This release has the following requirements.
New DMK requires ControlFLASH® version 15.03 and ControlFLASH Plus™ version 3.01
System Requirement first identified as of Firmware Revision 3.011
Catalog Numbers:
When upgrading to firmware revision 3.011, an alert message may appear as shown.
Click Yes to proceed and the alert no longer appear when updating subsequent adapters.
This release includes the following system features.
Enable or disable web server using the rotary address switches
System Feature first identified as of Firmware Revision 3.011
Catalog Numbers:
To enable the web server, set the rotary address switches to 000 and cycle power to the adapter for the setting to take effect. Then set the switches back to your original value and cycle power to the adapter again.
To disable the web server, set the rotary address switches to 901 and cycle power to the adapter for the setting to take effect. Then set the switches back to your original value and cycle power to the adapter again.
Check status of input channel using I/O status indicators
System Feature first identified as of Firmware Revision 3.011
Catalog Numbers:
With this firmware revision, you can check the status of an input channel regardless of whether the IP address of the module is valid or not.
For example, to check the status of input channel 0, short Pin 1 and Pin 4 of I/O connector 0 and verify that channel 0 status indicator is ON. To check the status of input channel 1, short Pin 1 and Pin 2 of the same I/O connector and verify that channel 1 status indicator is ON.
I/O Connector Pinout Diagram
Repeat these steps to check the status of the rest of the input channels. These instructions apply to all the catalogs.
Implicit Protected Mode
System Feature first identified as of Firmware Revision 3.011
Catalog Numbers:
This release provides security and performance enhancements.
Implicit Protected Mode is a security enhancement in the Adapter level that helps prevent unauthorized configuration changes that can affect system behavior and cause unintended and unforeseen changes.
When the adapter is in Implicit Protected Mode, if you perform any of the restricted tasks, an alert displays to indicate that the task cannot be performed because the adapter is in Implicit Protected Mode. The restricted tasks are:
For more information, see Rockwell Automation Knowledgebase article, “Description of Implicit Protected Mode as a security enhancement for ArmorBlock 2-port EtherNet/IP Modules and ArmorBlock 2-port EtherNet/IP Modules with QuickConnect”, Answer ID IN39401, at rok.auto/knowledgebase.
This release corrects the following anomalies.
Web Server Vulnerability
Known Anomaly first identified as of Firmware Revision 1.015
Anomaly Corrected as of Firmware Revision 3.011
Catalog Numbers:
User can modify the configuration pages of embedded Web server without proper authentication of the requests.
Safety controller cannot re-establish connection with adapter after Ethernet cable break
Known Anomaly first identified as of Firmware Revision 1.015
Anomaly Corrected as of Firmware Revision 3.011
Catalog Numbers:
When the adapter cable connection to the front Ethernet port of a GuardLogix® 5580 controller breaks, the controller is unable to re-establish a connection to the adapter.
Treck “Ripple20” TCP/IP vulnerabilities affect ArmorBlock 2-port EtherNet/IP adapters with QuickConnect
Known Anomaly first identified as of Firmware Revision 1.015
Anomaly Corrected as of Firmware Revision 3.011
Catalog Numbers:
Treck, an embedded Internet Protocol software vendor, has reported some vulnerabilities, named “Ripple20”, to Rockwell Automation.
The ArmorBlock® 2-port EtherNet/IP™ adapters with QuickConnect from Rockwell Automation uses the embedded TCP/IP stack (versions earlier than 6.0.1.66) from Treck. The stack includes vulnerabilities that can be successfully exploited and have considerable negative impacts on an application that uses ArmorBlock 2-port EtherNet/IP adapters with QuickConnect.
We recommend that you evaluate your system and apply appropriate risk mitigations as needed.
For more information, see Rockwell Automation Knowledgebase article, “Treck "Ripple20" TCP/IP Vulnerabilities Affect Multiple Rockwell Automation Products”. The Rockwell Automation Knowledgebase is available at rok.auto/knowledgebase.
This firmware revision results in a slight increase in QuickConnect connection time, but remains well within the EtherNet/IP QuickConnect specification by ODVA, Inc.
This release has the following application notes.
Set adapter to factory default settings after firmware update
After the adapter firmware is updated, we recommend that you first reset the adapter to the factory default settings, then reconfigure the adapter to its previous configuration.
To set to factory default settings, set the rotary address switches to 888 and cycle power to the adapter for the setting to take effect. Then set the switches back to your original value and cycle power to the adapter again.