Root RGW2400-OD Direct Sequence Spread Spectrum Transceiver User Manual 1 4 1E 2 1 Wiya comments
Root Inc Direct Sequence Spread Spectrum Transceiver 1 4 1E 2 1 Wiya comments
Root >
Contents
- 1. User Manual
- 2. Program manual
- 3. US power limitation
Program manual
Z0105001-L00-01
RGW series
Setup manual
For Version 1.4.1
ROOT Inc.

1. Setup Method
1.1 Connections
First, it is required to login in order to set up this unit. There are two
methods to login; one is through serial line, and two, through telnet or Secure Shell
(SSH) from a host on LAN.
When setting up with serial line, we suggest using terminal software such as
Hyperterminal for personal computers.
Setup configurations for terminal software are as follows:
Data Transfer Rate: 19200 bps
Character Bit Length: 8
Parity Check: None
Stop Bit Length: 1
Flow Control: RGW 2400/OD - hardware flowßIsn’t it “None”?, as Japanese manual
says
To connect with SSH, prior setup by serial line or telnet is required. Refer
to "Generating Host key of SSH" (Section 1.7.50).
1.2 Setup
There are two methods for setup:
One is to use command-line shell by command input from console; the other is
to directly rewrite configuration file from internal OS shell.
Setup through internal OS shell requires knowledge of both OS and network.
Please contact us regarding specific setup method.
1.3 User Mode and Privileged Mode
The command-line shell has two modes which are privileged mode and user mode.
Mode Description Prompt
Privileged Mode
A mode that can execute all commands "$"
User Mode
A mode that can execute only basic commands and display
commands
">"
1.4 Setting by Command Line Shell
A login prompt is displayed when connected with telnet:
login:
Enter user name "admin":
login: admin<CR>
Proceed to enter password:
Password:xxxxxxxx<CR> (Note: Entered password is not displayed. See
Section 3 for factory default user mode password setting.)
When login is accomplished, prompt > is displayed.
When changing the setup, it is required to move to privileged mode.
To move to privileged mode, enter command:
>administrator<CR>
Proceed to enter password for privileged mode:
password:xxxxxxxx<CR> (Note: Entered password is not displayed. See
Section 3 for factory default privileged mode password setting.)
Prompt $ is displayed.
To connect with SSH, please refer to "Generating Host key of SSH" (Section
1.7.50).

1.4.1 List of Command Line Shell Functions
Function Description
Supplement to
Command
By pressing [TAB] key, command string is inserted to the
supplemental part possible
Help on Commands
By pressing [?] key, displays list of available command or
description of each command.
Example:
$ip?
*ip address
*ip route add
*ip route delete
Since no command is formed in ip, commands starting with
ip are displayed.
$ ip address ?
usage: ip address"Interface Ipaddress Netmask"
e.g. : $ ip address ep0 192.168.0.100 255.255.255.0
Since the command "ip address" is unique, usage and
examples are displayed.
Editing Command Line
This function supports editing of command line.
The key bind of each is as follows:
Key Description
Back Space Deletes one character before cursor
Ctrl-A Moves cursor to the head of command line
Ctrl-E Moves cursor to the end of command line
Ctrl-D Deletes the character on cursor
Ctrl-U Deletes the entire command line
Ctrl-F (->) Moves cursor to the right
Ctrl-B (<-) Moves cursor to the left
Ctrl-K Deletes the character after cursor
Record of
Entered
Commands
Retains records of inputted command
Key Description
Ctrl-P Calls previous recorded entry
Ctrl-N Calls next recorded entry

1.5 List of Commands
Setup Item Command
Setting password passwd
Setting host name hostname
Setting IP address ip address
Setting static route ip route add
Deleting static route ip route delete
Setting ICMP Redirect send out ip icmp redirect
Setting wireless frequency wireless channel
Setting wireless transmission rate wireless tx rate
Setting wireless WEP function wireless wep encryption
Setting wireless WEP key number wireless wep key use
Setting wireless WEP key value wireless wep key value
Setting wireless port type wireless port
Setting wireless network name wireless network
Setting wireless station name wireless station
Switching infrastructure mode to Access
Point
wireless BSS AP mode
Setting wireless SSID wireless ssid
Adding wireless MAC address filter wireless macfilter add
Deleting wireless MAC address filter wireless macfilter delete
Setting static ARP entry arp add
Deleting ARP entry arp delete
Setting to choose the use of RIP rip
Setting to choose to send static route with
rip
rip static-supply
Setting RIP action rip action
Setting RIP version rip version
Setting to choose the use of filter filter
Setting Filter filter add
Deleting Filter filter delete
Setting to choose the use of NAT nat
Setting map action of NAT nat add map
Setting bimap action of nat nat add bimap

Setting map-block action of nat nat add map-block
Setting rdr action of nat nat add rdr
Deleting nat nat delete
Setting to choose the use of DHCP server
dhcp
Setting IP address to be distributed by
DHCP server
dhcp pool
Setting validity period of IP address to
be distributed by DHCP server
dhcp expire
Setting DNS server to be distributed by
DHCP server
dhcp dns add
Deleting DNS server to be distributed by
DHCP server
dhcp dns delete
Setting domain name to be distributed by
DHCP server
dhcp domain
Setting default route to be distributed
by
DHCP server
dhcp defaultroute
Setting DHCP relay agent dhcp relay
Setting to choose the use of SNMP function
snmp
Setting SNMP community name snmp community
Setting location of SNMP snmp location
Setting contact of SNMP snmp contact
Setting access of SNMP snmp access
Setting TRAP of SNMP snmp trap
Setting of syslog syslog
Setting of host to transfer syslog syslog host
Setting facility to transfer syslog syslog add
Deleting facility to transfer syslog syslog delete
Generating SSH host key ssh keygen
Setting SSH authenticate method ssh authentication
Downloading SSH public key ssh keyget
Setting telnet access access telnet
Setting monitor access access monitor
Setting ssh access access ssh
Save save
Loading setting contents load

Cold start cold start
Updating firmware update
Setting date and time date
Displaying software version show version
Clearing ARP cache clear arp
Confirming saved contents show setup
Displaying host name show hostname
Displaying IP address show ip address
Displaying static route show ip route
Displaying date and time show date
Displaying lease status of DHCP server show dhcp
Displaying filtering status show filtering
Displaying status of NAT show nat
Displaying status of SSH show ssh
Displaying ARP cache table show arp
Displaying elapsed time from start show uptime
Displaying wireless signal strength show wireless signal strength
Displaying wireless setting show wireless status
Displaying status of MAC address filter
show wireless macfilter
Displa
ying wireless infrastructure mode
of Access Point
show wireless ap
Displaying SNMP setting show snmp
Restart restart
Ping ping
Log out quit
Moving to privileged mode administrator
Displaying command help help
Referring to command history history
Close exit

1.6 Typographical Conventions
Typographical conventions used in the command list are shown below.
Convention Description Example(s)
Courier new,
regular style
Command ip address
italics Indicates a variable which must be replaced
with a real value.
ip address Interface IPaddress
Netmask
square brackets [ ] The argument within the brackets may be
omitted. Do not enter the brackets in the
command line.
ssh keygen version [overwrite]
Quotation marks " " Enclosed expression must be entered
exactly as shown (hard coded). Do not enter
the quotation marks in the command line.
"all"
| bar (exclusive OR) You must enter one, and only one, of the
items separated by the bar. Do not enter the
bar in the command line.
ne0| wi0| lo0
Braces { } List of arguments from which you must
choose an item in syntax descriptions, or an
enclosed phrase. Do not enter the braces in
the command line.
Port { = | ! | <= | >= } portNo

1.7 Explanation of Each Command
Each item is set without the need to restart.
1.7.1 Setting Password
Input format passwd user
Parameter user
- user : Password of user mode
- administrator : Password of privileged mode
Description Sets password
Note Password for privilege mode executes in only the privilege mode.
To discontinue entry, enter Ctrl-
D. Only alphabet characters and
numerals can be entered in character string. Number of characters
is up to 8 characters. To refer or to change the setting will be
unable due to loss of password. Also, method to initialize th
e
password (cold start) will be unable due to loss of password.
1.7.2 Setting Host Name
Input format hostname hostname
Parameter hostname
- Hostname with domain name
Description Sets hostname
Note Executes only in privileged mode.
Example $ hostname mypc.mydomain.co.jp
1.7.3 Setting IP Address
Input format ip address Interface IPaddress Netmask
Parameter -Interface
Interface name Ethernet: ne0 Wireless: wi0
-IP address
ip address
-Netmask
netmask

Description Sets IP address to specified interface.
Example $ip address wi0 192.168.0.100 255.255.255.0
1.7.4 Setting Static Route
Input format ip route add Destination Netmask Gateway
Parameter Destination
- Destination IP address
Netmask
- Destination netmask
Gateway
- IP address of gateway
Description Sets static route.
When Netmask is omitted, host route is set.
Note Executes only in privileged mode.
Examples $ ip route add 10.0.0.0 255.0.0.0 192.168.0.1
$ ip route add default 192.168.0.254 (In case of default mode)
$ ip route add 1 92.168.32.3 192.168.33.2 (In case of host route)
1.7.5 Deleting Static Route
Input format ip route delete Destination Netmask Gateway
Parameter Destination
- Destination IP address
Netmask
-Destination netmask
Gateway
- IP address of gateway
Description Deletes static route
Note Executes only in privilege mode.
Examples $ ip route delete 10.10.0.0 255.255.0.0
$ ip route delete default (In case of default route)
$ ip route delete 192.168.32.3 (In case of host route)
1.7.6 Setting ICMP Redirect Send Out
Input format ip icmp redirect flags
Parameter flags

- enable In use
- disable Not in use
Description
Chooses use of ICMP Redirect send out
function or not.
Example $ icmp redirect enable
1.7.7 Setting Wireless Frequency
Input format wireless channel Channel
Parameter Channel
Description Sets wireless frequency
Channel
Frequency(MHz)
Channel
Frequency(MHz)
1
2412
8
2447
2
2417
9
2452
3
2422
10
2457
4
2427
11
2462
5
2432
12
2467
6
2437
13
2472
7
2442
14
2484
Note Executes only in privileged mode.
Example $ wireless channel 3
1.7.8 Setting Wireless Transmission Rate
Input format wireless txrate Rate
Parameter Rate
-Wireless transmission rate 1 – 15
Value
Rate Value
Rate
1 1Mbps fixed 9 11 -> 1Mbps
2 2Mbps fixed 10 11 -> 2Mbps
3 2 -> 1Mbps 11 11 -> 2 -> 1Mbps
4 5.5Mbps fixed 12 11 -> 5.5Mbps
5 5.5 -> 1Mbps 13 11 -> 5.5 -> 1Mbps
6 5.5 -> 2Mbps 14 11 -> 5.5 -> 2Mbps
7 5.5 -> 2 ->1Mbps 15 11 -> 5.5 ->2 -> 1Mbps
8 11Mbps fixed

Description Sets wireless transmission rate
Note Executes only in privileged mode
in case of infrastructure mode
on Access Point, it is not possib
le to set wireless transmission
rate.
Example $ wireless txrate 8
1.7.9 Setting Wireless WEP Function
Input format wireless wep encryption flag
Parameter Flag
- enable : In use
- disable : Not in use
Description Chooses the use of WEP in case of packet transmission.
Note
Executes only in privileged mode. In case setting of
transmission rate is 5.5M or
11Mbps, actual transmission rate
may be lowered when WEP is used.
Example $ wireless wep encryption enable
1.7.10 Setting Wireless WEP Key Number
Input format wireless wep key use flag
Parameter flag
- flag 1 - 4
Description Sets WEP key number to be used in transmission.
Note Executes only in privileged mode
Example $ wireless wep key use 1
1.7.11 Setting WEP Key Value
Input format wireless wep key value flag value
Parameter flag
- key number (1 - 4)
value
-
ASCII (5 characters), or HEX (10 character hexadecimal number
starting with 0x.)
Description Sets WEP key value.
Note Key length is automatically decided according to length
of
value.

Example $ wireless wep key value My Keyß
the “key number” is missing
and 2 ASCII wording (“My” and “Key”). Is this example correct?
1.7.12 Setting Wireless Port Type
Input format wireless port value
Parameter Value
-1: BSS mode (client station in infrastructure mode)
-3: Ad-hoc mode (factory set value)
Description Sets RGW to act as a c lient station in infrastructure (BSS)
or ad hoc mode.
Note Executes only in privileged mode.
This co
mmand allows the RGW to function as a wireless client
station in an 802.11b basic service set (BSS).
To set up the RGW as an Access Point, use the
wireless BSS
AP mode command (section 1.7.15). The wireless port
command
cannot be used while wireless BSS AP mode is enabled.
Example $ wireless port 3
1.7.13 Setting Wireless Network Name
Input format wireless network value
Parameter value
- Network name (SSID) in BSS mode (max. 30 characters)
Description Sets network name during BSS mode.
Notes Executes only in privileged mode.
Enables communication with an
Access Point having the same
network name (SSID) when RGW i
s functioning as a wireless
client station in infrastructure mode.
To set the network name (SSID) when
RGW is functioning as
an Access Point, use the wireless ssid command
(section
1.7.16) instead.

Example $ wireless network NetBSD_IBSS
1.7.14 Setting Wireless Station
Input format wireless station value
Parameter Value
- Station name of BSS mode (max. 30 characters)
Description Sets station name during BSS mode
Notes Executes only in privileged mode.
Sets a distinguishing name and is valid in wireless port
1 during
BSS mode.
Some monitoring programs poll the station name of each
wireless client in the BSS for identification purposes.
Example $ wireless station NetBSD_Wave LAN/IEEE_node
1.7.15 Switching to Wireless Infrastructure Mode of Access Point
Input format wireless BSS AP mode flag
Parameter flag
- enable: Set infrastructure mode of Access Point
- disable: Delete infrastructure mode of Access Point
Description Sets RGW to function as the Access Point in an 802.11b BSS.
Notes Executes only in privileged mode.
Access Point is enabled [disabled] after the following commands
are entered:
1. wireless BSS AP mode enable [disable]
2. save
3. restart
4. save
When flag is set to disable, RGW operates in ad-hoc mode.
Important note: The SSID cannot be modified after
wireless BSS
AP mode is enabled. SSID parameter should be set using
wireless
ssid command (section 1.7.16) prior to
enabling wireless BSS
AP mode.
Example $ wireless BSS AP mode enable
1.7.16 Setting Wireless SSID

Input format wireless ssid value
Parameter value
-
SSID of infrastructure mode (max. 30
characters)
Description
Specifies SSID during infrastructure mode
of Access Point.
Notes
Executes only in privileged mode.
Enables communication with station of
BSS
mode having same network name. T
his
command can only be used when Access Point
mode of infrastructure is in operation.
Example $ wireless ssid NetBSD_IBSS
1.7.17 MAC Address Filter
Input format wireless macfilter add param
Parameter Param
- Specify MAC address
Description Sets MAC address that permits wireless LAN communication.
Notes Executes only in privileged mode.
Permits communication with all wireless terminal,
when MAC
address is not set.
Maximum number of entries of MAC address filter is 50.
Example $wireless macfilter add 11:22:33:44:55:66
1.7.18 Deleting MAC Address Filter
Input format wireless macfilter delete param
Parameter param
- Specify MAC address
Description Deletes MAC address that registered into MAC address filter.
Note Executes only in privileged mode.
Permits communication with all wireless
terminal when MAC
address is not set.
Example $ wireless macfilter delete 11:22:33:44:55:66

1.7.19 Setting Use or Non Use of RIP
Input format rip flag
Parameter flag
- enable : use
- disable : Not in use
Description Chooses to use RIP or not.
Note Executes only in privileged mode
Example $ rip enable
1.7.20 Setting to Announce Static Route in RIP
Input format rip static-supply flag
Parameter flag
- enable : Announce static route
- disable : Do not Announce static route
Description Sets to announce static route in RIP
Note Executes only in privileged mode.
Example $ rip static-supply enable
1.7.21 Setting Rip Action
Input format rip action interface action
Parameter interface
- interface name
action
- supply : Send and receive route
- listen : Receives route only

- disable : Neither send nor receive route
Description Sets RIP action
Note Executes only in privileged mode.
Example rip action wi0 supply
1.7.22 Setting RIP Version
Input format rip version interface version
Parameter interface
-interface name
version
- ripv2:Uses RIPv2 (multicast)
- ripv12:Uses RIPv2 (multicast ) and RIPv1 (broadcast).
- ripv1:Uses RIPv1 (broadcast).
Description Sets RIP version.
Notes Executes only in privileged mode.
Example $ rip version wi0 ripv2
1.7.23 Setting to Use Filter
Input format Filter flag
Parameter flag
- enable : In use
- disable : Not in use
Description Chooses to use IP filter or not
Note Executes only in privileged mode.
Example $ filter enable
1.7.24 Setting IP Filter
Input format
filter add number action inout [ log level facility.level
][quick] [on
interface] [proto proto] [ from [!] address [port] to [!] address
[port] ] [flags] [with] [keep] [group]
Parameter
number
-0-655335 : Filter No.
action

- block: puts mark on the packet to be cancelled.
- pass: Puts mark on the packet to be passed.
inout
-
in: A rule for a packet which enters from interface and enters
RGW.
- out: A rule for a packet which exits from RGW to interface.
log
- log: Specifies “log” keyword to log IP filtering
-
level: Specifies syslog facility and level preceded by “level”
keyword
- facility: facility of syslog (auth, user, daemon)
-
level: level of syslog (info, notice, warning, err...)
Transfer to host specified by syslog command mentioned in later
quick
- quick: adapts immediately to rule
on interface
- on ne0| wi0| lo0 : Specifies interface
proto
- tcp/udp | udp | tcp | icmp
address
- any | 1.2.3.4/24 format | 1.2.3.4 mask 255.255.255.0 format
port
-
port{= | ! | <|> | <= | > = | eq | ne | lt | gt | le | ge}
portNo
flags
- Combination of TCP flag, FSRPAU. Can
be specified during proto
tcp(F=FIN, S=SYN, R=RST, P=PUSH, A=ACK, U=URG)
with
- with ipopts : with IP option
- with short : extremely short packet
- with frag : fragmented packet
keep
-
keep state : implements filtering by keep state controlling
condition of session
group
- head N : makes new group N

- group N : sets rule in group N
Description Sets filtering for IP packet
Note Executes only in privileged mode.
Sorted according to filter No. and set in ascending order.
Example $ filter add 100
block out proto tcp from 100.100.0.0/16 to any port
= 80
1.7.25 Deleting IP Filter
Input format filter delete number
Parameter number
- 0-65535 : filter No.
Description Deletes filtering for IP packet
Note Executes only in privileged mode.
Example $ filter delete 100
1.7.26 Setting the Use of NAT
Input format nat flag
Parameter flag
- enable : Use
- disable : No use
Description Chooses use or no use of NAT.
Note Executes only in privileged mode.
NAT function in Ethernet side will be valid whe
n switched to
enable , factory set (wireless side: global and Ethernet side:
private).
Example $ nat enable
1.7.27 Setting map Action of NAT
Input format nat add map number interface address1 -> address2 [portmap Proto
ports| proxy port portname tag/protocol]
Parameter Number
- 0-255 : NAT No. (common at nat add * command)
interface
- name of interface
address1

- IP address on local side
- 1.2.3.4/xx format
address2
- IP address on global side
- 1.2.3.4/xx format
proto
- tcp/udp|udp|tcp
ports
-
auto|{lower limit of port No.}:{upper limit of port No.}
format
portname
- name of port (eg: ftp)
tag
- tag
protocol
- protocol
Description Sets map action of NAT
Notes Executes only in privileged mode.
Sorted according to nat No. common to nat setup and set
in ascending
order
Examples $ nat add map 10 ne0 10.0.0/8-
> 210.100.100.101/32 portmap tcp/udp
1025:65000
$ nat add map 15 ne0 10.0.0/8-> 0/32 proxy port ftp ftp/tcp
1.7.28 Setting bimap Action of NAT
Input format nat add bimap number interface address1 -> address2
Parameter number
- 0-255 : NAT No. (common at nat add command)
interface
- name of interface
address1
- IP address on local side
- 1.2.3.4/xx format
address2
- IP address on global side
- 1.2.3.4/xx format

Description Sets bimap action of NAT
Notes Executes only in privileged mode.
Sorted according to nat No. common to nat setup and set in
ascending order.
Example $ nat add bimap 3 ne 10.0.0.5/32 -> 210.100.100.101/32
1.7.29 Setting map-block Action of NAT
Input format nat add map-block number interface address1 -> address2
[ports
port]
Parameter
number
- 0-255 : NAT No.(common at nat add*command)
interface
- name of interface
address1
- IP address on local side
- 1.2.3.4/xx format
adderss2
- IP address on global side
- 1.2.3.4/xx format
port
- auto|port No.
Description Sets mapblock action of NAT
Note Executes only in privileged mode.
Sorted according to nat No. common to nat setup and set in ascending
order.
Example $ nat add map-block 2 ne 10.0.0.5/8 -
> 210.100.100.101/24 ports
auto

1.7.30 Setting rdr Action of NAT
Input format nat add rdr number interface address1 port port ->address2
port
port proto
Parameter
number
- 0-255 : NAT No. (common at nat add* command)
interface
- name of interface
address1
- IP address on local side
- 1.2.3.4/24 format
address2
- IP address on global side
port
- Port No.
proto
- tcp/udp|tcp|udp (default value: tcp)
Description Sets rdr action of NAT
Notes Executes only in privileged mode.
Sorted according to nat No. common to nat setup and set in
ascending order.
Example $ nat add rdr 5 ne0 10.0.0.5/32 port 7777 -
> 210.100.100.101 port
20
1.7.31 Deleting NAT
Input format nat delete number
Parameter number
- 0-255 : NAT No.
Description Deletes NAT entry
Note Executes only in privileged mode
Example $ nat delete 3
1.7.32 Setting to Choose the Use of DHCP server

Input format nat flag [interface]
Parameter flag
- enable : Use
- disable : Not in Use
interface
-
name of interface using DHCP server function. It assumes
ne0 when omitted. Not required during disable.
Description Chooses between use and no use of DHCP server function.
Notes Executes only in privileged mode.
Distribute IP address mu
st be in the interface network. Refer to
limitation for details.
Example $ dhcp enable
1.7.33 Setting IP Address Range to be Distributed through DHCP server
Input format dhcp pool ipaddress1 ipaddress2
Parameter
ipaddress 1
- Head of IP address
ipaddress2
- End of IP address
Description
Sets range of IP address to be distributed through
DHCP server.
Note Executes only in privileged mode.
Example $ dhcp pool 192.168.0.1 192.168.0.254
1.7.34 Setting Expiration of IP Address to be distributed through DHCP server
Input format dhcp expire period
Parameter
period
- Expiration of IP address (Second)
Description
Sets expiration of IP address to be distributed through DHCP
server.
Note Executes only in privileged mode.
Example $ dhcp expire 7200

1.7.35 Setting DNS Server to be distributed through DHCP server
Input format dhcp dns add ipaddress
Parameter ipaddress
* IP address of DNS server
Description Sets DNS server to be distributed through DHCP server.
Note Executes only in privileged mode. Maximum of 2 can be registered.
Example
$ dhcp dns add 210.100.100.101
1.7.36 Deleting DNS Server to be distributed through DHCP server
Input format dhcp dns delete ipaddress
Parameter ip address
-iP address of DNS server
Description Deletes DNS server to be distributed through DHCP server.
Note Executes only in privileged mode.
Example $ dhcp dns delete 210.100.100.101
1.7.37 Setting Domain Name to be distributed through DHCP server
Input format dhcp domain domainname
Parameter domainname
- Domain name
Description
Sets domain name to be distributed through DHCP server. When
domainname is omitted, domain name is not distributed.
Note Executes only in privileged mode.
Example $ dhcp domain root-hq.com
1.7.38 Setting Default Route to be distributed through DHCP server
Input format dhcp defaultroute [defaultroute]
Parameter defaultroute
-IP address of default route
Description Sets default route to be distributed through D
HCP server. When
defaultroute is omitted, default route is not distributed.
Note Executes only in privileged mode.
Example $ dhcp defaultroute 172.30.100.2

1.7.39 Setting DHCP Relay Agent
Input format dhcp relay flag
Parameter
flag
- IP address : IP address of DHCP server
- disable : Not in use
Description Sets DHCP relay agent.
Note Executes only in privileged mode.
Example $ dhcp relay 172.10.0.1
1.7.40 Setting to Choose the Use of SNMP Server Function
Input format snmp flag
Parameter
flag
- enable : Use
- disable : Not in use
Description Chooses use and no use of SNMP server.
Note Executes only in privileged mode.
Example $ snmp enable
1.7.41 Setting SNMP Community Name
Input format snmp community name
Parameter
name
- community name
Description Sets SNMP community name. Up to maximum of 31 characters.
Note Executes only in privileged mode.
Example $ snmp community secret
1.7.42 Setting Location of SNMP
Input format snmp location str
Parameter
str
- Character string
Description Sets location of SNMP. Up to maximum of 255 characters.
Note Executes only in privileged mode.

Example $ snmp location 1-17-8 Nishikata Bunkyo-ku Tokyo Japan
1.7.43 Setting Contact of SNMP
Input format snmp contact str
Parameter str
- Character string
Description Sets contact of SNMP. Up To maximum of 255 characters.
Note Executes only in privileged mode.
Example $ snmp contact Tarou Yamada <taro@root-hq.com>
1.7.44 Setting Access of SNMP
Input format snmp access [ipaddress|network]
Parameter ipaddress
-ip address | "all"
network
-network address with netmask
255.255.255.0
format
Description Specifies accessible host range to RGW with SNMP .
Notes Executes only in privileged mode.
Checking of IP filter is implemented prior to checking
the setting of this access.
Example $ snmp access 192.168.0.0 255.255.255.0
1.7.45 Setting SNMP TRAP
Input format snmp trap mode flag [community [port]]
Parameter mode
- v1|v2|inform
v1:snmp v1 v2:snmp v2
inform:NOTIFICATION
flag

- IP address : host of IP address sending the trap
- disable : not in use
community
name of community used for sending trap and
not required during
disable
port
- port No. (use 162 during omission) not required during disable
Description
Specifies type of trap and host sending snmp trap when restarted and/or
detected invalid access.
Note Executes only in privileged mode.
Example $ snmp trap v2 210.100.100.101 root
1.7.46 Setting to Choose the Use of syslog Function
Input format syslog flag
Parameter flag
- enable : use
- disable : not in use
Description Chooses use and no use of syslog function.
Note Executes only in privileged mode.
Example $ syslog enable
1.7.47 Setting Host to Transfer syslog
Input format syslog host ipaddress
Parameter ipaddress
- IP address : IP address of host to transfer syslog
Description Sets IP address of host to transfer syslog.
Note Executes only in privileged mode.
Example $ syslog host 172.10.0.1
1.7.48 Setting Facility to Transfer syslog
Input format syslog add facility level

Parameter facility
kern | user | auth | authpriv | syslog
| cron | ftp | uucp | local0-7 |
daemon |*
level
emerg | alert | crit | err | warning |
notice | info | debug | none | *
Description Sets facility and its level to transfer syslog.
Note Executes only in privileged mode.
Example $ syslog add * info
1.7.49 Deleting Facility to Transfer syslog
Input format syslog delete facility level
Parameter facility
kern | user | auth authpriv| syslog |
cron | ftp | uucp | local0-7|
daemon |*
level
emerg | alert | crit | err | warning |
notice | info | debug | none | *
Description Sets facility and its level to delete syslog.
Note Executes only in privileged mode.
Example $ syslog delete kern crit
1.7.50 Generating Host Key of SSH
Input format ssh keygen version [overwriteß
Isn’t it better to enclose it
with “ “? because it is hard coding]
Parameter version
- v1 : generate host key of SSHv1
- v2 : generate host key of SSHv2
- v12 : generate host key of both SSHv1 and SSHv2

overwrite
Specified when overwriting host key already generated
Description Generates host key of RGW
Notes Executes only in privileged mode.
It takes a while to complete this command. To specify v2 and
v12, Ver 1.4.0 and latter only can be used.
Example $ ssh keygen v1
1.7.51 Setting Authentication Method of SSH
Input format ssh authentication way
Parameter way
- passwd: password authentication is valid
- key: public key authentication is valid
-
both: both password and public key authentications
are valid
Description Specifies authentication method of SSH.
Notes Executes only in privileged mode. Factory set default: both.
Example $ ssh authentication key
1.7.52 Downloading Public Key of SSH
Input format ssh keyget version URL
Parameter version
- v1 : download public key of SSHv1
- v2 : download public key of SSHv2
URL
- URL with open key
Description Downloads public key to RGW.
Notes
An access will be valid with public key downloaded by this
command. Executes only in privileged mode. To specify v2, Ver
1.4.0 and later only can be used.

Example $ ssh keyget v1 http://192.168.0.12/~rgw/identity.pub
1.7.53 Switching Version of SSH
Input format
ssh version version
Parameter version
- v1: SSHv1
- v2: SSHv2
- v12: both
Description Switches Version of SSH
Notes An access will b
e valid with specified SSH version by
this command. Executes only in privileged mode. Ver
1.4.0 and later only can be used on this command.
Example $ ssh version v12
1.7.54 Setting telnet Access
Input format access telnet [ipaddress|network]
Parameter ipaddress
- IP address | "all"
network
- network address having netmask 255.255.255.0 format
Description Specifies host range possible to access to RGW with telnet.
Notes
Executes only in privileged mode. Checking IP filter is
implemented prior to checking setup access
Example
1.7.55 Setting http Access
Input format access http [ipaddress|network]
Parameter
Description
Notes
Example
éThis command explanation is missing.
1.7.56 Setting monitor Access

Input format access monitor [ipaddress|network]
Parameter ipaddress
- IP address | "all"
network
-
network address having netmask 255.255.255.0
format
Description
Specifies host range possible to access to RGW with
monitor.
Notes Executes only in privileged mode. Checking IP f
ilter is
implemented prior to checking setup access. The monitor
is an application which displays wireless condition of
RGW that operates on Windows. It can be downloaded from
ROOT Inc. home page.
Example
1.7.57 Setting SSH Access
Input format access ssh [ipaddress|network]
Parameter ipaddress
- IP address | "all"
network
- network address having netmask 255.255.255.0 format
Description Specifies host range possible to access to RGW with ssh.
Notes Executes only in privileged mode. Checking IP
filter is
implemented prior to checking setup access.
Example
1.7.58 Save
Input format save
Parameter None
Description Saves setup contents.
Notes
Executes only in privileged mode. Reflected on system file and
setup file is saved in command format.

1.7.59 Setting Static ARP
Input format arp add ipaddress macaddress
Parameter ipaddress
- IP address
macaddress
- MAC address
Description Sets entry of static ARP
Example $ arp add 10.0.0.1 11:22:33:44:55:66
1.7.60 Deleting ARP
Input format arp delete ipaddress
Parameter ipaddress
- IP address
Description Deletes ARP entry set to IP address.
Note Executes only in privileged mode.
Example $ arp delete 10.0.0.1
1.7.61 Loading Setup with tftp
Input format load tftp ipaddress file
Parameter ipaddress
-IP address | disable
file
-load specified file (not required during disable)
Description Loads contents of file.
Notes Executes only in privileged mode.
When save is implemented after specifying
tftp server with
this command, load of setup file with tftp is implemented
during restart. To get with tftp during start, implement
after setup of default route, and overwrite parameters that
were already set.
Example
1.7.62 Cold Start
Input format cold start

Parameter None
Description Returns equipment to factory default setting.
Note Executes only in privileged mode.
Restarts after returning to factory default setting.
1.7.63 Updating Firmware
Input format update url
Parameter url
- URL of file to be downloaded
Description Downloads file and update firmware.
Note Executes only in privileged mode.
Example
1.7.64 Setting Date and Time
Input format date yyyy/mm/dd HH:MM
Parameter yyyy
- Year
mm
- Month
dd
- Day
HH
- Hour
MM
- Minute
Description Sets date and time.
Note When this command is set, it is reflected on system.
Example $ date 2000/12/24 12:30
1.7.65 Restart
Input format restart
Parameter None
Description Restarts system.

Notes
Executes only in privileged mode. This function is possible by
reboot.
1.7.66 Clearing ARP Cache
Input format clear arp
Parameter None
Description Clears ARP cache table.
Note Executes only in privileged mode.
1.7.67 Displaying Host Name
Input format show hostname
Parameter None
Description Displays host name registered in system.
Note
1.7.68 Displaying IP Address
Input format show ip address
Parameter None
Description Displays IP address registered in system.
Note Displays IP address allocated to wireless and ethernet
1.7.69 Displaying Static Route
Input format show ip route
Parameter None
Description Displays static route registered in system.
Note Does not display route that is automaticall
y generated by kernel
(route to directly connected network etc.).
1.7.70 Displaying Lease Status of DHCP server
Input format show dhcp
Parameter None

Description Displays lease status of DHCP server
Note None
1.7.71 Displaying Filtering
Input format show filtering
Parameter None
Description
Displays status of filtering (Number of packet that matches
rule).
Note
Head number of each rule is number of packet that matches rule
and is not a filter number. To display filter number, use show
setup command.
1.7.72 Displaying ARP Cache Table
Input format show arp
Parameter None
Description Displays ARP cache table.
Note
1.7.73 Displaying Elapsed Time from Start
Input format show uptime
Parameter None
Description Displays elapsed time from start.
Note
1.7.74 Displaying Firmware Version
Input format show version
Parameter None
Description Displays this command line shell and information on OS version.
1.7.75 Displaying Date and Time

Input format show date
Parameter None
Description Displays present date and time.
1.7.76 Displaying Wireless Signal Strength
Input format Show wireless signal strength
Parameter None
Description Displays wireless signal strength.
Note
1.7.77 Displaying Wireless Setting
Input format Show wireless status
Parameter None
Description Displays wireless status
Note
This command is intended to display status of internal driver as
maintenance purpose. To confirm setting value use show setup
command.
1.7.78 Displaying Access Point Mode on Wireless Infrastructure
Input format show wireless AP
Parameter None
Description Displays Access Point mode on wireless infrastructure.
Note This command displays to confirm Access
Point mode on
infrastructure.
1.7.79 Displaying SNMP Setting
Input format show snmp
Parameter None
Description Displays SNMP setting.

Note
1.7.80 Displaying SSH Setting
Input format show ssh
Parameter None
Description Displays SSH status.
Note
1.7.81 Checking Contents of Setting
Input format show setup
Parameter None
Description Checks contents of setting.
1.7.82 Checking Saved Contents of Command Format
Input format show config
Parameter None
Description Checks saved contents of command format.
Note
1.7.83 ping
Input format ping Ipaddress
Parameter Ipaddress
- IP address of remote side
Description Issues ICMP Echo to IP address of remote side.
Note
1.7.84 Log Out
Input format quit or exit
Parameter None
Description Logs out from command line shell.

Note
1.7.85 Moving to Privileged Mode
Input format administrator
Parameter None
Description Moves to privileged mode.
Note
1.7.86 Displaying Command Help
Input format help command
Parameter None
Description Displays help of commands.
1.7.87 Referring to History
Input format history
Parameter None
Description Displays present history.
Note
Note
The command line shell can be implemented through serial line, telnet, or SSH, but
following message is displayed when multiple numbers of command line shells are
operated simultaneously.
WARNING: another administrator is still alive (Detected when command line shell is
already in operation)
ATTENTION: Two or more administrator are active now!!! (Displayed to all command line
shell in operation)
When a separate setting is implemented simultaneously a setting which can not be
anticipated may occur. In such case, it is recommended to implement minimum amount
of settings then restart.
The command line shell observes non-communication time when there is no input for
approximately 300 seconds, the session is shutdown automatically.
However, non-communication observation is not implemented during operation of each
command.
1.8 Limitations
The command line shell has following limitations:
1.8.1 DHCP
To start DHCP it is required to set each item of DHCP and press command
"$ dhcp enable."
1.8.2 Others
Please refer to "4. Tips and Hints for Setup."

3. Factory Default Settings
The settings when leaving our factory are as follows:
Data Settings Contents
User Mode user name "admin"
User Mode Password "admin"
Privileged Mode Password "admin"
Host Name rgw
IP Address and Netmask Ethernet Side: 172.30.100.2/24
Wireless Side: 10.12.1.2/24
Static Route None
Default Route 10.12.1.1
Access Control None
RIP Not Used
SNMP Used. No trap.
DHCP Not Used
IP Filter Not Used
MAC Address Filter Not Used
NAT Not Used
SYSLOG Not Used
Load Tftp Not Used
SSH: Version implemented SSHv1
SSH: Generating Host Key Not Generated
SSH: Public Key Download Not Set
SSH: Authentication Method Password Authentication/public key Authentication
Wireless Communication Mode Ad-Hoc Mode

4. Tips and Hints for Setting Up
A various knacks for setting up RGW are described in this chapter:
4.1 Wireless
4.1.1 Communication Mode
In wireless communication of RGW, there are 2 modes: Ad infrastructure.
The switching for these are implemented by using wireless setup of command line shell.
The factory default setting is in Ad-hoc, and to change to infrastructure mode an
Ad-hoc mode is implemented.
In order to make RGW to Access Point of infrastructure mode, it is implemented by
wireless BSS AP mode enable command from Ad-hoc mode. However, you must save & reboot
after that. After restart, it operates as Access Point of infrastructure mode, so
that make required settings, and save. This enables to keep the setting of RGW as
Access Point of infrastructure mode.
Following is summary of switch over to infrastructure mode:
-1. Various settings
-2. wireless BSS AP mode enable
-3. save ( store setting )
-4. reboot ( restart RGW )
-5. After restart, other settings
-6. save ( store setting )
(Note: Even if no change is made in "5. other settings", please make sure to implement
"6. save.")
It is not possible to directly switch Access Point of infrastructure mode to Station
of infrastructure mode.
It is necessary once to switch Access Point to Ad-hoc mode from wireless BSS AP mode
disable.
The following steps are made to switch from Access Point of infrastructure mode to
Ad-hoc mode:
-1. wireless BSS AP mode
disable
-2. save ( store setting)
-3. reboot ( restart RGW )
-4. After restart, save
( store setting )
(Note: Please make sure to
"4. save" after restart.)
The wireless port command is used to switch Ad-hoc mode and Station of infrastructure
mode. Use of this command immediately switches the mode of RGW , and there is no need
to restart.
Please note that when above switching of modes are made with wireless links•Athe link
will be disconnected when operation switch over.
On Access Point of infrastructure mode, there are following limitations:
∗ * On wireless relay, MAC address filter and IP filter do not work.
∗ * There is no roaming function. The RGW does not support an Extended Service
Set (ESS).
∗ * The wireless transfer rate depends on the settings on the client station side.
That is why it is not possible to set the wireless txrate command in AP mode.
Also, when Access Point is observed by monitor program, the transfer rate does
not indicate a valid value. (does this mean that the transfer rate observed
by the monitor program is inaccurate, or that the invalid value ‘0’ is shown?)
∗ * The possible link of Station is 200 maximum.
Since, on infrastructure mode flow of beacon and control data, general, an the actual
rate is lower than Ad-hoc mode.
4.1.2 WEP
It is possible to encrypt the data (MPDU) that RGW transmits on air. In order to code
this, WEP (Wired Equivalent Privacy), a secret key method can be used. Up to 4 keys
can be registered for each RGW. Since WEP require coding and compounding processes,
an actual transfer rate may be lowered in comparison without using the WEP. For details,
please refer to our home page.
4.1.3 Wireless Relay
A single unit of RGW enables wireless packet relay.
There are 2 methods for relaying:
When wireless port type is Ad-hoc, relay is in IP layer.
On infrastructure mode, Access Point implements relay in MAC layer.
However, relay with a single unit becomes a transfer using a same wireless channel
as actual rate is lowered to below 1/2.
On relay in IP layer, the station implemented must set in an order as not to send
out ICMP redirect.
Depending upon its condition, host routing becomes required. For details, please refer
to our home page.
On relay in MAC layer, please note that IP filter and MAC address filter do not work
at the station implementing relay.
By using 2 units of RGW linked both with Ethernet, each RGW is enable to be used with
different wireless channels, so that generally an actual rate increases than relaying
with a single RGW.
4.2 Fire Wall
4.2.1 IP Filter
The syntax of IP filter rule is explained in the previous chapter, but terms of each
parameter with examples are mentioned here:
Once more, syntax of filter rule is indicated:
filter add number action inout [log level facility.level] [quick] [on interface]
[proto proto] [from[!] address [port] to [!] address [port]][flags][with]
[keep][group]
Each filter rule has a number, and IP packet received by RGW is assessed in order
by all rules. And, it is processed accordingly to finally matched rule ( There are
exceptions which is mentioned later).
The IP filter of RGW is set to default permit (pass). In other words, a packet do
not matches to any rule is permitted.
In addition, filter number having order and rule sequence to set RGW is an independent
one.
* For action, set "pass" or "block", and when it matches the rule specify action of
either pass or cancel.
* For inout, set "in" or "out", and specify either packet going in RGW or going out
of RGW.
filter add 10 block in from any to any
filter add 11 pass in from any to any
When these 2 rules are specified, all packets received by RGW initially checks rule
No.10. All packet matches and becomes action of block(cancel). Furthermore, rule No.11
is checked next. All packet matches at No.11 and becomes action of pass (pass).
From above results, operation (pass) of rule No.11 which finally matched is
implemented. After all, in case of above 2 rules all packet passes.
* For quick, it is possible to specify "quick." When a packet matches rule specified
"quick", this packet is not assessed in later filter rule.
For example, in order to RGW to un-pass packet from host 192.168.1.2, when received
packet from this address, block it, and there is no longer a need to check the rule.
In such a case, by specifying quick keyword an action is immediately applied in case
it matches it.
filter add 15 block in quick from 192.168.1.2 to any
filter add 16 pass in from any to any
In this setting, the packet from 192.168.1.2 is blocked (block) by rule No.15 specified
by quick.
In the next rule No.16, it is intended to pass all packets, but packet matched to
rule No.15 is specified as quick, checking of next rule is not applied.
* On "on interface", it is possible to specify wi0 (wireless side) and ne0 (ethernet
side). Also, lo0 (loopback device) can be specified too. On internal RGW, it possesses
IP address 127.0.0.1 in device lo0, and it is used for internal process.
It is not possible to access externally to this address. On the contrary, please
note that an trouble may occur to operation of RGW when any access is blocked (block)
to 127.0.0.1 of device lo0. When this "on interface" keyword does not exist, all
interface, ne0, wi0 and lo0, become the target.
filter add 20 pass in quick on lo0 from any to 127.0.0.1
filter add 21 block in from 192.168.0.0/16 to any
filter add 22 pass in on wi0 from 192.168.0.0/24 to any
filter add 23 block out on ne0 from 172.16.0.0/12 to any
On rule No.20, an access of loop back device is immediately permitted.
On rule No.21, the packet is blocked (block) from address for private network
192.168.0.0/16 that is already reserved.
The wireless side (wi0), however, is linked to network of 192.168.0.0/24 so that on
No.22, pass is specified only in 192.168.0.0/24.
Since it follows finally matched rule, the rule up to this point, for example, when
packet from 192.168.0.3 comes from wireless side becomes pass, but packet from Ethernet
side and/or 192.168.1.2 is blocked (block).
The rule No.23 is to prevent packet from address 172.16.0.0/12 for reserved private
network to going to Ethernet side.
On proto, is possible to specify "tcp/udp", "tcp", "udp", or "icmp", and based on
these protocol classifications the filter rule can be set. When there is no proto,
it matches all classifications. In the example below, packets tcp and udp from
Ethernet side passes (pass), but icmp from Ethernet side is blocked (block).
filter add 40 pass in on ne0 proto tcp/udp from any to any
filter add 41 block in on ne0 proto icmp from any to any
* As you understand already, the rule can be set on packet by specifying IP address
and/or network such as from and to.
Also, "any" which expresses all hosts can be specified.
On port, port number for TCP/UDP can be specified, and filter rule specified with
specific port can be set. The port is valid in TCP and UDP packets. Also, when port
is not specified all ports becomes the target of rule. In the following example, TCP
packet directed to port No.80 from wireless side passes (pass).
filter add 50 pass in on wi0 proto tcp from any to any port = 80
On flags, it is possible to specify F(FIN),S(SYN),R(RST),P(PUSH),(ACK),
U(URG) of TCP flag, and it is also possible to set filter rule according
to type of flags. The packet of TCP flag which do not match specified in
flags do not match filter rule.
On with, it is possible to specify "ipopts","short",or "frag." ipopt can detect packet
having IP option on IP header. short can improperly detect
packet with short IP header. frag can detect fragmented IP header.
filter add 60 block in quick from any to any with short
In this filter rule, packet with improperly short IP header is immediately blocked
(block).
When keep state is specified, it is possible to set filter rule controlling the status.
When keep state is specified, a new TCP session is settled and information of this
session is stored internally. And the packet after this session which is stored in
RGW can implement to pass without having to check with separate filter in both
directions. Even in case of UDP packet when keep state is specified, IP address and
port No. of UDP packet is stored in memory for 600 seconds, and can pass only UDP
packet of reverse direction with same IP address and port No. On icmp, when keep state
is specified, the reply in respect to this icmp can pass for 600 seconds.
filter add 70 pass out quick on ne0 proto udp from any to any keep state
filter add 71 pass out quick on ne0 proto tcp from any to any flags S keep state
filter add 72 block in quick on ne0 proto tcp from any to any flags FUP
On rule No.70, it passes (pass) udp packet going out to Ethernet side,
and passes (pass) udp packet of this response for 600 seconds.
On rule No.71, it passes (pass) tcp packet with S flag going out to Ethernet
side, and after that passes (pass) packet of session input/output wise.
On rule No.72 when a packet of flag F(FIN),U(URG),P(PSH) comes from Ethernet
side, it is immediately blocked (block). However, it does not reach this rule when
the status is controlled in rule from previous checking of No.70 and 71.
The head is an indicator to give discrimination number to the packet that matches
filter rule. The packet which matched this rule checks discrimination number by filter
rule in the group. With these head and group, group of filter rule can be generated.
In addition, by specifying quick on filter rule with this head, after checking the
rule with same group of that discrimination number, checking of other rules is not
applied.
filter add 100 pass in on ne0 from any to any
filter add 101 block in quick on ne0 from 192.168.0.0/24 to any
filter add 102 block in quick on ne0 from 172.16.0.0/12 to any
filter add 110 block out on wi0 from any to any
filter add 111 pass out quick on wi0 proto tcp/udp from any to any flags S keep state
filter add 112 pass out quick on wi0 proto icmp from any to any keep state
When above set of rule is optimized by head and group, it becomes as follows:
filter add 100 pass in on ne0 from any to any head 1
filter add 101 block in quick on ne0 from 192.168.0.0/24 to any group 1
filter add 102 block in quick on ne0 from 172.16.0.0/12 to any group1
filter add 110 block out on wi0 from any to any head 2
filter add 111 pass out quick on wi0 proto tcp/udp from any to any flags S keep state
group 2
filter add 112 pass out quick on wi0 proto icmp from any to any keep state group 2
On set of rule optimized by head and group when rule No.100 matches
first, rules No.101 to 102 are checked in order. The rules No.101 to 102
are specified by quick so that it is immediately blocked (block) when
matched. When it does not match the rules from No. 101 to 102, it is immediately passed
(pass) from rule of No.100.
The packet going out to wireless side (wi0) do not match rule of No.100,
so that the next rule to be assessed becomes No.110. When it matches rule of No.110,
rules of No.111 and 112 are checked in order. When it matches
each an action appropriate to each rule is applied. When it does not
match rules of No.111 and 112, the block of action of No.110 is applied.
As you can see grouping of filter rule by use of head and group enables
better comprehension of complex set of rules as well as improvement of filtering
performance.
In addition, the values specified in head and/or group is not relevant
to filter number.

4.2.2 NAT
In the above network configuration, in order to access to global side
from client linked to network of private side, it is made possible with
following command:
nat add map nnn wi0 172.30.100.0/24 -> 10.12.1.2/32
On this command, the internal dispatch IP address (172.30.100.0/24)
is rewritten to 10.12.1.2 in RGW and goes out to the global side.
However, the port number of dispatch packet of TCP/UDP do not change.
In order to avoid overlap dispatch port number, it is changed by specifying keyword,
portmap.
nat add map nnn wi0 172.30.100.0/24 -> 10.12.1.2/32 portmap tcp/udp 20000:30000
On this command, on top of change of IP address of TCP and UDP packets, the dispatch
port number enables to change in the range of 20000 to 30000.
As for range of port number for portmap keyword, it is possible to specify in auto.
This command works similarly to the following:
nat add map nnn wi0 172.30.100.0/24 ->0/32 portmap tcp/udp 20000:30000
Also, it is known that several application protocols do not work within NAT. The NAT
in RGW corresponds with proxy to ftp, and access is possible for client without the
need to change to passive mode by using following command:
nat add map nnn wi0 172.30.100.0/24->0/32 proxy port ftp ftp/tcp
To summarize above the rule for NAT in general is as follows:
nat add map 10 wi0 172.30.100.0/24 -> 0/32 proxy port ftp ftp/tcp
nat add map 11 wi0 172.30.100.0/24 -> 0/32 portmap tcp/udp auto
nat add map 12 wi0 172.30.100.0/24 -> 0/32
Each rule of NAT is assessed in numerical order. For example, when command No.12 is
specified before No.10, all packet going out to global side from 172.30.100.0/24
changes only IP address so that expected operation of NAT will not be obtained.
The packet of icmp changes only the IP address so that for example, the
ping in contrary from multiple clients to same host at global side is responded only
to initially demanded client.
It is possible to reach from global side by setting server on inner side of NAT.
nat add bimap 100 wi0 172.30.100.3/32 -> 10.12.0.2/32
From this command an access to 10.12.0.2 from outside of NAT corresponds
to access of host 172.30.100.3 of inside NAT.
On bimap, spoof to host is possible, but on rdr, spoof of service becomes possible.
For example:
nat add rdr 101 wi0 10.12.0.2/32 port 80 -> 172.30.100.4/32 port 8000
With this command, an access to port No.80 of 10.12.0.2 from outside
of NAT becomes access to host port No.8000 of 172.30.100.4 of inside NAT.
With this rdr, it is possible during each port (each service) to distribute
packet to separate port of separate host.
Note: The packet entering RGW implements address change of NAT before
process of IP filter. On the other hand, packet going out of RGW implements
process of IP filter before address change of NAT.