Dual Ethernet, 3G, Dual SIM, Dual WiFi SMA female connectors
GW1042M:
Dual Ethernet, 4G/LTE, Dual SIM, Dual WiFi SMA female connectors
1 Introduction
This user manual describes the features and how to configure Virtual Access GW1000
and GW1000M Series routers.
The Virtual Access GW1000 and GW1000M Series routers enable 3G/LTE connectivity in
vehicles such as buses, taxis and fleet vehicles for applications such as passenger WiFi
internet access, telemetry and employee WiFi access to corporate network services.
Designed for managed network providers, GW1000 and GW1000M Series routers provide
secure WAN connectivity for internet and private networking environments over 3G or
4G broadband paths and incorporate optional 802.11n WiFi connectivity.
1.1 Document scope
This document covers models in the GW1000 Series and the GW1000M Series. For
general references, we refer to the GW1000 Series throughout. Feature variations
between GW1000 Series and GW1000M Series are described in separate sections.
1: Introduction
1.1.1 GW1000 Series routers
The Virtual Access GW1000 Series router is a compact 3G/4G LTE router with WiFi,
designed with a lightweight plastic case with optional carrier for use in vehicles and a
wide range of site-based applications.
1.1.2 GW1000M Series routers
The Virtual Access GW1000M Series router is a compact 3G/4G LTE router with WiFi,
designed with a rugged metal housing for use in vehicles and a wide range of site-based
applications.
1.2 Using this documentation
You can configure your router using either the router’s web interface or via the command
line using UCI commands. Each chapter explains first the web interface settings,
followed by how to configure the router using UCI. The web interface screens are shown
along with a path to the screen for example, ‘In the top menu, select Service ->
SNMP.’ followed by a screen grab.
After the screen grab there is an information table that describes each of the screen’s
We use information tables to show the different ways to configure the router using the
router’s web and command line. The left-hand column shows three options:
Web: refers the command on the router’s web page,
UCI: shows the specific UCI command, and
Opt: shows the package option.
The right-hand column shows a description field that describes the feature’s field or
command and shows any options for that feature.
Some features have a drop-down menu and the options are described in a table within
the description column. The default value is shown in a grey cell.
Values for enabling and disabling a feature are varied throughout the web interface, for
example, 1/0; Yes/No; True/False; check/uncheck a radio button. In the table
descriptions, we use 0 to denote Disable and 1 to denote Enable.
Some configuration sections can be defined more than once. An example of this is the
routing table where multiple routes can exist and all are named ‘route’. For these
sections, the UCI command will have a code value [0] or [x] (where x is the section
number) to identify the section.
1: Introduction
Note: these sections can be given a label for identification when using UCI or package
options.
network.@route[0]=route
network.@route[0].metric=0
can be witten as:
network.routename=route
network.routename.metric=0
However the documentation usually assumes that a section label is not configured.
The table below shows fields from a variety of chapters to illustrate the explanations
above.
The operating temperature range depends on the RF Band.
2: GW1000 Series hardware
2.10 Antenna
The GW1000 Series router has two SMA connectors for connection of two antennas for
antenna diversity. Antenna diversity helps improve the quality of a wireless link by
mitigating problems associated with multipath interference. The GW1000M has two
additional SMA female WiFi antenna sockets.
2.10.1 GW1000 Series router
2 x 4G/LTE SMA female antenna connectors
MIMO support in LTE versions
1 x GPS SMA female antenna connector with 3v3 active power feed
2.10.2 GW1000M Series router
2 x 4G/LTE SMA female antenna connectors
MIMO support in LTE versions
1 x GPS SMA female antenna connector with 3v3 active power feed
Virtual Access supplies a wide range of antennas. Please visit our website:
www.virtualaccess.com or contact Virtual Access for more information.
1 x fused automotive
cable
1 x non-fused automotive
cable
2.11 Components
To enable and configure connections on your router, it must be correctly installed.
The routers contain an internal web server that you use for configurations. Before you
can access the internal web server and start the configuration, ensure the components
are correctly connected and that your PC has the correct networking setup.
2. Hold the SIM 1 card with the chip side facing down and the cut corner front left.
3. Gently push the SIM card into SIM slot 1 until it clicks in.
4. If using SIM 2 then hold the SIM with the cut corner front right
5. Gently push the SIM card into SIM slot 2 until it clicks in.
2.13 Connecting the SIM lock
Connect the SIM lock using the Allen key provided.
2.14 Connecting cables
Connect one end of the Ethernet cable into port A and the other end to your PC or
switch. For information on connecting cables for a vehicle installation, read chapter 4,
‘Installing a router into a vehicle’.
2: GW1000 Series hardware
2.15 Connecting the antenna
If you are connecting only one antenna, screw the antenna into the MAIN SMA
connector.
If you are using two antennas, screw the main antenna into the MAIN SMA connector
and the secondary antenna into the AUX SMA connector.
2.16 Powering up
The router takes approximately 2 minutes to boot up. During this time, the PWR/CONFIG
LED flashes in a double flash pattern – 2 quick fashes followed by a pause.
Other LEDs display different diagnostic patterns during boot up.
Booting is complete when the PWR/CONFIG LED stops double flashing and stays solid or
flashing steady, indicating the particular running configuration is loaded. Read the
chapter ‘GW1000 LED behaviour’, for PWR/CONFIG LED states.
Normal reset to running config. No special
LED activity.
Between 3 and 15 seconds
Flashing slowly
Releasing between 3-15 seconds switches
the router back to factory configuration.
Between 15 and 20 seconds
On
Releasing between 15-20 seconds performs
a normal reset to running config.
Between 20 seconds and 30 seconds
Flashing faster
Releasing between 20-30 seconds reboots
the router in recovery mode.
Over 30 seconds
On
Releasing after 30 seconds performs a
normal reset.
2.17 Reset button
The reset button is used to request a system reset.
When you press the reset button the PWR/CONFIG LED will display different patterns
depending on how long you press the button. The flashing patterns will be different for
the 2 flashing phases indicated below. The length of time you hold the reset button will
determine the router behaviour.
2: GW1000 Series hardware
2.17.1 Recovery mode
Recovery mode is a fail-safe mode where the router can load a default configuration
from the routers firmware. If your router goes into recovery mode, all config files are
kept intact. After the next reboot, the router will revert to the previous config file.
You can use recovery mode to manipulate the config files, but should only be used if all
other configs files are corrupt. If your router has entered recovery mode, contact your
local reseller for access information.
The router takes approximately 2 minutes to boot up. During this time,
the power LED flashes.
Other LEDs display different diagnostic patterns during boot up.
Booting is complete when the power LED stops flashing and stays on
steady.
PWR/CONFIG
LED
Off
No power/boot loader does not exist.
Double flash
Unit is booting from power on.
Flashing slowly
Unit is in recovery mode.
Flashing quickly
Unit is in factory configuration.
On
Unit has completed booting up process and is in either config 1 or
config2.
SIM LEDs
Off
Not selected or SIM not inserted.
Flashing
SIM selected and data connection is being established.
On
SIM selected and registered on the network.
Signal LEDs
Both LEDs off
Not connected or signal strength <= -113dBm.
Left LED on
Right LED off
Connected and signal strength <= -89dBm.
Left LED off
Right LED on
Connected and signal strength between -89dBm and -69dBm.
Both LEDs on
Connected and signal strength >-69dBm.
WiFi LEDs
Off
WiFi not enabled.
Flashing
Data activity on WiFi interface.
On
WiFi is enabled.
Ethernet LED
(amber)
On
Physical Ethernet link detected
Flashing
Data is being transmitted/ received over the link.
3: GW1000 and GW1000M Series LED behaviour
The following table describes the possible LED behaviours and meanings on the GW1000
and GW1000M Series router.
Table 5: LED behaviour and descriptions
Note: when a data connection does not exist, none of the signal LEDs will light
regardless of signal strength.
3.2 GW1000 and GW1000M Series Ethernet port LED behaviour
The Ethernet port has two physical LEDs, one is green and one is amber. When looking
at the port, the amber LED is on the right and is the only active LED.
Each wire is 1.0mm square, with overall PVC sheath
Note:
Requires 5 amp fuse in series with red and blue wires
4: Installing a router into a vehicle
4 Installing a router into a vehicle
The type of cable you need depends on your application and vehicle. You will have
received either a fused or non-fused power cable for the installation.
4.1 Installing a router into a vehicle using a non-fused power cable
Install the router using the vehicle installation power cable 840-00076 provided.
Figure 8: 840-00076 3 core power cable
Table 7: Power cable descriptions
Connect the BLACK wire to a ground wire.
Connect the BLUE wire to a 12V switched vehicle ignition wire.
Virtual Access routers have a feature to update the factory configuration from a SIM
card. This allows you to change the factory configuration of a router when installing the
SIM.
1. Make sure the SIM card you are inserting has the required configuration written on it.
2. Ensure the router is powered off.
3. Hold the SIM 1 card with the chip side facing down and the cut corner front left.
4. Gently push the SIM card into SIM slot 1 until it clicks in.
5. Power up the router.
Depending on the model, the power LED and/or the configuration LED flash as usual.
The SIM LED starts flashing. This indicates the application responsible for 3G and
configuration extraction management is running. It also means the update of the
configuration is happening.
When the update is finished, depending on the model, the power LED and/or the
configuration LED blink alternatively and very fast for 20 seconds.
Note: factory configuration extraction is only supported on mobile modules that support
phone book operations.
Access the router through the web interface or by using SSH. By default, Telnet is
disabled.
6.1 Configuration packages used
6.2 Accessing the router over Ethernet using the web interface
DHCP is disabled by default, so if you do not receive an IP address via DHCP, assign a
static IP to the PC that will be connected to the router.
Assuming that the PC is connected to Port A on the router, in your internet browser, type
in the default local IP address 192.168.100.1, and press Enter. The Authorization page
appears.
Figure 10: The login page
The password may vary depending on the factory configuration the router has been
shipped with. The default settings are shown below. The username and password are
case sensitive.
6.3 Accessing the router over Ethernet using an SSH client
You can also access the router over Ethernet, using Secure Shell (SSH) and optionally
over Telnet.
To access CLI over Ethernet start an SSH client and connect to the router’s management
IP address, on port 22: 192.168.100.1/24.
On the first connection, you may be asked to confirm that you trust the host.
6: Accessing the router
Figure 11: Confirming trust of the routers public key over SSH
Figure 12: SSH CLI logon screen
In the SSH CLI logon screen, enter the default username and password.
Username: root
Password: admin
6.3.1 SCP (Secure Copy Protocol)
As part of accessing the router over SSH, you can also use SCP protocol. Use the same
user authentication credentials as for SSH access. You can use SCP protocol to securely
manually transfer files from and to the router’s SCP server.
No dedicated SPC client is supported; select the SCP client software of your own choice.
Local database is only
checked if TACACS server is
not reachable.
UCI:
system.@pam_auth[0].pammodule.auth
Opt: pammodule
Selects which TACACS module this part of configuration relates
to.
auth
auth module provides the actual
authentication and sets credentials
account
account module checks to make sure
that access is allowed for the user
session
session module performs additional
tasks which are needed to allow
access
system.@pam_auth[0].type=tacplus
Opt: type
Specifies the authentication method.
UCI: system.@pam_auth[0].servers
Opt: servers
Specifies the TACACS servers along with port number and
password. The example below explains the syntax.
192.168.0.1:49|secret '
UCI:
system.@pam_auth[1].args=service=ppp
Opt: args
Additional arguments to pass to TACACS serer.
6: Accessing the router
Table7: Information table for TACACS authentication
6.11SSH
SSH allows you to access remote machines over text based shell sessions. SSH uses
public key cryptography to create a secure connection. These connections allow you to
issue commands remotely via a command line.
The router uses a package called Dropbear to configure the SSH server on the box. You
can configure Dropbear via the web interface or through an SSH connection by editing
the file stored on: /etc/config_name/dropbear.
6.11.1 Configuration packages used
6.11.2 SSH access using the web interface
In the top menu, click System -> Administration. The Administration page appears.
Scroll down to the SSH Access section.
Listens only on the selected interface. If unspecified is checked,
listens on all interfaces. All configured interfaces will be displayed
via the web GUI.
(unspecified)
listens on all interfaces.
Range
Configured interface names.
Web: Port
UCI: dropbear.@dropbear[0].Port
Opt: port
Specifies the listening port of the Dropbear instance.
Certificates are used to prove ownership of a public key. They contain information about
the key, its owner’s ID, and the digital signature of an individual that has verified the
content of the certificate.
6: Accessing the router
In asymmetric cryptography, public keys are announced to the public, and a different
private key is kept by the receiver. The public key is used to encrypt the message, and
the private key is used to decrypt it.
To access certs and private keys, in the top menu, click System -> Administration.
The Administration page appears. Scroll down to the Certs & Private Keys section.
Figure 15: The certificates & private keys section
This section allows you to upload any certificates and keys that you may have stored.
There is support for IPSec, OpenVPN and VA certificates and keys.
If you have generated your own SSH public keys, you can input them in the SSH Keys
section, for SSH public key authentication.
The router’s web server is configured in package uhttpd. This file defines the behaviour
of the server and default values for certificates generated for SSL operation. uhttpd
supports multiple instances, that is, multiple listen ports, each with its own document
root and other features, as well as cgi and lua. There are two sections defined:
Main: this uHTTPd section contains general server settings.
Cert: this section defines the default values for SSL certificates.
6: Accessing the router
6.14.1 Configuration packages used
To configure the router’s HTTP server parameters, in the top menu, select Services ->
HTTP Server. The HTTP Server page has two sections.
Web: Listen Address and Port
UCI: uhttpd.main.listen_http
Opt: list listen_http
Specifies the ports and addresses to listen on for plain HTTP
access. If only a port number is given, the server will attempt to
serve both IPv4 and IPv6 requests.
0.0.0.0:80
Bind at port 80 only on IPv4
interfaces.
[::]:80
Bind at port 80 only on IPv6
interfaces
Range
IP address and/or port
Web: Secure Listen Address and Port
UCI: uhttpd.main.listen_https
Opt: list listen_https
Specifies the ports and address to listen on for encrypted HTTPS
access. The format is the same as listen_http.
0.0.0.0:443
Bind at port 443 only
[::]:443
Range
IP address and/or port
Web: Home path
UCI: uhttpd.main.home
Opt: home
Defines the server document root.
/www
Range
Web: Cert file
UCI: uhttpd.main.cert
Opt: cert
ASN.1/DER certificate used to serve HTTPS connections. If no
listen_https options are given the key options are ignored.
/etc/uhttpd.crt
Range
Web: Key file
UCI: uhttpd.main.key
Opt: key
ASN.1/DER private key used to serve HTTPS connections. If no
listen_https options are given the key options are ignored.
Defines the prefix for dispatching requests to the embedded lua
interpreter, relative to the document root. Lua support is
disabled if this option is missing.
Maximum wait time for network activity. Requested executables
are terminated and connection is shut down if no network activity
occured for the specified number of seconds.
30 Range
Web: N/A
UCI: uhttpd.main.realm
Opt: realm
Defines basic authentication realm when prompting the client for
credentials (HTTP 400).
OpenWrt
Range
Web: N/A
UCI: uhttpd.main.config
Opt: config
Config file in Busybox httpd format for additional settings.
Currently only used to specify basic auth areas.
For backward compatibility reasons, uhttpd uses the file /etc/httpd.conf to define
authentication areas and the associated usernames and passwords. This configuration
file is not in UCI format.
Authentication realms are defined in the format prefix:username:password with one
entry and a line break.
Prefix is the URL part covered by the realm, for example, cgi-bin to request basic auth
for any CGI program.
Username specifies the username a client has to login with.
Password defines the secret password required to authenticate.
The password can be either in plain text format, MD5 encoded or in the form $p$user
where the user refers to an account in /etc/shadow or /etc/passwd.
If you use $p$… format, uhttpd will compare the client provided password against the
By default, uhttpd binds to 0.0.0.0 which also includes the WAN port of your router. To
bind uhttpd to the LAN port only you have to change the listen_http and listen_https
options to your LAN IP address.
To get your current LAN IP address, enter:
uci get network.lan.ipaddr
Then modify the configuration appropriately:
uci set uhttpd.main.listen_http='192.168.1.1:80'
uci set uhttpd.main.listen_https='192.168.1.1:443'
Dynamic DNS (DDNS) functionality on a Virtual Access router will dynamically perform
DDNS updates to a server so it can associate an IP address with a correctly associated
DNS name. Users can then contact a machine, router, device and so on with a DNS
name rather than a dynamic IP address.
An account is required with the provider, and one or more domain names are associated
with that account. A dynamic DNS client on the router monitors the public IP address
associated with an interface and whenever the IP address changes, the client notifies the
DNS provider to update the corresponding domain name.
When the DNS provider responds to queries for the domain name, it sets a low lifetime,
typically a minute or two at most, on the response so that it is not cached. Updates to
the domain name are thus visible throughout the whole Internet with little delay.
Note: most providers impose restrictions on how updates are handled: updating when
no change of address occurred is considered abusive and may result in an account being
blocked. Sometimes, addresses must be refreshed periodically, for example, once a
month, to show that they are still in active use.
7: Configuring Dynamic DNS
7.2 Configuration packages used
7.3 Configuring Dynamic DNS using the web interface
In the top menu, select Services -> Dynamic DNS. The Dynamic DNS Configuration
page appears.
Figure 19: The Dynamic DNS configuration page
Enter a text name that will be used for the dynamic DNS section in the configuration.
Select Add. The Dynamic DNS configuration options appear.
Defines the interface whose IP needs to be updated.
Displayed when the Source of IP address option is set to
interface.
All the configured interfaces will be shown.
Web: URL
UCI: ddns.<name>.ip_url
Opt: ip_url
Defines the URL where the IP downloaded from.
Displayed when the Source of IP address option is set to URL.
Web: Check for changed IP every
UCI: ddns.<name>.check_interval
Opt: check_interval
Defines how often to check for an IP change. Used in conjunction
with check_unit.
10 . Range
Web: Check-time unit
UCI: ddns.<name>.check_unit
Opt: check_unit
Defines the time unit to use for check for an IP change. Used in
conjunction with check_interval.
minutes
hours
Web: Force update every
UCI: ddns.<name>.force_interval
Opt: force_interval
Defines how often to force an IP update to the provider. Used in
conjunction with force_unit.
72
Disabled.
Range
Enabled
Web: Force-time unit
UCI: ddns.<name>.force_unit
Opt: force_unit
Defines the time unit to use for check for an IP change. Used in
conjunction with force_interval.
minutes
hours
Web: Listen on
UCI: ddns.<name>.interface
Opt: interface
Defines the interface for ddns monitoring. Typically this will be
the same as the interface whose IP is being updated – as defined
ip_network or ip_interface
All configured interfaces will be displayed.
7: Configuring Dynamic DNS
Table 13: Information table for dynamic DNS settings
7.4Dynamic DNS using UCI
Dynamic DNS uses the ddns package /etc/config/ddns
Configure a router to log to a server. You can configure a Syslog client in this
section.
Language and Style
Configure the router’s web language and style.
Time synchronization
Configure the NTP server in this section.
8 System settings
The system section contains settings that apply to the most basic operation of the
system, such as the host name, time zone, logging details, NTP server, language and
style.
The host name appears in the top left hand corner of the interface menu. It also appears
when you open a Telnet or SSH session.
Note: this document shows no host name in screen grabs. Throughout the document we
use the host name ‘VA_router’.
The system configuration contains a logging section for the configuration of a Syslog
client.
8.1 Configuration package used
8: System settings
8.2 Configuring system properties
To set your system properties, in the top menu, click System. There are four sections in
the System page.
Sets the maximum log output level severity for system events.
System events are written to the system log. Messages with a lower
level or level equal to the configured level are displayed in the console
using the logread command, or alternatively written to flash, if
configured to do so.
Web value
Description
UCI
Debug
Information useful to developers for
debugging the application.
8
Info
Normal operational messages that
require no action.
7
Notice
Events that are unusual, but not
error conditions.
6
Warning
May indicate that an error will occur
if action is not taken.
Sets the maximum log level for kernel messages to be logged to the
console. Only messages with a level lower, or level equal to the
configured level will be printed to the console.
Web value
Description
UCI
Normal
Normal operation messages
8
Warning
Error messages
9
Debug
Debug messages
5
Web: n/a
UCI: system.main.log_file
Opt: log_file
Since logread is only small in size it can be beneficial to write system
events to flash. This option defines the file path to write the events.
Set to ‘root/syslog.messages’
Web: n/a
UCI: system.main.log_type
Opt: log_type
Defines whether to write the system events to a file rather than
logread. Set to ‘file’ to write to the file configured under log_file
option.
Defines the number of archive syslog files to store in flash. When
configured above to write to /root.syslog.messages files will be stored
at /root/syslog.messages,x (where x starts at 0).
Range
1 Stores 1 archive log file in flash
8: System settings
Table 15: Information table for the logging section
Specifies interval of NTP requests in hours. Default value set to
auto.
auto
Range
auto; 1-23
Web: NTP server candidates
UCI: system.ntp.server
Opt: list server
Defines the list of NTP servers to poll the time from. If the list is
empty, the built in NTP daemon is not started. Multiple servers
can be configured and are separated by a space if using UCI.
By default all fields are set to 0.0.0.0.
8.2.3Language and style
Figure 23: The language and style section in system properties
8: System settings
Table 16: Information table for the language and style page
8.2.4Time synchronization
Figure 24: The time synchronization section in system properties
Events in the system have a class, sub class and severity. All events are written to the
system log.
8.4.1.1 Logread
To view the system log, enter:
root@VA_router:~# logread
Shows the log.
root@VA_router:~# logread |tail
Shows end of the log.
root@VA_router:~# logread | more
Shows the log page by page.
root@VA_router:~# logread –f
Shows the log on an ongoing basis. To stop this option, press ctrl-c.
root@VA_router:~# logread –f &
Shows the log on an ongoing basis while in the background. This allows you to run other
commands while still tracing the event logs. To stop this option, type fg to view the
current jobs, then press ctrl-c to kill those jobs.
Since logread is only small in size it can be beneficial to write system events to flash. To
do this you need to modify the system config under the system package. Set the options
‘log_file’, ‘log_size’ and ‘log_type’ as below:
root@VA_router:~# uci export system
package system
config system 'main'
option hostname 'VA_router'
option zonename 'UTC'
option timezone 'GMT0'
option conloglevel '8'
option cronloglevel '8'
option time_save_interval_hour '10'
option log_hostname '%serial'
8: System settings
option log_ip '1.1.1.1'
option log_port '514'
option log_file '/root/syslog.messages'
option log_size '400'
option log_type 'file'
The above commands will take effect after a reboot.
root@VA_router:~# cat /root/syslog.messages
Shows all the system events stored in flash.
root@VA_router:~# tail /root/syslog.messages
Shows end of the events stored flash.
root@VA_router:~# tail –f /root/syslog.messages &
Shows the log on an ongoing basis. To stop this option, press ctrl-c.
Figure 27: The status page showing software version 72.002
In the Firmware Version row, the first two digits of the firmware version identify the
hardware platform, for example LIS-15; while the remaining digits: .00.72.002, show
the software version.
9.1.2 Upgrading router firmware for software versions pre- 72.002
Copy the new firmware issued by Virtual Access to a PC connected to the router.
In the top menu, select System tab -> Backup/Flash Firmware. The Flash operations
page appears.
9.1.3 Upgrading router firmware for software version 72.002 and above
Copy the new firmware issued by Virtual Access to a PC connected to the router.
In the top menu, select System tab > Flash operations. The Flash operations page
appears.
Figure 32: The flash operations page
Under Flash Operations, click Flash Image. Only the inactive image is available to flash.
Select the appropriate image and then wait until image has loaded.
Note: this process may take a while depending on the available connection speed.
When the image has loaded, the Update Firmware page appears.
Figure 33: The flash firmware - verify page
Click either: Flash image and do not reboot, or Flash image and reboot using new
image immediately. The ‘Firmware update is being applied’ message appears.
When the firmware update is complete, the Update Firmware page appears. There are
various messages, depending on which option you selected, or if any corruptions have
occurred.
Figure 34: The firmware update page after ‘…do not reboot’ option selected
9: Upgrading router firmware
If you select ‘Flash image and do not reboot’, the router will only run the firmware if you
click OK to return to the Flash Operations page. There you can manually select Made
Active (after reboot). Then click Reboot Now in the ‘Reboot using Active
Configuration’ section.
9.1.5Update flash image and reboot using new image immediately option
Figure 35: The firmware update page after ‘update flash image and reboot…’ option selected
If you select ‘Update flash image and reboot using new image immediately’ and the
overall validation and flashing process has succeeded, the router will reboot
immediately. To regain access to the router you must login again. If any part of the
processes encounters an error the reboot does not occur and a report is given as shown
in section 1.3.3.
In the unfortunate event that the firmware upgrade fails, the ‘Failed verification. File is
most likely corrupt’ or similar message will appear in the Verify file integrity row. No
changes will be made to the system and the general message File verification failed
appears.
9.1.7 Verify the firmware has been upgraded successfully
To check the firmware version, in the top menu, browse to System -> Flash
Operations, or after router reboots, in the top menu, click Status. The Firmware
Version shows in the system list and also in the right top corner of the menu bar.
Figure 37: The system status list showing current firmware version
where x.x.x.x is the IP of your PC, -o is local file name to store.
SCP
Secure Copy (SCP) is a part of Secure Shell (SSH) and enables file transfers to the
router using authentication and encryption. It is different to TFTP, which uses UDP, while
SCP uses a TCP connection. On Unix machines, SCP is a standard part of the system; on
Windows it requires an additional application.
The usage example below is for a Unix machine and therefore assumes the image file is
in the current folder.
Where the first argument ‘LIS-15.00.72.002.image’ in SCP is the source and the second
argument ‘tmp/LIS-15.00.72.002.image’ is the destination path, ”root” is the username
used to connect to x.x.x.x IP address.
After you execute the above command you will be asked to provide a root password.
At this stage the output shows the process of copying the software file into destination
directory.
root@192.168.100.1’s password:
LIS-15.00.72.000.image 100% 6812KB 2.2MB/s 00:03
Image verification before flashing
To verify the integrity of the image, firmware version xx.yy.72.002 and later uses an
image-check application.
Note: it is the user’s responsibility to verify the image before starting to write image to
flash process.
To use the image-check on downloaded image, enter:
image-check /tmp/LIS-15.00.72.002.image
In the case of any image corruption, appropriate error message will be displayed:
Error: no SquashFS filesystem after CRC'd section - data length 3
Error: read failed, expected at least 3 more bytes
or other.
Note: Image is valid only if none of error message appears. This process is done
automatically during Web UI firmware update.
Flashing
When downloaded firmware verification succeeds, the new image can be written to flash.
To write the image into the alternative image, enter:
mtd write LIS-15.00.72.002.image altimage
Note: this is an example, substitute the correct file name.
Flash verification after flashing
After the write process has finished, you must complete post verification of the firmware.
To verify the checksum of downloaded firmware, enter:
va_image_csum.sh /tmp/LIS-15.00.72.002.image
The checksum of the downloaded binary is shown:
08761cd03e33c569873bcc24cf2b7389 7006920 LIS-15.00.72.002 This MD5
To verify the checksum of written firmware, enter:
va_image_csum.sh alt
After a while the checksum will be calculated:
Calculating checksum.........
08761cd03e33c569873bcc24cf2b7389 7006920 LIS-15.00.72.002 This MD5
Verify and compare the checksum with the MD5 sum of the downloaded image.
If the checksum of the written firmware in altimage matches the one from the
downloaded image in /tmp, then the new firmware has been programmed successfully.
Setup an alternative image
Provided the programming has succeeded, you can set it as the next image to use after
reboot, enter:
This section describes the file structure and location of essential directories and files on
Virtual Access routers.
Throughout this document, we use information tables to show the different ways to
configure the router using the router’s web interface and command line (CLI).
When showing examples of the command line interface we use the host name
‘VA_router’ to indicate the system prompt. For example, the table below displays what
the user should see when entering the command to show the current configuration in
use on the router:
root@VA_router:~# va_config.sh
10.1 System information
General information about software and configuration used by the router is displayed on
the Status page. To view the running configuration file status on the web interface, in
the top menu, select Status -> Overview. This page also appears immediately after
you have logged in.
10: Router file structure
Figure 38: The status page
System information is also available from the CLI if you enter the following command:
The example below shows the output from the above command.
VA_SERIAL: 00E0C8121215
VA_MODEL: GW0000
VA_ACTIVEIMAGE: image2
VA_ACTIVECONFIG: config1
VA_IMAGE1VER: VIE-16.00.44
VA_IMAGE2VER: VIE-16.00.44
10.2 Identify your software version
To check which software version your router is running, in the top menu, browse to
Status -> Overview.
10: Router file structure
Figure 39: The status page showing a software version prior to 72.002
Figure 40: The status page showing software version 72.002
In the Firmware Version row, the first two digits of the firmware version identify the
hardware platform, for example LIS-15; while the remaining digits: .00.72.002, show
the software version.
Two firmware images are supported to enable the system to rollback to a previous
firmware version if the upgrade of one image fails.
The image names (image1, image2) themselves are symbols that point to different
partitions in the overall file system. A special image name “altimage” exists which always
points to the image that is not running.
The firmware upgrade system always downloads firmware to “altimage”.
10.4 Directory locations for UCI configuration files
Router configurations files are stored in folders on:
10: Router file structure
/etc/factconf,
/etc/config1, and
/etc/config2
Multiple configuration files exist in each folder. Each configuration file contains
configuration parameters for different areas of functionality in the system.
A symbolic link exists at /etc/config, which always points to one of factconf, config1 or
config2 is the active configuration file.
Files that appear to be in /etc/config are actually in /etc/factconf|config1|config2
depending on which configuration is active.
If /etc/config is missing on start-up, for example on first boot, the links and directories
are created with configuration files copied from /rom/etc/config/.
At any given time, only one of the configurations is the active configuration. The UCI
system tool (Unified Configuration Interface) only acts upon the currently active
configuration.
10.5 Viewing and changing current configuration
To show the configuration currently running, enter:
root@VA_router:~# va_config.sh
To show the configuration to run after the next reboot, enter:
root@VA_router:~# va_config.sh next
To set the configuration to run after the next reboot, enter:
Exports the configuration in a machine
readable format. It is used internally to
evaluate configuration files as shell scripts.
import
[<config>]
Imports configuration files in UCI syntax.
add
<config> <section-type>
Adds an anonymous section of type-section
type to the given configuration.
add_list
<config>.<section>.<option>=<string>
Adds the given string to an existing list
option.
show
[<config>[.<section>[.<option>]]]
Shows the given option, section or
configuration in compressed notation.
get
<config>.<section>[.<option>]
Gets the value of the given option or the type
of the given section.
Set
<config>.<section>[.<option>]=<value>
Sets the value of the given option, or adds a
new section with the type set to the given
value.
delete
<config>[.<section[.<option>]]
Deletes the given section or option.
10.6 Configuration file syntax
The configuration files consist of sections – or packages - that contain one or more
config statements. These optional statements define actual values.
Below is an example of a simple configuration file.
package 'example'
config 'example' 'test'
option 'string' 'some value'
option 'boolean' '1'
list 'collection' 'first item'
list 'collection' 'second item'
The config 'example' 'test' statement defines the start of a section with the type example
and the name test.
10: Router file structure
Table 1: Common commands, target and their descriptions
10.7 Managing configurations
10.7.1 Managing sets of configuration files using directory manipulation
Configurations can also be managed using directory manipulation.
To remove the contents of the current folder, enter:
root@VA_router:/etc/config1# rm –f *
Warning: the above command makes irreversible changes.
To export a configuration file using CLI, for any software version, go to section 8.9.3
10.9.1 Importing a configuration file using the web interface for software
versions pre- 72.002
You can import a configuration file to the alternate configuration segment using the web
interface. This will automatically reboot the router into this configuration file.
In the top menu, select System > Backup/Flash Firmware. The Flash operations
page appears.
Figure 43: The flash operations page
Under Backup/Restore, choose Restore Backup: Choose file. Select the appropriate
file and then click Upload archive.
Figure 44: The system – restoring…page
When the ‘waiting for router’ icon disappears, the upgrade is complete, and the login
10.9.2 Importing a configuration file using the web interface for software version
72.002 and above
You can import a configuration file to the alternate configuration segment using the web
interface.
In the top menu, select System > Flash Operations. The Flash operations page
appears.
Figure 45: The flash operations page
In the Operations column, click Upload new. Select the appropriate file.
Figure 46: The flash operations succeed upload configuration page
If you select ‘Flash image and do not reboot’, the router will only run this configuration if
you click OK to return to the Flash Operations page. There you can manually select
Made Active (after reboot). Then click Reboot Now in the ‘Reboot using Active
Configuration’ section.
This chapter explains how to view Virtual Access routers' log files and edit configuration
files using a Command Line Interface (CLI) and the Unified Configuration Interface (UCI)
system.
11.1 Overview of some common commands
Virtual Access routers’ system has an SSH server typically running on port 22.
The factconf default password for the root user is admin.
To change the factconf default password, enter:
root@VA_router:/# uci set system.main.password=”******”
root@VA_router:/# uci commit system
To reboot the system, enter:
11: Using the Command Line Interface
root@VA_router:/# reboot
The system provides a Unix-like command line. Common Unix commands are available
such as ls, cd, cat, top, grep, tail, head, more and less.
Typical pipe and redirect operators are also available, such as: >, >>, <, |
The system log can be viewed using any of the following commands:
root@VA_router:/# logread
root@VA_router:/# logread | tail
root@VA_router:/# logread –f
These commands will show the full log, end of the log (tail) and continuously (-f). Enter
Ctrl-C to stop the continuous output from logread -f.
To view and edit configuration files, the system uses the Unified Configuration Interface
(UCI) which is described further on in this chapter. This is the preferred method of
editing configuration files. However, you can also view and edit these files using some of
the standard Unix tools.
For example, to view a text or configuration file in the system, enter:
To search for a process, enter: pgrep -fl '<process name or part of name>':
root@VA_router:/# pgrep -fl ‘wifi’
424 root 320 S wifi up
To kill a process, enter the PID:
root@VA_router:~# kill 424
11.2 Using Unified Configuration Interface (UCI)
The system uses Unified Configuration Interface (UCI) for central configuration
management. Most common and useful configuration settings can be accessed and
configured using the UCI system.
UCI consists of a Command Line Utility (CLI), the files containing the actual configuration
data, and scripts that take the configuration data and apply it to the proper parts of the
system, such as the networking interfaces. Entering the command 'uci' on its own will
display the list of valid arguments for the command and their format.
11: Using the Command Line Interface
root@VA_router:/lib/config# uci
Usage: uci [<options>] <command> [<arguments>]
Commands:
export [<config>]
import [<config>]
changes [<config>]
commit [<config>]
add <config> <section-type>
add_list <config>.<section>.<option>=<string>
show [<config>[.<section>[.<option>]]]
get <config>.<section>[.<option>]
set <config>.<section>[.<option>]=<value>
delete <config>[.<section[.<option>]]
rename <config>.<section>[.<option>]=<name>
revert <config>[.<section>[.<option>]]
Options:
-c <path> set the search path for config files (default: /etc/config)
-d <str> set the delimiter for list values in uci show
-f <file> use <file> as input instead of stdin
-m when importing, merge data into an existing package
Writes changes of the given configuration file,
or if none is given, all configuration files, to
the filesystem. All "uci set", "uci add", "uci
rename" and "uci delete" commands are
staged into a temporary location and written to
flash at once with "uci commit". This is not
needed after editing configuration files with a
text editor, but for scripts, GUIs and other
programs working directly with UCI files.
export
[<config>]
Exports the configuration in a UCI syntax and
does validation.
import
[<config>]
Imports configuration files in UCI syntax.
changes
[<config>]
Lists staged changes to the given configuration
file or if none given, all configuration files.
add
<config> <section-type>
Adds an anonymous section of type sectiontype to the given configuration.
add_list
<config>.<section>.<option>=<string>
Adds the given string to an existing list option.
show
[<config>[.<section>[.<option>]]]
Shows the given option, section or
configuration in compressed notation.
get
<config>.<section>[.<option>]
Gets the value of the given option or the type
of the given section.
set
<config>.<section>[.<option>]=<value>
Sets the value of the given option, or add a
new section with the type set to the given
value.
delete
<config>[.<section[.<option>]]
Deletes the given section or option.
rename
<config>.<section>[.<option>]=<name>
Renames the given option or section to the
given name.
revert
<config>[.<section>[.<option>]]
Deletes staged changes to the given option,
section or configuration file.
11: Using the Command Line Interface
-n name unnamed sections on export (default)
-N don't name unnamed sections
-p <path> add a search path for config change files
-P <path> add a search path for config change files and use as default
-q quiet mode (don't print error messages)
-s force strict mode (stop on parser errors, default)
-S disable strict mode
-X do not use extended syntax on 'show'
The table below describes commands for the UCI command line and some further
examples of how to use this utility.
Table 18: Common commands, target and their descriptions
Note: all operations do not act directly on the configuration files. A commit command is
required after you have finished your configuration.
After changing the port, uhttpd listens on from 80 to 8080 in the file /etc/config/uhttpd;
save it, then enter:
root@VA_router:~# uci commit uhttpd
Then enter:
root@VA_router:~# /etc/init.d/uhttpd restart
For this example, the router does not need to reboot as the changes take effect when
the specified process is restarted.
11.2.2 Export a configuration
Using the uci export command it is possible to view the entire configuration of the router
or a specific package. Using this method to view configurations does not show comments
that are present in the configuration file:
11: Using the Command Line Interface
root@VA_router:~# uci export httpd
package 'httpd'
config 'httpd'
option 'port' '80'
option 'home' '/www'
11.2.3 Show a configuration tree
The configuration tree format displays the full path to each option. This path can then be
used to edit a specific option using the uci set command.
To show the configuration ‘tree’ for a given config, enter:
When there are multiple rules next to each other, UCI uses array-like references for
them. For example, if there are 8 NTP servers, UCI will let you reference their sections
as timeserver.@timeserver[0] for the first section; or timeserver.@timeserver[7]
for the last section.
You can also use negative indexes, such as timeserver.@timeserver[-1]‘-1’ means the last one, and ‘-2’ means the second-to-last one. This is useful when appending new
rules to the end of a list.
Boot up Activation behaviour (typically used in factconf)
/etc/config/httpclient
Activator addresses and urls
/etc/config/monitor
Monitor details
Basic
/etc/config/dropbear
SSH server options
/etc/config/dhcp
Dnsmasq configuration and DHCP settings
/etc/config/firewall
NAT, packet filter, port forwarding, etc.
/etc/config/network
Switch, interface, L2TP and route configuration
/etc/config/system
Misc. system settings including syslog
Other
/etc/config/snmpd
SNMPd settings
/etc/config/uhttpd
Web server options (uHTTPd)
/etc/config/strongswan
IPSec settings
va_eventd.@forwarding[2].target=MonitorSyslog
va_eventd.@forwarding[3]=forwarding
va_eventd.@forwarding[3].enabled=yes
va_eventd.@forwarding[3].className=ppp
va_eventd.@forwarding[3].target=MonitorSyslog
11.3 Configuration files
The table below lists common package configuration files that can be edited using uci
commands. Other configuration files may also be present depending on the specific
options available on the Virtual Access router.
11: Using the Command Line Interface
11.4 Configuration file syntax
The configuration files usually consist of one or more config statements, so-called
sections with one or more option statements defining the actual values.
Below is an example of a simple configuration file.
package 'example'
config 'example' 'test'
option 'string' 'some value'
option 'boolean' '1'
list 'collection' 'first item'
list 'collection' 'second item'
The config 'example' 'test' statement defines the start of a section with the type
example and the name test. There can also be so-called anonymous sections with only a
type, but no name identifier. The type is important for the processing programs to
decide how to treat the enclosed options.
The option 'string' 'some value' and option 'boolean' '1' lines define simple
values within the section.
Note: there are no syntactical differences between text and boolean options. Per
convention, boolean options may have one of the values '0', 'no', 'off' or 'false' to
specify a false value or '1' , 'yes', 'on' or 'true' to specify a true value.
In the lines starting with a list keyword, an option with multiple values is defined. All list
statements that share the same name collection in our example will be combined into a
single list of values with the same order as in the configuration file.
The indentation of the option and list statements is a convention to improve the
readability of the configuration file but it is not syntactically required.
Usually you do not need to enclose identifiers or values in quotes. Quotes are only
required if the enclosed value contains spaces or tabs. Also it is legal to use doublequotes instead of single-quotes when typing configuration options.
All of the examples below are valid syntax.
option example value
option 'example' value
option example "value"
option "example" 'value'
option 'example' "value"
In contrast, the following examples are not valid syntax.
option 'example" "value'
Quotes are unbalanced.
option example some value with space
Missing quotes around the value.
It is important to note that identifiers and config file names may only contain the
characters a-z, A-Z, 0-9 and _. However, option values may contain any character, as
long they are properly quoted.
This chapter contains the configuration sections and parameters required to manage and
monitor your device using Activator and Monitor.
12.1 Activator
Activator is a Virtual Access proprietary provisioning system, where specific router
configurations and firmware can be stored to allow central management and
provisioning. Activator has two distinct roles in provisioning firmware and configuration
files to a router.
Autoload activation of firmware and configuration files on router boot up:
o Autoload is generally used for router installation. In this scenario the
router will initiate the request for firmware and configuration files when it
boots up. The router is installed with a factory config that will allow it to
contact Activator. The autoload feature controls the behaviour of the
router in requesting firmware and configuration files; this includes when to
start the Activation process and the specific files requested. The HTTP
Client (uhttpd) contains information about the Activator server and the
protocol used for activation.
12: Management configuration settings
Deployment of firmware to routers after installation:
o In this scenario, Activator initiates the process. This process, known as
Active Updates, allows for central automatic deployment of firmware and
configuration files. It is used when configuration or firmware changes need
to be pushed to live routers.
12.2 Monitor
Monitor is a Virtual Access proprietary tool, based on SNMP protocol, to monitor wide
networks of deployed routers. The router will be configured to send information to
Monitor, which is then stored and viewed centrally via the Monitor application. This
includes features such as traffic light availability status, syslog and SLA monitoring.
Autoload configurations specify how the device should behave with respect to activation
when it boots up. Autoload entries contain information about the specific files to be
downloaded and the destination for the downloaded file. Standard autoload entry
configurations to download are:
A firmware file ($$.img)
A configuration file ($$.ini)
A .vas file ($$.vas). This file signals the end of the autolaod sequence to Activator
Activator identifies the device using the serial number of the router. $$ syntax is used to
denote the serial number of the router when requesting a file. The requested files are
written to the alternate image or config segment.
You can change the settings either directly in the configuration file or via appropriate UCI
set commands. It is normal procedure for autoload to be enabled in the router’s factory
settings and disabled in running configurations (config 1 and 2).
Autoload may already have been set at factory config level. If you wish to enable
autoload services, proceed through the following steps.
12: Management configuration settings
12.5 Autoload packages
12.5.1 Create a configuration file
In the top menu, select Services ->Autoload. The Autoload page has two sections:
Basic Settings and Entries. Click Add to access configuration settings for each section.
12.7 HTTP Client: configuring activation using the web interface
This section contains the settings for the HTTP Client used during activation and active
updates of the device.
The httpclient core section configures the basic functionality of the module used for
retrieving files from Activator during the activation process.
12.7.1 HTTP Client configuraton packages
12.7.2 Web configuration
To configure HTTP Client for Activator, in the top menu, click Services -> HTTP Client.
The HTTP Client page has two sections: Basic Settings and Advanced Settings.
Web: Server IP Address
UCI: httpclient.default.Fileserver
Opt: list Fileserver
Specifies the address of Activator that uses http port 80. This can
be an IP address or FQDN. The syntax should be x.x.x.x:80 or
FQDN:80. Multiple servers should be separated by a space using
UCI.
Web: Secure Server IP Address
UCI: httpclient.default.SecureFileServer
Opt: list SecureFileServer
Specifies the address of Secure Activator that uses port 443. This
can be an IP address or FQDN. The syntax should be x.x.x.x:443
or FQDN:443. Multiple servers should be separated by a space
using UCI.
Specifies the user’s password. When entering the user
password enter in plain text using the password option. After
reboot the password is displayed encrypted via the CLI using
the hashpassword option.
UCI: management_users.@user[x].hashpassword
Opt: hashpassword. Note: a SRP user password will be
Specifies linuxuser access permissions for the user.
0
Disabled.
1
Enabled.
option IgnoreServerCertificateStatus ‘0’
12.10 User management using UCI
User management is not currently available using the web interface. You can configure
the feature using UCI or Activator.
12.10.1 User management packages
12.10.2 Configuring user management
You can create different users on the system by defining them in the user management
configuration file. This gives users access to different services.
Web: n/a
UCI: List allowed_pages
Opt: list allowed_pages
Specifies which pages the user can view. Multiple pages should
be entered using a space to separate if using UCI.
12: Management configuration settings
Table 21: Information table for config user commands
Note:
webuser will only work if linuxuser is set to yes
chapuser will only work if linuxuser is set to no
When a new user is created on the system and given web access, you will no longer be
able to login to the router web interface with the default root user details. The user must
use their new user login details.
12.11 Configuring the management user password using UCI
The user password is displayed encrypted via the CLI using the hashpassword option.
13: Configuring an Ethernet interface on a GW1000 router
13 Configuring an Ethernet interface on a GW1000 router
This section describes how to configure an Ethernet interface on a GW1000, including
configuring the interface as a DHCP server, adding the interface to a firewall zone and
mapping the physical switch ports.
13.1 Configuration packages used
13.2 Configuring an Ethernet interface using the web interface
To create and edit interfaces via the web interface, in the top menu, click Network ->
Interfaces. The Interfaces overview page appears.
Shows existing interfaces and their status. You can create new, and edit existing
interfaces here.
ATM Bridges
ATM bridges expose encapsulated Ethernet in AAL5 connections as virtual Linux
network interfaces, which can be used in conjunction with DHCP or PPP to dial
into the provider network.
13: Configuring an Ethernet interface on a GW1000 router
There are two sections in the Interfaces page.
13.3 Interface overview: editing an existing interface
To edit an existing interface, from the interface tabs at the top of the page, select the
interface you wish to configure. Alternatively, click Editin the interface’s row.
13.3.1 Interface overview: creating a new interface
To create a new interface, in the Interface Overview section, click Add new interface.
The Create Interface page appears.
Web: Name of the new interface
UCI: network.<if name>
Opt: config interface
Assigns a logical name to the interface. The network interface
section will assign this name (<if name>).
Type the name of the new interface.
Allowed characters are A-Z, a-z, 0-9 and _
Web: Protocol of the new interface
UCI: network.<if name>.proto
Opt: proto
Specifies what protocol the interface will operate on. Select
Static.
Option
Description
Static
Static configuration with fixed address and
netmask.
DHCP Client
Address and netmask are assigned by DHCP.
Unmanaged
Unspecified
IPv6-in-IPv4
(RFC4213)
Used with tunnel brokers.
IPv6-overIPv4
Stateless IPv6 over IPv4 transport.
GRE
Generic Routing Encapsulation protocol
IOT L2TP
Layer 2 Tunnelling Protocol
PPP
Point to Point Protocol
PPPoE
PPP over Ethernet
PPPoATM
PPP over ATM
LTE/UMTS/
GPRS/EV-DO
CDMA, UMTS or GPRS connection using an
AT-style 3G modem.
Web: Create a bridge over multiple
interfaces
UCI: network.<if name>.type
Opt: type
If you select this option, then the new logical interface created
will act as a bridging interface between the chosen existing
physical interfaces.
Empty
Bridge
Configures a bridge over multiple
interfaces.
Web: Cover the following interface
UCI: network.<if name>.ifname
Opt: ifname
Physical interface name to assign to this logical interface. If
creating a bridge over multiple interfaces select two interfaces to
bridge. When using uci the interface names should be separated
by a space e.g. option ifname ‘eth2 eth3’
Section
Description
Common Configuration
Configure the interface settings such as protocol, IP address, gateway, netmask,
custom DNS servers, MTU and firewall configuration.
IP-Aliases
Assigning multiple IP addresses to the interface
DHCP Server
Configuring DHCP server settings for this interface
Section
Description
General Setup
Configure the basic interface settings such as protocol, IP address, gateway,
netmask, custom DNS servers.
Advanced Settings
'Bring up on boot', 'Monitor interface state', Override MAC address, Override MTU
and 'Use gateway metric'
Physical Settings
Bridge interfaces, VLAN PCP to SKB priority mapping,
Firewall settings
Assign a firewall zone to the interface
13: Configuring an Ethernet interface on a GW1000 router
Table 22: Information table for the create new interface page
Click Submit. The Interface configuration page appears. There are three sections:
13.3.2 Interface overview: common configuration
The common configuration section has four sub sections:
Protocol type. The interface protocol may be one of the options shown
below. The protocol selected in the previous step will be displayed as
default but can be changed if required.
Option
Description
Static
Static configuration with fixed
address and netmask.
DHCP Client
Address and netmask are assigned
by DHCP.
Unmanaged
Unspecified
IPv6-in-IPv4
(RFC4213)
Used with tunnel brokers.
Ipv6-over-IPv4
Stateless IPv6 over IPv4 transport.
GRE
Generic Routing Encapsulation
protocol.
IOT L2TP
Layer 2 Tunneling Protocol.
PPP
Point-to-Point Protocol.
PPPoE
PPP over Ethernet.
PPPoATM
PPP over ATM
LTE/UMTS/GPRS/EVDO
CDMA, UMTS, or GPRS connection
using an AT-style 3G modem.
Lists interfaces that are dependant on this parent interface.
Dependant interfaces will go down when parent interface is down
and will start or restart when parent interface starts.
Separate multiple interfaces by a space when using UCI.
Example: option dependants ‘PPPADSL MOBILE’
This replaces the following previous options in child interfaces.
gre
option local_interface
lt2p
option src_ipaddr
iot
option wan1 wan2
6in4
option ipaddr
6to4
option ipaddr
13.3.2.2Common configuration: advanced settings
Figure 51: The Ethernet connection advanced settings page
13: Configuring an Ethernet interface on a GW1000 router
Table 24: Information table for common configuration advanced settings
Web: Bridge interfaces
UCI: network.<if name>.type
Opt: type
Sets the interface to bridge over a specified interface(s). The
physical interfaces can be selected from the list and are defined
in network.<if name>.ifname.
Physical interface to assign the logical interface to. If mapping
multiple interfaces for bridging the interface names are separated
by a space when using UCI and package options.
Example: option ifname ‘eth2 eth3’ or network.<if
name>.ifname=eth2 eth 3
Web: Auto Negotiation
UCI: network.<if name>.autoneg
Opt: autoneg
Specifies if Speed and Duplex mode should be autonegotiated
0
Disabled.
1
Enabled.
Web: Full Duplex
UCI: network.<if name>.fullduplex
Opt: fullduplex