Hardware descriptions and installation instructions for the UF51 5G
CPE.
Date
Doc Version
Description
June 21, 2021
V 1.0
Initial version
Thanks for choosing Yeastar UF51 5G CPE. The UF51 5G CPE delivers tenacious connection over
network with full-featured design such as automated failover/failback, extended operating
temperature, hardware watchdog, VPN, Gigabit Ethernet and beyond.
This guide describes how to configure and operate the UF51 5G CPE. You can refer to it for detailed
functionality and device configuration.
Readers
This guide is mainly intended for the following users:
- Network Planners
- On-site technical support and maintenance personnel
- Network administrators responsible for network configuration and maintenance
Related Documents
Declaration of Conformity
UF51 is in conformity with the essential requirements and other relevant provisions of the CE, FCC,
Transparent (TCP Client/Server, UDP), Modbus Gateway (Modbus RTU to
Modbus TCP)
Power Supply and Consumption
Connector
2-pin 3.5 mm Terminal Block
Input Voltage
9-48 VDC or 802.3af PoE PD
Power Consumption
≤ 7 W
11
12
Chapter 2 Access to Web GUI
If you enter the username or password incorrectly more than 5 times, the login page will be
locked for 10 minutes.
This chapter explains how to access to Web GUI of the UF51 device.
Username: admin
Password: password
2.1 Wireless Access
1. Enable Wireless Network Connection on your computer and search for access point
“Router_******” to connect it.
2. Open a Web browser on your PC (Chrome is recommended) and type in the IP address 192.168.1.1
to access the web GUI.
3. Enter the username and password, and click “Login”.
4. After logging in the web GUI, you can view system information and perform configuration.
2.2 Wired Access
Connect PC to any LAN port directly or through PoE injector to access the web GUI of device. The
following steps are based on Windows 10 system for your reference.
1. Go to “Control Panel” → “Network and Internet” → “Network and Sharing Center”, then click
“Ethernet” (May have different names).
13
2. Go to “Properties” → “Internet Protocol Version 4(TCP/IPv4) ”, select “Obtain an IP address
If you enter the username or password incorrectly more than 5 times, the login page will be
locked for 10 minutes.
automatically” or “Use the following IP address”, then assign a static IP manually within the same
subnet of the device.
3. Open a Web browser on your PC (Chrome is recommended) and type in the IP address
192.168.1.1 to access the web GUI.
4. Enter the username and password, click “Login”.
5. After logging in the web GUI, you can view system information and perform configuration of the
gateway.
14
15
Chapter 3 Web Configuration
System Information
Item
Description
Model
Show the model name of device.
Serial Number
Show the serial number of device.
Firmware Version
Show the currently firmware version of device.
Hardware Version
Show the currently hardware version of device.
System Status
Item
Description
Local Time
Show the currently local time of system.
Uptime
Show the information about how long the device has
been running.
CPU Load
Show the current CPU utilization of the device.
RAM (Available/Capacity)
Show the RAM capacity and the available RAM memory.
Flash (Available/Capacity)
Show the Flash capacity and the available Flash memory.
Cellular
Item
Description
Status
Show the real-time status of the SIM card.
3.1 Status
3.1.1 Overview
You can view the system information of the device on this page.
Figure 3-1-1-1
Table 3-1-1-1 System Information
Table 3-1-1-2 System Status
16
Current SIM
Show the SIM card currently used for the data connection.
IPv4/IPv6
Show the IPv4/IPv6 address obtained from the mobile carrier.
Connection Duration
Show the connection duration of the currently-used SIM card.
Data Usage Monthly
Show the monthly data usage of currently used SIM card.
Table 3-1-1-3 Cellular Status
WAN
Item
Description
Status
Show the current status of WAN port.
IPv4/IPv6
The IPv4/IPv6 address of WAN port.
MAC
The MAC address of the Ethernet port.
Connection Duration
Show the connection duration of the WAN port.
WLAN
Item
Description
Status
Show the current status of WLAN.
IP
Show the WLAN mode (AP or client).
SSID
Show the SSID of the WLAN AP or client.
Connected Clients
Show the amount of connected devices when using AP
mode.
LAN
Item
Description
IPv4/IPv6
Show the IPv4/IPv6 address of the LAN port.
Connected Devices
The number of devices that connect to the device's LAN.
Table 3-1-1-4 WAN Status
Table 3-1-1-5 WLAN Status
Table 3-1-1-6 LAN Status
3.1.2 Cellular
You can view the cellular network status of device on this page.
17
Figure 3-1-2-1
Modem Information
Item
Description
Status
Show corresponding detection status of module and SIM card.
Model
Show the model name of cellular module.
Version
Show the cellular module firmware version.
Signal Level
Show the cellular signal level.
Register Status
Show the registration status of SIM card.
IMEI
Show the IMEI of the module.
IMSI
Show IMSI of the SIM card.
ICCID
Show ICCID of the SIM card.
ISP
Show the network provider which the SIM card registers on.
Network Type
Show the connected network type, such as 5G NR, LTE, etc.
PLMN ID
Show the current PLMN ID, including MCC, MNC, LAC and Cell ID.
LAC
Show the location area code of the SIM card.
Cell ID
Show the Cell ID of the SIM card location.
CQI
Show the Channel Quality Indicator of the cellular network.
DL Bandwidth
Show the DL bandwidth of the cellular network.
UL Bandwidth
Show the UL bandwidth of the cellular network.
SINR
Show the Signal Interference + Noise Ratio of the cellular network.
PCI
Show the physical-layer cell identity of the cellular network.
RSRP
Show the Reference Signal Received Power of the cellular network.
RSRQ
Show the Reference Quality Received Power of the cellular network.
ECGI
Show the E-UTRAN Cell Global Identifier of the cellular network.
EARFCN
Show the E-UTRA Absolute Radio Frequency Channel Number.
18
ENODEB ID
Show the eNodeB ID of the cellular network.
Table 3-1-2-1 Modem Information
Network
Item
Description
Status
Show the connection status of cellular network.
IPv4/IPv6 Address
Show the IPv4/IPv6 address and netmask of cellular network.
IPv4/IPv6 Gateway
Show the IPv4/IPv6 gateway and netmask of cellular network.
IPv4/IPv6 DNS
Show the DNS of cellular network.
Connection Duration
Show information on how long the cellular network has been
connected.
Data Usage Monthly
Item
Description
RX
Show monthly downlink data usage.
TX
Show monthly uplink data usage.
ALL
Show all monthly data usage.
WAN Status
Item
Description
Port
Show the name of WAN port.
Status
Show the status of WAN port. "Up" refers to a status that WAN is enabled
and Ethernet cable is connected. "Down" means Ethernet cable is
disconnected or WAN function is disabled.
Type
Show the dial-up connection type of WAN port.
IP Address
Show the IPv4 or IPv6 address of WAN port.
Netmask
Show the IPv4 netmask of WAN port.
Prefix-length
Show the IPv6 Prefix-length of WAN port.
Gateway
Show the gateway of WAN port.
Table 3-1-2-2 Network Status
Table 3-1-2-3 Data Usage Information
3.1.3 Network
On this page you can check the WAN and LAN status of the device.
Figure 3-1-3-1
19
DNS
Show the DNS of WAN port.
Connection
Duration
Show the information about how long the Ethernet cable has been
connected to WAN port when WAN function is enabled. Once WAN function
is disabled or Ethernet connection is disconnected, the duration will stop
counting.
Table 3-1-3-1 WAN Status
Bridge
Item
Description
Name
Show the name of the bridge interface.
STP
Show if STP is enabled.
IPv4/IPv6
Show the IPv4/IPv6 address and netmask of the bridge interface.
Members
Show the members of the bridge interface.
WLAN Status
Item
Description
WLAN Status
Name
Show the name of the Wi-Fi interface .
Status
Show the status of the Wi-Fi interface.
Type
Show the Wi-Fi interface type (AP or client).
SSID
Show the SSID of AP device.
IPv4/IPv6 Address
Show the IPv4/IPv6 address and netmask of AP device.
Figure 3-1-3-2
Table 3-1-3-2 Bridge Status
3.1.4 WLAN
You can check Wi-Fi status on this page, including the information of access point and client.
Figure 3-1-4-1
20
Associated Stations
SSID
Show the SSID of AP device.
MAC Address
Show the MAC address of the client which connected to the
device when the interface type is AP. Show the MAC address of
the AP which the device connected to when the interface type
is Client.
IPv4/IPv6 Address
Show the IPv4/IPv6 address of the client which connected to
the device when the interface type is AP. Show the IPv4/IPv6
address of the AP which the device connected to when the
interface type is Client.
Connection Duration
Show the connection duration between client device and device
when the interface type is AP. Show the connection duration
between device and the AP when the interface type is Client.
Table 3-1-4-1 WLAN Status
VPN Status
Item
Description
Clients
Name
Show the name of the enabled VPN clients.
Status
Show the status of client. "Connected" refers to a status that
client is connected to the server. "Disconnected" means client is
disconnected to the server.
Local IP
Show the local IP address of the tunnel.
Remote IP
Show the real remote IP address of the tunnel.
3.1.5 VPN
You can check VPN status on this page, including PPTP, L2TP, IPsec, OpenVPN and DMVPN.
Figure 3-1-5-1
21
Server
Name
Show the name of the enabled VPN Server.
Status
Show the status of Server.
Connected List
Server Type
Show the type of the server.
Client IP
Show the IP address of the client which connected to the server.
Duration
Show the information about how long the client has been
connected to this server when the server is enabled. Once the
server is disabled or connection is disconnected, the duration will
stop counting.
Table 3-1-5-1 VPN Status
Item
Description
Routing Table
Destination
Show the IP address of destination host or destination network.
Netmask/Prefix
Length
Show the netmask or prefix length of destination host or
destination network.
Gateway
Show the IP address of the gateway.
Interface
Show the outbound interface of the route.
Metric
Show the metric of the route.
3.1.6 Routing
You can check routing status on this page, including the routing table and ARP cache.
Figure 3-1-6-1
22
ARP Cache
IP
Show the IP address of ARP pool.
MAC
Show the IP address's corresponding MAC address.
Interface
Show the binding interface of ARP.
Table 3-1-6-1 Routing Information
Host List
Item
Description
DHCP Leases
IP Address
Show IP address of DHCP client
MAC/DUID
Show MAC address of DHCPv4 client or DUID of DHCPv6
client.
Lease Time Remaining
Show the remaining lease time of DHCP client.
MAC Binding
IP
Show the IP address set in the Static IP list of DHCP service.
MAC/DUID
Show the MAC address or DUID set in the Static IP list of DHCP
service.
3.1.7 Host List
You can view the host information on this page.
Figure 3-1-7-1
Table 3-1-7-1 Host List Description
3.1.8 GPS
When GPS function is enabled and the GPS information is obtained successfully, you can view the
latest GPS information including GPS Time, Latitude, Longitude and Speed on this page.
23
GPS Status
Item
Description
Status
Show the status of GPS.
Time for Locating
Show the time for locating.
Satellites In Use
Show the quantity of satellites in use.
Satellites In View
Show the quantity of satellites in view.
Latitude
Show the Latitude of the location.
Longitude
Show the Longitude of the location.
Altitude
Show the Altitude of the location.
Speed
Show the speed of movement.
3.2 Network
3.2.1 Interface
3.2.1.1 Link Failover
Figure 3-1-8-1
Table 3-1-8-1 GPS Status Description
This section describes how to configure link failover strategies, their priority and the ping settings,
each rule owns its own ping rules by default. UF51 will follow the priority to choose the next available
interface to access the internet, make sure you have enable the full interface that you need to use
here. If priority 1 can only use IPv4, UF51 will select a second link which IPv6 works as main IPv6 link
and vice versa.
24
Figure 3-2-1-1
Link Failover
Item
Description
Link Priority
Priority
Display the priority of each interface, you can modify it by the
operation’s up and down button.
Enable Rule
If enabled, the device will choose this interface into its switching
rule. For the Cellular interface, if it’s not enabled here, the
interface will be disabled as well.
Link In Use
Mark whether this interface is in use with green icon.
Interface
Display the name of the interface.
Connection type
Display how to obtain the IP address in this interface, like static
IP or DHCP.
IP
Display the IP address of the interface.
Operation
You can change the priority of the rules and configure the ping
detection rules here.
Settings
Revert Interval
Specify the number of seconds to waiting for switching to the
link with higher priority, 0 means to disable the function.
Emergency Reboot
Enable to reboot the device if no link is available.
Table 3-2-1-1 Link Failover Parameters
25
Figure 3-2-1-2
Ping Detection
Item
Description
Enable
If enabled, the device will periodically detect the connection
status of the link.
IPv4/IPv6 Primary
Server
The device will send ICMP packet to the IPv4/IPv6 address or
hostname to determine whether the Internet connection is still
available or not.
IPv4/IPv6 Secondary
Server
The device will try to ping the secondary server if primary
server is not available.
Interval
Time interval (in seconds) between two Pings.
Retry Interval
Set the ping retry interval. When ping failed, the device will
ping again in every retry interval.
Timeout
The maximum amount of time the device will wait for a
response to a ping request. If it does not receive a response
for the amount of time defined in this field, the ping request
will be considered to have failed.
Max Ping Retries
The retry times of the device sending ping request until
determining that the connection has failed.
Table 3-2-1-2 Ping Detection Parameters
3.2.1.2 Cellular
This section explains how to set the related parameters for cellular network.
26
Figure 3-2-1-3
Cellular Settings
Item
Description
Protocol
Select from "IPv4", "IPv6" and "IPv4/IPv6".
APN
Enter the Access Point Name for cellular dial-up connection provided
by local ISP.
Username
Enter the username for cellular dial-up connection provided by local
ISP.
Password
Enter the password for cellular dial-up connection provided by local
ISP.
PIN Code
Enter a 4-8 characters PIN code to unlock the SIM.
Access Number
Enter the dial-up center NO. For cellular dial-up connection provided
by local ISP.
Authentication Type
Select from "Auto", "PAP", "CHAP", "MS-CHAP", and "MS-CHAPv2".
27
Network Type
Select from "Auto", “5G NSA”, “5G SA”, "4G Only" and "3G Only".
Auto: connect to the network with the strongest signal automatically.
4G Only: connect to 4G network only.
And so on.
SMS Center
Enter the local SMS center number for storing, forwarding, converting
and delivering SMS message.
Enable NAT
Enable or disable NAT function.
Roaming
Enable or disable roaming.
Data Limit
When you reach the specified data usage limit, the data connection of
currently used SIM card will be disabled. 0 means to disable the
function.
Billing Day
Choose the billing day of the SIM card, the device will reset the data
used to 0.
Table 3-2-1-3 Cellular Parameters
Connection Setting
Item
Description
Connection Mode
Select from "Always Online" and "Connect on Demand".
Re-dial Interval(s)
Set the interval to dial into ISP when it lost connection, the default value is 5s.
Max Idle Times
Set the maximum duration of device when current link is under idle status.
Range: 10-3600
Triggered by Call
The device will switch from offline mode to cellular network mode
automatically when it receives a call from the specific phone number.
Call Group
Select a call group for call trigger. Go to "System > Phone&SMS > Phone" to
set up phone group.
Triggered by SMS
The device will switch from offline mode to cellular network mode
automatically when it receives a specific SMS from the specific mobile
phone.
Figure 3-2-1-4
28
SMS Group
Select an SMS group for trigger. Go to "System > Phone&SMS > SMS" to set
up SMS group.
SMS Text
Fill in the SMS content for trigger.
Triggered by IO
The device will switch from offline mode to cellular network mode
automatically when the DI status is changed. Go to "Industrial > I/O > DI" to
configure trigger condition.
Table 3-2-1-4 Cellular Parameters
Port Setting
Item
Description
Port
Users can define the Ethernet ports according to their needs.
Status
Set the status of Ethernet port; select "up" to enable and "down" to
disable.
Property
Show the Ethernet port's type, as a WAN port or a LAN port.
Speed
Ethernet port speed is fixed as “auto”.
Duplex
Ethernet port mode is fixed as “auto”.
Related Topics
Cellular Network Connection
Phone Group
DI Setting
3.2.1.3 Port
This section describes how to configure the Ethernet port parameters.
UF51 supports 2 Gigabit Ethernet ports.
Figure 3-2-1-5
Table 3-2-1-5 Port Parameters
3.2.1.4 WAN
WAN port can be connected with Ethernet cable to get Internet access. It supports 3 connection
types.
- Static IP: configure IP address, netmask and gateway for Ethernet WAN interface.
- DHCP Client: configure Ethernet WAN interface as DHCP Client to obtain IPv4 address
automatically.
- PPPoE: configure Ethernet WAN interface as PPPoE Client.
- DHCPv6 Client: configure Ethernet WAN interface as DHCP Client to obtain IPv6 address
automatically.
29
- PPPoE v6: configure Ethernet WAN interface as PPPoEv6 Client.
WAN Basic Setting
Item
Description
Default
Enable
Enable WAN function.
Enable
Port
The port that is currently set as WAN port.
LAN1/WAN
Connection Type
Select from "Static IP", "DHCP Client", “DHCPv6
Client”, "PPPoE", “DHCPv6 Client”, "PPPoEv6", and
"Dual-Stack Lite".
Static IP
MTU
Set the maximum transmission unit.
1500
IPv4 Primary
DNS Server
Set the primary IPv4 DNS server.
114.114.114.
114
IPv4 Secondary
DNS Server
Set the secondary IPv4 DNS server.
8.8.8.8
IPv6 Primary
DNS Server
Set the primary IPv6 DNS server.
2001:4860:4
860:8888
IPv6 Secondary
DNS Server
Set the secondary IPv6 DNS server.
--
Enable NAT
Enable or disable NAT function. When enabled, a
private IP can be translated to a public IP.
Enable
- Dual-Stack Lite: use IPv4-in-IPv6 tunneling to send terminal device’s IPv4 packet through a tunnel on
the IPv6 access network to the ISP.
Figure 3-2-1-6
Table 3-2-1-6 WAN Parameters
30
1. Static IP Configuration
Static IP
Item
Description
Default
IPv4
Address
Set the IPv4 address of the WAN port.
192.168.0.1
Netmask
Set the Netmask for WAN port.
255.255.255.0
IPv4
Gateway
Set the gateway for WAN port's IPv4 address.
192.168.0.2
IPv6
Address
Set the IPv6 address which can access Internet.
Generated from
Mac address
Prefix-length
Set the IPv6 prefix length to identify how many bits of a Global
Unicast IPv6 address are there in network part. For example, in
2001:0DB8:0000:000b::/64, the number 64 is used to identify
that the first 64 bits are in network part.
64
IPv6
Gateway
Set the gateway for WAN port's IPv6 address.
E.g.2001:DB8:ACAD:4::2.
--
Multiple IP
Address
Set the multiple IP addresses for WAN port.
Null
If the external network assigns a fixed IP for the WAN interface, user can select “Static IP” mode.
Figure 3-2-1-7
Table 3-2-1-7 Static Parameters
2. DHCP Client/DHCPv6 Client
If the external network has DHCP server enabled and has assigned IP addresses to the Ethernet WAN
interface, user can select “DHCP client” mode to obtain IP address automatically.
31
Figure 3-2-1-8
DHCP Client
Item
Description
Use Peer DNS
Obtain peer DNS automatically during PPP dialing. DNS is
necessary when visiting domain name.
DHCPv6 Client
Request IPv6-address
Choose the ways to obtain the IPv6 address from the DHCP
Server. Select from try, force, none.
Try: The DHCP Server will assign specific address in priority.
Force: The DHCP Server assigns specific address only.
None: The DHCP Server will randomly assign address.The
specific address is relevant to the prefix length of IPv6 address
you set.
Request prefix length of
IPv6
Set the prefix length of IPv6 address which device is expected
to obtain from DHCP Server.
Figure 3-2-1-9
Table 3-2-1-8 DHCP Client Parameters
3. PPPoE/PPPoEv6
PPPoE refers to a point to point protocol over Ethernet. With PPPoE, remote access devices can get
control of each user. If type as PPPoEv6, UF51 can get both IPv4 and IPv6 address.
32
Figure 3-2-1-10
PPPoE
Item
Description
Username
Enter the username provided by your Internet Service Provider (ISP).
Password
Enter the password provided by your Internet Service Provider (ISP).
Link Detection
Interval (s)
Set the heartbeat interval for link detection. Range: 1-600.
Max Retries
Set the maximum retry times after it fails to dial up. Range: 0-9.
Use Peer DNS
Obtain peer DNS automatically during PPP dialing. DNS is necessary
when visiting domain name.
Figure 3-2-1-11
Table 3-2-1-9 PPOE Parameters
4. Dual-Stack Lite
Dual-Stack Lite (DS-Lite) uses IPv4-in-IPv6 tunneling to send a subscriber’s IPv4 packet through a
tunnel on the IPv6 access network to the ISP. The IPv6 packet is decapsulated to recover the
33
subscriber’s IPv4 packet and is then sent to the Internet after NAT address and port translation and
Dual-Stack Lite
Item
Description
IPv6 Gateway
Set the gateway for WAN port's IPv6 address.
DS-Lite AFTR
Address
Set the DS-Lite AFTR server address.
Local IPv6
Address
Set the WAN port IPv6 address which use the same subnet as IPv6
gateway.
other LSN related processing. The response packets traverse through the same path to the
subscriber.
Figure 3-2-1-12
Table 3-2-1-10 Dual-Stack Lite Parameters
Related Configuration Example
Ethernet WAN Connection
3.2.1.5 Bridge
Bridge setting is used for managing local area network devices which are connected to LAN ports of
the UF51, allowing each of them to access the Internet.
34
Figure 3-2-1-13
Bridge
Item
Description
Default
Name
Show the name of bridge. "Bridge0" is set by default and
cannot be changed.
Bridge0
STP
Enable/disable STP.
Disable
IP Address
Set the IP address for bridge.
192.168.1.1
Netmask
Set the Netmask for bridge.
255.255.255.
0
IPv6 Address
Set the IPv6 address for bridge.
2004::1/64
MTU
Set the maximum transmission unit. Range: 68-1500.
1500
Multiple IP Address
Set the multiple IP addresses for bridge.
Null
Table 3-2-1-11 Bridge Settings
3.2.1.6 WLAN
This section explains how to set the related parameters for Wi-Fi network. UF51 supports both 2.4
GHz and 5 GHz Wi-Fi and it can work as AP or client mode at the same time.
35
Figure 3-2-1-14
WLAN
Item
Description
Enable
Enable/disable WLAN.
Work Mode
The options are "Client" or "AP".
SSID
Fill in the SSID of the access point.
BSSID
Fill in the MAC address of the access point. Either SSID or BSSID can be filled
to joint the network.
Encryption
Mode
Select encryption mode. The options are “No Encryption", “WEP Open
System" , “WEP Shared Key", “WPA-PSK", “WPA2-PSK" and
“WPA-PSK/WPA2-PSK".
Cipher
Select cipher. The options are “Auto", “AES", “TKIP" and “AES/TKIP".
Key
Fill in the key of access point.
36
Client Mode
Scan
Click "Scan" button to search the nearby access point.
SSID
Show SSID.
Channel
Show wireless channel.
Signal
Show wireless signal.
BSSID
Show the MAC address of the access point.
Cipher
Show the cipher of the access point.
Security
Show the encryption mode.
Frequency
Show the frequency of radio.
Join Network
Click the button to join the wireless network.
AP Mode
Radio Type
Select Radio type. 2.4G radio types can only be selected in WLAN 1 and 5G
radio types can only be selected in WLAN2.
Channel
Select wireless channel. The options are "Auto", "1", "2"......"11".
Bandwidth
Select bandwidth. The options are "20MHz" and "40MHz".
Group Rekey
Time
Rekeytime is when you select PSK encryption mode.
SSID
Broadcast
When SSID broadcast is disabled, other wireless devices can't not find the
SSID, and users have to enter the SSID manually to access to the wireless
network.
AP Isolation
When AP isolation is enabled, all users that access to the AP are isolated
without communication with each other.
Guest Mode
The internal network is not allowed to visit if the guest mode is enabled.
IP Setting
Protocol
Set the IP address in wireless network.
IP Address
Set the IP address in wireless network.
Netmask
Set the netmask in wireless network.
Gateway
Set the gateway in wireless network.
Table 3-2-1-12 WLAN Parameters
MAC Filtering
Item
Description
Type
In this mode, you can choose the rule according to your security
Figure 3-2-1-15
37
policy, which is ‘Allow and Block the Rest’ and ‘Block and Allow
the Rest’, the default value is Disabled.
Allow and Block the Rest
Only the listed MAC addresses are allowed to connect to the
device's wireless access point.
Block and Allow the Rest
The listed MAC addresses are not allowed to connect to the
device's wireless access point.
Table 3-2-1-13 MAC Filtering Parameters
Switch
Item
Description
LAN Settings
Name
Set interface name of VLAN.
VLAN ID
Select VLAN ID of the interface.
IP Address
Set IP address of LAN port.
Netmask
Set Netmask of LAN port.
MTU
Set the maximum transmission unit of LAN port. Range: 68-1500.
VLAN Settings
VLAN ID
Set the label ID of the VLAN. Range: 1-4094.
LAN 1/2
Make the VLAN bind with the corresponding ports and select status
from "Tagged", "Untagged" and "Close" for Ethernet frame on trunk link.
CPU
Control communication between VLAN and other networks.
Related Topic
Wi-Fi Application Example
3.2.1.7 Switch
VLAN is a kind of new data exchange technology that realizes virtual work groups by logically dividing
the LAN device into network segments.
Figure 3-2-1-16
Table 3-2-1-14 VLAN Trunk Parameters
38
3.2.1.8 Loopback
Loopback
Item
Description
Default
IP Address
Unalterable
127.0.0.1
Netmask
Unalterable
255.0.0.0
Multiple IP
Addresses
Apart from the IP above, user can configure
other IP addresses.
Null
Loopback interface is used for replacing device's ID as long as it is activated. When the interface is
DOWN, the ID of the device has to be selected again which leads to long convergence time of OSPF.
Therefore, Loopback interface is generally recommended as the ID of the device.
Loopback interface is a logic and virtual interface on device. Under default conditions, there's no
loopback interface on device, but it can be created as required.
Figure 3-2-1-17
Table 3-2-1-15 Loopback Parameters
3.2.2 DHCP
DHCP adopts Client/Server communication mode. The Client sends configuration request to the
Server which feeds back corresponding configuration information and distributes IP address to the
Client so as to achieve the dynamic configuration of IP address and other information.
3.2.2.1 DHCP Server/DHCPv6 Server
UF51 can be set as a DHCP server or DHCPv6 server to distribute IP address when a host logs on and
ensures each host is supplied with different IP addresses. DHCP Server has simplified some previous
network management tasks requiring manual operations to the largest extent. UF51 only supports
stateful DHCPv6 when working as DHCPv6 server.
39
Figure 3-2-2-1
DHCP Server/DHCPv6 Server
Item
Description
Default
Enable
Enable or disable DHCP server.
Enable
Interface
Select interface.
Bridge0
Start Address
Define the beginning of the pool of IP addresses which will
be leased to DHCP clients.
192.168.1.2
End Address
Define the end of the pool of IP addresses which will be
leased to DHCP clients.
192.168.1.2
54
Netmask
Define the subnet mask of IPv4 address obtained by DHCP
clients from DHCP server.
255.255.255
.0
Figure 3-2-2-2
40
Table 3-2-2-1 DHCP Server Parameters
DHCP Relay
Item
Description
Enable
Enable or disable DHCP relay.
DHCP Server
Set DHCP server, up to 10 servers can be configured;
separate them by blank space or ",".
Prefix Length
Set the IPv6 prefix length of IPv6 address obtained by DHCP
clients from DHCP server.
64
Lease Time (Min)
Set the lease time on which the client can use the IP
address obtained from DHCP server. Range: 1-10080.
1440
Primary DNS Server
Set the primary DNS server.
192.168.1.1
Secondary DNS
Server
Set the secondary DNS server.
Null
Windows Name
Server
Define the Windows Internet Naming Service obtained by
DHCP clients from DHCP sever. Generally you can leave it
blank.
Null
Static IP
MAC Address
Set a static and specific MAC address for the DHCP client
(it should be different from other MACs so as to avoid
conflict).
Null
DUID
Set a static and specific DUID for the DHCPv6 client (it
should be different from other DUID so as to avoid conflict).
Null
IP Address
Set a static and specific IP address for the DHCP client (it
should be outside of the DHCP range).
Null
3.2.2.2 DHCP Relay
UF51 can be set as DHCP Relay to provide a relay tunnel to solve the problem that DHCP Client and
DHCP Server are not in the same subnet.
Figure 3-2-2-2
Table 3-2-2-2 DHCP Relay Parameters
41
3.2.3 Firewall
Item
Description
Default
Prevent Attack
DoS/DDoS Protection
Enable/disable Prevent DoS/DDoS Attack.
Disable
Access Service Control
Port
Set port number of the services. Range: 1-65535.
--
Local
Access the device locally.
Enable
Remote
Access the device remotely.
Disable
HTTP
Users can log in the device locally via HTTP to
80
This section describes how to set the firewall parameters, including security, ACL, DMZ, Port Mapping,
MAC Binding and SPI.
The firewall implements corresponding control of data flow at entry direction (from Internet to local
area network) and exit direction (from local area network to Internet) according to the content
features of packets, such as protocol style, source/destination IP address, etc. It ensures that the
device operate in a safe environment and host in local area network.
3.2.3.1 Security
Figure 3-2-3-1
42
access and control it through Web after the option
is checked.
HTTPS
Users can log in the device locally and remotely
via HTTPS to access and control it through Web
after option is checked.
443
TELNET
Users can log in the device locally and remotely
via Telnet after the option is checked.
23
SSH
Users can log in the device locally and remotely
via SSH after the option is checked.
22
FTP
Users can log in the device locally and remotely
via FTP after the option is checked.
21
Website Blocking
URL Blocking
Enter the HTTP address which you want to block.
Keyword Blocking
You can block specific website by entering keyword. The
maximum number of character allowed is 64.
Table 3-2-3-1 Security Parameters
3.2.3.2 ACL
Access control list, also called ACL, implements permission or prohibition of access for specified
network traffic (such as the source IP address) by configuring a series of matching rules so as to
filter the network interface traffic. When device receives packet, the field will be analyzed according to
the ACL rule applied to the current interface. After the special packet is identified, the permission or
prohibition of corresponding packet will be implemented according to preset strategy.
The data package matching rules defined by ACL can also be used by other functions requiring flow
distinction.
Figure 3-2-3-2
43
Item
Description
ACL Setting
Default Filter Policy
Select from "Accept" and "Deny".
The packets which are not included in the access control list
will be processed by the default filter policy.
Access Control List
Type
Select type from "Extended" and "Standard".
ID
User-defined ACL number. Range: 1-199.
Action
Select from "Permit" and "Deny".
Protocol
Select protocol from "ip", "icmp", "tcp", "udp", and "1-255".
Source IP
Source network address (leaving it blank means all).
Source Wildcard Mask
Wildcard mask of the source network address.
Destination IP
Destination network address (0.0.0.0 means all).
Destination Wildcard
Mask
Wildcard mask of destination address.
Description
Fill in a description for the groups with the same ID.
ICMP Type
Enter the type of ICMP packet. Range: 0-255.
ICMP Code
Enter the code of ICMP packet. Range: 0-255.
Source Port Type
Select source port type, such as specified port, port range, etc.
Source Port
Set source port number. Range: 1-65535.
Start Source Port
Set start source port number. Range: 1-65535.
End Source Port
Set end source port number. Range: 1-65535.
Destination Port Type
Select destination port type, such as specified port, port range,
etc.
Destination Port
Set destination port number. Range: 1-65535.
Start Destination Port
Set start destination port number. Range: 1-65535.
End Destination Port
Set end destination port number. Range: 1-65535.
More Details
Show information of the port.
Interface List
Interface
Select network interface for access control.
In ACL
Select a rule for incoming traffic from ACL ID.
Out ACL
Select a rule for outgoing traffic from ACL ID.
Table 3-2-3-2 ACL Parameters
Related Configuration Example
Access Control Application Example
3.2.3.3 Port Mapping
Port mapping is an application of network address translation (NAT) that redirects a communication
request from the combination of an address and port number to another while the packets are
traversing a network gateway such as a router or firewall.
44
Clickto add a new port mapping rules.
Port Mapping
Item
Description
Source IP
Specify the host or network which can access local IP address.
0.0.0.0/0 means all.
Source Port
Enter the TCP or UDP port from which incoming packets are
forwarded. Range: 1-65535.
Destination IP
Enter the IP address that packets are forwarded to after being
received on the incoming interface.
Destination Port
Enter the TCP or UDP port that packets are forwarded to after
being received on the incoming port(s). Range: 1-65535.
Protocol
Select from "TCP" and "UDP" as your application required.
Description
The description of this rule.
Figure 3-2-3-3
Table 3-2-3-3 Port Mapping Parameters
Related Configuration Example
NAT Application Example
3.2.3.4 DMZ
DMZ is a host within the internal network that has all ports exposed, except those forwarded ports in
port mapping.
45
Figure 3-2-3-4
DMZ
Item
Description
Enable
Enable or disable DMZ.
DMZ Host
Enter the IP address of the DMZ host on the internal network.
Source Address
Set the source IP address which can access to DMZ host.
"0.0.0.0/0" means any address.
MAC Binding List
Item
Description
MAC Address
Set the binding MAC address.
IP Address
Set the binding IP address.
Description
Fill in a description for convenience of recording the
meaning of the binding rule for each piece of MAC-IP.
Table 3-2-3-4 DMZ Parameters
3.2.3.5 MAC Binding
MAC Binding is used for specifying hosts by matching MAC addresses and IP addresses that are in
the list of allowed outer network access.
Figure 3-2-3-5
Table 3-2-3-5 MAC Binding Parameters
3.2.3.6 Custom Rules
In this page, you can configure your own custom firewall iptables rules.
Figure 3-2-3-6
46
Custom Rules
Item
Description
Rule
Specify an iptables rule like the example shows.
Tips: You must reboot the device to take effect after modifying or
deleting the iptables rules.
Description
Enter the description of the rule.
3.2.3.7 SPI
SPI Firewall
Item
Description
Enable
Enable/disable SPI firewall.
Filter Proxy
Blocks HTTP requests containing the "Host": string.
Filter Cookies
Identifies HTTP requests that contain "Cookie": String and
mangle the cookie. Attempts to stop cookies from being used.
Filter ActiveX
Blocks HTTP requests of the URL that ends in ".ocx" or ".cab".
Filter Java Applets
Blocks HTTP requests of the URL that ends in ".js" or ".class".
Filter Multicast
Prevent multicast packets from reaching the LAN.
Filter IDENT(port 113)
Prevent WAN access to Port 113.
Block WAN SNMP access
Block SNMP requests from the WAN.
Filter WAN NAT Redirection
Prevent hosts on LAN from using WAN address of device to
connect servers on the LAN (which have been configured
using port redirection).
Block Anonymous WAN
Requests
Stop the device from responding to "pings" from the WAN.
Table 3-2-3-6 Custom Rules Parameters
Figure 3-2-3-7
Table 3-2-3-7 SPI Parameters
47
3.2.4 QoS
QoS
Item
Description
Download/Upload
Enable
Enable or disable QoS.
Default Category
Select the default category from Service Category list.
Download/Upload
Bandwidth Capacity
The download/upload bandwidth capacity of the network
that the device is connected with, in kbps. Range:
1-8000000.
Service Category
Name
You can use characters such digits, letters and "-".
Percent (%)
Set percent for the service category. Range: 0-100.
Max BW(kbps)
The maximum bandwidth that this category is allowed to
consume, in kbps. The value should be less than the
"Download/Upload Bandwidth Capacity" when the traffic is
blocked.
Min BW(kbps)
The minimum bandwidth that can be guaranteed for the
category, in kbps.The value should be less than the "MAX
BW" value.
Service Category Rules
Item
Description
Name
Give the rule a descriptive name.
Source IP
Source address of flow control (leaving it blank means any).
Quality of service (QoS) refers to traffic prioritization and resource reservation control mechanisms
rather than the achieved service quality. QoS is engineered to provide different priority for different
applications, users, data flows, or to guarantee a certain level of performance to a data flow.
Figure 3-2-4-1
48
Source Port
Source port of flow control. Range: 0-65535 (leaving it blank
means any).
Destination IP
Destination address of flow control (leaving it blank means
any).
Destination Port
Destination port of flow control. Range: 0-65535 (leaving it
blank means any).
Protocol
Select protocol from "ANY", "TCP", "UDP", "ICMP", and "GRE".
Service Category
Set service category for the rule.
Table 3-2-4-1 QoS (Download/Upload) Parameters
Related Configuration Example
QoS Application Example
3.2.5 VPN
Virtual Private Networks, also called VPNs, are used to securely connect two private networks
together so that devices can connect from one network to the other network via secure channels.
UF51 supports DMVPN, IPsec, GRE, L2TP, PPTP, OpenVPN, as well as GRE over IPsec and L2TP over
IPsec.
3.2.5.1 DMVPN
A dynamic multi-point virtual private network (DMVPN), combining mGRE and IPsec, is a secure
network that exchanges data between sites without passing traffic through an organization's
headquarter VPN server or router.
Figure 3-2-5-1
49
DMVPN
Item
Description
Enable
Enable or disable DMVPN.
Hub Address
The IP address or domain name of DMVPN Hub.
Local IP Address
DMVPN local tunnel IP address.
GRE Hub IP Address
GRE Hub tunnel IP address.
GRE Local IP Address
GRE local tunnel IP address.
GRE Netmask
GRE local tunnel netmask.
GRE Key
GRE tunnel key.
Negotiation Mode
Select from "Main" and "Aggressive".
Authentication
Algorithm
Select from "DES", "3DES", "AES128", "AES192" and
"AES256".
Encryption Algorithm
Select from "MD5" and "SHA1".
DH Group
Select from "MODP768_1", "MODP1024_2" and
"MODP1536_5".
Key
Enter the preshared key.
Local ID Type
Select from "Default", "ID", "FQDN", and "User FQDN"
IKE Life Time (s)
Set the lifetime in IKE negotiation. Range: 60-86400.
SA Algorithm
Select from "DES_MD5", "DES_SHA1", "3DES_MD5",
"3DES_SHA1", "AES128_MD5", "AES128_SHA1",
"AES192_MD5", "AES192_SHA1", "AES256_MD5" and
"AES256_SHA1".
PFS Group
Select from "NULL", "MODP768_1", "MODP1024_2" and
"MODP1536-5".
Life Time (s)
Set the lifetime of IPsec SA. Range: 60-86400.
DPD Interval Time (s)
Set DPD interval time
DPD Timeout (s)
Set DPD timeout.
Cisco Secret
Cisco Nhrp key.
NHRP Holdtime (s)
The holdtime of NHRP protocol.
Table 3-2-5-1 DMVPN Parameters
3.2.5.2 IPSec Server
IPsec is especially useful for implementing virtual private networks and for remote user access
through dial-up connection to private networks. A big advantage of IPsec is that security
arrangements can be handled without requiring changes to individual user computers.
IPsec provides three choices of security service: Authentication Header (AH), Encapsulating Security
Payload (ESP), and Internet Key Exchange (IKE). AH essentially allows authentication of the senders’
data. ESP supports both authentication of the sender and data encryption. IKE is used for cipher code
exchange. All of them can protect one and more data flows between hosts, between host and
gateway, and between gateways.
50
Figure 3-2-5-2
IPsec Server
Item
Description
Enable
Enable IPsec tunnel. A maximum of 3 tunnels is allowed.
IPsec Mode
Select from "Tunnel" and "Transport".
IPsec Protocol
Select from "ESP" and "AH".
Local Subnet
Enter the local subnet IP address that IPsec protects.
Local Subnet Netmask
Enter the local netmask that IPsec protects.
Local ID Type
Select from "Default", "ID", "FQDN", and "User FQDN".
Remote Subnet
Enter the remote subnet IP address that IPsec protects.
Remote Subnet Mask
Enter the remote netmask that IPsec protects.
Remote ID type
Select from "Default", "ID", "FQDN", and "User FQDN".
Table 3-2-5-2 IPsec Parameters
51
Figure 3-2-5-3
IKE Parameter
Item
Description
IKE Version
Select from "IKEv1" and "IKEv2".
Negotiation Mode
Select from "Main" and "Aggressive".
Encryption Algorithm
Select from "DES", "3DES", "AES128", "AES192" and "AES256".
Authentication Algorithm
Select from "MD5" and " SHA1"
DH Group
Select from "MODP768_1", "MODP1024_2" and "MODP1536_5".
Local Authentication
Select from "PSK" and "CA".
XAUTH
Enter XAUTH username and password after XAUTH is enabled.
Figure 3-2-5-4
52
Lifetime (s)
Set the lifetime in IKE negotiation. Range: 60-86400.
XAUTH List
Username
Enter the username used for the xauth authentication.
Password
Enter the password used for the xauth authentication.
PSK List
Selector
Enter the corresponding identification number for PSK authentication.
PSK
Enter the pre-shared key.
SA Parameter
SA Algorithm
Select from "DES_MD5", "DES_SHA1", "3DES_MD5", "3DES_SHA1",
"AES128_MD5", "AES128_SHA1", "AES192_MD5", "AES192_SHA1",
"AES256_MD5" and "AES256_SHA1".
PFS Group
Select from "NULL", "MODP768_1" , "MODP1024_2" and
"MODP1536_5".
Lifetime (s)
Set the lifetime of IPsec SA. Range: 60-86400.
DPD Interval Time(s)
Set DPD interval time to detect if the remote side fails.
DPD Timeout(s)
Set DPD timeout. Range: 10-3600.
IPsec Advanced
Enable Compression
The head of IP packet will be compressed after it's enabled.
VPN Over IPsec Type
Select from "NONE", "GRE" and "L2TP" to enable VPN over IPsec
function.
Expert Options
User can enter some other initialization strings in this field and
separate the strings with “;”. For example, if more local or remote
subnet need to be added, users can add contents here.
Table 3-2-5-3 IPsec Server Parameters
53
3.2.5.3 IPSec
IPsec
Item
Description
Enable
Enable IPsec tunnel. A maximum of 3 tunnels is allowed.
IPsec Gateway Address
Enter the IP address or domain name of remote IPsec
server.
IPsec Mode
Select from "Tunnel" and "Transport".
IPsec Protocol
Select from "ESP" and "AH".
Local Subnet
Enter the local subnet IP address that IPsec protects.
Local Subnet Netmask
Enter the local netmask that IPsec protects.
Local ID Type
Select from "Default", "ID", "FQDN", and "User FQDN".
Remote Subnet
Enter the remote subnet IP address that IPsec protects.
Remote Subnet Mask
Enter the remote netmask that IPsec protects.
Remote ID type
Select from "Default", "ID", "FQDN", and "User FQDN".
Figure 3-2-5-5
Table 3-2-5-4 IPsec Parameters
54
Figure 3-2-5-6
IKE Parameter
Item
Description
IKE Version
Select from "IKEv1" and "IKEv2".
Negotiation Mode
Select from "Main" and "Aggressive".
Encryption Algorithm
Select from "DES", "3DES", "AES128", "AES192" and "AES256".
Authentication Algorithm
Select from "MD5" and " SHA1"
DH Group
Select from "MODP768_1", "MODP1024_2" and "MODP1536_5".
Local Authentication
Select from "PSK" and "CA".
Local Secrets
Enter the pre-shared key.
XAUTH
Enter XAUTH username and password after XAUTH is enabled.
Lifetime (s)
Set the lifetime in IKE negotiation. Range: 60-86400.
SA Parameter
SA Algorithm
Select from "DES_MD5", "DES_SHA1", "3DES_MD5", "3DES_SHA1",
"AES128_MD5", "AES128_SHA1", "AES192_MD5", "AES192_SHA1",
"AES256_MD5" and "AES256_SHA1".
55
PFS Group
Select from "NULL", "MODP768_1" , "MODP1024_2" and
"MODP1536_5".
Lifetime (s)
Set the lifetime of IPsec SA. Range: 60-86400.
DPD Interval Time(s)
Set DPD interval time to detect if the remote side fails.
DPD Timeout(s)
Set DPD timeout. Range: 10-3600.
IPsec Advanced
Enable Compression
The head of IP packet will be compressed after it's enabled.
VPN Over IPsec Type
Select from "NONE", "GRE" and "L2TP" to enable VPN over IPsec
function.
Expert Option
User can enter some other initialization strings in this field and
separate the strings with “;”. For example, if more local or remote
subnet need to be added, users can add contents here.
Table 3-2-5-5 IPsec Parameters
3.2.5.4 GRE
Generic Routing Encapsulation (GRE) is a protocol that encapsulates packets in order to route other
protocols over IP networks. It’s a tunneling technology that provides a channel through which
encapsulated data message could be transmitted and encapsulation and decapsulation could be
realized at both ends.
In the following circumstances the GRE tunnel transmission can be applied:
GRE tunnel could transmit multicast data packets as if it were a true network interface. Single use
-
of IPSec cannot achieve the encryption of multicast.
A certain protocol adopted cannot be routed.
-
A network of different IP addresses shall be required to connect other two similar networks.
-
56
Figure 3-2-5-7
GRE
Item
Description
Enable
Check to enable GRE function.
Remote IP Address
Enter the real remote IP address of GRE tunnel.
Local IP Address
Set the local IP address.
Local Virtual IP
Address
Set the local tunnel IP address of GRE tunnel.
Netmask
Set the local netmask.
Peer Virtual IP Address
Enter remote tunnel IP address of GRE tunnel.
Global Traffic
Forwarding
All the data traffic will be sent out via GRE tunnel when this
function is enabled.
Remote Subnet
Enter the remote subnet IP address of GRE tunnel.
Remote Netmask
Enter the remote netmask of GRE tunnel.
MTU
Enter the maximum transmission unit. Range: 64-1500.
Key
Set GRE tunnel key.
Enable NAT
Enable NAT traversal function.
Table 3-2-5-6 GRE Parameters
57
3.2.5.5 L2TP
L2TP
Item
Description
Enable
Check to enable L2TP function.
Remote IP Address
Enter the public IP address or domain name of L2TP server.
Username
Enter the username that L2TP server provides.
Password
Enter the password that L2TP server provides.
Authentication
Select from "Auto", "PAP", "CHAP", "MS-CHAPv1" and
"MS-CHAPv2".
Global Traffic
Forwarding
All of the data traffic will be sent out via L2TP tunnel after
this function is enabled.
Remote Subnet
Enter the remote IP address that L2TP protects.
Remote Subnet Mask
Enter the remote netmask that L2TP protects.
Key
Enter the password of L2TP tunnel.
Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP)
used by an Internet service provider (ISP) to enable the operation of a virtual private network (VPN)
over the Internet.
Figure 3-2-5-8
Table 3-2-5-7 L2TP Parameters
58
Figure 3-2-5-9
Advanced Settings
Item
Description
Local IP Address
Set tunnel IP address of L2TP client. Client will obtain
tunnel IP address automatically from the server when it's
null.
Peer IP Address
Enter tunnel IP address of L2TP server.
Enable NAT
Enable NAT traversal function.
Enable MPPE
Enable MPPE encryption.
Address/Control
Compression
For PPP initialization. User can keep the default option.
Protocol Field
Compression
For PPP initialization. User can keep the default option.
Asyncmap Value
One of the PPP protocol initialization strings. User can
keep the default value. Range: 0-ffffffff.
MRU
Set the maximum receive unit. Range: 64-1500.
MTU
Set the maximum transmission unit. Range: 64-1500
Link Detection Interval (s)
Set the link detection interval time to ensure tunnel
connection. Range: 0-600.
Max Retries
Set the maximum times of retry to detect the L2TP
connection failure. Range: 0-10.
Expert Options
User can enter some other PPP initialization strings in this
field and separate the strings with blank space.
Table 3-2-5-8 L2TP Parameters
59
3.2.5.6 PPTP
PPTP
Item
Description
Enable
Enable PPTP client. A maximum of 3 tunnels is allowed.
Remote IP Address
Enter the public IP address or domain name of PPTP
server.
Username
Enter the username that PPTP server provides.
Password
Enter the password that PPTP server provides.
Authentication
Select from "Auto", "PAP", "CHAP", "MS-CHAPv1", and
"MS-CHAPv2".
Global Traffic
Forwarding
All of the data traffic will be sent out via PPTP tunnel once
enable this function.
Remote Subnet
Set the peer subnet of PPTP.
Remote Subnet Mask
Set the netmask of peer PPTP server.
Point-to-Point Tunneling Protocol (PPTP) is a protocol that allows corporations to extend their own
corporate network through private "tunnels" over the public Internet. Effectively, a corporation uses a
wide-area network as a single large local area network.
Figure 3-2-5-10
Table 3-2-5-9 PPTP Parameters
60
Figure 3-2-5-11
PPTP Advanced Settings
Item
Description
Local IP Address
Set IP address of PPTP client.
Peer IP Address
Enter tunnel IP address of PPTP server.
Enable NAT
Enable the NAT faction of PPTP.
Enable MPPE
Enable MPPE encryption.
Address/Control
Compression
For PPP initialization. User can keep the default option.
Protocol Field
Compression
For PPP initialization. User can keep the default option.
Asyncmap Value
One of the PPP protocol initialization strings. User can keep
the default value. Range: 0-ffffffff.
MRU
Enter the maximum receive unit. Range: 0-1500.
MTU
Enter the maximum transmission unit. Range: 0-1500.
Link Detection Interval
(s)
Set the link detection interval time to ensure tunnel
connection. Range: 0-600.
Max Retries
Set the maximum times of retrying to detect the PPTP
connection failure. Range: 0-10.
Expert Options
User can enter some other PPP initialization strings in this
field and separate the strings with blank space.
Table 3-2-5-10 PPTP Parameters
Related Configuration Example
PPTP Application Example
61
3.2.5.7 OpenVPN Client
OpenVPN Client
Item
Description
Enable
Enable OpenVPN client. A maximum of 3 tunnels is allowed.
OpenVPN is an open source virtual private network (VPN) product that offers a simplified security
framework, modular network design, and cross-platform portability.
Advantages of OpenVPN include:
Security provisions that function against both active and passive attacks.
-
Compatibility with all major operating systems.
-
High speed (1.4 megabytes per second typically).
-
Ability to configure multiple servers to handle numerous connections simultaneously.
-
All encryption and authentication features of the OpenSSL library.
-
Advanced bandwidth management.
-
A variety of tunneling options.
-
Compatibility with smart cards that support the Windows Crypt application program interface
-
(API).
Figure 3-2-5-12
62
Protocol
Select from "UDP" and "TCP".
Remote IP Address
Enter remote OpenVPN server's IP address or domain name.
Port
Enter the listening port number of remote OpenVPN server. Range:
1-65535.
Interface
Select from "tun" and "tap".
Authentication
Select from "None", "Pre-shared", "Username/Password", "X.509 cert",
and "X.509 cert+user".
Local Tunnel IP
Set local tunnel address.
Remote Tunnel IP
Enter remote tunnel address.
Global Traffic Forwarding
All the data traffic will be sent out via OpenVPN tunnel when this
function is enabled.
Enable TLS Authentication
Check to enable TLS authentication.
Username
Enter username provided by OpenVPN server.
Password
Enter password provided by OpenVPN server.
Enable NAT
Enable NAT traversal function.
Compression
Select LZO to compress data.
Link Detection Interval (s)
Set link detection interval time to ensure tunnel connection. Range:
10-1800.
Link Detection Timeout (s)
Set link detection timeout. OpenVPN will be reestablished after
timeout. Range: 60-3600.
Cipher
Select from "NONE", "BF-CBC", "DE-CBC", "DES-EDE3-CBC",
"AES-128-CBC", "AES-192-CBC" and "AES-256-CBC".
MTU
Enter the maximum transmission unit. Range: 128-1500.
Max Frame Size
Set the maximum frame size. Range: 128-1500.
Verbose Level
Select from "ERROR", "WARING", "NOTICE" and "DEBUG".
Expert Options
User can enter some other PPP initialization strings in this field and
separate the strings with blank space.
Local Route
Subnet
Set the local route's IP address.
Subnet Mask
Set the local route's netmask.
Table 3-2-5-11 OpenVPN Client Parameters
3.2.5.8 OpenVPN Server
UF51 supports OpenVPN server to create secure point-to-point or site-to-site connections in routed or
bridged configurations and remote access facilities.
63
Figure 3-2-5-13
OpenVPN Server
Item
Description
Enable
Enable/disable OpenVPN server.
Protocol
Select from TCP and UDP.
Port
Fill in listening port number. Range: 1-65535.
Listening IP
Enter WAN IP address or LAN IP address. Leaving it blank refers to all
active WAN IP and LAN IP address.
Interface
Select from " tun" and "tap".
Authentication
Select from "None", "Pre-shared", "Username/Password", "X.509 cert"
and "X. 509 cert +user".
Local Virtual IP
The local tunnel address of OpenVPN's tunnel.
Remote Virtual IP
The remote tunnel address of OpenVPN's tunnel.
Figure 3-2-5-14
64
Client Subnet
Local subnet IP address of OpenVPN client.
Client Netmask
Local netmask of OpenVPN client.
Renegotiation
Interval(s)
Set interval for renegotiation. Range: 0-86400.
Max Clients
Maximum OpenVPN client number. Range: 1-128.
Enable CRL
Enable CRL
Enable Client to Client
Allow access between different OpenVPN clients.
Enable Dup Client
Allow multiple users to use the same certification.
Enable NAT
Check to enable the NAT traversal function.
Compression
Select "LZO" to compress data.
Link Detection Interval
Set link detection interval time to ensure tunnel connection. Range:
10-1800.
Cipher
Select from "NONE", "BF-CBC", "DES-CBC", "DES-EDE3-CBC",
"AES-128-CBC", "AES-192-CBC" and "AES-256-CBC".
MTU
Enter the maximum transmission unit. Range: 64-1500.
Max Frame Size
Set the maximum frame size. Range: 64-1500.
Verbose Level
Select from "ERROR", "WARING", "NOTICE" and "DEBUG".
Expert Options
User can enter some other PPP initialization strings in this field and
separate the strings with blank space.
Local Route
Subnet
The real local IP address of OpenVPN client.
Netmask
The real local netmask of OpenVPN client.
Account
Username & Password
Set username and password for OpenVPN client.
Table 3-2-5-12 OpenVPN Server Parameters
3.2.5.9 Certifications
User can import/export certificate and key files for OpenVPN and IPsec on this page.
Select passthrough mode from “DHCPS-Fixed” and
“DHCPS-Dynamic”.
MAC
Set MAC address.
IP Passthrough mode shares or "passes" the Internet providers assigned IP address to a single LAN
client device connected to the device.
Figure 3-2-6-1
Table 3-2-6-1 IP Passthrough Parameters
3.2.7 Routing
3.2.7.1 Static Routing
A static routing is a manually configured routing entry. Information about the routing is manually
entered rather than obtained from dynamic routing traffic. After setting static routing, the package for
the specified destination will be forwarded to the path designated by user.
68
Figure 3-2-7-1
T
Static Routing
Item
Description
Destination
Enter the destination IPv4/IPv6 address.
Netmask/Prefix
Length
Enter the subnet mask or prefix length of destination address.
Interface
The interface through which the data can reach the destination
address.
Gateway
IPv4/IPv6 address of the next router that will be passed by before the
input data reaches the destination address.
Distance
Priority, smaller value refers to higher priority. Range: 1-255.
Table 3-2-7-1 Static Routing Parameters
3.2.7.2 RIP
RIP is mainly designed for small networks. RIP uses Hop Count to measure the distance to the
destination address, which is called Metric. In RIP, the hop count from the router to its directly
connected network is 0 and the hop count of network to be reached through a router is 1 and so on. In
order to limit the convergence time, the specified metric of RIP is an integer in the range of 0 - 15 and
the hop count larger than or equal to 16 is defined as infinity, which means that the destination
network or host is unreachable. Because of this limitation, the RIP is not suitable for large-scale
networks. To improve performance and prevent routing loops, RIP supports split horizon function. RIP
also introduces routing obtained by other routing protocols.
Each router that runs RIP manages a routing database, which contains routing entries to reach all
reachable destinations.
69
Figure 3-2-7-2
RIP
Item
Description
Enable
Enable or disable RIP.
Update Timer
It defines the interval to send routing updates. Range:
5-2147483647, in seconds.
Timeout Timer
It defines the routing aging time. If no update package on a routing
is received within the aging time, the routing's Routing Cost in the
routing table will be set to 16. Range: 5-2147483647, in seconds.
Garbage Collection Timer
It defines the period from the routing cost of a routing becomes 16
to it is deleted from the routing table. In the time of
Garbage-Collection, RIP uses 16 as the routing cost for sending
routing updates. If Garbage Collection times out and the routing
still has not been updated, the routing will be completely removed
from the routing table. Range: 5-2147483647, in seconds.
Version
RIP version. The options are v1 and v2.
Advanced Settings
Default Information Originate
Default information will be released when this function is enabled.
Default Metric
The default cost for the device to reach destination. Range: 0-16
Redistribute Connected
Check to enable.
Metric
Set metric after "Redistribute Connected" is enabled. Range: 0-16.
Redistribute Static
Check to enable.
Metric
Set metric after "Redistribute Static" is enabled. Range: 0-16.
70
Redistribute OSPF
Check to enable.
Metric
Set metric after "Redistribute OSPF" is enabled. Range: 0-16.
Table 3-2-7-2 RIP Parameters
Item
Description
Distance/Metric Management
Distance
Set the administrative distance that a RIP route learns. Range:
1-255.
IP Address
Set the IP address of RIP route.
Netmask
Set the netmask of RIP route.
Figure 3-2-7-3
71
ACL Name
Set ACL name of RIP route.
Metric
The metric of received route or sent route from the interface.
Range: 0-16.
Policy in/out
Select from "in" and "out".
Interface
Select interface of the route.
ACL Name
Access control list name of the route strategy.
Filter Policy
Policy Type
Select from "access-list" and "prefix-list".
Policy Name
User-defined prefix-list name.
Policy in/out
Select from "in" and "out".
Interface
Select interface from "cellular0", "WAN" and "Bridge0".
Passive Interface
Passive Interface
Select interface from "cellular0" and "WAN", "Bridge0".
Interface
Interface
Select interface from "cellular0", "WAN" and "Bridge0".
Send Version
Select from "default", "v1" and "v2".
Receive Version
Select from "default", "v1" and "v2".
Split-Horizon
Select from "enable" and "disable".
Authentication Mode
Select from "text" and "md5".
Authentication String
The authentication key for package interaction in RIPV2.
Authentication
Key-chain
The authentication key-chain for package interaction in RIPV2.
Neighbor
IP Address
Set RIP neighbor's IP address manually.
Network
IP Address
The IP address of interface for RIP publishing.
Netmask
The netmask of interface for RIP publishing.
3.2.7.3 OSPF
OSPF, short for Open Shortest Path First, is a link status based on interior gateway protocol
developed by IETF.
If a router wants to run the OSPF protocol, there should be a Router ID that can be manually
configured. If no Router ID configured, the system will automatically select an IP address of interface
as the Router ID. The selection order is as follows:
If a Loopback interface address is configured, then the last configured IP address of Loopback
-
interface will be used as the Router ID;
If no Loopback interface address is configured, the system will choose the interface with the
-
Table 3-2-7-3
72
biggest IP address as the Router ID.
OSPF
Item
Description
Enable
Enable or disable OSPF.
Router ID
Router ID (IP address) of the originating LSA.
ABR Type
Select from cisco, ibm, standard and shortcut.
RFC1583 Compatibility
Enable/Disable.
Five types of packets of OSPF:
Hello packet
-
DD packet (Database Description Packet)
-
LSR packet (Link-State Request Packet)
-
LSU packet (Link-State Update Packet)
-
LSAck packet (Link-Sate Acknowledgment Packet)
-
Neighbor and Neighboring
After OSPF router starts up, it will send out Hello Packets through the OSPF interface. Upon receipt of
Hello packet, OSPF router will check the parameters defined in the packet. If it’s consistent, a
neighbor relationship will be formed. Not all matched sides in neighbor relationship can form the
adjacency relationship. It is determined by the network type. Only when both sides successfully
exchange DD packets and LSDB synchronization is achieved, the adjacency in the true sense can be
formed. LSA describes the network topology around a router, LSDB describes entire network
topology.
Figure 3-2-7-4
73
OSPF Opaque-LSA
Enable/Disable
LSA: a basic communication means of the OSPF routing
protocol for the Internet Protocol (IP).
SPF Delay Time
Set the delay time for OSPF SPF calculations.
Range: 0-6000000, in milliseconds.
SPF Initial-holdtime
Set the initialization time of OSPF SPF.
Range: 0-6000000, in milliseconds.
SPF Max-holdtime
Set the maximum time of OSPF SPF.
Range: 0-6000000, in milliseconds.
Reference Bandwidth
Range: 1-4294967, in Mbit.
Table 3-2-7-4 OSPF Parameters
Item
Description
Interface
Interface
Select interface from "cellular0",”WAN”and "Bridge0".
Hello Interval (s)
Send interval of Hello packet. If the Hello time between two adjacent
routers is different, the neighbour relationship cannot be established.
Range: 1-65535.
Dead Interval (s)
Dead Time. If no Hello packet is received from the neighbours within the
dead time, then the neighbour is considered failed. If dead times of two
adjacent routers are different, the neighbour relationship cannot be
established.
Retransmit Interval (s)
When the device notifies an LSA to its neighbour, it is required to make
acknowledgement. If no acknowledgement packet is received within the
retransmission interval, this LSA will be retransmitted to the neighbour.
Range: 3-65535.
Transmit Delay (s)
It will take time to transmit OSPF packets on the link. So a certain delay
time should be increased before transmission the aging time of LSA. This
configuration needs to be further considered on the low-speed link.
Range: 1-65535.
Figure 3-2-7-5
74
Interface Advanced Options
Interface
Select interface.
Network
Select OSPF network type.
Cost
Set the cost of running OSPF on an interface. Range: 1-65535.
Priority
Set the OSPF priority of interface. Range: 0-255.
Authentication
Set the authentication mode that will be used by the OSPF area.
Simple: a simple authentication password should be configured and
confirmed again.
MD5: MD5 key & password should be configured and confirmed again.
Key ID
It only takes effect when MD5 is selected. Range 1-255.
Key
The authentication key for OSPF packet interaction.
Table 3-2-7-5 OSPF Parameters
Item
Description
Passive Interface
Passive Interface
Select interface from "cellular0", "WAN" and "Bridge0".
Network
IP Address
The IP address of local network.
Netmask
The netmask of local network.
Area ID
The area ID of original LSA's router.
Area
Area ID
Set the ID of the OSPF area (IP address).
Area
Select from "Stub" and "NSSA".
The backbone area (area ID 0.0.0.0) cannot be set as "Stub" or "NSSA".
No Summary
Forbid route summarization.
Authentication
Select authentication from "simple" and "md5".
Figure 3-2-7-6
Table 3-2--7-6 OSPF Parameters
75
Figure 3-2-7-7
Area Advanced Options
Item
Description
Area Range
Area ID
The area ID of the interface when it runs OSPF (IP address).
IP Address
Set the IP address.
Netmask
Set the netmask.
No Advertise
Forbid the route information to be advertised among different areas.
Cost
Range: 0-16777215
Area Filter
Area ID
Select an Area ID for Area Filter.
Filter Type
Select from "import", "export", "filter-in", and "filter-out".
ACL Name
Enter an ACL name which is set on "Routing > Routing Filtering" webpage.
Area Virtual Link
Area ID
Set the ID number of OSPF area.
ABR Address
ABR is the router connected to multiple outer areas.
Authentication
Select from "simple" and "md5".
Key ID
It only takes effect when MD5 is selected. Range 1-15.
Key
The authentication key for OSPF packet interaction.
Hello Interval
Set the interval time for sending Hello packets through the interface. Range:
1-65535.
Dead Interval
The dead interval time for sending Hello packets through the interface. Range:
1-65535.
Retransmit
Interval
The retransmission interval time for re-sending LSA. Range: 1-65535.
Transmit Delay
The delay time for LSA transmission. Range: 1-65535.
Table 3-2-7-7 OSPF Parameters
76
Figure 3-2-7-8
Item
Description
Redistribution
Redistribution Type
Select from "connected", "static" and "rip".
Metric
The metric of redistribution router. Range: 0-16777214.
Metric Type
Select Metric type from "1" and "2".
Route Map
Mainly used to manage route for redistribution.
Redistribution Advanced Options
Always Redistribute
Default Route
Send redistribution default route after starting up.
Select from "intra-area", "inter-area" and "external".
Distance
Set the OSPF routing distance for area learning. Range:
1-255.
Table 3-2-7-8 OSPF Parameters
77
3.2.7.4 Routing Filtering
Routing Filtering
Item
Description
Access Control List
Name
User-defined name, need to start with a letter. Only letters, digits and underline (_)
are allowed.
Action
Select from "permit" and "deny".
Match Any
No need to set IP address and subnet mask.
IP Address
User-defined.
Netmask
User-defined.
IP Prefix-List
Name
User-defined name, need to start with a letter. Only letters, digits and underline (_)
are allowed.
Sequence
Number
A prefix name list can be matched with multiple rules. One rule is matched with
one sequence number. Range: 1-4294967295.
Action
Select from "permit" and "deny".
Match Any
No need to set IP address, subnet mask, FE Length, and LE Length.
IP Address
User-defined.
Netmask
User-defined.
FE Length
Specify the minimum number of mask bits that must be matched. Range: 0-32.
LE Length
Specify the maximum number of mask bits that must be matched. Range: 0-32.
Figure 3-2-7-9
Table 3-2-7-9 Routing Filtering Parameters
3.2.8 VRRP
The Virtual Router Redundancy Protocol (VRRP) is a computer networking protocol that provides
automatic assignment of available Internet Protocol (IP) routers for participating hosts. This
increases the availability and reliability of routing paths via automatic default gateway selections in
78
an IP sub-network.
Increasing the number of exit gateway is a common method for improving system reliability. VRRP
adds a group of routers that undertake gateway function into a backup group so as to form a virtual
router. The election mechanism of VRRP will decide which router undertakes the forwarding task, and
the host in LAN is only required to configure the default gateway for the virtual router.
In VRRP, routers need to be aware of failures in the virtual master router. To achieve this, the virtual
master router sends out multicast “alive” announcements to the virtual backup routers in the same
VRRP group.
The VRRP router who has the highest number will become the virtual master router. The VRRP router
number ranges from 1 to 255 and usually we use 255 for the highest priority and 100 for backup.
If the current virtual master router receives an announcement from a group member (Router ID) with a
higher priority, then the latter will pre-empt and become the virtual master router.
VRRP has the following characteristics:
The virtual router with an IP address is known as the Virtual IP address. For the host in LAN, it is
-
only required to know the IP address of virtual router, and set it as the address of the next hop of
the default route.
The network Host communicates with the external network through this virtual router.
-
A router will be selected from the set of routers based on its priority to undertake the gateway
-
function. Other routers will be used as backup routers to perform the duties of gateway for the
gateway router in the case of any malfunction, so as to guarantee uninterrupted communication
between the host and external network.
When interface connected with the uplink is at the state of Down or Removed, the router actively
lowers its priority so that priority of other routers in the backup group will be higher. Thus the router
with the highest priority becomes the gateway for the transmission task.
Figure 3-2-8-1
79
VRRP
Item
Description
Default
Enable
Enable or disable VRRP.
Disable
Interface
Select the interface of Virtual Router.
None
Virtual Router ID
User-defined Virtual Router ID. Range: 1-255.
None
Virtual IP
Set the IP address of Virtual Router.
None
Priority
The VRRP priority range is 1-254 (a bigger number indicates
a higher priority). The device with higher priority will be
more likely to become the gateway.
100
Advertisement Interval
(s)
Heartbeat package transmission time interval between
devices in the virtual ip group. Range: 1-255.
1
Preemption Mode
If the device works in the preemption mode, once it finds
that its own priority is higher than that of the current
gateway, it will send VRRP notification package, resulting in
re-election of gateway and eventually replacing the original
gateway. Accordingly, the original gateway will become a
Backup device.
Disable
IPV4 Primary Server
The device will send ICMP packet to the IP address or host
name to determine whether the Internet connection is still a
vailable or not.
8.8.8.8
IPV4 Secondary Server
The router will try to ping the secondary server name if prim
ary server is not available.
114.114.
114.114
Interval
Time interval (in seconds) between two Pings.
300
Retry Interval
Set the ping retry interval. When ping failed, the device will p
ing again every retry interval.
5
Timeout
The maximum amount of time the device will wait for a res
ponse to a ping request. If it does not receive a response fo
r the amount of time defined in this field, the ping request w
ill be considered as failure.
3
Max Ping Retries
The retry times of the device sending ping request until dete
rmining that the connection has failed.
3
Table 3-2-8-1 VRRP Parameters
Related Configuration Example
VRRP Application Example
3.2.9 DDNS
Dynamic DNS (DDNS) is a method that automatically updates a name server in the Domain Name
System, which allows user to alias a dynamic IP address to a static domain name.
DDNS serves as a client tool and needs to coordinate with DDNS server. Before starting configuration,
user shall register on a website of proper domain name provider and apply for a domain name.
80
Figure 3-2-9-1
DDNS
Item
Description
Status
Show connection status of DDNS.
Enable
Enable/disable DDNS.
Name
Give the DDNS a descriptive name.
Service Type
Select the DDNS service provider.
Username
Enter the username for DDNS register.
User ID
Enter User ID of the custom DDNS server.
Password
Enter the password for DDNS register.
Server
Enter the name of DDNS server.
Server Path
By default the hostname is appended to the path.
Hostname
Enter the hostname for DDNS.
Append IP
Append your current IP to the DDNS server update path.
Use HTTPS
Enable HTTPS for some DDNS providers.
Table 3-2-9-1 DDNS Parameters
81
3.3 System
General
Item
Description
Default
System
Hostname
User-defined device name, needs to start with a letter.
ROUTER
Web Login Timeout
(s)
You need to log in again if it times out. Range: 100-3600.
1800
Encrypting Cleartext
Passwords
This function will encrypt all of cleartext passwords into
ciphertext passwords.
Enable
HTTPS Certificates
Certificate
Click "Browse" button, choose certificate file on the PC,
and then click "Import" button to upload the file into
device. Click "Export" button will export the file to the PC.
Click "Delete" button will delete the file.
--
Key
Click "Browse" button, choose key file on the PC, and then
click "Import" button to upload the file into device. Click
"Export" button will export file to the PC.
Click "Delete" button will delete the file.
--
This section describes how to configure general settings, such as administration account, access
service, system time, common user management, SNMP, AAA, event alarms, etc.
3.3.1 General Settings
3.3.1.1 General
General settings include system info and HTTPS certificates.
Figure 3-3-1-1
Table 3-3-1-1 General Setting Parameters
82
3.3.1.2 System Time
This section explains how to set the system time including time zone and time synchronization type.
Note: to ensure that the device runs with the correct time, it’s recommended that you set the system
time when configuring the device.
Figure 3-3-1-2
Figure 3-3-1-3
83
Figure 3-3-1-4
System Time
Item
Description
Current Time
Show the current system time.
Time Zone
Click the drop down list to select the time zone you are in.
Sync Type
Click the drop down list to select the time synchronization type.
Sync with Browser
Synchronize time with browser.
Browser Time
Show the current time of browser.
Set up Manually
Manually configure the system time.
GPS Time
Synchronization
Synchronize time with GPS.
Primary NTP Server
Enter primary NTP Server's IP address or domain name.
Secondary NTP Server
Enter secondary NTP Server's IP address or domain name.
NTP Server
Enable NTP Server
NTP client on the network can achieve time synchronization with device
after "Enable NTP Server" option is checked.
Figure 3-3-1-5
Table 3-3-1-2 System Time Parameters
84
3.3.1.3 Email
SMTP Client Settings
Item
Description
Enable
Enable or disable SMTP client function.
Email Address
Enter the sender's email account.
Password
Enter the sender's email password.
SMTP Server Address
Enter SMTP server's domain name.
Port
Enter SMTP server port. Range: 1-65535.
Encryption
Select from: None, TLS/SSL, STARTTLS.
None: No encryption. The default port is 25.
STARTTLS: STARTTLS is a way to take an existing insecure
connection and upgrade it to a secure connection by using
SSL/TLS. The default port is 587.
TLS/SSL: SSL and TLS both provide a way to encrypt a
communication channel between two computers (e.g. your
computer and our server). TLS is the successor to SSL and
the terms SSL and TLS are used interchangeably unless
you're referring to a specific version of the protocol.The
default port is 465.
SMTP, short for Simple Mail Transfer Protocol, is a TCP/IP protocol used in sending and receiving
e-mail. This section describes how to configure email settings and add email groups for alarms and
events.
Table 3-3-1-3 SMTP Setting
Figure 3-3-1-6
85
Item
Description
Email List
Email Address
Enter the Email address.
Description
The description of the Email address.
Email Group List
Group ID
Set number for email group. Range: 1-100.
Description
The description of the Email group.
List
Show the Email address list.
Selected
Show the selected Email address.
Related Topics
DI Setting
Events Setting
Events Application Example
Figure 3-3-1-7
Table 3-3-1-4 Email Settings
3.3.2 Phone&SMS
3.3.2.1 Phone
Phone settings involve in call/SMS trigger, SMS control and SMS alarm for events.
86
Phone
Item
Description
Phone Number List
Number
Enter the telephone number. Digits, "+" and "-" are allowed.
Description
The description of the telephone number.
Phone Group List
Group ID
Set number for phone group. Range: 1-100.
Description
The description of the phone group.
List
Show the phone list.
Selected
Show the selected phone number.
Related Topic
Connect on Demand
3.3.2.2 SMS
Figure 3-3-2-1
Table 3-3-2-1 Phone Settings
SMS settings involve in remote SMS control, sending SMS and SMS receiving and sending status.
87
Figure 3-3-2-2
SMS Settings
Item
Description
SMS Mode
Select SMS mode from "TEXT" and "PDU".
SMS Remote
Control
Enable/disable SMS Remote Control.
Authentication
Type
You can choose “phone number” or ”password + phone number”.
Phone number: Use phone number for authentication.
Password + phone number: Use both ""Password"" and ""Phone
number"" for authentication.
Password
Set password for authentication.
Phone Group
Select the Phone group which used for remote control. User can
click the Phone Group and set phone number.
Table 3-3-2-2 SMS Remote Control Parameters
88
Figure 3-3-2-3
SMS
Item
Description
Send SMS
Phone Number
Enter the number to receive the SMS.
Content
SMS content.
Inbox/Outbox
Sender
SMS sender from outside.
Recipient
SMS recipient which UF51 send to.
From
Select the start date.
To
Select the end date.
Table 3-3-2-3 SMS Settings
3.3.3 User Management
3.3.3.1 Account
Here you can change the login username and password of the administrator.
Note: it is strongly recommended that you modify them for the sake of security.
89
Figure 3-3-3-1
Account
Item
Description
Username
Enter a new username. You can use characters such as a-z,
0-9, "_", "-", "$". The first character can't be a digit.
Old Password
Enter the old password.
New Password
Enter a new password.
Confirm New Password
Enter the new password again.
User Management
Item
Description
Username
Enter a new username. You can use characters such as a-z, 0-9, "_", "-", "$". The first
Table 3-3-3-1 Account Settings
3.3.3.2 User Management
This section describes how to create common user accounts.
The common user permission includes Read-Only and Read-Write.
Figure 3-3-3-2
90
character can't be a digit.
Password
Set password.
Permission
Select user permission from “Read-Only” and “Read-Write”.
-
Read-Only: users can only view the configuration of device in this level.
-
Read-Write: users can view and set the configuration of device in this level.
Table 3-3-3-2 User Management
SNMP Settings
3.3.4 SNMP
SNMP is widely used in network management for network monitoring. SNMP exposes management
data with variables form in managed system. The system is organized in a management information
base (MIB) which describes the system status and configuration. These variables can be remotely
queried by managing applications.
Configuring SNMP in networking, NMS, and a management program of SNMP should be set up at the
Manager.
Configuration steps are listed as below for achieving query from NMS:
1.Enable SNMP setting.
2.Download MIB file and load it into NMS.
3.Configure MIB View.
4.Configure VCAM.
Related Configuration Example
SNMP Application Example
3.3.4.1 SNMP
UF51 supports SNMPv1, SNMPv2c and SNMPv3 version. SNMPv1 and SNMPv2c employ community
name authentication. SNMPv3 employs authentication encryption by username and password.
Figure 3-3-4-1
91
Item
Description
Enable
Enable or disable SNMP function.
Port
Set SNMP listened port. Range: 1-65535.
The default port is 161.
SNMP Version
Select SNMP version; support SNMP v1/v2c/v3.
Location Information
Fill in the location information.
Contact Information
Fill in the contact information.
Table 3-3-4-1 SNMP Parameters
MIB View
Item
Description
View Name
Set MIB view's name.
View Filter
Select from "Included" and "Excluded".
View OID
Enter the OID number.
Included
You can query all nodes within the specified MIB node.
Excluded
You can query all nodes except for the specified MIB node.
3.3.4.2 MIB View
This section explains how to configure MIB view for the objects.
Figure 3-3-4-2
Table 3-3-4-2 MIB View Parameters
3.3.4.3 VACM
This section describes how to configure VCAM parameters.
Figure 3-3-4-3
92
VACM
Item
Description
SNMP v1 & v2 User List
Community
Set the community name.
Permission
Select from "Read-Only" and "Read-Write".
MIB View
Select an MIB view to set permissions from the MIB view list.
Network
The IP address and bits of the external network accessing the MIB view.
Read-Write
The permission of the specified MIB node is read and write.
Read-Only
The permission of the specified MIB node is read only.
SNMP v3 User Group
Group Name
Set the name of SNMPv3 group.
Security Level
Select from "NoAuth/NoPriv", "Auth/NoPriv", and " Auth/Priv".
Read-Only View
Select an MIB view to set permission as "Read-only" from the MIB view list.
Read-Write View
Select an MIB view to set permission as "Read-write" from the MIB view list.
Inform View
Select an MIB view to set permission as "Inform" from the MIB view list.
SNMP v3 User List
Username
Set the name of SNMPv3 user.
Group Name
Select a user group to be configured from the user group.
Authentication
Select from "MD5", "SHA", and "None".
Authentication
Password
The password should be filled in if authentication is "MD5" and "SHA".
Encryption
Select from "AES", "DES", and "None".
Encryption
Password
The password should be filled in if encryption is "AES" and "DES".
Table 3-3-4-3 VACM Parameters
SNMP Trap
3.3.4.4 Trap
This section explains how to enable network monitoring by SNMP trap.
Figure 3-3-3-4
93
Item
Description
Enable
Enable or disable SNMP Trap function.
SNMP Version
Select SNMP version; support SNMP v1/v2c/v3.
Server Address
Fill in NMS's IP address or domain name.
Port
Fill in UDP port. Port range is 1-65535. The default port is 162.
Name
Fill in the group name when using SNMP v1/v2c; fill in the username when using
SNMP v3.
Auth/Priv Mode
Select from "NoAuth & No Priv", "Auth & NoPriv", and "Auth & Priv".
Table 3-3-4-4 Trap Parameters
MIB
Item
Description
MIB File
Select the MIB file you need.
Download
Click "Download" button to download the MIB file to PC.
3.3.4.5 MIB
This section describes how to download MIB files. The last MIB file “LTE-ROUTER-MIB.txt” is for the
UF51 device.
Figure 3-3-4-5
Table 3-3-4-5 MIB Download
3.3.5 AAA
AAA access control is used for visitors control and the available corresponding services once access
is allowed. It adopts the same method to configure three independent safety functions. It provides
modularization methods for following services:
Authentication: verify if the user is qualified to access to the network.
-
Authorization: authorize related services available for the user.
-
Charging: record the utilization of network resources.
-
3.3.5.1 Radius
Using UDP for its transport, Radius is generally applied in various network environments with higher
requirements of security and permission of remote user access.
94
Figure 3-3-5-1
Radius
Item
Description
Enable
Enable or disable Radius.
Server IP Address
Fill in the Radius server IP address/domain name.
Server Port
Fill in the Radius server port. Range: 1-65535.
Key
Fill in the key consistent with that of Radius server in order to
get connected with Radius server.
Table 3-3-5-1 Radius Parameters
3.3.5.2 TACACS+
Using TCP for its transport, TACACS+ is mainly used for authentication, authorization and charging of
the access users and terminal users by adopting PPP and VPDN.
Figure 3-3-5-2
95
TACACS+
Item
Description
Enable
Enable or disable TACACS+.
Server IP Address
Fill in the TACACS+ server IP address/domain name.
Server Port
Fill in the TACACS+ server port. Range: 1-65535.
Key
Fill in the key consistent with that of TACACS+ server in
order to get connected with TACACS+ server.
Table 3-3-5-2 TACACS+ Parameters
LDAP
Item
Description
Enable
Enable or Disable LDAP.
Server IP Address
Fill in the LDAP server's IP address/domain name. The
maximum count is 10.
Server Port
Fill in the LDAP server's port. Range: 1-65535
Base DN
The top of LDAP directory tree.
Security
Select secure method from "None", "StartTLS" and "SSL".
3.3.5.3 LDAP
A common usage of LDAP is to provide a central place to store usernames and passwords. This
allows many different applications and services to connect the LDAP server to validate users.
LDAP is based on a simpler subset of the standards contained within the X.500 standard. Because of
this relationship, LDAP is sometimes called X.500-lite as well.
Figure 3-3-5-3
96
Username
Enter the username to access the server.
Password
Enter the password to access the server.
Table 3-3-5-3 LDAP Parameters
Authentication
Item
Description
Console
Select authentication for Console access.
Web
Select authentication for Web access.
Telnet
Select authentication for Telnet access.
SSH
Select authentication for SSH access.
3.3.5.4 Authentication
AAA supports the following authentication ways:
None: uses no authentication, generally not recommended.
-
Local: uses the local username database for authentication.
-
Advantages: rapidness, cost reduction.
Disadvantages: storage capacity limited by hardware.
Remote: has user’s information stored on authentication server. Radius, TACACS+ and LDAP
-
supported for remote authentication.
When radius, TACACS+, and local are configured at the same time, the priority level is: 1 >2 >3.
Figure 3-3-5-4
Table 3-3-5-4 Authentication Parameters
3.3.6 Device Management
3.3.6.1 DeviceHub
You can connect the device to the Yeastar DeviceHub on this page so as to manage the device
centrally and remotely. For more details please refer to DeviceHub User Guide.
97
DeviceHub
Item
Description
Status
Show the connection status between the device and the
DeviceHub.
Disconnected
Click this button to disconnect the device from the
DeviceHub.
Server Address
IP address or domain of the device management server.
Activation Method
Select activation method to connect the device to the
DeviceHub server, options are "By Authentication Code" and
"By Account name".
Authentication Code
Fill in the authentication code generated from the
DeviceHub.
Account Name
Fill in the registered DeviceHub account (email) and
password.
Password
3.3.6.2 Yeastar VPN
Figure 3-3-6-1
Table 3-3-6-1
You can connect the device to the Yeastar VPN on this page so as to manage the device and
connected devices centrally and remotely. For more details please refer to YeastarVPN User Guide.
98
Figure 3-3-6-2
Yeastar VPN
Item
Description
Yeastar VPN Settings
Server
Enter the IP address or domain name of Yeastar VPN.
Port
Enter the HTTPS port number.
Authorization Code
Enter the authorization code which generated by Yeastar VPN.
Device Name
Enter the name of the device.
Yeastar VPN Status
Status
Show the connection information about whether the device is
connected to the Yeastar VPN.
Local IP
Show the virtual IP of the device.
Remote IP
Show the virtual IP of the Yeastar VPN.
Duration
Show the information on how long the device has been
connected to the Yeastar VPN.
Table 3-3-6-2
99
3.3.7 Events
Events
Item
Description
Mark as Read
Mark the selected event alarm as read.
Delete
Delete the selected event alarm.
Mark All as Read
Mark all event alarms as read.
Delete All Alarms
Delete all event alarms.
Status
Show the reading status of the event alarms, such as “Read”
and “Unread”.
Type
Show the event type that should be alarmed.
Time
Show the alarm time.
Message
Show the alarm content.
Event feature is capable of sending alerts by Email when certain system events occur.
3.3.7.1 Events
You can view alarm messages on this page.
Figure 3-3-7-1
Table 3-3-7-1 Events Parameters
3.3.7.2 Events Settings
In this section, you can decide what events to record and whether you want to receive email and SMS
notifications when any change occurs.
100
Figure 3-3-7-2
Event Settings
Item
Description
Enable
Check to enable "Events Settings".
Phone Group List
Select phone group to receive SMS alarm.
Email Group List
Select email group to receive alarm.
Record
The relevant content of event alarm will be recorded on
"Event" page if this option is checked.
Email
The relevant content of event alarm will be sent out via email
if this option is checked.
Figure 3-3-7-3
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.