations.
Security
Setting the security mode to EAP or PSK will enable device authentication. When enabled, the remotes
will authenticate with the AP (PSK) or a backend RADIUS server (EAP) before they are allowed to pass
data on the network. The authentication protocol is compliant with IEEE 802.1X. If device
authentication is enabled, over the air data encryption can also be enabled. This ensures all over the air
MDS 05-6632A01, Rev. M MDS Orbit MCR/ECR Technical Manual 143
traffic is protected. When encryption is enabled, the device must occasionally rotate the encryption keys.
This rotation is logged in the event log with event type nx_auth. These events can be suppressed in the
event log configuration to prevent them from filling the event log. See section 3.6.2 for instruction on
controlling the event log.
Simplified Serial Operation in QAM modes
The MDS Orbit is inherently an Ethernet based router. IP messages typically route through the system
over-the-air which adds significant overhead compared to traditional serial polling. To address this Orbit
LN offers a short-cut to allow serial data to be sent over-the-air directly without requiring conversion to
IP.
In QAM operation, a Virtual Radio Channel (VRC) can be added to create a virtual serial port. Virtual
serial ports can then be linked to “Terminal Server” or “Pass-Through” facilities.
• ThePass-Through facility can link a physical COM port (e.g., COM1 or COM2) to the VRC.
Setting this up at the AP and corresponding remotes behaves much like a multicast UDP network
without the configuration complexity or channel overhead associated with conversion to and from
IP.
• The Terminal Server facility is typically used to convert IP data that has been received over-the-air,
into serial data at a remote. By using VRCs it is also possible convert data from an ethernet host
into a serial stream before sending it over the air. (This feature was commonly referred to as
IP/Payload in the legacy MDS SD radio). In this scenario, in addition to being more efficient, the
remote ends need only configure a Pass-Through instance to a serial port instead of requiring a
terminal server configuration at each site.
A quick guide to configuration for Serial Operation is presented in the table below:
Table 3-19. Guide to Serial Operation
Desired Operation Configuration Summary
At the AP:
1)Create a Virtual Radio Channel vrcX which
automatically creates vrcX-serial
2)Setup pass-through instance with vrcx-serial
port and desired AP COM port
Accept serial at the AP, send serial through
the system, and deliver serial at the remote At the Remote:
3)Create a Virtual Radio Channel vrcR which
automatically creates vrcR-serial
4)Setup pass-through instance with vrcR-serial
port and desired remote COM port
At the AP:
1)Create a Virtual Radio Channel vrcX which
automatically creates vrcX-serial
Accept ethernet at the AP, convert to serial 2)Setup terminal server with vrcx-serial port and
desired TCP/UDP port
over-the-air (a.k.a. “IP/Payload”), and
deliver serial at the remote At the Remote:
3)Create a Virtual Radio Channel vrcR which
automatically creates vrcR serial
4)Setup pass-through instance with vrcR serial
port and desired remote COM port
No need to use a Virtual Radio Channel.
Multiple FSK modulation rate / bandwidth combinations are provided as shown here.
Table 3-21. FSK Modulation and Bandwidth for LN radios
• VRC – Select “Add…” to define a new Virtual Radio Channel. (See Simplified Serial Operation
in QAM modes
• for more information.)
150 MDS Orbit MCR/ECR Technical Manual MDS 05-6632A01, Rev. M
• Device Mode - Sets the role the radio will assume in the network.
- Remote (DEFAULT)
- AP
• Network Name - The name of the network. Used to control what networks the radio connects to.
Valid values: 1 to 31 letters (DEFAULT is mds_ln). The network name string is used to identify
the logical network that the device should join. If the network name does not match, the device
will log an event to identify network name collisions.
• Data Compression – Over the air compression
- lzo - Compresses the over the air traffic with the LZO algorithm (DEFAULT)
- none - No data compression
• Header Compression – Enabled by DEFAULT. Enable/disable over the air robust header
compression. This feature compresses IP headers to improve system performance and is most
useful in applications that rely on IP packets with small payloads, such as terminal server
operations or MODBUS polling. This setting must match on each radio (Remote and AP).
NOTE Header Compression and packet concatenation should be disabled when using links with
marginal RF performance, due to higher probability of packet errors.
• Power - The transmit power of the radio: Valid values: 20 - 40 dBm – DEFAULT is 40dBm
• TX Frequency – The frequency at which the radio transmits. DEFAULT is none.
• RX Frequency – The frequency at which the radio receives. DEFAULT is none.
• Channel - Controls the channel bandwidth and symbol rate of the radio.
- 6.25 kHz-4.8 ksps - Channel width 6.25 kHz, symbol rate of 4.8 ksps
- 12.5 kHz-9.6 ksps - Channel width 12.5 kHz, symbol rate of 9.6 kbps (DEFAULT)
- 12.5 kHz-10 ksps - Channel width 12.5 kHz, symbol rate of 10 kbps
- 25 kHz-16 ksps - Channel width 25 kHz, symbol rate of 16 kbps
- 25 kHz-20 ksps - Channel width 25 kHz, symbol rate of 20 kbps
- 50 kHz-40 ksps - Channel width 50 kHz, symbol rate of 40 kbps
• Modulation – Sets the radio’s modulation. You may select automatic (adaptive modulation) or
choose from three fixed modulations.
- Adaptive modulation (DEFAULT)
- QPSK
- 16QAM
- 64QAM
Automatic modulation adaptively selects which modem (QPSK, 16QAM, or 64QAM) is used
on a per-transmission basis. This is useful in networks with some remotes close to the Access
Point, and others farther away or obstructed. This mode allows the close remotes to take
advantage of the higher data rate for the directed messages, while the remotes use a more
conservative modulation.
Radios with fixed modulation settings will operate only at the modulation that you specify. If
the specified modulation is higher than the connection can support, no traffic will flow. If the
connection can support a higher modulation than the selected modulation, the radio will not
take advantage of this and will continue to use the fixed modulation. We recommend that
Adaptive Modulation be used in all cases other than bench tests.
Theoretical throughput is based on modulation and channel settings. Please refer to above.
NOTE On Remote devices if ‘force-store-and-forward’ is set to True, they will only connect if a SAF
device is available, even if a direct link to the AP is present.
• FEC-Mode (AP only) - Sets the FEC level for the radio network. The higher the level the higher
amount of FEC used. Recommended to use default Level-3. In certain conditions where very
strong signals are present, Level-2 and Level-1 may be considered.
- Level-3 (DEFAULT)
- Level-2
- Level-1
• Modulation-Mask (AP only) - Sets the active modulations supported in the network. The radio
will automatically adjust to the highest supportable modulation.
- 4QAM
- 16QAM
- 32QAM
- 64QAM
• Automatic Power Control – Disabled by DEFAULT. When enabled, the radio will reduce
transmit power to the lowest 4 possible settings that maintain reliable 64QAM modulation.
Power starts out at its current setting, then incrementally reduces by 5db to a new threshold once
reliable communication is confirmed. The preset levels for power attenuation are 0, 5, 10, and
15db. This setting may be useful for preventing self-blocking of remotes in a dense radio
deployment with strong signal.
Advanced mode intrinsically supports SAF functionality. In Advanced mode SAF is enabled when ‘use-
store-and-forward’ is set to True in the AP’s configuration. SAF functionality provides a single hop
extension to the radio network and also supports bi-directional Adaptive Modulation through the direct
and SAF link. Multiple SAF devices are supported in a radio network. Advanced mode operation of
Store-and-Forward differs significantly from Orbit’s original Store-and-Forward radio mode. In
Advanced mode as more SAF devices are added to the network, performance does not decrease. This is
because Advanced mode SAF operation immediately forwards any SAF traffic by all SAF devices
simultaneously. This provides an overall faster SAF performance when compared to earlier Store-and-
Forward mode. The tradeoff is that that since all SAF devices transmit simultaneously, any remote device
connecting to the network through an SAF must be restricted only hear a single SAF device. If a remote
can hear from two or more SAF devices this is likely to cause reception errors.
NOTE Since Advanced-polling mode does not generate internal traffic, fec-mode and modulation-
mask must be configured on all individual devices and certain security methods are not
available.
See APPENDIX K for a table summarizing LN Radio Modes, recommended operation and supported
features list.
NOTE In FIPS mode, in packet-with-mac configuration, Security Mode must be set to NONE.
• Radio Mode
- transparent-serial – FSK mode supporting x710 backward compatibility
• Power - The transmit power of the radio: Valid values: 20 - 37 dBm – DEFAULT is 37dBm
• TX Frequency – The frequency at which the radio transmits. DEFAULT is none.
• RX Frequency – The frequency at which the radio receives. DEFAULT is none.
• Serial Modulation – Sets the radio’s modulation (which also determines bandwidth).
- 9600-3FSK - 9600bps, 12.5KHz channel, (legacy MODEM 9600) (DEFAULT)
- 9600M-3FSK - 9600bps, 12.5KHz channel, (legacy MODEM 9600M)
- 19200-3FSK - 19200bps, 12.5KHz channel, (legacy MODEM 19200)
- 19200N-7FSK - 19200bps, 12.5KHz channel , (legacy MODEM 19200N)
- 19200E-7FSK - 19200bps, 12.5KHz channel , (legacy MODEM 19200E)
- 19200M-3FSK - 19200bps, 25.0KHz channel, (legacy MODEM 19200M)
• Radio Mode
- packet-with-mac – FSK mode supporting SD backward compatibility
Note that SD supports up to 3 virtual radios channels (vrc-1, vrc-2, vrc-3) corresponding to 3 different
serial data streams. In the example above, Orbit’s vrcX was set-up to communicate to the SD network’s
vrc-1. Orbit supports definition of multiple Virtual Radio Channels as needed to communicate with any
corresponding SD configuration.
Monitoring
General Interface information: Interfaces / LnRadio ---> Status / General
• Discontinuity Time - The time on the most recent occasion at which one or more of this
interface's counters suffered a discontinuity.
• In Octets - The total number of octets received on the interface, including framing characters.
• In Unicast Pkts - The number of packets, delivered by this sub-layer to a higher (sub-)layer,
which were not addressed to a multicast or broadcast address at this sub-layer.
• In Multicast Pkts - The number of packets, delivered by this sub-layer to a higher (sub-)layer,
which were addressed to a multicast address at this sub-layer.
• In Discards - The number of inbound packets which were chosen to be discarded even though no
errors had been detected to prevent their being deliverable to a higher-layer protocol. One
possible reason for discarding such a packet could be to free up buffer space.
• In Errors - For packet-oriented interfaces, the number of inbound packets that contained errors
preventing them from being deliverable to a higher-layer protocol.
• Out Octets - The total number of octets transmitted out of the interface, including framing
characters.
• Out Unicast Pkts - The total number of packets that higher-level protocols requested be
transmitted, and which were not addressed to a multicast or broadcast address at this sub-layer,
including those that were discarded or not sent.
• Out Discards - The number of outbound packets which were chosen to be discarded even though
no errors had been detected to prevent their being transmitted.
• Out Errors - For packet-oriented interfaces, the number of outbound packets that could not be
transmitted because of errors.
Modem Stats
Last RX Packet
• Last RSSI – The RSSI measured at the time of the last received packet.
• Last Error Vector Magnitude – The EVM measured at the time of the last received packet. For
more information, refer to Important Notes and Information Regarding EVM
• Last Modulation – The modulation measured at the time of the last received packet.
• Rate – The calculated over the air rate.
Hardware Info
NOTE Highlighting an IP address of a Connected Remote and clicking will open a remote web UI
session to the selected remote. See Section 3.8.18, Remote Management Service, for more
information.
Test Mode provides a way to place the transmitter on the air to check the measured RF power output,
measure reflected power from an antenna system, or to provide a signal at a receiving station so that RSSI
can be checked. While in Test Mode, a radio will not operate normally and does not communicate with
the narrowband network.
To enter or exit Test Mode, select the desired test state from the State drop-down box and click Perform
Action.
• Time – The time, in minutes, to remain in test mode before automatically resuming normal
operation. We recommend that you remain in test mode 10 minutes or less.
• State -
- Receive – Enter Receive mode to check the RSSI of a received signal.
- Keyed – Key the transmitter. To prevent damage to the radio, the unit will stop keying
after one minute and automatically transition to the Receive state.
- Stop – Stop all test operations and exit test mode.
Test Values
• Test Mode Time – The length of time test mode has been running.
• Test State – Receive, Keyed, Stop. The current test state.
• Test RSSI (Receive Mode only) – The current signal RSSI.
CLI Configuration Examples
AP Mode
On the next page, the example will display how to configure the LN module as an access point with the
network name of ‘MyNetwork’ and default settings. For this example, we assume a transmit frequency of
Security configuration
The default security mode, as shown above, is none.
The following configures the LN module to use pre-shared key authentication with the passphrase
'mypassphrase' and aes256-ccm encryption.
NOTE When viewing the configuration, the passphrase that you entered is not displayed in plaintext.
This is a security measure.
% set interfaces interface LnRadio ln-config security encryption aes256-ccm security-mode
psk passphrase mypassphrase
% show interfaces interface LnRadio ln-config | details
radio-mode standard;
device-mode access-point;
network-name MyNetwork;
data-compression lzo;
header-compression true;
power 40;
tx-frequency 451.4;
rx-frequency 456.4;
The following configures the LN module to use data compression, EAP authentication and aes256-ccm
encryption. The RADIUS server used by the EAP authentication is selected from a list of configured
RADIUS servers.
% set interfaces interface LnRadio ln-config security encryption aes256-ccm security-mode
eap radius-server RADIUS_SERVER
% show interfaces interface LnRadio ln-config | details
radio-mode standard;
device-mode access-point;
network-name MyNetwork;
data-compression lzo;
header-compression true;
power 40;
tx-frequency 451.4;
rx-frequency 456.4;
channel 12.5KHz-9.6ksps;
modulation automatic;
fec false;
security {
security-mode eap;
encryption aes256-ccm;
radius-server RADIUS_SERVER;
}
advanced-config {
data-retries 3;
packet-ttl 600;
remote-age-time 600;
endpoint-age-time 300;
allow-retransmit true;
arp-cache false;
qam16-threshold -85;
qam64-threshold -70;
}
Security Configuration
The default security mode, as shown above, is none. The following configures the LN module to use pre-
shared key authentication with the passphrase “mypassphrase” and aes256-ccm encryption.
NOTE When viewing the configuration, the passphrase that you entered is not displayed in plaintext.
This is a security measure.
% set interfaces interface LnRadio ln-config security encryption aes256-ccm security-mode
psk passphrase mypassphrase
% show interfaces interface LnRadio ln-config | details
radio-mode standard;
device-mode remote;
network-name MyNetwork;
data-compression lzo;
header-compression true;
power 40;
tx-frequency 456.4;
rx-frequency 451.4;
The following configures the LN module to use data compression, EAP authentication and aes128-ccm
encryption. The EAP mode currently supports only EAP-TLS. This requires configuring the appropriate
PKI Certificates and Keys to use in the TLS authentication. This information is selected from the PKI
configuration.
% set interfaces interface LnRadio ln-config security encryption aes128-ccm security-mode
eap eap-mode eap-tls pki ca-cert-id CACert key-id DevicePrivKey cert-id DevicePubCert
% show interfaces interface LnRadio ln-config | details
radio-mode standard;
device-mode remote;
network-name MyNetwork;
data-compression lzo;
header-compression true;
power 40;
tx-frequency 456.4;
rx-frequency 451.4;
channel 12.5KHz-9.6ksps;
modulation automatic;
fec false;
security {
security-mode eap;
encryption aes128-ccm;
eap-mode eap-tls;
pki {
cert-id DevicePubCert;
key-id DevicePrivKey;
ca-cert-id CACert;
}
}
advanced-config {
data-retries 3;
nic-id 0;
inactivity-timeout 600;
remote-age-time 600;
Monitoring
Ensure the CLI is in operational mode.
Remote Mode
The following shows status when connected to a configured Access Point.
> show interfaces-state interface LnRadio ln-status
ln-status link-status associated
ln-status init-status complete
ln-status current-device-mode remote
ln-status alarms ""
ln-status firmware-revision 0.2.4
ln-status temperature 43
ln-status modem-stats modem-tx-success 33116
ln-status modem-stats modem-tx-error 0
ln-status modem-stats modem-rx-success 197463
ln-status modem-stats modem-rx-error 55283
ln-status mac-stats mac-tx-success 11424
ln-status mac-stats mac-tx-queue-full 0
ln-status mac-stats mac-tx-error 0
ln-status mac-stats mac-tx-retry 0
ln-status mac-stats mac-rx-success 13390
ln-status mac-stats mac-rx-error 1
ln-status ap-info ap-address 00:06:3d:09:0d:d8
ln-status ap-info ip-address 192.168.1.51
ln-status ap-info connected-time 174
ln-status ap-info rssi -68
ln-status ap-info evm 0
ln-status ap-info rx-modulation qpsk
ln-status last-rx-packet last-rssi -68
ln-status modem-stats modem-tx-success 33116
ln-status modem-stats modem-tx-error 0
ln-status modem-stats modem-rx-success 198622
ln-status modem-stats modem-rx-error 55283
ln-status mac-stats mac-tx-success 11424
ln-status mac-stats mac-tx-queue-full 0
ln-status mac-stats mac-tx-error 0
ln-status mac-stats mac-tx-retry 0
ln-status mac-stats mac-rx-success 13390
ln-status mac-stats mac-rx-error 1
ln-status ap-info ap-address 00:06:3d:09:0d:d8
ln-status ap-info ip-address 192.168.1.51
ln-status ap-info connected-time 226
ln-status ap-info rssi -68
ln-status ap-info evm 0
ln-status ap-info rx-modulation qpsk
ln-status last-rx-packet last-rssi -68
ln-status last-rx-packet last-evm 0
ln-status hardware-info serial-number 2661832
ln-status hardware-info hardware-id 0
ln-status hardware-info hardware-revision 0
ln-status test test-mode-time 0
ln-status test test-state stop
NOTE The only required steps for basic configuration are programing a network name in all units and
establishing one unit as the AP.
Security
Setting the security mode to EAP or PSK will enable device authentication. When enabled, the remotes
will authenticate with the AP (PSK) or a backend RADIUS server (EAP) before they are allowed to pass
data on the network. The authentication protocol is compliant with IEEE 802.1X. If device
authentication is enabled, over the air data encryption can also be enabled. This ensures all over the air
traffic is protected. When encryption is enabled, the device must occasionally rotate the encryption keys.
This rotation is logged in the event log with event type nx_auth. These events can be suppressed in the
event log configuration to prevent them from filling the event log. See section 3.6.2 for instruction on
controlling the event log.
• Auto Discover (Remotes only) – Enabled by DEFAULT. When enabled Remotes learn Channel,
Duplex Setting, and Channel Size from the corresponding AP. Disabling Auto Discover enables
manual configuration of these items. Manual settings may be helpful for bench testing but are
discouraged for typical deployments. Auto Discover enabled is the recommended mode.
• Channel (typically AP only) – Logical Channel Section, Valid Values 1-6 - DEFAULT is 1
- Channel selection provides a method to support simple configuration of overlapping
networks. See Table 3-24. Consult GE MDS for channel reuse recommendations.
• Duplex Setting (typically AP only) – Channel Split configuration - DEFAULT is fdd-low-high
- fdd-low-high –split frequency, TX Low and RX High (recommended for masters)
(DEFAULT)
- fdd-high-low – split frequency, TX High and RX Low (recommend for remotes)
- tdd-low – Single frequency operation in the 757-758MHz range
- tdd-high – Single frequency operation in the 787-788MHz range
• Channel Size (typically AP only) – Channel Size choice offers the ability to trade throughput for
range and channel reusability. Setting will depend on application need.
- 570KHz – 570KHz channel, w/ net data throughput of 200 to 1200 kbps
- 315KHz – 315KHz channel, w/ net data throughput of 100 to 600 kbps (DEFAULT)
- 195KHz – 195KHz channel, w/ net data throughput of 50 to 300 kbps
• Enhanced Blocking - Disabled by DEFAULT. When enabled the LW7 will be more immune to
interference, but sensitivity will be slightly reduced. Recommended for high RF noise
environments.
• Modulation Low - Controls the lower bound for Adaptive Modulation
• Modulation High - Controls the upper bound for Adaptive Modulation
Lower Modulation has highest sensitivity. Higher Modulation has higher throughput.
- qpsk-1/4 – OFDM QPSK with 1/4 FEC encoding
- qpsk-1/2 – OFDM QPSK with 1/2 FEC encoding
- qpsk-3/4 – OFDM QPSK with 3/4 FEC encoding
- 16qam-1/2 – OFDM 16QAM with 1/2 FEC encoding
- 16qam-3/4 – OFDM 16QAM with 3/4 FEC encoding (DEFAULT for Modulation High)
• Data Retries - Number of times to retry unicast data before declaring failure. Valid values: 0—
15, DEFAULT = 3.
• NIC ID – ADVANCED SETTING - DO NOT CHANGE - Manually overrides the NIC
identifier.
• Packet TTL (Time-to-Live) – Length of time, in milliseconds, of inactivity of all over-the-air
traffic before registering a disconnection. The radio will then attempt to reconnect to the
network. Valid values: 100 to 65535 ms, DEFAULT = 2000 (2 seconds).
• RSSI Upper Threshold – If the received RSSI signal is stronger than this value for more than
“RSSI Alarm Count” samples, then the unit will generate an alarm. Valid values: -20 to -120
dBm, DEFAULT = -120
• RSSI Lower Threshold – If the received RSSI signal is weaker than this value for more than
“RSSI Alarm Count” samples, then the unit will generate an alarm. Valid values: -20 to -120
dBm, DEFAULT = -120
• RSSI Alarm Count – This is the number of failed threshold samples prior to issuing an alarm. It
provides a mechanism to introduce hysteresis into the RSSI alarm reporting mechanism.
• Retry Percentage – This is a threshold applied to a running average of the number of retries
required to transmit a data packet. If the retry percentage is above the threshold an alarm is
issued.
Test Mode
Test modes are available from the web and from the CLI. The example below is for the CLI.
To enter Test Mode and key the transmitter with random data for 5 minutes:
> request interfaces-state interface LwRadio lw-status test-mode state keyed-random time 5
LW7 introduces a spectrum analyzer useful for analyzing channel interference when verifying a channel
re-use plan.
From the web: Navigate to: Interfaces / LwRadio ---> Actions / Spectrum Analyzer
The default setting may be overridden by adding an event rule. For example the follow shows the cell
connect/disconnect disabled for local logging - this would be useful in an environment where the cell
modem reconnects many times as part of normal operations.
Click on the button to the right of the Name field to locate the event rule to configure. This will
automatically bring up the popup shown on the previous page.
Once selected, click the OK button to close the popup and then click on the Add button when finished.
Clicking on the add buton will display the Event Rule Details option. Clicking the Finish button will add
the event rule.
NETCONF-notifications
The events generated by the unit are converted to NETCONF notifications. NETCONF clients can
subscribe to the unit to receive those notifications.
Syslog Server Setup
The events generated by the unit can be sent to remote syslog servers. The connection to the syslog server
can be made secure using syslog over TLS.
For example:
Alarms
Events can be configured by Event Rules to be Alarms which can causes the Power Light and external
alarm signal to go “high” state. Refer to Section 2.5 for further details.
Alarms have factory default settings that control the behavior of the alarm outputs timing in terms of
period and duration. These values can be overridden to adjust for local requirements.
From the Web UI at Logging ---> Basic Config scroll down to Default Alarm Output to view settings.
If desired, default alarm output behavior can be adjusted by adding entries to the Alarm Output table.
These values supersede the defaults. For example it is possible to change the flash rate of the Power LED
or cause the COM1_PIN alarm output to pulse when an alarm condition is active.
Figure 3-88. Setup using iperf for throughput testing in a private network
Iperf features:
• TCP
- Measure bandwidth
- Report MSS/MTU size and observed read sizes.
- Support for TCP window size via socket buffers.
- Multi-threaded if pthreads or Win32 threads are available. Client and server can have
multiple simultaneous connections.
• UDP
- Client can create UDP streams of specified bandwidth.
- Measure packet loss
- Measure delay jitter
- Multicast capable
- Multi-threaded if pthreads are available. Client and server can have multiple
simultaneous connections (this doesn't work in Windows).
Iperf is available on many platforms, and there are also open source graphical front-ends available. For
further information on iperf, see the iperf homepage at http://software.es.net/iperf/.
Enabling the Iperf service allows the unit to receive TCP traffic from remote host running iperf.
Currently, iperf service running v2.0.5 and is hardcoded to act only as a TCP server listening on port
5001.
NOTE If firewall is enabled, then it must be configured to permit incoming TCP traffic on port 5001.
Monitoring
From the Services Screen the iPerf status can be checked by navigating to IPerf Server
> show services
NAME STATUS
---------------------------------------------------------
DHCP Server running
Firewall running
IPerf Server running
NETCONF Server running
Quality of Service running
Serial running
SNMP Server running
SSH Server running
VPN disabled
Web Server running
Factory No Yes
Auto No No
User Yes No
Configuration
Using the WebUI
Navigate to System->Troubleshooting and click the Actions tab.
Rollback to a snapshot
To rollback to one of the unit’s snapshots, first expand the Recovery menu.
The Snapshot dropdown box lists all the snapshots available on the device. Select the desired snapshot,
and the image that you wish to reboot to.
Initiating a rollback operation immediately reboots the unit to the specified firmware image and restores
the unit’s configuration to the specified snapshot. This operation cannot be undone.
The User Snapshots menu, found under the Rollback menu, allows you to create, delete, and set the
default user snapshot. You cannot delete or modify the unit’s Factory or Auto snapshots.
You may create up to two user snapshots. These snapshots contain the system’s current configuration
and can be rolled back to at any time. User snapshots do not restore passwords. You can also specify a
default user snapshot. The system may use the default user snapshot as a recovery point in the event that
the unit fails to boot properly.
Create Snapshot
• Identifier – The name of the user snapshot. Up to 30 characters, including letters, numbers, dashes,
underscores, and spaces.
• Description - Description of this user snapshot. Up to 127 characters, including letters, numbers,
dashes, underscores, and spaces. Optional.
• Default - Set the default user snapshot used in error recovery. Optional.
Delete Snapshot
• Identifier – The user snapshot to delete. Once a snapshot is deleted, it cannot be recovered.
Status
Navigate to System->Troubleshooting->Status.
The system will prompt you for confirmation before the unit proceeds with the operation. Once
confirmed, the rollback cannot be undone.
The current system configuration will be erased and replaced with the snapshot.
Proceed? [no,yes]
You can set an existing snapshot as the default user snapshot with the following command.
% request system recovery user-snapshots set-default identifier Snapshot1
Monitoring
To view the device’s snapshots, ensure that the CLI is in operational mode.
% show system recovery snapshot
system recovery snapshots Factory
description "Factory Default Configuration"
date 2013-01-01T00:14:27+00:00
version 4.0.0
hash 0x158debb6d7eaec2068166370ace53581
user-default false
system recovery snapshots Auto
description "Automatic snapshot for 4.0.8"
date 2016-01-13T17:20:54+00:00
version 4.0.8
hash 0xa13ceb2d5d267341d5067d975e39131e
user-default false
system recovery snapshots Snapshot1
description "Example snapshot"
date 2016-01-13T19:53:44+00:00
version 4.5.5
hash 0x579b9fa00303ceb9eeb3981cc429d31b
user-default true
Possible completions:
remote-sync-status -
Enables pushing status to the AP on a fixed interval.
remote-sync-time - How often in minutes that the remote will publish its status.
Configuring
Manual Setting of Date, Time and Timezone
To manually set the System Clock date and time on the webUI - Navigate as shown and set the date
(using the calendar) , time (using the slider shown below) and timezone (offset from GMT) - Navigate to
System / Time ---> Actions / Set Current Datetime:
To manually set the date and time, use the request set-current-datetime:
> request system clock set-current-datetime current-datetime 2013-10-01T8:33:45
To configure a SNTP server from the CLI, use the following command as an example;
% set system ntp use-ntp true mode sntp ntp-server server-address
Manually setting the time offset will not take in account daylight savings. To set the time based on
location; choose the location based closest to the installation site. For New York, the offset is -5 hours
during daylight savings and will automatically become -4 hours when daylight savings ends.
% set system clock timezone-location America/New_York
Finally, note that versions of Orbit host firmware prior to 9.3.3 did not support the Sync with Access
Point feature. To use the feature it is necessary to update the firmware on both AP and remotes.
Remotes that are not upgraded to new firmware will not receive the time reference information and
remain unsynchronized.
Monitoring
Ensure the CLI is in operational mode. Follow the example below to view the state and statistics:
> show system clock
system clock current-datetime 2012-06-19T00:20:34+00:00
system clock boot-datetime 2012-06-19T00:18:01+00:00
3.7.2 Geographical-location
The geographical-location of the unit can be manually configured. This information can also be
configured using the initial setup wizard.
• Latitude - in degrees
• Longitude - in degrees
• Altitude - in meters
From the CLI:
% set system geographical-location altitude 1.0 latitude 43.117807 longitude -77.611896
Configuring
The attribute described below controls whether or not Orbit operates in FIPS 140-2 certified mode. This
mode can be enabled to provide an elevated level of security. Changing this setting will result in a factory
reset of the device, to ensure destruction of cryptographic material.
From the CLI:
% set system fips-mode true
Monitoring
Setting the system to FIPS mode is prerequisite, but not sufficient, to be in FIPS operational status. After
the unit is configured to operate in FIPS mode, default passwords and keys must be changed before the
module will report that it has reached “FIPS operational status” (FIPS certified mode + approved
settings). The user can query the FIPS operational status in the System menu in the UI.
From the CLI:
% run show system fips-oper-status
The current alarms view (See Section 3.6.2: Event Logging) will also inform the user which of the above
items currently need to be updated.
From the CLI:
% run show logging current-alarms
The password for each user account can also be changed using a CLI request:
> request system authentication change-password user admin password new_password
Or
> change-password user admin (prompts for new password)
MDS 05-6632A01, Rev. M MDS Orbit MCR/ECR Technical Manual 207
NOTE If the admin password is forgotten, the method to recover the unit is by using the login One-
Time-Password. This will give the user the ability to change the forgotten password. See “One-
Time “Recovery” Passwords” on Page 43.
Orbit user authentication provides the capability to manage the rules regarding logins and the setup rules
regarding password strength.
The unit has protections against repeated login attempts. The max-login-attempts configuration
determines the number of failed logins that can occur in succession before the unit disables the ability to
login for a specified amount of time. The amount of time is determined by failed-login-lockout-time,
which represents the time in seconds.
Start by viewing the current users at System / User Authentication ---> Status
• Max Login Attempts - The maximum number of failed login attempts before locking out future
attempts. DEFAULT 4
• Failed Login Lockout- The number of seconds to reject further login attempts from a host who
has failed to login 'max-login-attempts' number of times. DEFAULT 300 (5 minutes)
• User Authentication Order - When the device authenticates a user with a password, it tries the
authentication method described. Items can be moved from the “Available” to the “In Use” to
select them for use. The order the entries appear in the “In Use” list will be the fallback order.
- Local Users– authentication is based on password info stored on the device
- RADIUS– authentication is based on password info managed by a RADIUS server
- TACACS+ - authentication is based on password info managed by a TACACS+ server
• Disable Non Admin Users – Indicates whether or not tech and oper accounts are disabled.
DEFAULT false (Note: these are automatically disabled until default password is changed)
From the CLI these parameters may be set:
% set system authentication max-login-attempts 30
To configure password rules Navigate to System / User Authentication ---> Basic Config / Password
Options
Clicking on the event Id number provides detailed information regarding record. In the following example
the user logged in the web from IP4 address 192.168.1.10, on port 49656 as user admin:
To do similar operations from the CLI in operational mode, follow the example below to see the history
of login attempts by reviewing the event log:
> show logging event-log event-type web_login
logging event-log 62625
time-stamp 2011-12-21T01:18:08.985996+00:00
priority notice
event-type web_login
status success
message “user_name oper, “
logging event-log 62627
210 MDS Orbit MCR/ECR Technical Manual MDS 05-6632A01, Rev. M
time-stamp 2011-12-21T01:23:00.288046+00:00
priority notice
event-type web_login
status failure
message “msg noauth, user_name admin, “
Syntax may differ from one RADIUS server platform to another. Configurations for a commercial Linux
server, such as the AAA server from Interlinks Network, its dictionary file may be similar to the
following:
GEMDS.attr GEMDS-UserAuth-Group 1 integer (1, 0, 0)
GEMDS.value GEMDS-UserAuth-Group Administrator 2
GEMDS.value GEMDS-UserAuth-Group Technician 1
GEMDS.value GEMDS-UserAuth-Group Operator 0
NOTE All approved networked devices are required to be identified in the server's client file.
Configuring
Navigate to: System / RADIUS ---> Basic Config the main interface for adding RADIUS servers.
• Timeout - The number of seconds the device will wait for a response from a RADIUS server
before trying with a different server. Default = 5 - max value 255.
• Attempts - The number of times the device will send a query to the RADIUS servers before
giving up. Default = 2 - max value 255.
Click the Add button and add a server.
group = mdstech {
service = "user-auth" {
user-auth-group = tech
}
}
And configure the TACACS+ users to belong to one of those groups as follows for PAP authentication:
user = admin {
name = "Admin User"
member = mdsadmin
pap = cleartext admin
}
user = tech {
name = "Tech User"
member = mdstech
pap = cleartext admin
}
user = oper {
name = "Oper User"
member = mdsoper
pap = cleartext admin
}
Configuring
Navigate to: System / TACACS+ ---> Basic Config the main interface for adding TACACS+ servers.
• Timeout - The number of seconds the device will wait for a response from a TACACS+ server
before trying with a different server. Default = 5 - max value 255.
• Attempts - The number of times the device will send a query to the TACACS+ servers before
giving up. Default = 2 - max value 255.
Click the Add button and add a server.
The unit can have two firmware packages programmed into the device. The package that the device
booted into is referred to as the Active Firmware. The other image is referred to as the Inactive Firmware.
NOTE Beginning with Firmware revision 7.1.1, the firmware certificate has changed from a SHA1
value to a SHA256 value. When upgrading from early versions of code it is necessary to load
the proper SHA256 certificate first. See the GE MDS website support_items directory for more
information.
NOTE https://www.gegridsolutions.com/Communications/MDS/software.asp?directory=Orbit_MCR/S
upport_Items
Users may add their own signatures to the firmware package using the GE MDS code signing tool.
NOTE Any additional signatures added to a firmware package will require the corresponding public
certificates to be loaded into the unit for firmware reprogramming to complete successfully.
Similarly, any additional firmware-validation public certificates loaded into the unit require a
firmware package to be signed with the corresponding private keys.
From the WebUI, navigate to System / Firmware. The Versions section shows the firmware currently
loaded in the two regions and which region is active.
Basic Configuration
The unit can be configured to automatically update its firmware to the latest official release. Navigating
to the Basic Config tab, the following Auto Update configuration options are available.
NOTE Security Tip: HTTPS Update Server URLs require a CA X.509 certificate to verify the server
that the device will update from. To access GE’s update server, a CA certificate with identity
“AutoUpdate” comes installed on the device (See CA Certificates, Section 3.9.3). If this
certificate is deleted, please contact Technical Services, as the unit will NOT be able to connect
to GE’s update server.
The rest of the options below are only available if the Enabled option is set to true. Changing the Enabled
setting to false will cancel any pending operations (update or reboot) that may have been scheduled. If a
unit is in Updating state, the update will continue, but auto-reboot will be disabled.
• Firmware Installation – If a check determines that an update is available, the user may select
from one of the following firmware installation options:
- Automatic: If an update is available, the unit will begin the update within one minute.
During this brief wait time, the unit will appear in Pending state. This is the default
behavior.
- Delay: If an update is available, the unit will begin the update after a specified delay.
This may be useful for networks that require staggering of firmware updates to prevent
network loading. During this delay, the unit will be in Pending state. This can be set from
30 minutes, to the length of the Check Interval. The default is 3 hours (180 minutes).
- Manual: If an update is available, the unit will wait for user intervention to perform the
update (via Actions tab).
• Firmware Installation Delay – This is the delay specified if the Firmware Installation option is
set to Delay. If an update is available, the unit will wait this period (in the Pending state) before
beginning the update. This delay may be bypassed manually or the pending update may be
cancelled by the user (see Actions section below).
• Auto-Reboot – Once an update had completed (firmware has been reprogrammed into the
inactive image), the user may select from one of the following reboot options:
- Disabled: When the update is complete, the unit will wait for user intervention to reboot
the unit to the new firmware (via the Power menu).
- Immediately – The unit will reboot to the new firmware immediately after the update is
complete.
- Window – The unit will reboot to new firmware if the update completes during an
allowed “time-of-day” window. This is useful when a reboot is desired at a certain time
of day (i.e. when network traffic will be impacted the least). This is the default option.
• Reboot Window Start/End – If the Auto-Reboot option is set to Window, these options denote
the start and end of the reboot window. Each one is a time-of-day in 24-hour format (between
00:00 and 23:59). If an update completes in between the start and end of the reboot window, the
unit will reboot to the new firmware within one minute. If the update completes outside the
window (before the window start or after the window end), it will wait until the reboot window
start time to reboot. While waiting for reboot, the unit will be in Reboot-Pending state. A pending
reboot may be cancelled by the user.
Monitoring - Reprogram
Once the reprogramming is begun, the process may be cancelled by clicking the Cancel
Reprogramming button. The current status of the reprogramming process is displayed on the web page.
Note that the web page does not display the current status if the device has not been instructed to
reprogram (in other words, if the state is “inactive”).
Upon completion the unit can be re-booted to the newly loaded image by navigating to the Power section.
• Cancel Scheduled Update – This action is only available when an update is in Pending state
(due to Delayed firmware installation being selected). When clicked, it will cancel the scheduled
update. The user will have to manually intervene (Check For Update or Start Update Now) to
schedule or start the update. In the CLI, this can be performed by entering: request system
firmware auto-update cancel-scheduled-update
• Cancel Update – This action is only available in the Updating state. This will cancel the
firmware upgrade in progress. In the CLI, this can be performed by entering: request system
firmware auto-update cancel-update
Note: Since reprogramming may have begun, the firmware in the inactive image will be marked as invalid, and will no longer be functional.
• Cancel Scheduled Reboot – This is only available if Auto-Reboot has been set to Window (see
Basic Config). A reboot that is scheduled for the Reboot Window Start may be cancelled by the
user. The new firmware will be present in the inactive image. The user will have to intervene
(either reschedule reboot via a Check For Update or manually via Power menu) to reboot the
device to the new firmware. In the CLI, this can be performed by entering: request system
firmware auto-update cancel-scheduled-reboot
A “stale firmware” alarm will be raised if a unit has updated its firmware but has not booted to the new
firmware for one-half the value of the check interval. The alarm will also be raised if a unit has Up-to-
Date firmware, but is booted to out-of-date (stale) firmware.
To view the status of the Auto Update process in the CLI, ensure the CLI is in operational mode and then
follow the example below:
> show system firmware auto-update
system firmware auto-update status auto-update-state Up-to-Date
system firmware auto-update status auto-update-details "Last check: Sun Sep 27 17:39:46
2020"
Monitoring - Verifying
Once the verification is begun, the current status of the verification process is displayed on the web page.
Note that the web page does not display the current status if the device has not been instructed to verify a
firmware image (in other words, if the state is “inactive”).
Configuring - Copy
To copy the active firmware image to the inactive firmware image, navigate to the Copy Image section
and click on the Begin Copying button to begin.
Monitoring - Copy
Once the copying is begun, the current status of the copying process is displayed on the web page. Note
that the web page does not display the current status if the device has not been instructed to copy the
firmware image (in other words, if the state is “inactive”).
Configuring – Power
To restart the device to a specified firmware image, navigate to the Power section and select the
appropriate image (1 or 2) to restart into. Once an image is selected, click on the Restart to selected
button to begin.
Allow approximately 2 minutes for the unit to complete the restarting process and refresh the screen.
File Servers
External file servers can be pre-configured in the CLI so that the configuration can easily be referenced in
other services without the need to re-enter the information. File Server Configurations can be used for
reprogramming, downloading certificates, configuration script import and export and sending support
bundles for debugging.
The following shows how to add a file server configuration named “GE File Server 1”:
% set file-servers GE_file_server_1 tftp address 192.168.1.10
% commit
• Enabled - Indicates whether magnetometer is enabled for use. Enabling magnetometer performs
a calibration to zero the current coordinate values.
• Trigger Thresholds - used to configure the device’s sensitivity. Merely rotating the unit or
moving it along any axis (for example, 6 to 12 inches) may be enough to trigger an alarm with
thresholds at the minimum values. Setting the thresholds at the maximum values will prevent
alarms from occurring under normal circumstances. However, unusual circumstances, such as
setting a strong magnet on the unit, may still trigger an alarm
- x-axis - alarm trigger threshold for x-axis. Default = 50 range : 25 - 2000
- y-axis - alarm trigger threshold for y-axis. Default = 50 range : 25 - 2000
- z-axis - alarm trigger threshold for z-axis. Default = 50 range : 25 - 2000
NOTE None of these numbers for coordinates or thresholds has meaningful units. They are just values
that are all relative to each other. A value of 50 cannot be equated to a specific number such as
6 inches.
MDS 05-6632A01, Rev. M MDS Orbit MCR/ECR Technical Manual 229
In the CLI to view this, enter configuration mode and execute the following command:
% show system tamper-detection magnetometer | details
enabled false;
trigger-thresholds {
x-axis 50;
y-axis 50;
z-axis 50;
}
Configuring
Set trigger thresholds and enable the device. This will start the calibration process. Use the Web UI as
show above, change the values, enable the device and press Save.
Monitoring
Example of device status during calibration period:
From the CLI the Device status during calibration period could look like this:
> show system tamper-detection magnetometer
system tamper-detection magnetometer calibration-offsets x-axis 0
system tamper-detection magnetometer calibration-offsets y-axis 0
system tamper-detection magnetometer calibration-offsets z-axis 0
system tamper-detection magnetometer current-offsets x-axis -917
From the CLI the Device status when operational (after calibration) could be:
> show system tamper-detection magnetometer
system tamper-detection magnetometer calibration-offsets x-axis -916
system tamper-detection magnetometer calibration-offsets y-axis 840
system tamper-detection magnetometer calibration-offsets z-axis 1648
system tamper-detection magnetometer current-offsets x-axis -2
system tamper-detection magnetometer current-offsets y-axis -0
system tamper-detection magnetometer current-offsets z-axis -2
Tamper Alarms
Once tamper detection is enabled the alarm will be triggered when the magnetometer readings exceed the
configurable offsets. To clear the alarm, navigate to System / Tamper Detection / ---> Actions / Clear
Alarms and press Perform Action. After confirmation, the following screen will show.
Monitoring - Import
Once the import of a configuration file is begun, the process may be cancelled by clicking the Cancel
Import button. The current status of the import process is displayed on the web page. Note that the web
234 MDS Orbit MCR/ECR Technical Manual MDS 05-6632A01, Rev. M
page does not display the current status if the device has not been instructed to import a configuration file
(in other words, if the state is “inactive”).
Monitoring
Ensure the CLI is in operational mode. Follow the example below to view the state and statistics.
The ping utility can be used on the CLI when it is in operational mode to verify that DNS is working
properly. If ping can resolve a name on the connected network to an IP address then DNS settings are
working properly. The example below shows the resolution of the name “example.com” to the IP address
“192.0.43.10” on a unit that is connected to the Internet.
Use the control sequence “CTRL-C” to stop the ping utility.
> ping example.com
PING example.com (192.0.43.10) 56(84) bytes of data.
Orbit
Redundant AP
Figure 3-118. Redundant AP Network with two co-located access points
In Redundant AP operation, when a faulty situation with the primary access point is detected, the backup
radio system will take over as the access point for the network. This failover operation can happen based
on several user-configurable settings. Remote radios will automatically associate with the backup access
point with minimal interruptions and the data paths will be re-established. This feature is intended only
for access points that are co-located and servicing the same field of remote radios. All radio settings must
be the same at both locations for failover to occur seamlessly.
Configuring
The following example shows the essential settings for the primary access point in a Redundant AP
system. From the CLI:
% set interfaces interface ETH1 vrrp enabled true
% set interfaces interface ETH1 vrrp address 10.0.0.1
% set interfaces interface ETH1 vrrp subnet-mask 255.255.0.0
% set interfaces interface ETH1 vrrp id 123
% set interfaces interface ETH1 vrrp priority 200
% commit
The backup access point in a Redundant AP system will use similar settings, except the VRRP priority
should be a lesser value:
% set interfaces interface ETH1 vrrp priority 100
A web wizard is provided to aid in the initial setup of Redundant AP mode for each access point. The
wizard also configures the settings shown above, however, it configures settings for redundant VPNs as
well.
Monitoring
Status parameters can be used to monitor the Redundant AP operation and to
check which AP is in the active Master and Backup role.
To view the status of the netmon services, use the following command:
> show services Netmon
When the NETMON-VRRP service reports a status of True, then the Radio
interface conditional-operation will be permitted to enable the AP as the active
access point. At that time, the backup access point will show a NETMON-VRRP
status of False, indicating that the backup access point is acting in standby
mode.
The NETMON-VRRP status reflects the state of VRRP on an Ethernet interface. To
view the VRRP status directly on an interface, use the following command:
> show interfaces-state interface vrrp
Consequently, the parameters for the example above can be set with the following:
% config
% set system maintenance scheduled-reboot mode Recurring
% set system maintenance scheduled-reboot reboot-interval 2
% set system maintenance scheduled-reboot reboot-window-start 00:00
% set system maintenance scheduled-reboot reboot-window-end 03:00
% commit
240 MDS Orbit MCR/ECR Technical Manual MDS 05-6632A01, Rev. M
Monitoring
When Scheduled Reboot mode is set to One-Time or Recurring, the date and time of the next reboot will
be displayed in the status window in the Web UI.
Navigate to System / General ---> Status ---> Scheduled Reboot
In the CLI status prompt, the next reboot date/time can be displayed with the following command:
% show system maintenance scheduled-reboot
Note: If Scheduled reboot is Disabled, the status will show “Not Scheduled”.
For SFP-equipped Orbit devices, open up the Digital Diagnostics Monitoring drop-down below the
General drop-down to view diagnostic debugging information for the SFP interface:
Open up the Statistics drop-down below the General drop-down to view the statistics for the Bridge
interface:
LINK LAYER
IP ADDRESS ORIGIN STATE
-----------------------------------------------------
10.10.10.109 00:11:11:e0:2e:70 dynamic stale
10.10.10.98 80:c1:6e:f0:3b:7a dynamic reachable
3.8.2 LAN
Understanding
The unit has external Local Area Network (LAN) ports (ETH1/2 ports) that can be used to connect to a
local (wired) LAN. It supports both IPv4 and IPv6 addresses and may be assigned multiple IP addresses.
The LAN port can be assigned static IP addresses, or a dynamically allocated address can be assigned
using DHCP.
NOTE The LAN port should be assigned IP addresses only if it is a routed interface (that is, not in a
bridge).
Configuring
From the Interfaces screen the status may be displayed by clicking on the interface and scrolling down to
the statistics information:
Navigate to: Interfaces / Add/Delete Interfaces
• Output - Use for selecting and applying a QoS policy (from the available QoS policies) to the
outgoing traffic on this interface. See 3.8.19 - Quality of Service (QoS), for more information on
creating QoS policies.
• Security Mode - See 3.8.3 - Ethernet port Security / Port-based Authentication for related
information. Valid Choices:
- None (DEFAULT)
- EAP – Use Extensible Authentication Protocol mode.
- MAB – Use MAC Authentication Bypass mode
• VRRP – Enable or Disable Virtual Router Redundancy Protocol. (See 3.8.27 - VRRP – Virtual
Router Redundancy Protocol)
Using the CLI, the following sequence shows how to configure the ETH1 port to obtain a dynamic IPv4
address using DHCP:
Before configuring a new IP address, be sure to remove the previous address by issuing the command
% delete interfaces interface ETH1 ipv4
The following sequence shows how to configure the ETH1 port with a static IPv4 address:
> configure
Entering configuration mode private
% set interfaces interface ETH1 ipv4 address 192.168.1.11 prefix-length 24
% commit
Monitoring
Ensure the CLI is in Operational mode. Follow the example below to view the state and statistics of the
ETH1 port:
> show interfaces-state interface ETH1
interfaces-state interface ETH1
type ethernet
admin-status up
oper-status up
if-index 3
phys-address 00:06:3d:07:96:82
statistics discontinuity-time 2014-02-12T14:29:35-05:00
statistics in-octets 497076597
statistics in-unicast-pkts 6457046
statistics in-multicast-pkts 0
statistics in-discards 17
statistics in-errors 0
statistics out-octets 1002105
statistics out-unicast-pkts 6480
statistics out-discards 0
statistics out-errors 0
eth-phy-status "10 Mb, Half Duplex"
ipv4 forwarding true
ipv4 mtu 1500
PREFIX
IP LENGTH ORIGIN
-------------------------------------------------------------
10.10.10.147 23 static
LINK LAYER
IP ADDRESS ORIGIN STATE
-------------------------------------------------------------------------------------
10.10.10.98 80:c1:6e:f0:3b:7a dynamic reachable
In both security-modes, the NAS-IP address in the RADIUS request can be static or dynamic. A static
NAS-IP is used when the Orbit’s RADIUS configuration contains the NAS settings. If the static NAS
settings are not set, the Orbit uses one its IP addresses that is able to route to the RADIUS server’s
address.
Configuring
Configuration of port authentication first requires a RADIUS server configuration to be added to the
Orbit. For example:
% set system mds-radius servers MyServer address 192.168.10.100 shared-secret
RadiusSharedSecret
% commit
Ethernet security settings are not set by default, so Ethernet traffic is unobstructed until security is
enabled. Ethernet security settings include:
MDS 05-6632A01, Rev. M MDS Orbit MCR/ECR Technical Manual 253
security-mode – either EAP, MAB, or none
radius-server – The name of a RADIUS server configuration in system settings
Monitoring
Read-only parameters for Ethernet ports show the state of the security on the port:
Create the VLAN as an interface with a name by clicking on the Add button.
Operational Modes
As previously shown in previous sections, interfaces can have three separate VLAN modes: none
(default), trunk, or access. These modes are used to set interface behavior, and examples of their use are
provided below.
Trunk: To add ETH1 as a trunk (tagged) port in both defined VLANs above, the command is:
% set interfaces interface ETH1 vlan-mode trunk vlans [video_vlan mgmt_vlan]
Access: To set ETH2 as an access port for video_vlan the command is:
% set interfaces interface ETH2 vlan-mode access vlan video_vlan
Native VLANs
A VLAN device may also be specified as a “native” VLAN by checking the Native Vlan box.
A native VLAN is conceptually the same as a standard VLAN except that the packets will never be
tagged. The purpose of a native VLAN is to segregate untagged packets on a VLAN trunk port that
OR:
258 MDS Orbit MCR/ECR Technical Manual MDS 05-6632A01, Rev. M
Adding WiFi interface (in Station mode) to the bridge:
% set interfaces interface Bridge bridge-settings members wifi-station
interface Wi-Fi
Removing WiFi interface (in Access Point mode) from the bridge:
% delete interfaces interface Bridge bridge-settings members wifi-ap somessid
OR:
Removing WiFi interface (in Station mode) from the bridge:
% delete interfaces interface Bridge bridge-settings members wifi-station interface Wi-Fi
Monitoring
Ensure the CLI is in operational mode. Follow the example below to view the state and statistics of a
bridge. In this example, bridge (Bridge) is bridging the LAN (ETH1).
> show interfaces-state interface Bridge
interfaces-state interface Bridge
type bridge
admin-status up
oper-status up
if-index 1
phys-address 00:06:3d:07:96:82
statistics discontinuity-time 2014-02-12T14:29:35-05:00
statistics in-octets 263244716
statistics in-unicast-pkts 3231995
statistics in-multicast-pkts 0
statistics in-discards 4126
statistics in-errors 0
statistics out-octets 785224
statistics out-unicast-pkts 1362
statistics out-discards 0
statistics out-errors 0
ipv4 forwarding true
ipv4 mtu 1500
PREFIX
IP LENGTH ORIGIN
------------------------------------------------------------
10.10.10.141 23 static
LINK LAYER
IP ADDRESS ORIGIN STATE
--------------------------------------------------------------------------------
10.10.10.98 80:c1:6e:f0:3b:7a dynamic delay
3.8.6 Routing
Understanding
The Orbit can forward IP packets between routed interfaces, using a network path defined by the user.
These user-defined network paths are known as static routes. A static route may be configured if data
intended for a specific subnet or IP address must egress a particular onboard NIC.
As an example, consider a case where the unit is connected to a local network, 10.10.0.0/24, through its
ETH2 port. This network contains a gateway at IP address 10.10.10.101. This gateway is also connected
to another network 216.171.112.0/24, which has an NTP server. The Orbit must use this network path to
access an NTP server at IP address 216.171.112.36. A static route to network 216.171.112.0/24 via next-
hop 10.10.10.101 (or a host-only route to 216.171.112.36/24 via next-hop 10.10.10.101) ensures that the
unit can communicate with the NTP servers.
Server
216.171.112.36
ETH2
Interface
IPv4 and IPv6 routes may be configured. The example that follows shows how to configure an IPv4
route. It is important to note that IPv6 routes are created with the same input parameters. The only
difference is that the format of the Dest Prefix and Next Hop input parameters varies based on whether
IPv4 or IPv6 is selected.
The example network path in Figure 3-1 requires an IPv4 address. When previous routes have been
configured, the IPv4 Route table will display all user-configured IPv4 static routes are listed, as shown
below.
Create a numeric ID for the new route and click Add. The ID acts as a label, is for reference only, and has
no bearing on the route itself.
3.8.7 VRF
Understanding
Network interfaces present on a router are typically part of the main/global routing instance, which allows
traffic to be routed between them based on the routes in the main/global routing table and firewall rules
governing flow of traffic between the interfaces.
VRF (Virtual Routing and Forwarding) enables network interfaces to be segregated from each other by
moving them into a separate routing instance with its own routing table. This enables layer-3
segmentation of the network by creating one or more isolated routing instances.
Orbit supports policy routing with multiple routing tables where the user can configure one or more
routing tables along with rules to classify traffic on any IPv4 header fields and direct the matching traffic
through a particular routing table. This enables routing of IPv4 traffic based on any header field rather
than just destination address. VRF extends this support by allowing user creation of a virtual network
interface of type ‘vrf’ that is associated with a routing instance. This allows other routable network
interfaces like Ethernet, Bridge, Cellular etc. to be added to the VRF interface as members, thereby,
confining them within the routing domain of that VRF. See Table 3-25 below for an understanding of
supported features
Creating VRF interface and Each VRF interface is associated with its own routing
adding following routable instance/table and the member interfaces exist within
interface types as members: this routing table segregated from default/main and
- Ethernet other VRFs in the system.
- Cellular
- Cellular-PDN
(second APN)
- Bridge
- VLAN
- GRE
VRF aware DMVPN DMVPN instance can operate within a VRF, where
the GRE interface uses a transport interface that is
within a VRF. IPsec SA also operates within that
VRF. The GRE tunnel interface itself is outside the
VRF. It could be in the main/default or another VRF.
VRF aware BGPv4, RIPv2 BGPv4 (IPv4 only), RIPv2 (IPv4 only) and OSPFv2
and OSPFv2 protocols can operate within a VRF (that is they
import/export routes from the routing table
associated with that VRF).
VRF aware CLI commands The following CLI commands can be passed VRF
within which they need to execute: ping,ping6,ssh,
telnet, traceroute,traceroute6
Configuring
Basic creation of a VRF interface via the CLI is straightword.
Create a routing instance aassociated with the VRF interface. It is recommended that same name be used
for VRF and routing instance for convenience:
%set routing routing-instance MY_VRF1 interface MY_VRF1
Monitoring
As mentioned above in Configuring, all of the user-defined neighbors on the web UI may be viewed by
navigating to Interfaces / Interface Name ---> Basic Config / Ipv4 viewing the Neighbor list.
To view the entire list of known IPv4 neighbors, including those learned automatically by the unit, the
following CLI command would be used in operational mode:
> show interfaces-state interface ipv4 neighbor
LINK LAYER
NAME IP ADDRESS ORIGIN STATE
-----------------------------------------------------------------------------------------------------------------------------
Bridge 192.168.1.3 00:80:c8:3b:97:bb dynamic reachable
192.168.1.2 00:12:17:5c:4f:2d dynamic reachable
Wi-Fi 192.168.2.65 74:de:2b:a7:15:0a static reachable
192.168.2.99 00:11:22:33:44:55 static reachable
If the Firewall service is enabled, filters specifying ingress and egress rules must be applied to each
network interface on the device. The Orbit's network interfaces allow no traffic to pass unless a filter is
applied to each one allowing them to do so. Except for the Cell, each network interface on the Orbit is
preconfigured with IN_TRUSTED as an input filter, and OUT_TRUSTED as an output filter. This allows
all traffic to enter and exit the unit.
The diagrams below provide a simplified view of packet flow for various categories of traffic flows going
in and out of the Orbit unit when packet filtering is enabled.
Figure 3-143 shows the flow of packets terminating at the unit, such as device management traffic using
SSH or NETCONF protocol terminating at local device management process within the unit.
Figure 3-151. Creation of a packet filter rule for inbound UDP traffic
The next rule in this example will be used for the TCP services SSH and NETCONF. Click Add new
rule and select Protocol TCP. Since SSH and NETCONF traffic is used to manage the Orbit, the traffic
terminates at the Orbit. This means that the incoming traffic will have these well-known service ports as
its destination port. Set Destination Port to Services, and enter netconf, Ssh in the textbox next to
Services. Again, ensure that Actions is set to Accept, and Log Level can be set to Debug.
Figure 3-152. Creation of a packet filter rule for inbound TCP traffic
The last step in the creation of a restrictive filter is a default rule to deny all traffic that does not match
any of the previous rules. To do this, click Add new rule, select Protocol All, and set Actions to Drop.
The Log Level is once again set to Debug. This rule must be at the last on the rule list. Any rules added
after this last rule will have no effect, as they would match “any” traffic and be dropped.
Figure 3-153. Creation of a default restrictive packet filter rule for inbound traffic
Once all changes are finished, click Back to return to the list of packet filters and create another.
NOTE The rule stated in step 5 permits SSH or NETCONF connection addressed to the cellular
interface’s IP address. If it is desired that SSH or NETCONF connection only be allowed via
the VPN tunnel, then remove rule 3 and instead apply appropriate filter to IPsec connection.
Create the last rule for this “restrictive” filter to deny everything else. Note that rules are applied in
ascending order using rule IDs. Any rules added after this last rule will have no effect, as they
would match “any” traffic and be dropped. In this example rule ID 10 is chosen. This facilitates the
insertion of new rules prior to this last one to support future new traffic types.
% set services firewall filter Cell_Inbound_Traffic rule 10 match protocol all
% set services firewall filter Cell_Inbound_Traffic rule 10 actions action drop
Apply this filter to incoming direction on cellular interface “Cell”.
% set interfaces interface Cell filter input Cell_Inbound_Traffic
Create a “permissive” filter that permits all traffic. Later on, if needed, this filter can be enhanced to
deny certain traffic from getting out of the cellular interface.
% set services firewall filter Cell_Outbound_Filter rule 10 match protocol all
% set services firewall filter Cell_Outbound_Filter rule 10 actions action accept
Apply this filter to outgoing direction on cellular interface “Cell”.
% set interfaces interface Cell filter output Cell_Outbound_Filter
Commit configuration and exit configuration mode.
% commit
Commit complete.
The status tab provides the ability to monitor traffic statistics for packets being dropped or permitted by
the firewall. In addition to Filter Type, Filter Name, and Rule ID, the display also provides Byte Count
and Packet Count. These values can be used by a network administrator to detect possible intrusion
attempts on the network.
This menu displays a view of all rules created for the current rule set, as well as a means to create new
ones. The following options are available.
• Order – Click the arrows to sort rules in order of priority. Rules with higher priority are applied
before rules with lower priority; rule sets containing more than one rule should be sorted
accordingly.
• Source IP – Apply rule to traffic that originates at a specific address or addresses.
• Mode – options:
- All – Apply rule regardless of source address.(The example above uses this
configuration.)
Click on the Source NAT drop-down to open the Source NAT menu.
The menu that appears lists all rules contained within the new rule set. Since this is a new rule set, there
are currently none. Click the Add button to add a rule. The Configure Rule Details menu appears.
Now, the rule set must be applied to the desired interface. Navigate to Interfaces and click on Cell to
proceed to the cell interface’s menu. From there, navigate to Basic Config / NAT.
Monitoring
At this time there are no commands to monitor traffic statistics for packets being masqueraded by the
firewall. This feature may be added in future revisions of firmware.
3.8.11 Destination NAT (Port Forwarding)
Destination NAT performs translation of destination IP address (and, optionally, destination port) of the
traffic ingressing an interface. This is typically used to allow a host on the public network (HOST-B) to
access a service running on a host in the private network (HOST-1). This is also called port forwarding.
Figure 3-178 shows the flow of packets being port-forwarded (DNAT’ed) through the Orbit unit. For
example, TCP traffic arriving at the cellular interface and getting port forwarded to a private host
connected to the local Ethernet interface.
Click Add to create a new rule-set and enter name for the new rule set. Spaces are not allowed; use the
underscore character instead. Click OK to continue.
Figure 3-183. Destination NAT rules list for the new rule-set
The Destination NAT screen lists all rules contained within the new rule set. Since this is a new rule set,
there are currently none. Click Add New Rule to add one. The rule creation menu appears.
294 MDS Orbit MCR/ECR Technical Manual MDS 05-6632A01, Rev. M
Figure 3-184. Creating a new destination NAT rule
The following options are available within the rule creation menu.
• Order – Click the arrows to sort rules in order of priority. Rules with higher priority are applied
before rules with lower priority; rule sets containing more than one rule should be sorted
accordingly.
• Protocol – Options: All, SCTP, TCP, UDP, ICMP, ESP. Specifies the IP protocol of incoming
traffic that the rule should be applied to. (In the example above, this is TCP.)
• Source IP – Apply rule to traffic that originates at a specific address or addresses.
• Mode – Options:
- All – Apply rule regardless of source address. (The example above uses this
configuration.)
- Address - Apply rule to a specific source address and prefix.
- Address Range – Apply rule to a range of source addresses.
- Address Set – Apply rule to a non-contiguous set of source addresses.
- Not Address - Apply rule to traffic that does not originate from a specific address and
prefix.
- Not Address Range – Apply rule to traffic that does not originate from a specific source
address range.
- Not Address Set – Apply rule to traffic that does not originate from a non-contiguous set
of source addresses.
• Destination IP – Apply rule to traffic that ingresses the unit at a specific address or addresses.
• Mode – Options:
- All – Apply rule regardless of destination address.
- Address - Apply rule to a specific destination address and prefix.(In the example above,
this is 10.150.1.1/32.)
- Address Range – Apply rule to a range of destination addresses.
- Address Set – Apply rule to a non-contiguous set of destination addresses.
- Not Address - Apply rule to traffic that does not ingress at a specific address and prefix.
- Not Address Range – Apply rule to traffic that does not ingress at a specific destination
address range.
- Not Address Set – Apply rule to traffic that does not ingress at a non-contiguous set of
destination addresses.
Monitoring
At this time there are no commands to monitor traffic statistics for packets masqueraded by the firewall.
This feature may be added in future revisions of firmware.
3.8.12 Static NAT
Understanding
Static NAT performs translation of a single public (external network) IP address, or entire subnet, to a
private (internal network) IP address or subnet. This can be used to make a private host on an internal
network accessible to hosts on the public/external network. This can also be used connect two networks
with overlapping address ranges. In particular, this is useful when connecting multiple remote sites with
same local addressing (e.g. 192.168.1.0/24) to the back-office network (e.g. 172.16.10/24) using IPsec
VPN.
Using the above configuration, a host in back office network shall use 10.10.1.2 external address to access
an internal host 192.168.1.2 in site A and use 10.10.2.2 external address to access an internal host
192.168.1.2 in site B.
Configuration
Static NAT configuration on Orbit involves following high level steps:
Create a static NAT rule-set.
Add rule to perform static NAT on the public interface or IPsec connection.
Example
Using the Static NAT Wizard
The following example demonstrates step-by-step static NAT configuration for Network A shown in
Figure 3-189.
During this example, assume the following:
An IPsec connection named Network_A_IPsec_Connection is already created and configured on
the Orbit in Network A. Refer to Section 3.8.13VPN - IPSEC
for more information on creating an IPsec connection.
Network B has already been appropriately configured for static NAT. Only Network A’s
configuration will be shown in this example.
Click Next to continue. Click on the Add button. Confirm to create a new rule and then enter a name for
the static NAT rule list. Click Ok to continue.
The next menu shows all rules contained within the newly named rule set. You may edit existing rules,
delete them, or add new ones. Since the rule set is new, it contains no rules at first. Click Add New Rule
to add one. The rule creation menu appears.
The Interface Selection menu allows you to apply a static NAT rule list to an interface or IPsec
connection on the Orbit. Select the name of the static NAT rule list from the dropdown box to the right of
the interface or IPsec connection and click Next to continue.
Customer
Cellular Network/
network Internet
Remote IPsec
Orbit Gateway/Router
IPsec Tunnel
Local LAN carrying traffic Remote LAN
192.168.1.0/24 between local 10.1.1.0/24
and remote
LANs
In this setup, there is single LAN behind Orbit and traffic from this LAN needs to
be routed towards a single remote LAN on the other side of the remote router
through an IPsec tunnel. If the remote LAN is configured as 0.0.0.0/0, then Orbit
will route traffic from local LAN to any other destination through this tunnel.
Figure 3-191. Site-to-Site Policy-Based IPsec L3VPN
Remote LAN#1
Local LAN#1 192.168.3.0/24
192.168.1.0/24
Customer
Cellular
Network/
network
Internet
Remote IPsec
Orbit
Gateway/Router
3. Site-to-Site GRE/IPsec L2VPN – This enables bridging of traffic to/from one or more local LANs of
Orbit from/to one or more remote LANs on the other side of the Remote IPsec router through a
single GRE tunnel protected by transport mode IPsec connection. Orbit also supports VLAN trunking
over GRE tunnel for a case where there is more than one LAN behind Orbit and remote router.
Remote LAN
Local LAN
192.168.1.0/24
192.168.1.0/24
Customer
Cellular
Network/
network
Internet
Remote IPsec
Orbit
Gateway/Router
In this setup, there is single LAN behind Orbit and traffic from this LAN needs to be bridged with
single remote LAN on the other side of the remote router through a GRE tunnel protected by
IPsec transport mode connection. In this mode, the GRE tunnel is in Ethernet-over-GRE mode and
simulates a point-to-point layer-2 VPN enabling MAC visibility and learning between the two
sites. Orbit also supports VLAN trunking over the GRE tunnel in a case there is more than one
LAN behind Orbit and Remote router.
Figure 3-193. Site-to-Site GRE/IPsec L2VPN
304 MDS Orbit MCR/ECR Technical Manual MDS 05-6632A01, Rev. M
4. Dynamic Multipoint/Mesh VPN (DMVPN) - DMVPN combines multipoint GRE (mGRE) Tunnels,
IPSec encryption and NHRP (Next Hop Resolution Protocol) functionality to enable easier
configuration of hub-to-spoke VPN deployments. In addition, it enables formation of on-demand
dynamic tunnels between spokes for a full or partial mesh VPN network. The routes are added for
remote LAN networks on Orbit either statically (via manual configuration) or dynamically (by
running routing protocols like RIP/OSPF/BGP over multipoint GRE tunnel).
In a hub-n-spoke deployment, where there is one hub router in central office and large number of
spoke router at remote sites, if site-to-site VPN setup is used then each spoke requires its own
tunnel configuration on the hub router. This can make hub configuration unwieldy. Also, every time
a new spoke site is added to the deployment, the hub configuration needs to be updated. This can
become cumbersome from management perspective. DMVPN uses single multipoint GRE tunnel
interface on the hub which needs to be configured only once initially and is used to terminate all the
spoke tunnels. Addition of new spoke site does not require update of hub configuration if dynamic
routing protocols are used to add routes towards remote LANs at the spoke site. Although, DMVPN
technology is based on open standards, it was created by Cisco and hence is primarily only
supported by Cisco routers designed for use as IPsec hub routers.
LAN
10.0.1.0/24
HUB Router
Cellular network
2. Hub-n-Spoke IPsec/GRE Tunnel: Orbit can tunnel IPv4 traffic over IPv4 transport/underlay with
Cisco FlexVPN HUB router using GRE tunnel protected by IPsec SA. Orbit establishes the IPsec
transport mode SA (with GRE protocol traffic selector) with the HUB router, which sends the
assigned GRE tunnel IP address in INTERNAL_IP4_ADDRESS/NETMASK attribute and one or more
of its local subnets in thein INTERNAL_IP4_SUBNET or INTERNAL_IP6_SUBNET attributes (as
IKEv2 configuration payloads) and the Orbit adds a route to the HUB subnets over the GRE
tunnel interface. Orbit sends its assigned tunnel address to the HUB, so that the HUB can add
route to Orbit’s GRE Tunnel IP over the virtual-access tunnel interface instantiated from the
virtual-template.
IPSec Overview
IPsec, Internet Protocol Security, is a set of protocols defined by the IETF, Internet Engineering Task
Force, to provide IP security at the network layer.
An IPsec based VPN is made up by two parts:
• Internet Key Exchange protocol (IKE)
• IPsec protocols (ESP, AH)
The first part, IKE, is the initial negotiation phase, where the Orbit device and VPN gateway agree on
which methods will be used to provide security for the underlying IP traffic. There are two IKE protocol
versions: IKE-v1 and IKE-v2. These are not compatible with each other. The IKE-v2 is more efficient
and therefore should be preferred for new deployments. The Orbit supports IKE-v1 and IKE-v2.
The other part is the actual IP data being transferred, using the encryption and authentication methods
agreed upon in the IKE negotiation. This is accomplished by using IPsec protocols like Encapsulating
Security Payload (ESP) or Authentication Header (AH). Orbit only supports ESP protocol as it provides
both encryption and authentication of the data. The AH protocol provides only data authentication.
The process of IPsec VPN connection establishment consists of following phases:
• IKE Phase-1 (IKE security negotiation)
- IKE authenticates IPSec peers and negotiates IKE Security Association (SAs) during this
phase, setting up a secure channel for negotiating IPSec SAs in phase 2
• IKE Phase-2 (IPsec Security Association)
- IKE negotiates IPSec SA parameters and sets up matching IPSec SAs in the peers
Configuration
Click Next to continue. The next screen provides a list of VPN setups that one can choose from for a
particular use case. For this example, we’ll select “Configure Site-to-Site IPsec VPN”.
Click Next to continue. The next screen requires one to specify a name for this VPN connection.
Cipher suites used for phase-1 and phase-2 must match corresponding configuration on the peer.
• Encryption algorithm – 3des, Aes 128 Cbc, Aes 192 Cbc, Aes 256 Cbc, Aes 128 Ctr, Aes 192
Ctr, Aes 256 Ctr, Aes 128 Ccm 8, Aes 192 Ccm 8, Aes 256 Ccm8, Aes 128 Ccm 12, Aes 192
Ccm 12, Aes 256 Ccm12, Aes 128 Ccm 16, Aes 192 Ccm 16, Aes 256 Ccm16, Aes 128 Gcm 8,
Aes 192 Gcm 8, Aes 256 Gcm8, Aes 128 Gcm 12, Aes 192 Gcm 12, Aes 256 Gcm12, Aes 128
Gcm 16, Aes 192 Gcm 16, Aes 256 Gcm16.
The local and remote subnets should also match those configured on the peer.
• Local IP Subnet – The local IP subnet behind Orbit.
• Remote IP Subnet – The remote IP subnet behind the peer IPsec VPN router.
Click Next to continue. The next screen requires one to select the interface over which this connection
will be established. This is almost always the Cell interface.
Click Next to continue. The next screen provides some general information.
Click Next to continue. The next screen lists all the changes that have been made by this wizard. Click
Submit to commit these changes on Orbit.
The IPsec panel includes configuration for IPsec policy and connection settings. When VPN wizard is
used for configuration, it automatically configures the IPsec policy (<name>_<type>_ipsec_policy), IPsec
connection (<name>_<type>) based on specified VPN name.
Following additional parameters are available for configuration in IPsec policy and connection entries:
• Connection Type – net-to-net or host-to-host. The net-to-net type signifies IPsec tunnel mode.
The host-to-host type signifies the IPsec transport mode.
• Life Time – 15-1440. The time interval, in minutes, after which the IPsec security association
expires.
• Failure Retry Interval – 1-255. The number of minutes to wait after repeated failed VPN
connections before retrying.
• Periodic Retry Interval – 15-255. The periodic attestation time, in minutes. Used only in IMA
connections. See APPENDIX B – Integrity Measurement Authority (IMA).
• Inbound Firewall Filter – Apply an existing packet filter to the incoming traffic on this
connection. See section 3.8.9 Access Control List (Packet Filtering / Firewall) for more
information. An inbound filter to the connection must be applied, or no traffic will pass. If a
filter hasn’t been created specifically for the VPN connection, use the preconfigured filter
IN_TRUSTED, which allows all inbound traffic.
• Outbound Firewall Filter – Apply an existing packet filter to the outgoing traffic on this
connection. See section 3.8.9 Access Control List (Packet Filtering / Firewall) for more
information. An outbound filter to the connection must be applied, or no traffic will pass. If a
filter hasn’t been specifically created for the VPN connection, use the preconfigured filter
OUT_TRUSTED, which allows all outbound traffic.
• Static NAT – Apply an existing static Network Address Translation (NAT) rule set to the
connection. See 3.8.12 Static NAT for more information
NOTE The VPN connections that are configured using the VPN service menu cannot be modified
using the VPN wizard.
During initial configuration set failure-retry-interval to lowest value of 1 min, to have Orbit attempt
connection more quickly. This allows debugging of any connection-related issue by watching logs on
peer side etc. Be sure to change this value to 5 minutes or higher to prevent excessive attempts and traffic.
Commit configuration to save the changes.
% commit
Following shows IKE policy configuration for public-key encryption based authentication method:
Create IKE policy with auth-method “public-key encryption”.
% set services vpn ike policy IKE-POLICY-1 auth-method pub-key
Firewall Configuration
The VPN wizard automatically configures the firewall to allow incoming and outgoing IKE/IPsec traffic
over the Cell/WAN interface. However, when VPN is configured manually via Services->VPN->Basic
Config menu or via CLI, the firewall needs to be manually configured as well:
1. Add following rules to IN_UNTRUSTED filter that is applied to the Cell interface in the incoming
direction:
2. Add following rules to OUT_UNTRUSTED filter that is applied to the Cell interface in the outgoing
direction:
% set services firewall address-set CELL-IP
% set services firewall filter OUT_UNTRUSTED rule 1 match src-address address-set CELL-IP
% set services firewall filter OUT_UNTRUSTED rule 1 match src-address add-interface-address
true
% set services firewall filter OUT_UNTRUSTED rule 1 actions action accept
% set services firewall filter OUT_UNTRUSTED rule 2 match protocol all
% set services firewall filter OUT_UNTRUSTED rule 2 actions action drop
NOTE See section 3.8.22 Network Link failover/failback for GRE/IPsec VPN configuration examples.
See section 12.0 APPENDIX G for more VPN configuration examples like DMVPN etc.
Conditional Operation
The Site-to-Site IPsec VPN connections in the initiator mode can be configured to operate conditionally
based on state of a network monitor operation. Following configuration will make IPsec connection
named IPSEC-1 to be established only if the PROBE-1 network monitor operation state is true (UP).
Otherwise, the IPsec connection will be disconnected.
FlexVPN Configuration
FlexVPN interoperability was described earlier. Below is an example FlexVPN GRE tunnel
configuration on the Orbit router and corresponding Cisco FlexVPN HUB router configuration.
%set services vpn enabled true
%set services vpn ike
%set services vpn ike policy IKE-POLICY-1 version ikev2
%set services vpn ike policy IKE-POLICY-1 auth-method pre-shared-key
%set services vpn ike policy IKE-POLICY-1 pre-shared-key
$8$9vpkZBPRB6/FL0z6SSvO5SDjf2Shh+dt3xBz+BNidpQ=
%set services vpn ike policy IKE-POLICY-1 ciphersuite CS1 encryption-algo aes256-cbc
%set services vpn ike policy IKE-POLICY-1 ciphersuite CS1 mac-algo sha512-hmac
%set services vpn ike policy IKE-POLICY-1 ciphersuite CS1 dh-group dh5
%set services vpn ike peer FLEXVPN-HUB ike-policy IKE-POLICY-1
%set services vpn ike peer FLEXVPN-HUB peer-endpoint address 172.18.175.51
%set services vpn ike peer FLEXVPN-HUB role initiator
group 14
!
interface Loopback1
description FlexVPN Tunnel source
ip address 10.243.0.1 255.255.255.224
ip rip advertise 5
no ipv6 redirects
no ipv6 unreachables
!
interface Loopback2
description Network behind Tunnel
MDS 05-6632A01, Rev. M MDS Orbit MCR/ECR Technical Manual 323
ip address 10.1.1.1 255.255.255.0
ip rip advertise 5
ipv6 address 2001:10:1::1/128
no ipv6 redirects
no ipv6 unreachables
!
interface GigabitEthernet0/0/1
ip address 172.18.175.51 255.255.255.0
negotiation auto
!
router rip
version 2
network 10.0.0.0
default-information originate
no auto-summary
!
Monitoring
Using the Web UI
To view the VPN status, navigate to Services->VPN-> Status.
Under IPsec panel, click on the IPsec security association row to view the detailed status.
Ping the back-office PC from the local device to make sure the traffic is passing between device and PC.
> ping 192.168.2.1
PING 192.168.1.2 (192.168.2.1) 56(84) bytes of data.
64 bytes from 192.168.2.1: icmp_req=1 ttl=63 time=389 ms
64 bytes from 192.168.2.1: icmp_req=2 ttl=63 time=161 ms
Troubleshooting
The following are common reasons for VPN connection failure:
Invalid certificate or keys loaded on the device
Time not synchronized on the device. Note that after cell connection is established, device can take
few minutes to sync time from NTP server. VPN connection will not succeed until time is
synchronized.
Mismatch in cipher suites configured for IKE policy on device and peer VPN gateway.
Mismatch in cipher suites configured for IPsec policy on device and peer VPN gateway.
Mismatch in remote and local IP subnets configured for IPsec connection on device and peer VPN
gateway. Note the following:
• For device
- remote ip subnet = back-office subnet
- local ip subnet = local LAN or WIFI subnet on device
• For VPN gateway
- remote ip subnet = device’s local LAN or WIFI subnet
- local ip subnet = back-office subnet on device
3.8.14 VPN – OpenVPN
Orbit supports Virtual Private Network (VPN) setups using either IPsec or OpenVPN. This section
describes OpenVPN.
Understanding
OpenVPN provides a secure tunnel connection and is generally easier to configure than IPsec. Orbit’s
implementation of OpenVPN provides support for one Server instance and up to two Client instances.
The server implementation accepts connections from up to two external OpenVPN clients. Both Client
and Server instances can be enabled on a single Orbit device. The implementation uses pre-shared keys
and communicates using a TUN virtual network device. Communication is limited to IPv4.
General
The following lists the sequence of CLI commands to create and configure an OpenVPN Server instance
and to enable it:
%set services openvpn server TUN1
%set services openvpn server TUN1 tunnel-ip-subnet 10.8.0.0/28
%set services openvpn server TUN1 auth-type pub-key
%set services openvpn server TUN1 pki cert-type rsa
%set services openvpn server TUN1 pki ca-cert-id ovpn_ca_cert
%set services openvpn server TUN1 pki cert-id ovpn_server_cert key-id ovpn_server_key
%set services openvpn server TUN1 enabled true
The following lists the sequence of CLI commands to create and configure an OpenVPN Client instance
and to enable it:
%set services openvpn client TUN2
%set services openvpn client TUN2 server 192.168.1.2 1194
%set services openvpn client TUN2 auth-type pub-key
%set services openvpn client TUN2 pki cert-type rsa
%set services openvpn client TUN2 pki ca-cert-id ovpn_ca_cert
%set services openvpn client TUN2 pki cert-id ovpn_client_cert key-id ovpn_client_key
%set services openvpn client TUN2 enabled true
Monitoring
Server
Server status provides general information on the TUN virtual device as well as information on connected
clients.
The V4 Subnet and V6 Subnet drop-downs show the currently configured DHCP subnets. Click on an
entry to edit, add or delete new entries.
IPv4 Subnets
To add an IPv4 subnet, click the Add button in the V4 Subnet section.
Figure
3-209. Adding a new DHCP IPv6 subnet
# v4subnet
% set services dhcp v4subnet 192.168.1.0/24 range-start 192.168.1.2
% set services dhcp v4subnet 192.168.1.0/24 range-end 192.168.1.128
% set services dhcp v4subnet 192.168.1.0/24 broadcast-address 192.168.1.255
% set services dhcp v4subnet 192.168.1.0/24 router 192.168.1.1
# v6subnet
% set services dhcp v6subnet 2001:192:168:1::/64 range-start 2001:192:168:1::2
% set services dhcp v6subnet 2001:192:168:1::/64 range-end 2001:192:168:1::128
% commit
Monitoring
NOTE Serial ports in Orbit are broadly defined to include any user addressable interfaces that pass
serial bytes. Serial ports include all physical COM ports and the mini-USB. Depending on
configuration, serial ports may also include virtualized access to the over-the-air serial data
stream of NIC interfaces. Examples include “LnRadio-serial” which provides a backward
compatible serial interface to legacy licensed narrowband MDS radios.
- TCP Client
- TCP Server
- TCP Client/Server
- MODBUS-TCP client
- MODBUS-TCP server
- MODBUS-TCP client/server
• UDP
NOTE Once a terminal-server is enabled on a COM port, the port stays in data mode and the CLI will
not be available on that port. To break out of data mode, the escape sequence +++ can be
entered on the PC’s keyboard. The baud rate and format must match on the PC and on the unit
for the escape sequence to be detected. Once the sequence is detected, the login prompt is
presented as long as the port is enabled for console access.
Basic Setup of UDP Terminal Server
Configuring
The following shows how to enable a UDP terminal server on COM1. Navigate to Serial ---> Basic
Config / Terminal Server
• Transaction timeout – The period, in milliseconds, of inactivity on the serial port before an inactive
transaction is dropped. A transaction begins when data is received via UDP and ends when serial data
received in response is transmitted to the remote endpoint. (3500 – DEFAULT)
The following setting applies only when the server operates in Polled TCP mode.
• Transaction Timeout - The period, in milliseconds, of inactivity on the serial port before an inactive
transaction is dropped. A transaction begins when data is received via TCP and ends when serial data
received in response is transmitted to the remote endpoint. (3500 – DEFAULT)
TCP Client
Single Remote
In this example below, the TCP Client is configured with one remote with IPv4 address 192.168.1.2 and
TCP port of 30011.
Multiple Remotes
One or more extra remotes can be configured to enable failover between primary and backup remote TCP
server destinations. In the example below, second remote is configured with IPv4 address 192.168.1.3 and
port 30012.
The following shows how to configure an extra remote for failover scenario:
% set services serial terminal-server server COM1 mode tcp-client extra-remote 192.168.1.3
30012
% commit
Monitoring
Each Terminal server has the same statistic information. Navigate to terminal server and select the server.
For example for a COM1 server - navigate to Serial ---> Basic Config / Terminal Server and then click
on COM1. The Terminal Service Status will be located at the end of the Server Details.
Serial Port Settings for Polled TCP Server and Polled UDP Modes
Some protocols, such as DNP3, can generate packets larger than 255 bytes, which is Orbit’s default Vmin
value for serial ports. To ensure that large packets are not truncated when they arrive via serial port, set
Vmin equal to or larger than the largest expected packet.
For example, a polled TCP server that expects to receive 300-byte packets on COM1 should set COM1’s
Vmin setting equal to or larger than 300.
Figure 3-201 below shows the configuration settings available for a serial port. Please refer to section
3.5.1, Serial Interface, for information on configuring the serial port.
Click the x next to any of the existing TLS Cipher Suites values in the HTTPS submenu to remove it, or
click Add an Entry to access a dropdown box containing all of the available TLS Cipher Suites. Select
the TLS Cipher Suites for the webserver to use and click Add. You can drag the current TLS Cipher
Suites values to change the order you would like to have the webserver use in the TLS handshake.
Click Add an Entry next to IPv4 Bind IPs or IPv6 Bind IPs in each submenu to access a dropdown box
containing all IP addresses on the device. Select the IP address belonging to the appropriate interface and
click Add.
These remote management interfaces can also be bound to IPv6 address by using “ipv6-bind-ips” instead
of “ipv4-bind-ips”. If these settings are not configured, the default behavior is to listen on all IP addresses
in the system.
Configuration
Using the WebUI
Navigate to Services->Remote Management and click the Basic Config tab.
The Basic Config menu is divided into sections for General, Proxy Configuration, and Firmware.
General
• Enabled – Enables the Remote Management Service. Enabled by DEFAULT.
• Interfaces – Enter one or more network interfaces on which the Remote Management Service
should run. If a desired network interface is present in a bridge, you must enter the bridge’s name
in this field.
• Shared Secret – A shared secret used to allow remote connections to or from the device. It must
be the same on both sides of the connection. For greater security, we recommend that you change
this password and do not use the default. DEFAULT rmadmin
NOTE In FIPS mode, passphrases are not allowed. Only a 128-character hexadecimal value (0-9, a-f,
A-F) is permitted.
Firmware
• Enabled – Enables the unit to either push firmware to other Orbit devices on the network, or
receive firmware pushed by other devices. This feature must be enabled on both sending and
receiving devices. Enabled by DEFAULT.
NOTE Remote Management operates on the following IP addresses and ports. Ensure that they are not
blocked by your firewall settings, or the service will not operate properly.
Firmware Reprogramming
Address 230.4.4.1 UDP Port 1044
Address Range 230.5.5.0 – 230.5.5.255 UDP Port 1044
Address <Interface Broadcast> UDP Port 40010
Web Proxy
Address <local unit’s address> <TCP ports as specified by Min/Max>
To initiate an over the air reprogramming session (or to remotely reboot a unit) access the Actions menu
at Services->Remote Management->Actions.
Figure 3-234 Cancel Remote Session and Reboot Remote Devices options
To cancel an active remote reprogramming session, expand the Cancel Session menu and click Perform
Action.
Reboot Remote Devices sends a request across the selected interface for all Orbit units on the network to
reboot to the specified image version. The Remote Management Service must be enabled on each remote
radio in order for them to receive the request.
• Interface – The network interface on which to transmit the reboot request. If a desired network
interface is present in a bridge, you must enter the bridge’s name in this field.
• Image Version – Select either onboard firmware version. Each remote Orbit unit that receives
the request will reboot to this version of firmware if it is present. If the remote unit does not
currently have the specified firmware version, it will ignore the reboot request.
Statistics are available to show reprogramming status. Additionally you can view a remote unit’s event
log to determine that it has opened a remote reprogramming session, completed successfully, or finished
unsuccessfully. You can also monitor the transfer status by viewing the AP’s event log to see that it has
begun or finished a remote transfer session.
Send Firmware Certificate can be used to push a firmware certificate from an access point to all remote
radios at once, to simplify the operation of changing a firmware certificate.
The same system configuration settings are necessary that are required for sending firmware images.
• Interface – The network interface on which to transmit the reboot request. If a desired network
interface is present in a bridge, you must enter the bridge’s name in this field.
You can view a remote unit’s event log to determine that it has opened a remote transfer session,
completed successfully, or finished unsuccessfully. You can also monitor the transfer status by viewing
the AP’s event log to see that it has begun or finished a remote transfer session.
Status
Navigate to Services->Remote Management->Status.
Proxy Status
• Remotes - Displays the connected Remote’s status
Use the following commands to enable the radio to send or receive firmware remotely, as well as manage
or be managed through a remote web UI session.
% set services remote-management firmware enabled true
% set services remote-management web-proxy auto-redirect true
% set services remote-management web-proxy enabled true
You may perform remote management actions in either operational or configuration mode. The following
command requests remote units to reboot to image version 4.0.4.
% request services remote-management reboot-remote-devices interface Bridge which-image
{ version 4.0.4 }
The following command requests remote units to reboot to the active image version of the current radio.
For example, if the local radio’s active firmware image is version 4.0.0, remote radios will receive a
request to reboot to firmware version 4.0.0.
% request services remote-management reboot-remote-devices interface Bridge which-image
{ active }
The following command initiates a remote reprogramming session of the current radio’s active image
over the Bridge interface, with a blocksize of 512, at a rate of 500 kbps. Remotes are requested to reboot
to the new image upon successful completion.
% request services remote-management send firmware local-image { active } blocksize 512
interface Bridge reboot-remotes-on-completion true txrate 500
The following command initiates a remote transfer session of the current radio’s firmware certificate
called “GEMDS-FW” over the Bridge interface, with a blocksize of 512, at a rate of 500 kbps.
% request services remote-management send firmware-certificate local-certificate { cert-id
GEMDS-FW } blocksize 512 interface Bridge txrate 500
Use the following command to cancel the currently active remote reprogramming or management session.
% request services remote-management cancel-session
Monitoring
To view the current Remote Management status, ensure that the CLI is in operational mode.
% show services remote-management-status
services remote-management-status web-proxy-client status disabled
services remote-management status web-proxy-server status operating
Following QoS policies that can be applied to Orbit's non-virtual interfaces (LnRadio, NxRadio etc.) or a
class in a class-full policy:
• Prioritization – This policy implements a strict priority scheduler that requires classifiers be set
up to give traffic different priorities. The prioritization policy will always send highest priority
traffic first. Excessive high priority traffic can prevent any lower priority traffic from being sent.
• Fairness - This policy attempts to split up the traffic into different groups based on the packets IP
addresses and IP protocols. It services these groups in a round robin fashion to ensure one traffic
flow does not prevent others from using the link. The fairness policy determines traffic flows on
its own and does not need the user to set up classifiers for it. Orbit uses Stochastic Fair
Scheduling (SFQ) algorithm for fairness.
• Shaping – This policy is used to set minimal and maximal rates for a class of traffic. For
example, with business critical traffic like SCADA, traffic shaping can be setup to guarantee that
this class of traffic will always have at least 100Kbyte/s of an 800Kbyte/s link, regardless of the
amount of other traffic. The remaining unclassified traffic can use the entire 800Kbyte/s link as
long as there is no SCADA traffic, but as soon as SCADA traffic resumes, it will be given at least
100Kbyte/s allocation of the bandwidth. Additionally, a maximal rate could be applied to a class
of traffic to prevent that class from consuming too much of a link. For example, a video stream
could be limited to using 400Kbyte/s of an 800Kbyte/s link to prevent it from interfering with any
other traffic or to prevent it from saturating a radio interface.
Following QoS policies are system wide policies (not applied to any specific interface):
• Modify – This is a special QoS policy that provides the ability to modify fields in an IP packet
before they egress an interface. The modifications that can be performed are setting the ToS or
DSCP value in IP packets. The modify policy is particularly useful when the traffic going through
GRE or IPsec tunnels (tunneled traffic) needs to be provided differentiated service. This use case
often arises when tunneling traffic over Cellular networks. In this scenario, the GRE or IPsec
tunnel inherits the ToS/DSCP value of the tunneled traffic (i.e. copies the TOS field to outer
header) enabling classifiers to be setup based on inner TOS values thereby providing
differentiated service to the inner/tunneled traffic when egressing the cellular interface.
NOTE The modify policy does NOT need to be applied to an interface for it to take effect. Creating the
policy with at least one classifier enables the policy and any traffic matching the classifiers will
be modified accordingly.
Following diagram the illustrates the use of modify policy to provide differentiated service to tunneled
traffic as per 3GPP LTE QoS.
I Default Bearer I
P QoS QoS P
Laptop WiFi QoS GRE S (UL (DL S GRE QoS
E TFT) TFT) E
C C
Dedicated Bearer
SCADA
RTU Serial Terminal App
Server
Figure 3-236. Single APN/PDN, Single Default Bearer, One or More Dedicated Bearers
The packet classifiers mark the packets as they travel through the system. This mark is used when the
packet gets to the queue, to put it in its proper class. Packets can be classified based on the following
parameters:
In the IPv4 headers:
- IP protocol
- Source address
- Source port
- Destination address
- Destination port
- DSCP value
- TOS value
In the Ethernet header:
- Ether-type
- Source address
- Destination address
- VLAN ID
- VLAN priority
- VLAN encapsulated ether-type
Ingress Egress
IPv4 Classifiers Packet Queue
Interface Interface
NOTE The Ethernet classifiers are only pertinent to traffic that is bridged through the system
NOTE The QoS policies affect the outgoing traffic flows on an interface only if the interface is
saturated. That is, when the offered load exceeds the outgoing link capacity.
For example, QoS configured as:
- GOOSE traffic treated as the highest priority.
- VLAN 101 traffic treated as the next lowest priority.
- All remaining traffic treated as the lowest priority.
In this case, QoS is invoked only when traffic is queued due to exceeding maximum throughput. GOOSE
traffic would be given highest priority and be sent over the air first, followed by any VLAN 101 traffic
and then all remaining traffic.
Configuring
In the web UI, the QoS service is configured under QoS Services ---> Basic Config.
Using the Web UI
Example: Prioritize traffic with a particular ether-type above all other traffic
This example will create a QoS policy that uses a classifier to prioritize GOOSE messages above all
others.
First, navigate to QoS Services ---> Basic Config. Ensure that QoS is Enabled.
This policy has to be applied to an interface before it has any affect. To apply the policy to an interface:
% set interfaces interface NxRadio qos output Policy1
Now all traffic going out of interface NxRadio will prioritize based on Policy1.
Example: Priority Inversion
Suppose all traffic from IP address 1.2.3.4 needs to be prioritized above all else, unless it is SFTP traffic.
SFTP traffic from anyone has to be prioritized at the lowest priority. To start with we will set up the
classifiers and the policies.
% set services qos classifier SFTP match M1 ipv4 protocol assigned-number tcp
% set services qos classifier SFTP match M1 ipv4 dst-port services ssh
% set services qos classifier FROM1234 match M1 ipv4 src-address address 1.2.3.4/32
% set services qos policy Policy1 prioritization class HIGH priority 1 classifier FROM1234
% set services qos policy Policy1 prioritization class BULK priority 15 classifier SFTP
% set services qos policy Policy1 prioritization default-priority 5
This creates a policy with three classes where unclassified traffic will go into the second priority class.
The class priority numbers do not imply the number of underling classes, just the order of the classes'
priority. The default priority can be the same as a defined class, but if it's not a class is created under the
hood with no classifier or next policy.
The problem with this configuration is that because we check for matches in order of priority we will
match on the IP address of 1.2.3.4 and apply the mark for the high priority class before we check if it is
SFTP. One solution to this is to use the classifiers metric. A classifier with a lower metric is evaluated
before classifiers with higher metrics. All classifiers have a default metric of 10. So by giving SFTP
classifier a lower metric, it will be considered before the FROM1234 classifier.
The other way to solve the problem would to be use the not syntax and explicitly prevent the FROM1234
classifier from matching SFTP traffic.
% set services qos classifier FROM1234 match M1 ipv4 protocol not assigned-number tcp
% set services qos classifier FROM1234 match M2 ipv4 src-address address 1.2.3.4/32
% set services qos classifier FROM1234 match M2 ipv4 protocol assigned-number tcp
% set services qos classifier FROM1234 match M2 ipv4 dst-port services ssh not
This will make the classifier match everything from 1.2.3.4 that is not TCP and everything from 1.2.3.4
that is TCP and port is not SFTP. The coupling of ports to IP protocols complicates negating ports. Either
constricting higher priority rules with the not syntax or inverting the order classification is evaluated with
metric will work.
Example: Fairness
Taking the last example if we wanted to extend it so that all traffic from 1.2.3.4 is evaluated fairly, we
could apply a next policy to that class.
% set services qos policy FAIR fairness sfq
% set services qos policy Policy1 prioritization class HIGH next-policy FAIR
% set services qos policy HTB shaping-htb class GOOSE priority 0 committed-rate 100 max-
rate 800 classifier [ GOOSE ]
% set services qos policy HTB shaping-htb class VIDEO priority 1 committed-rate 200 max-rate
400 classifier [ VIDEO ]
% set services qos policy HTB shaping-htb class OTHER priority 16 committed-rate 500 max-
rate 800
% set services qos policy HTB shaping-htb committed-rate 800 max-rate 800 default-class
OTHER
% set services qos enabled true
% commit
% set services qos classifier DST-IP match 1 ipv4 dst-address address 192.168.2.10/32
% set services qos policy DSCP-POLICY modify dscp value 16
% commit
In the Web UI these are provided on the screen by Navigating to: SNMP Agent ---> Advanced Config.
• V 1 – SNMP version 1: Only requires a plain-text community, with 32 bit counters, and minimal
security.
• V 2C – SNMP version 2 C: V 2c is basically equivalent to version 1, except it adds support for 64
bit counters.
• V 3 - SNMP version 3: adds both encryption and authentication, which can be used or in
combination.
• Agent Engine ID settings:
• Enterprise Number – This value may be left at default and is an administratively unique
identifier for the SNMPv3 engine. Combined with value from the selected method below is used
to create the Engine ID which is used in SNMPv3 to generate authentication and encryption keys.
DEFAULT: 4130
• Method:
- From IP – Generate SNMP engine ID based on the specified IP address
- From Mac (DEFAULT) – Generate SNMP engine ID based on the ethernet MAC address
- From Text – Generate SNMP engine ID based on specified text string 1 to 27 letters.
- From Other - Generate SNMP engine ID based on specified hex string
Advanced Configuration
The example below shows how to create an SNMP community named “public” with security name
“public”. On the Web UI, click on the community panel under advanced config tab on SNMP Agent main
screen and set/verify the parameters:
Filling in the parameter values can be accomplished via the CLI using the following commands:
% set services snmp community public sec-name public
Create VACM group named “all-rights” and a view named “internet”
The VACM determines whether a SNMP request that has been authenticated by matching community
security name (in case of SNMP v1/v2c) or by USM (in case SNMP v3) is authorized to access the
MIB object that is contained in the request.
VACM view: A VACM view is a MIB view that includes an OID subtree value and a type that
determines if the OID subtree is included or excluded from the view. For example in the case below,
the view name is “internet” with subtree OID value of 1.3.6.1 and type “included”. This view
basically includes all OIDs at or below 1.3.6.1 OID subtree.
On the Web UI, on the SNMP main screen scroll down to the bottom and click on VACM and
set/verify the parameters. These parameters are nested and an example shown below:
Configuring the SNMP agent for v3-only operation (w/ Authentication and
Encryption)
The example below assumes SNMP agent has factory default configuration (see section “Default
Configuration on Page 383”).
Disable v2c and enable v3
Click on the Add button in the User table and then enter “User 1”. Once done, click the Add button. This
will then prompt the user for additional information.
Once finished, click the Add button, which will present additional configurable fields.
• Sec Model - The security models under which this security Name (i.e. USM) is a member of this
group.
Next, assign the “internet” SNMP view as the Read View of the “usm” Access Sec Model.
• Read View - The name of the MIB view of the SNMP context authorizing read access.
• Write View - The name of the MIB view of the SNMP context authorizing write access.
• Notify View - The name of the MIB view of the SNMP context authorizing notify access.
Filling in the VACM Group parameter values can be accomplished via the CLI using the following
commands:
% set services snmp vacm group secure member User1 sec-model [usm]
% set services snmp vacm group secure access usm auth-priv read-view internet
Commit configuration
Each entry above specifies a SNMP notify name (e.g. std_v1_trap), the tag (e.g. std_v1_trap) and the type
of notification (trap or inform). The notify and tag names are kept the same for ease of configuration of
SNMP targets. The SNMP notify name is used to lookup up the tag (in notify table) that in turns is used
to look up all the SNMP targets (in target table) to which the SNMP notification needs to be sent.
Each event in the Orbit system can be configured to send an SNMP notification (trap/inform). By default,
all events are configured to send SNMP notification with SNMP notify name of “” (empty string). This
selects all tags in the notify table and attempts to lookup the targets that have been configured for these
tags. The user can also configure the SNMP notify name to be used for each event.
Sending all system events as SNMP v1 traps
Following example shows how to configure the unit to send v1 traps for all the events in the system to a
specified SNMP target:
Ensure version v1 is enabled.
Filling in values can be accomplished via the CLI using the following commands:
% set services snmp vacm group all-rights access any no-auth-no-priv notify-view internet
Click “Save” on the Web UI.
Via the CLI using the following commands:
% commit
To test above configuration, start an SNMP trap receiver (like “snmptrapd” with configuration file as
shown below) and generate “ssh_login” event by logging into the Orbit via SSH.
snmptrapd.conf:
engineID testing
snmpTrapdAddr 0.0.0.0:5000
authCommunity log,execute,net public
doNotFork yes
$ snmptrapd -M +./ -Lo -c snmptrapd.conf
NET-SNMP version 5.4.3
As can be seen above, the SNMP agent sent a v1 trap for “ssh_login” event
NOTE The following configuration are very similar to the WebUI Screens already presented. To save
space only the CLI version is presented.
Sending all system events as SNMP v2c traps
Following example shows how to configure the unit to send v2c traps for all the events in the system to a
specified SNMP target via the CLI command line:
Ensure version v2c is enabled.
% set services snmp agent version v2c
Configure SNMP manager as a target that listens on port 5000, has IP address of 192.168.1.2, can
receive v2c traps (tag “std_v2_trap”) with security name of “public”.
% set services snmp target TARGET-1-v2c ip 192.168.1.2
% set services snmp target TARGET-1-v2c port 5000
% set services snmp target TARGET-1-v2c tag std_v2_trap
% set services snmp target TARGET-1-v2c v2c sec-name public
Give the VACM group named “all-rights” (as configured in previous examples) notify access to
“internet” view.
% set services snmp vacm group all-rights access any no-auth-no-priv notify-view internet
Commit configuration.
% commit
To test above configuration, start an SNMP trap receiver (like “snmptrapd” with configuration file as
shown below) and generate “ssh_login” event by logging into the Orbit via SSH.
snmptrapd.conf:
engineID testing
snmpTrapdAddr 0.0.0.0:5000
authCommunity log,execute,net public
doNotFork yes
As can be seen above, the SNMP agent sent a v2 trap for “ssh_login” event.
To test above configuration, start an SNMP trap receiver (like “snmptrapd” with configuration file as
shown below) and generate “ssh_login” event by logging into the Orbit via SSH.
NOTE When using SNMPv3 traps, the Orbit is the authoritative engine since it is the one sending the
trap. Therefore, the user created in snmptrapd.conf must be tied to the EngineID of Orbit. The
EngineID of Orbit can be obtained by running following command:
% run show SNMP-FRAMEWORK-MIB snmpEngine snmpEngineID
SNMP-FRAMEWORK-MIB snmpEngine snmpEngineID 80:00:10:22:03:00:06:3d:06:ea:96
snmptrapd.conf:
engineID testing
snmpTrapdAddr 0.0.0.0:5000
createUser -e 800010220300063d06ea96 User1 SHA sha1Password AES aesPassword
doNotFork yes
authUser log,execute,net User1
As can be seen above, the SNMP agent sent a v3 trap for “ssh_login” event. If the authentication or
encryption password for user “User1” as set in snmptrapd.conf file does not match as that configured in
the unit, snmptrapd will not display the received trap.
To test above configuration, start an SNMP trap receiver (like “snmptrapd” with configuration file as
shown below) and generate “ssh_login” event by logging into the Orbit via SSH.
snmptrapd.conf:
engineID testing
snmpTrapdAddr 0.0.0.0:5000
authCommunity log,execute,net public
doNotFork yes
To test above configuration, start an SNMP trap receiver (like “snmptrapd” with configuration file as
shown below) and generate “ssh_login” event by logging into the Orbit via SSH.
snmptrapd.conf:
engineID testing
snmpTrapdAddr 0.0.0.0:5000
createUser RemUser1 SHA sha1Password AES aesPassword
authUser log,execute,net RemUser1
doNotFork yes
Monitoring
Ensure the CLI is in operational mode. Check SNMP agent status
> show SNMPv2-MIB
INTERFACE-MONITOR
This operation monitors operational status (oper-status) of an interface, with monitor operation state being
false (i.e. DOWN) when interface oper-status is DOWN and monitor operation state being true (i.e. UP)
when interface oper-status is UP.
Configuration
Monitoring
NOTE If the netmon monitor operation is disabled by configuration, then the operation state will be
true (UP). This ensures that operations that have been disabled do not factor into decision
making by other Orbit subsystems that would otherwise take any corrective action based on
state being false (down).
ICMP-ECHO-MONITOR
This operation monitors IP connectivity to a configured host using ICMP ECHO (i.e. PING) messages.
This operation can also just be used to generate periodic traffic towards a specific host.
Configuration
To configure the system to trigger a device reboot on monitor failure, add the following:
% set system power restart-trigger netmon initial-delay 300
% set system power restart-trigger netmon operation [ NX-LINK-CHECK]
Following is another example of using icmp-echo-monitor to reboot the Orbit device based on low duty
cycle connectivity check over cellular link:
1. Configure NETMON ping operation
% set services netmon operation PROBE-1 enabled true
% set services netmon operation PROBE-1 type icmp-echo-monitor
Number of pings that have to fail successively (i.e. no replies) before netmon operation state is changed
to “false” (i.e. DOWN). With setting of 6, probe will go down in about ~300 * 6 = 1800 seconds (30mins)
when there is no connectivity
% set services netmon operation PROBE-1 icmp-echo-monitor successive-loss-threshold 6
Number of pings that have to be successful (i.e. replies) before netmon operation state is changed to
“true” (i.e. UP). With setting of 1, probe will go up in about ~300 seconds (5mins) when connectivity is
restored.
% set services netmon operation PROBE-1 icmp-echo-monitor successive-gain-threshold 1
Set initial-delay in seconds before netmon status is checked after system boot. This should be set to a high
value to give unit ample time to connect and gain connectivity.
% set system power restart-trigger netmon initial-delay 300
BGP-NEIGHBOR-MONITOR
This operation monitors the BGP connection status of a configured neighbor. For DMVPN setups that use
BGP for exchanging routes through the tunnel, it can be advantageous to use the BGP connection status
as a liveliness check for the tunnel instead of using a separate ICMP-ECHO monitor operation, since BGP
protocol already uses keepalives to monitor peer connection.
Configuration
CELL-SIGNAL-MONITOR
The cellular signal monitor operation monitors service-state (i.e. 2G/3G/4G) of the Cellular interface as
well corresponding signal metrics. The operation state is set to “true” when signal levels are above for
ALL configured thresholds for specified number of samples. Otherwise, the operation state is set to false
(DOWN) when this condition is not met specified number of samples. This NETMON operation can then
be tied to various NETMON clients in Orbit, one of which is cellular connection profile switching, which
can monitor state of the NETMON operation and switch profiles when it indicates false (i.e. “down”
state).
Configuration
Following example illustrates configuring cell connection profile/SIM switching based on cell-signal-
monitor state on a dual SIM Orbit device:
Configure connection profile named PROFILE-1 that uses SIM-A
% set interfaces interface Cell cell-config connection-profile PROFILE-1 bearer-config apn
www.dau.dau
% set interfaces interface Cell cell-config connection-profile PROFILE-1 bearer-config protocol
ip
% set interfaces interface Cell cell-config connection-profile PROFILE-1 service-recovery
netmon
VRRP- MONITOR
The vrrp monitor operation monitors the state of the VRRP instance configured on a particular network
interface. The operation state is set to true (UP) when the vrrp state is “master” and is set to false
(DOWN) when it is “backup”.
Configuration
Configuration
LOGIC-MONITOR
The logic monitor allows user to create a logical expression composed of other netmon operations using
following operators: AND, and, OR, or, NOT, not, &&, ||, !.
SCADA Back-office to Remote MCR NX+CELL redundant network setup using routing – Use Case#1
SCADA Master
BACKOFFICE
• R1 configured to terminate GRE (and IPsec) 10.10.1.0/24
tunnels from remotes over cell.
• Static routes configured for REMOTE#1:
10.10.6.0/24 -> towards AP (primary) 192.168.1.0/24
192.168.1.4 10.150.1.1
10.10.6.0/24 -> towards GRE-TUN (backup)
• Static routes configured for REMOTE#2: R1
10.10.7.0/24 -> towards AP (primary)
10.10.7.0/24 -> towards GRE-TUN (backup)
• Failover to Cell enabled by checking primary
route’s reachability by pinging remote’s NX
interface.
ETH
AP
Bridge Cellular Network
NX
Figure 3-255. SCADA Back-office to Remote Orbit NX+CELL redundant setup using routing
In above use case, the SCADA back-office application sends/receives data to/from a remote asset
connected to remote Orbit (called REMOTE hereafter) that has both 900 MHz radio (NX) and Cellular
• ConfigureGRE tunnel interface with mode = ip-over-gre, src-address = Local cell address and dst-
address = R1’s WAN address.
% set interfaces interface GRE1 type gre
% set interfaces interface GRE1 gre-config mode ip-over-gre
% set interfaces interface GRE1 gre-config src-address 10.150.1.10
% set interfaces interface GRE1 gre-config dst-address 10.150.1.1
% set interfaces interface GRE filter input IN_TRUSTED
% set interfaces interface GRE filter output OUT_TRUSTED
• Configure primary route towards SCADA back-office network (10.10.1.0/24) with NX as the
outgoing interface and with address of R1’s interface on NX backhaul as the next-hop. Also,
configure this route with verify-reachability using NX-LINK-CHECK operation, which checks
the reachability of the back-office network via this route.
% set routing static-routes ipv4 route 1 dest-prefix 10.10.1.0/24
% set routing static-routes ipv4 route 1 next-hop 192.168.1.4
% set routing static-routes ipv4 route 1 outgoing-interface NxRadio
% set routing static-routes ipv4 route 1 verify-reachability operation NX-LINK-CHECK
• Configure secondary route towards SCADA back-office network (10.10.1.0/24) with GRE1 as the
outgoing interface and preference value of 20.
% set routing static-routes ipv4 route 2 dest-prefix 10.10.1.0/24
Figure 3-256. Orbit to Orbit NX+CELL redundant network (layer-3) setup using routing
In above use case, a remote asset (e.g. RTU) connected to AP can send/receive data to/from another
remote asset connected to a REMOTE. Both, AP and REMOTE Orbit have 900 MHz radio (NX) and
Cellular radio options. The NX interface is configured as a routed interface (i.e. outside of the Bridge).
All REMOTEs have non-overlapping LAN subnet configuration. The IP packets sent by remote asset
connected to AP are normally routed by the AP towards the REMOTE over the NX interface. The IP
packets sent by remote asset connected to REMOTE are normally routed by the REMOTE towards the
AP over the NX interface. Both AP and REMOTE verify the primary link (NX) connectivity by sending
periodic ICMP echo requests (pings). In the event that N (configurable) successive pings are lost, both AP
and REMOTE update their routing tables to direct traffic over cellular network instead. Both still keep
checking the primary link connectivity. Once primary link connectivity is restored (i.e. N successful
pings), both AP and REMOTE update their routing tables to direct traffic over NX network.
The above setup is facilitated by same functionality as described in previous section.
Configuration
The configuration for the REMOTEs and AP for this use case is similar to configuration of REMOTE as
described in use case#1, except that at the AP the IPsec is configured in responder mode.
420 MDS Orbit MCR/ECR Technical Manual MDS 05-6632A01, Rev. M
Use Case#3 High Reliability Orbit AP to REMOTE Layer-2 Network
Following figure shows a setup to achieve a high reliability network communications between an Orbit
AP and REMOTE using 900 MHz and Cellular communications in a redundant layer-2 network setup
using bridging and bonding functionality.
MCR to MCR NX+CELL redundant network (layer-2) setup using bridging and bonding – Use Case#3
RTU
• NX configured as layer-2 interface in the bridge
with ETH (192.168.1.0/24 network).
• Cell configured with APN that provides static IP 192.168.1.0/24
address.
ETH
• GRE configured as layer-2 interface over Cell in
the bridge with NX and ETH (192.168.1.0/24
BRIDGING FUNCTION
network).
• STP disabled on Bridge. AP
• (Optional) IPsec configured over Cell to provide GRE-TUN
security.
NX CELL
The failover happens at the remote.
Cellular Network
Figure 3-257. Orbit to Orbit NX+CELL redundant network (layer-2) setup using Bridging and
Bonding
In above use case, a remote asset (e.g. RTU) connected to AP can send/receive data to/from another
remote asset connected to a REMOTE. Both, AP and REMOTE Orbit have 900 MHz radio (NX) and
Cellular radio options. This is a typical NX setup where LAN networks connected to both AP and
REMOTEs are bridged to enable Ethernet communication between any remote assets on the LAN
networks. A layer-2 GRE tunnel (ETHERNET-OVER-GRE mode) is setup over Cell. The redundant
layer-2 link between AP and REMOTE is achieved by use of a BOND interface on the REMOTE.
A BOND interface bonds two layer-2 interfaces together and presents them as a single layer-2 interface to
the rest of the system. Specifically, the BOND interface in active-backup mode enables redundancy
between the enslaved interfaces by activating the secondary member link when primary link goes down.
On each REMOTE, the BOND interface bonds NX interface (primary) with GRE layer-2 tunnel interface
(secondary) and is itself bridged with the LAN interface. On the AP, the NX and layer-2 GRE tunnel
interfaces are bridged with the LAN interface.
On the REMOTE, when the NX link goes down, the BOND interface makes GRE layer-2 tunnel interface
as the active interface (after some configurable delay to avoid link flapping) thereby tunneling LAN
traffic through the cellular network. When NX link comes back up, the BOND interface makes it the
MDS 05-6632A01, Rev. M MDS Orbit MCR/ECR Technical Manual 421
active interface (after some configurable delay to avoid link flapping) thereby restoring layer-2
communications over the NX link.
NOTE In this setup, the failover is initiated by the REMOTE. Therefore, a periodic traffic stream is
required from REMOTE towards the AP, to update the Bridge forwarding table on the AP, so
that traffic for remote assets connected to failed-over REMOTE is sent over the GRE layer-2
tunnel for that REMOTE at the AP. If there is no periodic application data stream from remote
assets towards the AP, it is recommended that a NETMON service be setup on the REMOTE
that sends ICMP ECHO (ping) requests periodically (say, every 30 secs.) to the AP. The time
interval of this periodic data stream will determine the fail-over time for traffic from AP
towards the failed-over REMOTE.
Using the Web UI
AP Configuration
Following features need to be configured on the AP:
IPsec transport mode connection – To secure GRE traffic to/from REMOTE-1 and REMOTE-2
over Cellular network.
GRE tunnel – To send/receive layer-2 traffic to/from REMOTE-1 and REMOTE-2’s LAN
segments over Cellular network.
Adding GRE tunnels to the Bridge interface – To enable flow of layer-2 traffic between local LAN
segment and REMOTE-1 and REMOTE-2’s LAN segments over Cellular network.
Configure IPsec Transport Mode Connections
Configure an IPsec VPN transport mode connection for the REMOTE-1. Please refer to section on
IPsec VPN for help with configuring IPsec VPN using Web UI.
Configure an IPsec VPN transport mode connection for the REMOTE-2. Please refer to section on
IPsec VPN for help with configuring IPsec VPN using Web UI.
Configure GRE tunnels
Configure GRE tunnel interface towards REMOTE-1 with mode = ethernet-over-gre, src-address =
10.150.1.1 (the local Cell interface address as used in IPsec VPN towards REMOTE-1) and dst-
address = 10.150.1.10 (the remote Cell interface address as configured in IPsec VPN towards
REMOTE-1).
- Navigate to Interfaces / Add/Delete Interfaces and click ‘Add’ to create new interface named
‘GRE-REMOTE-1’:
NOTE Since the AP and REMOTEs are now part of a single layer-2 network, the bridge interfaces
need to be assigned distinct IP addresses.
• Add the GRE tunnel interfaces to the bridge and disable STP on the bridge
% set interfaces interface Bridge bridge-settings members port GRE-REMOTE-1
% set interfaces interface Bridge bridge-settings members port GRE-REMOTE-2
% set interfaces interface Bridge bridge-settings stp-mode disabled
REMOTE#1 Configuration
• Configure IPsec tunnel
% set services vpn enabled true
% set services vpn ike policy AP_ike_policy auth-method pre-shared-key
% set services vpn ike policy AP_ike_policy pre-shared-key remote1
% set services vpn ike policy AP_ike_policy ciphersuite ike_policy_cipher0
% set services vpn ike policy AP_ike_policy life-time 180
% set services vpn ike policy AP_ike_policy reauth true
% set services vpn ike peer AP_ike_peer ike-policy AP_ike_policy
% set services vpn ike peer AP_ike_peer local-endpoint address 10.150.1.10
% set services vpn ike peer AP_ike_peer local-identity default
% set services vpn ike peer AP_ike_peer peer-endpoint address 10.150.1.1
% set services vpn ike peer AP_ike_peer peer-identity default
% set services vpn ike peer AP_ike_peer role initiator
% set services vpn ike peer AP_ike_peer initiator-mode on-demand
% set services vpn ipsec policy AP_ipsec_policy ciphersuite ipsec_policy_cipher0
% set services vpn ipsec policy AP_ipsec_policy life-time 60
% set services vpn ipsec connection AP ike-peer AP_ike_peer
% set services vpn ipsec connection AP ipsec-policy AP_ipsec_policy
% set services vpn ipsec connection AP host-to-host
% set services vpn ipsec connection AP filter input IN_TRUSTED
% set services vpn ipsec connection AP filter output OUT_TRUSTED
BOND interface in ‘active-backup’ mode with NxRadio and GRE-AP as members and
• Configure
NxRadio as the primary member.
% set interfaces interface Bond1 type bond
% set interfaces interface Bond1 bond-config mode active-backup
% set interfaces interface Bond1 bond-config member NxRadio
% set interfaces interface Bond1 bond-config member GRE-AP
% set interfaces interface Bond1 bond-config primary-member NxRadio
REMOTE#2 Configuration
Configuration is similar to REMOTE#1.
SCADA Master
BACKOFFICE
10.10.40.1.0/24
Cellular Network
CELL CELL
• GRE configured as routed interface over Cell
• (Optional) IPsec transport mode configured REMOTE-1 GRE-TUN REMOTE-2 GRE-TUN
over Cell to secure GRE traffic.
• RIP or OSPF configured to export LOCAL ROUTER FUNCTION ROUTER FUNCTION
LAN route (10.10.6.0/24) and import routes
ETH ETH
sent by back-office router.
10.10.6.0/24 10.10.7.0/24
RTU RTU
Figure 3-258. Dynamic Routing between SCADA Back-office and Remote LAN
Configuring
Following example shows how to create a route filter to export route for a directly connected local LAN
(i.e. direct/interface route for Bridge interface for a unit with factory default configuration).
Navigate to Routing-> Basic Config->Route filters
Click ‘Add’ to create a route filter named LOCAL_LAN.
Select the newly created LOCAL_LAN route filter and click ‘Add’ to add a rule with ID=1 to this filter.
Monitoring
Navigate to Routing-> Status
The user can check the routing table in the ‘General’ panel to ensure a dynamic route for the back-office
has been received from the back-office router.
Using CLI
In operational mode, enter following commands:
OSPF
The basic OSPF configuration consists of enabling the protocol, creating backbone area 0.0.0.0 and
adding interfaces to this area on which the protocol should operate and configuring an export filter. In
addition, MD5 authentication can be used to secure routing protocol updates on per-interface basis. In the
example below, OSPF is enabled with area 0.0.0.0 containing GRE interface along with LOCAL_LAN as
the export filter.
Navigate to Routing-> Basic Config->OSPF
Select ‘LOCAL_LAN’ as the export filter.
Monitoring
Navigate to Routing-> Status
The user can check the routing table in the ‘General’ panel to ensure a dynamic route for the back-office
has been received from the back-office router.
The ‘OSPF’ panel, displays the state of OSPF routing protocol including route import/export statistics and
other OSPF protocol status.
The ‘Lsa’ table displays all link state advertisements (LSAs) received by this router.
Using CLI
In operational mode, enter following commands:
> show routing-state routes
OUTGOING
DEST PREFIX NEXT HOP INTERFACE SOURCE
---------------------------------------------------------------------------------------------------------
0.0.0.0/0 172.18.175.129 Cell kernel
10.10.6.0/24 - Bridge kernel
10.10.40.0/24 - GRE dynamic
172.18.175.128/28 - Cell kernel
ADV
SCOPE TYPE LS ID ROUTER AGE SEQUENCE CHECKSUM
-------------------------------------------------------------------------------------------------------------------------------------
Global 0005 10.10.40.0 2.2.2.2 1012 80000001 105e
Global 0005 10.10.6.255 10.10.6.1 1014 80000001 cb9a
Area 0.0.0.0 0002 192.168.1.4 2.2.2.2 966 80000002 049b
Area 0.0.0.0 0001 2.2.2.2 2.2.2.2 966 80000004 8785
Area 0.0.0.0 0001 10.10.6.1 10.10.6.1 967 80000002 d25b
BGP
The basic BGP configuration consists of adding a neighbor entry for each peer and configuring an export
filter. BGP can operate in two modes: External BGP (EBGP) and Internal (IBGP). EBGP is used between
BGP routers that are in different Autonomous (AS) systems and IBGP is used between BGP routers in the
same ASes (to redistribute routes learned from external BGP routers to internal BGP routers). The mode
is not configured explicitly but is activated based on AS number configuration for the local BGP router
and the neighbor. When the AS number is different, BGP operates in EBGP mode and when it is the same
it operates in IBGP mode. In the example below, BGP is configured with one external neighbor with
LOCAL_LAN as the export filter.
Navigate to Routing-> Basic Config->BGP
Select ‘LOCAL_LAN’ as the export filter.
NOTE Please see section 12.3.2.1 for an example on use of BGP to exchange routes over DMVPN
network.
Using CLI
In configuration mode, enter following commands:
% set routing bgp neighbor PRIMARY-HUB peer-address 172.16.0.1
% set routing bgp neighbor PRIMARY-HUB enabled true
Monitoring
Navigate to Routing-> Status
The user can check the routing table in the ‘General’ panel to ensure a dynamic route for the back-office
has been received from the back-office router.
Using CLI
In operational mode, enter following commands:
>show routing-state bgp
MDS 05-6632A01, Rev. M MDS Orbit MCR/ECR Technical Manual 445
routing-state bgp neighbor PRIMARY-HUB
routing-instance inet.main
state up
preference 100
import-filter ACCEPT
export-filter LOCAL-LAN
statistics import-updates-received 1
statistics import-updates-rejected 0
statistics import-updates-filtered 0
statistics import-updates-ignored 0
statistics import-updates-accepted 1
statistics import-withdraws-received 0
statistics import-withdraws-rejected 0
statistics import-withdraws-ignored 0
statistics import-withdraws-accepted 0
statistics export-updates-received 8
statistics export-updates-rejected 1
statistics export-updates-filtered 6
statistics export-updates-accepted 1
statistics export-withdraws-received 0
statistics export-withdraws-accepted 0
local-state established
peer-address 172.16.0.1
peer-as 65500
peer-id 172.16.0.1
local-address 172.16.0.3
hold-time 23/30
keepalive-time 7/10
GPS 97-3194A33
NOTE A GPS equipped unit has a dedicated GPS antenna port which provides 3.3V, 100mA max DC
bias and can be used with active GPS antennas.
Configuring
Navigate to Services->GPS Service--> Basic Config
The GPS service has very minimal configuration. The user simply has to enable the GPS service for it to
start collecting data from the first detected GPS data source in the system. If there are more sources in the
system, then user can select the specific data source by configuring the ‘source’ parameter.
To apply configuration, click Save.
Using CLI
% set services gps enabled true
% commit
NOTE Enabling/Disabling GPS service will reset cellular modem (that supports standalone GPS
receiver).
Monitoring
Navigate to Services --> GPS Service --> Status
To configure via the web interface. Navigate to Services->I/O Service--> Basic Config
NOTE In firmware versions prior to 4.x.x, the user might need to click the refresh symbol next to
‘DDNS service’ to make the URL field show up after Provider = ‘Other’ is selected.
To apply configuration, click Save.
Using CLI
% set services ddns enabled true
% set services ddns provider dyn.com
% set services ddns hostname pump1.dyndns.org
% set services ddns username test
% set services ddns password test123
% set services ddns interface Cell
% commit
Office
Backup
Configuration
VRRP can be enabled on select interfaces, including Ethernet, Bridge, and VLAN interfaces. For
example:
configure
The following items are configurable VRRP settings for each interface:
• enabled – whether or not VRRP is enabled on the interface
• address – the Virtual IP (VIP) assigned to the physical routers in a VRRP group.
• subnet-mask – corresponding subnet-mask to the VIP
• id – a numeric value that indicates which VRRP group this router belongs to.
• priority – each physical router in a group gets its own priority. The higher the number, the
higher the priority that the physical router will be become the Master during negotiation.
• advertisement-interval – The Master router advertises its presence to the Backups. This
controls the frequency of those advertisements. Note: The advertisement-interval should be the
same on all units.
• preemption – whether or not to allow higher priority routers become Master when they come
online.
All physical routers in a VRRP group must be configured with same VIP address/subnet and id. Each
router should have a unique priority value. Lastly, each router could have an additional, unique, IP/subnet
on the same interface that VRRP is running on to facilitate administration and diagnostics.
Monitoring
Read-only parameters for interfaces with VRRP show the state of the router:
show interfaces-state interface ETH2 vrrp
3.8.28 IP Passthrough
Understanding
This service enables an outside interface's (e.g. Cell) IP address to be passed through to a device
connected to an inside interface (e.g. Bridge) of Orbit, making Orbit act as a simple modem (like a
traditional cable modem). The IP Passthrough service also enables user to configure certain traffic to be
terminated at Orbit (for example, management) instead getting passed through. This service is typically
used for Orbit devices with cellular interfaces where the Orbit is connected to the end-device via LAN
and the IP address received from the cellular network needs to be passed to the end-device so it can be
accessed using that address from the network.
Configuration
Using Web UI
Navigate to Services->IP Passthrough->Basic Config.
Click ‘Enable” to enable the passthrough service.
Add any local service that needs to be captured and terminated at the Orbit itself instead of getting passed
through to the attached end-device. This is typically required to enable remote management of Orbit
itself. The example below shows, SSH service being added as a local service. With this configuration any
traffic destined for the cellular address on port 22 will be routed to Orbit instead of getting passed through
to the end device. One can similarly configure entries for HTTP (TCP port 80) or HTTPS (tcp port 443)
to enable remote access to Orbit’s Web UI.
Using CLI
In configuration mode, enter following commands:
% set services ip-passthrough enabled true
% set services ip-passthrough local-service SSH protocol tcp port 22
% set services ip-passthrough local-service HTTP protocol tcp port 80
% set services ip-passthrough local-service HTTPS protocol tcp port 443
% commit
Monitoring
Using Web UI
Navigate to Services->IP Passthrough->Status
Deleting
The device may delete a private key by clicking the Delete button on the web user interface or using the
CLI in operational mode. See the following example for deleting private keys via the CLI:
> request pki private-keys delete key-identity generated_key_2048
Configuring - Generation
To start generating a new private key, navigate to System / Certificate Management ---> Actions /
Generate Private Key. Click on the Begin Generation button once the key identity and key size (in bits)
is configured.
Monitoring - Generation
Once the generation is begun, the process may be cancelled by clicking the Cancel Generation button.
The current status of the generation process is displayed on the web page. Note that the web page does not
display the current status if the device has not been instructed to generate a private key (in other words, if
the state is “inactive”).
Configuring - Import
The following example shows how to have the device import a private key by uploading a local file
through the web browser.
Navigate to the Private Keys section in Certificate Management / Basic Config.
Monitoring - Import
Once the import of a private key is begun, the process may be cancelled by clicking the Cancel Import
button. The current status of the import process is displayed on the web page. Note that the web page does
not display the current status if the device has not been instructed to import a private key (in other words,
if the state is “inactive”).
When using the SCEP protocol, additional CA server files sent as part of the request and needed later are
saved with the base name selected for the CA server and an added extension. Some of the additional files
that may be added are:
• _ENC , SCEP encryption certificate
• _SGN , SCEP digital signature certificate
Deleting
The device may delete a CA certificate by clicking the Delete button on the web user interface or using
the CLI in operational mode. See the following example for deleting CA certificates via the CLI:
> request pki ca-certs delete cert-identity imported_ca_cert_2048
Configuring
The following example shows how to have the device import a CA certificate by uploading a local file
through the web browser.
Navigate to the CA Certificates section in Certificate Management / Basic Config.
Click on the Add button, and then click on the Begin Importing button once the certificate identity and
the file source are configured.
Monitoring - Import
Once the import of a CA certificate is begun, the process may be cancelled by clicking the Cancel
Import button. The current status of the import process is displayed on the web page. Note that the web
page does not display the current status if the device has not been instructed to import a CA certificate (in
other words, if the state is “inactive”).
Deleting
The device may delete a client certificate by clicking the Delete button on the web user interface or using
the CLI in operational mode. See the following example for deleting CA certificates via the CLI:
> request pki client-certs delete cert-identity imported_client_cert_2048
Configuring
The following example shows how to have the device import a client certificate by uploading a local file
through the web browser.
Navigate to the Client Certificates section in Certificate Management / Basic Config.
Click on the Add button, and then click on the Begin Importing button once the certificate identity and
the file source are configured.
The following example shows how to have the device import a new client certificate from a predefined
SCEP server that is accessible from the Orbit (e.g. a locally connected host or remote host accessible via
cellular interface). To start the client certificate import from the CLI, enter the following command to
download the new client certificate from the SCEP server:
> request pki client-certs import cert-identity scep_client_cert scep {
cert-server-identity predefined_cert_server ca-issuer-identity predefined_ca_server cert-info-
identity predefined_cert_info ca-cert-identity scep_ca_cert private-key-identity
imported_key_2048 ca-challenge 36DE2A1E53BECF9AE5BB3E0B12D4C85E }
The following example shows how to have the device import a renewed client certificate from a
predefined SCEP server that is accessible from the Orbit (e.g. a locally connected host or remote host
accessible via cellular interface). To start the client certificate import from the CLI, enter the following
command to download the renewed client certificate from the SCEP server:
> request pki client-certs import cert-identity renewed_scep_client_cert scep { cert-server-
identity predefined_cert_server ca-issuer-identity predefined_ca_server cert-info-identity
predefined_cert_info ca-cert-identity scep_ca_cert private-key-identity imported_key_2048
existing-cert-identity scep_client_cert existing-private-key-identity imported_key_2048 }
Monitoring - Import
Once the import of a client certificate is begun, the process may be cancelled by clicking the Cancel
Import button. The current status of the import process is displayed on the web page. Note that the web
page does not display the current status if the device has not been instructed to import a CA certificate (in
other words, if the state is “inactive”).
Deleting
The device may delete a firmware certificate by clicking the Delete button on the web user interface or
using the CLI in operational mode. See the following example for deleting CA certificates via the CLI:
> request pki firmware-certs delete cert-identity firmware_cert_2048_delete_me
Monitoring - Import
Once the import of a firmware certificate is begun, the process may be cancelled by clicking the Cancel
Import button. The current status of the import process is displayed on the web page. Note that the web
page does not display the current status if the device has not been instructed to import a firmware
certificate (in other words, if the state is “inactive”).
This defines the server that is running the SCEP protocol on an accessible network. The unit will append
an 'http://' to the URL so it must not be entered as part of the uri parameter in the configuration. Note also,
the above is just an example. The IP address, specific port (if different from the default) and path to .dll or
.cgi or other SCEP server mechanism must be obtained from the System Administration or Security
personnel.
NOTE In FIPS mode, MD5 and SHA1 are prohibited as the digest algorithm.
The configuration of the Certificate Authority that will be accessed at the above server is setup in a
second command under ca-servers.
> set pki ca-servers ca-server predefined_ca_server ca-fingerprint
8777AF0253204589452ECC3CDB9DEC77
The fingerprint of the CA server is another data item obtained from the System Administrator or Security
personnel. The CA server name is the name that will be referenced in the SCEP operations described
below. In general, it is simply for reference and does not have to be a specific name. In fact, it can be the
same name as the ca-server if this helps to remember it. Also, client certificate information that goes in
the “Subject” portion of an X.509 certificate must be configured. Some fields may be fixed/required by
the specific SCEP server.
The CA fingerprint on the Orbit should contain only alpha-numeric characters without spaces or
separators (i.e. commas, colons etc.).
The parameters that must be entered for the client certificate information must again be obtained from the
System Administration or Security personnel. The common name will always be required. Other
parameters may be required.
> set pki cert-info certificate-info predefined_cert_info
Possible completions:
common-name-x509 -
country-x509 -
locale-x509 -
org-unit-x509 -
organization-x509 -
pkcs9-email-x509 -
state-x509 -
Here is an example:
The next step is to request the new client certificate from the SCEP server.
> request pki client-certs import cert-identity scep_client_cert scep {
cert-server-identity predefined_cert_server ca-issuer-identity predefined_ca_server cert-info-
identity predefined_cert_info ca-cert-identity scep_ca_cert private-key-identity
imported_key_2048 ca-challenge 36DE2A1E53BECF9AE5BB3E0B12D4C85E }
The following example shows how to re-enroll for a new client certificate from the SCEP server that
belongs to a new private key, using the existing private key and issued client certificate, without the need
to provide the ca-challenge:
> request pki client-certs import cert-identity reenrolled_scep_client_cert scep { cert-server-
identity predefined_cert_server ca-issuer-identity predefined_ca_server cert-info-identity
predefined_cert_info ca-cert-identity scep_ca_cert private-key-identity new_key_2048
existing-cert-identity scep_client_cert existing-private-key-identity imported_key_2048 }
After checking all of the client certificates, the automated processing will check each CA certificate. If
the CA certificate is found to have the “Validity Not After” within the expiry-window and certificate was
previously imported via SCEP, and the stored certificate has information about the SCEP options that was
used to initially import the certificate via SCEP, then the automated processing will begin attempting to
obtain a new certificate using the SCEP settings that were previously used. The processing will log the
auto_renew event indicating the start and either the successful completion or the failure of the automated
processing on the certificate, indicating the certificate identity that as assigned to it by the user during
initial import. The automated processing will the fetch the CA certificates from the SCEP server. The
import of the CA certificates will be recorded to the event log as if performed manually. In addition, the
processing is done to temporary identity names based on the existing identity value, but with the
“AUTORENEW_” prefix. Upon successful completion, the automated processing will also delete the
existing PKI material, then rename the PKI material from the “AUTORENEW_” names to the existing
identity names. Upon failure, the “AUTORENEW_” PKI material will be deleted. The event log will
include events for the deleting and rename events for the PKI material.
You can examine the event log to monitor the automated processing.
Configuring
The following example shows how to have the device send the update notification of the PKI material
through the web browser.
Navigate to the Send Update Notification section in Certificate Management / Actions.
Using CLI
The following are example CLI commands to send the update notifications for PKI material:
> request pki send-update-notification key-identity DEVKEY
> request pki send-update-notification ca-cert-identity CACERT
> request pki send-update-notification client-cert-identity DEVCERT
NOTE In addition to the LEDs listed on the previous page, the Ethernet connector has two embedded
LEDs. A yellow indicates a link at 100 Mbps operation. A flashing green indicates Ethernet
data traffic.
Note that the user supplied name “test” is used a base for autogenerating a more complete name. The
prefix “serdump_” is added and a numeric suffix is added (starting with “1”). During file capture once
500KB of data is collected, the current file is closed and a new one is opened, with a new incremented
suffix (i.e. serdump_test1.bin is closed and serdump_test2.bin is opened). After 5 files are created, the
oldest is automatically overwritten. This provides a sliding window of about 2000KB-2500KB of data
with one serdump command.
Saved files can be viewed with the command: show diagnostics capture-files
NAME SIZE DATE
----------------------------------------------------
To export a saved file use a command like: request diagnostics export-capture-files name
serdump_test1.bin filename name_after_upload.txt …. This will upload the file to be
viewed as a text file.
GENERAL
Overvoltage Category
1
Input Power
11 to 55 VDC, NOMINAL
10 to 60 VDC, 15 Watts maximum (depending on configuration)
MCR 4.5A Maximum
ECR 3.0A Maximum
Below are power consumption figures for common configurations:
Typical High Throughput Wi-Fi power consumption <= 4.1 Watts
Minimum Wi-Fi power consumption <= 3.4 Watts
Serial Port(s)
RJ-45, supporting RS-232/RS-485
Ethernet Port(s)
RJ-45 10/100/1000 Mbps Auto-MDIX [SFP platform offering]
RJ-45 10/100 Mbps Auto-MDIX [All other platforms]
SFP Port(s)
Small Form Factor Pluggable 100/1000 Mbps
LAN Protocols
802.3 (Ethernet) 802.1D (Spanning Tree) TCP/IP, DHCP, ICMP, IGMP, FTP, TFTP,
SFTP, UDP, SNMP, VPN, VLAN
Networking
DHCP, Port Forwarding, NAT, VLAN, SNMP
Configuration
Serial console, SSH, HTTP/HTTPS, NETCONF, Configuration files
Security
Encryption, Password access, RADIUS, TACACS+, Firewall, SCEP, VPN
Physical
Size
MCR 8.0” width (20.32 cm), 4.8” depth (12.19 cm), 1.75” height (4.45 cm)
ECR 4.3” width (10.92 cm), 4.6” depth (11.68 cm), 2.1” height (5.33 cm)
Housing
Die-cast Aluminum
Weight
MCR 2 lbs (0.91 kg) without mounting hardware
ECR 1.45 lbs (0.65 kg) without mounting hardware
Environmental
Operating Temperature Range
-40°C to +70°C
NOTE For Orbit ECR equipped with LN modules, the maximum continuous duty cycle while
operating at 70C is 10%
NOTE Operating temperature range may be reduced based on model configuration. See product label
for detail.
Caution: This device may exceed safe handling temperatures when operated in an ambient temperature
above 55°.
MDS 05-6632A01, Rev. M MDS Orbit MCR/ECR Technical Manual 483
Agency/Regulatory Approvals
FCC
Standard WiFi – M4Y-ZCN722MV1
Standard WiFi – E5MDS-AC720M
Enhanced WiFi – 2AG87NM-DB-3N
4G cell (E4V) – PKRNVWE362
3G Cell – RI7HE910
4G cell (4G1..4G5) – N7NMC7355
4G cell (4GP) – N7NMC7354B
4G cell (4Gy) – N7NMC7455
4G cell (4Gc) – RI7LE910CXWWX
4G cell (4Gb) – N7NEN75S
4G cell (4Ga) – N7NEN75
4G/3G/2G cell (4Gd) - XMR201903EG25G
NX915 – E5MDS-NX915
LN100 – E5MDS-LN100
LN200 – E5MDS-LN200
LN400 – E5MDS-LN400
LN700 – E5MDS-LN700
LN900 – E5MDS-LN900
LN900 – E5MDS-LN900-1
LW700 – E5MDS-LW700
IC - Industry
Standard WiFi – 3195A-ZCN722MV1
4G cell (E4V) - 3229B-E362
3G Cell – 5131A-HE910
4G cell (4G1..4G5) - 2417C-MC7355
4G cell (4Gy) - 2417C-MC7455
4G cell (4Gc) – 5131A-LE910C4-WWX
4G cell (4Gb) - 2417C-EM75S
4G cell (4Ga) - 2417C-EM75
4G/3G/2G cell (4Gd) - 10224A-201903EG25G
NX915 – 101D-NX915
LN100 – 101D-LN100
LN200 – 101D-LN200
LN400 – 101D-LN400
LN900 – 101D-LN900
Anatel
4G/3G/2G cell (4Gd) - Certification Number 00116066
FCC ID
E5MDS-LN100
IC
101D-LN100
NOTE Channel Bandwidth and step size availability based on hardware model and license restrictions
FCC ID
E5MDS-LN200
IC
101D-LN200
NOTE Channel Bandwidth and step size availability based on hardware model and license restrictions
FCC ID
E5MDS-LN400
IC
101D-LN400
NOTE Channel Bandwidth and step size availability based on hardware model and license restrictions
FCC ID
E5MDS-LN700
NOTE Channel Bandwidth and step size availability based on hardware model and license restrictions
FCC ID
E5MDS-LN900 and E5MDS-LN900-1
IC
101D-LN900
NOTE Channel Bandwidth and step size availability based on hardware model and license restrictions
FCC ID
E5MDS-LW700
[edit]
% commit
Commit complete.
[ok][2012-06-19 00:57:01]
NOTE Use caution when deleting a list element. In the CLI, deleting a single entry with bracket
notation will delete the entire list. Do not use brackets in the command when deleting an
element in the list.
6.6 Tab-Completion
Tab-completion is a powerful feature that presents CLI users with assistance while typing. Depending on
the text that was already typed, tab-completion will display different possible completions.
When the tab key is pressed and no text has been typed, the CLI shows all of the possible commands that
can be typed, as shown below. In this example, the CLI is in configuration mode and the following
commands are relevant to configuration mode only.
%
Possible completions:
annotate - Add a comment to a statement
commit - Commit current set of changes
compare - Show configuration differences
copy - Copy a dynamic element
delete - Delete a data element
edit - Edit a sub-element
exit - Exit from this level
help - Provide help information
insert - Insert a parameter
move - Move a parameter
quit - Exit from this level
rename - Rename an identifier
request - Make system-level requests
resolved - Conflicts have been resolved
revert - Copy configuration from running
rollback - Roll back database to last committed version
run - Run an operational-mode command
set - Set a parameter
show - Show a parameter
When the tab key is pressed after a typed command, then the CLI will show the user all the possible
options that are pertinent to that command. In the example below the tab key was pressed after the word
“set“. The list of possible completions is shown to user.
% set
Possible completions:
SNMP-Community-MIB
SNMP-Target-MIB
SNMP-User-Based-SM-MIB
SNMP-View-Based-ACM-MIB
file-servers -
interfaces - Interface parameters.
logging -
pki - Public Key and Certificate Options
routing -
services - Services which are configurable on this system
system - System group configuration
When the tab is key is pressed after the name of a data node that the user is trying to configure, then the
CLI will show the user the format of the data that is acceptable for that data node. In the example below,
the tab key was pressed after the word “search”. In this case, the node “search” can take a list of values
that are IP addresses or strings, each with 0-255 characters.
% set system dns search
Possible completions:
<IP address> <string, min: 1 chars, max: 253 chars>
In the example above only lines containing “date” are shown. Similarly lines not containing a regular
expression can be included.
> show interface-state | except counters
interfaces supported-interfaces bridge true
interfaces interface eth0
if-index 2
status mac-address 1e:ed:19:27:1a:b3
status mtu 1500
status link up
status ipv4 address [ 192.168.1.10/24 ]
It is also possible to display the output starting at the first match of a regular expression, using the find
target. For example:
> show interface-state | find tx
status counters tx_aborted_errors 0
status counters tx_bytes 238574
status counters tx_carrier_errors 0
status counters tx_compressed 0
status counters tx_dropped 0
status counters tx_errors 0
status counters tx_fifo_errors 0
status counters tx_heartbeat_errors 0
status counters tx_packets 1731
status counters tx_window_errors 0
Output can also be ended when a line matches a regular expression. This is done with the until target. For
example:
> show interface-state | find tx | until compressed
status counters tx_aborted_errors 0
status counters tx_bytes 250246
status counters tx_carrier_errors 0
status counters tx_compressed 0
For example, to only display uid and gid you can do the following:
> show configuration | match "(uid) | (gid)"
uid 1000;
gid 100;
uid 1000;
gid 100;
uid 1000;
gid 100;
uid 1000;
gid 100;
506 MDS Orbit MCR/ECR Technical Manual MDS 05-6632A01, Rev. M
6.12 Display Line Numbers
The linnum target causes a line number to be displayed at the beginning of each line in the display.
> show configuration | match "(uid) | (gid)" | linnum
1: uid 1019;
2: gid 1013;
3: uid 1019;
4: gid 1013;
5: uid 1019;
6: gid 1013;
7: uid 1019;
8: gid 1013;
show run
ssh set
telnet show
top status
traceroute tag
up top
up
validate
show [path]
- Display CLI properties..
ssh
- Open a secure shell on another host
telnet
- Open a telnet session
Once the unit has been configured, the hash (sha256 or sha385) of system configuration file can be
obtained via CLI (locally or remotely) and loaded into the Integrity Measurement Authority (IMA)
database.
Typically, integrity measurement and attestation happens automatically as part of IPsec VPN “data”
connection establishment using EAP-TTLS method (and EAP-TNC authentication within it) as instructed
by the VPN-gateway. However, Orbit also supports an out-of-band IMA connection, where the unit
connects to a separate IMA server not to pass data but just to perform integrity measurement and
attestation. The IMA server, in such a setup, can then publish the unit’s “health” information to the VPN
server that is terminating the actual data connections. This allows VPN server to enforce permit/deny
policy for incoming VPN data connections from the unit.
7.2 Configuring
The out of band IMA configuration is exactly similar to VPN configuration described in VPN section
except that the IPsec connection is designated specifically as out-of-band IMA connection and local and
remote ip subnet are all set 0.0.0.0/0 as shown below:
% set services vpn ipsec connection IMA-CONN-1 is-out-of-band-ima true
% set services vpn ipsec connection IMA-CONN-1 local-ip-subnet 0.0.0.0/0
% set services vpn ipsec connection IMA-CONN-1 remote-ip-subnet 0.0.0.0/0
% set services vpn ipsec connection IMA-CONN-1 periodic-retry-interval 60
The “periodic-retry-interval” applies only to the IPsec connection designated as an “out-of-band” IMA
connection. The Orbit attempts attestation every “periodic-retry-interval” if the previous attempt to
connect with IMA server was unsuccessful.
In case of an out of band IMA server setup, the Orbit needs to be configured with an IMA IPsec
connection and a VPN-GWY IPsec connection. An example follows:
connection IMA-CONN-1 {
ike-peer IMA-SERVER;
ipsec-policy IPSEC-POLICY-IMA;
local-ip-subnet 0.0.0.0/0;
remote-ip-subnet 0.0.0.0/0;
is-out-of-band-ima true;
IMA-CONN-1 is used for attestation and VPN-GWY-CONN-1 is used for VPN data connection.
If more than one IPsec connection is configured on the unit, the unit initiates connections in round-robin
fashion. For example, Orbit will follow the following sequence:
• Attempt connection to IMA-SERVER
• Attempt connection to VPN-SERVER (irrespective of IMA-SERVER connection outcome)
• Attempt connection to IMA-SERVER after failure-retry-interval if previous attempt to connect
with it failed.
• Attempt connection to IMA-SERVER after periodic-retry-interval if previous attempt to connect
with it succeeded.
• Attempt connection to VPN-SERVER after failure-retry-interval if it failed previously or got
disconnected due to dead peer detection.
• and so on…
7.2.1 Obtaining Configuration File Hash
The following example shows the use of a request to get the system configuration hash:
admin@(none) 22:09:59> request services vpn ipsec get-config-hash hash-algo sha384 hash
e60429aa127cb2f23e10ae00b6c1553fa9d1f598b2a206926ad0dcdf9a758622eec77ad559b32f
85ceea9013a961041f
[ok][2013-01-18 22:10:15]
7.3 Monitoring
The current attestation status of the IMA connection is displayed using same command as used to display
regular VPN data connection status. The example on the following page shows that the IMA connection
succeeded but the IMA Evaluation was “non-compliant” and IMA recommendation was “Quarantined”.
This will happen is the system configuration file hash loaded in IMA does not match the actual hash of
the current system configuration, indicating that system configuration was changed since last time the
hash was loaded in the IMA database.
> show services vpn
services vpn ipsec ipsec-status connections connection IMA-CONN-1
state disconnected
failure-reason none
last-timestamp 2013-01-18T21:24:26+00:00
ima-evaluation “non-compliant major”
ima-recommendation Quarantined
The IMA status can then be checked again periodically for new attestation result:
> show services vpn
services vpn ipsec ipsec-status connections connection IMA
state disconnected
failure-reason none
last-timestamp 2013-01-18T22:19:02+00:00
ima-evaluation compliant
ima-recommendation “Access Allowed”
A valid CEE JSON Event Record used with a “legacy” Syslog transport:
<0>Dec 20 12:42:20 syslog-relay process[35]: @cee:
{"crit":123,"id":"abc","appname":"application","pname":"auth","pid":123,"host":"system.exam
ple.com","pri":10,"time":"2011-12-20T12:38:05.123456-
05:00","action":"login","domain":"app","object":"account","service":"web","status":"success"}
The following example shows a series of events that may be generated by a host requesting an IP for its
eth0 interface from a DHCP server (Syslog header left off for brevity, and formatted for clarity):
DHCP Request sent to the server:
@cee: {
"host":"stout",
"pname":" my_appname ",
"time":"2012-08-22T11:20:10.559227-04:00",
"action":"request",
"domain":"net",
"object":"interface",
"service":"dhcp_client",
"status":"ongoing",
"event":"dhcp_client",
"interface_name":"eth0",
"profile":"http://gemds.com/cee_profile/1.0beta1.xsd"
}
The body of syslog messages of type “alert” is specified using RFC 5425 type key/value pairs. A few
additional fields are also present.
8.3.2 syslog PRIVAL
The “PRIVAL” field of the syslog “HEADER” shall to be set to 113 for alerts and between 104 and 111
for editable events.
8.3.3 syslog APP-NAME
The “APP-NAME” field of the “HEADER” specified in the syslog RFC shall be set to “csmgr”.
RFC5424 states: “The APP-NAME field SHOULD identify the device or application that originated the
message.” The semantics of the field have changed from the application that originated the event, to the
application who should receive the event.
8.3.4 syslog MSG
For events of type audit, the msg is vendor specific, whereas events of type alert must be in a specified
format which contains a GUID, level and message. Using the CEE approach all of the requested
information would be present in all messages.
Example of message using format
Jun 7 11:10:22 ccc99 csmgr[27417]: Source=’ ABCDEF0123456789AB00000000000099’
Level=’5’ Message=’Date/Time Changed by User’
8.4 Configuring
The following shows how to configure the unit with a server to which events will be sent:
% set logging syslog server my_syslog_server ip 192.168.1.1 port 1999 protocol tls version
RFC5424 tls-options tls-ca-certificate my_ca_cert tls-client-certificate my_client_cert tls-
client-key my_client_key
8.5 Monitoring
Ensure the CLI is in operational mode. Follow the example below to view the state and statistics:
% show logging event-rules cell_connected
description "cell connection established";
local true;
priority notice;
syslog-facility user;
syslog true;
snmp-notification true;
netconf-notification true;
Usage:
To verify and sign a package:
pkgsigner -v verifycert -k privkey -P password -p pubcert -f infile -o outfile
Users can verify that a firmware package file came from GE MDS by using the CST. The following
example shows how to verify a signed firmware package file came from GE MDS by using the firmware
file ge_signed_package.mpk and by using the GE MDS provided public certificate ge_pubcert.pem.
./pkgsigner -l -v ge_pubcert.pem -f ge_signed_package.mpk
Processing file: 'ge_signed_package.mpk'
Package ID: 20121101
NumImages: 4
NumSignatures: 1
Image #0 : Bootloader version 2012.07-g644d99
Image #1 : Kernel version 3.0.15-mds-gc00
Image #2 : RootFS version 0.0.4
Image #3 : CompFS version 0.0.0
Package version: 0.0.4
Where:
• ge_signed_package.mpk is the firmware package provided by GE MDS that was signed by GE
MDS. Firmware packages will typically be downloaded by users from GE MDS websites.
• ge_pubcert.pem is the public certificate provided by GE MDS that is used to verify that the signed
packaged is authentic. The GE MDS public certificate will typically be downloaded by users
from the GE MDS website.
• user_key.pem is a private key provided by the user.
• mypass is the password used to decrypt user_key.pem, assuming the key is password protected. If
the key is not password protected, then the –P option may be omitted.
• user_pubcert.pem is the public certificate corresponding to user_key.pem.
• user_signed_package.mpk the file that will be created that contains the GE MDS signature and the
newly appended user signature.
When verifying a user-signed package, both the GE MDS public certificate and the user’s public
certificate must be provided to the CST:
./pkgsigner -l -v ge_pubcert.pem -v user_pubcert.pem -f user_signed_package.mpk
If MEID (Mobile Equipment Identifier) is needed, this is equal to the IMEI value minus the last digit.
NOTE Do not run the command above unless a provisioned SIM card is installed in the unit. If an un-
provisioned card is used, the cell-status may return an error code beginning with 0x instead of
the proper IMEI value.
Channels/Hop Set
A 80 80 27 18 15 13
B 0 0 27 20 15 12
C 0 0 26 20 16 12
D 0 0 0 20 16 13
E 0 0 0 0 16 13
F 0 0 0 0 0 13
Customer
Cellular Network/
network Internet
JUNOS SRX
Orbit
IPsec Tunnel
Local LAN carrying traffic Remote LAN
192.168.1.0/24 between local 192.168.2.0/24
and remote
LANs
The WAN IP address of SRX240 is 172.18.175.40 and Orbit cell ip address is 172.18.175.138.
12.1.1 Orbit
12.1.1.1 Configuration
# Bridge/LAN interface configuration
set interfaces interface Bridge type bridge
set interfaces interface Bridge ipv4 address 192.168.1.1 prefix-length 24
set interfaces interface Bridge filter input IN_TRUSTED
set interfaces interface Bridge filter output OUT_TRUSTED
set interfaces interface Bridge bridge-settings members port ETH1
set interfaces interface Bridge bridge-settings members port ETH2
# IKE/IPsec configuration
set services vpn enabled true
set services vpn ike policy SRX240-IKE-POLICY auth-method pre-shared-key
set services vpn ike policy SRX240-IKE-POLICY pre-shared-key test123
set services vpn ike policy SRX240-IKE-POLICY ciphersuite CS1 encryption-algo aes128-cbc
set services vpn ike policy SRX240-IKE-POLICY ciphersuite CS1 mac-algo sha256-hmac
set services vpn ike policy SRX240-IKE-POLICY ciphersuite CS1 dh-group dh14
set services vpn ike peer SRX240-IKE-PEER ike-policy SRX240-IKE-POLICY
set services vpn ike peer SRX240-IKE-PEER local-identity default
set services vpn ike peer SRX240-IKE-PEER peer-endpoint address 172.18.175.40
set services vpn ike peer SRX240-IKE-PEER peer-identity default
set services vpn ike peer SRX240-IKE-PEER role initiator
set services vpn ipsec policy SRX240-IPSEC-POLICY ciphersuite CS1 encryption-algo aes128-cbc
set services vpn ipsec policy SRX240-IPSEC-POLICY ciphersuite CS1 mac-algo sha256-hmac
set services vpn ipsec policy SRX240-IPSEC-POLICY ciphersuite CS1 dh-group dh14
set services vpn ipsec connection SRX240 ike-peer SRX240-IKE-PEER
set services vpn ipsec connection SRX240 ipsec-policy SRX240-IPSEC-POLICY
set services vpn ipsec connection SRX240 local-ip-subnet 192.168.1.0/24
set services vpn ipsec connection SRX240 remote-ip-subnets [ 192.168.2.0/24 ]
set services vpn ipsec connection SRX240 filter input IN_TRUSTED
set services vpn ipsec connection SRX240 filter output OUT_TRUSTED
# Firewall configuration
set services firewall enabled true
set services firewall address-set CELL-IP
set services firewall filter IN_TRUSTED rule 10 match protocol all
set services firewall filter IN_TRUSTED rule 10 actions
set services firewall filter IN_TRUSTED rule 10 actions action accept
set services firewall filter IN_UNTRUSTED rule 1 match protocol icmp
set services firewall filter IN_UNTRUSTED rule 1 actions
set services firewall filter IN_UNTRUSTED rule 1 actions action accept
set services firewall filter IN_UNTRUSTED rule 2 match protocol udp
set services firewall filter IN_UNTRUSTED rule 2 match src-port
set services firewall filter IN_UNTRUSTED rule 2 match src-port services [ dns ]
set services firewall filter IN_UNTRUSTED rule 3 match protocol tcp
set services firewall filter IN_UNTRUSTED rule 3 match dst-port
set services firewall filter IN_UNTRUSTED rule 3 match dst-port services [ https netconf ssh ]
12.1.1.2 Status
> show services vpn
services vpn ike security-associations security-association 1
name SRX240
state ESTABLISHED
local-host 172.18.175.138
local-id 172.18.175.138
remote-host 172.18.175.40
remote-id 172.18.175.40
initiator true
initiator-spi 6fae9c7ca839c195
responder-spi 63568d4ca1c3d071
ciphersuite AES_CBC-128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
established-time 1
rekey-time 9899
reauth-time 0
services vpn ipsec security-associations security-association 1
name SRX240
534 MDS Orbit MCR/ECR Technical Manual MDS 05-6632A01, Rev. M
state INSTALLED
mode TUNNEL
udp-encap false
in-spi c4bfce67
out-spi ef7c6bd3
ciphersuite AES_CBC-128/HMAC_SHA2_256_128
in-bytes 0
in-packets 0
in-last-use 1619592
out-bytes 0
out-packets 0
out-last-use 0
rekey-time 2704
life-time 3599
install-time 1
local-ts 192.168.1.0/24
remote-ts 192.168.2.0/24
12.1.2 JUNOS
12.1.2.1 Configuration
The configuration below assumes that interface ge-0/0/0 is the external WAN interface and vlan.0 is the
VLAN interface that includes all LAN ports.
# IKE/IPsec configuration
set security ike proposal IKE-PROP-PSK authentication-method pre-shared-keys
set security ike proposal IKE-PROP-PSK dh-group group14
set security ike proposal IKE-PROP-PSK authentication-algorithm sha-256
set security ike proposal IKE-PROP-PSK encryption-algorithm aes-128-cbc
set security ike policy IKE-POLICY-PSK proposals IKE-PROP-PSK
set security ike policy IKE-POLICY-PSK pre-shared-key ascii-text test123
set security ike gateway ORBIT138 ike-policy IKE-POLICY-PSK
set security ike gateway ORBIT138 address 172.18.175.138
set security ike gateway ORBIT138 local-identity inet 172.18.175.40
set security ike gateway ORBIT138 external-interface ge-0/0/0
set security ike gateway ORBIT138 version v2-only
set security ipsec proposal IPSEC-PROP protocol esp
set security ipsec proposal IPSEC-PROP authentication-algorithm hmac-sha-256-128
set security ipsec proposal IPSEC-PROP encryption-algorithm aes-128-cbc
set security ipsec policy IPSEC-POLICY perfect-forward-secrecy keys group14
set security ipsec policy IPSEC-POLICY proposals IPSEC-PROP
MDS 05-6632A01, Rev. M MDS Orbit MCR/ECR Technical Manual 535
set security ipsec vpn ORBIT138 ike gateway ORBIT138
set security ipsec vpn ORBIT138 ike ipsec-policy
# Security policies
set security policies from-zone TRUST to-zone UNTRUST policy ORBIT138-NET-1-SA match source-address
LOCAL-NET-1
set security policies from-zone TRUST to-zone UNTRUST policy ORBIT138-NET-1-SA match destination-
address ORBIT138-NET-1
set security policies from-zone TRUST to-zone UNTRUST policy ORBIT138-NET-1-SA match application any
set security policies from-zone TRUST to-zone UNTRUST policy ORBIT138-NET-1-SA then permit tunnel
ipsec-vpn ORBIT138
set security policies from-zone UNTRUST to-zone TRUST policy ORBIT138-NET-1-SA match source-address
ORBIT138-NET-1
set security policies from-zone UNTRUST to-zone TRUST policy ORBIT138-NET-1-SA match destination-
address LOCAL-NET-1
set security policies from-zone UNTRUST to-zone TRUST policy ORBIT138-NET-1-SA match application any
set security policies from-zone UNTRUST to-zone TRUST policy ORBIT138-NET-1-SA then permit tunnel
ipsec-vpn ORBIT138
12.1.2.2 Status
> show security ike security-associations
Index State Initiator cookie Responder cookie Mode Remote Address
1948863 UP 95c139a87c9cae6f 71d0c3a14c8d5663 IKEv2 172.18.175.138
Cisco ISR/ASR
Orbit
IPsec Tunnel
Local LAN carrying traffic Remote LAN
192.168.1.0/24 between local 192.168.2.0/24
and remote
LANs
The WAN IP address of Cisco ISR/ASR is 172.18.175.45 and Orbit cell ip address is 192.168.3.24.
12.2.1 Orbit
12.2.1.1 Configuration
# Bridge/LAN interface configuration
set interfaces interface Bridge type bridge
set interfaces interface Bridge ipv4 address 192.168.1.1 prefix-length 24
set interfaces interface Bridge filter input IN_TRUSTED
set interfaces interface Bridge filter output OUT_TRUSTED
set interfaces interface Bridge bridge-settings members port ETH1
set interfaces interface Bridge bridge-settings members port ETH2
# IKE/IPsec configuration
set services vpn enabled true
set services vpn ike policy IKE-POLICY auth-method pre-shared-key
set services vpn ike policy IKE-POLICY pre-shared-key test123
set services vpn ike policy IKE-POLICY ciphersuite CS1 encryption-algo aes128-cbc
set services vpn ike policy IKE-POLICY ciphersuite CS1 mac-algo sha256-hmac
set services vpn ike policy IKE-POLICY ciphersuite CS1 dh-group dh14
set services vpn ike peer IKE-PEER ike-policy IKE-POLICY
set services vpn ike peer IKE-PEER local-identity default
set services vpn ike peer IKE-PEER peer-endpoint address 172.18.175.45
# Firewall configuration
set services firewall enabled true
set services firewall address-set CELL-IP
set services firewall filter IN_TRUSTED rule 10 match protocol all
set services firewall filter IN_TRUSTED rule 10 actions
set services firewall filter IN_TRUSTED rule 10 actions action accept
set services firewall filter IN_UNTRUSTED rule 1 match protocol icmp
set services firewall filter IN_UNTRUSTED rule 1 actions
set services firewall filter IN_UNTRUSTED rule 1 actions action accept
set services firewall filter IN_UNTRUSTED rule 2 match protocol udp
set services firewall filter IN_UNTRUSTED rule 2 match src-port
set services firewall filter IN_UNTRUSTED rule 2 match src-port services [ dns ]
set services firewall filter IN_UNTRUSTED rule 3 match protocol tcp
set services firewall filter IN_UNTRUSTED rule 3 match dst-port
set services firewall filter IN_UNTRUSTED rule 3 match dst-port services [ https netconf ssh ]
set services firewall filter IN_UNTRUSTED rule 10 match protocol udp
set services firewall filter IN_UNTRUSTED rule 10 match dst-port
set services firewall filter IN_UNTRUSTED rule 10 match dst-port services [ ike ntp ]
set services firewall filter IN_UNTRUSTED rule 10 actions
set services firewall filter IN_UNTRUSTED rule 10 actions action accept
set services firewall filter IN_UNTRUSTED rule 11 match protocol esp
set services firewall filter IN_UNTRUSTED rule 11 actions
set services firewall filter IN_UNTRUSTED rule 11 actions action accept
set services firewall filter IN_UNTRUSTED rule 12 match protocol all
set services firewall filter IN_UNTRUSTED rule 12 actions
set services firewall filter IN_UNTRUSTED rule 12 actions action drop
set services firewall filter OUT_TRUSTED rule 10 match protocol all
set services firewall filter OUT_TRUSTED rule 10 actions
set services firewall filter OUT_TRUSTED rule 10 actions action accept
set services firewall filter OUT_UNTRUSTED rule 1 match src-address
12.2.1.2 Status
> show services vpn
services vpn ike security-associations security-association 194
name CISCO
state ESTABLISHED
local-host 192.168.3.24
local-id 192.168.3.24
remote-host 172.18.175.45
remote-id 172.18.175.45
initiator true
initiator-spi 19ff75241329afca
responder-spi db8b71ddb5602c7a
ciphersuite AES_CBC-128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
established-time 245
rekey-time 9569
reauth-time 1818307942
services vpn ipsec security-associations security-association 193
name CISCO_t1
state INSTALLED
mode TUNNEL
udp-encap false
in-spi c3eaf292
out-spi 6029b7da
ciphersuite AES_CBC-128/HMAC_SHA2_256_128
in-bytes 0
in-packets 0
in-last-use 7
out-bytes 0
out-packets 0
out-last-use 27732648
rekey-time 2500
life-time 3355
install-time 245
local-ts 172.16.23.24/32
remote-ts 192.168.2.0/24
The configuration below assumes that interface GigabitEthernet0/0 is the external WAN interface and the
GigabitEthernet0/1 is the local LAN interface.
interface GigabitEthernet0/1
ip address 192.168.2.1 255.255.255.0
interface GigabitEthernet0/0
mtu 1428
ip address 172.18.175.45 255.255.255.0
crypto map CMAP-24
12.2.2.2 Status
#show crypto ikev2 sa remote 192.168.3.24
interface: GigabitEthernet0/0
Crypto map tag: CMAP-24, local addr 172.18.175.45
inbound ah sas:
outbound ah sas:
LAN
10.0.1.0/24
Cisco IOS
Cellular network
In example below, we disable default route over Cell and instead setup BGP dynamic routing that
advertises the local LAN network to the IOS router and received default route over the GRE tunnel form
IOS router.
12.3.1 Orbit
12.3.1.1 Configuration
# NTP configuration
set system ntp use-ntp true
set system ntp ntp-server 172.18.175.62
# IKE/IPsec Configuration
set services vpn enabled true
set services vpn ike policy DMVPN-CERT version ikev2
set services vpn ike policy DMVPN-CERT auth-method pub-key
set services vpn ike policy DMVPN-CERT pki cert-type rsa
# Client certificate is installed as ID1
set services vpn ike policy DMVPN-CERT pki cert-id ID1
# Client private key pair is generated as ID1
set services vpn ike policy DMVPN-CERT pki key-id ID1
# Root CA certificate is installed as CA1
set services vpn ike policy DMVPN-CERT pki ca-cert-id CA1
# Sub CA certificates are installed as SUBCA1 and SUBCA2.
set services vpn ike policy DMVPN-CERT pki sub-ca-cert-ids [SUBCA1 SUBCA2 ]
set services vpn ike policy DMVPN-CERT ciphersuite CS1 encryption-algo aes256-cbc
set services vpn ike policy DMVPN-CERT ciphersuite CS1 mac-algo sha1-hmac
set services vpn ike policy DMVPN-CERT ciphersuite CS1 dh-group dh5
set services vpn ike peer DMVPN ike-policy DMVPN-CERT
set services vpn ike peer DMVPN peer-endpoint any
set services vpn ike peer DMVPN role responder
set services vpn ipsec policy DMVPN ciphersuite CS1 encryption-algo aes256-cbc
set services vpn ipsec policy DMVPN ciphersuite CS1 mac-algo sha1-hmac
set services vpn ipsec connection DMVPN ike-peer DMVPN
set services vpn ipsec connection DMVPN ipsec-policy DMVPN
set services vpn ipsec connection DMVPN host-to-host
set services vpn ipsec connection DMVPN filter input IN_TRUSTED
set services vpn ipsec connection DMVPN filter output OUT_TRUSTED
# Firewall configuration
set services firewall enabled true
set services firewall address-set CELL-IP
set services firewall filter IN_TRUSTED rule 10 match protocol all
set services firewall filter IN_TRUSTED rule 10 actions
set services firewall filter IN_TRUSTED rule 10 actions action accept
set services firewall filter IN_UNTRUSTED rule 1 match protocol icmp
set services firewall filter IN_UNTRUSTED rule 1 actions
set services firewall filter IN_UNTRUSTED rule 1 actions action accept
set services firewall filter IN_UNTRUSTED rule 2 match protocol udp
set services firewall filter IN_UNTRUSTED rule 2 match src-port
set services firewall filter IN_UNTRUSTED rule 2 match src-port services [ dns ]
set services firewall filter IN_UNTRUSTED rule 3 match protocol tcp
set services firewall filter IN_UNTRUSTED rule 3 match dst-port
set services firewall filter IN_UNTRUSTED rule 3 match dst-port services [ https netconf ssh ]
set services firewall filter IN_UNTRUSTED rule 10 match protocol udp
set services firewall filter IN_UNTRUSTED rule 10 match dst-port
set services firewall filter IN_UNTRUSTED rule 10 match dst-port services [ ike ntp ]
set services firewall filter IN_UNTRUSTED rule 10 actions
set services firewall filter IN_UNTRUSTED rule 10 actions action accept
set services firewall filter IN_UNTRUSTED rule 11 match protocol esp
set services firewall filter IN_UNTRUSTED rule 11 actions
set services firewall filter IN_UNTRUSTED rule 11 actions action accept
set services firewall filter IN_UNTRUSTED rule 12 match protocol all
set services firewall filter IN_UNTRUSTED rule 12 actions
set services firewall filter IN_UNTRUSTED rule 12 actions action drop
set services firewall filter OUT_TRUSTED rule 10 match protocol all
set services firewall filter OUT_TRUSTED rule 10 actions
set services firewall filter OUT_TRUSTED rule 10 actions action accept
set services firewall filter OUT_UNTRUSTED rule 1 match src-address
set services firewall filter OUT_UNTRUSTED rule 1 match src-address address-set CELL-IP
set services firewall filter OUT_UNTRUSTED rule 1 match src-address add-interface-address true
set services firewall filter OUT_UNTRUSTED rule 1 actions
set services firewall filter OUT_UNTRUSTED rule 1 actions action accept
set services firewall filter OUT_UNTRUSTED rule 2 match protocol all
set services firewall filter OUT_UNTRUSTED rule 2 actions
set services firewall filter OUT_UNTRUSTED rule 2 actions action drop
# NHRP status
> show services nhrp
# Routing status
# The highlighted default route is received from the IOS router via BGP.
> show routing-state routes
OUTGOING
DEST PREFIX NEXT HOP INTERFACE SOURCE
--------------------------------------------------
0.0.0.0/0 172.16.0.1 GRE1 dynamic
10.0.3.0/24 - Bridge kernel
172.16.0.0/24 - GRE1 kernel
172.18.175.0/24 - Cell static
# NTP configuration
ntp server 172.18.175.62
!
# Certificate configuration
crypto pki trustpoint DMVPN-3-TIER-SUBCA-2
enrollment terminal pem
subject-name C=US, ST=NY, L=Rochester, O=GE MDS, OU=ENGG, CN=DMVPN-HUB.com
revocation-check none
rsakeypair DMVPN-3-TIER-SUBCA-2 2048
# IKE/IPsec configuration
crypto ikev2 proposal DMVPN_IKEV2_PROPOSAL
encryption aes-cbc-256
integrity sha1
group 5
!
crypto ikev2 policy DMVPN_IKEV2_POLICY
match fvrf any
proposal DMVPN_IKEV2_PROPOSAL
!
crypto ikev2 profile DMVPN_IKEV2_PROFILE
match certificate ORBIT_CERT_MAP
identity local dn
authentication remote rsa-sig
authentication local rsa-sig
pki trustpoint DMVPN-3-TIER-SUBCA-2
dpd 10 3 periodic
!
crypto ipsec transform-set DMVPN_TRANSFORM esp-aes 256 esp-sha-hmac
mode transport
!
crypto ipsec profile DMVPN
set transform-set DMVPN_TRANSFORM
set ikev2-profile DMVPN_IKEV2_PROFILE
!
12.3.2.2 Status
#IKE/IPsec status
DMVPN-HUB#show crypto ikev2 sa
IPv4 Crypto IKEv2 SA
interface: Tunnel0
Crypto map tag: Tunnel0-head-0, local addr 172.18.175.45
inbound ah sas:
outbound ah sas:
# NHRP status
DMVPN-HUB#show dmvpn
Legend: Attrb --> S - Static, D - Dynamic, I - Incomplete
N - NATed, L - Local, X - No Socket
# Ent --> Number of NHRP entries with same NBMA peer
NHS Status: E --> Expecting Replies, R --> Responding, W --> Waiting
UpDn Time --> Up or Down Time for a Tunnel
==========================================================================
# Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb
----- --------------- --------------- ----- -------- -----
1 172.18.175.138 172.16.0.3 UP 16:55:28 D
# Routing status
# The highlighted route is the LAN network route received from Orbit via BGP.
DMVPN-HUB#show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
NOTE The Juniper JUNOS based devices do not support IPsec transport mode for data traffic.
Therefore, to protect GRE traffic one needs to setup IPsec tunnel instead of IPsec transport
mode connection. This leads to double tunneling- GRE tunnel within IPsec tunnel. Also, GRE
tunneling over IPsec tunnel is only supported for route-based tunnel setup.
Remote LAN#1
Local LAN#1 192.168.3.0/24
192.168.1.0/24
Customer
Cellular
Network/
network
Internet
JUNOS SRX
Orbit
# Loopback interface used as source address for GRE tunnels towards JUNOS
# This is required for GRE traffic to ride on IPsec tunnel
set interfaces interface LO-SRX240 type loopback
set interfaces interface LO-SRX240 ipv4 address 172.16.1.2 prefix-length 32
# IKE/IPsec configuration
set services vpn enabled true
set services vpn ike policy SRX240-IKE-POLICY auth-method pre-shared-key
set services vpn ike policy SRX240-IKE-POLICY pre-shared-key test123
set services vpn ike policy SRX240-IKE-POLICY ciphersuite CS1 encryption-algo aes128-cbc
set services vpn ike policy SRX240-IKE-POLICY ciphersuite CS1 mac-algo sha256-hmac
set services vpn ike policy SRX240-IKE-POLICY ciphersuite CS1 dh-group dh14
set services vpn ike peer SRX240-IKE-PEER ike-policy SRX240-IKE-POLICY
set services vpn ike peer SRX240-IKE-PEER local-identity default
set services vpn ike peer SRX240-IKE-PEER peer-endpoint address 172.18.175.40
set services vpn ike peer SRX240-IKE-PEER peer-identity default
# Routing configuration
set routing static-routes ipv4 route 1 dest-prefix 192.168.3.0/24
set routing static-routes ipv4 route 1 outgoing-interface GRE-SRX240
set routing static-routes ipv4 route 1 dest-prefix 192.168.4.0/24
set routing static-routes ipv4 route 1 outgoing-interface GRE-SRX240
# Firewall configuration
set services firewall enabled true
set services firewall address-set CELL-IP
set services firewall filter IN_TRUSTED rule 10 match protocol all
set services firewall filter IN_TRUSTED rule 10 actions
set services firewall filter IN_TRUSTED rule 10 actions action accept
set services firewall filter IN_UNTRUSTED rule 1 match protocol icmp
set services firewall filter IN_UNTRUSTED rule 1 actions
set services firewall filter IN_UNTRUSTED rule 1 actions action accept
set services firewall filter IN_UNTRUSTED rule 2 match protocol udp
set services firewall filter IN_UNTRUSTED rule 2 match src-port
set services firewall filter IN_UNTRUSTED rule 2 match src-port services [ dns ]
set services firewall filter IN_UNTRUSTED rule 3 match protocol tcp
12.4.1.2 Status
#IKE/IPsec status
> show services vpn
services vpn ike security-associations security-association 54
name SRX240_SA
state ESTABLISHED
local-host 172.18.175.135
local-id 172.18.175.135
remote-host 172.18.175.40
remote-id 172.18.175.40
initiator true
initiator-spi 78c786f79094ac55
responder-spi c5aa90f242499e8d
ciphersuite AES_CBC-128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
established-time 694
rekey-time 9143
556 MDS Orbit MCR/ECR Technical Manual MDS 05-6632A01, Rev. M
reauth-time 1852140901
services vpn ipsec security-associations security-association 196
name SRX240_SA
state INSTALLED
mode TUNNEL
udp-encap false
in-spi cce4cde5
out-spi 4c84f08c
ciphersuite AES_CBC-128/HMAC_SHA2_256_128/MODP_2048
in-bytes 0
in-packets 0
in-last-use 1621200
out-bytes 0
out-packets 0
out-last-use 0
rekey-time 708
life-time 1590
install-time 2010
local-ts 172.16.1.2/32
remote-ts 172.16.1.1/32
# Routing status
> show routing-state routes
OUTGOING
DEST PREFIX NEXT HOP INTERFACE SOURCE
-------------------------------------------------------
0.0.0.0/0 - Cell kernel
10.1.1.0/30 - GRE-SRX240 kernel
192.168.1.0/24 - Bridge kernel
192.168.2.0/24 - Bridge2 kernel
172.16.1.1/32 172.18.175.40 Cell static
12.4.2 JUNOS
12.4.2.1 Configuration
# WAN external interface
# NOTE: Ensure that MTU value matches that configured on Cell interface on Orbit (default=1428).
set interfaces ge-0/0/0 unit 0 family inet mtu 1428
set interfaces ge-0/0/0 unit 0 family inet address 172.18.175.40/26
# Loopback interface used as source address for GRE tunnels towards Orbits
set interfaces lo0 unit 0 family inet address 172.16.1.1/32
# Common routing
set routing-options static route 0.0.0.0/0 next-hop 172.18.175.62
# Common IKE
set security ike proposal IKE-PROP-PSK authentication-method pre-shared-keys
set security ike proposal IKE-PROP-PSK dh-group group14
set security ike proposal IKE-PROP-PSK authentication-algorithm sha-256
set security ike proposal IKE-PROP-PSK encryption-algorithm aes-128-cbc
set security ike policy IKE-POLICY-PSK proposals IKE-PROP-PSK
set security ike policy IKE-POLICY-PSK pre-shared-key ascii-text test123
# Common IPsec
set security ipsec proposal IPSEC-PROP protocol esp
set security ipsec proposal IPSEC-PROP authentication-algorithm hmac-sha-256-128
set security ipsec proposal IPSEC-PROP encryption-algorithm aes-128-cbc
set security ipsec policy IPSEC-POLICY perfect-forward-secrecy keys group14
set security ipsec policy IPSEC-POLICY proposals IPSEC-PROP
# Common Policies
set security policies from-zone TRUST to-zone TRUST policy TTT match source-address any
set security policies from-zone TRUST to-zone TRUST policy TTT match destination-address any
set security policies from-zone TRUST to-zone TRUST policy TTT match application any
set security policies from-zone TRUST to-zone TRUST policy TTT then permit
# IKE
set security ike gateway ORBIT135 ike-policy IKE-POLICY-PSK
set security ike gateway ORBIT135 address 172.18.175.135
set security ike gateway ORBIT135 local-identity inet 172.18.175.40
set security ike gateway ORBIT135 external-interface ge-0/0/0
set security ike gateway ORBIT135 version v2-only
# IPsec
set security ipsec vpn ORBIT135 bind-interface st0.0
set security ipsec vpn ORBIT135 ike gateway ORBIT135
set security ipsec vpn ORBIT135 ike ipsec-policy IPSEC-POLICY
# IPsec policies
12.4.2.2 Status
# IKE/IPsec status
> show security ike security-associations
Index State Initiator cookie Responder cookie Mode Remote Address
1948872 UP 55ac9490f786c778 8d9e4942f290aac5 IKEv2 172.18.175.135
# Routing status
> show route
The Orbit blocks all traffic (except EAP frames) on the Ethernet port until it can authenticate the peer
connected to that port. The Orbit must be able to communicate with the RADIUS authentication server
through a non-authenticating Ethernet port or other backhaul network interface like the cellular modem.
ETH1
Wireless
backhaul
Windows7 802.1x Peer
GEMDS Orbit
802.1x
Freeradius authenticator
ETH2
authentication
server
Kubuntu Linux 802.1x Peer
13.2.2 FreeRADIUS
Setup FreeRADIUS with server and device certificates, users, and network clients. The following shows
only a snippet of the configuration but has the most important sections listed.
/etc/freeradius/users
# Username/password example
joe Cleartext-Password := password
/etc/freeradius/eap.conf
Setup tls { } section with your certificates, key and key password
/etc/freeradius/clients.conf
# Allow connections from devices in this network
client 192.168.1.0/24 {
secret = password
shortname = ghost
}
The wired interface is configured as shown in the next few diagrams on the following pages:
Running Wireshark in administrator mode on the Windows peer captures the EAP-TLS conversation
between the Orbit and Windows. This tool can be used to diagnose communication errors on the peer.
Switch#show configuration
Using 2061 out of 524288 bytes
!
version 12.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
hostname Switch
boot-start-marker
boot-end-marker
enable secret 5 $1$sP31$MR/SumVvQhHlirgeef3gY0
username login privilege 15 nopassword
aaa new-model
aaa authentication dot1x default group radius
aaa authorization network default group radius
aaa authorization network mylist none
aaa session-id common
switch 1 provision ws-c2960s-24ts-l
dot1x system-auth-control
spanning-tree mode pvst
spanning-tree extend system-id
vlan internal allocation policy ascending
interface FastEthernet0
no ip address
interface GigabitEthernet1/0/1
switchport mode access
interface GigabitEthernet1/0/2
switchport mode access
authentication order dot1x
authentication port-control auto
dot1x pae authenticator
interface GigabitEthernet1/0/3
….
interface Vlan1
ip address 192.168.1.100 255.255.0.0
interface Vlan2
no ip address
ip http server
ip http secure-server
radius-server host 192.168.1.200 auth-port 1812 acct-port 1646
radius-server key password
line con 0
line vty 0 4
password cisco
line vty 5 15
password cisco
end
Switch#
Australia
For professional use only, not for sale to the
general public.
Hot surface—this product is only suitable for
installation In restricted access locations.
ARP Cache feature tries to limit ARPs from going over-the-air. This is not so much because the ARPs
are large packets, but because the ARPs add contention to the channel for information that can be
reasonably determined without sending data over-the-air.
When ARP cache is enabled, whenever an ARP reply or IPV4 packet arrives over-the-air Orbit will save
the source mac address and the source IP address pair. This gives us a table of devices that Orbit expects
to be on the other side of the radio link.
Next when an ARP request is going to go out over-the-air, Orbit will do a lookup in this table to see if the
requested IP address is in the table. If it is not found, it goes over-the-air like any other packet. If it is
found a spoofed reply is generated locally as if it came from the requested device and nothing is sent
over-the-air.
Orbit also keeps a timestamp of the last time a message came from over-the-air that would update the
table. Entries are removed from the table if they have been in there longer than the Arp Cache Timeout
value.
The ARP cache is VLAN aware so VLAN tagged over-the-air traffic is tracked in its own table and
appropriately used for outbound requests.
ARP cache is also enabled on remote-to-remote communication, so if a request is passed from a remote to
the AP, before it is sent over-the-air the table lookup is done. This lets the request-reply only require 2
hops instead of 4.
ARP cache works well in most scenarios. A key scenario to avoid is swapping out a device and giving it
the same IP address (when that device also does not initiate any over-the-air traffic). In this case any over-
the-air traffic would need to wait the cache timeout (default 900 seconds/15 minutes) before it could
communicate. This happens with wired systems as well, but recovery appears faster since most operating
systems/devices ARP every 30-90 seconds. This constant stream of ARPs is what Orbit’s ARP caching
was implemented to avoid.
Summary:
• ARP Cache limits over-the-air traffic by keeping a local table of devices that that are marked as
located remotely, so that replies to ARP requests can be generated locally without going over-the-
air
• ARP Cache is simpler to configure than ARP proxy (which is not implemented in Orbit)
• ARP Cache will only stop ARP requests from going over-the-air. If a device generates excessive
gratuitous ARPs (broadcast ARP replies that are unsolicited) this will NOT limit them.
TECHNICAL ASSISTANCE
Technical assistance for GE MDS products is available from our Technical Support Department during
business hours (8:30 A.M.–6:00 P.M. Eastern Time). When calling, please give the complete model
number of the product, along with a description of the trouble/symptom(s) that you are experiencing. In
many cases, problems can be resolved over the telephone, without the need for returning the unit to the
factory. Please use one of the following means for product assistance:
Phone: 585 241-5510 E-Mail: gemds.techsupport@ge.com
FAX: 585 242-8369 Web: www.gemds.com
REPAIR SERVICE
Component level repair of this equipment is not recommended in the field. Many components are
installed using surface mount technology, which requires specialized training and equipment for proper
servicing. For this reason, the equipment should be returned to the factory for any PC board repairs. The
factory is best equipped to diagnose, repair and align your unit to its proper operating specifications.
If return of the equipment is necessary, you must obtain a return authorization number before shipment.
This number helps expedite the repair so that the equipment can be returned to you as quickly as possible.
Please be sure to include the number on the outside of the shipping box, and on any correspondence
relating to the repair. No equipment will be accepted for repair without an authorization number.
Return authorization numbers are issued online at www.gedigitalenergy.com/Communications.htm. On
the left side of the page, click “Login to my MDS” and once logged in, click “Service Request Order”.
Your number will be issued immediately after the required information is entered. Please be sure to have
the model number(s), serial number(s), detailed reason for return, “ship to” address, “bill to” address, and
contact name, phone number, and fax number available when requesting a number. A purchase order
number or pre-payment will be required for any units that are out of warranty, or for product conversion.
If you prefer, you may contact our Product Services department to obtain an authorization number:
Telephone Number: 585-241-5540
Fax Number: 585-242-8400
E-mail Address: gemds.productservices@ge.com
The radio must be properly packed for return to the factory. The original shipping container and
packaging materials should be used whenever possible. All factory returns should be addressed to:
GE MDS LLC
Product Services Department
(Auth. No. XXXX)
175 Science Parkway
Rochester, NY 14620 USA
When repairs have been completed, the equipment will be returned to you by the same shipping method
used to send it to the factory. Please specify if you wish to make different shipping arrangements. To
inquire about an in-process repair, you may contact our Product Services department using the telephone,
Fax, or E-mail information given above.
REPLACEMENT PARTS
Many spare and replacement items are available for purchase by contacting your factory sales
representative, or by visiting our online store at http://store.gedigitalenergy.com/front.asp