710 likes | 1.06k Views
NPort OP Modes. Moxa Connectivity 2012-08. NPort OP Modes. NPort 6000 Series. Async Server. Device Control Application. Real COM Mode. Real COM -With Native COM port driver & Real/Fixed TTY driver. Selection Principle. COM/TTY port application
E N D
NPort OP Modes Moxa Connectivity 2012-08
NPort OP Modes NPort 6000 Series Async Server
Device Control Application Real COM Mode Confidential
Real COM-With Native COM port driver & Real/Fixed TTY driver Selection Principle • COM/TTY port application • On Hostdriver will establish the connection • On NPort • "Listen" for connection Ethernet COM3 COM4…… COM N • Real COM driver: • Win9x/NT • Win2K/WinXP/2003/Vista/7/2008 x86 • WinXP/2003/Vista/7/2008 x64 • Real TTY driver: • Linux 2.4/2.6 kernel x86 • Linux 2.4/2.6 kernel x64 • Fixed TTY driver: • SCO Unix, SCO OpenServer 5 & 6, Unixware7, Solaris 10 x86/Sparc, SVR4.2, QNX4.25, QNX6, FreeBSD 5.x & 6, AIX 5.x
Real COM multi-connection application:Multiple Hosts using COM together Ethernet Max. Connection2G NPort: 43G NPort/NPort A:8 • Tips: • 1. Up to 4 hosts using COM together • 2. First in first service, if NPort receive host’s data • 3. Multicast to 4 hosts, if NPort receive serial data • 4. Advanced • Allow driver control • Ignore jammed IP • Command by command NPort 6000 COMn io Server
Device Control Application Reverse Real COM Mode Confidential
Selection Principle Introduction • COM port application • On Hostavailable to be connected • On NPort • "actively" connects with the Host • when power on • Real COM Client Server Establish Connection (Driver) (Firmware) CellularNetwork • ReverseReal COM Server Client Establish Connection (Driver) (Firmware) Confidential
Installation:Step1. Set Reverse Real COM Listening Port Confidential • In NPort Windows Driver Manager • Configuration -> Reverse Real COM • Set Listening Data port & Command port.
Step2. Select OP mode Confidential Login Web console and select Application & Mode
Step3. Specify the Host IP & Listening Port • Specify the PC's IP & TCP listen port • Define NPort "local" data & command port • For some firewall or NAT management issue Confidential
Step4. Mapping COM port • NPort Windows Driver Manager • Add NPort -> Input Manually -> Reverse Real COM Confidential
Device Control Application RFC2217 Mode Confidential
What is RFC2217 mode Selection Principle • COM/TTY port application • On Hostusing RFC2217 COM driver • Similar to Real COM mode • COM port control protocol • An extension of the Telnet protocol :Allows applications to set parameters of remote serial ports (baud rate, flow control, etc.) and detect line signal changes • Can receive and transmit data • Drivers based on RFC2217 may be developed for different devices Confidential
CRC CRC IP Header IP Header TCP Header TCP Header Data Data IP Header TCP Header I/O Control CRC IP Header TCP Header I/O Control CRC RFC2217 vs.Real COM mode TCP Data Port Real COM Mode <IP Address> : 950/966 TCP Command Port Host NPort 6000 RFC2217 Host COM Port Control Protocol <IP Address> : 4001 NPort 6000 Confidential RFC2217 transfers data and serial command via the same TCP port Real COM Mode has more efficient performance than RFC2217
CRC CRC IP Header IP Header TCP Header TCP Header Data Data IP Header TCP Header I/O Control CRC RFC2217 vs. TCP Server mode TCP Server Mode Host TCP Data Port NPort 6000 <IP Address> : 4001 RFC2217 Host COM Port Control Protocol <IP Address> : 4001 NPort 6000 Confidential TCP server mode only can receive and transmit data via TCP port 4001
Third Party RFC2217 Driver —Serial Port Redirector & Serial/IP Redirector • Serial/IP have verified working with NPort 6000 • How to use:1. Set RFC2217 mode in NPort 6000 console2. install RFC-2217 driver3. map COM port in driver Serial/IP Redirectorhttp://www.tacticalsoftware.com Serial Port Redirector http://www.serial-port-redirector.com Confidential
Socket Application TCP Server Mode Confidential
TCP Server mode Telnet IP:Port • Server Administration • Configure • Save setting • Quit 2. Transmit and Receive data Ethernet 1. Establish Connection IP:Port Selection Principle NPort 6000 • On host Your socket program actively • connects with remote site • - On NPortListen for TCP connection RS-232 console port Router Confidential
TCP Server multi-connection application: Listen, Up to 4/8 multi connections Ethernet Max. Connection2G NPort: 43G NPort/NPort A: 8 • Tips: • 1. Up to 4 hosts using COM together • 2. First in first service, if NPort receive host’s data • 3. Multicast to 4 hosts, if NPort receive serial data • 4. Advanced • Allow driver control • Ignore jammed IP • Command by command NPort 6000 COMn io Server
Socket Application TCP Client Mode Confidential
TCP Client mode Socket software 2. Transmit and Receive data Ethernet 1. Establish Connection Selection Principle NPort 6000 • On host Your program waits for remote connection passively • On NPort Active serial to Ethernet data • transmission Serial Card Reader Confidential
TCP Client multi-connection application: Auto Connect Up to 4 destinations Ethernet Max. Connection2G NPort: 43G NPort: 4 • Tips: • 1. Up to 4 hosts using COM together • 2. First in first service, if NPort receive host’s data • 3. Multicast to 4 hosts, if NPort receive serial data • 4. Only transmit the RAW data • 5. Advanced • Ignore jammed IP NPort 6000 COMn io Server
Socket Application UDP Mode Confidential
Selection Principle • Active serial to Ethernet data • transmission • - Real-time data transmission • - Multi-destination UDP Server/Client modeMulti-unicast application R TCP/IP R R Ethernet UDP datagram NPort 6000 Serial Finger Printer
Selection Principle • Active serial to Ethernet data • transmission • - Real-time data transmission • - Multi-destination UDP Server/Client modeMulti-unicast application R TCP/IP R R Ethernet UDP datagram NPort 6000 Serial Finger Printer
Secure Device Server Real COM / TCP Client / TCP Server Confidential
Secure Operation modes (SSL) • Secure Real COM mode Must enable encryption in both Windows driver and NPort 6000 firmware • Secure TCP Server mode • Programming by OpenSSL • A SSDK (Secure SDK) TCP Client example provided for testing of Secure TCP Server mode • Secure TCP Client mode • Programming by OpenSSL • Example for TCP Server will be provided in next SSDK
12345 abcde No Encryption No Encryption Real COM mode
Secure Real COM mode @#$^* &G%^ Encryption Encryption
Secure Real COM mode – SSL Handshake Flow AES, DES, RC4… Hello Client: Cipher Suite Hello Server: AES Certificate: Server Key Exchange Public Server Done Client Key Exchange Private Change Cipher Spec Finish Change Cipher Spec Finish Confidential
Secure TCP Server mode TCP Client Software TCP Server Mode • SSDK TCP Client • Secure Socket SSL
Secure TCP Clientmode TCP Server Software • SSDK TCP Server • Secure Socket TCP Client Mode SSL
Pair Connection Application Confidential
1. Establish Connection Pair Connection mode - Transparent Data Tunnel with Full Modem Signal Control 2.Transmit and Receive data Master Slave NPort 6000 NPort 6000 Raw data or Proprietary protocol RS-232 RS-232 Selection Principle • No driver required • Extend comm. distance for legacy serial device • Line control signals must be transparent Writer PLC Confidential
Pair Connection mode- How Modem Signal be Passed Hands-on Reminding • No HW flow control Slave Master NPort 6000 NPort 6000 RS-232 RS-232 CTS ON RTS ON RTS OFF RTS ON CTS ON Writer PLC Confidential
Ethernet Modem Application Confidential
3.Transmit and Receive data 2.Establish Connection 1. Make connection ATDT 192.168.1.11:4001 OK Connected 4. Disconnect +++ ATH OK Ethernet Modem mode Selection Principle • Modem emulation • Dynamic destination • Suitable for legacy modem control software Ethernet 192.168.1.10 192.168.1.11 NPort 6000 NPort 6000 COM1 RS-232 Serial Legacy DOS Software CNC machine
Terminal Application Terminal ASCII / Binary / SSH Confidential
Terminal mode Terminal control remote server Connecting terminals to UNIX or Windows servers over a network Confidential
Terminal mode • ASCII mode • Up to 8 sessions • Local or RADIUS/TACACS+authentication • Text-based, cannot transfer files • Binary mode • One session • Local or RADIUS/TACACS+ authentication • File transfer • SSH • One session • Local or RADIUS/TACACS+ authentication • Secure transmission Confidential
Terminal mode - ASCII …... 8 ....... Server Ethernet • Up to 8 sessions per terminal • Local or RADIUS/TACACS+ authentication • Text-based, no file transfer • Hot key to change session (e.g., Ctrl+T) RS-232 123456 Terminal
Terminal mode - Binary Server Ethernet RS-232 • One session per terminal • Local or RADIUS/TACACS+ authentication • File transfer supported Terminal
Terminal mode - SSH OpenSSH Server SSH Data Secured Ethernet • One session per terminal • Local or RADIUS/TACACS+ authentication • Secure transmission • SSH v2 supported RS-232 Terminal
Reverse Terminal Application Reverse Telnet / Reverse SSH Confidential
Reverse Terminal Mode Is widely used for console management in telecom Connect to serial console from remote site through the network Configuration purposesex router/ switch/ NPort Confidential
Reverse Terminal Mode • Supported modes • Reverse Telnet • Reverse SSH • Reverse SSH adds data encryption • Reverse Terminal vs. TCP Server mode • Reverse Terminal mode supports CR/LF,CR and LF. • Reverse Terminal mode supports authentication (Local, RADIUS/TACACS+) • NPort 5000 series R-telnet mode do NOT support authentication function Confidential
Reverse SSH SSH client (or Putty)#ssh –l admin 192.168.12.10 4001 • Data encryption • Local or RADIUS/TACACS+ authentication • SSH v2 supported Data Encryption Ethernet RS-232 Router Confidential
Map Keys <CR-LF> • If select <CR>, when press ENTER key from PC, carriage return will send to serial device • Some device you need to use <CR-LF>. • E.g. some CISCO device Reverse Terminal RS-232 CR-LF CR Confidential
Serial Printer Application RAW / LPD Confidential
Serial Printer Mode LPR LPD Supports both RAW and LPD protocols Network printer solution for serial printer Support RAW or LPD printer protocol Line Printer Daemon is for printer server / Line Printer Remote is for printer client The LPR client sends the print request to the IP address of the LPD printer/server Confidential