15.01.2015 Views

Rugged Operating System (ROS ® ) Software User ... - RuggedCom

Rugged Operating System (ROS ® ) Software User ... - RuggedCom

Rugged Operating System (ROS ® ) Software User ... - RuggedCom

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 1<br />

Introduction<br />

RUGGEDCOM <strong>ROS</strong><br />

<strong>User</strong> Guide<br />

Section 1.1.3<br />

Bootloader Considerations<br />

NOTE<br />

<strong>ROS</strong> Key Management features require Boot <strong>Software</strong> v2.20.0 at minimum. It is strongly<br />

recommended to update the bootloader to this version or higher.<br />

NOTE<br />

If a Boot upgrade is required from Boot v2.15.0 or older, it is recommended to run the "flashfiles defrag"<br />

command from the CLI Shell prior to the bootloader upgrade.<br />

In the event that it is impracticable to update the bootloader to v2.20.0 or higher, some of the key management<br />

features will nevertheless be available, although in a degraded mode. A <strong>ROS</strong> system running Main <strong>Software</strong> v<br />

and Boot <strong>Software</strong> earlier than v2.20.0 will have the following behaviour:<br />

• The unit will use the default keys after every reset, and immediately begin generating ssl.crt and<br />

ssh.keys. It will not, however, write these files to flash.<br />

• The unit will accept user-uploaded ssl.crt and ssh.keys, but again, it will not write these files to flash.<br />

WARNING!<br />

If <strong>ROS</strong> Boot <strong>Software</strong> earlier than v2.20.0 runs and creates log entries, there is the possibility that it will<br />

overflow into an area of Flash memory that is reserved by <strong>ROS</strong> Main <strong>Software</strong> v or newer for keys. If<br />

this were to occur, some syslog data would not be readable by Main.<br />

In the even more unlikely event that <strong>ROS</strong> Boot <strong>Software</strong> v2.20.0 or newer had been installed and Main had<br />

written the ssl.crt and ssh.keys files, and the unit had subsequently had a downgrade to Boot <strong>Software</strong><br />

earlier than v2.20.0, there is a possibility similar to the warning above, whereby Boot logging could possibly<br />

overwrite and therefore destroy one or both installed key files.<br />

Section 1.2<br />

SNMP MIB Support<br />

Section 1.2.1<br />

Standard MIBs<br />

Table: Standard MIBs<br />

Standard MIB Name Title<br />

RFC 2578 SNMPv2-SMI Structure of Management Information Version 2<br />

RFC 2579 SNMPv2-TC Textual Convention s for SMIv2<br />

RFC 2580<br />

SNMPv2-CONF<br />

IANAifType<br />

Conformance Statements for SMIv2<br />

Enumerated Values of The ifType Object Defined<br />

ifTable defined in IF-MIB<br />

RFC 1907 SNMPv2-MIB Management Information Base for SNMPv2<br />

RFC 2011 IP-MIB SNMPv2 Mnagement Information Base for Internet<br />

Protocol using SMIv2<br />

6 Bootloader Considerations

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!