The software described in this manual is furnished under a license agreement and may be used only in ac-
cordance with the terms of that agreement.
Copyright Notice
Copyright 2013 Weidmüller Interface GmbH & Co. KG
All rights reserved.
Reproduction without permission is prohibited.
Disclaimer
Information in this document is subject to change without notice and does not represent a commitment on
the part of Weidmüller.
Weidmüller provides this document "as is," without warranty of any kind, either expressed or implied, including, but not limited to, its particular purpose. Weidmüller reserves the right to make improvements and/or
changes to this manual, or to the products and/or the programs described in this manual, at any time.
Information provided in this manual is intended to be accurate and reliable. However, Weidmüller assumes
no responsibility for its use, or for any infringements on the rights of third parties that may result from its use.
This product might include unintentional technical or typographical errors. Changes are periodically made to
the information herein to correct such errors, and these changes are incorporated into new editions of the
publication.
4. Mounting the device.......................................................................................................................... 7
5. Technical data ................................................................................................................................... 8
6. Hardware related functional descriptions .................................................................................... 11
Pin assignment of power supply connector....................................................................................... 13
Pin assignment of RJ45 Ethernet ports (LAN and WAN) .................................................................. 13
Pin assignment of 4-pin connector for „VPN initiate“ and „VPN active“ ............................................ 13
Pin assignment of 4-pin connector for „Cut WAN port“ and „Signalize Alarm“ ................................. 13
Pin assignment of USB 2.0 connector .............................................................................................. 14
Pin assignment of Smartcard Reader (ISO 7816 Standard) ............................................................. 14
7. Initial start-up / Getting Started ..................................................................................................... 14
Configuration of the Router by using an Internet browser ................................................................ 14
Starting the Web interface ................................................................................................................. 15
8. Reset to factory default settings by external push button ......................................................... 17
Default factory settings of the Router: ............................................................................................... 17
9. Using the Weidmüller Router-Search-Utility ................................................................................ 18
10. Basic description of the configuration interface (menu items) .................................................. 19
All rights reserved. Reproduction without permission is prohibited.
B. Application scenarios (Uses cases) for VPN (Virtual private networks) .............................................. 85
B1 - OpenVPN based remote access application via “Meeting Point” ..................................................... 85
Description of a remote access application to allow a communication between protected, not
directly accessible machine networks and remote Service-PC’s by using a public OpenVPN-Server
as „Meeting-Point“ ............................................................................................................................. 85
B2 - Configuring an OpenVPN remote access scenario using a Weidmüller Router as OpenVPN-
Server ............................................................................................................................................... 85
B3 - Configuring an IPsec scenario between 2 Routers (Client and Server) ............................................ 85
C. Additional application notes ..................................................................................................................... 86
C1- How to start and stop a pre-defined OpenVPN connection by external 24 VDC input ..................... 86
C2- Description how to disable the Ethernet connection at WAN port ..................................................... 88
C3- Description how to use the feature “Remote Capture” with Wireshark to analyze the LAN/WAN
traffic of the Router ......................................................................................................................... 96
C4- Description how to configure the Internet access of a PC via a 3G Router............................ 101
All rights reserved. Reproduction without permission is prohibited.
1. Introduction
Proper and intended usage
The Router is intended for use in industrial (IP20) environments. It is equipped with Ethernet interface ports
and is used solely for connecting components within a network.
By connecting network components, the Router enables network nodes to exchange data. The Router also
allows an industrial IP network to access the Internet via an external DSL modem (via PPPoE). The Router is
responsible for routing IP packets between an industrial network and an external network (such as the Internet). Internet access is automatically activated when needed. The Router can be configured on-site using an
IP network on both Ethernet ports (LAN or WAN).
The Router has implemented extensive security standards to enable different networks to work together
smoothly
Additionally VPN (virtual private network) connections can be used to connect the Router as a VPN-Client or
a VPN-Server with other VPN devices.
2. Package Checklist
Models IE-SR-2GT-LAN and IE-SR-2GT-UMTS/3G
1 x Industrial Security Router (IE-SR-2GT-LAN or IE-SR-2GT-UMTS/3G)
1 x 3-pin connector for power supply
2 x 4-pin connectors for special digital inputs and output signals (Alarm, CUT, VPN)
1 x Ethernet cable ( Length 1 m, Color red)
1 x Hardware Installation Guide
Additional for model IE-SR-2GT-UMTS/3G (with an additional 3G modem)
1 x antenna for mobile connection
If any of these items are missing or damaged, please contact your customer service representative for assistance.
All rights reserved. Reproduction without permission is prohibited.
Warning
- Using the selected device for purposes other than those specified or failure to
observe the operating instructions and warning notes can lead to serious malfunctions that may result in personal injury or damage to property.
- If this product malfunctions, it is no longer possible to predict the behaviour of
neighbouring networked facilities and their connected devices. Personal injury and
property damage can occur as a result of malfunctions. Only carry out changes to
the settings when you are certain of the consequences such changes will have on
all connected networks, facilities and devices.
- Personal injury and property damage can occur as a result if this product is used
improperly. Adjustments and setting changes to this product should only be carried
out by sufficiently qualified personnel.
Caution
- This device is designed only for an operating voltage range from 7 to 36 V DC. Do
not use a higher voltage; this could destroy the Router and other devices.
- The Security Router does not have an on/off switch. The operating voltage must
be switched on by the facility in which the device is integrated.
Caution
You should activate and synchronise the time server or set the system time manually if you are using certificates in virtual private networks (VPNs) or simple network
management protocol (SNMP). An inaccuracy in the system time can cause the
virtual private network (VPN) to malfunction.
You should synchronise the system time with a time server after each Router reboot and after you load the default settings. Or you can set the system time manually.
Caution
- The default system access information for the Security Router is included in this
document. Unauthorized individuals can use this access data to gain access to the
Router's web browser and cause damage. Be sure to change these system default
access settings.
- Some services may be blocked by a firewall. You may need to deactivate the
firewall. By deactivating the firewall, the PC is no longer protected against viruses
or other attacks. Only deactivate the firewall when your PC is sufficiently protected
by other measures.
- A single port can only properly execute one service. If multiple services are assigned to a port, the port can no longer execute any service. Be sure to assign only
one service to any port.
All rights reserved. Reproduction without permission is prohibited.
Caution
- This device is designed only for a operating voltage range from +7 to 36 VDC. Do
not use a higher voltage; this could destroy the Router and other devices.
- Connecting plugs should never be connected or disconnected from electrical devices if they are carrying a live load. Be sure to first disconnect all poles of the plug.
Remember to disconnect all plugs from the Router before it is installed or removed.
- Electrical devices should not be installed or removed during operations. Never
install or remove the Router while it is running.
Caution
- It is important to provide sufficient clearance between devices which cause strong
electromagnetic interference (such as frequency converters, transformers or motor
regulators). The clearance gap between such devices and the Router should be as
wide as possible. The Router can be further shielded by using a mu-metal partition.
- The Router is designed to be mounted on a top-hat rail that is compliant with the
EN 50022 standard. This Router will not have a secure mount if any other type of
rail is used. Use a top-hat rail that complies with the EN 50022 standard. Be sure to
observe the mounting information provided by the manufacturer.
Note
- A minimum of 2 inch (5 cm) gap should be kept between the Router and
neighbouring devices from the top and bottom. This will ensure that the Router is
sufficiently ventilated and prevent induction from developing.
- The top-hat rail should be located in a horizontal position along the vertical rear
wall of the electrical cabinet. This ensures that the Router can be adequately ventilated from below to above.
Note
- The IP protocol reserves certain IP address ranges for special purposes (such as
multicasting). Do not assign IP addresses in the range from 127.0.0.0 –
127.255.255.255 or 224.0.0.0 – 255.255.255.255.
- This device is intended for use in applications as described in the operating instructions only. Using this device in non-approved applications will lead immediately to the expiration of all guarantee and warranty claims on the part of the operator against the manufacturer.
packet filter rules (Analysis of the network traffic)
Layer 2/3 packet priorizitation (Ethernet
Frame, IP Header, VLAN Tag)
VPN
OpenVPN
Configurable as OpenVPN server or cli-
ent (Layer 2 and Layer 3)
Authentication with X.509 Certificates
Tunnel support via HTTP-Proxy
A maximum of 10 different server con-
figurations
Unlimited number of client connections in
server mode
1
2
DIN-rail mounting:
Insert the top of the DIN-rail clip behind the upper edge of the DINrail (1). Then open the latch at bottom of the device by using a flatbladed screwdriver and fix the device on the DIN-rail by gently
pressing on the bottom (2).
To remove the Router from the DIN-Rail, simply reverse the steps
as described above.
All rights reserved. Reproduction without permission is prohibited.
Pin number
SIGNAL NAME
1
VDC
2
D -
3
D+
4
GND
Note
The configuration of the device can be done either via LAN or WAN RJ45 ports.
Pin number
SIGNAL NAME
1
VCC 5 Volt
2
RESET
3
CLOCK
4
n/c
5
GND
6
n/c
7
I/O
8
n/c
Pin assignment of USB 2.0 connector
The USB interface is intended for connecting peripheral devices (USB 2.0). The connector is without function
in the current firmware version, but is optional for future planned applications.
Pin assignment of Smartcard Reader (ISO 7816 Standard)
The integrated SIM card reader is intended for saving and restoring the configuration data.
7. Initial start-up / Getting Started
Configuration of the Router by using an Internet browser
Connect the unit to a 24V DC (3-pin plug) power source. The corresponding plug is included.
During the initial boot phase, the PWR LED is flashing. The Router is ready when the PWR LED is lit
constantly (after about 30 seconds).
Connect the Router to the Ethernet interface of a configuration PC using a RJ45 network cable.
It is possible to use a standard Ethernet patch cable or a crossed network cable. By default both Ethernet
All rights reserved. Reproduction without permission is prohibited.
Important note
The Router’s Web server partly is using Java script for parameter settings (e.g. if you
want to apply or deleting a configured Open VPN session).
Please ensure that the Web browser your a using is allowed to run Java script.
For Router configuration you do NOT need to install Java runtime software (for
executable Java applets) because only Java script will be used. Standard Web
browsers by default are able to run Java script code.
If some “Apply” buttons are not working (seems to be without function) and if you are
using Internet Explorer 10 please verify that you are using Bowser Mode IE10 to
ensure that Java script is running properly. To validate the browser mode press key
F12 and activate – if not set – mode Internet Explorer 10 as shown in the screenshot
below.
The configuration and control of the Router is to done via the integrated Web server. Any Internet browser
(Microsoft Internet Explorer or Mozilla Firefox) can be used.
When delivered, the Web interface of the Router can be achieved from both LAN and WAN port.
To access the Web interface of the Router the IP address of the connected PC has to be in the same logical
network (IP address range) as the Router.
The default IP addresses and net masks of the Router are:
LAN port : 192.168.1.110 / 255.255.255.0
WAN port : 192.168.2.110 / 255.255.255.0
Starting the Web interface
Start your Web browser and enter the IP address of the connected Router port into the browser’s address
line.
All rights reserved. Reproduction without permission is prohibited.
Note
If the login prompt does not appear, please check the network LED's, if the devices are
connected to the network correctly. If problems still persist, please check the proxy and
firewall settings of the local PC
Screenshot of
the Login page
Now the login prompt of the Router should appear for input „User
name“ and „Password“.
Default values (factory settings) for Login:
User name : admin
Password : Detmold
Confirm your input by pressing the OK button.
Now the Router homepage is displayed. This page corresponds to the menu item "Diagnostic System
Status." On this page the most important configuration and status informations are summarized.
Note: Some fields are linked with a hyperlink to jump directly into the corresponding menu item.
All rights reserved. Reproduction without permission is prohibited.
8. Reset to factory default settings by external push button
By pressing the push button "Factory Default" the security Router can be reset at any time and regardless of
the configuration to the default settings (factory settings).
How to set the factory settings:
1. Power off the Router
2. Press the button „Factory Default“ and keep it hold down
3. Power on the Router and keeping button „Factory Default“ pressed while Router is booting
4. Release button „Factory Default“ when Power LED starts flashing fast (around 10 seconds after power on)
5. Wait until Power LED is glowing constantly green
Now the Router is ready to run with factory default settings.
Default factory settings of the Router:
Language: Englisch user interface
Operation mode : IP Router
IP address LAN port: 192.168.1.110 (static value)
Subnet mask: 255.255.255.0
NAT (Masquerading) on LAN port: Not activated
IP address WAN port: 192.168.2.110 (static value)
Subnet mask: 255.255.255.0
NAT (Masquerading) on WAN port: Not activated
Default gateway: No entry
DNS: DNS relay not activated
Firewall (Packet filter): By default, data traffic in both directions between LAN and WAN is
allowed on both level Layer 2 and Layer 3. For that the packet filter
contains two default rules, called "Allow_L2" and "Allow_L3" (allow traffic
at Layer 2 and 3) which allows as "white lists" all network traffic.
IP routing No static routes
Dynamic routing (OSPF, RIP) disabled
SNMP / DHCP / DNS Disabled
VPN: Disabled
Data prioritization Disabled
All rights reserved. Reproduction without permission is prohibited.
9. Using the Weidmüller Router-Search-Utility
The software tool Weidmüller Router- Search-Utility can be used to find Weidmüller Routers and detect
theirs IP addresses within a switched network. This software is very helpful if you don’t know the current IP
address of a Router. This can e.g. happen in cases that you have forgotten the current IP configuration or
you have lost the Router access in case of configuring an unintended IP address. The main features of the
software are
Detecting a Router and displaying parameters like Device name, MAC address and IP address with
Subnet mask
Change the IP address of a detected Router
Open the web interface of a detected Router
You may download the Weidmüller Router-Search-Utility from the Weidmüller web site using the following
path:
All rights reserved. Reproduction without permission is prohibited.
10. Basic description of the configuration interface (menu items)
The menu structure of the web Interface is divided into 4 main sections:
Section Diagnostics
► Displays system status data
► Display of logging information
► Displays current interface parameters (LAN/WAN/3G)
► Feature for testing the data communication between the Router and other
Ethernet devices (Ping test)
Section Configuration
► Setting of operation mode (eg „IP Router“) and basic network parameters (IP addresses,
Default gateway)
► Setting of firewall rules (Packet filter and an additional auto learning feature called „SecureNow“ to assist the creation of packet filtering rules)
► Configuration of general system data (name, location, contact person, date / time,
language interface, etc.)
► Certificate Management for VPN connections
► User administration (assignment of rights)
► IP-Routing (static, dynamic) and IP address management (Masquerading, 1:1 NAT,
Portforwarding)
► Configuration of VPN connections (OpenVPN, IPsec)
► Configuration of general network services (e.g. DHCP, DBS, SNMP)
► Prioritization of network traffic (Layer-2 and Layer-3 level)
Section System
► Backup and restore of device configuration, Update firmware, Reboot)
Section Informations
► Display of technical data and hardware information (eg serial number and MAC address)
All rights reserved. Reproduction without permission is prohibited.
Figure 3: Diagnostics Eventlog Tab Configuration
Event and error messages can be sent to a syslog server (PC on the network) and also sent as emails.
Figure 4: Diagnostics WAN
Display of the current status of the WAN port.
Figure 5: Diagnostics LAN
Display of the current status of the LAN port.
All rights reserved. Reproduction without permission is prohibited.
Figure 8: Diagnostics Remote-Capture
By using the "remote capture" function data packets on both the LAN and the WAN port of the
Router can be recorded for diagnostic purposes. The receiver of the diagnostic data is a PC which
must have installed the tool "Wireshark".
How to use please refer to application note in Appendix C3.
Figure 9: Configuration IP Configuration
This is the basic configuration window of the Router for assignment of IP addresses on the LAN and WAN
port. Each of the two interfaces can be configured with static or dynamic (DHCP) IP addresses. For models
of type IE-SR-3GT-UMTS/3G (as shown above) additionally a section „3G“ will be displayed to configure the
3G connection.
All rights reserved. Reproduction without permission is prohibited.
Figure 10: Configuration SecureNow
This is an auxiliary function for "independent learning" firewall rules based on temporary recording of data
traffic. By pressing the button "Start Analysis" button the Router begins to analyze the network traffic (ports
LAN, WAN and possibly UMTS/3G). As a result, the Router will provide a table showing the recorded TCP
packets and protocols as well as a proposal for the setting of firewall filtering rules.
Figure 11: Configuration SecureNow „running analysis“
Window screen after starting the network analysis displaying the current network traffic.
All rights reserved. Reproduction without permission is prohibited.
Figure 12: Configuration SecureNow „Analysis stopped“
Window after exiting the network analysis with a proposed indication of firewall filtering rules. If you click the
button "apply rules", the firewall will be updated with the proposed rules and immediately activated. The
changes are not saved automatically, so that e.g. "wrong" filter rules can be removed by a Router restart.
Then previous filter rules would be valid again.
Figure 13: Configuration Packet filter Tab „Layer 3“
This is the window for the manual configuration of firewall filter rules based on Layer 3 (IP layer). The
screenshot shows the firewall settings as delivered with the default rule "Allow_L3*". This rule says that any
IP protocol (*) and any traffic regardless the direction (source and destination=*) is allowed. The result is that
- on delivery - the firewall is "open" on layer 3.
Fore more detailed information about using the packet filter please refer to Appendix A3.
All rights reserved. Reproduction without permission is prohibited.
Figure 14: Configuration Packet filter Tab „Layer 2“
This is the window for the manual configuration of firewall filter rules based on Layer 2 (MAC layer). The
screenshot shows the firewall settings as delivered with the 2 default rules "Allow_L2*" and „ARP*“ (Address
resolution protocol). The rule Allow_L2* allows transmitting any Ethernet frame type (*) and any traffic
regardless the direction (source and destination mac address =*). The result is that - on delivery - the firewall
is "open" for layer 2.
Figure 15: Configuration Packet filter Tab „Status“
Overview of transmit and receive activities of the Ethernet interfaces. In addition, firewall-related information
In this menu it can be configured how the events "Cut" and "Alarm" - after they have occurred – will be reset
(either manually by clicking on a button on the tab “State” or automatically after an elapsed time).
For more information please refer to Appendix C2 (Method 2).
Figure 17: Configuration Cut & Alarm Tab „State“
Displays the current status of the events
"Internal Cut" triggered eg by a special firewall rule
"External Cut" Input of 24 VDC at 4-pin connector (at front side of the Router)
"Alarm" triggered eg by a special firewall rule or by the function „Client monitoring“
By clicking on the buttons „Reset Cut signal“ and „Reset alarm signal“ you can manually reset the events
„Internal Cut“ and „Alarm“. The "External Cut" will automatically be reset if the 24 VDC at the 4-pin connector
All rights reserved. Reproduction without permission is prohibited.
Note:
The Router has no battery-buffered, but
a capacity-buffered system clock. If the
Router is powered-off more than 30
minutes, the date and time values will
be reset to factory default settings (Date
= date of production e.g. 01/01/2012,
Time 00:00).
Figure 18: Configuration General settings System data Tab „Configuration“
Configuring application-related data of the Router (free text).
Figure 19: Configuration General settings Date & time Tab „Configuration“
Setting of date, time and time zone. Alternatively, the date/time setting can be configured via using the "Net-
work Time Protocol" and accessing an external NTP server.
All rights reserved. Reproduction without permission is prohibited.
Figure 20: Configuration General settings User interface Tab „Configuration“
Language Setting the language (German or English) of the Web interface.
Save and apply Setting the behaviour of the button "Activate" respectively „Save“ in the configuration
windows. If you chose the entry „Apply immediately and do not save“ then configuration changes will be
immediately activated but not saved. If you chose the entry „Save only and do not apply“ then the button
named „Apply“ in the configuration windows will be changed to a button named „Saved“. In this case all done
changes will be only saved and not activated. Saved changes come into effect after a restart.
Adding or deleting of certificates for VPN applications (used for both IPsec and OpenVPN).
How to use certificates (CA Root, Server, Client) please refer to Appendix B1 (Link to document
TechNote_Router_RemoteAccess_via_MeetingPoint_V1_??.pdf).
All rights reserved. Reproduction without permission is prohibited.
Figure 22: Configuration General settings SCEP Tab „Configuration“
Configuration of the Router for online access to certificates which are stored on a centralized online certifica-
te server (SCEP Simple Certification Enrollment Protocol). When setting up certificate-based VPN connections, the necessary certificates can be obtained directly from a SCEP server.
Figure 23: Configuration Access control User accounts Tab „Configuration“
Create and delete other user accounts