Dual Ethernet, 4G/LTE, Dual SIM, Dual WiFi SMA female connectors
1 Introduction
This user manual describes the features and how to configure Virtual Access GW1000
and GW1000M Series routers.
The Virtual Access GW1000 and GW1000M Series routers enable 3G or LTE connectivity
in vehicles such as buses, taxis and fleet vehicles for applications such as passenger WiFi
internet access, telemetry and employee WiFi access to corporate network services.
Designed for managed network providers, GW1000 and GW1000M Series routers provide
secure WAN connectivity for internet and private networking environments over 3G or
4G broadband paths and incorporate optional 802.11n WiF i connectivity.
1.1 Document scope
This document covers models in the GW1000 Series and the GW1000M Series. For
general references, we refer to the GW1000 Series throughout. Feature variations
between GW1000 Series and GW1000M Series are described in separate sections.
1: Introduction
1.1.1 GW1000 Series routers
The Virtual Access GW1000 Series router is a compact 3G, 4G/LTE router with WiFi,
designed with a lightweight plastic case with optional carrier for use in vehicles and a
wide range of si t e-based applications.
1.1.2 GW1000M Series routers
The Virtual Access GW1000M Series router is a compact 3G, 4G/LTE router with WiFi,
designed with a rugged metal housing for use in vehicles and a wide r ange of site-based
applications.
GW1032M: Dual Ethernet, 3G, Dual SIM, Dual WiFi SMA female connector s
1.2 Using this documentation
You can configure your router using either the router’s web interface or via the command
line using UCI commands. Each chapter explains first the web interface settings,
followed by how to configure the router using UCI. The web interface screens are shown
along with a path to the screen for example, ‘In the top menu, se lect Service -> SNMP.’ followed by a screen grab.
After the screen grab there is an information table that describes each of the screen’s
fields.
We use information tables to show the different ways to configure the router using the
router’s web and command line. The left-hand column shows three options:
• Web: refers the command on the router’s web page,
• UCI: shows the specific UCI command, and
• Opt: shows the package option.
The right-hand column shows a description field that describes the feature’s field or
command and shows any options for that feature.
Some features have a drop-down menu and the options are described in a table within
the description column. The default value is shown in a grey cell.
Values for enabling and disabling a feature are var ied throughout the web interface, for
example, 1/0; Yes/No; True/False; check/uncheck a radio button. In the table
descriptions, we use 0 to denote Disable and 1 to denote Enable.
Some configuration s ections can be defined more than once. An example of this is the
routing table where multiple routes can exist and all are named ‘route’. For these
sections, the UCI command will have a code value [0] or [x] (where x is the section
number) to identify the section.
1: Introduction
Web: Metric
UCI: network.@route[0].metric
Specifies the route metric to use.
Note: these sections can be given a label for identification when using UCI or package
options.
However the documenta t io n usually assumes that a section label is not configured.
The table below shows fields from a variety of chapters to illustrate the explanations
Throughout the document, we use the host name ‘VA _router’ to cover all router models.
UCI commands and package option examples are shown in the following format:
Enables CESoPSN services.
Selects the severity used for logging events CESoPS N in syslog .
The following levels are available .
Specifies the address(es) and port(s) on which the agent should
listen.
[(udp|tcp):]port[@address][,…]
Table 1: Example of an information table
root@VA_router:~# vacmd show current config
1.2.3 Diagnostics
Diagnostics are explained at the end of each feature’s chapter.
1.2.4 UCI commands
For detailed information on using UCI commands, read chapters ‘Router File Structure’
and ‘Using Command Line Interface’.
Figure 1: GW1000 Series router front Figure 2: GW1000 Series router back
GW1032: Dual SIM sockets
Dual antenna SMA connectors for 3G main and aux
GPS antenna with 3.3V active power feed
Two 10/100 Mbps Ethernet ports
WiFi internal antennas
Concurrent Access Point and Station mode
Optional plastic casing and carrie
GW1042: Dual SIM sockets
Dual antenna SMA connectors for LTE main and aux
GPS antenna with 3.3V active power feed
Two 10/100 Mbps Ethernet ports
WiFi internal antennas
Concurrent Access Point and Station mode
2.2 GW1000 Series router dimensions
Unit size with carrier: 120W 120D 32Hmm
Unit weight: 209g
2.3.1 GW1000M with standard locking DC power conne ctor
Figure 3: GW1000M Series router front Figure 4: GW1000M Series router back
GW1032M Dual SIM sockets
Dual antenna SMA connectors for 3G main and aux
GPS antenna with 3.3V active power feed
Two 10/100 Mbps Ethernet ports
Dual WiFi internal antennas
Dual WiFi SMA fem a l e connectors
Concurrent Access Point and Station mode
Metal casing
Carrier bracket
GW1042M Dual SIM sockets
Dual antenna SMA connectors for LTE main and aux
GPS antenna with 3.3V active power feed
Two 10/100 Mbps Ethernet ports
Dual WiFi internal antennas
Dual WiFi SMA female connectors
Concurrent Access Point and Station mode
Metal casing
Figure 5: GW1000M Series router front Figure 6: GW1000M Series router back
GW1032M Dual antenna SMA connectors for 3G main and aux
GPS antenna with 3.3V active power feed
Two 10/100 Mbps Ethernet ports
Concurrent Access Point and Station mode
No WiFi
Metal casing
Carrier bracket
GW1042M Dual SIM sockets
Dual antenna SMA connectors for LTE main and aux
GPS antenna with 3.3V active power feed
Two 10/100 Mbps Ethernet ports
Concurrent Access Point and Station mode
No WiFi
Metal casing
2: GW1000 and GW1000M Series router hardware
2.4 GW1000M Series router dimensions
Unit size with carrier: 120W 120D 42Hmm
Unit weight: 450g
The GW1000 Series router has two SMA connectors for connection of two antennas for
antenna diversity. Antenna diversity helps improve the quality of a wireless link by
mitigating problems associated with multipath interference.
The GW1000M Series router standard locking DC power connector model has two
additional SMA female WiFi antenna sockets.
• 1 x GPS SMA female antenna connector with 3v3 active power feed
• 2 x SMA female WiFi antenna sockets*
*No WiFi on GW1000M isolated DC power connector models.
2.11 GW1000 and GW1000M Series components
To enable and configure connections on your router, it must be correctly installed.
The routers contain an internal web server that you use for configurations. Before you
can access the internal web server and start the configuration, ensure the components
are correctly connected and that your PC has the correct networking setup.
Right angle or straight
stubby antenna for WiFi
connection
1 x fused automotive
cable
1 x non-fused automotive
cable
Table 4: GW1000 Series router optional components
2.12Inserting a SIM card
1. Ensure the unit is powered off.
2. Hold the SIM 1 card with the chip side facing down and the cut cor ner front left.
3. Gently push the SIM card into SIM slot 1 until it clicks in.
4. If using SIM 2 then hold the SIM with the cut corner fr ont right
Virtual Access supplies a wide range of antennas for WiFi. Please
visit our website: www.virtualaccess.com
for more information.
or contact Virtual Access
5. Gently push the SIM card into SIM slot 2 until it clicks in.
2.13 Connecting the SIM lock
Connect the SIM lock using the Allen key provided.
2.14 Connecting cables
Connect one end of the Ethernet cable into port A and the other end to your PC or
switch. For information on connecting cables for a vehicle installation, read chapter 4,
‘Installing a router into a vehicle’.
2.15 Connecting the antenna
If you are connecting only one antenna, screw the antenna into the MAIN SMA
connector.
If you are using two antennas, screw the main antenna into the MAIN SMA connect or
and the secondary antenna into the AUX SMA connec tor.
2.16 Powering up
The router takes approximately 2 minutes to boot up. During this time, the PWR/CONFIG
LED flashes in a double flash pattern – 2 quick fashes followed b y a pause.
Other LEDs display different diagnostic patterns during boot up.
Booting is complete when the PWR/CONFIG LED stops double flashing and s ta ys solid or
flashing steady, indicating the particular running configuration is loaded. Read the
chapter ‘GW1000 LED behaviour’, for PWR/CONFIG LED states.
2.17 Reset button
The reset button is used to request a system reset.
When you press the reset button the PWR/CONFIG LED will display different patterns
depending on how long you press the button. The flashing patterns will be different for
the 2 flashing phases indicated below. The length of time yo u hold the reset button will
determine the router behaviour.
2: GW1000 and GW1000M Series router hardware
Press duration PWR/CONFIG LED
0-3 seconds Solid on Normal reset to running config. No special
Between 3 and 15 seconds Flashing fast Releasing between 3-15 seconds switches
Between 15 and 20 seconds Solid on Releasing between 15-20 seconds performs
Between 20 seconds and 30 seconds Flashing slowly Releasing between 20-30 seconds reboots
Over 30 seconds Solid on Releasing after 30 seconds performs a
2.17.1 Recovery mode
Recovery mode is a fail-safe mode where the router can load a default configuration
from the routers firmware. If your router goes into recovery mode, all config files are
kept intact. After the next reboot, the router will revert to the previous config file.
You can use recovery mode to manipulate the config files, but should only be used if all
other configs files are corrupt. If your router has entered recovery mode, contact you r
local reseller for access information.
The following table describes the possible LED behaviours and meanings on the GW1000
and GW1000M Series router.
The router takes approximate ly 2 minutes to boot up. During this time,
the power LED flashes.
Booting
Off No power/boot loader does not exist.
Other LEDs display different diagnos tic p atter ns dur ing boot up.
Booting is complete when the power LED stops flashing and stays on
steady.
PWR/CONFIG
LED
SIM LEDs
Signal LEDs
WiFi LEDs
Flashing slowly Unit is in recovery mode.
Flashing quickly Unit is in factory configuration.
Solid on Unit has completed booting up process and is in either config 1 or
config2.
Flashing SIM selected and data connection is being estab li s he d .
Solid on SIM selected and registered on the network.
Left LED on
Left LED off
Right LED on
Both LEDs on Connected and signal strength >-69dBm.
Flashing Data activity on WiFi interface.
Solid on WiFi is enabled.
Connected and signal strength <= -89dBm.
Connected and signal strength between -89dBm and -69dBm.
Table 6: LED behaviour and descriptions
Note: when a data connection does not exist, none of the signal LEDs will light
regardless of signal strength.
3.2 GW1000 and GW1000M Series Ethernet port LED behaviour
The Ethernet port has two physical LEDs, one is green and one is amber. When looking
at the port the green LED is on the left and is the only active LED.
Figure 9: Ethernet LED on the rear of the GW1000 Series router
The type of cable you need depends on your application and vehicle. You will have
received eit h er a fu sed or non-fused power cable for the installation.
4.1 Installing a router into a vehicle using a non-fused power cable
Install the router using the vehic le installation power cab le 840-00076 provided.
Figure 10: 840-00096 3 core power cable
• Link pins 1 and 2 and bring out on a BLACK ground wire.
• Wire pin 3 and bring out on a BLUE wire to a 12V switched vehicle ignition wire.
• Link pins 5 and 6 and bring and bring out on a RED 12v permanent wire.
• Wire pin 4 and bring out on a YELLOW voltage sense wire.
• Plug the 6 pin connector into the router.
Note: requires 5 amp fuse in series with red and blue wires.
4.2 Installing a ro uter into a veh icle using a fused power cable
Install the router using the vehic le installation power cab le 840-00105 provided.
5 Factory configuration extract ion from SIM c a rd
Virtual Access routers have a feature to update the factory configuration from a SIM
card. This allows you to change the factory configuration of a router when installing the
SIM.
1. Make sure the SIM card you are inserting has the required configuration written on it.
2. Ensure the router is p owered off.
3. Hold the SIM 1 card with the chip side facing down and the cut corner front left.
4. Gently push the SIM card into SIM slot 1 until it clicks in.
5. Power up the router.
Depending on the model, the power LED and/or the configuration LED flash as usual.
The SIM LED starts flashing . This indicates the application responsible for 3G and
configuration extraction management is running. It also means the update of the
configuration is happening.
When the update is finished, depending on the model, the power LED and/or the
configuration LED blink a lternatively and very fast for 20 seconds.
Note: factory configuration extraction is only supporte d on mobile modules that support
phone book operations.
Assuming that the PC is connected to Port A on the router, in your interne t browser, type
in the default local IP address 192.168.100.1, and press Enter. The Authorization page
appears.
Figure 12: The login page
The password may vary depending on the factory configuration the router has been
shipped with. The default settings are shown below. The username and password are
case sensitive.
In the username field, type root.
In the Password field, type admin.
Click Login. The Status page appears.
6.3 Accessing the router over Eth ernet using a n SSH client
You can also access the router over Ethernet, using Secure Shell (SSH) and optionally
over Telnet.
To access CLI over Ethernet start an SSH client and connect to the router’s management
IP address, on port 22: 192.168.100.1/24.
On the first connection, you may be asked to confirm that you trust the host.
6: Accessing the router
Figure 13: Confirming trust of the routers public key over SSH
Figure 14: SSH CLI logon screen
In the SSH CLI logon screen, enter the default username and password.
Username: root
Password: admin
6.3.1 SCP (Secure Copy Protocol)
As part of accessing the router over SSH, you can also use SCP protocol. Use the same
user authentication credentials as for SSH access. You can use SCP protocol to securely,
manually transfer files from and to the router’s SCP server.
No dedicated SPC client is supported; select the SCP client software of your own choice.
Local database is only
checked if TACACS server is
not reachable.
default=die]
Selects which TACACS module this part of configur ation relates
to.
auth auth module provides the actual
authentication and sets credentials
account account module checks to make sure
that access is allowed for the user
session session module performs additional
tasks which are needed to allow
access
Specifies the authentication metho d.
UCI: system.@pam_auth[0].servers
Opt: servers
UCI:
system.@pam_auth[1].args=service=ppp
6.11 SSH
SSH allows you to access remote machines over text-based shell sessions. SSH uses
public key cryptography to create a secure connection. These connections allow y ou to
issue commands remotely via a command line.
The router uses a package called Dropbear to configure the SSH server on the box. You
can configure Dropb ear via the web interface or t hrough an SSH connection by editing
the file stored on: /etc/config_name/dropbear.
6.11.1 Configuration packages used
dropbear dropbear
6.11.2 SSH access using the web interface
In the top menu, click System -> Administration. The Administration page appears.
Scroll down to the SSH Access section.
Listens only on the selected interface. If uns pec ified is checked,
listens on all interfaces. All configured interfaces will be displayed
via the web GUI.
Range Configured interface names .
Web: Port
UCI: dropbear.@dropbear[0].Po rt
Specifies the listening port of the Dropb e ar ins tanc e .
Certificates are used to prove ownership of a public key. They contain information about
the key, its owner’s ID, and the digital signature of a n individual that has verified the
content of the certificate.
6: Accessing the router
In asymmetric cryptography, public keys are announced to the public, and a different
private key is kept by the receiver. The public key is used to encrypt the message, and
the private key is used to decrypt it.
To access certs and private keys, in the top menu, click System -> Ad ministration.
The Administration page appears. Scroll down to the Certs & Private Keys section.
Figure 17: The certificates & private keys section
This section allows you to upload any certificates and ke ys that you may have stored.
There is support for IPSec, OpenVPN and VA certificates and keys.
If you have generated your own SSH public keys, you can input them in the SSH Keys
section, for SSH public key authentication.
The router’s web server is configured in package uhttpd. This file defines the behaviour
of the server and default values for certificates generated for SSL operation. uhttpd
supports multiple instances, that is, multiple listen ports, each with its own document
root and other features, as well as cgi and lua. There are two sections defined:
Main: this uHTTPd section contains general server settings.
Cert: this section defines the default values for SSL certificates.
6: Accessing the router
6.14.1 Configuration packages used
uhttpd
To configure the router’s HTTP server parameters, in the top menu, select Services -> HTTP Server. The HTTP Server page has two sections.
Main Settings Server configurations
Certificate Settings SSL certificates.
Web: Listen Address and Port
UCI: uhttpd.main.listen_http
Opt: list listen_http
Web: Secure Listen Address and Port
UCI: uhttpd.main.listen_https
Opt: list listen_https
Web: Home path
UCI: uhttpd.main.home
Opt: home
Web: Cert file
UCI: uhttpd.main.cert
Opt: cert
Web: Key file
UCI: uhttpd.main.key
Opt: key
Figure 19: HTTP server settings
Specifies the ports and addresses to listen on for plain HTTP
access. If only a port number is given, the server will attempt to
serve both IPv4 and IPv6 requests.
0.0.0.0:80 Bind at port 80 only on IPv4
[::]:80 Bind at port 80 only on IPv6
interfaces
Range IP address an d/or port
Specifies the ports and address to listen on for encrypte d HTTPS
access. The format is the same as listen_http.
0.0.0.0:443 Bind at port 443 only
Defines the server document root.
/www
Range
ASN.1/DER certificate used to serve HTTPS connections. If no
listen_https options are given the key options are ignored.
/etc/uhttpd.crt
ASN.1/DER private key used to serve HTTPS connections . If no
listen_https options are given the key options are ignored.
Web: Script timeout
UCI: uhttpd.main.script_time out
Opt: script_timeout
Web: Network timeout
UCI: uhttpd.main.network_ timeo ut
Opt: network_timeout
Defines the prefix for CGI scripts, relative to the document root.
CGI support is disabled if this option is missing .
Range
Defines the prefix for dispatching reque s ts to the embedd ed lua
interpreter, relative to the document roo t. Lua s uppor t is
disabled if this option is missing.
/luci
Specifies the lua handler script used to initia lis e the lua runtime
on server start.
Range
Sets the maximum wait time for CGI or lua requests in seconds.
Requested executables are terminated if no output w as
generated.
60
Maximum wait time for network activity. Requested executables
are terminated and connection is shut down if no networ k activity
occured for the specified number of seconds.
For backward compatibility reasons, uhttpd uses the file /etc/httpd.conf to define
authentication areas and the associated usernames and passwords. This configuration
file is not in UCI format.
Authentication realms are defined in the format prefix:username:password with one
entry and a line break.
Prefix is the URL part covered by the realm, for example, cgi-bin to request basic auth
for any CGI program.
Username specifies the username a client has to login with.
Password defines the secret password required to authenticate.
The password can be either in plain text format, MD5 encoded or in the form $p$user
where the user refers to an account in /etc/shadow or /etc/passwd.
If you use $p$… format, uhttpd will compare the client provided p a ss word against the
one stored in the shadow or passwd database.
By default, uhttpd binds to 0.0.0.0 which also includes the WAN port of your router. To
bind uhttpd to the LAN port only you have to change the listen_http and listen_https
options to your LAN IP address.
To get your current LAN IP address, enter:
uci get network.lan.ipaddr
Then modify the configuration appropr iate ly:
uci set uhttpd.main.listen_http='192.168.1.1:80'
uci set uhttpd.main.listen_https='192.168.1.1:443'
config 'uhttpd' 'main'
list listen_http 192.168.1.1:80
list listen_https 192.168.1.1:443
6: Accessing the router
6.17 Displaying custom information via login screen
The login screen, by default, shows the hostname of the router in addition to the
username and password prompt. However, the router can be configured to show some
other basic information if required using a UDS script.
Note: this can only be configured via the command line.
6.17.1 Configuration packages used
Package Sections
uds script
6.17.2 Configuring login screen custom information
The luci package option login_page_info_template is configured with the path to a
UDS script that would render the required information on the right side of the login page.
The following example shows how to display serial number and mobile signal strength.
Note: this can only be configured via the command line.
Figure 21: Example login screen displaying serial and signal strength
local sig = luci.dispatcher.uci.cursor_state():get("mobile", "3g_1_1",
"sig_dbm") or -113 sig = tonumber(sig) local hue = (sig + 113) * 2 local
hue = math.min(math.max(hue, 0), 120) %> Signal strength: <h3
style="color:hsl(<%=hue%>, 90%, 50%); display:inline;"><%=sig%></h3> dBm
6: Accessing the router
6.17.2.2 Login screen custom information using package options
root@VA_router:~# uci export luci
package luci
config core ‘main’
option login_page_info_template ‘/tmp/uds/sysauth_template’
root@VA_router:~# uci export uds
package uds
config script 'sysauth_template'
option enabled '1'
option exec_type 'none'
option fname 'sysauth_template.htm'
option type 'none'
list text 'Serial: <%=pcdata(luci.version.serial)%><br/>'
list text '<% local sig =
luci.dispatcher.uci.cursor_state():get("mobile", "3g_1_1", "sig_dbm") or 113'
list text 'sig = tonumber(sig)'
list text 'local hue = (sig + 113) * 2'
list text 'local hue = math.min(math.max(hue, 0), 120) %>'
list text 'Signal strength: <h3 style="color:hsl(<%=hue%>, 90%,
This section describes the file structure and location of essential directories and files on
Virtual Access routers.
Throughout this document, we use information tables to show the different ways to
configure the router using the router’s we b interface and command line interface (CLI).
When showing examples of the command line interface we use the host name
‘VA_router’ to indicate the system prompt. For example, the table below displays what
the user should see when entering the command to show the current configuration in
use on the router:
root@VA_router:~# va_config.sh
7.1 System information
General information about software and configuration used by the router is displayed on
the Status page. To view the running configuration file status on the web interface, in
the top menu, select Status -> Overview. This page also appears immediately after
you have logged in.
7: Router file structure
Figure 22: Example of the status page
System information is also available from the CLI if you enter the following com mand:
To check which software version your router is running, in the top menu, browse to
Status -> Overview.
7: Router file structure
Figure 23: The status page showing a software version prior to 72.002
Figure 24: The status page showing software version 72.002
In the Firmware Version row, the first two digits of the firmware version identify the
hardware platform, for example LIS-15; while the remaining digits: .00.72.002, show
the software version.
Two firmware images are supported to enable the system to rollback to a previous
firmware version if the upgrade of one image fails.
The image names (image1, image2) themselves are symbols that point to different
partitions in the overall file system. A special image name “altimag e” exists which always
points to the image that is not running.
The firmware upgrade system always downloads firmware to “altimage”.
7.4 Directory locations for UCI configuration files
Router configurations files are stored in folders on:
7: Router file structure
• /etc/factconf,
• /etc/config1, and
• /etc/config2
Multiple configuration files exist in each folder. Each configura t io n file contains
configuration parameters for different areas of functionality in the system.
A symbolic link exists at /etc/config, which always points to one of factconf, config1 or
config2 is the activ e configuration fi le.
Files that appear to be in /etc/config are actually in /etc /factconf|config1|config2
depending on which configuration is active.
If /etc/config is missing on start-up, for example on first boot, the links and directories
are created with configuration files copied from /rom/etc/config/.
At any given time, only one of the configurations is the active configuration. The UCI
system tool (Unified Configuration Interface) only acts upon the currently active
configuration.
7.5 Viewing and changing current configurati on
To show the configuration currently running, e nt er:
root@VA_router:~# va_config.sh
To show the configuration to run after the next reboot, enter:
root@VA_router:~# va_config.sh next
To set the configuration to run after the next reboot, enter:
The configuration files consist of sections – or packages - that contain one or more
config statements. These optional statements define actual values.
Below is an example of a simple configuration file.
package 'example'
config 'example' 'test'
option 'string' 'some value'
option 'boolean' '1'
list 'collection' 'first item'
list 'collection' 'second item'
The config 'example' 'test' statement defines the start of a section with the type example
and the name test.
7: Router file structure
export [<config>] Exports the configuration in a machine
readable format. It is used internally to
evaluate configuration file s as shell s cr ip ts .
add <config> <section-type> Adds an anonymous section of type-section
add_list <config>.<section>.<option>=<string> Adds the given string to an existing list
option.
show [<config>[.<section>[.<option>]]] Shows the given option, sectio n or
configuration in compressed notation.
get <config>.<section>[.<option>] Gets the v alue of the giv e n option or the type
of the given section.
Set <config>.<section>[.<option>]=<value> Se ts the v alue of the given optio n, o r add s a
new section with the type set to the given
value.
Table 1: Common commands, target and their descriptions
7.7 Managing con figurations
7.7.1 Managing sets of configuration files using directory manipulation
Configurations can also be managed using directory manipulation.
To remove the contents of the current folder, enter:
root@VA_router:/etc/config1# rm –f *
Warning: the above command makes irreversible changes.
If you have software versions prior to 72.002, to expor t a configuration file using the
web interface, go to section 7.8.1.
If you have software version 72.002 or above, export a configuration file using the web
interface go to section 7.8.2.
To export a configuration file using UCI, for any software version, go to section 7.8.3.
7: Router file structure
7.8.1 Exporting a configuration file using the web interface for software
versions pre- 72.002
The current running configuration file may be exported using the web interfac e.
In the top menu, select Syste m > Backup/Flash Firmware. The Flash operations
page appears.
Figure 25: The flash operations page
In the Backup/Restore section, select Generate Ar chive.
7.8.2 Exporting a configuration file using the web interface for software version
72.002 and above
The current running configuration file may be exported using the web interface.
In the top menu, select System > Flash Operations. The Flash operations page
appears.
Figure 26: The flash operations page
In the Flash Operation section, click the configuration file in t h e Contents column to
download it.
7.8.3 Exporting a configuration file using UCI
You can view any configuration file segment using UCI.
To export the running configuration file, enter:
root@VA_router:~# uci export
To export the factory configuration file, enter:
root@VA_router:~# uci –c /etc/factconf/ export
To export config1 or config2 configuration file, enter:
To import a configuration file using UCI, for any softw a re version, go to section 7.9.3.
7.9.1 Importing a configuration file using the web interface for software
versions pre- 72.002
You can import a configuration file to the alternate conf iguration segment using the web
interface. This will automatically reboot the ro uter into this configuration file.
In the top menu, select System > Backup/Flash Firmware. The Flash operations
page appears.
Figure 27: The flash operations page
Under Backup/Restore, choose Restore Backup: Choose file . Select the appropriate
file and then click Upload archive.
Figure 28: The system – restoring…page
When the ‘waiting for router’ icon disappears, the upgrade is complete, and the login
homepage appears.
7.9.2 Importing a configuration file using the web interface for software version
72.002 and above
You can import a configuration file to the alternate configuration segment using the web
interface.
In the top menu, select System > Flash Operations. The Flash operations page
appears.
Figure 29: The flash operations page
In the Operations colu m n , click Upload new. Select the appropriate file.
Figure 30: The flash operations succeed upload configuration page
If you select ‘Flash image and do not reboot’, the router will only run this configuration if
you click OK to return to the Flash Operations page. There you can manually select
Made Active (after reboot). Then click Reboot Now in the ‘Reboot using Active
Configuration’ section.
This chapter explains how to view Virtual Access routers' log files and edit conf iguration
files using a Command Line Interface (CLI) and the Unified Configuration Interface (UCI)
system. Some commands may vary between router models.
8.1 Overview of some common commands
Virtual Access routers’ system has an SSH server typically running on port 22.
The factconf default password for the root user is admin.
To change the factconf default password, enter:
root@VA_router:/# uci set system.main.password=”******”
root@VA_router:/# uci commit system
To reboot the system, enter:
8: Using the Command Line Interface
root@VA_router:/# reboot
The system provides a Unix-like command line. Common Unix commands are available
such as ls, cd, cat, top, grep, tail, head, more and less.
Typical pipe and redirect operators are also available, such as: >, >>, <, |
The system log can be viewed using any of the following c ommands:
root@VA_router:/# logread
root@VA_router:/# logread | tail
root@VA_router:/# logread –f
These commands will sho w the full log, end of the log (t ail) and continuously (-f). Enter
Ctrl-C to stop the continuous output from logread -f.
To view and edit configuration files, the system uses the Unified Configuration I nt erface
(UCI) which is described further on in this chapter. This is the preferred method of
editing configuration fi les. However, you can also view and edit these files using some of
the standard Unix tools.
For example, to view a text or configuration file in the system, enter:
To search for a process, enter: pgrep -fl '<process name or part of name>':
root@VA_router:/# pgrep -fl ‘wifi’
424 root 320 S wifi up
To kill a process, enter the PID:
root@VA_router:~# kill 424
8.2 Using Unified Configuration Interface (UCI)
The system uses Unified Configuration Interface (UCI) for central configuration
management. Most common and useful configuration settings can be accessed and
configured using the UCI system.
UCI consists of a Command Line Utility (CLI), the files containing the actual configuration
data, and scripts that take the configuration data and a pp ly it to the proper parts of the
system, such as the networking interfaces. Entering the command 'uci' on its own will
display the list of valid arguments for the command and their format.
8: Using the Command Line Interface
root@VA_router:/lib/config# uci
Usage: uci [<options>] <command> [<arguments>]
Commands:
export [<config>]
import [<config>]
changes [<config>]
commit [<config>]
add <config> <section-type>
add_list <config>.<section>.<option>=<string>
show [<config>[.<section>[.<option>]]]
get <config>.<section>[.<option>]
set <config>.<section>[.<option>]=<value>
delete <config>[.<section[.<option>]]
rename <config>.<section>[.<option>]=<name>
revert <config>[.<section>[.<option>]]
Options:
-c <path> set the search path for config files (default: /etc/config)
-d <str> set the delimiter for list values in uci show
-f <file> use <file> as input instead of stdin
-m when importing, merge data into an existing package
-p <path> add a search path for config change files
-P <path> add a search path for config change files and use as default
-q quiet mode (don't print error messages)
-s force strict mode (stop on parser errors, default)
-S disable strict mode
-X do not use extended syntax on 'show'
The table below describes commands for the UCI command line and some further
examples of how to use this utility.
Writes changes of the given configurati o n file ,
or if none is given, all configuration files, to
the filesystem. All "uci set", "uci add", "uc i
rename" and "uci delete" commands are
commit [<config>]
staged into a temporary location and written to
flash at once with "uci commit". This is not
needed after editing configuration f ile s with a
text editor, but for scripts, GUIs and other
export [<config>]
import [<config>] Imports configuration files in UCI sy ntax .
changes [<config>]
add <config> <section-type>
add_list <config>.<section>.<option>=<string> Adds the given string to an existing list option.
show [<config>[.<section>[.<option>]]]
get <config>.<section>[.<option>]
set <config>.<section>[.<option>]=<value>
rename <config>.<section>[.<option>]=<name>
revert <config>[.<section>[.<option>]]
Exports the configuration in a UCI syntax and
does validation.
Lists staged changes to the given configuration
Adds an anonymous section of type section-
Shows the given option, section or
configuration in compressed notation.
Gets the value of the given option or the type
of the given section.
Sets the value of the given option, or add a
new section with the type set to the given
value.
Renames the given option or section to the
Deletes staged changes to the given option,
Table 13: Common commands, target and their descriptions
Note: all operations do not act directly on the configuration files. A commit command is
required after you have finished your configuration.
After changing the port, uhttpd listens on from 80 to 8 08 0 in the file /etc/config/uhttpd;
save it, then enter:
root@VA_router:~# uci commit uhttpd
Then enter:
root@VA_router:~# /etc/init.d/uhttpd restart
For this example, the router does not need to reboot as the changes take effect when
the specified process is restarted.
8.2.2 Export a configuration
Using the uci export command it is possible to view the entire configuration of the router
or a specific package. Using this method to view configurations does not show comments
that are present in the configuration file:
When there are multiple rules next to each other, UCI uses array-like references for
them. For example, if there are 8 NTP servers, UCI will let you reference their sections
as timeserver.@timeserver[0] for the first section; or timeserver.@timeserver[7]
for the last section.
You can also use negative indexes, such as timeserver.@timeserver[-1] ‘-1’ means
the last one, and ‘-2’ means the second -to-last one. This is useful whe n appending new
rules to the end of a list.
root@VA_router:/# uci show va_eventd
va_eventd.main=va_eventd
va_eventd.main.enabled=yes
va_eventd.main.event_queue_file=/tmp/event_buffer
va_eventd.main.event_queue_size=128K
va_eventd.@conn_tester[0]=conn_tester
The table below lists common package configuration files that can be edited using uci
commands. Other configuration files may also be present depending on the specific
options available on the Virtual Access router.
/etc/config/autoload Boot up Activation behaviour (typically used in factconf)
/etc/config/httpclient Activator addresses and urls
8: Using the Command Line Interface
Basic
/etc/config/dropbear SSH server options
/etc/config/firewall NAT, packet filter, port forwarding, etc.
/etc/config/network Switch, inte rface, L2TP and route configuration
/etc/config/snmpd SNMPd settings
8.4 Configuration file syntax
The configuration files usually consist of one or more config statemen t s, so-called
sections with one or more option statements defining the actual values.
Below is an example of a simple configuration file.
package 'example'
config 'example' 'test'
option 'string' 'some value'
option 'boolean' '1'
list 'collection' 'first item'
list 'collection' 'second item'
The config 'example' 'test' statement defines the start of a section with the type
example and the name test. There can also be so-called anonymous sections with only a
type, but no name identifier. The type is important for the processing programs to
decide how to treat the enclosed options.
The option 'string' 'some value' and option 'boolean' '1' lines define simple
values within the section.
Note: there are no syntactical differences between text and boolean options. Per
convention, boolean options may have one of the values '0', 'no', 'off' or 'false' to
specify a false value or '1' , 'yes', 'on' or 'true' to specify a true value.
In the lines starting with a list keyword, an option wit h multiple va lues is defined. All list
statements that share the same name collection in our example will be combined into a
single list of values with the sa me order as in th e configuration file.
The indentation of the option and list stateme nts is a conv ention to improve the
readability of the configuration file but it is not syntactically required.
Usually you do not need to enclose identifiers or v alues in quotes. Quotes are only
required if the enclosed value contains spaces or tabs. Also it is legal to use doublequotes instead of single-quotes when typing configuration options.
All of the examples below are valid syntax.
option example value
option 'example' value
option example "value"
option "example" 'value'
option 'example' "value"
In contrast, the following examples are not valid syntax.
option 'example" "value'
Quotes are unbalanced.
option example some value with space
Missing quotes around the value.
It is important to note that identifiers and config file names may only contain the
characters a-z, A-Z, 0-9 and _. However, option values may contain any character, as
long they are properly quoted.
Figure 32: The status page showing software version 72.002
In the Firmware Version row, the first two digits of the firmware version identify the
hardware platform, for example LIS-15; while the remaining digits: .00.72.002, show
the software version.
9.1.2 Upgrading router firmware for software versions pre- 72.002
Copy the new firmware issued by Virtual Access to a PC connected to the router.
In the top menu, select System tab -> Backup/Flash F i rm w are. The Flash operations
9.1.3 Upgrading router firmware for software version 72.002 and above
Copy the new firmware issued by Virtual Access to a PC connected to the router.
In the top menu, select System tab > Flash operations. The Flash operations page
appears.
Figure 37: The flash operations page
Under Flash Operations, click Flash Image. Only the inactive image is available to flas h.
Select the appropriate image and then wait until image has loaded.
Note: this process may take a while depending on the available connection speed.
When the image has loaded, the Update Firmware page appears.
Figure 38: The flash firmware - verify page
Click either: Flash image and do not reboot, or Flash image and reboot using new
image immediat ely. The ‘Firmware update is being applied’ message appears.
When the firmware update is complete, the Update Firmware page appears. There are
various messages, de p end ing on which option you sele cted, or if any corruptio ns have
occurred.
Figure 39: The firmware update pag e after ‘…do not reboot’ option selected
9: Upgrading router firmware
If you select ‘Flash image and do not reboot’, the router will only run the firmware if you
click OK to return to the Flash Operations page. There you can manually select Made Active (after reboot). Then click Reboot Now in the ‘Reboot using Active
Configuration’ section.
9.1.5Update flash image and reboot using new image immediately option
Figure 40: The firmware update pag e after ‘update flash image and reboot…’ option selected
If you select ‘Update flash image and reboot using new image immediately’ and the
overall validation and flashing process has succeeded, the router will reboot
immediately. To regain access to the router you must login again. If any part of the
processes encounters an error the reboot does not occur and a report is given.
In the unfortunate event that the firmware upgrade fails, the ‘Failed verification File is
most likely corrupt’ or similar message will appear in the Verify file integrity row. No
changes will be made to the system and the general message File verification failed
appears.
9.1.7 Verify the firmware has been upgraded successfully
To check the firmware version, in the top menu, browse to System -> Flash
Operations, or after router reboots, in the top menu, click Status. The Firmware
Version shows in the system list and also in the right top corner of the menu bar.
Figure 42: The system status list showing current firmware version
To upgrade firmware using CLI, you will need a TFTP server on a connected PC or SCP
available.
Open up an SSH or Telnet session to the router.
Enter in the relevant username and password.
To access the temp folder, enter cd /tmp
Depending on the router’s so ftware version the following TFTP clients are available:
• atftp
• curl
To determine which is available on your router, enter:
where x.x.x.x is the IP of your PC, -o is local file name to store.
SCP
Secure Copy (SCP) is a part of Secure Shell (SSH) and ena bles file transfers to the
router using authentication and encryption. It is different to TFTP, which uses UD P, while
SCP uses a TCP connection. On Unix machines, SCP is a standard part of the sys te m ; on
Windows it requires an additiona l application.
The usage example below is for a Unix machine and therefore assumes the image file is
in the current folder.
Where the first argument ‘LIS-15.00.72.002.image’ in SCP is the source and the second
argument ‘tmp/LIS-15.00.72.002.image’ is the destination path, enter root as the
username to connect to x.x.x.x IP address.
After you execute the above command you will be asked to provide a root password.
At this stage the output shows the process of copying the so ftware file into destination
The system section contains settings that apply to the most basic operation of the
system, such as the host name, time zone, logging details, NTP server, language and
style.
The host name appears in the top left hand corner of the interface menu bar. It also
appears when you open a Telnet or SSH session.
Note: this document shows no host name in screen shots. Throughout the document we
use the host name ‘VA_router’.
The system configurat ion contains a logging section for the configuration of a Syslog
client.
10.1 Syslog overview
Most syslog settings appear in the main System Configuration page.
Syslog messages have a timestamp, source facility, priority, and message section. Often
the message section begins with an optional tag identifyi ng the usermode program name
and process ID responsible for the message.
10: System settings
Messages can be stored locally and also forwarded remotely. Separate filter options
apply to each case. At a broad level, you can set the minimum severity level for local
and remote targets; only messages with a priority more severe than the configured level
will be recorded.
Kernel messages are recorded separately in their own buffer. However, for convenience,
these are copied to the system log automatically so that a unified system log is
available.
In addition, you can also define filter rules to determine how particular log messages are
handled. For example, you may decide that certain debug messages are directed into
their own log file, to avoid cluttering up the main system log, and to save bandwidth if
delivering to a remote syslog server. You can define filters to be applied to local and
remote targets, or both. A filter matches specific log messages and then determines an
action for them.
Defines the file path for log storage when Log Storage is se t to ‘file’ .
Note: when the file reaches the configured siz e it is copied to the
archive file (log_file_name.0).
Set to: root/syslog.messages
Defines the file number of archive files for storage in flash when Log
Storage is set to ‘file’.
When the system log file reaches the configured size it is copie d to
the archive file (log_file_name.0). Existing archive files are copied to
log_file_name.(x+1).
Defines the maximum duration in hours before archive syslog files are
deleted.
Set to 0 to define no age limit.
Defines a custom host name for syslog messages.
Magic values %hostname (system hostnam e ), %ser (serial), and
%mon (Monitor dev_reference) are als o recog nis ed .
Sets the maximum log output level severity for system events.
System events are written to the system log. Messages with a lowe r
level or level equal to the configured level are disp laye d on the
console using the logread command, or alternatively written to a flash
file, if configured to do so.
Debug Information useful to developers for
Info Normal operational messages that
Notice Events that are unusual, but not
Warning May ind i c ate that an error will o ccur
8
7
6
5
Sets the maximum log output level severity for system events sent to
remote syslog server.
Debug Information useful to developers for
Info Normal operational messages that
8
7
Web: n/a
UCI: system.main.audit_shel l
Opt: audit_shell
Figure 45: The language and style section in system properties
Language Sets the language to ‘auto’ or ‘English’.
10: System settings
Table 16: Information table for the language and style page
10.3.4Time synchronization
The router time must be synchronized using NTP. The router can act as both an NT P
client and an NTP server. It is enabled as an NTP client by default and individual
interfaces can be configured to respond to NTP requests.
Web: NTP server candidates
UCI: system.ntp.server
Opt: list server
Web: Max Round-Tip Time (secs)
UCI: system.ntp.max_ntp_roundtrip_sec
Opt: max_ntp_roundtrip_sec
Web: NTP Server Interface
UCI: system.ntp.listen
Opt: listen
Web: NTP Server Stratum
UCI: system.ntp.stratum
Opt: stratum
Specifies interval of NTP requests in hours. Default value set to
auto.
Defines the list of NTP servers to poll the time from. If the list is
empty, the built-in NTP daemon is not started. Multip le serv e rs
can be configured and are separated by a space if using UCI.
Defines the maximum time in seconds for an NTP poll. Any polls
that take longer than this will be not be used for NTP calculation.
Defines a list of interfaces that respond to NTP requests .
Interfaces should be delimited using sp ac e . Example :
option listen ‘LAN1 LAN2’
Defines how far this NTP Server is from the reference clock. For
example, an NTP server getting time directly from the reference
clock will have a stratum of 1. In general, this should be lef t
blank, which means that the router NTP Server will der ive the
stratum from the NTP dialogue.
10.3.5 System reboot
The router can be configured to reboot immediately, or sche duled to reboot a configured
time in the future.
In the top menu, select System -> Reboot. The System page appears.
Ensure you have saved all yo ur configuration chang es before you reboot.
Table 17: Information table for time synchronization secti o n
Check the Reboot now check box and then click Reboot.
By default, system log messages are stored in the system log in RAM.
To view the system log in RAM, enter:
root@VA_router:~# logread
Shows the log.
root@VA_router:~# logread |tail
Shows end of the log.
root@VA_router:~# logread | more
Shows the log page by page.
root@VA_router:~# logread –f
Shows the log on an ongoing basis. To stop this option, press ctrl-c.
10: System settings
root@VA_router:~# logread –f &
Shows the log on an ongoing basis while in the background. This allows you to run other
commands while still tracing the event logs. To stop this option, type fg to view the
current jobs, then press ctrl-c to kill those jobs.
10.5.1.4 System log messages in flash
Since logread is limited by memory size and does not survive a reset, it is beneficial t o
write system messages to flash memory. To do t his, modify the system config under the
system package. Set the options ‘log_file’, ‘log_size’, ‘log_type’and ‘log_file_count’
as shown below:
Changes to the NTP configuration will take effect with a restart of chrony
10: System settings
root@VA_router:~# /etc/init.d/chrony restart
10.6 Advanced filtering of syslog messages
Syslog messages can be filtered against a series of rules that are checked for
each message generated. If a match is found, then the specified action is taken.
If no match occurs, then the default action is taken, as defined in the main
system logging settings.
A message may match multiple filters. They are processed in the order listed.
For example, you may wish to record authorisation messages in the main
system log, but also make a copy in a separate authorisation log which can span
a much longer period of time.
By default, all matching filters will be applied to each message. However, you
can mark a filter to indicate that after it matches, no further filter processing
should take place.
The filter rules are defined in a free-form text list in the syslog_filter configuration
section. There are two section types, one for messages to be stored locally, and one for
messages delivered remotely.
Configuring advanced filters on the web interface is not currently supported; they must
be edited using the command line interface.
10.6.1 Advanced filtering using command line
Filters are defined in the syslog_filter configuration section of the system package. A
set of filters can be eit h er local or remote.
•All messages are matched against both local and remote filter rules, if configured.
•Each local filter matched is executed; if there is no match, then the default local
logging action applies.
•Any remote filter matched is executed; if there is no match, then the default
remote logging action applies.
root@VA_router:~# uci export system
package system
……
config syslog_filter 'local'
list text "...line 1..."
list text "...line 2..."
list text "...line 3..."
...
config syslog_filter 'remote'
list text "...line 1..."
list text "...line 2..."
list text "...line 3..."
...
Lines defined here are copied to the router runtime file /var/conf/syslog.conf which
may be reviewed to determine current rules in use.
10.6.2 Filter definitions
Each filter ruleset is a series of lines. Each line can be:
• A filter pattern, of the form facility.[op]severity(pattern) target [~]
• A blank line, or comment line, starting with hash (#).
If a message does not match any of the filter lines for a destination, local or remote, the
default action for that destination is taken.
The sections of a filter pattern break down as follows:
facility Any keyword or comma -separated list of keywords from the source facility list.See the
severity Any keyword from the event severity list (see Event Severity table above). The rule
match listed severity, and also anything more severe
!
match on less urgent severities than that listed
=
severity must match exactly
!=
match any severity other than than the listed severity
*.=debug matches all debug messages.
*
Matches zero or more characters.
?
Matches any single character (use this for space s ).
!
Matches anything not matching the following patte r n.
^
Matches the start of a message.
$
Matches the end of a message.
(firewall:)
Match any message containing the string 'firewall:'
(up*eth1)
Match any UP message referencing eth1
(!mobile)
Match only messages that don't include the string 'mobile '
(^mobile)
Match only messages beginning with the string 'mobile '
default
Do whatever the default action is, as if not filter rule matched.
ignore
Never log this message (useful for remote filter ing).
/proc/conlog For GW6600/GW6600 V S er i e s o n ly.
Note: logread is not stored through reboot.
~
no further filters should be checked after a match.
(empty)
continue checking other filter s af ter a match.
10: System settings
op Defines an optional severity conditio n.
Examples:
*.debug matches all messages of debug severity and gre ater (ie . debug , info ,
warning, etc.
pattern Defines an optional pattern to match against the message text. The pattern is used to
restrict the number of log messages matching this f ilte r .
The pattern syntax is a simple case-insensitive reg ula r exp res sion, using these
characters:
Examples:
target Defines what to do with the log message when a match occur s . It is optio na l fo r
remote filters. It can be the name of a disk file, or one of the special target keywords
listed below.
console
Log this message to the console. To view the console use cat
mem Log this message to the memory buffer (logread), if configured .
~ Optional flag to indicate no further filter s should be checked, if this filter matches. This
prevents later filters from acting on the same message . For conve nie nce this is
automatically implied when a target of ignore is used. A space must be present before
the ~ character.
Table 20: Filter syntax definitions
10.6.3 Filter examples
10.6.3.1 Example 1
Log all debug messages to memory buffer. Do not log anywhere else locally.
Log all authorisation facility messages to filepath ‘var/log/auth’. Do not log anywhere
else locally.
Log all ipsec messages to f ilepath ‘va/log/ipsec’. Do not log anywhere else locally.
For everything else, apply default local logg ing.
No remote filter rules defined, so apply default remote logging to all messages.
config syslog_filter 'local'
list text '*.=debug mem ~'
list text 'auth,authpriv.* /var/log/auth ~'
list text '*.*(ipsec:) /var/log/ipsec ~'
10.6.3.2 Example 2
As Example 1 but in addition to specified local files, copy auth, a uthpriv and ipsec to
local default log.
config syslog_filter 'local'
list text '*.=debug mem ~'
list text 'auth,authpriv.* /var/log/auth'
list text '*.*(ipsec:) /var/log/ipsec'
list text '*.* default'
10.6.3.3 Example 3
As in Example 2, except do not send any auth or auth priv messages remotely.
10: System settings
config syslog_filter 'local'
list text '*.=debug mem ~'
list text 'auth,authpriv.* /var/log/auth'
list text '*.*(ipsec:) /var/log/ipsec'
list text '*.* default'
config syslog_filter 'remote'
list text 'auth,authpriv.* ignore'
10.6.3.4 Example 4
As in Example 3, except only send auth or auth priv messages remotely.
config syslog_filter 'local'
list text '*.=debug mem ~'
list text 'auth,authpriv.* /var/log/auth'
list text '*.*(ipsec:) /var/log/ipsec'
list text '*.* default'
config syslog_filter 'remote'
list text 'auth,authpriv.* ~'
list text '*.* ignore'
11: Configuring an Ethernet interface on a GW1000 router
11 Configuring an Ethernet interface on a GW1000 router
This section describes how to configure an Ethernet interface on a GW1000 or GW1000M
router, including configuring the interface as a DHCP server, adding the interface to a
firewall zone and mapping the physical switch ports.
11.1 Configuration packages used
network
11.2 Configuring an Ethernet interface using the web interface
To create and edit interfaces via the web interface, in the top menu, click Network ->
Interfaces. The Interfaces overview page appears.
11: Configuring an Ethernet interface on a GW1000 router
There are two sections in the Interfaces page.
Interface Overview Shows existing interfaces and their status. You can create new and edit existing
ATM Bridges ATM brid ges expose enca p s ulated Ethe r ne t in AAL5 co nnectio ns as v irtual Linux
network interfaces, which can be used in conjunction with DHCP or PPP to dial
11.3 Interface overview: editing an existing interface
To edit an existing interface, from the interface tabs at the top of the page, select the
interface you wish to configure. Alternatively, click Edit in the interface’s row.
11.3.1 Interface overview: creating a new interface
To create a new interface, in the Interface Overview section, click Add new interface.
The Create Interface page appears.
custom DNS servers, MTU and firewall configuration.
IP-Aliases
Assigning multiple IP addresses to the inte rf ac e .
DHCP Server
Configuring DHCP server settings for this inte rface.
11: Configuring an Ethernet interface on a GW1000 router
Web: Name of the new interface
UCI: network.<if name>
Opt: config interface
Web: Protocol of the new interface
UCI: network.<if name>.proto
Opt: proto
Assigns a logical name to the interface. The network inter f ace
section will assign this name (<if name>).
Type the name of the new interface.
Specifies what protocol the inter f ace will ope rate on. Select
Static.
Static Static configur ation with fixed
DHCP Client Address and netmask are
IPv6-in-IPv4
IPv6-over-
Used with tunnel brokers.
Stateless IPv6 over IPv4
GRE Generic Routing Encapsulation
PPtP Point to Po int T unne lling
static
dhcp
gre
pptp
Web: Create a bridge over multiple
interfaces
UCI: network.<if name>.type
LTE/UMTS/
GPRS/EV-DO
PPP(PSTN-
If you select this option the new logical interface create d will act
as a bridging interface between the chosen existing physical
interfaces.
CDMA, UMTS or GPRS
3g
connection using an AT-style 3G
PPP v90 modem pppmodem
Opt: type
Bridge Configures a bridge over multiple
Web: Cover the following interface
UCI: network.<if name>.ifname
Opt: ifname
Physical interface name to assign to this log ic a l inte rf ac e . If
creating a bridge over multiple interfaces select two interfaces to
bridge. When using uci, seperate the interface names by a space
Table 21: Information table for the create new interface page
Click Submit. The Interface configuration page appears. There are three sections:
Common Configuration Conf igure the interface settings such as protocol, IP address, gateway, netmask,
Protocol type. The interface protocol may be one of the options s how n
below. The protocol selected in the previous step w ill be displayed as
default but can be changed if required.
Static Static configuration with fixed
DHCP Client Address and netmask are
IPv6-in-IPv4
IPv6-over-
Used with tunnel brokers.
Stateless IPv6 over IPv4
GRE Generic Routing Encapsulation
PPtP Point to Po int T unne lling
LTE/UMTS/
GPRS/EV-DO
CDMA, UMTS or GPRS
connection using an AT-style 3G
Enables the interface to connect automatic a lly on boot up.
Enabled if status of interface is presented o n Monito r ing p latform.
Override the MAC address assigned to this interf a c e . Must be in
Defines the value to override the default MTU on this interface.
Specifies the default route metric to use for this interface
(optional).
Lists interfaces that are dependent on this parent interface.
Dependent interfaces will go down when the parent interface is
down and will start or restart when parent interfac e star ts .
Separate multiple interfaces by a space when using UCI.
Example: option dependants ‘PPPADSL MOBILE’
This replaces the following previous options in child interfaces.
11: Configuring an Ethernet interface on a GW1000 router
Web: SNMP Alias ifindex
UCI: network.[..x..].snmp_alias_ifindex
Opt: snmp_alias_ifindex
Defines a static SNMP interface alias ind ex for this inte r face, that
can be polled via the SNMP interface index
(snmp_alias_ifindex+1000). Read the chapter, ‘Configuring
SNMP’ for more information.
Table 23: Information table for common configuration advanced settings
11.3.2.3Common configuration: physical settings
Figure 52: The common configuration physical settings page
Web: Bridge interfaces
UCI: network.<if name>.type
Opt: type
Sets the interface to bridge over a specified interf a ce(s ). The
physical interfaces can be selected from the list and are defined
in network.<if name>.ifname.
Enable Spanning Tree Protocol. This op tio n is only available when
the Bridge Interfaces option is selec ted.
VLAN priority code point to socket buffer mapp ing . Multip l e
priority mappings are entered with a space between the m when
using UCI.
Example: network.<if name>. vlan_qos_ map_ingress =1:2 2:1
Socket buffer to VLAN priority code point mapp ing . Multiple
priority mappings are entered with a space between the m when
using UCI.
Example: network.<if name>. vlan_qos_ map_egr e ss =1:2 2:1
Physical interface to assign the logical interface to. If mapping
multiple interfaces for bridging the inte rf a ce names are separ ated
by a space when using UCI and package options.
Example: option ifname ‘eth2 eth3’ or network.<if
Web: Auto Negotiation
UCI: network.<if name>.autoneg
Opt: autoneg
Web: Full Duplex
UCI: network.<if name>.fullduplex
Opt: fullduplex
11: Configuring an Ethernet interface on a GW1000 router
Web: Ethernet Speed
UCI: network.<if name>.speed
Sets Ethernet speed. Available optio ns are :
Eth0:10,100,1000
Table 24: Information table for physical settings page
11.3.2.4Common configuration: firewall settings
Use this section to select the firewall zone you want to a ss ign to this interface.
Select unspecified to remove the interface from the associated zone or fill out the create
field to define a new zone and attach the interface to it.
Figure 53: GRE firewall settings
11.3.3Interface overview: IP-aliases
IP aliasing is associating more than one IP address to a network interface. You can
assign multiple aliases.
11.3.3.1 IP-alias packages used
11.3.3.2 Configuring IP-alias using the web
To use IP-Aliases, enter a name for the alias and click Add. This name will be assigned
to the alias section for this IP-alias. In this example the name ethalias1 is used.
After you click Add, the IP Aliases configuration options page appears. The IP-Aliases
page is divided into two sub sections: General Setup and Advanced Settings.
11.3.3.3IP-aliases: general setup
Figure 55: The IP-aliases general setup section
11: Configuring an Ethernet interface on a GW1000 router
Web: IPv4-Address
UCI: network.<alias name>.ipad dr
Web: IPv4-Netmask
UCI: network.<alias name>.netmas k
Defines whether the DHCP pool should be enabled for this
interface. If not specified for the DHCP pool then defa ult is disab le d
i.e. dhcp pool enabled.
Defines whether the DHCP pool should be enabled for this
interface. If not specified for the DHCP pool then defa ult is disab le d
i.e. dhcp pool enabled.
Defines the offset from the network address for the star t of the
DHCP pool.
Example: for network a ddress 192.168.100.10/24, start=100,
DHCP allocation pool will start at 192.168 .100 .10 0.
For subnets greater than /24, it may be greater than 255 to span
subnets. Alternatively , spe c ify in IP addre s s notation using the
wildcard ‘0’ where the octet is required to inheri t bits from the
interface IP addess.
Example: to define a DHCP scope starting from 10.1.20.0 on an
interface with 10.1.0.0/16 address , set s tart to 0.0.20.1
Defines the size of the address pool.
Example: for network address 192.168.100.10/24, start=100,
limit=150, DHCP allocation pool will be .100 to .249
Defines the lease time of addresses handed out to clients, for
example 12h or 30m.
Defines the interface that is served by this DHCP pool. This must
be one of the configured interfaces.
When configured through the web UI this will be automatic ally
populated with the interface name.
Table 28: Information table for DHCP server general setup page
11.3.4.3DHCP Server: advanced settings
Figure 59: The DHCP server advanced settings section