CROSSBOW_v5.4_Server_ConfigurationManual
CROSSBOW_v5.4_Server_ConfigurationManual
Configuration Manual
SIMATIC NET
Device Management
https://www.siemens.com/ruggedcom
Preface
Introduction 1
RUGGEDCOM CROSSBOW
Installation and Upgrade 2
SIMATIC NET
Setup and Configuration 3
Device Management
RUGGEDCOM CROSSBOW v5.4 Managing Logs 4
Server
Troubleshooting 5
Configuration Manual
06/2023
C79000-G8976-1574-01
Legal information
Warning notice system
This manual contains notices you have to observe in order to ensure your personal safety, as well as to prevent
damage to property. The notices referring to your personal safety are highlighted in the manual by a safety
alert symbol, notices referring only to property damage have no safety alert symbol. These notices shown
below are graded according to the degree of danger.
DANGER
indicates that death or severe personal injury will result if proper precautions are not taken.
WARNING
indicates that death or severe personal injury may result if proper precautions are not taken.
CAUTION
indicates that minor personal injury can result if proper precautions are not taken.
NOTICE
indicates that property damage can result if proper precautions are not taken.
If more than one degree of danger is present, the warning notice representing the highest degree of danger
will be used. A notice warning of injury to persons with a safety alert symbol may also include a warning
relating to property damage.
Qualified personnel
The product/system described in this documentation may be operated only by personnel qualified for the
specific task in accordance with the relevant documentation, in particular its warning notices and safety
instructions. Qualified personnel are those who, based on their training and experience, are capable of
identifying risks and avoiding potential hazards when working with these products/systems.
Proper use of Siemens products
Note the following:
WARNING
Siemens products may only be used for the applications described in the catalog and in the relevant
technical documentation. If products and components from other manufacturers are used, these must be
recommended or approved by Siemens. Proper transport, storage, installation, assembly, commissioning,
operation and maintenance are required to ensure that the products operate safely and without any
problems. The permissible ambient conditions must be complied with. The information in the relevant
documentation must be observed.
Trademarks
All names identified by ® are registered trademarks of Siemens Canada Ltd.. The remaining trademarks in this
publication may be trademarks whose use by third parties for their own purposes could violate the rights of
the owner.
Disclaimer of liability
We have reviewed the contents of this publication to ensure consistency with the hardware and software
described. Since variance cannot be precluded entirely, we cannot guarantee full consistency. However, the
information in this publication is reviewed regularly and any necessary corrections are included in subsequent
editions.
Note
Along with the server and companion tools, RUGGEDCOM CROSSBOW consists of
a Client application and an Asset Discovery and Management Agent (ADM). For
more information about managing the Client and ADM, refer to the "RUGGEDCOM
CROSSBOW Client Configuration Manual".
Security information
Siemens provides products and solutions with industrial security functions that
support the secure operation of plants, systems, machines and networks.
In order to protect plants, systems, machines and networks against cyber threats, it
is necessary to implement – and continuously maintain – a holistic, state-of-the-art
industrial security concept. Siemens’ products and solutions constitute one element
of such a concept.
Customers are responsible for preventing unauthorized access to their plants,
systems, machines and networks. Such systems, machines and components should
only be connected to an enterprise network or the internet if and to the extent
such a connection is necessary and only when appropriate security measures (e.g.
firewalls and/or network segmentation) are in place.
For additional information on industrial security measures that may be implemented,
please visit https://www.siemens.com/industrialsecurity.
Siemens’ products and solutions undergo continuous development to make them
more secure. Siemens strongly recommends that product updates are applied as
soon as they are available and that the latest product versions are used. Use of
product versions that are no longer supported, and failure to apply the latest updates
may increase customer’s exposure to cyber threats.
To stay informed about product updates, subscribe to the Siemens Industrial Security
RSS Feed under https://www.siemens.com/cert.
Supplementary Documentation
Other documents that may be of interest include:
• "RUGGEDCOM CROSSBOW v5.4 Client Configuration Manual". Contains
information about managing the RUGGEDCOM CROSSBOW Client and Asset
Discovery and Management Agent (ADM).
• "RUGGEDCOM CROSSBOW v5.4 Companion Reference Manual". Contains
information specific to device types and products that support RUGGEDCOM
CROSSBOW.
• "RUGGEDCOM CROSSBOW v5.4 Scripting Reference Manual"
• "RUGGEDCOM CROSSBOW v5.4 Device Type Definition Tool (DTDT) for
CROSSBOW Configuration Manual"
• "RUGGEDCOM CROSSBOW v5.4 Executables and Ports". Contains a list of
executable files and ports, and their default state.
• "Application Description: Deploying RUGGEDCOM CROSSBOW as an Intermediate
Remote Access Solution"
• "FAQ – How to Troubleshoot Connection Issues"
Accessing documentation
The latest user documentation for RUGGEDCOM CROSSBOW v5.4 is available upon
request. To request or inquire about a user document, contact Siemens Customer
Support.
Registered trademarks
The following and possibly other names not identified by the registered trademark
sign ® are registered trademarks of Siemens Canada Ltd.:
• RUGGEDCOM
• ROS
• RCDP
• Discovery Protocol
Other designations in this manual might be trademarks whose use by third parties
for their own purposes would infringe the rights of the owner.
Warranty
Refer to the License Agreement for the applicable warranty terms and conditions, if
any.
For warranty details, visit https://www.siemens.com or contact a Siemens customer
service representative.
Training
Siemens offers a wide range of educational services ranging from in-house training
of standard courses on networking, Ethernet switches and routers, to on-site
customized courses tailored to the customer's needs, experience and application.
Siemens' Educational Services team thrives on providing our customers with the
essential practical skills to make sure users have the right knowledge and expertise
to understand the various technologies associated with critical communications
network infrastructure technologies.
Siemens' unique mix of IT/Telecommunications expertise combined with domain
knowledge in the utility, transportation and industrial markets, allows Siemens to
provide training specific to the customer's application.
For more information about training services and course availability, visit https://
www.siemens.com or contact a Siemens Sales representative.
Customer support
Customer support is available 24 hours, 7 days a week for all Siemens customers.
For technical support or general information, contact Siemens Customer Support
through any of the following methods:
Online
Visit http://www.siemens.com/automation/support-request to submit a Support Request
(SR) or check on the status of an existing SR.
Telephone
Call a local hotline center to submit a Support Request (SR). To locate a local hotline center,
visit https://w3.siemens.com/aspa_app/?lang=en.
Mobile app
Install the Industry Online Support app by Siemens AG on any Android, Apple iOS or
Windows mobile device and be able to:
• Access Siemens' extensive library of support documentation, including FAQs and
manuals
• Submit SRs or check on the status of an existing SR
• Contact a local Siemens representative from Sales, Technical Support, Training, etc.
• Ask questions or share knowledge with fellow Siemens customers and the support
community
Contacting Siemens
Address Siemens Canada Ltd.
Digital Industries
Process Automation
300 Applewood Crescent
Concord, Ontario
Canada, L4K 5C7
Telephone Toll-free: 1 888 264 0006
Tel: +1 905 856 5288
Fax: +1 905 856 1995
E-Mail [email protected]
Web https://www.siemens.com
Primary Features
• Global password management of all applicable relays and gateway devices
• Configuration and firmware management of applicable relays and gateway
devices
• Integrated file management provides controlled access, version control, and
history for all file types
• Support for third-party security event management systems
• Blocking of specified IED commands improves security and reduces errors
• Automated, scheduled retrieval of important IED event files
• Preservation of investment in legacy gateway devices and communication
infrastructure
• Individual user accounts and privileges
Automation
• Support for IED polling applications (e.g. SEL-5040)
• Scheduling of special operations (e.g. log retrieval, report generation, password
changes)
• IED File Retrieval (e.g. event records)
• Configuration management of relays and gateways
• Firmware management of applicable devices
• Password management of many device types
Security
• Individual user accounts and permissions
• Two-factor authentication, using RSA SecurID (optional)
• Audit log of all IED accesses and security events
• Support for Active Directory domains
• Blocking and logging of specified IED commands
• Optional encryption between server and substation
• Support for scheduled polling by applications
• Optional Station Access Controller (SAC) and Secure Access Manager - Local
(SAM-L) extends offering to the substation
Ease of Administration
• Structured view of IEDs (region/substation/gateway)
• Support for groups of IEDs and users
• Transparent integration with Active Directory
• Database redundancy, including Hot Standby availability
Authentication
• Make sure database encryption is enabled. For added security, Siemens
recommends using certificate-based encryption. If certificate-based encryption
is used, make sure the encryption certificate is different than the one used for
the RUGGEDCOM CROSSBOW server. If password-based encryption is used, make
sure to use registry protection.
For more information about encrypting passwords, refer to "Encrypting/
Decrypting the CROSSBOW Database" (Page 52).
For more information about registry protection, refer to "Enabling/Disabling
Service Permissions" (Page 91).
• Replace the default passwords for all user accounts and processes (where
applicable) before RUGGEDCOM CROSSBOW is deployed.
• Use strong passwords. Avoid weak passwords such as password1, 123456789,
abcdefgh, etc.
• Make sure passwords are protected and not shared with unauthorized personnel.
• Passwords should not be re-used across different user names and systems, or
after they expire.
• Record passwords in a safe, secure, off-line location for future retrieval should
they be misplaced. This includes the Device Password reports that can be
generated by RUGGEDCOM CROSSBOW.
• Restrict access to the RUGGEDCOM CROSSBOW server and database to only
trusted personnel.
• Do not save credentials in RUGGEDCOM CROSSBOW-adjacent applications (e.g.
Microsoft SQL Server Management Studio).
Physical/Remote Access
• Restrict physical access to the RUGGEDCOM CROSSBOW server to only trusted
personnel. A person with malicious intent in possession of removable media
(e.g. USB, external hard drive, etc.) could extract critical information, such as
certificates, keys, etc., or reprogram the server.
• Make sure operators are trained to use RUGGEDCOM CROSSBOW and have the
required set of permissions to perform their duties.
• Do not expose the RUGGEDCOM CROSSBOW server – specifically, ports 21000,
21005 and 21008 – to the Internet. For more information about network
configuration, refer to "Network Configuration Requirements" (Page 9).
• Make sure unwanted commands are not issued to devices via RUGGEDCOM
CROSSBOW. While RUGGEDCOM CROSSBOW is designed to block commands
(as specified by the administrators), a determined user may still be able to
circumvent security surrounding a specific command. It is recommended
(and the responsibility of the user) to review the event logs regularly for any
such activity. If necessary, RUGGEDCOM CROSSBOW can also be configured to
generate audit logs for device connections, which detail all transactions between
users and devices.
• Generated reports may contain sensitive information, such as IP addresses and
credentials. The user generating these reports is responsible for the proper
storage and distribution of this material.
• Dependent on the company's Public Key Infrastructure (PKI), use Transport Layer
Security (TLS) 1.3 connections and make sure all TLS/SSL certificates are signed
using a Secure Hash Algorithm. TLS 1.3 is enabled by default in RUGGEDCOM
CROSSBOW v5.4.
Communication
• All communications with the RUGGEDCOM CROSSBOW server, client
workstations, and IEDs should be contained within the security perimeter.
• Make sure IP address allocations are managed by authenticated and privileged
users only, and that all IP addresses within the network are unique.
• Establish VPN connections with RUGGEDCOM routers and switches whenever
possible.
• Make sure connections between the SAM-P/SAM-L and the RUGGEDCOM
CROSSBOW database are encrypted.
• If the RUGGEDCOM CROSSBOW Client is to be deployed in a multi-user
environment, only platforms that guarantee the separation of resources (such
as serial and network ports) between simultaneously-connected users should be
used. Applications such as Citrix XenDesktop are recommended for this purpose.
Other applications that share resources between users, such as Windows Remote
Desktop and Citrix XenApp, are not recommended.
Hardware/Software
• Make sure the latest versions of all RUGGEDCOM CROSSBOW utilities are installed
on the RUGGEDCOM CROSSBOW server and individual client workstations,
including all security-related patches. For the latest information on security
patches for Siemens products, visit the ProductCERT Security Advisories website
[http://www.industry.siemens.com/topics/global/en/industrial-security/news-
alerts/Pages/alerts.aspx] or the ProductCERT Security Advisories website [https://
new.siemens.com/global/en/products/services/cert.html#SecurityPublications].
Updates to Siemens Product Security Advisories can be obtained by subscribing
to the RSS feed on the Siemens ProductCERT Security Advisories website, or by
following @ProductCert on Twitter.
• Make sure installed RUGGEDCOM CROSSBOW components contain an MD5 that
matches the MD5 specified in the document "RUGGEDCOM CROSSBOW v5.4
Executables and Ports".
• Only enable the services that will be used by RUGGEDCOM CROSSBOW utilities,
including physical ports. Unused physical ports could potentially be used to gain
access to the network behind the device.
• Use redundant RUGGEDCOM CROSSBOW setups whenever possible to increase
availability of all services and to backup the configuration.
• Make sure robust Server Class hardware is used when installing RUGGEDCOM
CROSSBOW on custom hardware not provided by Siemens.
• Make sure systems on which RUGGEDCOM CROSSBOW is installed are protected
from malware by using virus scanners, applying the latest Windows updates and
other industry best practices as appropriate.
• Make sure all centralized security components that interact with RUGGEDCOM
CROSSBOW (e.g. servers for Active Directory/RADIUS/RSA, external logging
servers, mail servers, etc.) are continuously secured and maintained according to
industry best practices.
Policy
• Periodically audit all workstations that access the RUGGEDCOM CROSSBOW
Server to make sure they comply with these recommendations and/or any
internal security policies.
• Make sure to follow the security recommendations outlined in this Configuration
Manual and configure the environment according to defense in depth best
practices.
• Review the user documentation for other Siemens products used in coordination
with RUGGEDCOM CROSSBOW for further security recommendations.
Decommissioning
• When RUGGEDCOM CROSSBOW is no longer in use, delete the RUGGEDCOM
CROSSBOW database and uninstall all instances of Server and Client applications,
including any related tools such as SAM-Ls, ADMs, etc.
For more information about related tools, refer to the "RUGGEDCOM CROSSBOW
Client Configuration Manual".
Note
Responsiveness of the RUGGEDCOM CROSSBOW Client and Servers (SAM-P, SAM-
L, and SAC) can vary depending on a number of factors, including the capacity of
the host hardware, the capacity of the network infrastructure, the number of active
automated activities, the number of connected users, and the size of the overall
system.
Consider employing industry best practices, such as limiting the number of
connected users and scheduling automated activities during off hours, to optimize
Client responsiveness and overall system performance.
NOTICE
Users are responsible for managing the SQL Server instance in which the
RUGGEDCOM CROSSBOW database resides, including but not limited to its
security, user access, managed transaction logs, and disk space.
Note
The SQL Server associated with the RUGGEDCOM CROSSBOW SAC must be
installed on the same workstation as the SAC to allow pushing the SAC database.
Note
Make sure the TCP/IP protocol is enabled if using the ADM.
Note
If deploying redundant RUGGEDCOM CROSSBOW servers on Virtual Machines,
make sure:
• The Virtual Machines are installed on different physical hardware
• A high-availability solution appropriate to the Virtual Machine deployment
environment is implemented
• Client/Windows SAC/SAM-L
Workstations running RUGGEDCOM CROSSBOW Client, Windows SAC or SAM-L
should meet the following minimum requirements:
Component Specification
CPU x86 Compatible, 6-core, 2.40 GHz or faster
RAM 8 GB or more
Disk 500 GB
Operating System Windows 8
Windows 10
Windows Server 2016
Windows Server 2019
Note
A preconfigured SAM-L is available on a RUGGEDCOM RX1500PN LM
APE1808SAM-L module, designed for RUGGEDCOM RX1500-series routers.
For more information about this module, refer to the "RUGGEDCOM APE1808
Configuration Manual [https://support.industry.siemens.com/cs/us/en/
view/109769739]" .
For technical specifications, refer to the "RUGGEDCOM Modules Reference Guide
[https://support.industry.siemens.com/cs/ww/en/view/109747072]" for the
RX1500-series routers.
• Authentication Server
RUGGEDCOM CROSSBOW requires a separate authentication server for the
strong authentication of users and user groups. The following server types are
supported:
• RSA SecurID Server (RSA Authentication Manager)
• RADIUS
• Active Directory
• Network Connections
The RUGGEDCOM CROSSBOW Server requires at least one network connection.
If desired, a second network connection can be supported. In this case, typically
one Network Interface Controller (NIC) will connect to the internal Local Area
Network (LAN), and the second NIC will connect to field communication devices.
• Serial Connections and Modems
Requirements for serial connections and modems are dependent on the specific
field communication requirements of the facility.
Note
For information about how to change the server port, refer to
"Configuring Server Host Connection" (Page 68).
RADIUS Server
An open UDP port from the RUGGEDCOM CROSSBOW Server to
the RADIUS server. Use port 1812 (default) or any other port as
necessary. For more information, refer to the documentation for
the RADIUS server.
System Requirement
has been changed, add 5 to the server port number. For example, if
the server port is 18000, the port for the SAC is 18005.
This connection uses TLS between the client and server.
RUGGEDCOM CROSSBOW Secure An open TCP port from the client's workstation to the RUGGEDCOM
Access Manager - Local CROSSBOW Secure Access Manager - Local (SAM-L). Use port 21000
(default). For more information about configuring the server port,
refer to "Configuring Server Host Connection" (Page 68).
One TCP port from the RUGGEDCOM CROSSBOW Server to
RUGGEDCOM CROSSBOW SAM-L for database synchronization. Use
port 21005 (default). If the server port has been changed, add 5 to
the server port number. For example, if the server port is 18000,
the port for the SAM-L is 18005. This connection uses TLS between
the client and server.
One TCP port from the RUGGEDCOM CROSSBOW Client to
RUGGEDCOM CROSSBOW Secure Access Manager - Local (SAM-L)
for the transfer of large types of data (RUGGEDCOM CROSSBOW
Network Proxy interface). Use port 21008 (default). If the server
port has been changed, add 8 to the server port number. For
example, if the server port is 18000, the port for the SAM-L is
18008. This connection uses TLS between the client and server.
RUGGEDCOM CROSSBOW Secure An open TCP port from the client's workstation to the RUGGEDCOM
Access Manager - Primary CROSSBOW Secure Access Manager - Primary (SAM-P). Use port
21000 (default). For more information about configuring the server
port,refer to "Configuring Server Host Connection" (Page 68).
One TCP port from the RUGGEDCOM CROSSBOW SAM-L and SAC to
RUGGEDCOM CROSSBOW SAM-P for database synchronization. Use
port 21005 (default). If the server port has been changed, add 5 to
the server port number. For example, if the server port is 18000,
the port for the SAM-P is 18005. This connection uses TLS between
the client and server.
One TCP port from the RUGGEDCOM CROSSBOW Client to
RUGGEDCOM CROSSBOW Secure Access Manager - Primary (SAM-
P) for the transfer of large types of data (RUGGEDCOM CROSSBOW
Network Proxy interface). Use port 21008 (default). If the server
port has been changed, add 8 to the server port number. For
example, if the server port is 18000, the port for the SAM-L is
18008. This connection uses TLS between the client and server.
E-Mail One TCP port from the RUGGEDCOM CROSSBOW Server to the SMTP
server. Use port 25 (default).
Field Devices Dependent on the specifics of each facility. The RUGGEDCOM
CROSSBOW Server requires access (network or modem) to every
gateway in every substation.
VPN Connections For VPN connections from RUGGEDCOM CROSSBOW to facilities,
the following ports will need to be open (in both the inbound
and outbound directions) in any firewall devices between the
RUGGEDCOM CROSSBOW server and the RUGGEDCOM gateway in
that facility:
• UDP 500
• Protocol 50
• Protocol 51
• UDP 4500 (if there is NAT traversal)
Note
The configuration of the SAM-P determines the accessibility of each remote
device, based on the user’s group assignment. If a user is not a member of a user
group that is allowed access to a certain device, that device is not visible to the
user.
Since these operations are performed on behalf of the SAM-P, they cannot be
scheduled by users connected to the SAM-L. Instead, they must be scheduled by
users connected to the SAM-P.
Any activities that will be executed on the SAM-L will appear with the state
Delegated on the SAM-P.
For more information about scheduling operations, refer to "Configuring the
Maximum Number of Scheduled Processes" (Page 171).
Note
For more information about available authentication methods, refer to "Managing
User Authentication" (Page 93).
Note
A Virtual Port, or VPort, is an internal software component that
behaves like an actual hardware serial port. A Virtual Port is named
using the same convention as a real serial port, such as COM3. The
port number is configurable.
Tool Description
The ADM must be reachable from the RUGGEDCOM CROSSBOW
External Database Integration Service (EDIS).
For more information about managing an ADM, refer to the
"RUGGEDCOM CROSSBOW Client Configuration Manual".
RUGGEDCOM CROSSBOW SAM-P RUGGEDCOM CROSSBOW SAM-P is the principal interface for
configuring the Secure Access Manager - Primary (SAM-P). This tool
must be installed on the RUGGEDCOM CROSSBOW server.
RUGGEDCOM CROSSBOW SAM-L RUGGEDCOM CROSSBOW SAM-L is the primary interface for
configuring a Secure Access Manager - Local (SAM-L). This tool
should be installed on a workstation at a substation facility.
RUGGEDCOM CROSSBOW SAC RUGGEDCOM CROSSBOW SAC is the primary interface for
configuring a Station Access Controller (SAC). This tool should
be installed at a substation facility, either on a workstation or a
RUGGEDCOM ROXII device.
RUGGEDCOM CROSSBOW Bulk RUGGEDCOM CROSSBOW Bulk Importer is used to import and
Importer export information to/from the RUGGEDCOM CROSSBOW database.
For more information about using the Bulk Importer, refer to the
"RUGGEDCOM CROSSBOW Client Configuration Manual".
RUGGEDCOM CROSSBOW DTDT RUGGEDCOM CROSSBOW DTDT, or Device Type Definition Tool, is
used to create and import custom device types.
For more information about the DTDT, refer to the "RUGGEDCOM
CROSSBOW v5.4 Device Type Definition Tool (DTDT) for CROSSBOW
Configuration Manual".
RUGGEDCOM CROSSBOW RUGGEDCOM CROSSBOW Background Logger can optionally be
Background Logger run in the background of the RUGGEDCOM CROSSBOW server. It
captures internal log messages to assist in debugging and analyzing
field issues.
NOTICE
RUGGEDCOM CROSSBOW works with various third-party applications. Make sure
to consult the documentation for these applications for any requirements needed
to work with RUGGEDCOM CROSSBOW. Additionally, make sure to keep these
applications up-to-date, as outdated software can impact performance and security.
NOTICE
Make sure the installation materials provided by Siemens are digitally signed with
the Siemens AG certificate and contain MD5s that match those in the RUGGEDCOM
CROSSBOW v5.4 Release Notes.
Note
Unique databases must be created for the SAM-P, SAM-L and SAC.
Note
If mirror databases are implemented for redundancy, the following procedure must
be performed for all databases.
NOTICE
If an error is encountered at any point in this procedure, contact Siemens Customer
Support for assistance.
Note
This procedure describes the basic steps for configuring a database in Microsoft's SQL
Server Management Studio. For more information about specific steps or topics, refer
to the "Microsoft Developer Network" website (https://msdn.microsoft.com/en-us/
library/bb545450).
Note
If the name of the RUGGEDCOM CROSSBOW database defined in SQL Server
Management Studio is anything other than CrossBow, change the database
name in each script before they are run.
To change the database name, type the following:
:setvar DatabaseName {name}
Where:
• {name} is the name of the database
Note
If the server installation type defined in SQL Server Management Studio is
anything other than SAM-P, change the server installation in each script, where
applicable, before they are run.
To change the server installation, type the following:
:setvar ServerInstallType {name}
Where:
• {name} is the name of the server installation. Options are SAM-P, SAM-L and
SAC.
Note
This script includes customizable parameters that can be
configured before the script is executed. Under Please edit
these statements to correspond to your desired initial
values, edit the following, or retain the default values:
NOTICE
Security hazard – risk of unauthorized access and/or
exploitation
If user authentication (via RSA SecurID, RADIUS, and/or
Active Directory) will be implemented immediately after
installation, the Initial Administrator must correspond to an
account defined in the authentication system. Logging in to
RUGGEDCOM CROSSBOW as the initial administrator will not be
possible otherwise.
Crossbow_db_scripts.sql This script creates a table in the database referencing the Visual
Basic and Perl scripts required for the various device types
supported by RUGGEDCOM CROSSBOW.
Crossbow_db_client_queries.sql This script creates a table in the database defining the queries
RUGGEDCOM CROSSBOW is permitted to run. This includes the
query text, parameters, permissions, etc.
NOTICE
Security – risk of unauthorized access and/or exploitation
A database owner, or dbo, can perform a variety of administrative and
maintenance tasks, such as updating fields, changing stored procedures,
deleting tables, etc. Only RUGGEDCOM CROSSBOW administrators should be
granted ownership over the RUGGEDCOM CROSSBOW database.
Note
A database owner is not required for a single-server system with a local SQL
server instance.
14. Under Default database, select the RUGGEDCOM CROSSBOW database, then
click OK.
Note
SQLCMD scripting mode can be enabled by default. For more information, refer
to the SQL Server Management Studio documentation.
Note
If the name of the RUGGEDCOM CROSSBOW database defined in SQL Server
Management Studio is anything other than CrossBow, change the database
name in each script before they are run.
6. On the SQL Editor toolbar, click Execute to run the script. A confirmation
message appears in the status bar once the script has completed. If the script
does not complete successfully, contact Siemens Customer Support.
Note
This procedure describes some tasks related to Microsoft's SQL Server Management
Studio. For more information about specific steps or topics, refer to the "Microsoft
Developer Network" website (https://msdn.microsoft.com/en-us/library/bb545450).
1. Contact Siemens Customer Support and obtain the necessary files to upgrade
the RUGGEDCOM CROSSBOW database.
NOTICE
To avoid the potential loss of important data, make sure a backup of the current
database is available before upgrading.
Note
Modified scripts may not function following a database upgrade. It is
recommended that all modified scripts be reverted back to their original baseline
state so they can be updated to work with the new database version. For
information about retaining custom functionality, contact Siemens Customer
Support.
6. Restart the RUGGEDCOM CROSSBOW server, and revert all scripts back to their
baseline state. For more information, refer to the "RUGGEDCOM CROSSBOW
Client Configuration Manual".
Note
An available obsolescence script checks the RUGGEDCOM CROSSBOW database
for the presence of older device types. It is recommended to run this script and
provide the results to Siemens to ensure active device types are supported.
Note
If the name of the RUGGEDCOM CROSSBOW database defined in SQL Server
Management Studio is anything other than CrossBow, change the database
name in each script before they are run.
Crossbow_db_{current}_{new}_mi
grate.sql
Where:
• current is the version number for the
current SQL database
• new is the version number of the SQL
database after the update
For example, if upgrading from database
version 4.13 to 4.14, use the migration script
titled Crossbow_db_413_414_migrate.sql.
If the current database is more than one
version away from the target version, make
sure to run the appropriate migration scripts
in sequence. For example, if upgrading
from database version 4.13 to 4.20, run
Crossbow_db_413_414_migrate.sql,
Crossbow_db_414_functions.sql,
Crossbow_db_414_420_migrate.sql, and
then Crossbow_db_420_functions.sql.
Refer to the sequence example for the
recommended series of steps.
Crossbow_db_{new}_functions.sql
Where:
• new is the version number of the SQL
database functions after the update
Crossbow_db_scripts.sql This script updates the table in the database
that references the Visual Basic and Perl scripts
required for the various device types supported
by RUGGEDCOM CROSSBOW.
Crossbow_db_client_queries.sql This script updates the table in the database
that defines the queries RUGGEDCOM
CROSSBOW is permitted to run. This includes
the query text, parameters, permissions, etc.
When this script is run, all previously existing
records in the associated tables are overwritten
with new values.
Sequence Example
The migrate and functions scripts must be run for each version in sequence, followed
by the scripts and client queries functions.
For example, to migrate from RUGGEDCOM CROSSBOW v4.4.1 to RUGGEDCOM
CROSSBOW v4.6, do the following:
1. Run the migrate script and functions script for each version.
a. Run CrossBow_db_441_450_migrate.sql.
b. Run CrossBow_db_450_functions.sql.
c. Run CrossBow_db_450_460_migrate.sql.
d. Run CrossBow_db_460_functions.sql.
2. Run the remaining scripts at the final target version.
a. Run CrossBow_db_scripts.sql.
b. Run CrossBow_db_client_queries.sql.
For information about how to execute scripts, refer to "Executing SQL
Scripts" (Page 23).
Note
Modified scripts may not function following a database upgrade. It is recommended
that all modified scripts be reverted back to their original baseline state so they can
be updated to work with the new database version. For information about retaining
custom functionality, contact Siemens Customer Support.
Note
This procedure describes some tasks related to Microsoft's SQL Server Management
Studio. For more information about specific steps or topics, refer to the "Microsoft
Developer Network" website (https://msdn.microsoft.com/en-us/library/bb545450).
1. Contact Siemens Customer Support and obtain the necessary files to upgrade
the RUGGEDCOM CROSSBOW database.
2. Make sure all users have logged out of the SAM-L.
3. Make sure any in-progress operations have completed.
4. Initiate synchronization with th SAM-P. For more information, refer to the
"RUGGEDCOM CROSSBOW Client Configuration Manual".
5. Stop all services on the RUGGEDCOM CROSSBOW Server. For more
information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
6. Delete the existing SAM-L database.
7. Create a new SAM-L database. For more information, refer to "Creating and
Configuring a RUGGEDCOM CROSSBOW Database" (Page 17).
Note
Except in the case of a single-server system with a local SQL server instance, the
following procedure must be performed by a database owner, or dbo.
Note
RUGGEDCOM CROSSBOW Server cannot be installed alongside RUGGEDCOM
CROSSBOW SAC or RUGGEDCOM CROSSBOW SAM-L.
1. Contact Siemens Customer Support and obtain a compressed Zip file containing
the latest RUGGEDCOM CROSSBOW Server installer for RUGGEDCOM CROSSBOW
v5.4.
2. Open the compressed Zip file and double-click Server Strong Setup.msi.
The CrossBow Server with Strong Authentication Setup installation wizard
appears.
3. Follow the on-screen instructions to install RUGGEDCOM CROSSBOW Server.
Note
Windows by default grants all services the right to use the log in settings of the
local system account.
Note
Do not install DIGSI 4 or DIGSI 5 on the RUGGEDCOM CROSSBOW Server when
a SIPROTEC 4 Server is also installed. DIGSI is incompatible with SIPROTEC 4
servers.
Note
SIPROTEC 4 serial devices require the installation of the DIGSI 4 server to work
with RUGGEDCOM CROSSBOW. Complete step 4 (Page 28) if you are using
SIPROTEC 4 serial devices.
The DIGSI Server is a large file. To maximize system performance, it is
recommended to only install this file if SIPROTEC 4 Serial devices are in use.
Note
Failure to acknowledge the server connection will result in an error message
indicating the last saved server version is incorrect.
log on settings for the service. For more information, refer to "Configuring the
RUGGEDCOM CROSSBOW Server Log On Settings" (Page 30).
7. Configure the RUGGEDCOM CROSSBOW database. For more information, refer to
"Configuring/Upgrading the RUGGEDCOM CROSSBOW Database" (Page 17).
8. Configure the server host connection. For more information, refer to
"Configuring Server Host Connection" (Page 68).
9. Install the license file. For more information, refer to "Installing a License
File" (Page 75).
10. Select a trusted Certificate Authority for the server. For more information, refer
to "Selecting a Trusted CA for the RUGGEDCOM CROSSBOW Server" (Page 147).
11. Select a certificate. For more information, refer to "Selecting/Installing the
RUGGEDCOM CROSSBOW Server Certificate" (Page 144).
12. Install any CAM licenses that have been purchased. For more information, refer
to "Installing/Upgrading CAMs" (Page 37).
13. [Optional] Encrypt passwords for users, devices and gateways in the
RUGGEDCOM CROSSBOW database. For more information, refer to "Encrypting/
Decrypting the CROSSBOW Database" (Page 52).
Note
Windows by default grants all services the right to use the log in settings of the local
system account. If a different account is being configured (e.g. domain account),
make sure this account is configured for all RUGGEDCOM CROSSBOW services.
Note
Images and steps may differ depending on the version of Windows being used. For
assistance, contact Siemens Customer Support.
1. Click Start, type Administrative Tools in the search box, then click Enter.
The Administrative Tools window appears.
1 3
6 7 8
1 Account Options
2 This Account Box
3 Browse Button
4 Password Box
5 Confirm Password Box
6 OK Button
7 Cancel Button
8 Apply Button
Figure 2.8 CrossBow Server Management Service Properties (Local Computer) Dialog Box
Note
If a different user account is being configured (e.g. domain account), make sure
this account is also configured for all RUGGEDCOM CROSSBOW services.
6. In the This account box, type the name of the user account or click Browse and
select one of the available user accounts.
7. In the Password and Confirm password boxes, type the password for the user
account.
8. Click OK.
1 2 3
7 5
8 6
10
11
12
13
14
15
4. In the SQL Server box, type the name of the SQL server (case sensitive).
• To connect to the default instance of SQL server on a given workstation,
type the name of the workstation (e.g. CROSSBOW)
• To connect to a specific named instance of SQL server on a given
workstation, type the name of the workstation and instance (e.g.
CROSSBOW\SQLEXPRESS).
• To connect to the SQL server using a specific port, type the name of the
workstation, followed by the port number (i.e. CROSSBOW,1444). The
default TCP port number for the SQL server is 1433.
Note
SQL Server Express does not support database mirroring.
5. [Optional] In the SQL Mirror Server box, type the name (case-sensitive) of the
mirror SQL server.
• To connect to the default instance of SQL Server on a given workstation,
type the name of the workstation
• To connect to a specific instance of SQL Server on a given workstation, type
the name of the workstation and instance (i.e. workstation\instance)
6. In the Database Name box, type the name of the database as defined in SQL
Server Management Studio.
Note
To minimize the possibility of stored database credentials being accessed by
unauthorized personnel, Siemens recommends using Windows authentication.
Note
Except in the case of a single-server system with a local SQL server instance, the
following procedure must be performed by a database owner, or dbo.
NOTICE
Compatible versions of RUGGEDCOM CROSSBOW Client and RUGGEDCOM
CROSSBOW Server must be used together. When RUGGEDCOM CROSSBOW Server
is upgraded, all end users accessing that server must also upgrade RUGGEDCOM
CROSSBOW Client on their workstations to continue connecting through that server.
For this reason, the corresponding version of RUGGEDCOM CROSSBOW Client
should be made available to all end users before RUGGEDCOM CROSSBOW Server
is upgraded. A staged upgrade approach is recommended, such as installing and
testing the upgrade on a less-used secondary server before installing on a more
heavily-used server.
1. Contact Siemens Customer Support and obtain a compressed Zip file containing
the latest RUGGEDCOM CROSSBOW Server installer for RUGGEDCOM CROSSBOW
v5.4.
2. Open the compressed Zip file and double-click Server Strong Setup.msi.
The CrossBow Server with Strong Authentication Setup installation wizard
appears.
3. Follow the on-screen instructions to upgrade the RUGGEDCOM CROSSBOW
Server application.
4. Review and acknowledge the server configuration:
Note
Failure to acknowledge the server connection will result in an error message
indicating the last saved server version is incorrect.
Note
A new license file is not required when the RUGGEDCOM CROSSBOW Server tool
and related services are upgraded. The existing license file may be re-used.
Note
step 6 (Page 37) is not required if the installation path has not changed since
the last upgrade.
6. If the installation path has changed since the last upgrade, re-install the license
file. For more information refer to "Installing a License File" (Page 75).
7. Re-configure the server log on settings. For more information refer to
"Configuring the RUGGEDCOM CROSSBOW Server Log On Settings" (Page 30).
8. Re-configure the user authentication settings. For more information refer to
"Configuring User Authentication" (Page 95).
Note
CAMs are licensed separately from RUGGEDCOM CROSSBOW itself. Each CAM has its
own separate license file and can be licensed for a specified number of end-devices,
users, etc. which may be different from the general the RUGGEDCOM CROSSBOW
server license. CAMs can only be run with an appropriate license in place on the
server.
Note
The SAC application is supported on RUGGEDCOM RX1400/RX1500/RX1501/RX1510/
RX1511/RX1512/RX5000/MX5000/MX5000RE devices. Review the software release
notes for full support details.
Before installing the SAC on any of the supported RUGGEDCOM ROX II devices, a
repository containing the SAC application must first be created on the RUGGEDCOM
ROX II upgrade server.
To create the repository, do the following:
1. Contact Siemens Customer Support and obtain a compressed Zip file containing
the RUGGEDCOM CROSSBOW SAC application for RUGGEDCOM ROX II devices.
2. On the RUGGEDCOM ROX II upgrade server, navigate to either C:\Apache
\Apache2\htdocs\ (for a Windows-based server running Apache HTTPS Server) or
/var/www/ (for a Linux-based server).
3. Create a folder titled crossbow and a subfolder titled dists (e.g. crossbow\dists).
4. Unzip the SAC application package from the compressed Zip file, navigate
to rs2\dists\, and copy the crossbow-{version}-rr{version}-powerpc folder
(e.g. crossbow-v5.4-rr2.6.0-powerpc) to the dists folder created in step
3 (Page 38).
5. Log in to the RUGGEDCOM ROX II device and install and configure the
RUGGEDCOM CROSSBOW application. For more information, refer to the
"RUGGEDCOM ROX II Configuration Manual" associated with the device.
For instructions about how to install/upgrade the SAC on one of the supported
RUGGEDCOM ROX II devices, refer to the "RUGGEDCOM ROX II Configuration Manual"
associated with the device.
Note
The SAC cannot be installed alongside RUGGEDCOM CROSSBOW SAM-P or
RUGGEDCOM CROSSBOW SAM-L.
Note
Make sure the SQL Server/SQL Server Express associated with the RUGGEDCOM
CROSSBOW SAC is installed on the same workstation as the SAC to allow pushing the
SAC database.
A SAC database push from the SAM-P is required before connecting to the SAC.
Note
The RUGGEDCOM CROSSBOW SQL database must be configured prior to installing
the SAC. For more information, refer to "Creating and Configuring a RUGGEDCOM
CROSSBOW Database" (Page 17).
1. Contact Siemens Customer Support and obtain a compressed Zip file containing
the RUGGEDCOM CROSSBOW SAC installer for RUGGEDCOM CROSSBOW v5.4.
2. Open the compressed Zip file and double-click CrossBow Windows Station
Access Controller {version}.msi. The CrossBow Station Access Controller
Setup installation wizard appears.
3. Follow the on-screen instructions to install/upgrade the SAC application.
4. After RUGGEDCOM CROSSBOW SAC is successfully installed, configure the
server host connection. For more information, refer to "Configuring Server Host
Connection" (Page 68).
5. Select the certificate. For more information, refer to "Selecting/Installing the
RUGGEDCOM CROSSBOW Server Certificate" (Page 144).
6. Select the trusted Certificate Authority (CA). For more information, refer to
"Selecting a Trusted CA for a RUGGEDCOM CROSSBOW SAC/SAM-L" (Page 149).
Note
A preconfigured SAM-L is available on a RUGGEDCOM RX1500PN LM APE1808SAM-L
module, designed for RUGGEDCOM RX1500-series routers.
The following sections do not apply to the APE1808SAM-L.
For more information about this module, refer to the "RUGGEDCOM APE1808
Configuration Manual [https://support.industry.siemens.com/cs/us/en/
view/109769739]" .
For technical specifications, refer to the "RUGGEDCOM Modules Reference Guide
[https://support.industry.siemens.com/cs/ww/en/view/109747072]" for the RX1500-
series routers.
Note
If any errors are encountered during an installation or upgrade, review the log file
and if necessary provide it to Siemens Customer Support.
Note
The SAM-L cannot be installed alongside a RUGGEDCOM CROSSBOW SAM-P or
RUGGEDCOM CROSSBOW SAC.
Note
Do not install DIGSI 4 or DIGSI 5 on the SAM-L when a SIPROTEC 4 Server is also
installed. DIGSI is incompatible with SIPROTEC 4 servers.
Local Installation
To install a RUGGEDCOM CROSSBOW SAM-L locally on a Windows-based workstation,
do the following:
Note
The SAM-L cannot be installed alongside a RUGGEDCOM CROSSBOW SAM-P or
RUGGEDCOM CROSSBOW SAC.
1. Contact Siemens Customer Support and obtain a compressed Zip file containing
the RUGGEDCOM CROSSBOW SAM-L installer for RUGGEDCOM CROSSBOW v5.4.
2. Install the RUGGEDCOM CROSSBOW SAM-L.
To install the SAM-L using the wizard, refer to "Installing/Upgrading a
RUGGEDCOM CROSSBOW SAM-L Using the Wizard" (Page 42).
To install the SAM-L from the command line, refer to "Installing/Upgrading
a RUGGEDCOM CROSSBOW SAM-L from the Windows Command
Line" (Page 42).
To mass install SAM-Ls remotely, refer to "Managing RUGGEDCOM CROSSBOW
SAM-L Remote Installations" (Page 45).
Note
The SQL database is installed along with the SAM-L as part of the SAM-L
installation. If desired, it can be installed separately.
3. Make sure an SQL database for the SAM-L has been created/upgraded.
To install the database, refer to "Creating and Configuring a RUGGEDCOM
CROSSBOW Database" (Page 17).
To upgrade an existing database, refer to "Upgrading the RUGGEDCOM
CROSSBOW SAM-L Database" (Page 27).
4. After the RUGGEDCOM CROSSBOW SAM-L is successfully installed, configure the
server host connection. For more information, refer to "Configuring Server Host
Connection" (Page 68).
5. Configure the parent server. For more information, refer to "Adding/Configuring
a Parent Server" (Page 72).
6. Select the certificate. For more information, refer to "Selecting/Installing the
RUGGEDCOM CROSSBOW Server Certificate" (Page 144).
7. Select the trusted Certificate Authority (CA). For more information, refer to
"Selecting a Trusted CA for a RUGGEDCOM CROSSBOW SAC/SAM-L" (Page 149).
Local Upgrade
To upgrade a RUGGEDCOM CROSSBOW SAM-L locally on a Windows-based
workstation, do the following:
1. Contact Siemens Customer Support and obtain a compressed Zip file containing
the RUGGEDCOM CROSSBOW SAM-L installer for RUGGEDCOM CROSSBOW v5.4.
2. Upgrade the RUGGEDCOM CROSSBOW SAM-L.
To upgrade the SAM-L using the installation wizard, refer to "Installing/
Upgrading a RUGGEDCOM CROSSBOW SAM-L Using the Wizard" (Page 42).
To upgrade the SAM-L from the command line, refer to "Installing/
Upgrading a RUGGEDCOM CROSSBOW SAM-L from the Windows Command
Line" (Page 42).
3. Upgrade the SAM-L database. For more information, refer to "Upgrading the
RUGGEDCOM CROSSBOW SAM-L Database" (Page 27).
Remote Upgrade
To upgrade RUGGEDCOM CROSSBOW SAM-Ls remotely via the SAM-P from the
command line, do the following:
1. Contact Siemens Customer Support and obtain a compressed Zip file containing
the RUGGEDCOM CROSSBOW SAM-L installer for RUGGEDCOM CROSSBOW v5.4.
Note
For all related steps necessary to install a SAM-L, including server configuration,
certificates and licensing, refer to "Installing/Upgrading a RUGGEDCOM CROSSBOW
SAM-L" (Page 39).
1. Open the compressed Zip file containing the RUGGEDCOM CROSSBOW SAM-L
installer for RUGGEDCOM CROSSBOW v5.4.
2. Double-click CrossBow Windows Secure Access Manager - Local
{version}.msi. The CrossBow Windows Secure Access Manager - Local
installation wizard appears.
3. Follow the on-screen instructions to install/upgrade the SAM-L application.
4. Make sure an SQL database for the SAM-L has been created/upgraded.
To install the database, refer to "Creating and Configuring a RUGGEDCOM
CROSSBOW Database" (Page 17).
To upgrade an existing database, refer to "Upgrading the RUGGEDCOM
CROSSBOW SAM-L Database" (Page 27).
Note
For all related steps necessary to install a SAM-L, including server configuration,
certificates and licensing, refer to "Installing/Upgrading a RUGGEDCOM CROSSBOW
SAM-L" (Page 39).
Note
The SQL scripts required to install/upgrade the database are included in the
RUGGEDCOM CROSSBOW SAM-L installer for RUGGEDCOM CROSSBOW v5.4.
Apply parameters as needed per the table and use cases below.
Common Parameters
Any parameters supported by Msiexec can be used in this procedure.
The following table lists some commonly used parameters:
Note
The custom parameters SAML_DBSERVER, SAML_DBUSER, SAML_DBPASSWORD and
SAML_DBNAME must be either all used together, or not used at all, per the described
use cases.
Parameter Description
AUTO Indicates that the installer will attempt to recreate the SAM-L database
automatically. This parameter is used with either all or none of the other four
custom parameters SAML_DBSERVER, SAML_DBUSER, SAML_DBPASSWORD and
SAML_DBNAME.
SAML_DBSERVER The name of the target SQL Server on which to create the database.
SAML_DBUSER The name of the user with permissions to perform CREATE and DROP functions on
databases.
SAML_DBPASSWORDThe password associated with SAML_DBUSER.
SAML_DBNAME The name of the database to be created and used with the RUGGEDCOM
CROSSBOW SAM-L Server.
/forcerestart Always restart option. Ensures the RUGGEDCOM CROSSBOW SAM-L Server starts
following the installation.
/quiet Quiet mode (no user interaction). This parameter is optional.
/L Enable logging. This parameter is optional.
Use Cases
The following upgrade scenarios are supported:
Command:
msiexec.exe/i CrossBow_Windows_Secure_Access_Manager_Lo
cal.msi AUTO="1" SAML_DBSERVER="{ {server name} }" SAML_D
BUSER="{ {user name} }" SAML_DBPASSWORD="{ {password} }" SAM
L_DBNAME="{ {database name} }" /quiet /L*V { {log filename} }
Example:
msiexec.exe/i CrossBow_Windows_Secure_Access_Manager_Local.m
si AUTO="1" SAML_DBSERVER="CROSSBOWSAM-L-1" SAML_DBUSER="sa"
SAML_DBPASSWORD="12345" SAML_DBNAME="CrossBowix" /quiet /L*V
cxb_package.log
Note
Appropriate credentials must be present in the SQL Server. The user must be the
database owner.
Command:
msiexec.exe/i CrossBow_Windows_Secure_Access_Manager_Local.m
si AUTO="1" /quiet /L*V { {log filename} }
Note
For instructions on preparing an individual SAM-L to receive a software update, refer
to the "RUGGEDCOM CROSSBOW Client Configuration Manual".
Preparing for an update puts each SAM-L in recovery mode, where users are
prevented from connecting to the SAM-L and any pending automated device
connections are prevented from starting. Automated device connections already in
progress will be permitted to complete. All data is pushed back to the SAM-P.
Note
This preparation feature is designed to work only with systems at RUGGEDCOM
CROSSBOW v5.0 or higher.
The form displays the update status of all SAM-L's in the SAM-P's network.
Once all SAM-Ls are prepared and all SAM-P users are offline, the SAM-L's Ready
for Software Update status will display Yes. Otherwise, No will be shown.
NOTICE
Siemens does not endorse a specific third party application. Other applications
may be used to perform this procedure. Contact your IT department to determine
the appropriate method for your organization and to make sure no security
vulnerabilities are exposed in your system.
Once the process has completed, the following output will be dispalyed:
msiexec.exe exited on {SAM-L database name} with error code 0.
Note
For information about setting up the RUGGEDCOM CROSSBOW Client(s), refer to the
"RUGGEDCOM CROSSBOW Client Configuration Manual".
1. Add and configure a SAC. For more information, refer to the "RUGGEDCOM
CROSSBOW Client Configuration Manual".
2. Configure a trusted Certificate Authority for the SAC. For more information,
refer to "Selecting a Trusted CA for a RUGGEDCOM CROSSBOW SAC/SAM-
L" (Page 149).
• RUGGEDCOM CROSSBOW SAM-L (If Applicable)
To configure a Secure Access Manager - Local (SAM-L), do the following:
1. Add and configure a SAM-L. For more information, refer tothe "RUGGEDCOM
CROSSBOW Client Configuration Manual".
2. Configure a trusted Certificate Authority for the SAM-L. For more
information, refer to "Selecting a Trusted CA for a RUGGEDCOM CROSSBOW
SAC/SAM-L" (Page 149).
Note
Images and steps may differ depending on the version of Windows being used. For
assistance, contact Siemens Customer Support.
Note
In the case of RUGGEDCOM CROSSBOW SAC, the following procedure describes how
to open the Windows application. For information about the RUGGEDCOM ROX II
based SAC, refer to the appropriate "RUGGEDCOM ROX II Configuration Manual".
1. Launch the tool by clicking Start, select All Programs, select RuggedCom,
select the folder for the tool, then select the tool itself.
2. If Windows' User Account Control (UAC) is enabled, a dialog box may appear
requesting authorization to open the application. Click Yes.
Note
A service must be stopped before it can be configured.
Note
If active user and device connections exist when attempting to stop RUGGEDCOM
CROSSBOW Server Services, a confirmation dialog will appear listing the active
connections. Select Yes to proceed, or No to abort.
Note
Stopping the RUGGEDCOM CROSSBOW Main Server service via RUGGEDCOM
CROSSBOW Server automatically disconnects all clients.
2 3
1 Services
2 Start Button
3 Stop Button
Figure 3.1 RUGGEDCOM CROSSBOW Server Window
2. For the desired service, including the RUGGEDCOM CROSSBOW Server itself, click
either Start or Stop.
Icons for each service indicate the service's current status.
Icon Status
Stopped
Start Pending
Icon Status
Running
NOTICE
Whenever the encryption settings are changed (i.e. by applying/removing
encryption), RUGGEDCOM CROSSBOW deletes any existing log files, encrypted
reports and bulk import sheets in the database. Make sure to retrieve any desired
files via the client before changing these encryption settings. For more information
about retrieving logs from devices/gateways, refer to the "RUGGEDCOM CROSSBOW
Client Configuration Manual".
NOTICE
For added security, RUGGEDCOM CROSSBOW cross-references the server software
version with the database software version. To configure encryption or decryption,
the version numbers must match. For example, decrypting a database prior to
migration must take place before installing the new version of the RUGGEDCOM
CROSSBOW server.
NOTICE
Security hazard – risk of unauthorized access and/or exploitation
Make sure to safely record the encryption certificate and make sure it is only
available to trusted personnel.
Note
Certificates are managed in the Windows store. Users are responsible for uploading
certificates to the store. For more information about installing certificates, refer to
"Selecting/Installing the RUGGEDCOM CROSSBOW Server Certificate" (Page 144).
Note
The encryption process may take several minutes to complete, depending on the size
of the RUGGEDCOM CROSSBOW database.
1 Configure Button
2 OK Button
3 Cancel Button
Figure 3.5 Database Screen
1 4
2
5
8
12
9
11 10
1 By Certificate Button
2 Enable Encryption Check Box
3 OK Button
4 Cancel Button
5 Store Type Box
6 Store Name Box
7 Subject Box
8 Thumbprint Box
9 Browse Button
10 Validation Certificate Range Boxes
11 Force Decrypt Box
12 Expiry Warning Lead Time
Figure 3.6 Encryption Configuration Dialog Box
1 3
1 Certificate List
2 OK Button
3 Cancel Button
4 Import Button
Figure 3.7 Certificate Selection Dialog Box
1 Configure Button
2 OK Button
3 Cancel Button
Figure 3.8 Database Screen
1 4
2
5
8
12
9
11 10
1 By Certificate Button
2 Enable Encryption Check Box
3 OK Button
4 Cancel Button
5 Store Type Box
6 Store Name Box
7 Subject Box
8 Thumbprint Box
9 Browse Button
10 Validation Certificate Range Boxes
11 Force Decrypt Box
12 Expiry Warning Lead Time
Figure 3.9 Encryption Configuration Dialog Box
1 3
1 Certificate List
2 OK Button
3 Cancel Button
4 Import Button
Figure 3.10 Certificate Selection Dialog Box
Note
The encryption certificate is stored on the server used to originally encrypt user,
device and gateway passwords in the RUGGEDCOM CROSSBOW database. If
server clusters are implemented, the certificate must be configured on all other
servers that access the same database.
11. If the server is part of a server cluster, repeat this procedure for each server in
the cluster.
NOTICE
Security hazard – risk of unauthorized access and/or exploitation
Make sure to safely record the encryption password and make sure it is only
available to trusted personnel.
Note
The encryption process may take several minutes to complete, depending on the size
of the RUGGEDCOM CROSSBOW database.
1 Configure Button
2 OK Button
3 Cancel Button
Figure 3.11 Database Screen
5
1 6
1 By Password Button
2 Enable Encryption Check Box
3 Encryption Password Box
4 Confirm Password Box
5 OK Button
6 Cancel Button
Figure 3.12 Encryption Configuration Dialog Box
1 Configure Button
2 OK Button
3 Cancel Button
Figure 3.13 Database Screen
5
1 6
1 By Password Button
2 Enable Encryption Check Box
3 Encryption Password Box
4 Confirm Password Box
5 OK Button
6 Cancel Button
Figure 3.14 Encryption Configuration Dialog Box
Note
The encryption password is stored on the server originally used to encrypt user,
device and gateway passwords in the RUGGEDCOM CROSSBOW database. If
server clusters are implemented, the password must be configured on all other
servers that access the same database.
12. If the server is part of a server cluster, repeat step 1 (Page 62) to step
11 (Page 64) to for each server in the cluster.
Note
Passwords are still visible to administrators/sub-administrators during password
checkouts and in the device password reports.
1 OK Button
2 Cancel Button
3 Show Connected User's Name Check Box
4 Show Device Passwords to Admin Check Box
5 Disable Sending Checked Out Password Email Check Box
6 Show Popup Message When Command Blocked Check Box
Figure 3.17 Options Screen
Note
For information about enabling/disabling Transport Layer Security (TLS) 1.2
connections, refer to "Enabling/Disabling TLS 1.2 Connections for RUGGEDCOM
CROSSBOW Server" (Page 70).
3
5
4
7
6
7
1 OK Button
2 Cancel Button
3 Server Port Box
4 Use TLS 1.2 instead of TLS 1.3 Connections Check Box
5 Client Connection Timeout Box
6 Device Session Timeout Box
7 Disable Check Box
Figure 3.18 CrossBow Server Configuration Dialog Box
Note
If a firewall exists between RUGGEDCOM CROSSBOW clients and the
RUGGEDCOM CROSSBOW Server, make sure the server port number is not
blocked.
5. In the Client Connection Timeout box, type or select the maximum amount of
time (in minutes) for the server to wait before disconnecting an inactive client.
To disable this feature, select Disable.
6. In the Device Session Timeout box, type or select the maximum amount of
time (in minutes) for the server to wait before disconnecting an inactive remote
device. To disable this feature, select Disable.
7. Click OK to save changes.
8. Start the RUGGEDCOM CROSSBOW Main Server service. For more
information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
3
5
4
7
6
7
1 OK Button
2 Cancel Button
3 Server Port Box
4 Use TLS 1.2 instead of TLS 1.3 Connections Check Box
5 Client Connection Timeout Box
6 Device Session Timeout Box
7 Disable Check Box
Figure 3.19 CrossBow Server Configuration Dialog Box
4. Select Use TLS 1.2 instead of TLS 1.3 Connections to allow TLS v1.2
connections, or clear the check box to use TLS v1.3 connections.
5. Click OK to save changes.
6. Start the RUGGEDCOM CROSSBOW Main Server service. For more
information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
7. If the server is part of a server cluster, repeat step 1 (Page 70) to step
6 (Page 71) for the remaining servers in the cluster.
3 5
1 OK Button
2 Cancel Button
3 Parent Servers
4 Add Server Button
4. Either modify the values for an existing parent server, or click Add Server to add
a new row and then provide the host address and host port for the new parent
server.
5. Click OK to save changes.
6. Start the RUGGEDCOM CROSSBOW Main Server service. For more
information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
3 5
1 OK Button
2 Cancel Button
3 Parent Servers
4 Add Server Button
5 Delete Server Button
Figure 3.21 CrossBow Server Configuration Dialog Box
4. Select the desired parent server and then click Delete Server.
5. Click OK to save changes.
6. Start the RUGGEDCOM CROSSBOW Main Server service. For more
information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
Note
For information about how to view which licenses are enabled and make
sure no license restrictions have been exceeded, refer to "Viewing License
Limits" (Page 76).
4
1
3 Cancel Button
4 Install Button
Figure 3.22 CrossBow Server Configuration Dialog Box
The first section indicates the total number of licenses available and the number of
licenses in use. The color of the icon next to each category indicates the status of the
licenses:
Icon Color Description
Green The number of installed licenses is less than 90% of the license limit.
Yellow The number of installed licenses is greater than or equal to 90% of the license
limit.
Red The number of installed licenses has reached 100% of the license limit. Additional
or upgraded licenses must be purchased.
The second section is a read-only list of license features currently enabled or disabled
in RUGGEDCOM CROSSBOW.
Note
This procedure applies only to SEL devices.
Note
This procedure details configuration of the RUGGEDCOM CROSSBOW main server.
For the RUGGEDCOM CROSSBOW SAM-L, follow the same procedure. The SEL
CompressorHead application must be installed on each SAM-L in a facility to have
files decompressed during file retrieval.
1 OK Button
2 Cancel Button
3 Application File Path Box
4 Browse Button
Figure 3.24 Options Screen
Note
If the Application File Path box is blank, the CompressorHead application will
be inactive. RUGGEDCOM CROSSBOW will retrieve the files but they will remain
compressed.
Note
Firmware for Gauntlet gateways is stored on the RUGGEDCOM CROSSBOW server, as
opposed to within the RUGGEDCOM CROSSBOW database.
Note
Each updated firmware file for Gauntlet gateways replaces the last. Multiple versions
are not retained by RUGGEDCOM CROSSBOW.
1. Make sure the firmware file is accessible from the RUGGEDCOM CROSSBOW
server.
2. Access the RUGGEDCOM CROSSBOW server and launch RUGGEDCOM
CROSSBOW Server.
3. Make sure the RUGGEDCOM CROSSBOW Main Server service is stopped. For
more information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
4. Under CrossBow Main Server, click Configure. The CrossBow Server
Configuration dialog box appears.
5. Click the Options tab. The Options screen appears.
4
3
1 OK Button
2 Cancel Button
3 Firmware File Box
4 Install Button
Figure 3.25 Options Screen
Note
If Active Directory is in use, some interface controls in RUGGEDCOM CROSSBOW
Client for managing users and user groups are disabled.
Note
For information about how to reactivate a user's profile, refer to the "RUGGEDCOM
CROSSBOW Client Configuration Manual".
Note
This setting is only applicable when Basic authentication is in use. If using Active
Directory or RSA SecurID, the lockout policy for the respective authentication method
overrides this setting.
1 OK Button
2 Cancel Button
3 Max Login Attempts Box
Figure 3.26 Options Screen
3. Under Max Login Attempts, type the number of login attempters permitted.
4. Click OK to save changes.
Note
The administrator user group must have at least one member.
1 OK Button
2 Cancel Button
5. Under Administrator User Group Configuration, in the Group Name box, type
the name of the administrator user group (e.g. Admin).
6. Click OK to save changes.
7. Start the RUGGEDCOM CROSSBOW Main Server service. For more
information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
Note
If the number of allowable licenses for all users (Active Directory and CxB) is reached,
RUGGEDCOM CROSSBOW will prioritize the Active Directory users that are being
imported first, over the CxB manually-entered users. Only Active Directory users
that belong to at least one user group will be imported and a licensed used. To view
license limitations, refer to "Viewing License Limits" (Page 76).
Note
If users and user groups have been imported from Active Directory, Yes appears
under Use AD Group. Otherwise, the value is No.
Note
Users and user groups are updated in RUGGEDCOM CROSSBOW at a user-configured
polling interval. Any changes made in the Active Directory server will not be reflected
until the next poll.
For example, if RUGGEDCOM CROSSBOW is using AD authentication, and changes are
made to the username attribute in AD, RUGGEDCOM CROSSBOW will be required to
to complete its next poll before the user can log in. This is because the username is
checked both in AD and the RUGGEDCOM CROSSBOW database.
All connections to the Active Directory server are logged in the Event Log file. For
information about the Event Log file, refer to "Configuring the CrossBow Event Log
Distribution Service" (Page 177).
NOTICE
When users and user groups are imported from Active Directory, use strong
authentication options – such as RADIUS, RSA or Active Directory itself – to
authenticate users. If only basic authentication is used, new users will not be
automatically assigned a basic authentication password. The administrator will be
prompted to provide one, and one must be assigned before the user can log into
RUGGEDCOM CROSSBOW.
4
3
1 OK Button
2 Cancel Button
3 Use AD Groups Box
4 Configure Button
Figure 3.28 Options Screen
1 3
10
11
14
12
15 13
When deselected, all existing users and user groups will be overwritten with
the active users and user groups from the Active Directory server when the next
Active Directory polling attempt is made.
9. [Optional] Select Use Strong Authentication for non-AD Users.
When selected, RUGGEDCOM CROSSBOW will apply the selected strong
authentication method to non-AD users.
When deselected, the existing authentication method will be preserved for non-
AD users.
Note
For more information about available authentication methods, refer to
"Managing User Authentication" (Page 93).
Note
Make sure to use appropriate syntax (i.e. use of symbols, case sensitivity, etc.) as
defined by your LDAP controller in your configuration string.
Parameter Description
Base Distinguished The location of the Active Directory domain controller from
Name which all user and group information will be retrieved.
NOTICE
Security hazard – risk of unauthorized access and/or ex
ploitation
Appropriate certificates must be installed on both the Active
Directory and RUGGEDCOM CROSSBOW servers before any
TLS/SSL connection is established. Although authentication
information will not be transmitted in the clear over the
connection, sensitive user and user group information may still
be exposed.
Note
If redundant AD severs are being used, specify only the domain,
rather than a specific domain controller. For example, use
LDAP://domain not LDAP://machine.domain.
LDAP://abx.example.lan:636
Groups Filter The query to be used to retrieve user and user group
information from Active Directory. For example:
(&(objectClass=group)(name=CxB*))
Parameter Description
At minimum, the query must contain (objectClass=group)
to import user groups from Active Directory. Individual users
can be imported using (objectClass=user).
Use a filter to select only the users and user groups to be
imported. To simplify filtering, use a consistent naming
convention for all users and user groups in Active Directory.
For instance, in the previous example, only user groups whose
names begin with CxB will be imported.
NOTICE
Configuration hazard – risk of communication failure
Do not use Active Directory attributes that have an array value. Only attributes
with string values are permitted. If an array-type attribute is used, such as
memberOf, Active Directory will abort the import operation and close the
connection.
Note
If any of the following parameters are left blank, the associated property will
be configurable via RUGGEDCOM CROSSBOW for each user profile. Otherwise,
values are imported from Active Directory.
Parameter Description
Full Name Attribute The attribute in Active Directory that specifies the full name of a
user (e.g. displayName).
Description Attribute The attribute in Active Directory that specifies the description of
a user (e.g. description).
Email Attribute The attribute in Active Directory that specifies the e-mail
address for a user (e.g. mail).
Primary Phone At The attribute in Active Directory that specifies the primary
tribute phone number for a user (e.g. telephoneNumber, mobile,
pager, etc.).
Secondary Phone At The attribute in Active Directory that specifies the primary
tribute secondary number for a user (e.g. otherTelephone,
otherMobile, otherPager, etc.).
1 OK Button
2 Cancel Button
3 Show Connected User's Name Check Box
4 Show Device Passwords to Admin Check Box
5 Disable Sending Checked Out Password Email Check Box
6 Show Popup Message When Command Blocked Check Box
Figure 3.30 Options Screen
1 OK Button
2 Cancel Button
3 Service Permission Check Box
4 Service Start Name Box
Figure 3.31 Primary Configuration Screen
5. Under Service Configuration, select or clear the Service Permission check box.
Note
Any access permissions granted outside of RUGGEDCOM CROSSBOW will not be
impacted.
• Clear (default): Any user logged in to the SAM-P machine can access the
server registry.
• Selected – Only a specified user or group can access the server registry.
If clearing the check box, proceed to step 7 (Page 93).
6. When selected, the Service Start Name box appears. Do the following:
Note
The user name configured in Windows must match the name entered in the
Service Start Name box. If there is a mismatch, the RUGGEDCOM CROSSBOW
services will be unable to run.
NOTICE
Active Directory, RSA and RADIUS servers are configured outside of RUGGEDCOM
CROSSBOW. Use industry best practices when configuring AD, RSA and RADIUS
servers.
Authentication Methods
• Basic Authentication
Basic authentication requires all users to log into RUGGEDCOM CROSSBOW using
a password that conforms to rules defined by the administrator. This password
may be subject to renewal at intervals chosen by the administrator.
Basic passwords are configured in the SAM-P and pushed to the SAC/SAM-L.
• Strong Authentication
Strong authentication requires all users to be authenticated by an external
service. That service can be an RSA/ACE, Active Directory, RADIUS, or RSA and
Active Directory server.
• Proxy
Authentication is performed via proxy to the SAM-P. If the SAM-P cannot be
reached then the fallback option becomes active, where a user can authenticate
with either their basic password or the SAM-L's global password. The basic
passwords are configured in the SAM-P and pushed to the SAM-L.
• Windows
Authenticate with the User's Windows password on that particular server.
• Global
For SAM-L, authenticate with the individual SAM-L global password. For the SAC,
authenticate with the individual SAC global password.
• Basic with Global
Users can authenticate with either their basic password or the SAM-L's global
password.
• AD
Authentication is performed locally using Active Directory.
• RSA
Authentication is performed locally via RSA.
• RSA and AD
Authentication is performed locally via RSA and AD.
• RADIUS
Authentication is performed locally via RADIUS.
3 1
4 2
6 7
9 8
10
13
11
12
14
15
16
17
1 OK Button
2 Cancel Button
3 Primary Options
4 Secondary Options
5 Manual Secondary Options
6 Disconnect on Failure Options
7 NAS IP Address Box
8 NAS Identifier Box
9 Password Encryption Options
10 Add RAD Svr Button
11 Edit RAD Svr Button
12 Delete RAD Svr Button
13 Available RADIUS Servers
14 Password Rule Settings
15 Allowed Characters Check Boxes
16 Symbol Characters Box
17 Required Characters Check Boxes
Figure 3.32 Authentication Screen (SAM-P)
Note
Available authentication methods depend on the server connection being
used. For more information about available authentication methods, refer to
"Choosing an Authentication Method" (Page 94).
Parameter Description
Note
An RSA/ACE server must be present and configured for RSA SecurID strong two-
factor authentication.
Note
If RSA and AD is selected, the user is required to authenticate themselves twice
during the login, first via RSA and then via AD. Each of these login phases will go
through the usual full sequence of prompts. Both login phases must succeed in
order to gain access to RUGGEDCOM CROSSBOW.
Note
Parameters under RADIUS Configuration are only available when RADIUS is
selected.
NAS Identifier The NAS identifier attribute. This attribute (typically the Fully
Qualified Domain Name) is used in the Access-Request process
to identify the computer that constructed the Access-Request
packet.
7. If RADIUS is selected, add and configure RADIUS servers. For more information,
refer to "Adding/Configuring a RADIUS Server" (Page 99).
Note
Passwords are used for user access to the system if the CrossBow Server is
set for basic authentication. When strong authentication is selected, these
passwords still exist and may be used in SAC fallback authentication. Fallback
authentication occurs when a user logs in locally to a Station Access Controller
at a facility and the SAC is unable to connect to a parent SAM-P to proxy the
user login. In this case, the SAC will authenticate the user based on their basic
authentication password.
Even if strong authentication is selected, and there are no SACs in the system,
these settings should be reviewed and configured appropriately.
Note
When the rules for password characters are changed, they are not retroactively
applied to previously configured basic authentication passwords. New rules are
only applied to new passwords.
However, when the rules for password expiries and warnings are changed, they
are applied immediately to existing passwords.
Note
The following characters are not permitted in passwords and will be ignored if
defined in the password rules:
• single quote (')
• semi-colon (;)
• pipe (|)
9. Under Allowed Characters, set the rules for characters allowed in user
passwords.
10. Under Required Characters, set the rules for characters that must be used in all
user passwords.
11. Click OK to save changes.
12. Start the RUGGEDCOM CROSSBOW Main Server service. For more
information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
Note
A maximum of 10 RADIUS servers can be configured.
Note
Available authentication methods depend on the server connection being
used. For more information about available authentication methods, refer to
"Managing User Authentication" (Page 93).
2
3
5
4 6
7 9
10
11
12
13
14
1 OK Button
2 Cancel Button
3 Authentication Method Options
4 Password Encryption Options
5 NAS IP Address Box
6 NAS Identifier Box
7 Available RADIUS Servers
8 Add RAD Svr Button
9 Edit RAD Svr Button
10 Delete RAD Svr Button
11 Password Rule Settings
12 Allowed Characters Check Boxes
13 Symbol Characters Box
5. Under RADIUS Configuration, either select an existing RADIUS server and click
Edit RAD Svr, or click Add RAD Svr. The RADIUS Server Configuration dialog
box appears.
1
4
5
2
Note
Available authentication methods depend on the server connection being
used. For more information about available authentication methods, refer to
"Managing User Authentication" (Page 93).
2
3
5
4 6
7 9
10
11
12
13
14
1 OK Button
2 Cancel Button
3 Authentication Method Options
4 Password Encryption Options
5 NAS IP Address Box
6 NAS Identifier Box
7 Available RADIUS Servers
8 Add RAD Svr Button
9 Edit RAD Svr Button
10 Delete RAD Svr Button
11 Password Rule Settings
12 Allowed Characters Check Boxes
13 Symbol Characters Box
5. Under RADIUS Configuration, select the desired RADIUS server and then click
Delete.
6. Click OK to save changes.
7. Start the RUGGEDCOM CROSSBOW Main Server service. For more
information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
3
5
4
6
9 11
7
8
12
10
13
1 OK Button
2 Cancel Button
3 Sender Email Address Box
4 Address Box
5 Port Box
6 Username Box
7 Password Box
8 Authentication Method List
9 SSL Connection Check Box
10 Max Attachment Size (MB) Box
11 Enter the Email Address Box
12 Test Button
13 Communication Log
Figure 3.36 E-Mail Screen
Note
The E-mail sender behavior is different when configuring reports.
For more information about configuring E-mail recipients when generating a
report, refer to the "RUGGEDCOM CROSSBOW Client Configuration Manual".
Port The port number used to connect to the outgoing SMTP server.
Username The user name required to log into the outgoing SMTP server.
Password The password required to log into the outgoing SMTP server.
Authentication Method The authentication method used by the outgoing SMTP server.
For example:
Address: smtp.gmail.com
Port: 25
Username: ruggedsol
Password: {password}
Authentication Method: Username/Password
SSL Connection: enabled
Max Attachment Size (MB): 5
7. Test the connection to the SMTP server by typing an e-mail address in the
Enter the Email Address box, and then click Test. If the test was successful, a
confirmation message appears and an e-mail is sent to the recipient. Click OK to
close the dialog box and continue.
Otherwise, if an Exception Message dialog box appears, the connection was
unsuccessful. Review the message(s) and modify the settings as required.
Note
Some email servers support security standards which can block email
notifications from RUGGEDCOM CROSSBOW. Refer to the email server
documentation for details about allowing less secure apps and/or resetting
CAPTCHA authentication. Once configured, repeat the test to ensure a successful
connection.
1 3
4. Select Enable Email Target to enable logging, or clear the check box to disable
logging.
5. Click OK to save changes.
1 Test Button
2 OK Button
3 Cancel Button
4 Current Version Box
4. Click Test. Under Database Version, the current database version is displayed in
the Current Version box.
5. Click OK.
NOTICE
If the database version is different from the version displayed in the Latest Version
box, the server will not start. Consider upgrading the RUGGEDCOM CROSSBOW
database. For more information, refer to "Upgrading the RUGGEDCOM CROSSBOW
Database" (Page 24).
1 Test Button
2 OK Button
3 Cancel Button
4 Expected Type Box
5 Detected Type Box
Figure 3.39 CrossBow Database Configuration Dialog Box
4. Click Test. Under Database Type, the current database type is displayed in the
Detected Type box.
5. Click OK.
NOTICE
If the detected database type is different from the type displayed in the Expected
Type box, the server will not start. To connect to a different RUGGEDCOM
CROSSBOW database, refer to "Connecting to the RUGGEDCOM CROSSBOW
Database" (Page 33).
2. Make sure the RUGGEDCOM CROSSBOW Main Server service is stopped. For
more information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
3. Under CrossBow Database, click Configure. The CrossBow Database
Configuration dialog box appears.
1 Test Button
2 OK Button
3 Cancel Button
4 Connection Status Box
Figure 3.40 CrossBow Database Configuration Dialog Box
Note
It is recommended to back up the RUGGEDCOM CROSSBOW database prior to
enabling this feature.
Note
There may be a performance impact the first time the RUGGEDCOM CROSSBOW
server is started after this feature is enabled, as the server will be removing all of
the now-expired data. This will be a one-time impact. Once the initial processing is
complete, the on-going clean-up effort will not impact normal system performance.
10 7
11 8
12 9
1 OK Button
2 Cancel Button
3 Clear Older Records (Alerts/Events/Audits) List
4 Clear Older Files (Fault/Config/Firmware/Bulk/Report) List
5 Clear Older SOE Records List
6 Clear Older Password History Records List
7 Clear OlderScheduler Entries Records List
8 Configuration File Max Versions List
9 Enable Daily Clean Up Start Time Check Box
10 Daily Clean Up Start Time (hh:mm) Box
11 Perform Clean Up at System Start (optional) Box
12 Schedule Activity Repeat Limit (5-100) Box
Figure 3.41 Database Screen
Parameter Description
The time frame in years to clear alerts, events and audits. When
configured, records older than the specified time frame days
are cleared. Selecting None disables the service.
Parameter Description
NOTICE
Security hazard – risk of unauthorized access and/or exploitation
Passwords copied to an external database are stored as cleartext, even if the main
RUGGEDCOM CROSSBOW database is encrypted. Make sure access to the external
database is only granted to trusted personnel.
Note
The CrossBow External Database Integration Service is separately licensed from
RUGGEDCOM CROSSBOW. Contact Siemens Sales for more information about adding
this feature.
Note
For compatibility, the external database is created automatically using the
Crossbow_Ext_DB_Int_Svc_db_create.sql SQL script.
When upgrading from an earlier version of RUGGEDCOM CROSSBOW with an
external database installed, the existing external database can be migrated to the
new external database. For more information, refer to "Migrating from an Existing
External Database" (Page 116).
For information about how to run this script, refer to "Executing SQL
Scripts" (Page 23).
Note
An available obsolescence script checks the RUGGEDCOM CROSSBOW database
for the presence of older device types. It is recommended to run this script and
provide the results to Siemens to ensure active device types are supported.
Crossbow_Ext_db_{curren
t}_{new}_migrate.sql
Where:
• current is the version number for the
current external database
• new is the version number of the
external database after the update
Note
For information about how to execute scripts, refer to "Executing SQL
Scripts" (Page 23).
1 18
19
2 3
4
5
6
7
9
10
11 12
13
14
15
17
16
4. Under General Settings, in the Run Every box, type or select the polling
interval. The value is in hours. A value of zero (0) disables the service.
5. [Optional] Click the Enable External Device Key check box to allow the use of
external keys. Select the defined custom field that will hold the external device
key.
6. [Optional] Click the Enable Device Approved Firmware Version Import check
box to allow the EDIS to import the approved firmware version for the device.
Select the firmware version from the drop down menu.
7. [Optional] Click the Enable Device data sync from CrossBow check box to
push data from the RUGGEDCOM CROSSBOW database to pre-populate tables
in the EDIS database. This makes it easier for third parties to use the EDIS to
trigger CAM operations on specific devices or groups of devices using the
DevicedForCrossBow and CAMTriggerRecords tables. Enabling this feature will
keep the RUGGEDCOM CROSSBOW and EDIS databases in sync over time.
NOTICE
Before enabling device data syncing, make sure to review your device
configurations. Data synced from RUGGEDCOM CROSSBOW to the
DevicesForCrossBow table will include any missing configurations, such as
child devices without parent gateway ports, or devices without all of their
interfaces assigned to device groups. In these cases an error will be generated
during record processing.
order to read and write to all tables, including the table storing the output of the
device credentials.
ADM credentials are used by any of the remote ADM Agent devices in the
field. These credentials are used to read/write to the DevicesFor CrossBow and
AgentHeartBeat tables only. Access to all other tables in the database should be
removed.
NOTICE
For added security, make sure the credentials used by the ADM to log into
the EDIS database are different from the credentials used by the EDIS on the
RUGGEDCOM CROSSBOW server.
For information about sharing device information, refer to "Sharing Device
Information With an External Database" (Page 113).
For information about configuring ADM credentials, refer to the "RUGGEDCOM
CROSSBOW Client Configuration Manual".
11. If Use Database Authentication is selected, in the SQL User box, type the name
of the user account to use to log into the SQL server.
12. If Use Database Authentication is selected, in the SQL Password box, type the
password for the user account used to log into the SQL server.
13. Click Test EDI Service Credentials. The status of the connection is displayed in
the Connection Status box.
14. If the test is successful, click OK to save changes.
15. Start the RUGGEDCOM CROSSBOW External Database Integration Service. For
more information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
1 13
14
2
3
4
10
11
12
4. Under General Settings, in the Run Every box, type or select the polling
interval. The value is in hours. A value of zero (0) disables the service.
5. In the Database Name box, type the name of the external database as defined
in SQL Server Management Studio.
NOTICE
Parameters configured under Asset Discovery & Management Credentials
are required for the ADM to work properly. These parameters are pushed to the
ADM agent and will be used by that agent to access the database.
6. Under Asset Discovery & Management Credentials, in the SQL Server box,
type the name of the SQL server (case sensitive).
Note
When a host name is specified, a Domain Name Server (DNS) or host entry must
be present for the ADM. Otherwise, an IP address must be provided.
NOTICE
For added security, make sure the credentials used by the ADM to log into
the EDIS database are different from the credentials used by the EDIS on the
RUGGEDCOM CROSSBOW server. The ADM should be limited to only have
access to the DevicesForCrossbow table.
For information about sharing device information, refer to "Sharing Device
Information With an External Database" (Page 113).
For information about configuring the EDIS, refer to "Configuring the
RUGGEDCOM CROSSBOW External Database Integration Service" (Page 117).
7. In the SQL User Name box, type the SQL user name.
8. In the SQL Password box, type the SQL password.
9. In the Remote Access Port option field, use the arrows to select the remote
access port.
10. Click Test ADM Agent Credentials. The status of the connection is displayed in
the Test Result box.
11. If the test is successful, click OK to save changes.
12. Start the RUGGEDCOM CROSSBOW External Database Integration Service. For
more information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
The name of the parent facility. The name must match a facility
already defined in the RUGGEDCOM CROSSBOW database.
Note
Device names containing unsupported characters will not be added
to RUGGEDCOM CROSSBOW.
The following characters, including a blank space, are supported:
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
0123456789_!@#&+$^[]-.`~%*()=\{}:""<>?/
ŠŒŽšœžŸÀÁÂÃÄÅÆÇÈÉÊËÌÍÎÏÐÑÒÓÔÕÖØÙÚÛÜÝ
Þßàáâãäåæçèéêëìíîïðñòóôõöøùúûüýþÿ
The name of the associated device type. The name must match
a device type already defined in the RUGGEDCOM CROSSBOW
database.
Parameter Description
The time the device was first detected on the network (optional,
may be blank). This parameter does not apply to serial devices.
The most recent time the device was detected on the network
(optional, may be blank). This parameter does not apply to serial
devices.
If the device/gateway does not already exist in the main RUGGEDCOM CROSSBOW
database, RUGGEDCOM CROSSBOW adds it automatically during the next polling
interval. The value of the Result parameter for the device/gateway in the external
database is also changed to either Added or Updated.
Note
If the RUGGEDCOM CROSSBOW External Database Integration Service is unable to
add a device/gateway to the main RUGGEDCOM CROSSBOW database – perhaps
because it exists already in the main database – an error message is added to the
Result parameter in the form of:
Error: {message}
Review the error message and correct the table entry as needed.
NOTICE
A separate license is required for the Nozomi service. For information about
obtaining a license, contact Siemens Customer Support.
NOTICE
The External Database Integration Service (EDIS) must be licensed and running in
order for assets from the Guardian to be imported into RUGGEDCOM CROSSBOW.
For more information about the EDIS, refer to "Sharing Device Information With an
External Database" (Page 113).
NOTICE
The unique device identifier is the MAC address. If an asset has either multiple
MAC addresses or no MAC address, the Nozomi service will ignore the asset and
it will not be added to the EDIS database.
NOTICE
When a server cluster is in use, each server processes the Guardians
independently of each other to avoid duplication and minimize the load on each
server.
• Assets matching the filter defined from device special parameters are added to
the EDIS database.
For more information about configuring Nozomi Guardians, refer to the
"RUGGEDCOM CROSSBOW Client Configuration Manual"
• When the EDIS service runs, the new assets are added to RUGGEDCOM
CROSSBOW as Generic IED - Network device types.
The device properties can then be updated in RUGGEDCOM CROSSBOW as
needed.
Note
COMTRADE components (i.e. .cfg, .dat, .hdr extensions) are extracted from ZIP files
and exported individually. ZIP files not containing COMTRADE files are exported
intact.
The following parameters are used to configure the exported file name and to define
the directory structure:
Parameter Description
regionname The name of the immediate parent region of the device, as listed in
the RUGGEDCOM CROSSBOW database
facilityname The name of the facility, as listed in the RUGGEDCOM CROSSBOW
database
devicename The name of the device, as listed in the Device Properties dialog
box
date The date the file was retrieved from the IED by the CAM operation,
in format yyyyMMdd (e.g. 20190820).
For oscillography files containing a .cfg or .dat extension, this
reperesents the event timestamp from within the COMTRADE
file when the Use COMTRADE Event Time check box is selected.
For more information, refer to "Configuring the RUGGEDCOM
CROSSBOW File Export Service" (Page 128).
time The time the file was retrieved from the IED by the CAM operation,
in format HHmmssffffff (e.g. 152543984000).
For oscillography files containing a .cfg or .dat extension, this
reperesents the event timestamp from within the COMTRADE
file when the Use COMTRADE Event Time check box is selected.
For more information, refer to "Configuring the RUGGEDCOM
CROSSBOW File Export Service" (Page 128).
customfieldname The value of the specified custom field for the specified device (e.g.
<Voltage>, <Busbar>, etc.). Multiple comma-separated entries are
permitted.
Parameter Description
filename The name of the file as stored in the RUGGEDCOM CROSSBOW
database
version The version number of the file as stored in the RUGGEDCOM
CROSSBOW database
devicedescription The description of the device as listed in the Device Properties
dialog box
Note
If the file directories do not exist on the target server, the directories are created
using the specified settings.
The root directory is as specified in the CrossBow File Export Service Configuration
dialog box, with any <parameters> replaced with corresponding values from the
database.
For example, if the following is specified for the Customer1 directory:
\Customer1\<facilityname>\<voltage>\<devicename>
Files are categorized inside the directory based on their type. For example, a settings
file would be placed in:
\Customer1\Substation1\240V\SEL-2020_Serial_123\Settings
If a file is of an unknown type (i.e. does not map to settings, events, oscillography or
faults), then it is placed in the main directory.
For more information about configuring the directory structure, refer to "Configuring
the RUGGEDCOM CROSSBOW File Export Service" (Page 128).
Note
The date and time are generated based on when RUGGEDCOM CROSSBOW retrieves
the file from the IED.
<date>_<time>--<voltage>,<devicename>+<version>
File extensions are not configurable, as they match the extension of the file in the
database.
If the generated file name already exists in the target directory, a counter is
appended to the filename (before the extension) to make the file name unique. For
example, if a file already exists, the following files might be created:
• 20180412_132219123456--240v,SEL-2020_Serial_123+15.cfg_1
• 20180412_132219123456--240v,SEL-2020_Serial_123+15.cfg_2
• 20180412_132219123456--240v,SEL-2020_Serial_123+15.cfg_3
• 20180412_132219123456--240v,SEL-2020_Serial_123+15.cfg_4
For more information about configuring the file name, refer to "Configuring the
RUGGEDCOM CROSSBOW File Export Service" (Page 128).
Note
If multiple File Export Service instances are running in a server cluster, make sure to
restart each instance following any configuration changes to a single instance.
Note
For information about enabling or disabling the file export service for a specific
device or gateway, refer to the "RUGGEDCOM CROSSBOW Client Configuration
Manual".
2
3
4
5
6
7
8
9
11
13
10 15
11
12 16
17
14
18
19
20
21
22
23
24
25
26
27
28
4. Under General Settings, in the Polling Interval (sec) options box, type or select
the polling interval. The value is in seconds. A value of zero (0) disables the
service.
5. In the Batch Size options box, type or select the desired number of files to be
transferred per polling interval.
6. In the Exported File Name Format box, type the desired file name format.
For more information about allowable parameters, refer to "File Export
Parameters" (Page 126).
7. Under Directory Structure, in the Root Directory box, type the desired root
directory name (i.e. the full path to the target directory). For more information
about allowable parameters, refer to "File Export Parameters" (Page 126).
8. In the Settings Sub-Directory box, type the desired sub-directory name for
delivery of settings files.
9. In the Events Sub-Directory box, type the desired sub-directory name for
delivery of events files.
10. In the Oscillography Sub-Directory box, type the desired sub-directory name
for delivery of oscillography files.
11. In the Reports Sub-Directory box, type the desired sub-directory name for
delivery of report files.
12. [Optional] Map file types to sub-directories as desired. Files will be saved to the
specified folder based on the file extension entered. Any unidentified file types
will be saved to the root directory.
Note
Files containing a .cfg extension are automatically mapped to the applicable
sub-directory: Event file types are mapped to the Oscillography sub-directory,
configuration type files are mapped to the Settings directory, and all other types
are mapped to the root directory.
Note
A file extension can only be mapped to one sub-directory.
• In the Events File Types box, type the desired file extension(s) to map files
to the Events sub-directory configured in step 9 (Page 130).
• In the Reports File Types box, type the desired file extension(s) to map files
to the Reports sub-directory configured in step 11 (Page 130).
• In the Oscillography File Types box, type the desired file extension(s)
to map files to the Oscillography sub-directory configured in step
10 (Page 130).
• In the Settings File Types box, type the desired file extension(s) to map files
to the Settings sub-directory configured in step 8 (Page 130).
Note
The COMTRADE Event Timestamp will only be applied when the COMTRADE files
are packaged as a ZIP file.
13. [Optional] Select the Use COMTRADE Event Time check box, and select either
Trigger Point (default) or First Data Value as the timestamp to be used. If the
check box is not selected, or if the COMTRADE file is not a ZIP file, the timestamp
of the file within RUGGEDCOM CROSSBOW will be used.
14. [Optional] Select the Use Custom Date Format check box, and configure the
desired data format. Refer to your Microsoft documentation for supported
custom date and time format strings.
Note
The following characters are not supported:
• single quote (')
• double quote (")
• forward slash (/)
• backslash (\)
• question mark (?)
• pipe (|)
• asterisk (*)
If the check box is not selected, the default date format yyyyMMdd (case
sensitive) will be used.
Note
Changes to the custom date format will also be applied to the time file export
parameter. For more information about the time parameter, refer to "File Export
Parameters" (Page 126).
15. [Optional] Select the Use Custom Time Format check box, and configure the
desired data format. Refer to your Microsoft documentation for supported
custom date and time format strings.
Note
The following characters are not supported:
• single quote (')
If the check box is not selected, the default time format HHmmssffffff (case
sensitive) will be used.
Note
Changes to the custom time format will also be applied to the time file export
parameter. For more information about the time parameter, refer to "File Export
Parameters" (Page 126).
16. Under Connection Settings, in the File Transfer Protocol box, select either File
Transfer Protocol (FTP) or Secure File Transfer Protocol (SFTP).
17. [Optional] Under SSH Algorithms, click SSH Algorithm Setting to select the
SSH algorithms to be used for SFTP file transfers. The SSHAlgorithmSelection
dialog box appears.
NOTICE
The values in the list are assigned a security grade from 0 to 5. Siemens
recommends using grade 3 and above security grades. Listed values with a
security grade lower than 3 are to support older devices.
For a description of the available SSH Algorithm types, refer to the available
advanced parameters listed in the "RUGGEDCOM CROSSBOW Client
Configuration Manual".
Note
SSH Fingerprint Handling is only available when SFTP is selected as a File
Transfer Protocol.
22. Under SSH Fingerprint Handling, select either Store new device fingerprint
on next SSH connection to add a new fingerprint to the database at the next
connection, or Verify device fingerprint against stored fingerprint to check
the stored fingerprint matches the target device fingerprint. The current stored
fingerprint value is displayed in the SSH Fingerprint Value box.
23. Click OK to save changes.
1 OK Button
2 Cancel Button
3 Modem Caching Timeout Box
Figure 3.46 Options Screen
Parameter Description
3 5
1 OK Button
2 Cancel Button
3 Available Modem Pools
4 Add Modem Button
5 Edit Modem Button
6 Delete Modem Button
Figure 3.47 Options Screen
5. Under Modem Pool Configuration, either select an existing modem and click
Edit Modem, or click Add Modem. The Modem Configuration dialog box
appears.
1 5
6
2
7
3
8
4 9
10
Note
This parameter is only configurable when adding a modem.
Port Speed Synopsis: [ 75 | 150 | 300 | 600 | 1200 | 2400 | 4800 | 7200 |
9600 | 19200 | 38400 | 57600 | 115200 ]
Default: 9600
Parameter Description
3 5
1 OK Button
2 Cancel Button
3 Available Modem Pools
4 Add Modem Button
5 Edit Modem Button
6 Delete Modem Button
Figure 3.49 Options Screen
5. Under Modem Pool Configuration, select the desired modem and then click
Delete Modem.
6. Click OK to save changes.
7. Start the RUGGEDCOM CROSSBOW Main Server service. For more
information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
Note
When a client connects to a server cluster, RUGGEDCOM CROSSBOW Client attempts
to connect to each server in the order in which they are listed until a connection is
established.
4 6
1 OK Button
2 Cancel Button
3 Cluster Name Box
4 Available Servers
5 Add Server Button
6 Delete Server Button
Figure 3.50 CrossBow Server Configuration Dialog Box
Note
The name of the cluster appears on the client-side Most Recently Used list.
Parameter Description
7. Click OK.
8. Start the RUGGEDCOM CROSSBOW Main Server service. For more
information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
Note
It is recommended the server cluster configuration be identical for each server
in the cluster, including addresses and ports. However, the order of the server
cluster can be different for each server if needed, as the list is refreshed each
time a user successfully logs into a server.
For example, if Server B is to act as a fallback server when Server A is down,
define Server A first in the cluster on each server.
4 6
1 OK Button
2 Cancel Button
3 Cluster Name Box
4 Available Servers
5 Add Server Button
6 Delete Server Button
Figure 3.51 CrossBow Server Configuration Dialog Box
digital Certificate Authority (CA) certificate and identity certificate must be installed
via RUGGEDCOM CROSSBOW Server on the RUGGEDCOM CROSSBOW server to
support TLS/SSL connections.
NOTICE
It is recommended that a utility have an established Public Key Infrastructure (PKI),
including its own internal Certificate Authority (CA) from which certificates can be
issued. This certificate must include the matching private key.
The RUGGEDCOM CROSSBOW Secure Access Manager (SAM) uses TLS / SSL (X.509)
CA certificates to:
• Create a TLS/SSL tunnel between the client and the server (SAC or SAM)
• Mutually authenticate with the RUGGEDCOM CROSSBOW Station Access
Controller (SAC) or Secure Access Manager - Local (SAM-L).
NOTICE
TLS 1.3 connections between RUGGEDCOM CROSSBOW clients and servers are
enabled by default, requiring all TLS/SSL certificates be signed using a Secure Hash
Algorithm.
NOTICE
Some gateways/servers (e.g. Cooper Power Systems) require installing an additional
proprietary root CA to allow special operations in RUGGEDCOM CROSSBOW. Refer to
the manufacturer's instructions for details.
6
5
1 OK Button
2 Cancel Button
3 Certificate Store Type List
4 Certificate Store Name Box
5 Certificate Subject Box
6 Browse Button
Figure 3.52 CrossBow Server Configuration Dialog Box
2
1
3
1 Certificate List
2 Import Button
3 OK Button
4 Cancel Button
Figure 3.53 CrossBow Server Configuration Dialog Box
The left pane shows two pre-loaded certificate stores: local computer and
current user.
7. Expand Certificates (Local Computer).
NOTICE
CA certificates must be added to the Trusted Root Certification Authorities
folder. All other certificates signed by the CA certificate must be placed in the
Personal folder.
NOTICE
During the import process, make sure to select the Mark this key as
exportable option. This is required for TLS connections between the client and
server. If this option is not selected, connections between the client and server
cannot be made.
12. On the Select Server Certificate dialog box, select the certificate from the list
and then click OK. The certificate name appears in the Certificate Subject box.
13. Click OK to save changes.
14. Start the RUGGEDCOM CROSSBOW Main Server service. For more
information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
Note
For information about trusted CAs for client workstations, refer to the "RUGGEDCOM
CROSSBOW Client Configuration Manual".
To select a trusted Certificate Authority (CA) for the RUGGEDCOM CROSSBOW server,
do the following:
1. Access the RUGGEDCOM CROSSBOW server and launch RUGGEDCOM
CROSSBOW Server.
2. Make sure the RUGGEDCOM CROSSBOW Main Server service is stopped. For
more information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
3. Under CrossBow Main Server, click Configure. The CrossBow Server
Configuration dialog box appears.
1 OK Button
2 Cancel Button
3 Choose Trusted Certificate Authorities Button
Figure 3.55 CrossBow Server Configuration Dialog Box
1 OK Button
2 Cancel Button
3 Choose Trusted Certificate Authorities Button
Figure 3.57 CrossBow Server Configuration Dialog Box
NOTICE
For the server to start, at least one cipher suite must be selected for the enabled
TLS level (1.3 or 1.2) in the RUGGEDCOM CROSSBOW client. For example, if TLS
1.2 connections are enable in the client, at least one TLS 1.2 supported cipher suite
must be selected.
For information about enabling/disabling TLS 1.2 connections in the client, refer to
the "RUGGEDCOM CROSSBOW Client Configuration Manual".
NOTICE
Cipher suite selection is only available on the SAM-P.
NOTICE
For increased security, Siemens recommends using grade 5 ciphers wherever
possible.
While no ciphers below grade 4 were available at the time of release, new
vulnerabilities may be discovered over time, causing cipher grades to change. As
such, security grades will be updated with each release.
While grades 3 and lower may at some time be available for selection, they are
considered weak and should not be used unless necessary. If a security grade lower
than 4 is selected, a notification appears.
1 OK Button
2 Cancel Button
3 TLSCiperSuites Setting Button
Figure 3.59 CrossBow Server Configuration Dialog Box
4 5 6 7
5. Select one or more suites from the list using the Select button.
6. Click OK to save changes.
7. Start the RUGGEDCOM CROSSBOW Main Server service. For more
information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
NOTICE
For increased security, Siemens recommends using grade 5 ciphers wherever
possible.
While grades 3 and lower ciphers may be available for selection, they are considered
weak and should not be used unless necessary to connect to an older device. If a
security grade lower than 4 is selected, a notification appears.
Note
For information about how to apply a custom field to a device/gateway, refer to the
"RUGGEDCOM CROSSBOW Client Configuration Manual".
4
1 5
5. Click Edit or Define next to the desired custom field. A dialog box appears.
Under Type, choose either Text or List.
1 5
6
2
7
3
2 Type Options
3 Default Box
4 Required Check Box
5 OK Button
6 Cancel Button
7 Remove Button
Figure 3.62 Dialog Box (Text Option)
1 6
7
2
8
3
4 9
List Values A comma separated list of distinct values. Appears when List is
selected.
Sort the List of Val When selected, the values are displayed in alphabetical order by
ues RUGGEDCOM CROSSBOW Client .
Required When selected, the custom field must be configured for each
device managed by RUGGEDCOM CROSSBOW.
4
1 5
5 Define Button
Figure 3.64 Custom Screen
5. Click Edit next to the desired custom field. A dialog box appears.
1 6
7
2
8
3
4 9
6. Click Remove.
7. Click OK to save changes.
8. Start the RUGGEDCOM CROSSBOW Main Server service. For more
information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
2. Make sure the RUGGEDCOM CROSSBOW Main Server service is stopped. For
more information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
3. Under CrossBow Main Server, click Configure. The CrossBow Server
Configuration dialog box appears.
4. Click the Options tab. The Options screen appears.
3
5
4
6
1 OK Button
2 Cancel Button
3 Enable Custom Labels Check Box
4 Available Custom Labels
5 Add Label Button
6 Delete Label Button
Figure 3.66 Options Screen
1
4
5
2
1 Enumeration List
2 Custom Label Name
3 Custom Label Value
4 OK Button
5 Cancel Button
Figure 3.67 Custom Label Screen
Custom Label Name The name of the custom label that appears in the RUGGEDCOM
CROSSBOW Client.
3
5
4
6
1 OK Button
2 Cancel Button
3 Enable Custom Labels Check Box
4 Available Custom Labels
5 Add Label Button
6 Delete Label Button
Figure 3.68 Options Screen
connecting to the RUGGEDCOM CROSSBOW Server. Both the banner text and logo
can be customized by installing the appropriate files.
Note
The combined file size of the custom text and logo must not exceed 65000 bytes.
Otherwise, the banner may not display or display incorrectly.
1 2
1 Install Button
2 Clear Button
3 OK Button
4 Cancel Button
Figure 3.70 Options Dialog Box
5. For either a custom text file or a custom logo file, click the associated Install
button. A dialog box appears.
6. Navigate to and select the desired file.
7. Click OK to save changes.
8. Start the RUGGEDCOM CROSSBOW Main Server service. For more
information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
To customize the text and background colors for an alert, do the following:
1. Access the RUGGEDCOM CROSSBOW server and launch RUGGEDCOM
CROSSBOW Server.
2. Make sure the RUGGEDCOM CROSSBOW Main Server service is stopped. For
more information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
3. Under CrossBow Main Server, click Configure. The CrossBow Server
Configuration dialog box appears.
4. Click the Alerts tab. The Alerts screen appears.
3 2
4 5 6
1 OK Button
2 Cancel Button
3 Restore Defaults Button
4 Text Setting Button
5 Background Setting Button
6 Example
Figure 3.71 Alerts Screen
Note
Color settings for each alert are demonstrated under Example.
5. Click the Text Setting button next to the desired alert. The Color dialog box
appears.
1 Basic Colors
2 Custom Colors
3 Define Custom Colors Button
4 OK Button
5 Cancel Button
Figure 3.72 Color Dialog Box
2. Make sure the RUGGEDCOM CROSSBOW Main Server service is stopped. For
more information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
3. Under CrossBow Main Server, click Configure. The CrossBow Server
Configuration dialog box appears.
4. Click the Options tab. The Options screen appears.
1 OK Button
2 Cancel Button
3 Show Connected User's Name Check Box
4 Show Device Passwords to Admin Check Box
5 Disable Sending Checked Out Password Email Check Box
6 Show Popup Message When Command Blocked Check Box
Figure 3.73 Options Screen
5. Under Client Options, select or clear Show Popup Message When Command
Blocked.
6. Click OK to save changes.
7. Start the RUGGEDCOM CROSSBOW Main Server service. For more
information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
Note
For more information about advanced parameters, refer to the "RUGGEDCOM
CROSSBOW Client Configuration Manual".
1 OK Button
2 Cancel Button
3 Configure Button
Figure 3.74 Options Screen
4
2
7. Change the parameter value as desired. If the chosen value falls outside of the
permitted range, a message will appear indicating the permitted range.
If the parameter value contains a check box, select the box for True, deselect for
False.
8. Click OK to close the dialog box.
9. Start the RUGGEDCOM CROSSBOW Main Server service. For more
information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
To configure the number of scheduled processes that can run simultaneously, do the
following:
1. Access the RUGGEDCOM CROSSBOW server and launch RUGGEDCOM
CROSSBOW Server.
2. Make sure the RUGGEDCOM CROSSBOW Main Server service is stopped. For
more information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
3. Under CrossBow Main Server, click Configure. The CrossBow Server
Configuration dialog box appears.
1 OK Button
2 Cancel Button
3 Number of Scheduler Processes Box
Figure 3.77 CrossBow Server Configuration Dialog Box
For more information about configuring virtual serial ports, refer to the
"RUGGEDCOM CROSSBOW Client Configuration Manual"
To configure the range of COM pool ports, do the following:
1. Access the RUGGEDCOM CROSSBOW server and launch RUGGEDCOM
CROSSBOW Server.
2. Make sure the RUGGEDCOM CROSSBOW Main Server service is stopped. For
more information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
3. Under CrossBow Main Server, click Configure. The CrossBow Server
Configuration dialog box appears.
3 4
1 OK Button
2 Cancel Button
3 Minimum Port Number Options
4 Maximum Port Number Options
Figure 3.78 CrossBow Server Configuration Dialog Box
4. Under Com Pool Configuration, select the Minimum and Maximum port
number values to specify the range of serial ports.
1 OK Button
2 Cancel Button
3 Server IP Box
Figure 3.79 CrossBow Server Configuration Dialog Box
4. Under VPN Local Tunnel EndPoint, enter the desired Server IP address.
5. Click OK to save changes.
6. Start the RUGGEDCOM CROSSBOW Main Server service. For more
information, refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server
Services" (Page 50).
1 OK Button
2 Cancel Button
3 Seconds Between Every Check for Events List
4 Event Logs Sent to External Targets Every Poll Cycle List
Figure 4.1 CrossBow Log Distribution Service Configuration Screen
4. [Optional] Configure the Windows Event Log. For more information, refer to
"Configuring the Windows Event Log" (Page 178).
5. [Optional] Configure system logging. For more information, refer to
"Configuring Syslog Targets" (Page 182).
6. [Optional] Configure e-mail logs. For more information, refer to "Enabling/
Disabling E-Mail Logs" (Page 106).
7. Click OK. The dialog box closes.
8. Click OK to save changes.
9. [Optional] Enable the CrossBow Syslog Receiver to make system log (syslog)
messages from devices/gateways available in the RUGGEDCOM CROSSBOW
database for distribution. For more information, refer to "Retrieving Log
Messages from Devices/Gateways" (Page 179).
1
3 2
1 OK Button
2 Cancel Button
3 Enable Windows Target Check Box
4 Data Prefix Box
5 Data Delimiter Box
6 Maximum Log Size Box
Figure 4.2 Windows Event Log Screen
Enable Windows Target When selected, enables the generation of Windows event logs.
Data Prefix An optional text string prefixed to all event information. Third-
party monitoring systems can use this string to filter event
information in the log.
Maximum Log Size The maximum size of the log file in megabytes (MB). Once the
log file reaches its maximum size, older events are overwritten
by new events.
Note
The IP address of the device/gateway must match the address defined in
RUGGEDCOM CROSSBOW.
Note
If multiple devices/gateways use the same IP address, only log messages from the
first device RUGGEDCOM CROSSBOW finds in its database are added to the Windows
Event Log.
Note
For information about viewing, searching and deleting audit log files, and changing
audit log settings for individual devices and gateways, refer to the "RUGGEDCOM
CROSSBOW Client Configuration Manual".
Note
The audit level configured for a device/gateway overrides the default setting. For
more information about configuring the audit level for a specific device/gateway,
refer to the "RUGGEDCOM CROSSBOW Client Configuration Manual".
1 OK Button
2 Cancel Button
3 Default Audit Level List
Figure 4.3 Options Screen
5. Under Session Auditing Configuration, select the default audit level. Options
include:
• None – No audit log is generated.
• Transmit Only – Logs all messages from RUGGEDCOM CROSSBOW Client to
the device.
Note
The Transmit and Receive option may result in large audit log entries in the
RUGGEDCOM CROSSBOW database. Select this option only when required.
• Transmit and Receive – Logs all messages to and from the RUGGEDCOM
CROSSBOW Client to the device.
6. Click OK to save changes.
7. Start the RUGGEDCOM CROSSBOW Main Server service. For more information,
refer to "Starting/Stopping RUGGEDCOM CROSSBOW Server Services" (Page 50).
1 3 5
Enable Syslog Target When selected, enables the generation of system logs.
Syslog Address The IP address or host name of the target Syslog server to which
RUGGEDCOM CROSSBOW will forward syslog messages.
Syslog Port The UDP port on the Syslog server to which RUGGEDCOM
CROSSBOW will forward syslog messages.
5. Define one or more distribution rules to control which events are included in the
system log. For more information, refer to "Adding/Configuring a Distribution
Rule" (Page 183).
6. Click OK to save changes.
Note
RUGGEDCOM CROSSBOW includes a default distribution rule to handle any events
that did not match the user-defined distribution rules. The only configurable option
for this default rule is to specify whether events are included or excluded from the
system log.
1 Distribution Rules
2 Add Button
3 Edit Button
4 Delete Button
5 Move Up Button
6 Move Down Button
Figure 4.5 Syslog Dialog Box
4
1
5
2
Value To Match Synopsis: [ Device Session (1) | Security (2) | Password Change
(3) | Configuration Change (4) | System Status (5) | Teltone
Operation (6) | Teltone Log Port Access (7) | Teltone Log Basic
Program (8) | Teltone Log Secure Program (9) | Teltone Log Aux
Relay (10) | Generic Special Operations (11) | External Syslog
(12) | Device Activity (13) | File Access (14) | Alert (15) ] or A
string
The event type associated with the target event or a string that
appears in the event message. Any events belonging to the
specified event type or containing the specified string will be
processed according to the distribution action (e.g. Include
Event or Exclude Event) chosen for the rule.
6. Under Distribution Action, select Include Event to include the event in the
system log, or click Exclude Event to exclude the event.
If Exclude Event is selected, proceed to step 8 (Page 186).
Note
The Facility and Level parameters are unavailable when Exclude Event is
selected.
Facility Synopsis: [ Kernel (0) | User (1) | Mail (2) | Daemons (3) | Auth
(4) | Syslog (5) | Printer (6) | News (7) | UUCP (8) | Cron (9) |
Auth/Priv (10) | FTP (11) | NTP (12) | Log Audit (13) | Log Alert
(14) | Clock Daemon (15) | Local0 (16) | Local1 (17) | Local2
(18) | Local3 (19) | Local4 (20) | Local5 (21) | Local6 (22) |
Local7 (23) ]
Default: Local0 (16)
Level Synopsis: [ Emergency (0) | Alert (1) | Critical (2) | Warning (3) |
Notice (4) | Information (5) | Debug (6) ]
Default: Information (5)
The event's severity level. The value is used along with the
specified facility to determine the event's overall priority.
Options include:
• Emergency – the device/gateway is unusable
• Alert – the device/gateway should be corrected
immediately
• Critical – the device/gateway is in a critical state
• Warning – the device/gateway may fail if not addressed
• Notice – the event is unusual, but associated with any
errors
• Information – the event is normal, no action is required
• Debug – the event is for debugging purposes
8. Click OK.
Note
Distribution rules are run against an event until a match is found. Make sure
distribution rules are defined in the desired order in which they are to be
applied.
Note
The default distribution rule will always be the last in the list to make sure any
events not captured by the distribution rule are excluded from the system log,
unless the default distribution rule is configured to include events.
9. [Optional] Select the distribution rule and click either Move Up or Move Down
to change the order in which rules are tested.
Note
RUGGEDCOM CROSSBOW includes a default distribution rule to handle any events
that did not match the user-defined distribution rules. The only configurable option
for this default rule is to specify whether events are included or excluded from the
system log.
1 Distribution Rules
2 Add Button
3 Edit Button
4 Delete Button
5 Move Up Button
6 Move Down Button
Figure 4.7 Syslog Dialog Box
4. Under Distribution Rule Configuration, select the desired distribution rule and
then click Delete.
5. Click OK to save changes.
Enabled, pass
word incorrect
Receiving the
following error when
attempting to decrypt
the RUGGEDCOM
CROSSBOW database:
Unable to de
crypt the data
base. Please
contact Cross
Bow support for
assistance.
unknown, data
base inaccessi
ble
Receiving the An unexpected error Contact Siemens Customer Support for assistance.
following error when has occurred.
attempting to enable
encryption:
unknown, con
tact support
Note
RUGGEDCOM CROSSBOW Logger is automatically installed alongside both
RUGGEDCOM CROSSBOW server and RUGGEDCOM CROSSBOW client.
RUGGEDCOM CROSSBOW Background Logger is automatically installed alongside the
RUGGEDCOM CROSSBOW server.
For more information about installing RUGGEDCOM CROSSBOW, refer to
"RUGGEDCOM CROSSBOW Installation and Upgrade" (Page 17).
Note
To capture all interactions between RUGGEDCOM CROSSBOW clients and the
RUGGEDCOM CROSSBOW server(s), a logger must be present on the machine hosting
each component.
2 3 4 5 6 7 8 9 10 11
1 Messages
2 Input Filter Check Box
3 Input Filter Box
4 Invert Check Box
5 Font Button
6 Set Level Button
7 Open Button
8 Save Button
9 Disable/Enable Button
10 Clear Button
11 Close Button
Figure 5.1 CROSSBOW Logger Dialog Box
Launching Logger
Launch RUGGEDCOM CROSSBOW Logger by either:
• Double-clicking the RUGGEDCOM CROSSBOW Logger shortcut icon on the
desktop
• Clicking Start, selecting All Programs, selecting RuggedCom, selecting
CrossBow Logger, then selecting CrossBow Logger
Filtering Messages
The log can be filtered to show or hide messages that match or contain a specific
string. Simply select Input Filter and then type the string. Only messages that match
or contain that string will display going forward.
To exclude messages that match or contain the specified string, select Invert.
Note
Filtering only applies when it is enabled. It does not apply to previous log messages.
Enabling/Disabling Logger
To disable any further logging of messages without closing RUGGEDCOM CROSSBOW
Logger, click Disable. To re-enable logging, click Enable.
Closing Logger
To close RUGGEDCOM CROSSBOW Logger, click Close.
Note
RUGGEDCOM CROSSBOW Background Logger does not automatically stop writing log
messages. If the log files are full, RUGGEDCOM CROSSBOW Background Logger will
automatically delete the first file and start a new one until the user stops the process.
3. In the Number of Files options box, type or select the desired number of files to
be generated.
4. In the Max Size of Files (MB) options box, select the maximum size (in
megabytes) permitted for each file.
5. Click OK to save changes.
1 OK Button
2 Cancel Button
3 Allow All Check Box
4 Allow Passwords Check Box
5 Allow IP Addresses Check Box
6 Allow Phone Numbers Check Box
7 Allow Raw Transmitted or Received Device Data Check Box
8 Allow Database Query Errors Check Box
9 Allow Command Lines Check Box
Figure 5.3 Logging Screen (SAM-P)
5. Click the check box of the chosen category or categories, or click Allow All to
select all categories.
6. Click OK to save changes.
Siemens RUGGEDCOM
https://www.siemens.com/ruggedcom
Industry Mall
https://mall.industry.siemens.com