Dell Edge Gateway 3000 Series 3002 Installation And Operation Manual User 3001 Users Guide2 En Us
User Manual: Dell dell-edge-gateway-3000-series Dell Edge Gateway 3001 Installation and Operation Manual
Open the PDF directly: View PDF .
Page Count: 77
- Dell Edge Gateway 3002 Installation and Operation Manual
- Overview
- System views
- Installing your Edge Gateway
- Safety and regulatory information
- Setting up your Edge Gateway
- Activating your mobile broadband service
- Mounting your Edge Gateway
- Mounting the Edge Gateway using the standard-mount bracket
- Mounting the Edge Gateway using quick-mount bracket
- Attaching the cable control bars to the standard-mount bracket
- Mounting the Edge Gateway on a DIN rail using the DIN-rail bracket
- Mounting the Edge Gateway using the perpendicular mount
- Mounting the Edge Gateway using a VESA mount
- Setting up the ZigBee dongle
- Setting up the operating system
- Windows 10 IoT Enterprise LTSB 2016
- Ubuntu Core 16
- Overview
- Boot up and log in – Remote system configuration
- Boot up and log in – Static IP system configuration
- Updating operating system and applications
- Additional Ubuntu commands
- Ubuntu Network Manager
- Security
- Watchdog Timer (WDT)
- Cloud LED On/Off
- Global Positioning Systems (GPS)
- Snappy auto update/Autopilot
- Accessing Snappy Store/Snapweb
- CAN module
- Sensors
- Ignition Pin
- System Power Management
- Restoring Ubuntu Core 16
- Flashing a new OS image
- Creating the recovery USB flash drive
- CAN module
- Accessing and updating BIOS
- References
- Appendix
- Contacting Dell
Dell Edge Gateway 3002
Installation and Operation Manual
Computer Model: Dell Edge Gateway 3002
Regulatory Model: N03G
Regulatory Type: N03G001
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the
problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2017-2018 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
2018 - 01
Rev. A04
Contents
1 Overview......................................................................................................................... 5
2 System views.................................................................................................................. 6
Top view.............................................................................................................................................................................6
Bottom view....................................................................................................................................................................... 7
Left view.............................................................................................................................................................................7
Right view.........................................................................................................................................................................10
3 Installing your Edge Gateway..........................................................................................11
Safety and regulatory information...................................................................................................................................... 11
Professional installation instructions............................................................................................................................12
Instructions d'installation professionnelles................................................................................................................... 12
Federal Communication Commission interference statement......................................................................................12
Industry Canada statement......................................................................................................................................... 13
Setting up your Edge Gateway..........................................................................................................................................14
Activating your mobile broadband service......................................................................................................................... 19
Mounting your Edge Gateway.......................................................................................................................................... 20
Mounting the Edge Gateway using the standard-mount bracket................................................................................20
Mounting the Edge Gateway using quick-mount bracket............................................................................................27
Attaching the cable control bars to the standard-mount bracket............................................................................... 35
Mounting the Edge Gateway on a DIN rail using the DIN-rail bracket......................................................................... 38
Mounting the Edge Gateway using the perpendicular mount...................................................................................... 41
Mounting the Edge Gateway using a VESA mount.....................................................................................................44
4 Setting up the ZigBee dongle........................................................................................46
5 Setting up the operating system................................................................................... 47
Windows 10 IoT Enterprise LTSB 2016..............................................................................................................................47
Boot up and login – Remote system conguration..................................................................................................... 47
Boot up and login—Static IP system conguration.....................................................................................................47
Restoring Windows 10 IoT Enterprise LTSB 2016....................................................................................................... 48
Windows 10 IOT Enterprise LTSB 2016 basic functions.............................................................................................. 48
Ubuntu Core 16................................................................................................................................................................ 49
Overview....................................................................................................................................................................49
Boot up and log in – Remote system conguration.................................................................................................... 50
Boot up and log in – Static IP system conguration...................................................................................................50
Updating operating system and applications.............................................................................................................. 50
Additional Ubuntu commands......................................................................................................................................51
Ubuntu Network Manager..........................................................................................................................................52
Security......................................................................................................................................................................55
Watchdog Timer (WDT).............................................................................................................................................55
Cloud LED On/O......................................................................................................................................................56
3
Global Positioning Systems (GPS)..............................................................................................................................56
Snappy auto update/Autopilot....................................................................................................................................56
Accessing Snappy Store/Snapweb............................................................................................................................ 56
CAN module...............................................................................................................................................................58
Sensors...................................................................................................................................................................... 58
Ignition Pin................................................................................................................................................................. 59
System Power Management......................................................................................................................................60
Restoring Ubuntu Core 16.......................................................................................................................................... 60
Flashing a new OS image........................................................................................................................................... 62
Creating the recovery USB ash drive..............................................................................................................................62
CAN module.....................................................................................................................................................................63
6 Accessing and updating BIOS....................................................................................... 64
Accessing BIOS settings.................................................................................................................................................. 64
Updating BIOS................................................................................................................................................................. 64
Using the USB invocation script.................................................................................................................................64
Flashing the BIOS from a USB ash drive.................................................................................................................. 65
Updating the BIOS on a Windows system..................................................................................................................65
Using UEFI capsule update on an Ubuntu system...................................................................................................... 65
Dell Command | Congure (DCC).............................................................................................................................. 66
Edge Device Manager (EDM).................................................................................................................................... 66
Default BIOS settings....................................................................................................................................................... 67
System conguration (BIOS level 1)............................................................................................................................67
Security (BIOS level 1)................................................................................................................................................67
Secure boot (BIOS level 1)......................................................................................................................................... 69
Performance (BIOS level 1)........................................................................................................................................ 69
Power management (BIOS level 1).............................................................................................................................69
POST behavior (BIOS level 1).....................................................................................................................................70
Virtualization support (BIOS level 1)........................................................................................................................... 70
Maintenance (BIOS level 1)........................................................................................................................................ 70
System logs (BIOS level 1)...........................................................................................................................................71
7 References.................................................................................................................... 72
8 Appendix....................................................................................................................... 73
Antenna specications......................................................................................................................................................73
De-mounting from DIN-rail bracket...................................................................................................................................74
Connecting to the Edge Gateway.....................................................................................................................................75
Windows 10 IoT Enterprise LTSB 2016........................................................................................................................75
Ubuntu Core 16.......................................................................................................................................................... 75
9 Contacting Dell..............................................................................................................77
4
1
Overview
The Edge Gateway 3000 Series is an Internet-of-Things (IoT) device. It is mounted at the edge of a network, enabling you to collect,
secure, analyze, and act on data from multiple devices and sensors. It enables you to connect with devices used in transportation,
building automation, manufacturing, and other applications. The Edge Gateway has a low-power architecture, which is capable of
supporting industrial automation workloads while remaining fanless to satisfy environmental and reliability requirements. It supports
Windows 10 IoT Enterprise LTSB 2016 and Ubuntu Core 16 operating systems.
5
2
System views
Top view
Table 1. Top view
Features
1 WLAN, Bluetooth, or GPS connector Connect the antenna to increase the range and strength of
wireless, Bluetooth, or satellite signals.
2 Mobile broadband antenna-connector one (3G/
LTE)
Connect the mobile broadband antenna to increase the range and
strength of mobile broadband signals.
3 ZigBee antenna connector Connect the ZigBee antenna for intermittent data transmissions
from a ZigBee-compliant sensor or input device.
4 Mobile broadband antenna-connector two (LTE
Auxiliary only)
Connect the mobile broadband antenna to increase the range and
strength of mobile broadband signals.
NOTE: Depending on the conguration ordered, some of the antenna connectors may not be present or may be capped.
For more information about connecting antennas to the Edge Gateway, see the documentation that is shipped with the
antenna.
6
Bottom view
Table 2. Bottom view
Features
1 Service Tag label The Service Tag is a unique alphanumeric identier that enables
the Dell service technicians to identify the hardware components
in your Edge Gateway and access warranty information.
2 Earth ground A large conductor attached to one side of the power supply, which
serves as the common return path for current from many dierent
components in the circuit.
Left view
Table 3. Left view
Features
1 Intrusion switch An intrusion event is triggered when the enclosure (in which the Edge Gateway is
installed) is opened.
NOTE: External enclosure is sold separately.
7
Features
NOTE: An intrusion event is triggered by a third-party enclosure to the Edge
Gateway through a sensor. The sensor should have a cable that is compatible
with the intrusion switch connector on the Edge Gateway.
2 Power or ignition port Connect a 12-57 VDC (1.08-0.23 A) power cable to supply power to the Edge
Gateway.
NOTE: Power cable is sold separately.
NOTE: For marine applications, limit input voltage to 12-48 VDC. The cable
length for rail applications must not exceed 30 meters.
3 Power and System status light Indicates the power status and system status.
4 WLAN or Bluetooth status light Indicates if WLAN or Bluetooth is ON or OFF.
5 Cloud-connection status light Indicates the cloud connection status.
6 Ethernet port one (with Power
over Ethernet support)
Connect an Ethernet (RJ45) cable to gain network access. Provides data transfer
speeds up to 10/100 Mbps and supports Alternative A of the IEEE 802.3af standard.
NOTE: The Edge Gateway is an IEEE 802.3af Alternative A compliant
Powered Device (PD).
NOTE: To comply with EU Declaration of Conformity (DoC), ensure cable
length from the system to the device does not exceed 30 meters.
NOTE: To comply with regulatory requirements in Brazil, ensure cable length
from the system to the device does not exceed 10 meters.
7 USB 3.0 port 1Connect a USB enabled device. Provides data transfer speeds up to 5 Gbps.
8 SIM card slot (optional) Insert a micro-SIM card into the slot.
9 SD card slot (optional) Insert a micro-SD card into the slot.
NOTE: Remove the SD card slot ller before inserting a micro-SD card.
10 Quick Resource Locator label Scan with a QR reader to access documentation and other system information.
11 micro-SIM or micro-SD card
access door
Open the access door to access the micro-SIM or micro-SD card.
1 USB power is limited to 0.6 A/3 W.
Table 4. Status-light indicators
Function Indicator Color Control Status
System Power status and
System status
Green or Amber BIOS O: System o
On (Solid Green):
System on or Boot
successful
On (Solid Amber):
Power up or boot fail
Blinking Amber: Fault or
error
8
Function Indicator Color Control Status
WLAN or Bluetooth Green Hardware O: WLAN or Bluetooth
module is o
On: WLAN or Bluetooth
module is on
Cloud Green Software O: No connection to
the cloud device or
service
On: Edge Gateway
connected to a cloud
device or service
Blinking Green: Activity
to a cloud device or
service
LAN (RJ-45) Link Green/Amber Driver (LAN) O: No network link or
cable is not connected
On (Green): High-speed
connection (100 Mbps)
On (Amber): Low-speed
connection (10 Mbps)
Activity Green Driver (LAN) O: No activity on link
Blinking Green: LAN
activity. The blink rate is
related to packet
density.
NOTE: The power and system status light may operate dierently during dierent boot-up scenarios, for example, when
a USB script le is run during boot-up.
Table 5. Power connector pin denition details
Pin Signal Function
1 DC+ 12–57 VDC power
2 DC– Ground
3 IG 9–32 VDC ignition
NOTE: Pin 3 (IG) is connected to the vehicle's ignition status indicator (optional) or a wake pin. A voltage of more than 9
V on the signal indicates that the vehicle’s engine is running. The Ignition or Wake pin is used to prevent the draining of
the vehicle battery when the vehicle is turned o for an extended amount of time.
9
NOTE: The IG signal can be used to gracefully shutdown or enter low-power state when the vehicle is turned o (battery
powered). It can also be used for powering on the Edge Gateway when the vehicle starts.
Right view
Table 6. Right view—3002
Features
1 CANbus port Enables the CANbus connection.
2 USB 2.0 port 1Connect a USB enabled device. Provides data transfer speeds up
to 480 Mbps.
3 Ethernet port two (Non-PoE) Connect an Ethernet (RJ45) cable for network access. Provides
data transfer speeds up to 10/100 Mbps.
1 USB power is limited to 0.4 A/2 W.
Table 7. CANbus-port pin denition details
Features
1 GND Ground
2 CAN-H High-level CANbus line
3 CAN-L Low-level CANbus line
10
3
Installing your Edge Gateway
WARNING: Before you begin any of the procedures in this section, read the safety and regulatory information that is
shipped with your system. For additional best practices information, go to www.dell.com/regulatory_compliance.
Safety and regulatory information
WARNING: The Edge Gateway must be installed by knowledgeable, skilled persons familiar with local and/or international
electrical codes and regulations.
WARNING: The Edge Gateway is not designed for use in wet environments. If the Edge Gateway is to be installed in a
wet environment, depending on the location and environment, it must be installed in a panel box or enclosure with an
Ingress Protection (IP) rating of IP54, IP65, or higher.
WARNING: To reduce the risk of electric shock, power to the DC+ and DC- terminals must be provided by a power supply
or transformer/rectier circuit that is designed with double-insulation. The power supply or power circuit source must
comply with local codes and regulations; for example, in the USA, NEC Class 2 (SELV/limited energy circuit, or LPS
circuitry). If powered by a battery, double-insulation is not required.
WARNING: When installing the Edge Gateway, the responsible party or integrator shall use the 12-57 VDC or Power over
Ethernet (PoE) power source 37-57 VDC, with a minimum of 13 W power already present as part of the client’s
installation.
WARNING: Ensure that the power source providing power to the Edge Gateway is reliably grounded and ltered such
that the peak-to-peak ripple component is less than 10 percent of the input DC voltage.
WARNING: When installing the Edge Gateway 3001 and 3002, use a cable appropriate for the load currents: 3-core cable
rated 5 A at 90°C (194°F) minimum, which conform to either IEC 60227 or IEC 60245. The system accepts cables from
0.8 mm to 2 mm. The maximum operating temperature of the Edge Gateway is 70⁰C (158°F). Do not exceed this
maximum temperature while operating the Edge Gateway inside an enclosure. Internal heating of the Edge Gateway
electronics, other electronics, and the lack of ventilation inside an enclosure can cause the operating temperature of the
Edge Gateway to be greater than the outside ambient temperature. Continuous operation of the Edge Gateway at
temperatures greater than 70⁰C (158°F) may result in an increased failure rate and a reduction of the product life. Ensure
that the maximum operating temperature of the Edge Gateway when placed inside an enclosure is 70⁰C (158°F) or less.
WARNING: Always ensure that the available power source matches the required input power of the Edge Gateway.
Check the input power markings next to power connector(s) before making connections. The 12-57 VDC (1.08-0.23 A) or
the PoE power source must be compliant with local Electrical Codes and Regulations.
WARNING: To ensure the protection provided by the Edge Gateway is not impaired, do not use or install the system in
any manner other than what is specied in this manual.
WARNING: If a battery is included as part of the system or network, the battery must be installed within an appropriate
enclosure in accordance with local re and electrical codes and laws.
WARNING: The system is for installation in a suitable industrial enclosure (provides electrical, mechanical, and re hazard
protection).
WARNING: The core module only can be wall-mounted (without the need for an additional enclosure).
11
Professional installation instructions
Installation personnel
This product is designed for specic applications and needs to be installed by qualied personnel with RF and regulatory-related
knowledge. The general user shall not attempt to install or change the setting.
Installation location
The product shall be installed at a location where the radiating antenna is kept 20 cm from nearby persons in its normal operation
condition in order to meet regulatory RF exposure requirements.
External antenna
Use only approved antenna(s). Non-approved antenna(s) may produce spurious or excessive RF transmitting power which may lead
to a violation of FCC/IC limits.
Installation procedure
Refer to user’s manual for installation instructions.
WARNING: Carefully select the installation position and make sure that the nal output power does not exceed the limits
described in the product’s documentation. The violation of these rules could lead to serious federal penalties.
Instructions d'installation professionnelles
Le personnel d'installation
Ce produit est conçu pour des applications spéciques et doit être installé par un personnel qualié avec RF et connaissances
connexes réglementaire. L'utilisateur ne doit pas tenter générale d'installer ou de modier le réglage.
Lieu d'installation
Le produit doit être installé à un endroit où l'antenne de rayonnement est maintenue à 20 cm de personnes à proximité dans son état
de fonctionnement normal, an de répondre aux exigences réglementaires d'exposition aux radiofréquences.
Antenne externe
Utilisez uniquement l'antenne(s) qui ont été approuvés par le demandeur. Antenne (s) peuvent produire de l'énergie RF parasite
indésirable ou excessive transmission qui peut conduire à une violation des normes de la FCC / IC est interdite et non-approuvé.
Procédure d'installation
ATTENTION: S'il vous plaît choisir avec soin la position d'installation et assurez-vous que la puissance de sortie nal ne
dépasse pas les limites xées dans les règles pertinentes. La violation de ces règles pourrait conduire à des sanctions fédérales
graves.
Federal Communication Commission interference statement
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not
cause harmful interference, and (2) this device must accept any interference received, including interference that may cause
undesired operation.
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC
Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This
equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions,
12
may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a
particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by
turning the equipment o and on, the user is encouraged to try to correct the interference by one of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and receiver.
• Connect the equipment into an outlet on a circuit dierent from that to which the receiver is connected.
• Consult the dealer or an experienced radio/TV technician for help.
FCC caution:
• Any changes or modications not expressly approved by the party responsible for compliance could void the user's authority to
operate this equipment.
• This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
Radiation exposure statement:
This equipment complies with FCC radiation exposure limits for an uncontrolled environment. This equipment should be installed and
operated with a minimum distance of 20 cm between the active transceiver and your body.
NOTE: The country code selection is for a non-US model only and is not available to all US model. Per FCC regulation, all
WiFi products marketed in the US must be xed to US operation channels only.
Industry Canada statement
This device complies with Industry Canada license-exempt RSS standard(s). Operation is subject to the following two conditions:
1. this device may not cause interference, and
2. this device must accept any interference, including interference that may cause undesired operation of the device.
Le présent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radio exempts de licence. L'exploitation est
autorisée aux deux conditions suivantes:
1. l'appareil ne doit pas produire de brouillage, et
2. l'utilisateur de l'appareil doit accepter tout brouillage radioélectrique subi, même si le brouillage est susceptible d'en
compromettre le fonctionnement.
Under Industry Canada regulations, the radio transmitter(s) may only operate using an antenna(s) of a type and maximum (or lesser)
gain approved for the transmitter(s). To reduce potential radio interference to other users, the antenna type(s) and gain(s) should be
chosen so that the Equivalent Isotropic Radiated Power (E.I.R.P.) is not more than what was approved for the transmitter(s).
This Class A digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe A est conforme à la norme NMB-003 du Canada.
This device complies with RSS-210 of Industry Canada. Operation is subject to the condition that this device does not cause harmful
interference.
Cet appareil est conforme à la norme RSS-210 d'Industrie Canada. L'opération est soumise à la condition que cet appareil ne
provoque aucune interférence nuisible.
This device and its antenna(s) must not be co-located or operating in conjunction with any other antenna or transmitter, except
tested built-in radios.
Cet appareil et son antenne ne doivent pas être situés ou fonctionner en conjonction avec une autre antenne ou un autre émetteur,
exception faites des radios intégrées qui ont été testées.
The County Code Selection feature is disabled for products marketed in the US/Canada.
13
La fonction de sélection de l'indicatif du pays est désactivée pour les produits commercialisés aux États-Unis et au Canada.
Radiation Exposure Statement: This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment.
This equipment should be installed and operated with minimum distance of 20 cm between the active transceiver and your body.
Déclaration d'exposition aux radiations: Cet équipement est conforme aux limites d'exposition aux rayonnements IC établies pour
un environnement non contrôlé. Cet équipement doit être installé et utilisé avec un minimum de 20 cm de distance entre la source de
rayonnement et votre corps.
Setting up your Edge Gateway
NOTE: Edge Gateway mounting options are sold separately.
NOTE: Mounting can be done before or after conguring your Edge Gateway. For more information about mounting your
Edge Gateway, see Mounting your Edge Gateway.
NOTE: In some environments where the Edge Gateway may be installed, a more robust mounting method is required. For
example, for mounting in marine applications, it is recommended to use only the standard— mount bracket. The
recommendation is due to the presence of vibrations unique to the marine environment.
1. Connect an Ethernet cable to Ethernet port one.
2. Connect the antennas depending on the conguration ordered (optional).
NOTE: The antennas supported in the Edge Gateway vary depending on the conguration ordered.
Table 8. Antennas supported in Edge Gateway 3002
Antennas
supported
Signals
14
3002 Yes Yes Yes Yes Yes
NOTE: Use only the supplied antennas or third-party antennas that meet the minimum specications.
NOTE: Depending on the conguration ordered, some of the antenna connectors may not be present or may be
capped.
NOTE: Mobile broadband antenna connector two is for LTE Auxiliary only; it does not support 3G.
3. Insert the antenna into the connector.
NOTE: If you are installing multiple antennas, follow the sequence indicated in the following image.
4. Secure the antenna by tightening the rotating head of the connector until it rmly holds the antenna in the preferred position
(upright or straight).
NOTE: Antenna images are for illustrative purposes only. Actual appearance may dier from the images provided.
5. Connect all desired cables to the appropriate I/O ports on the Edge Gateway.
6. Open the micro-SIM or micro-SD card access door.
15
7. Insert a micro-SIM card into the top micro-SIM card slot and activate your mobile broadband service.
CAUTION: Dell recommends that you insert the micro-SIM card before turning on the Edge Gateway.
NOTE: Ensure that you rmly screw back the access door after closing.
NOTE: Contact your service provider to activate your micro-SIM card.
8. Insert a micro-SD card into the bottom micro-SD card slot.
NOTE: Remove the SD card slot ller before inserting a micro-SD card.
NOTE: Ensure that you rmly screw back the access door after closing.
9. Connect a grounding cable between the Edge Gateway and the secondary enclosure.
16
NOTE: Secondary enclosures are sold separately.
10. Connect the Edge Gateway to one of the following power sources:
•DC-IN
•PoE
17
NOTE: Shut down your system before you change the power sources.
11. Replace the dust caps on any unused ports.
12. When setting up the Edge Gateway for the rst time, complete the operating system setup.
For more information, see Setting up your operating system.
NOTE: MAC addresses and the IMEI number are available on the label at the front of the Edge Gateway. Remove the
label at install.
NOTE: The Edge Gateway is shipped with either Windows 10 IoT Enterprise LTSB 2016 or Ubuntu Core 16 operating
system.
NOTE: The default user name and password for Windows 10 IoT Enterprise LTSB 2016 is
admin
.
NOTE: The default user name and password for Ubuntu Core 16 is
admin
.
13. Access the BIOS by connecting remotely with the Dell Command | Congure application.
Windows 10 IOT Enterprise LTSB 2016
Click Start → All Programs → Dell → Command Congure → Dell Command | Congure Wizard.
Ubuntu Core 16
Use the dcc.cctk command to access the Dell Command | Congure application.
NOTE: For more information about using the Dell Command | Congure application, see the Dell Command |
Congure
Installation Guide
and
User's Guide
at www.dell.com/dellclientcommandsuitemanuals.
NOTE: For more information about BIOS settings on the Edge Gateway, see Default BIOS settings.
14. Install the Edge Gateway using one of the following mounting options:
NOTE: An open space of 63.50 mm (2.50 in) is recommended around the Edge Gateway for optimal air circulation.
•Standard mount
•DIN rail mount
•Quick mount
•Perpendicular mount
•Cable control bar
18
•VESA mount
Activating your mobile broadband service
CAUTION: Before you power on the Edge Gateway, insert a micro-SIM card.
NOTE: Ensure that the service provider has already activated the micro-SIM card before you use it in the Edge Gateway.
1. Remove the screw to open the micro-SIM card access door.
2. Insert a micro-SIM card into the top micro-SIM card slot.
3. Replace the screw, and close the micro-SIM card access door.
4. Power on the Edge Gateway.
5. Connect to a mobile network.
Windows operating system
a. Click the network icon from the taskbar, and then click Cellular.
b. Select Mobile Broadband Carrier → Advanced Options.
c. Make a note of the International Mobile Equipment Identity (IMEI) and Integrated Circuit Card Identier (ICCID).
d. Enter your APN number and any other credentials that your service provider requires.
Ubuntu operating system
a. Open the Terminal window.
b. Enter $sudo su - to access super user mode.
c. Congure the Mobile Broadband connection prole:
Command line:
network-manager.nmcli con add type <type> ifname <ifname> con-name <connection-name>
apn <apn>
Example (Verizon):
network-manager.nmcli con add type gsm ifname cdc-wdm0 con-name VZ_GSMDEMO apn
vzwinternet
19
Example (AT&T):
network-manager.nmcli con add type gsm ifname cdc-wdm0 con-name ATT_GSMDEMO apn
broadband
Example (3G):
network-manager.nmcli con add type gsm ifname cdc-wdm0 con-name 3G_GSMDEMO apn
internet
d. Connect to the mobile network:
Command line:
network-manager.nmcli con up <connection-name>
Example (Verizon):
network-manager.nmcli con up VZ_GSMDEMO
Example (AT&T):
network-manager.nmcli con up ATT_GSMDEMO
Example (3G):
network-manager.nmcli con up 3G_GSMDEMO
To disconnect from the mobile network:
Command line: network-manager.nmcli con down <connection-name>
Example (Verizon):
network-manager.nmcli con down VZ_GSMDEMO
Example (AT&T):
network-manager.nmcli con down ATT_GSMDEMO
Example (3G):
network-manager.nmcli con down 3G_GSMDEMO
Mounting your Edge Gateway
NOTE: Mounting can be completed before or after conguring your Edge Gateway.
NOTE: Mounting options are sold separately. Mounting instructions are available in the documentation shipped with the
mounting device.
NOTE: In some environments where the Edge Gateway is installed, a more robust mounting method is required. For
example, in marine applications, due to vibrations unique to that environment, only standard-mount bracket should be
used.
Mounting the Edge Gateway using the standard-mount bracket
Mounting dimensions
20
NOTE: The mounting brackets are shipped with only those screws that are required for securing the mounting brackets
to the Edge Gateway.
1. Secure the standard-mount bracket to the back of the Edge Gateway using the four M4x4.5 screws.
NOTE: Torque the screws at 8±0.5 kilograms-centimeter (17.64±1.1 pounds-inch).
21
2. Place the Edge Gateway against the wall, and align the holes in the standard-mount bracket with the holes on the wall. Screw
holes on the bracket have a diameter of 3 mm (0.12 in).
22
3. Place the standard-mount bracket on the wall, and using the holes above the screw holes on the bracket, mark the positions to
drill the four holes.
23
4. Drill four holes in the wall as marked.
5. Insert and tighten four screws (not supplied) to the wall.
NOTE: Purchase screws that t the diameter of the screw holes.
24
6. Align the screw holes on the standard-mount bracket with the screws and place the Edge Gateway onto the wall.
25
7. Tighten the screws to secure the assembly to the wall.
26
Mounting the Edge Gateway using quick-mount bracket
The quick-mount bracket is a combination of the standard-mount bracket and the DIN-rail bracket. It enables you to easily mount
and demount the Edge Gateway.
NOTE: The mounting brackets are shipped with only those screws required for securing the mounting brackets to the
Edge Gateway.
Mounting dimensions
27
Mounting instructions
1. Place the standard-mount bracket on the wall, and using the holes above the screw holes on the bracket, mark the positions to
drill the four holes.
28
2. Drill four holes in the wall as marked.
3. Insert and tighten four screws (not supplied) to the wall.
NOTE: Purchase screws that t the diameter of the screw holes.
29
4. Align the screw holes on the standard-mount bracket with the screws on the wall, letting the bracket hang on the screws.
30
5. Tighten the screws to secure the assembly to the wall.
31
6. Align the screw holes on the DIN-rail bracket with the screw holes at the back of the Edge Gateway.
7. Place the two M4x5 screws on the DIN-rail bracket and secure it to the Edge Gateway.
32
8. Place the Edge Gateway on the standard mount at an angle, and then pull the Edge Gateway down to compress the springs at
the top of the DIN-rail bracket.
33
9. Push the Edge Gateway towards the DIN-rail to secure it on the standard-mount bracket.
34
NOTE: For more information about demounting the DIN-rail, see Demounting DIN rail.
Attaching the cable control bars to the standard-mount bracket
1. Mount the Edge Gateway on the wall using the standard-mount bracket or quick-mount bracket.
2. Place the cable control bar on the mounting bracket and secure it to the notch.
CAUTION: Use the top cable control bar only with coaxial cable connections. Do not use with antennas.
35
3. Align the screw holes on the cable control bar with the screw holes on the mounting bracket.
4. Tighten the six M3x3.5 mm screws that secure the cable control bar to the mounting bracket.
NOTE: Torque the screws at 5±0.5 kilograms-centimeter (11.02±1.1 pounds-inch).
36
5. Connect the cables to the Edge Gateway.
6. Loop the cable lock (not supplied) to secure each cable to the cable control bar.
37
Mounting the Edge Gateway on a DIN rail using the DIN-rail bracket
NOTE: The DIN-rail bracket includes the screws that are required for securing the bracket to the Edge Gateway.
1. Align the screw holes on the DIN-rail bracket with the screw holes at back of the Edge Gateway.
2. Place the two M4x5 screws on the DIN-rail bracket and secure it to the Edge Gateway.
38
3. Secure the DIN-rail mounting bracket to the Edge Gateway using the two M4x5 screws provided.
NOTE: Torque the screws at 8±0.5 kilograms-centimeter (17.64±1.1 pounds-inch) on the DIN-rail mounting bracket.
39
4. Place the Edge Gateway on the DIN rail at an angle, and then pull the Edge Gateway down to compress the springs at the top
of the DIN-rail mounting bracket.
5. Push the Edge Gateway towards the DIN-rail to secure the lower clip of the bracket onto the DIN rail.
40
NOTE: For more information about demounting the DIN-rail, see Demounting DIN rail.
Mounting the Edge Gateway using the perpendicular mount
NOTE: The perpendicular mount is designed for mounting in a DIN-rail only.
NOTE: An open space of 63.50 mm (2.50 in) around the Edge Gateway is recommended for optimal air circulation.
Ensure that the environmental temperature in which the Edge Gateway is installed does not exceed the operating
temperature of the Edge Gateway. For more information about the operating temperature of the Edge Gateway, see the
Edge Gateway Specications
.
1. Align the screw holes on the perpendicular-mount bracket with the screw holes on the Edge Gateway.
2. Tighten the four M4x7 screws to secure the Edge Gateway to the perpendicular-mount bracket.
NOTE: Torque the screws at 8±0.5 kilograms-centimeter (17.64±1.1 pounds-inch).
41
3. Align the screw holes on the DIN-rail mount bracket with the screw holes on the perpendicular-mount bracket, and tighten the
two screws.
NOTE: Torque the screws at 8±0.5 kilograms-centimeter (17.64±1.1 pounds-inch).
42
4. Place the Edge Gateway on the DIN rail at an angle and push the Edge Gateway down to compress the springs on the DIN-rail
mount brackets.
5. Push the Edge Gateway towards the DIN-rail to secure the lower clip of the bracket onto the DIN rail.
43
6. Secure the Edge Gateway on the DIN rail.
Mounting the Edge Gateway using a VESA mount
The Edge Gateway can be mounted on a standard VESA mount (75 mm x 75 mm).
NOTE: The VESA mount option is sold separately. For VESA mounting instructions, see the documentation that is
shipped with the VESA mount.
44
45
4
Setting up the ZigBee dongle
CAUTION: Do not connect the ZigBee dongle if the Edge Gateway is installed inside the enclosure.
1. Power o your Edge Gateway.
2. Connect the ZigBee dongle to any external USB port on your Edge Gateway.
3. Power on your Edge Gateway and complete the setup.
NOTE: For more information about the ZigBee development, see www.silabs.com.
46
5
Setting up the operating system
CAUTION: To prevent operating system corruption from sudden power loss, use the operating system to gracefully shut
down the Edge Gateway.
The Edge Gateway is shipped with one of the following operating systems:
• Windows 10 IoT Enterprise LTSB 2016
• Ubuntu Core 16
NOTE: For more information about Windows 10 operating system, see msdn.microsoft.com.
NOTE: For more information about the Ubuntu Core 16 operating system, see www.ubuntu.com/desktop/snappy.
Windows 10 IoT Enterprise LTSB 2016
Boot up and login – Remote system conguration
NOTE: Your computer must be on the same subnet as the Edge Gateway.
1. Connect a network cable from Ethernet port one on the Edge Gateway to a DHCP-enabled network or router that provides IP
addresses.
NOTE: The rst-time boot to Windows takes about 5 minutes for system conguration. Subsequent boot-ups take
about 50 seconds.
2. Using the MAC address provided on the front cover of the Edge Gateway, obtain the IP address through your network’s DHCP
server or through a network analyzer.
3. On the Windows computer, search for Remote Desktop Connection and launch the application.
4. Log in using the IP address.
NOTE: Ignore any certication errors when connecting to your Edge Gateway.
Boot up and login—Static IP system conguration
NOTE: To help set up the Edge Gateway remotely, the static IP address of Ethernet port two on the Edge Gateway is set
to these values at the factory:
• IP address: 192.168.2.1
• Subnet mask: 255.255.255.0
• DHCP server: Not applicable
You can connect your Edge Gateway to a Windows computer that is on the same subnet using a crossover cable.
1. On the Windows computer, search for View network connections in the control panel.
2. In the list of network devices displayed, right-click the Ethernet adaptor that you want to use to connect to the Edge Gateway,
then click Properties.
3. On the Networking tab, click Internet Protocol Version 4 (TCP/IPv4) → Properties.
4. Select Use the following IP address, then enter 192.168.2.x (where x represents the last digit of the IP address, for
example, 192.168.2.2).
47
NOTE: Do not set the IPv4 address to the same IP address as the Edge Gateway. Use an IP address between
192.168.2.2 to 192.168.2.254.
5. Enter the subnet mask 255.255.255.0 , then click OK.
6. Secure a crossover network cable between Ethernet port two on the Edge Gateway and the congured Ethernet port on the
computer.
7. On the Windows computer, launch Remote Desktop Connection.
8. Connect to the Edge Gateway using the IP address 192.168.2.1. The default username and password are both admin.
Restoring Windows 10 IoT Enterprise LTSB 2016
CAUTION: These steps will delete all the data on your Edge Gateway.
You can restore Windows 10 IoT Enterprise LTSB 2016 by using a USB ash drive.
Prerequisites
Create the recovery USB ash drive. For more information, see Creating the recovery USB ash drive.
Procedure
1. Connect the recovery USB ash drive to the Edge Gateway.
2. Power on the Edge Gateway.
The Edge Gateway will automatically boot from the USB recovery ash drive and restore Windows back to the factory image.
Restoration takes about 25 minutes to complete and a conrmation log le is stored on the USB ash drive. Once restoration is
complete, the system will power o.
NOTE: The conrmation log le is named
<service tag>
_
<date>
_
<time>
.txt
Windows 10 IOT Enterprise LTSB 2016 basic functions
BIOS update
For more information about updating the BIOS, see Accessing and updating the BIOS.
Watchdog Timer
The Watchdog Timer for Windows 10 IoT Enterprise LTSB 2016 is controlled through the BIOS setting.
The Watchdog Timer is enabled and disabled under the BIOS setting Watchdog Timer.
NOTE: For more information about BIOS settings on the Edge Gateway, see Default BIOS settings.
Cloud LED
NOTE: To utilize the Cloud LED, download the necessary tools and drivers from www.dell.com/support.
One unique feature of the Edge Gateway 3000 Series is the Cloud LED. Cloud LED enables you to visually inspect the operational
status of the Edge Gateway by looking at the display light on the left panel of the Edge Gateway.
To enable this feature, you must expose and program a GPIO register on the Edge Gateway.
Follow these steps to control the Cloud LED on the Edge Gateway:
1. Download the Cloud LED utility from www.dell.com/support.
2. Extract the following les:
a. DCSTL64.dll
b. DCSTL64.sys
c. DCSTL64.inf
48
d. DCSTL64.cat
e. CloudLED.exe
NOTE: These les must be in the same directory.
3. Run the CloudLED.exe from Command Prompt or PowerShell with administrative rights. Run the following commands:
• CloudLED.exe ON
• CloudLED.exe OFF
TPM support
Windows 10 IoT Enterprise LTSB 2016 supports TPM 2.0. For more information about TPM resources, see
technet.microsoft.com/en-us/library/cc749022.
System shutdown and restart
Click Start → Power, and then click Restart or Shutdown to restart or shutdown the Edge Gateway, respectively.
LAN and WLAN network conguration
In the Search box, type Settings and open the Settings window. Select Network & Internet to congure the network.
Bluetooth conguration
In the Search box, type Settings and open the Settings window. Select Devices, and then select Bluetooth from the menu on
the left panel to congure the network.
WWAN (5815) network conguration
NOTE: Ensure that the micro-SIM card is already activated by your service provider before using it in the Edge Gateway.
For more information, see activate your mobile broadband service.
Follow these steps after installing the micro-SIM card:
1. In the Search box, type Settings and open the Settings window.
2. Select Network & Internet.
3. Locate the WWAN connection in the Wi-Fi section and select the entry to connect and disconnect from the WWAN adapter.
Ubuntu Core 16
Overview
Ubuntu Core 16 is a Linux OS distribution that is an entirely new mechanism for managing IOT systems and its applications. For more
information about Ubuntu Core 16 OS, see
•www.ubuntu.com/cloud/snappy
•www.ubuntu.com/internet-of-things
Prerequisites for setting up Ubuntu Core 16
Infrastructure
An active connection to the internet is needed to update the Ubuntu Core 16 operating system as well as applications (snaps).
Prior knowledge
• Ensure the personnel setting up Ubuntu Core 16 operating system has prior knowledge of the following:
– Unix\Linux commands
– Serial communication protocol
– SSH terminal emulators (for example, PuTTY)
49
– Network settings (for example, proxy URL)
Boot up and log in – Remote system conguration
1. Connect a network cable from Ethernet port one on the Edge Gateway to a DHCP-enabled network or router that provides IP
addresses.
2. In your network's DHCP server, use the command dhcp-lease-list to obtain the IP address associated with the Edge
Gateway's MAC address.
3. Setup as SSH session using an SSH terminal emulator (for example, native command-line ssh client on Linux or PuTTY on
Windows).
NOTE: The SSH service is enabled on Ubuntu Core 16 by default.
4. Enter the command ssh admin@<IP address>, followed by the default user name and password. The default user name and
password are both admin.
For example;
lo@lo-Latitude-E7470:~$ ssh admin@10.101.46.209
admin@10.101.46.209's password:
Boot up and log in – Static IP system conguration
This allows you to connect your Edge Gateway through a host computer, which must be on the same subnet.
NOTE: The static IP address of Ethernet port two on the Edge Gateway is set to these values at the factory:
• IP address: 192.168.2.1
• Subnet mask: 255.255.255.0
• DHCP server: Not applicable
1. On the host computer, congure the Ethernet adaptor that is connected to the Edge Gateway with a static IPv4 address under
the same subnet. Set the IPv4 address to 192.168.2.x (where x represents the last digit of the IP address, for example,
192.168.2.2).
NOTE: Do not set the IPv4 address to the same IP address as the Edge Gateway. Use an IP address between
192.168.2.2 to 192.168.2.254.
2. Set the subnet mask to 255.255.255.0.
Updating operating system and applications
After enabling the network connections and connecting to the internet, Dell recommends to have the latest OS components and
applications installed. To update Ubuntu Core 16, run:
admin@localhost:~$ sudo snap refresh
Viewing operating system and application versions
Run the command:
admin@localhost:~$ sudo uname –a
returns
Linux ubuntu.localdomain 4.4.30-xenial_generic #1 SMP Mon Nov 14 14:02:48 UTC 2016 x86_64
x86_64 x86_64 GNU/Linux
NOTE: Check if a newer version of the software is available. For more information on checking for updates, see Updating
operating system and applications.
50
Additional Ubuntu commands
Basic commands
NOTE: For more information about Ubuntu commands, see https://snapcraft.io/.
Table 9. Basic commands
Action Ubuntu Core 16
Viewing system attributes #sudo snap version
Updating the image to the latest release #sudo snap update
Viewing a list of all the snaps that are currently installed #sudo snap find
Viewing a set and attribute to a snap #sudo snap set <snap> <attribute>=<value>
Querying attributes from a snap #sudo snap get <snap>
Rebooting the system Run the command:
admin@localhost:$ sudo reboot
returns:
System reboot successfully
Shutting down the system Run the command:
admin@localhost:$ sudo poweroff
The system shuts down successfully.
Add a new user if libnss-extrausers is pre-installed $sudo adduser --extrausers testuser
Change a user’s password $sudo passwd <user-name>
Re-mount the Ubuntu Snappy 16 root-le system as read only Snappy 16 rootfs is Read-Only
Accessing the built-in help admin@localhost:~$ sudo snap --help
Listing the installed snaps admin@localhost:~$ sudo snap list
Updating the system name admin@localhost:$ network-manager.nmcli
general hostname <NAME>
Changing the time zone When the system arrives from the factory, the operating system
is usually set to the UTC time zone.
To change the time zone to your location, run the command:
admin@localhost:~$ sudo timedatectl --help
Root-user credential Run the command:
admin@localhost:$ sudo su -
Returns:
$ admin@localhost:~# sudo su –
$ root@localhost:~#
Identifying the System Service Tag Run the command:
admin@localhost:$ cat /sys/class/dmi/id/
product_serial
The system tag is printed.
51
Action Ubuntu Core 16
Identifying the system vendor Run the command:
admin@localhost:$ cat /sys/class/dmi/id/
board_vendor
returns
Dell Inc.
The system tag is printed.
Ubuntu Network Manager
Network-Manager is a native Ubuntu Snappy connection manager. The application can be used to congure the Edge Gateway so
that it's automatically-detected and connected to the network. The application can be used to congure multiple network devices.
A command-line utility nmcli is included with Network-Manager to support non-graphical user interface congurations.
NOTE: For more information about Network Manager, see https://wiki.archlinux.org/index.php/NetworkManager
Connecting through WWAN
NOTE: For more information on conguring and connecting through WWAN, see https://docs.ubuntu.com/core/en/
stacks/network/network-manager/docs/congure-cellular-connections.
1. Check if a modem is present and identify the modem index number.
$ sudo modem-manager.mmcli –L
2. Check the modem status and identify the primary port.
$ sudo modem-manager.mmcli -m <x>
NOTE:
<x>
refers to the modem index number. Replace
<x>
with the modem index number after running the
command at step 1.
3. Create a prole.
$ sudo network-manager.nmcli c add con-name test type gsm ifname <primary port> apn
internet
NOTE: Depending on the return results from step 2, replace
<primary port >
after ifname with the actual primary
port name.
4. Check the WWAN status.
$ network-manager.nmcli r wwan
5. Turn on WWAN.
$ sudo network-manager.nmcli r wwan on
6. Find wwan0 in the interface list.
$ ifconfig -a
7. Enable the connection prole.
$ sudo network-manager.nmcli c up test
8. Check the Network Manager status.
$ network-manager.nmcli d
9. Disable the connection prole.
$ sudo network-manager.nmcli c down test
10. Check the Network Manager status.
$ network-manager.nmcli d
Connecting through WLAN
1. Show a list of network interfaces like eth0, eth1, wlan0, mlan0, and so on.
$ network-manager.nmcli d
52
2. Show a list of network interfaces like eth0, eth1, wlan0, mlan0, and so on.
$ network-manager.nmcli d
3. Show a list of available wireless access points.
$ network-manager.nmcli device wifi list
4. Wireless connection with nmcli: Run the following commands and replace $SSID, $PSK, and $WIFI_INTERFACE with the
variables for your environment.
• Connect:
$ sudo network-manager.nmcli dev wifi connect $SSID password $PSK ifname
$WIFI_INTERFACE
• Disconnect:
$ sudo network-manager.nmcli dev disconnect $WIFI_INTERFACE
Connecting through software-enabled Access Point (SoftAP)
This feature depends on the wireless module and its associated driver to function as a wireless-access point.
NOTE: For more information on SoftAP, see https://docs.ubuntu.com/core/en/stacks/network/wi-ap/docs/index.
1. Login to Ubuntu Snappy. Make sure that the system is connected to the internet.
2. Run the command to nd the application from the Ubuntu Snappy Store.
#sudo snap seach wifi-ap
3. Run the command to install the application.
#sudo snap install wifi-ap
4. After snap is installed, run the command to check the status.
$ wifi-ap.status
5. Run the command to enable the access point and restart the service.
$ wifi-ap.config set disabled=false
The WiFi-AP default SSID Ubuntu is now visible to clients.
To secure the WiFi access point with WPA 2 personal, change the following conguration items.
$ wifi-ap.config set wifi.security=wpa2 wifi.security-passphrase=Test1234
The command enables WPA2 security with the passphrase set to Test1234.
Connecting through Bluetooth
This feature allows the system to connect to Bluetooth devices such as a Bluetooth keyboard.
1. Run the command to start bluetoothctl console.
#bluetoothctl -a
The bluetoothctl console opens.
2. Run the command to power on the Bluetooth device.
$power on
3. Register the agent for the keyboard:
$agent KeyboardOnly
$default-agent
4. Run the command to put the Bluetooth controller in pair-able mode.
$pairable on
5. Run the command to scan for nearby Bluetooth devices.
$scan on
6. Run the command to stop scanning after the Bluetooth keyboard is found.
$scan off
53
7. Run the command to pair the Bluetooth keyboard.
$pair <MAC address of Bluetooth keyboard>
8. Enter the PIN code on the Bluetooth keyboard, if needed.
9. Run the command to trust the Bluetooth keyboard.
$trust <MAC address of Bluetooth keyboard>
10. Run the command to connect the to the Bluetooth keyboard.
$connect <MAC address of Bluetooth keyboard>
11. To quit the bluetoothctl console.
$quit
Switching between WLAN and Bluetooth modes
1. Unload the WLAN/BT driver.
$ modprobe -r ven_rsi_sdio
2. Adjust the mode in /etc/modprobe.d/rs9113.conf
3. Reload the WLAN/BT driver.
$ modprobe ven_rsi_sdio
4. Verify the operation mode. Refer to the table for operating mode values.
$ cat /sys/module/ven_rsi_sdio/parameters/dev_oper_mode
Table 10. Operating-mode values for WLAN and Bluetooth
Operating mode value WiFi station BT/BLE modes
supported
softAP Clients supported by
softAP
1 X N/A N/A
1 N/A X 32
13 X Dual (BT classic and
BTLE)
N/A
14 Dual (BT classic and
BTLE)
X 4
5 X BT Classic N/A
6 BT Classic X 32
Bluetooth Serial Port Prole (SPP)
Assumptions for MAC addresses of each BT adapter:
• BT MAC(MYCLIENT): XX:XX:XX:XX:XX:XX
• BT MAC(MYSERVER): YY:YY:YY:YY:YY:YY
1. Pre-requirements (for Debian-only, not required on Ubuntu Core OS).
sudo apt-get install bluez bluez-tools
2. Prepare to pair MYSERVER and MYCLIENT
$ sudo bluez.bluetoothctl -a
[bluetoothctl]# power on
[bluetooth]# discoverable on
[bluetooth]# scan on
[NEW] Device XX:XX:XX:XX:XX:XX MYCLIENT
[bluetooth]# scan off
3. Pair with each other. As of Bluetooth v2.1, Secure Simple Pairing is a requirement, and oers three methods of pairing devices,
which are applicable on the Dell Gateway 3000 series:
• Just Works
54
• Numeric Comparison
• Passkey Entry
NOTE: For more information about blueetooth pairing, see https://blog.bluetooth.com/bluetooth-pairing-part-4.
[bluetooth]# agent on
[bluetooth]# default-agent
[bluetooth]# pairable on
[bluetooth]# pair XX:XX:XX:XX:XX:XX <MAC Address of Device to Pair>
[bluetooth]# connect XX:XX:XX:XX:XX:XX [CHG] Device XX:XX:XX:XX:XX:XX Connected: yes
[bluetooth]# exit
4. Congure SPP.
Server Device
$ bluez.sdptool add --channel=22 SP
$ ./rfcomm -r listen /dev/rfcomm0 22
Waiting for connection on channel 22
Connection from XX:XX:XX:XX:XX:XX to /dev/rfcomm0 <These lines will be seen when client
comes>
Press CTRL-C for hangup
Then, create a new instance of terminal to screen the data over bluetooth serial.
$ cat /dev/rfcomm0
Client Device
$ bluez.sdptool add --channel=22 SP
$ ./rfcomm -r connect /dev/rfcomm0 YY:YY:YY:YY:YY:YY 22
Then, create a new instance of terminal to send data, for example, a new instance of ssh.
$ echo "test" > /dev/rfcomm0
NOTE: The rfcomm command is not available in this command. If required, you can copy the binary to the Edge
Gateway from an AMD64-based system running Ubuntu 16.04 or above.
Security
Trusted Platform Module (TPM)
NOTE: For more information about the TPM, see https://developer.ubuntu.com/en/snappy/guides/security-whitepaper/.
TPM is only supported on devices that have TPM hardware installed on products with Snappy-enhanced security support. The TPM
on/o setting is congurable in the BIOS and manageable in the operating system.
If TPM is turned o, the device node (/dev/tpm0) does not exist.
(plano)ubuntu@localhost:~$ ls /dev/tpm0
ls: cannot access /dev/tpm0: No such file or directory
If TPM is turned on, the device node (/dev/tpm0) exists.
(plano)ubuntu@localhost:~$ ls /dev/tpm0
/dev/tpm0
Watchdog Timer (WDT)
NOTE: For more information about Watchdog Timer (WDT) commands, see www.sat.dundee.ac.uk/~psc/watchdog/
Linux-Watchdog.html.
Dell recommends that you enable the WDT by default to activate the fail-safe circuitry. Snappy, a WDT-compatible operating system,
provides the capability to detect and recover the system from malfunctions or unexpected crashes.
To check daemon status, run the command:
admin@localhost:$ systemctl show | grep –i watchdog
55
Returns:
RuntimeWatchdogUSec=1min
ShutdownWatchdogUSec=10min
NOTE: The default value is 10. The actual value should be greater than 0.
To congure WDT, run the command:
admin@localhost:$ sudo vi /etc/systemd/system.conf.d/watchdog.conf
Cloud LED On/O
1. To export Cloud LED PIN, run the command:
#sudo su –
#echo 346 > /sys/class/gpio/export
#echo out > /sys/class/gpio/gpio346/direction
2. To turn on Cloud LED, run the command:
#echo 1 > /sys/class/gpio/gpio346/value
or
To turn o Cloud LED, run the command:
#echo 0 > /sys/class/gpio/gpio346/value
Global Positioning Systems (GPS)
NOTE: For more information about GPS congurations, see http://locationd.readthedocs.io/en/latest/intro.html.
National Marine Electronics Association (NMEA) data is supported if the GPS module is present in the system. In the operating
system, the location service is a central hub for multiplexing access to positioning subsystems available through hardware and
software. It provides a client API oering positioning capabilities to applications and other system components..
To retrieve NMEA streaming data:
• Device node for NMEA streaming: Edge Gateway 3002
$ cat /dev/ttyS5
To access location service:
$ sudo locationd.monitor
Enabled position/heading/velocity updates...
Update(Position(lat: 26.9511 deg, lon: 155.087 deg, alt: n/a, hor.acc.: n/a, ver.acc.: n/
a),
1489044234694526189)
Update(0.552 m s^-1, 1489044234695698701)
Update(Position(lat: 26.9477 deg, lon: 155.098 deg, alt: n/a, hor.acc.: n/a, ver.acc.: n/
a), 1489044234718316599)
Snappy auto update/Autopilot
Snappy auto update is a feature which runs in the background, ensuring that your software always up-to-date. We recommend that
you enable the feature by default. The settings can be adjusted in the Ubuntu Core.
NOTE: For more information automatic updates, see https://docs.ubuntu.com/core/en/reference/automatic-refreshes.
Accessing Snappy Store/Snapweb
1. Enter ip_address:4200 in a browser.
56
2. Select Advanced, then select proceed to the ip_address(unsafe).
3. Using the default login of 'admin', keeping the password blank, open Terminal and ssh remote login
lo@lo-latitude-E7470:~$ ssh admin@10.101.46.209
admin@10.101.46.209's password:
4. While running sudo snapweb.generate-token, copy the token.
lo@lo-latitude-E7470:~$ ssh admin@10.101.46.209
admin@10.101.46.209's password:
Welcome to Ubuntu 16.04.1 LTS (GNU/Linux 4.4.0-45-generic x86_64)
* Documentation: https://help.ubuntu.com
* Management: https://landscape.canonical.com
* Support: https://ubuntu.com/advantage
Welcome to Snappy Ubuntu Core, a transactionally updated Ubuntu.
* See https://ubuntu.com/snappy
It's a brave new world here in Snappy Ubuntu Core! This machine does not use apt-get or
deb packages. Please see 'snap --hwlp' for app installation and transactional updates.
Last login: Tue Nov 01:10:12 2016 from 10.101.46.187
Admin@localhost:~$ sudo snapweb.generate-toen
Snapweb Access Token:
GtYaoevIodhTgHDyFWczWtYkEhDYROpX0pf27K62TtTOVooUwRuQ)IgBB7ECznCP
Use the above token in the Snapweb interface to be granted access.
admin@localhost:~$
5. Paste the token on the web page and click Submit.
57
You can now access the snapweb.
CAN module
NOTE: For information about using the CAN module, see the documentation available at www.atmel.com.
The Edge Gateway supports the CANbus model Atmel ATSAME70N19A-CNT. This feature is only supported if the hardware module
is present, and the operating system provides the capability of mutual communication between user space application and physical
module. If there is a specic CANbus programming requirement of user mode application, contact the hardware provider of that
module for the API documentation.
To check if the CAN module is present:
for i in /dev/ttyACM*; do udevadm info $i | grep -q 03eb_2404_USB_CAN_FD && echo "path:
/dev/$(basename $i)"; done
Sensors
The sensors on the Edge Gateway provide measurements on pressure, relative humidity and temperature, and motion.
Table 11. Sensor types
Relative humidity and temperature sensor ST Micro HTS221
Motion sensor—Accelerometer ST Micro LNG2DMTR
Pressure sensor ST Micro LPS22HB
Retrieve the raw data from the sensors by running the following commands. Then, apply the formula in the table to convert the data
collected into measurements such as relative humidity and temperature.
Retrieving raw data from sensors
• To query sensor devices, run the command.
$ cat /sys/bus/iio/devices/iio:device*/name
hts221 <-- device0, Humidity and temp.
lng2dm_accel <-- device1, G-sensor
lps22hb <-- device2, Pressure
• To retrieve data from the humidity and temperature sensor, run the command.
$ cat in_humidityrelative_offset
$ cat in_humidityrelative_raw
$ cat in_humidityrelative_scale
$ cat in_temp_offset
$ cat in_temp_raw
$ cat in_temp_scale
58
• To retrieve data from the motion sensor, run the command.
$ cat in_accel_scale_available
$ cat in_accel_*_scale
$ cat in_accel_*_raw
• To retrieve data from the pressure sensor, run the command.
$ cat in_pressure_raw
$ cat in_pressure_scale
Converting raw data for use
Apply the formula in the table to convert the raw data collected into usable measurements.
Table 12. Convert relative humidity and temperature sensor raw data
Relative humidity and temperature sensor ST Micro HTS221
RH (in %) = (in_humidityrelative_raw + in_humidityrelative_oset) * in_humidityrelative_scale
Temperature (degC) = (in_temp_raw + in_temp_oset) * in_temp_scale
Table 13. Convert motion sensor raw data
Motion sensor—Accelerometer ST Micro LNG2DMTR
accel_{x/y/z} (m/s^2) = in_accel_{x/y/z}_raw * in_accel_{x/y/z}_scale
Table 14. Convert pressure sensor raw data
Pressure sensor ST Micro LPS22HB
Pressure (hPa) = in_pressure_raw * in_pressure_scale * 10
Temperature (m degC) = in_temp_raw * in_temp_scale
Ignition Pin
The ignition pin can be used to wake the system from S3, S4, and S5 power states. The user can use the operating system power
management to congure S3, S4, and S5 power states and shutdown.
NOTE: For more information about conguring the ignition pin (using the system.power-key-action command), see
https://docs.ubuntu.com/core/en/reference/core-conguration.
Specify the action to take when the power button is pressed.
Table 15. Values and conguration options for the ignition pin
ignore Do nothing
poweroff (default) Shut down the system
reboot Reboot the system
halt Halt the system
kexec Direct-boot a new kernel
suspend Suspend the system
hibernate Hibernate the system
hybrid-sleep Suspend to both disk and RAM
lock Screen-lock all running sessions.
59
For example, to reboot the system when the power button is pressed, run the command:
$ snap set core system.power-key-action=reboot
System Power Management
Conguring low power states: S3 and S4
Congure sleep state–S3
$ sudo systemctl suspend
Congure hibernate state–S4
$ sudo systemctl hibernate
Rebooting or power o
To reboot the system
$ sudo reboot
To power o
$ sudo poweroff
Conguring system wake-up from LAN or WLAN
1. Enable Wake on LAN in the BIOS program. For more information on accessing the BIOS program, see Accessing BIOS settings
2. Connect the system to a wireless network.
$ sudo network-manager.nmcli dev wifi connect $SSID password $PSK ifname wlan0
3. Enable Wake on LAN.
$ sudo iw phy0 wowlan enable magic-packet
4. Recheck the support status.
$ sudo iw phy phy0 wowlan show
5. Make sure wlan0 is up and running with IP address.
6. Perform sleep.
$ sudo systemctl sleep
Or, perform hibernation.
$ sudo systemctl hibernate
7. Use another system to wake from wlan (Supported tools: wakeonlan, and etherwake).
$ sudo wakeonlan MAC
$ sudo etherwake MAC
Restoring Ubuntu Core 16
When the operating system is restored to the factory image, all data on the system is deleted. You can restore Ubuntu Core 16
operating system to the factory image using one of the following methods:
• Restore Ubuntu Core 16 from USB ash drive
• Restore Ubuntu Core 16 from the recovery partition on the Edge Gateway
–Option 1: Restoring from the operating system
–Option 2: Restoring during system POST
Option 1: Restoring from the operating system
CAUTION: These steps will delete all the data on your Edge Gateway
1. Connect the Edge Gateway remotely or through a KVM session.
2. Log in to the operating system.
60
3. Run the following command to trigger native eMMC recovery partition:.
$ sudo efibootmgr -n $(efibootmgr | grep "factory_restore" | sed 's/Boot//g' | sed 's/
[^0-9A-B]*//g') ; reboot
Option 2: Restoring during system POST
CAUTION: These steps delete all the data on your Edge Gateway.
1. Connect a USB keyboard to the Edge Gateway.
2. Power on the Edge Gateway.
The Power LED turns solid green while the Cloud LED is o.
3. During the rst 20 seconds after applying power, press Ctrl+F repeatedly to trigger the operating system recovery.
4. When the Cloud LED starts blinking green, continue with one of these options:
NOTE: If the Cloud LED does not start blinking after 50 seconds, power o the Edge Gateway and repeat Steps 2
and 3.
Table 16. Start or cancel restoration during system POST
To start restoration To cancel restoration
• Press y, then press Enter.
The Cloud LED changes to solid green indicating that recovery
is in progress. Once restoration is complete, the Cloud LED
turns o and the system reboots. The restoration takes about
2 minutes to complete.
• Press n, then press Enter. Or, if the system does not
detect any key-press within 30 seconds.
The Cloud LED turns o, and the system reboots.
Restore Ubuntu Core 16 from USB ash drive
CAUTION: These steps will delete all the data on your Edge Gateway.
Prerequisites
Create the recovery USB ash drive. For more information, see Creating the recovery USB ash drive.
Procedure
1. Insert the USB ash drive into the USB port on the Edge Gateway.
2. Power on the Edge Gateway.
3. The Edge Gateway boots through the USB ash drive and ashes the Ubuntu Core installation image into storage automatically.
NOTE: When the installation images are being ashed to the storage, the Power LED is solid green and Cloud LED is
blinking green.
4. The system powers o after the installation is complete.
NOTE: The installation takes about 3 minutes to complete.
5. Remove the USB drive after the Edge Gateway powers o.
6. Power on the Edge Gateway again to continue the installation. The system reboots several times during the installation and
takes about 10 minutes to complete.
Once installation is complete, a login screen is displayed.
7. At the login screen, enter the default user name and password: admin.
The Edge Gateway is now ready for use.
NOTE: For more information about accessing Ubuntu on the Edge Gateway remotely, see Boot up and log in –
Remote system conguration.
61
Flashing a new OS image
Prerequisites
• A blank and FAT32–formatted USB ash drive with at least 4 GB of storage space
• Ubuntu Desktop ISO
NOTE: You can download the latest version of the Ubuntu Desktop ISO le from http://releases.ubuntu.com.
• A released Ubuntu Core 16 image from Dell.com/support: <unique name-date> img.xz
• USB keyboard
• USB mouse
• Ubuntu workstation with Ubuntu Desktop 14.04 or higher
Flashing new Ubuntu OS image
1. Insert a USB ash drive into the Ubuntu Desktop workstation.
2. Copy <unique name-date>img.xz to ~/Downloads/ directory.
3. Flash the installation image to USB ash drive.
a. Start the Terminal application. It can be found by typing Terminal in the Unity Dash.
CAUTION: The dd command erases the content of the drive it writes to.
b. Type the following command and press Enter.
xzcat /cdrom/<unique name-date> img.xz | sudo dd
of=/dev/sdb bs=32M ; sync
NOTE: The sdb may have to be replaced with the actual name of the drive on the system.
4. Unmount and remove the USB ash drive.
5. Connect the power and Ethernet cable to your Edge Gateway.
6. Insert the USB ash drive into your Edge Gateway.
7. Power on and boot up the Edge Gateway from the USB ash drive.
The installation USB ash drive ashes the Ubuntu Core 16 installation image into storage automatically. After the installation is
complete, the system shuts down.
8. Remove the USB ash drive.
9. Power on the system.
Ubuntu Core 16 is installed on your Edge Gateway.
Creating the recovery USB ash drive
Prerequisites:
• Service Tag of the Edge Gateway
• A Windows computer with administrator rights and at least 8 GB of available storage space to download the Dell ISO recovery
image
• A blank USB ash drive with at least 8 GB of storage space. These steps delete all data on the USB ash drive.
• .NET Framework 4.5.2 or higher
1. Download and save the Dell ISO recovery image le from:
• For Windows: dell.com/support/home/us/en/19/drivers/osiso/win
• For Ubuntu: dell.com/support/home/us/en/19/drivers/osiso/linux
2. Download and install the Dell OS Recovery Tool on your computer.
3. Launch the Dell OS Recovery Tool.
4. Click Yes in the User Account Control prompt.
62
5. Connect the USB ash drive to the computer.
6. Click Browse and navigate to the location where the Dell ISO recovery image le is saved.
7. Select the Dell ISO recovery image le and click Open.
8. Click Start to begin creating the bootable USB recovery media.
9. Click Yes to continue.
10. Click OK to complete.
CAN module
NOTE: For information about using the CAN module, see the documentation available at www.atmel.com.
The Edge Gateway supports the CANbus model Atmel ATSAME70N19A-CNT. This feature is only supported if the hardware module
is present, and the operating system provides the capability of mutual communication between user space application and physical
module. If there is a specic CANbus programming requirement of user mode application, contact the hardware provider of that
module for the API documentation.
To check if the CAN module is present:
for i in /dev/ttyACM*; do udevadm info $i | grep -q 03eb_2404_USB_CAN_FD && echo "path:
/dev/$(basename $i)"; done
63
6
Accessing and updating BIOS
Accessing BIOS settings
Use Dell Command | Congure (DCC) to access BIOS settings
Dell Command | Congure (DCC) is a factory-installed application in the Edge Gateway that helps to congure the BIOS settings. It
consists of a Command Line Interface (CLI) to congure various BIOS features. For more information about DCC, see
www.dell.com/dellclientcommandsuitemanuals.
• On the connected computer running Windows, click Start → All Programs → Command Congure → Dell Command |
Congure Wizard
• On the connected computer running Ubuntu Core, access Dell Command | Congure using the command dcc.cctk
For more information on how to use the Dell Command | Congure application, see the Dell Command | Congure Installation Guide
and User's Guide at www.dell.com/dellclientcommandsuitemanuals.
For more information about BIOS settings on the Edge Gateway, see Default BIOS settings
Use Edge Device Manager (EDM) to access BIOS settings
Edge Device Manager (EDM) enables you to perform remote management and system conguration. By using the EDM cloud
console, you can view and congure the BIOS settings. For more information about the EDM, see www.dell.com/support/
home/us/en/19/product-support/product/wyse-cloud-client-manager/research.
Updating BIOS
NOTE: Download the latest BIOS le from dell.com/support/home/us/en/19/product-support/product/dell-edge-
gateway-3000-series/drivers/.
Select one of these options to update the BIOS on the Edge Gateway.
•Using the USB invocation script
NOTE: Dell recommends the use of the USB invocation script to update the BIOS.
•Updating the BIOS on a Windows system
•Using UEFI capsule update on an Ubuntu system
•Dell Command | Congure (DCC)
•Edge Device Manager (EDM)
Using the USB invocation script
The Edge Gateway 3000 Series come in headless congurations—that is, congurations without any video output. Certain basic
system administration tasks traditionally accomplished by the BIOS Setup program are not possible without video. Hence, to perform
these system administration tasks, Edge Gateways contain a facility for running an invocation script of BIOS commands from a USB
ash drive.
64
For more information about USB invocation script, see the Edge Gateway USB script utility User's Guide at www.dell.com/support/
home/us/en/19/product-support/product/dell-edge-gateway-3000-series/drivers/.
Flashing the BIOS from a USB ash drive
Prerequisites
• BIOS le. Download the le from www.dell.com/support.
• A blank USB 2.0 or 3.0 USB ash drive with at least 4 GB of storage space.
Follow these steps to update the BIOS:
1. Power o the Edge Gateway.
2. Copy the BIOS update le to a USB ash drive.
3. Insert the USB ash drive in one of the available USB ports on the Edge Gateway.
4. Power on the Edge Gateway.
5. Press F12 when the system is starting up to enter the one-time boot screen.
6. On the one-time boot screen, choose Flash the BIOS.
7. In the next screen, select the BIOS le on the USB ash drive.
8. Start the ash process.
Updating the BIOS on a Windows system
Follow these steps to update the BIOS:
1. After connecting to the Edge Gateway.
NOTE: Connect and login to the Edge Gateway with one these options:
•Remote system conguration
•Static IP system conguration (only for Edge Gateway 3002 and 3003)
2. Go to www.dell.com/support.
3. Click Product support, enter the Service Tag of your system, and then click Submit.
NOTE: If you do not have the Service Tag, use the auto-detect feature or manually browse to your system model.
4. Click Drivers & downloads.
5. Select the operating system installed on your system.
6. Scroll down the page and expand BIOS.
7. Click Download to download the latest version of the BIOS for your system.
8. After the download is complete, navigate to the folder where you saved the BIOS le.
9. Double-click the BIOS update le icon and follow the instructions on the screen.
Using UEFI capsule update on an Ubuntu system
The fwupgmgr tool or commands are used to update the UEFI BIOS on the system. The UEFI BIOS for this platform is released
through online Linux Vendor File System (LVFS) based methods
Dell recommends that you enable the UEFI Capsule update by default so that it is running in the background to keep the system
BIOS up to date.
NOTE: For more information about fwupd commands, see www.fwupd.org/users.
Without an internet connection
1. Download the latest .cab le from secure-lvfs.rhcloud.com/lvfs/devicelist.
2. Check the current BIOS details.
$ sudo uefi-fw-tools.fwupdmgr get-devices
65
3. Copy the rmware.cab le to /root/snap/ue-fw-tools/common/ folder.
$ sudo cp firmware.cab /root/snap/uefi-fw-tools/common/
4. Check the details of the BIOS from the .cab le.
$ sudo uefi-fw-tools.fwupdmgr get-details [Full path of firmware.cab]
5. Apply the update.
$ sudo uefi-fw-tools.fwupdmgr install [Full path of firmware.cab] -v
6. Restart the system.
$ sudo reboot
With an internet connection
1. Connect and login to the Edge Gateway.
NOTE: Connect and login to the Edge Gateway with one these options:
•Remote system conguration (only for Edge Gateway 3001 and 3002)
•Static IP conguration (only for Edge Gateway 3002 and 3003)
2. Check the current BIOS details.
$sudo uefi-fw-tools.fwupdmgr get-devices
3. Check if the update is available from LVFS service.
$sudo uefi-fw-tools.fwupdmgr refresh
4. Download the BIOS from the www.dell.com/support.
$sudo uefi-fw-tools.fwupdmgr get-updates
5. Apply the update.
$sudo uefi-fw-tools.fwupdmgr update -v
6. Restart the system.
$ sudo reboot
Dell Command | Congure (DCC)
Use DCC to update and congure the BIOS settings.
For more information on how to use DCC, see the DCC Installation Guide and User's Guide at www.dell.com/
dellclientcommandsuitemanuals.
For more information about BIOS settings on the Edge Gateway, see Default BIOS settings.
Edge Device Manager (EDM)
BIOS can be updated remotely through the EDM console connected to a remote system.
For more information about EDM, see www.dell.com/support/home/us/en/19/product-support/product/wyse-cloud-client-
manager/research.
66
Default BIOS settings
System conguration (BIOS level 1)
Table 17. System conguration (BIOS level 1)
BIOS level 2 BIOS level 3 Item Default value
Integrated NIC Integrated NIC Enable UEFI Network Stack
[Enable/Disable]
Enabled
[Disabled, Enabled, Enabled w/
PXE]
Enabled w/PXE
Integrated NIC 2 [Disabled, Enabled] Enabled
USB Conguration USB Conguration Enable Boot Support [Enable/
Disable]
Enabled
Enable USB 3.0 Controller
[Enable/Disable]
Enabled
Enable USB Port1 [Enable/
Disable]
Enabled
Enable USB Port2 [Enable/
Disable]
Enabled
Miscellaneous Devices Enable WWAN [Enable/
Disable]
Enabled
Enable WLAN/Bluetooth
[Enable/Disable]
Enabled
Enable CANBus [Enable/
Disable]
Enabled
Enable ZigBee [Enable/Disable] Enabled
Enable Dedicated GPS Radio
[Enable/Disable]
Enabled
Enable MEMs Sensor [Enable/
Disable]
Enabled
Watchdog Timer Support Watchdog Timer Support Enable Watchdog Timer
[Enable/Disable]
Disabled
Security (BIOS level 1)
Table 18. Security (BIOS level 1)
BIOS level 2 BIOS level 3 Item Default value
Admin Password Admin Password Enter the old password Not Set
Enter the new password Not applicable
67
BIOS level 2 BIOS level 3 Item Default value
Conrm new password Not applicable
System Password System Password Enter the old password Not Set
Enter the new password Not applicable
Conrm new password Not applicable
Strong Password Strong Password Enable Strong Password
[Enable/Disable]
Disabled
Password Conguration Password Conguration Admin Password Min 4
Admin Password Max 32
Password Bypass Password Bypass [Disabled/Reboot Bypass] Disabled
Password Change Password Change Allow Non-Admin Password
Changes [Enable/Disable]
Enabled
UEFI Capsule Firmware
Updates
UEFI Capsule Firmware
Updates
Enable UEFI Capsule Firmware
Updates [Enable/Disable]
Enabled
TPM 2.0 Security TPM 2.0 Security TPM 2.0 Security [Enable/
Disable]
Enabled
TPM On [Enable/Disable] Enabled
PPI Bypass for Enable
Commands [Enable/Disable]
Disabled
PPI Bypass for Disable
Commands [Enable/Disable]
Disabled
Attestation Enable [Enable/
Disable]
Enabled
Key Storage Enable [Enable/
Disable]
Enabled
SHA-256 [Enable/Disable] Enabled
Clear [Enable/Disable] Disabled
Computrace(R) Computrace(R) Deactivate/Disable/Activate Deactivate
Chassis Intrusion Chassis Intrusion [Disable/Enable/On-Silent] Disable
CPU XD Support CPU XD Support Enable CPU XD Support
[Enable/Disable]
Enabled
Admin Setup Lockout Admin Setup Lockout Enable Admin Setup Lockout
[Enable/Disable]
Disabled
68
Secure boot (BIOS level 1)
Table 19. Secure boot (BIOS level 1)
BIOS level 2 BIOS level 3 Item Default value
Secure Boot Enable Secure Boot Enable [Enable/Disable] Disabled
Expert Key Management Expert Key Management Enable Custom Mode [Enable/
Disable]
Disabled
Custom Mode Key
Management {PK/KEK/db/
dbx}
PK
Performance (BIOS level 1)
Table 20. Performance (BIOS level 1)
BIOS level 2 BIOS level 3 Item Default value
Inter SpeedStep Enable Intel SpeedStep
[Enable/Disable]
Enabled
C-States Control C-States Control C-states [Enable/Disable] Enabled
Limit CPUID Value Limit CPUID Value Enable CPUID Limit [Enable/
Disable]
Disabled
Power management (BIOS level 1)
Table 21. Power management (BIOS level 1)
BIOS level 2 BIOS level 3 Item Default value
Auto On Time Auto On Time Time Selection: [HH:MM A/P]
Auto On Time (if Wake Period
=0)
12:00AM
Value Selection: [0-254] Auto-
Wake Period (0-254 minutes)
000
Day Selection: [Disabled/Every
Day/Weekdays/Select Days]
Disabled
Under [Select Days] when
enabled [Sunday/Monday…/
Saturday]
Not applicable
Wake on LAN/WLAN Wake on LAN/WLAN [Disabled/LAN Only/WLAN
only/LAN or WLAN]
Disabled
69
POST behavior (BIOS level 1)
Table 22. POST behavior (BIOS level 1)
BIOS level 2 BIOS level 3 Item Default value
Numlock LED Numlock LED Enable Numlock LED [Enable/
Disable]
Enabled
Keyboard Errors Keyboard Errors Enable Keyboard Error
Detection [Enable/Disable]
Enabled
Fastboot Fastboot [Minimal/Thorough/Auto] Thorough
Extend BIOS POST Time Extend BIOS POST Time [0 seconds/5 seconds/10
seconds]
0 seconds
Warnings and Errors Warnings and Errors [Prompt on Warnings and
Errors/Continue on Warnings/
Continue on Warnings and
Errors]
Prompt on Warnings and Errors
Virtualization support (BIOS level 1)
Table 23. Virtualization support (BIOS level 1)
BIOS level 2 BIOS level 3 Item Default value
Virtualization Virtualization Enable Intel Virtualization
Technology [Enable/Disable]
Enabled
Maintenance (BIOS level 1)
Table 24. Maintenance (BIOS level 1)
BIOS level 2 BIOS level 3 Item Default value
Service Tag Service Tag <System Service Tag>, text
entry capability when blank
Not applicable
Asset Tag Asset Tag <System Asset Tag>, text
entry capability
Not applicable
SERR Messages SERR Messages Enable SERR Messages
[Enable/Disable]
Enabled
BIOS Downgrade BIOS Downgrade Allow BIOS Downgrade
[Enable/Disable]
Enabled
Data Wipe Data Wipe Wipe on Next Boot [Enable/
Disable]
Disabled
BIOS Recovery BIOS Recovery BIOS Recovery from Hard
Drive [Enable/Disable]
Enabled
70
System logs (BIOS level 1)
Table 25. System logs (BIOS level 1)
BIOS level 2 BIOS level 3 Item Default value
BIOS Events BIOS Events List of BIOS events with "Clear
Log" button to clear the log
Not applicable
71
7
References
In addition to the Installation and Operation Manual, you can see the following documents available at www.dell.com/support/
manuals.
•Dell Edge Gateway Specications
•Dell Edge Gateway Service Manual
•Dell SupportAssist For Dell OpenManage Essentials Quick Start Guide
•Dell Command | Congure User's Guide
•Dell Command | Congure Reference Guide
•Dell Command | Monitor User's Guide
•Dell Command | PowerShell Provider User's Guide
For more information on using Dell Data Protection | Encryption see the documentation for the software at www.dell.com/
support/manuals.
72
8
Appendix
Antenna specications
The Edge Gateway is a professionally installed equipment. The Radio Frequency output power does not exceed the maximum limit
allowed in the country of operation.
CAUTION: Unauthorized antennas, modications, or attachments may damage the device and potentially violate
international regulations.
NOTE: Use only the supplied or an approved replacement antenna.
NOTE: Modications to the device or use of unauthorized antennas not expressly approved by Dell is the sole
responsibility of the user or congurator or operator to reassess the equipment in accordance to all applicable
international Safety, EMC, and RF standards.
The Dell authorized antenna specications are as follows:
• Mobile Broadband
– Main: Dipole
– LTE Auxiliary: PIFA
• GPS/WiFi/Zigbee: Monopole
The following tables provide the gain specications for dierent antenna positions.
Table 26. Mobile broadband main antenna maximum gain (dBi)
Antenna position—Bent Antenna position—Straight
Frequency (MHz) 3G (dBi) 4G (dBi) 3G (dBi) 4G (dBi)
704~806 Not applicable 2.6 Not applicable 2.9
824~894 1.2 1.6 2.8 2.6
880~960 0.9 1.6 2.0 1.9
1710~1880 2.4 3.8 1.7 3.0
1850~1990 3.1 3.8 3.3 3.2
1920~2170 3.4 3.9 3.3 3.2
73
Table 27. Mobile broadband auxiliary antenna maximum gain (dBi)
Antenna position—Bent Antenna position—Straight
Frequency (MHz) 4G (dBi) 4G (dBi)
704~806 0.2 1.9
824~894 –0.8 –0.1
880~960 –0.6 –2.5
1710~1880 4.2 2.0
1850~1990 5.4 3.2
1920~2170 5.4 3.2
Table 28. WiFi/GPS antenna maximum gain (dBi)
Antenna position—Bent Antenna position—Straight
Frequency (MHz) GPS (dBi) WLAN (dBi) GPS (dBi) WLAN (dBi)
1561~1602 3.9 Not applicable 3.4 Not applicable
2400~2500 Not applicable 2.7 Not applicable 1.3
Table 29. ZigBee antenna maximum gain (dBi)
Antenna position—Bent Antenna position—Straight
Frequency (MHz) ZigBee (dBi) ZigBee (dBi)
2400~2500 0.4 1.7
De-mounting from DIN-rail bracket
1. Pull the Edge Gateway down to release from DIN-rail bracket.
2. Lift the Edge Gateway bracket o the DIN rail.
74
Connecting to the Edge Gateway
Windows 10 IoT Enterprise LTSB 2016
Boot up and login – Remote system conguration
NOTE: Your computer must be on the same subnet as the Edge Gateway.
1. Connect a network cable from Ethernet port one on the Edge Gateway to a DHCP-enabled network or router that provides IP
addresses.
NOTE: The rst-time boot to Windows takes about 5 minutes for system conguration. Subsequent boot-ups take
about 50 seconds.
2. Using the MAC address provided on the front cover of the Edge Gateway, obtain the IP address through your network’s DHCP
server or through a network analyzer.
3. On the Windows computer, search for Remote Desktop Connection and launch the application.
4. Log in using the IP address.
NOTE: Ignore any certication errors when connecting to your Edge Gateway.
Boot up and login—Static IP system conguration
NOTE: To help set up the Edge Gateway remotely, the static IP address of Ethernet port two on the Edge Gateway is set
to these values at the factory:
• IP address: 192.168.2.1
• Subnet mask: 255.255.255.0
• DHCP server: Not applicable
You can connect your Edge Gateway to a Windows computer that is on the same subnet using a crossover cable.
1. On the Windows computer, search for View network connections in the control panel.
2. In the list of network devices displayed, right-click the Ethernet adaptor that you want to use to connect to the Edge Gateway,
then click Properties.
3. On the Networking tab, click Internet Protocol Version 4 (TCP/IPv4) → Properties.
4. Select Use the following IP address, then enter 192.168.2.x (where x represents the last digit of the IP address, for
example, 192.168.2.2).
NOTE: Do not set the IPv4 address to the same IP address as the Edge Gateway. Use an IP address between
192.168.2.2 to 192.168.2.254.
5. Enter the subnet mask 255.255.255.0 , then click OK.
6. Secure a crossover network cable between Ethernet port two on the Edge Gateway and the congured Ethernet port on the
computer.
7. On the Windows computer, launch Remote Desktop Connection.
8. Connect to the Edge Gateway using the IP address 192.168.2.1. The default username and password are both admin.
Ubuntu Core 16
Boot up and log in – Direct system conguration
1. Power on the Edge Gateway. The system sets up the operating system automatically and restarts multiple times to apply all the
congurations. The system takes approximately one minute to boot to the operating system.
2. When prompted, log in using the default credentials. The default user name and password are both admin. The default
computer name is the service tag.
75
For example;
Ubuntu Core 16 on 127.0.0.1 (tty1)
localhost login: admin
Password: admin
Boot up and log in – Static IP system conguration
This allows you to connect your Edge Gateway through a host computer, which must be on the same subnet.
NOTE: The static IP address of Ethernet port two on the Edge Gateway is set to these values at the factory:
• IP address: 192.168.2.1
• Subnet mask: 255.255.255.0
• DHCP server: Not applicable
1. On the host computer, congure the Ethernet adaptor that is connected to the Edge Gateway with a static IPv4 address under
the same subnet. Set the IPv4 address to 192.168.2.x (where x represents the last digit of the IP address, for example,
192.168.2.2).
NOTE: Do not set the IPv4 address to the same IP address as the Edge Gateway. Use an IP address between
192.168.2.2 to 192.168.2.254.
2. Set the subnet mask to 255.255.255.0.
76
9
Contacting Dell
To contact Dell for sales, technical assistance, or customer service issues:
1. Go to www.dell.com/contactdell.
2. Verify your country or region in the drop-down list at the bottom of the page.
3. Select the appropriate service or support link based on your requirement or choose the method of contacting Dell that is
convenient for you.
Dell provides several online and telephone-based support and service options. Availability varies by country and product, and
some services may not be available in your area.
NOTE: If you do not have an active internet connection, you can nd the contact information on your purchase
invoice, packing slip, bill, or Dell product catalog.
77