SEL-2730M: Managed Ethernet Switch
SEL-2730M: Managed Ethernet Switch
SEL-2730M: Managed Ethernet Switch
SEL-2730M
Managed Ethernet Switch
Instruction Manual
20211227
*PM2730M-01*
© 2012–2021 by Schweitzer Engineering Laboratories, Inc. All rights reserved.
All brand or product names appearing in this document are the trademark or registered trademark of their respective holders. No SEL trademarks
may be used without written permission.
SEL products appearing in this document may be covered by U.S. and Foreign patents. Schweitzer Engineering Laboratories, Inc. reserves all
rights and benefits afforded under federal and international copyright and patent laws in its products, including without limitation software,
firmware, and documentation.
The information in this document is provided for informational use only and is subject to change without notice. Schweitzer Engineering
Laboratories, Inc. has approved only the English language document.
This product is covered by the standard SEL 10-year warranty. For warranty details, visit selinc.com or contact your customer service
representative. PM2730M-01
Section 2: Installation
Introduction ..................................................................................................................................................... 2.1
Connecting to the Device ................................................................................................................................ 2.1
Commissioning the Device.............................................................................................................................. 2.4
Navigating the User Interface.......................................................................................................................... 2.4
Installing a New Web Certificate..................................................................................................................... 2.6
Device Dashboard............................................................................................................................................ 2.7
Battery Change Instructions .......................................................................................................................... 2.12
Troubleshooting............................................................................................................................................... 6.4
Technical Support ............................................................................................................................................ 6.5
Appendix E: Syslog
Introduction .....................................................................................................................................................E.1
Remote Syslog Servers....................................................................................................................................E.3
Open-Source Syslog Servers ...........................................................................................................................E.3
SEL-2730M Event Logs..................................................................................................................................E.3
Manual Overview
This instruction manual describes the functionality and use of the SEL-2730M
Managed Ethernet Switch. It includes information necessary to install,
configure, test, and operate this device.
An overview of the manual’s layout and the topics that are addressed follows.
Preface. Describes the manual organization and conventions used to
present information.
Section 1: Introduction and Specifications. Introduces SEL-2730M
applications, connectivity, and use requirements. This section also lists
specifications.
Section 2: Installation. Provides dimension drawings on the SEL-2730M
and instructions for initializing the SEL-2730M.
Section 3: Managing Users. Explains how users are managed on the
SEL-2730M.
Section 4: Job Done Examples. Provides three Job Done examples. These
examples provide step-by-step configuration of the SEL-2730M for
application in various SCADA and engineering access environments.
Section 5: Settings and Commands. Lists and describes all the
SEL-2730M settings and commands.
Section 6: Testing and Troubleshooting. Provides guidelines for testing
and troubleshooting the SEL-2730M.
Appendix A: Firmware and Manual Versions. Lists firmware and manual
revisions.
Appendix B: Firmware Upgrade Instructions. Provides instructions to
update the firmware in the SEL-2730M.
Appendix C: User-Based Accounts. Introduces user-based accounts and
the benefits associated with using user-based accounts.
Appendix D: Lightweight Directory Access Protocol. Describes
Lightweight Directory Access Protocol (LDAP) and its use in SEL
products.
Appendix E: Syslog. Introduces the Syslog Protocol and its uses in SEL
products.
Appendix F: Networking Fundamentals. Provides an overview of
Windows Networking and network configuration.
Appendix G: Virtual Local Area Networks. Describes VLANs, their
purpose, and how they should be used in control system environments.
Appendix H: Classless Inter-Domain Routing (CIDR). Explains CIDR and
CIDR notation.
Appendix I: X.509. Explains the structure and use of X.509 certificates.
Appendix J: Accessing Port Information Through SNMP. Describes the
mapping between ifIndex and SEL-2730M port number.
Safety Information
CAUTION
To ensure proper safety and operation, the equipment ratings, installation instructions, and
operating instructions must be checked before commissioning or maintenance of the equipment.
The integrity of any protective conductor connection must be checked before carrying out any other
actions. It is the responsibility of the user to ensure that the equipment is installed, operated, and
used for its intended function in the manner specified in this manual. If misused, any safety
protection provided by the equipment may be impaired.
Dangers, Warnings, This manual uses three kinds of hazard statements, defined as follows:
and Cautions
DANGER
Indicates an imminently hazardous situation
that, if not avoided, will result in death or
serious injury.
WARNING
Indicates a potentially hazardous situation
that, if not avoided, could result in death or
serious injury.
CAUTION
Indicates a potentially hazardous situation
that, if not avoided, may result in minor or
moderate injury or equipment damage.
Safety Symbols The following symbols are often marked on SEL products.
CAUTION ATTENTION
Refer to accompanying documents. Se reporter à la documentation.
CAUTION ATTENTION
There is danger of explosion if the battery is incorrectly replaced. Une pile remplacée incorrectement pose des risques d’explosion.
Replace only with Panasonic BR-1632A/DBN or equivalent Remplacez seulement avec un Panasonic BR-1632A/DBN ou un produit
recommended by manufacturer. See Owner's Manual for safety équivalent recommandé par le fabricant. Voir le guide d’utilisateur
instructions. The battery used in this device may present a fire or pour les instructions de sécurité. La pile utilisée dans cet appareil peut
chemical burn hazard if mistreated. Do not recharge, disassemble, présenter un risque d’incendie ou de brûlure chimique si vous en faites
heat above 100°C or incinerate. Dispose of used batteries according to mauvais usage. Ne pas recharger, démonter, chauffer à plus de 100°C
the manufacturer’s instructions. Keep battery out of reach of children. ou incinérer. Éliminez les vieilles piles suivant les instructions du
fabricant. Gardez la pile hors de la portée des enfants.
Disconnect both power supplies before servicing. Débranchez les deux blocs d’alimentation avant l’entretien.
DANGER DANGER
Disconnect or de-energize all external connections before opening this Débrancher tous les raccordements externes avant d’ouvrir cet
device. Contact with hazardous voltages and currents inside this appareil. Tout contact avec des tensions ou courants internes à
device can cause electrical shock resulting in injury or death. l’appareil peut causer un choc électrique pouvant entraîner des
blessures ou la mort.
DANGER DANGER
Contact with instrument terminals can cause electrical shock that can Tout contact avec les bornes de l’appareil peut causer un choc
result in injury or death. électrique pouvant entraîner des blessures ou la mort.
WARNING AVERTISSEMENT
Use of this equipment in a manner other than specified in this manual L'utilisation de cet appareil suivant des procédures différentes de
can impair operator safety safeguards provided by this equipment. celles indiquées dans ce manuel peut désarmer les dispositifs de
protection d'opérateur normalement actifs sur cet équipement.
WARNING AVERTISSEMENT
Have only qualified personnel service this equipment. If you are not Seules des personnes qualifiées peuvent travailler sur cet appareil. Si
qualified to service this equipment, you can injure yourself or others, vous n’êtes pas qualifiés pour ce travail, vous pourriez vous blesser
or cause equipment damage. avec d’autres personnes ou endommager l’équipement.
WARNING AVERTISSEMENT
Do not look into the fiber ports/connectors. Ne pas regarder vers les ports ou connecteurs de fibres optiques.
WARNING AVERTISSEMENT
Do not look into the end of an optical cable connected to an optical Ne pas regarder vers l’extrémité d’un câble optique raccordé à une
output. sortie optique.
WARNING AVERTISSEMENT
Do not perform any procedures or adjustments that this instruction Ne pas appliquer une procédure ou un ajustement qui n’est pas décrit
manual does not describe. explicitement dans ce manuel d’instruction.
WARNING AVERTISSEMENT
During installation, maintenance, or testing of the optical ports, use Durant l’installation, la maintenance ou le test des ports optiques, utili-
only test equipment qualified for Class 1 laser products. sez exclusivement des équipements de test homologués comme pro-
duits de type laser de Classe 1.
WARNING AVERTISSEMENT
Incorporated components, such as LEDs and transceivers are not user Les composants internes tels que les leds (diodes électrolumines-
serviceable. Return units to SEL for repair or replacement. centes) et émetteurs-récepteurs ne peuvent pas être entretenus par
l'usager. Retourner les unités à SEL pour réparation ou remplacement.
CAUTION ATTENTION
Equipment components are sensitive to electrostatic discharge (ESD). Les composants de cet équipement sont sensibles aux décharges
Undetectable permanent damage can result if you do not use proper électrostatiques (DES). Des dommages permanents non-décelables
ESD procedures. Ground yourself, your work surface, and this peuvent résulter de l’absence de précautions contre les DES.
equipment before removing any cover from this equipment. If your Raccordez-vous correctement à la terre, ainsi que la surface de travail
facility is not equipped to work with these components, contact SEL et l’appareil avant d’en retirer un panneau. Si vous n’êtes pas équipés
about returning this device and related SEL equipment for service. pour travailler avec ce type de composants, contacter SEL afin de
retourner l’appareil pour un service en usine.
CAUTION ATTENTION
In order to avoid losing system logs on a factory-default reset, Pour éviter de perdre les enregistrements du système sur un
configure the SEL-2730M to forward Syslog messages. redémarrage défini par défaut, configurer le SEL-2730M pour envoyer
les messages de l'enregistreur du système (“Syslog”).
General Information
Examples This instruction manual uses several example illustrations and instructions to
explain how to effectively operate the SEL-2730M Managed Ethernet Switch.
These examples are for demonstration purposes only; the firmware
identification information or settings values these examples include may not
necessarily match those in the present version of your SEL-2730M.
Trademarks All brand or product names appearing in this document are the trademark or
registered trademark of their respective holders. No SEL trademarks may be
used without written permission.
SEL trademarks appearing in this manual are shown in the following table.
Copyrighted Software The software included in this product may contain copyrighted software
licensed under terms that give you the opportunity to receive source code. You
may obtain the applicable source code from SEL by sending a request to:
Legal Department
GPL Compliance
Schweitzer Engineering Laboratories, Inc.
One Schweitzer Drive
Pullman, WA 99163
Please include your return address, product number, and firmware revision.
Technical Support We appreciate your interest in SEL products and services. If you have
questions or comments, please contact us at:
Schweitzer Engineering Laboratories, Inc.
2350 NE Hopkins Court
Pullman, WA 99163-5603 U.S.A.
Tel: +1.509.338.3838
Fax: +1.509.332.7990
Internet: selinc.com/support
Email: info@selinc.com
Introduction
This section includes the following information about the SEL-2730M
Managed Ethernet Switch.
➤ Product Overview on page 1.1
➤ Product Features on page 1.1
➤ Connections, Reset Button, and LED Indicators on page 1.3
➤ Software System Requirements on page 1.6
➤ General Safety and Care Information on page 1.7
➤ Front- and Rear-Panel Diagrams on page 1.7
➤ Dimension Drawing on page 1.8
➤ Specifications on page 1.10
Product Overview
The SEL-2730M Managed Ethernet Switch is designed for the harsh
environments commonly found in the energy and utility industries. The
SEL-2730M supports communications infrastructures built for engineering
access, supervisory control and data acquisition (SCADA), and real-time data
communication, and offers the same reliability found in SEL protective relays.
Product Features
➤ Reliable. Increase availability with the SEL-2730M, which is
designed, built, and tested to function in harsh environments
such as substations. Optional hot-swappable, dual power
supplies allow connectivity to primary and backup power
sources.
➤ Flexible. Maximize flexibility by using SEL-2730M ordering
options to meet different network configurations. Order the
SEL-2730M with Ethernet ports in combinations of copper,
single-mode fiber, and multimode fiber. Add even more
flexibility by using the four small form-factor pluggable (SFP)
modules to change port configurations when network designs
change.
➤ Port Monitoring. Monitor port health for link flap and frame
check sequence cyclic redundancy check (CRC) errors.
➤ Port Configuration. Use per-port configuration of settings
such as speed, duplex, and auto-negotiation, which facilitates
connection with other devices.
➤ User-Based Accounts. Provide user accountability and
separate authorization levels for configuration and
maintenance. Use LDAP or RADIUS with two-factor
authentication for centralized user authentication.
Status Indicators Figure 1.2 shows the layout of the status indicators on the front of the
SEL-2730M. After the device has turned on and is in a normal operating state,
a red LED indicates a non-optimal condition needing operator attention.
17 18 19 20 21 22 23 24
LAMP 100 Mbps
TEST LNK/ACT
ENABLED PWR A 1 Gbps 100 Mbps
ALARM PWR B LNK/ACT LNK/ACT
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Lamp Test
The LAMP TEST button illuminates all front-panel indicators when pressed.
Rear Panel
The base-model SEL-2730M has four Gigabit Ethernet copper ports and
sixteen 10/100 Mbps copper Ethernet ports, built as four-port modules. You
NOTE: Fiber Ethernet devices
can order each of the 10/100 Mbps copper port modules as single- or
connected to the fiber ports must multimode fiber-optic ports to meet the unique requirements of your network.
match both the speed and sub-type You can also add as many as 4 ports that use small form-factor pluggable
(FX) of the SEL-2730M port.
(SFP) modules for a total of 24 ports. These SFP ports can be any combination
NOTE: SEL-2730M fiber ports are of fiber-optic Gigabit Ethernet ports and 10/100/1000 copper ports.
100 Mbps only; they will not operate at
10 Mbps.
Ethernet copper ports support Auto MDI/MDX and auto-negotiation for speed
and duplex values. Gigabit fiber-optic SFP ports support auto-negotiation of
speed, but only support the Gigabit speed. 100 Mbps fiber-optic ports support
auto-negotiation of speed but only support the 100 Mbps speed.
Pin Description
1 A+
2 A-
3 B+
4 C+
5 C–
6 B–
7 D+
8 D–
Pin Description
1 A+
2 A–
3 B+
4 N/C
5 N/C
6 B–
7 N/C
8 N/C
Pin Description
1 GND
2 –/N
3 +/H
Pin Description
1 GND
2 –
3 +
The POWER terminal on the rear of the power supplies must connect to a source
within the rated range of the SEL-2730M. The POWER terminals are isolated
from the chassis ground. Use 1.5–2.5 mm (16–14 AWG) wire to connect to
the POWER terminals.
Pin Description
C1 Normally Open
C2 Common
C3 Normally Closed
Cleaning Instructions ➤ The device should be de-energized (by removing the power
connection to both the power and alarm connection) before cleaning.
➤ The case can be wiped down with a damp cloth. Solvent-based
cleaners should not be used on plastic parts or labels.
Dimension Drawing
RACK-MOUNT CHASSIS WALL/SURFACE-MOUNT CHASSIS
.80
[20.3]
.31
9.79 10.03 6.61 [7.9]
[248.8] TOP [254.8] [167.8] TOP
1.25
.25 18.21 [31.8]
[6.3] [462.5]
18.43
[468.2]
18.99
[482.4]
9.81
[249.3] TOP
.73
[18.5]
19.80 4X #10-32
[502.9] STUD
3.15
[80.0] FRONT SIDE
4X Ø.25
17.63 [Ø6.4]
[447.8]
18.31 1.25
1.80 [465.1] [31.8]
[45.7]
PANEL CUTOUT
LEGEND
in
[mm] i9387d
Note: The SEL-2730M supports front, 19-inch rack-mount, DIN-rail mount, panel-mount, and wall-mount installations.
Note: Order the surface-mount SEL-2730M with the DIN-rail mounted adapter kit, or the surface-mounting kit and the
DIN-rail adapters if it is a conversion from a rack mount.
Note: When using 915900533 wall-mount brackets, use appropriate fasteners for the wall location to which the unit is
being mounted and install the device in a restricted area with wires down.
Note: When using the wall-mount brackets, insert one mounting screw in each bracket cutout, for a total of four mounting
screws per switch.
Note: For torque recommendations, refer to Specifications.
Mounting Options
Mounting The SEL-2730M comes with reversible mounting ears to support surface
mount and front- and rear-panel installations. When mounting multiple
Instructions SEL-2730M in the same rack, leave a one-unit space between each device to
ensure proper heat dissipation.
Warranty
The SEL-2730M meets or exceeds the IEEE 1613 Class 1, IEC 61850-3, and
IEC 60255 industry standards for communications devices in electrical
substations for vibration, electrical surges, fast transients, extreme
temperatures, and electrostatic discharge.
SEL manufactures the SEL-2730M through the use of the same high standards
as those for SEL protective relays and backs it with the same 10-year
worldwide warranty.
Specifications
Rear Connectors: RJ45 female or LC fiber (single-mode or
Compliance multimode)
Designed and manufactured under an ISO 9001 certified quality Standard: IEEE 802.3-2012
management system IEEE 802.3-2012 excluding 10 Gbps and
UL Listed to U.S. and Canadian safety standards above
(File E220228; NRAQ/NRAQ7) (rack-mount configuration only) IEEE 802.3-2008/Cor 1
IEEE 802.3bd
CE Mark IEEE 802.3bf
RCM Mark Fiber-Optic Ports
General Multimode Option (to 2 km)
Storage: 512 MB Rated Supply Voltage: 125–250 Vdc; 120–240 Vac, 50/60 Hz
Grounded Neutral Device in series with the HOT or Maximum: 4 Nm (35 in-lb)
Systems: energized conductor Grounding Screw
DC and Isolated Device in series with both conductors Ground Wiring
Systems:
Insulation: 300 V minimum
Fuse Ratings
Size: 12 AWG
Power Supply Fuse
Length: <3 m
SEL-9330-A: 2.5 A, 250 Vdc/300 Vac Time-lag T,
250 Vac/1500 A break rating Tightening Torque
SEL-9330-C: 4.0 A, 150 Vdc Time-lag T, 250 Vac/ Minimum: 0.9 Nm (8 in-lb)
1500 A break rating Maximum: 1.4 Nm (12 in-lb)
Note: Fuses are not user-serviceable. Ring Terminal Recommended
Alarm Contact Output Dimensions
Per IEC 255-0-20:1974, Using Simplified Method of Assessment: 1U Rack Mount
Output Type: Relay, Form C, break-before-make Height: 43.7 mm (1.72 in)
Power Supply Burden: <1 W maximum Depth: 232.1 mm (9.14 in)
Mechanical Life: 2000000 operations Width: 482.5 mm (19 in)
Operational Voltage: 250 Vac/Vdc 1U Panel Mount
Make: 30 A at 250 Vdc Height: 80.0 mm (3.15 in)
Carry: 6 A continuous at 70°C Depth: 261.9 mm (10.31 in)
1 s Rating 50 A Width: 502.9 mm (19.80 in)
MOV Protection: 270 Vac, 23 J
Weight
Insulation Voltage: 300 Vdc
1.96 kg (4.3 lb)
Pickup Time: <8 ms
Environmental
Dropout Time: <8 ms
Breaking Capacity (10,000 Operations):
Operating Temperature
24 V 0.75 A L/R = 40 ms –40° to +85°C (–40° to +185°F)
48 V 0.50 A L/R = 40 ms Relative Humidity
125 V 0.30 A L/R = 40 ms
250 V 0.20 A L/R = 40 ms 0% to 95% non-condensing
Cyclic Capacity (2.5 Cycles/Second): Altitude
24 V 0.75 A L/R = 40 ms 2000 m
48 V 0.50 A L/R = 40 ms
125 V 0.30 A L/R = 40 ms Atmospheric Pressure
250 V 0.20 A L/R = 40 ms
80–110 kPa
Introduction
This section includes the following information:
➤ Connecting to the Device on page 2.1
➤ Commissioning the Device on page 2.4
➤ Navigating the User Interface on page 2.4
➤ Device Dashboard on page 2.7
Physical Network
Connect the device to your computer as shown in Figure 2.1. Using a standard
RJ45 Ethernet cable, connect the Ethernet port of your computer to the front
Ethernet port (ETH F) of the device. The web management interface of an
uncommissioned SEL-2730M can only be reached through the front Ethernet
port. After commissioning, an additional IP interface can be configured. See
Network Settings on page 5.20 for information on enabling an additional IP
interface.
Ethernet
(DHCP Enabled)
Ethernet
Cable
The default URL for the web server via the front port is https://192.168.1.2.
However, if your computer is configured as a DHCP client, the SEL-2730M
Captive Port feature sends the necessary network configuration information
from the SEL-2730M to place your computer in the same subnet as the
SEL-2730M. This will direct any entered URL to the SEL-2730M. More
information about the Captive Port feature can be found in Network Settings
on page 5.20. If you prefer to use a static IP address, you can set these
parameters yourself as described in Configuring a Static IP Address in
Microsoft Windows Networking on page 2.10.
To set the network connection of your computer to be automatically
configured, follow these steps:
Step 1. Open the Microsoft Windows Network Connections Control
Panel applet. Do this by typing ncpa.cpl in the Windows Run
dialog box, as shown in Figure 2.2. Selecting OK will open the
Network Connections window, which contains a list of the
network devices available on your computer.
Step 3. Select the Internet Protocol (TCP/IP) entry from the This
connection uses the following items list (this entry is usually
located last in the list). Select the Properties button to show the
Internet Protocol (TCP/IP) Properties window (see
Figure 2.5).
Step 2. Enter the account information for the first administrative user.
This requires both a username and a password. The password
must be entered twice to ensure that it is correctly typed,
because the password characters are hidden.
Step 3. Select the Submit button to complete commissioning. When
the page reloads, you will be able to log in as the administrative
user to set up accounts and configure the system. Navigating
the User Interface on page 2.4 provides a general description of
the web interface.
When you log in to the device, you are presented with the Dashboard as
shown in Figure 2.7. The Dashboard gives a quick overview of the status of
the device. The features of the Dashboard are explained in greater detail later
in this section.
The far-left frame of the device web interface is the navigation panel.
Selecting any link on this panel will take you to the associated page that
includes all the settings and configurations for that part of the system. The
navigation panel is always present on the web interface. One of the first tasks
might be to create user accounts for personnel who will be configuring and
maintaining the device. Selecting the Local Users link in the navigation panel
will open the Accounts page as shown in Figure 2.8.
The Local Users page shown in Figure 2.8 shows the main panel of the web
interface. This sample shows the single administrative user created when the
device was configured. On this page, we can also see the status of each user
account and details about the users.
The Local Users page has an Add New User button above the table. There is
also an Edit button for each user in the table. Each user will also have a Delete
button, except for that user when there is only one administrative user left. The
last administrative user cannot be deleted.
Selecting the Add New User button will display the user form (see
Figure 2.9) to allow changing the role, description, password, or enabled
condition of a user. Selecting the Edit button will show the same form,
without the username box.
Step 5. Select Submit. If the certificate is valid, it will appear in the list
of certificates with an Activate button.
Step 6. Select Activate for the new certificate and then Yes to continue.
The SEL-2730M begins refreshing the web interface; when the
Activating certificate button turns green, select it to return to
the web interface.
You can confirm that the X.509 certificate is presently active by navigating to
the X.509 Certificate page.
There should now be a check mark ( ) to the left of the alias of the
certificate that you activated. You may now remove the self-signed certificate
by selecting the Delete button for the Default_Web_Cert certificate.
Device Dashboard
The device Dashboard is the page that is displayed when a user logs in to the
device. The Dashboard provides a quick overview of the state of the device. To
access the Dashboard from another device webpage, select the Dashboard
link on the left navigation panel.
Network Interfaces The Network Interfaces section of the Dashboard contains icons representing
each physical Ethernet network interface on the device. You can mouse over
any of the network interface port icons to see the alias and current status
information of the port. Selecting one of these icons will add a status area to
the Dashboard and add a line to it containing the statistics for that interface.
More information about network interface configuration can be found in
Section 5: Settings and Commands.
The network interface icons are color-coded to indicate the configuration state
of that interface. The interface icon colors and their meanings can be found in
Table 2.1.
Device Information This section of the Dashboard provides version information, including part
number, serial number, and the firmware identification string. This
information can be useful when technical support or firmware upgrades are
necessary.
System Statistics The System Statistics area (see Figure 2.16) of the Dashboard provides some
basic statistics of device operations. This information can quickly help
determine whether the device firmware is operating properly.
Statistic Meaning
Diagnostics The Diagnostics section (see Figure 2.17) of the Dashboard provides simple
status indications for the basic hardware systems of the SEL-2730M. This
information can quickly help determine the health of the device hardware and
that it is operating properly.
Configuring a Static To configure the SEL-2730M by using a static IP address, you will need to
configure your computer to communicate on the 192.168.1.0/24 subnet. For a
IP Address in description of the Classless Inter-Domain Routing (CIDR) notation, see
Microsoft Windows Appendix H: Classless Inter-Domain Routing (CIDR).
Networking Step 1. Start the Microsoft Windows Command Terminal.
a. Open the Run command (from the Start menu).
NOTE: The instructions in this b. Type cmd in the text box.
section are provided in the event
you decide to use a static IP c. Select OK.
address to access the device
instead of configuring your
computer for DHCP.
Step 5. Select the Internet Protocol (TCP/IP) entry from the This
connection uses the following items list (usually located last
in the list). Select the Properties button.
Introduction
This section includes the following:
➤ User-Based Accounts on page 3.1
➤ Adding a Local User on page 3.2
➤ Editing a Local User and Resetting a Password on page 3.2
➤ Removing a Local User on page 3.3
➤ Enabling or Disabling a Local User on page 3.3
➤ Changing a User Password on page 3.3
➤ Centralized User Accounts on page 3.4
User-Based Accounts
The SEL-2730M has user-based access control to provide for greater
authentication, authorization, and accountability. Individuals responsible for
configuring, monitoring, or maintaining the device will have their own unique
user accounts. User-based access controls are organized to answer, “Who did
what and when?” and allow flexibility for detailed auditing. This structure
also eases the burden of password management for the operators by only
requiring users to remember their own personal passwords. This eliminates
the need for each operator to remember a new password every time an
employee leaves or no longer needs access as required in a global account
structure.
Permissions of the device are organized into roles, and access is granted
through role-based access controls (RBACs). The device has four roles:
Administrator, Engineer, User Manager, and Monitor. User account privileges
are based on the group (i.e., role) in which the user is a member. A brief
overview of each role is provided below.
➤ Users with the Administrator role have full access to the device.
➤ Users with the Engineer role have access to most settings and
information on the device. The main exception to this is user
account management.
➤ Users with the User Manager role have access to manage users
on the device. Access to other settings is restricted.
➤ Users with the Monitor role have read-only access to most of
the device settings.
Adding a Local User The device supports as many as 256 unique local user accounts. Use the
following steps to create a new user account.
Step 1. Log in to the device with an account that is a member of either
the Administrator or the User Manager group. The account you
created during commissioning is one such account.
Step 2. Select the Local Users link from the navigation menu of the
web management interface. This link will open the User
Accounts page.
Step 3. Select Add New User.
Step 4. Enter the Username, Role, and Password of the new user. The
password must be entered twice to confirm that it has been
entered correctly.
Step 5. Select the Submit button. This will add the new user to the
device.
Editing a Local User The device provides an Administrator or User Manager user with the ability to
edit account information for existing accounts. With this function, users can
and Resetting a reset forgotten passwords, reassign group membership, and enable or disable
Password an account. Perform the following steps to reset an account’s password.
Step 1. Log in to the device with an account that is a member of the
Administrator or User Manager group. The account you created
during commissioning is one such account.
Step 2. Select the Local Users link from the navigation menu of the
web management interface. This link will open the User
Accounts page.
Step 3. Select the Edit button associated with the account that you
want to edit. This step will open the Edit User form.
Step 4. To change the user’s password, enter the new password,
confirm the new password, and select the Submit button.
Removing a Local In the case where an employee leaves the company, you should remove the
employee’s account to prevent security breaches. The device allows for the
User easy removal of user accounts. Perform the following steps to remove an
account.
Step 1. Log in to the device with an Administrator or User Manager
account. The account you created during commissioning is one
such account.
Step 2. Select the Local Users link from the navigation menu of the
web management interface. This link will open the User
Accounts page.
Step 3. Select the Delete button associated with the account that you
want to remove.
Step 4. Verify that the user to be deleted is the correct user.
Step 5. Once verified, select Yes. If this person is not the correct user,
select No to go back to the User Accounts page.
Enabling or Disabling If an employee takes an extended leave of absence or has a temporary change
in duties, the employee’s account should be disabled to prevent unauthorized
a Local User access to the device. Disabling the account will maintain the account
information while preventing unauthorized access to the system during the
absence. The account can be reactivated when the employee resumes normal
duties. Perform the following steps to enable or disable a user's account.
Step 1. Log in to the device with an account that is a member of the
Administrator or User Manager group. The account you created
during commissioning is one such account.
Step 2. Select the Local Users link from the navigation menu of the
web management interface. This link will open the User
Accounts page.
Step 3. Select the Edit button associated with the account that you
want to edit. This step will open the Edit User form.
Step 4. If an account is currently enabled, uncheck the Account
Enabled button to disable the account. To enable an account
that has been disabled, check Account Enabled.
Changing a User Many organizations have policies requiring employees to change their system
passwords at regular intervals. To aid with these policies, users on the device
Password can change their own passwords. Perform the following steps to change your
password.
Step 1. Log in to the device.
Step 2. Select the Local Users link from the navigation menu of the
web management interface.
Users of the Monitor or Engineer group will only see a Change
Your Password button. Users of the User Manager or
Administrators group will see all user accounts of the device, as
well as the same Change Your Password button.
Step 3. Select the Change Your Password button. This step will bring
up the form to change your password. Enter your old password,
new password, and select the Submit button to change your
password.
Each of the central authentication services can configure primary and backup
servers. When using LDAP or RADIUS settings, the SEL-2730M attempts to
contact the primary server first; if the response times out, the SEL-2730M
either tries to contact the backup server. If any other error or rejection occurs,
the SEL-2730M rejects the login attempt and stops processing the login.
Both protocols use the Hosts page to resolve Hostname settings into IP
addresses and the X.509 page for X.509 certificate management for EAP
protocols. See Edit Hosts on page 5.23 and X.509 Certificates on page 5.29
for instructions on using those two pages.
SEL-2730M SEL-3354
Log in as Alice
Yes
Connection Established
Log in as Bob
No
Connection Refused
SEL cannot guarantee that the device will be compatible with all possible
NOTE: This device is not compatible
with LDAP deployments that permit LDAP server architectures and implementations. Commissioning and
commas in usernames. configuration of an LDAP server typically requires advanced knowledge of
certificate authority hierarchies and centralized user group configurations. It is
important that an organization’s LDAP server administrators be involved
during the design and implementation process to ensure that the device
settings will be compatible with your organization’s specific trust
management infrastructure.
Hosts
The device needs to know the name and IP address of your LDAP server to
know how to contact it. Select Hosts from the navigation panel on your
webpage to view and edit the Hosts settings, see Figure 3.3.
The Host Settings page provides a method to statically map IP addresses with
external device hostnames such as your LDAP servers. To map an IP address
to a hostname, select Add Host. The SEL-2730M supports as many as 64
hosts.
LDAP Certificates
LDAP requires X.509 authentication to create binds (authenticated
connections) between the server and client. This is to ensure that attackers are
not spoofing the authentication server to gain unauthorized access. The device
requires that the root certificate of the LDAP server’s certificate chain is stored
locally.
LDAP Settings
Now that your device knows who and where your LDAP servers are, we can
configure the device to access those servers. Select Accounts / LDAP in the
navigation panel on your webpage to view the LDAP configuration (see
Figure 3.4).
Figure 3.5 shows the LDAP Connection Settings form and all the options for
communicating with your LDAP servers. To simplify configuration, we have
included a form for your LDAP administrators to complete, which you can use
to populate all the LDAP fields. This form is in Appendix D: Lightweight
Directory Access Protocol.
The LDAP Enabled setting must be set checked to make centrally managed
accounts available to the SEL-2730M for logins. When LDAP is enabled, if
the credentials entered by the user are not found in the locally configured
accounts on the SEL-2730M, it will next consult the enterprise directory by
using LDAP to attempt to authenticate the user. If LDAP authentication is
successful, the directory service will supply user attributes that indicate the
privilege level of the user when logging in to this device.
The TLS Required setting determines whether the connection to the LDAP
server will be protected by a TLS session. Using TLS requires that the LDAP
server be provided with a suitable X.509 server certificate and that the
SEL-2730M import a suitable CA or server certificate.
The Synchronization Interval setting exists to reduce the overhead
associated with pulling account information from an LDAP server. The device
locally caches the credentials and privileges of centralized users for the period
of time configured. The synchronization interval is settable from 0 to 24
hours. If the synchronization interval is set to 0, then the device will
resynchronize on every login. The synchronization interval exists to speed up
the login process. The SEL-2730M will continue to verify the authenticity of
users against the central directory even if their privilege information is locally
cached.
LDAP Servers
The Configured Servers section lists the LDAP servers that the SEL-2730M
will use to authenticate logins.
LDAP servers are identified by their hostname and port numbers. Use
Port 389 unless a different port number is specified by your LDAP
administrator. This information should be obtained from your LDAP
administrators using the form found in Appendix D: Lightweight Directory
Access Protocol.
The device allows for two LDAP servers to be configured for redundancy and
increased reliability. LDAP servers are assigned a priority and will be queried
in their order of priority until the user accessing the device is found, or the list
has been exhausted.
Group Mappings
The device has specific device roles that can be mapped to LDAP group
memberships on the Group Maps tab. The view shown in Figure 3.7 has a
single group defined for administrators.
Select the plus ( ) button at the end of the table to configure a new group
mapping in a new row of the table. On the new table row, select the device role
from the drop-down list in the left column. You can enter the Mapped DN
string yourself, or you can select the list icon at the end of the Mapped DN
field. When you select the list icon, the SEL-2730M will query your LDAP
server and then show a hierarchical tree of directory groups that can be
searched using your Search Base. Scroll through the tree as necessary to find
the correct group, select it with a mouse click, and select Submit. Opening a
new row in the table is shown in Figure 3.8.
To expand the tree of groups for a row of the table, select the list icon at the
right end of the Mapped DN field in the table. Selecting the icon again will
close the tree of groups. Figure 3.9 shows the tree of possible groups that
appears after selecting the list icon.
If you cannot find an appropriate group, your server administrator may need to
create new groups and assign members appropriate for these mappings. Work
with your LDAP administrator to determine group mappings using the form
found in Appendix D: Lightweight Directory Access Protocol.
The last tab on the LDAP page is Flush LDAP User Cache. Selecting the
Flush Cache button flushes the LDAP user cache, which will cause all LDAP
users to be logged out of the device and will force authentication information
to be refreshed from the server on each account’s next login.
RADIUS The SEL-2730M supports the basic NAS client authentication functionality of
the RADIUS protocol. By configuring the RADIUS settings, a user can log in
using credentials not stored in the Local Users table on the SEL-2730M. The
SEL-2730M also supports two-factor authentication through RADIUS.
There are three types of settings used by the RADIUS feature on the
SEL-2730M:
➤ RADIUS Protocol settings (see RADIUS Protocol Settings)
viewable on the Configuration page and configurable through
the use of the RADIUS Connection Settings page under the
RADIUS navigation menu link
➤ Hosts (required if a hostname is used in hostname setting in
Configured Server) located on the Hosts page
➤ X.509 Certificates (required if an EAP Authentication Protocol
is used) located on the X.509 Certificates page
SEL cannot guarantee that the device will be compatible with all possible
RADIUS server architectures and implementations.
The RADIUS page on the SEL-2730M is divided into three tabs, as shown in
Figure 3.10: Configuration for viewing RADIUS settings, RADIUS
Connection Settings for configuring RADIUS settings, and Download
Dictionary for downloading the RADIUS dictionary file. You can access
these tabs by selecting on the RADIUS navigation menu item under
Accounts.
General RADIUS settings that appear in the web interface, configuration file,
and ACSELERATOR QuickSet SEL-5030 Software are listed in Table 3.1.
Configuration file and QuickSet-only settings are listed in Table 3.2.
EAP protocols also have two additional settings, as listed in Table 3.3. SEL
recommends enabling these settings if the RADIUS server supports them.
These do not apply if the PAP authentication protocol is selected.
Valid
Setting Default Feedback Rules Description
Values
Don’t send user- Enabled, Disabled — — The username is normally sent in clear text in the User-Name
name in cleartext Disabled attribute or Identity field (for EAP protocols). If this setting is
enabled, then the SEL-2730M sends “anonymous” instead of the
username (see Anonymous ID in Table 3.2).
Validate server Enabled, Enabled — — As part of setting up the TLS connection, the RADIUS server
hostname against Disabled sends a certificate to the SEL-2730M. One of the attributes of
common name this certificate is the common name. If this setting is enabled, the
SEL-2730M checks the server hostname as entered into the host-
name setting on the RADIUS page and the common name in the
X.509 certificate and rejects any login attempt from that
RADIUS server if they are not identical.
Configured server settings are listed in Table 3.4. There are no default values
for the Hostname or Port setting.
At least the primary server (Priority 1) must be configured. You can optionally
add a backup server (Priority 2). The SEL-2730M first attempts to contact the
primary server (Priority 1), and if no responses are received, it attempts to
contact the backup server (Priority 2) if one is configured. If no servers are
configured during the time RADIUS is enabled, then the feedback is as
follows:
At least one configured server required
You can enter a hostname, as entered in the Hosts page, or an IP address, into
the Hostname setting and the appropriate authentication port into the Port
setting. This is typically 1812. To add a backup server, select the plus ( )
button and enter the hostname and port. The hostname does not have to be
present on the Hosts page when entered, but the SEL-2730M skips any server
with a hostname that is not present on the Hosts page. The primary and
backup server information must be unique (i.e., the hostname and either the IP
address that the hostname resolves to or the port must be different). If the
configured servers are identical, the feedback is as follows:
Configured servers must be unique. Either the hostname, and
their resolved IP addresses, or the ports must be different
SEL-User-Role VSA
Similar to logging in through LDAP or through a Local User, the user does not
select their role. The RADIUS server determines the user role through the
reply message. To successfully authenticate a user, the RADIUS server must
return the user role in the format accepted by the SEL-2730M. This format is
defined by an SEL vendor attribute SEL-User-Role, which can be downloaded
by selecting Download Dictionary at the top of the RADIUS page.
Setting up RADIUS
On the SEL-2730M
When enabling RADIUS, you must configure the RADIUS Shared Secret
setting (configured on the RADIUS server) and have at least one configured
server with a defined Hostname or IP address and the UDP port. If you are
using a hostname, add the appropriate hostname and IP address to the Hosts
page. If you are using an EAP protocol, you must have the appropriate X.509
certificate added to the X.509 Certificate page. To enable RADIUS, select the
Enable RADIUS check box on the RADIUS page, configure the settings, and
select Submit. RADIUS is then enabled and ready for the next login attempt.
RADIUS Attributes
In addition to the RADIUS attributes defined by the authentication protocol,
the SEL-2730M supports three other attributes, listed in Table 3.5. These
appear in each request message to the RADIUS server.
Attribute Value
NAS-IP-Address The IP address of the port through which the SEL-2730M con-
tacts the server (i.e., the IP address of the front- or rear-panel
ports)
NAS-Identifier The hostname setting as configured on the IP Configuration
page
Calling-Station-Id The IP address of the user logging in to the SEL-2730M
Communications
Using PAP as an example, when a user attempts to log in to the SEL-2730M,
the SEL-2730M sends an Access-Request to the RADIUS server with the
username and the hashed password. When using EAP protocols, certificates
Engineering Station
RADIUS Server
RADIUS Client
SEL-2730M SEL-3355
Log in as Alice
Access-Request with
username and password
Alice logged in
as Engineer Access-Accept with
user role of Engineer
Log in as Bob
Access-Request with
username and password
Engineering Station
RADIUS Server
RADIUS Client
SEL-2730M SEL-3355
Alice logged in
with user role Access-Accept with user role
Events
If the SEL-2730M does not receive a response within the time-out period, the
SEL-2730M logs the following event:
Rejected login attempt because no response from the RADIUS
server received within the retransmission timeout
The SEL-2730M rejects the login attempt if all attempts time out.
The RADIUS server authenticates and logs a user in by responding to the
SEL-2730M request with a user role in the response. The user role must be
one of the four supported on the SEL-2730M. If there is no user role in the
response accept message, the SEL-2730M rejects the login attempt and sends
the following event:
Rejected login attempt by user <username> because RADIUS
server <priority> replied without an SEL-User-Role attribute
If the user role is not recognized, the SEL-2730M rejects the login attempt and
sends the following event:
Rejected login attempt by user <username> because RADIUS
server <priority> replied with an SEL-User-Role attribute
containing an unrecognized user role
The SEL-2730M attempts to use the primary server (Priority 1) first. If all
attempts to contact the primary RADIUS server fail, and the backup server
(Priority 2) is configured, the SEL-2730M logs the following event and then
attempts to contact the backup server (Priority 2):
Active RADIUS server is now 2
At the next login attempt, the SEL-2730M again attempts to connect to the
primary server (Priority 1) first.
The EAP authentication protocols have additional optional checks. During the
initial handshake, the RADIUS server sends its X.509 certificate. If the user
has enabled the Validate server hostname against common name setting,
and the hostname does not match the common name, the SEL-2730M rejects
the login attempt and logs the following event:
Rejected login attempt because the common name in the X.509
certificate sent by the RADIUS server <priority> did not match
the hostname of the RADIUS server on the RADIUS page
If the certificate sent by the RADIUS server has an authority issue, the
SEL-2730M rejects the login attempt and logs the following event:
Reject login attempt because RADIUS server <priority> sent an
X.509 certificate with an unknown or untrusted certificate
authority
If the X.509 time is incorrect (e.g., expired), the SEL-2730M rejects the login
attempt and logs the following event:
Rejected login attempt because RADIUS server <priority> sent
an expired or not yet valid X.509 certificate
For a complete list of all events including those for RADIUS, see Appendix E:
Syslog.
Introduction
This section contains Job Done examples for the SEL-2730M. All Job Done
examples assume that the device has already been commissioned.
➤ Example 1: Create VLANs to Effectively Manage Network
Traffic on page 4.1
➤ Example 2: Configure RSTP Network Topology on page 4.6
➤ Example 3: SNMP Monitoring From a Central Location on
page 4.7
Identifying the Your objective is to create VLANs to separate devices and GOOSE messages
to effectively and securely manage network traffic. Figure 4.1 is the logical
Problem network diagram that was provided to you, and your job is to configure
VLANs on the SEL-2730M to implement this network configuration.
WAN
SEL-3620
Eth1.10—192.168.10.1/24
Eth1.20—192.168.20.1/24
Eth1.30—192.168.30.1/24
10 Relay LAN
20 SCADA LAN
30 Engineering Access LAN
100 GOOSE Message 100
101 GOOSE Message 101
102 GOOSE Message 102
103 GOOSE Message 103
104 GOOSE Message 104
Access between VLANs 10, 20, and 30 are firewalled using an SEL-3620 to
perform packet inspection. The SEL-3620 is configured with three sub-
interfaces on Eth1 to provide routing between each VLAN segment.
VLANs 100–104 are used specifically for GOOSE messaging and therefore
do not require routing to the SEL-3620. The VLAN configuration in this Job
Done example allows GOOSE messaging between relays as follows:
➤ Relay-1: Send/Receive GOOSE messages with VIDs 100–104
➤ Relay-2: Send/Receive GOOSE messages with VIDs 100–102
➤ Relay-3: Send/Receive GOOSE messages with VIDs 103–104
Configure VLANs on Step 1. Log in to the SEL-2730M–1 web management interface and
navigate to Global Settings.
SEL-2730M–1
Step 2. Check VLAN-aware and select the Submit button.
Step 3. Navigate to VLAN Settings and select the plus ( ) button
beneath the VLAN table to add a new VLAN.
Step 4. Enter the configuration in Table 4.2. You may see feedback
such as “A port can only exist in the untagged column for one
VLAN.” when entering the information for each VLAN. You
can ignore these prompts because the SEL-2730M automatically
updates the VID to 1 to remove duplicates when you submit the
page.
10 Relay LAN 2, 8 11
20 SCADA LAN 8 9
Step 11. Select the plus ( ) button again to add a new VLAN.
Step 12. Enter the configuration in Table 4.6.
Step 13. Select the plus ( ) button again to add a new VLAN.
Step 14. Enter the configuration in Table 4.7.
Step 15. Select the plus ( ) button again to add a new VLAN.
Step 16. Enter the configuration in Table 4.8.
Step 17. Select the plus ( ) button again to add a new VLAN.
Step 18. Enter the configuration in Table 4.9 and select Submit to create
all the new VLANs.
Configure VLANs on Step 1. Log in to the SEL-2730M–2 web management interface and
navigate to Global Settings.
SEL-2730M–2
Step 2. Check VLAN-aware and select the Submit button.
Step 3. Navigate to VLAN Settings and select the plus ( ) button
beneath the VLAN table to add a new VLAN.
Step 4. Enter the configuration in Table 4.10.
Step 11. Select the plus ( ) button again to add a new VLAN.
Step 12. Enter the configuration in Table 4.14.
Step 13. Select the plus ( ) button again to add a new VLAN.
Step 14. Enter the configuration in Table 4.15 and select Submit to
create all the new VLANs.
Identifying the Your objective is to configure the RSTP settings of the SEL-2730M devices in
the network diagram pictured in Figure 4.4. SEL-2730M-1 has been chosen to
Problem be the root bridge in the network topology and is connected to two
SEL-2730M devices, providing redundant communications paths for end
devices. SEL-2730M-2 and SEL-2730M-3 are connected to each other,
providing a redundant communications path. End devices connected to either
SEL-2730M-2 or SEL-2730M-3 have two communications paths available.
One is listed as the Active RSTP Link, and the other is listed as the Blocking
RSTP Link. The Active RSTP Links are the paths that communications follow
unless there is a link or device failure impacting those communications paths.
In the event of such a failure, the Blocking RSTP Link becomes active.
Without RSTP, the network topology depicted in the figure below would have
a loop, which would be detrimental to the network.
The root bridge is the logical center of the network. There is always exactly
one root bridge at any given time within the network. The root bridge of the
network is determined by selecting the device with the lowest bridge ID.
RSTP selects the lowest bridge ID by comparing the bridge priority first and
selecting the lowest value. If two devices have equal lowest bridge priority
values, then the MAC addresses are compared next and the device with the
lowest MAC address will be selected as the root bridge. To guarantee that a
device will be the root bridge within the network, the bridge priority value
must be set to a lower value than all other RSTP-capable devices in the
network. Careful network planning is crucial when deciding on the selection
of the root bridge.
Configure RSTP on Step 1. Log in to SEL-2730M-1 and make sure RSTP is enabled on the
Global Settings page. RSTP is enabled by default.
SEL-2730M–1
Step 2. Navigate to RSTP Settings under Switch Management and
select Edit RSTP Settings.
Step 3. Because SEL-2730M-1 is the root bridge in the spanning tree
topology, the bridge priority must be set to a lower value than
any other switch participating in the spanning tree topology.
For this example, set the Bridge Priority value for
SEL-2730M-1 to 8192. Leave the remaining settings on this
page at their default settings.
Step 4. The following message should now be displayed at the top of
the RSTP Settings page when the device determines it is the
Root Bridge in the spanning tree topology.
NOTE: It may take a few seconds for
the status of the spanning tree
topology to refresh and the message
to appear.
Identifying the Your objective is to configure the SNMP settings of the SEL-2730M to allow
SNMP requests from a network management system (NMS), and to also
Problem configure SNMP traps to be sent to the NMS. Figure 4.6 is the logical network
diagram that was provided you, and your job is to configure the SNMP
settings on the SEL-2730M to implement this SNMP configuration. It is
assumed that the NMS has already been configured with the SNMP
configuration required to allow this communication to occur. SNMP v3 is
used in this example, but the steps to configure SNMP v1 and v2c are very
similar (see Add v1/v2c Profile on page 5.24).
Configure SNMP on Step 1. Log in to the SEL-2730M web management interface and
navigate to IP Configuration under Network Settings. Make
the SEL-2730M sure SNMP is listed under Services under the Mgmt interface.
If SNMP is not listed, you will need to enable SNMP by editing
the network interface and selecting SNMP.
Step 2. Navigate to SNMP Settings under Network Settings and select
Edit Hosts. The Edit Hosts page allows you to limit access to
the SNMP service of the SEL-2730M by entering allowed hosts
or networks. In this example, we will be limiting access to only
allow the NMS with an IP address of 10.10.10.50. Enter the
configuration shown below and select Submit.
Step 3. Select the Add v3 Profile tab at the top of the SNMP Settings
page. Configure the SNMP v3 settings as shown below (enter
an Authentication Password and Encryption Password of
your choice) and select Submit. These settings must match the
SNMP v3 configuration on the NMS.
Step 4. Select the Add Trap Server tab at the top of the SNMP
Settings page and configure the settings as shown below. This
configuration will send Authentication, Configuration, Port
Security, and Rapid Spanning Tree Protocol SNMP traps to the
NMS at 10.10.10.50.
Introduction
This section explains the settings and commands of the device.
➤ Reports on page 5.2
➢ Syslog Report
➢ MAC Address Table
➤ Switch Management on page 5.4
➢ VLAN Settings
➢ RSTP Settings
➢ Multicast MAC Filtering
➢ Port Mirroring
➢ Port Monitor
➢ Port Settings
➢ Priority Settings
➤ Network Settings on page 5.20
➢ IP Configuration
➢ SNMP Settings
➢ Syslog Settings
➢ Hosts
➤ Accounts on page 5.29
➢ Local Users
➤ Security on page 5.29
➢ X.509 Certificates
➢ MAC-Based Port Security
➤ System on page 5.31
➢ Global Settings
➢ Date/Time
➢ Alarm Contact
➢ Usage Policy
➢ File Management
➢ Device Reset
Reports
Syslog Report The SEL-2730M uses the Syslog message format to record event data. The
device has storage for 60,000 of these messages. The device can also forward
Syslog messages to three destinations.
The Syslog message format includes five fields:
➤ Severity
➤ Facility
➤ Tag name
➤ Timestamp
➤ Message
Device system logs are displayed in the order of their generation. Select a field
label at the top of the list to reorder the messages according to the value of that
field. For example, selecting the Severity label reorders the list by severity.
Event messages in the device have two states: unacknowledged and
acknowledged. These two states exist to make identification of abnormal event
generation easier. Large numbers of unacknowledged messages can indicate
high levels of activity on the device.
Message acknowledgment also assists with log documentation. In your
periodic examination of logs, acknowledge existing logs. When you examine
logs in the future, the previously acknowledged logs limit the logs of concern
to only those logs the device has generated since the last examination.
Select the Acknowledge Selected button to acknowledge selected system
logs. All system logs can be acknowledged by selecting the Acknowledge All
button. You cannot remove system logs from the device without issuing a
factory-default reset.
The Download button allows you to save log messages in an offline format.
MAC Address Table The SEL-2730M can report the device MAC Address attached to each port.
The report can be sorted by:
➤ Address
➤ Port
➤ Alias
➤ Type
➢ Learned: Learned by the switch
➢ Static: Manually input multicast MAC filter
➢ Secure - User Set: Manually input by user on
MAC-based port security
➤ Multicast
The report can also be downloaded into a comma-separated value table for
local storage or export.
Select a field label at the top of the report to reorder the messages according to
the value of that field. For example, selecting the Address label reorders the
list by Address first and Port second.
The Download button allows you to save the table output in an offline format.
Switch Management
VLAN Settings When the device is not in VLAN-aware mode, VLAN settings can be viewed
but not modified. To modify VLAN settings, make sure VLAN-aware mode is
enabled and the account accessing the device has the appropriate role
VLAN View
The VLAN View page (Figure 5.3) shows a table that provides a VLAN-
centric view of the configuration of VLANs and the member ports. The fields
of the table can be edited, and the Submit button at the bottom of the page
used to apply the finished set of changes to the configuration of the VLANs.
In the VLAN view, groups of VLANs with similar settings are shown as a
VID range.
To edit a VLAN entry, select the table item to be changed and edit the data.
The affected table item will be highlighted, and an undo link will appear next
to it to allow you to revert the change. Selecting the Submit button at the
bottom of the page will apply all the edited changes to the VLAN
configuration. Figure 5.4 shows an example where several fields have been
edited but not yet applied.
To delete a VLAN entry, select the button in the last column of the table.
To edit a VLAN in a group, select the edit ( ) button in the last column of
the entry, enter the VLAN number, and then make the necessary changes in
the table row that is added for that VLAN. Figure 5.5 shows how to select the
VLAN that you wish to edit.
To delete a VLAN group (single row of the VLAN table), select the Port
View tab and delete the affected VID range from the Allowed VIDs column
for the affected ports.
Tagged Ports
The Tagged Ports column lists those ports that can send or receive frames for
a given VLAN to another VLAN-aware switch or device. Devices capable of
IEEE 802.1Q-2005 VLAN tagging, such as switches and GOOSE-capable
IEDs, transmit frames with a VID assigned to the frame. This is commonly
referred to as VLAN tagging. For the device to allow a frame with a VLAN
tag to be sent or received from a port, that port must be configured as a
Tagged Port for the VLAN indicated by the tag.
One example of using VLAN tagging is to create a trunk link between
switches. A trunk link is a physical link between two switches that can pass
traffic among multiple VLANs. Figure 5.6 shows an example of two switches
using port 1 as a trunk link carrying VLANs 100, 101, and 102. To configure
this, each switch would need to add Port 1 as a Tagged Port for VLANs 100,
101, and 102.
SEL-2730M
Port 1 Switch #1
SEL-2730M
Switch #2
Figure 5.6 Switch Trunk Link
Another example of using VLAN tagging is with the IEC 61850 GOOSE
protocol. IEDs tag GOOSE messages with a VID. For these GOOSE
messages to be sent or received with another switch, you must configure the
port used to connect to the other switch or VLAN-aware device as a Tagged
Port for the VID tag of the GOOSE frame. In the example shown in
Figure 5.7, two IEDs use GOOSE messages tagged with VIDs 200, 201, and
202 to communicate through the switch. In this example, the configuration of
the switch must have Ports 9 and 10 listed as Tagged Ports for VLANs 200,
201, and 202 for the GOOSE messages to pass through the switch between the
two VLAN-aware IEDs.
SEL-2730M
Port 9 Port 10
GOOSE Messages With
Untagged Ports
Devices that are not VLAN-aware can still participate in a VLAN if the switch
is configured to associate their traffic with a VLAN. Their network frames
need to be assigned a VID associated with other devices within the same
VLAN. Untagged ports perform two actions: (1) they receive untagged frames
from devices connected to the port and apply the VID of the VLAN to which
the port is assigned, and (2) they transmit untagged frames to the devices.
Each port can be assigned as an Untagged Port in one only VLAN.
In the example shown in Figure 5.8, an engineer must log in to the SEL IED to
perform maintenance. Communications from the SEL-3355 to the SEL IED
are untagged, and the ports must be in the same VLAN for the two devices in
this example to communicate. VLAN 7 is used in this example, but any valid
SEL-2730M
Port 11 Port 12
Untagged Frames
Untagged Frames
SEL-3355 SEL IED
Port View
The Port View page (see Figure 5.9) provides a port-centric view of the
VLAN configuration of each port. This page provides an alternative view of
the VLAN configuration for each port.
Step 3. To create a new VLAN, select the plus ( ) button beneath the
VLAN table. A new row will be added to the end of the VLAN
table.
Step 4. Assign a VID, optionally enter a VLAN Name, and assign the
port(s) based on your required configuration. The VLAN
settings table above describes each field.
Rapid Spanning Tree Communications networks are typically designed with ring and mesh
topologies and interconnecting switches to provide network redundancy.
Protocol (RSTP) RSTP is designed to support these network topologies and provide loop-free
Settings redundant paths to end devices. Without these protocols, network loops would
be present on the network and Ethernet frames circulating endlessly
throughout the network would impact communications. RSTP ensures a loop-
free network and provides an alternative path in the event of a network failure.
RSTP is enabled by default on this device. You can disable RSTP through the
Spanning Tree Mode setting on the Global Settings page. Exercise caution
when disabling RSTP, because doing so could introduce network loops.
If RSTP is disabled, the following message displays at the top of the RSTP
Settings page.
Settings can be modified while RSTP is disabled; these settings are not active
until you enable RSTP through the Spanning Tree Mode setting in Global
Settings.
Configuration
Figure 5.11 shows the RSTP configuration of the device.
Bridge ID
The Bridge ID field consists of a combination of the bridge priority and the
bridge MAC address. Each RSTP-capable device in the network has a unique
bridge ID that RSTP uses to determine the root bridge.
Root Bridge
The root bridge is the logical center of the network. There is always exactly
one root bridge at any given time within the network. Determination of the
root bridge of the network occurs through RSTP selection of the device with
the lowest bridge ID. RSTP selects the lowest bridge ID by comparing the
bridge priority first and selecting the lowest value. If two devices have equal
bridge priority values, then RSTP next compares the MAC addresses and
selects the device with the lowest MAC address as the root bridge. To
guarantee a device will be the root bridge within the network, the bridge
priority value must be set to a lower value than all other RSTP-capable devices
in the network. Careful network planning is crucial to selection of the root
bridge.
The following message displays at the top of the RSTP Settings page when
the device is the root bridge in the spanning tree topology.
Root Port
The root port is a port with the shortest path to the root bridge. All RSTP-
enabled devices must have exactly one root port with the exception of the root
bridge, which does not have a root port. If the device is the root bridge, the
root port does not apply and the device displays —.
Bridge Priority
The bridge priority consists of two components; the bridge priority and the
MAC address.
Hello Time
The hello time is the interval in which the device sends bridge protocol data
units (BPDUs).
Max Age
The max age is the maximum number of hops from the root that an
SEL-2730M accepts a BPDU. If the number of hops from the root bridge
(Message Age) is greater than this setting, the SEL-2730M discards the
BPDU.
Forward Delay
The forward delay is the time that a port must spend in the listening and
learning states before transitioning to forwarding.
The max age and forward delay derive from the root bridge. If the device is
not the root bridge in the spanning tree topology, the device derives these
settings from the root bridge.
Figure 5.14 shows the Port Settings dialog used to set those RSTP parameters
that are individual for each port.
BPDU Guard 1–60 min 5 min The amount of time that port configured with BPDU Guard will be dis-
Timeout abled after receiving a BPDU frame.
Bridge Priority 0–61440 in incre- 32768 Bridge priority determines the root bridge. The bridge with the lowest
ments of 4096 value becomes the root bridge.
Hello Time 1–10 s 2s Interval in which device sends BPDUs.
Max Age 6–40 20 Maximum number of hops before a BPDU is discarded.
Forward Delay 4–30 s 15 s The time that a port must spend in the listening and learning states before
transitioning to forwarding.
Port Settings
Table 5.3 Port Settings
Priority 0–240 128 Port priority determines which port the device selects as a root port when
there is a tie between two ports. The port with the lower value will become
the root port.
Path Cost 1–200000000 Based on Path cost helps determine which path the device selects to a root bridge. The
port speed device selects paths with the lowest overall cost first.
STP Mode Auto, Fast Port BPDU Auto See below.
Guard, Fast Port, Non-
STP BPDU Guard
Switch Sends BPDUs Switch Shuts Off Port Moves Instantly Into the
STP Mode For Connecting to...
Out the Port? if it Receives a BPDU? Forwarding State?
Multicast MAC The SEL-2730M uses multicast MAC filtering to subscribe multicast traffic to
a group of selected ports. When a multicast frame ingresses a port, the device
Filtering inspects the multicast address to see if it matches any configured multicast
MAC filter. If no match occurs, the device sends the frame to all ports within
the same VLAN. If a match does occur, the device sends the frame to only the
member ports the device configuration specifies within the same VLAN.
Use the following steps to create a multicast MAC filter on the device.
Step 1. Log in to the device with an Engineer or Administrator
account.
Step 2. Navigate to the Multicast MAC Filtering page and select Add
Filter. The following page will display.
Step 3. Enter the multicast MAC address on which you would like to
filter and the member ports.
Step 4. Select Submit to add the multicast MAC filter.
Port Mirroring You would typically use port mirroring for troubleshooting network problems
and for monitoring traffic on a selected source port through the use of a
network protocol analyzer attached to a target port. Port mirroring mirrors the
network traffic the device sends and receives on the source port to the target
port. This allows the use of a non-intrusive troubleshooting technique for
gathering network traffic information for a connected port.
The device can mirror network traffic from multiple source ports to one target
port. The source port may be any physical port on the device except the target
port that the device uses for mirroring and the front Ethernet management port
(ETH F).
The source port may be selected as ingress, egress, or for passage of both
types of traffic to the target port.
The target port cannot receive ingress traffic while in the monitoring session.
In Figure 5.16, the device has been configured to mirror both ingress and
egress traffic from Port 9 to Port 16. To configure port mirroring, navigate to
the Port Mirroring page and select Enable Port Mirroring. Select the
source port, target port, and the traffic you want mirrored to the target port, by
selecting either Mirror Ingress Traffic or Mirror Egress Traffic. You can
also select both to mirror ingress and egress traffic from the source port to the
target port.
Port Monitor Link flap is a situation in which a physical interface on the switch continually
goes up and down. Rx Checksum is a count of the frame check sequence
errors. The Port Monitor page provides you the ability to change the
monitoring mode, threshold limits, and actions. Each port can be configured
with two different modes (see Figure 5.17) and four actions (See Figure 5.18).
The default settings are to monitor for both situations and log to the syslog.
The monitoring period is fixed at sixty seconds. The port will be disabled if
the threshold is reached inside of the monitoring period. A user can enable the
port from the port settings page or the port monitoring page. A reboot of the
device will automatically enable any disabled ports.
Port Settings The Port Settings page provides you the ability to enable and disable ports,
set an alias for a port, configure port speed and duplex mode, and configure
Rating Limiting protection. The device configures fiber ports automatically to
their maximum speed and sets these to full duplex. The device sets copper
ports to Auto as their default setting for speed and duplex values, but you can
configure these as necessary.
Rate Limiting
The SEL-2730M allows you to set the maximum data rate for either ingress
(incoming) or egress (outgoing) traffic for any of the device ports slider
controls on the Switch Management/Port Settings page. This allows you to
prevent malicious or faulty devices from flooding your network and blocking
access to network resources. Figure 5.19 shows how limiting can be
configured for each port.
The Ingress Rate limit can be set using a slider control to 1, 5, 10, 20, 30, 42,
50, 75, 100, 150, or 300 Mbps, as appropriate for the link speed of the port, or
can be set to No Limit. For the Ingress traffic, the limit can be set to All
traffic, Broadcast, or mixes of unicast, broadcast, and multicast. The Egress
Rate is applied to the overall rate (all traffic from the port).
Priority Settings Priority settings control the egress order of frames out of a port by using the
transmission policy and the assigned priority of each frame, which is based on
the priority code point (PCP), differentiated service code point (DSCP), or a
default value.
Settings
There are three groups of settings (described in Table 5.5): one to control the
order in which frames are transmitted from a port, one to configure the PCP-
to-priority mapping, and one to configure the DSCP-to-priority mapping.
Transmission Weighted Round Weighted Round — Sets the transmission policy for
Policy Robin, Strict Robin all SEL-2730M ports.
PCP Mapping Priority: Low, See Table 5.6 Disabled if VLAN-aware is disabled. Sets the priority for each PCP
Medium, High, value for all SEL-2730M ports.
Critical
DSCP Mapping DSCP: 0–63 Empty If the DSCP Mapping table is empty, Sets the priority for each DSCP
Priority: Low, then the DSCP field is ignored (ToS value for all SEL-2730M ports.
Medium, High, Inspection disabled).
Critical Otherwise, DSCP values not explicitly
specified are mapped to Low.
PCP Priority
0
Low
1
2
Medium
3
4
High
5
6
Critical
7
There are 64 DSCP values (0–63). The DSCP uses the Type of Service (ToS)
field in the IP header as defined by the DiffServ standard RFC2475. If the
DiffServ-to-Queue Mapping table is empty, the SEL-2730M ignores the
DSCP field in the packet (ToS Inspection is disabled). To add a new mapping
point, select the plus ( ) button, select a DSCP value from 0–63 that is not
already present and a Priority of Low, Medium, High, or Critical (as shown in
Figure 5.21). Select the button to remove a mapping point.
The SEL-2730M does not have an explicit ToS Inspection setting. Instead, the
SEL-2730M enables ToS Inspection automatically if the DSCP mapping has
at least one row, and disables ToS Inspection automatically if the DSCP
mapping has zero rows.
Priority Behavior
Internally, the SEL-2730M supports the following four priority levels, listed in
descending order of precedence:
➤ Critical
➤ High
➤ Medium
➤ Low
The SEL-2730M determines the priority of a packet at ingress using one of the
three sources listed in Table 5.7. The VLAN PCP and ToS fields support more
than four values, so the SEL-2730M must map those values to its internal four
priority levels. Table 5.7 lists what sources use which mappings.
Source Mapping
The SEL-2730M uses the process shown in Figure 5.22 to determine the
priority of a packet. As shown, the ToS field is used only for tagged IP packets
if VLAN-aware is disabled and ToS Inspect is enabled.
Frame ingresses
into the SEL-2730M
Is VLAN-aware
enabled AND the Yes Source is PCP field
frame tagged?
No
Is ToS Inspection
enabled AND the
Yes Source is ToS field
frame is an IP
packet?
No
Priority is Low
(Default)
The SEL-2730M supports four priority queues, one for each priority level.
When the SEL-2730M forwards a frame to a port for egress, it places the
frame in the appropriate priority queue based on the priority assigned at
ingress (see Figure 5.22). The priority of a packet only determines into which
priority queue the packet is placed. The transmission policy setting determines
which packet to egress first when packets of more than one priority are
waiting to egress. Packets of the same priority egress in the order in which
they were forwarded to the port. The transmission policy considers the priority
of packets only and not their priority source (as shown in Table 5.7).
The SEL-2730M does not modify the ToS field of an IP packet or the PCP
field of a frame that was already tagged at ingress. If the SEL-2730M tags a
packet, it sets the PCP field to 0 unless the packet is an IP packet and the ToS
Inspection is enabled, in which case the SEL-2730M sets the PCP field based
on the priority mapped to the DSCP value of the frame, as shown in Table 5.8.
Low 0
Medium 2
High 4
Critical 6
Network Settings
IP Configuration The IP Configuration page provides the configuration options for the IP
settings of the device. ETH F is used for initial commissioning and local access.
A second IP interface, under the Mgmt section of the page, can be configured
to access the device over a local or remote network, as shown in Figure 5.23.
Remote Network
SEL-3620
Mgmt SEL-3354
ETH F
SEL-2730M
Local Access
The Mgmt interface is a logical interface accessible through the switch fabric
ports. Ports 1–24 are considered the switch fabric ports. ETH F is used for local
management access and is not considered a switch fabric port. ETH F does
allow web management or SNMP access if these services are enabled for the
front port.
The Mgmt interface is used for services such as remote management of the
device, sending Syslog or SNMP traps, and receiving SNMP requests. You
can reach the Mgmt interface through the use of devices within the same
subnet, or through a router configured with an interface on the same subnet as
the Mgmt interface.
Hostnamea 1–63 characters SEL<SERIAL#> The unique name identifying the device on the network.
Domain Namea 0–253 characters N/A The domain name of which the device is a member.
Default Gateway Unicast network address N/A The IP address of the device used to transfer packets to another
network. If this setting is left blank, the device will not be able
to communicate outside of the local subnet.
a The Hostname and Domain Name combined length must be less than 255 characters.
Alias 1–32 characters ETH F A name that is associated with the network interface.
Enabled Enabled, Disabled Enabled Administratively enables or disables the interface.
IP Address Unicast IP address 192.168.1.2/24 IP address of the interface. The device uses classless inter-domain rout-
ing (CIDR) notation to assign the subnet mask.a
HTTPS Enabled, Disabled Enabled Enables or disables HTTPS on the interface.
Captive Port Enabled, Disabled Enabled Enables or disables captive port on the interface.
SNMP Enabled, Disabled Disabled Enables or disables SNMP on the interface.
a The IP address and subnet for ETH F cannot be the same as any of the switch ports or of the Management Network Interface.
Alias 1–32 characters Mgmt A name that is associated with the network interface.
Enabled Enabled, Disabled Disabled Administratively enables or disables the interface.
IP Address Unicast IP address N/A IP address of the interface. The device uses classless inter-domain routing
(CIDR) notation to assign the subnet mask.
VLAN ID 1–4094 1 The VLAN with which to associate the interface. The VLAN must be present
to be selected as the management VLAN.
This setting is not visible when the device is not in VLAN-aware mode.
HTTPS Enabled, Disabled Disabled Enables or disables HTTPS on the interface.
SNMP Enabled, Disabled Disabled Enables or disables SNMP on the interface.
a If you put the management port on a nondefault VLAN, the switch must restart to complete the settings change.
SNMP Settings The device supports SNMP v1, v2c. and v3 read-only operations. Use SNMP
to monitor device health, status, and to gather data. Figure 5.24 shows the
SNMP Settings page.
The SNMP Engine ID for the SEL-2730M is a sequence of 11 bytes
consisting of 80 00 7C 4F 03, followed by the MAC address of the unit.
Example: For a unit with MAC address of 00:30:A7:04:5A:CF, the SNMP
engine ID would be (shown in hexadecimal): 80 00 7C 4F 03 00 30 A7 04 5A CF.
SNMP is disabled by default. You must enable SNMP on the Mgmt interface
for the device to respond to SNMP communications. Refer to
IP Configuration for information on how to enable SNMP.
The Permitted Hosts section on the page displays the hosts or networks
allowed SNMP communications with the device. The device will accept
SNMP requests from all IP addresses, unless configured otherwise. The
Permitted Hosts list provides the option to limit SNMP communications from
known IP address ranges. The Edit Hosts page provides the interface to update
the Permitted Hosts list.
The SNMP Profiles section on the page displays the SNMP profiles
configured on the device. The device requires an SNMP profile for it to
respond to SNMP requests. The Add v1/v2c Profile and Add v3 Profile pages
provide the interfaces from which you can add SNMP profiles. The SNMP
manager requesting SNMP information from the device must be configured
with the matching SNMP profile information for the device to respond to the
SNMP requests. The device supports as many as eight SNMP profiles.
The Trap Servers section on the page displays the SNMP trap servers to
which the device is configured to send SNMP traps. An SNMP profile with
trap permission is necessary prior to configuring a trap server. The Add Trap
Server page provides the interface from which you can add a trap server. The
SNMP manager must be configured with the matching SNMP trap profile for
the SNMP manager to accept the SNMP traps.
Descriptions follow for each of the pages under SNMP Settings.
Edit Hosts
The Edit Hosts page allows you to add or remove hosts or networks from the
Permitted Hosts list. Perform the following steps to add a host or network:
Step 1. From the SNMP Settings page, select Edit Hosts. This will
take you to the page shown in Figure 5.25.
Step 2. Enter the alias you would like to use for the host or network
you will be adding.
Step 3. Enter either the host IP address or network ID under the Host
field.
Host IP addresses use a /32 CIDR notation. For example, if the
IP address of the SNMP manager for which you would like to
allow SNMP access to this device is 192.168.10.10, you would
enter 192.168.10.10/32 into the Host field. A network ID could
also be specified to allow access from the network segment that
the SNMP manager is on, e.g., 192.168.10.0/24.
Step 4. The Edit Hosts page allows you to enter as many as 16 entries
on this page.
Step 5. Select Submit to complete.
Alias 1–32 characters N/A A name that is associated with the host or network.
Host Host IP address (e.g., 192.168.10.10/32) or N/A IP address or network allowed access to the SNMP
Network ID (e.g., 192.168.10.0/24) service of the device.
Step 2. Enter the Alias you would like to use for the SNMP profile.
Step 3. Select whether the SNMP profile should have Read, Trap, or
both permissions.
Step 4. Enter the SNMP Read Only Community String.
Step 5. Select Submit to add the SNMP profile.
Add v3 Profile
The Add v3 Profile page allows you to add an SNMP v3 profile. Perform the
following steps to add an SNMP v3 profile:
Step 1. From the SNMP Settings page, select Add v3 Profile. This
will take you to the page shown in Figure 5.27.
Step 2. Enter the Username you would like to use for the SNMP v3
user.
Note: SNMP v3 provides optional authentication and
encryption to ensure a secure SNMP communications channel.
SHA-1 Authentication Protocol and AES-128 Encryption
Protocol is recommended. SNMP v1/v2c provides mutual
authentication through the use of a preshared key and the
SNMP Read Only Community String, but SNMP
communication, including the community string, is not
encrypted and appears as plaintext.
NOTE: The encryption algorithm Step 3. Select whether the SNMP user should have Read, Trap, or
DES is deprecated and should not be
used for an encryption protocol. both permissions.
Migrate all systems to AES-128.
Step 4. Specify the Authentication Protocol, Authentication
Password, Encryption Protocol, and Encryption Password.
Step 5. Select Submit to add the SNMP profile.
The device sends traps to all configured trap servers through the use of the
SNMP information for the selected profiles. The trap server must have the
corresponding information for the profiles to authenticate and accept the traps.
The device supports as many as three trap servers. Perform the following steps
to add a trap server:
Step 1. From the SNMP Settings page, select Add Trap Server. This
will take you to the page shown in Figure 5.28.
Step 2. Enter the Alias and IP address of the trap server to which you
would like to send SNMP traps.
Step 3. Select the SNMP profile from the drop-down box whose
identity you would like to use to send SNMP traps.
Step 4. Select the SNMP traps you would like to send to the trap server
by checking one or more trap categories under Traps.
Step 5. Select Submit to add the SNMP trap server.
Alias 1–128 characters N/A A name that is associated with the SNMP trap server.
IP Address Host IP address N/A The IP address of the SNMP trap server.
Associated A list of SNMP profiles N/A Any one SNMP v1/v2c or v3 profile created on the SEL-2730M.
Profile with the trap permission
Traps See Table 5.16. N/A The SEL-2730M sends SNMP traps to the configured trap server when
an event occurs within selected trap categories.
SNMP traps are categorized based on the type of system event that occurs.
Each category is listed below with an explanation of the event types that fall
within each category. When an SNMP trap is selected, the device will send
that SNMP trap to the configured trap server when an event that falls within
the category occurs.
Category Description
MIB Downloads
SNMP Management Information Base (MIB) modules contain definitions and
other information about the properties of services and resources of the device.
The MIB Downloads page provides a brief description of the MIBs the device
uses to provide information through SNMP. You can download MIBs through
this page by selecting the Download button.
Syslog Settings Syslog is a specification that describes both the method and format in which
the device stores logs locally and routes them to a collector. The device logs
many different types of events such as system startup, log in attempts, and
configuration changes. The device can send log information to as many as
three remote destinations and store as many as 60,000 event logs locally in
nonvolatile memory. Each destination, including the local device, has a
configurable logging threshold. The device logs all configuration changes to
Syslog. For more information about Syslog, refer to Appendix E: Syslog.
Select the Syslog Settings link from the navigation menu to configure the
Syslog settings for the device. The Syslog Settings page (see Figure 5.29)
allows you to configure the logging threshold for local logging and remote
Syslog destinations, which determines what severity levels are logged.
Table 5.17 lists what severity levels are logged for each logging threshold. See
Appendix E: Syslog for a list of Syslog events and their associated severity
levels.
Setting the logging threshold too low can result in the device generating many
logs. Setting the logging threshold too high can result in the device failing to
record important messages.
The settings under Syslog Destinations are to configure remote Syslog
destinations. You can configure as many as three remote destinations. To
configure the device to send Syslog events to a remote Syslog server, enter the
Alias and IP Address of the remote Syslog server, and select the logging
threshold of the Syslog events to be sent to the remote Syslog server.
Hosts To map an IP address to a host name, select the Add Host button. This shows
the Add Host form (see Figure 5.30).
Populate the Add Host form with the correct host name and IP address of an
LDAP or RADIUS server. The SEL-2730M supports as many as 64 hosts.
Accounts
Local Users Use the Local Users page to add, remove, and update local user accounts for
the device. Refer to Section 3: Managing Users for more information
regarding local user accounts.
Security
X.509 Certificates HTTPS (SSL/TLS) connections require authentication to confirm that the
server with which you are communicating is the correct server. This
authentication is through X.509 certificates. By default, the device has a self-
signed X.509 certificate that can cause your web browser to issue a security
alert. This security alert will require a security exception for authentication to
continue. To prevent this security alert from appearing, install a CA-signed
X.509 certificate on the device. If your web browser has been configured to
trust the CA issuing and signing the certificate, the X.509 certificate will be
trusted and the security alert will no longer appear.
The device supports one X.509 certificate that is used for HTTPS
communications between the client web browser and the web server running
on the device. The X.509 Certificates page has options to view, rename,
export, import, and regenerate the X.509 certificate. Descriptions follow for
each of these options.
LDAP and RADIUS also use X.509 certificates.
View
This option provides a detailed view of the installed certificate.
Rename
This option provides a form for renaming the certificate. The Certificate Name
can contain as many as 128 characters.
Import
This option provides a form to import a certificate generated or signed
externally to the device. You must enter the password for the private key
during import if the private key is encrypted.
For more information on X.509 certificates, see Appendix I: X.509.
MAC-Based Port MAC-based port security provides the ability to create MAC address filters
that only allow traffic on a port from specific MAC addresses. The device
Security provides two methods of dynamically building the MAC filter for a port, and
an additional method to statically assign MAC addresses to the filter. The
methods for dynamically building the MAC filter for a port include count lock
and time lock. You can use all methods independently or in conjunction to
build the MAC filter for the port.
For example, you can specify that you would like to learn five MAC addresses
for the port and lock in the configuration. You can also specify that you would
like to learn five MAC addresses for ten minutes, and the configuration will
either lock after five addresses have been learned, or ten minutes have elapsed.
You can also choose to statically configure the MAC filter on the port by
manually entering one or more MAC addresses.
The device supports a maximum of 1000 MAC address entries across all ports.
System
Global Settings
Web Settings
The web settings allow for modification of settings related to the web
management interface of the device.
The device automatically selects the language used for the web management
interface based on an Accept-Language request-header field from the
requesting client web browser. The device defaults to the highest-priority
supported language the requesting client web browser lists. In the event of a
tie in priorities of supported languages or if none of the requested languages
are supported, the language defaults to the Language setting configured in the
Global Settings. The SEL-2730M transmits Syslog messages and SNMP traps
in the language specified through the Language setting in Global Settings.
VLAN-aware Enabled, Disabled Disabled Determines the operational mode of the device with respect to VLANs.
Spanning Tree RSTP, Off RSTP Configures the spanning tree mode for the device. The device does not
Mode provide network loop prevention if this setting is disabled.
LLDP Enabled, Disabled Enabled Enables or disables Link Layer Discovery Protocol (LLDP) on the
device.
Date/Time The date and time functions of the device allow accurate timekeeping for
time-stamping internally generated system events. The date and time of the
device can be manually set, or the device can synchronize its internal clock to
Network Time Protocol (NTP) servers over the network. One benefit of
synchronizing time by using NTP is that all devices synchronized to the NTP
servers share the same time, and event correlation across multiple systems is
possible. Having the same time reference for time-stamped events makes
auditing system and security events across multiple systems easier to manage.
NTP
NTP is a method for synchronizing system clocks over IP networks. NTP
typically maintains accuracies of 10 ms across public networks and 200 s or
better in private networks under ideal conditions.
Alarm Contact Each SEL-2730M has one alarm contact output that can be used to alert
system personnel about system- or security-related events. The events are
divided into seven categories (described in Table 5.24) that can either be
configured with one of three alarm contact behaviors (described in Table 5.25)
or disabled so that the SEL-2730M does not operate the alarm contact for
those events. The alarm contact on and off duration for latching and pulsing
are configurable, as described in Table 5.27. These durations apply to all
pulsing and latching events.
Settings
There are three groups of settings: one to enable the event categories (see
Table 5.24), one to select the alarm contact behavior (see Table 5.25), and one
for the on and off durations (see Table 5.27).
Behavior Description
Pulse The alarm contact asserts for the on time and then deasserts
for the off time.
Latch (Manual Clear) The alarm contact asserts for at least as long as the on time.
or The alarm contact then deasserts for at least as long as the off
Latch (Automatic Clear) time after the user manually clears the alarm via the web
interface for both types of latches. Automatically clearing
latches are automatically cleared if the underlying cause of
the event is resolved. If cleared during the on time period, the
alarm contact deasserts immediately after the on time expires.
The Latch (Automatic Clear) behavior depends on the category of the alarm,
as shown in Table 5.26.
Configuration
Eth F Link Front port is up
Link All enabled back ports are upa
Port Security Alarm is manually cleared
Rapid Spanning Tree Protocol SEL-2730M is turned off and back on
On Time 1s 1–10 s Minimum duration for which the alarm contact asserts.
Off Time 1s 1–10 s Minimum duration for which the alarm contact deasserts.
a These apply to latching events as well as pulsing events.
To enable a category, select the check box to the left of the category name. To
change the behavior of the alarm contact for that category, use the drop-down
box to the right of the category name.
System Integrity alarms representing diagnostics are pooled once per cycle. If
the alarm is manually cleared and the underlying cause persists, the
configured alarm contact behavior event reoccurs.
For both Link Alarms (Link: Eth F or Link: Ports 1–24), there are no warnings
to the user when they enable a Link alarm when the physical port is disabled.
For example, if Link alarm for Eth F is enabled but in the IP Configuration,
the physical Eth F is disabled, the user will not be warned and Eth F will never
trigger a Link alarm. This is true for Ports 1–24 as well. If Ports 13–24 are
physically disabled and the Link alarm for Ports 1–24 are enabled, the user is
not warned that some ports are physically disabled, but alarms occur for port
activity on the physically enabled Ports 1–12.
If more than one event occurs during the on or off time of a latch or pulse, the
alarm contact operates according to the following rules:
➤ A latching event always interrupts a pulse, regardless of
whether the on or off time has expired.
➤ Pulsing events are ignored during the on time of a pulse or a
latch.
➤ If one or more pulsing events occur during the off time of a
pulse or a latch, or if one or more latching events occur and are
cleared during the off time of the latch, the alarm contact pulses
once more after the off time has expired.
➤ During a latching event, the alarm contact always asserts for at
least the on time and remains asserted until all latching events
are cleared, including all latching events that occurred during
the on time of the original latching event.
➤ Once in the off time of a latch, the alarm contact remains
deasserted until at least the off time expires, regardless of any
pulsing or latching events that occur during this time.
To unambiguously differentiate between a latching event and a pulsing event,
use a manually clearing latch behavior. Events are also logged to the Syslog
Report page and sent to any configured Syslog servers regardless of the alarm
contact settings or behavior.
Usage Policy The device presents a usage policy to all users accessing the login page. This
policy notifies users of what constitutes the appropriate use of this device,
what actions are taken to ensure the device is not used inappropriately, and
what actions will be taken if abuse is discovered. The device comes with the
following default usage policy:
This system is for the use of authorized users only. Individuals using this
system without authority or in excess of their authority, are subject to
having all their activities on this system monitored and recorded by
system personnel. Anyone using this system expressly consents to such
monitoring and is advised that if such monitoring reveals possible
evidence of criminal activity, system personnel may provide the evidence
of such activity to law enforcement officials.
The usage policy is configurable from 0 to as many as 4095 characters. Select
the Usage Policy link from the navigation menu to modify the usage policy.
File Management File management provides an interface from which you can import and export
settings, as well as perform firmware upgrades and download diagnostics
reports. Exporting system settings is useful for providing device configuration
backups for disaster recovery, as well as creating a template configuration that
you can use in commissioning large numbers of devices. For example, if all
devices share the same configuration, except for a few device-specific
configuration items such as hostname and IP address, the configuration can be
created once and then exported as a template. When the configuration file is
imported into a new device, only a couple of changes are necessary before the
device is fully configured.
Export Settings
Settings can be exported either encrypted or unencrypted in XML format. The
encrypted settings export is useful for creating an encrypted copy of the device
configuration as a device backup. You can use this backup for disaster
Diagnostics Report
A diagnostics report provides system status, diagnostics, and crash logs to
SEL for analysis. Diagnostic reports are encrypted to protect sensitive
information.
Step 1. Log in to the device and browse to the File Management page.
Step 2. Select Diagnostics Report.
Step 3. Select Generate.
Import Settings
The Import Settings page provides an interface to import settings from either
an encrypted or unencrypted settings file. Perform the following to import a
settings file:
Step 1. Log in to the device and browse to the File Management page.
Step 2. Select the Import Settings tab at the top of the page.
Step 3. Select Choose File and browse to the location of the settings
file you would like to import.
WARNING Step 4. If the file was encrypted during the export process, enter the
Importing settings will replace the encryption password into the Password field. If the file was not
current settings and reboot the encrypted during the export process, leave the Password field
device.
blank.
Step 5. Select the Import button.
Firmware Upgrade
The Firmware Upgrade page provides an interface from which you can
upgrade device firmware. Refer to Appendix B: Firmware Upgrade
Instructions for more information on the firmware upgrade procedure.
Device Reset
Device Reboot
The device reboot function turns the device off and back on. All
communication through the device is lost while the device restarts.
Factory Reset
The device provides the factory-reset function to restore the unit to its factory
configuration. You should only use this feature when you decommission the
device. The factory-reset function erases the device log files and returns
device settings back to the factory-default values. After a factory reset, you
must recommission the device. Refer to Section 2: Installation for details on
commissioning the device.
Introduction
This section provides the following guidelines for testing and troubleshooting
the device.
➤ Testing Philosophy on page 6.1
➤ LED Indicators on page 6.2
➤ Device Dashboard on page 6.3
➤ Troubleshooting on page 6.4
➤ Technical Support on page 6.5
Testing Philosophy
Device testing can be divided into three categories: acceptance,
commissioning, and maintenance. The categories are differentiated by when
they take place in the life cycle of the product and by test complexity. The
following paragraphs describe when you should perform each type of test, the
goals of testing at that time, and the functions that you need to test at each
point.
This information is intended as a guideline for testing a device.
Acceptance Testing Perform acceptance testing when qualifying the SEL-2730M for use in an
Ethernet-based communications network that supports critical systems.
What to Test
Acceptance test all settings parameters critical to your intended application.
SEL performs detailed acceptance testing on all SEL-2730M models and
versions. It is important for you to perform acceptance testing on the
Maintenance Testing The SEL-2730M does not require regular maintenance testing.
LED Indicators
The SEL-2730M has extensive self-test capabilities. You can determine the
status of your device by using the indicator lights located on the front or rear
panels. These indicators are provided to show whether the device is enabled,
whether an alarm condition exists, whether the power supplies are healthy, and
to show the speed and link state for each of the communications interfaces.
Figure 6.1 shows the locations of the LED indicators. The rear-panel
indicators corresponding to the ones on the front panel operate identically.
17 18 19 20 21 22 23 24
LAMP 100 Mbps
TEST LNK/ACT
ENABLED PWR A 1 Gbps 100 Mbps
ALARM PWR B LNK/ACT LNK/ACT
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Table 6.1 describes the system status indicators. On the front panel, these are
located next to the LAMP TEST button.
Device Dashboard
While the device status indicator lights are useful for getting status
information at a quick glance, they will only alert you to simple normal vs.
abnormal operating conditions. For more detailed diagnostic information, visit
the Dashboard page by selecting the Dashboard link from the navigation
panel. See Device Dashboard on page 2.7 for more information.
Troubleshooting
Inspection Procedure Complete the following procedure before disturbing the device. After you
finish the inspection, refer to Table 6.3.
Step 1. If the web interface is accessible, record the part number, serial
number, and firmware version from the Dashboard Device
Information table.
Step 2. Record a description of the problem encountered.
Step 3. Examine the System Statistics and Diagnostics tables and
record any values that are unusual.
Step 4. Measure and record the power supply voltage at the power
input terminals.
Step 5. Record the state of the LED indicators.
The PWR A and PWR B indica- Input power is not present. Verify that input power is present and that the power supply
tors are both dark assembly is fully inserted.
The login page is The computer trying to connect to Verify the physical and logical connection between the man-
inaccessible the web interface is not on the cor- agement computer and the SEL-2730M.
rect network. Configure the IP address of the management computer to the
same network as the SEL-2730M, or set the computer network
interface to autoconfigure the network by using DHCP as
described in Section 2: Installation.
The ETH F network interface on the Insert a small tool such as a paperclip into the pinhole reset
SEL-2730M is not enabled. above Port 2 on the rear panel of the device, and depress the
reset button for 5 seconds. This will enable the interface and
turn on the Captive Port feature to allow you to connect to the
management interface by using ETH F. See Section 2: Installa-
tion for details.
No Syslog messages The Syslog server is not reachable Ensure that the Syslog server IP address is valid and reachable.
from the network containing the If the Syslog server is on another network, ensure that a net-
SEL-2730M. work gateway is configured and available to route the Syslog
traffic.
No Syslog servers defined or the Navigate to the Network Settings/Syslog Settings page and
logging threshold is unexpectedly ensure that the proper Syslog IP address and Logging Thresh-
high. old settings are made there.
A user cannot log in The user’s account is missing. Log in to the SEL-2730M as an administrator and verify the
details for the subject account on the Accounts/Local Users
page.
The user’s password is incorrect. Check that Caps Lock is not active on the computer logging in.
If necessary, reset the user’s account from the Local Users
page.
If You Forget Your If you forget the IP address for which your SEL-2730M is configured, but do
not want to perform a full factory reset, the Captive Port feature provides you
SEL-2730M IP access to the web management interface.
Address To activate the Captive Port feature on ETH F, while the SEL-2730M is
powered on, insert a tool such as a straightened paper clip into the pinhole
reset hole above Port 2 on the rear panel and press the recessed reset button for
5 seconds. This enables the front Ethernet port and turns on the Captive Port
feature.
The Captive Port feature provides special DHCP and DNS servers to the
computer connected to ETH F. The DHCP server assigns the computer an IP
address adjacent to the IP address of your SEL-2730M, so the computer will
be on the same subnet and capable of communicating with it. This also sets
the DNS server for the computer to the IP address of your SEL-2730M. Once
this occurs, any DNS requests from the computer resolve to the SEL-2730M,
so that browsing to any host, such as selinc.com, results in opening the web
management interface of your SEL-2730M.
If You Forget Your Use of the Captive Port feature to gain access to your SEL-2730M
reestablishes network communication with it, but you must still know the
Administrative credentials for an administrative account. If you have lost all administrative
Account Password account credentials, you must perform a full factory-default reset.
Turn off power to your SEL-2730M, insert a tool such as a straightened paper
clip into the pinhole reset hole above Port 2 on the rear panel, and press the
recessed reset button. Holding the button depressed, apply power. After five
seconds, release the recessed reset button.
Wait for the green ENABLED LED on the front panel to illuminate, indicating
that your SEL-2730M has reset to factory-default settings and is ready. ETH F
will be enabled, the Captive Port feature will be on, and the IP address for the
unit will be 192.168.1.2. You can access the Commissioning page by entering
a hostname, such as selinc.com, or you can browse directly to the IP address
for the unit at https://192.168.1.2.
Technical Support
We appreciate your interest in SEL products and services. If you have
questions or comments, please contact us at:
Schweitzer Engineering Laboratories, Inc.
2350 NE Hopkins Court
Pullman, WA 99163-5603 U.S.A.
Tel: +1.509.338.3838
Fax: +1.509.332.7990
Internet: selinc.com/support
Email: info@selinc.com
Firmware
Determining the To determine the firmware version, log in to the web interface and check the
Dashboard page. The Device Information section displays the Firmware
Firmware Version Identification (FID) number.
The firmware version will be either a standard release or a point release. A
standard release adds new functionality to the firmware beyond the
specifications of the existing version. A point release is reserved for
modifying firmware functionality to conform to the specifications of the
existing version.
A standard release is identified by a change in the R-number of the device FID
number.
Existing firmware:
FID=SEL-2730M-R100-V0-Z001001-Dxxxxxxxx
Standard release firmware:
FID=SEL-2730M-R101-V0-Z001001-Dxxxxxxxx
A point release is identified by a change in the V-number of the device FID
number.
Existing firmware:
FID=SEL-2730M-R100-V0-Z001001-Dxxxxxxxx
Point release firmware:
FID=SEL-2730M-R100-V1-Z001001-Dxxxxxxxx
The Z-number indicates which ACSELERATOR QuickSet SEL-5030 Software
version to use.
The release date is after the D. For example, the following is firmware version
number R100, release date June 11, 2012.
FID=SEL-2730M-R100-V0-Z001001-D20120611
Revision History Table A.1 lists the firmware versions, revision descriptions, and corresponding
instruction manual date codes.
Manual
Firmware Identification (FID) Number Summary of Revisions
Date Code
Manual
Firmware Identification (FID) Number Summary of Revisions
Date Code
Manual
Firmware Identification (FID) Number Summary of Revisions
Date Code
Manual
Firmware Identification (FID) Number Summary of Revisions
Date Code
Instruction Manual
The date code at the bottom of each page of this manual reflects the creation
or revision date.
Table A.2 lists the instruction manual versions and revision descriptions. The
most recent instruction manual revisions are listed first.
20211227 Section 1
➤ Updated Figure 1.3: Rear-Panel View.
➤ Updated SEL-9330-A High-Voltage Power Supply (120–240 Vac, 125–250 Vdc), SEL-9330-C Low-Voltage
Power Supply (24–48 Vdc), Front- and Rear-Panel Diagrams, and Specifications.
20210830 Section 1
➤ Updated Product Features.
Section 5
➤ Added Hosts.
➤ Updated File Management.
➤ Updated Figure 5.34: Export Settings Page.
➤ Added Diagnostics Report.
Appendix A
➤ Updated for firmware versions R109-V3 and R110.
Appendix E
➤ Updated Table E.3: Event Logs.
20210727 Section 1
➤ Updated Dimension Drawing.
➤ Updated Specifications.
20210630 Section 1
➤ Updated Electromagnetic Compatibility Emissions in Specifications.
20210625 Section 1
➤ Updated Dimension Drawing.
➤ Updated notes in Dimension Drawing.
20210324 Section 1
➤ Updated UL listing in Specifications.
20210301 Section 2
➤ Updated Connecting to the Device.
Appendix A
➤ Updated for firmware version R109-V2.
Appendix J
➤ Updated Table J.1 SEL-2730M Port Number to ifIndex Mapping.
20201203 Section 1
➤ Updated UL listing in Specifications.
20201123 Section 2
➤ Updated Figure 2.7: Device Dashboard and Navigation Menu.
Appendix A
➤ Updated for firmware version R109-V1.
20201117 Section 1
➤ Added port monitoring.
➤ Updated compliance statement for Figure 1.3: Rear-Panel View.
Section 3
➤ Added note regarding Internet-Draft RFC 2307.
Section 4
➤ Changed Figure 4.4: RSTP Network Topology to reflect port number changes.
Section 5
➤ Added Port Monitor section.
Section 6
➤ Updated Table 6.1: System Status Indicators.
Appendix A
➤ Updated for firmware version R109.
Appendix E
➤ Updated Port Mirror log messages in Table E.3: Event Logs.
➤ Added Port Monitor log messages to Table E.3: Event Logs.
20200805 Section 1
➤ Updated Figure 1.1: Front-Panel View and Dimension Drawing.
Section 2
➤ Updated Figure 2.1: Commissioning Network.
20200709 Section 1
➤ Updated list of supported browsers in Software System Requirements.
Appendix A
➤ Updated for firmware versions R107-V3 and R108-V1.
20200402 Section 1
➤ Added UL MX certification to Specifications.
20190805 Section 1
➤ Updated Specifications.
20190429 Appendix A
➤ Added a new entry under firmware version R108.
20181228 Section 1
➤ Added MAC Address Download to Product Features.
Section 2
➤ Updated Figure 2.7: Device Dashboard and Navigation Menu.
Section 5
➤ Added NTP version information.
➤ Updated Figure 5.30: Alarm Contact Page (Default Settings).
➤ Updated Table 5.24: Alarm Contact Categories.
➤ Updated Table 5.26: Latch (Automatic Clear) Behavior.
Appendix A
➤ Updated for firmware version R108.
Appendix E
➤ Updated Table E.3: Event Logs.
20180824 Appendix A
➤ Updated for firmware versions R106-V1 and R107-V2.
20180622 Section 1
➤ Added Supported Simple Form Factor Pluggable (SFP) Fiber-Optic Ports in Specifications.
20180228 Section 1
➤ Updated Communication Product Testing in Specifications.
20171207 Section 1
➤ Added RoHS compliance to Environmental in Specifications.
20171031 General
➤ Added Appendix J: Accessing Port Information Through SNMP.
Section 1
➤ Added a note regarding isolation requirements to Figure 1.3: Rear-Panel View.
➤ Added RCM Mark to Compliance in Specifications.
➤ Updated 24/48 Volt Power Supply under General > Power Supply in Specifications.
➤ Updated Power Supply Fuse Ratings under General in Specifications.
➤ Updated Type Tests in Specifications.
Section 2
➤ Added Installing a New Web Certificate.
➤ Updated System Statistics in Device Dashboard.
Section 3
➤ Added RADIUS to Centralized User Accounts.
Section 4
➤ Updated Configure VLANs on SEL-2730M-1 and Configure VLANs on SEL-2730M-2 in Job Done Example 1.
➤ Updated Identifying the Problem in Job Done Example 2.
Section 5
➤ Updated Table 5.1: VLAN Settings, Table 5.2: RSTP Settings, Table 5.3: Port Settings, Table 5.18: Syslog
Threshold Values, Table 5.19: Syslog Destination Settings, and Table 5.23: Features.
➤ Updated Figure 5.8: Port View.
➤ Updated IP Configuration and SNMP Settings in Network Settings.
➤ Added Table 5.4: STP Mode, Table 5.17: Severity Settings, and Table 5.26: Latch (Automatic Clear) Behavior.
Section 6
➤ Updated Table 6.1: System Status Indicators.
➤ Updated Device Dashboard.
Appendix A
➤ Updated for firmware version R107-V1.
Appendix C
➤ Updated Logging In With SEL User-Based Accounts.
Appendix E
➤ Updated Table E.1: Syslog Message Severities Reported by the SEL-2730M.
➤ Added RADIUS messages to Table E.3: Event Logs.
Appendix F
➤ Updated Date Link Layer (Layer 2) and Transport Layer (Layer 4) in OSI Model.
20170731 Section 1
➤ Updated Type Tests in Specifications.
20170314 General
➤ Updated open-source software components to current revisions.
Section 1
➤ Updated Connections, Reset Button, and LED Indicators, Software System Requirements, and Specifications.
Section 2
➤ Updated Figure 2.7: Device Dashboard and Navigation Menu.
Section 5
➤ Updated Switch Management.
➤ Updated Table 5.5: ETH F Network Interface Settings.
➤ Added Priority Settings.
➤ Updated Alarm Contact.
Appendix A
➤ Updated for firmware version R106-V0.
20160812 Appendix A
➤ Updated for firmware version R105-V1.
20160330 Section 1
➤ Updated Specifications.
Section 4
➤ Updated Table 4.2: VLAN 10 Configuration, Table 4.3: VLAN 20 Configuration, and Table 4.4: VLAN 30 Con-
figuration.
Appendix A
➤ Updated to include information on point releases.
➤ Updated for firmware version R105-V0.
Appendix B
➤ Updated to include information on point releases.
20160218 Preface
➤ Updated Safety Information.
➤ Added Trademarks.
Section 1
➤ Moved Open Source Software to Preface.
➤ Updated Table 1.7: Alarm Contact Ratings.
➤ Updated Specifications.
20150901 Preface
➤ Updated General Safety Marks.
Section 1
➤ Added Open Source Software subsection.
Section 2
➤ Added Battery Change Instructions subsection.
20150630 Section 1
➤ Updated Specifications.
20150522 Section 1
➤ Updated Specifications.
20150325 Section 1
➤ Updated Status Indicators.
Section 3
➤ Updated Figure 3.3–Figure 3.9.
Section 4
➤ Updated Figure 4.2.
➤ Updated Job Done Example 3.
20141218 Preface
➤ Updated Safety Information
Section 1
➤ Updated Specifications.
20141014 Appendix A
➤ Updated for firmware version R104.
20140814 Section 1
➤ Updated Product Features.
➤ Updated Specifications.
Section 2
➤ Updated Navigating the User Interface.
➤ Updated Device Dashboard.
Section 4
➤ Updated Configure VLANs on SEL-2730M–1.
➤ Updated Configure VLANs on SEL-2730M–2.
Section 5
➤ Updated VLAN Settings.
➤ Updated Figure 5.14 Add New Filter.
Section 6
➤ Updated Figure 6.2 Device Dashboard.
Appendix A
➤ Updated for firmware version R103.
20140425 Section 1
➤ Updated Specifications.
20131204 Section 1
➤ Updated Product Features.
➤ Updated Figure 1.3: Rear-Panel View.
➤ Updated Communications Ports in Specifications.
Section 2
➤ Updated Figure 2.12: Version Information.
Section 3
➤ Added LDAP functionality description and settings.
Section 5
➤ Updated Figure 5.13: Port Mirroring.
Appendix A
➤ Updated for firmware version R102.
Appendix D
➤ New appendix with information about LDAP.
Appendix I
➤ Updated X.509 Certificates.
➤ Updated Digital Signatures.
➤ Updated Public Key Infrastructure.
20130429 Section 1
➤ Updated Figure 1.3: Rear-Panel View.
➤ Updated Power Supply in Specifications.
20130416 Section 1
➤ Updated Specifications.
20121206 Appendix A
➤ Updated for firmware version R101.
20120611 ➤ Initial version.
Introduction
These instructions guide you through the process of upgrading firmware in the
device. The firmware upgrade will be either a standard release or a point
release. A standard release adds new functionality to the firmware beyond the
specifications of the existing version. A point release is reserved for
modifying firmware functionality to conform to the specifications of the
existing version.
A standard release is identified by a change in the R-number of the device
firmware identification (FID) number.
Existing firmware:
FID=SEL-2730M-R100-V0-Z001001-Dxxxxxxxx
Standard release firmware:
FID=SEL-2730M-R101-V0-Z001001-Dxxxxxxxx
A point release is identified by a change in the V-number of the device FID
number.
Existing firmware:
FID=SEL-2730M-R100-V0-Z001001-Dxxxxxxxx
Point release firmware:
FID=SEL-2730M-R100-V1-Z001001-Dxxxxxxxx
The release date is after the D. For example, the following is firmware version
number R100, release date June 11, 2012.
FID=SEL-2730M-R100-V0-Z001001-D20120611
Firmware Files SEL-2730M firmware upgrade files have a tar.gz file name extension. An
example firmware filename is install_2730M_R100.tar.gz.
The firmware packages are cryptographically signed to enable the device to
recognize official SEL firmware. Any uploaded files that cannot be verified as
being produced by SEL will not be processed.
Step 4. Enter the path name for the upgrade file. To locate the file
instead using the Windows file browser, select the Browse
button, navigate to the location where the upgrade file is stored,
select it, and select Open.
Step 5. Select the Upgrade button at the bottom of the page to upload
and install the new firmware. The Upgrading Firmware status
display will appear and periodically update the shown progress
of the upgrade operation as it proceeds. Firmware update takes
about 10 minutes to complete.
Technical Support
We appreciate your interest in SEL products and services. If you have
questions or comments, please contact us at:
Schweitzer Engineering Laboratories, Inc.
2350 NE Hopkins Court
Pullman, WA 99163-5603 U.S.A.
Tel: +1.509.338.3838
Fax: +1.509.332.7990
Internet: selinc.com/support
Email: info@selinc.com
Introduction
Local accounts are the engineering access accounts that reside on SEL
products. SEL has historically used global accounts such as ACC and 2AC
and a password associated with each to control access to SEL devices. With
global accounts, every user has the same login credentials (username and
password), which weakens the security of the system. To strengthen
authentication, authorization, and accountability, this SEL product uses a user-
based account structure.
Accountability is the idea that individual users can be held responsible for
their actions on a system. The lack of authentication with global accounts
creates too much opportunity to cast doubt on one’s activities, making
accountability difficult to enforce. The ability to clearly authenticate a user to
the individual level allows all actions to be assigned to specific users.
Accountability is very important to event tracking and forensic investigations.
The SEL-2730M rejects a login attempt and returns an error if the username
and corresponding password do not match a local user or if the LDAP or
RADIUS server rejects the login attempt (if configured). After three failed
login attempts within a one-minute period, this SEL product disallows access
attempts with the locked username for 30 seconds. Additionally, the
SEL-2730M pulses the alarm contact for one second to provide an alert to the
control center that a failed login attempt has occurred (if the Authentication
alarm contact category is enabled and set to Pulse). These security features are
designed to prevent and slow down password guessing attacks. Login failure
can occur if the username or password is incorrect or the user’s account is
disabled. Check the spelling of the username and password if an access
attempt fails. If you are certain that you entered the username and password
correctly, contact your system administrator to verify that your account has
not been disabled.
Passphrases
Passphrases provide a user the ability to create strong and easy-to-remember
passwords that protect access to a system. A strong passphrase includes many
different characters from many different character sets. Longer passphrases
provide greater security than shorter passphrases. SEL user-based accounts
support complex passphrases that must include at least one character from
each of the following character sets.
➤ Uppercase letters
➤ Lowercase letters
➤ Digits
➤ Special characters
LDAP Server
SEL LDAP Client
SEL-2730M SEL-3354
Open TCP Port
Start TLS
Credentials verified
Certificate Chain
When an SEL device receives an X.509 certificate from an LDAP server
during a StartTLS exchange prior to LDAP bind, you will need to have the
certificate chain stored locally. The certificate chain, also known as the
certification path, is a list of certificates used to authenticate the LDAP server.
The chain, or path, begins with the certificate of the LDAP server (the one the
SEL device receives), and each certificate in the chain is signed by the
certificate authority (CA) identified by the next certificate in the chain. The
chain terminates with a root CA certificate. The root CA certificate is always
signed by the CA itself. The signatures of all certificates in the chain must be
verified by the SEL LDAP client until the root CA certificate is reached. The
Distinguished Name (DN) of the X.509 certificate the LDAP server uses to
authenticate to the SEL LDAP client must match the LDAP server name (i.e.,
LDAP server “3354.x509.local” must match its certificate DN
“3354.x509.local”).
Hostname: IP Address:
Hostname: IP Address:
LDAP Settings
(Input these settings on the LDAP Settings page):
Search Base:
User ID Attribute:
LDAP Servers
(Input these settings on the LDAP Settings page, need at least one):
Device Roles
(Required to map user privileges, input these settings on the LDAP settings page):
Monitor Group/User DN
Introduction
The Syslog Protocol, defined in RFC 3164, provides a transport to allow a
device to send system event notification messages across IP networks to
remote Syslog servers. Syslog is commonly used to send system logs such as
security events, system events, and status messages useful in troubleshooting,
auditing, and event investigations. The Syslog packet size is limited to 1024
bytes and is formatted into three parts: PRI, HEADER, and MSG.
1. PRI: The priority part of a Syslog packet is a number enclosed
in angle brackets that represents both the Facility and Severity
of the message. The Priority value is calculated by multiplying
the Facility numerical code by 8 and adding the numerical
value of the Severity. For example, a kernel message
(Facility = 0) with a Severity of Emergency (Severity = 0)
would have a Priority of 0. Also, a “local use 4” message
(Facility = 20) with a Severity of Notice (Severity = 5) would
have a Priority value of 165. In the PRI part of the Syslog
message, these values would be placed between the angle
brackets as <0> and <165> respectively.
Higher severities have lower numerical codes, as shown in Table E.1.
1 Alert
2 Critical
3 Error
4 Warning
5 Notice
6 Informational
The Facility code (Table E.2) defines from which application group the
message originated.
0 Kernel messages
1 User-level messages
2 Mail system
3 System daemons
4 Security/authorization messagesa
The Syslog message has been divided into each respective part as shown here.
<34> Jul 09 2009 08:17:29 myhostname Invalid login attempt by: root at 192.168.1.1
PSTN
SEL-
3025 SEL-351
VPN SEL-3620
SEL-351
Central Syslog
Server
SEL-351
Commissioning
Device commissioned by {username} at {IP address} Commissioning Notice SECURITY
User Configuration
User {username}: created by {username} at {IP address} UserConfig Warning SECURITY
User {username}: deleted by {username} at {IP address} UserConfig Warning SECURITY
User {username}: enabled by {username} at {IP address} UserConfig Notice SECURITY
User {username}: disabled by {username} at {IP address} UserConfig Notice SECURITY
User {username}: password set by {username} at {IP address} UserConfig Warning SECURITY
User {username}: attributes changed by {username} at {IP address} UserConfig Notice SECURITY
Login
Login to {interface}: successful by {username} at {IP address} Login Notice SECURITY
Login to {interface}: failed from {IP address} Login Notice SECURITY
Logout {interface}: {username} at {IP address} Login Notice SECURITY
User account {username} locked out due to consecutive failed login Login Warning SECURITY
attempts
User account {username} timeout Login Warning SECURITY
LDAP
LDAP: settings changed by {username} at {IP address} LDAPConfig Warning SECURITY
LDAP: enabled by {username} at {IP address} LDAPConfig Warning SECURITY
LDAP: disabled by {username} at {IP address} LDAPConfig Warning SECURITY
LDAP Search Base: changed by {username} at {IP address} LDAPConfig Warning SECURITY
LDAP User ID Attribute: changed by {username} at {IP address} LDAPConfig Warning SECURITY
LDAP Group Membership Attribute: changed by {username} at LDAPConfig Warning SECURITY
{IP address}
LDAP Synchronization Interval: changed by {username} at {IP address} LDAPConfig Warning SECURITY
LDAP Bind DN: changed by {username} at {IP address} LDAPConfig Warning SECURITY
LDAP Bind DN Password: changed by {username} at {IP address} LDAPConfig Warning SECURITY
LDAP Server {hostname}: created by {username} at {IP address} LDAPConfig Warning SECURITY
LDAP Server {hostname}: deleted by {username} at {IP address} LDAPConfig Warning SECURITY
LDAP Server {previous_hostname} Hostname: changed to LDAPConfig Warning SECURITY
{post_hostname} by {username} at {IP address}
LDAP Server {hostname} Port: port number changed by {username} at LDAPConfig Warning SECURITY
{IP address}
LDAP Group Mapping: {privilege level} mapping created by {username} LDAPConfig Warning SECURITY
at {IP address}
LDAP Group Mapping: {privilege level} mapping deleted by {username} LDAPConfig Warning SECURITY
at {IP address}
LDAP User Attribute Mappings: changed by {username} at {IP address} LDAPConfig Warning SECURITY
LDAP: Unable to connect to server at {hostname}:{port} LDAP Error SECURITY
LDAP: {hostname}:{port} does not respond LDAP Error SECURITY
LDAP: LDAP version used by server {hostname}:{port} is not supported LDAP Error SECURITY
LDAP: Unable to start TLS session with {hostname}:{port} LDAP Error SECURITY
LDAP: The certificate presented by {hostname}:{port} is invalid LDAP Error SECURITY
LDAP: The hostname of the certificate presented by {hostname}:{port} LDAP Error SECURITY
does not match
LDAP: The issuing authority of the certificate presented by LDAP Error SECURITY
{hostname}:{port} is untrusted
LDAP: The certificate presented by {hostname}:{port} is expired LDAP Error SECURITY
LDAP: Search base entry not found on server {hostname}:{port} LDAP Error SECURITY
LDAP: User ID Filter syntax invalid for server {hostname}:{port} LDAP Error SECURITY
LDAP: Group Filter syntax invalid for server {hostname}:{port} LDAP Error SECURITY
LDAP: Group Filter search on server {hostname}:{port} returned no LDAP Error SECURITY
groups
LDAP: No Group Mappings set for server {hostname}:{port} LDAP Error SECURITY
LDAP: Bind DN authentication failed on server {hostname}:{port} LDAP Error SECURITY
LDAP: An error occurred during authentication or authorization on server LDAP Error SECURITY
{hostname}:{port}
LDAP: One or more of the user-configured DNs for server LDAP Error SECURITY
{hostname}:{port} contains syntax errors.
LDAP: Server {hostname}:{port} returned a DN that was longer than LDAP Error SECURITY
4096 bytes. That DN was ignored.
LDAP: An error occurred during Bind DN authentication on server LDAP Error SECURITY
{hostname}:{port}
LDAP: An error occurred when searching for a DN on the server LDAP Error SECURITY
{hostname}:{port}
LDAP: An error occurred when searching for the user’s DN on the server LDAP Error SECURITY
{hostname}:{port}
Miscellaneous Configuration
Usage Policy: changed by {username} at {IP address} Config Notice SECURITY
System Contact Information: changed by {username} at {IP address} Config Notice USER
Port Mirror
Port Mirroring enabled on {target_port} by {username} at {user_ip} PortMirrorConfig Notice USER
Port Mirroring disabled on {target_port} by {username} at {user_ip} PortMirrorConfig Notice USER
Port Mirroring target port changed from {previous_target_port_id} to PortMirrorConfig Notice USER
{new_target_port_id} by {username} at {user_ip}
Port Mirroring source ports changed by {username} at {user_ip} PortMirrorConfig Notice USER
Port Monitor
Port {port #} exceeded link flap threshold PortMonitor Error SYSTEM
Port {port #} detected {x} RX Checksum Errors within monitor window PortMonitor Notice SYSTEM
Port {port #} disabled: exceeded link flap threshold PortMonitor Error SYSTEM
Port {port #} disabled: exceeded RX Checksum Error rate limit PortMonitor Error SYSTEM
Port {port #} restored by {username} at {user_ip} PortMonitor Notice USER
Settings changed by {username} at {user_ip} PortMonitorConfig Notice SECURITY
Ports
Port Settings: changed by {username} at {IP address} Config Notice SYSTEM
Port {number} changed link state to up Link Up/Down Notice SYSTEM
Port {number} changed link state to down Link Up/Down Notice SYSTEM
Front Port changed link state up Link Up/Down Notice SYSTEM
Front Port changed link state down Link Up/Down Notice SYSTEM
Rate Limiting Settings: changed on port {number} by {username} at RateLimitingConfig Notice USER
{IP address}.
Firmware
Firmware update from {previous version} to {current version} succeeded Firmware Warning SYSTEM
Uploaded firmware update package is corrupted; unable to decrypt the Firmware Error SYSTEM
firmware update package or validate the signature on the firmware update
package
Firmware: reversion to previous version initiated by {username} at Firmware Warning USER
{IP address}
The firmware update from {0} to new version failed with an error of Firmware Critical SYSTEM
{code}. Please contact Schweitzer Engineering Laboratories, Inc. for
assistance.
Firmware: update to new version initiated by {username} at {IP address} Firmware Notice USER
VLAN Configuration
VLAN {VID}: updated by {username} at {IP address} VLANConfig Notice USER
VLAN-aware mode disabled by {username} at {IP address} VLANConfig Notice USER
VLAN-aware mode enabled by {username} at {IP address} VLANConfig Notice USER
VLAN {VID}: created by {username} at {IP address} VLANConfig Notice USER
VLAN {VID}: deleted by {username} at {IP address} VLANConfig Notice USER
Multicast MAC Filtering
Static Multicast MAC Group {number}: updated by {username} at StaticMulticastMAC Notice USER
{IP address}
Static Multicast MAC Group {number}: deleted by {username} at StaticMulticastMAC Notice USER
{IP address}
Static Multicast MAC Group {number}: created by {username} at StaticMulticastMAC Notice USER
{IP address}
Port Mirroring
Port Mirroring Source Ports: changed by {username} at {IP address} PortMirroringConfig Notice USER
Port Mirroring disabled on {port} by {username} at {IP address} PortMirroring Notice USER
Port Mirroring enabled on {port} by {username} at {IP address} PortMirroring Notice USER
Port Mirroring target port changed from none to {port} by {username} at PortMirroringConfig Notice USER
{IP address}
Port Mirroring target port changed from {port} to none by {username} at PortMirroringConfig Notice USER
{IP address}
Spanning Tree
Spanning Tree: {hostname} has become the root bridge SpanningTree Notice SYSTEM
Spanning Tree: Configuration changed by {username} at {IP address} SpanningTree Notice USER
Spanning Tree: Port {number} transitioned from {1} to {2} SpanningTree Informational SYSTEM
Spanning Tree: Port {number} transitioned from {1} to {2} SpanningTree Notice SYSTEM
RSTP
BPDU received, port {port_number} disabled. SpanningTree Notice SYSTEM
BPDU Guard timeout reached. Port {port_number} enabled. SpanningTree Notice SYSTEM
BPDU Guard overridden by {username} at {IP address} Port SpanningTree Notice SYSTEM
{port_number} enabled.
Host Settings: Removed host {old_hostname} with IP address HostConfig Notice USER
{ip_address} by {username} at {IP address}.
SNMP
SNMP Settings: changed by {username} at {IP address} SNMPConfig Informational USER
Syslog
Syslog Settings: changed by {username} at {IP address} SyslogConfig Notice USER
Syslog Destination {number}: created by {username} at {IP address} SyslogConfig Notice USER
Syslog Destination {number}: deleted by {username} at {IP address} SyslogConfig Warning USER
Syslog Destination {number} Settings: modified by {username} at SyslogConfig Warning USER
{IP address}
Local Syslog Event Queue contains >= 90% unacknowledged events Syslog Critical SYSTEM
Local Syslog Event Queue contains <= 80% unacknowledged events Syslog Notice SYSTEM
Local Syslog Event Queue contains >= 75% unacknowledged events Syslog Warning SYSTEM
Local Syslog Event Queue contains <= 65% unacknowledged events Syslog Notice SYSTEM
Syslog events acknowledged by {username} at {IP address} Syslog Notice USER
The {0} event queue overflowed Syslog Critical SYSTEM
The {0} event queue left the overflow condition. Approximately Syslog Notice SYSTEM
{number} events were lost.
Date/Time
Time Zone: changed from {0} to {1} by {username} at {IP address} DateTimeConfig Notice USER
System Time: changed from {0} to {1} by {username} at {IP address} DateTimeConfig Notice USER
Time Source: set to {0} by {username} at {IP address} DateTimeConfig Notice USER
NTP: server mode enabled by {username} at {IP address} DateTimeConfig Notice USER
NTP Server {priority}: created by {username} at {IP address} DateTimeConfig Notice USER
NTP Server {priority}: deleted by {username} at {IP address} DateTimeConfig Notice USER
NTP: server mode disabled by {username} at {IP address} DateTimeConfig Notice USER
System Time: synchronized via NTP DateTime Notice SYSTEM
System Time: lost synchronization to external source DateTime Warning SYSTEM
System Time: manually synchronized to external source by {username} at DateTime Notice USER
{IP address}
Configuration File Import and Export
Configuration file import started by {username} at {IP address} ImportExport Notice USER
Configuration file import successful ImportExport Notice USER
Configuration file import failed ImportExport Warning USER
Configuration file export started by {username} at {IP address} ImportExport Notice USER
Configuration file export successful ImportExport Notice USER
Configuration file export failed ImportExport Warning USER
Device Reset
Device initialization completed Power Notice SYSTEM
Device reset because of hardware watchdog Power Critical SYSTEM
Device rebooted by {username} at {IP address} Power Error USER
Device factory reset initiated by {username} at {IP address} Commissioning Notice SECURITY
Device factory reset initiated through pinhole button PushbuttonReset Notice USER
Front management port reset initiated through pinhole button PushbuttonReset Alert USER
RADIUS
{username} at {IP address} enabled RADIUS RADIUSConfig Warning SECURITY
{username} at {IP address} disabled RADIUS RADIUSConfig Warning SECURITY
{username} at {IP address} modified RADIUS settings RADIUSConfig Notice SECURITY
Rejected login attempt because no response from the RADIUS server RADIUS Warning SECURITY
received within the retransmission timeout
Active RADIUS server is now {priority} RADIUS Notice SECURITY
Rejected login attempt by user {username} because RADIUS server RADIUS Error SECURITY
{priority} replied without an SEL-User-Role attribute
Rejected login attempt by user {username} because RADIUS server RADIUS Error SECURITY
{priority} replied with an SEL-User-Role attribute containing an
unrecognizable user role
Rejected login attempt because the common name in the X.509 certificate RADIUS Error SECURITY
sent by the RADIUS server {priority} did not match the hostname of the
RADIUS server on the RADIUS page
Rejected login attempt because RADIUS server {priority} sent an X.509 RADIUS Error SECURITY
certificate with an unknown or untrusted certificate authority
Rejected login attempt because RADIUS server {priority} sent an expired RADIUS Error SECURITY
or not yet valid X.509 certificate
Diagnostics
Diagnostic report generated by {username} at {IP address} Diagnostics Notice USER
Introduction
A telecommunications network can be as simple as two devices linked
together for information sharing or as complex as the internet involving many
devices serving a multitude of purposes. In either case, networking devices
need a common model for interconnectivity across a diverse set of
communications media, manufacturer equipment, protocols, and applications.
The International Organization for Standardization (ISO) developed the Open
Systems Interconnection (OSI) model to serve this purpose. The OSI model
has been in use for decades as a reference model that describes the
fundamental concepts and approach to interconnecting heterogeneous systems
by abstracting the model into seven logical layers. This appendix introduces
networking fundamentals and illustrates how device communication occurs
across disparate networks.
OSI Model
The OSI model consists of seven conceptual layers, as shown in Figure F.1.
Each layer is relatively independent of the other layers and only needs to know
how to communicate with the adjacent layers. This independence has allowed
manufacturers to develop implementations at their respective OSI layers and
still be interoperable with implementations at completely different layers. For
example, a program interfacing at the Application Layer does not need to
know if the data being transmitted will traverse over a Cat 5 cable, serial, or
radio physical medium.
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Physical Layer
1100101010101010101010111011010101000011111100010101
Physical Layer The primary responsibility of the Physical Layer is transmitting data across a
communications medium from one device to another. This layer defines the
(Layer 1) electrical and mechanical interfaces such as the hardware network interface
cards use in interfacing with the physical medium that carries the bit stream. A
Physical Layer device simply transmits or receives data and lacks any
knowledge of the data that it transmits. Copper and fiber are both examples of
physical media in common use. Network hubs and repeaters are devices
common to this layer.
Data Link Layer The Data Link Layer is responsible for providing transit of data across
physical mediums by controlling access control, data framing, and error
(Layer 2) detection, as well as providing physical addressing. Directly connected
devices (Figure F.2) communicate at this layer without the need for a Layer 3
device, such as a router.
Ethernet Segment 1
MAC addresses are physical addresses that are embedded into the hardware
and determine how devices should identify each other uniquely on the same
network segment.
At this layer, devices organize data they receive into frames that encapsulate
the data from higher layers. Figure F.3 depicts an example of an Ethernet
frame.
Network Layer The Network Layer is responsible for transmitting data from one device to
another device that is on a separate network segment. The separate network
(Layer 3) segment could be within close proximity, such as within the same building, or
in a completely different country, as seen with the internet.
Addressing, routing, fragmentation, and error handling are all functions of the
Network Layer.
Layer 3 addressing is different from Layer 2 addressing, in that Layer 3
addresses are logical. Logical addresses are hardware-independent, unlike
MAC addresses that are assigned to specific hardware. The Network Layer
manages mappings between these logical addresses and physical addresses.
Address Resolution Protocol (ARP) performs this mapping in IPv4 networks.
The most common Layer 3 addressing scheme is IP addressing. IP addresses
are 32-bit addresses, commonly denoted in dotted-decimal notation, that
identify devices across different network segments.
Table F.1 shows an example IP address of 192.168.254.1 in dotted-decimal
notation, with the equivalent 32-bit binary notation. Each 8-bit octet value is
equivalent to the decimal value in the dotted-decimal notation. For example,
the first binary octet of 11000000 is equivalent to 192 in the first octet of the
dotted-decimal notation.
and Device F. Without this router, these devices would not be able to
communicate with each other. Device A, Device B, and Device C can all
communicate among each other without the need for a router, as described in
Data Link Layer (Layer 2). The same is true for communication among
Device D, Device E, and Device F.
192.168.254.0/24
(.10) (.11) (.12)
Ethernet Segment 1
192.168.254.1
Router
10.10.10.1
Ethernet Segment 2
Transport Layer When data arrive at a network device that the Network Layer determines is the
final destination, the Network Layer formats the data and passes the
(Layer 4) information to the Transport Layer. This layer is responsible for processing
level addressing, segmentation, connection management, and flow control.
Flow control manages the amount of data transmitted between communicating
devices so that the sending device does not send more data than the receiving
device can process.
Each Transport Layer protocol handles error recovery differently, but it
typically involves requesting data retransmission if a device detects an error.
Transmission Control Protocol (TCP) is the Transport Layer protocol the
TCP/IP suite uses to provide reliable, end-to-end communication. The suite
also includes User Datagram Protocol (UDP) as a connectionless protocol,
meaning that data transmission occurs with no guarantee of successful
delivery.
SYN
SYN/ACK
ACK
Session Layer The Session Layer handles session establishment, management, and
termination between two end-user software application processes. This is the
(Layer 5) first layer that switches focus from the actual networking details and deals
primarily with sessions consisting of service requests and responses that occur
between applications installed on communicating devices.
Presentation Layer The Presentation Layer provides for standard data presentation so that
applications can exchange data in a meaningful manner across a network. The
(Layer 6) sending device converts data into a standard format for transmission on the
network. The receiving device converts the data sent in this standard format to
a format recognizable by the application of the receiving device. This
processing occurs transparently to ensure that the receiving device can read
the data from the sending device.
Application Layer The Application Layer is the layer closest to the end user of a system.
Software applications provide a means for end users to interface with a device
(Layer 7) to transmit and receive data. The Application Layer provides the interface
between the end user and software applications that a system uses to process
data over the network. Application Layer protocols define rules for
communicating with network applications in a standardized format.
Broadcast Domain A
2nd Floor
Router
Broadcast Domain B
1st Floor
Figure G.1 Network Illustration Not Using VLANs
Figure G.2 shows the same physical network using VLANs. Broadcast
Domain A now consists of Device A and Device D without requiring Device
A to physically move to the 2nd floor. This can be useful when assigning
VLANs to functional or departmental roles within an organization. Let’s
assume VLAN 10 was created for the Human Resources department that
contains network resources spread throughout the 1st and 2nd floors. Without
the use of VLANs, all network resources for the Human Resources
department would need to be physically located on the same floor. As you can
see in Figure G.2, VLAN membership is independent of physical location.
2nd Floor
Router
Broadcast Broadcast Broadcast
Domain A Domain B Domain C
1st Floor
192.168.0.0
192.168.1.0
Route Advertisements
192.168.2.0
192.168.0.0
192.168.1.0
192.168.2.0
192.168.(...).0 ...
192.168.253.0
192.168.254.0
192.168.253.0 192.168.255.0
192.168.254.0
192.168.255.0
192.168.0.0
192.168.1.0
192.168.2.0
Route Advertisements
192.168.(...).0
192.168.0.0/16
192.168.253.0
192.168.254.0
192.168.255.0
CIDR has carried over to use in private network RFC 1918 addresses, through
the use of CIDR notation when defining the subnet mask and in simplifying
internal routing tables. CIDR notation uses the format where the network ID
and associated subnet mask are listed as xxx.xxx.xxx.xxx/n. The value n is the
number of leftmost bits set to a value of “1” in the mask. A traditional classful
depiction of a network ID and subnet mask would be as follows:
➤ Network ID: 192.168.1.0
➤ Subnet Mask: 255.255.255.0 (dotted-decimal notation)
To take the above example and convert it to CIDR notation, you would need to
count the number of leftmost bits set to a value of “1” in the binary notation of
the subnet mask. The binary notation of the subnet mask of 255.255.255.0
would be 11111111.11111111.11111111.00000000. There are 24 bits set to a
value of “1”, so n would equal 24. The CIDR notation would be 192.168.1.0/
24. The table below provides additional information about CIDR and the
equivalent dotted-decimal notation.
/1 128.0.0.0 1 31 2,147,483,646
/2 192.0.0.0 2 30 1,073,741,822
/3 224.0.0.0 3 29 536,870,910
/4 240.0.0.0 4 28 268,435,454
/5 248.0.0.0 5 27 134,217,726
/6 252.0.0.0 6 26 67,108,862
/7 254.0.0.0 7 25 33,554,430
/8 255.0.0.0 8 24 16,777,214
/9 255.128.0.0 9 23 8,388,606
/10 255.192.0.0 10 22 4,194,302
/11 255.224.0.0 11 21 2,097,150
/12 255.240.0.0 12 20 1,048,574
/13 255.248.0.0 13 19 524,286
/14 255.252.0.0 14 18 262,142
/15 255.254.0.0 15 17 131,070
/16 255.255.0.0 16 16 65,534
/17 255.255.128.0 17 15 32,766
/18 255.255.192.0 18 14 16,382
/19 255.255.224.0 19 13 8,190
/20 255.255.240.0 20 12 4,094
/21 255.255.248.0 21 11 2,046
/22 255.255.252.0 22 10 1,022
/23 255.255.254.0 23 9 510
/24 255.255.255.0 24 8 254
/25 255.255.255.128 25 7 126
/26 255.255.255.192 26 6 62
/27 255.255.255.224 27 5 30
/28 255.255.255.240 28 4 14
/29 255.255.255.248 29 3 6
/30 255.255.255.252 30 2 2
Introduction
In cryptography, X.509 is an International Telecommunication Union standard
for public key infrastructure (PKI). X.509 specifies formats for public key
certificates and validation paths for authentication. The SEL-2730M uses
X.509 certificates in the web server for secure device management, and for
IPsec authentication.
Alice
52ED879E Key Generation
70F71D92 Function
Big Random
Number
Symmetric key cryptography, which has been used in various forms for
thousands of years, uses a single key that both encrypts and decrypts the
message. This key must be shared between the sender and receiver in advance.
If the key cannot be shared securely, the confidentiality of any transmission
encrypted with that key cannot be known.
In public key cryptography, the encryption key is not the same as the
decryption key. If a message is encrypted with the publicly known key, only
the private key can be used to decrypt it. This private key is known only to the
owner of the key pair. Only the sender and the intended receiver will know the
message, ensuring confidentiality.
Bob
Hello
Encrypt
Alice!
Alice’s Public Key
6EB69570
08E03CE4
Alice
Hello
Decrypt
Alice!
Alice’s Private Key
Figure I.2 Confidentiality With Asymmetric Keys
Alice
I Will Sign
Pay $500 (Encrypt)
Alice’s Private Key
DFCD3454
BBEA788A
Bob
I Will Verify
Pay $500 (Decrypt)
Alice’s Public Key
Figure I.3 Authentication With Asymmetric Keys
X.509 Certificates
Digital certificates, also known as public key certificates, provide a formal
method for associating pairs of asymmetric keys with their owners. You can
use these electronic documents, through the use of digital signatures, to bind
public keys to their owners.
Digital Signatures
A digital signature is a more formal method of authenticating data than an
electronic signature. They can be compared to the wax seals that were placed
on envelopes before email was available. To create a digital signature of data,
you would first compute a hash of the data to be signed and then encrypt that
hash with the signer’s private key. You would then attach this signature to the
data to be signed. To verify the authenticity of the data, the receiver’s system
first separates data and signature. The receiver computes a hash of the data and
then uses the issuer’s public key to decrypt the signature. We compare these
two hashes and, if they match, we know the data are authentic.
Signing Verification
Attach
to Data
101100110101 101100110101
Hash Hash
Web of Trust
Another of the three common uses of digital certificates is in the web of trust.
This is a less formal method of authentication than PKI provides, but is still in
common use. The largest use of the web of trust model is in Pretty Good
Privacy (PGP) used for email security. This model is very similar to PKI in
that a trusted third party is verifying the authenticity of a certificate. The
difference is that this trusted third party is not a CA, but rather a person who
endorses the authenticity of another person. Signing the public key of the
person requiring endorsement (or trust) with the endorser’s (trusted entity)
own private key establishes a web of trust. Figure I.5 below illustrates a
simple example of a web of trust. If Alice trusts Bob, and Bob trusts Charlie,
then Alice implicitly trusts Charlie.
Diane
Alice Charlie
Trust
Implicit Trust
Bob
Figure I.5 Web of Trust
Validity
Not Before: Aug 1 00:00:00 1996 GMT
Not After: Dec 31 23:59:59 2020 GMT
Subject: C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting
cc,
OU=Certification Services Division,
CN=Thawte Server CA/Email=server-certs@thawte.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (1024 bit)
Modulus (1024 bit):
00:d3:a4:50:6e:c8:ff:56:6b:e6:cf:5d:b6:ea:0c:
68:75:47:a2:aa:c2:da:84:25:fc:a8:f4:47:51:da:
85:b5:20:74:94:86:1e:0f:75:c9:e9:08:61:f5:06:
6d:30:6e:15:19:02:e9:52:c0:62:db:4d:99:9e:e2:
6a:0c:44:38:cd:fe:be:e3:64:09:70:c5:fe:b1:6b:
29:b6:2f:49:c8:3b:d4:27:04:25:10:97:2f:e7:90:
6d:c0:28:42:99:d7:4c:43:de:c3:f5:21:6d:54:9f:
5d:c3:58:e1:c0:e4:d9:5b:b0:b8:dc:b4:7b:df:36:
3a:c2:b5:66:22:12:d6:87:0d
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE
Signature Algorithm: md5WithRSAEncryption
07:fa:4c:69:5c:fb:95:cc:46:ee:85:83:4d:21:30:8e:ca:d9:
a8:6f:49:1a:e6:da:51:e3:60:70:6c:84:61:11:a1:1a:c8:48:
3e:59:43:7d:4f:95:3d:a1:8b:b7:0b:62:98:7a:75:8a:dd:88:
4e:4e:9e:40:db:a8:cc:32:74:b9:6f:0d:c6:e3:b3:44:0b:d9:
8a:6f:9a:29:9b:99:18:28:3b:d1:e3:40:28:9a:5a:3c:d5:b5:
e7:20:1b:8b:ca:a4:ab:8d:e9:51:d9:e2:4c:2c:59:a9:da:b9:
b2:75:1b:f6:42:f2:ef:c7:f2:18:f9:89:bc:a3:ff:8a:23:2e:
70:47
1 22 20
2 21 19
3 20 18
4 19 17
5 18 16
6 16 14
7 17 15
8 15 13
9 14 12
10 13 11
11 12 10
12 11 9
13 10 8
14 9 7
15 8 6
16 7 5
17 27 25
18 28 26
19 29 27
20 30 28
21 23 21
22 24 22
23 25 23
24 26 24
For example, to find the port status (ifOperStatus) of Port 1, you would look at
the ifEntry with an ifIndex of 22 (1.3.6.1.2.1.2.2.1.8.22).