Attention! The cellular router will not operate unless the cellular carrier has been cor-
rectly configured and the account activated and provisioned for data communications.
For UMTS and LTE carriers, a SIM card must be inserted into the router. Do not insert
the SIM card when the router is powered up.
You can monitor the status, configuration and administration of the router via the Web
interface. To access the router over the web interface, enter http://xxx.xxx.xxx.xxx into the
URL for the browser where xxx.xxx.xxx.xxx is the router IP address. The router’s default IP
address is 192.168.1.1. The default username is root and the default password is root.
When you successfully enter login information on the login page, web interface will be
displayed. The left side of the web interface displays the menu. You will find links for the
Status, Configuration, Customization and Administration of the router.
Name and Location displays the router’s name, location and SNMP configuration (see
3.17). These fields are user-defined for each router.
For enhanced security, you should change the default password. If the router’s default
password is set, the menu item Change password is highlighted in red.
If the green LED is blinking, you may restore the router to its factory default settings by
pressing RST on front panel. The configuration will be restored to the factory defaults and the
router will reboot. (The green LED will be on during the reboot.)
1.1Secured access to web configur ation
The Web interface can be accessed through a standard web browser via a secure HTTPS
connection.
Access the web interface by entering https://192.168.1.1 in the web browser. You may
receive a message that there is a problem with the website’s security certificate. If you do,
click on Continue to this website. If you want to prevent this message, you can follow the
procedure described below.
There is the self-signed HTTPS certificate in the router.If you want to use your own
certificate (e.g. in combination with the dynamic DNS service), you need to replace the
/etc/certs/https_cert and /etc/certs/https_key files in the router.
If you decide to use the self-signed certificate in the router to prevent the security message
(domain disagreement) from pop up every time you log into the router, you can take the following steps. Note: You will have to use the domain name based on the MAC address of the
router and it is not guaranteed to work with every combination of an operating system and a
browser.
• Add the DNS record to your DNS system: Edit /etc/hosts (Linux/Unix OS) or
C:\WINDOWS\system32\drivers\etc\hosts (Windows OS) or configure your own DNS
server. Add a new record with the IP address of your router and the domain name
based of the MAC address of the router (MAC address of the first network interface seen
in Network Status in the Web interface of the router.) Use dash separators instead of
colons. Example: A router with the MAC address 00:11:22:33:44:55 will have a domain
name 00-11-22-33-44-55.
• Access the router via the new domain name address (E.g. https://00-11-22-33-44-55).
If you see the security message, add an exception so the next time the message will
not pop up (E.g. in Firefox Web browser). If there is no possibility to add an exception,
export the certificate to the file and import it to your browser or operating system.
You can access a summary of basic router information and its activities by opening the
General page. This page is the default dialog displayed when you login to the device. Information is divided into several sections, based upon the type of router activity or the properties
area: Mobile Connection, Primary LAN, Peripherals Ports and System Information. If your
router is equipped with WIFI expansion port, there is also WIFI section.
2.1.1Mobile Connection
ItemDescription
SIM CardIdentification of the SIM card (Primary or Secondary)
InterfaceDefines the interface
FlagsDisplays network interface flags
IP AddressIP address of the interface
MTUMaximum packet size that the equipment is able to transmit
Rx DataTotal number of received bytes
Rx PacketsReceived packets
Rx ErrorsErroneous received packets
Rx DroppedDropped received packets
Rx OverrunsLost received packets because of overload
Tx DataTotal number of sent bytes
Tx PacketsSent packets
Tx ErrorsErroneous sent packets
Tx DroppedDropped sent packets
Tx OverrunsLost sent packets because of overload
UptimeIndicates how long the connection to the cellular network has
Items displayed in this part have the same meaning as items in the previous part. Moreover, the MAC Address item shows the MAC address of the corresponding router’s interface
(Primary LAN – eth0, Secondary LAN – eth1, WiFi – wlan0). Visible information depends on
configuration (see 3.1 or 3.5).
2.1.3Peripheral Ports
ItemDescription
Expansion Port 1Expansion port fitted to the position 1 (None indicates that this
position is equipped with no port)
Expansion Port 2Expansion port fitted to the position 2 (None indicates that this
position is equipped with no port)
Binary InputState of binary input
Binary OutputState of binary output
Table 2: Peripheral Ports
2.1.4System Information
ItemDescription
Firmware VersionInformation about the firmware version
Serial NumberSerial number of the router (in case of N/A is not available)
ProfileCurrent profile – standard or alternative profiles (profiles are used
for example to switch between different modes of operation)
The XR5i v2 routers do not display the Mobile WAN status option.
The Mobile WAN menu item contains current information about connections to the mobile
network. The first part of this page (Mobile Network Information) displays basic information
about mobile network the router operates in. There is also information about the module,
which is mounted in the router.
ItemDescription
RegistrationState of the network registration
OperatorSpecifies the operator’s network the router operates in
TechnologyTransmission technology
PLMNCode of operator
CellCell the router is connected to
LACLocation Area Code – unique number assigned to each location area
ChannelChannel the router communicates on
Signal StrengthSignal strength of the selected cell
Signal QualitySignal quality of the selected cell:
• EC/IO for UMTS and CDMA (it’s the ratio of the signal received
from the pilot channel – EC – to the overall level of the spectral
density, ie the sum of the signals of other cells – IO)
• RSRQ for LTE technology (Defined as the ratio
• The value is not available for the EDGE technology
CSQCell Signal Quality, relative value is given by RSSI (dBm). 2–9 range
means Marginal, 10–14 range means OK, 15–16 range means Good,
20–30 range means excellent.
NeighboursSignal strength of neighboring hearing cells
ManufacturerModule manufacturer
ModelType of module
RevisionRevision of module
IMEIIMEI (International Mobile Equipment Identity) number of module
ESNESN (Electronic Serial Number) number of module (for CDMA routers)
MEIDMEID number of module
ICCIDIntegrated Circuit Card Identifier is international and unique serial
If a neighboring cell is highlighted in red, there is a risk that the router may repeatedly
switch between the neighboring cell and the primary cell. This can affect the performance of
the router. To prevent this, re-orient the antenna or use a directional antenna.
The next section of this window displays historical information about the quality of the cellular WAN connection during each logging period. The router has standard intervals, such as
the previous 24 hours and last week, and also includes information one user-defined interval.
PeriodDescription
TodayToday from 0:00 to 23:59
YesterdayYesterday from 0:00 to 23:59
This weekThis week from Monday 0:00 to Sunday 23:59
Last weekLast week from Monday 0:00 to Sunday 23:59
This periodThis accounting period
Last periodLast accounting period
Table 5: Description of Periods
ItemDescription
Signal MinMinimal signal strength
Signal AvgAverage signal strength
Signal MaxMaximal signal strength
CellsNumber of switch between cells
AvailabilityAvailability of the router via the mobile network (expressed as a percent-
age)
Table 6: Mobile Network Statistics
Tips for Mobile Network Statistics table:
• Availability is expressed as a percentage. It is the ratio of time connection to the mobile
network has been established to the time that router has been is turned on.
• Placing your cursor over the maximum or minimum signal strength will display the last
time the router reached that signal strength.
To view information about the interfaces and the routing table, open the Network item in
the Status menu. The upper part of the window displays detailed information about the active
interfaces only:
You may view the status of the mobile network connection on the network status screen.
If the connection to the mobile network is active, it will appear in the system information as an
usb0 interface. The Route Table is displayed at the bottom.
For the XR5i v2 routers, interface ppp0 indicates the PPPoE connection.
• packets – transmit packets
• errors – number of errors
• dropped – dropped packets
• overruns – outgoing packets lost because of overload
• carrier – wrong outgoing packets with errors resulting from the
physical layer
Table 12: Description of Information in Network Status
Information about the DHCP server activity is accessible via DHCP item. The DHCP server
provides automatic configuration of the client devices connected to the router. The DHCP
server assigns each device an IP address, subnet mask, default gateway (IP address of router)
and DNS server (IP address of router).
For each client in the list, the DHCP status window displays the following information.
ItemDescription
leaseAssigned IP address
startsTime that the IP address was assigned
endsTime that the IP address lease expires
hardware ethernetUnique hardware MAC address
uidUnique ID
client-hostnameHost computer name
Table 13: DHCP Status Description
The DHCP status may occasionally display two records for one IP address. This may be
caused by resetting the client network interface.
Figure 6: DHCP Status
Note: Records in the DHCP Status window are divided into two separate parts – Active DHCPLeases (Primary LAN) and Active DHCP Leases (WLAN).
Selecting the IPsec option in the status menu of the web page will bring up the information
for any IPsec Tunnels that have been established. If the tunnel has been built correctly, the
screen will display IPsec SA established (highlighted in red in the figure below.)
Figure 7: IPsec Status
2.8DynDNS Status
The router supports DynamicDNS using a DNS server on www.dyndns.org. If Dynamic
DNS is configured, the status can be displayed by selecting menu option DynDNS. Refer to
www.dyndns.org for more information on how to configure a Dynamic DNS client.
You can use the following servers for the Dynamic DNS service:
When the router detects a DynDNS record update, the dialog displays one or more of the
following messages:
• DynDNS client is disabled.
• Invalid username or password.
• Specified hostname doesn’t exist.
• Invalid hostname format.
• Hostname exists, but not under specified username.
• No update performed yet.
• DynDNS record is already up to date.
• DynDNS record successfully update.
• DNS error encountered.
• DynDNS server failure.
The router’s SIM card must have public IP address assigned or DynDNS will not function
correctly.
2.9System Log
If there are any connection problems you may view the system log by selecting the System
Log menu item. Detailed repor ts from individual applications running in the router will be dis-
played. Use the Save Log button to save the system log to a connected computer. (It will be
saved as a text file with the .log extension.) The Save Report button is used for creating detailed reports. (It will be saved as a text file with the .txt extension. The file will include statistical
data, routing and process tables, system log, and configuration.)
The default length of the system log is 1000 lines. After reaching 1000 lines a new file is
created for storing the system log. After completion of 1000 lines in the second file, the first
file is overwritten with a new file.
The Syslogd program will output the system log. It can be started with two options to modify
its behavior. Option "-S" followed by decimal number sets the maximal number of lines in one
log file. Option "-R" followed by hostname or IP address enables logging to a remote syslog
daemon. (If the remote syslog deamon is Linux OS, there has to be remote logging enabled
(typically running "syslogd -R"). If it’s the Windows OS, there has to be syslog server installed,
e.g. Syslog Watcher). To start syslogd with these options, the "/etc/init.d/syslog" script can
be modified via SSH or lines can be added into Startup Script (accessible in Configuration
section) according to figure 10.
To enter the Local Area Network configuration, select the LAN menu item in the Configuration section. The Primary LAN subitem is for the router’s main Ethernet interface (ETH). Ifthe router has additional Ethernet ports (PORT1 or PORT2), they are configured using the
Secondary LAN subitem. For routers with two additional Ethernet ports, PORT1 and PORT2
are automatically bridged together.
ItemDescription
DHCP ClientEnables/disables the DHCP client function.
• disabled – The router does not allow automatic allocation IP ad-
dress from a DHCP server in LAN network.
• enabled – The router allows automatic allocation IP address from
a DHCP server in LAN network.
IP addressSpecifies a fixed set of IP addresses for the network interfaces ETH.
Subnet MaskSpecifies a Subnet Mask for the IP address.
BridgedActivates/deactivates the bridging function on the router.
• no – The bridging function is inactive (default).
• yes – The bridging function is active.
Media typeSpecifies the type of duplex and speed used in the network.
• Auto-negation – The router automatically sets the best speed
and duplex mode of communication according to the network’s
possibilities.
• 100 Mbps Full Duplex – The router communicates at 100Mbps,
in the full duplex mode.
• 100 Mbps Half Duplex – The router communicates at 100Mbps,
in the half duplex mode.
• 10 Mbps Full Duplex – The router communicates at 10Mbps, in
the full duplex mode.
• 10 Mbps Half Duplex – The router communicates at 10Mbps, in
the half duplex mode.
Default GatewaySpecifies the IP address of default gateway. When entering the IP
address of default gateway, every packet for which the destination IP
address was not found in the routing table, is sent to this IP address.
DNS serverSpecifies the IP address of the DNS server. When the IP address is not
found the Routing Table, the router forwards an IP address requests to
the DNS server.
Table 14: Configuration of the Network Interface
The router considers the last address in the network range to be broadcast address,
regardless of the address is set as a broadcast or not. Connection (ping) to the broadcast
address does not work.
The Default Gateway and DNS Server items are only used if the DHCP Client item is set
to disabled and if the Primary or Secondary LAN is selected by the Backup Routes system
as the default route. (The selection algorithm is described in section 3.7). Since FW 5.3.0,
Default Gateway and DNS Server are also supported on bridged interfaces (e.g. eth0 + eth1).
Only one bridge can be active on the router. The Only DHCP Client, IP Address and SubnetMask parameters are used to configure the bridge. Primary LAN has higher priority when both
interfaces (eth0, eth1) are added to the bridge. Other interfaces (wlan0 – wifi) can be added to
or deleted from an existing bridge at any time. The bridge can be created on demand for such
interfaces, but not if it is configured by their respective parameters.
The DHCP server assigns the IP address, gateway IP address (IP address of the router)
and IP address of the DNS server (IP address of the router) to the connected clients. If these
values are filled in by the user in the configuration form, they will be preferred.
The DHCP server supports static and dynamic assignment of IP addresses. DynamicDHCP assigns clients IP addresses from a defined address space. Static DHCP assigns IP
addresses that correspond to the MAC addresses of connected clients.
ItemDescription
Enable dynamic
DHCP leases
IP Pool StartStarting IP addresses allocated to the DHCP clients.
IP Pool EndEnd of IP addresses allocated to the DHCP clients.
Lease timeTime in seconds that the IP address is reserved before it can be re-
Select this option to enable a dynamic DHCP server.
Do not to overlap ranges of static allocated IP addresses with addresses allocated by the
dynamic DHCP server. IP address conflicts and incorrect network function can occur if
you overlap the ranges.
Example 1: Configure the network interface to connect to a dynamic DHCP server:
• The range of dynamic allocated addresses is from 192.168.1.2 to 192.168.1.4.
• The address is allocated 600 second (10 minutes).
Figure 11: Example 1 – Network Topology for Dynamic DHCP Server
Select this option to enable a static DHCP server.
Select the VRRP menu item to enter the VRRP configuration. VRRP protocol (Virtual
Router Redundancy Protocol) allows you to transfer packet routing from the main router to
a backup router in case the main router fails. (This can be used to provide a wireless cellular
backup to a primary wired router in critical applications.) If the Enable VRRP is checked, you
may set the following parameters.
ItemDescription
Virtual Server IP AddressThis parameter sets the virtual server IP address. This ad-
dress must be the same for both the primary and backup
routers. Devices on the LAN will use this address as their
default gateway IP address.
Virtual Server IDThis parameter distinguishes one virtual router on the net-
work from another. The main and backup routers must use
the same value for this parameter.
Host PriorityThe active router with highest priority set by the parameter
Host Pr iority, is the main router. According to RFC 2338, the
main router should have the highest possible priority – 255.
The backup router(s) have a priority in the range 1 – 254
(default value is 100). A priority value of 0 is not allowed.
Table 17: VRRP configuration
You may set the Check connection flag in the second part of the window to enable automatic test messages for the cellular network. In some cases, the mobile WAN connection
could still be active but the router will not be able to send data over the cellular network. This
feature is used to verify that data can be sent over the PPP connection and supplements
the normal VRRP message handling. The currently active router (main/backup) will send test
messages to the defined Ping IP Address at periodic time intervals (Ping Interval) and wait for
a reply (Ping Timeout). If the router does not receive a response to the Ping command, it will
retry up to the number of times specified by the Ping Probes parameter. After that time, it will
switch itself to a backup router until the PPP connection is restored.
ItemDescription
Ping IP AddressDestinations IP address for the Ping commands. IP Address can
not be specified as a domain name.
Ping IntervalInterval in seconds between the outgoing Pings.
Ping TimeoutTime in seconds to wait for a response to the Ping.
Ping ProbesMaximum number of failed ping requests.
Table 18: Check connection
You may use the DNS server of the mobile carrier as the destination IP address for the test
messages (Pings).
The Enable traffic monitoring option can be used to reduce the number of messages that
are sent to test the PPP connection. When this parameter is set, the router will monitor the
interface for any packets different from a ping. If a response to the packet is received within the
timeout specified by the Ping Timeout parameter, then the router knows that the connection is
still active. If the router does not receive a response within the timeout period, it will attempt to
test the mobile WAN connection using standard Ping commands.
Example of the VRRP protocol:
Figure 17: Topology of VRRP configuration example
Figure 18: Example of VRRP configuration – main router
The XR5i v2 routers do not display the Mobile WAN configuration option.
Select the Mobile WAN item in the Configuration menu section to enter the cellular network
configuration page.
3.3.1Connection to Mobile Network
If you mark the Create connection to mobile network checkbox, then the router automatically attempts to establish a connection after booting up. You can specify the following parameters for each SIM card separately, or to toggle between the SIM cards, specify two different
APNs.
ItemDescription
APNNetwork identifier (Access Point Name)
UsernameUser name for logging into the GSM network
PasswordPassword for logging into the GSM network
AuthenticationAuthentication protocol in the GSM network:
• PAP or CHAP – The router selects the authentication method.
• PAP – The router uses the PAP authentication method.
• C HAP – The router uses the CHAP authentication method.
IP AddressSpecifies the IP address of SIM card. You manually enter the IP ad-
dress, only when mobile network car rier assigned the IP address.
Phone NumberSpecifies the telephone number the router dials for a GPRS or CSD
connection. The router uses a default telephone number *99***1 #.
OperatorSpecifies the carrier code. You can specify the parameter as the PLNM
preferred carrier code.
Network typeSpecifies the type of protocol used in the mobile network.
• Automatic selection – The router automatically selects the trans-
mission method according to the availability of transmission technology.
• Furthermore, according to the type of router – It’s also possible to
select a specific method of data transmission (GPRS, UMTS, . . . )
PINSpecifies the PIN used to unlock the SIM card. Use a PIN parameter
only if the network requires a SIM card router. The SIM card is blocked
after several failed attempts to enter the PIN.
MRUSpecifies the Maximum Receive Unit which is the maximum size of a
packet that the router can receive in a given environment. The default
value is 1500 B. Other settings can cause the router to incorrectly transmit data.
MTUSpecifies the Maximum Transmission Unit which is the maximum size
of a packet that the router can transmit in a given environment. The default value is 1500 B. Other settings can cause the router to incorrectly
transmit data.
Table 19: Mobile WAN Connection Configuration
The following list contains tips for working with the Mobile WAN configuration form:
• If the MTU size is set incorrectly, then the router does not exceed the data transfer. When
you set the MTU value low, more frequent fragmentation of data occurs. More frequent
fragmentation means a higher overhead and also the possibility of packet damage during
defragmentation. On the contrary, a higher MTU value can cause the network to drop
the packet.
• If the IP address field is left blank, when the router establishes a connection, then the
mobile network carrier automatically assigns an IP address. If you assign an IP address,
then the router accesses the network quicker.
• If the APN field is left blank, then the router automatically selects the APN using the IMSI
code of the SIM card. If the PLMN (operator number format) is not in the APN list, then
the router uses the default APN "internet". The mobile network carrier defines the APN.
• If you enter the word blank in the APN field, then the router interprets the APN as blank.
ATTENTION:
• If only one SIM card is installed in the router (or the router has one only one
SIM card slot), the router switches between the APN options. A router with
two SIM cards switches between SIM cards.
• The correct PIN must be filled in. SIM cards with two APNs will use the same
PIN for both APNs. An incorrect PIN can block the SIM card.
Parameters identified with an asterisk require you to enter the appropriate information only
if this information is required by the mobile network carrier.
When the router is unsuccessful in establishing a connection to mobile network, verify
accuracy of the entered data. Alternatively, you can try a different authentication method or
network type.
3.3.2DNS Address Configuration
The DNS Settings parameter is designed for easier configuration on the client side. When
you set the value to get from opertor the router attempts to automatically obtain an IP address
from the primary and secondary DNS server of the mobile network carrier. To specify the IP
addresses of the Primary DNS servers manually, from the DNS Server pull down list, select
the value set manually.
3.3.3Check Connection to Mobile Network Configuration
If the Check Connection item is set to enabled or enabled + bind, it activates checking
the connection to the mobile network. The router will automatically send ping requests to the
specified domain or IP address (Ping IP Address item) at regular time intervals (Ping Interval).
In case of unsuccessful ping, a new one will be sent after ten seconds. If it fails to ping the IP
address three times in a row, the router terminates the current connection and tries to establish
new ones. Checking can be set separately for two SIM cards or two APNs. Send an IMCP to
an IP address that you know is still functional. (The operator’s DNS server, for example.)
If the Check Connection item is set to the enabled option, ping requests are sent on the
basis of routing table. Thus, the requests may be sent through any available interface. If you
require each ping request to be sent through the network interface, which was created when
establishing a connection to the mobile operator, it is necessary to set the Check Connection
item to enabled + bind. The disabled option deactivates checking the connection to the mobile
network.
ItemDescription
Ping IP AddressSpecifies the destination IP address or domain name for ping
queries.
Ping IntervalSpecifies the time intervals between the outgoing pings.
Table 20: Check Connection to Mobile Network Configuration
If you mark the Enable Traffic Monitoring checkbox, then the router stops sending ping
request to the Ping IP Address and it monitors the data stream on the connection to mobile
network. If this connection is without data longer than the Ping Interval, then the router sends
a ping request to the Ping IP Address.
Enabling the Check Connection function for mobile networks is necessary for uninterrupted and lasting operation of the router.
Data limitSpecifies the maximum expected amount of data transmitted (sent
and received) over GPRS in one billing period (month).
Warning ThresholdSpecifies the percentage of the "Data Limit" in the range of 50 % to
99 %. If the data limit is exceeded, the router sends an SMS in the
following form Router has exceeded (value of Warning Threshold)
of data limit.
Accounting StartSpecifies the day of the month in which the billing cycle starts for
the SIM card used. When the service provider that issued the SIM
card specifies the start billing period, the router begins to count
the amount of transferred data starting on this day.
Table 21: Data Limit Configuration
If the parameters Switch to backup SIM card when data limit is exceeded and switch to default
SIM card when data limit isn’t exceeded (see next subsection) or Send SMS when data limit
is exceeded (see SMS configuration) are not selected, the data limit will be ignored.
3.3.5Switch between SIM Cards Configuration
At the bottom of this configuration form you can specify the rules for toggling between the
two APNs, a single SIM card, or between the two SIM cards if you have inserted two SIM
cards. The router can automatically toggle between the network setups in the following cases:
• the active connection to mobile network is lost,
• the data limit is exceeded,
• the binary input on the front panel is activated.
ItemDescription
Default SIM cardSpecifies the default APN or SIM card. The router attempts to es-
tablish a connection to mobile network using the default. If you
specify this parameter as none, then the router boots up in the
off line mode and it is necessary to establish a connection to the
mobile network using an SMS message.
Backup SIM cardSpecifies the backup APN or SIM card.
If you select none from the Backup SIM card drop down list, then the following parameters
cause the router to go into the of f line mode:
• Switch to other SIM card when connection fails,
• Switch to backup SIM card when roaming is detected and switch to default SIM card
when home network is detected,
• Switch to backup SIM card when data limit is exceeded and switch to default SIM card
when data limit isn’t exceeded.
ItemDescription
Switch to other SIM card when
connection fails
Switch to backup SIM card when
roaming is detected and switch
to default SIM card when home
network is detected
Switch to backup SIM card when
data limit is exceeded and switch
to default SIM card when data
limit isn’t exceeded
Switch to backup SIM card when
binary input is active switch to
default SIM card when binary input isn’t active
Switch to default SIM card after
timeout
Table 23: Switch between SIM Card Configurations
If the connection to mobile network fails, the router will
switch to the secondary SIM card or secondary APN
of the SIM card. The router will switch to the backup
SIM card if the router is unable to establish a connection to mobile network after 3 attempts or the Check
the connection to mobile network option is selected
and the router detects that the connection to mobile
network has failed.
If roaming is detected, this option forces the router to
switch to the secondary SIM card or secondary APN
of the SIM card. If the home network is detected, this
option enables switching back to the default SIM card.
For proper operation, it is necessary to enable
roaming on your SIM card!
This option enables the router to switch to the secondary SIM card or secondary APN of the SIM card
when the data limit of default APN is exceeded. This
option also enables switching back to default SIM
card, when data limit is not exceeded.
This parameter forces the router to switch to the secondary SIM card or secondary APN of the SIM card
when binary input ’bin0’ is active. If the binary input
isn’t active, this option enables switching back to the
default SIM card.
This parameter defines the method the router will use
to try to switch back to the default SIM card or default APN. This parameter defines the method, how
the router will try to switch back to default SIM card or
default APN.
The following parameters specifies the length of time that the router waits before attempting
to change back to the default SIM card or APN.
ItemDescription
Initial timeoutSpecifies the length of time that the router waits before the first
attempt to change back to the primary SIM card or APN, the range
of this parameter is from 1 to 10000 minutes.
Subsequent TimeoutSpecifies the length of time that the router waits after an unsuc-
cessful attempt to change to the default SIM card, the range is
from 1 to 10000 min.
Additive constantsSpecifies the length of time that the router waits for any further
attempts to change back to the primary SIM card or APN. The
length time is the sum of the time specified in the "Subsequent
Timeout" parameter and the time specified in this parameter, the
range is from 1 to 10000 minutes.
Table 24: Timeout Configuration
Example:
If you mark the Switch to default SIM card after timeout check box, and you enter the following
values:
• Initial Timeout – 60 min,
• Subsequent Timeout – 30 min,
• Additional Timeout – 20 min.
The first attempt to change to the primary SIM card or APN is carried out after 60 minutes.
When the first attempt fails, a second attempt is made after 30 minutes. A third attempt is
made after 50 minutes (30+20). A fourth attempt is made after 70 minutes (30+20+20).
Dial-In access configuration is supported for these routers only: ER75i, UR5, ER75i v2
and UR5 v2.
You may define access over CSD connection by selecting the Enable Dial-In Access function. Access can be secured by using the Username and Password. If the router does not have
a connection to a mobile network, you may use this function to gain access to the router via
dial-up connections. The router waits two minutes to accept connections. If no one logs on
during this time the router will make another attempt to establish a GPRS connection.
ItemDescription
UsernameUser name for secured Dial-In access.
PasswordPassword for secured Dial-In access.
Table 25: Dial-In access configuration
3.3.7PPPoE Bridge Mode Configuration
If you mark the Enable PPPoE bridge mode check box, the router activates the PPPoE
bridge protocol. PPPoE (point-to-point over ethernet) is a network protocol for encapsulating
Point-to-Point Protocol (PPP) frames inside Ethernet frames. The bridge mode allows you to
create a PPPoE connection from a device behind the router. For example, a PC connected to
the ETH port of the router. You assign the IP address of the SIM card to the PC.
The changes in settings will apply after clicking the Apply button.
Example 1:The figure below displays the following scenario: the connection to the mobile
network is controlled on the address 8.8.8.8 with the time interval of 60 seconds for the primary SIM card and on the address www.google.com with the time interval 80 seconds for the
secondary SIM card. In the case of data stream on the router, the control pings are not sent,
but the data stream is monitored.
Figure 21: Example 1 – Mobile WAN Configuration
Example 2: The following configuration illustrates a scenario in which the router changes to
a backup SIM card after exceeding the data limits of 800MB. The router sends a warning SMS
upon reaching 400MB. The accounting period starts on the 18th day of the month.
Figure 22: Example 2 – Mobile WAN Configuration
Example 3:The Primary SIM card changes to the off line mode after the router detects
roaming. The first attempt to change back to the default SIM card is executed after 60 minutes,
the second attempt is executed after 40 minutes, the third attempt is executed after 50 minutes
(40+10).
PPPoE (Point-to-Point over Ethernet) is a network protocol which encapsulates PPPoE
frames into Ethernet frames. The router uses the PPPoE client to connect to devices supporting a PPPoE bridge or server. The bridge or ser ver is typically an ADSL router.
To open the PPPoE Configuration page, select the PPPoE menu item. If you mark the
Create PPPoE connection check box, then the router attempts to establish a PPPoE connection after boot up. After connecting, the router obtains the IP address of the device to which
it is connected. The communications from a device behind the PPPoE server is forwarded to
the router.
ItemDescription
UsernameUsername for secure access to PPPoE
PasswordPassword for secure access to PPPoE
AuthenticationAuthentication protocol in GSM network
• PAP or CHAP – The router selects the authentication method.
• PAP – The router uses the PAP authentication method.
• C HAP – The router uses the CHAP authentication method.
MRUSpecifies the Maximum Receiving Unit. The MRU identifies the max-
imum packet size, that the router can receive in a given environment. The default value is 1492 bytes. Other settings can cause incorrect data transmission.
MTUSpecifies the Maximum Transmission Unit. The MTU identifies the
maximum packet size, that the router can transfer in a given environment. The default value is 1492 bytes. Other settings can cause
incorrect data transmission.
Table 26: PPPoE configuration
Figure 24: PPPoE configuration
Setting a bad packet size value (MRU, MTU) can cause unsuccessful transmission.
This item is available only if the router is equipped with a WiFi module.
Configure the WiFi network by selecting the WiFi item in the main menu of the router web
interface. Activate WiFi by selecting Enable WiFi at the top of the form. You may also set the
following properties:
ItemDescription
Operating modeWiFi operating mode:
• access point (AP) – The router becomes an access point to
which other devices in station (STA) mode can connect.
• st ation (STA) – The router becomes a client station. It receives
data packets from the available access point (AP) and sends
data from cable connection via the WiFi network.
SSIDUnique identifier of WiFi network.
Broadcast SSIDMethod of broadcasting the unique identifier of SSID network in bea-
con frame and type of response to a request for sending the beacon
frame.
• Enabled – SSID is broadcasted in beacon frame
• Zero length – Beacon frame does not include SSID. Requests
for sending beacon frame are ignored.
• Clear – All SSID characters in beacon frames are replaced by
0. Original length is kept. Requests for sending beacon frames
are ignored.
Probe Hidden
SSID
Country CodeCode of the country where the router is installed. This code must be
Probes hidden SSID (only for station (STA) mode)
entered in ISO 3166-1 alpha-2 format. If a country code isn’t specified
and the router has not implemented a system to determine this code,
it will use "US" as the default country code.
If no country code is specified or if the wrong country code is entered,
then the router violate country-specific regulations for the use of the
WiFi frequency bands.
HW ModeHW mode of WiFi standard that will be supported by WiFi access
point.
• IEE 802.11b
• IEE 802.11b+g
• IEE 802.11b+g+n
• IEE 802.11a
• IEE 802.11a+n
ChannelThe channel, where the WiFi AP is transmitting.
BW 40 MHzThe option for HW mode 802.11n which allows transmission on two
standard 20 MHz channels simultaneously. The option is also available in the STA mode and it has to be enabled in both the AP and the
STA mode if using the high throughput mode.
WMMBasic QoS for WiFi networks is enabled by checking this item. This
version doesn’t guarantee network throughput. It is suitable for simple applications that require QoS.
AuthenticationAccess control and authorization of users in the WiFi network.
• Open – Authentication is not required (free access point).
• Shar ed – Base authentication using WEP key.
• WPA-PSK – Authentication using better authentication meth-
ods PSK-PSK.
• WPA2-PSK – WPA -PSK using new encryption AES.
EncryptionType of data encryption in the WiFi network:
• None – No data encryption.
• WEP – Encryption using static WEP keys. This encryption can
be used for Shared authentication.
• TKIP – Dynamic encryption key management that can be used
for WPA-PSK and WPA2-PSK authentication.
• AES – Improved encryption used for WPA2-PSK authentica-
tion.
This item is available only if the router is equipped with a WiFi module.
The WiFi LAN and DHCP server page is displayed by selecting WLAN in the configuration
section. You will then be able to set the following properties (see table below). Use the EnableWLAN interface check box at the top of this form to enable WiFi LAN interface.
ItemDescription
Operating ModeWiFi operating mode:
• access point (AP) – The router becomes an access point
to which other devices in station (STA) mode can be con-
nected.
• st ation (STA) – Router becomes a client station. It will re-
ceive data packets from the available access point (AP) and
send data from cable connection via the WiFi network.
DHCP ClientActivates/deactivates DHCP client.
IP AddressFixed set IP address of WiFi network interface.
Subnet MaskSubnet mask of WiFi network interface.
BridgedActivates bridge mode:
• no – Bridged mode is not allowed (default value). WLAN
network is not connected with LAN network of the router.
• yes – Bridged mode is allowed. WLAN network is connected
with one or more LAN networks of the router. In this case,
the setting of most items in this table are ignored. Instead,
the router uses the settings of the selected network interface
(LAN).
Default GatewayIP address of the default gateway. When entering the IP address
of the default gateway, all packets for which the record was not
found in the routing table will be sent to this address.
DNS ServerAddress to which all DNS queries are forwarded.
By using the configuration form on the Backup Routes page, you can back up the primary connection with alternative connections to the Internet/mobile network. Each backup
connection can be assigned a priority. Switching between connections is done based upon
set priorities and the state of the connections (for Primar y LAN and Secondary LAN).
If the Enable backup routes switching option is checked, the default route is selected according to the settings in the chart below. (Options include Enable backup routes switching for
Mobile WAN, Enable backup routes switching for PPPoE, Enable backup routes switching for
WiFi STA, Enable backup routes switching for Primary LAN or Enable backup routes switching
for Secondary LAN.)
Network interfaces belonging to individual backup routes should display a flag that says
they are RUNNING. This check fixes, for example, the disconnection of an Ethernet cable.
Attention! If you want to use a mobile WAN connection as a backup route, then mark
the Check Connection check box, and on the Mobile WAN page, select the enable + bind
option, see chapter 3.3.1.
If you unmark the Enable backup routes switching check box, the backup routes system
operates in the backward compatibility mode. The router selects the default route based on
implicit priorities of the enabled settings for each of the network interfaces, as the case may
be enabling services that set these network interfaces. The following list contains the names
of backup routes and corresponding network interfaces in order of implicit priorities:
• Mobile WAN (pppX, usbX)
• PPPoE (ppp0)
• WiFi STA (wlan0)
• Secondary LAN (eth1)
• Primary LAN (eth0)
Example: The router selects the Secondary LAN as the default route only if you unmark the
Create connection to mobile network check box on the Mobile WAN page. Alternatively, if youunmark the Create PPPoE connection check box on the PPPoE page. To select the Primary
LAN, delete the IP address for the Secondary LAN and disabled the DHCP Client for the
Secondary LAN.
ItemDescription
PriorityPrior ity for the type of connection.
Ping IP AddressDestination IP address of ping queries to check the connection.
(The address can not be specified as a domain name.)
Ping IntervalThe time intervals between consecutive ping queries.
Table 30: Backup Routes
All changes in settings will be applied after pressing the Apply button.
The first security element which incoming packets pass is a check of the enabled source
IP addresses and destination ports. You can specify the IP addresses as an IP address from
which you can remotely access the router and the internal network connected behind a router.
To enable this function, marking the Enable filtering of incoming packets check box located
at the top of the Firewall Configuration page. Accessibility is checked against the IP address
table. This means that access is permitted only to addresses specified in the table. It is possible to specify up to eight remote IP addresses for access. You can specify the following
parameters:
ItemDescription
SourceIP address from which access to the router is allowed.
ProtocolSpecifies the protocol used for remote access:
• all – Access for all protocols is active.
• TCP – Access for the TCP protocol is active.
• UDP – Access for the UDP protocol is active.
• ICMP – Access for the ICMP protocol is active.
Target PortThe port number on which access to the router is allowed.
ActionSpecifies the type of action the router performs:
• allow – The router allows the packets to enter the network.
• deny – The router denies the packets from entering the network
Table 31: Filtering of Incoming Packets
The next section of the configuration form specifies the forwarding policy. If you unmark
the Enabled filtering of forwarded packets check box, then packets are automatically accepted.
If you activate this function, and a packet is addressed to another network interface, then the
router sends the packet to the FORWARD chain. When the FORWARD chain accepts the
packet and there is a rule for forwarding it, the router sends the packet. If a forwarding rule is
unavailable, then the router drops the packet.
This configuration form also contains a table for specifying the filter rules. It is possible
to create a rule to allow data with the selected protocol by specifying only the protocol, or to
create stricter rules by specifying values for source IP addresses, destination IP addresses,
and ports.
SourceIP address from which access to the router is allowed.
DestinationIP address of destination device.
ProtocolSpecifies the protocol used for remote access:
• all – Access for all protocols is active.
• TCP – Access for the TCP protocol is active.
• UDP – Access for the UDP protocol is active.
• ICMP – Access for the ICMP protocol is active.
Target PortSpecifies the port number on which access to the router is allowed.
ActionSpecifies the type of action the router performs:
• allow – The router allows the packets to enter the network.
• deny – The router denies the packets from entering the net-
work.
Table 32: Forwarding filtering
When you enable the Enable filtering of locally destined packets function, the router drops
receives packets requesting an unsupported service. The packet is dropped automatically
without any information.
As a protection against DoS attacks, the Enable protection against DoS attacks limits the
number of allowed connections per second to five. The DoS attac k floods the target system
with meaningless requirements.
To configure the address translation function, open the NAT Configuration page, click on
NAT in the Configuration section of the main menu. The router actually uses Port Address
Translation (PAT), which is a method of mapping a TCP/UDP port to another TCP/UDP port.
The router modifies the information in the packet header as the packets traverse a router. This
configuration form allows you to specify up to 16 PAT rules.
ItemDescription
Public PortPublic port
Private PortPrivate port
TypeProtocol type
Server IP addressIP address where the router forwards incoming data.
Table 33: NAT Configuration
If you require more than sixteen NAT rules, then insert the remaining rules into the start
up script. The Startup Script dialog is located in the Configuration section of the main menu.
When creating your rules in the start up script, use the following format:
Enter the IP address [IPADDR], the public ports numbers [PORT_PUBLIC], and private
[PORT_PRIVATE] in square bracket.
You use the following parameters to set the routing of incoming data from the PPP to a
connected computer.
ItemDescription
Send all remaining incoming
packets to default server
Default Server IP AddressSpecified the IP address for the default server.
Table 34: Configuration of send all incoming packets
Activates/deactivates forwarding unmatched incoming
packets to the default server. The prerequisite for the
function is that you specify a default server in the DefaultServer IP Address field. The router can forward incoming data from a GPRS to a computer with the assigned
IP address.
It is important to mark the Send all remaining incoming packets to default server check box
for this configuration. The IP address in this example is the address of the device behind the
router. The default gateway of the devices in the subnetwork connected to router is the same
IP address as displayed in the Default Server IP Address field. The connected device replies
if a PING is sent to the IP address of the SIM card.
In this example there is additional equipment connected behind the router, using a Switch.
Every device connected behind the router has its own IP address. This is the address to enter
in the Server IP Address field in the NAT configuration. All of these devices will be communicating on port 80, but you can configure the Port Forwarding in the NAT configuration PublicPort and Private Port fields. It is now configured to access 192.168.1.2:80 socket behind the
router when accessing 10.0.0.1:81 from the Internet, and so on. If you send the ping request to
the public IP address of the router (10.0.0.1), the router will respond as usual (not forwarding).
If you access the IP address 10.0.0.1 in the browser (it is port 80), nothing will happen – Port
80 in the Public Port list is not defined, and you have not checked the Enable remote HTTPaccess on port 80. And since the Send all remaining incoming packets to default server is not
enabled, the attempt to connect will fail.
Select the OpenVPN item to configure an OpenVPN tunnel. The OpenVPN tunnel function
allows you to create a secure connection between two separate LAN networks. The router
allows you to create up to four OpenVPN tunnels.
ItemDescription
CreateActivates/deactivates the individual tunnel configurations.
DescriptionDisplays the name of the tunnel specified in the configuration form.
EditOpens the OpenVPN tunnel configuration form.
Table 36: OpenVPN Tunnels Overview
Figure 35: OpenVPN Tunnels List
ItemDescription
DescriptionSpecifies the description or name of tunnel.
ProtocolSpecifies the communication protocol.
• UDP – The OpenVPN communicates using UDP.
• TCP server – The OpenVPN communicates using TCP in
server mode.
• TCP client – The OpenVPN communicates using TCP in
client mode.
UDP/TCP portSpecifies the port of the relevant protocol (UDP or TCP).
Remote IP AddressSpecifies the IP address of opposite tunnel side. You can also
use the domain name.
Remote SubnetSpecifies the IP address of a network behind opposite side of the
tunnel.
Remote Subnet MaskSpecifies the subnet mask of a network behind opposite side of
Redirect GatewayActivates/deactivates redirection of data on Layer 2.
Local Interface IP
Address
Remote Interface
IP Address
Ping IntervalSpecifies the time interval after which the router sends a mes-
Ping TimeoutSpecifies the time interval during which the router waits for a
Renegotiate IntervalSpecifies the renegotiate period (reauthorization) of the Open-
Max Fragment SizeMaximum size of a sent packet.
CompressionCompression of the data sent:
NAT RulesActivates/deactivates the NAT rules for the OpenVPN tunnel:
Specifies the IP address of a local interface.
Specifies the IP address of the interface of opposite side of the
tunnel.
sage to opposite side of tunnel to verify the existence of the tunnel.
message sent by the opposite side. For proper verification of the
OpenVPN tunnel, set the Ping Timeout to greater than the PingInterval.
VPN tunnel. You can only set this parameter when the Authen-ticate Mode is set to username/password or X.509 certificate.
After this time period, the router changes the tunnel encryption
to help provide the continues safety of the tunnel.
• none – No compression is used.
• LZO – A lossless compression is used, use the same set-
ting on both sides of the tunnel.
• not applied – NAT rules are not applied to the OpenVPN
tunnel.
• applied – NAT rules are applied to the OpenVPN tunnel.
Authenticate ModeSpecifies the authentication mode:
• none – No authentication is set.
• Pre-shared secret – Specifies the shared key function for
both sides of the tunnel.
• Username/password – Specifies authentication using a
CA Certificate, Username and Password.
• X.509 Certificate (multiclient) – Activates the X.509 au-
thentication in multi-client mode.
• X.509 Certificate (client) – Activates the X.509 authenti-
cation in client mode.
• X.509 Certificate (server) – Activates the X.509 authenti-
cation in server mode.
Pre-shared SecretSpecifies the pre-shared secret which you can use for every au-
thentication mode.
CA CertificateSpecifies the CA Certificate which you can use for the user-
name/password and X.509 Certificate authentication modes.
DH ParametersSpecifies the protocol for the DH parameters key exchange which
you can use for X.509 Certificate authentication in the server
mode.
Local CertificateSpecifies the certificate used in the local device. You can use this
authentication certificate for the X.509 Certificate authentication
mode.
Local Private KeySpecifies the key used in the local device. You can use the key
for the X.509 Certificate authentication mode.
UsernameSpecifies a login name which you can use for authentication in
the username/password mode.
PasswordSpecifies a password which you can use for authentication in the
username/password mode.
Extra OptionsSpecifies additional parameters for the OpenVPN tunnel, such as
DHCP options. The parameters are proceeded by two dashes.
For possible parameters see the help text in the router using SSH
– run the openvpnd --help command.
To open the IPsec Tunnel Configuration page, click IPsec in the Configuration section of
the main menu. The IPsec tunnel function allows you to create a secured connection between
two separate LAN networks. The router allows you to create up to four IPsec tunnels.
To encrypt data between the local and remote subnets, specify the appropriate values in
the subnet fields on both routers. To encrypt the data stream between the routers only,
leave the local and remote subnets fields blank.
If you specify the protocol and port information in the Local Protocol/Port field, then the
router encapsulates only the packets matching the settings.
ItemDescription
CreateActivates/deactivates the individual IPsec tunnels.
DescriptionDisplays the name of the tunnel specified in the configuration of
the tunnel.
EditOpens the IPsec tunnel configuration form.
Table 39: IPsec Tunnels Overview
Figure 38: IPsec Tunnels List
ItemDescription
DescriptionName or description of the tunnel.
Remote IP AddressIP address of remote side of the tunnel. It is also possible to enter
the domain name.
Remote IDIdentifier (ID) of remote side of the tunnel. It consists of two parts:
a hostname and a domain-name.
Remote SubnetIP address of a network behind remote side of the tunnel.
Remote Subnet MaskSubnet mask of a network behind remote side of the tunnel.
Remote Protocol/PortSpecifies Protocol/Port of remote side of the tunnel. The general
form is protocol/port, for example 17/1701 for UDP (protocol 17)
and port 1701. It is also possible to enter only the number of
protocol, however, the above mentioned format is preferred.
Local IDIdentifier (ID) of local side of the tunnel. It consists of two parts:
a hostname and a domain-name.
Local SubnetIP address of a local network.
Local Subnet MaskSubnet mask of a local network.
Local Protocol/PortSpecifies Protocol/Port of a local network. The general form is
protocol/port, for example 17/1701 for UDP (protocol 17) and
port 1701. It is also possible to enter only the number of protocol,
however, the above mentioned format is preferred.
Encapsulation ModeSpecifies the IPsec mode, according to the method of encap-
sulation. You can select the tunnel mode in which the entire IP
datagram is encapsulated or the transport mode in which only IP
header is encapsulated.
NAT traversalEnable/disables NAT address translation on the tunnel. If you
use NAT between the end points of the tunnel, then enable this
parameter.
IKE ModeSpecifies the mode for establishing a connection (main or ag-
gressive). If you select the aggressive mode, then the router establishes the IPsec tunnel faster, but the encryption is permanently set to 3DES-MD5. We recommend that you not use the
aggressive mode due to lower security!
IKE AlgorithmSpecifies the means by which the router selects the algorithm:
• auto – The encryption and hash algorithm are selected au-
tomatically.
• manual – The encryption and hash algorithm are defined
by the user.
IKE EncryptionEncryption algorithm – 3DES, AES128, AES192, AES256.
IKE HashHash algorithm – MD5, SHA1, SHA256, SHA384 or SHA512.
Remote CertificateCertificate for X.509 authentication.
Local CertificateCertificate for X.509 authentication.
Local Private KeyPrivate key for X.509 authentication.
Local PassphrasePassphrase used during private key generation.
Extra OptionsSpecifies the additional parameters of the IPsec tunnel for exam-
ple, secure parameters.
Table 40: IPsec Tunnel Configuration
The IPsec function supports the following types of identifiers (ID) for both sides of the
tunnel, Remote ID and Local ID parameters:
• IP address (for example, 192.168.1.1)
• DN (for example, C=CZ,O=Conel,OU=TP,CN=A)
• FQDN (for example, @director.conel.cz) – the @ symbol proceeds the FQDN.
• User FQDN (for example, director@conel.cz)
The certificates and private keys have to be in the PEM format. Use only certificates containing
start and stop tags.
The random time, after which the router re-exchanges new keys is defined as follows:
Lifetime - (Rekey margin + random value in range (from 0 to Rekey margin * Rekey Fuzz/100))
The default exchange of keys is in the following time range:
• Minimal time: 1h - (9m + 9m) = 42m
• Maximal time: 1h - (9m + 0m) = 51m
We recommend that you maintain the default settings. When you set key exchange times
higher, the tunnel produces lower operating costs, but the setting also provides less security.
Conversely, when you reducing the time, the tunnel produces higher operating costs, but
provides for higher security.
The changes in settings will apply after clicking the Apply button.
To open the GRE Tunnel Configuration page, click GRE in the Configuration section of
the main menu. The GRE tunnel function allows you to create an unencrypted connection
between two separate LAN networks. The router allows you to create four GRE tunnels.
ItemDescription
CreateActivates/deactivates the individual GRE tunnels.
DescriptionDisplays the name of the tunnel specified in the configuration form.
EditOpens the GRE tunnel configuration form.
Table 42: GRE Tunnels Overview
Figure 41: GRE Tunnels List
ItemDescription
DescriptionDescription of the GRE tunnel.
Remote IP AddressIP address of the remote side of the tunnel.
Remote SubnetIP address of the network behind the remote side of the tunnel.
Remote Subnet MaskSpecifies the mask of the network behind the remote side of the
tunnel.
Local Interface IP
Address
Remote Interface IP
Address
MulticastsActivates/deactivates sending multicast into the GRE tunnel:
IP address of the local side of the tunnel.
IP address of the remote side of the tunnel.
• disabled – Sending multicast into the tunnel is inactive.
• enabled – Sending multicast into the tunnel is active.
Pre-shared KeySpecifies an optional value for the 32 bit shared key in numeric
format, with this key the router sends the filtered data through
the tunnel. Specify the same key on both routers, otherwise the
router drops received packets.
Table 43: GRE Tunnel Configuration
Attention, the GRE tunnel does not pass through NAT.
The changes in settings will apply after pressing the Apply button.
To open the L2TP Tunnel Configuration page, click L2TP in the Configuration section of the
main menu. The L2TP tunnel function allows you to create a password protected connection
between 2 LAN networks. The router activates the tunnels after you mark the Create L2TPtunnel check box.
ItemDescription
ModeSpecifies the L2TP tunnel mode on the router side:
• L2TP server – Specify an IP address range offered by
the server.
• L2TP client – Specify the IP address of the server.
Server IP AddressIP address of the server.
Client Start IP AddressIP address to start with in the address range. The range is
offered by the server to the clients.
Client End IP AddressThe last IP address in the address range. The range is offered
by the server to the clients.
Local IP AddressIP address of the local side of the tunnel.
Remote IP AddressIP address of the remote side of the tunnel.
Remote SubnetAddress of the network behind the remote side of the tunnel.
Remote Subnet MaskThe mask of the network behind the remote side of the tunnel.
Select the PPTP item in the menu to configure a PPTP tunnel. PPTP tunnel allows password protected connections between two LANs. It is similar to L2TP. The tunnels are active
after selecting Create PPTP tunnel.
ItemDescription
ModeSpecifies the L2TP tunnel mode on the router side:
• PPTP server – Specify an IP address range offered by
the server.
• PPTP client – Specify the IP address of the server.
Server IP AddressIP address of the server.
Local IP AddressIP address of the local side of the tunnel.
Remote IP AddressIP address of the remote side of the tunnel.
Remote SubnetAddress of the network behind the remote side of the tunnel.
Remote Subnet MaskThe mask of the network behind the remote side of the tunnel
UsernameUsername for the PPTP tunnel login.
PasswordPassword for the PPTP tunnel login.
Table 47: PPTP Tunnel Configuration
The changes in settings will apply after pressing the Apply button.
Figure 46: PPTP Tunnel Configuration
The firmware also supports PPTP passthrough, which means that it is possible to create a
tunnel through the router.
The DynDNS function allows you to access the router remotely using an easy to remember custom hostname. This DynDNS client monitors the IP address of the router and updates the address whenever it changes. In order for DynDNS to function, you require a public IP address, either static or dynamic, and an active Remote Access service account at
www.dyndns.org. Register the custom domain (third-level) and account information specified
in the configuration form. You can use other services, too – see the table below, Server item.
To open the DynDNS Configuration page, click DynDNS in the main menu.
ItemDescription
HostnameThe third order domain registered on the www.dyndns.org server.
UsernameUsername for logging into the DynDNS server.
PasswordPassword for logging into the DynDNS server.
ServerSpecifies a DynDNS service other than the www.dyndns.org. Possible
other services:
www.spdns.de
www.dnsdynamic.org
www.noip.com
Enter the update server service information in this field. If you leave this
field blank, the default server members.dyndns.org will be used.
Table 49: DynDNS Configuration
Example of the DynDNS client configuration with the domain conel.dyndns.org:
Figure 48: DynDNS Configuration Example
To access the router’s configuration remotely, you will need to have enabled this option in the
NAT configuration (bottom part of the form), see chapter 3.9.
The NTP configuration form allows you to configure the NTP client. To open the NTP page,
click NTP in the Configuration section of the main menu. NTP (Network Time Protocol) allows
you to periodically set the internal clock of the router. The time is set from servers that provide
the exact time to network devices.
• If you mark the Enable local NTP service check box, then the router acts as a NTP server
for other devices in the local network (LAN).
• If you mark the Synchronize clock with NTP server check box, then the router acts as a
NTP client. This means that the router automatically adjusts the internal clock every 24
hours.
ItemDescription
Primary NTP Server
Address
Secondary NTP
Server Address
TimezoneSpecifies the time zone where you installed the router.
Daylight Saving TimeActivates/deactivates the DST shift.
The figure below displays an example of a NTP configuration with the primary server set
to ntp.cesnet.cz and the secondary server set to tik.cesnet.cz and with the automatic change
for daylight saving time enabled.
The SNMP page allows you to configure the SNMP v1/v2 or v3 agent which sends information about the router (and its expansion ports) to a management station. To open the
SNMP page, click SNMP in the Configuration section of the main menu. SNMP (Simple Network Management Protocol) provides status information about the network elements such as
routers or endpoint computers. In the version v3, the communication is secured (encrypted).
To enable the SNMP service, mark the Enable the SNMP agent check box.
ItemDescription
NameDesignation of the router.
LocationLocation of where you installed the router.
ContactPerson who manages the router together with information how to contact
this person.
Table 51: SNMP Agent Configuration
To enable the SNMPv1/v2 function, mark the Enable SNMPv1/v2 access check box. It is
also necessary to specify a password for access to the Community SNMP agent. The default
setting is public.
You can define a different password for the Read community (read only) and the Write
community (read and write) for SNMPv1/v2. You can also define 2 SNMP users for SNMPv3.
You can define a user as read only (Read), and another as read and write (Write). The router
allows you to configure the parameters in the following table for every user separately. The
router uses the parameters for SNMP access only.
To enable the SNMPv3 function, mark the Enable SNMPv3 access chec k box, then specify
the following parameters:
ItemDescription
UsernameUser name
AuthenticationEncryption algorithm on the Authentication Protocol that is
used to verify the identity of the users.
Authentication PasswordPassword used to generate the key used for authentication.
PrivacyEncryption algorithm on the Privacy Protocol that is used to
ensure confidentiality of data.
Privacy PasswordPassword for encryption on the Privacy Protocol.
In addition, you can continue with this configuration:
• Activating the Enable I/O extension function allows you monitor the binary I/O inputs on
the router.
• Selecting the Enable XC-CNT extension lets you monitor the expansion port CNT inputs
and outputs status.
• Selecting Enable M-BUS extension and entering the Baudrate, Parity and Stop Bits lets
you monitor the meter status connected to the expansion port MBUS status.
ItemDescription
BaudrateCommunication speed
ParityControl parity bit:
• none – Data will be sent without parity.
• even – Data will be sent with even parity.
• odd – Data will be sent with odd parity.
Stop BitsNumber of stop bits.
Table 53: SNMP configuration – MBUS extension
Parameters Enable XC-CNT extension and Enable M-BUS extension cannot be checked
at the same time.
Selecting Enable reporting to supervisory system and entering the IP Address and Period
lets you send statistical information to the monitoring system, R-SeeNet.
ItemDescription
IP AddressIP address
PeriodPeriod of sending statistical information (in minutes).
Each monitored value is uniquely identified using a numerical identifier OID – Object Iden-tifier. This identifier consists of a progression of numbers separated by a point. The shape
of each OID is determined by the identifier value of the parent element and then this value is
complemented by a point and current number. So it is obvious that there is a tree structure.
The following figure displays the basic tree structure that is used for creating the OIDs.
Figure 50: OID Basic Structure
The SNMP values that are specific for Conel routers create the tree starting at OID =
.1.3.6.1.4.1.30140. You interpret the OID in the following manner:
iso.org.dod.internet.private.enterprises.conel
This means that the router provides for example, information about the binary input and
output. The following table shows the range of used OID values:
Starting with firmware version 3.0.4, all v2 routers with board RB-v2-6 and newer provide information About the internal temperature of the device (OID 1.3.6.1.4.1.30140.3.3) and
power voltage (OID 1.3.6.1.4.1.30140.3.4).
The list of available and supported OIDs and other details can be found in the application note
In order to access a particular device enter the IP address of the SNMP agent which is
the router, in the Remote SNMP agent field. The dialog displayed the internal variables in the
MIB tree after entering the IP address. Furthermore, you can find the status of the internal
variables by entering their OID.
The path to the objects is:
iso → org → dod → internet → private → enterprises → conel → protocols
The path to information about the router is:
iso → org → dod → internet → mgmt → mib-2 → system
You use the SMTP form to configure the Simple Mail Transfer Protocol client (SMTP) for
sending e-mails.
ItemDescription
SMTP Server AddressIP or domain address of the mail server.
SMTP PortPort the SMTP server is listening on.
Secure Methodnone, SSL/TLS, or STARTTLS. Secure method has to be sup-
ported by the SMTP server.
UsernameName for the e-mail account.
PasswordPassword for the e-mail account. The password can contain the
following special characters * + , - . / : = ? ! # % [ ] _ { } ~
The following special characters are not allowed: “ $ & ’ ( ) ; < >
Own E-mail AddressAddress of the sender.
Table 58: SMTP client configuration
The mobile service provider can bloc k other SMTP servers, then you can only use the SMTP
server of the service provider.
Figure 53: SMTP Client Configuration Example
You send e-mails from the Startup script. The Startup Script dialog is located in the Con-figuration section of the main menu. The router also allows you to send e-mails using an SSH
connection. Use the email command with the following parameters:
-te-mail address of the receiver
-ssubject, enter the subject in quotation marks
-mmessage, enter the subject in quotation marks
-aattachment file
-rnumber of attempts to send e-mail (default setting: 2)
The command above sends an e-mail address to name@domain.com with the subject
"subject", body message "message" and attachment "abc.doc" directly from the directory
c:\directory\. The router attempts to send the message five times.
The SMS Configuration page is not available for the XR5i v2 routers.
Open the SMS Configuration page, click SMS in the Configuration section of the main
menu. The router can automatically send SMS messages to a cell phone or SMS message
server when certain events occur. The form allows you to select which events generate an
SMS message.
ItemDescription
Send SMS on power upActivates/deactivates the sending of an SMS mes-
sage automatically on power up.
Send SMS on connect to mobile
network
Send SMS on disconnect to mobile network
Send SMS when datalimit
exceeded
Send SMS when binary input on
I/O port (BIN0) is active
Send SMS when binary input on
expansion port (BIN1 – BIN4) is
active
Add timestamp to SMSActivates/deactivates the adding a time stamp to the
Phone Number 1Specifies the phone number to which the router sends
Phone Number 2Specifies the phone number to which the router sends
Phone Number 3Specifies the phone number to which the router sends
Unit IDThe name of the router. The router sends the name
BIN0 – SMSSMS text messages when activate the first binary in-
Activates/deactivates the sending of an SMS message automatically when the router is connected to
a mobile network.
Activates/deactivates the sending of an SMS message automatically when the router is disconnection
from a mobile network.
Activates/deactivates the sending of an SMS message automatically when the data limit exceeded.
Send an SMS message when the binary input on the
I/O port (BIN0) goes active. The text of the message
is set using parameter BIN0.
Automatic sending SMS message after binary input
on expansion port (BIN1 – BIN4) is active. Text of
message is intended parameter BIN1 – BIN4.
SMS messages. This time stamp has a fixed format
YYYY-MM-DD hh:mm:ss.
BIN1 – SMSSMS text messages when activate the binary input on
the expansion port.
BIN2 – SMSSMS text messages when activate the binary input on
the router.
BIN3 – SMSSMS text messages when activate the binary input on
the router.
BIN4 – SMSSMS text messages when activate the binary input on
the router.
Table 59: SMS Configuration
After you enter a phone number in the Phone Number 1 field, the router allows you to
configure the control of the device using an SMS message. You can configure up to three
numbers for incoming SMS messages. To enable the function, mark the Enable remote controlvia SMS check box. The default setting of the remote control function is active.
ItemDescription
Phone Number 1Specifies the first phone number allowed to access the router us-
ing an SMS.
Phone Number 2Specifies the second phone number allowed to access the router
using an SMS.
Phone Number 3Specifies the third phone number allowed to access the router
using an SMS.
Table 60: Control via SMS
• If you leave the phone number field blank, then you can restart the router using an
SMS Reboot message from any phone number.
• If you enter one or more phone numbers, then you can control the router using SMS
messages sent only from the specified phone numbers.
• If you enter the wild card character ∗, then you can control the router using SMS
messages sent from any phone number.
Control SMS messages do not change the router configuration. For example, if the router is
changed to the off line mode using an SMS message, then the router remains in this mode.To
return the router to the on-line mode, reboot or power cycle the device. The behavior is the
same for every SMS control message.
To control the router using an SMS, send only message text containing the control command. You can send control SMS messages in the following form:
SMSDescription
go online sim 1The router changes to SIM1 (APN1)
go online sim 2The router changes to SIM2 (APN2)
go onlineChanges the router to the online mode
go offlineChanges the router to the off line mode
set out0=0Sets the binary output to 0
set out0=1Sets the binary output to 1
set out1=0Sets the binary output of XC-CNT to 0
set out1=1Sets the binary output of XC-CNT to 1
set profile stdSets the standard profile
set profile alt1Sets the alternative profile 1
set profile alt2Sets the alternative profile 2
set profile alt3Sets the alternative profile 3
rebootThe router reboots
get ipThe router responds with the IP address of the SIM card
Table 61: Control SMS
Choosing Enable AT-SMS protocol on expansion port 1 and Baudrate makes it possible to
send/receive an SMS on the serial Port 1.
ItemDescription
BaudrateCommunication speed on the expansion port 1
Table 62: Send SMS on the serial Port 1
Choosing Enable AT-SMS protocol on expansion port 2 and Baudrate makes it possible to
send/receive an SMS on the serial Port 2.
ItemDescription
BaudrateCommunication speed on the expansion port 2
Setting the parameters in the Enable AT-SMS protocol over TCP frame, you can enable
the router to send and receive SMS messages on a TCP port. This function requires you to
specify a TCP port number. The router sends SMS messages using a standard AT command.
ItemDescription
TCP PortTCP port on which will be allowed to send/receive SMS messages.
Table 64: Send SMS on ethernet PORT1 configuration
3.19.1Sending SMS
If you establish a connection to the router using a serial interface or Ethernet, then you can
use AT commands to manage SMS messages. The following table lists only the commands
that the router supports. For other AT commands the router sends an OK response. The
router sends an ERROR response for complex AT commands.
AT CommandDescription
AT+CGMIReturns the specific identity of the manufacturer.
AT+CGMMReturns the specific model identity of the manufacturer.
AT+CGMRReturns the specific model revision identity of the manufacturer.
AT+CGPADDRDisplays the IP address of the usb0 interface.
AT+CGSNReturns the product serial number.
AT+CIMIReturns the International Mobile Subscriber Identity number (IMSI).
AT+CMGDDeletes a message from the location.
AT+CMGFSets the presentation format for short messages.
AT+CMGLLists messages of a certain status from a message storage area.
AT+CMGRReads a message from a message storage area.
AT+CMGSSends a short message from the device to entered tel. number.
AT+CMGWWrites a short message to the SIM storage.
AT+CMSSSends a shor t message from the SIM storage location.
AT+COPS?Identifies the mobile networks available
AT+CPINUsed to query and enter a PIN code.
AT+CPMSSelects the SMS memory storage types, to be used for short message
operations.
AT+CREGDisplays network registration status.
AT+CSCASets the short message service center (SMSC) number
Configuration of the expansion port can be done via Expansion Port 1 or Expansion Port 2
items in the menu.
In the upper part of the configuration window, the port can be enabled and the type of the
connected port is shown in the Port Type item. Other items are described in the table below:
ItemDescription
BaudrateApplied communication speed.
Data BitsNumber of data bits.
ParityControl parity bit:
• none – data will be sent without parity.
• even – data will be sent with even parity.
• odd – data will be sent with odd parity.
Stop BitsNumber of stop bits.
Split TimeoutTime to rupture reports. If the gap between two characters exceeds
the parameter in milliseconds, any buffered characters will be sent
over the Ethernet port.
ProtocolProtocol:
• TCP – communication using a linked protocol TCP.
• UDP – communication using a unlinked protocol UDP.
ModeMode of connection:
• TCP server – The router will listen for incoming TCP connection
requests.
• TCP client – The router will connect to a TCP ser ver on the
specified IP address and TCP port.
Server AddressWhen set to TCP client above, it is necessary to enter the Server ad-
dress and TCP port.
TCP PortTCP/UDP port used for communications. The router uses the value for
both the server and client modes.
Inactivity TimeoutTime period after which the TCP/UDP connection is interrupted in case
If you mark the Reject new connections check box, then the router rejects any other con-
nection attempt. This means that the router no longer supports multiple connections.
If you mark the Check TCP connection check box, the router verifies the TCP connection.
ItemDescription
Keepalive TimeTime after which the router verifies the connection.
Keepalive IntervalLength of time that the router waits on an answer.
Keepalive ProbesNumber of tests that the router performs.
Table 67: Expansion Port Configuration 2
When you mark the Use CD as indicator of the TCP connection check box, the router uses
the carrier detection (CD) signal to verify the status of the TCP connection. The CD signal
verifies that another device is connected to the other side of the cable.
CDDescription
ActiveTCP connection is enabled
NonactiveTCP connection is disabled
Table 68: CD Signal Description
When you mark the Use DTR as control of TCP connection check box, the router uses the
data terminal ready (DTR) single to control the TCP connection. The remote device sends a
DTR single to the router indicating that the remote device is ready for communications.
DTRDescription serverDescription client
ActiveThe router allows the establishment of
TCP connections.
NonactiveThe router denies the establishment of
TCP connections.
Table 69: DTR Signal Description
Since firmware 3.0.9, all v2 routers provide a program called getty which allows user to connect
to the router via the serial line (router must be fitted with an expansion port RS232!). Getty
displays the prompt and after entering the username passes it on login program, which asks
for a password, verifies it and runs the shell. After logging in, it is possible to manage the
system as well as a user is connected via telnet.
93
The router initiates a TCP connection.
The router terminates the TCP connection.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.