Release Notes

1732E ArmorBlock I/O 2-Port EtherNet/IP Digital Modules with QuickConnect
Version 3.011 (released 10/2021)

Catalog Number 1732E-16CFGM12QCWR (series A)

These release notes describe version information for 1732E-16CFGM12QCWR, version 3.011 (released 10/2021).

Requirements

This release has the following requirements.

New DMK requires ControlFLASH® version 15.03 and ControlFLASH Plus™ version 3.01

System Requirement first identified as of Firmware Revision 3.011

Catalog Numbers:


When upgrading to firmware revision 3.011, an alert message may appear as shown.

graphic

Click Yes to proceed and the alert no longer appear when updating subsequent adapters.

Features

This release includes the following system features.

Enable or disable web server using the rotary address switches

System Feature first identified as of Firmware Revision 3.011

Catalog Numbers:


To enable the web server, set the rotary address switches to 000 and cycle power to the adapter for the setting to take effect. Then set the switches back to your original value and cycle power to the adapter again.

To disable the web server, set the rotary address switches to 901 and cycle power to the adapter for the setting to take effect. Then set the switches back to your original value and cycle power to the adapter again.

Check status of input channel using I/O status indicators

System Feature first identified as of Firmware Revision 3.011

Catalog Numbers:


With this firmware revision, you can check the status of an input channel regardless of whether the IP address of the module is valid or not.

For example, to check the status of input channel 0, short Pin 1 and Pin 4 of I/O connector 0 and verify that channel 0 status indicator is ON. To check the status of input channel 1, short Pin 1 and Pin 2 of the same I/O connector and verify that channel 1 status indicator is ON.

I/O Connector Pinout Diagram

graphic

Repeat these steps to check the status of the rest of the input channels. These instructions apply to all the catalogs.

Implicit Protected Mode

System Feature first identified as of Firmware Revision 3.011

Catalog Numbers:


This release provides security and performance enhancements.

Implicit Protected Mode is a security enhancement in the Adapter level that helps prevent unauthorized configuration changes that can affect system behavior and cause unintended and unforeseen changes.

When the adapter is in Implicit Protected Mode, if you perform any of the restricted tasks, an alert displays to indicate that the task cannot be performed because the adapter is in Implicit Protected Mode. The restricted tasks are:

For more information, see Rockwell Automation Knowledgebase article, “Description of Implicit Protected Mode as a security enhancement for ArmorBlock 2-port EtherNet/IP Modules and ArmorBlock 2-port EtherNet/IP Modules with QuickConnect”, Answer ID IN39401, at rok.auto/knowledgebase.

Corrected Anomalies in This Release

This release corrects the following anomalies.

Web Server Vulnerability

Known Anomaly first identified as of Firmware Revision 1.015

Anomaly Corrected as of Firmware Revision 3.011

Catalog Numbers:


User can modify the configuration pages of embedded Web server without proper authentication of the requests.

Safety controller cannot re-establish connection with adapter after Ethernet cable break

Known Anomaly first identified as of Firmware Revision 1.015

Anomaly Corrected as of Firmware Revision 3.011

Catalog Numbers:


When the adapter cable connection to the front Ethernet port of a GuardLogix® 5580 controller breaks, the controller is unable to re-establish a connection to the adapter.

Treck “Ripple20” TCP/IP vulnerabilities affect ArmorBlock 2-port EtherNet/IP adapters with QuickConnect

Known Anomaly first identified as of Firmware Revision 1.015

Anomaly Corrected as of Firmware Revision 3.011

Catalog Numbers:


Treck, an embedded Internet Protocol software vendor, has reported some vulnerabilities, named “Ripple20”, to Rockwell Automation.

The ArmorBlock® 2-port EtherNet/IP™ adapters with QuickConnect from Rockwell Automation uses the embedded TCP/IP stack (versions earlier than 6.0.1.66) from Treck. The stack includes vulnerabilities that can be successfully exploited and have considerable negative impacts on an application that uses ArmorBlock 2-port EtherNet/IP adapters with QuickConnect.

We recommend that you evaluate your system and apply appropriate risk mitigations as needed.

For more information, see Rockwell Automation Knowledgebase article, “Treck "Ripple20" TCP/IP Vulnerabilities Affect Multiple Rockwell Automation Products”.  The Rockwell Automation Knowledgebase is available at rok.auto/knowledgebase.

This firmware revision results in a slight increase in QuickConnect connection time, but remains well within the EtherNet/IP QuickConnect specification by ODVA, Inc.

Application Notes

This release has the following application notes.

Set adapter to factory default settings after firmware update

After the adapter firmware is updated, we recommend that you first reset the adapter to the factory default settings, then reconfigure the adapter to its previous configuration.

To set to factory default settings, set the rotary address switches to 888 and cycle power to the adapter for the setting to take effect. Then set the switches back to your original value and cycle power to the adapter again.

Rockwell Automation recognizes that some of the terms that are currently used in our industry and in this publication are not in alignment with the movement toward inclusive language in technology. We are proactively collaborating with industry peers to find alternatives to such terms and making changes to our products and content. Please excuse the use of such terms in our content while we implement these changes.

Copyright © 2025 Rockwell Automation, Inc. All rights reserved.
Rockwell Automation, Allen-Bradley, and FactoryTalk are trademarks of Rockwell Automation, Inc.
To view a complete list of Rockwell Automation trademarks please click here.
Trademarks not belonging to Rockwell Automation are property of their respective companies.