Ripex2 Man en
Ripex2 Man en
RipEX2
Radio modem & Router
.
fw 2.1.0.0
2023-09-06
version 1.27
RACOM s.r.o. | Mirova 1283 | 592 31 Nove Mesto na Morave | Czech Republic
www.racom.eu
Tel.: +420 722 937 522 | E-mail: racom@racom.eu
Table of Contents
Important Notice .................................................................................................................................. 9
1. Quick guide ................................................................................................................................... 10
1.1. Bench testing ...................................................................................................................... 11
2. Product .......................................................................................................................................... 13
2.1. Dimensions ......................................................................................................................... 14
2.2. Connectors ......................................................................................................................... 17
2.3. Cellular interface ................................................................................................................ 27
2.4. Indication LEDs .................................................................................................................. 28
2.5. Ordering codes ................................................................................................................... 30
3. Accessories ................................................................................................................................... 33
4. Installation ..................................................................................................................................... 34
4.1. Step-by-step checklist ........................................................................................................ 34
4.2. Minimal required settings to set-up cellular connection ...................................................... 34
4.3. Mounting ............................................................................................................................. 35
4.4. Antenna installation ............................................................................................................ 39
4.5. Antenna feed line ............................................................................................................... 40
4.6. Grounding ........................................................................................................................... 40
4.7. Full duplex operation .......................................................................................................... 40
4.8. Connectors ......................................................................................................................... 40
4.9. Power supply ...................................................................................................................... 41
5. RipEX2 in detail ............................................................................................................................. 42
5.1. Bridge mode ....................................................................................................................... 42
5.1.1. Functionality example .............................................................................................. 43
5.1.2. Configuration examples ........................................................................................... 45
5.1.3. Point-to-Point Full duplex links ................................................................................ 46
5.2. Router mode ....................................................................................................................... 46
5.2.1. Router - Base driven ................................................................................................ 47
5.2.2. Router - Flexible ...................................................................................................... 50
5.3. Combination of IP and serial communication ..................................................................... 54
5.3.1. Detailed Description ................................................................................................ 54
6. Web interface ................................................................................................................................ 56
6.1. Supported web browsers .................................................................................................... 58
6.2. Changes to commit ............................................................................................................ 58
6.3. Notifications ........................................................................................................................ 60
6.4. User menu .......................................................................................................................... 61
6.5. Remote access ................................................................................................................... 61
6.6. Refresh settings ................................................................................................................. 62
6.7. Status info area .................................................................................................................. 63
6.8. Help .................................................................................................................................... 63
6.9. Shortcuts ............................................................................................................................ 64
7. Settings ......................................................................................................................................... 65
7.1. Interfaces ............................................................................................................................ 65
7.1.1. Ethernet ................................................................................................................... 65
7.1.1.1. Network interfaces ........................................................................................ 65
7.1.1.2. Ports ............................................................................................................. 67
7.1.2. Radio ....................................................................................................................... 69
7.1.2.1. Radio interface .............................................................................................. 70
7.1.2.2. Radio channel parameters ........................................................................... 71
7.1.2.3. Encryption ..................................................................................................... 73
7.1.2.4. Transparent protocol (Bridge mode) ............................................................. 73
7.1.2.5. Base driven protocol (Router mode) ............................................................. 75
Important Notice
Copyright
Sole owner of all rights to this User manual is the company RACOM s. r. o. (in this manual referred to
under the abbreviated name RACOM). Drawing written, printed or reproduced copies of this manual
or records on various media or translation of any part of this manual to foreign languages (without
written consent of the rights owner) is prohibited.
Products offered may contain software proprietary to RACOM. The offer of supply of these products
and services does not include or infer any transfer of ownership.
Disclaimer
Although every precaution has been taken in preparing this information, RACOM assumes no liability
for errors and omissions, or any damages resulting from the use of this information. This document or
the equipment may be modified without notice, in the interests of improving the product.
RACOM reserves the right to make changes in the technical specification or in this product function or
to terminate production of this product or to terminate its service support without previous written noti-
fication of customers.
Trademark
All trademarks and product names are the property of their respective owners.
Important Notice
• Due to the nature of wireless communications, transmission and reception of data can never be
guaranteed. Data may be delayed, corrupted (i.e. have errors), or be totally lost. Significant delays
or losses of data are rare when wireless devices such as the RipEX2 are used in an appropriate
manner within a well‐constructed network. RipEX2 should not be used in situations where failure to
transmit or receive data could result in damage of any kind to the user or any other party, including
but not limited to personal injury, death, or loss of property. RACOM accepts no liability for damages
of any kind resulting from delays or errors in data transmitted or received using RipEX2, or for the
failure of RipEX2 to transmit or receive such data.
• Under no circumstances is RACOM or any other company or person responsible for incidental, acci-
dental or related damage arising as a result of the use of this product. RACOM does not provide the
user with any form of guarantee containing assurance of the suitability and applicability for its
application.
• RACOM products are not developed, designed or tested for use in applications which may directly
affect health and/or life functions of humans or animals, nor to be a component of similarly important
systems, and RACOM does not provide any guarantee when company products are used in such
applications.
• The equipment should be used in hazardous locations under conditions according to Section 10.5,
“Explosive atmospheres” only.
1. Quick guide
RipEX2 is a widely configurable compact radio modem, more precisely a radio IP router. All you have
to do to put it into operation is to connect it to an antenna and a power supply and configure it using a
PC (tablet, smartphone) and a web browser.
Fig. 1.1: Connecting RipEX2 to a PC over WiFi, ETH/USB adapter, ETH interface
Default password for "admin" account is "admin". Change the password before deploying unit
to a network.
1
https://www.racom.eu/eng/products/radio-modem-ripex.html#accessories_ethusb
2
https://www.racom.eu/eng/products/radio-modem-ripex.html#accessories_ethusb
Important
When you change the RipEX2 ETH address to a different IP address/mask, the IP address
of your PC might be necessary to be updated to match the same subnet (mask).
Note
https - For security reasons the http protocol with ssl encryption is used for the communication
between the PC and RipEX2. The https protocol requires a security certificate. You must install
this certificate into your web browser. The first time you connect to the RipEX2, your computer
will ask you for authorisation to import the certificate into your computer. The certificate is
signed by the certification authority RACOM s.r.o. It meets all security regulations and you
need not to be concerned about importing it into your computer. Confirm the import with all
warnings and exceptions that your browser may display during installation.
Warning
Before you start any configuration, make sure only one unit is powered ON, otherwise a different
radio modem could reply to your requests! (In default settings: all units share the same IP ad-
dress and are in Bridge mode - which means, they can connect together over the air and create
unwanted responds.)
Note
If you do not know unit IP address or password, you can reset the access parameters to defaults,
see Section 2.2.9, “HW button”.
• A dummy load or an actual antenna with 50 ohm impedance should be connected to the RipEX2
• Minimum RF output must be set to avoid overloading the dummy antenna and to keep the received
signal at reasonable level, between -40 and -80 dBm.
• The power supplies must meet the requirements given in the specifications. Make sure the power
supplies do not generate interference in the radio channel and that they can handle very fast changes
in the load when RipEX2 switches from reception to transmission and back.
2. Product
RipEX2 is a radio modem platform renowned for overall data throughput in any real-time environment.
RipEX2 radio modems are native IP devices, Software Defined with Linux OS that have been designed
with attention to detail, performance and quality.
RipEX2 is built into a rugged die-cast aluminium casing that allows for multiple installation possibilities,
see Section 4.3, “Mounting”.
Explosive atmospheres
2.1. Dimensions
185 134,7
60
68,3
68,3
125,5
DIN Rail Clip DIN 35 Rail
For more information see Section 4.3.1, “DIN rail mounting” and Section 4.3.2, “Flat mounting”.
142,4
153,8
154,1
166,4
167,1
7,7 10,2
22,1 17,8
31,6 21
42,7 32,8
47,3
2.2. Connectors
All connectors are located on the front panel. The upper side features a LED panel. The HW button is
located on the front panel as well (close to the COM connector).
Explosive atmospheres
Do not manipulate the RipEX (e.g. plug or unplug connectors) unless powered down or the
area is known to be non-hazardous.
2.2.1. Antenna
Both Rx and Tx/Rx connectors for split Fig. 2.7: Antenna connectors
installation (separated Tx and Rx anten-
nas or full duplex operation with duplexer) - Rx for receiving and Tx/Rx for transmitting.
Note
HW option RipEX2e (product variant ‘C' and 'D’) provides only Tx/Rx connector.
Warning
RipEX2 radio modem may be damaged when operated without an antenna or a dummy load.
Explosive atmospheres
This rugged connector connects to a power supply and it contains control signals. A Plug with screw-
terminals and retaining screws for power and control connector is supplied with each RipEX2. It is Tyco
7 pin terminal block plug, part No. 1776192-7, contact pitch 3.81 mm. The connector is designed for
2
electric wires with a cross section of 0.5 to 1.5 mm . Strip the wire leads to 6 mm (1/4 inch). Isolated
cables should receive PKC 108 or less end sleeves before they are inserted in the clip. Insert the cables
in the wire ports, tightening securely.
Lead
Binding
Screws (7)
Wire Retaining
Ports (7) Screws (2)
Fig. 2.8: Supply connector Fig. 2.9: Power and Control - cable plug
Explosive atmospheres
The unit must be powered with an intrinsic save power source for use in hazardous locations.
SI AI - + A0 + -
10–30VDC
Pin No.: 1 2 3 4 5 6 7
SI AI - + A0 + -
10–30VDC
Pin No.: 1 2 3 4 5 6 7
POWER
The POWER pins labelled + and - serve to connect a power supply 10–30 VDC. The requirements for
a power supply are defined in Section 4.9, “Power supply” and Chapter 9, Technical parameters.
Standard RJ45 connectors for Ethernet connection. RipEX2 has 10/100/1000Base-T Auto MDI/MDIX
interfaces so it can connect to 10 Mb/s, 100 Mb/s or 1000 Mb/s Ethernet network. The speed can be
selected manually or recognized automatically by RipEX2. RipEX2 is provided with Auto MDI/MDIX
function which allows it to connect over both standard and cross cables, adapting itself automatically.
Pin assignment
Note
HW option RipEX2e (product variant ‘C' and 'D’) provides only ETH1 - ETH2 interfaces.
It is strongly recommended to use a high quality SFP module with industry temperature range.
The SFP modules listed in Accessories are thoroughly tested by RACOM and are guaranteed
to function with RipEX2 units. It is possible to use any other SFP module, but RACOM cannot
guarantee they will be completely compatible with RipEX2 units.
Note
HW option RipEX2e (product variant ‘C' and 'D’) does not provide ETH5 interface.
2.2.5. COM
RipEX2 provides serial interface COM terminated by DSUB9F connectors. It can be configured as
RS232 or RS485.
RS232 of RipEX2 is a hard-wired DCE (Data Communication Equipment) device. Equipment connected
to the serial port of RipEX2 unit should be DTE (Data Terminal Equipment) and a straight-through cable
should be used. If a DCE device is connected to the serial port of RipEX2, a null modem adapter or
cross cable has to be used.
RipEX2 keeps pin 6 DSR at the level of 0 (state ON, approx. +6.2 V) by RS232 standard permanently.
The 2nd and 3rd COM ports are available when the Extension module 'C' (2 × RS232) is installed. In
such a case: The DI/DO connector is used as a connector for COM2 and COM3.
COM2: RS232 - 5 pin (RxD, TxD, GND, RTS, CTS) 600 b/s to 2 Mb/s
COM3: RS232 - 3 pin (RxD, TxD, GND) 2.4 kb/s to 921.6 kb/s
2.2.6. USB
RipEX2 uses USB 3.0, Host A interface. USB interface is wired as standard:
The USB interface is designed for the connection to an external ETH/USB adapter or a WiFi adapter.
1
They are optional accessories to RipEX2, for more details see www/ripex/accessories . The adapters
are used for service access to web configuration interface of RipEX2 unit.
The USB connector also provides power supply (5 V / 0.5 A). It can be used to temporarily power a
connected device, for instance a telephone. The USB connector should not be used as permanent
source of power supply.
Explosive atmospheres
Only USB equipments dedicated for hazardous locations shall remain connected permanently.
1
https://www.racom.eu/eng/products/radio-modem-ripex.html#accessories_ethusb
2.2.7. EXT
Input signal level >200 mVp-p @ 220R, up to 5V TTL Fig. 2.11: EXT connector SMA
levels
RipEX2 can be equipped with an internal G – Extension GPS (GNSS) module (see details). The GPS
module is used for time synchronization of the NTP server inside RipEX2. In this case the EXT connector
serves for connecting the GPS antenna:
• active antenna
• 3.3 VDC supply
Note
Interface AUX was renamed to EXT (FW version 2.0.13.0. and newer).
Note
HW option RipEX2e (product variant ‘C' and 'D’) does not provide EXT interface.
2.2.8. DI/DO
Digital Outputs:
Digital inputs:
• Pull below 1.1 VDC to activate (1.1 VDC / 1.9 VDC threshold hysteresis)
• Max. 30 VDC
If the RipEX2 unit is installed in the RipEX2-HS (Hot Standby chassis), the DI/DO interface is dedicated
for the Hot Standby operation.
Note
HW option RipEX2e (product variant ‘C' and 'D’) does not provide DI/DO interface.
2.2.9. HW button
HW button operation
2.3.1. Antenna
RipEX2 radio modem equipped with the LTE cellular module has two additional SMA antenna connectors
mounted on the opposite side than radio antenna connectors.
It is recommended to use both antennas (MIMO diversity) for the LTE connection. In case of using only
one antenna, attach it to the ANT1 connector.
Two SIM card holders for Micro SIM (3FF) are available under the screwed cover on the RipEX2 bottom
side.
Warning
Disconnect RipEX2 unit from a power supply before opening the cover and manipulating with
SIM cards.
Alarm
An Alarm is triggered by any event with severity Error or higher (see Section 8.4, “Events”).
Trade name – trade and marketing name of the product. This name is used for all products within
the same product family.
Possible values: RipEX
Gen. – generation of the product of specific Trade name. The very first generation does not have
any number in this position.
Possible values: none, 2
D*** – RipEX2e, processor without HW encryption support. Encryption features will never be
possible.
H – RipEX2e, processor without HW encryption support. COM2 available.
J – RipEX2e, processor without HW encryption support. Encryption features will never be possible.
COM2 available.
X*– RipEX2, processor with HW encryption support.
SW keys – if unit is ordered with SW keys, all keys are specified in this bracket. SW key can be
ordered independently for specific S/N anytime later on.
Possible values:
Master – enables all functionalities of all possible SW feature keys, excl. Ex; Part No.: RipEX2-
SW-MASTER, RipEX2e-SW-MASTER
Protocols – enables Radio protocols (Flexible, Base driven); Part No.: RipEX2-SW-PROTOCOLS
Dynamic routing – enables Dynamic routing (Babel, OSPF, BGP; Link management); Part No.:
RipEX2-SW-DYNAMIC-ROUTING
Speed – enables 256QAM, Channels > 50kHz, Full duplex, RipEX2 only; Part No.: RipEX2-SW-
SPEED
Power – enables RF power 40 dBm PEP; Part No.: RipEX2-SW-POWER
Security – enables IPsec, RADIUS, Multiple users; Part No.: RipEX2-SW-SECURITY
SFP – enables SFP interface, RipEX2 only; Part No.: RipEX2-SW-SFP
COM2 – enables COM2 interface, RipEX2e only; Part No.: RipEX2e-SW-COM2
Ex - authorization for use RipEX2 in hazardous location II 3G Ex ic IIA T4 Gc. Part No.: RipEX2-
Ex (Note: Ex keys are available only for units produced after 1st of January 2022)
Region – used for countries where specific restrictions are required. Available only on special request
when ordering. If used, it is indicated in bracket along with the SW keys.
Possible values:
US – USA, Allowed freq. according to FCC part 90
RipEX2 - 1A: 150.8 - 156.2475, 157.1875 - 161.575, 161.775 - 161.9625, 162.0375 - 170.0 MHz;
Reg. ID: 1A-FCC_Part_90
RipEX2 - 4A: 4A: 406.1 - 454.0, 456 - 462.5375, 462.7375 - 467.5375, 467.7375 - 470.0 MHz;
Reg. ID: 4A-FCC_Part_90
RU – Russia, Allowed freq. according to Russian regulations
RipEX2 - 1A: 146.0 - 174.0 MHz; Reg. ID: 1A-Russia
RipEX2 - 4A: 403.0 - 410.0, 433.0 - 450.0 MHz; Reg. ID: 4A-Russia
RipEX2 - 4A: 433.0 - 450.0 MHz; Adjusted product label; Reg. ID: 4-Russia
BR – Brazil, 6.25 kHz channel not allowed
RipEX2 - 4A: Additional sticker (Anatel 16763) on product and paper box; Reg. ID: 4A-Brazil
MX – Mexico, Additional sticker on product and paper box
Code – part of order code which is printed on Product label on the housing (SW keys are not HW
dependent and can be ordered later on, so they are not printed on Product label).
Order code – the complete product code, which is used on Quotations, Invoices, Delivery notes etc.
2
In order to find out the correct Order code, please use E-shop .
2
https://webservice-new.racom.eu/main/eshop.list?t=10
* The processor included in the unit uses an encryption module listed as 5A002 a.1 in the Regulation
(EU) 2021/821, setting up a Community regime for the control of exports, transfer, brokering and
transit of dual-use items. Units are subject to export control when exporting outside the European union,
according to national, EU and US law (ECCN 5A002 a.1), see
https://policy.trade.ec.europa.eu/help-exporters-and-importers/exporting-dual-use-items_en.
In the case of export from the country where the units were delivered by RACOM, the exporter must
inform RACOM of the new country of delivery. X was under production until XII/2022
3. Accessories
1
Whole accessory list is available on RACOM website.
1. L-bracket
(see https://www.racom.eu/eng/products/radio-modem-ripex.html#accessories_mounting
2. Flat-bracket
2
(see https://www.racom.eu/eng/products/radio-modem-ripex.html#accessories_mounting)
4. RipEX2-RD
4
(see https://www.racom.eu/eng/products/radio-modem-ripex.html#accessories_mounting)
5. RipEX2-RS
5
(see https://www.racom.eu/eng/products/radio-modem-ripex.html#accessories_mounting)
Note
WiFi adapter Part No.: OTH-USB/WIFI-W1, which was suitable for previous generation of
RipEX does not work with RipEX2 units. Please use OTH-USB/WIFI-W2 adapter instead.
Since FW 2.0.14.0 it is possible to use OTH-USB/WIFI-W3 adapter.
7. Demo case
https://www.racom.eu/eng/products/radio-modem-ripex.html#accessories_democase
1
https://www.racom.eu/eng/products/radio-modem-ripex.html#accessories
2
https://www.racom.eu/eng/products/radio-modem-ripex.html#accessories_mounting
3
https://www.racom.eu/eng/products/radio-modem-ripex.html#accessories_mounting
4
https://www.racom.eu/eng/products/radio-modem-ripex.html#accessories_mounting
5
https://www.racom.eu/eng/products/radio-modem-ripex.html#accessories_mounting
4. Installation
Explosive atmospheres
The equipment should be used in hazardous locations under conditions according to Sec-
tion 10.5, “Explosive atmospheres”.
1. Enter the PIN code for the particular SIM card, if required (SETTINGS > Interfaces > Cellular >
SIM1/SIM2).
2. Enable and Configure the Access Point Name (APN) (SETTINGS > Interfaces > Cellular > MAIN/EXT
> Enable & Add/Edit Cellular profile).
3. Add default route 0.0.0.0/0 via WWAN (MAIN or EXT) (SETTINGS > Routing > Static) or other
routing rule required.
• Without such routes, unit will be connected to the cellular network, but not communicating with
any other device/IP.
5. Check functionality
• SETTINGS > Interfaces > Cellular > Status > Show more (<)
• DIAGNOSTICS > Statistics > Cellular statistic tables (Interface, State, Signal)
6. In case of any issues, download a detailed Diagnostic package (DIAGNOSTICS > Information >
Diagnostic package), include all the information except User credentials and send it to support@ra-
1
com.eu .
1
mailto:support@racom.eu
4.3. Mounting
The radio modem RipEX2 is directly mounted using clips to the DIN rail. The mounting can be done
lengthwise (recommended) or widthwise; in both cases with the RipEX2 lying flat. The choice is made
by mounting the clips, one M4 screw per clip. RipEX2 is delivered with two clips, two screws and four
threaded holes. Use solely the M4×5 mm screws that are supplied.
When tightening the screw on the clip, leave a 0.5 mm gap between the clip and the washer.
For vertical mounting to DIN rail, L-bracket (optional accessory) is used. Use solely the M4×5 mm
screws that are supplied.
2
https://www.racom.eu/eng/products/radio-modem-ripex.html#HOL-RipEX-L
For flat mounting directly to the support you must use the Flat bracket (an optional accessory). Use
solely the M4×5 mm screws that are supplied; tighten with torque 0.9 Nm.
3
https://www.racom.eu/eng/products/radio-modem-ripex.html#HOL-RipEX-FLAT
The standard mounting for full-duplex operation is possible for surrounding temperatures bellow + 60°C
(see Table 9.1, “Technical parameters”), but it is recommended to use external passive cooler (e.g.
installation in RipEX2-RS chassis) or keep the surrounding temperature bellow +35°C for increasing
of a long term reliability .
RipEX2 unit provides IP41 level of environmental protection. It is possible to reach higher level of pro-
tection IP52 (Limited dust ingress protection and protection from water spray < 15 degrees from vertical).
To obtain IP5x protection: plug in all connectors and cover unused ports (COM port does not need to
4
be covered) with dust covers from the SET-RipEX2-IP5x .
To obtain IPx2 protection: RipEX2 unit must be physically installed with the connectors facing down-
ward.
4
https://www.racom.eu/download/hw/ripex/free/eng/7_accessories/SET-RipEX2-IP5x.pdf
The antenna pole or mast should be chosen with respect to the antenna dimensions and weight, to
ensure adequate stability. Follow the antenna manufacturer’s instructions during installation.
The antenna should never be installed close to potential sources of interference, especially electronic
devices like computers or switching power supplies. A typical example of totally wrong placement is
mount a whip antenna directly on top of the box containing all the industrial equipment which is supposed
to communicate via RipEX2, including all power supplies.
Only qualified personnel with authorization to work at heights are entitled to install antennas on masts,
roofs and walls of buildings. Do not install the antenna in the vicinity of electrical lines. The antenna
and brackets should not come into contact with electrical wiring at any time.
The antenna and cables are electrical conductors. During installation electrostatic charges may build
up which may lead to injury. During installation or repair work all open metal parts must be temporarily
grounded.
The antenna and antenna feed line must be grounded at all times.
Do not mount the antenna in windy or rainy conditions or during a storm, or if the area is covered with
snow or ice. Do not touch the antenna, antenna brackets or conductors during a storm.
Explosive atmospheres
The shorter the feed line, the better. If RipEX2 is installed close to antenna, the data cable can be re-
placed by an Ethernet cable for other protocols utilizing the serial port, see Section 7.1.4, “Terminal
servers”.
Always follow the installation recommendations provided by the cable manufacturer (bend radius, etc.).
Use suitable connectors and install them diligently. Poorly attached connectors increase interference
and can cause link instability.
4.6. Grounding
To minimize the odds of the transceiver and the connected equipment receiving any damage, a safety
ground (NEC Class 2 compliant) should be used, which bonds the antenna system, transceiver, power
supply, and connected data equipment to a single-point ground, keeping the ground leads short.
The RipEX2 radio modem is generally considered adequately grounded if the supplied flat mounting
brackets are used to mount the radio modem to a properly grounded metal surface. If the radio modem
is not mounted to a grounded surface, you should attach a safety ground wire to one of the mounting
brackets or a screw on the radio modem’s casing.
It is strongly recommended to install an appropriate lightning protection system where the antenna
cable enters the building.
Note
All cablings, groundings and lightning protection must comply with the applicable standards
and regulations.
4.8. Connectors
RipEX2 uses standard connectors. Use only standard counterparts to these connectors.
Explosive atmospheres
Please note that connectors - or their individual pins - are connected to the housing. The
housing is connected with the minus pin of the power connector.
Explosive atmospheres
Fig. 4.10: 10–30 VDC Supplying
The unit must be powered with an intrinsic save
power source for use in hazardous locations.
5. RipEX2 in detail
One of the advantages of the Bridge mode (together with Radio Transparent protocol) is its transparency.
For example: both IPv4 and IPv6 type of traffic passes through; Frames defined by IEEE802.1Q-2018
are supported (e.g. VLAN, QinQ).
• Ethernet ports: The Ethernet ports, intended to be used in Bridge mode, are grouped together in the
Network interface (default name "bridge"), which is bridged with the Radio interface (parameter
"Bridged with radio" enabled)
Radio channel
Transparent radio channel protocol does not solve collisions. There is a CRC check of data integrity
to assure once a message is delivered, it is error free.
Ethernet ports
The whole radio network build from RipEX2 radio modems behaves as a standard Ethernet bridge. An
Ethernet bridge ("Network interface" in RipEX2) automatically learns which devices (MAC addresses)
are located in the local LAN and which devices are accessible over the radio channel. Consequently,
only the Ethernet frames addressed to remote devices are physically transmitted over the radio channel.
This arrangement saves the precious RF spectrum from extra load which would be otherwise generated
by local traffic.
By default all Ethernet ports are bridged together with the Radio interface. It is possible to remove some
Ethernet ports from this Network interface (having the Radio interface attached) to prevent unwanted
traffic to enter the radio channel.
It is possible to form another Network interface(s). Any needed Ethernet traffic can be routed in between
individual Network interfaces.
It is a good practice to detach one (or more) Ethernet port(s) from the main Network interface (described
above) for other purpose than transparent data transfer. One typical example is: dedicated port for the
unit management. It is very useful to use such a separated port for unit management, because there
is no danger of transferring unwanted traffic (e.g. system updates or similar traffic) from the client PC
over the radio channel. You can create another Network interface (e.g. called LAN-mgmt). Attach the
previously detached ETH port and configure an IP address to be able to access the unit management.
COM port
The COM port needs to be Enabled and a Protocol needs to be selected to transfer any data. "Trans-
parent" type of COM protocol is dedicated for Bridge mode purposes. This protocol transfers data
between the COM port and the RipEX2 network transparently. Any other Protocol can be selected
when needed.
When the "Transparent" protocol is selected, all frames received from the COM port are broadcasted
over the radio channel and transmitted to all COM ports on all radio modems within the network. If the
remote COM port is also configured for "Transparent" protocol, the received data are transparently
transmitted over the COM port.
Terminal Servers
Behavior of Terminal Servers is similar to COM port. "Transparent" protocol needs to be selected when
transparent data transfer to whole network (broadcasts) is needed. The other protocol types can be
used for "Router mode" type of addressed communication.
• FEP - Front End Processor, designates the communication interface equipment in the center
• RTU - Remote Telemetry Unit, the terminal SCADA equipment at remote sites
The single digits in illustrations are “site names” and do not necessarily correspond with actual addresses
of both the RipEX2's and SCADA equipment. Address configuration examples are given in the Sec-
tion 5.1.2, “Configuration examples”.
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Step 7
You can see an example of IP addresses of the SCADA equipment and RipEX2 ETH interfaces in the
picture below.
In Bridge mode, the IP address of the ETH interface of RipEX2 is not relevant for user data communic-
ation. However it is strongly recommended to assign a unique IP address to each RipEX2 Network in-
terface, since it allows for easy local as well as remote service access. Moreover, leaving all RipEX2
units with the same (= default) IP on the ETH interface may cause serious problems, when more RipEX2
units are connected to the same LAN, even if by accident (e.g. during maintenance).
Repeater
Because using the bridge mode makes the radio network transparent, the use of repeaters has certain
limitations. To keep matters simple we recommend using a single repeater. However, if certain rules
are observed, using multiple repeaters in the same network is possible.
The total number of repeaters in the network is configured for every unit individually under SETTINGS
> Interfaces > Radio > Radio protocol parameters. This information is contained in every packet sent.
All units that receive such packet will resume transmission only after sufficient time has been allowed
for the packet to be repeated. The packets received from user ports remain buffered and are sent after
the appropriate time passes. This prevents collisions between remote radio modems. There can be no
repeater collisions if only one repeater is used.
Where two or more repeaters are used, collisions resulting from simultaneous reception of a repeated
packet must be eliminated. Collisions happen because repeaters repeat packets immediately after re-
ception, i.e. if two repeaters receive a packet from the center, they both relay it at the same time. If
there is a radio modem which is within the range of both repeaters, it receives both repeated packets
at the same time rendering them unreadable.
• To establish a PtP link it is recommended to use a Bridge mode. In context of PtP it has following
advantages:
○ Simple configuration
○ Transparent data transfer (VLAN - single, double, tripple tagged; IPv6; MPLS; etc.)
○ Low latency
○ Install a duplexer (exact type for a given channel link). A recommended duplex distance is 75 dB
and more.
1
○ Due to high duty cycle, proper cooling is required. We recommend to use RipEX2-RS .
2
For more details see RipEX2 PtP link tutorial video .
IP packets are processed according to routing table rules. You can also set the router’s default gateway
(applies to both interfaces) in the routing table.
The COM ports are treated as standard host devices, messages can be delivered to them as UDP
datagrams to selected port numbers. The destination IP address of a COM port is either the IP of an
ETH or the IP of a radio interface.
1
https://www.racom.eu/eng/products/m/ripex2-hs/product.html#rip2rs
2
https://www.youtube.com/watch?v=Mg-ioFV0wDo&ab_channel=RACOMCompany
The additional Virtual COM ports and Terminal server can act as other IP router ports. This enables
Serial and TCP based RTUs to be combined in one network.
Two different Radio protocols are available in the Router mode: Base driven and Flexible.
• Base driven
This protocol is optimized for TCP/IP traffic and/or 'hidden' Remotes in report-by-exception networks,
when a Remote is not be heard by other Remotes and/or different Rx and Tx frequencies are used.
It is suitable for a star network topology with up to 255 Remotes under one Base station, where each
Remote can simultaneously work as a Repeater for one or more additional Remotes.
• Flexible
Suitable for master or even multi master-slave polling and report by exception from remotes concur-
rently. No limits in network design – each radio can work as base station, a repeater, a remote, or
all of these simultaneously
All traffic over the Radio channel is managed by the Base station. Radio channel access is granted by
a deterministic algorithm resulting in collision free operation regardless of the network load. Uniform
distribution of Radio channel capacity among all Remotes creates stable response times with minimum
jitter in the network.
All communication on Radio channel is controlled by the Base station; all frames inside the radio network
have to be routed through the Base station. Appropriate routing has to be set.
Base station can communicate with the Remote stations using individual modulation and FEC settings.
Any Remote can work as a Repeater for another Remote. Only one Repeater is possible between the
Base station and Remote, however a number of Remotes can use the same Repeater.
There is no need to set any routes in Routing table(s) for Remote stations located behind Repeater.
Forwarding of frames from the Base station over the Repeater in either direction is provided transparently
by the Base driven protocol.
When Remote to Remote communication is required, respective routes via the Base station must be
set in Routing tables in the Remotes.
Frame acknowledgement, retransmissions and CRC check, guarantee data delivery and integrity even
under harsh interference conditions on the Radio channel.
A star topology with one repeater is used in the following example of a SCADA network using a polling
and report by exception combination. The Repeater is also serving as a Remote radio. The packets’
acknowledgement on Radio channel is used in both directions in the example.
Step 1
RipEX2 base station regularly
checks the queue status of
RipEX2 Remote stations for
which it has no queueing inform-
ation. The feedback enables the
Base station to manage time al-
locations for all Remotes to
transmit.
Step 2
FEP sends a request packet to
RTU A via Base station; Base
station transmits packet in
shortest possible time. Remote
station 1 receives the packet and
hands it over to RTU A, simultan-
eously acknowledging packet re-
ceipt to the Base station.
Step 3
Fig. 5.2: Router - Base driven, Functionality example RTU A processes the request
and sends the reply to Remote
station 1. During the checking process the Base station detects a prepared packet in the queue of
Remote station 1 and subsequently allots a Radio channel for transmission of the packet. Remote
station 1 transmits the packet. If the Base station successfully receives the packet, it sends an acknow-
ledgement and then the Remote station 1 clears the packet from the queue. A part of the relation includes
a hand over of information about the number of packets waiting in the queue.
Step 4
RTU B is connected to Remote station 2 behind Repeater station 1, which manages all communication
between the Base station and Remote station 2.
As already mentioned, RipEX2 works as a standard IP router with multiple independent interfaces:
Radio and Ethernets. Each interface has its own MAC address, IP address and mask.
When Base driven protocol is used, Radio IP addresses for all RipEX2 units must share the same IP
subnet.
The Base driven protocol routing table for each RipEX2 Remote station can be simplified to a default
gateway route rule directed to RipEX2 Base station Radio IP. Only one record with respective IP ad-
dress/mask combination for each remote station is needed in the Base station routing table.
The repeaters are not considered in routing in Base driven protocol. Each Remote station uses its own
Radio IP address as a gateway in the routing table of the Base station.
Important
Note
When only serial protocols are used, there is no need to use Routing tables. Instead of using
Routing tables records, Address translation in COM protocol settings is used. Serial protocol
address to IP address translation rules apply where the Radio IP addresses are used. Radio
IP addresses will only be used for maintenance in such circumstances.
Router mode with Flexible protocol is suitable for Multipoint networks of all topologies with unlimited
number of repeaters on the way, and all types of network traffic where Multi-master applications and
any combination of simultaneous polling and/or report-by-exception protocols can be used.
Each RipEX2 can access the Radio channel spontaneously using sophisticated algorithms to prevent
collisions when transmitting to the Radio channel. Radio channel access is a proprietary combination
of CSMA and TDMA; the Radio channel is deemed to be free when there is no noise, no interfering
signals and no frames being transmitted by other RipEX2 stations. In this situation, a random selection
of time slots follows and a frame is then transmitted on the Radio channel.
Frame acknowledgement, retransmissions and CRC check, guarantee data delivery and integrity even
under harsh interference conditions on the Radio channel.
In the following example, there are two independent SCADA devices connected to RipEX2's ports
(COM and ETH). One is designated RTU (Remote Telemetry Unit) and is assumed to be polled from
the center by the FEP (Front End Processor). The other is labelled PLC (Programmable Logic Controller)
and is assumed to communicate spontaneously with arbitrary chosen peer PLCs.
Step 1
Step 2
Step 3
Step 4
Step 5
As it was mentioned above, RipEX2 radiomodem works as a standard IP router with two independent
interfaces: radio and ETH. Each interface has got its own MAC address, IP address and mask.
The IP router operating principles stipulate that every unit can serve as a repeater. Everything what is
needed is the proper configuration of routing tables.
Radio IP addresses of the RipEX2 units required to communicate over the radio channel must share
the same IP network. We recommend planning your IP network so that every RipEX2 is connected to
a separate sub-network over the Ethernet port. This helps to keep the routing tables clear and simple.
Note
Even if the IP addresses of all RipEX2 units in a radio channel share a single IP network, they
may not be communicating directly as in a common IP network. Only the RipEX2 units that
are within the radio range of each other can communicate directly. When communication with
radio IP addresses is required, routing tables must include even the routes that are within the
same network (over repeaters), which is different from common IP networks. The example
configuration below does not show such routing rules for the sake of simplicity (they are not
needed in most cases).
Formal consistency between the last byte of the radio IP address and the penultimate byte of the Eth-
ernet address is not necessary but simplifies orientation. The “Addressing” image shows a routing table
next to every RipEX2. The routing table defines the next gateway for each IP destination. In radio
transmission, the radio IP of the next radio-connected RipEX2 serves as the gateway.
In large and complex networks with numerous repeaters, individual routing tables may become long
and difficult to comprehend. To keep the routing tables simple, the addressing scheme should follow
the layout of the radio network.
More specifically, every group of IP addresses of devices (both RipEX2's and SCADA), which is accessed
via a repeater, should fall in a range which can be defined by a mask and no address defined by that
mask exists in different part of the network.
A typical network consisting of a single center and number of remotes has got a tree-like layout, which
can be easily followed by the addressing scheme – see the example in the figure "Optimised addressing"
below.
The default gateway is also a very powerful routing tool, however be very careful whenever the default
route would go to the radio interface, i.e. to the radio channel. If a packet to non-existing IP destination
came to the router, it would be transmitted over the radio channel. Such packets increase the load of
the network at least, cause excessive collisions, may end-up looping etc. Consequently the default
route should always lead to the ETH interface, unless you are perfectly certain that a packet to non-
existing destination IP may never appear (remember you are dealing with complex software written
and configured by humans).
Five independent terminal servers are available in RipEX2. Terminal server is a virtual substitute for
devices used as serial-to-TCP(UDP) converters. It encapsulates serial protocol to TCP(UDP) and vice
versa eliminating the transfer of TCP overhead over the radio channel.
If the data structure of a packet is identical for IP and serial protocols, the terminal server can serve as
a converter between TCP(UDP)/IP and serial protocols (RS232, RS485).
Generally, a Terminal server (also referred to as Serial server) enables connection of devices with a
serial interface to a RipEX2 over the local area network (LAN). It is a virtual substitute for the devices
used as serial-to-TCP(UDP) converters.
A SCADA application in the center should be connected to the radio network via serial interface, however,
for some reason that serial interface is not used. The operating system (e.g. Windows) can provide a
virtual serial interface to such application and converts the serial data to TCP (UDP) datagrams, which
are then received by the terminal server in RipEX2. This type of connection between RipEX2 SCADA
and application is beneficial in the following circumstances:
Important
The TCP (UDP) session operates only locally between RipEX2 and the central computer,
hence it does not increase the load on the radio channel.
In special cases, the Terminal server can reduce network load from TCP applications. A TCP session
can be terminated locally at the Terminal server in RipEX2. User data are extracted from the TCP
messages and processed as if it came from a COM port. When the data reaches the destination RipEX2,
it can be transferred to the RTU either via the serial interface or via TCP (UDP), using the Terminal
server again. Please note, that RipEX2 Terminal server implementation also supports the dynamical
IP port change in every incoming application datagram. In such a case the RipEX2 sends the reply to
the port from which the last response has been received. This feature allows to extend the number of
simultaneously opened TCP connections between the RipEX2 and the locally connected application
up to 10 on each Terminal server.
6. Web interface
RipEX2 can be easily managed from your computer using a web browser. If there is an IP connection
between the computer and the respective RipEX2, you can simply enter the IP address of any RipEX2
in the network directly in the browser address line and log in. However, it is not recommended to
manage an over-the-air connected RipEX2 in this way, because high amounts of data would have to
be transferred over the Radio channel, resulting in quite long response times.
When you need to manage an over-the-air connected RipEX2 , log-in to a RipEX2, which your computer
is connected to using either a cable (via LAN) or a high-speed WAN (e.g. Internet). The RipEX2 which
you are logged-in to in this way is called Local. Then you can manage any remote RipEX2 in the network
over-the-air in a throughput-saving way: all the static data (e.g. Web page graphic objects) is downloaded
from the Local RipEX2 and only information specific to the remote unit is transferred over the Radio
channel. RipEX2 accessed in such a way is called Remote.
When in Router mode, the IP address of either the Radio or Ethernet interface in the remote unit can
be used for such a Remote management. IP routing between the source (Local RipEX2) and the des-
tination IP (Remote RipEX2) needs to be configured properly.
When in Bridge mode, IP address of the Network interface the Radio interface is bridged with is used
for Remote access. When accessing the unit locally the IP address belonging to an Ethernet port, the
management PC is connected to, is used. Be careful, each RipEX2 MUST have its unique IP address
and all these IP addresses have to be within the same IP network (defined by the IP Mask) when Remote
management is required in Bridge mode.
You can also connect to a RipEX2 unit to the hybrid networks in a same way.
For the sake of security only HTTPS protocol is used for the connection between the web browser and
RipEX2 unit. If the http://... is used into the web browser address line, the communication is immediately
automatically redirected to HTTPS protocol.
For better protection against unauthorized access to the network there is a timer build within the RipEX2
unit and the web interface (set to 24 hours by default), which is monitoring user activity. In case of user
inactivity, the connection between the web interface and the unit will be interrupted (i.e. automatic
logout). Timer is automatically launched in parallel both In the unit and in the web browser. In case of
changing the timer setting, we recommend to logout and login, so the correct initialization of timeout
inactivity can occur.
Login page
The login page informs you about the Unit name and IP address of the RipEX2 unit you are trying
to log in.
The login page allows changing of the language of the whole web interface (English language is
default).
Web interface is designed for usage on all kinds of equipment - with different screen sizes and
screen resolutions. Most of the pictures depicted in this User manual are taken on the desktop type
of screen resolution.
Note
A mechanism against brute-force attack is implemented. When wrong combination of the
Account / Password is entered you have to wait a while for the following attempt. The time
is growing with every wrong attempt.
• Unit name
• Notifications button
• Edge
• Chrome
• Firefox
• Safari
Supported Web browsers for mobile equipment are current versions of:
Note
For safety reasons, it is recommended to use a web browser without any extensions (especially
extensions, which could get access to data).
To access the Changes to commit "basket", click on the Changes button (top right corner in the Web
page header) or use "Ctrl+Alt+C" shortcut.
• Are separated in the menu alphabetically. Alphabetical separation is sorted hierarchically according
to the name of items in the menu.
• Are displayed in the menu (including the path of their placement) and provided with a link for a quick
transfer to its original placement.
• Carry an information about their changed values ("Old value" → "New value").
• Reset changes - all changes will be reset back to their previously set value (not default).
6.3. Notifications
With RipEX2 new way of showing important system events to the user is introduced. It is called Notific-
ation Center and is used consistently throughout the interface. Notification Center is located on the top
right corner of the interface. It exists in two forms: active notification display and full Notification Center.
Both the active notification display and the full Notification Center are displayed either below the top
header of the interface or in the right hand sidebar depending on the size of user’s display. The beha-
vior is responsive so in case the user needs to make the browser window narrower, the notification
center automatically changes place to use the most efficient location.
Note
Notifications are mostly triggered by user actions in the interface, for example success or failure of Fast
Remote Access connection. They are not to be confused with Events, which are triggered mostly by
the system and are not shown in the Notification Center, but on Diagnostics > Events page. In other
words Notifications are caused by the user, Events are caused by changing status of the unit.
Every new notification is displayed in the Notification Center drawer. User can either dismiss the noti-
fication by clicking the cross in the notification body, close all displayed notifications in the drawer or
expand full Notification Center using buttons (“Close all” and “Show all”) on the right side of the Notific-
ation Center drawer.
Notification Center collects all notifications that have not been dismissed and allows users to browse
them.
Note
RipEX2 local unit must have the newest firmware version in the whole network to ensure proper Remote
access functionality. Nevertheless it is recommended to keep the same version of firmware in the whole
network. See details in chapter Section 7.6.5, “Firmware”
Once the Remote access is successful, the IP address line changes its color to black together with the
web page identification.
The IP address of the currently connected RipEX2 unit is displayed as a part of the Remote access
button. All the configuration settings are remotely available using standard web interface. Some of the
Diagnostic features are available via local connection only.
Remote access connection can be established directly by entering the IP address of the Remote unit
as an additional parameter into the URL. The required format is:
https://LOCAL_UNIT_IP_ADDRESS?remoteAccessTarget=REMOTE_UNIT_IP_ADDRESS
Note
It is possible to use this URL format to make a web browser’s bookmark. Such bookmarks can
be used for faster access to remote units.
Triggering the Refresh will upload current data from the unit to the web client.
Note
Refresh deletes all non-saved changes which were done in the client.
6.8. Help
This feature is available on individual web pages of the graphical user interface by clicking on the purple
box with the question mark on the right upper corner (or in the middle) of the screen (according to the
width of the screen).
The content of the help is identical with the respective sub-chapter of the User manual.
6.9. Shortcuts
Tab. 6.1: Table of shortcuts
Shortcut Access to
Ctrl+Alt+C Changes to commit
Ctrl+Alt+N Notification center
Ctrl+Alt+R Remote access
7. Settings
Information provided in this chapter is identical with the content of Helps for individual menu. which will
be gradually added on all screens.
7.1. Interfaces
7.1.1. Ethernet
RipEX2 provides 5 physical Ethernet ports ETH1, ETH2, ETH3, ETH4 and ETH5. ETH1 - ETH4 ports
are metallic. ETH5 port is an SFP port. There is a possibility to define an Ethernet bridge - a logical
Network interface - by bridging (joining) together multiple physical Ethernet interfaces. All interfaces
bridged together share the same traffic.
The Network interface (technically - an Ethernet bridge) is identified by a name. The name always begins
with a "LAN-" prefix. Multiple Network interfaces can be defined. Multiple physical Ethernet interfaces
can be bridged together by using single Network interface.
When unit is operating in Bridge mode - the default Network interface bridges together not only physical
Ethernet ports, but also the Radio interface. All the Ethernet traffic received by those Ethernet ports is
transferred to the Radio interface and transmit by the Radio channel and vice versa.
When unit is operating in Router mode - the Radio channel transmits only the traffic, which is destined
to the Radio interface by Routing rules.
The radio unit default setting bridges all Ethernet ports together. New Network interfaces can be defined
to split the Ethernet traffic of the individual ports. Any single Ethernet port can be detached from an
existing Network interface and added to another Network interface.
Single or multiple Ethernet subnets can be defined within one Network interface. Each subnet is iden-
tified by its IP / mask. Use the optional parameter Note to keep your network configuration in human
readable manner.
Enable / Disable
Enables / disables the Network interface.
Name
Mandatory name of the Network interface.
ETH1 - ETH5
Range on Ethernet ports selected within the specific Network interface.
Note
HW option RipEX2e (product variant ‘C' and 'D’) provides only ETH1 - ETH2 interfaces.
Note
If the Network interface has set up either a Radio interface or GRE L2 tunnel, it does not
require any ETH ports.
Add IP/Subnet
Adds defined subnet to the Network interface.
IP / Mask
IP / mask of the specific Ethernet subnet (in CIDR notation). IP address represents the Network
interface in the Layer 3 Ethernet network.
Note
Optional comment.
VLAN
Each Network interface can have one or more attached VLANs with one or more Subnets.
Enable / Disable
Enables / disables VLAN.
VLAN ID
Number {0 – 4094}, default = 1
Specifies the VLAN ID according to IEEE 802.1Q
Note
Optional comment.
Add IP/Subnet
Adds defined subnet to the VLAN.
7.1.1.2. Ports
Enable / Disable
Enables / Disables ETH ports (1 - 5) SW control.
Note
HW option RipEX2e (product variant ‘C' and 'D’) provides only Ethernet 1 - Ethernet 2 in-
terfaces.
Note
When several bridges are interconnected in the network, it is appropriate to switch on Spanning
Tree Protocol (ADVANCED > Interfaces > Ethernet > STP) to prevent bridge loops and build
a loop-free logical topology.
7.1.2. Radio
• Radio interface
• Radio protocol
• Radio parameters
• Encryption
Radio interface behavior is heavily affected by a Radio interface mode. For Bridge mode, there is one
protocol available:
• Transparent – This protocol is very simple; no channel access mechanism takes place. Suitable for
star topology with maximum one repeater along the packet path. Available in Bridge mode.
• Base driven – TCP/IP optimized protocol having deterministic channel access mechanism. Suitable
for star topology with maximum one repeater along the packet path. Available in Router mode.
• Flexible - Suitable for master or even multi master-slave polling and report by exception from remotes
concurrently. No limits in network design – each radio can work as base station, a repeater, a remote,
or all of these simultaneously.
Radio channel parameters (such as frequency, output power etc.) are common for all protocols. They
are described later in this chapter.
Mode
List box {Bridge; Router}, default = "Bridge"
Selecting Bridge or Router mode affects many other parameters across the unit. See Section 5.1,
“Bridge mode” and Section 5.2, “Router mode” for detailed description.
IP / Mask
IP address of the radio interface and the mask of the radio network. This parameter occurs only, if
parameter "Mode" is set to "Router".
TX frequency
Transmitting frequency in Hz. Step 5 kHz (for 25 kHz channel spacing) or 6.25 kHz (for 12.5 or
6.25 kHz channel spacing).
The value entered must be within the frequency tuning range of the product as follows:
RipEX2-1A: 135–175 MHz
RipEX2-3A: 285–335 MHz
RipEX2-3B: 335–400 MHz
RipEX2-4A: 400–470 MHz
RipEX2-4B: 450–520 MHz
RipEX2-8A: 803–897 MHz
RipEX2-9A: 860–960 MHz
RX frequency
Receiving frequency, the same format and rules apply as for TX frequency.
Antenna configuration
List box {Single (Tx/Rx); Dual (Rx, Tx/Rx)}, default = "Dual (Rx; Tx/Rx)"
See chapter 1.2.1. Antenna for details
Note
HW option RipEX2e (product variant ‘C' and 'D’) enables Single antenna operation only.
RF power PEP
1
See PEP versus RMS RF power .
Note
Channels 250 and 300 kHz are available only in Bridge mode.
Note
HW option RipEX2e (product variant ‘C' and 'D’) provides Channel spacing up to 50 kHz.
1
https://www.racom.eu/eng/products/m/ripex/app/pep/pep.html
Modulation type
List box {FSK, QAM}, default = "FSK"
FSK
Suitable for difficult conditions – longer radio hops, non-line of sight, noise / interferences on
Radio channel…
Note
FSK belongs to the continuous-phase frequency-shift keying family of non-linear mod-
ulations. Compared to QAM (linear modulations), FSK is characterized by narrower
bandwidth, a lower symbol rate and higher sensitivity. As a result, the system gain is
higher, power efficiency is higher, but spectral efficiency is lower.
QAM
Suitable for normal conditions offering higher data throughput.
Note
QAM belongs to the phase shift keying family of linear modulations. Compared to FSK
(non-linear modulations), QAM is characterized by wider bandwidth. The spectral effi-
ciency is higher, power efficiency is lower and system gain is typically lower.
Modulation
FSK modulations:
List box {2CPFSK; 4CPFSK}, default = "2CPFSK"
QAM modulations:
List box {DPSK; π/4DQPSK; D8PSK; 16DEQAM; 64QAM; 256QAM}, default = "DPSK"
Note
For more detailed information see Section 9.2, “Recommended MSE thresholds”.
Note
HW option RipEX2e (product variant ‘C' and 'D’) provides Modulation up to 64QAM.
FEC
List box {2/3; 3/4; 5/6; Off}, default = "Off"
FEC (Forward Error Correction) is a very effective method to minimize radio channel impairments.
Basically, the sender inserts some redundant data into its messages. This redundancy allows the
receiver to detect and correct errors; used is Trellis code with Viterbi soft-decoder. The improvement
comes at the expense of the bitrate. The lower the FEC ratio, the better the capability of error cor-
rection and the lower the bitrate. Bitrate = Modulation rate × FEC ratio.
Radio can receive not only radio frames with the very same setting, but also frames with different type
of modulation - the Auto-speed functionality.
Modulation types which can be combined (with the same radio frequencies, channel spacing and OBW
limit) are:
or
DPSK & π/4DQPSK & D8PSK & 16DEQAM & 64QAM & 256QAM with or without FEC.
This functionality is used especially in the Individual link option (Flexible protocol) and the setting of
the Base - Remote communication settings (in Base Driven Protocol).
7.1.2.3. Encryption
Encryption
List box {Off; AES-256-CCM}, default = "Off"
AES 256-CCM (Advanced Encryption Standard with Cipher Block Chaining-Message Authentication
Code) can be used for encryption and authentication of packets on Radio channel to protect your
data from an intrusion. When AES 256 is On, a control block of 25 Bytes length (13 B nonce + 12
B TAG) is attached to each frame on Radio channel. AES requires an encryption key. The length
of key is 256 bits (32 Bytes, 64 hexa chars). The same key must be stored in all units within the
network.
Mode
List box {Passphrase; Key}, default = "Passphrase"
This parameter occurs only, if parameter "Encryption" is set to "AES-256-CCM".
Passphrase
The key can be automatically generated based on a Passphrase. Fill in your Passphrase (any
printable ASCII character, min. 1 char, max. 128 char). The same Passphrase must be set in
all units within the network. This parameter occurs only, if parameter "Mode" is set to "Pass-
phrase".
Bridge mode with fully transparent Radio protocol is suitable for all polling (request-response) applications
with star network topologies, however repeater(s) are possible.
A packet received through any interface (bridged with the radio interface) is broadcasted to the appro-
priate interfaces of all units within the network.
Any unit can be configured as a repeater. A repeater relays all packets it receives through the radio
channel. The network implements safety mechanisms which prevent cyclic loops in the radio channel
(e.g. when a repeater receives a packet from another repeater) or duplicate packets delivered to the
user interface (e.g. when RipEX2 receives a packet directly and then from a repeater).
Transparent protocol does not solve collisions on the radio channel protocol. There is a CRC check of
data integrity, however, i.e. once a message is delivered, it is 100% error free.
Radio protocol
List box {Transparent; Base driven; None}, default = "Transparent"
Communication mode
List box {Half Duplex; Full Duplex}, default = "Half Duplex"
Full duplex mode is intended to be used mainly for Point-to-Point communication. Full duplex oper-
ation is not possible in networks with repeaters.
Note
HW option RipEX2e (product variant ‘C' and 'D’) enables Half duplex operation only.
Unit is repeater
List box {On; Off}, default = "Off"
Each RipEX2 may work simultaneously as a Repeater (Relay) in addition to the standard Bridge
operation mode.
If "On", every frame received from Radio channel is transmitted to the respective user interface
(ETH, COM) and to the Radio channel again.
The Bridge functionality is not affected, i.e. only frames whose recipients belong to the local LAN
are transmitted from the ETH interface.
It is possible to use more than one Repeater within a network. To eliminate the risk of creating a
loop, the “Number of repeaters” has to be set in all units in the network, including the Repeater
units themselves.
Warning: Should Repeater mode be enabled “Modulation rate” and “FEC” must be set to the same
value throughout the whole network to prevent frame collisions occurring.
No of repeaters
Number {0 – 7}, default = 0
If there is a repeater (or more of them) in the network, the total number of repeaters within the
network MUST be set in all units in the network, including the Repeater units themselves. After
transmitting to or receiving from the Radio channel, further transmission (from this RipEX2) is
blocked for a period calculated to prevent collision with a frame transmitted by a Repeater. Further-
more, a copy of every frame transmitted to or received from the Radio channel is stored (for a
period). Whenever a duplicate of a stored frame is received, it is discarded to avoid possible looping.
These measures are not taken when the parameter “Number of repeaters” is zero, i.e. in a network
without repeaters.
Tx delay [B]
Number {0 – 1600}, default = 0
This parameter should be used when all substations (RTU) reply to a broadcast query from the
master station. In such case massive collisions would ensue because all substations (RTU) would
reply at nearly the same time. To prevent such collision, TX delay should be set individually in each
slave RipEX2. The length of responding frame, the length of Radio protocol overhead, modulation
rate have to be taken into account.
Router mode with Base driven protocol (BDP) is suitable for a star network topology with up to 256
Remotes under one Base station. Each Remote can work as a Repeater for one or more additional
Remotes. This protocol is optimized for TCP/IP traffic and/or ‘hidden’ Remotes in report-by-exception
networks, when a Remote is not be heard by other Remotes and/or different Rx and Tx frequencies
are used.
Frame acknowledgement, retransmissions and CRC check guarantee data delivery and integrity even
under harsh interference conditions on the Radio channel.
Note
There is no need to set any routes in Routing table(s) for Remote stations located behind Re-
peater. Forwarding of frames from the Base station over the Repeater in either direction is
serviced transparently by the Base driven protocol.
Note
When Remote to Remote communication is required, respective routes via Base station have
to be set in Routing tables in Remotes.
The whole network traffic (including transactions) is controlled by the Base station. For this reason, the
List of Remote stations is configured here.
Station type
List box {Base; Remote}, default = "Base"
Note
Only one Base station should be present within one radio coverage when Base driven
protocol is used.
For each Remote station a BDP address (within the BDP network) and Radio parameters are configured
here.
Note
HW option RipEX2e (product variant ‘C' and 'D’) cannot be used as a Base station.
Common Radio channel parameters Modulation type, Modulation and FEC are used for transactions
query on terminal status and for broadcast. The set type of modulation must match with settings in all
terminals within the network.
All frames (to and from Base station) for a given Remote are transmitted with modulation set in this
list. If the transaction is transmitted over a Repeater, the Repeater settings is not used.
Modulation type
List box {2CPFSK; 4CPFSK; DPSK; π/4DQPSK; D8PSK; 16DEQAM; 64QAM; 256QAM}, default
= "2CPFSK"
Modulation and FEC settings for communication with terminal. Settings is used in both directions
of communication. If the terminal is behind repeater, the settings is used all the way (Repeater
settings is not used).
FEC
List box {Off; 2/3; 3/4; 5/6}, default = "Off"
For detailed description see Modulation type above.
ACK
List box {On; Off}, default = "On"
Frame acknowledge enable. Applies to data frames transmitted from Base.
Retries
Number {0 – 15}, default = 3
Frame retries count. Applies to data frames transmitted from Base.
Set value is used in one direction from Base to Remote (Remote to Base direction is configured in
Remote unit in its Radio protocol settings). If the Remote station is behind Repeater, set value is
used for both radio hops: Base station - Repeater and Repeater - Remote.
CTS Retries
Number {0 – 15}, default = 3
Based on sophisticated internal algorithm, Base station sends a CTS (Clear To Send) packet which
allows Remote station to transmit. If the Remote station is connected directly to the Base station
(not behind Repeater), and the Base station doesn't receive a frame from the Remote station, the
Base station repeats permission to transmit.
Connection
List box {Direct; Direct & Repeater; Behind repeater}, default = "Direct"
BDP address
For detailed description see Section 7.1.2.5.3, “Base station - List of Remote stations”.
ACK
List box {On; Off}, default = "On"
Frame acknowledgement enable. Applies to data frames transmitted from Remote to Base.
Retries
Number {0 – 15}, default = 3
Frame retries count. Applies to data frames transmitted from Remote to Base.
Router mode with Flexible protocol is suitable for Multipoint networks of all topologies with unlimited
number of repeaters on the way, and all types of network traffic where Multi-master applications and
any combination of simultaneous polling and/or report-by-exception protocols can be used.
ACK
List box {On; Off}, default = "On"
General setting of acknowledging of received packets. It can be set differently in individual link op-
tions.
Retries
Number {0 – 15}, default = 3
It is possible to add some exceptions for radio links with particular conditions (e.g. longer or shorter
ones than common).
The individual link is defined by Counterpart radio IP. For this link it is possible to set individually
Modulation, FEC, ACK, Retries.
Retries are used to set a number of repeats, when the packet is not acknowledged (in case of ACK
ON). The standard number of retries is 3.
Note
It is highly recommended to set common modulation to the lowest required modulation within
the network. Modulation for Individual link is recommended to set higher, because broadcast
frames are always transmitted over the common modulation.
The Advanced setting option allows to customize radio and radio protocol parameters. Typically these
parameters should remain on default values.
These settings you can find in ADVANCED > Interfaces > Radio > menu
MTU [B]
Number {70 – 1500}, default = 1500 B
If a packet entering to an interface exceeds the maximum value, it is either discarded or fragmented.
Minimum MTU value to establish TCP between RipEX2 units = 576 B.
Minimum MTU value for IPv6 (Babel) = 1280 B.
Maximal distance
Number {0 to 200}, default = 100
This parameter allows to set a maximal distance of a radio hop (in km). The same number shall be
used for the whole network. We recommend to change the value only in case that the network uses
radio hops longer than 100 km.
Resilience
List box {High sensitivity; Auto; High resilience}, default = "Auto"
RipEX2 is equipped with cognitive function of receiving mode selection. When exposed in a radio
environment where strong interfering signals (stronger than -45 dBm) are present, RipEX2 senses
them and adaptively increases its resistance to interference (by lowering its sensitivity by up to 2-
3 dB).
Resilience parameter controls this functionality. By default the Auto is set - when intereference
holds, RipEX2 stays in High resilience mode of receiver operation and signals this state by turning
the yellow RX LED on. Once the interfering signals fade away, RipEX2 automatically returns to its
High sensitivity mode of receiver operation. It is possible to switch this functionality permanently
off (High sensitivity) or permanently on (High resilience).
7.1.2.7.3. Queues
TX Buffers
The Radio protocol transmission buffer handles data waiting to be transmitted. Its size is defined
by both the number of records (Queue length) and total storage space (Queue size) requirement.
Records are held in a queue which is considered full, if either the Queue length or Queue size is
reached. New incoming frames are not accepted when the queue is full.
The TX buffer is active for all radio protocols.
This functionality is available in ADVANCED > Interfaces > Radio > Queues menu
This settings allows to customize individual length and numbers of slots used for accessing of the radio
channel or waiting with retransmissions of an undelivered packet.
The length of the slots has to be same in all radio units within on radio network. It is highly recommended
to consult changes of these parameters with our technical support.
7.1.3. COM
Data incoming to the RipEX2 unit from the COM port are received by the Protocol module. The Protocol
module behavior depends on the Protocol selected. In case of Transparent protocol (available in Bridge
mode only), it is transparently transmitted to the RipEX2 network and sent out through all COM ports
with Transparent protocol selected. If any other protocol is selected, the incoming frame from the COM
port is processed by the Protocol module, translated into UDP frame, forwarded to the RipEX2 router
module and further processed according to router rules. Such UDP frames received by the RipEX2
unit from the RipEX2 network (based on the unit IP address and UDP port of the Protocol module) are
translated into original frame format (by the Protocol module) and send out through the COM port.
When extension module "C" is installed, two additional COM ports (RS232) are available. Their setting
is similar to the COM1 port.
This settings of Baud rate, Data bits, Parity and Stop bits of COM port and setting of connected device
must match.
Type
List box {possible values}, default = "RS232"
Data bits
List box {5; 6; 7; 8}, default = 8, for COM3 (optional) only 8
The number of data bits in each character.
Parity
List box: {None; Odd; Even}, default = "None"
Wikipedia: Parity is a method of detecting errors in transmission. When parity is used with a serial
port, an extra data bit is sent with each data character, arranged so that the number of 1-bits in
each character, including the parity bit, is always odd or always even. If a byte is received with the
wrong number of 1-bits, then it must have been corrupted. However, an even number of errors can
pass the parity check.
Stop bits
List box {1; 2 (1.5)}, default = 1, for COM3 (optional) only 1, for 5 data bits the 1.5 length of stop
bits is used instead of 2
Wikipedia: Stop bits sent at the end of every character allow the receiving signal hardware to detect
the end of a character and to resynchronize with the character stream.
Idle [ms]
Number {10 – 16383}, default = 20
This parameter defines the maximum gap (in milliseconds) in the received data stream. If the gap
exceeds the value set, the link is considered idle, the received frame is closed and forwarded to
the network.
MRU [B]
Number {1 – 2047}, default = 1500
MRU (Maximum Reception Unit) — an incoming frame is closed at this size even if the stream of
bytes continues. Consequently, a permanent data stream coming to a COM results in a sequence
of MRU-sized frames sent over the network.
Note
1. Very long frames (>800 B) require good signal conditions on the Radio channel and the
probability of a collision increases rapidly with the length of the frames. Hence if your ap-
plication can work with smaller MTU, it is recommended to use values in 200 – 400 bytes
range.
Note
2. This MRU and the MTU in Radio settings are independent, however MTU should be
greater or equal to MRU.
Flow control
List box {None; RTS/CTS}, default = "None"
RTS/CTS (Request To Send / Clear To Send) hardware flow control (handshake) between the DTE
(Data Terminal Equipment) and RipEX2 (DCE - Data Communications Equipment) can be enabled
in order to pause and resume the transmission of data. If RX buffer of RipEX2 is full, the CTS goes
down.
Note
RTS/CTS Flow control requires a 5-wire connection to the COM port.
Each SCADA protocol used on serial interface is more or less unique. The COM port protocol module
performs conversion to standard UDP datagrams to travel across RipEX2 Radio network. The same
settings are valid for Terminal servers as well (for more details about TS see Section 7.1.4, “Terminal
servers”).
Protocol
List box {None; Transparent; Async Link; COMLI; DNP3; DF1; IEC101; Mars-A; Modbus RTU;
PR2000; RDS; S3964R; SAIA S-BUS; UNI}, default = "None"
Transparent protocol can be used when unit operates in Bridge mode only. All the traffic is bridged
transparently to RipEX2 network.
Broadcast
List box {On; Off}, default = "On"
Some Master SCADA units sends broadcast messages to all Slave units. SCADA application typ-
ically uses a specific address for such messages. RipEX2 (Protocol module) converts such message
to a customized IP broadcast and broadcasts it to all RipEX2 units resp. to all SCADA units within
the network.
Broadcast address
Number {0 – 65535}, default = 255
The protocol address which is treated as broadcast address.
Address translation
List box {Mask; Table}, default = "Mask"
SCADA protocol address is translated to the IP address using either Mask (common rule for all
addresses) or Table (specific rule per address) type of conversion
Base IP / Mask
A part of Base IP address defined by this Mask is replaced by 'Protocol address'. The SCADA
protocol address is typically 1 byte long, so Mask 24 (255.255.255.0) is most frequently used. This
IP address is used as a destination IP address of the UDP datagram into which the serial SCADA
packet received from COM is encapsulated.
IP address (base)
IP address to which Protocol address will be translated. This IP address is used as a destination
IP address of the UDP datagram into which the serial SCADA packet received from COM is encap-
sulated. When several addresses are used, this will be the first IP address, the following one will
have +1 etc.
Note
All IP addresses used have to be within the same subnet, which is defined by this Mask
The same UDP port is used for all the SCADA units, which results in the following limitations:
Only one SCADA device to one COM port can be connected, even if the RS485 interface
is used.
Note
You may add a note to each address with your comments (UTF8 is supported) for your
convenience.
Some of the SCADA protocols are able to setup additional Slave device response behavior.
Response target IP
IP address to which the response is sent when TARGET is chosen in the Response target mode.
7.1.3.3.1. None
The None protocol switches the COM port off. All incoming data will be thrown away, no data will be
sent into the COM interface.
Operates in Bridge mode only. All the traffic is bridged transparently to RipEX2 network (see Section 5.1,
“Bridge mode” for details).
Async link creates an asynchronous link between two COM ports on different RipEX2 (or M!DGE3)
units. Received frames from COM port or from a Terminal server are sent without any processing
transparently via router to the set IP destination and UDP port. Received frames from the network are
sent to COM or Terminal server according to Destination (UDP port) parameter.
Destination IP
Defines destination IP address of RipEX2 (or M!DGE3).
Transmit as broadcasts
List box {On; Off}, default = "Off"
Allows sending of the packets incoming from COM port as broadcast.
Accept broadcasts
List box {On; Off}, default = "Off"
On: Broadcast packets from the radio channel will be send to the COM port.
Off: Only unicast packets will be sent to the COM port.
7.1.3.3.4. COMLI
COMLI is a serial polling-type communication protocol used by Master-Slave application. When RipEX2
radio network in Router mode is used, more COMLI Masters can be employed within one Radio network
and one Slave can be polled by more Masters. Broadcast packets are not used.
The frame of COMLI protocol is sent transparently, but without STX, ETX and BCC. STX (start of data),
ETX (end of data) and BCC (8-bit XOR) are added on the receiving participant. While transfer, data
integrity is properly secured by individual protocol checksums.
Note
The COMLI protocol in the RipEX2 (or M!DGE3) is not fully compatible on COM port with
RipEX and MR modems. RipEX2 implementation is not supporting “Intercharacter tx delay”.
7.1.3.3.5. DNP3
Each frame in the DNP3 protocol contains the source and destination addresses in its header, so there
is no difference between Master and Slave in terms of the RipEX2 configuration. The DNP3 allows
both Master-Slave polling as well as report-by-exception communication from the remote units.
Broadcast
List box {On; OFF}, default = "On"
Note
There is not an option to set the Broadcast address, since DNP3 broadcast messages al-
ways have addresses in the range 0xFFFD - 0xFFFF. Hence when Broadcast is On,
packets with these destinations are handled as broadcasts.
7.1.3.3.6. DF1
Each frame in the Allen-Bradley DF1 protocol contains the source and destination addresses in its
header, so there is no difference between Master and Slave in the Full duplex mode in terms of RipEX2
configuration.
Duplex mode
List box {Full duplex; Half duplex}, default = “Full duplex“
Mode of DF1 protocol operation: Only Full duplex mode is implemented now.
DF1 advanced parameters
Protocol DF1 supports protocol local acknowledgment. Typically the default setting shall be used.
In case a need it is possible to change ACK parameters in ADVANCED > Generic >
com_x_prot/Protocol_DF1 menu.
ACK locally
List box {On; Off}, default = ”On”
Allows to switch On / Of the local ACK
Repeats
Number {0 – 31}, default = 2
Sets number of repeats when local ACK is nor received.
Note
According to the DF1 specification, packets for the destination address 0xFF are considered
broadcasts. Hence when Broadcast is On, packets with this destination are handled as
broadcasts.
7.1.3.3.7. IEC101
Note
For connected SCADA Master set Master, for connected SCADA Slave set Slave.
Address mode
List box {IEC101; 2B ADDR; TELEGYR; SINAUT; No addr}, default = “IEC101”
Broadcast
List box {On; Off}, default = "On"
7.1.3.3.8. Mars-A
- error correction
MARS-A was widely used by legacy RACOM radio modems in the MORSE system from the year 1999.
The new implementation of this protocol in RipEX2 or M!DGE3 is limited to the parts of the complex
protocol which can be used together with modern packet type of these routers:
USER DATA (0x09) from router to the serial interface (e.g. to RTU),
USER DATA (0x09) and PROT DATA (0x0A) from serial interface (e.g. from RTU) to the router.
Mars-A headers are removed from the packet prior to transmitting to the network - only data are
transmitted.
Repeats
Number {0 – 31}, default = 3
Number of repeats. Repetition is triggered when NAK frame is received or if ACK frame was not
received within ACK timeout.
Security bit
List box {On; Off}, default = "Off"
Needed for compatibility with legacy MORSE network implementations. This parameter does not
change protocol behavior.
CRC
List box {On; Off}, default = "Off"
Error detection algorithm:
• On - CRC algorithm is used
• Off - XOR algorithm is used
When RipEX2 radio network run in Router mode, more Modbus Masters can be used within one Radio
network and one Slave can be polled by more Masters.
Broadcast address
It is possible to set address, which will be handled as a broadcast address while Broadcast =
"On". Default broadcast address of the Modbus RTU protocol is 0.
Response timeout
Number { 0 – 8190}, default = 300
The Response timeout parameter controls how long the unit waits for an acknowledgement
frame. The timeout is started when the original frame received from the Radio channel is
transmitted to the connected device (over the serial channel). Transmission of any other frame
to the connected device is temporarily blocked, whilst Response timeout is active. Response
timeout = 0 disables this feature.
7.1.3.3.10. PR2000
PR2000 is an abbreviation for the PROTEUS 2000 SCADA protocol. This protocol is used in Master-
Slave applications.
The PR2000 protocol is implemented in a fully transparent manner. The original protocol frames are
transported over the RipEX network in their entirety.
The 3964 protocol is utilized by the Siemens Company as a Point-to-Point connection between two
controllers. Meanwhile it has developed into an industry standard that can be found on many devices
as a universal communications interface. 3964R is the same as 3964, in addition it only uses BCC
(Block Check Character). 3964(R) handles only the link layer (L2 in OSI model), hence RipEX uses a
similar way to read “SCADA address” as in UNI protocol.
There is a handshake STX(0x02) – DLE(Ox10) on the start of communication and DLE+ETX – DLE
on the end. This handshake is performed by RipEX locally, it is not transferred over the RipEX network.
* only this packet is transferred over the RipEX network, all the other ones are handled locally.
Master
Address mode
List box {Binary (1 B); Binary (2B LSB first); Binary (2B MSB first)}, default = "Binary (1 B)"
RipEX reads the Protocol address in the format and length set (in Bytes).
Address position
Specify the sequence number of the byte, where the Protocol address starts.
Note
3964(R) protocol is using escape sequence (control sequence) for DLE(0x10). I.e.
when 0x10 is in user data, 0x1010 is sent instead. When address position is calculated,
the bytes added by escape sequence algorithm are not taken into account.
Note
The first byte in the packet has the sequence number 1, not 0.
Slave
Retries [No]
Number {0 – 7}, default = 3
When DLE packet is not received from the connected device (RTU) within the set DLE timeout,
RipEX retransmits the frame. The number of possible retries is specified.
Priority
List box {Low; High}, default = "Low"
When the equipment sends STX and receives STX instead of DLE, there is a collision, both
equipments want to start communication. In such a case, one unit has to have a priority. If the
Priority is High, RipEX waits for DLE. When it is Low, RipEX sends DLE.
Note
Obviously, two pieces of equipment which are communicating together must be set so
that one has High priority and the other has Low.
BCC
List box {On; Off}, default = "On"
BCC (Block Check Character) is a control byte used for data integrity control, it makes the reli-
ability higher. BCC is used by 3964R, 3964 does not use it.
RipEX checks (calculates itself) this byte while receiving a packet on COM. RipEX transmits
DLE (accepts the frame) only when the check result is OK. BCC byte is not transferred over
the RipEX network, it is calculated locally in the end RipEX and appended to the received data.
SAIA S-Bus protocol was widely used by legacy RACOM radio modems in the MORSE system. The
S-Bus protocol is implemented as an access module for communication with the SAIA PCD device.
The protocol is a MASTER/SLAVE type; the MASTER does not have its own address. There can be
at most 254 SLAVEs, the address 255 is reserved for broadcast transmitting which is not acknowledged.
The physical layer of the S-Bus protocol uses the RS232 or RS485 interface. The data addressed to
255 is processed as broadcast.
Protocol frame has to be as whole received in the one buffer, so the IDLE parameter should be set
properly. The S-bus protocol header does not always contain the length of the data, so it is not possible
to work with fragmented and defragmented frames.
Broadcast
List box {On; Off}, default =”On”
When On, the 255 address is treated as a broadcast, When Off, the 255 address is ignored.
Protocol mode
List box {Break; Data}, default =”Break”
Break or Data protocol modes can be used.
Break mode is available only with COM port, it is not implemented on TS (the break signal is
not available there). The Break signal check is very rough (with step of 100 ms) due to Linux
kernel limitations.
Note
See details of the RACOM’s implementation on https://www.racom.eu/eng/sup-
2
port/prot/sbus/index.html
Repeats
Number {0 – 7}, default = 3
Number of repeats when the response from master is not received.
Break mode
(additional parameter)
Master, Slave Plus
Break validity time [ms]
Number {0 – 5000}, default = 1000
Slave, Slave Plus
Break length [ms]
Number {0 – 128}, default = 2
Length of break in ms.
2
https://www.racom.eu/eng/support/prot/sbus/index.html
7.1.3.3.13. RDS
RDS protocol is a protocol used in MRxx networks. It supports network communication; any node in
the network can talk to any other (unlike Master-Slave type of protocols). The RDS protocol is typically
used when combining RipEX and MRxx networks or SCADA networks adapted to MRxx networks.
Frames are received from the Radio channel and sent to COM1-3 or Terminal server 1-5 according to
UDP port settings and vice versa - from wire to Radio channel.
ACK
List box {On; Off}, default = "On"
Frame acknowledgement when transmitted over wire (COM or Ethernet) interface. ACK (0x06)
frames are transmitted on successful reception and NAK (0x15) on unsuccessful frame reception.
Note
ACK timeout is measured from the beginning of the packet transmission.
When "ACK" is enabled, RipEX is waiting "ACK timeout [ms]" after transmitting frame to receive
acknowledgement. If the ACK frame isn't received, the frame is re-transmitted. Frame re-transmission
happens up to "Repeats" number of times.
Repeats
Number {0 – 31}, default = 3
Number of frame re-transmissions.
7.1.3.3.14. UNI
UNI is the 'Universal' protocol utility designed for RipEX. It is supposed to be used when the required
application protocol is not available in RipEX and the network communication is using addressed mode
(which is a typical scenario). The key prerequisite is: messages generated by the Master application
device must always contain the respective Slave address and the address position, relative to the be-
ginning of the message (packet, frame), is always the same (Address position). Generally, two com-
munication modes are typical for UNI protocol: In the first one, communication is always initiated by
the Master and only one response to a request is supported; in the second mode, Master-Master
communication or combination of UNI protocol with ASYNC LINK protocol and spontaneous packets
generation on remote sites are possible.
The UNI protocol is fully transparent, i.e. all messages are transported and delivered without any
modifications.
Adress mode
List box {Binary (1B); ASCII (2B); Binary (2B LSB first); Binary (2B MSB first)}, default = "Binary
(1B)"
Protocol address format and length (in Bytes). ASCII 2-Byte format is read as 2-character hexa-
decimal representation of one-byte value. E.g. ASCII characters AB are read as 0xAB hex (10101011
binary, 171 decimal) value (the ASCII-2-Byte format function will be available in a future FW release).
Address position
Number {1 – 255}, default = 1
Specify the sequence number of the byte, where the Protocol address starts. Note that the first
byte in the packet has the sequence number 1, not 0.
Note
It may happen, that a response from a slave (No.1) is delivered after the respective timeout
expired and the Master generates the request for the next slave (No.2) in the meantime.
In such case the delayed response from No.1 would have been considered as the response
from No.2. When Poll response control is On, the delayed response from the slave No.1
is discarded and the Master stays ready for the response from No.2.
"Off" – The Master does not check packets incoming from the RF channel - all packets are passed
to the application, including broadcasts. That allows e.g. spontaneous packets to be generated at
remote sites. This mode is suitable for Master-Master communication scheme or a combination of
the UNI and ASYNC LINK protocols.
Accept broadcasts
List box {On; Off}, default = "On"
"On" – Broadcast packets received at the radio channel are forwarded to the COM port.
"Off" – Broadcast packets (received at the radio channel) are discarded. Unicast packets are
forwarded to the COM port.
Generally, a Terminal Server (also referred to as a Serial Server) enables connection of devices with
serial interface to a RipEX2 over the local area network (LAN). It is a virtual substitute for devices used
as serial-to-TCP (UDP) converters.
In some special cases, the Terminal server can be also used for reducing the network load from applic-
ations using TCP. A TCP session can be terminated locally at the Terminal server in RipEX2, user data
extracted from TCP messages and processed like it comes from a COM port. When data reaches the
destination RipEX2, it can be transferred to the RTU either via a serial interface or via TCP (UDP),
using the Terminal server again.
Up to 5 independent Terminal servers can be set up. Each one can be either TCP or UDP Type, TCP
Inactivity is the timeout in seconds for which the TCP socket in RipEX2 is kept active after the last
data reception or transmission. As source IP address of a Terminal server will be used the IP address
of the RipEX2 ETH interface (Local preferred source address if exists see Section 7.2.1, “ Static”),
Source (my) port can be set as required. Destination (peer) IP and Destination (peer) port values
belong to the locally connected application (e.g. a virtual serial interface). In some cases, applications
dynamically change the IP port with each datagram. In such a case set Destination port=0. RipEX2
will then send replies to the port from which the last response was received. This feature allows to extend
the number of simultaneously opened TCP connections between a RipEX2 and locally connected ap-
plication to any value up to 10 on each Terminal server. Protocol follows the same principles as a
protocol on COM interface.
Note
Max. user data length in a single datagram processed by the Terminal server is 8192 bytes.
7.1.5. Cellular
RipEX2 optionally provides cellular WWAN interface using embedded cellular module. Two SIM cards
are available, only one can be active at a time.
APN must always be set up, all other parameters can keep their default values.
7.1.5.1. EXT
Note
Routing Mode “WWAN EXT” is added to the Static routing rules definition. When this mode is
selected, the routing Gateway parameter is ignored. The packet is forwarded to the Cellular
(WWAN) interface instead.
Routing rules are enabled / disabled automatically when the Cellular (WWAN) interface is
opened / closed.
No routing rules are added automatically after configuring a new cellular profile. Add all appro-
priate routing manually (e.g., default route 0.0.0.0/0 via WWAN interface).
Note
7.1.5.1.1. Parameters
Masquerade
List box {On; Off}, default = "On"
Enables / Disables SNAT (MASQUERADE) for the packets outgoing from the WWAN interface.
When on, the source address of packets outgoing via the Cellular WWAN interface will be changed
to the address assigned to this interface (WWAN IP address is used instead of internal/LAN IP
addresses). Returning packets will be correctly routed back to its original source (internal device).
Link testing
List box {On; Off}, default = "Off"
Enables / Disables Link testing.
Profile Switching
List box {On; Off}, default = "Off"
Enables / Disables automatic Profile switching.
Set of defined profiles (at least one profile is required), which are setting parameters of requested
service of the network (e.g APN).
Enable profile
Enables / Disables specific profile.
Authentication
List box {None; PAP (legacy); CHAP}, default = "None"
Selects the method of authentication into the APN.
None
No authentication is used for the APN access.
PAP (legacy)
PAP (Password Authentication Protocol) authentication. We do not recommend to use this option
because of security issues (the option is provided to offer legacy systems compatibility). User-
name and Password are required.
CHAP
CHAP (Challenge-Handshake Authentication Protocol) authentication. Username and Password
are required.
Preferred service
List box {2G (GSM) first; 2G (GSM) only; 3G (UMTS) first; 3G (UMTS) only; 2G/3G (GSM/UMTS)
only; 4G (LTE) first; 4G (LTE) only; 3G/4G (UMTS/LTE) only}, default = "4G (LTE) first"
Sets preferences and/or permission of the individual cellular network services.
Header compression
List box {On; Off}, default = "Off"
Enables / Disables the user data traffic IP headers compression. Not used with 4G service.
Data compression
List box {On; Off}, default = "Off"
Enables / Disables the user data traffic data compression. Not used with 4G service.
Network selection
List box {Automatic; Prefer manual; Lock to manual; Lock to home}, default = "Automatic"
Defines the network selection preferences:
Automatic
Network is selected automatically.
Prefer manual
The network according to the Location area identity (LAI) is preferred. Another network will
be selected when the preferred network is not available.
Lock to manual
Only the LAI filled in the Location area identity (LAI) parameter will be used.
Lock to home
Only the home network will be used (if the SIM supports PLMN reading). This option can also
be used as a “switch-off” for the roaming.
MTU [B]
Number {70 – 1500}, default = 1430
Outgoing packets MTU. Default value matches to the value of the mPLS83W module and it is the
most common value within cellular networks.
Minimum MTU value for IPv6 (Babel) = 1280 B.
Note
Optional comment.
Testing not only the connection to the cellular network (Connection check), but the connection with the
destination address(es) as well (Link testing). Tests are in form of sending ICMP ping to defined ad-
dress(es) and waiting for response. This section occurs only, if parameter Link testing is set to "On".
Retries [No]
Number {1 – 20}, default = 3
Target address
IP address, default = 0.0.0.0
Primary tested IP address.
Test mode
List box {One address succeeds; Both addresses succeeds}, default = "One address succeeds"
Defines the success of the test:
• One address succeeds - only one address is enough to pass the test.
Note
If the connection to SIM card fails (missing SIM, wrong PIN), all profiles using that SIM will be
blocked. If all profiles are blocked, the whole Cellular interface service will be blocked.
In case of a malfunction of the current running profile, the module switches automatically to another (if
it is defined). If the module has no more defined profiles to switch to, it switches back to the first one.
After defined time period, the module can try to reconnect via the first profile again (independently on
the profile queue). This section occurs only, if parameter Profile switching is set to "On".
Switching method
List box {On first failure; On failure to reconnect, On timeout}, default = "On first failure"
Defines the way of switching to the next profile, when the connection fails.
• On first failure - after first failure, the module switches to another profile.
• On failure to reconnect - after failure, the module tries to reconnect. If the reconnection is unsuc-
cessful, the module switches to another profile.
• On timeout - the module keeps reconnecting to its current profile for the time period of its timeout
(parameter Connection timeout [min]).
SIM1 and SIM2 tabs contain the same setting for SIM1 and SIM2 respectively.
PIN protection
List box {On; Off}, default = "Off"
Enables / Disables the SIM module PIN protection. It has to be switched on if the PIN is required.
The parameter is ignored if the SIM does not require a PIN.
PIN code
String {0000 – 9999}, default = "0000"
The PIN is used only when PIN protection is On and the module requires the PIN.
Firewall L3
Parameters Input interface and Output interface can filter the traffic either coming to WWAN or
leaving to WWAN (List box WWAN or EXT).
NAT
• SNAT - parameter Output interface can filter the traffic (List box WWAN or EXT).
Rules of SNAT (user settings) have higher priority than rules of MASQUERADE in this section
(parameter Masquerade).
• DNAT - parameter Input interface can filter the traffic (List box WWAN or EXT).
HotStandby
WWAN is activated only in active mode (disabled in passive). In passive mode, the module is dis-
connected from the mobile network.
IPsec
Automatic rules of MASQUERADE do not overwrite the source address of packets, which are en-
capsulated into IPsec.
It is recommended for IPsec to enable MOBIKE, if guided through Cellular.
7.1.5.4. Status
Values are displayed from the moment of opening the SETTINGS menu. The values can be updated
by using Refresh button.
Signal level LED color 2G: RSSI 3G: RSCP 4G: RSRP
Weak / No signal Red <= -95 dBm <= -100 dBm <= -100 dBm
Medium Orange -95 to -84 dBm -100 to -89 dBm -100 to -80 dBm
Good Green -84 dBm <= -89 dBm <= -80 dBm <=
7.2. Routing
RipEX router supports both static and dynamic IP routing.
Static routing is based on fixed – static – definition of routing tables. Dynamic routing is based on
automatic creating and updating of routing tables. Various methods and protocols are used for this
purpose. Babel, OSPF and BGP standard routing protocols are available in RipEX networks.
Link management option was added allowing to set the switchover of the main link (in the event of its
failure) to an existing backup link by automatic changes of routing rules.
7.2.1. Static
RipEX2 works as a standard IP router with multiple independent interfaces: Radio interface, Network
interfaces (bridging physical Ethernet interfaces), COM ports, Terminal servers, optional Cellular interface
etc. Each of the interfaces has its own IP addresses and Masks. All IP packets are processed according
to the Routing table.
Unlimited number of subnets can be defined on the Network interface. They are routed independently.
The COM ports are treated in the standard way as router devices, messages can be delivered to them
as UDP datagrams to selected UDP port numbers. Destination IP address of COM port is either IP of
a Network interface (bridging Ethernet interfaces) or IP of Radio interface. The IP address source of
outgoing packets from COM ports is equal to IP address of interface (either Radio or Network interface)
through which packet has been sent. The source address can also be assigned to Local preferred
source address value - see description below. Outgoing interface is determined in Routing table ac-
cording to the destination IP.
The IP addressing scheme can be chosen arbitrarily, only 127.0.0.0/8 and 192.0.2.233/30 and
192.0.2.228/30 restriction applies. It may happen that also the subsequent addresses from the
192.0.2.0/24 subnet according to RFC5737 may be reserved for internal usage in the future.
Active
{On / Off}
Switches the rule on / off.
Destination IP / mask
IP address, default = 0.0.0.0/0
Each IP packet, received by RipEX2 through any interface (Radio, ETH, COM, ...), has got a des-
tination IP address. RipEX2 (router) forwards the received packet either directly to the destination
IP address or to the respective Gateway, according to the Routing table. Any Gateway has to be
within the network defined by IP and Mask of one of the interfaces, otherwise the packet is discarded.
Each item in the routing table defines a Gateway (the route, the next hop) for the network (group
of addresses) defined by Destination IP and Mask. When the Gateway for the respective destination
IP address is not found in the Routing table, the packet is forwarded to the Default gateway, when
Default gateway (0.0.0.0/0) is not defined, the packet is discarded.
The network (Destination IP and Mask) is written in CIDR format, e.g. 10.11.12.0/24.
Note
Networks defined by IP and Mask for Radio and other interfaces must not overlap.
Note
Network defined by the same combination of Destination IP and Mask cannot be used for
two different rules.
Mode
List box {Static; WWAN}, default = Static
{Static} Used for static IP routing rules. If the next hop on the specific route is over the radio channel,
the Radio IP is used as a Gateway. If Base driven protocol is used and the destination Remote is
behind a Repeater, the destination Remote Radio IP is used as a Gateway (not the Repeater ad-
dress).
Metric
Number {0 – 4294967294}, default = 0
Routing rule metric value.
Note
You may add a name to each route with your comments up to 16 characters (UTF8 is supported)
for your convenience.
Persistent route
List box {On; Off}, default = Off
Sets the persistence (time of presence) of dynamic routing rule.
This parameter is available only if parameter Mode is set to "WWAN (EXT)".
• On - Routing rule is always present. When the WWAN interface is closed, it reports "unreachable"
messages (via ICMP) and the traffic cannot be caught by a different rule.
• Off - Routing rule exists only if the WWAN interface is open. If it is closed, the traffic can be caught
by a different rule.
Table of loopback addresses contains IP addresses of RipEX2, which are set on the loopback interface
as "support" addresses independent on specific interface. Maximum number of addresses is 256.
Loopback addresses can be useful e.g. for specific routing purposes or specific user data traffic. For
example using different routing rules for different traffic.
Enable address
List box {On; Off}, default = "On"
Note
Optional comment.
IP
IP address, default = 0.0.0.0
Defines the IP address which will be set on the loop-back interface. The mask is automatically /32.
The link manager allows to set the switchover of the main link (in the event of its failure) to an existing
backup link by automatic changes of routing rules.
Several links can be defined. The connection through the current link and all higher priority links are
checked. Links with a lower priority can also be checked.
When the current link fails, link manager switches to the next functional link with a lower priority. If the
link is not being checked, it is assumed to be operational and therefore it is also switched to such a
link. All links' interfaces are being checked passively and if configured, actively by ICMP ping as well.
IPsec tunnels can be bound to particular links via Peer ID parameter so they are also swapped respect-
ively.
7.2.3. Babel
Babel is a loop-avoiding distance-vector routing protocol that is designed to be robust and efficient both
in networks using prefix-based routing and in networks using flat routing ("mesh networks"), and both
in relatively stable wired networks and in highly dynamic wireless networks (for more information see
3
RFC6126 ).
Babel is also a dynamic routing protocol for Internet Protocol (IP) networks. It is an Interior Gateway
Protocol (IGP) working within one Autonomous system. It is based on OSPF protocol (see the next
chapter for OSPF protocol description) with the following differences:
Babel protocol is typically used within the network hops or other networks with limited data throughput.
3
https://datatracker.ietf.org/doc/html/rfc6126.html#section-1.1
Configuration parameters are described in the following chapters. Several use case scenarios and
4
configuration examples are described in the Babel Application note .
7.2.3.1. Description
Every router defines which interfaces are used for Babel protocol to search for available network
neighbors.
Each router is periodically transmitting and receiving Hello packets to determine existence and quality
of a connection to neighboring network nodes. The result information about available routes (paths)
and their quality is shared across the network. Routing tables are exchanged periodically and also after
their update.
• Metric is set on each interface. It reflects a “price” for the packet reception. The higher the metric
value, the more disadvantageous is usage of such a path.
• Wired: assumes a reliable link. The quality is evaluated according to the number of received Hello
packets. If configured limit of lost packets is exceeded, the line is considered down.
• Wireless: assumes a variable connection quality. The price of the interface increases gradually witch
each lost Hello packet until the line is declared down.
Routing decision:
4
https://www.racom.eu/download/hw/ripex/free/eng/1_application/ripex2-app-bab-en.pdf
• SETTINGS > Routing > Static routes are valid even if the Dynamic routing is enabled. Dynamic
routing protocols “export” resulting routing rules into Linux and they are added to the existing (static)
routing rules.
• Particular routing decision takes IP mask as a primary decision rule (narrower mask has a higher
priority) and metric as a secondary decision rule. Rules received from dynamic protocols have
higher metric compared to Static routes (they always have the highest possible metric).
• Internal metrics of dynamic protocols are processed only inside them. Only the final set of routing
rules is exported to the Linux router.
Example 1:
• Packet with DST 192.168.1.42 will be routed to 192.168.11.1 because the dynamic rule has a nar-
rower mask.
• Packet with DST 192.168.1.42 will be routed to 192.168.22.1 because the static rule has the same
mask, but better metric.
Router ID
IP address, default = 0.0.0.0
RipEX2 unit acts in the Babel network as a dynamic router. Every router is identified by an ID having
the format of IP address. This IP address does not have to be ‘real’.
Router ID is shared across all dynamic protocols.
Randomize ID
List box {On; Off}, default = "Off"
Advanced feature: Enables randomization of the upper 4 Bytes of the router identification. The
lower 4 Bytes are set by a Router ID parameter. This feature might be used in a case the Babel
node is often restarted resulting in refusing its messages by its neighbors.
Routing offering
List box {On; Off}, default = "On"
Enables propagation of routing rules acquired from the neighbors. When disabled, the incoming
rules are not propagated to other routers and this router behaves as an end point terminal – network
paths are started or terminated in such a point, but do not travel through.
Active
List box {On; Off}, default = "Off"
Enables / disables the interface.
Interface
String {a..z A..Z 0..9}, max 16 char, default = <empty>Interfaces which will be used by Babel for
searching the available connections. Name of an existing unit interface has to be used. Following
interfaces can be used:
LAN – “if_” prefix must be used followed by Network interface name, e.g. “if_LAN-141”
VLAN – “if_” prefix must be used followed by Network interface name, ‘.’ dot and VLAN number,
e.g. “if_LAN-141.29”
Radio – “radio”
GRE L3 – “gre_tunX” where ‘X’ is the tunnel number, starting from zero
Cellular – “ext”
Interface MTU must be 1280 Bytes or bigger in order to operate Babel protocol correctly.
Type
List box {Wired; Wireless}, default = "Wireless"
Type of network interface and also the type of link status evaluation. “Wired” link status is evaluated
by checking the limit of received Hello packets – if not met, the link is considered down. “Wireless”
link is status is evaluated using ETX criteria – each lost Hello packet gradually decreases the link
metric.
Rx cost
Number {1 – 65534}, default = 128
The cost of using this interface to receive packet from a neighbor. It is added to Babel path metric.
Hello limit
Number {1 – 16}, default = 12
For “Wired” interface only: limit of received Hello packets from the 16 expected; if not met, the link
is considered down.
Hello interval
Number {0.1 – 327.0}, default = 4.0
Interval (in seconds) of sending Hello packets.
Authentication
List box {None; Full; Only sign}, default = "None"
Enables packets authentication of Babel protocol.
• Full - packets are signed during transfer and the signature is validated when receiving incoming
packets. Packets with invalid signature are reported to the log and thrown away.
• Only sign - Packets are signed during transfer and the signature is validated when receiving in-
coming packets. Packets with invalid signature are reported to the log and accepted. This settings
is intended for gradual network switch to safe mode.
Authentication algorithm
List box {HMAC SHA256; HMAC SHA384; HMAC SHA512; BLAKE2s-128; BLAKE2s-256; BLAKE2b-
256; BLAKE2b-512}, default = "HMAC SHA256"
Selects the authentication algorithm. This parameter occurs only, if parameter Authentication is
set either to "Full" or "Only sign".
Password
String {up to 128 char}
Defines the password for packets authentication.
Note
Optional comment.
Pre-defined static routing rules to be exported over the Babel protocol. Maximum number of rules is
256.
Active
List box {On; Off}, default = "On"
Enables / disables the static routing rule.
Metric
Number {0 – 65534}, default = 0
Routing rule metric value. The higher the value, the more “expensive” the path is.
Note
Optional comment.
Babel import filter rules. The order of rules matters. Each incoming routing rule is processed by those
Import filters. Maximum number of filter rules is 256.
Active
List box {On; Off}, default = "On"
Enables / disables the filter rule.
Filter network
List box {Off; Match; Not match}, default = "Off"
Method of the routing rule target range comparison.
IP address / mask
IP address / mask, default = 0.0.0.0/0
IP address and mask defining the network range to be compared.
Mask from
Number {0 – 32}, default = 0
Mask to
Number {0 – 32}, default = 32
Definition of the enabled range of the mask length of the processed routing rule.
Examples:
Rule 192.168.1.0/24 {24,32} captures 192.168.1.0/24 and all subnets (for example 192.168.1.1/32)
Rule 10.9.8.7/32 {8,32} captures all ranges having the mask longer than 8 covering the address
10.9.8.7 (e.g. 10.9.0.0/16)
Action
List box {Accept; Reject; Pass}, default = "Accept"
Type of action to be performed when the filter rules above matches the incoming routing rule. When
“Pass” is selected, the packet processing continues.
Set preference
List box {On; Off}, default = "Off"
When enabled, the Preference (see next parameter) will be set to this rule.
Preference
Number {0 – 65535}, default = 210
Routing rule preference in the routing table (to be used when Set preference is enabled). The
higher the number the better the preference.
Note
Optional comment.
Babel export filter rules define set of routing rules to be exported from the unit to other Babel routers.
The order of rules matters. Maximum number of filter rules is 256.
Active
List box {On; Off}, default = "On"
Enables / disables the filter rule.
Filter network
List box {Off; Match; Not match}, default = "Off"
Method of the routing rule target range comparison.
IP address / mask
IP address / mask, default = 0.0.0.0/0
IP address and mask defining the network range to be compared.
Mask from
Number {0 – 32}, default = 0
Mask to
Number {0 – 32}, default = 32
Definition of the enabled range of the mask length of the processed routing rule.
Filter protocol
List box {Off; Match; Not match}, default = "Off"
Selects the way how the routing rule source protocol is compared.
Protocol
List box {System; BGP; BGP external; BGP internal; OSPF}, default = "System"
Selection of the protocol origin. “System” – stands for rules from the ordinary routing table.
OSPF source
List box {Internal; Inter-area; External type 1; External type 2}, default = "External type 2"
OSPF sources. "Internal" – stands for internally generated rule (e.g. interface range). "Inter-area"
– stands for rule generated on the area borders.
OSPF tag
32
Number {0 – (2 -1)}, default = 0
OSPF tag to be compared.
Action
List box {Accept; Reject; Pass}, default = "Accept"
Defines what action is taken on the routing rule. When “Pass” is selected, the packet processing
continues.
Off: The static Metric value (see the following parameter) is used.
BGP MED: MED (Multi-Exit Discriminator) rules from the BGP protocol. If the rule does not have
a MED value filled in, the static Metric value is used.
OSPF metric 1: Metric of OSPF type 1. If the rule does not have a metric value filled in, the static
Metric value is used.
OSPF metric 2: Metric of OSPF type 2. If the rule does not have a metric value filled in, the static
Metric value is used.
OSPF metric sum: Sum of OSPF type 1 a type 2 metrics. If the rule does not have both metric
values filled in, the static Metric value is used.
Metric
Number {0 – 65534}, default = 0
Routing rule metric value. The higher the value, the more “expensive” the path is.
Note
Optional comment.
7.2.4. OSPF
Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks. It uses a link
state routing (LSR) algorithm and falls into the group of interior gateway protocols (IGPs), operating
within a single autonomous system (AS). OSPF Version 2 defined in RFC 2328 (1998) for IPv4 is im-
plemented in the RipEX router. OSPF provides Layer 2 dynamic routing. In the context of RipEX networks
it is typically used for the backhaul network routing.
OSPF splits the network into “areas” to simplify the network topology. There is a primary “backbone”
(0.0.0.0) area and the other areas are connected to this backbone area via border routers.
The route decision process is affected by the path “metric”. There are two types of metrics:
• Metric Type 1 – path length; individual interfaces pass-over costs are added.
• Metric Type 2 – is setup on the rules which are exported to the OSPF from outside. Rules having
metric ‘Type 2’ are always treated as worse (i.e. longer path) comparing to metric ‘Type 1’.
• An address range can be defined for an interface where is the OSPF working. Multiple address
ranges can be defined (behaving as another interface).
• Specific “Cost” is defined for each interface which is added to metric ‘Type 1.’
○ Stub – interface only announces to OSPF: its presence and its address ranges to be propagated
further to the network.
○ Broadcast – to be used in the network where all the participants always hear each other (Ethernet).
Designated Router (DR) and Backup DR (BDR) are setup between the neighbors. They are re-
sponsible for the update propagation (broadcast).
○ NBMA (Non-Broadcast Multiple Access) – to be used in the network where only specific participants
can communicate between each other; all the participants hear each other but multicast is not
available. DR and BDR is setup.
○ Point2Point – network having only two participants. They discover each other using multicast.
○ Point2Multipoint – network where only predefined pairs of participants can hear each other (e.g.
star topology); multicast is not available.
• Static rules can be defined. Such a routing rules are propagated to the network from this router.
• It is possible to define exported routing rules aggregation or specific routing rule hiding.
• It is possible to control the routing rules which are imported into the RipEX unit from the OSPF protocol
and those that are exported into the OSPF protocol from the unit by using ‘filters’.
○ Export filters – to control rules exported from the unit to the OSPF protocol which is propagating
them further.
○ Import filters – to control rules imported from the OSPF into the unit.
Active
List box {On; Off}, default = "Off"
Enables the dynamic routing and the OSPF protocol.
Router ID
IP address, default = 0.0.0.0
RipEX2 unit acts in the OSPF network as a dynamic router. Every router is identified by an ID
having the format of IP address. This IP address does not have to be ‘real’. Router ID is shared
across all dynamic protocols.
Instance ID
Number {0 – 255}, default = 0
OSPF protocol instance number. This number is needed in case of running multiple OSPF protocols
(for example on the border of 2 independent OSPF networks).
OSPF areas RipEX unit belongs to are described here. Maximum number of areas is 32.
Enable / Disable
Enables / disables the specific area.
Area ID
IP address, default = 0.0.0.0
OSPF area identifier. The ID has a format of an IP address. This IP address does not have to be
‘real’. The ‘Router ID’ value is used typically. The default value of 0.0.0.0 is called ‘backbone’ and
it has to be present somewhere in the OSPF network.
Stub area
Click box {On; Off}, default = "Off"
Defines if the area is of a ‘stub’ type – which means, the traffic is not routed through such an area.
Every traffic is originated or terminated in the ‘stub’ area.
Note
Optional comment. It is a good practice to enter some descriptive area name since this value is
displayed (when filled) instead of the Area ID as an Area name in other configuration dialogs (e.g.
Networks configuration).
OSPF interfaces of the respective OSPF area are defined here. Maximum number of interfaces is 128.
Active
List box {On; Off}, default = "Off"
Enables / disables the interface.
Interface
String {a..z A..Z 0..9}, max 16 char, default = <empty>
OSPF interface name. Name of an existing unit interface has to be used. Following interfaces can
be used:
• LAN – “if_” prefix must be used followed by Network interface name, e.g. “if_LAN-141”
• VLAN – “if_” prefix must be used followed by Network interface name, ‘.’ dot and VLAN number,
e.g. “if_LAN-141.29”
• Radio – “radio”
• GRE L3 – “gre_tunX” where ‘X’ is the tunnel number, starting from zero
• Cellular – “ext”
IP address / mask
IP address / mask, default = 0.0.0.0/0
IP address and mask of the address range above which the OSPF protocol will be working on this
interface. The default value is 0.0.0.0/0, which means the whole address range on this interface is
available for the OSPF protocol.
Network type
List box {Broadcast; Point2Point; Point2Multipoint; NBMA; Stub}, default = "Broadcast"
Defines the type of the network behind the interface.
Cost
Number {1 – 65535}, default = 10
The cost of traffic over this interface. The higher the Cost, the worse the path. It is added to OSPF
metric ‘Type 1’.
Hello interval
Number {1 – 3600}, default = 10
Interval (in seconds) of sending Hello packets. The interval must be the same for the all participants
of the given interface.
Poll interval
Number {1 – 3600}, default = 20
Interval (in seconds) of sending Hello packets to inactive neighbors in the NMBA type of interface.
Retransmit interval
Number {1 – 3600}, default = 5
Dead count
Number {2 – 64}, default = 4
Number of lost Hello packets from the neighbor to treat the connection as interrupted.
TTL security
List box {On; Off}, default = "On"
Protection against OSPF packets spoofing.
Authentication, Password
List box {None; Keyed MD5 (OSPFv2); HMAC SHA256; HMAC SHA384; HMAC SHA512}, default
= "None"
Selection of a method to authenticate the OSPF messages. Password is used as a secret key for
the selected hash function. Maximum length of the password is 128 characters.
Priority
Number {0 – 255}, default = 1
Priority is used to select primary or backup router responsible for the routing updates propagation.
The higher the number, the higher the priority. ‘0’ states the router cannot be used as a primary or
backup router.
Use broadcast
List box {On; Off}, default = "Off"
Defines if OSPF packets distribution is provided using multicasts (default behavior) or broadcasts
(nonstandard behavior).
Note
Optional comment. It is possible to enter some descriptive OSPF interface name. This value is
used (when filled) instead of the original Interface identification as an Interface name in other
configuration dialogs (e.g. Neighbors configuration).
7.2.4.2.2. Neighbors
Network neighbors of Point2Multipoint and NBMA types of OSPF interfaces are defined here. Maximum
number of neighbors is 512.
Active
List box {On; Off}, default = "Off"
Enables / disables the interface.
Interface
List box {list of existing OSPF interfaces}
OSPF interface the neighbor belongs to. The interface – Note value is used when defined. The in-
terface – Interface value is used otherwise.
IP
IP address, default = 0.0.0.0
IP address of the neighbor.
Note
Optional comment.
7.2.4.2.3. Networks
The Networks table modifies networks announced out of the area. It enables partial networks aggreg-
ation into the common prefixes or specific network hiding. Maximum number of rules is 256.
Active
List box {On; Off}, default = "Off"
Enables / disables the interface.
Area
List box {list of existing OSPF areas}
OSPF area the record belongs to.
IP address / mask
IP address / mask, default = 0.0.0.0/0
IP address and mask of the range (i.e. network) which will be aggregated or hidden.
Action
List box {Aggregate; Hide}, default = "Aggregate"
• Aggregate – small network prefixes will be exported from this area aggregated into this range
(defined by IP / mask)
• Hide – this network prefix will be hidden and will not be exported
Example:
Area 0.0.0.1 exports two subnets: 192.168.1.0/24 and 192.168.2.0/24. Area border router between
Area 0.0.0.1 and 0.0.0.0 defines a rule for network aggregation: 192.168.0.0/16. As a result of this,
the area border router announces to the area 0.0.0.0 only one route 192.168.0.0/16 instead of the
two individual routes.
Note
Optional comment.
Pre-defined static routing rules to be exported over the OSPF protocol. Maximum number of rules is
256.
Active
List box {On; Off}, default = "Off"
Enables / disables the static routing rule.
Metric type
List box {Type 1; Type 2}, default = "Type 1"
Metric type of the routing rule. Metric 1 is added to the path cost. Metric 2 stays apart and compared
to metric 1 is always bigger.
Metric
Number {1 – 65535}, default = 1000
Routing rule metric value.
OSPF tag
32
Number {0 – (2 -1)}, default = 0
OSPF tag is added to a rule at the moment of its insertion to the network. The tag travels through
the OSPF without any modification so it can be used to distinguish the rule in the filters.
Note
Optional comment.
OSPF import filter rules. The order of rules matters. Each incoming routing rule is processed by those
Import filters. Maximum number of filter rules is 256.
Active
List box {On; Off}, default = "Off"
Enables / disables the filter rule.
Filter network
List box {Off; Match; Not match}, default = "Off"
Method of the routing rule target range comparison.
IP address / mask
IP address / mask, default = 0.0.0.0/0
IP address and mask defining the network range to be compared.
Mask from
Number {0 – 32}, default = 0
Mask to
Number {0 – 32}, default = 32
Definition of the enabled range of the mask length of the processed routing rule.
Examples:
• Rule 192.168.1.0/24{24,32} captures 192.168.1.0/24 and all subnets (for example 192.168.1.1/32)
• Rule 10.9.8.7/32{8,32} captures all ranges having the mask longer than 8 covering the address
10.9.8.7 (e.g. 10.9.0.0/16)
Filter source
List box {Off; Match; Not match}, default = "Off"
Method of the OSPF routing rule source comparison.
Source
List box {Internal; Inter-area; External type 1; External type 2}, default = "External type 1"
Source types comments:
OSPF tag
32
Number {0 – (2 -1)}, default = 0
OSPF tag to be compared.
Action
List box {Accept; Reject; Pass}, default = "Accept"
Type of action to be performed when the filter rules above matches the incoming routing rule.
Set preference
List box {On; Off}, default = "Off"
When enabled, the Preference (see next parameter) will be set to this rule.
Preference
Number {0 – 65535}, default = 200
Routing rule preference in the routing table (to be used when Set preference is enabled). The
higher the number the better the preference.
Note
Optional comment.
OSPF export filter rules define set of routing rules to be exported from the unit into the OSPF area.
The order of rules matters. Maximum number of filter rules is 256.
Active
List box {On; Off}, default = "Off"
Enables / disables the filter rule.
Note
Optional comment.
Filter network
List box {Off; Match; Not match}, default = "Off"
Selects a method of the routing rule destination range comparison.
IP address / mask
IP address / mask, default = 0.0.0.0/0
IP address and mask defines the network prefix to be compared.
Mask from
Number {0 – 32}, default = 0
Mask to
Number {0 – 32}, default = 32
Definition of the enabled range of the mask length of the processed routing rule.
Filter protocol
List box {Off; Match; Not match}, default = "Off"
Selects the way how the routing rule source protocol is compared.
Protocol
List box {System; BGP; BGP external; BGP internal}, default = "System"
Selection of the protocol origin. “System” – stands for rules from the ordinary routing table.
Action
List box {Accept; Reject; Pass}, default = "Accept"
Defines what action is taken on the routing rule. "Pass" continues in processing.
7.2.5. BGP
Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange
routing and reachability information among autonomous systems. BGP is classified as a path-vector
routing protocol, and it makes routing decisions based on paths, network policies, or rule-sets configured
by a network administrator.
BGP splits the network into Autonomous Systems (AS) which are identified by a specific number. Indi-
vidual BGP routers are interconnected with their neighbors using TCP connections. Any connection
can travel over multiple hops. Any connection can be secured using MD5 signatures.
• All BGP routers within given AS must be fully interconnected – every router must have connection
to all other routers.
• It is possible to define ‘Route reflectors’ – they must be fully interconnected. The other routers behave
as Route reflector clients and they need a connection to their reflector only. Route reflector and its
clients form a ‘cluster’. It is possible to create a cluster with multiple Route reflectors for the purpose
of backup.
• The iBGP router having a higher local preference will be preferred during the internal AS path selection.
• It is possible to communicate from the router to the neighbor AS the MED (Multi-Exit Discriminator)
metric designating which of the AS border routers will be used as an input point.
When the routing rules are spread across the multiple AS, those AS are added into the accumulated
path (BGP path). Path length is the primary criteria during the decision which of the routing rules will
be used.
It is possible to prescribe routing rules toward this router which will be spread across the network
(Static rules).
It is possible to control the routing rules which are imported into the RipEX unit from the BGP protocol
and those that are exported into the BGP protocol from the unit by using ‘filters’.
Import IGP filter – controls which of the routing rules from the BGP are accepted to the dynamic
routing table and how
Export IGP filter – controls which of the routing rules from the dynamic routing table are exported to
the BGP and how
Import OUT filter – controls which of the routing rules from the other AS are accepted to the BGP
and how
Export OUT filter – controls which of the routing rules are exported from the BGP to other AS and
how
Routing rules passed on between iBGP and BGP tables are not filtered
Active
List box {On; Off}, default = "Off"
Enables the dynamic routing and the BGP protocol.
Router ID
IP address, default = 0.0.0.0
RipEX unit acts in the BGP network as a dynamic router. Every router is identified by an ID having
the format of an IP address. This IP address does not have to be ‘real’. Router ID is shared with
the OSPF protocol.
Local AS
32
Number {0 – (2 -1)}, default = 65000
Local Autonomous System identification number. AS numbers are assigned by IANA. Part of the
range is reserved for private network usage: 64512 – 65534 and 4200000000 – 4294967294. AS
numbers from this range can be safely used by anyone.
Preference
32
Number {0 – (2 -1)}, default = 100
Router preference within the local AS. The higher the number, the higher the preference.
Static MED
32
Number {0 – (2 -1)}, default = 0
Metric to be used for the preferred input point to the AS selection (see MED (Multi-Exit Discriminator)
description). The higher the number the lower the preference.
Route reflector
List box {Off; On}, default = "Off"
Enables the Route reflector function on this router. iBGP requires connection in between all routers
under normal circumstances. Route reflector makes it possible to avoid this requirement by distrib-
uting routing updates to all its clients. Such clients do not need any other connection except con-
nection to this Route reflector. Route reflector and its clients form a ‘cluster’. See more details at
the beginning of the BGP chapter.
Cluster ID type
List box {Router ID; Manual}, default = "Router ID"
Controls the iBGP cluster identification. Cluster identification must be the same inside the cluster
and it has to be different in another cluster. If the "Router ID" is selected, the Router ID value is
used as a cluster id.
Cluster ID
IP address, default = 0.0.0.0
Cluster identification in the format of an IP address. This IP address does not have to be ‘real’
(valid).
Active
List box {On; Off}, default = "On"
Enables the specific neighbor.
Note
Optional comment.
Neighbor type
List box {Internal; External}, default = "External"
Neighbor router type selection. "Internal" neighbor belongs to the same AS (iBGP). "External" belongs
to other AS (eBGP).
Neighbor AS
32
Number {0 – (2 -1)}, default = 65000
Neighbor AS number.
Neighbor IP
IP address, default = 0.0.0.0
Neighbor router IP address.
Neighbor connection
List box {Direct; Multihop}, default = "Direct"
Network connection type between the neighbors. "Direct" means direct – one hop – connection.
This is typical for eBGP routers. "Multihop" means connection over the multiple routers. This is
typical for iBGP routers.
MD5 authentication
List box {On; Off}, default = "Off"
Enables BGP packets authentication using TCP MD5 Signature extension.
Password
String {up to 128 char}
Password for the MD5 authentication.
Passive
List box {On; Off}, default = "Off"
Passive BGP router does not initiate connection to a neighbor, it is waiting for the neighbor activity.
TTL security
List box {On; Off}, default = "On"
Protection against BGP packets spoofing. [PP1] The Generalized TTL Security Mechanism (GTSM
– RFC 5082) is used. BGP transmits packets with known TTL value. Incoming packets having lower
than expected value (expected number of hops) are discarded.
Expected hops
Number {2 – 32}, default = 2
Number of expected hops between the neighbors.
Set cost
List box {On; Off}, default = "Off"
Enables to set a specific Cost of the BGP connection.
Cost
32
Number {0 – (2 -1)}, default = 10
The cost of connection to this neighbor. The higher the number the higher the cost. It enables to
make decisions inside the router between multiple paths from the same neighbor.
Pre-defined static routing rules to be exported over the BGP protocol. Maximum number of rules is
256.
Active
List box {On; Off}, default = "Off"
Note
Optional comment.
Import IGP filter [PP1] rules. The order of rules matters. Maximum number of filter rules is 256.
Filter policy
List box {Accept; Reject}, default = "Reject"
Defines what action is taken on the routing rules which were not captured (i.e. fallback) in the Import
IGP filter.
Active
List box {On; Off}, default = "On"
Enables / disables the filter rule.
Note
Optional comment.
Filter network
List box {Off; Match; Not match}, default = "Off"
Selects a method of the routing rule destination range comparison.
IP address / mask
IP address / mask, default = 0.0.0.0/0
IP address and mask defines the network prefix to be compared
Mask from
Number {0 – 32}, default = 0
Mask to
Number {0 – 32}, default = 32
Definition of the enabled range of the mask length of the processed routing rule.
Filter source
List box {Off; Internal; External}, default = "Off"
Selection based on the routing rule source. "Internal" selects rules received from the internal (iBGP)
connection. "External" selects rules received from the other AS (eBGP).
Path position
List box {Any; Neighbor; Source}, default = "Any"
Selects position of the specific AS (Path AS). "Any" – anywhere on the path. "Neighbor" – the path
was received from this AS (last on the path). "Source" – routing rule was originated from this AS
(first on the path).
Path AS
32
Number {0 – (2 -1)}, default = 65000
The number of the AS searched for.
Action
List box {Accept; Reject; Pass}, default = "Accept"
Defines what action is taken on the captured [PP1] routing rule. "Pass" continues in processing.
Set preference
List box {Off; On}, default = "Off"
Defines if the specific Preference will be set up for this rule.
Preference
Number {0 – 65535}, default = 100
Routing rule preference in the routing table. The higher the number the higher the preference.
Export IGP filter rules. The order of rules matters. Maximum number of filter rules is 256.
Filter policy
List box {Accept; Reject}, default = "Reject"
Defines what action is taken on the routing rules which were not captured (i.e. fallback) in the Export
IGP filter.
Active
List box {On; Off}, default = "On"
Enables / disables the filter rule.
Note
Optional comment.
Filter network
List box {Off; Match; Not match}, default = "Off"
Selects a method of the routing rule destination range comparison.
IP address / mask
IP address / mask, default = 0.0.0.0/0
IP address and mask defines the network prefix to be compared
Mask from
Number {0 – 32}, default = 0
Mask to
Number {0 – 32}, default = 32
Definition of the enabled range of the mask length of the processed routing rule.
Filter protocol
List box {Off; Match; Not match}, default = "Off"
Selects the way how the routing rule source protocol is compared.
Protocol
List box {System; OSPF}, default = "System"
Selection of the protocol origin. "System" – stands for rules from the ordinary routing table. "OSPF"
stands for rules from the OSPF protocol.
OSPF source
List box {Internal; Inter-area; External type 1; External type 2}, default = "External type 2"
OSPF sources. "Internal" – stands for internally generated rule (e.g. interface range). "Inter-area"
– stands for rule generated on the area borders.
OSPF tag
32
Number {0 – (2 -1)}, default = 0
OSPF tag to be compared. The tag is added to a rule when inserted to OSPF.
Action
List box {Accept; Reject; Pass}, default = "Accept"Defines what action is taken on the routing rule.
"Pass" continues in processing.
Import OUT filter [PP1] rules. The order of rules matters. Maximum number of filter rules is 256.
Filter policy
List box {Accept; Reject}, default = "Accept"
Defines what action is taken on the routing rules which were not captured (i.e. fallback) in the Import
OUT filter.
Filter limit
Number {1 – 65535}, default = 1024
Limit of the accepted routing rules from the neighbor. The limit applies before this Import OUT filter.
Excess rules are dropped.
Active
List box {On; Off}, default = "On"
Enables / disables the filter rule.
Note
Optional comment.
Filter network
List box {Off; Match; Not match}, default = "Off"
Selects a method of the routing rule destination range comparison.
IP address / mask
IP address / mask, default = 0.0.0.0/0
IP address and mask defines the network prefix to be compared
Mask from
Number {0 – 32}, default = 0
Mask to
Number {0 – 32}, default = 32
Definition of the enabled range of the mask length of the processed routing rule.
Path position
List box {Any; Neighbor; Source}, default = "Any"
Selects position of the specific AS (Path AS). "Any" – anywhere on the path. "Neighbor" – the path
was received from this AS (last on the path). "Source" – routing rule originates from this AS (first
on the path).
Path AS
32
Number {0 – (2 -1)}, default = 65000
The number of the AS searched for.
Action
List box {Accept; Reject; Pass}, default = "Accept"
Defines what action is taken with the matching routing rule. "Pass" continues in processing.
Prepend local AS
Number {0 – 8}, default = 0
Enables to append (even multiple times) local AS number to the BGP path end – making the path
virtually longer. The longer path is handicapped during the comparisons and selections.
Export OUT filter rules. The order of rules matters. Maximum number of filter rules is 256.
Filter policy
List box {Accept; Reject}, default = "Accept"
Defines what action is taken on the routing rules which were not captured (i.e. fallback) in the Export
OUT filter.
Active
List box {On; Off}, default = "On"
Enables / disables the filter rule.
Note
Optional comment.
Filter network
List box {Off; Match; Not match}, default = "Off"
Selects a method of the routing rule destination range comparison.
IP address / mask
List box {Off; Match; Not match}, default = "Off"
IP address and mask defines the network prefix to be compared
Mask from
Number {0 – 32}, default = 0
Mask to
Number {0 – 32}, default = 32
Definition of the enabled range of the mask length of the processed routing rule.
Filter protocol
List box {Off; Match; Not match}, default = "Off"
Selects the way how the routing rule source protocol is compared.
Protocol
List box {System; OSPF; BGP; BGP external; BGP internal}, default = "System"
Selection of the protocol origin. "System" – stands for rules from the ordinary routing table.
OSPF tag
32
Number {0 – (2 -1)}, default = 0
OSPF tag to be compared. The tag is added to a rule when inserted to OSPF.
Path position
List box {Any; Neighbor; Source}, default = "Any"
Selects position of the specific AS (Path AS). "Any" – anywhere on the path. "Neighbor" – the path
was received from this AS (last on the path). "Source" – routing rule was originated from this AS
(first on the path).
Path AS
32
Number {0 – (2 -1)}, default = 65000
The number of the AS searched for.
Action
List box {Accept; Reject; Pass}, default = "Accept"
Defines what action is taken on the routing rule. "Pass" continues in processing.
7.3. Firewall
7.3.1. Firewall L2
Filter mode
List box {Off; Blacklist; Whitelist}, default = "Off"
Blacklist
The MAC addresses listed in the table are blocked, i.e. all packets to/from them are discarded.
The traffic to/from other MAC addresses is allowed.
Whitelist
Only the MAC addresses listed in the table are allowed, i.e. only packets to/from them are al-
lowed. The traffic to/from other MAC addresses is blocked.
Active
List box {Off; On}, default = "On"
If "On", Layer 2 Linux firewall rule is activated.
Interface
List box {All; ETH1..ETH5}, default = "All"
MAC
IPv4 MAC address
Note
L2 firewall settings do not impact the local ETH access, i.e. settings never deny access to a
locally connected RipEX2 (web interface, ping, ...).
7.3.2. Firewall L3
7.3.2.1. Forward
Set of rules applying for the traffic coming through the radio modem.
L3
Enables / disables L3 firewall; default = "Off"
Each individual firewall rule is described by following parameters:
Protocol
List box {All; ICMP; UDP; TCP; GRE; ESP; Other}, default = "All"
Source IP / Mask
The rule with narrower mask has higher priority. The rule’s order does affect priority.
Input interface
List box {All; Radio; All ETH; EXT; ETH1..ETH5; GRE L2; GRE L3; HotStandby; Other}, default =
"All"
Destination IP / Mask
Defines the destination IP subnet.
Output interface
List box {All; Radio; All ETH; EXT; GRE L3; HotStandby; Other}, default = "All"
Relates to the first packet when a TCP connection starts (Request from TCP client to TCP server
for opening a new TCP connection). Used e.g. for allowing to open TCP only from RipEX2 network
to outside.
Note
Management connection to a remote RipEX2 may be lost, when another RipEX2 acts as
a router along the management packets path and TCP port 8889 (Remote Access) is dis-
abled (DENY rule) in L3 firewall settings of that routing RipEX2 (FORWARD chain).
Action
List box {Deny; Allow}, default = "Deny"
7.3.2.2. Input
Set of rules applying for traffic heading into the radio modem. Incoming traffic from unwanted source
addresses can be blocked by setting parameter Action to "Deny, add to the blocklist".
L3
Enables / disables L3 firewall; default = "Off"
Each individual firewall rule is described by following parameters:
Service
Rules, that open management access through service interfaces.
List box {Other; COM1; COM2; COM3; TS1; TS2; TS3; TS4; TS5; SSH; HTTP; HTTPS; Remote
access; SNMP; NTP}, default = "Other"
Protocol
List box {All; ICMP; UDP; TCP; GRE; ESP; Other}, default = "All"
Source IP / Mask
Source IP address and mask. The rule with narrower mask has higher priority. The rule’s order
does affect priority.
Input interface
List box {All; Radio; All ETH; EXT; ETH1..ETH5; GRE L2; GRE L3; HotStandby;Other}, default =
"All"
Note
Management connection to a remote RipEX2 may be lost, when another RipEX2 acts as
a router along the management packets path and TCP port 8889 (Remote Access) is dis-
abled (DENY rule) in L3 firewall settings of that routing RipEX2 (FORWARD chain).
Action
List box {Deny; Allow; Deny, Add to Blocklist}, default = "Deny"
Deny, Add to Blocklist - all traffic from the particular address will be automatically dropped. Blocklist
has limited capacity of 512 addresses. Once its capacity is exceeded, the oldest address is over-
written. Addresses added to the blocklist remain in for one week (604,800s) and are deleted from
it afterwards. Change of configuration including firewall, or unit reboot will delete those addresses
as well.
7.3.2.3. Output
Set of rules applying for the traffic leaving from the radio modem.
L3
Enables / disables L3 firewall; default = "Off"
Each individual firewall rule is described by following parameters:
Service
Rules, that allow returning management packets (replies) through service interface.
List box {Other; COM1; COM2; COM3; TS1; TS2; TS3; TS4; TS5; SSH; HTTP; HTTPS; Remote
access; SNMP; NTP}, default = "Other"
The rule’s order does affect priority.
Protocol
List box {All; ICMP; UDP; TCP; GRE; ESP; Other}, default = "All"
Destination IP / Mask
Defines the destination IP / subnet.
Note
Management connection to a remote RipEX2 may be lost, when another RipEX2 acts as
a router along the management packets path and TCP port 8889 (Remote Access) is dis-
abled (DENY rule) in L3 firewall settings of that routing RipEX2 (FORWARD chain).
Action
List box {Deny; Allow}, default = "Deny"
Note
Optional comment.
Network address and port translation (NAPT) is a method of mapping an IP address (or port) space
into another by modifying network address information in the IP header of packets while they are in
transit across a traffic routing device.
Source Network Address Translation (SNAT) - rewrites the source address and/or port within the
leaving connection and performs opposite changes for returning packets.
SNAT:
• Allows to pretend, that the packets come from a device, that performs SNAT.
• Performs during packet output from a device (after routing and filtering in firewall).
Enable
List box {Enable; Disable}, default = "Disable"
Enables / disables all Source NAT rules.
Parameters “Source port from”, “Source port to”, “Destination port from” and “Destination
port to” occur only if parameter “Protocol” is set to “UDP” or “TCP”.
Protocol
List box {All; ICMP; UDP; TCP; GRE; ESP; Other}, default = "All"
Filters selected protocol. If none of the mentioned values suits, select “Other”.
Protocol number
Number {0 – 255}, default = 1
This parameter occurs only, if parameter “Protocol” is set to “Other”.
Source IP / Mask
IP address, default = 0.0.0.0/0
Defines the source IP subnet.
Destination IP / Mask
IP address, default = 0.0.0.0/0
Output Interface
List box {All; Radio; All ETH; EXT; GRE L3; HotStandby; Other}, default = "All"
Filters selected interfaces.
Range mapping
List box {Off; IP address to IP address}, default = "Off"
Off – Source address and (or) port will be replaced by values from parameters “Rewrite source
IP” and “Rewrite source port”. This applies only if those parameters are set (they are not set as
0.0.0.0).
IP address to IP address (NETMAP) – Rewriting the Range mapping of source IP address. New
source address will contain prefix from parameters “Rewrite Source IP” and “Rewrite Source IP
/ Mask”. Rest of the source address will be filled by the original source address.
Rewrite source IP
IP address, default = 0.0.0.0/0
Defines a new source address. Value 0.0.0.0/0 means, that the source address is not changed.
Note
Optional comment.
Destination Network Address Translation (DNAT) - rewrites the destination address and/or port within
incoming connection and performs opposite changes for returning packets.
DNAT:
• Performs during packet input to a device (before redirecting and filtering in firewall).
Enable
List box {Enable; Disable}, default = "Disable"
Enables / disables all Destination NAT rules.
Parameters “Source port from”, “Source port to”, “Destination port from” and “Destination
port to” occur only if parameter “Protocol” is set to “UDP” or “TCP”.
Protocol
Filters selected protocol. If none of the mentioned values suits, select “Other”.
Protocol number
Number {0 – 255}, default = 1
This parameter occurs only, if parameter “Protocol” is set to “Other”.
Source IP / Mask
IP address, default = 0.0.0.0/0
Defines the source IP subnet.
Destination IP / Mask
IP address, default = 0.0.0.0/0
Defines the destination IP subnet.
Input interface
List box {All; Radio; All ETH; EXT; GRE3; HotStandby; Other}, default = "All"
Filters selected interfaces.
Range mapping
List box {Off; IP address to IP address}, default = "Off"
• Off – Destination address and (or) port will be replaced by values from parameters “Rewrite
destination IP” and “Rewrite destination port”. This will apply only if those parameters are set
(they are not set as 0.0.0.0).
• IP address to IP address (NETMAP) – Rewriting the Range mapping of source IP address. New
source address will contain prefix from parameters “Rewrite Source IP” and “Rewrite Source
IP / Mask”. Rest of the source address will be filled by the original source address.
Example:
Input interface
Data must be received on any ETH port
Range mapping
Set to “Port to IP address” - i.e., destination ports change the destination IP address(es) ac-
cordingly.
Rewrite destination IP
IP address, default = 0.0.0.0/0
Defines a new destination address. Value 0.0.0.0/0 means, that the destination address is not
changed.
Note
Optional comment.
• MASQUERADE rule for Cellular connection has lower priority that user NAT (it is tested after the
NAT), thus it is possible to create exceptions in NAT settings.
• By using DNAT it is possible to intercept a passing connection and redirect it into the RipEX2 (similar
to a proxy behavior).
• For redirection
○ Service port, to which is the local address being redirected will be filled into “Rewrite destination
port” parameter.
• DNAT can be used before packing a packet into the IPsec. For more information see Section 7.4.1.3,
“Interaction with DNAT”.
• SNAT can be used before packing a packet into the IPsec (parameter “Output interface” must be
set to “All”)
• Rules of SNAT and MASQUERADE (from Cellular) changes packets addresses before capturing by
IPsec traffic selector.
7.4. VPN
VPN (Virtual Private Network) extends a private network across a public network, and enables users
to send and receive data across shared or public networks as if their computing devices were directly
connected to the private network. Applications running across the VPN may therefore benefit from the
functionality, security, and management of the private network.
7.4.1. IPsec
Internet Protocol Security (IPsec) is a network protocol suite that authenticates and encrypts the
packets of data sent over a network. IPsec includes protocols for establishing mutual authentication
between agents at the beginning of the session and negotiation of cryptographic keys for use during
the session. IPsec uses cryptographic security services to protect communications over Internet Protocol
(IP) networks. IPsec supports network-level peer authentication, data-origin authentication, data integrity,
data confidentiality (encryption), and replay protection. IPsec is an end-to-end security scheme operating
within the Internet Layer of the Internet Protocol Suite. IPsec is recognized as a secure, standardized
and well-proven solution by the professional public.
Although there are 2 modes of operation, RipEX2 only offers a Tunnel mode. In Tunnel mode, the entire
IP packet is encrypted and authenticated. It is then encapsulated into a new IP packet (ESP – Encap-
sulating Security Payloads) with a new IP header.
Symmetrical cryptography is used to encrypt the packets. The symmetric keys must be safely delivered
to the peer. In order to maintain a secure connection, symmetric keys must be regularly exchanged.
The protocol used for secure key exchange is IKE (Internet Key Exchange). Both IKE version 1 and
the newer version 2 are available in RipEX2.
IKE protocol communication with the peer is established using UDP frames on port 500. However, if
NAT-T (NAT Traversal) or MOBIKE (MOBile IKE) are active, the UDP port 4500 is used instead.
Note
The IPsec tunnel is provided by Security Association (SA). There are 2 types of SA:
• IKE SA: IKE Security Association providing SA keys exchange with the peer.
Every IPsec tunnel contains 1 IKE SA and at least 1 CHILD SA. In RipEX2 can be set maximum of 24
IKE_SA and 48 CHILD_SA (TS).
Link partner (peer) secure authentication is assured using Pre-Shared Key (PSK) authentication
method: Both link partners share the same key (password).
As and when the CHILD SA expires, new keys are generated and exchanged using IKE SA.
As and when the IKE SA version IKEv1 expires - new authentication and key exchange occurs and a
new IKE SA is created. Any CHILD SA belonging to this IKE SA is re-created as well.
As and when the IKE SA version IKEv2 expires one of two different scenarios might occur:
• It the re-authentication is not required - only new IKE SA keys are generated and exchanged.
IPsec
{Enable; Disable}, default = "Disable"
IPsec system turning On/Off
There can be a maximum of 16 active CHILD SA (in total over all Active IKE SA).
Every "Active" line must have an equivalent on the peer side with reversed "Local network..." and
"Remote network..." fields.
"Local network..." and "Remote network..." fields must contain different address ranges and must
not interfere with the USB service connection (10.9.8.7/28) or internal connection to FPGA
(192.0.2.233/30).
Each "Active" Traffic selector in the configuration table must be unique.
Make-before-break
{On; Off}, default = "Off"
This parameter is valid for all IKE SA using IKEv2 with re-authentication. A temporary connection
breaks during IKE_SA re-authentication is suppressed by this parameter. This function may not
operate correctly with some IPsec implementations (on peer side).
To further configure IPsec VPN tunnel, click the Add VPN configuration button.
Start state
List box {Passive; On demand; Start}, default = "Passive"
MOBIKE
List box {On; Off}, default = "On"
Enables MOBIKE for IKEv2 supporting mobility or migration of the tunnels. Please note IKE is
moved from port 500 to port 4500 when MOBIKE is enabled. The peer configuration must match.
It is strongly recommended to use MOBIKE mode in case of routing the traffic over the Cellular
interface.
are initialized). In the case when Detection is not enabled, a connection loss is discovered when
regular key exchange process is initiated.
DPD action
List box {Clear; Hold; Restart}, default = "Hold"
One of three connection states automatically activated when connection loss is detected:
Clear – connection is closed and waiting
Hold – connection is closed. Connection is established when first packet transmission through
tunnel is attempted.
Restart – connection is established immediately
This parameter is available only if parameter Dead Peer Detection is set to "On".
Phase 1 IKE
Parameters related to IKE SA (IKE Security Association) provide SA keys exchange with the peer.
Authentication method
List box {PSK}
Peer authentication method. Peer configuration must match.
The "main mode" negotiation is the only option supported. The "aggressive mode" is not sup-
ported; it is recognized as unsafe when combined with PSK type of authentication.
Encryption algorithm
List box {3DES (legacy); AES128; AES192; AES256}, default = "AES128"
IKE SA encryption algorithm. The "legacy" marked methods are recognized as unsafe. Peer
configuration must match.
Hash algorithm
List box {MD5 (legacy); SHA1 (legacy); SHA256; SHA384; SHA512}, default = "SHA256"
IKE SA integrity algorithm. The "legacy" marked methods are recognized as unsafe. Peer con-
figuration must match.
Reauthentication
List box {On; Off}, default = "Off"
This parameter is valid if IKEv2 is used. It determines the next action after IKE SA has expired.
When enabled: the new IKE SA is negotiated including new peer authentication. When disabled:
only the new keys are exchanged.
SA lifetime [s]
Number {180 – 86400}, default = 14400 s (4 hours)
Time of SA validity. The new key exchange or re-authentication is triggered immediately the
key expires. The true time of expiration is randomly selected within the range of 90-110%.
Unfortunately, the more frequent the key exchange, the higher the network and CPU load.
Note
If low capacity channel is used, the RipEX2’s channel load can affected during the key
exchange process.
Phase 2 – IPsec
Certain parameters are shared by all subordinate CHILD SA. IPsec Security Association provides
packet encryption (user traffic encryption).
Encryption algorithm
List box {3DES (legacy); AES128; AES192; AES256}, default = "AES128"
IKE CHILD SA encryption algorithm. The "legacy" marked methods are recognized as unsafe.
Peer configuration must match.
Hash algorithm
List box {MD5 (legacy); SHA1 (legacy); SHA256; SHA384; SHA512}, default = "SHA256"
IKE CHILD SA integrity algorithm. The "legacy" marked methods are recognized as unsafe.
Peer configuration must match.
The same value as selected for the Integrity algorithm, is used for the PRF (Pseudo-Random
Function).
Payload compression
This parameter enables payload compression. This takes place before encryption. Peer config-
uration must match.
SA lifetime [s]
Number {180 – 86400}, default = 3600 s (1 hour)
Time of CHILD SA validity. The new key exchange or re-authentication is triggered immediately
the key expires. The true time of expiration is randomly selected within the range of 90-110%.
The SA lifetime for CHILD SA is normally much shorter than SA lifetime for IKE SA because
the CHILD SA normally transfers much more data than IKE SA (key exchange only). Changing
the keys serves as protection against breaking the cypher by analyzing big amounts of data
encrypted by the same cypher.
Note
If low capacity channel is used, the RipEX2’s channel load can affected during the key
exchange process.
PSK
PSK (Pre-shared key) authentication is used for IKE SA authentication. The relevant peer is identified
using it's "Peer ID". The key must be the same for both local and peer side of the IPsec.
Mode
List box {Passphrase; Key}, default = "Passphrase"
Passphrase
The PSK key is entered as a password. Empty password is not allowed (max. length is 128
characters). Passphrase must not contain any unsupported characters. Unsupported characters
are: ", `, \, $, ;.
Key
It is possible to set 256 bits long Key instead of Passphrase. This parameter occurs only, if
parameter Mode is set to "Key".
Peer Address
Default = 0.0.0.0
IKE peer IP address.
Local ID
IP address or FQDN (Fully Qualified Domain Name) is used as the Local side identification. It must
be the same as "Peer ID" of the IKE peer.
Peer ID
IP address or FQDN (Fully Qualified Domain Name) is used as the IKE peer identification. It must
be the same as "Local ID" of the IKE peer. The "Peer ID" must be unique in the whole table.
Defines which traffic is forwarded to the IPsec tunnel. The rule that defines this selection matches an
incoming packet to "Local network ..." and "Remote network ..." address ranges.
Protocol
List box {All; ICMP; UDP; TCP; GRE; ESP; Other}, default = "All"
Defines the transport protocol of packets which will be caught and encrypted.
Protocol number
Number {1 – 255}, default = 1
Defines the number of the transport protocol of packets which will be caught and encrypted. This
parameter is available only if parameter Protocol is set to "Other".
If IPsec captures packets which were modified by DNAT, routing rules automatically created by IPsec
rules will not apply to them, because DNAT rewrites their destination address. Therefore a new static
routing rule must be created (SETTINGS > Routing > Static) for those packets.
7.4.2. GRE L2
GRE L2 tunnel is interconnected to the bridge (LAN interface) as one of the bridge’s port, it captures
Ethernet frames of the bridge and sends them to the other end of the tunnel. It enables to build bridge
via the complex network and combine the local partial networks to one network.
GRE L2 tunnel can be used to tunnel the Q-in-Q and IPv6 traffic over the RipEX IPv4 network.
GRE L2 Enable
Switches all L2 tunnels On or Off.
Individual L2 tunnels:
Enable
Enables particular L2 tunnel. Maximum number of configurable tunnels is 256.
Note
Optional comment.
Peer address
IP address of the equipment with the second end of the tunnel. This address is the expected source
address of incoming GRE packets from the peer.
Key enabled
Enables using key identification of the tunnel from/to the same peer.
Key
Identification number of the tunnel Number {0 – 4,294,967,295}, default = 0
MTU [B]
MTU of the L2 tunnel. Number {74 – 1500}, default = 1430 B
Overhead of the L2 tunnel is 38 B, so it should be GRE MTU = Path MTU - 38.
Minimum MTU value to establish TCP between RipEX2 units = 576 B.
Note
For traffic in bridged network (e.g. when using Transparent protocol), it is necessary to set
the MTU to a proper value, otherwise there is a risk of packet fragmentation and thus
compromising efficiency and reliability of the transfer.
7.4.3. GRE L3
GRE L3 tunnel works as an additional unit’s interface with its own IP address (and mask). The routing
rules are used for sending packets to this interface. It bridges part of the network, so it seems to be
one hop for the user traffic.
GRE L3 Enable
Switches all L3 tunnels On or Off.
Individual L3 tunnels:
Enable
Enables particular L3 tunnel. Maximum number of configurable tunnels is 256.
Note
Optional comment.
Peer address
IP address of the equipment with the second end of the tunnel. This address is the expected source
address of incoming GRE packets from the peer.
Key enabled
Enables using key identification of the tunnel from/to the same peer.
Key
Identification number of the tunnel Number {0 – 4,294,967,295}, default = 0
MTU
MTU of the L2 tunnel. Number {70 – 1476}, default = 1476
Overhead of the L3 tunnel is 24 B, so it should be GRE MTU = Path MTU - 24. If the MTU is
bigger than is allowed along the route, the GRE packets will be discarded and ICMP report will be
send back to the source of the original packet (Path MTU discovery).
7.5. Security
User authentication is required to access RipEX unit management. There are two types of user authen-
tication which differ in the user account location:
Local authentication – user accounts are stored directly in the RipEX unit
Remote authentication – user accounts are stored on a remote authentication server (RADIUS is
implemented)
There are four different levels of user access privileges – they are bound with four different user access
roles:
Guest (role_guest)
Read only access for configuration parameters (except secured part of configuration). Diagnostics
tools are available.
Technician (role_tech)
All privileges of Guest role plus: write access for non-secured part of configuration; unit firmware
up/down-grade.
Administrator (role_admin)
No access level restrictions. All privileges of Security technician role plus: user accounts manage-
ment; remote authentication configuration.
Limitations:
Maximal number of concurrently active sessions is 64. One user can have multiple sessions opened
in the same time. If this limit is reached and a new session is to be opened, the oldest active session
is deactivated and a new one is opened.
Note
The Remote access uses local identity and role of the user – there is no additional login to
the remote unit (the login into local unit serves as login to the whole network).
User access serves for enabling/disabling and setting of used protocol access. It can be used for setting
a non-standard port for the protocol as well.
Note
Note
When changing settings of HTTP or HTTPS, linux service LigHTTPd restarts. Because of that,
the waiting time period for update in the web ends a returns Error: Connection to device timed
out.
The following settings are available only for user with the Administrator role.
Following user account parameters can be changed: password, user role. Any account (expect the last
one of Administrator role) can be deleted.
Export all users button provides backup of all Local user accounts into a file.
Import all user button provides restoration of all Local user accounts from a backup file. Active session
is logged out automatically after this command.
+ Add user account button invokes new user account creation dialog:
Username
String {1–128 char}, default = <empty>
New Username. Every username in the unit must be unique.
Password
String {5–128 char}, default = <empty>
Password is stored in a secure way.
Role
List box {Admin; Security Technician; Technician; Guest}, default = "Admin"
Note
It is highly recommended to create a new administrator type of account and delete the
default “Admin” account.
Advanced feature
When the user account is not active for some time, the user will be automatically logged-out. The in-
activity timeout of the account is set for 1 day by default. It is possible to change in the range of 5
minutes up-to 2 days (menu ADVANCED > Generic > UserAccess > Web inactivity timeout).
Note
7.5.2.2. Settings
Note
The settings are applicable for new passwords only, already existing passwords will not
be affected.
7.5.3. Credentials
RipEX2 units feature a unified storage solution for keys, certificates and other credentials. This storage
is secured and only accessible to users with Sectech permission and higher.
Credentials are separate from configuration to improve security and it also is protected using checksum
to prevent unauthorised modification. Because of this all Repository/Key changes are executed imme-
diately and do not go through the “Changes” workflow like the regular configuration.
Note: In this manual and in the user interface we are calling all Credential storage entries “Keys”. While
this is a simplification, we believe it is understandable. Further on “Keys” are all keys, public and private
certificates, DH parameters, CA chains etc.
Warning: Downgrading the Unit will always reset all Credentials to defaults.
7.5.3.1. General
Credentials are stored in Repositories. Repository is a reserved space, which contains 0-1 Key and is
addressable via its ID in the rest of the unit configuration. This construct, while it may seem complicated
at first, brings major benefits. Mainly the user can simply update expired certificates in a repository
without any need to change configuration using that Repository.
There are two types of Keys: Read-only, easily identifiable by a lock icon and “_RO_” prefix. These
Keys are built into firmware, or generated automatically on device. The rest are user-defined keys.
Admin website allows users to perform various operations with the keys and repositories.
Using buttons on the bottom of the page we also allow users to download complete credential backup.
There are two ways to restore credentials: Replace, which replaces all Keys with ones from the file,
and Update, which merges current and new Keys.
7.5.3.2. Credentials
Credentials show all Repositories and Keys currently on the device. Users can filter them by type and
show only valid or all Keys. The card border and bottom label indicate whether the Repository is empty,
or whether the Key is valid or invalid.
Each card represents a Repository. Card title is Repository ID. All user-defined repositories can be
edited using the “Edit” button and deleted using the red “Delete” button.
ID
Unique identifier used to reference Repository in configuration.
Validated according to regular expression: [a-zA-Z0-9\_]\\{1,128\\}. IDs starting with underscore “_”
are reserved for Read Only keys.
Type
Defines the type of Key the Repository can contain.
Note
Optional comment.
There are several operations, that can be performed on a repository:
Info
Displays Key info including checksums.
Generate
Generates a new Key using local Certification authority (see below).
Update
Updates the Key with a new one. Both file and text, encrypted and unencrypted Keys are supported.
Download
Allows download of the Key. Both encrypted and unencrypted downloads are supported, according
to Setting (see below).
Shortcut operations “Generate key” and “Upload key” allow users to create a Repository and gener-
ate/upload a key into it. These buttons cannot be used to modify existing repositories.
_RO_Ssh_Host_Key
Type: SSH Key (PRI)
The SSH host key used to authenticate the server on the client. If missing, it is generated when
the station boots.
_RO_Rmt_Access_Host_Key
Type: RMTACCESS Key (PRI)
Host key for the Remote access server (QSSH). It is used to authenticate the server.
If missing, it is generated when the station starts.
_RO_Rmt_Access_Client_Key
Type: RMTACCESS Key (PRI)
Key for Remote access (QSSH) client login to the server. Must be present on both sides.
Obtained from FW. If it differs from the version in FW, it is updated.
_RO_Web_Private_Key
Type: Certificate (PRI)
_RO_Web_Cert
Type: Certificate Key (PUB)
Web server certificate (default).
Obtained from FW. If it is different from the version in FW, it is updated.
_RO_Web_CA_Chain
Type: CA Chain (PUB)
The certificate string of the authority that signed the Web server certificate. If self-signed, it will be
empty.
Retrieved from FW. If it differs from the version in FW, it is updated.
_RO_Web_DH_Param
Type: DH Parameters (PUB)
Parameters for the Diffie-Hellman key exchange in the Web server.
Retrieved from FW. If it differs from the version in FW, it is updated.
_RO_File_Distribution_Key
Type: UFTP Key (PRI)
Key for authenticating stations in the "File distribution" (UFTP) service.
Obtained from FW. If it differs from the version in FW, it is updated.
7.5.3.4. Settings
This tab displays additional settings needed for Local CA authority and Passphrase complexity rules
for Key downloads.
Local authority
Private key ID
Private key used for local certification authority.
Certificate ID
Public certificate used for local certification authority.
Signature algorithm
Algorithm used for certificate signing. It depends on the Certification Authority key algorithm and
may not be used in case CA uses a specific algorithm.
7.5.3.5. Organisation
• Country
• Country code (pre filled automatically, possible to manually set by using “Other” in “Country”)
• Organisation
• Department
• Location
• State
• Common name
Passphrase required
2. Generate a new “CA Chain (PUB)” using certificate created in previous step as “Certificate key”
3. Activate Local CA by going to Settings tab and activating Local CA, selecting newly created “Private
key ID” (= new private certificate “Certificate key (PRI)”) and “Certificate ID” (= new “CA Chain
(PUB)”)
Note
Web server private key must use “RSA” or “EC (ECDSA)” algorithms. Other algorithms are
not supported by web browsers.
User accounts can be managed centrally with an authentication server. RADIUS client-server protocol
is used for remote authentication. RADIUS accounts can be mapped to one of the four user roles. This
is either managed by the server itself or by local RipEX2 settings.
Local accounts are checked first and if the account does not exist, RADIUS accounts will be used. If
the RADIUS server is not accessible, users may use the local username/password to “fall back” to
local authentication.
Menu SETTINGS > Security > RADIUS allows to set all the main parameters.
User realm
Text {must contain at least one dot “.”}
Realm allows to shorten the login name - e.g. when the full login name is "tech@noname.eu" and
the realm is "noname.eu" the Username filled in the login page is only "tech".
The level of access is realised by Management-Privilege-Level (RFC 5607, index 136, type integer).
The level for each account shall be set during the server configuration. The user access level will be
granted according to the integer ranges for individual role levels. When the server does not allow setting
of Management-Privilege-Level the static account level option (for all users) has to be used.
Tamper is a detection service, which is triggered, when the RipEX2 chassis is physically opened. There
are 2 contacts (securing top and bottom casing) and the event is triggered even if the unit is without
power. When the chassis is opened an alarm is triggered and shown in Status report. Triggered Tamper
stops the RTC (real time clock) which means, that every unit reboot resets the unit timer back to the
time, when the Tamper was triggered.
To solve Tamper alarm, re-assemble the unit, via admin user account see SETTINGS/Security/Tamper
reset in the menu and click the "Reset tamper" button.
Note
The unit must be re-assembled before clicking the "Reset tamper" button, otherwise it returns
an error.
Whole process can take a while and ends by rebooting the unit.
If an automatic time synchronization is not set, the time in the RTC needs to be set manually.
7.6. Device
7.6.1. Unit
7.6.1.1. General
Unit name
This name is used as a real name of the Linux router, so the allowed characters are strictly limited
to:
Text; default = _a..zA..Z0..9
Unit note
Text; default = _a..zA..Z0..9
Longer unit name without special characters restrictions.
The USB service interface primary purpose is to provide unit service and management access. Ethernet
or WiFi connection can be established using an external ETH/USB or WiFi adapter.
The DHCP server is running on this service interface to enable easier connection of the management
device (PC, tablet or smart phone).
Enable / Disable
Each of the ETH or WiFi service can be enabled or disabled separately. When the WiFi is enabled,
the unit acts as a WiFi Access Point (AP).
IP address / Mask
IP address, default = 0.0.0.0/0
IP address of the DHCP server. This is the IP address to be used when accessing the unit manage-
ment via this serial interface.
WiFi
WiFi AP parameters can be customized.
SSID automatically
List box {On; Off}, default = "On"
When automatic definition of SSID is enabled, the SSID contains unit Serial number.
SSID
WiFi AP SSID. When entered manually, it must follow SSID naming conventions.
Mode
List box {802.11g; 802.11g }, default = "802.11g "
WiFi AP mode.
Channel
Selected WiFi channel.
Security
List box {Off; WPA2-PSK}, default = “Off”
It is a good practice to use WPA2-PSK secured connection together with a strong password. It is
highly recommended in case of permanent WiFi adapter installation.
7.6.1.3. Time
Unit Event time stamps, unit Statistics records and unit internal logs are using Unit time. It is good
practice to keep the Unit time synchronized to ease unit and network diagnostics.
Unit time can be setup manually or it can be synchronized with an NTP server. NTP server synchron-
ization is recommended.
The unit itself serves as an NTP server providing the time synchronization to another IP clients. If no
NTP server is defined or no one is available, the unit runs in an “orphan” mode. The unit internal NTP
server Stratum is set to 8 in this case. If the unit is synchronized with an NTP server, the unit NTP
server Stratum is set a 1 higher comparing to Stratum of the NTP server providing the time synchron-
ization to the unit.
If the unit is synchronized to a time source and the unit (synchronized) time differs from the unit RTC
time (by more than 8 seconds), the RTC time is updated.
Note
Each unit can serve as NTP server for further IP equipment, this functionality is always on.
Status
The Status field provides information about NTP synchronization status.
Refresh button is used to update the Status information.
7.6.1.3.1. Time
Update in device
Sets the given time to the unit.
GNSS synchronization
List box {On; Off }, default = "Off"
Enables / disables synchronization with the GNSS (GPS) (when optional GNSS module is used).
GNSS (GPS) synchronisation has priority over other NTP sources. This parameter occurs only if
GNSS (GPS) is enabled in Section 7.6.1.5, “GNSS (GPS)”.
Time zone
Time zone to represent unit internal time. All the unit timestamps are displayed using this time zone.
Changing the time zone does not affect unit internal records – they are always recorded using UTC
time zone.
NTP status information is based on standard ntpq daemon status output (ntpq -c lpeers, ntpq -c
rv) - see https://docs.ntpsec.org/latest/ntpq.html (system, peer and clock variables) for details.
Multiple NTP servers can be configured to get more precise time synchronization or to have a backup
solution in case of an individual NTP server unavailability. Maximum number of records in the list is
32. The unit runs in an “orphan” mode if the NTP client synchronization source is set to “NTP server”
and there is no NTP server defined in this list.
RipEX2 offers a mode which periodically switches between the full traffic mode and low power con-
sumption mode. This mode is suitable e.g. for power-consumption sensitive applications. When in
Sleep mode, RipEX2 has extremely low power consumption (10 mW). The time needed for a complete
wake-up from the Sleep mode (booting time) is approx. 30 seconds or more - depending on the config-
uration. Sleeping unit indicates its state by green flashing SYS LED.
Fig. 7.5: SETTINGS > Device > Unit > Sleep mode
Sleep mode
Enable / disable, default = disable
Enables / disables Sleep mode. When enabled, the unit will periodically go into Sleep mode depend-
ing on conditions defined by the following configuration.
Sleep mode cannot be used if:
• The unit’s Radio protocol is set to Base driven (BDP) and the Station type is set to Base.
Waking up the RipEX2 from Sleep mode is possible via setting the time of its awakening. It is also
possible to set an interval during which the unit will be woken up regularly. Sleep mode time boundaries
are counted in a set Time zone (SETTINGS > Device > Unit > Time).
Note
Set time from parameters Wake from [h] and Wake from [min] must be smaller or equal to
set time from parameters Wake until [h] and Wake until [min].
RipEX2 will go into the Sleep mode after the set time passes. It is possible to delay the Sleep mode to
assure that all data transfer is complete. Connecting USB-ETH or USB-WIFI adapters to the service
port will also delay the Sleep mode. Falling into the Sleep mode will generate an event to the Event
log.
Note
If the RipEX2 is in the Sleep mode and a power outage occurs (for approx. 10s), the Sleep
mode will be interrupted and the unit will wake up (boot).
Reset interval
List box {On; Off }, default = "Off"
Allows to set conditions causing the unit to delay transition into Sleep mode by resetting the count
down timer back to the initial value Go to sleep interval [min].
Note
ICMP ping on Cellular-EXT interface will not trigger the Reset on Radio/EXT activity.
Example 1:
With following settings RipEX2 will be periodically woken up every hour for 10 minutes (all day
long):
Wake from [h] = 0
Wake from [min] = 0
Waking period [min] = 60
Wake until [h] = 23
Wake until [min] = 59
Go to sleep interval [min] = 10
Reset interval = Off
Example 2:
With following settings RipEX2 will be periodically woken up from 7:00 to 16:00 every 30 minutes
for 10 minutes:
Wake from [h] = 7
Wake from [min] = 0
Waking period [min] = 30
Wake until [h] = 16
Wake until [min] = 00
Go to sleep interval [min] = 10
Reset interval = On
Reset on Radio/MAIN activity = On - this parameter will ensure that RipEX2 stays awake in case
of any radio or Cellular activity at the scheduled sleep time.
GNSS (Global navigation satellite system) allows the optional extension module to provide information
about the units location and enable a precise time synchronization.
• Events - TBD
• SNMP -TBD
7.6.2. Configuration
• Stored configuration - configuration stored in the RipEX2 unit. This configuration is stored in the unit,
even when its turned off.
• Changes - all changes done to the Current configuration (in the web client). For more information
see Section 6.2, “Changes to commit”.
Backup
It is a good practice to make a configuration backup into an external file every time the configuration
is changed, to be able to restore the configuration into another unit in case of unit maintenance.
Backup and download button triggers the web browser Download action. The specific behavior
depends on your web browser personal settings - whether the configuration backup file is downloaded
to a predefined download folder or the file Download dialog to select destination folder is shown.
The configuration is stored in a text file (.json file type).
The backup configuration has following limitations:
• The set of configuration data is limited by a user access privileges of the user who performed
the backup. The full configuration backup can only be issued by a user with the Administrator
(role_admin) access privileges. The same user access limit applies when the configuration is
restored (i.e. the full configuration Restore can only be issued by a user with the Administrator
(role_admin) access privileges).
• The configuration data are valid only for the given configuration version (CNF version - see below).
If the new firmware version brings the new configuration version, the new configuration backup
file needs to be downloaded after the firmware upgrade.
Note
The current unit configuration (inside the running unit) is converted to a new version auto-
matically during the firmware upgrade. No need to take care about that process.
Configuration version is stored in the parameter called “CNF version” which can be checked in the
menu: DIAGNOSTICS > Information > Device > Advanced information.
Restore
The configuration can be restored from a backup file (containing the same configuration version
as the configuration version currently running in the unit - see above).
Factory settings
Load default configuration button loads default values of all configuration parameters into
the web interface. All parameters whose current value differs from the default are marked as
changed. They are listed in the Changes to commit dialog. They do not affect the running unit
until eventually sent to the unit by the Send configuration button.
Note
This action can be used (for example) to check which set of parameters differs from
the default value.
Total purge
Restores all configuration parameters to default setup (including monitoring settings). Logout from
station will apply.
Deletes user database (only default user "admin" with default password will remain).
Deletes all diagnostic logs and statistics.
Clears Radio Tx and antenna degradation detector calibration.
Note
Basic data such as Code, Region, SW keys will always remain in the unit.
Warning
This action can take up to two minutes - do not power off the unit until finished.
7.6.3. Events
Settings of the severities of the individual events. Some events can generate SNMP notification and
can change level of the HW alarm outputs (AO, DO1, DO2) see Section 2.2.2, “Power and Control”.
Events can also generate SMS notifications, which are being sent to a defined phone number (see
Section 7.7.3, “SMS”).
7.6.4. SW keys
Certain RipEX2 features needs to be activated by a SW key to be available. When the respective SW
key is not present, the feature cannot be configured. If the feature is enabled in a configuration backup
file and the file is loaded to a unit which is not equipped with the respective key, the configuration is
refused (no changes are made in the unit).
Here is the list of available SW keys and their assignment to offered SW key packages.
SW key(s) can be obtained from your supplier. It is delivered as a text file containing the key(s). Every
SW key is unique for the specific unit (specific serial number). Use Choose File dialog to select the file
and Install key button to install the key(s) to unit.
7.6.5. Firmware
7.6.5.1. Local
Unit firmware defines the unit functionality. There are several principles for managing the firmware in
the running network:
• Maintain the same version of firmware in the network (recommended). RipEX units are able to co-
operate with different versions of firmware running, but using the same firmware version in all units
is the best way to keep the network maintenance simple.
• Upgrading firmware to a newer version is not obligatory, unless there are bug/security fixes etc.
• The cyber security issues may force the firmware to be upgraded e.g. when some serious security
vulnerability was fixed.
Note
Unit configuration backup is recommended after the firmware upgrade. See Section 7.6.2,
“Configuration” for details.
1. Optional (recommended): Backup the current unit configuration (menu SETTINGS > Device >
Configuration – Backup and download).
5
2. Download the required firmware from the Racom web : Products – RipEX – Download – Firmware
RipEX2 – ripex2-fw-x.x.x.0.fwp
3. Click the Choose File button (the button label may differ based on your web browser localization)
to select the firmware file.
4. Click the Upload firmware button to transfer the firmware file into the unit. The upload can take a
long time – depending on the connection speed between the management PC and the RipEX2 unit.
In case of slow connection and file transfer longer than 120 s, the web browser will shut down the
connection and the action will not finish successfully. This action does not update the running unit
firmware yet. There is no affection on the other communication running through this unit. Successful
uploading of the new firmware into the archive is announced in the Notifications and the available
firmware version is highlighted under the "Activation" heading as "Uploaded firmware:".
5. Click the Activate firmware button to upgrade (i.e. reinstall) the unit firmware. The upgrade process
takes approx. one minute. The user data communication running through this unit is interrupted for
a while. All the processes are restarted in a certain moment (e.g. VPN tunnels need to be re-estab-
lished).
5
https://www.racom.eu/eng/products/radio-modem-ripex.html#download
Warning
Do not shut down the unit during the firmware update process. It may permanently damage
the unit.
6. It is possible not only to upgrade the firmware version, but to even downgrade it, although this op-
eration is not recommended. Be aware of eventual security issues of firmware downgrade as
eventually outdated security code can be part of an old firmware. After FW downgrade, all unit
parameters will be set to factory defaults.
Note
Direct firmware upgrade from version 2.0.3.0 (or lower) to version 2.0.13.0 (or higher) is not
possible. You have to upgrade the firmware to any version from 2.0.5.0. to 2.0.10.0 prior to
upgrading to 2.0.13.0 (or higher).
In some cases, instead of uploading and activating full FW version, patch files can be used. Advantage
of the patch files is that they are smaller comparing to the full version files. For successful activation a
compatibility between the patch file and active firmware (or uploaded firmware) must be ensured. Patch
6
files for RipEX2 can be downloaded from RACOM’s web site . FW versions stored in RipEX2 are dis-
played in SETTINGS > Device > Firmware.
6
https://www.racom.eu/eng/products/radio-modem-ripex.html#dnl_fwr2
Example: There are 2 older FW versions (2.0.8.0 and 2.0.10.0) stored in RipEX2 (picture above). For
successful activation of newer FW version (e.g. 2.0.13.0) either:
Note
7
FW versions (both patch files and full versions) are stored in RipEX2 archive .
7.6.5.2. Distributed
When enabled, firmware file (or patch file) can be delivered to this unit using Firmware distribution
service. This section configures the receiver part of the service. Receiver units accept distributed
firmware files only from authorized senders. When the whole firmware file is accepted, it is saved into
units firmware archive. Received firmware must be manually activated (SETTINGS > Device > Firmware
> Local > Activate firmware button). Receiver unit will delete all transfers which are older than 14 days.
7
https://www.racom.eu/eng/products/radio-modem-ripex.html#dnl_archive
7.6.5.2.1. Status
Information about running firmware distribution process (status, firmware file name, file size, progress)
is described in this section.
Defines the sender, from which the receiver unit accepts the distributed FW file.
Enable / Disable
Enables / disables the specific remote radio - sender.
Radio address
Defines the IP address of the radio interface.
Note
Informational note.
7.7. Services
RipEX2 can distribute its uploaded firmware to other RipEX2 units. This feature can be used during
unit’s regular traffic and offers to distribute firmware from one unit (sender) to another unit(s) (receiver)
within one network. Firmware distribution is suitable especially in potentially problematic cases, e.g.
for units with low signal quality, busy traffic or placed in a hard-accessible environment.
Distribution works over the radio network (FOTA - Firmware over the air) in form of multicast. Units
must be available to each other within one IP hop. To set up FW distribution, RipEX2 unit must be set
either as a sender or a receiver.
The process of Firmware distribution is composed of individual attempts of delivering the firmware file.
The firmware file is uploaded into RipEX2’s firmware archive. During distribution, the file is divided into
multiple pieces (data blocks) which are gradually transferred to defined receiver units (the size of a
data block is set to 512 B). If a data block is not transferred successfully (it gets lost), the receiver unit
will again request the sender for it, until the data block is received (more information in Loss limit
parameter). Only one file at a time can be distributed.
The transfer can be interrupted by events such as changing the configuration, unit reboot, Hot Standby
unit switch, etc. When the transfer is interrupted, its status is saved into unit’s FLASH memory. The
transfer will continue once the unit returns to its normal state. Interruptions which do not save the status
(e.g. power outage) can lead into the loss of the distribution progress. If such a case occurs, the
transfer will start from the beginning.
Patch files can be also distributed via Firmware distribution. A compatibility between the patch file and
firmware of the receiver unit must be ensured (for more information, see Section 7.6.5.1.1, “Patch files”.
• When in Flexible protocol, the Firmware distribution works only in a star topology. In case of more
complex topology, the firmware distribution must be launched gradually (from star to star). After the
first round of firmware distribution finishes, another one can be launched from the repeater. The re-
peater will be re-configured to a sender and will distribute its uploaded firmware to receiver units
within its star topology.
• When in Base driven protocol, the firmware is distributed from base unit to all units within the network
which are defined as a receiver.
7.7.1.1. Status
Information about running firmware distribution process (status, progress, receiver group, max. rate,
loss limit, start time) is described in this section.
7.7.1.2. Parameters
7.7.1.3. Controls
Cancel distribution
Cancels the Firmware distribution. If the firmware distribution is cancelled, the transfer progress
will be lost.
7.7.1.4. Targets
Enable / Disable
Enables / disables the specific remote radio - receiver.
Radio address
IP address, default = 0.0.0.0
Defines the IP address of the radio interface.
Target Group
Click box {Group A; Group B; Group C; Group D}, default = "Group A"
Selects the receiver unit into a individual group to which the firmware will be distributed. One unit
can be in multiple groups.
Note
Informational note.
7.7.2. SNMP
SNMP (Simple Network Management Protocol) implementation in RipEX2 provides three SNMP versions:
v1, v2c and v3.
Note
SNMP mode
List box {Off; v1_v2c_v3; v3}, default = "Off"
Enables the SNMP and defines which protocol versions are available.
Community name
String {1–32 char}, default = "public"
Community name used by v1 and v2c. When mode v1_v2c_v3 is used, this parameter is mandatory.
Version 3 settings
Security username
String {1–32 char}, default = <empty>
Username for SNMPv3. When v3 protocol is selected, this parameter is mandatory.
Security level
List box {NoAuthNoPriv; AuthNoPriv; AuthPriv}, default = "NoAuthNoPriv"
The v3 protocol security level. Switches on/off Authentication (Auth) and the SNMP data encryption
(Priv).
Authentication
List box {MD5_legacy; SHA1_legacy; SHA224; SHA256; SHA384; SHA512}, default = "SHA256"
Authentication algorithm. Legacy algorithms are not recommended to use, they are available for
compatibility reasons only.
Authentication passphrase
String {8–128 char}, default = <empty>
Passphrase used for authentication with SNMP server.
Encryption
List box {DES_legacy; AES128; AES192; AES256}, default = "AES128"
Encryption algorithm.
Encryption passphrase
String {8–128 char}
Passphrase used for data encryption when communicating with SNMP server.
Engine ID mode
List box {Default; User defined}, default = "Default"
Engine ID serves for unique identification of the SNMP instance (i.e. the RipEX2 unit) according to
RFC3411. When the "Default" Engine ID mode is selected the MAC address of the ETH1 interface
is used for the unique part of the Engine ID (the whole Engine ID example: 800083130302a92006ef).
Engine ID
String {1–27 char}
When "User defined" Engine ID mode is selected the differentiated part of the Engine ID can be
entered as ASCII characters or generated (e.g. U3qPrisWoDYbBVNsAWluZYGL3M5). This string
is converted into HEX number (i.e. 55 33 71 50 72 69 73 57 6f 44 59 62 42 56 4e 73 41 57 6c 75
5a 59 47 4c 33 4d 35). The whole Engine ID for mentioned example:
800083130455337150726973576f44596242564e7341576c755a59474c334d35.
Notification
Notification is used for asynchronous notification from a RipEX2 unit into the SNMP server.
Notification mode
List box {Off; Trap; Inform}, default = "Off"
Mode of notification; Inform is not supported by SNMPv1.
Notification version
List box {v1; v2c; v3}, default = "v2c"
Notification packets version.
Inform repeats
Number {0 – 10}, default = 3
Number of repeats used when Inform acknowledge was not received.
Notification destinations
Destination IP
IP address, default = 0.0.0.0
Destination port
Number {1 – 65535}, default = 162
Notification packets destination port.
8
For more detailed information, please see SNMP application note .
7.7.3. SMS
RipEX2, fully connected into the cellular network (status CONNECTED), is capable of receiving and
sending SMS.
• The queue of SMS waiting for sending is controlled by appropriate diagnostic linux service.
• The length of the SMS depends on the type of module and coding. If longer SMS is required (only
SMS notifications), it is divided into a Chained SMS.
Note
8
https://www.racom.eu/eng/products/m/ripex/app/snmp-ripex2/index.html
○ The specific phone number must be defined in parameter SMS numbers. If the phone number
is not defined, the SMS will be not processed.
○ The SMS must contain a password to pass the authentication (parameter SMS password).
• Some commands generate an automatic reply, which is sent to a defined phone number(s), if
this feature is enabled.
○ The specific phone number must be defined in parameter SMS numbers. If the phone number
is not defined, it will not receive any notification.
7.7.3.1. Parameters
SMS password
String {2–16 ASCII char}, default = "public"
Sets an SMS password, which serves as an authentication to send SMS from defined phone
number(s). The range of length of the password is between 2–16 characters. SMS password must
not contain any unsupported characters. Unsupported characters are: ", `, \, $, ;.
Phone number
{Enable; Disable}, default = "Enable"
Enables / Disables phone number. When enabled, defined phone number can either send or receive
(or both) SMS. Amount of phone numbers, which can receive and send SMS is limited to 10.
Note
Optional comment.
Allow commands
{On; Off}, default = "On"
Allows to accept commands from defined phone number.
Note
This parameter will work only if parameter SMS commands EXT is enabled.
Send notifications
{On; Off}, default = "On"
Allows to send notifications to defined phone number.
Note
This parameter will work only if parameter SMS notifications EXT is enabled.
<password>"space"<command>"space"[<param1>...]
SMS commands:
cellstatus
Example: public cellstatus
Request for SMS with extract of Cellular status of the module, which received the SMS.
Reply of command "cellstatus":
Station: <station_name>
<module_type> <SIM> Profile <profile_id>
Status: <connection_state>
Reg: <registration_state>
Net: <PLMN>
Svc: <service_type>
Band: <band>
Signal: <signal_strength>
APN: <username_APN>
IP: <assigned_IP>
Example of reply for command "cellstatus":
Station: Alef
EXT SIM2 Profile 1
Status: CONNECTED
Reg: RegHome
Net: 23002
Svc: 2G_EDGE
Band: ARFCN 77
Signal: RSSI: >=-48 dBm
APN: internet
IP: 100.110.103.173
smsevent <param>
Example: public smsevent raise
This command is used to turn on/off alarms which can be set in Section 7.6.3, “Events” by using
its parameters ("raise", "clear").
This command does not generate an automatic reply.
Following settings is supported by the controller version of the RipEX2-HS, where the controller manages
the active and passive/standby RipEX2 units and their accessing to the shared channels (e.g. radio).
The HW switch (mode selector) has to be set to AUTO position for switching between units, otherwise
the selected unit remains active even if an error occurs on the selected one.
AUTO regime allows switching to the standby unit when an error status occur in active unit – if both
units are without alarms, the A unit will be active.
For detailed settings of unit switching (and its conditions of switching) see Section 8.7.5, “Antenna de-
9
tection”, Ripex2-HS section "Switching over" and Section 7.6.3, “Events” .
Important
The communication between individual RipEX2 units and HS controller use DI/DO interfaces,
so other use of these interfaces is not possible.
Note
HW option RipEX2e (product variant ‘C' and 'D’) cannot be used in Hot standby configuration.
9
https://www.racom.eu/eng/products/m/ripex2-hs/ripex_detail.html#d6e553
While in HotStandby mode, it is necessary to set identical radio MAC address (HotStdby_RadioMac)
in both stations, because protocol link address is derived from the address.
Virtual Radio MAC address has to differ from Virtual MAC address and all other addresses in the
unit.
To prevent a collision with broadcast addresses (in case of Flexible protocol usage), the address
must not be ended with :FF:FF:FF.
Virtual IP
This address has to fit into range of addresses used for the relevant network interface (e.g. ETH 1)
and will be used as shared IP address for LAN interface. Typically used for connection of attached
technology.
Note
The radio address used according to setting in SETTINGS > Interfaces > Radio > IP - the
same address has to be set in both radio modems.
Fallback time
Time in seconds. The time delay to stay on the standby unit, after all alarms are solved.
Guard mode
List box {INCLUDE; EXCLUDE}, default = "INCLUDE"
Defines the behavior of guarding of ETH interfaces. "INCLUDE" requires all guarded lines in UP
status – if one of these guarded lines is not in UP state, alarm occurs and the switching to the standby
unit is executed. "EXCLUDE" requires at least one guarded line in UP status.
Toggle now
This button allows to switch from unit Active status to the non-active.
The Range for virtual address parameter is in this menu available only when HS functionality in the
menu SETTINGS > Device > Unit > Hot standby is enabled (see above).
The parameter Range for virtual address has to be set to On for the LAN address interconnected with
shared ETH interface (Range for virtual address set to On).
Note
Interconnected ETH interface IP addresses of both ETH addresses must be different as well
as addresses of A and B units, yet in the same range as the virtual shared address (= together
three different addresses in the same range).
GNSS server collects data from a GNSS (GPS) receiver and provides the data to potentially multiple
client applications in a server-client application architecture. Internally is used by the NTP.
Enable GNSS
List box {On; Off}, default = Off
Enables / disables GNSS subsystem. This parameter occurs only, if GNSS module is available in
the unit.
7.8. Advanced
RipEX2 introduces new concept for expert settings and rapid deployment of new features called “Ad-
vanced” section. Advanced section displays all configuration set points currently present in the device
automatically, without need to design a special configuration page (like the ones in “Settings”). This
allows us to deploy new features rapidly with each new firmware and also allows experienced users
to fine-tune their RipEX2.
Please note, that RipEX2 is a very powerful device and it really shows all parameters in the Advanced
section.
When you visit the page for the first time, you will see a search field and below a tree of configuration
pages.
Search field looks through all labels and the tree itself and is capable of showing all relevant configur-
ation pages. It features so called “fuzzy” search capable of returning right answers even when there is
a typo in search query. Try searching for “Ethernet” or “BGP” to see the feature in action. To use the
whole tree again, simply delete search query.
Configuration tree has two parts. For your convenience first few items (Interfaces, Routing, …) use
similar hierarchy to “Settings”, but include all advanced settings. The newest features then can be found
in the last item called “General”, which contains all configuration tables there are in the unit.
By selecting a configuration page (marked with pencil icon) a window is shown on the right side of the
screen containing selected configuration page set points. You can change settings and then send them
to the device the same way you know from “Settings”.
Be careful when adjusting settings in Advanced section and review the “Changes” page in detail before
sending changes to the device.
8. Diagnostics
8.1. STATUS
Provides overview information about individual sections of the unit.
When any event with severity higher than Notice occurs in the unit, corresponding icon will change the
color according to the severity of the event, the link leads to further information about the event in the
DIAGNOSTICS menu. STATUS also shows and describes alarms in last week which are highlighted
under icons. Latest 25 Emergency, Alert, Critical and Error Events are displayed at the bottom of the
page.
Device
Radio
USB
Security
Ethernet 1-5
Note
The number of visible Ethernet icons is depended on the units settings. (SETTINGS > Interfaces
> Ethernet > Ports)
To each event an individual severity can be assigned. When multiple Events with different severities
are triggered in the same section, the priority goes: Error > Warning > Notice.
Warning
Error, Critical, Alert,
Emergency
8.2. Overview
The Overview section serves to give general information about the RipEX2.
8.2.1. Measurements
Section Overview - Measurements contains current data measurement (obtained from sensors).
• Card Temperature - provides data about temperature (on CPU, modem and radio).
Note
If the temperature exceeds its specified range (-45 – +95°C), the radio receiving/transmitting
will be blocked. If the temperature will return to a specified range (-40 – +85°C), the radio
starts receiving/transmitting again.
This feature can be disabled in parameters ADVANCED > Interfaces > Radio > Radio
parameters > Block radio in extreme temperatures.
• ↑ - Maximum-limit value. An alarm is triggered, when the value (displayed in brackets) is exceeded.
• ↓ - Minimum-limit value. An alarm is triggered, when the value falls under the value, which is displayed
in the brackets.
Note
Value measurements are collected once per 10s (excluding radio interface, where values can
be collected once per 10s or more often – depends on the radio communication character).
8.2.2. Statistics
Section Overview - Statistics shows a short view of the statistics over last 15 minutes (from the time
of opening the window or pressing Refresh button).
• Statistics collection is updated every 1 s (each second is possible to see new values).
• 15-min interval is collected by taking 14 mins from history + seconds passed from current minute.
8.3. Information
This section provides more detailed information (data extract) about settings of RipEX2 unit. It provides
also a deeper explanation about some of set values and interfaces. Diagnostic data are provided as
well.
Provides a complete information extract about all active interfaces (addresses, details and statistics
included). All interfaces used by the linux router (including all internal interfaces like npi, loop, ag, ip6tnl,
etc.) are displayed in this section.
Intefaces used in RipEX2 units are in general either Bridged ports (BP-L2) or Routed interfaces (RI-
L3).
All interfaces used by the linux router (internal interfaces excluded) are displayed in the following list.
if_<LanIface_Name>
LAN bridge interface RI-L3 type
(SETTINGS > Interfaces > Ethernet > Network interfaces)
if_<LanVlan_IfName>.<LanVlan_VlanId>
• VLAN BP-L2 interface type (if used as a port in LAN bridge) (SETTINGS > Interfaces > Ethernet
> Network interfaces>VLAN)
• VLAN RI-L3 interface type (if not used as a port in LAN bridge) (SETTINGS > Interfaces > Ethernet
> Network interfaces > IP/Subnet > VLAN)
eth0
Interface of physical port SFP (ETH5), BP-L2 interface type
hstdby
Switched Hot Stand-by LAN interface – only in the active HS unit – used for traffic switched by HS
unit, RI-L3 type of interface (SETTINGS > Interface > Radio)
radio
RF radio interface
• BP-L2 interface type when Bridge mode of Radio interface is used (SETTINGS > Interface >
Radio)
• BP-L2 interface type when Bridge mode of Radio interface is used (SETTINGS > Interface >
Radio)
ext
Bridge interface of the EXT cellular module, , RI-L3 interface type (SETTINGS > Interface > Cellular
> EXT)
gre_tap<INDEX>
GRE L2 tunnel interface, BP-L2 interface type (SETTINGS > VPN > GRE > L2)
gre_tun<INDEX >
GRE L3 tunnel interface, RI-L3 interface type (SETTINGS > VPN > GRE > L3)
lo
Loopback interface RI-L3 type of interface – The IP addresses of the loopback (ADVANCED > In-
terfaces > Loopback).
8.3.2. Routing
• System - complete data extract of system routing table. Displays data called by linux command “ip
route show”.
• Dynamic - complete data extract of internal routing table of dynamic routing service bird master4.
Displays data called by linux command “birdcl show route all table master4”.
• Babel - data extract of status of Babel protocol. Displays data called by following linux commands:
“birdcl show babel interfaces”, "birdcl show babel neighbors", "birdcl show babel routes", "birdcl show
babel entries", "birdcl show route all table babel_ipv4".
• OSPF- data extract of status of OSPF protocol. Displays data called by following linux commands:
"birdcl show ospf neighbors", "birdcl show ospf state", "birdcl show ospf interface", "birdcl show route
all table ospf_ipv4".
• BGP - data extract of status of all BGP protocol instances. Displays data called by following linux
commands: "birdcl show protocol '"bgp*"'", "birdcl show protocol all '"bgp*"'", "birdcl show route all
table bgp_ipv4".
8.3.3. Firewall
Provides general overview about data extract from sections L2, L3 and NAT.
8.3.3.1. Firewall L2
8.3.3.2. Firewall L3
8.3.3.3. NAT
Creates a table about object and statistics extract for each given interface. This table contains:
• Name of an interface.
• Status and statistics of front disciplines - displays data called by linux command “tc qdisc show”.
• Status and statistics of classes - displays data called by linux command “tc class show”.
• Status and statistics of filter - displays data called by linux command “tc filter show”.
8.3.5. Device
Additional unit information is provided which might be requested for advanced diagnostics. Partial de-
scription:
• CNF version - Version of the unit configuration. Configuration version is updated if the new firmware
version brings major configuration changes leading to incompatibility with the previous configuration.
See Section 7.6.2, “Configuration” for more details.
• Region ID - If the unit is delivered with certain limits applied according to a specific Region (specified
when ordering a new unit), the specific Region identification is visible here. No limits are applied if
the Region ID is empty (“---”).
This menu serves for collecting data, either from local or remote station and storing them into a package
(file). Diagnostic package serves primarily as a help tool, for RACOM’s technical support in case of
any potential unit issues. Minimum size of a package is 5kB. Maximum size depends on the amount
of radio links contained in the statistics. Diagnostic package is downloaded already compressed, which
saves approx. 1/3 of its original size.
Only one package collecting (applies for both local and remote) at a time is supported.
Package size
List box {Base; Verbose}, default = "Base"
Target
Defines the station, from which is the Diagnostic package being collected.
• Diagnostic package from a remote station - destination IPv4 address of the requested station
must be used.
Include
○ Base: 5 frames
○ Verbose: 10 frames
After setting all parameters, click on "Generate" button. By clicking the "Refresh" button update the
processing status of the package. Once the package is ready, it can be downloaded by clicking the
"Download" button. After its download, the package is deleted from the unit. The package will be deleted
even if its download is unsuccessful and if the download is not initiated, the package will be deleted
automatically after 24h.
8.4. Events
This menu shows all events which occur within the unit history.
For filtering of events you can use the filtering tool. When no filter rules are used, the last 30 events
will be displayed after Display button click.
Older events should be displayed using Load more button click, the events which occur during the
viewing of this window can be loaded by using Load newer button.
Alarms are displayed in red color, warnings in orange, notices in black and debugs in gray.
It is possible to change severities of individual events in the menu SETTINGS > Device > Events.
8.5. Statistics
RipEX2 unit permanently monitors various system 'channels'. There are several types of those channels:
Physical interfaces (Ethernet ports, serial ports, radio interface, additional module interface (e.g. LTE
module) when installed), virtual interfaces (e.g. VLAN interfaces) and HW sensors (CPU temperature,
supply voltage, ...). Monitored values are stored in the internal database.
Statistics page provides aggregated statistical data from this internal database. Data can be both dis-
played and downloaded in CSV format. This file format is suitable to be imported to any 3rd party
spreadsheet program for further analysis.
Historical
Statistics counters are aggregated over the defined time interval. The interval is defined by two
time stamps "From" and "To".
Differential
Statistics counters are aggregated between the counter reset and the current time (the moment
when the Display button was pressed). Reset is triggered by a unit reboot or by the Reset statistics
button.
Reset statistics button - initiates the Differential statistic counters reset. Such a reset does not
affect normal statistic counters - i.e. the Historical statistics are not affected by such a Reset at all.
Statistics data are stored in the internal database. There is a fixed memory size allocated for the stat-
istics data - the database is limited by number of records. As a result of this, the length of statistics
history - how old records are available - depends on the actual network configuration: The more mon-
itored values, the higher the rate of new recorded values, the shorter the available history.
Some sets of monitored values are constant (Ethernet ports and their counters) or do not rise to a high
values (COM ports, Terminal servers and their counters). What affects the length of available history
the most is the number of radio links - how many radio “neighbours” the unit communicates with or how
many of the neighbouring signals are received. This is different for each unit in the network. For example
Base station in a network operating Base driven protocol is the most active unit thus it has the shortest
history available.
8.5.1. Parameters
Statistics data are always retrieved as aggregated for a certain time Interval. This Interval can be set
by putting specific date and time into "From" and "To" fields, or using buttons “Last day”, “Last hour”
or “More options” fast presets (from several minutes to several days). Button “Set Current Time” sets
current time to both From and To fields to ease current unit status diagnostics.
• Ethernet statistics
• Measurements
“Display” button then shows chosen data below. “Download Selected Data” button generates CSV
(UTF-8 encoded) file of all chosen systems’ data and downloads them as files without displaying them.
Both "Display" and "Download ..." buttons send a request for the required set of statistics data to the
unit. Retrieving and transferring of the data (over the radio channel) takes some time. Downloading
the data is practical when the user needs to process them in a spreadsheet and wants to save some
bandwidth. It is also recommended to use spreadsheet editor like Microsoft Excel or Apple Numbers
to process statistics on mobile devices due to better user experience provided by the specialized apps.
Radio interface statistics provides set of data monitoring the interface between the Router module (IP
routing engine in the unit) and the Radio protocol module. It corresponds to monitoring Radio - Router.
Tx direction: from the Router module to the Radio protocol module. Rx direction: from the Radio protocol
module to the Router module.
MAC address - MAC address of the IP packet. Source for Rx or destination for Tx packets.
IP address – translated MAC address when available. Address 0.0.0.0 is used as a placeholder if the
translation is not available. If the Transparent protocol is used, the translation is not available at all.
UDP, TCP, ICMP, ARP - Packet count and amount of data in Bytes [B] for different protocol types.
Amount of data is summed over the whole Layer 2 Ethernet frame (i.e. all IP headers are counted).
Other – Packets not handled by the previous counters (e.g. VLAN, services, GRE, IPsec (ESP), ...)
Radio protocol statistics provides set of data monitoring the radio channel access protocol frames and
events. It corresponds to monitoring Radio - Interface.
Frames which are not addressed to/from this unit are not handled (they do not affect any counter).
Rx direction: from the 'air' radio interface to the Radio protocol module. Tx direction: from the Radio
protocol module to the radio interface.
Link address – Link address of the frame. Source for Rx or destination for Tx frames. This is a Link
address assigned at the origin (input) - when entering, or at the target (output) - when leaving the radio
network.
In case of Base driven protocol or Transparent protocol, this address pair is not modified when re-
translated. As a result of this fact, the whole traffic to a remote station behind the re-translation is
counted together in a line assigned to the remote station.
IP address – translated MAC address when available. Address 0.0.0.0 is used as a placeholder if the
translation is not available. If the Transparent protocol is used, the translation is not available at all.
Frame OK (Tx) – Correctly send data frames count. Control frames are not included. When ACK is
on, only acknowledged frames are included. Re-translated data frames are not included.
Frame err (Rx) – Received corrupted data frames count (CRC error)
Frame lost (Tx) – Transmitted unacknowledged frames count. It happens when ACK is on and acknow-
ledging frame was not received even when full number of re-transmission attempts was reached.
Frame dupl (Rx) – Received, but dropped, duplicated data frames count. 'Duplicated' frames are re-
peatedly received acknowledged frames.
Frame rep (Tx) – Repeated frames count (they can appear when ACK is on). Re-translated frames
are not included.
Frame rej (Tx) – Rejected frames count (rejected just before transmission) – reason: buffer timeout.
In case of Transparent protocol (Bridge mode) it happens when there is a collision during re-translation.
Packet rej (Rx) – Correctly received but rejected packets count - reason: impossible to decrypt or de-
compress.
Packet rej (Tx) – Rejected packets count (rejected before handed over to the transmitter) – reason:
buffer overflow, buffer timeout.
Total (Rx) – Received frames count and amount of data in Bytes. Amount of data - for both Rx and Tx
- is summed over the whole Layer 2 Ethernet frame (i.e. all IP headers are counted).
Total (Tx) – Transmitted frames count and amount of data in Bytes. Re-translated frames are included.
Radio protocol 'non-addressable' statistics provides set of data monitoring the radio channel access
protocol frames and events which cannot be linked with any address (e.g. broadcasts). It corresponds
to monitoring Radio - Interface.
Phy header err – Packet reception failure count - reason: sub header error
Phy err – Packet reception failure count - reason: physical layer analysis error
Header err - Packet reception failure count - reason: header content error or CRC error.
Strange – Received unexpected frames count - reason: wrong addresses, wrong sequence etc. Valid
for Base Driven Protocol only.
Unroutable – Packets counter which were scheduled for transmission but impossible to be forwarded
to the Radio protocol - multiple reasons: e.g. the destination IP address is not known
Radio signal statistics provides set of data monitoring the radio interface quantities and events. It cor-
responds to monitoring Radio - Interface.
Statistic data are collected by the frame source address - Link address, which is an address of the
originating radio transmitter (unlike "Radio protocol statistics" where the Link address is an address of
the unit where the packet entered the RipEX2 network).
There is a special address 'RELAY' to indicate frames coming from the re-translation unit in case of
Base Driven Protocol operation.
RSS [dBm] – Radio Signal Strength - measured within the header reception
Phy header MSE [dB] – modulation Mean Squared Error - measured within the header reception
Freq offset [Hz] – Averaged frequency offset between the transmitter and the receiver station, measured
by the receiver station.
Att1 [%] - First internal attenuator (15 dB) activated. Shown in percents of affected frames.
Data count – Received complete frames (including data part) count. Frames with valid header CRC,
but wrong data CRC are not counted
Data MSE [dB] - modulation Mean Squared Error - measured within the frame data part reception
Radio signal statistics provides set of data monitoring the radio interface quantities and events. This
table contains measurements handled before the frame reception and measurements which cannot
be linked with any address (e.g. broadcasts). It corresponds to monitoring Radio - Interface.
RSS [dBm] – Radio Signal Strength - measured short time just before the frame reception
Others – Values for frames which cannot be linked with any address
Serial protocols statistics provides set of data monitoring the COM port(s) and Terminal server (s). Only
enabled interfaces are displayed. The statistics counters are based on packets entering or leaving the
COM port or Terminal server module. As a result of this the 'count' values correspond to the Protocol
messages (the "Protocol" selected on the specific COM port or Terminal server). If the packet is 'glued'
from the several frames, it is evaluated as a single packet. In case of COM port statistics, the summary
of 'Correct' and 'Drop' Bytes provides the total amount of Bytes on the physical interface.
Rx direction: from the connected (at the COM or ETH port) external device to the RipEX2 unit (i.e. from
the COM port module or Terminal server module to the Router module). Tx direction: from the RipEX2
unit to the external device.
Correct (Rx, Tx) – Correctly received / transmitted packets count and amount of data in Bytes. Accepted
by the COM port or Terminal server module - based on the selected Protocol processing. Amount of
data - for both Correct and Drop counters - is affected by COM port data only (i.e. IP headers of the
UDP frames created in the COM port module are NOT counted).
Drop (Rx, Tx) - Dropped received / transmitted packets - reason: corrupted frame, CRC error, wrong
protocol message, unsupported protocol message.
Ethernet statistics provides set of data monitoring the physical Ethernet ports. Only enabled interfaces
are displayed.
Only correctly received frames are handled. The counters correspond to the specific IP protocol types.
Rx direction: from the physical Ethernet port to the RipEX2 unit (i.e. to the Router module). Tx direction:
from the RipEX2 unit to the physical Ethernet port.
UDP, TCP, ICMP, ARP, VLAN, Multicast - Packet count and amount of data in Bytes [B] for different
protocol types - IPv4 traffic. Amount of data - for all counters - is summed over the whole Layer 2 Eth-
ernet frame (i.e. all IP headers are counted).
Other - Counter summing up the frames which were not handled by the previous counters - for example
MPLS and GOOSE protocols.
Cellular interface statistics provides set of data collected from the interface between the Router module
(IP routing engine in the unit) and the Cellular module. It corresponds to monitoring Cellular - Interface.
Interface
– “cell-ext” interface is used for RipEX2 optional extension cellular module.
IPv4 other
- Packets not handled by the previous counters (e.g. VLAN, services, GRE, IPsec (ESP), ...).
IPv6
- IPv6 packets are handled separately.
Other
- other packets than IPv4 or IPv6
Interface
– “cell-ext” interface is used for RipEX2 optional extension cellular module.
SIM [%]
– information about using the individual SIM cards during the time displayed in %.
Services [%]
– N/A (not available), 2G (e.g. GPRS, EDGE), 3G (e.g. UMTS), 4G (e.g. LTE) services usage dis-
played in % of time.
Networks [%]
– NC (not connected), Home (home network), Roaming (roaming network), Other (not matching
previous type of networks) displayed in % of time.
Note
Interface
– “cell-ext” interface is used for RipEX2 optional extension cellular module.
Samples
Number of samples used for the individual statistics.
8.5.9.4. Measurements
Sensor
Measured values on RipEX2.
count
Number of times that the sensor measured given value (counter).
8.6. Monitoring
Monitoring is an advanced on-line diagnostic tool, which enables a detailed analysis of communication
over any of the RipEX2 router interfaces. In addition to all the physical interfaces (RADIO, EXT, ETHs,
COMs, TSs), some internal interfaces between software modules can be monitored when such advanced
diagnostics is needed.
Monitoring consists of two independent processes: settings of the monitored items and outputs. Please
note that even if both of the outputs are switched off and some interfaces are set to On, the monitoring
is still running in the background.
The monitoring screen has two main parts - Settings and Output
8.6.1. Settings
Refresh monitoring data button - refreshes the settings menu according to the statistics status saved
in the unit. The difference between the displayed and saved status can occur for example when the
status is changed in different browser tab.
8.6.1.1. Overview
All status (On/Off) of individual interfaces are displayed on this place for quick overview on monitoring
settings.
8.6.1.2. Interfaces
This section allows detailed settings of particular monitoring parameters for all interfaces.
Rx enabled, Tx enabled
List box {On; Off}, default = "On"
A packet is considered a Tx one when it comes out from the respective software module (e.g. RADIO
or Terminal Server) and vice versa. When an external interface (e.g. Interface COM) is monitored,
the Tx also means packets being transmitted from the RipEX2 over the respective interface (Rx
means "received"). Understanding the directions over the internal interfaces may not be that
straightforward, please see Fig. 8.2, “Interfaces in the context of unit monitoring” above for clarific-
ation.
All
List box {On; Off}, default = "On"
Monitoring output can also be limited by IP protocol type. Select Off to be able to enable/disable
specific protocol output individually - see next parameter(s).
Offset [B]
Default = 0
Number of bytes from the beginning of packet/frame, which will not be displayed - the monitoring
output is truncated by 'Offset' bytes at the beginning of the message.
Length [B]
Default = 32
Number of bytes to be displayed from each packet/frame.
Example: Offset=2, Length=4 means, that bytes from the 3rd byte to the 6th (inclusive) will be dis-
played:
Data (HEX): 01AB 3798 A285 93CD 6B96
Monitoring output: 3798 A285
Bandwidth
List box {LOW; NORMAL; HIGH; UNLIMITED}, default = "NORMAL"
Monitoring bandwidth limit to prevent overload of management link between client PC and the
RipEX2 unit. LOW (up to ~300 kb/s), NORMAL (up to ~800 kb/s), HIGH (up to ~2 Mb/s), UNLIMITED
(up to ~8 Mb/s)
Dropped frames
List box {On; Off}, default = "Off"
When On, monitoring shows frames which are dropped (e.g. CRC is not valid, buffer overflow, ...).
ETH interfaces
Include reverse
List box {On; Off}, default = "Off"
Enable/disable reverse traffic (e.g. TCP reply to a request) monitoring.
Radio interface
Corrupted frames
List box {On; Off}, default = "On"
Corrupted ("header CRC error", "data CRC error", etc.) received frames monitoring output can be
suppressed. This can be useful when the communication in the channel is heavily disturbed by in-
terference or noise, resulting in „garbage" messages which can make the monitoring output difficult
to read.
Other modes
List box {On; Off}, default = "Off"
When Promiscuous mode is enabled, the unit is capable to monitor (receive) frames from the other
RipEX2 units even if the other unit(s) is(are) working in the other Unit mode (Bridge versus Router).
Frames transmitted under another Unit mode may not be properly 'analyzed'. In such a case frames
are displayed in raw data format.
• None – Only the payload (L4) is displayed, e.g. the data part of a UDP datagram.
• Packet (IP) – Headers up to a Network layer (L3) are included, i.e. the full IP packet is displayed.
• Frame (ETH) – The full Ethernet frame (L2) is displayed, i.e. including the ETH header.
• Radio link – radio link headers will be included into the monitoring output
• Data coding – data coding header will be included, where C: type of compression, E: type of
encryption
• Both – both Radio link and data coding headers will be included
Promiscuous mode
List box {On; Off}, default = "Off"
• Off – only frames which are normally received by this unit, i.e. frames whose Radio IP destination
equals to Radio IP address of this RipEX2 unit and broadcast frames are available for the mon-
itoring. Monitoring filters are applied afterwards.
• On – all frames detected on the Radio channel are available for the monitoring. Monitoring filters
are applied afterwards.
• Off – Radio Link Control Frames (e.g. ACK frames) are never displayed.
• On – Radio Link Control Frames are processed by monitoring. Monitoring filters are applied.
Extended measurement
To the monitoring are added extended values, e.g. modulation type and FEC code, RF power,
temperature for TX and modulation type and FEC code, frequency offset, pre-packet RSS for RX.
Menu DIAGNOSTICS > Monitoring > Advanced groups together all setting across all monitoring web
pages, mentioned above, in one web page.
Cellular interfaces
Cinterion PLS83-W cellular module is connected to L3 layer, thus captured frames do not contain L2
header(s). For consistency reasons are following values added to the frame:
• Ethertype: 0x0800
8.6.1.3. General
The settings of output parameters for file output – Max. file size and Time period, the first parameter
matched closes the monitoring file. File is saved in compressed way, so the uncompressed and approx-
imate compressed size is displayed in the list box.
Time period
List box {1 min; 2 min; 5 min; 10 min; 20 min; 30 min; 1 hour; 3 hours; 24 hours; Off}, default = "5
min"
Record button – starts recording to the file. Triggers a process, which is set by parameters in the
chapter above (Section 8.6.1.3, “General”).
Stop recording button – stops recording to the file. The recording will be stopped immediately regardless
of the size and time of recording. When the Record button is pressed for the second time the previously
recorded data will be cleared.
Refresh button – refreshes the information about time remaining and size of the recorded data (in un-
compressed way).
Download button – downloads file to a connected computer. The default name contains of the Unit
name, date and time of the begin and day and time of the end of the monitoring. Before downloading
you have to stop recording.
Clear button – allows to clear the monitoring data stored in the unit – both downloaded or not down-
loaded.
Note
If the amount of monitored data exceeds the limit (2.7 kB for remote monitoring and 32 kB for
local monitoring) for one time period (approx. 1 s), some data will not be displayed in the console
output. A note about the omited data will be inserted to the console output to the position of
the non-displayed data.
8.7. Tools
Set of diagnostic tools
All parameters used by standard ICMP ping are available. Start / Stop button starts / stops pinging.
RSS ping is a diagnostic tool for the radio performance measurement (Radio Signal Strength and
modulation Mean Squared Error) of the individual radio hops within a RipEX2 network. Hybrid networks
are supported. Output format of different type (other than radio) of hops is similar to ICMP ping.
Destination IP
Destination IP address. This address must belong to a RipEX2 unit as the RSS ping can be initiated
only between two RipEX2 units.
Length [B]
Number {8 – 1500}, default = 10
The length of data used by RSS ping. In case the length of RSS ping packet is longer than the
length of Radio interface MTU, the first RSS ping packet will be lost and will cause decreasing of
the packet length to the value matching to the current radio MTU. Random data are used as a
payload.
Period [ms]
Number {100 – 3 600 000}, default = 1000
Period of sending RSS ping packets
When the period is set to a shorter number than the actual RTT, collisions might appear (depends
on the selected Radio protocol). In order to reach the shortest possible period enable the Go on
mode.
Timeout [ms]
Number {100 – 3 600 000}, default = 10000
Response timeout
Count
Number {1 – 10000}, default = 5
Number of RSS pings to be send
Source IP
The local IP address of RipEX2 unit originating RSS ping. Blank field (equal to 0.0.0.0 address) is
used to assign the source address automatically - address is assigned automatically according to
the routing rules.
Go on
List box {On; Off}, default = “Off”
Go on mode. When Enabled, RSS pings are sent immediately after receiving the RSS ping reply
(Period parameter is ignored).
Traces reserved
The RSS ping also contains data about the route (RSS, MSE), this parameter allows to set number
of radio hops within the network to be measured. Radio hop is measured in both directions, so the
number has to be higher than number of hops in route multiplied by 2 (for example: link consisting
of 2 radio hops needs 5 traces to be reserved).
Output:
Modulation FEC
00 2CPFSK FEC off
01 FEC 3/4
10 4CPFSK FEC off
11 FEC 3/4
80 DPSK FEC off
81 FEC 3/4
90 pi/4 DQPSK FEC off
91 FEC 3/4
A0 D8PSK FEC off
A1 FEC 3/4
B0 16DEQAM FEC off
B1 FEC 3/4
C0 64QAM FEC off
C1 FEC 3/4
D0 FEC 5/6
D1 FEC 2/3
E0 256QAM FEC off
E1 FEC 3/4
F0 FEC 5/6
F1 FEC 2/3
• RSS – Radio Signal Strength [dBm] - measured within the header reception
• hMSE – Phy header modulation Mean Squared Error [dB] - measured within the header reception
• dMSE – Data modulation Mean Squared Error [dB] - measured within the frame data part reception
8.7.3. Routing
Routing tool provides the next hop routing information of the given IP address.
Destination IP
The examined IP address.
Output
Output section provides the following details:
RF Transmission test
Pre-defined type of RF signal can be transmitted for a specific purpose.
• Type
List box {Random data; Carrier wave; Single tone}, default = "Random data"
Type of transmitted signal during the test. In case of Single tone a frequency with an offset from
the central frequency is transmitted.
• Period [s]
Number {1 – 120 s}
Transmission test pre-set duration.
• Start button
Starts the transmission test. If "Start" is requested during running test, it will not be launched
again, but an error value will return. Currently running test will finish its time period.
• Stop button
Allows to stop the test before the pre-set time. If "Stop" is requested and there is no running test,
and error value will return.
Note
Testing is only allowed without standard radio protocol. Please set "Radio protocol" to "None"
in Radio Settings before using this feature.
Antenna detection is a tool (Detector) for Tx antenna and transmission circuits failure detection. The
“Radio TX or antenna degraded” Event is triggered in case the Detector detects a problem.
Calibrate button initiates the calibration process. Following steps need to be done:
1. Set the Radio protocol to ‘None’. The Calibrate button can be pressed afterwards.
2. Disconnect the Tx antenna. It is recommended to disconnect the antenna cable as far from the radio
unit (closer to the antenna) as possible – to get better detection sensitivity.
3. Connect the antenna. The antenna should not be disconnected any more after the calibration is
finished – to ensure proper Detector sensitivity. If the antenna needs to be disconnected for a
reason, it is recommended to repeat the calibration process afterwards.
Calibration limits:
• Calibration is valid for the given values of Tx frequency and RF Power. If those values need to be
changed, it is necessary to re-calibrate the Detector after such change.
• The calibrated parameters are specific for the given radio unit and antenna connection. This is the
reason, why the calibration parameters cannot be backed up for the eventual transfer to a backup
unit. In case the radio unit needs to be replaced, the Detector must be re-calibrated.
Reset button initiates the Detector status reset. Such a reset is needed when the unit is operated as
a Hot-standby unit (see below) and the Detector caused the Hot-standby units’ switchover: the passive
(repaired) station needs to be reset after the repair.
The Detector Event can be used as one of the triggers for the Hot-standby units’ switchover. There are
several conditions for the Hot-standby operation:
• In case of shared Tx antenna, each unit must be calibrated as active – in order to have the antenna
connected.
• In case of separated Tx antennas, it is possible to run the calibration both on active and passive unit
independently. Unit repair or replacement does not interrupt the user data traffic. The calibration
process (of the eventually replaced station) causes a short (up to 10 seconds) interference of the
active station.
• The Detector needs to be reset after the passive station repair (see above).
The Antenna disconnected and Antenna connected lines provide information about the calibration
– when it was finished, what is the frequency and RF power for which the calibration is valid.
Quality of calibration informs about calibration process result – how reliable the failure detection can
be expected:
8.7.6. System
Reboot button
Performs unit cold restart (power cycle equivalent).
8.8. Syslog
SYSLOG server IP
IP address of the remote Syslog server to which logs will be sent with severity higher than severity
set in the Max. severity
Max. severity
List box {Off; 0 Emergency; 1 Alert; 2 Critical; 3 Error}, default= ”Off”
Off - switches off the SYSLOG functionality
Only the events with set severity (and higher) will be sent to the Syslog server. Severities for indi-
vidual Events can be set in Section 7.6.3, “Events”.
Login attempt
List box {Off; Web}, default = "Off"
Switches whether login attempts (both successful and unsuccessful) will be sent to the SYSLOG
server.
9. Technical parameters
Tab. 9.1: Technical parameters
Indication LEDs
LED panel 5× tri-color status LEDs (SYS, EXT, RX, TX, COM)
ETH 4× RJ45 (Link and Activity LEDs), 1× SFP (Status LED)
Environmental
IP Code (Ingress Protection) IP41, IP42, IP52 - see details
MTBF (Mean Time Between Failure) > 900 000 hours (> 100 years)
4)
Operating temperature −40 to +70 °C ( −40 to +158 °F)
Operating humidity 5 to 95 % non-condensing
Storage −40 to +85 °C ( −40 to +185 °F) / 5 to 95 % non-condensing
Mechanical
Casing Rugged die-cast aluminium
Dimensions H×W×D: 60×185×125.5 mm (2.34×7.2×4.94 in)
Weight 1.55 kg (3.4 lbs)
Mounting DIN rail, L-bracket, Flat-bracket, 19" Rack chassis
1
see details
SW
Operating modes Bridge / Router
Transparent @ Bridge
Radio channel protocols Base driven, Flexible @ Router
2
see details
DNP3, DF1, IEC101, Modbus RTU, PR2000, RDS, Siemens
User protocols on COM
3964(R), COMLI, SAIA S-bus, Mars-A, PPP, UNI, Async Link
User protocols on Ethernet Modbus TCP, IEC104, DNP3 TCP, Comli TCP,
Terminal server…
Serial to IP convertors DNP3 / DNP3 TCP, Modbus RTU / Modbus TCP
Protocol on Radio channel
Multi master applications Yes
Report by exception Yes
Collision Avoidance Capability Yes
Remote to Remote communication Yes
Addressed and acknowledged
Yes
serial SCADA protocols
Data integrity control CRC 32
Optimization Intelligent payload data and header (Eth / IP / TCP / UDP) com-
pression
Security
Management HTTPS (Web Interface or Application Programming Interface)
Role-based access control (RBAC) 4 levels (Guest, Tech, SecTech, Admin)
WiFi management access (optional) WPA2-PSK secured
1
https://www.racom.eu/eng/products/radio-modem-ripex.html#accessories_mounting
2
https://www.racom.eu/eng/products/radio-modem-ripex.html#radio_protocols
Encryption AES256-CCM
VPN IPsec, GRE
VLAN IEEE 802.1Q (tagging), Q-in-Q for Transparent mode
AAA protocol RADIUS
Firewall Layer 2 - MAC, Layer 3 - IP, Layer 4 - TCP/UDP
FW Digitally signed
HW tamper Case opening evidence
4)
When full-duplex with full power (40 dBm PEP) and the surrounding temperature above + 60°C
3
the external passive cooler should be used (e.g. RipEX2-RS 19" Rack chassis ).
3
https://www.racom.eu/eng/products/m/ripex2-hs/product.html#rip2rs
Standards
CE RED, RoHS, WEEE
FCC, IC FCC Part 90, IC RSS-119
Spectrum ETSI EN 302 561 V2.1.1
ETSI EN 300 113 V2.2.1
EMC ETSI EN 301 489-1 V2.2.3
(electromagnetic compatibility) ETSI EN 301 489-5 V3.2.1
EN 61850-3:2014
Product safety EN 62368-1:2014 + A11:2017
RF health safety EN 62311:2008
Electric power substations IEEE 1613:2009
environment IEEE 1613.1:2013
EN 61850-3:2014
Hazardous locations EN 60079-0:2012
EN 60079-11:2012
Environmental EN 61850-3: 2014
Vibration & shock EN 60068-2-6:2008
ETS 300 019-2-3:1994, Class 3.4
EN 61850-3:2014
Seismic qualification EN 60068-2-27:2010
IP rating EN 60529:1993 + A1:2001 + A2:2014
RipEX2
Modulation PEP [dBm] RMS [dBm] RMS [W]
2CPFSK 20 – 40 20 – 40 0.1 – 10
4CPFSK 20 – 40 20 – 40 0.1 – 10
DPSK 20 – 40 20 – 37 0.1 – 5
π/4-DQPSK 20 – 40 20 – 37 0.1 – 5
D8PSK 20 – 40 20 – 36 0.1 – 4
16DEQAM 20 – 40 20 – 35 0.1 – 3.2
64QAM 20 – 40 20 – 34 0.1 – 2.5
256QAM 20 – 40 20 – 33 0.1 – 2
SW configurable [PEP, dBm]
FSK, QAM: 1 dB step
4
PEP vs. RMS application note
Shielded / Recommended
Input / Output Specified length
Nonshielded cable type
DC power supply 10 – 30 V As needed N V03VH-H 2×0,5
GPIO (Sleep Input, HW Alarm
As needed S LiYCY 6×0,14
Input, HW Alarm Output)
Antenna connection Rx, Rx/Tx As needed S Coaxial
As needed, typically up to 15 m
COM (RS232/485) S LiYCY 4×0,14
(RS232) or up to 400 m (RS485)
EXT (used for GNSS) As needed S Coaxial
ETH (4 ports) As needed, typically up to 100 m S STP CAT 5e
Optical Ethernet As needed, typically up to 2 km N/A Optical fibre
USB Max. 3 m S USB3
DI / DO As needed S STP CAT 5e
Check the maximum voltage, current and minimal cross sections in Table 10.4, “Maximum
voltage and current of individual interfaces” for hazardous location conditions.
4
https://www.racom.eu/eng/products/m/ripex/app/pep/pep.html
Band 5 (850 MHz), Band 8 (900 MHz), Band 4 (AWS, i.e. 1700
MHz), Band 2 (1900 MHz), Band 1 (2100 MHz)
2G GSM/GPRS/EDGE
GSM 850 MHz, E-GSM 900 MHz, DCS 1800 MHz,
PCS 1900 MHz
Ublox TOBY L-200 FCC ID XPYTOBYL200
TAC 35225406
ANT1, ANT2 - space diversity 2× SMA Antenna
(on rear panel)
4G LTE
3GPP Release 9
Long Term Evolution (LTE)
Evolved Uni. Terrestrial Radio Access (E-UTRA)
Frequency Division Duplex (FDD)
DL Multi-Input Multi-Output (MIMO) 2×2
3G UMTS/HSDPA/HSUPA
3GPP Release 8
Dual-Cell HS Packet Access (DC-HSPA+)
Specification UMTS Terrestrial Radio Access (UTRA)
Frequency Division Duplex (FDD) DL Rx diversity
2G GSM/GPRS/EDGE
3GPP Release 8
Enhanced Data rate GSM Evolution (EDGE)
GSM EGPRS Radio Access (GERA)
Time Division Multiple Access (TDMA)
DL Advanced Rx Performance Phase 1
Data rates up to 150 Mb/s downlink / 50 Mb/s uplink
SIM slots 2x Micro SIM (3FF)
Both 1.8 and 3 V SIM
types supported
-2
Sensitivity [dbm] @ BER 10 (ETSI 80% PSR eqv.), FEC 3/4 (2/3 QAM64
and QAM256)
6.25 -123 -121 -122 -121 -119 -116 -116 -109
12.5 -120 -119 -119 -118 -116 -112 -112 -106
25 -118 -117 -117 -116 -113 -110 -110 -104
50 x x -114 -113 -110 -107 -107 -101
100 x x -112 -111 -108 -104 -104 -99
150 x x -110 -109 -106 -102 -102 -97
200 x x -109 -108 -105 -101 -101 -96
250 x x -107 -106 -103 -100 -100 -94
300 x x -106 -105 -101 -98 -98 -93
Note
Consider the proper fade margin for the radio link design. The larger the fade margin the
higher link availability. The fade margin of 20 dB is considered acceptable for most installations
with availability 99% or less. The fade margin of 25 dB or higher shall be used for highly reliable
systems (99.9% availability).
6.25 kHz
Modulation rate OBW OBW limit
Modulation Emission code
[kb/s] [kHz] [kHz]
Baudrate 2.60 kBaud
2.60 2CPFSK 3K60F1DBN 3.60 5
5.21 4CPFSK 3K60F1DBN 3.60 5
Baudrate 4.34 kBaud
4.34 DPSK 5K00G1DBN 5.00 5
8.68 π/4-DQPSK 5K00G1DDN 5.00 5
13.02 D8PSK 5K00G1DEN 5.00 5
17.36 16DEQAM 5K00G1DEN 5.00 5
26.04 64QAM 5K00G1DEN 5.00 5
34.72 256QAM 5K00G1DEN 5.00 5
6.25 kHz
Classification Sensitivity [dBm]
Modulation rate Bitrate -2 -3 -6
FEC Modulation BER 10 BER 10 BER 10
[kb/s] [kb/s]
RX sensitivity, Baudrate 2.60 kBaud
2.60 1.95 3/4 2CPFSK -122.5 -121.0 -119.0
2.60 2.60 Off 2CPFSK -122.0 -120.0 -117.0
5.21 3.91 3/4 4CPFSK -121.0 -119.0 -116.0
5.21 5.21 Off 4CPFSK -120.0 -117.5 -114.0
RX sensitivity, Baudrate 4.34 kBaud
4.34 3.26 3/4 DPSK -122.0 -120.5 -116.0
4.34 4.34 Off DPSK -121.5 -119.5 -114.0
8.68 6.51 3/4 π/4-DQPSK -121.0 -119.5 -115.0
8.68 8.68 Off π/4-DQPSK -120.0 -118.0 -112.0
13.02 9.77 3/4 D8PSK -118.5 -116.0 -110.5
13.02 13.02 Off D8PSK -115.5 -112.0 -105.5
17.36 13.02 3/4 16DEQAM -115.5 -112.0 -106.0
17.36 17.36 Off 16DEQAM -112.5 -109.5 -102.5
26.04 17.36 2/3 64QAM -115.5 -111.5 -103.5
26.04 19.53 3/4 64QAM -112.5 -109.0 -102.0
26.04 21.70 5/6 64QAM -111.5 -106.5 -99.5
26.04 26.04 Off 64QAM -108.5 -104.0 -96.5
34.72 23.15 2/3 256QAM -109.0 -106.0 -100.0
34.72 26.04 3/4 256QAM -108.0 -104.5 -98.0
34.72 28.94 5/6 256QAM -106.0 -103.0 -96.0
34.72 34.72 Off 256QAM -104.0 -100.0 -94.5
12.5 kHz
Modulation rate OBW OBW limit
Modulation Emission code
[kb/s] [kHz] [kHz]
Baudrate 5.21 kBaud
5.21 2CPFSK 7K50F1DBN 7.0 11.0
10.42 4CPFSK 7K50F1DDN 7.0 11.0
Baudrate 8.68 kBaud
8.68 DPSK 10K0G1DBN 10.0 11.0
17.36 π/4-DQPSK 10K0G1DDN 10.0 11.0
26.04 D8PSK 10K0G1DEN 10.0 11.0
34.72 16DEQAM 10K0G1DEN 10.0 11.0
52.08 64QAM 10K0G1DEN 10.0 11.0
69.44 256QAM 10K0G1DEN 10.0 11.0
Baudrate 10.42 kBaud
10.42 DPSK 11K9G1DBN 11.9 12.5
20.83 π/4-DQPSK 11K9G1DDN 11.9 12.5
31.25 D8PSK 11K9G1DEN 11.9 12.5
41.67 16DEQAM 11K9G1DEN 11.9 12.5
62.50 64QAM 11K9G1DEN 11.9 12.5
83.33 256QAM 11K9G1DEN 11.9 12.5
12.5 kHz
Co-Channel
Classification Sensitivity [dBm] Rejection
Ratio
Modulationrate Bitrate -2 -3 -6
FEC Modulation BER 10 BER 10 BER 10 [dB]
[kb/s] [kb/s]
RX sensitivity, Baudrate 5.21 kBaud
5.21 3.91 3/4 2CPFSK -120 -119 -117 -7
5.21 5.21 Off 2CPFSK -120 -118 -115 -10
10.42 7.81 3/4 4CPFSK -119 -117 -114 -11
10.42 10.42 Off 4CPFSK -118 -115 -112 -6
RX sensitivity, Baudrate 10.42 kBaud
10.42 7.81 3/4 DPSK -119 -118 -114 -6.5
10.42 10.42 Off DPSK -119 -117 -112 -5
20.83 15.62 3/4 π/4-DQPSK -118 -117 -113 -9
20.83 20.83 Off π/4-DQPSK -117 -115 -110 -10
31.25 23.44 3/4 D8PSK -116 -113 -108 -12
31.25 31.25 Off D8PSK -113 -109 -103 -14
41.67 31.25 3/4 16DEQAM -112 -109 -103 -16
41.67 41.67 Off 16DEQAM -109 -106 -99 -18.5
62.50 41.67 2/3 64QAM -112 -108 -101 -16
62.50 46.88 3/4 64QAM -110 -106 -99 -19
62.50 52.08 5/6 64QAM -109 -104 -97 -20
62.50 62.50 Off 64QAM -105 -101 -94 -22.5
83.33 55.56 2/3 256QAM -106 -103 -97 -21
83.33 62.50 3/4 256QAM -105 -102 -95 -22
83.33 69.44 5/6 256QAM -103 -100 -93 -24
83.33 83.33 Off 256QAM -100 -97 -90 -28.5
Channel spacing[kHz] 25
Occupied BW limit[kHz] 14 16 16 20 25
Modulation type FSK QAM
RipEX 1 "Mode" CE Narrow FCC CE
Baudrate [kBaud] 8.68 10.42 13.89 17.36 20.83
RED RED RED RED
RipEX2 Compliance RED
FCC, ISED FCC, ISED FCC, ISED FCC, ISED
25 kHz
Modulation rate OBW OBW limit
Modulation Emission code
[kb/s] [kHz] [kHz]
Baudrate 8.68 kBaud
8.68 2CPFSK 13K5F1DBN 13.5 14
17.36 4CPFSK 12K2F1DDN 12.2 14
Baudrate 10.42 kBaud
10.42 2CPFSK 15K5F1DBN 15.5 16
20.83 4CPFSK 15K5F1DDN 15.5 16
Baudrate 13.89 kBaud
13.89 DPSK 15K9G1DBN 15.9 16
27.78 π/4-DQPSK 15K9G1DDN 15.9 16
41.67 D8PSK 15K9G1DEN 15.9 16
55.56 16DEQAM 15K9G1DEN 15.9 16
83.33 64QAM 15K9G1DEN 15.9 16
111.11 256QAM 15K9G1DEN 15.9 16
Baudrate 17.36 kBaud
17.36 DPSK 19K8G1DBN 19.8 20
34.72 π/4-DQPSK 19K8G1DDN 19.8 20
52.08 D8PSK 19K8G1DEN 19.8 20
69.44 16DEQAM 19K8G1DEN 19.8 20
104.17 64QAM 19K8G1DEN 19.8 20
138.89 256QAM 19K8G1DEN 19.8 20
Baudrate 20.83 kBaud
20.83 DPSK 24K0G1DBN 24.0 25
41.67 π/4-DQPSK 24K0G1DDN 24.0 25
62.50 D8PSK 24K0G1DEN 24.0 25
83.33 16DEQAM 24K0G1DEN 24.0 25
125.00 64QAM 24K0G1DEN 24.0 25
166.67 256QAM 24K0G1DEN 24.0 25
25 kHz
Co-Channel
Classification Sensitivity [dBm] Rejection
Ratio
Modulation
Bitrate -2 -3 -6
rate FEC Modulation BER 10 BER 10 BER 10 [dB]
[kb/s]
[kb/s]
Rx sensitivity Baudrate 10.42
10.42 7.81 3/4 2CPFSK -118 -117 -115 -6
10.42 10.42 Off 2CPFSK -118 -116 -113 -7
20.83 15.63 3/4 4CPFSK -117 -115 -112 -10
20.83 20.83 Off 4CPFSK -115 -113 -109 -6
Rx sensitivity Baudrate 20.83
20.83 15.62 3/4 DPSK -117 -116 -112 -6
20.83 20.83 Off DPSK -117 -115 -110 -6
41.66 31.25 3/4 π/4-DQPSK -116 -115 -111 -9
41.66 41.66 Off π/4-DQPSK -115 -113 -108 -10
62.49 46.87 3/4 D8PSK -113 -111 -106 -12
62.49 62.49 Off D8PSK -110 -107 -101 -14.5
83.33 62.49 3/4 16DEQAM -110 -107 -101 -16
83.33 83.33 Off 16DEQAM -108 -105 -98 -18.5
125.00 83.33 2/3 64QAM -110 -106 -99 -16
125.00 93.75 3/4 64QAM -108 -104 -97 -19
125.00 104.17 5/6 64QAM -107 -102 -95 -20
125.00 125.00 Off 64QAM -104 -99 -92 -22.5
166.67 111.11 2/3 256QAM -104 -101 -95 -21
166.67 125.00 3/4 256QAM -103 -100 -93 -22
166.67 138.89 5/6 256QAM -101 -98 -91 -24
166.67 166.67 Off 256QAM -98 -95 -88 -28.5
50 kHz
Modulation rate OBW OBW limit
Modulation Emission code
[kb/s] [kHz] [kHz]
Baudrate 34.72 kBaud
34.72 DPSK 40K0G1DBN 40.0 40
69.44 π/4-DQPSK 40K0G1DDN 40.0 40
104.17 D8PSK 40K0G1DEN 40.0 40
138.89 16DEQAM 40K0G1DEN 40.0 40
208.33 64QAM 40K0G1DEN 40.0 40
277.78 256QAM 40K0G1DEN 40.0 40
Baudrate 41.67 kBaud
41.67 DPSK 45K0G1DBN 45.0 50
83.33 π/4-DQPSK 45K0G1DDN 45.0 50
125.00 D8PSK 45K0G1DEN 45.0 50
166.67 16DEQAM 45K0G1DEN 45.0 50
250.00 64QAM 45K0G1DEN 45.0 50
333.33 256QAM 45K0G1DEN 45.0 50
50 kHz
Co-Channel
Classification Sensitivity [dBm] Rejection
Ratio
Modulation
Bitrate -2 -3 -6
rate FEC Modulation BER 10 BER 10 BER 10 [dB]
[kb/s]
[kb/s]
Baudrate 41.67 kBaud
41.67 31.25 3/4 DPSK -114 -113 -109 -7
41.67 41.67 Off DPSK -114 -112 -107 -7
83.33 62.50 3/4 π/4-DQPSK -113 -112 -108 -10
83.33 83.33 Off π/4-DQPSK -112 -110 -105 -11
125.00 93.75 3/4 D8PSK -110 -108 -103 -13
125.00 125.00 Off D8PSK -107 -104 -98 -15
166.67 125.00 3/4 16DEQAM -107 -104 -98 -17
166.67 166.67 Off 16DEQAM -105 -102 -95 -19
250.00 166.67 2/3 64QAM -107 -103 -96 -17
250.00 187.50 3/4 64QAM -105 -101 -94 -20
250.00 208.33 5/6 64QAM -104 -99 -92 -21
250.00 250.00 Off 64QAM -101 -96 -89 -23
333.33 222.22 2/3 256QAM -101 -98 -92 -22
333.33 250.00 3/4 256QAM -100 -97 -90 -23
333.33 277.78 5/6 256QAM -98 -95 -88 -25
333.33 333.33 Off 256QAM -95 -92 -85 -31
100 kHz
Modulation rate OBW OBW limit
Modulation Emission code
[kb/s] [kHz] [kHz]
Baudrate 69.44 kBaud
69.44 DPSK 80K0G1DBN 80.0 80
138.89 π/4-DQPSK 80K0G1DDN 80.0 80
208.33 D8PSK 80K0G1DEN 80.0 80
277.78 16DEQAM 80K0G1DEN 80.0 80
416.66 64QAM 80K0G1DEN 80.0 80
555.55 256QAM 80K0G1DEN 80.0 80
100 kHz
Co-Channel
Classification Sensitivity [dBm] Rejection
Ratio
Modulation
Bitrate -2 -3 -6
rate FEC Modulation BER 10 BER 10 BER 10 [dB]
[kb/s]
[kb/s]
Baudrate 69.44 kBaud
69.44 52.08 3/4 DPSK -112 -110 -106 -7
69.44 69.44 Off DPSK -111 -109 -104 -7
138.89 104.17 3/4 π/4-DQPSK -111 -109 -105 -10
138.89 138.89 Off π/4-DQPSK -110 -108 -102 -11
208.33 156.25 3/4 D8PSK -108 -105 -100 -13
208.33 208.33 Off D8PSK -105 -101 -95 -15
277.78 208.33 3/4 16DEQAM -104 -101 -95 -17
277.78 277.78 Off 16DEQAM -102 -99 -92 -19
416.66 277.78 2/3 64QAM -104 -100 -93 -17
416.66 312.50 3/4 64QAM -102 -98 -91 -20
416.66 347.22 5/6 64QAM -101 -96 -89 -21
416.66 416.66 Off 64QAM -98 -93 -86 -23
555.55 370.37 2/3 256QAM -99 -95 -89 -22
555.55 416.66 3/4 256QAM -98 -94 -86 -23
555.55 462.96 5/6 256QAM -96 -92 -85 -25
555.55 555.55 Off 256QAM -93 -89 -83 -31
150 kHz
Modulation rate OBW OBW limit
Modulation Emission code
[kb/s] [kHz] [kHz]
Baudrate 115.74 kBaud
115.74 DPSK 125KG1DBN 125.0 125
231.48 π/4-DQPSK 125KG1DDN 125.0 125
347.22 D8PSK 125KG1DEN 125.0 125
462.96 16DEQAM 125KG1DEN 125.0 125
694.45 64QAM 125KG1DEN 125.0 125
925.93 256QAM 125KG1DEN 125.0 125
150 kHz
Co-Channel
Classification Sensitivity [dBm] Rejection
Ratio
Modulation
Bitrate -2 -3 -6
rate FEC Modulation BER 10 BER 10 BER 10 [dB]
[kb/s]
[kb/s]
Baudrate 115.74 kBaud
115.74 86.71 3/4 DPSK -110 -108 -104 -7
115.74 115.74 Off DPSK -109 -107 -102 -7
231.48 173.61 3/4 π/4-DQPSK -109 -107 -103 -10
231.48 231.48 Off π/4-DQPSK -108 -106 -100 -11
347.22 260.42 3/4 D8PSK -106 -103 -98 -13
347.22 347.22 Off D8PSK -103 -99 -93 -15
462.96 347.22 3/4 16DEQAM -102 -99 -93 -17
462.96 462.96 Off 16DEQAM -100 -97 -90 -19
694.45 462.96 2/3 64QAM -102 -98 -91 -17
694.45 520.83 3/4 64QAM -100 -96 -89 -20
694.45 587.71 5/6 64QAM -99 -94 -87 -21
694.45 694.45 Off 64QAM -96 -91 -84 -23
925.93 617.29 2/3 256QAM -97 -93 -87 -22
925.93 694.45 3/4 256QAM -96 -92 -84 -23
925.93 771.61 5/6 256QAM -94 -90 -83 -25
925.93 925.93 Off 256QAM -91 -87 -81 -31
200 kHz
Modulation rate OBW OBW limit
Modulation Emission code
[kb/s] [kHz] [kHz]
Baudrate 138.89 kBaud
138.89 DPSK 150KG1DBN 150.0 175
277.78 π/4-DQPSK 150KG1DDN 150.0 175
416.67 D8PSK 150KG1DEN 150.0 175
555.56 16DEQAM 150KG1DEN 150.0 175
833.33 64QAM 150KG1DEN 150.0 175
1111.11 256QAM 150KG1DEN 150.0 175
200 kHz
Co-Channel
Classification Sensitivity [dBm] Rejection
Ratio
Modulation
Bitrate -2 -3 -6
rate FEC Modulation BER 10 BER 10 BER 10 [dB]
[kb/s]
[kb/s]
Baudrate 138.89 kBaud
138.89 104.17 3/4 DPSK -109 -107 -103 -7
138.89 138.89 Off DPSK -108 -106 -101 -7
277.78 208.33 3/4 π/4-DQPSK -108 -106 -102 -10
277.78 277.78 Off π/4-DQPSK -107 -105 -99 -11
416.67 312.50 3/4 D8PSK -105 -102 -97 -13
416.67 416.67 Off D8PSK -102 -98 -92 -15
555.55 416.67 3/4 16DEQAM -101 -98 -92 -17
555.55 555.55 Off 16DEQAM -99 -96 -89 -19
833.33 555.55 2/3 64QAM -101 -97 -90 -17
833.33 625.00 3/4 64QAM -99 -95 -88 -20
833.33 694.45 5/6 64QAM -98 -93 -86 -21
833.33 833.33 Off 64QAM -95 -90 -83 -23
1111.11 740.74 2/3 256QAM -96 -92 -86 -22
1111.11 833.33 3/4 256QAM -95 -91 -83 -23
1111.11 925.93 5/6 256QAM -93 -89 -82 -25
1111.11 1111.11 Off 256QAM -90 -86 -80 -31
250 kHz
Modulation rate OBW OBW limit
Modulation Emission code
[kb/s] [kHz] [kHz]
Baudrate 208.33 kBaud
208.33 DPSK 225KG1DBN 225.0 250
416.67 π/4-DQPSK 225KG1DDN 225.0 250
625.00 D8PSK 225KG1DEN 225.0 250
833.33 16DEQAM 225KG1DEN 225.0 250
1250.00 64QAM 225KG1DEN 225.0 250
1388.89 256QAM 225KG1DEN 225.0 250
250 kHz
Co-Channel
Classification Sensitivity [dBm] Rejection
Ratio
Modulation
Bitrate -2 -3 -6
rate FEC Modulation BER 10 BER 10 BER 10 [dB]
[kb/s]
[kb/s]
Baudrate 208.33 kBaud
208.33 156.25 3/4 DPSK -107 -106 -102 -7
208.33 208.33 Off DPSK -107 -105 -100 -7
416.67 312.50 3/4 π/4-DQPSK -106 -105 -101 -10
416.67 416.67 Off π/4-DQPSK -105 -103 -98 -11
625.00 468.75 3/4 D8PSK -103 -101 -96 -13
625.00 625.00 Off D8PSK -100 -97 -91 -15
833.33 625.00 3/4 16DEQAM -100 -97 -93 -17
833.33 833.33 Off 16DEQAM -98 -95 -88 -19
1250.00 833.33 2/3 64QAM -100 -96 -89 -17
1250.00 937.50 3/4 64QAM -98 -94 -88 -20
1250.00 1041.67 5/6 64QAM -97 -92 -86 -21
1250.00 1250.00 Off 64QAM -96 -91 -84 -23
1388.89 1111.11 2/3 256QAM -94 -91 -85 -22
1388.89 1250.00 3/4 256QAM -93 -90 -83 -23
1388.89 1388.89 5/6 256QAM -91 -88 -81 -25
300 kHz
Modulation rate OBW OBW limit
Modulation Emission code
[kb/s] [kHz] [kHz]
Baudrate 260.42 kBaud
260.42 DPSK 280KG1DBN 280.0 300
520.83 π/4-DQPSK 280KG1DDN 280.0 300
781.25 D8PSK 280KG1DEN 280.0 300
1041.67 16DEQAM 280KG1DEN 280.0 300
1562.50 64QAM 280KG1DEN 280.0 300
1736.11 256QAM 280KG1DEN 280.0 300
300 kHz
Co-Channel
Classification Sensitivity [dBm] Rejection
Ratio
Modulation
Bitrate -2 -3 -6
rate FEC Modulation BER 10 BER 10 BER 10 [dB]
[kb/s]
[kb/s]
Baudrate 260.42 kBaud
260.42 195.31 3/4 DPSK -106 -104 -100 -7
260.42 260.42 Off DPSK -105 -103 -98 -7
520.83 390.63 3/4 π/4-DQPSK -105 -103 -99 -10
520.83 520.83 Off π/4-DQPSK -104 -102 -96 -11
781.25 585.94 3/4 D8PSK -101 -99 -94 -13
781.25 781.25 Off D8PSK -99 -95 -89 -15
1041.67 781.25 3/4 16DEQAM -98 -95 -91 -17
1041.67 1041.67 Off 16DEQAM -96 -93 -86 -19
1562.50 1041.67 2/3 64QAM -98 -94 -87 -17
1562.50 1171.88 3/4 64QAM -96 -92 -86 -20
1562.50 1302.09 5/6 64QAM -95 -90 -84 -21
1562.50 1562.50 Off 64QAM -92 -87 -81 -23
1736.11 1388.89 2/3 256QAM -93 -89 -83 -22
1736.11 1562.50 3/4 256QAM -91 -88 -81 -23
1736.11 1736.11 5/6 256QAM -90 -86 -79 -25
10.1. Frequency
The radio modem must be operated only in accordance with the valid frequency license issued by na-
tional frequency authority and all radio parameters have to be set exactly as listed.
Important
Use of frequencies between 406.0 and 406.1 MHz is worldwide-allocated only for International
Satellite Search and Rescue System. These frequencies are used for distress beacons and
are incessantly monitored by the ground and satellite Cospas-Sarsat system. Other use of
these frequencies is forbidden.
Important
The radio operator is responsible for setting the radio parameters of the radio modem exactly
in accordance with the valid frequency license issued by national frequency authority, and all
radio parameters to be set exactly as listed.
The minimal safe distance is typically ensured by the antenna position on a mast. When special install-
ation is required, the conditions of the standard EN 50385: 2002 have to be met. The distance between
the persons and antenna shown in the table below comply with all applicable standards for human
exposure of general public to RF electromagnetic fields.
1
http://www.fcc.gov/oet/info/documents/bulletins
Important
For individual interface maximum voltage and current see the following table:
• The radio equipment can only be operated on frequencies stipulated by the body authorized by the
radio operation administration in the respective country and cannot exceed the maximum permitted
output power. RACOM is not responsible for products used in an unauthorized way.
• Equipment mentioned in this User manual may only be used in accordance with instructions contained
in this manual. Error-free and safe operation of this equipment is only guaranteed if this equipment
is transported, stored, operated and controlled in the proper manner. The same applies to equipment
maintenance.
• In order to prevent damage to the radio modem and other terminal equipment the supply must always
be disconnected upon connecting or disconnecting the cable to the radio modem data interface. It
is necessary to ensure that connected equipment has been grounded to the same potential.
10.7. SW license
Conditions of use of this product software abide by the license mentioned below. The program spread
by this license has been freed with the purpose to be useful, but without any specific guarantee. The
author or another company or person is not responsible for secondary, accidental or related damages
resulting from application of this product under any circumstances.
Copyright (c) 2001, RACOM s.r.o., Mírová 1283, Nové Město na Moravě, 592 31
Everyone can copy and spread word-for-word copies of this license, but any change is not permitted.
The program (binary version) is available for free on the contacts listed on https://www.racom.eu. This
product contains open source or another software originating from third parties subject to GNU General
Public License (GPL), GNU Library / Lesser General Public License (LGPL) and / or further author li-
censes, declarations of responsibility exclusion and notifications. Exact terms of GPL, LGPL and some
further licenses is mentioned in source code packets (typically the files COPYING or LICENSE). You
can obtain applicable machine-readable copies of source code of this software under GPL or LGPL li-
censes on contacts listed on https://www.racom.eu. This product also includes software developed by
the University of California, Berkeley and its contributors.
10.8. EU Compliance
According to the Directive 2008/98/EC on waste amended by Directive (EU) 2015/1127 and Directive
(EU) 2018/851 (Waste Framework Directive) we hereby state that our products doesn’t contain sub-
stances of very high concern (SVHC) listed on European chemical agency (ECHA) SCIP database
candidate list in concentrations above 0.1 % w/w.
The RipEX2 radio modem predominantly operates within frequency bands that require a site license
be issued by the radio regulatory authority with jurisdiction over the territory in which the equipment is
being operated.
BG
С настоящото RACOM s.r.o. декларира, че този тип радиосъоръжение RipEX2 е в съответствие
с Директива 2014/53/ЕС.
ES
Por la presente, RACOM s.r.o. declara que el tipo de equipo radioeléctrico RipEX2 es conforme con
la Directiva 2014/53/UE.
CS
Tímto RACOM s.r.o. prohlašuje, že typ rádiového zařízení RipEX2 je v souladu se směrnicí 2014/53/EU.
DA
Hermed erklærer RACOM s.r.o., at radioudstyrstypen RipEX2 er i overensstemmelse med direktiv
2014/53/EU.
DE
Hiermit erklärt RACOM s.r.o., dass der Funkanlagentyp RipEX2 der Richtlinie 2014/53/EU entspricht.
ET
Käesolevaga deklareerib RACOM s.r.o., et käesolev raadioseadme tüüp RipEX2 vastab direktiivi
2014/53/EL nõuetele.
EL
Με την παρούσα ο/η RACOM s.r.o., δηλώνει ότι ο ραδιοεξοπλισμός RipEX2 πληροί την οδηγία
2014/53/ΕΕ.
EN
Hereby, RACOM s.r.o. declares that the radio equipment type RipEX2 is in compliance with Directive
2014/53/EU.
FR
Le soussigné, RACOM s.r.o., déclare que l'équipement radioélectrique du type RipEX2 est conforme
à la directive 2014/53/UE.
HR
RACOM s.r.o. ovime izjavljuje da je radijska oprema tipa RipEX2 u skladu s Direktivom 2014/53/EU.
IT
Il fabbricante, RACOM s.r.o., dichiara che il tipo di apparecchiatura radio RipEX2 è conforme alla
direttiva 2014/53/UE.
LV
Ar šo RACOM s.r.o. deklarē, ka radioiekārta RipEX2 atbilst Direktīvai 2014/53/ES.
LT
Aš, RACOM s.r.o., patvirtinu, kad radijo įrenginių tipas RipEX2 atitinka Direktyvą 2014/53/ES.
HU
RACOM s.r.o. igazolja, hogy a RipEX2 típusú rádióberendezés megfelel a 2014/53/EU irányelvnek.
MT
B'dan, RACOM s.r.o., niddikjara li dan it-tip ta' tagħmir tar-radju RipEX2 huwa konformi mad-Direttiva
2014/53/UE.
NL
Hierbij verklaar ik, RACOM s.r.o., dat het type radioapparatuur RipEX2 conform is met Richtlijn
2014/53/EU.
PL
RACOM s.r.o. niniejszym oświadcza, że typ urządzenia radiowego RipEX2 jest zgodny z dyrektywą
2014/53/UE.
PT
O(a) abaixo assinado(a) RACOM s.r.o. declara que o presente tipo de equipamento de rádio RipEX2
está em conformidade com a Diretiva 2014/53/UE.
RO
Prin prezenta, RACOM s.r.o. declară că tipul de echipamente radio RipEX2 este în conformitate cu
Directiva 2014/53/UE.
SK
RACOM s.r.o. týmto vyhlasuje, že rádiové zariadenie typu RipEX2 je v súlade so smernicou 2014/53/EÚ.
SL
RACOM s.r.o. potrjuje, da je tip radijske opreme RipEX2 skladen z Direktivo 2014/53/EU.
FI
RACOM s.r.o. vakuuttaa, että radiolaitetyyppi RipEX2 on direktiivin 2014/53/EU mukainen.
SV
Härmed försäkrar RACOM s.r.o. att denna typ av radioutrustning RipEX2 överensstämmer med
direktiv 2014/53/EU.
“This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions:
• This device must accept any interference received, including interference that may cause undesired
operation.”
“Changes or modifications not expressly approved by the party responsible for compliance could void
the user's authority to operate the equipment”
Possible values for channels, channel spacing and occupied bandwidth fulfilling FCC rules are shown
in Chapter 9, Technical parameters.
Important
The radio operator is responsible for setting the radio parameters of the radio modem exactly
in accordance with the valid frequency license issued by national frequency authority, and all
radio parameters to be set exactly as listed.
Certified Equipment shall not be distributed, leased, sold or offered for sale in Canada before the details of the certification have
been added to the REL. This certificate has been issued in accordance with the Testing and Certification Regulations of TÜV SÜD
America. For further details related to this certification please contact Certification@tuvam.com
UCB_F_10.09 Rev 1 TÜV SÜD America, Inc. 10 Centennial Drive, Peabody, MA 01960, USA Page 1 of 2
Page 2 of 2
10.11. Warranty
RACOM-supplied parts or equipment ("equipment") is covered by warranty for inherently faulty parts
and workmanship for a warranty period as stated in the delivery documentation from the date of dispatch
to the customer. The warranty does not cover custom modifications to software. During the warranty
period RACOM shall, on its option, fit, repair or replace ("service") faulty equipment, always provided
that malfunction has occurred during normal use, not due to improper use, whether deliberate or acci-
dental, such as attempted repair or modification by any unauthorised person; nor due to the action of
abnormal or extreme environmental conditions such as overvoltage, liquid immersion or lightning strike.
Any equipment subject to repair under warranty must be returned by prepaid freight to RACOM direct.
The serviced equipment shall be returned by RACOM to the customer by prepaid freight. If circumstances
do not permit the equipment to be returned to RACOM, then the customer is liable and agrees to reim-
burse RACOM for expenses incurred by RACOM during servicing the equipment on site. When
equipment does not qualify for servicing under warranty, RACOM shall charge the customer and be
reimbursed for costs incurred for parts and labour at prevailing rates.
This warranty agreement represents the full extent of the warranty cover provided by RACOM to the
customer, as an agreement freely entered into by both parties.
RACOM warrants the equipment to function as described, without guaranteeing it as befitting customer
intent or purpose. Under no circumstances shall RACOM's liability extend beyond the above, nor shall
RACOM, its principals, servants or agents be liable for any consequential loss or damage caused directly
or indirectly through the use, misuse, function or malfunction of the equipment, always subject to such
statutory protection as may explicitly and unavoidably apply hereto.
The Availability depends on specific network design and Service availability. Availability can be increased
by decreasing MTTR. Availability calculation needs to be done for each network element separately.
RipEX2 redundant solution within Field Replaceable Units fully achieving the level availability and reli-
ability for the Core elements.
Note
Core networks elements(repeaters/bases) are typically designed for high availability i.e. needs
to be 99.999% available with any single component (radio node) fails.
If you are unsure on any of the above, please contact RACOM technical support.
2
https://www.racom.eu/eng/products/radio-modem-ripex.html#dnl_fwr2
A P
product
accessories, 33
conformity
addressing
EU, 273
bridge, 45
antenna, 17
mounting, 39 Q
quick guide, 10
B
base driven protocol, 47 R
radio
C parameters, 247
reset, 26
connectors, 17
RoHS and WEEE, 271
Copyright, 9
router, 46
D S
default
safety, 264
parameters, 10
distance, 264
setting, 26
dimensions, 14
T
E technical parameters, 236
environment, 264
EXT, 25 W
warranty, 264
F
flexible protocol, 46
G
grounding, 40
H
hazardous locations, 266
I
installation, 34
IP/serial, 54
L
LED, 28
M
mode
router, 46
base driven, 47
model offerings, 30
mounting
bracket, 36
DIN rail, 35
Revision History
Revision
This manual was prepared to cover a specific version of firmware code. Accordingly, some screens
and features may differ from the actual unit you are working with. While every reasonable effort has
been made to ensure the accuracy of this publication, product improvements may also result in minor
differences between the manual and the product shipped to you.