1 / 64

NPort OP Modes

NPort OP Modes. Moxa Connectivity 2012-08. NPort OP Modes. NPort 6000 Series. Async Server. Device Control Application. Real COM Mode. Real COM -With Native COM port driver & Real/Fixed TTY driver. Selection Principle. COM/TTY port application

charla
Download Presentation

NPort OP Modes

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. NPort OP Modes Moxa Connectivity 2012-08

  2. NPort OP Modes NPort 6000 Series Async Server

  3. Device Control Application Real COM Mode Confidential

  4. Real COM-With Native COM port driver & Real/Fixed TTY driver Selection Principle • COM/TTY port application • On Hostdriver will establish the connection • On NPort • "Listen" for connection Ethernet COM3 COM4…… COM N • Real COM driver: • Win9x/NT • Win2K/WinXP/2003/Vista/7/2008 x86 • WinXP/2003/Vista/7/2008 x64 • Real TTY driver: • Linux 2.4/2.6 kernel x86 • Linux 2.4/2.6 kernel x64 • Fixed TTY driver: • SCO Unix, SCO OpenServer 5 & 6, Unixware7, Solaris 10 x86/Sparc, SVR4.2, QNX4.25, QNX6, FreeBSD 5.x & 6, AIX 5.x

  5. Real COM multi-connection application:Multiple Hosts using COM together Ethernet Max. Connection2G NPort: 43G NPort/NPort A:8 • Tips: • 1. Up to 4 hosts using COM together • 2. First in first service, if NPort receive host’s data • 3. Multicast to 4 hosts, if NPort receive serial data • 4. Advanced • Allow driver control • Ignore jammed IP • Command by command NPort 6000 COMn io Server

  6. Device Control Application Reverse Real COM Mode Confidential

  7. Selection Principle Introduction • COM port application • On Hostavailable to be connected • On NPort • "actively" connects with the Host • when power on • Real COM Client Server Establish Connection (Driver) (Firmware) CellularNetwork • ReverseReal COM Server Client Establish Connection (Driver) (Firmware) Confidential

  8. Installation:Step1. Set Reverse Real COM Listening Port Confidential • In NPort Windows Driver Manager • Configuration -> Reverse Real COM • Set Listening Data port & Command port.

  9. Step2. Select OP mode Confidential Login Web console and select Application & Mode

  10. Step3. Specify the Host IP & Listening Port • Specify the PC's IP & TCP listen port • Define NPort "local" data & command port • For some firewall or NAT management issue Confidential

  11. Step4. Mapping COM port • NPort Windows Driver Manager • Add NPort -> Input Manually -> Reverse Real COM Confidential

  12. Device Control Application RFC2217 Mode Confidential

  13. What is RFC2217 mode Selection Principle • COM/TTY port application • On Hostusing RFC2217 COM driver • Similar to Real COM mode • COM port control protocol • An extension of the Telnet protocol :Allows applications to set parameters of remote serial ports (baud rate, flow control, etc.) and detect line signal changes • Can receive and transmit data • Drivers based on RFC2217 may be developed for different devices Confidential

  14. CRC CRC IP Header IP Header TCP Header TCP Header Data Data IP Header TCP Header I/O Control CRC IP Header TCP Header I/O Control CRC RFC2217 vs.Real COM mode TCP Data Port Real COM Mode <IP Address> : 950/966 TCP Command Port Host NPort 6000 RFC2217 Host COM Port Control Protocol <IP Address> : 4001 NPort 6000 Confidential RFC2217 transfers data and serial command via the same TCP port Real COM Mode has more efficient performance than RFC2217

  15. CRC CRC IP Header IP Header TCP Header TCP Header Data Data IP Header TCP Header I/O Control CRC RFC2217 vs. TCP Server mode TCP Server Mode Host TCP Data Port NPort 6000 <IP Address> : 4001 RFC2217 Host COM Port Control Protocol <IP Address> : 4001 NPort 6000 Confidential TCP server mode only can receive and transmit data via TCP port 4001

  16. Third Party RFC2217 Driver —Serial Port Redirector & Serial/IP Redirector • Serial/IP have verified working with NPort 6000 • How to use:1. Set RFC2217 mode in NPort 6000 console2. install RFC-2217 driver3. map COM port in driver Serial/IP Redirectorhttp://www.tacticalsoftware.com Serial Port Redirector http://www.serial-port-redirector.com Confidential

  17. Socket Application TCP Server Mode Confidential

  18. TCP Server mode Telnet IP:Port • Server Administration • Configure • Save setting • Quit 2. Transmit and Receive data Ethernet 1. Establish Connection IP:Port Selection Principle NPort 6000 • On host Your socket program actively • connects with remote site • - On NPortListen for TCP connection RS-232 console port Router Confidential

  19. TCP Server multi-connection application: Listen, Up to 4/8 multi connections Ethernet Max. Connection2G NPort: 43G NPort/NPort A: 8 • Tips: • 1. Up to 4 hosts using COM together • 2. First in first service, if NPort receive host’s data • 3. Multicast to 4 hosts, if NPort receive serial data • 4. Advanced • Allow driver control • Ignore jammed IP • Command by command NPort 6000 COMn io Server

  20. Socket Application TCP Client Mode Confidential

  21. TCP Client mode Socket software 2. Transmit and Receive data Ethernet 1. Establish Connection Selection Principle NPort 6000 • On host Your program waits for remote connection passively • On NPort Active serial to Ethernet data • transmission Serial Card Reader Confidential

  22. TCP Client multi-connection application: Auto Connect Up to 4 destinations Ethernet Max. Connection2G NPort: 43G NPort: 4 • Tips: • 1. Up to 4 hosts using COM together • 2. First in first service, if NPort receive host’s data • 3. Multicast to 4 hosts, if NPort receive serial data • 4. Only transmit the RAW data • 5. Advanced • Ignore jammed IP NPort 6000 COMn io Server

  23. Socket Application UDP Mode Confidential

  24. Selection Principle • Active serial to Ethernet data • transmission • - Real-time data transmission • - Multi-destination UDP Server/Client modeMulti-unicast application R TCP/IP R R Ethernet UDP datagram NPort 6000 Serial Finger Printer

  25. Selection Principle • Active serial to Ethernet data • transmission • - Real-time data transmission • - Multi-destination UDP Server/Client modeMulti-unicast application R TCP/IP R R Ethernet UDP datagram NPort 6000 Serial Finger Printer

  26. Secure Device Server Real COM / TCP Client / TCP Server Confidential

  27. Secure Operation modes (SSL) • Secure Real COM mode Must enable encryption in both Windows driver and NPort 6000 firmware • Secure TCP Server mode • Programming by OpenSSL • A SSDK (Secure SDK) TCP Client example provided for testing of Secure TCP Server mode • Secure TCP Client mode • Programming by OpenSSL • Example for TCP Server will be provided in next SSDK

  28. 12345 abcde No Encryption No Encryption Real COM mode

  29. Secure Real COM mode @#$^* &G%^ Encryption Encryption

  30. Secure Real COM mode – SSL Handshake Flow AES, DES, RC4… Hello Client: Cipher Suite Hello Server: AES Certificate: Server Key Exchange Public Server Done Client Key Exchange Private Change Cipher Spec Finish Change Cipher Spec Finish Confidential

  31. Secure TCP Server mode TCP Client Software TCP Server Mode • SSDK TCP Client • Secure Socket SSL

  32. Secure TCP Clientmode TCP Server Software • SSDK TCP Server • Secure Socket TCP Client Mode SSL

  33. Pair Connection Application Confidential

  34. 1. Establish Connection Pair Connection mode - Transparent Data Tunnel with Full Modem Signal Control 2.Transmit and Receive data Master Slave NPort 6000 NPort 6000 Raw data or Proprietary protocol RS-232 RS-232 Selection Principle • No driver required • Extend comm. distance for legacy serial device • Line control signals must be transparent Writer PLC Confidential

  35. Pair Connection mode- How Modem Signal be Passed Hands-on Reminding • No HW flow control Slave Master NPort 6000 NPort 6000 RS-232 RS-232 CTS ON RTS ON RTS OFF RTS ON CTS ON Writer PLC Confidential

  36. Ethernet Modem Application Confidential

  37. 3.Transmit and Receive data 2.Establish Connection 1. Make connection ATDT 192.168.1.11:4001 OK Connected 4. Disconnect +++ ATH OK Ethernet Modem mode Selection Principle • Modem emulation • Dynamic destination • Suitable for legacy modem control software Ethernet 192.168.1.10 192.168.1.11 NPort 6000 NPort 6000 COM1 RS-232 Serial Legacy DOS Software CNC machine

  38. Terminal Application Terminal ASCII / Binary / SSH Confidential

  39. Terminal mode Terminal control remote server Connecting terminals to UNIX or Windows servers over a network Confidential

  40. Terminal mode • ASCII mode • Up to 8 sessions • Local or RADIUS/TACACS+authentication • Text-based, cannot transfer files • Binary mode • One session • Local or RADIUS/TACACS+ authentication • File transfer • SSH • One session • Local or RADIUS/TACACS+ authentication • Secure transmission Confidential

  41. Terminal mode - ASCII …... 8 ....... Server Ethernet • Up to 8 sessions per terminal • Local or RADIUS/TACACS+ authentication • Text-based, no file transfer • Hot key to change session (e.g., Ctrl+T) RS-232 123456 Terminal

  42. Terminal mode - Binary Server Ethernet RS-232 • One session per terminal • Local or RADIUS/TACACS+ authentication • File transfer supported Terminal

  43. Terminal mode - SSH OpenSSH Server SSH Data Secured Ethernet • One session per terminal • Local or RADIUS/TACACS+ authentication • Secure transmission • SSH v2 supported RS-232 Terminal

  44. Reverse Terminal Application Reverse Telnet / Reverse SSH Confidential

  45. Reverse Terminal Mode Is widely used for console management in telecom Connect to serial console from remote site through the network Configuration purposesex router/ switch/ NPort Confidential

  46. Reverse Terminal Mode • Supported modes • Reverse Telnet • Reverse SSH • Reverse SSH adds data encryption • Reverse Terminal vs. TCP Server mode • Reverse Terminal mode supports CR/LF,CR and LF. • Reverse Terminal mode supports authentication (Local, RADIUS/TACACS+) • NPort 5000 series R-telnet mode do NOT support authentication function Confidential

  47. Reverse SSH SSH client (or Putty)#ssh –l admin 192.168.12.10 4001 • Data encryption • Local or RADIUS/TACACS+ authentication • SSH v2 supported Data Encryption Ethernet RS-232 Router Confidential

  48. Map Keys <CR-LF> • If select <CR>, when press ENTER key from PC, carriage return will send to serial device • Some device you need to use <CR-LF>. • E.g. some CISCO device Reverse Terminal RS-232 CR-LF CR Confidential

  49. Serial Printer Application RAW / LPD Confidential

  50. Serial Printer Mode LPR LPD Supports both RAW and LPD protocols Network printer solution for serial printer Support RAW or LPD printer protocol Line Printer Daemon is for printer server / Line Printer Remote is for printer client The LPR client sends the print request to the IP address of the LPD printer/server Confidential

More Related