CANBERRA RMSA7070822 Digital Security Device User Manual Blue Sky Airlines
Canberra Industries Digital Security Device Blue Sky Airlines
  
    CANBERRA   >  
User Manual

 Remotely Monitored Seal Array (RMSA) 
User’s Manual  
SFG-MAN-001 
Revision: 1.7 
107 Union Valley Road 
Oak Ridge, TN 37830 
Phone: (865)220-
6300 
Fax: (865)483-0406 
    2016 CANBERRA 
Table of Contents 
PREFACE ....................................................................................................................................................... 1 
INTRODUCTION ........................................................................................................................................... 1 
1.1 RMSA SYSTEM OVERVIEW ........................................................................................................................... 1 
1.2 THEORY OF OPERATION ................................................................................................................................. 3 
1.3 SEAL ................................................................................................................................................................ 5 
1.4 TRANSLATOR .................................................................................................................................................. 9 
1.5 RMSA REVIEW GUI .................................................................................................................................... 13 
RMSA SET-UP ............................................................................................................................................ 15 
2.1 RMSA SEAL PROGRAMMING AND CONFIGURING....................................................................................... 15 
2.2 RMSA TRANSLATOR SET-UP AND LINUX BOOTSTRAP .............................................................................. 27 
2.3 WINDOWS XP REMOTE REVIEW APPLICATION HOST ........................ ERROR! BOOKMARK NOT DEFINED. 
RMSA KEY GENERATION ....................................................................................................................... 35 
3.1 RMSA KEY GENERATION............................................................................................................................ 35 
RMSA SECURITY ...................................................................................................................................... 37 
4.1 COLLECT / STORE SEAL MESSAGES WITH NO CONSOLE ACCESS ............................................................... 37 
4.2 AUTHENTICATION AND ENCRYPTION OF MESSAGES................................................................................... 37 
4.3 FIBER LENGTHS ............................................................................................................................................ 38 
REMOTE REVIEW OF SEAL DATA ......................................................................................................... 40 
5.1 RMSA REVIEW GUI INSTALLATION AND CONFIGURATION ....................................................................... 40 
5.2 LOADING COLLECTED RMSA DATA ........................................................................................................... 41 
5.3 SORTING AND ANALYZING RMSA DATA .................................................................................................... 45 
5.4 REQUESTING RMSA SEAL DATA ................................................................................................................ 53 
Table of Figures 
 Figure 1 Capability and Implementation Relational Diagram ....... 2 
Figure 2 RMSA System Configuration .......................................... 4 
Figure 3 Seal in Case .................................................................... 5 
Figure 4 Block Diagram of the Seal .............................................. 7 
Figure 5 Translator Block Diagram ............................................. 10 
Figure 6 Type Length Value (TLV) Format ................................. 12 
Figure 7 Example RMSA System Installation ............................. 14 
Figure 8 Battery Holders (Seal Not in Case) .............................. 16 
Figure 9 Out of Case Seal and Programmer Set -up ................. 17 
Figure 10 Seal Programmer Inside Case ................................... 17 
Figure 11 Installing Plastic Optical Fiber (POF)………………..38 

Preface 
Inside This Manual 
This document describes all of the procedures necessary to operate the Remotely Monitored 
Seal Array system including the Seals, their supporting  Translators,  and communications 
subsystems. The User is expected to be familiar with the basic PC and MS/DOS procedures.   
This document is divided into the following five chapters: 
Chapter 1 RMSA System Description - This section includes an RMSA system overview 
and theory of operation and describes the Seal, Translator and Remote Review 
Application software.  
Chapter 2 RMSA System Set-Up  -  This section provides step-by-step instructions for 
setting up each of the RMSA System components. 
Chapter 3 RMSA Key  Generation - This section contains the procedures for generating 
cryptographic keys that will be loaded into the Seal. 
Chapter 4 RMSA Security -  This section discusses RMSA Security via encryption, 
authentication, and default keys for a specific Seal. 
Chapter 5 Remote Review of Seal Data - This section demonstrates the Remote Review of 
Seal Data. 
Safety Guidelines 
 Caution – Do not operate this unit in a manner not specified in this document. 
 Caution – Only use this unit with the manufacturer provided input power cable. 
FCC Compliance 
Compliance Statement (Part 15.19)     
The enclosed hardware device complies with Part 15 of the FCC Rules. Operation is subject to the following two 
conditions: (1) This device may not cause harmful interference, and (2) This device must accept any interference 
received including interference that may cause undesired operation. 
Warning (Part 15.21)      
Changes or modifications not expressly approved by Canberra Industries could void the user’s authority to operate 
the equipment. Manufacturer is not responsible for any radio or TV interference caused by unauthorized 
modifications to this equipment. 
Compliance Statement (Part 15.105(b))       
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 
15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a 
residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed 
and used in accordance with the instructions, may cause harmful interference to radio communications. However, 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001   
REVISION: 1.7    
2016 CANBERRA 
I 

there is no guarantee that interference will not occur in a particular installation. If this equipment does cause 
harmful interference to radio or television reception, which can be determined by turning the equipment off and on, 
the user is encouraged to try to correct the interference by one or more of the following measures: 
• Reorient or relocate the receiving antenna       
• Increase the separation between the equipment and receiver     
• Connect the equipment into an outlet on a circuit different from that to which the receiver is connected 
• Consult the dealer or an experienced radio/TV technician for help  
Industry Canada (IC) regulatory information 
This device complies with Industry Canada license-exempt RSS standard(s). Operation is subject to the following 
two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, 
including interference that may cause undesired operation of the device. 
Le présent appareil est conforme aux CNR d'Industrie 
Canada applicables aux appareils radio exempts de licence. L'exploitation est autorisée aux deux conditions 
suivantes : (1) l'appareil ne doit pas produire de brouillage, et (2) l'utilisateur de l'appareil doit accepter tout 
brouillage radioélectrique subi, même si le brouillage est susceptible d'en compromettre le fonctionnement. 
Class B digital device notice 
This Class B digital apparatus complies with Canadian 
ICES-003, RSS-Gen and RSS-210. 
Cet appareil numérique de la classe B est conforme à 
la norme NMB-003, CNR-Gen et CNR-210 du Canada. 
• The system antenna(s) used for this transmitter must be installed to provide a separation distance of at least 
20cm from all the persons and must not be co-located or operating in conjunction with any other antenna or 
transmitter, except in accordance with FCC and Industry Canada multi-transmitter product procedures. 
• The system antenna(s) used for this module must not exceed 10dBi (CDMA BC0) and 9.31dBi (CDMA BC1) 
for mobile and fixed operating configurations. Users and installers must be provided with antenna installation 
instructions and transmitter operating conditions for satisfying RF exposure compliance. 
Translator Input Power 
Voltage: 100-240 VAC, 50-60Hz 
Power Consumption:  .75A 
Prepared by: 
Author(s): Michael Fontanarosa, Tammy Wenderlich 
II 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001   
REVISION: 1.7   
2016 CANBERRA 

Introduction 
Welcome to the Remotely Monitored Seal Array (RMSA) system provided by Canberra and 
Sandia National Labs.  RMSA was designed to meet the needs of a large base of Users who 
require more data storage features, better RF performance, longer battery life, enhanced 
security and other more powerful functions.  Figure 1 provides a pictorial representation of how 
the RMSA System fits within the Secure Sensor Platform (SSP) product family constellation in 
terms of its complexity and shared capabilities.   
The RMSA Seal monitors a fiber optic loop, records tamper events, provides autonomous and 
requested State of Health via encrypted and authenticated messages.   This information  is 
stored in the Seal, remotely via the RMSA Translator and  reviewed  through  the Remote 
Review Application.  The Authenticated Switch version of the Seal includes magnetic sensors 
and activating magnets such that a pair of Authenticate Switch Seals can be used to create a 
balanced magnetic switch suitable for monitoring doors, containers and other articles where 
one surface moves away from another under authorized conditions. 
1.1 RMSA System Overview 
The RMSA system consists of Seals, a Translator, a Programming Card interface as well as 
the Remote Review Application.  The RMSA system provides the following features: 
• Offers a low cost solution for monitoring Sealed components 
• Incorporates high reliability 
• It is inexpensive compared to earlier RF Seals 
• Ensures surveillance capabilities available for a long duration 
• Provides requested or periodic state of health updates  
• Monitors and records date and time of any Seal tamper or other events 
• Secures Seal data with encryption and authentication techniques  
• Allows remote review of Seals 
• Can receive messages from multiple Seals while polling for data via Remote Review  
• Requires no license for its low power 900 MHz ISM band RF communication 
Each of these features will be discussed in this RMSA User Guide. 
Chapter 
1 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
1 

Figure 1 Capability and Implementation Relational Diagram 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
2 

1.2 Theory of Operation 
The RMSA allows for monitoring of a fiber optic or authenticated switch sensor as a Seal.  See 
Figure 2 for an overview of the RMSA system configuration.  Seal data is collected with an 
RMSA Translator with Translator/Seal communications via a no-license, low power RF 
communications channel.  Seal data is encrypted, authenticated, and stored before transfer to 
the Translator as the Translator is an unsecure device.  A Microsoft Windows (XP-based) 
Remote Review Application host can decrypt and authenticate the data stored on the 
Translator for inspector analysis.  A TCP/IP (Ethernet) connection between the Translator and 
the Remote Review Application host facilitates the transfer of data from the Translator to the 
Remote Review Application.  In addition to remote review, this network connection is used to 
allow the inspector to interrogate specific Seals for state-of-health or to request re-send of a 
specific Seal message.   
The RMSA system is capable of supporting three configuration modes of operation.  These 
three modes are designated standalone mode, local host supported mode  and remote 
monitoring mode.  In the standalone configuration the system hardware may consist of many 
active Seals and one Translator, which sits unmonitored for long periods of time.  The local 
host supported configuration is via an Ethernet interface connected directly to a local host 
computer.  The remote monitoring mode is similar to the local host mode but is via the internet 
to allow monitoring by a host computer of the RMSA system over the internet.   
The Programming Card has several functions.  It is used to provide power via an external 
power supply, a USB interface or from a Microchip compatible programming device.  It also 
converts the Microchip RJ12  connector  6-wire  programming cable to the RMSA 8-wire 
interface cable.  The RMSA interface cable is used to program the microcontroller code and 
Seal personality information that is unique to each Seal.  It also provides the interface between 
an external USB device, such as a PC, and the UART on the Seal, for personality 
programming and debugging. 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
3 

Figure 2 RMSA System Configuration
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
4 

1.3 Seal  
The  Seal's design is rugged and resistant to tampering.  Its electronics  are  in a tamper 
indicating plastic housing.  See Figure 3 for a picture of the prototype version of Seal in its 
case.  A pair of tamper switches is used to detect any opening of the Seal housing.  The Seal 
housing may be opened to replace the internal batteries.  Openings are recorded as tamper 
events.  The Seal is contained in either a white PVC or a blue and white swirl polycarbonate 
plastic overlapping two piece case that contains an O-ring Sealing system for environmental 
protection.  The Plastic Optical Fiber (POF) cable connectors have special Delrin®  plastic 
ferules along with O-ring Sealing gaskets. 
Figure 3 Seal in Case 
  Advantages of using the RMSA Seal include the following:  
• Can be reused indefinitely   
• Can be read in situ without removal from the Sealed item 
• No external power required, battery operated 
• Provides intrinsic tamper indication  
• Easily installed 
• One or multiple Seals can be read remotely 
The Seal stores data and then forwards this data securely to a local Translator via low 
power RF communication.  As many as 2000 normal State of Health messages are stored 
locally in the Seal in a non-volatile circular memory buffer.  This locally stored Seal data 
can be retrieved manually by the User by using the Send Message Protocol should RF 
transmission be interrupted during normal operation. 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
5 

The Seal is comprised of the following major components: the Fiber Optic Cable, a Fiber Optic 
Emitter and a Fiber Optic Receiver, a Microcontroller, Memory, an RF Transceiver and Real 
Time Clock.  Other inherent components include the Battery Pack, Personality and Security 
Key programming, and the Programming Interface.  See Figure 4 for a block diagram of the 
Seal. 
Authenticated Switch Seals contain all of the components in the Seal, and additionally have a 
complementary set of magnetic switches, one operating as normally closed and the other 
operating as normally open.  There is also a strong magnet installed in the housing such that 
when two Authenticated Switch modules are installed face to face, the magnet from one 
activates the magnetic switches on the other module. 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
6 

Figure 4 Block Diagram of the Seal
PIC 
18 
FL 
6722 
Microcontroller 
Real Time Clock 
CC 
1100 
RF Transceiver 
Memory 
Fiber Optic  
Emitter 
Fiber Optic  
Receiver 
Tamper 
Battery  
Pack 
I 
2 
C 
SPI 
Programming  
Interface 
TX
/ 
RX 
To USB  
Programming 
Cable 
VDD  
( 
unregulated 
) 
30  
Meters 
1  
mm Plastic Fiber 
SPI 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
7 

A  parametric measure of  the light intensity through the Fiber Cable Monitor is monitored 
electronically by the Seal.  The fiber optic loop may be as short as 1 meter and as long as 30 
meters in length.   
Dates and times of opening or closing the loop, tampering, out of boundary conditions and 
interrogation are stored in the Seal.  Each Seal has a unique ID number that is programmed 
before deployment in non-volatile memory internally.  A new Seal received from the 
manufacturer does not contain any personality information such as encryption or authentication 
keys.  For the Seal initialization and configuration process, refer to Section 2.1. 
For tamper resistance, a pair of tamper switches along with a special pin attached to the case 
top are used together to detect opening of the Seal case.  Once the case is opened, the time of 
this tamper is recorded for later review.  Additionally, the encryption and authentication keys 
are automatically destroyed and a default key is used from that point forward to do both the 
encryption and authentication for any further messages.  
The Seal contains the following components: 
• Quartz  crystal based timer (real-time clock) to ensure high precision in time/date 
generation 
• Microchip low power microcontroller with 128 Kbyte Flash memory to control the Seal 
functions, encryption, and transmit information 
• Non-volatile Flash memory to store up to 2000 normal SOH messages 
• Case switches for tamper detection 
• Fiber optic circuits to emit and receive light pulses traveling through the optical fiber 
loop 
• Serial interface for data exchange between the Seal and the Personality Programming 
device 
• Two AA 3.6V, 2100 mA-H Lithium Batteries 
• Temperature monitor circuit 
• Programmable RF transceiver for the 900 MHz ISM band 
• Magnasphere magnetic switches (Authenticated Switch only) 
• Cylindrical magnet (Authenticated Switch only) 
The microprocessor is activated by any of the following events: 
• Tampering attempt on the case switch 
• Fiber optic (FO) loop event 
• Valid request for communication (interrogation, initialization, etc.) 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
8 

• Magnetic switch activation (Authenticated Switch only) 
The  plastic optical fiber (POF) cable is a 200-micron single fiber in a 1000 micron (1mm) 
plastic jacket.  At each end is a removable plastic ferrule for connecting the POF into the Seal 
body.  There is a 1 mm hole in the ferrule to allow the POF to pass through and insert into the 
Seal case opening to allow light from the POF to either enter or exit. 
To communicate with the Seal, the Seal is connected to a PC USB port through the 
Programming Card. The Seal’s two replaceable AA 3.6V lithium batteries may provide a 
source of power for over four years, although it is recommended that they be replaced sooner if 
there is more RF transmitting activity than normal. 
1.4  Translator 
The Translator is the device used to read the Seal data in situ.   The Translator collects, stores, 
and then forwards data from Seals upon request, local or remote.  All data is encrypted by the 
Seals before transmission, though some portions of the data frame such as Seal ID is sent in 
the clear (no encryption).  An authentication signature is part of the overall Seal message.  The 
Translator can then transfer this pre-encrypted Seal data via its Ethernet link as it does not 
decrypt the data nor authenticate nor does not contain such functionality.  The Translator 
sends on the encrypted Seal messages as well as non-encrypted information regarding the 
Seal address, the number of bytes in the encrypted messages, received signal strength as 
seen by the Translator, and other information.  Data can then be verified and analyzed on-site 
or remotely worldwide.   
When a message is transmitted the source device expects an acknowledge response from the 
destination device.  If an acknowledge message is not received the source device retransmits 
the message after a random stand-off period of time.  This RF “hand-shake” is an affirmative 
action and has been shown to cut down the amount of RF traffic used by other types of Seals.  
The Seal will only try to wait for this acknowledgement of successful data reception by the 
Translator up to three times before stopping any further attempts for that particular message.    
The Translator stores the messages chronologically in non-volatile memory.   
For physical security, the Translator is housed in a tamper-indicating enclosure with openings 
for RF antenna and an Ethernet cable.  The Translator consists of an ARM9 based single 
board computer (SBC) with a specially designed PC/104 daughter card called the Translator 
Communication Card (TCC), a universal 115/230V, 50/60Hz AC to 5VDC power supply, two 
external vertical swivel antennas and a tamper switch.  See Figure 5 for a block diagram of the 
Translator.  The  SBC runs Debian Linux and contains the  Operating System and RMSA 
application on a removable 4 GB SD card.   There are 128 MB of DDR RAM, 512MB of NAND 
Flash, USB ports, Gigabit Ethernet, a serial port and several other items which are not used on 
the SBC.  The Translator may be powered by Power Over Ethernet (POE) if desired.  Total 
power consumption is around 5 watts. 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
9 

Figure 5 Translator Block Diagram 
The Translator base system stores the encrypted Type Length Value (TLVs) messages in day 
files.  The log file name consists of a date stamp and 4 digit counter.  At midnight, the current 
day file is closed and a new file is opened with the new date stamp.  To minimize Linux 
resource issues while stress testing, a maximum number of records per log file is imposed. 
When this maximum record count is reached, the current day file is closed and a new one is 
open with the same date stamp but incremented counter.  Multi-part messages are 
reassembled and stored as a single day file entry for ease of retrieval.  Remote command 
pass-through sends the State of Health of the Seals, the Message ID and includes an initiation 
of Wake on Radio sequence to the Seal.  In addition, the day files also contain basic Translator 
State of Health data such as the following: 
• Translator up-time and RMSA application start / stop time. 
• Date and time that messages are received by the Translator timebase (though not 
necessarily the date and time the message was created by the Seal timebase). 
• Number of successful and unsuccessful TLVs received from this Seal (based only on 
properly formatted TLV Header information).  See Figure 6 for a breakdown of the 
TLV information and its proper formatting.  
• Receive Signal Strength Indication (RSSI) / Link Quality Indication (LQI) based on 
messages. 
The Translator is considered a non-secure device as any stored seal data is encrypted at the 
seal source before being collected by the Translator.  However, Translator security features 
are available including: 
UNIVERSAL
AC
POWER 
SUPPLY
ARM9 PC/104 SBC
TRANSLATOR
COMMUNICATION
CARD
(TCC)
PC/104
(ISA Bus)
TAMPER
DETECT
SWITCH
+ 5 VDC AC INPUT
ETHERNET
(POE)
ETHERNET
UNIVERSAL
AC
POWER 
SUPPLY
ARM9 PC/104 SBC
TRANSLATOR
COMMUNICATION
CARD
(TCC)
PC/104
(ISA Bus)
TAMPER
DETECT
SWITCH
+ 5 VDC AC INPUT
ETHERNET
(POE)
ETHERNET
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
10 

• Password protection for upload of Translator log files to a review host via Samba. 
• Translator log files are placed on a separate disk partition so problems with the root 
partition will have no effect on the logs. 
• An “rmsadeploy” script on the Translator that disables user access including 
console/serial port access, ftp, ssh, etc.  In deployed mode, the Translator’s SD card 
(firmware) would have to be replaced to regain access.   
• Improperly encrypted and authenticated data will be flagged by the Remote Review 
GUI as “corrupt”. 
Refer to Chapter 4 of this User’s Guide for more details on Translator operational deployment. 
During RF transmissions, badly formatted TLV packets will be noted during the Translator’s 
data review of the packets sent.  All transmitted message data is stored on the Seal as well.  
Interruption of network operations will not affect the Translator’s RF data store operations.  
Network operations are only necessary during inspector download and review events.   
Figure 6 shows the TLV message construction from the Physical Layer all the way up to the 
Application Layer.  The TLV message format is very flexible as it allows for new message types 
to be created at some future point in time while allowing all previous message types previously 
created to be fully backwards compatible.   
The TLV format is set up with a Message Type Field (this it the “T”), followed by the Length 
Field (this is the “L”) and then followed by the Value Field (this is the “V”).  The Type and 
Length fields are fixed in the number of bytes, but can be modified for future growth.  The 
Value field can be as long as feasible, depending on the Message Type. 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
11 

Figure 6 Type Length Value (TLV) Format
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
12 

1.5  RMSA Review GUI 
The RMSA Review GUI application runs under Microsoft WindowsXP.  The Review application 
includes the ability to decrypt and authenticate Seal data and facilitates remote review of data 
both in a batch processing mode and in a live update mode.  Decryption and authentication of 
the Seal data messages is provided as is handling of incorrectly formatted TLVs and batch 
processing of multiple input files. 
The  RMSA  Review  GUI includes an Inspector Mode that provides a Main Batch Review 
Screen and a Demand Data Screen.  Within the Main Batch processing, a simplified view of 
the data, a full view of the data, or a custom view may be set up by the inspector.  The batch 
processing of an RMSA day file(s) is only allowed with a password-protected Samba file share.  
Figure 7 provides a diagram of how the Review Application Software may be used. 
Should live data updates or Seal data queries be needed, a TCP/IP port connection to the 
Translator is required.  Query functions include either a request to acquire a specific Seal 
message via a send message demand or a request for status via a State-of Health demand.   
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
13 

Figure 7 Example RMSA System Installation 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
14 

RMSA Set-Up 
This chapter details the set-up steps for the RMSA system.   
2.1 RMSA Seal Programming and Configuring 
Ensure that the Seal has fresh batteries with the following instructions. 
Chapter 
2 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
15 

2.1.1 Changing the Seal Batteries 
• Open the Seal case.  See  Figure  8  below, which just shows the Seal circuit card 
assembly. 
• The two 3.6-volt Lithium AA batteries are on the top of the board in battery holders. 
• Remove old batteries and insert two fresh batteries.  Note that the battery positive 
terminal must align with where the arrows are pointing. There are also battery 
orientation symbols in the battery holders. 
• NOTE: The prototype Seal has a power switch which must be turned on (slide away 
from the end of the board with the fiber optic cable ferrules) to enter the command 
interface for personality programming. 
• Reprogram the Seal personality, close the Seal case and install a fiber loop. 
• Confirm proper start-up by verifying that the red LED visible through the bottom of the 
Seal case flashes 5 times and then turns off. 
Figure 8 Battery Holders (Seal Not in Case)
Battery 
Holders for 
Batteries 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
16 

2.1.2 Programming the Seal  
The picture below illustrates the hardware set-up for the Seal programming phase.  In Figure 9 
the Programming Card and Seal are outside of their respective cases while Figure 10 shows 
the Programming inside its case. The hardware shown are the RMSA Programmer with USB 
cable, an 8-pin cable to support the Seal console and a PICKit2 Programming Dongle with 
USB-mini cable to support Seal microcontroller programming.  The connections are the same 
if an MPLAB ICD3 Programming and Emulation module is used instead of the PICKit 2.  Both 
USB cables (one from the PICKit 2 or ICD3 and one from the Programmer) are attached to the 
host PC.  The set-up for the Windows terminal program such as HyperTerm or TeraTerm to 
be used with the Programmer Card is as follows:  8 data bits, No parity, 1 stop bit, 19.2 KBaud, 
no flow control.  Once the Seal has been properly configured and programmed, all dongle 
connections may be removed and the Seal can operate stand-alone. 
Figure 9 Out of Case Seal and Programmer Set -up  
Figure 10 Seal Programmer Inside Case 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
17 

Note that support files have been packaged for the User in a folder called RMSA_USER_Files 
in the support  and documentation package provided with the RMSA system.  The folder will be 
referred to as the RMSA USER file repository in the remainder of this User Guide. 
Seal programming requires access to MPLAB IDE version 8.43 or later and PICKit 2 version 
2.61 or later.  If programming is being performed using the MPLAB ICD3, the ICD3 is fully 
supported by the MPLAB IDE.  Both are available as free downloads from the Microchip 
website at www.microchip.com.  The MPLAB IDE is used to create the Seal hex code with 
embedded Seal ID and then the PICKit 2 is used to write the hex file to the Seal.  Each process 
is described below along with the process to configure a Seal with the appropriate date and 
encryption keys.   
• Locate hex code files (will have a format such as NAME.hex) and Keys.dat in the 
RMSA file repository.  Also, locate the Seal personality Blind Programmer executable 
in the RMSA file repository. (The default is typically C:\Program Files\Sandia National 
Laboratories\SSP Software) 
• Identify the host PC COM Port associated with the RMSA USB dongle (e.g., COM5 or 
COM11).  For the remainder of this User Guide, this COM port will be referred to as 
Comport. 
2.1.3 Creating the Seal-Specific Hex File with MPLAB IDE 
To create a Seal specific .hex file (with embedded Seal ID), perform the following steps: 
• Launch the MPLAB IDE application.   
• Using the Configure/Select Device option, ensure that the MPLAB tool is configured 
for device type PIC18F6722 as illustrated in the screen shot below: 
Normal operation for the Seal should be 3.5 V, +/- 0.1 V.  The Seal will operate between 3.0 
and 3.6 volts. 
IMPORTANT INFORMATION!  Do not apply any voltage greater than 3.7 volts to the 
Seal!  
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
18 

• Under the File pull down, select Import.  In the Open window, browse to the location of 
the RMSA User files and select file FullUser.hex. 
• Select Configure, then ID Memory, then enter the Seal ID (NOTE: All ID’s using 0xFF 
in the least significant byte of the ID are reserved for the Translator only and may not 
be used for Seal identification) in the User ID box, then press OK. 
• Under the File pull down, select Export.  Select the export defaults as illustrated below 
and click OK. 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
19 

• In the Save As window, browse to the User file location and save the Seal specific 
.hex file with a unique name.  For example, if the new .hex file has embedded ID 6F, 
save the .hex file as FullUser_ID6F.hex. 
• If the Seal is to be programmed with the PICKit2 dongle, exit the MPLAB IDE 
application and use the Writing the Hex File to the Seal with PICKit2 section.  
Otherwise, remain in the MPLAB IDE and use the Writing the Hex File to the Seal 
with ICD3 section. 
2.1.4 Writing the Hex File to the Seal with ICD3 
Writing the .hex file to the Seal requires the RMSA USB/Programmer.  To write the .hex file to 
a Seal, perform the following steps: 
• Select a Seal, remove the enclosure and connect the RMSA USB/Programming 
dongle and ICD3 dongle shown in Section 2.1 of this User Guide.   
• Start the MPLAB Integrated Development Environment (IDE) if it is not already 
running.  The program will confirm the existence of the ICD3 programming module 
and ask the user to confirm the correct power supply setting.  When the initialization is 
complete, the prompt will indicate that the program is ready.  If not, check dongle 
cabling (as shown in Section 2.1) and repeat this step until the connection is indicated. 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
20 

• Under the File pull down, select Import, browse to the Seal specific .hex file for the 
Seal and select Open.  The program will report the successful import of the hex file. 
• Click Programmer from the top menu line and click on Program in the drop-down 
menu 
• The progress bar at the bottom of the screen will indicate that programming is in 
progress, and the screen will report “Programming/Verify Complete” when it is 
finished.  Exit the MPLAB IDE program. 
2.1.4 Writing the Hex File to the Seal with PICKit2 
Writing the .hex file to the Seal requires the RMSA USB/Programmer.  To write the .hex file to 
a Seal, perform the following steps: 
• Select a Seal, remove the enclosure and connect the RMSA USB/Programming 
dongle and PICKit 2 dongle shown in Section 2.1 of this User Guide.   
• Start the PICKit 2 application.  Once started, the PICKit 2 window should indicate that 
a PIC device was found.  If not, check dongle cabling (as shown in Section 2.1) and 
repeat this step until the connection is indicated. 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
21 

• Under the File pull down, select Import Hex, browse to the Seal specific .hex file for 
the Seal and select Open.  Note whether the program bytes appear in the Program 
Memory window and if the message that the Hex file has been successfully imported 
appears. 
• Click the Write button.  Writing the hex file to the Seal will take approximately 1 minute 
allowing erase of the device then programming of the new code.  A successful 
outcome will cause the message box to be shaded green with the message 
Programming Successful. 
Note:  Should the User wish to Read the code back, click the Read button. The message 
“Reading Device: Program Memory” is displayed in the message box.  After several 
seconds, the message box will indicate it is “Done.”.  No program bytes are available in the 
Program Memory window (use ICD3 from Microchip). 
2.1.5 The Key Files 
Key files are used to load keys into the Seal with  the Sandia National Laboratories Blind 
Programmer GUI.  The key files are for creation and review of encrypted and authenticated 
Type Length Value (TLV) data.  The key file is a table of comma-delimited records where each 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
22 

record contains the Seal ID followed by the default encryption key, encryption key and 
authentication key.  Key generation is dictated by IAEA policy and, therefore, outside the scope 
of this User Guide.  Example encryption keys for this step are obtained from key file keyfile.dat. 
See Section 3.1 for information on how a Key file is generated for a series of RMSA Seal IDs. 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
23 

2.1.6 Configuring the Seal Personality 
Sandia National Laboratories provides software for configuring seal personality including the 
SSP Personality Profile Editor for creating an XML file to define SSP seal configuration and the 
SSP Personality Programmer for programming the personality defined in an XML file into a 
seal.  Use the RMSA Software.msi installer program to install the tools on a host PC running 
Windows XP.  Then, from Start->All Programs, choose SSP Software to create the personality 
XML file.  Once created, the personality XML file can be used to configure any number of 
seals.  The XML file creation and SSP Programmer steps are described in more detail below.   
The instructions below assume that the key file for the seals has been generated and is in a 
known location.   
• Start the SSP Personality Profile Editor from Start->All Programs->SSP Software.  
Just under the SSP Seal Configuration Title, click on the left most icon to create a new 
configuration file.  The configuration window should be similar to: 
• Click the empty cell in the right column next to “Translator Addresses”.  Enter the 
default address 000000ff. 
• Click anywhere on the “Key File Location” row for the CMAC Authentication Key then 
click on the “…” icon that appears to the right of this row.  Use the standard browser 
interface to select the key file for the seals.  Repeat this step for the “Key File Location” 
row for the AES Encryption Key and Default Encryption and Authentication Key.  Note 
that these keys may be loaded from the same file. 
• Click on the cells to the right of the label “Reporting Interval”.  (The default value of 
these cells is 30 seconds.)  Enter any value between 30 seconds and 24 hours.  This 
interval defines the period for normal State of Health reporting for the seal. 
• At this point, the configuration window should appear similar to: 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
24 

• Under the SSP Seal Configuration title, select the right-most icon to save the 
personality configuration using the provided standard browser interface.  Once saved, 
exit the editor program. 
• It is important that the RMSA programmer dongle be plugged into the host PC via a 
USB port before starting the RMSA Blind Programmer GUI so that the GUI selects the 
correct COM port for communications.  Plug the RMSA Programmer dongle into the 
USB port of the PC host and the white 8-pin connector into the seal. 
• Start the SSP Personality Programmer from Start->All Programs->SSP Software.  In 
the browser interface that is presented at startup, navigate to the XML configuration 
file that you just saved.  The SSP Programmer window will appear similar to: 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
25 

• Open the seal that is to be configured.  Cycle the power (red switch) to the VDD 
position.  Message will appear in the Blind Programmer window reporting status of 
seal configuration similar to: 
• There should be no messages printed out in red font. Any such messages indicate 
errors in the personality programming and/or the hardware. 
• Disconnect the 8-pin programming connector from the seal and install the cover.   
• When configuring multiple seals repeat the SSP Personality Programmer steps 
above. (*The XML configuration file will need to be re-loaded for each seal.) 
• At this point, the seals have been loaded with the information from the XML 
configuration file: 
• Translator Address 
• Translator Retry Attempts 
• Date and Time 
• Authentication and Encryption Keys 
• Seal Reporting Interval 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
26 

2.1.7 Verification of Seal Communications  
Verification of seal communications requires an RMSA Translator.  Refer to section 2.2.2 
of this User’s Guide. 
2.2  RMSA Translator Set-up and Linux Bootstrap 
The  Translator is initially delivered in factory set-up mode.  In factory set-up mode, the 
Translator is not yet installed in the tamper indicating enclosure and the User has access to the 
Translator via the console port or secure network communication such as ssh.  Section 4.1 
includes Translator deployment steps which put the Translator in the more secure “deployed” 
mode, eliminating console port access and auto-starting the RMSA application. 
In factory set-up mode, an XP Windows PC can be used with a terminal emulator program 
such as TeraTerm or Hyperterm to create a console connection to the Translator via an RS-
232 or USB port (with a USB-serial dongle).  The console port should be configured with 
115,200 baud, 8 bits, no parity, 1 stop bit and no flow control. 
2.2.1 Translator Physical Configuration 
To support the console port connection required for factory set-up mode, the Translator is 
initially used in an open case or on the bench top.  The Translator board stack consists of an 
EmbeddedARM TS7800 SBC with Canberra’s custom TCC daughter card.  Physical 
configuration details for the Translator are as follows: 
• TS7800 jumper JP1 is installed to initiate bootstrap from the SD card. 
• TS7800 jumper JP3 is installed to run the CPU at 333MHz instead of 500MHz, saving 
power and increasing reliability in extreme thermal conditions. 
• A serial port console connection requires a null modem connector.  A cross-over 
Ethernet cable can be used to connect the  Translator directly to the Windows-XP 
Remote Review Host (see below).   
• Two RF antennas should be connected to the TCC card through cabling in the 
tamper-indicating enclosure. 
• The tamper switch is connected to the Tamper port of the TCC card. 
2.2.2 Creating a Translator SD Card 
Translator initial factory set-up mode is achieved by creating a clone of a bootable Translator 
SD card as documented in the “Cloning Translator SD Cards” section of the “Building RMSA 
Software” document.  This guideline contains a complete description of the cloning procedure.  
Create a bootable SD card for the Translator as described below in a brief summary: 
• Insert an SD card in an SD appliance connected to a Linux development environment.  
These steps assume that the contents of the clonesd folder provided by Canberra is 
installed in the Linux development environment in /home/rmsa/clonesd.  This folder 
should contain the tarclone.sh script, the tarballs for the RMSA root (root.tar.gz) and 
home (home.tar.gz) partitions and the dd files for the other partitions required by the 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
27 

EmbeddedARM bootloader. 
• Before proceeding, you must know the /dev file name for the inserted SD appliance.  
This can typically be obtained from the dmesg utility.  Make sure the SD appliance is 
settled and available after insertion before continuing.   
• From the shell prompt of the Linux development system, enter the following 
commands: 
cd /home/rmsa/clonesd 
./tarclone.sh sdX 
where sdX represents the /dev file name of the SD card appliance (which can be 
determined from the dmesg utility). 
• The disk clone procedure will take several minutes.   Upon completion, dismount the 
SD card from the appliance.   
2.2.3 Booting the Translator 
With power removed from the Translator, insert the  bootable SD card into the Translator’s SD 
card slot then apply Translator power.  Linux bootstrap messages appear in the Translator 
console window.  The Translator is configured to auto-start the RMSA application. With no 
active seals, the Translator bootstrap messages will be similar to: 
>> TS-BOOTROM - built Dec  4 2008 
>> Copyright (c) 2008, Technologic Systems 
>> Booting from SD card... 
. 
. 
. 
. 
>> Booting to SD Card... 
INIT: version 2.86 booting 
Starting the hotplug events dispatcher: udevd. 
Synthesizing the initial hotplug events...done. 
Waiting for /dev to be fully populated...done. 
Cleaning up ifupdown...done. 
Loading kernel modules...done. 
Checking all file systems... 
fsck 1.37 (21-Mar-2005) 
... done. 
/dev/tssdcardb6 on /home type ext3 (rw,noexec,nosuid,nodev) 
Setting up networking...done. 
Setting up IP spoofing protection: rp_filter. 
Enabling packet forwarding...done. 
Configuring network interfaces...done. 
Starting portmap daemon: portmap. 
INIT: Entering runlevel: 3 
Starting system log daemon: syslogd. 
Starting kernel log daemon: klogd. 
Starting internet superserver: inetdJul 25 20:19:55 ts7800 
kernel: Debian version TCC driver. 
Jul 25 20:19:55 ts7800 kernel: Initializing TCCDriver: 0.0.1 @ 
IO base address 320 
Jul 25 20:19:55 ts7800 kernel: TCC Card Version:  -  
(202D)<0>ID RT (5452) 
Jul 25 20:19:55 ts7800 kernel: Registered device tcc, major # 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
28 

62 
Jul 25 20:19:55 ts7800 kernel: CC1100 INIT:  Success and ready 
in RX mode. 
Jul 25 20:19:55 ts7800 kernel: RxSyncLo = 91 
Jul 25 20:19:55 ts7800 kernel: Verifying TCC Initial status: 
<0> 02 
Jul 25 20:19:55 ts7800 kernel: TCC driver successfully 
initialized. 
. 
Starting Samba daemon......Samba daemon started!Starting 
OpenBSD Secure Shell server: sshd. 
Starting periodic command scheduler: cron. 
main: Translator starting.  Verbosity Level = LOW. 
rmsa: Initializing log file. 
rmsa: Initializing TCC. 
tccInit: Opening /dev/tcc. 
tccInit: TranslatorId=ff 
tccInit: Wake Interval = 12 msec, Wake Duration = 5 msec 
tccInit: Initializing known device queue at 0x16610. 
tccInit: SSPq ready. tccInit: radioCfg=0 
tccInit: channel number = 0x0main: Ready to service TCC port. 
rmsa: Initializing CC1100. 
Jul 25 20:20:02 ts7800 kernel: CC1100 INIT:  Success and ready 
in RX mode. 
Kernel level CC1100 INIT returns 1. 
Disable all TCC interrupts returns 1. 
cc1100: Programming CC1100. 
Setting cc1100Ready to 1 
CC1100 programming successful. 
        Flushing the RX FIFO returns 1. 
        Flushing the TX FIFO returns 1. 
        Calibrating. 
        Calibration returns 1 
        Entering RX Mode. 
        RX mode returns 1 
CC1100 Ready. 
rmsa: Starting threads. 
netCreateSocket: translator hostname: ts7800 
netCreateSocket: Creating network socket ... 
net create socket, sockfd = 7 
netCreateSocket: Network socket ready. Bind=0 
rmsa: Logging application start. 
logTranslatorEvent:  Logging translator event 0. 
rmsa: Enabling TCC interrupts. 
rmsa: Radio channel number: 0x0 
main: Translator successfully initialized. 
Set process priority to -10 
Calling tccServicePort with priority -10 
2.2.4 Setting Translator Time 
To configure the Translator system time, Login as User “root” with password “rmsa”.  This can be 
done from the console port or via a ssh connection from a Linux host.  If the console is required, 
we must first terminate the RMSA application.  To do this, enter CTRL C on the console port.  
Within 7 seconds, you must enter the root user name and password then issue the command 
wdoff.  If the wdoff command is not issued within 7 seconds, the watchdog timer will expire 
and the Translator will reboot.  
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
29 

From the shell prompt, issue the following command to set the Translator system time: 
date –u MMDDhhmmCCYY.ss 
 Where –u is the command line argument that specifies UTC format and  
    MM represents the current month (01-12) 
    DD represents the current month day (01-31) 
    hh represents the current hour (01-23) 
    mm represents the current minute (01-59) 
    CCYY represents the current year (e.g. 2010) 
    and ss represents the seconds (01-59) 
 Repeat this step as often as necessary until satisfied with the new system date and 
time, the new date and time is repeated on the console without error and the shell 
prompt is re-displayed.  For example: 
 # date –u 011208272010.45 
Tue Jan 12 08:27:45 MST UTC 2010        
 # 
If the RMSA application was terminated in order to use the Translator console, restart the 
RMSA application with the following command: 
 rmsa -v 
Alternatively, the application can be restarted by rebooting the Translator. 
2.2.5 Verification of Translator Operation 
An operational Translator running the RMSA application will automatically collect and store the 
Seal  messages.  The  Translator receives and stores Seal  messages, and logs them 
chronologically (in the order received) in day files in a separate partition on the SD card from 
the root file system.  The size of the storage for messages is 1.5GB or larger.   
Translator Implementation Note: All Translator statistics and message logs are stored in files 
on the Translator SD card.  As disk files, the logs are non-volatile.  Separate file partitions are 
provided for system and message logs.  System status information is in the root partition.  The 
size of the root /home partition depends on the size of the SD card.  Approximately 512 MB are 
used for bootloader and root partitions.  A 2GB SD card, for example, would have 
approximately 1.5GB available for the message log partition.  
In order to verify Translator operation, prepare at least 2 seals according to the instructions in 
Section 2.1 of this User’s Guide and operate the Translator in factory configuration mode with a 
console cable attached.  With the seals configured and installed, reboot the Translator and 
observe the bootstrap messages in the console window followed by the RMSA application 
initialization messages as described in section 2.2.3, above.  If the seal period is set to one 
minute, then within one minute you should see messages similar to the following: 
tccServicePort: Rcvd 63 bytes from 45 seq_ack 31 
tccRegisterDevice: creating new SSPq entry for 45 
sspReceive: ACKing 45 SSP with seq_ack byte 33 
tccSend (14): 0D 45 00 00 00 45 00 00 00 FF 33 00 00 00 
tccServicePort: Rcvd 43 bytes from 45 seq_ack 43 
sspReceive: ACKing 45 SSP with seq_ack byte 44 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
30 

tccSend (14): 0D 45 00 00 00 45 00 00 00 FF 44 00 00 00 
Cleared 2 segments for device 45 
Note:  In this example, 45 is the Seal address that originated the message.  Similar messages 
should appear for other Seals. 
Verification of seal message logging can be accomplished by logging into the Translator.  
Once again, if the console must be used, it will be necessary to CTRL C, log on to the 
Translator as root and issue the wdoff command within 7 seconds.  Alternatively, use an ssh 
network connection.   From the shell prompt (“#”) within the console window, issue the 
following commands: 
 cd /home/share 
ls 
Verify log file contents with the command: 
cat  filename 
 where filename is a log file name such as rmsa255_20100112.log. 
The log file will contain entries that look similar to the following example: 
1, 2010 01 15 17:10:47, 00000051, 00000032, 00000000, 000000FF,        
0 06:43:22,    1, ab(a9/ab), 00(00/00),   80, fb 1c a7 b5 55 a4 
d1 69 22 f5 67 be 1c 09 c1 82 ec 79 59 ec de 6d a1 a2 32 44 22 8e 
1b b2 34 62 7b 45 4c 35 e2 d2 1c 43 04 1b ba 1e 3b ce d4 dd fe 63 
57 25 93 e2 3d b0 ea 95 35 a6 0f bc 24 ea 03 4d 02 e3 5e b7 3b c6 
69 5d dc 40 c7 3d 5c 55  
Highlights have been added to the example log entry above to facilitate understanding of this 
comma separated data file: 
The green text is the log entry type. 1 indicates a message received.  (Other log entry types 
indicate Translator start, Translator tamper, etc.) 
The yellow  text is the timestamp that the message was received.  A review of the log file 
(using cat or similar linux tool) will show the entries in chronological order based on this time 
stamp.    
The non-highlighted text contains a snapshot of key Translator statistics at the time the 
message was received. 
The pink text is the number of message bytes received. 
The cyan text contains the actual as-received encrypted message bytes.  The TLV contents 
are not available to the Translator in clear-text. 
From the shell prompt, issue the following command to display Translator file partitions: 
df 
Results will be similar to: 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
31 

Filesystem      1K-blocks  Used Available Use% Mounted on 
tmpfs              63584    …   …           0%   /dev/shm 
/dev/tssdcardb6  2855172    …   …           3%   /home 
tmpfs              10240    …   …           1%   /dev 
Note that /home is mounted as a separate file partition completely separating the storage for 
the RMSA log files from system information and statistics. 
2.2.6 Translator Power-Over-Ethernet Operation 
To configure the Power-Over-Ethernet option, disconnect the AC power cord from the 
Translator and connect POE enabled power supply or POE enabled Ethernet Router to the 
Translator with an Ethernet cable.  To verify correct operations, apply Translator power and 
verify the bootstrap messages in the console window as described in section 2.2.3 of this 
User’s Manual. 
Note that the Translator can be powered simultaneously from either the POE interface or the 
AC interface without any issues. 
2.2.7 Alternate Translator Configuration 
The default Translator SSP address is 0xff and the default radio channel is 0.  These settings 
should be adequate in most cases.  Instructions are provided below for applications where 
these default settings must be modified. 
The default radio frequency of the Translator is set correspond with the base of the proper 
allocated frequency band and to agree with the frequency that is programmed into the Seals.  
While the channel of the Translator may be changed, it must agree with the channel that the 
Seals are operating on to insure proper communication.  The Translator channel should only 
be changed if the Seals have been programmed with an alternate channel.  To change the 
default radio channel, edit the file /etc/rmsa/radioconfig and replace the 0 with the desired radio 
channel.  The radio channel value may range from 0-30 hexadecimal. 
To change the Translator’s SSP address, edit the file /etc/rmsa/transid and replace the ff with 
the desired translator address.  The Translator address may be any hexadecimal integer (4 
bytes) where the last byte is either ff or 0. 
Note that the /etc/rmsa folder contains 2 other files that should not be modified.  The sdVersion 
file may be read to obtain the translator software version.  The wakecfg file was used by 
developers to experiment with the command and acknowledge timing for demanding seal data 
and should not be changed. 
2.2.8 Change Translator IP Address 
To change the translator IP address, connect to the translator via the console port.  The 4 
steps below must be performed within 7 seconds or the watchdog will cause the system to 
reboot. 
 Type Ctrl + c 
ts7800 login: root 
Password: rmsa 
root@ts7800:root# wdoff (enter) 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
32 

At this point the root@ts7800:root# prompt should be displayed. 
Edit the Hosts file 
root@ts7800:root# cd /etc (enter) 
root@ts7800:etc# vi hosts (enter) 
The "hosts" file will be open for editing. 
10.10.16.72 ts7800 <--Change to the desired IP address 
127.0.0.1 ts7800 
204.152.191.39 ftp.us.debian.org 
130.225.242.102 ftp.sunsite.dk 
10.10.16.71 yagoo 
 # The following lines are desirable for IPv6 capable hosts 
# (added automatically by netbase upgrade) 
 ::1     ip6-localhost ip6-loopback 
fe00::0 ip6-localnet 
ff00::0 ip6-mcastprefix 
ff02::1 ip6-allnodes 
ff02::2 ip6-allrouters 
ff02::3 ip6-allhosts 
~ 
To add new characters place the cursor under the character(s) that will be changed and press 
"i", type the desired character(s) and press "esc".  To Delete old characters place the cursor 
under the characters(s) that need to be removed and press "x".  When changes are complete 
press "shift+z+z" to close and save the file. 
Edit the Interfaces file 
root@ts7800:root# cd etc/network (enter) 
root@ts7800:network# vi interfaces (enter) 
The "interfaces" file will be open for editing. 
 #Used by ifup(8) and ifdown(8). See the interfaces(5) manpage 
or # /usr/share/doc/ifupdown/examples for more information. 
 auto lo 
iface lo inet loopback 
 auto eth0 
#iface eth0 inet dhcp 
iface eth0 inet static 
         address 10.10.16.72 <--Change to the desired IP address 
         network 10.10.16.0 <--Change to the desired network (if necessary) 
         netmask 255.255.255.0 
         broadcast 10.10.16.255 
         gateway 10.10.16.72 <--Change to the desired gateway 
#       address 192.168.239.50 
#       network 192.168.239.0 
#       netmask 255.255.255.0 
#       broadcast 192.168.239.255 
#       gateway 192.168.239.1 
#iface eth0 inet static 
#       address 192.168.1.207 
#       network 192.168.1.0 
#       netmask 255.255.255.0 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
33 

interfaces: unmodified: line 1 
To add new characters place the cursor under the character(s) that will be changed and press 
"i", type the desired character(s) and press "esc".  To Delete old characters place the cursor 
under the characters(s) that need to be removed and press "x".  When changes are complete 
press "shift+z+z" to close and save the file. 
When all changes are complete the system will need to be re-booted. 
 root@ts7800:network# reboot (enter) 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
34 

RMSA Key Generation 
This chapter demonstrates key generation for the Seal.  
3.1.   RMSA Key Generation  
This step uses software that runs in a DOS box on a WindowsXP PC generating keys for one 
Seal.  The resultant keys will be loaded into the Seal. 
• Locate the file rmsakeyfilegen.exe in the RMSA file repository.   
• Note that Help is available if needed in the following file: 
msakeyfilegenhelp.txt 
• Start the key generation software by typing the following command line in the DOS 
box: 
rmsakeyfilegen.exe /start:0x00000001 /end:0x000000FF /keyfile:rmsakeys.dat 
/start tells the generator what the first RMSA Seal ID in the file will be.  Additional 
Seal IDs will increment from this one. 
/end tells the generator what the last RMSA Seal ID in the file will be. 
/keyfile tells the generator the filename to write the keys to. 
• You will be prompted to retype in a first set of specific random characters in the DOS 
box.  Type in the first set of characters. 
• You will be prompted to retype in second set of specific randomly characters in the 
DOS box.  Type in the second set of characters 
• You will be asked to type in 128 random key strokes.  Type in 128 keystrokes. 
• After the 128th keystroke, the program will ask the User to stop typing and will create 
the keyfile. 
Chapter 
3 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
35 

Starting the Key Generation Software 
After echoing 2 sets of characters by the key generation software 
After entering 128 keystrokes 
The keys have been generated in the named file.  You can close the DOS box. 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
36 

RMSA Security 
This chapter demonstrates RMSA encryption, authentication and 
default keys as well as adding new fiber lengths to a Seal. 
4.1   Collect / Store Seal Messages with no Console Access 
The Translator provides a script for deploying from factory set-up mode to operational mode.  
In operational mode, no further access to the Translator (via the physical console or secure 
network communications such as ssh or sftp) will be possible. To re-use the Translator in 
factory set-up mode, the User will have to configure a new bootable SD card as described in 
Section 2.2 of this User Guide. 
To deploy a Translator into operational mode, from the shell prompt in the console window, 
issue the command: 
rmsadeploy  
Messages similar to the following will be displayed on the in the console window: 
Cleaning files out of the /home/share directory ... 
Cleaning debug statistics in /var/stat/rmsa ... 
Disable root login... 
Removing ssh service... 
Remove unnecessary modules... 
Disable root ftp access ... 
Autostart RMSA application ... 
Removing TTYs and console... 
Deploy complete.   
Rebooting Translator to implement security changes. 
Remove the Translator console cable and install the enclosure cover.   
4.2   Authentication and Encryption of Messages 
Valid keys are necessary for decryption and signature verification.  Key management 
procedures, including generation of keys and key file management, are the responsibility of the 
user. 
Messages with invalid authentication keys will result in a “Bad signature” message status in the 
RMSA Review GUI.  Messages with invalid encryption keys will result in a “Bad key” message 
status in the RMSA Review GUI and the decrypted data will not be available for review.  
Messages with a correct encryption and authentication key will be available for review in the 
Chapter 
4 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
37 

RMSA Review GUI.  When messages are properly decrypted and authenticated, all TLV data 
is displayed. 
• Ensure that the RMSA Review Application is connected to the Translator by noting 
that the RMSA Review Application indicates it is connected and new messages from 
the Seals appear in the main display at a rate that has been configured by the User in 
Section 2.1.7. 
• Open the key file keyfile.dat in the RMSA file repository. 
• Note that for each Seal ID is defined 3 keys.  The first is the default key, the 2nd is the 
encryption key, the 3rd is the authentication key.  An example for a hypothetical entry 
for Seal ID 50 could show: 
Default key: FAAB136723F5DD237533C32A14879011 
Encryption key: 2086C23014C770D7411C039028740150 
Authentication key: 2B7E151628AED2A6ABF7158809CF4F50   
• Quit (Don’t Save) the keyfile.dat file.   
4.3   Fiber Lengths  
This step is to demonstrate how to use various fiber lengths.  The User may add any User 
selected length of fiber, between 1 and 30 meters cut from a spool of fiber without any special 
tools.   However, it should be noted that the best way to ensure a good plastic optical fiber 
(POF) connection to the Seal would be to use a very sharp implement that will create a clean 
cut that is orthogonal to the cable.  Cuts that have angles, are ragged or are poorly terminated 
will affect the sensitivity measurements done by the Seal for the light intensity and can preclude 
proper operation if not enough light is coupled through the fiber.   
After each fiber insertion or removal, the Seal will send a message that shows the state of the 
fiber link in the Seal (i.e., Open or Closed).   
• Insert the fiber within the RMSA Seal ferrules and then screw down until Hand Tight.  
(DO NOT OVER-TIGHTEN!) 
o Push the POF into the opening until you feel it bottom out against the 
photodiode.  Hand-tighten the ferrule  
Figure 11 Installing Plastic Optical Fiber (POF) 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
38 

o Repeat the above sequence for the other end of the POF for the remaining 
fiber opening in the Seal. 
o To remove the POF, do the same set of operations but in reverse order. 
• Ensure that the RMSA Review Application is connected to the Translator (see section 
5.1) by noting that the RMSA Review Application indicates it is connected and new 
messages from the Seals appear in the main display at a rate of that has been 
configured by the User in Section 2.1.6. 
• Remove one end of the POF from the seal. 
• Within a few seconds, a message is displayed from that Seal indicating an alarm 
under the Source Tamper Status column, indicating that a fiber has been removed or 
inserted. 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
39 

Remote Review of Seal Data 
This chapter describes the installation, configuration and use of the 
demonstration RMSA Remote Review GUI provided by Canberra for 
the analysis of data collected by the Translator.  
5.1   RMSA Review GUI Installation and Configuration 
The RMSA Review GUI installer is provided by Canberra in the RMSA repository.  The 
demonstration GUI runs on a Windows XP PC.  The default installation location of the GUI will 
be in c:\Program Files\RMSA.  The GUI is based on the .NET framework which must be 
installed before installing the RMSA Review GUI.  If required, a copy of the .NET framework is 
also provided by Canberra in the RMSA repository. 
The demonstration RMSA Review GUI relies on a network connection from the Windows XP 
host to the Translator.  This can be accomplished with an Ethernet crossover cable from the 
PC to the Translator with the PC LAN port configured as follows: 
Once the LAN is properly configured, it should be possible to ping the Translator (default IP 
10.10.16.72) to confirm the network connection.   
Chapter 
5 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
40 

5.2   Loading Collected RMSA Data 
The RMSA Review GUI is designed to work in two ways: 
• In Remote Review Mode the GUI loads one or more day files from the Translator’s 
Samba-mounted /home partition for review and analysis. 
• In Local Host Mode an active network connection is made between the RMSA 
application running on the Translator and the Remote Review GUI.  In this mode, as 
seal messages are received by the Translator and stored in a day file, the messages 
are also sent immediately to the GUI providing a “live” view of RMSA message activity.  
In local host mode, the GUI operator can also demand seal data by requesting an 
immediate State-of-Health (SOH) message or a resend of a previous seal message. 
In both modes, the GUI controls the number of records loaded for review in order to avoid 
resource issues on the Host PC.  Operating procedures for each mode are further described in 
the remainder of this section as is the procedure for configuring the maximum number of 
records available for viewing.  Operating procedures for data analysis and for demand of seal 
data are provided in sections 5.3 and 5.4 of this chapter. 
Both Remote Review and Local Host operations require the GUI operator to have access to 
the same key file(s) used to configure the seal personality in order to properly decrypt and 
authenticate the seal data. 
5.2.1 Remote Review Operation 
Perform the following steps to operate the RMSA Review GUI in Remote Review mode: 
• Ensure the Translator is operational and a PC LAN connection has been established 
between the Host PC and the Translator (refer to section 5.1, above). 
• Establish the Samba connection between the Host PC and the Translator using the 
Tools->Map Network Drive function in an Explore window.  The drive folder will be 
\\10.10.16.72\share.  Click on Connect Using a Different Username and enter 
Username “smbuser” and password “asdfqwer”.  (Note that this factory default 
password can be changed by the user prior to Translator deployment.)  
• Start the RMSA Review GUI via Start->All Programs->RMSA Review.  A window 
similar to the following should appear: 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
41 

• Click the Load Keys button, then browse for the appropriate key file.  Double click the key 
file (keyfile.dat, for example) to load the keys.  A message box will be displayed indicating 
that the key file was successfully loaded.  Click OK to dismiss this message.   
• Using the File pull-down in the toolbar (upper left corner), browse for a log file on the 
Translator’s  Samba-mounted drive.  Double click on one or more day file to upload that 
day’s data to the remote review GUI. 
• Data is displayed in the GUI similar to the example below.  Note the file name in the Data 
File text box at the top of the display.  If more than one file is selected for loading, this text 
box will contain the name of the last file loaded but the main window will contain the data for 
all files.   
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
42 

5.2.2 Local Host Operation 
Perform the following steps to operate the RMSA Review GUI in Local Host mode: 
• Repeat all steps for Remote Review operation up to the point of select day files with the 
File pull down.  I.e., start the RMSA Review GUI and load keys. 
• Click the Connect to Translator button.  Within a few seconds, the Translator status 
should be changed from Disconnected to Connected and the button will be relabeled 
“Disconnect From Translator”.  As seal messages are received by the Translator, they 
will be immediately sent to the GUI.  Refer to the view below: 
To terminate the Local Host connection, click on the Disconnect From Translator button.  For 
best synchronization of the network connection between the GUI and Translator, the 
connection should be disconnected before terminating the RMSA Review application.  If not, it 
may take several minutes to re-establish the connection if the GUI restarted.   
In Local Review mode, demanding seal data is available via the Tools pull down as described 
in section 5.4.   
In Local Host mode, a TCP/IP connection heartbeat message is passed between the GUI and 
Translator.  If loss of heartbeat is detected, the connection will be shutdown.  If this occurs, the 
Translator status will change to Disconnected and the button will be relabeled “Connect to 
Translator. 
Note the Auto Connect option near the upper right corner of the display.  If this option is 
selected, the GUI will automatically  attempt  to  establish  GUI/Translator  communications.    
Therefore, if a network disruption causes disconnection due to loss of heartbeat, the GUI will 
re-establish the connection within a minute once the network becomes available. 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
43 

5.2.3 Maximum Record Display Threshold 
If the number of total number of records for all day files exceeds the maximum record count for 
the RMSA Review Display, a warning will be printed at the top of the display indicating that the 
maximum record threshold has been exceed as illustrated below.  Consider loading fewer day 
files to view the complete set of data.  If a particular day file exceeds the maximum record count, 
consider raising the threshold or using an editor to break the day files into multiple parts. 
To increase the threshold, select Tools->Customize Report View.  The threshold setting is in 
the Maximum Number of Records to Display box at the top of the configuration menu 
(illustrated below).  Change the setting as desired and click OK.  Data will need to be reloaded 
(from the File pulldown) to load additional records.  The default value of the threshold is 1000. 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
44 

5.3   Sorting and Analyzing RMSA Data 
This section summarizes the methods available in the demonstration RMSA Review GUI for 
sorting data or generating alternate data view to assist with analysis.  The details of the default 
data view, device-specific reports and data view customization are provided below. 
5.3.1 Default Data View 
The RMSA Review default data view is illustrated below. 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
45 

From the default view, note the following: 
• Each row in the main display contains a Device Report row including a message 
counter, the Source Timestamp column contains the UNIX encoded time field and the 
Source Alert Count column contains the alert counter.  These fields are included in 
every State of Health Message.  The source timestamp should mirror the seal 
reporting period that was configured when programming the seal personality. 
• The following Event Log Types may be included in the report: 
o Device Report: a TLV message from a seal 
o Translator Start: provides the timestamp of the start of the RMSA collection 
application on the Translator. 
o Cal Success: The Translator has detected conditions where the RF receiver 
needed to be recalibrated and has successfully performed this task. 
o Cal Failure: The Translator has detected conditions where the RF receiver 
needed to be recalibrated and failed to successfully perform this task. 
o Translator Tamper: Indicates a tamper event in the Translator enclosure. 
• In Device Report entries, the following fields are reported with a standard SOH 
message: 
o The Source ID is the address of the reporting seal. 
o The Log Timestamp is the time the seal report was logged by the Translator. 
o The Report Status will indicate Normal, Alarm, Warning or Bad Key if the 
message decryption fails.  Alarm entries will be shaded red, Warning entries 
are shaded yellow, normal messages are not shaded.  In the example below, 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
46 

seal 00000121 reported an Alarm in the SOH message due to a failed light 
test fiber status.   
The seal logic includes a security feature that, under certain circumstances, 
will delete the encryption and authentication keys configured during 
personality programming and replace them with default keys.  If the RMSA 
Review GUI fails to decrypt and authenticate using the standard keys, it will 
then try using the default keys.  If the default key is required a “DK” code will 
be added to the Report Status field.  So a “Normal – DK” status indicates that 
a normal SOH message has been received from the seal but a previous 
event caused the keys to be replaced with default keys. 
o The message number is the seals message count.  The report should 
contain consecutive message numbers for each seal.  However, in a busy 
situation where a number of seals are reporting at the same time, it is 
possible that the SSP ACK/Retry logic will time out and the message will be 
missed by the Translator.  The message will be stored on the seal and can be 
recovered with the SNDM command as described in section 5.4. 
o The Source Alert Count contains a cumulative alert count for the seal.  Note 
in the figure above that the Source Alert Count for seal 45 changes from 0 to 
1 when the fiber event is reported. 
o Other standard SOH fields include the battery voltage, temperature and 
tamper status of the seal at the time the SOH message was sent.  The 
Further Report Info would be empty under normal circumstances but may 
contain additional TLV information in the case of an alert or warning. 
• On the left side of the main display is a Known Device List.  This list can be minimized 
with the Hide Known Devices button if more screen space is desired for a custom 
report view as described in section 5.3.3.  The known device list can be used to create 
seal-specific reports as described in section 5.3.2.  Within the known device list, the 
seal address is shaded by the highest noted alert level.  I.e. if no problems have been 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
47 

reported, the seal address is not shaded.  If the seal has ever reported a warning, the 
device address will be shaded red.  If the seal has ever reported an alert, the address 
is shaded red. 
5.3.2 Device-Specific Report 
Double click on the address cell of any seal in the Known Source ID’s list to get a pop-up report 
containing only messages for that seal as illustrated below. 
As with the main data display, it is possible to click on any column header to sort by that data.  
Note that the device report is static – it is generated from the data available at the time it was 
created.  In Local Host mode, where data is continually being added to the main display, it may 
be necessary to click the Refresh Data button to receive live updates. 
With the Device-specific report, it is quite easy to note missing messages where the message 
numbers are not consecutive.  There may be valid reasons for a missing message.  For 
example, the ack/retry logic on the seal takes place in a relatively short amount of time to 
conserve seal battery.  If multiple seals are reporting at once, the Translator may not meet the 
acknowledge time criteria for all seals and the message will not be received.  However, the 
message should still be available on the seal and can be resent with the Send Message data 
request as described in section 5.4. 
5.3.3 Customizing the Data View 
Each Device Report log entry has more data available for forensics and detailed analysis than is 
probably desired during the initial data review.  The RMSA Review GUI provides a tool to allow 
the operator to customize the data view.  Under Tools, select Customize Report View.  A window 
similar to the following will be displayed: 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
48 

The items listed on the left are default report items and can be restored by pressing the Default 
Settings button.  Use the checkboxes for each of the default and alternate report items to select 
the items to be visible then click OK.  In the following example, the operator selected Report 
Status, Message Number and Report Bytes.  The Hide Known Sources button was clicked to 
maximize the data view.  The resulting display can be used to forensically examine message 
bytes. 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
49 

In the next example, the report view was customized to include only the Event Log Type, Source 
ID, Log Timestamp, Report Status and Message Number.  The resulting minimal display could 
be used to quickly scan for Alarm or Warning conditions: 
It is important to note that all data exists at all times within the GUI.  Customizing the report view 
only determines which data will be displayed.  In other words, customizing the report view does 
not cause the GUI to reload data from the translator. 
The following table has a complete list of available Device Report data items: 
Column Label Description of Contents 
Event Log Type Describes the type of report – refer to section 5.3.1, above, for further 
details.  This column should always contain data and is included in the 
default report view. 
Source ID Contains the 
seal address that originated a Device Report and is 
empty for all other Event Log Types.  This column is included in the 
default report view. 
Log Timestamp Contains the timestamp that the log entry was created on the translator 
in the format MM/DD/YYYY hh.mm.ss.  This column should always 
contain data and is included in the default report view. 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
50 

Column Label Description of Contents 
Report Status Some analysis of message data is performed by the GUI to categorize 
each report as Normal, Warning or Alarm.  Normal reports have no 
background shading, Warning reports are shaded yellow and Alarm 
reports are shaded red.  In the case of a Normal report, the Report 
Status is Normal.  Warning or Alarm reports may have a Report Status 
of Warning or Alarm or may further indicate the Warning or Alarm 
source (such as “Bad key.”).  This column should always contain data 
and is included in the default report view. 
Message Number Contains the seal message number for a Device Report in decimal 
format.  This column is included in the default report view. 
Source Timestamp Contains the seal timestamp for a Device Report indicating the time 
that the seal generated the report.  This column is included in the 
default report view. 
Source Alert Count 
Contains the seal’s cumulative alert count for a Device Report in 
decimal format.  This column is included in the default report view. 
Source Fiber State Contains the seal’s fiber optic state for a Device Report.  A fiber state 
reading is interpreted by the seal into one of the following possible fiber 
states:   
• FiberOK 
•  Dark test failed 
• Light test failed 
• Measured light exceeds upper limit 
• Measured light exceeds lower limit 
• Positive threshold exceeds upper limit 
• Negative threshold exceeds lower limit 
• Measured light exceeds positive threshold 
• Measured light exceeds negative threshold 
• Unknown fiber state 
A reported state of FiberOK is considered “Normal” all others are 
considered an “Alarm”.  This column is included in the default report 
view. 
Source Battery 
Voltage Contains the seal’s battery voltage reading for a Device Report.   This 
column is included in the default report view. 
Source Temp 
Contains the seal’s temperature reading for a Device Report in 
Degrees Celsius.  This column is included in the default report view. 
Source Tamper 
Status Contains the seal’s tamper status reading for a Device Report.  The 
case tamper reading is analyzed by the seal and reported as either 
Normal or Alarm.  If “Alarm” is reported, the report is classified as an 
Alarm report and shaded red.  This column is included in the default 
report view. 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
51 

Column Label Description of Contents 
Further Report Info Contains information as necessary to support the log entry.  In the 
case of a Translator Tamper report, this column will contain further 
information on the nature of the tamper.  For Device Report log entries, 
the column is used to report a Bad TLV or invalid TLV format.  It may 
also be used to report information from TLVs that are not normally 
reported in a SOH message and do not, therefore, have a dedicated 
column.  This column is included in the default report view. 
Report Bytes  Contains a list of the raw report bytes (in hexadecimal) for a Device 
Report.  If the report bytes were successfully decrypted, the decrypted 
report bytes are reported.  Note that this column can be quite wide.  To 
examine the report bytes of a single entry, roll the mouse over the cell 
for a 5-second pop-
up of the complete contents.  Alternative, 
customize the report view to remove other columns, then expand the 
Report Bytes column width.  Report bytes will typically not be of interest 
for inspection outside of forensic investigations.  Therefore, this column 
is not included in the default report view.  See Customizing Report 
View, below for more information.  
Source Report 
Count The number of reports received by the translator from the seal source 
address of this Device Report.  This column is not included in the 
default report view. 
Source Error Count The number of errors logged by the translator for reports from the seal 
source address of this Device Report.  For example, RF payloads with 
invalid SSP 
header information are ignored (not processed and 
logged), but a error counter is incremented.  This column is not 
included in the default report view. 
Translator Address The translator address extracted from the SSP header for the Device 
Report.  In most cases, the Translator Address will be 0xff – unless the 
translator device address has been modified during translator set-
up/configuration or corruption of the RF payload has occurred.  This 
column is not included in the default report view. 
Translator Uptime The translator uptime (time since last boot) at the time the Device 
Report was processed and logged.   The uptime can be used as a 
forensic indicator that the translator was unavailable for a period of 
time.  This column is not included in the default report view. 
Translator Tamper 
Count The cumulative count of translator case tampers at the time the Device 
Report was processed and logged.  This column is not included in the 
default report view. 
RSSI (RF Signal 
Quality) The RSSI value is an indicator of RF signal quality and can be used 
forensically by an RF expert to determine if there were problems with 
the RF.  This column is not included in the default report view. 
LQI (RF Signal 
Quality) The LQI value is an indicator of RF signal quality and can be used 
forensically by an RF expert to determine if there were problems with 
the RF.  This column is not included in the default report view. 
Report Byte Count The number of bytes included in a Device Report.  The raw bytes are 
viewable in the Report Bytes column.  This column is not included in 
the default report view. 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
52 

5.4   Requesting RMSA Seal Data 
In Local Host Operation  mode (refer to section 5.2.2) the RMSA Review GUI provides an 
interface to request immediate data from the RMSA seals via Tools->Request Device Data.  
Six types of data request are supported(refer to sections 5.4.1 thru 5.4.5). 
Because the translator cannot access the contents of incoming TLV messages from seals 
(due to encryption), the translator has no way of assigning a particular incoming message to a 
particular request.  A response message will be delivered to the GUI for evaluation of TLV 
contents as with any autonomous SOH or alarm.   
Further, seal response is not guaranteed.  All commands sent to a seal require an 
acknowledgement to the Translator.  If the Translator does not detect an acknowledgement 
within an adequate time period, the request will time out and the translator will retry up to 3 
times.  (Further data requests are locked out until the current data request completes, so a 
finite number of attempts is necessary.)  Data requests can be interrupted by autonomous 
SOH or alarm messages from any seal resulting in a delayed acknowledge for the request.  
Testing has shown that the translator’s three automatic retries are adequate in most cases, but 
occasional misses still happen. 
The GUI operator can watch the main display for the requested report from the seal address 
specified in the request.  If the report from the specified seal does not appear within 15 
seconds, the GUI operator should repeat the request. 
Procedures for each of the three requests are detailed below. 
5.4.1 State of Health (SSOH) Request 
To demand a SOH message from a seal, select Tools->Request Device Data.  The following 
pop-up will appear: 
If necessary, click on the down arrow for the Request Type and select SSOH.  (SSOH is the default 
request type but the GUI will remember the last request type.)  Enter the hexadecimal address of 
the seal (from 1 to FFFFFFFF) in the Seal Address text box then press OK.  Within 15 seconds, a 
SOH report from the specified seal, using the next available message number, should appear in 
the GUI’s main display.   
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
53 

5.4.2 Extended State of Health (ESOH) Request 
For an extended SOH request, enter the hexadecimal seal address (from 1 to FFFFFFFF) and 
use the Request Type down arrow to select ESOH.  The message ID text box is not activated as 
a message number is not required for an ESOH request.  Once the seal address has been 
entered, click OK to continue.  Click Cancel to abort the request. 
Within 15 seconds, an extended SOH report from the specified seal, using the next available 
message number, should appear in the GUI’s main display.  The extended SOH report includes 
entries in the Further Information column for the number of watchdog resets and the transmission 
count for the seal.0 
5.4.3 Send Message (SNDM) Request 
To request a particular archived message, enter the hexadecimal seal address (from 1 to 
FFFFFFFF) and use the Request Type down arrow to select SNDM.  Once the SNDM request 
type is selected, the Message ID text box is activated.  Enter a valid message number for this 
seal as a decimal value.   
Message numbers start with 1.  The maximum valid message number should be available in the 
main display within the most recent autonomous State of Health message. 
Click OK to send the request.  Click Cancel to abort the request. 
Within 15 seconds, the requested message number from the requested seal should appear 
within the GUI window.  Note that in default review mode, messages are sorted chronologically in 
order of the log timestamp on the translator.  Since the translator has no access to the TLV 
contents of the message (due to encryption), it has no way of inserting the data in a day file log 
based on the message number or time it was originally sent.  Therefore, if interrogating a seal 
that has been running for some time for message ID 1, the translator will log the event in the 
current day file, not in the day file of the original transmission attempt. Similarly, the GUI will 
present the new message (Message Number 1) at the end of the currently displayed data set.   
5.4.4 Send Fiber History (HIST) Request 
To request a history of all fiber optic event messages generated (up to a limit of ~383), enter the 
hexadecimal seal address (from 1 to FFFFFFF) and use the Request Type down arrow to select 
HIST. Once the seal address has been entered, click OK to continue.  Click Cancel to abort the 
request. 
Within 15 seconds, a list of the seal’s fiber optic event messages should appear in the GUI’s 
main display. 
5.4.5 Send RMSA To Translator Associate(RTTA) and RMSA To Translator 
Disassociate(RTTD) Request 
The RMSA To Translator Associate (RTTA) and Disassociate (RTTD) commands were created 
for seals that do not provide translator addresses during personality programming.  The address 
of the Translator that is connected to the GUI will be used by the seal after successfully sending 
this message.  Before receiving the RTTA command,  the seal will buffer but not transmit 
messages.  Upon receiving RTTA command, the seal will check a list of all messages buffered 
and send those to the associated translator all at once.  Upon receiving the RTTD command, the 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
54 

seal will once again no longer transmit, but buffer messages in flash memory.  Messages will 
continue being buffered until a new RTTA command is received.  Note that these commands 
only work when translator addresses are not downloaded during personality programming. 
The message number is not required for a RTTA or RTTD command.  Enter the hexadecimal 
seal address (from 1 to FFFFFFFF) then click OK to continue or Cancel to abort the request.  
Within 15 seconds, buffered messages should begin to appear in the GUI’s main display.
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
55 

This page left blank intentionally 
REMOTELY MONITORED SEAL ARRAY(RMSA) 
SFG-MAN-001 
REVISION: 1.7 
2016 CANBERRA 
56