User Guide for DIGI models including: IX20, Express System Peripherals
uploading health metrics to the Digi Remote Manager to avoid situations where multiple ... Wide Area Networks (WANs) and Wireless Wide Area Networks (WWANs).
Digi IX20-00M1 - DigiStore.com
Digi IX20-WAG4 - DigiStore.com
IX20 User Guide Revision history--90002381 Revision A B Date March 2020 June 2020 Description Initial release of the IX20 User Guide. Release of Digi IX20 firmware version 20.5: n Support for LDAP user authentication. n Preconfigured Wi-Fi SSID and password enabled by default (available for the Wi-Fi enabled IX20W model only). l The default SSID for the access point is: Digi-IX20W-serial_number l Default password is the unique password as found on the device's label. You will need to change the SSID and password before any configuration changes can be saved. n Wi-Fi client isolation options. n Firmware installation from the Digi firmware server. n Enhanced Digi Remote Manager support: l Support for remote proxy server for Digi Remote Manager. l Watchdog support for connection to Digi Remote Manager. l Locally authenticate CLI option added to Digi Remote Manager configuration to control whether a user is required to provide device-level authentication when accessing the console of the device through Digi Remote Manager. l Added a randomized two minute delay window for uploading health metrics to the Digi Remote Manager to avoid situations where multiple devices are uploading metrics at the same time. n Enhanced Python support: l Support for the Python serial module to allow programmatic access to serial ports. l Support for the Python HID module to allow programmatic access to a USB Human Interface Device (HID) from within a Python script. n Application mode for serial ports to allow for Python programmatic control. IX20 User Guide 2 Revision Date C September 2020 Description Release of Digi IX20 firmware version 20.8: n Support for NEMO/DMNR virtual private networks. n Support for serial Modbus Gateway. n Support for Ethernet network bonding. n Support for VRRP+, an extension to the VRRP standard that uses network probing to monitor connections through VRRP-enabled devices. n Cloud service enhancements: l Reduced data usage for reporting health metrics to Digi Remote Manager. Added Monitoring > Device Health > Only report changed values to Digi Remote Manager option to control sending metrics to Digi Remote Manager on the basis of whether the values have changed since they were last reported. l Added Monitoring > Device Health > Data point tuning configuration options to fine tune what datapoints are uploaded as health metrics to Digi Remote Manager. l Added the ability to select Digi aView as the cloud service. n Added the ability to duplicate firmware to copy the active firmware to the secondary firmware partition. n Moved the update firmware CLI command to system firmware update. n Added new Authoritative option under TACACS+, RADIUS, and LDAP user authentication methods to prevent falling back to additional authentication methods. n Cisco Umbrella content filtering. n Wi-Fi enhancements: l Added new options under Network > Wi-Fi to control Tx Power of the Wi-Fi module. l Added support for multiple RADIUS servers for WPA2 Enterprise. n Added options under System > Log > Server list to allow users to specify the TCP/UDP protocol and port of the remote syslog server. n Serial port enhancements: l Added configuration option under Serial > TCP connection to specify encrypted connection types. l Added configuration option under Serial > IX20 User Guide 3 Revision Date Description TCP/Telnet/SSH connections to enable/disable TCP keep-alive messages and nodelay. n Enhanced SMS support: l Added System > Scheduled tasks > Allow scheduled scripts parameter to allow custom python scripts to handle sending/receiving SMS messages l Added the digidevice.sms python module for sending/receiving SMS messages in a custom python script. n MQTT client support via Paho Python module. n Added a random unprivileged port for performing ntp time syncs if standard port 123 fails. n Scripting enhancements: l Added a Status > Scripts page in the web UI and show scripts command to the Admin CLI to view custom scripts and applications configured in the device, along with their status. Added the system scripts stop command to the Admin CLI to stop a custom script or application. IX20 User Guide 4 Revision Date D December 2020 Description Release of Digi IX20 firmware version 20.11: n Modem firmware update commands added to the Admin CLI. n Network bridging enhanced to use the MAC address of the first active device listed in Network > Bridges > Bridge name > Devices as the MAC address for the bridged interface. n IPsec enhancements: l Support for full IPsec IPv6 tunnels: IPv6-over-IPv4, or IPv4-over-IPv6 tunnels. l IPsec tunnels are now treated like network interfaces, which allows tunnels to be selected for routing and routing priority and access control lists. l IPSec tunnels now wait for Surelink tests, if configured, to pass prior to initiating outbound tunnels. n Modbus gateway enhancements: l Status > Modbus gateway page in the Web UI displays information about modbus clients and servers connected to the gateway. l show modbus command displays information about the the Modbus gateway service. n Serial port enhancements: l Serial port logging options added for starting, stopping, and viewing serial port activity. l Option added to the System > Serial configuration page to copy serial port settings. n Policy-based routing enhancements: l Added a DSCP option to match the routing rule by the type of DSCP field in the packet. l Added a Defaultroute option for matching policybased routes to the device's active default route. n Python pip support for installing external modules and libraries. n Service > Location added to enable location services. Requires either GPS from the cellular modem, or an external GNSS module connected via serial to the device. n Link speed and duplex options added to Ethernet port configuration. n ssh and telnet commands added to Admin CLI. n Services > Ping responder allows you to control the IX20 User Guide 5 Revision Date Description interfaces and firewall zones on which the DAL device will respond to ICMP requests. n Enhanced policy-based routing: l Added a DSCP option to match the routing rule by the type of DSCP field in the packet. l Added a Defaultroute option for matching policybased routes to the device's active default route. n Added a link to User Guide under the User menu in the Web UI. Trademarks and copyright Digi, Digi International, and the Digi logo are trademarks or registered trademarks in the United States and other countries worldwide. All other trademarks mentioned in this document are the property of their respective owners. © 2020 Digi International Inc. All rights reserved. Disclaimers Information in this document is subject to change without notice and does not represent a commitment on the part of Digi International. Digi provides this document "as is," without warranty of any kind, expressed or implied, including, but not limited to, the implied warranties of fitness or merchantability for a particular purpose. Digi may make improvements and/or changes in this manual or in the product(s) and/or the program(s) described in this manual at any time. Warranty To view product warranty information, go to the following website: www.digi.com/howtobuy/terms Customer support Gather support information: Before contacting Digi technical support for help, gather the following information: Product name and model Product serial number (s) Firmware version Operating system/browser (if applicable) Logs (from time of reported issue) Trace (if possible) Description of issue Steps to reproduce Contact Digi technical support: Digi offers multiple technical support plans and service packages. Contact us at +1 952.912.3444 or visit us at www.digi.com/support. IX20 User Guide 6 Feedback To provide feedback on this document, email your comments to techcomm@digi.com Include the document title and part number (IX20 User Guide, 90002381 D) in the subject line of your email. IX20 User Guide 7 Contents Revision history--90002381 2 What's new in Digi IX20 version 20.11 Digi IX20 Quick start Quick start using the Digi Remote Manager mobile app 19 Step 1: What's in the box 19 Step 2: Gather accessories 21 Step 3: Connect 21 Step 4: Power up 22 Step 5: Configure 23 Digi IX20 hardware reference Digi IX20 features and specifications 24 IX20 accessories 24 IX20 front view 24 IX20 LEDs 25 Power 26 INT 26 Wi-Fi Service (IX20W model only) 26 SIM1 26 SIM2 26 LTE 27 Signal quality indicators 27 Ethernet Link and Activity 28 Signal quality bars explained 28 IX20 power supply requirements 29 Digi IX20 serial connector pinout 29 Configuration for extreme thermal conditions 30 Hardware setup Install SIM cards in the Plug-in LTE modem 34 Tips for improving cellular signal strength 35 Connect data cables 35 Mount the IX20 device 35 Attach to a mounting surface by using the two mounting tabs 36 Attach to DIN rail with clip 36 IX20 User Guide 8 Attach to DIN rail with bracket 37 Configuration and management Review IX20 default settings 39 Local WebUI 39 Digi Remote Manager 39 Default interface configuration 39 Other default configuration settings 40 Change the default password for the admin user 41 Reset default SSID and pre-shared key for the preconfigured Wi-Fi access point 43 Configuration methods 45 Using Digi Remote Manager 45 Access Digi Remote Manager 45 Using the web interface 46 Log out of the web interface 47 Using the command line 48 Access the command line interface 48 Log in to the command line interface 48 Exit the command line interface 49 Interfaces Wide Area Networks (WANs) 51 Wide Area Networks (WANs) and Wireless Wide Area Networks (WWANs) 52 Configure WAN/WWAN priority and default route metrics 52 WAN/WWAN failover 55 Configure SureLink active recovery to detect WAN/WWAN failures 56 Configure the device to reboot when a failure is detected 63 Disable SureLink 69 Example: Use a ping test for WAN failover from Ethernet to cellular 73 Using Ethernet devices in a WAN 76 Using cellular modems in a Wireless WAN (WWAN) 76 Configure a Wide Area Network (WAN) 96 Configure a Wireless Wide Area Network (WWAN) 103 Show WAN and WWAN status and statistics 112 Delete a WAN or WWAN. 114 Local Area Networks (LANs) 116 About Local Area Networks (LANs) 117 Configure a LAN 117 Show LAN status and statistics 123 Delete a LAN 125 DHCP servers 126 Create a Virtual LAN (VLAN) route 142 Bridging 145 Edit the preconfigured ETH2 bridge 146 Configure a bridge 149 Serial port Configure the serial port 153 Show serial status and statistics 165 Log serial port messages 166 IX20 User Guide 9 Wi-Fi Wi-Fi configuration 168 Default access point SSID and password 168 Default Wi-Fi configuration 168 Configure the Wi-Fi radio's channel 170 Configure the Wi-Fi radio's band and protocol 172 Configure the Wi-Fi radio's transmit power 173 Configure a Wi-Fi access point with no security 175 Configure a Wi-Fi access point with personal security 180 Configure a Wi-Fi access point with enterprise security 185 Isolate Wi-Fi clients 192 Isolate clients connected to the same access point 192 Isolate clients connected to different access points 193 Show Wi-Fi access point status and statistics 199 Configure a Wi-Fi client and add client networks 200 Show Wi-Fi client status and statistics 207 Routing IP routing 210 Configure a static route 211 Delete a static route 214 Policy-based routing 216 Configure a routing policy 216 Example: Dual WAN policy-based routing 224 Example: Route traffic to a specific WAN interface based on the client MAC address 227 Routing services 232 Configure routing services 233 Show the routing table 236 Dynamic DNS 237 Configure dynamic DNS 237 Virtual Router Redundancy Protocol (VRRP) 243 VRRP+ 243 Configure VRRP 243 Configure VRRP+ 247 Example: VRRP/VRRP+ configuration 254 Configure device one (master device) 255 Configure device two (backup device) 259 Show VRRP status and statistics 265 Virtual Private Networks (VPN) IPsec 268 IPsec data protection 268 IPsec modes 268 Internet Key Exchange (IKE) settings 268 Authentication 269 Configure an IPsec tunnel 269 Configure IPsec failover 290 Configure SureLink active recovery for IPsec 293 Show IPsec status and statistics 299 Debug an IPsec configuration 300 OpenVPN 303 IX20 User Guide 10 Configure an OpenVPN server 304 Configure an OpenVPN Authentication Group and User 313 Configure an OpenVPN client by using an .ovpn file 317 Configure an OpenVPN client without using an .ovpn file 320 Configure active recovery for OpenVPN 324 Show OpenVPN server status and statistics 331 Show OpenVPN client status and statistics 332 Generic Routing Encapsulation (GRE) 334 Configuring a GRE tunnel 334 Show GRE tunnels 339 Example: GRE tunnel over an IPSec tunnel 340 NEMO 355 Configure a NEMO tunnel 355 Show NEMO status 361 Services Allow remote access for web administration and SSH 364 Configure the web administration service 367 Configure SSH access 377 Use SSH with key authentication 383 Generating SSH key pairs 383 Configure telnet access 386 Configure DNS 391 Simple Network Management Protocol (SNMP) 397 SNMP Security 397 Configure Simple Network Management Protocol (SNMP) 397 Download MIBs 402 Location information 403 Configure the location server 404 Enable or disable the internal GNSS module 408 Configure the device to accept location messages from external sources 409 Forward location information to a remote host 414 Show location information 420 Modbus gateway 421 Configure the Modbus gateway 422 Show Modbus gateway status and statistics 435 System time 438 Configure the system time 438 Network Time Protocol 441 Configure the device as an NTP server 441 Configure a multicast route 446 Ethernet network bonding 449 Enable service discovery (mDNS) 452 Use the iPerf service 455 Example performance test using Iperf3 460 Configure the ping responder service 460 Example performance test using Iperf3 464 Applications Configure applications to run automatically 466 Task one: Upload the application 466 Task two: Configure the application to run automatically 468 IX20 User Guide 11 Run a Python application at the shell prompt 472 Start an interactive Python session 474 Digidevice module 476 Use digidevice.cli to execute CLI commands 477 Use digidevice.datapoint to upload custom datapoints to Digi Remote Manager 478 Use digidevice.config for device configuration 480 Use Python to respond to Digi Remote Manager SCI requests 483 Use digidevice runtime to access the runtime database 491 Use Python to upload the device name to Digi Remote Manager 493 Use Python to send and receive SMS messages 495 Use Python to access serial ports 498 Use the Paho MQTT python library 498 Stop a script that is currently running 502 Show script information 502 User authentication IX20 user authentication 505 User authentication methods 505 Add a new authentication method 507 Delete an authentication method 509 Rearrange the position of authentication methods 511 Authentication groups 512 Change the access rights for a predefined group 514 Add an authentication group 516 Delete an authentication group 520 Local users 522 Change a local user's password 523 Configure a local user 524 Delete a local user 532 Terminal Access Controller Access-Control System Plus (TACACS+) 534 TACACS+ user configuration 535 TACACS+ server failover and fallback to local authentication 536 Configure your IX20 device to use a TACACS+ server 536 Remote Authentication Dial-In User Service (RADIUS) 542 RADIUS user configuration 543 RADIUS server failover and fallback to local configuration 543 Configure your IX20 device to use a RADIUS server 544 LDAP 549 LDAP user configuration 550 LDAP server failover and fallback to local configuration 551 Configure your IX20 device to use an LDAP server 551 Disable shell access 556 Set the idle timeout for IX20 users 557 Example user configuration 560 Example 1: Administrator user with local authentication 560 Example 2: RADIUS, TACACS+, and local authentication for one user 562 Firewall Firewall configuration 570 Create a custom firewall zone 570 Configure the firewall zone for a network interface 572 Delete a custom firewall zone 574 IX20 User Guide 12 Port forwarding rules 575 Configure port forwarding 575 Delete a port forwarding rule 580 Packet filtering 583 Configure packet filtering 583 Enable or disable a packet filtering rule 587 Delete a packet filtering rule 589 Configure custom firewall rules 590 Configure Quality of Service options 592 System administration Review device status 604 Configure system information 605 Update system firmware 607 Manage firmware updates using Digi Remote Manager 607 Certificate management for firmware images 607 Downgrading 608 Dual boot behavior 610 Update cellular module firmware 611 Update modem firmware over the air (OTA) 612 Update modem firmware by using a local firmware file 614 Reboot your IX20 device 615 Reboot your device immediately 615 Schedule reboots of your device 616 Reset the device to factory defaults 617 Configuration files 621 Save configuration changes 621 Save configuration to a file 622 Restore the device configuration 623 Schedule system maintenance tasks 626 Disable device encryption 633 Re-enable cryptography after it has been disabled. 633 Configure the speed of your Ethernet ports 635 Monitoring intelliFlow 639 Enable intelliFlow 639 Use intelliFlow to display average CPU and RAM usage 642 Use intelliFlow to display top data usage information 643 Use intelliFlow to display data usage by host over time 645 Configure NetFlow Probe 646 Central management Digi Remote Manager support 652 Configure Digi Remote Manager 652 Collect device health data and set the sample interval 658 Log into Digi Remote Manager 661 Use Digi Remote Manager to view and manage your device 663 Add a device to Digi Remote Manager 664 View Digi Remote Manager connection status 664 IX20 User Guide 13 Use the Digi Remote Manager mobile app 665 Configure multiple devices using profiles 665 Learn more 666 File system The IX20 local file system 668 Display directory contents 668 Create a directory 669 Display file contents 670 Copy a file or directory 670 Move or rename a file or directory 671 Delete a file or directory 672 Upload and download files 673 Upload and download files by using the WebUI 673 Upload and download files by using the Secure Copy command 674 Upload and download files using SFTP 675 Diagnostics Generate a support report 678 View system and event logs 679 View System Logs 679 View Event Logs 681 Configure syslog servers 683 Configure options for the event and system logs 685 Analyze network traffic 690 Configure packet capture for the network analyzer 691 Example filters for capturing data traffic 695 Capture packets from the command line 696 Stop capturing packets 697 Show captured traffic data 697 Save captured data traffic to a file 699 Download captured data to your PC 700 Clear captured data 701 Use the ping command to troubleshoot network connections 702 Ping to check internet connection 702 Stop ping commands 702 Use the traceroute command to diagnose IP routing problems 702 Digi IX20 regulatory and safety statements RF exposure statement 704 Federal Communication (FCC) Part 15 Class B 704 Radio Frequency Interference (RFI) (FCC 15.105) 704 European Community - CE Mark Declaration of Conformity (DoC) 705 CE mark (Europe) 705 Maximum transmit power for radio frequencies 707 Innovation, Science, and Economic Development Canada (IC) certifications 707 RoHS compliance statement 708 Safety statements 708 Special safety notes for wireless routers 709 Product disposal instructions 710 IX20 User Guide 14 DigiIX20 Certifications International EMC (Electromagnetic Compatibility) and safety standards 710 Command line interface Access the command line interface 712 Log in to the command line interface 712 Exit the command line interface 713 Execute a command from the web interface 713 Display help for commands and parameters 714 The help command 714 The question mark (?) command 714 Display help for individual commands 715 Use the Tab key or the space bar to display abbreviated help 715 Auto-complete commands and parameters 715 Available commands 717 Use the scp command 718 Display status and statistics using the show command 719 show config 719 show system 720 show network 720 Device configuration using the command line interface 720 Execute configuration commands at the root Admin CLI prompt 721 Display help for the config command from the root Admin CLI prompt 721 Configuration mode 723 Enable configuration mode 723 Enter configuration commands in configuration mode 723 Save changes and exit configuration mode 723 Exit configuration mode without saving changes 724 Configuration actions 724 Display command line help in configuration mode 725 Move within the configuration schema 727 Manage elements in lists 728 The revert command 730 Enter strings in configuration commands 732 Example: Create a new user by using the command line 732 Command line reference 735 analyzer 736 cp 737 help 738 ls 739 mkdir 740 modem 741 modem puk status [imei STRING] [name STRING] 746 more 749 mv 750 ping 751 reboot 753 rm 754 scp 755 show 756 ssh 764 system 766 IX20 User Guide 15 traceroute 770 IX20 User Guide 16 What's new in Digi IX20 version 20.11 Release of Digi IX20 firmware version 20.11: n Modem firmware update commands added to the Admin CLI. n Network bridging enhanced to use the MAC address of the first active device listed in Network > Bridges > Bridge name > Devices as the MAC address for the bridged interface. n IPsec enhancements: l Support for full IPsec IPv6 tunnels: IPv6-over-IPv4, or IPv4-over-IPv6 tunnels. l IPsec tunnels are now treated like network interfaces, which allows tunnels to be selected for routing and routing priority and access control lists. l IPSec tunnels now wait for Surelink tests, if configured, to pass prior to initiating outbound tunnels. n Modbus gateway enhancements: l Status > Modbus gateway page in the Web UI displays information about modbus clients and servers connected to the gateway. l show modbus command displays information about the the Modbus gateway service. n Serial port enhancements: l Serial port logging options added for starting, stopping, and viewing serial port activity. l Option added to the System > Serial configuration page to copy serial port settings. n Policy-based routing enhancements: l Added a DSCP option to match the routing rule by the type of DSCP field in the packet. l Added a Defaultroute option for matching policy-based routes to the device's active default route. n Python pip support for installing external modules and libraries. n Service > Location added to enable location services. Requires either GPS from the cellular modem, or an external GNSS module connected via serial to the device. n Link speed and duplex options added to Ethernet port configuration. n ssh and telnet commands added to Admin CLI. n Services > Ping responder allows you to control the interfaces and firewall zones on which the DAL device will respond to ICMP requests. n Enhanced policy-based routing: IX20 User Guide 17 What's new in Digi IX20 version 20.11 l Added a DSCP option to match the routing rule by the type of DSCP field in the packet. l Added a Defaultroute option for matching policy-based routes to the device's active default route. n Added a link to User Guide under the User menu in the Web UI. IX20 User Guide 18 Digi IX20 Quick start The following steps guide you through the setup of your DigiIX20 device. Quick start using the Digi Remote Manager mobile app After connecting your hardware and powering up, you can use the Digi Remote Manager mobile app to quickly install your IX20 into your Digi Remote Manager account. Here's how: If you already have a Digi Remote Manager account: 1. Download the Digi Remote Manager mobile app from the App Store (iPhone) or Google Play (Android). 2. Click Log in or Sign Up and log in to your account. 3. From the menu, select Install a device with a QR or bar code and scan the installation QR code on the label. 4. Follow the prompts to complete your IX20 registration. If you need to sign up for a Digi Remote Manager account: 1. Click here to create a new account. You'll receive an email with login instructions. 2. On your smartphone or tablet, download the Digi Remote Manager mobile app from the App Store (iPhone) or Google Play (Android). 3. Open the Digi Remote Manager mobile app, click Log in and log into your new account. 4. From the menu, select Install a device with a QR or bar code and scan the installation QR code on the label. 5. Follow the prompts to complete your IX20 registration. Step 1: What's in the box When you open the IX20 package, look for the following: n Digi IX20 device (Wi-Fi enabled IX20W unit shown) IX20 User Guide 19 Digi IX20 Quick start Step 1: What's in the box The Digi IX20 has a product label on the bottom of the device. The label includes product identification information and the default password assigned to the device. The IX20 also includes a terminal connector for the power supply installed in the power input. n Digi 1002-CM unit n CM unit cover plate n Antennas Two cellular antenna are included. For the Wi-Fi-enabled IX20W device, a Wi-Fi antenna is also included. n Power supply and adapters n Ethernet cable n Insert cards n Digi IX20 label Printed copy of the product label on the bottom of your device. You can affix this label to the top or side of the device such that you can access the label after the device is mounted, or store the label in a safe place for future reference. n Digi CORE modem label IX20 User Guide 20 Digi IX20 Quick start Step 2: Gather accessories Printed copy of the CORE modem label on the bottom of your CORE modem. You can affix this label to the top or side of the device such that you can access the label after the device is mounted, or store the label in a safe place for future reference. Step 2: Gather accessories Accessories may be purchased with the IX20 device, or you can provide your own. Here's the list of accessories used in this Quick start: DIN rail clip Ordered separately. For optionally clipping the IX20 to a DIN rail. DIN rail mounting bracket Ordered separately. For optionally mounting the IX20 to a DIN rail. Laptop or personal computer Use an Ethernet cable to connect your IX20 to a laptop or PC. SIM card(s) If you intend to configure cellular WWAN access at this time, acquire SIM cards as needed. Note the carrier, network APN (Access Point Name), and SIM pin (if any) for each card. Smart phone or tablet Optional: Use a smart phone or table to to automatically register your IX20 in your Digi Remote Manager account and connect to your cellular network. See Quick start using the Digi Remote Manager mobile app. Step 3: Connect 1. Insert your activated SIMs provided by your cellular carrier into the Digi 1002-CM CORE modem. 2. Insert the CORE modem into the IX20 by aligning the white clip. Press the modem in and then push the white clip in until it locks firmly in place. IX20 User Guide 21 Digi IX20 Quick start Step 4: Power up 3. Secure the CORE modem with one of the CM unit anchor screws. 4. Cover the installed CORE modem with the cover plate and secure the coverplate with screw. 5. (Optional) Attach spare label included with the CORE modem to the device. 6. Attach antenna(s). 7. If you intend to configure Ethernet WAN access at this time, use an Ethernet cable to connect the IX20's WAN/ETH1 port to a hub with access to the Internet. 8. Use an Ethernet cable to connect the IX20 ETH2 port to your PC. Step 4: Power up a. Connect DC power. Note If you need help understanding power requirements, see IX20 power supply requirements. IX20 User Guide 22 Digi IX20 Quick start Step 5: Configure b. Indicator LEDs blink to show status during startup. c. Wait for the power LED to stop blinking. The device is ready. Step 5: Configure This section describes how to configure the device by using the local Web UI. You can also use Digi Remote Manager to configure the device, including using a Digi RM device configuration to automatically update the device. See the Digi Remote Manager User Guide. a. On the PC connected to the IX20, open a browser and go to 192.168.2.1. b. Log into the IX20: User name: Use the default user name: admin. Password: Use the unique password printed on the bottom label of the device (or the printed label included in the package). When you first log into the WebUI or the command line, you must change the password for the admin user. See Change the default password for the admin user for instructions. Additionally, for Wi-Fi enabled models, when you first log into the WebUI or the command line, you will be required the change the SSID and pre-shared key (password) for the preconfigured Wi-Fi access point. See Reset default SSID and pre-shared key for the preconfigured Wi-Fi access point for instructions. IX20 User Guide 23 Digi IX20 hardware reference Digi IX20 features and specifications The Digi IX20 key features include: n Industrial grade components. n Operating temperatures: l IX20W (Wi-Fi enabled version): -20C to +70C/-40F to +158F. l IX20 (non-Wi-Fi version): -40C to +70C/-4F to +158F. n Plug-in LTE modem (1002-CM). n 802.11b/g/n/ac 2.4/5Ghz Wi-Fi (Wi-Fi enabled IX20W model only). n Two 10/100 BaseT Ethernet ports for high-speed connectivity. For a detailed list of IX20 hardware specifications, see https://www.digi.com/products/networking/cellular-routers/industrial/digi-ix20#specifications. IX20 accessories When accessories are purchased with the IX20 device, the following are provided: n Cellular antennas. n Wi-Fi antennas (for the IX20W device only). n Power supply. n Ethernet cable. n DIN rail mounting bracket, n DIN rail mounting clip, IX20 front view The following figure shows the front view of the IX20W enabled model. IX20 User Guide 24 Digi IX20 hardware reference IX20 LEDs Item Decription WIFI antenna connector Wi-Fi enabled model only. WAN/ETH1 Ethernet port, WAN-enabled by default. ETH2 Ethernet port, LAN-enabled by default Serial port See Digi IX20 serial connector pinout for information about the serial port pin-out. SIM button The SIM button is used to manually toggle between the two SIM slots included in the CM module. ERASE button The ERASE button is used to perform a device reset, and it has three modes: 1. Configuration reset: Pressing the ERASE button one time will reset the device configurations to the factory default. It will not remove any automatically generated certificates and keys. 2. Full device reset: After the device reboots from the first button press, press the ERASE button again before the device is connected to the internet to also remove generated certificates/keys. 3. Firmware reversion: Press and hold the ERASE button and then power on the device to boot to the version of firmware that was used prior to the current version. LEDs See IX20 LEDs. Power suppy IX20 power supply requirements. IX20 LEDs The IX20 LEDs are located on the top front panel. The number of LEDs varies by model. During bootup, the front-panel LEDs light up in sequence to indicate boot progress. IX20 User Guide 25 Digi IX20 hardware reference IX20 LEDs Power Off No power. Solid green Device has power INT Off The WAN/ETH1 Ethernet port not connected. Flashing green The WAN/ETH1 Ethernet port is connecting. Solid green The WAN/ETH1 Ethernet port is connected and has activity. Wi-Fi Service (IX20W model only) Off No Wi-Fi access points or Wi-Fi clients are enabled. Solid green Wi-Fi access points or Wi-Fi clients are enabled. SIM1 Indicates that SIM1 is in use. Off SIM1 not in use. Solid green SIM1 is in use. SIM2 Indicates that SIM2 is in use. IX20 User Guide 26 Digi IX20 hardware reference IX20 LEDs Off SIM2 not in use. Solid green SIM2 is in use. LTE Indicates that the status of the ETH2 Ethernet port connection and the cellular module: Solid yellow (or orange) Initializing or starting up. Flashing yellow (or orange) In the process of connecting to the cellular network and to a device on its ETH2 port. Flashing white ETH2 port connection established and in the process of connecting to the cellular network. Flashing green Connected to 2G or 3G and is in the process of connecting to any device on its ETH2 port, or nothing is connected to the port. Solid green Connected to 2G or 3G and also has a device linked to its ETH2 port. Flashing blue Connected to 4G LTE and in the process of connecting to a device on its ETH2 port. Solid blue Connected to the 4G LTE and also has a ETH2 connection. Alternating Red/yellow (or orange) Upgrading firmware. WARNING! DO NOT POWER OFF DURING FIRMWARE UPGRADE. Signal quality indicators LEDs labeled 1 through 5 Indicate the cellular service quality level. Signal bars Weighted dBm -113 to -99 Signal strength % 0% to 23% -98 to -87 24% to 42% -86 to -76 43% to 61% -75 to -64 62% to 80% -63 to -51 81% to 100% Quality Bad Marginal OK Good Excellent IX20 User Guide 27 Digi IX20 hardware reference IX20 LEDs The weighted dBm measurements are negative numbers, meaning the smaller negative values denote a larger number. For example, a -85 is a better signal than -90. Note See Signal quality bars explained for more information regarding how signal strength is calculated and subsequently displayed via the LED indicators. Ethernet Link and Activity The LEDs on the WAN/ETH1 and ETH2 ports indicate that the Ethernet network interface is up and there is activity on the network interface. Left LED (on top of port connector) n Off: No Ethernet link detected. n Blinking amber: Indicates Ethernet traffic. Right LED (on top of port connector) n Off: No Ethernet link detected. n Solid green: 10/100 Mbps link detected. n Solid amber: 1000 Mbps link detected. Signal quality bars explained The signal status bars for the Digi IX20 measure more than simply signal strength. The value reported by the 4G LTE signal bars is calculated using an algorithm that takes into consideration the Reference Signals Received Power (RSRP), the Signal-to-noise ratio (SNR), and the Received Signal Strength Indication (RSSI) to provide an accurate indicator of the quality of the signal that the device is receiving. For 3G networks (including HSPA+) and 2G networks, the signal strength bars are determined by the RSSI value. 4G LTE algorithms For 4G LTE, the IX20 device determines the RSRP, SNR, and RSSI values separately and uses the following algorithms to display the signal quality: RSRP > -85, rsrp_bars=5 -95 < RSRP <= -85, rsrp_bars=4 -105 < RSRP <= -95, rsrp_bars=3 -115 < RSRP <= -105, rsrp_bars=2 -199 < RSRP <= -115, if we're connected to the cellular network, rsrp_bars=1, if not rsrp_bars=0 If RSRP <= -199, the device uses the RSSI as the value with the same algorithm: SNR >= 13, snr_bars=5 4.5 <= SNR < 13, snr_bars=4 1 <= SNR < 4, snr_bars=3 -3 < SNR < 1, snr_bars=2 IX20 User Guide 28 Digi IX20 hardware reference IX20 power supply requirements -99 < SNR <= -3, if we're connected to the cellular network, snr_bars=1, if not snr_bars=0 Once the snr_bars and rsrp_bars values are determined, the device uses the lesser of the two as the reported signal a bars. 3G algorithm For 3G, the IX20 determines RSSI signal strength: RSSI > -80, bars=5 -90 < RSSI <= -80, bars=4 -100 < RSSI <= -90, bars=3 -106 < RSSI <= -100, bars=2 RSSI <= -106, if we're connected to the cellular network, bars=1, if not bars=0 bars is then reported as the signal strength bars. 2G algorithm For 2G, the IX20 determines RSSI signal strength: RSSI > -80, bars=5 -89 < RSSI <= -80, bars=4 -98 < RSSI <= -89, bars=3 -104 < RSSI <= -98, bars=2 RSSI <= -104, if we're connected to the cellular network, bars=1, if not bars=0 bars is then reported as the signal strength bars. IX20 power supply requirements IX20 is intended to be powered by a certified power supply with output rated at either 12 VDC/0.75 A or 24 VDC/0.375 A minimum. n Use the included power supply (part number 24000154). n If you are providing the DC power source with a non-Digi power supply, you must use a certified LPS power supply rated at either 12 VDC/0.75 A or 24 VDC/0.375 A minimum. The voltage tolerance supports +/- 10% (9 VDC to 30 VDC) at 9 Watts minimum. n For installations requiring protective earth grounding, connect the -ve terminal of the power connector to the system protective earth with a minimum 1mm2 stranded single insulated cable. Crimp terminals should be used for all connections. Digi IX20 serial connector pinout The IX20 is a DTE device. The pinout for the DB9 serial connector is as follows: Signal name Transmit Data Receive Data RS232 signal TxD RxD DTE signal direction In Out DB9 pin number 3 2 IX20 User Guide 29 Digi IX20 hardware reference Configuration for extreme thermal conditions Signal name Ready To Send Clear to Send Data Set Ready Ground Data Carrier Detect Data Terminal Ready Ring Indicate RS232 signal RTS CTS DSR GND DCD DTR RI DTE signal direction In Out Out N/A Out In Out DB9 pin number 7 8 6 5 1 4 9 Configuration for extreme thermal conditions The IX20 has been verified to operate in the following temperate ranges: n IX20W (Wi-Fi enabled version): -20C to +70C/-40F to +158F. n IX20 (non-Wi-Fi version): -40C to +70C/-4F to +158F. However, in extreme temperature conditions (up to +70C/+158F), you must add a Quality of Service (QOS) rule that limits the upload speed of the modem to 1 Mpbs. For less extreme temperatures, a modem upload speed of up to 10 Mpbs is acceptable. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Firewall > Quality of Service. 4. For Add Binding, click . IX20 User Guide 30 Digi IX20 hardware reference Configuration for extreme thermal conditions 5. For Interface, select Modem. 6. For Interface bandwidth (Mbit), type 1. 7. Click to expand Policy. 8. For Add Policy, click . 9. Click to expand Rule. 10. For Add Rule, click . The default settings for the policy and rule are sufficient. 11. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add a binding: (config)> add firewall qos end (config firewall qos 2)> 4. Set the interface to the modem interface: (config firewall qos 2)> interface /network/interface/modem (config firewall qos 2)> 5. Set the maximum egress bandwidth of the interface to 1: (config firewall qos 2)> bandwidth 1 (config firewall qos 2)> IX20 User Guide 31 Digi IX20 hardware reference Configuration for extreme thermal conditions 6. Create a policy: (config firewall qos 2)> add policy end (config firewall qos 2 policy 0)> 7. Add a rule to the policy: (config firewall qos 2 policy 0)> add rule end (config firewall qos 2 policy 0 rule 0)> The default settings for the policy and rule are sufficient. 8. Save the configuration and apply the change: (config firewall qos 2 policy 0 rule 09)> save Configuration saved. > 9. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 32 Hardware setup This chapter contains the following topics: Install SIM cards in the Plug-in LTE modem 34 Connect data cables 35 Mount the IX20 device 35 IX20 User Guide 33 Hardware setup Install SIM cards in the Plug-in LTE modem Install SIM cards in the Plug-in LTE modem There is a label on the bottom of the CORE modem that indicates the plug-in modem IMEI number. The modem is referred to as 1002-CM. To install SIM cards: 1. Identify the SIM 1 and SIM 2 slots on the 1002-CM. If using only one SIM card, insert it into SIM 1. A second SIM may be inserted into slot SIM 2 for an alternate wireless carrier. 2. Insert the SIM cards into the 1002-CM. Note If the IX20 device is used in an environment with high vibration levels, SIM card contact fretting may cause unexpected SIM card failures. To protect the SIM cards, Digi strongly recommends that you apply a thin layer of dielectric grease to the SIM contacts prior to installing the SIM cards. 3. On the IX20 back panel, remove the CORE modem cover by loosening the cover plate thumb screw and removing the cover plate. 4. With the antennas SMA connectors pointing outward, slide the Digi 1002-CM CORE modem into the IX20 device. A clicking sound will indicate it is properly inserted. 5. Secure the 1002-CM CORE modem with an anchor screw. 6. Cover the installed Digi1002-CM unit with the CORE modem cover and secure the coverplate by tightening the thumb screw. IX20 User Guide 34 Hardware setup Connect data cables 7. Affix the cellular antennas to the two connectors protruding from the device. To remove the CORE modem: 1. Remove the anchor screw. 2. Pinch the two vertical sides of the white clip. 3. Slide the CORE modem out of the IX20 device. Tips for improving cellular signal strength If the signal strength LEDs or the signal quality for your device indicate Poor or No service, try the following things to improve signal strength: n Move the device to another location. n Try connecting a different set of antennas, if available. n Purchase a Digi Antenna Extender Kit: Antenna Extender Kit, 1m. Connect data cables The IX20 provides two types of data ports: n Ethernet (RJ-45): Use a Cat 5e or Cat 6 Ethernet cable. n Serial (9-pin RS-232): Use a serial cable with a 9-pin RS-232 connector. Mount the IX20 device There are three options for mounting the IX20 device: n Attach to a mounting surface by using the two mounting tabs. n Attach to DIN rail with clip. n Attach to DIN rail with bracket. IX20 User Guide 35 Hardware setup Mount the IX20 device Attach to a mounting surface by using the two mounting tabs Attach to DIN rail with clip The DIN rail clip is an optional accessory included when the IX20 is purchased with accessories. 1. Attach the DIN rail clip to the bottom of the device with the screws provided. 2. Set the IX20 device onto a DIN rail and gently press until the clip snaps into the rail. IX20 User Guide 36 Hardware setup Mount the IX20 device Attach to DIN rail with bracket 1. Attach the DIN rail clip to the DIN rail mounting bracket with the screws provided. 2. Attach the IX20 device to the bracket with the screws provided. 3. Set the bracket with the clip onto a DIN rail and gently press until the clip snaps into the rail. WARNING! If being installed above head height on a wall or ceiling, ensure the device is fitted securely to avoid the risk of personal injury. Digi recommends that this device be installed by an accredited contractor. IX20 User Guide 37 Configuration and management This chapter contains the following topics: Review IX20 default settings 39 Change the default password for the admin user 41 Reset default SSID and pre-shared key for the preconfigured Wi-Fi access point 43 Configuration methods 45 Using Digi Remote Manager 45 Access Digi Remote Manager 45 Using the web interface 46 Using the command line 48 Access the command line interface 48 Log in to the command line interface 48 Exit the command line interface 49 IX20 User Guide 38 Configuration and management Review IX20 default settings Review IX20 default settings You can review the default settings for your IX20 device by using the local WebUI or Digi Remote Manager: Local WebUI 1. Log into the IX20 WebUI as a user with Admin access. See Using the web interface for details. 2. On the menu, click System > Device Configuration. Digi Remote Manager 1. If you have not already done so, connect to your Digi Remote Manager account. 2. Click Device Management to display a list of your devices. 3. Locate and select your device as described in Use Digi Remote Manager to view and manage your device. 4. Click Configure. The following tables list important factory default settings for the IX20. Default interface configuration Interface type Wide Area Network (WAN) Preconfigured interfaces n ETH1 Wireless Wide Area Network (WWAN) n Modem Devices n Ethernet: ETH1 n Modem Default configuration n Firewall zone: External n WAN priority: Metric=1 n IP Address: DHCP client n Digi SureLinkTM enabled for IPv4 n Firewall zone: External n WAN priority: Metric=3 n SIM failover after 5 attempts n SureLink enabled for IPv4 IX20 User Guide 39 Configuration and management Review IX20 default settings Interface type Local Area Network (LAN) Preconfigured interfaces n ETH2 n Loopback n Default IP n Default Link-local IP Wi-Fi (available with IX20W models only) n Wi-Fi access point: Digi AP Bridges (Wi-Fi model only) n Bridge: LAN Devices Default configuration n Ethernet: ETH2 (non-Wi-Fi models) n Bridge: LAN (Wi-Fi models) n Firewall zone: Internal n IP address: 192.168.2.1/24 n DHCP server enabled n LAN priority: Metric=5 n Ethernet: Loopback n Firewall zone: Loopback n IP address: 127.0.0.1/8 n Bridge: LAN n Firewall zone: Setup n IP address 192.168.210.1/24 n Bridge: LAN n Firewall zone: Setup n IP address 169.254.100.100/16 n Wi-Fi radio n Enabled n SSID: Digi-IX20W- serial_number n Encryption: WAP2 Personal (PSK) n Pre-shared key: The unique password printed on the bottom label of the device. n Ethernet: ETH2 n Wi-Fi access point: Digi AP n Enabled n Used by the ETH1 interface Other default configuration settings Feature Central management Configuration n Digi Remote Manager enabled as the central management service. IX20 User Guide 40 Configuration and management Change the default password for the admin user Feature Security policies Monitoring Serial port Configuration n Packet filtering allows all outbound traffic. n SSH and web administration: l Enabled for local administration l Firewall zone: Internal n Device heath metrics uploaded to Digi Remote Manager at 60 minute interval. n SNMP: Disabled n Enabled n Serial mode: Remote n Label: None n Baud rate: 9600 n Data bits: 8 n Parity: None n Stop bits: 1 n Flow control: None Change the default password for the admin user The unique, factory-assigned password for the default admin user account is printed on the bottom label of the device and on the loose label included in the package. When you first log into the WebUI or the command line, you will be required to change the password for the admin user prior to being able to save any configuration changes. If you erase the device configuration or reset the device to factory defaults, the password for the admin user will revert to the original, factory-assigned default password. Additionally, for Wi-Fi enabled models, when you first log into the WebUI or the command line, you will be required the change the SSID and pre-shared key (password) for the preconfigured Wi-Fi access point. See Reset default SSID and pre-shared key for the preconfigured Wi-Fi access point for instructions. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 41 Configuration and management Change the default password for the admin user 3. Click Authentication > Users > admin. 4. Enter a new password for the admin user. The password must be at least ten characters long and must contain at least one uppercase letter, one lowercase letter, one number, and one special character. 5. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Set a new password for the admin user. The password must be at least ten characters long and must contain at least one uppercase letter, one lowercase letter, one number, and one special character. (config)> auth user admin password new-password (config)> IX20 User Guide 42 Configuration and management Reset default SSID and pre-shared key for the preconfigured Wi-Fi access point 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Reset default SSID and pre-shared key for the preconfigured Wi-Fi access point For the Wi-Fi enabled IX20W device, by default, the SSID and pre-shared key for the preconfigured WiFi access point are: n Enabled n SSID: Digi-IX20W-serial_number n Encryption: WAP2 Personal (PSK) n Pre-shared key: The unique password printed on the bottom label of the device. When you first log into the WebUI or the command line, or after erasing the configuration, you will be required to change the SSID and pre-shared key for the preconfigured Wi-Fi access point. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 43 Configuration and management Reset default SSID and pre-shared key for the preconfigured Wi-Fi access point 3. Click Network > Wi-Fi > Digi AP. 4. Enter a new SSID and Pre-shared key. 5. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Set a new SSID for the digi_ap access point: (config)> network wifi ap digi_ap ssid new_ssid (config)> 4. Set a new pre-shared key: (config)> network wifi ap digi_ap encryption key_psk2 new_key (config)> 5. Save the configuration and apply the change: (config)> save Configuration saved. > IX20 User Guide 44 Configuration and management Configuration methods 6. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configuration methods There are two primary methods for configuring your IX20 device: n Web interface. The web interface can be accessed in two ways: l Central management using the Digi Remote Manager, a cloud-based device management and data enablement platform that allows you to connect any device to any application, anywhere. With the Remote Manager, you can configure your IX20 device and use the configuration as a basis for a profile which can be applied to other similar devices. See Using Digi Remote Manager for more information about using the Remote Manager to manage and configure your IX20 device. l The local web interface. See Using the web interface for more information about using the local web interface to manage and configure your IX20 device. Web-based instructions in this guide are applicable to both the Remote Manager and the local web interface. n Command line. A robust command line allows you to perform all configuration and management tasks from within a command shell. Both the Remote Manager and the local web interface also have the option to open a terminal emulator for executing commands on your IX20 device. See Using the command line for more information about using the command line to manage and configure your IX20 device. In this guide, task topics show how to perform tasks: WebUI Shows how to perform a task by using the local web interface. Command line Shows how to perform a task by using the command line interface. Using Digi Remote Manager By default, your IX20 device is configured to use Digi Remote Manager as its central management server. No configuration changes are required to begin using the Remote Manager. For information about configuring central management for your IX20 device, see Central management . Access Digi Remote Manager To access Digi Remote Manager: 1. If you have not already done so, go to https://myaccount.digi.com/ to sign up for a Digi Remote Manager account. IX20 User Guide 45 Configuration and management Using the web interface Check your email for Digi Remote Manager login instructions. 2. Go to remotemanager.digi.com. 1. Enter your username and password. The Digi Remote Manager Dashboard appears. Using the web interface To connect to the IX20 local WebUI: 1. Use an Ethernet cable to connect the IX20's ETH2 port to a laptop or PC. 2. Open a browser and go to 192.168.2.1. The device is also accessible at the default IP address of 192.168.210.1. However, because this IP address does not use a DHCP server, to connect to this address you must configure your local PC with an appropriate static IP address (for example, 192.168.210.2). 3. Log into the device using a configured user name and password. The default user name is admin and the default password is the unique password printed on the label packaged with your device. After logging in, the local web admin dashboard is displayed. The dashboard shows the current state of the device. Dashboard area Network activity Digi Remote Manager Device Network Interfaces Modems Description Summarizes network statistics: the total number of bytes sent and received over all configured bridges and Ethernet devices. Displays the device connection status for Digi Remote Manager, the amount of time the connection has been up, and the Digi Remote Manager device ID. See Using Digi Remote Manager. Displays the IX20 device's status, statistics, and identifying information. Displays the status of the network interfaces configured on the device. Provides information about the signal strength and technology of the cellular modem (s). IX20 User Guide 46 Configuration and management Log out of the web interface n On the main menu, click your user name. Click Log out. Using the web interface IX20 User Guide 47 Configuration and management Using the command line Using the command line The Digi IX20 device provides a command-line interface that you can use to configure the device, display status and statistics, update firmware, and manage device files. See Command line interface for detailed instructions on using the command line interface and see Command line reference for information on available commands. Access the command line interface You can access the IX20 command line interface using an SSH connection, a telnet connection, or a serial connection. You can use an open-source terminal software, such as PuTTY or TeraTerm, to access the device through one of these mechanisms. You can also access the command line interface in the WebUI by using the Terminal, or the Digi Remote Manager by using the Console. To access the command line, your device must be configured to allow access, and you must log in as a user who has been configured for the appropriate access. For further information about configuring access to these services, see: n Serial: Configure the serial port n WebUI: Configure the web administration service n SSH: Configure SSH access n Telnet: Configure telnet access Log in to the command line interface Command line 1. Connect to the IX20 device by using a serial connection, SSH or telnet, or the Terminal in the WebUI or the Console in the Digi Remote Manager. See Access the command line interface for more information. n For serial connections, the default configuration is: l 115200 baud rate l 8 data bits l no parity l 1 stop bit l no flow control n For SSH and telnet connections, the default IP address of the device is 192.168.2.1 on the . The device is also accessible at the default IP address of 192.168.210.1. However, because this IP address does not use a DHCP server, to connect to this address you must configure your local PC with an appropriate static IP address (for example, 192.168.210.2). IX20 User Guide 48 Configuration and management Exit the command line interface 2. At the login prompt, enter the username and password of a user with Admin access: login: admin Password: ********** The default username is admin. The default unique password for your device is printed on the device label. 3. Depending on the device configuration, you may be presented with another menu, for example: Access selection menu: a: Admin CLI s: Shell q: Quit Select access or quit [admin] : Type a or admin to access the IX20 command line. You will now be connected to the Admin CLI: Connecting now, 'exit' to disconnect from Admin CLI ... > See Command line interface for detailed instructions on using the command line interface. Exit the command line interface Command line 1. At the command prompt, type exit. > exit 2. Depending on the device configuration, you may be presented with another menu, for example: Access selection menu: a: Admin CLI s: Shell q: Quit Select access or quit [admin] : Type q or quit to exit. IX20 User Guide 49 Interfaces IX20 devices have several physical communications interfaces. These interfaces can be bridged in a Local Area Network (LAN) or assigned to a Wide Area Network (WAN). This chapter contains the following topics: Wide Area Networks (WANs) 51 Local Area Networks (LANs) 116 Bridging 145 IX20 User Guide 50 Interfaces Wide Area Networks (WANs) Wide Area Networks (WANs) The IX20 device is preconfigured with one Wide Area Network (WAN), named ETH1, and one Wireless Wide Area Network (WWAN), named Modem. Interface type Wide Area Network (WAN) Preconfigured interfaces n ETH1 Wireless Wide Area Network (WWAN) n Modem Devices n Ethernet: ETH1 n Modem Default configuration n Firewall zone: External n WAN priority: Metric=1 n IP Address: DHCP client n Digi SureLinkTM enabled for IPv4 n Firewall zone: External n WAN priority: Metric=3 n SIM failover after 5 attempts n SureLink enabled for IPv4 You can modify configuration settings for the existing WAN and WWANs, and you can create new WANs and WWANs. This section contains the following topics: Wide Area Networks (WANs) and Wireless Wide Area Networks (WWANs) 52 Configure WAN/WWAN priority and default route metrics 52 WAN/WWAN failover 55 Configure SureLink active recovery to detect WAN/WWAN failures 56 Configure the device to reboot when a failure is detected 63 Disable SureLink 69 Example: Use a ping test for WAN failover from Ethernet to cellular 73 Using Ethernet devices in a WAN 76 Using cellular modems in a Wireless WAN (WWAN) 76 Configure a Wide Area Network (WAN) 96 Configure a Wireless Wide Area Network (WWAN) 103 Show WAN and WWAN status and statistics 112 Delete a WAN or WWAN. 114 IX20 User Guide 51 Interfaces Wide Area Networks (WANs) Wide Area Networks (WANs) and Wireless Wide Area Networks (WWANs) A Wide Area Network (WAN) provides connectivity to the internet or a remote network. A WAN configuration consists of the following: n A physical device, such as an Ethernet device or a cellular modem. n Several networking parameters for the WAN, such as firewall configuration and IPv4 and IPv6 support. n Several parameters controlling failover. Configure WAN/WWAN priority and default route metrics The IX20 device is preconfigured with one Wide Area Network (WAN), named ETH1, and one Wireless Wide Area Network (WWAN), named Modem. You can also create additional WANs and WWANs. When a WAN is initialized, the IX20 device automatically adds a default IP route for the WAN. The priority of the WAN is based on the metric of the default route, as configured in the WAN's IPv4 and IPv6 metric settings. Assigning priority to WANs By default, the IX20 device's WAN (ETH1) is configured with the lowest metric (1), and is therefor the highest priority WAN. By default, the Wireless WAN (Modem) is configured with a metric of 3, which means it has a lower priority than ETH1. You can assign priority to WANs based on the behavior you want to implement for primary and backup WAN interfaces. For example, if you want a cellular connection to be your primary WAN, with an Ethernet interface as backup, configure the metric of the WWAN to be lower than the metric of the WAN. Example: Configure cellular connection as the primary WAN, and the Ethernet connection as backup Required configuration items n Configured WAN and WWAN interfaces. This example uses the preconfigured ETH1 and Modem interfaces. n The metric for each WAN. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 52 Interfaces Wide Area Networks (WANs) 3. Set the metrics for Modem: a. Click Network > Interfaces > Modem > IPv4. b. For Metric, type 1. c. Click IPv6. d. For Metric, type 1. 4. Set the metrics for ETH1: a. Click Network > Interfaces > ETH1 > IPv4. b. For Metric, type 2. c. Click IPv6. d. For Metric, type 2. IX20 User Guide 53 Interfaces Wide Area Networks (WANs) 5. Click Apply to save the configuration and apply the change. The IX20 device is now configured to use the cellular modem WWAN, Modem, as its highest priority WAN, and its Ethernet WAN, ETH1, as its secondary WAN. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Set the metrics for Modem: a. Set the IPv4 metric for Modem to 1. For example: (config)> network interface modem ipv4 metric 1 (config)> b. Set the IPv6 metric for Modem to 1: (config)> network interface modem ipv6 metric 1 (config)> IX20 User Guide 54 Interfaces Wide Area Networks (WANs) 4. Set the metrics for ETH1: a. Set the IPv4 metric for ETH1 to 2: (config)> network interface eth1 ipv4 metric 2 (config)> b. Set the IPv6 metric for ETH1 to 1: (config)> network interface eth1 ipv6 metric 2 (config)> 5. Save the configuration and apply the change: (config)> save Configuration saved. > 6. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. The IX20 device is now configured to use the cellular modem WWAN, Modem, as its highest priority WAN, and its Ethernet WAN, ETH1, as its secondary WAN. WAN/WWAN failover If a connection to a WAN interface is lost for any reason, the IX20 device will immediately fail over to the next WAN or WWAN interface, based on WAN priority. See Configure WAN/WWAN priority and default route metrics for more information about WAN priority. Active vs. passive failure detection There are two ways to detect WAN or WWAN failure: active detection and passive detection. n Active detection uses Digi SureLinkTM technology to send probe tests to a target host or to test the status of the interface. The WAN/WWAN is considered to be down if there are no responses for a configured amount of time. See Configure SureLink active recovery to detect WAN/WWAN failures for more information about active failure detection. n Passive detection involves detecting the WAN going down by monitoring its link status by some means other than active detection. For example, if an Ethernet cable is disconnected or the state of a cellular interface changes from on to off, the WAN is down. Default Digi SureLink configuration Beginning with firmware version 20.2.x, Surelink is enabled by default for IPv4 on all WAN and WWAN interfaces, and is configured to perform two tests on these interfaces: n Interface connectivity. n DNS query to the DNS servers for interface's the network connection. DNS servers are typically received as part of the interface's DHCP client connection, although you can manually configure the DNS servers that will be used by SureLink. IX20 User Guide 55 Interfaces Wide Area Networks (WANs) Note If your device is operating on a private APN or on wired network with firewall restrictions, ensure that the DNS servers on your private network allow DNS lookups for my.devicecloud.com; otherwise, the SureLink DNS query test will fail and the IX20 device will determine that the interface is down. By default, these tests will be performed every 15 minutes, with a response timeout of 15 seconds. If the tests fail three consecutive times, the device will reset the network interface to attempt to recover the connection. Configure SureLink active recovery to detect WAN/WWAN failures Problems can occur beyond the immediate WAN/WWAN connection that prevent some IP traffic from reaching its destination. Normally this kind of problem does not cause the IX20 device to detect that the WAN has failed, because the connection continues to work while the core problem exists somewhere else in the network. Using Digi SureLink, you can configure the IX20 device to regularly probe connections through the WAN to determine if the WAN has failed. Required configuration items n Enable SureLink. SureLink can be enabled for both IPv4 and IPv6 configurations. By default, SureLink is enabled for IPv4 for the preconfigured WAN (ETH1) and WWAN (Modem). It is disabled for IPv6. When SureLink is configured for Wireless WANs, SureLink tests are only run if the cellular modem is connected and has an IP address. Use the SIM failover options to configure the IX20 device to automatically recover the modem in the event that it cannot obtain an IP address. See Configure a Wireless Wide Area Network (WWAN) for details about SIM failover. n The type of probe test to be performed, either: l Ping: Requires the hostname or IP address of the host to be pinged. l DNS query: You can perform a DNS query to a named DNS server, or to the DNS servers configured for the WAN. l HTTP or HTTPS test: Requires the URL of the host to be tested. l Interface status: Determines if the interface has an IP address assigned to it, that the physical link is up, and that a route is present to send traffic out of the network interface. The preconfigured WAN is configured by default to use SureLink to both test the interface status and perform a test DNS query. Additional configuration items n The behavior of the IX20 device upon test failure: l The default behavior, which is to fail over to the next priority WAN/WWAN. l Restart the WAN interface. l Reboot the device. n The interval between connectivity tests. n The number of probe attempts before the WAN is considered to have failed. n The amount of time that the device should wait for a response to a probe attempt before considering it to have failed. IX20 User Guide 56 Interfaces Wide Area Networks (WANs) n If the type of probe test is: l Ping: Configure the number of bytes in the ping packet. l Interface status: Configure the amount of time that the interface is down before it is considered to have failed, and the amount of time it takes to make an initial connection before it is considered down. n Additional test targets. n If more than one test target is configured, determine whether the interface should fail over based on the failure of one of the test targets, or all of the test targets. To configure the IX20 device to regularly probe connections through the WAN: WebUI SureLink can be configured for both IPv4 and IPv6. 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > Interfaces. 4. Create a new WAN or WWAN or select an existing one: n To create a new WAN or WWAN, see Configure a Wide Area Network (WAN) or Configure a Wireless Wide Area Network (WWAN). n To edit an existing WAN or WWAN, click to expand the appropriate WAN or WWAN. 5. After creating or selecting the WAN or WWAN, click IPv4 (or IPv6) > SureLink. 6. Enable SureLink. IX20 User Guide 57 Interfaces Wide Area Networks (WANs) SureLink can be enabled for both IPv4 and IPv6 configurations. By default, SureLink is enabled for IPv4 for the preconfigured WAN (ETH1) and WWAN (Modem). It is disabled for IPv6. When SureLink is configured for Wireless WANs, SureLink tests are only run if the cellular modem is connected and has an IP address. Use the SIM failover options to configure the IX20 device to automatically recover the modem in the event that it cannot obtain an IP address. See Configure a Wireless Wide Area Network (WWAN) for details about SIM failover. 7. Click to expand Test targets. 8. For Add Test Target, click . 9. Select the Test type: n Ping test: Tests connectivity by sending an ICMP echo request to the hostname or IP address specified in Ping host. You can also optionally change the number of bytes in the Ping payload size. n DNS test: Tests connectivity by sending a DNS query to the specified DNS server. n HTTP test: Tests connectivity by sending an HTTP or HTTPS GET request to the URL specified in Web servers. The URL should take the format of http[s]://hostname/ [path]. n Test DNS servers configured for this interface: Tests connectivity by sending a DNS query to the DNS servers configured for this interface. n Test the interface status: The interface is considered to be down based on: l Down time: The amount of time that the interface can be down before this test is considered to have failed. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Down time to ten minutes, enter 10m or 600s. The default is 60 seconds. l Initial connection time: The amount of time to wait for an initial connection to the interface before this test is considered to have failed. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Initial connection time to ten minutes, enter 10m or 600s. The default is 60 seconds. 10. Optional active recovery configuration parameters: a. For Restart interface, enable to configure the device to restart the interface when its connection is considered to have failed. This is useful for interfaces that may regain connectivity after restarting, such as a cellular modem. b. For Reboot device, enable to instruct the device to reboot when the WAN connection is considered to have failed. Note If both the Restart interface and Reboot device parameters are enabled, the Reboot device parameter takes precedence. IX20 User Guide 58 Interfaces Wide Area Networks (WANs) c. Change the Interval between connectivity tests. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Interval to ten minutes, enter 10m or 600s. The default is 15 minutes. d. If more than one test target is configured, for Success condition, determine whether the interface should fail over based on the failure of one of the test targets, or all of the test targets. e. For Attempts, type the number of probe attempts before the WAN is considered to have failed. f. For Response timeout, type the amount of time that the device should wait for a response to a probe attempt before considering it to have failed. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Response timeout to ten minutes, enter 10m or 600s. The default is 15 seconds. 11. (Optional) Repeat this procedure for IPv6. 12. Click Apply to save the configuration and apply the change. Command line Active recovery can be configured for both IPv4 and IPv6. These instructions are for IPv4; to configure IPv6 active recovery, replace ipv4 in the command line with ipv6. 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Create a new WAN or WWAN, or edit an existing one: n To create a new WAN or WWAN, see Configure a Wide Area Network (WAN) or Configure a Wireless Wide Area Network (WWAN). n To edit an existing WAN or WWAN, change to the WAN or WWAN's node in the configuration schema. For example, for a WAN or WWAN named my_wan, change to the my_wan node in the configuration schema: (config)> network interface my_wan (config network interface my_wan)> IX20 User Guide 59 Interfaces Wide Area Networks (WANs) 4. Enable SureLink. SureLink can be enabled for both IPv4 and IPv6 configurations. By default, SureLink is enabled for IPv4 for the preconfigured WAN (eth1) and WWAN (modemwwan2). It is disabled for IPv6. When SureLink is configured for Wireless WANs, SureLink tests are only run if the cellular modem is connected and has an IP address. Use the SIM failover options to configure the IX20 device to automatically recover the modem in the event that it cannot obtain an IP address. See Configure a Wireless Wide Area Network (WWAN) for details about SIM failover. (config network interface my_wan> ipv4 surelink enable true (config network interface my_wan)> 5. Add a test target: (config network interface my_wan)> add ipv4 surelink target end (config network interface my_wan ipv4 surelink target 0)> 6. Set the test type: (config network interface my_wan ipv4 surelink target 0)> test value (config network interface my_wan ipv4 surelink target 0)> where value is one of: n ping: Tests connectivity by sending an ICMP echo request to a specified hostname or IP address. l Specify the hostname or IP address: (config network interface my_wan ipv4 surelink target 0)> ping_ host host (config network interface my_wan ipv4 surelink target 0)> l (Optional) Set the size, in bytes, of the ping packet: (config network interface my_wan ipv4 surelink target 0)> ping_ size [num] (config network interface my_wan ipv4 surelink target 0)> n dns: Tests connectivity by sending a DNS query to the specified DNS server. l Specify the DNS server. Allowed value is the IP address of the DNS server. (config network interface my_wan ipv4 surelink target 0)> dns_ server ip_address (config network interface my_wan ipv4 surelink target 0)> n dns_configured: Tests connectivity by sending a DNS query to the DNS servers configured for this interface. n http: Tests connectivity by sending an HTTP or HTTPS GET request to the specified URL. l Specify the url: IX20 User Guide 60 Interfaces Wide Area Networks (WANs) (config network interface my_wan ipv4 surelink target 0)> http_url value (config network interface my_wan ipv4 surelink target 0)> where value uses the format http[s]://hostname/[path] n interface_up: The interface is considered to be down based on the interfaces down time, and the amount of time an initial connection to the interface takes before this test is considered to have failed. l (Optional) Set the amount of time that the interface can be down before this test is considered to have failed: (config network interface my_wan ipv4 surelink target 0)> interface_down_time value (config network interface my_wan ipv4 surelink target 0)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set interface_down_time to ten minutes, enter either 10m or 600s: (config network interface my_wan ipv4 surelink target 0)> interface_down_time 600s (config network interface my_wan ipv4 surelink target 0)> The default is 60 seconds. l (Optional) Set the amount of time to wait for an initial connection to the interface before this test is considered to have failed: (config network interface my_wan ipv4 surelink target 0)> interface_timeout value (config network interface my_wan ipv4 surelink target 0)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set interface_timeout to ten minutes, enter either 10m or 600s: (config network interface my_wan ipv4 surelink target 0)> interface_timeout 600s (config network interface my_wan ipv4 surelink target 0)> The default is 60 seconds. (Optional) Repeat to add additional test targets. 7. Optional active recovery configuration parameters: a. Move back two levels in the configuration by typing .. ..: (config network interface my_wan ipv4 surelink target 0)> .. .. (config network interface my_wan ipv4 surelink> b. To configure the device to restart the interface when its connection is considered to have failed: IX20 User Guide 61 Interfaces Wide Area Networks (WANs) (config network interface my_wan ipv4 surelink)> restart enable (config network interface my_wan ipv4 surelink> This is useful for interfaces that may regain connectivity after restarting, such as a cellular modem. c. To configure the device to reboot when the interface is considered to have failed: (config network interface my_wan ipv4 surelink)> reboot enable (config network interface my_wan ipv4 surelink> Note If both the restart and reboot parameters are enabled, the reboot parameter takes precedence. d. Set the Interval between connectivity tests: (config network interface my_wan ipv4 surelink)> interval value (config network interface my_wan ipv4 surelink> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set interval to ten minutes, enter either 10m or 600s: (config network interface my_wan ipv4 surelink)> interval 600s (config network interface my_wan ipv4 surelink)> The default is 15 minutes. e. If more than one test target is configured, determine whether the interface should fail over based on the failure of one of the test targets, or all of the test targets: (config network interface my_wan ipv4 surelink)> success_condition value (config network interface my_wan ipv4 surelink> Where value is either one or all. f. Set the number of probe attempts before the WAN is considered to have failed: (config network interface my_wan ipv4 surelink)> attempts num (config network interface my_wan ipv4 surelink> The default is 3. g. Set the amount of time that the device should wait for a response to a probe attempt before considering it to have failed: (config network interface my_wan ipv4 surelink)> timeout value (config network interface my_wan ipv4 surelink> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set timeout to ten minutes, enter either 10m or 600s: IX20 User Guide 62 Interfaces Wide Area Networks (WANs) (config network interface my_wan ipv4 surelink)> timeout 600s (config network interface my_wan ipv4 surelink)> The default is 15 seconds. 8. (Optional) Repeat this procedure for IPv6. 9. Save the configuration and apply the change: (config network interface my_wan ipv4 surelink)> save Configuration saved. > 10. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure the device to reboot when a failure is detected Using SureLink, you can configure the IX20 device to reboot when it has determined that an interface has failed. Required configuration items n Enable SureLink. SureLink can be enabled for both IPv4 and IPv6 configurations. By default, SureLink is enabled for IPv4 for the preconfigured WAN (ETH1) and WWAN (Modem). It is disabled for IPv6. When SureLink is configured for Wireless WANs, SureLink tests are only run if the cellular modem is connected and has an IP address. Use the SIM failover options to configure the IX20 device to automatically recover the modem in the event that it cannot obtain an IP address. See Configure a Wireless Wide Area Network (WWAN) for details about SIM failover. n Enable device reboot upon interface failure. n The type of probe test to be performed, either: l Ping: Requires the hostname or IP address of the host to be pinged. l DNS query: You can perform a DNS query to a named DNS server, or to the DNS servers configured for the WAN. l HTTP or HTTPS test: Requires the URL of the host to be tested. l Interface status: Determines if the interface has an IP address assigned to it, that the physical link is up, and that a route is present to send traffic out of the network interface. Additional configuration items n See Configure SureLink active recovery to detect WAN/WWAN failures for optional SureLink configuration parameters. To configure the IX20 device to reboot when an interface has failed: WebUI SureLink can be configured for both IPv4 and IPv6. IX20 User Guide 63 Interfaces Wide Area Networks (WANs) 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > Interfaces. 4. Create a new interface or select an existing one: n To create a new interface, see Configure a LAN, Configure a Wide Area Network (WAN), or Configure a Wireless Wide Area Network (WWAN). n To edit an existing interface, click to expand the appropriate interface. 5. After creating or selecting the interface, click IPv4 (or IPv6) > SureLink. 6. Enable SureLink. SureLink can be enabled for both IPv4 and IPv6 configurations. By default, SureLink is enabled for IPv4 for the preconfigured WAN (ETH1) and WWAN (Modem). It is disabled for IPv6. When SureLink is configured for Wireless WANs, SureLink tests are only run if the cellular modem is connected and has an IP address. Use the SIM failover options to configure the IX20 device to automatically recover the modem in the event that it cannot obtain an IP address. See Configure a Wireless Wide Area Network (WWAN) for details about SIM failover. 7. Enable Reboot device. Note If both the Restart interface and Reboot device parameters are enabled, the Reboot device parameter takes precedence. 8. Click to expand Test targets. IX20 User Guide 64 Interfaces 9. For Add Test Target, click . Wide Area Networks (WANs) 10. Select the Test type: n Ping test: Tests connectivity by sending an ICMP echo request to the hostname or IP address specified in Ping host. You can also optionally change the number of bytes in the Ping payload size. n DNS test: Tests connectivity by sending a DNS query to the specified DNS server. n HTTP test: Tests connectivity by sending an HTTP or HTTPS GET request to the URL specified in Web servers. The URL should take the format of http[s]://hostname/ [path]. n Test DNS servers configured for this interface: Tests connectivity by sending a DNS query to the DNS servers configured for this interface. n Test the interface status: The interface is considered to be down based on: l Down time: The amount of time that the interface can be down before this test is considered to have failed. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Down time to ten minutes, enter 10m or 600s. The default is 60 seconds. l Initial connection time: The amount of time to wait for an initial connection to the interface before this test is considered to have failed. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Initial connection time to ten minutes, enter 10m or 600s. The default is 60 seconds. 11. Optional active recovery configuration parameters: a. Change the Interval between connectivity tests. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Interval to ten minutes, enter 10m or 600s. The default is 15 minutes. b. If more than one test target is configured, for Success condition, determine whether the interface should fail over based on the failure of one of the test targets, or all of the test targets. c. For Attempts, type the number of probe attempts before the WAN is considered to have failed. d. For Response timeout, type the amount of time that the device should wait for a response to a probe attempt before considering it to have failed. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Response timeout to ten minutes, enter 10m or 600s. IX20 User Guide 65 Interfaces The default is 15 seconds. 12. (Optional) Repeat this procedure for IPv6. 13. Click Apply to save the configuration and apply the change. Wide Area Networks (WANs) Command line Active recovery can be configured for both IPv4 and IPv6. These instructions are for IPv4; to configure IPv6 active recovery, replace ipv4 in the command line with ipv6. 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Create a new interface, or edit an existing one: n To create a new interface, see Configure a LAN, Configure a Wide Area Network (WAN), or Configure a Wide Area Network (WAN) or Configure a Wireless Wide Area Network (WWAN). n To edit an existing interface, change to the interface's node in the configuration schema. For example, for a interface named my_wan, change to the my_wan node in the configuration schema: (config)> network interface my_wan (config network interface my_wan)> 4. Enable SureLink. SureLink can be enabled for both IPv4 and IPv6 configurations. By default, SureLink is enabled for IPv4 for the preconfigured WAN (eth1) and WWAN (modemwwan2). It is disabled for IPv6. When SureLink is configured for Wireless WANs, SureLink tests are only run if the cellular modem is connected and has an IP address. Use the SIM failover options to configure the IX20 device to automatically recover the modem in the event that it cannot obtain an IP address. See Configure a Wireless Wide Area Network (WWAN) for details about SIM failover. (config network interface my_wan> ipv4 surelink enable true (config network interface my_wan)> 5. Set the device to reboot when the interface is considered to have failed: (config network interface my_wan ipv4 surelink)> reboot true (config network interface my_wan ipv4 surelink> IX20 User Guide 66 Interfaces Wide Area Networks (WANs) Note If both the restart and reboot parameters are enabled, the reboot parameter takes precedence. 6. Add a test target: (config network interface my_wan)> add ipv4 surelink target end (config network interface my_wan ipv4 surelink target 0)> 7. Set the test type: (config network interface my_wan ipv4 surelink target 0)> test value (config network interface my_wan ipv4 surelink target 0)> where value is one of: n ping: Tests connectivity by sending an ICMP echo request to a specified hostname or IP address. l Specify the hostname or IP address: (config network interface my_wan ipv4 surelink target 0)> ping_ host host (config network interface my_wan ipv4 surelink target 0)> l (Optional) Set the size, in bytes, of the ping packet: (config network interface my_wan ipv4 surelink target 0)> ping_ size [num] (config network interface my_wan ipv4 surelink target 0)> n dns: Tests connectivity by sending a DNS query to the specified DNS server. l Specify the DNS server. Allowed value is the IP address of the DNS server. (config network interface my_wan ipv4 surelink target 0)> dns_ server ip_address (config network interface my_wan ipv4 surelink target 0)> n dns_configured: Tests connectivity by sending a DNS query to the DNS servers configured for this interface. n http: Tests connectivity by sending an HTTP or HTTPS GET request to the specified URL. l Specify the url: (config network interface my_wan ipv4 surelink target 0)> http_url value (config network interface my_wan ipv4 surelink target 0)> where value uses the format http[s]://hostname/[path] n interface_up: The interface is considered to be down based on the interfaces down time, and the amount of time an initial connection to the interface takes before this test is considered to have failed. l (Optional) Set the amount of time that the interface can be down before this test is considered to have failed: IX20 User Guide 67 Interfaces Wide Area Networks (WANs) (config network interface my_wan ipv4 surelink target 0)> interface_down_time value (config network interface my_wan ipv4 surelink target 0)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set interface_down_time to ten minutes, enter either 10m or 600s: (config network interface my_wan ipv4 surelink target 0)> interface_down_time 600s (config network interface my_wan ipv4 surelink target 0)> The default is 60 seconds. l (Optional) Set the amount of time to wait for an initial connection to the interface before this test is considered to have failed: (config network interface my_wan ipv4 surelink target 0)> interface_timeout value (config network interface my_wan ipv4 surelink target 0)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set interface_timeout to ten minutes, enter either 10m or 600s: (config network interface my_wan ipv4 surelink target 0)> interface_timeout 600s (config network interface my_wan ipv4 surelink target 0)> The default is 60 seconds. (Optional) Repeat to add additional test targets. 8. Optional active recovery configuration parameters: a. Move back two levels in the configuration by typing .. ..: (config network interface my_wan ipv4 surelink target 0)> .. .. (config network interface my_wan ipv4 surelink> b. Set the Interval between connectivity tests: (config network interface my_wan ipv4 surelink)> interval value (config network interface my_wan ipv4 surelink> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set interval to ten minutes, enter either 10m or 600s: (config network interface my_wan ipv4 surelink)> interval 600s (config network interface my_wan ipv4 surelink)> The default is 15 minutes. IX20 User Guide 68 Interfaces Wide Area Networks (WANs) c. If more than one test target is configured, determine whether the interface should fail over based on the failure of one of the test targets, or all of the test targets: (config network interface my_wan ipv4 surelink)> success_condition value (config network interface my_wan ipv4 surelink> Where value is either one or all. d. Set the number of probe attempts before the WAN is considered to have failed: (config network interface my_wan ipv4 surelink)> attempts num (config network interface my_wan ipv4 surelink> The default is 3. e. Set the amount of time that the device should wait for a response to a probe attempt before considering it to have failed: (config network interface my_wan ipv4 surelink)> timeout value (config network interface my_wan ipv4 surelink> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set timeout to ten minutes, enter either 10m or 600s: (config network interface my_wan ipv4 surelink)> timeout 600s (config network interface my_wan ipv4 surelink)> The default is 15 seconds. 9. (Optional) Repeat this procedure for IPv6. 10. Save the configuration and apply the change: (config network interface my_wan ipv4 surelink)> save Configuration saved. > 11. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Disable SureLink If your device uses a private APN with no Internet access, or your device has a restricted wired WAN connection that doesn't allow DNS resolution, follow this procedure to disable the default SureLink connectivity tests. You can also disable DNS lookup or other internet activity, while retaining the SureLink interface test. WebUI IX20 User Guide 69 Interfaces Wide Area Networks (WANs) 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > Interfaces. 4. Select the appropriate WAN or WWAN on which SureLink should be disabled.. 5. After selecting the WAN or WWAN, click IPv4 > SureLink. 6. Toggle off Enable to disable SureLink. 7. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Change to the WAN or WWAN's node in the configuration schema. For example, to disable SureLink for the Modem interface: IX20 User Guide 70 Interfaces Wide Area Networks (WANs) (config)> network interface modem (config network interface modem)> 4. Disable SureLink: (config network interface modem> ipv4 surelink enable false (config network interface modem)> 5. Save the configuration and apply the change: (config network interface my_wwan ipv4 surelink)> save Configuration saved. > 6. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Disable DNS lookup Alternatively, you can disable DNS lookup or other internet activity for device that use a private APN with no Internet access, or that have restricted wired WAN connections that do not allow DNS resolution, while retaining the SureLink interface test. The SureLink interface test determines if the interface has an IP address assigned to it, that the physical link is up, and that a route is present to send traffic out of the network interface. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > Interfaces. 4. Select the appropriate WAN or WWAN on which SureLink should be disabled.. IX20 User Guide 71 Interfaces 5. After selecting the WAN or WWAN, click IPv4 > SureLink. Wide Area Networks (WANs) 6. Click to expand Test targets. 7. Click to expand the second test target. This test target has its Test type set to Test DNS servers configured for this interface. 8. Click the menu icon (...) next to the target and select Delete. 9. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Change to the WAN or WWAN's node in the configuration schema. For example, to disable SureLink for the Modem interface: (config)> network interface modem (config network interface modem)> IX20 User Guide 72 Interfaces Wide Area Networks (WANs) 4. Determine the index number of the target: (config network interface modem)> show ipv4 surelink target 0 interface_down_time 600s interface_timeout 120s test interface_up 1 test dns_configured (config network interface modem)> 5. Delete the target: (config network interface modem> del ipv4 surelink target 1 (config network interface modem)> 6. Save the configuration and apply the change: (config network interface my_wwan ipv4 surelink)> save Configuration saved. > 7. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Example: Use a ping test for WAN failover from Ethernet to cellular In this example configuration, the ETH1 interface serves as the primary WAN, while the cellular Modem interface serves as the backup WAN. In this example configuration, SureLink is used over for the ETH1 interface to send a probe packet of size 256 bytes to the IP host 43.66.93.111 every 10 seconds. If there are three consecutive failed responses, the IX20 device brings the ETH1 interface down and starts using the Modem interface. It continues to regularly test the connection to ETH1, and when tests on ETH1 succeed, the device falls back to ETH1. To achieve this WAN failover from the ETH1 to the Modem interface, the WAN failover configuration is: WebUI IX20 User Guide 73 Interfaces Wide Area Networks (WANs) 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Configure active recovery on ETH1: a. Click Network > Interface > ETH1 > IPv4 > SureLink. b. For Interval, type 10s. c. Click to expand Test targets. d. Delete the existing test targets: Click the menu icon (...) next to each target and select Delete. e. For Add Test Target, click . f. For Test type, select Ping test. g. For Ping host, type 43.66.93.111. IX20 User Guide 74 Interfaces h. For Ping payload size, type 256. Wide Area Networks (WANs) 4. Repeat the above step for Modem to enable SureLink on that interface. 5. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Configure SureLink on ETH1: a. Set the interval to ten seconds: (config)> network interface eth1 ipv4 surelink interval 10s (config)> b. Delete the existing test targets: (config network interface eth1> del ipv4 surelink target 0 (config network interface eth1> del ipv4 surelink target 1 (config network interface eth1)> c. Add a test target: (config)> add network interface eth1 ipv4 surelink target end (config network interface eth1 ipv4 surelink target 0)> d. Set the probe type to ping: (config network interface eth1 ipv4 surelink target 0)> test ping (config network interface eth1 ipv4 surelink target 0)> e. Set the packet size to 256 bytes: (config network interface eth1 ipv4 surelink target 0)> ping_size 256 (config network interface eth1 ipv4 surelink target 0)> IX20 User Guide 75 Interfaces Wide Area Networks (WANs) f. Set the host to ping: (config network interface eth1 ipv4 surelink target 0)> ping_host 43.66.93.111 (config network interface eth1 ipv4 surelink target 0)> 1. Repeat the above step for the cellular Modem (modem) interface to enable SureLink on that interface. 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Using Ethernet devices in a WAN The IX20 device has Ethernet devices, named ETH1 ETH2. You can use these Ethernet interfaces as a WAN when connecting to the Internet, through a device such as a cable modem: By default, the WAN/ETH1 Ethernet device is configured as a WAN, named ETH1, with both DHCP and NAT enabled and using the External firewall zone. This means you should be able to connect to the Internet by connecting the WAN/ETH1 Ethernet port to another device that already has an internet connection. Using cellular modems in a Wireless WAN (WWAN) The IX20 supports one cellular modem, named Modem, which is included in a preconfigured Wireless WAN, also named Modem. The cellular modem can have only one active SIM slot at any one time. For example, Modem can have either SIM1 or SIM2 up at one time. Typically, you configure SIM1 of the cellular modem as the primary cellular interface, and SIM2 as the backup cellular interface. In this way, if the IX20 device cannot connect to the network using SIM1, it automatically fails over to SIM2. IX20 devices automatically use the correct cellular module firmware for each carrier when switching SIMs. Configure cellular modem Configuring the IX20's cellular modem involves configuring the following items: IX20 User Guide 76 Interfaces Wide Area Networks (WANs) Required configuration items n Enable the cellular modem. The cellular modem is enabled by default. n Configure the criteria used to determine if this modem configuration applies to the current modem. n Determine the SIM slot that will be used when connecting to the cellular network. n Configure the maximum number of interfaces that can use the modem. n Enable carrier switching, which allows the modem to automatically match the carrier for the active SIM. Carrier switching is enabled by default. n Configure the access technology. n Determine which cellular antennas to use. Additional configuration items n If Active SIM slot is set to Any, determine the preferred SIM slot. In the event of a failover to a non-preferred SIM, or if manual SIM switching is used to switch to a non-preferred SIM, the modem will attempt to reconnect to the SIM in the preferred SIM slot. To configure the modem: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 77 Interfaces 3. Click Network > Modems > Modem. Wide Area Networks (WANs) 4. Modem are enabled by default. Click to toggle Enable to off to disable. 5. For Match modem by, select the matching criteria used to determine if this modem configuration applies to the currently attached modem: n Any modem: Applies this configuration to any modem that is attached. n IMEI: Applies this configuration only to a modem that matches the identified IMEI. l If IMEI is selected, for Match IMEI, type the IMEI of the modem that this configuration should be applied to. n Port: Applies this configuration to a modem attached to the identified physical port. l If Port is selected, for Match Port, select the modem's port. The default is Any modem. 6. For Active SIM slot, select the SIM slot that should be used by the modem, or select Any to use any SIM slot. The default is Any. 7. If Active SIM slot is set to Any, for Preferred SIM slot, select the SIM slot that should be considered the preferred slot for this modem, or select None. In the event of a failover to a non-preferred SIM, or if manual SIM switching is used to switch to a non-preferred SIM, the modem will attempt to reconnect to the SIM in the preferred SIM slot. None is the default. 8. For Maximum number of interfaces, type the number of interfaces that can be configured to use this modem. This is used when using dual-APN SIMs. The default is 1. 9. Enable Carrier switching to allow the modem to automatically match the carrier for the active SIM. Carrier switching is enabled by default. 10. For Access technology, select the type of cellular technology that this modem should use to access the cellular network, or select All technologies to configure the modem to use the best available technology. The default is All technologies. 11. For Antennas, select whether the modem should use the main antenna, the auxiliary antenna, or both the main and auxiliary antennas. 12. Click Apply to save the configuration and apply the change. IX20 User Guide 78 Interfaces Wide Area Networks (WANs) Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Modem configurations are enabled by default. To disable: (config)> network modem modem enable false (config)> 4. Set the matching criteria used to determine if this modem configuration applies to the currently attached modem: (config)> network modem modem match value (config)> where value is one of the following: n any: Applies this configuration to any modem that is attached. n imei: Applies this configuration only to a modem that matches the identified IMEI. l If imei is used, set the IMEI of the modem that this configuration should be applied to: (config)> network modem modem imei value (config)> where value is the IMEI of the modem. n port: Applies this configuration to a modem attached to the identified physical port. l If port is used, set modem's port: a. Determine available ports and correct syntax by using the ?: (config)> network modem modem port ? Match port: The physical port that the modem device is attached to. Format: /device/usb/modem/module Default value: /device/usb/modem/module Current value: /device/usb/modem/module IX20 User Guide 79 Interfaces Wide Area Networks (WANs) (config)> network modem modem port b. Set the port: (config)> network modem modem port /device/usb/modem/module (config)> The default is any. 5. Set the SIM slot that should be used by the modem: (config)> network modem modem sim_slot value (config)> where value is one of the following: n any: Uses either SIM slot. n 1: Uses the first SIM slot. n 2. Uses the second SIM slot. The default is any. 6. If sim_slot is set to any, set the SIM slot that should be considered the preferred slot for this modem: (config)> network modem modem sim_slot_preference value (config)> where value is one of the following: n none: Does not consider either SIM slot to be the preferred slot. n 1: Configures the first SIM slot as the preferred SIM slot. n 2. Configures the second SIM slot as the preferred SIM slot. In the event of a failover to a non-preferred SIM, or if manual SIM switching is used to switch to a non-preferred SIM, the modem will attempt to reconnect to the SIM in the preferred SIM slot. The default is none. 7. Set the maximum number of interfaces. This is used when using dual-APN SIMs. The default is 1. (config)> network modem modem max_intfs int (config)> 8. Carrier switching allows the modem to automatically match the carrier for the active SIM. Carrier switching is enabled by default. To disable: (config)> network modem modem carrier_switch false (config)> 9. Set the type of cellular technology that this modem should use to access the cellular network: (config)> network modem modem access_tech value (config)> IX20 User Guide 80 Interfaces Wide Area Networks (WANs) Available options for value vary depending on the modem type. To determine available options: (config)> network modem modem access_tech ? Access technology: The cellular network technology that the modem may use. Format: 2G 3G 4G 4GM 4GT all Default value: all Current value: all (config)> The default is all, which uses the best available technology. 10. Set whether the modem should use the main antenna, the auxiliary antenna, or both the main and auxiliary antennas: (config)> network modem modem antenna value (config)> where value is one of the following: n main n aux n both 11. Save the configuration and apply the change: (config)> save Configuration saved. > 12. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure cellular modem APNs The IX20 device uses a preconfigured list of Access Point Names (APNs) when attempting to connect to a cellular carrier for the first time. After the device has successfully connected, it will remember the correct APN. As a result, it is generally not necessary to configure APNs. However, you can configure the system to use a specified APN. To configure the APN: WebUI IX20 User Guide 81 Interfaces Wide Area Networks (WANs) 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > Interfaces > Modem > APN list > APN. 4. For APN, type the Access Point Name (APN) to be used when connecting to the cellular carrier. 5. (Optional) IP version: For IP version, select one of the following: n Automatic: Requests both IPv4 and IPv6 address. n IPv4: Requests only an IPv4 address. n IPv6: Requests only an IPv6 address. The default is Automatic. 6. (Optional) Authentication method: For Authentication method, select one of the following: n None: No authentication is required. n Automatic: The device will attempt to connect using CHAP first, and then PAP. n CHAP: Uses the Challenge Handshake Authentication Profile (CHAP) to authenticate. n PAP: Uses the Password Authentication Profile (PAP) to authenticate. If Automatic, CHAP, or PAP is selected, enter the Username and Password required to authenticate. The default is None. IX20 User Guide 82 Interfaces Wide Area Networks (WANs) 7. To add additional APNs, for Add APN, click and repeat the preceding instructions. 8. (Optional) To configure the device to bypass its preconfigured APN list and only use the configured APNs, enable APN list only. 9. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. At the config prompt, type: (config)> network interface modem modem apn 0 apn value (config)> where value is the APN for the SIM card. 4. (Optional) To add additional APNs: a. Use the add command to add a new APN entry. For example: (config)> add network interface modem modem apn end (config network interface modem modem apn 1)> b. Set the value of the APN: (config network interface modem modem apn 1)> apn value (config network interface modem modem apn 1)> where value is the APN for the SIM card. 5. (Optional) Set the IP version: (config)> network interface modem modem apn 0 ip_version version (config)> IX20 User Guide 83 Interfaces Wide Area Networks (WANs) where version is one of the following: n auto: Requests both IPv4 and IPv6 address. n ipv4: Requests only an IPv4 address. n ipv6: Requests only an IPv6 address. The default is auto. 6. (Optional) Set the authentication method: (config)> network interface modem modem apn 0 auth method (config)> where method is one of the following: n none: No authentication is required. n auto: The device will attempt to connect using CHAP first, and then PAP. n chap: Uses the Challenge Handshake Authentication Profile (CHAP) to authenticate. n pap: Uses the Password Authentication Profile (PAP) to authenticate. If auto, chap, or pap is selected, enter the Username and Password required to authenticate: (config)> network interface modem modem apn 0 username name (config)> network interface modem modem apn 0 password pwd (config)> The default is none. 7. (Optional) To configure the device to bypass its preconfigured APN list and only use the configured APNs: (config)> network interface modem modem apn_lock true (config)> 8. Save the configuration and apply the change: (config)> save Configuration saved. > 9. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Show cellular status and statistics You can view a summary status for all cellular modems, or view detailed status and statistics for a specific modem. WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. On the menu, click Status. 3. Under Connections, click Modems. The modem status window is displayed IX20 User Guide 84 Interfaces Wide Area Networks (WANs) Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. Use the show modem command: n To view a status summary for the modem: > show modem Modem ----modem SIM ------------1 (ready) Status --------connected APN --------1234 Signal Strength -------------------Good (-84 dBm) > n To view detailed status and statistics, use the show modem name name command: > show modem name modem modem: [Telit] LM940 --------------------------------------------------------------------- --------- IMEI : 781154796325698 Manufacturer : Telit Model : LM940 FW Version : 24.01.541_ATT Revision : 24.01.541 Status -----State APN Signal Strength Bars Access Mode Temperature IP address (IPv4) Gateway (IPv4) : connected : 1234 : Good (-85 dBm) : 2/5 : 4G : 34C : 10.200.1.2 : 10.200.1.1 SIM --SIM Slot SIM Status IMSI ICCID SIM Provider :1 : ready : 21685216482134 : 26587956542156312312 : AT&T > IX20 User Guide 85 Interfaces Wide Area Networks (WANs) Unlock a SIM card A SIM card can be locked if a user tries to set an invalid PIN for the SIM card too many times. In addition, some cellular carriers require a SIM PIN to be added before the SIM card can be used. If the SIM card is locked, the IX20 device cannot make a cellular connection. Command line To unlock a SIM card: 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the Admin CLI prompt, use the modem command to set a new PIN for the SIM card: > modem puk unlock puk_code new_pin modem_name > For example, to unlock a SIM card in the modem named modem with PUK code 12345678, and set the new SIM PIN to 1234: > modem puk unlock 12345678 1234 modem > 3. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Note If the SIM remains in a locked state after using the unlock command, contact your cellular carrier. Signal strength for 4G cellular connections For 4G connections, the RSRP value determines signal strength. n Excellent: > -90 dBm n Good: -90 dBm to -105 dBm n Fair: -106 dBm to -115 dBm n Poor: -116 dBm to -120 dBm: n No service: < -120 dBm See Show cellular status and statistics for procedures to view this information. Signal strength for 3G and 2G cellular connections For 3G and 2G cellular connections, the current RSSI value determines signal strength. n Excellent: > -70 dBm n Good: -70 dBm to -85 dBm n Fair: -86 dBm to -100 dBm n Poor: < -100 dBm to -109 dBm n No service: -110 dBm IX20 User Guide 86 Interfaces Wide Area Networks (WANs) See Show cellular status and statistics for procedures to view this information. Tips for improving cellular signal strength If the signal strength LEDs or the signal quality for your device indicate Poor or No service, try the following things to improve signal strength: n Move the IX20 device to another location. n Try connecting a different set of antennas, if available. n Purchase a Digi Antenna Extender Kit: l Antenna Extender Kit, 1m l Antenna Extender Kit, 3m AT command access To run AT commands from the IX20 command line: Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the Admin CLI prompt, type modem at-interactive and press Enter. Type n if you do not want exclusive access. This allows you to send AT commands to the device while still allowing the device to connect, disconnect, and/or reconnect to the cellular network. 3. At the Admin CLI prompt, use the modem command to begin an interactive AT command session: > modem at-interactive Do you want exclusive access to the modem? (y/n) [y]: 4. Type n if you do not want exclusive access. This allows you to send AT commands to the device while still allowing the device to connect, disconnect, and/or reconnect to the cellular network. The following is an example interactive AT command: > modem at-interactive Do you want exclusive access to the modem? (y/n) [y]: n Starting terminal access to modem AT commands. Note that the modem is still in operation. To quit enter '~.' ('~~.' if using an ssh client) and press ENTER Connected ati Manufacturer: Sierra Wireless, Incorporated Model: MC7455 Revision: SWI9X30C_02.24.03.00 r6978 CARMD-EV-FRMWR2 2017/03/02 13:36:45 IX20 User Guide 87 Interfaces Wide Area Networks (WANs) MEID: 35907206045169 IMEI: 359072060451693 IMEI SV: 9 FSN: LQ650551070110 +GCAP: +CGSM OK 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure dual APNs Some cellular carriers offer a dual APN feature that allows a SIM card to be provisioned with two separate APNs that can be used simultaneously. For example, Verizon offers this service as its Split Data Routing feature. This feature provides two separate networking paths through a single cellular modem and SIM card, and allows for configurations such as: n Segregating public and private traffic, including policy-based routes to ensure that your internal network traffic always goes through the private connection. n Separation of untrusted Internet traffic from trusted internal network traffic. n Secure connection to internal customer network without using a VPN. n Separate billing structures for public and private traffic. n Site-to-site networking, without the overhead of tunneling for each device. In the following example configuration, all traffic on LAN1 is routed through the public APN to the internet, and all traffic on LAN2 is routed through the private APN to the customer's data center: To accomplish this, we will create separate WWAN interfaces that use the same modem but use different APNs, and then use routing roles to forward traffic to the appropriate WWAN interface. Note Dual-APN connections with the Telit LE910-NAv2 module when using a Verizon SIM are not supported. Using an AT&T SIM with the Telit LE910-NAv2 module is supported. The Telit LE910-NAv2 module is used in the 1002-CM04 CORE modem. WebUI IX20 User Guide 88 Interfaces Wide Area Networks (WANs) 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Increase the maximum number of interfaces allowed for the modem: a. Click Network > Modems > Modem. b. For Maximum number of interfaces, type 2. 4. Create the WWAN interfaces: In this example, we will create two interfaces named WWAN_Public and WWAN_Private. a. Click Network > Interfaces. b. For Add Interface, type WWAN_Public and click . c. For Interface type, select Modem. d. For Zone, select External. e. For Device, select Modem . f. (Optional): Configure the public APN. If the public APN is not configured, the IX20 will attempt to determine the APN. i. Click to expand APN list > APN. ii. For APN, type the public APN for your cellular carrier. IX20 User Guide 89 Interfaces Wide Area Networks (WANs) g. For Add Interface, type WWAN_Private and click . h. For Interface type, select Modem. i. For Zone, select External. j. For Device, select Modem . This should be the same modem selected for the WWAN_Public WWAN. k. Enable APN list only. l. Click to expand APN list > APN. m. For APN, type the private APN provided to you by your cellular carrier. 5. Create the routing policies. For example, to route all traffic from LAN1 through the public APN, and LAN2 through the private APN: IX20 User Guide 90 Interfaces a. Click Network > Routes > Policy-based routing. b. Click the to add a new route policy. Wide Area Networks (WANs) c. For Label, enter Route through public APN. d. For Interface, select Interface: WWAN_Public. e. Configure the source address: i. Click to expand Source address. ii. For Type, select Interface. iii. For Interface, select LAN1. f. Configure the destination address: i. Click to expand Destination address. ii. For Type, select Interface. iii. For Interface, select Interface: WWAN_Public. g. Click the to add another route policy. h. For Label, enter Route through private APN. i. For Interface, select Interface: WWAN_Private. j. Configure the source address: i. Click to expand Source address. ii. For Type, select Interface. iii. For Interface, select LAN2. k. Configure the destination address: i. Click to expand Destination address. ii. For Type, select Interface. IX20 User Guide 91 Interfaces iii. For Interface, select Interface: WWAN_Private. Wide Area Networks (WANs) 6. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Set the maximum number of interfaces for the modem: (config)> network modem modem max_intfs 2 (config)> 4. Create the WWAN interfaces: a. Create the WWANPublic interface: (config)> add network interface WWANPublic (config network interface WWANPublic)> b. Set the interface type to modem: (config network interface WWANPublic)> type modem (config network interface WWANPublic)> c. Set the modem device: (config network interface WWANPublic)> modem device modem (config network interface WWANPublic)> d. (Optional): Set the public APN. If the public APN is not configured, the IX20 will attempt to determine the APN. IX20 User Guide 92 Interfaces Wide Area Networks (WANs) (config network interface WWANPublic)> modem apn public_apn (config network interface WWANPublic)> e. Use to periods (..) to move back one level in the configuration: (config network interface WWANPublic)> .. (config network interface)> f. Create the WWANPrivate interface: (config network interface)> add WWANPrivate (config network interface WWANPrivate)> g. Set the interface type to modem: (config network interface WWANPrivate)> type modem (config network interface WWANPrivate)> h. Set the modem device: (config network interface WWANPrivate)> modem device modem (config network interface WWANPrivate)> i. Enable APN list only: (config network interface WWANPrivate)> apn_lock true (config network interface WWANPrivate)> j. Set the private APN: (config network interface WWANPublic)> modem apn private_apn (config network interface WWANPublic)> 5. Create the routing policies. For example, to route all traffic from LAN1 through the public APN, and LAN2 through the private APN: a. Add a new routing policy: (config)> add network route policy end (config network route policy 0)> b. Set the label that will be used to identify this route policy: (config network route policy 0)> label "Route through public apn" (config network route policy 0)> c. Set the interface: (config network route policy 0)> interface /network/interface/WWANPublic (config network route policy 0)> IX20 User Guide 93 Interfaces Wide Area Networks (WANs) d. Configure the source address: i. Set the source type to interface: (config network route policy 0)> src type interface (config network route policy 0)> ii. Set the interface to LAN1: (config network route policy 0)> src interface LAN1 (config network route policy 0)> e. Configure the destination address: i. Set the type to interface: (config network route policy 0)> dst type interface (config network route policy 0)> ii. Set the interface to WWANPublic : (config network route policy 0)> interface /network/interface/WWANPublic (config network route policy 0)> f. Use to periods (..) to move back one level in the configuration: (config nnetwork route policy 0)> .. (config nnetwork route policy)> g. Add a new routing policy: (config network route policy )> add end (config network route policy 1)> h. Set the label that will be used to identify this route policy: (config network route policy 1)> label "Route through private apn" (config network route policy 1)> i. Set the interface: (config network route policy 1)> interface /network/interface/WWANPrivate (config network route policy 1)> j. Configure the source address: i. Set the source type to interface: (config network route policy 1)> src type interface (config network route policy 1)> IX20 User Guide 94 Interfaces Wide Area Networks (WANs) ii. Set the interface to LAN2: (config network route policy 1)> src interface LAN2 (config network route policy 1)> k. Configure the destination address: i. Set the type to interface: (config network route policy 1)> dst type interface (config network route policy 1)> ii. Set the interface to WWANPrivate : (config network route policy 1)> interface /network/interface/WWANPrivate (config network route policy 1)> 6. Save the configuration and apply the change: (config network route policy 1)> save Configuration saved. > 7. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 95 Interfaces Wide Area Networks (WANs) Configure a Wide Area Network (WAN) Configuring a Wide Area Network (WAN) involves configuring the following items: Required configuration items n The interface type: Ethernet. n The firewall zone: External. n The network device or bridge that is used by the WAN. n Configure the WAN as a DHCP client. Additional configuration items n Additional IPv4 configuration: l The metric for IPv4 routes associated with the WAN. l The relative weight for IPv4 routes associated with the WAN. l The IPv4 management priority of the WAN. The active interface with the highest management priority will have its address reported as the preferred contact address for central management and direct device access. l The IPv4 Maximum Transmission Unit (MTU) of the WAN. l When to use DNS servers for this interface. l Whether to include the IX20 device's hostname in DHCP requests. l SureLink active recovery configuration. See Configure SureLink active recovery to detect WAN/WWAN failures for further information. n IPv6 configuration: l The metric for IPv6 routes associated with the WAN. l The relative weight for IPv6 routes associated with the WAN. l The IPv6 management priority of the WAN. The active interface with the highest management priority will have its address reported as the preferred contact address for central management and direct device access. l The IPv6 Maximum Transmission Unit (MTU) of the WAN. l When to use DNS servers for this interface. l Whether to include the IX20 device's hostname in DHCP requests. l Active recovery configuration. See Configure SureLink active recovery to detect WAN/WWAN failures for further information. n MAC address blacklist and whitelist. To create a new WAN or edit an existing WAN: WebUI IX20 User Guide 96 Interfaces Wide Area Networks (WANs) 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > Interfaces. 4. Create the WAN or select an existing WAN: n To create a new WAN, for Add interface, type a name for the WAN and click . n To edit an existing WAN, click to expand the WAN. The Interface configuration window is displayed. New WANs are enabled by default. To disable, click Enable. 5. For Interface type, leave at the default setting of Ethernet. 6. For Zone, select External. 7. For Device, select an Ethernet device, a Wi-Fi client, or a bridge. See Bridging for more information about bridging. 8. Configure IPv4 settings: a. Click to expand IPv4. IPv4 support is enabled by default. b. For Type, select DHCP address. IX20 User Guide 97 Interfaces Wide Area Networks (WANs) c. Optional IPv4 configuration items: i. Set the Metric. See Configure WAN/WWAN priority and default route metrics for further information about metrics. ii. For Weight, type the relative weight for default routes associated with this interface. For multiple active interfaces with the same metric, Weight is used to load balance traffic to the interfaces. iii. Set the Management priority. This determines which interface will have priority for central management activity. The interface with the highest number will be used. iv. Set the MTU. v. For Use DNS, select one of the following: n Always: DNS will always be used for this WAN; when multiple interfaces have the same DNS server, the interface with the lowest metric will be used for DNS requests. n When primary default route: Only use the DNS servers provided for this interface when the interface is the primary route. n Never: Never use DNS servers for this interface. vi. Enable DHCP Hostname to instruct the IX20 device to include the device's system name with DHCP requests as the Client FQDN option. The DHCP server can then be configured to register the device's hostname and IP address with an associated DNS server. n See RFC4702 for further information about DHCP server support for the Client FQDN option. n See Configure system information for information about setting the IX20 device's system name. d. See Configure SureLink active recovery to detect WAN/WWAN failures for information about configuring Active recovery. 9. (Optional) Configure IPv6 settings: a. Click to expand IPv6. b. Enable IPv6 support. c. For Type, select DHCPv6 address. d. For Prefix length, type the minimum length of the prefix to assign to this LAN. If the minimum length is not available, then a longer prefix will be used. e. For Prefix ID, type the identifier used to extend the prefix to the assigned length. Leave blank to use a random identifier. f. Set the Metric. See Configure WAN/WWAN priority and default route metrics for further information about metrics. g. For Weight, type the relative weight for default routes associated with this interface. For multiple active interfaces with the same metric, Weight is used to load balance traffic to the interfaces. h. Set the Management priority. This determines which interface will have priority for central management activity. The interface with the highest number will be used. IX20 User Guide 98 Interfaces Wide Area Networks (WANs) i. Set the MTU. j. For Use DNS: n Always: DNS will always be used for this WAN; when multiple interfaces have the same DNS server, the interface with the lowest metric will be used for DNS requests. n When primary default route: Only use the DNS servers provided for this interface when the interface is the primary route. n Never: Never use DNS servers for this interface. k. Enable DHCP Hostname to instruct the IX20 device to include the device's system name with DHCP requests as the Client FQDN option. The DHCP server can then be configured to register the device's hostname and IP address with an associated DNS server. n See RFC4702 for further information about DHCP server support for the Client FQDN option. n See Configure system information for information about setting the IX20 device's system name. 10. (Optional) Click to expand MAC address blacklist. Incoming packets will be dropped from any devices whose MAC addresses is included in the MAC address blacklist. a. Click to expand MAC address blacklist. b. For Add MAC address, click . c. Type the MAC address. 11. (Optional) Click to expand MAC address whitelist. If there whitelist entries are specified, incoming packets will only be accepted from the listed MAC addresses. a. Click to expand MAC address whitelist. b. For Add MAC address, click . c. Type the MAC address. 12. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> IX20 User Guide 99 Interfaces Wide Area Networks (WANs) 3. Create a new WAN or edit an existing one: n To create a new WAN named my_wan: (config)> add network interface my_wan (config network interface my_wan)> n To edit an existing WAN named my_wan, change to the my_wan node in the configuration schema: (config)> network interface my_wan (config network interface my_wan)> 4. Set the appropriate firewall zone: (config network interface my_wan)> zone zone (config network interface my_wan)> See Firewall configuration for further information. 5. Select an Ethernet device, a Wi-Fi device, or a bridge. See Bridging for more information about bridging. a. Enter device ? to view available devices and the proper syntax. (config network interface my_wan)> device ? Device: The network device used by this network interface. Format: /network/device/eth1 /network/device/eth2 /network/device/loopback /network/bridge/lan /network/wireless/ap/digi_ap Current value: (config network interface my_wan)> device b. Set the device for the LAN: (config network interface my_wan)> device device (config network interface my_wan)> 6. Configure IPv4 settings: n IPv4 support is enabled by default. To disable: (config network interface my_wan)> ipv4 enable false (config network interface my_wan)> n Configure the WAN to be a DHCP client: (config network interface my_wan)> ipv4 type dhcp (config network interface my_wan)> IX20 User Guide 100 Interfaces Wide Area Networks (WANs) a. Optional IPv4 configuration items: i. Set the IP metric: (config network interface my_wan)> ipv4 metric num (config network interface my_wan)> See Configure WAN/WWAN priority and default route metrics for further information about metrics. ii. Set the relative weight for default routes associated with this interface. For multiple active interfaces with the same metric, the weight is used to load balance traffic to the interfaces. (config network interface my_wan)> ipv4 weight num (config network interface my_wan)> iii. Set the management priority. This determines which interface will have priority for central management activity. The interface with the highest number will be used. (config network interface my_wan)> ipv4 mgmt num (config network interface my_wan)> iv. Set the MTU: (config network interface my_wan)> ipv4 mtu num (config network interface my_wan)> v. Configure how to use DNS: (config network interface my_wan)> ipv4 use_dns value (config network interface my_wan)> where value is one of: n always: DNS will always be used for this WAN; when multiple interfaces have the same DNS server, the interface with the lowest metric will be used for DNS requests. n primary: Only use the DNS servers provided for this interface when the interface is the primary route. n never: Never use DNS servers for this interface. vi. Enable DHCP Hostname to instruct the IX20 device to include the device's system name with DHCP requests as the Client FQDN option. The DHCP server can then be configured to register the device's hostname and IP address with an associated DNS server. (config network interface my_wan)> ipv4 dhcp_hostname true (config network interface my_wan)> n See RFC4702 for further information about DHCP server support for the Client FQDN option. IX20 User Guide 101 Interfaces Wide Area Networks (WANs) n See Configure system information for information about setting the IX20 device's system name. b. See Configure SureLink active recovery to detect WAN/WWAN failures for information about configuring active recovery. 7. (Optional) Configure IPv6 settings: a. Enable IPv6 support: (config network interface my_wan)> ipv6 enable true (config network interface my_wan)> b. Set the IPv6 type to DHCP: (config network interface my_wan)> ipv6 type dhcpv6 (config network interface my_wan)> c. Generally, the default settings for IPv6 support are sufficient. You can view the default IPv6 settings by using the question mark (?): (config network interface my_wan)> ipv6 ? IPv6 Parameters Current Value ----------------------------------------------------------------------- -------- dhcp_hostname false DHCP Hostname enable true Enable metric 0 Metric mgmt 0 Management priority mtu 1500 MTU type dhcpv6 Type use_dns always Use DNS weight 10 Weight Additional Configuration ----------------------------------------------------------------------- -------- connection_monitor Active recovery (config network interface my_wan)> d. Modify any of the remaining default settings as appropriate. For example, to change the metric: (config network interface my_wan)> ipv6 metric 1 (config network interface my_wan)> If the minimum length is not available, then a longer prefix will be used. See Configure WAN/WWAN priority and default route metrics for further information about metrics. IX20 User Guide 102 Interfaces Wide Area Networks (WANs) 8. Save the configuration and apply the change: (config network interface my_wan)> save Configuration saved. > 9. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure a Wireless Wide Area Network (WWAN) Configuring a Wireless Wide Area Network (WWAN) involves configuring the following items: Required configuration items n The interface type: Modem. n The firewall zone: External. n The cellular modem that is used by the WWAN. Additional configuration items n SIM selection for this WWAN. n The SIM PIN. n The SIM phone number for SMS connections. n Enable or disable roaming. n DNS options. n SIM failover configuration. n APN configuration. n The custom gateway/netmask. n IPv4 configuration: l The metric for IPv4 routes associated with the WAN. l The relative weight for IPv4 routes associated with the WAN. l The IPv4 management priority of the WAN. The active interface with the highest management priority will have its address reported as the preferred contact address for central management and direct device access. l The IPv4 Maximum Transmission Unit (MTU) of the WAN. l SureLink active recovery configuration. See Configure SureLink active recovery to detect WAN/WWAN failures for further information. n IPv6 configuration: l The metric for IPv6 routes associated with the WAN. l The relative weight for IPv6 routes associated with the WAN. l The IPv6 management priority of the WAN. The active interface with the highest management priority will have its address reported as the preferred contact address for central management and direct device access. l The IPv6 Maximum Transmission Unit (MTU) of the WAN. IX20 User Guide 103 Interfaces Wide Area Networks (WANs) l SureLink active recovery configuration. See Configure SureLink active recovery to detect WAN/WWAN failures for further information. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > Interfaces. 4. Create the WWAN or select an existing WWAN: n To create a new WWAN, for Add interface, type a name for the WWAN and click . n To edit an existing WWAN, click to expand the WWAN. New WWANs are enabled by default. To disable, click Enable. IX20 User Guide 104 Interfaces 5. For Interface type, select Modem. Wide Area Networks (WANs) 6. For Zone, select External. 7. For Device, select a cellular modem. 8. Optional WWAN configuration items: a. For Match SIM by, select a SIM matching criteria to determine when this WWAN should be used: n If SIM slot is selected, for Match SIM slot, select which SIM slot must be in active for this WWAN to be used. n If Carrier is selected, for Match SIM carrier, select which cellular carrier must be in active for this WWAN to be used. n If PLMN identifier is selected, for Match PLMN identifier, type the PLMN id that must be in active for this WWAN to be used. n If IMSI is selected, for Match IMSI, type the International Mobile Subscriber Identity (IMSI) that must be in active for this WWAN to be used. n If ICCID is selected, for Match ICCID, type the unique SIM card ICCID that must be in active for this WWAN to be used. b. Type the PIN for the SIM. Leave blank if no PIN is required. c. Type the Phone number for the SIM, for SMS connections. Normally, this should be left blank. It is only necessary to complete this field if the SIM does not have a phone number or if the phone number is incorrect. d. Roaming is enabled by default. Click to disable. e. For Use DNS: n Always: DNS will always be used for this WWAN; when multiple interfaces have the same DNS server, the interface with the lowest metric will be used for DNS requests. n When primary default route: Only use the DNS servers provided for this WWAN when the WWAN is the primary route. n Never: Never use DNS servers for this WWAN. The default setting is When primary default route. f. SIM failover is enabled by default, which means that the modem will automatically fail over from the active SIM to the next available SIM when the active SIM fails to connect. If IX20 User Guide 105 Interfaces Wide Area Networks (WANs) enabled: i. For Connection attempts before SIM failover, type the number of times that the device should attempt to connect to the active SIM before failing over to the next available SIM. ii. For SIM failover alternative, configure how SIM failover will function if automatic SIM switching is unavailable: n None: The device will perform no alternative action if automatic SIM switching is unavailable. n Reset modem: The device will reset the modem if automatic SIM switching is unavailable. n Reboot device: The device will reboot if automatic SIM switching is unavailable. 9. For APN list and APN list only, the IX20 device uses a preconfigured list of Access Point Names (APNs) when attempting to connect to a cellular carrier for the first time. After the device has successfully connected, it will remember the correct APN. As a result, it is generally not necessary to configure APNs. See Configure cellular modem APNs for further information and instructions for setting an APN. 10. (Optional) To configure the IP address of a custom gateway or a custom netmask: a. Click Custom gateway to expand. b. Click Enable. c. For Gateway/Netmask, enter the IP address and netmask of the custom gateway. To override only the gateway netmask, but not the gateway IP address, use all zeros for the IP address. For example, 0.0.0.0./32 will use the network-provided gateway, but with a /32 netmask. 11. Optional IPv4 configuration items: a. Click IPv4 to expand. b. IPv4 support is Enabled by default. Click to disable. c. Set the Metric. See Configure WAN/WWAN priority and default route metrics for further information about metrics. d. For Weight, type the relative weight for default routes associated with this interface. For multiple active interfaces with the same metric, Weight is used to load balance traffic to the interfaces. e. Set the Management priority. This determines which interface will have priority for central management activity. The interface with the highest number will be used. f. Set the MTU. g. See Configure SureLink active recovery to detect WAN/WWAN failures for information about configuring Active recovery. 12. Optional IPv6 configuration items: a. Click IPv6 to expand. b. IPv6 support is Enabled by default. Click to disable. IX20 User Guide 106 Interfaces Wide Area Networks (WANs) c. Set the Metric. See Configure WAN/WWAN priority and default route metrics for further information about metrics. d. For Weight, type the relative weight for default routes associated with this interface. For multiple active interfaces with the same metric, Weight is used to load balance traffic to the interfaces. e. Set the Management priority. This determines which interface will have priority for central management activity. The interface with the highest number will be used. f. Set the MTU. g. See Configure SureLink active recovery to detect WAN/WWAN failures for information about configuring Active recovery. 1. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Create a new WWAN or edit an existing one: n To create a new WWAN named my_wwan: (config)> add network interface my_wwan (config network interface my_wwan)> n To edit an existing WWAN named my_wwan, change to the my_wwan node in the configuration schema: (config)> network interface my_wwan (config network interface my_wwan)> 4. Set the appropriate firewall zone: (config network interface my_wwan)> zone zone (config network interface my_wwan)> See Firewall configuration for further information. IX20 User Guide 107 Interfaces Wide Area Networks (WANs) 5. Select a cellular modem: a. Enter modem device ? to view available modems and the proper syntax. (config network interface my_wwan)> modem device ? Device: The modem used by this network interface. Format: modem Current value: (config network interface my_wwan)> device b. Set the device: (config network interface my_wwan)> modem device modem (config network interface my_wwan)> 6. Optional WWAN configuration items: a. Set theSIM matching criteria to determine when this WWAN should be used: (config network interface my_wwan)> modem match value (config network interface my_wwan)> Where value is one of: n any n carrier Set the cellular carrier must be in active for this WWAN to be used: i. Use ? to determine available carriers: (config network interface my_wwan)> modem carrier Match SIM carrier: The SIM carrier match criteria. This interface is applied when the SIM card is provisioned from the carrier. Format: AT&T Rogers Sprint T-Mobile Telstra Verizon Vodafone other Default value: AT&T Current value: AT&T (config network interface my_wwan)> IX20 User Guide 108 Interfaces Wide Area Networks (WANs) ii. Set the carrier: (config network interface my_wwan)> modem carrier value (config network interface my_wwan)> n iccid Set the unique SIM card ICCID that must be in active for this WWAN to be used: (config network interface my_wwan)> modem iccid ICCID (config network interface my_wwan)> n imsi Set the International Mobile Subscriber Identity (IMSI) that must be in active for this WWAN to be used: (config network interface my_wwan)> modem imsi IMSI (config network interface my_wwan)> n plmn_id Set the PLMN id that must be in active for this WWAN to be used: (config network interface my_wwan)> modem plmn_id PLMN_ID (config network interface my_wwan)> n sim_slot Set which SIM slot must be in active for this WWAN to be used: (config network interface my_wwan)> modem sim_slot value (config network interface my_wwan)> where value is either 1 or 2. b. Set the PIN for the SIM. Leave blank if no PIN is required. (config network interface my_wwan)> modem pin value (config network interface my_wwan)> c. Set the phone number for the SIM, for SMS connections: (config network interface my_wwan)> modem phone num (config network interface my_wwan)> Normally, this should be left blank. It is only necessary to complete this field if the SIM does not have a phone number or if the phone number is incorrect. d. Roaming is enabled by default. To disable: (config network interface my_wwan)> modem roaming false (config network interface my_wwan)> IX20 User Guide 109 Interfaces Wide Area Networks (WANs) e. Configure when the WWAN's DNS servers will be used: (config network interface my_wwan)> modem dns value (config network interface my_wwan)> Where value is one of: n always: DNS will always be used for this WWAN; when multiple interfaces have the same DNS server, the interface with the lowest metric will be used for DNS requests. n never: Never use DNS servers for this WWAN. n primary: Only use the DNS servers provided for this WWAN when the WWAN is the primary route. The default setting is primary. f. SIM failover is enabled by default, which means that the modem will automatically fail over from the active SIM to the next available SIM when the active SIM fails to connect. To disable: (config network interface my_wwan)> modem sim_failover false (config network interface my_wwan)> If enabled: i. Set the number of times that the device should attempt to connect to the active SIM before failing over to the next available SIM: (config network interface my_wwan)> modem sim_failover_retries num (config network interface my_wwan)> The default setting is 5. ii. Configure how SIM failover will function if automatic SIM switching is unavailable: (config network interface my_wwan)> modem sim_failover_alt value (config network interface my_wwan)> where value is one of: n none: The device will perform no alternative action if automatic SIM switching is unavailable. n reset: The device will reset the modem if automatic SIM switching is unavailable. n reboot: The device will reboot if automatic SIM switching is unavailable. 7. The IX20 device uses a preconfigured list of Access Point Names (APNs) when attempting to connect to a cellular carrier for the first time. After the device has successfully connected, it will remember the correct APN. As a result, it is generally not necessary to configure APNs. See Configure cellular modem APNs for further information and instructions for setting an APN. IX20 User Guide 110 Interfaces Wide Area Networks (WANs) 8. (Optional) To configure the IP address of a custom gateway or a custom netmask: a. Enable the custom gateway: (config network interface my_wwan)> modem custom_gw enable true (config network interface my_wwan)> b. Set the IP address and netmask of the custom gateway: (config network interface my_wwan)> modem custom_gw gateway ip_ address/netmask (config network interface my_wwan)> modem custom_gw To override only the gateway netmask, but not the gateway IP address, use all zeros for the IP address. For example, 0.0.0.0./32 will use the network-provided gateway, but with a /32 netmask. 9. Optional IPv4 configuration items: a. IPv4 support is enabled by default. To disable: (config network interface my_wwan)> ipv4 enable false (config network interface my_wwan)> b. Set the metric: (config network interface my_wwan)> ipv4 metric num (config network interface my_wwan)> See Configure WAN/WWAN priority and default route metrics for further information about metrics. c. Set the relative weight for default routes associated with this interface. For multiple active interfaces with the same metric, the weight is used to load balance traffic to the interfaces. (config network interface my_wwan)> ipv4 weight num (config network interface my_wwan)> d. Set the management priority. This determines which interface will have priority for central management activity. The interface with the highest number will be used. (config network interface my_wwan)> ipv4 mgmt num (config network interface my_wwan)> e. Set the MTU: (config network interface my_wwan)> ipv4 mtu num (config network interface my_wwan)> f. See Configure SureLink active recovery to detect WAN/WWAN failures for information about configuring active recovery. 10. Optional IPv6 configuration items: IX20 User Guide 111 Interfaces Wide Area Networks (WANs) a. Click IPv6 to expand. b. IPv6 support is enabled by default. To disable: (config network interface my_wwan)> ipv6 enable false (config network interface my_wwan)> c. Set the metric. (config network interface my_wwan)> ipv6 metric num (config network interface my_wwan)> See Configure WAN/WWAN priority and default route metrics for further information about metrics. d. Set the relative weight for default routes associated with this interface. For multiple active interfaces with the same metric, the weight is used to load balance traffic to the interfaces. (config network interface my_wwan)> ipv6 weight num (config network interface my_wwan)> e. Set the management priority. This determines which interface will have priority for central management activity. The interface with the highest number will be used. (config network interface my_wwan)> ipv6 mgmt num (config network interface my_wwan)> f. Set the MTU. (config network interface my_wwan)> ipv6 mtu num (config network interface my_wwan)> g. See Configure SureLink active recovery to detect WAN/WWAN failures for information about configuring active recovery. 1. Save the configuration and apply the change: (config)> save Configuration saved. > 2. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Show WAN and WWAN status and statistics WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. From the menu, click Status. 3. Under Networking, click Interfaces. IX20 User Guide 112 Interfaces Wide Area Networks (WANs) Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. Enter the show network command at the Admin CLI prompt: > show network Interface ---------------defaultip defaultlinklocal eth1 eth1 eth2 eth2 loopback modem modem Proto ----IPv4 IPv4 IPv4 IPv6 IPv4 IPv6 IPv4 IPv4 IPv6 Status ------up up up up up up up up down Address ------------------------------192.168.210.1/24 169.254.100.100/16 10.10.10.10/24 fe00:2404::240:f4ff:fe80:120/64 192.168.2.1/24 fd00:2704::1/48 127.0.0.1/8 10.200.1.101/30 > 3. Enter show network interface name at the Admin CLI prompt to display additional information about a specific WAN. For example, to display information about ETH1, enter show network interface eth1: > show network interface eth1 wan1 Interface Status --------------------- Device : eth1 Zone : external IPv4 Status IPv4 Type IPv4 Address(es) IPv4 Gateway IPv4 MTU IPv4 Metric IPv4 Weight IPv4 DNS Server(s) : up : dhcp : 10.10.10.10/24 : 10.10.10.1 : 1500 :1 : 10 : 10.10.10.2, 10.10.10.3 IPv6 Status IPv6 Type IPv6 Address(es) IPv6 Gateway IPv6 MTU IPv6 Metric IPv6 Weight IPv6 DNS Server(s) : up : dhcpv6 : fe00:2404::240:f4ff:fe80:120/64 : ff80::234:f3ff:ff0e:4320 : 1500 :1 : 10 : fd00:244::1, fe80::234:f3f4:fe0e:4320 IX20 User Guide 113 Interfaces Wide Area Networks (WANs) > 4. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Delete a WAN or WWAN. Follow this procedure to delete any WANs and WWANs that have been added to the system. You cannot delete the preconfigured WAN, ETH1, or the preconfigured WWAN, Modem. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > Interfaces. 4. Click the menu icon (...) next to the name of the WAN or WWAN to be deleted and select Delete. 5. Click Apply to save the configuration and apply the change. Command line IX20 User Guide 114 Interfaces Wide Area Networks (WANs) 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Use the del command to delete the WAN or WWAN. For example, to delete a WWAN named my_ wwan: (config)> del network interface my_wwan 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 115 Interfaces Local Area Networks (LANs) Local Area Networks (LANs) The IX20 device is preconfigured with the following Local Area Networks (LANs): Interface type Local Area Network (LAN) Preconfigured interfaces n ETH2 n Loopback n Default IP n Default Link-local IP Devices Default configuration n Ethernet: ETH2 (nonWi-Fi models) n Bridge: LAN (Wi-Fi models) n Firewall zone: Internal n IP address: 192.168.2.1/24 n DHCP server enabled n LAN priority: Metric=5 n Ethernet: Loopback n Firewall zone: Loopback n IP address: 127.0.0.1/8 n Bridge: LAN n Firewall zone: Setup n IP address 192.168.210.1/24 n Bridge: LAN n Firewall zone: Setup n IP address 169.254.100.100/16 You can modify configuration settings for ETH2, and you can create new LANs. This section contains the following topics: About Local Area Networks (LANs) 117 Configure a LAN 117 Show LAN status and statistics 123 Delete a LAN 125 DHCP servers 126 Create a Virtual LAN (VLAN) route 142 IX20 User Guide 116 Interfaces Local Area Networks (LANs) About Local Area Networks (LANs) A Local Area Network (LAN) connects network devices together, such as Ethernet or Wi-Fi, in a logical Layer-2 network. The following diagram shows a LAN connected to the ETH2 Ethernet device and the Digi AP access point (available for Wi-Fi enabled models only). Once the LAN is configured and enabled, the devices connected to the network interfaces can communicate with each other, as demonstrated by the ping commands. Configure a LAN Configuring a Local Area Network (LAN) involves configuring the following items: Required configuration items n The interface type: either Ethernet, IP Passthrough, or PPPoE. n The firewall zone: Internal. n The network device or bridge that is used by the LAN. n The IPv4 address and subnet mask for the LAN. While it is not strictly necessary for a LAN to have an IP address, if you want to send traffic from other networks to the LAN, you must configure an IP address. Note By default, ETH2 is set to an IP address of 192.168.2.1 and uses the IP subnet of 192.168.2.0/24. If the WAN/ETH1 Ethernet device is being used by a WAN with the same IP subnet, you should change the default IP address and subnet of LAN1. Additional configuration items n Additional IPv4 configuration: l The metric for IPv4 routes associated with the LAN. l The relative weight for IPv4 routes associated with the LAN. l The IPv4 management priority of the LAN. The active interface with the highest management priority will have its address reported as the preferred contact address for central management and direct device access. l The IPv4 Maximum Transmission Unit (MTU) of the LAN. l IPv4 DHCP server configuration. See DHCP servers for more information. IX20 User Guide 117 Interfaces Local Area Networks (LANs) n IPv6 configuration: l The metric for IPv6 routes associated with the LAN. l The relative weight for IPv6 routes associated with the LAN. l The IPv6 management priority of the LAN. The active interface with the highest management priority will have its address reported as the preferred contact address for central management and direct device access. l The IPv6 Maximum Transmission Unit (MTU) of the LAN. l The IPv6 prefix length and ID. l IPv6 DHCP server configuration. See DHCP servers for more information. n MAC address blacklist and whitelist. To create a new LAN or edit an existing LAN: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > Interfaces. 4. Create the LAN or select an existing LAN: n To create a new LAN, for Add interface, type a name for the LAN and click . n To edit an existing LAN, click to expand the LAN. The Interface configuration window is displayed. IX20 User Guide 118 Interfaces Local Area Networks (LANs) New LANs are enabled by default. To disable, click Enable. 5. For Interface type, leave at the default setting of Ethernet. 6. For Zone, select the appropriate firewall zone. See Firewall configuration for further information. 7. For Device, select an Ethernet device, a Wi-Fi access point, or a bridge. See Bridging for more information about bridging. 8. Configure IPv4 settings: a. Click to expand IPv4. IPv4 support is enabled by default. b. For Type, select Static IP address. c. For Address, type the IP address and subnet of the LAN interface. Use the format IPv4_ address/netmask, for example, 192.168.2.1/24. d. Optional IPv4 configuration items: i. Set the Metric. ii. For Weight, type the relative weight for default routes associated with this interface. For multiple active interfaces with the same metric, Weight is used to load balance traffic to the interfaces. iii. Set the Management priority. This determines which interface will have priority for central management activity. The interface with the highest number will be used. iv. Set the MTU. e. Enable the DHCP server: i. Click to expand DHCP server. ii. Click Enable. See DHCP servers for information about configuring the DHCP server. 9. See Configure DHCP relay for information about configuring DHCP relay. 10. (Optional) Configure IPv6 settings: a. Click to expand IPv6. b. Enable IPv6 support. c. For Type, select IPv6 prefix delegration. d. For Prefix length, type the minimum length of the prefix to assign to this LAN. If the minimum length is not available, then a longer prefix will be used. e. For Prefix ID, type the identifier used to extend the prefix to the assigned length. Leave blank to use a random identifier. f. Set the Metric. IX20 User Guide 119 Interfaces Local Area Networks (LANs) g. For Weight, type the relative weight for default routes associated with this interface. For multiple active interfaces with the same metric, Weight is used to load balance traffic to the interfaces. h. Set the Management priority. This determines which interface will have priority for central management activity. The interface with the highest number will be used. i. Set the MTU. 11. (Optional) Click to expand MAC address blacklist. Incoming packets will be dropped from any devices whose MAC addresses is included in the MAC address blacklist. a. Click to expand MAC address blacklist. b. For Add MAC address, click . c. Type the MAC address. 12. (Optional) Click to expand MAC address whitelist. If there whitelist entries are specified, incoming packets will only be accepted from the listed MAC addresses. a. Click to expand MAC address whitelist. b. For Add MAC address, click . c. Type the MAC address. 13. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Create a new LAN or edit an existing one: n To create a new LAN named my_lan: (config)> add network interface my_lan (config network interface my_lan)> n To edit an existing LAN named my_lan, change to the my_lan node in the configuration schema: (config)> network interface my_lan (config network interface my_lan)> IX20 User Guide 120 Interfaces Local Area Networks (LANs) 4. Set the appropriate firewall zone: (config network interface my_lan)> zone zone (config network interface my_lan)> See Firewall configuration for further information. 5. Select an Ethernet device, a Wi-Fi device, or a bridge. See Bridging for more information about bridging. a. Enter device ? to view available devices and the proper syntax. (config network interface my_lan)> device ? Device: The network device used by this network interface. Format: /network/device/eth1 /network/device/eth2 /network/device/loopback /network/bridge/lan /network/wireless/ap/digi_ap Current value: (config network interface my_lan)> device b. Set the device for the LAN: (config network interface my_lan)> device device (config network interface my_lan)> 6. Configure IPv4 settings: n IPv4 support is enabled by default. To disable: (config network interface my_lan)> ipv4 enable false (config network interface my_lan)> n The LAN is configured by default to use a static IP address for its IPv4 configuration. To configure the LAN to be a DHCP client, rather than using a static IP addres: (config network interface my_lan)> ipv4 type dhcp (config network interface my_lan)> These instructions assume that the LAN will use a static IP address for its IPv4 configuration. a. Set the IPv4 address and subnet of the LAN interface. Use the format IPv4_ address/netmask, for example, 192.168.2.1/24. (config network interface my_lan)> ipv4 address ip_address/netmask (config network interface my_lan)> b. Optional IPv4 configuration items: IX20 User Guide 121 Interfaces Local Area Networks (LANs) i. Set the IP metric: (config network interface my_lan)> ipv4 metric num (config network interface my_lan)> ii. Set the relative weight for default routes associated with this interface. For multiple active interfaces with the same metric, the weight is used to load balance traffic to the interfaces. (config network interface my_lan)> ipv4 weight num (config network interface my_lan)> iii. Set the management priority. This determines which interface will have priority for central management activity. The interface with the highest number will be used. (config network interface my_lan)> ipv4 mgmt num (config network interface my_lan)> iv. Set the MTU: (config network interface my_lan)> ipv4 mtu num (config network interface my_lan)> c. Enable the DHCP server: (config network interface my_lan)> ipv4 dhcp_server enable true See DHCP servers for information about configuring the DHCP server. 7. (Optional) Configure IPv6 settings: a. Enable IPv6 support: (config network interface my_lan)> ipv6 enable true (config network interface my_lan)> b. Set the IPv6 type to DHCP: (config network interface my_lan)> ipv6 type dhcpv6 (config network interface my_lan)> c. Generally, the default settings for IPv6 support are sufficient. You can view the default IPv6 settings by using the question mark (?): (config network interface my_lan)> ipv6 ? IPv6 Parameters Current Value ----------------------------------------------------------------------- -------- enable true Enable metric 0 Metric mgmt 0 Management priority IX20 User Guide 122 Interfaces Local Area Networks (LANs) mtu prefix_id prefix_length type weight 1500 1 48 prefix_delegation 10 MTU Prefix ID Prefix length Type Weight Additional Configuration ----------------------------------------------------------------------- -------- connection_monitor Active recovery dhcpv6_server DHCPv6 server (config network interface my_lan)> View default settings for the IPv6 DHCP server: (config network interface my_lan)> ipv6 dhcpv6_server ? DHCPv6 server: The DHCPv6 server settings for this network interface. Parameters Current Value ----------------------------------------------------------------------- -------- enable true Enable (config network interface my_lan)> d. Modify any of the remaining default settings as appropriate. For example, to change the minimum length of the prefix: (config network interface my_lan)> ipv6 prefix_length 60 (config network interface my_lan)> If the minimum length is not available, then a longer prefix will be used. See Configure WAN/WWAN priority and default route metrics for further information about metrics. 8. Save the configuration and apply the change: (config network interface my_lan)> save Configuration saved. > 9. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Show LAN status and statistics WebUI IX20 User Guide 123 Interfaces Local Area Networks (LANs) 1. Log into the IX20 WebUI as a user with Admin access. 2. From the menu, click Status. 3. Under Networking, click Interfaces. Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. Enter the show network command at the Admin CLI prompt: > show network Interface ---------------defaultip defaultlinklocal eth1 eth1 eth2 eth2 loopback modem modem Proto ----IPv4 IPv4 IPv4 IPv6 IPv4 IPv6 IPv4 IPv4 IPv6 Status ------up up up up up up up up down Address ------------------------------192.168.210.1/24 169.254.100.100/16 10.10.10.10/24 fe00:2404::240:f4ff:fe80:120/64 192.168.2.1/24 fd00:2704::1/48 127.0.0.1/8 10.200.1.101/30 > 3. Enter show network interface name at the Admin CLI prompt to display additional information about a specific LAN. For example, to display information about ETH2, enter show network interface eth2: > show network interface eth2 lan1 Interface Status --------------------- Device : eth2 Zone : internal IPv4 Status IPv4 Type IPv4 Address(es) IPv4 Gateway IPv4 MTU IPv4 Metric IPv4 Weight IPv4 DNS Server(s) : up : static : 192.168.2.1/24 : : 1500 :5 : 10 : IPv6 Status IPv6 Type IPv6 Address(es) : up : prefix : fd00:2704::1/48 IX20 User Guide 124 Interfaces Local Area Networks (LANs) IPv6 Gateway IPv6 MTU IPv6 Metric IPv6 Weight IPv6 DNS Server(s) : : 1500 :5 : 10 : > 4. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Delete a LAN Follow this procedure to delete any LANs that have been added to the system. You cannot delete the preconfigured LAN, LAN1. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > Interfaces. 4. Click the menu icon (...) next to the name of the LAN to be deleted and select Delete. 5. Click Apply to save the configuration and apply the change. Command line IX20 User Guide 125 Interfaces Local Area Networks (LANs) 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Use the del command to delete the LAN. For example, to delete a LAN named my_lan: (config)> del network interface my_lan 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. DHCP servers You can enable DHCP on your IX20 device to assign IP addresses to clients, using either: n The DHCP server for the device's local network, which assigns IP addresses to clients on the device's local network. Addresses are assigned from a specified pool of IP addresses. For a local network, the device uses the DHCP server that has the IP address pool in the same IP subnet as the local network. When a host receives an IP configuration, the configuration is valid for a particular amount of time, known as the lease time. After this lease time expires, the configuration must be renewed. The host renews the lease time automatically. n A DHCP relay server, which forwards DHCP requests from clients to a DHCP server that is running on a separate device. Configure a DHCP server Note These instructions assume you are configuring the device to use its local DHCP server. For instructions about configuring the device to use a DHCP relay server, see Configure DHCP relay. Required configuration items n Enable the DHCP server. Additional configuration items n The lease address pool: the range of IP addresses issued by the DHCP server to clients. n Lease time: The length, in minutes, of the leases issued by the DHCP server. n The Maximum Transmission Units (MTU). n The domain name suffix appended to host names. IX20 User Guide 126 Interfaces Local Area Networks (LANs) n The IP gateway address given to clients. n The IP addresses of the preferred and alternate Domain Name Server (DNS), NTP servers, and WINS severs that are given to clients. n The TFTP server name. n The filepath and name of the bootfile on the TFTP server. n Custom DHCP options. See Configure DHCP options for information about custom DHCP options. n Static leases. See Map static IP addresses to hosts for information about static leases. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > Interfaces. 4. Click to expand an existing LAN, or create a new LAN. See Configure a LAN. 5. Click to expand IPv4 > DHCP server. 6. Enable the DHCP server. 7. (Optional) For Lease time, type the amount of time that a DHCP lease is valid. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Lease time to ten minutes, enter 10m or 600s. The default is 12 hours. 8. (Optional) For Lease range start and Lease range end, type the lowest and highest IP address that the DHCP server will assign to a client. This value represents the low order byte of the address (the final triplet in an IPv4 address, for example, 192.168.2.xxx). The remainder of the IP address will be based on the LAN's static IP address as defined in the Address field. Allowed values are between 1 and 254, and the default is 100 for Lease range start and 250 for Lease range end. 9. Optional DHCP server settings: IX20 User Guide 127 Interfaces Local Area Networks (LANs) a. Click to expand Advanced settings. b. For Gateway, select either: n None: No gateway is broadcast by the DHCP server. Client destinations must be resolvable without a gateway. n Automatic: Broadcasts the IX20 device's gateway. n Custom: Allows you to identify the IP address of a Custom gateway to be broadcast. The default is Automatic. c. For MTU, n None: An MTU of length 0 is broadcast. This is not recommended. n Automatic: No MTU is broadcast and clients will determine their own MTU. n Custom: Allows you to identify a Custom MTU to be broadcast. The default is Automatic. d. For Domain name suffix, type the domain name that should be appended to host names. e. For Primary and Secondary DNS, Primary and Secondary NTP server, and Primary and Secondary WINS server, select either: n None: No server is broadcast. n Automatic: Broadcasts the IX20 device's server. n Custom: Allows you to identify the IP address of the server. f. For Bootfile name, type the relative path and file name of the bootfile on the TFTP server. g. For TFTP server name, type the IP address or host name of the TFTP server. 10. See Configure DHCP options for information about Custom DHCP options. 11. See Map static IP addresses to hosts for information about Static leases. 12. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Enable the DHCP server for an existing LAN. For example, to enable the DHCP server for a LAN named my_lan: IX20 User Guide 128 Interfaces Local Area Networks (LANs) (config)> network interface my_lan ipv4 dhcp_server enable true (config)> See Configure a LAN for information about creating a LAN. 4. (Optional) Set the amount of time that a DHCP lease is valid: (config)> network interface my_lan ipv4 dhcp_server lease_time value (config)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set network interface my_lan ipv4 dhcp_server lease_time to ten minutes, enter either 10m or 600s: (config)> network interface my_lan ipv4 dhcp_server lease_time 600s (config)> 5. (Optional) Set the lowest IP address that the DHCP server will assign to a client. This value represents the low order byte of the address (the final triplet in an IPv4 address, for example, 192.168.2.xxx). The remainder of the IP address will be based on the LAN's static IP address as defined in the address parameter. (config)> network interface my_lan ipv4 dhcp_server lease_start num (config)> Allowed values are between 1 and 254, and the default is 100. 6. (Optional) Set the highest IP address that the DHCP server will assign to a client: (config)> network interface my_lan ipv4 dhcp_server lease_end num (config)> Allowed values are between 1 and 254, and the default is 250. 7. Optional DHCP server settings: a. Click to expand Advanced settings. b. Determine how the DHCP server should broadcast the gateway server: (config)> network interface my_lan ipv4 dhcp_server advanced gateway value (config)> where value is one of: n none: No gateway is broadcast by the DHCP server. Client destinations must be resolvable without a gateway. n auto: Broadcasts the IX20 device's gateway. n custom: Allows you to identify the IP address of a custom gateway to be broadcast: (config)> network interface my_lan ipv4 dhcp_server advanced gateway_custom ip_address (config)> IX20 User Guide 129 Interfaces Local Area Networks (LANs) The default is auto. c. Determine how the DHCP server should broadcast the the MTU: (config)> network interface my_lan ipv4 dhcp_server advanced mtu value (config)> where value is one of: n none: An MTU of length 0 is broadcast. This is not recommended. n auto: No MTU is broadcast and clients will determine their own MTU. n custom: Allows you to identify a custom MTU to be broadcast: (config)> network interface my_lan ipv4 dhcp_server advanced mtu_ custom mtu (config)> The default is auto. d. Set the domain name that should be appended to host names: (config)> network interface my_lan ipv4 dhcp_server advanced domain_ suffix name (config)> e. Set the IP address or host name of the primary and secondary DNS, the primary and secondary NTP server, and the primary and secondary WINS servers: (config)> network interface my_lan ipv4 dhcp_server advanced primary_dns value (config)> network interface my_lan ipv4 dhcp_server advanced secondary_ dns value (config)> network interface my_lan ipv4 dhcp_server advanced primary_ntp value (config)> network interface my_lan ipv4 dhcp_server advanced secondary_ ntp value (config)> network interface my_lan ipv4 dhcp_server advanced primary_ wins value (config)> network interface my_lan ipv4 dhcp_server advanced secondary_ wins value (config)> where value is one of: n none: No server is broadcast. n auto: Broadcasts the IX20 device's server. n custom: Allows you to identify the IP address of the server. For example: (config)> network interface my_lan ipv4 dhcp_server advanced primary_dns_custom ip_address (config)> The default is auto. IX20 User Guide 130 Interfaces Local Area Networks (LANs) f. Set the IP address or host name of the TFTP server: (config)> network interface my_lan ipv4 dhcp_server advanced nftp_server ip_address (config)> g. Set the relative path and file name of the bootfile on the TFTP server: (config)> network interface my_lan ipv4 dhcp_server advanced bootfile filename (config)> 8. See Configure DHCP options for information about custom DHCP options. 9. See Map static IP addresses to hosts for information about static leases. 10. Save the configuration and apply the change: (config network interface my_lan ipv4 dhcp_server advanced static_lease 0)> save Configuration saved. > 11. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Map static IP addresses to hosts You can configure the DHCP server to assign static IP addresses to specific hosts. Required configuration items n IP address that will be mapped to the device. n MAC address of the device. Additional configuration items n A label for this instance of the static lease. To map static IP addresses: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 131 Interfaces Local Area Networks (LANs) 3. Click Network > Interfaces. 4. Click to expand an existing LAN, or create a new LAN. See Configure a LAN. 5. Click to expand IPv4 > DHCP server > Advanced settings > Static leases. 6. For Add Static lease, click . 7. Type the MAC address of the device associated with this static lease. 8. Type the IP address for the static lease. Note The IP address here should be outside of the DHCP server's configured lease range. See Configure a DHCP server for further information about the lease range. 9. (Optional) For Hostname, type a label for the static lease. This does not have to be the device's actual hostname. 10. Repeat for each additional DHCP static lease. 11. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add a static lease to the DHCP server configuration for an existing LAN. For example, to add static lease to a LAN named my_lan: (config)> add network interface my_lan ipv4 dhcp_server advanced static_ lease end (config network interface my_lan ipv4 dhcp_server advanced static_lease 0)> See Configure a LAN for information about creating a LAN. IX20 User Guide 132 Interfaces Local Area Networks (LANs) 4. Set the MAC address of the device associated with this static lease, using the colon-separated format: (config network interface my_lan ipv4 dhcp_server advanced static_lease 0)> mac 00:40:D0:13:35:36 (config network interface my_lan ipv4 dhcp_server advanced static_lease 0)> 5. Set the IP address for the static lease: (config network interface my_lan ipv4 dhcp_server advanced static_lease 0)> ip 10.01.01.10 (network interface my_lan ipv4 dhcp_server advanced static_lease 0)> Note The IP address here should be outside of the DHCP server's configured lease range. See Configure a DHCP server for further information about the lease range. 6. (Optional) Set a label for this static lease: (config network interface my_lan ipv4 dhcp_server advanced static_lease 0)> name label (config network interface my_lan ipv4 dhcp_server advanced static_lease 0)> 7. Save the configuration and apply the change: (config network interface my_lan ipv4 dhcp_server advanced static_lease 0)> save Configuration saved. > 8. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Show current static IP mapping To view your current static IP mapping: WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. On the main menu, click Status 3. Under Networking, click DHCP Leases. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. IX20 User Guide 133 Interfaces Local Area Networks (LANs) 2. At the command line, type config to enter configuration mode: > config (config)> 3. Show the static lease configuration. For example, to show the static leases for a lan named my_lan: (config)> show network interface my_lan ipv4 dhcp_server advanced static_ lease 0 ip 192.168.2.10 mac BF:C3:46:24:0E:D9 no name 1 ip 192.168.2.11 mac E3:C1:1F:65:C3:0E no name (config)> 4. Type cancel to exit configuration mode: (config)> cancel > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Delete static IP mapping entries To delete a static IP entry: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 134 Interfaces Local Area Networks (LANs) 3. Click Network > Interfaces. 4. Click to expand an existing LAN. 5. Click to expand IPv4 > DHCP server > Advanced settings > Static leases. 6. Click the menu icon (...) next to the name of the static lease to be deleted and select Delete. 7. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Show the static lease configuration. For example, to show the static leases for a lan named my_lan: (config)> show network interface my_lan ipv4 dhcp_server advanced static_ lease 0 ip 192.168.2.10 mac BF:C3:46:24:0E:D9 no name 1 ip 192.168.2.11 mac E3:C1:1F:65:C3:0E no name (config)> IX20 User Guide 135 Interfaces Local Area Networks (LANs) 4. Use the del index_number command to delete a static lease. For example, to delete the static lease for the device listed in the above output with a mac address of BF:C3:46:24:0E:D9 (index number 0): (config)> del network interface lan1 ipv4 dhcp_server advanced static_lease 0 (config)> 5. Save the configuration and apply the change: (config)> save Configuration saved. > 6. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure DHCP options You can configure DHCP servers running on your IX20 device to send certain specified DHCP options to DHCP clients. You can also set the user class, which enables you to specify which specific DHCP clients will receive the option. You can also force the command to be sent to the clients. DHCP options can be set on a per-LAN basis, or can be set for all LANs. A total of 32 DHCP options can be configured. Required configuration items n DHCP option number. n Value for the DHCP option. Additional configuration items n The data type of the value. n Force the option to be sent to the DHCP clients. n A label for the custom option. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 136 Interfaces Local Area Networks (LANs) 3. Click Network > Interfaces. 4. Click to expand an existing LAN, or create a new LAN. See Configure a LAN. 5. Click to expand IPv4 > DHCP server > Advanced settings > Custom DHCP option. 6. For Add Custom option, click . Custom options are enabled by default. To disable, uncheck Enable. 7. For Option number, type the DHCP option number. 8. For Value, type the value of the DHCP option. 9. (Optional) For Label, type a label for the custom option. 10. (Optional) If Forced send is enabled, the DHCP option will always be sent to the client, even if the client does not ask for it. 11. (Optional) For Data type, select the data type that the option uses. If the incorrect data type is selected, the device will send the value as a string. 12. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add a custom DHCP option to the DHCP server configuration for an existing LAN. For example, to add static lease to a LAN named my_lan: (config)> add network interface my_lan ipv4 dhcp_server advanced custom_ option end (config network interface my_lan ipv4 dhcp_server advanced custom_option 0)> See Configure a LAN for information about creating a LAN. IX20 User Guide 137 Interfaces Local Area Networks (LANs) 4. Custom options are enabled by default. To disable: (config network interface my_lan ipv4 dhcp_server advanced custom_option 0)> enable false (config network interface my_lan ipv4 dhcp_server advanced custom_option 0)> 5. Set the option number for the DHCP option: (config network interface my_lan ipv4 dhcp_server advanced custom_option 0)> option 210 (config network interface my_lan ipv4 dhcp_server advanced custom_option 0)> 6. Set the value for the DHCP option: (config network interface my_lan ipv4 dhcp_server advanced custom_option 0)> value_str value (network interface my_lan ipv4 dhcp_server advanced custom_option 0)> 7. (Optional) Set a label for this custom option: (config network interface my_lan ipv4 dhcp_server advanced custom_option 0)> name label (config network interface my_lan ipv4 dhcp_server advanced custom_option 0)> 8. (Optional) To force the DHCP option to always be sent to the client, even if the client does not ask for it: (config network interface my_lan ipv4 dhcp_server advanced custom_option 0)> force true (config network interface my_lan ipv4 dhcp_server advanced custom_option 0)> 9. (Optional) Set the data type that the option uses. If the incorrect data type is selected, the device will send the value as a string. (config network interface my_lan ipv4 dhcp_server advanced custom_option 0)> datatype value (config network interface my_lan ipv4 dhcp_server advanced custom_option 0)> where value is one of: n 1byte n 2byte n 4byte n hex n ipv4 n str The default is str. IX20 User Guide 138 Interfaces Local Area Networks (LANs) 10. Save the configuration and apply the change: (config network interface my_lan ipv4 dhcp_server advanced custom_option 0)> save Configuration saved. > 11. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure DHCP relay DHCP relay allows a router to forward DHCP requests from one LAN to a separate DHCP server, typically connected to a different LAN. For the IX20 device, DHCP relay is configured by providing the IP address of a DHCP relay server, rather than an IP address range. If both the DHCP relay server and an IP address range are specified, DHCP relay is used, and the specified IP address range is ignored. Multiple DHCP relay servers can be provided for each LAN. If multiple relay servers are provided, DHCP requests are forwarded to all servers without waiting for a response. Clients will typically use the IP address from the first DHCP response received. Configuring DHCP relay involves the following items: Required configuration items n Disable the DHCP server, if it is enabled. n IP address of the primary DHCP relay server, to define the relay server that will respond to DHCP requests. Additional configuration items n IP address of additional DHCP relay servers. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 139 Interfaces Local Area Networks (LANs) 3. Click Network > Interfaces. 4. Click to expand an existing LAN, or create a new LAN. See Configure a LAN. 5. Disable the DHCP server, if it is enabled: a. Click to expand IPv4 > DHCP server. b. Click Enable to toggle off the DHCP server. 6. Click to expand DHCP relay. 7. For Add DHCP Server:, click . 8. For DHCP server address, type the IP address of the relay server. 9. Repeat for each additional DHCP relay server. 10. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add a DHCP relay server to an existing LAN. For example, to add a server to a LAN named my_ lan: (config)> add network interface my_lan ipv4 dhcp_relay end (config network interface lan1 my_lan dhcp_relay 0)> See Configure a LAN for information about creating a LAN. 4. Set the IP address of the DHCP relay server: (config network interface my_lan ipv4 dhcp_relay 0)> address 10.10.10.10 (config network interface my_lan ipv4 dhcp_relay 0)> IX20 User Guide 140 Interfaces Local Area Networks (LANs) 5. (Optional) Add additional DHCP relay servers: a. Move back one step in the configuration schema by typing two periods (..): (config network interface my_lan ipv4 dhcp_relay 0)> .. (config network interface my_lan ipv4 dhcp_relay)> b. Add the next server: (config network interface lan1 ipv4 dhcp_relay)> add end (config network interface lan1 ipv4 dhcp_relay 1)> c. Set the IP address of the DHCP relay server: (config network interface my_lan ipv4 dhcp_relay 1)> address 10.10.10.11 (config network interface my_lan ipv4 dhcp_relay 1)> d. Repeat for each additional relay server. 1. Disable the DHCP server, if it is enabled: (config network interface my_lan ipv4 dhcp_relay 1)> .. .. dhcp_server enable false (config network interface my_lan ipv4 dhcp_relay 1)> 6. Save the configuration and apply the change: (config network interface lan1 ipv4 dhcp_relay 1)> save Configuration saved. > 7. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Show DHCP server status and settings View DHCP status to monitor which devices have been given IP configuration by the IX20 device and to diagnose DHCP issues. WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. On the main menu, click Status 3. Under Networking, click DHCP Leases. Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. IX20 User Guide 141 Interfaces Local Area Networks (LANs) 2. Enter the show dhcp-lease command at the Admn CLI prompt: > show dhcp-lease IP Address ------------192.168.2.194 192.168.2.195 Hostname --------------MTK-ENG-USER1 MTK-ENG-USER2 Expires ------- > 3. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Create a Virtual LAN (VLAN) route Virtual LANs (VLANs) allow splitting a single physical LAN into separate Virtual LANs. This is useful for security reasons, and also helps to reduce broadcast traffic on the LAN. Required configuration items n Device to be assigned to the VLAN. n The VLAN ID. The TCP header uses the VLAN ID to identify the destination VLAN for the packet. To create a VLAN: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > Virtual LAN. 4. Type a name for the VLAN and click . 5. Select the Device. IX20 User Guide 142 Interfaces 6. Type or select a unique numeric ID for the VLAN ID. 7. Click Apply to save the configuration and apply the change. Local Area Networks (LANs) Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add the VLAN: (config)> add network vlan name (config)> 4. Set the device to be used by the VLAN: a. View a list of available devices: (config network vlan vlan1)> device ? Device: The Ethernet device to use for this virtual LAN Format: /network/device/eth1 /network/device/eth2 /network/device/loopback /network/vlan/vlan1 /network/bridge/lan /network/wireless/ap/digi_ap Current value: (config network vlan vlan1)> b. Add the device: (config network vlan vlan1)> device /network/device/ (config network vlan vlan1)> 5. Set the VLAN ID: (config network vlan vlan1)> id value where value is an integer between 1 and 4095. IX20 User Guide 143 Interfaces Local Area Networks (LANs) 6. Save the configuration and apply the change: (config network vlan vlan1)> save Configuration saved. > 7. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 144 Interfaces Bridging Bridging Bridging is a mechanism to create a single network consisting of multiple devices, such as Ethernet devices and wireless access points. By default, the IX20 has the following preconfigured bridges: Interface type Bridges (Wi-Fi model only) Preconfigured interfaces n Bridge: LAN Devices n Ethernet: ETH2 n Wi-Fi access point: Digi AP Default configuration n Enabled n Used by the ETH1 interface You can modify configuration settings for the existing bridge, and you can create new bridges. This section contains the following topics: Edit the preconfigured ETH2 bridge 146 Configure a bridge 149 IX20 User Guide 145 Interfaces Edit the preconfigured ETH2 bridge Required configuration items n Enable or disable the bridge. n Modify the devices included in the bridge. Additional configuration items n Enable Spanning Tree Protocol (STP). To edit the preconfigured LAN bridge: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. Bridging The Configuration window is displayed. 3. Click Network > Bridges > LAN. 4. The LAN bridge is enabled by default. To disable, uncheck Enable. 5. Modify the list of devices that are a part of the bridge. By default, the LAN bridge includes the following devices: n Ethernet: ETH2 n Wi-Fi access point: Digi AP Note The MAC address of the bridge is taken from the first available device in the list. a. To delete a device from the bridge, click the down arrow () next to the field label and select Delete. IX20 User Guide 146 Interfaces Bridging b. To add a device, for Add device, click and select the Device. 6. (Optional) Enable Spanning Tree Protocol (STP). STP is used when using multiple LANs on the same device, to prevent bridge loops and other routing conflicts. a. Click STP. b. Click Enable. c. For Forwarding delay, enter the number of seconds that the device will spend in each of the listening and learning states before the bridge begins forwarding data. The default is 2 seconds. 7. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. The LAN bridge is enabled by default. n To disable: (config)> network bridge eth2 enable false (config)> n To enable if it has been disabled: (config)> network bridge eth2 enable true (config)> 4. Modify the list of devices that are a part of the bridge. By default, the LAN bridge includes the following devices: IX20 User Guide 147 Interfaces Bridging n Ethernet: ETH2 n Wi-Fi access point: Digi AP Note The MAC address of the bridge is taken from the first available device in the list. a. To delete a device from the bridge: i. Determine the index numbers of the devices included with the bridge: (config)> show network bridge eth2 device 0 /network/device/eth2 1 /network/wireless/ap/digi_ap (config)> ii. Use the index number to delete the appropriate device. For example, to delete the Digi AP Wi-Fi access point from the bridge: (config)> del network bridge lan device 1 (config)> Note If you are deleting multiple devices from the bridge, the device index may be reordered after each deletion. As a result, best practice is to perform a show network bridge lan1 device command after each device is deleted to determine the new index numbering. b. Add devices to the bridge: i. Determine available devices: (config network bridge my_bridge)> .. .. interface lan device ? Device: The network device used by this network interface. Format: /network/device/eth1 /network/device/eth2 /network/device/loopback /network/bridge/lan /network/wireless/ap/digi_ap Default value: /network/bridge/lan Current value: /network/bridge/lan (config network bridge my_bridge)> ii. Add the appropriate device. For example, to add the Digi AP Wi-Fi access point: (config network bridge my_bridge)> add device end /network/wireless/ap/digi_ap (config)> 5. (Optional) Enable Spanning Tree Protocol (STP). STP is used when multiple LANs are configured on the same device, to prevent bridge loops and other routing conflicts. IX20 User Guide 148 Interfaces Bridging a. Enable STP: (config)> network bridge eth2 stp enable true b. Set the number of seconds that the device will spend in each of the listening and learning states before the bridge begins forwarding data: (config)> network bridge eth2 stp forward_delay num (config)> The default is 2 seconds. 6. Save the configuration and apply the change: (config)> save Configuration saved. > 7. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure a bridge Required configuration items n A name for the bridge. Bridges are enabled by default. n Devices to be included in the bridge. Additional configuration items n Enable Spanning Tree Protocol (STP). To create a bridge: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 149 Interfaces Bridging 3. Click Network > Bridges. 4. For Add Bridge, type a name for the bridge and click . 5. Bridges are enabled by default. To disable, uncheck Enable. 6. Add devices to the bridge: a. Click to expand Devices. b. For Add device, click . c. Select the Device. d. Repeat to add additional devices. Note The MAC address of the bridge is taken from the first available device in the list. 7. (Optional) Enable Spanning Tree Protocol (STP). STP is used when using multiple LANs on the same device, to prevent bridge loops and other routing conflicts. a. Click STP. b. Click Enable. c. For Forwarding delay, enter the number of seconds that the device will spend in each of the listening and learning states before the bridge begins forwarding data. The default is 2 seconds. 8. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> IX20 User Guide 150 Interfaces Bridging 3. Create the bridge: (config)> add network bridge my_bridge (config network bridge my_bridge)> 4. Bridges are enabled by default. n To disable: (config network bridge my_bridge)> enable false (config network bridge my_bridge)> n To enable if it has been disabled: (config network bridge my_bridge)> enable true (config network bridge my_bridge)> 5. Add devices to the bridge: a. Determine available devices: (config network bridge my_bridge)> .. .. interface lan device ? Device: The network device used by this network interface. Format: /network/device/eth1 /network/device/eth2 /network/device/loopback /network/bridge/lan /network/wireless/ap/digi_ap Default value: /network/bridge/lan Current value: /network/bridge/lan (config network bridge my_bridge)> b. Add the appropriate device. For example, to add the Digi AP Wi-Fi access point: (config network bridge my_bridge)> add device end /network/wireless/ap/digi_ap (config)> Note The MAC address of the bridge is taken from the first available device in the list. 6. (Optional) Enable Spanning Tree Protocol (STP). STP is used when using multiple LANs on the same device, to prevent bridge loops and other routing conflicts. a. Enable STP: (config network bridge my_bridge)> stp enable true b. Set the number of seconds that the device will spend in each of the listening and learning states before the bridge begins forwarding data: IX20 User Guide 151 Interfaces Bridging (config network bridge my_bridge)> stp forward_delay num (config)> The default is 2 seconds. 7. Save the configuration and apply the change: (config)> save Configuration saved. > 8. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 152 Serial port IX20 devices have a single serial port that provides access to the command-line interface. Use an RS-232 serial cable to establish a serial connection from your IX20 to your local laptop or PC. Use a terminal emulator program to establish the serial connection. The terminal emulator's serial connection must be configured to match the configuration of the IX20 device's serial port. The default serial port configuration is: n Enabled n Serial mode: Remote n Label: None n Baud rate: 9600 n Data bits: 8 n Parity: None n Stop bits: 1 n Flow control: None Configure the serial port By default, the IX20 serial port is configured as follows: n Enabled n Serial mode: Remote n Label: None n Baud rate: 9600 n Data bits: 8 n Parity: None n Stop bits: 1 n Flow control: None To change the configuration to match the serial configuration of the device to which you want to connect: WebUI IX20 User Guide 153 Serial port Configure the serial port 1. Log into the IX20 WebUI as a user with Admin access. 2. On the menu, click System. Under Configuration, click Serial Configuration. The Serial Configuration page is displayed. Note You can also configure the serial port by using Device Configuration > Serial. Changes made by using either Device Configuration or Serial Configuration will be reflected in both. 3. Click to expand Port 1. The serial port is enabled by default. To disable, toggle off Enable. 4. For Mode, one of the following: n Login: Allows the user to log into the device through the serial port. n Remote access: Allows for remote access to another device that is connected to the serial port. n Application: Provides access to the serial device from Python applications. See Use Python to access serial ports for information about creating Python applications that access the serial port. n Modbus: Allows you to use the serial port for Modbus. The default is Login. 5. (Optional) For Label, enter a label that will be used when referring to this port. 6. If Login, Remote Access, or Modbus is selected for Mode: a. Click to expand Serial Settings. b. For Baud rate, select the baud rate used by the device to which you want to connect. IX20 User Guide 154 Serial port Configure the serial port c. For Data bits, select the number of data bits used by the device to which you want to connect. d. For Parity, select the type of parity used by the device to which you want to connect. e. For Stop bits, select the number of stop bits used by the device to which you want to connect. f. For Flow control, select the type of flow control used by the device to which you want to connect. 7. (Optional) If Remote Access is selected for Mode: a. Click to expand Service Settings. All service settings are disabled by default. Click available options to toggle them to enabled, and set the IP ports as appropriate. b. Click to expand Session Settings. c. Enable Exclusive access to limit access to the serial port to a single active session. d. For Escape sequence, type the characters used to start an escape sequence. If no characters are defined, the escape sequence is disabled. The default is ~b. e. For History size, type or select the number of bytes of output from the serial port that are written to buffer. These bytes are redisplayed when a user connects to the serial port. The default is 4000 bytes. f. For Idle timeout, type the amount of time to wait before disconnecting due to user inactivity. 1. Click to expand Monitor Settings. a. Enable CTS to monitor CTS (Clear to Send) changes on this port. b. Enable DCD to monitor DCD (Data Carrier Detect) changes on this port. 8. (Optional) Copy the serial port's configuration by clicking the (copy) icon. The Copy Configuration window displays. IX20 User Guide 155 Serial port Configure the serial port a. For Copy Port 1 configuration to these ports:, type the names of the ports that the configuration should be copied to. b. For Copy these settings, select the types of settings that should be copied to the selected ports. c. Click Copy. 9. Click Apply to save the configuration and apply the change. The Apply button is located at the top of the WebUI page. You may need to scroll to the top of the page to locate it. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. The serial port is enabled by default. To disable: (config)> serial port1 enable false (config)> IX20 User Guide 156 Serial port Configure the serial port 4. Set the mode: (config)> serial port1 mode mode (config)> where mode is either: n login: Allows the user to log into the device through the serial port. n remote: Allows for remote access to another device that is connected to the serial port. n application: Provides access to the serial device from Python applications. See Use Python to access serial ports for information about creating Python applications that access the serial port. n modbus: Allows you to use the serial port for Modbus. The default is login. 5. (Optional) Set a label that will be used when referring to this port. (config)> serial port1 label label (config)> 6. If mode is set to login or remote: a. Set the baud rate used by the device to which you want to connect: (config)> serial port1 baudrate rate (config)> b. Set the number of data bits used by the device to which you want to connect: (config)> serial port1 databits bits (config)> c. Set the type of parity used by the device to which you want to connect: (config)> serial port1 parity parity (config)> Allowed values are: n even n odd n none The default is none. d. Set the stop bits used by the device to which you want to connect: (config)> serial port1 stopbits bits (config)> e. Set the type of flow control used by the device to which you want to connect: (config)> serial port1 flow type (config) IX20 User Guide 157 Serial port Configure the serial port Allowed values are: n none n rts/cts n xon/xoff The default is none. 7. If mode is set to remote: a. Set the characters used to start an escape sequence: (config)> serial port1 escape string (config) If no characters are defined, the escape sequence is disabled. The default is ~b. b. Limit access to the serial port to a single active session: (config)> serial port1 exclusive true (config) c. Set the number of bytes of output from the serial port that are written to buffer. These bytes are redisplayed when a user connects to the serial port. (config)> serial port1 history bytes (config) The default is 4000 bytes. d. Set the amount of time to wait before disconnecting due to user inactivity: (config)> serial port1 idle_timeout value (config) where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set idle_timeout to ten minutes, enter either 10m or 600s: (config)> serial port1 idle_timeout 600s (config) The default is 15m. e. (Optional) Enable monitoring of CTS (Clear to Send) changes on this port: (config)> serial port1 monitor cts true (config) f. (Optional) Enable monitoring of DCD (Data Carrier Detect) changes on this port: (config)> serial port1 monitor dcd true (config) IX20 User Guide 158 Serial port Configure the serial port g. Configure TCP access to this port: i. Set the connection type: (config serial USB_port)> service tcp conn_type value (config serial USB_port)> where value is one of: i. tcp: The TCP connection is unencrypted. ii. tls: The TCP connection uses Transport Layer Security (TLS) encryption. iii. tls_auth: The TCP connection uses TLS encryption with authentication. ii. Enable TCP access: (config serial USB_port)> service tcp enable true (config serial USB_port)> iii. Set the TCP port: (config serial USB_port)> service tcp port port (config serial USB_port)> iv. (Optional) Configure the access control list to limit access to the TCP connection: n To limit access to specified IPv4 addresses and networks: (config serial USB_port)> add service tcp acl address end value (config serial USB_port)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the tcp port. Repeat this step to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: (config serial USB_port)> add service tcp acl address6 end value (config serial USB_port)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the tcp port. Repeat this step to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: IX20 User Guide 159 Serial port Configure the serial port (config serial USB_port)> add service tcp acl interface end value (config serial USB_port)> Where value is an interface defined on your device. Display a list of available interfaces: Use ... network interface ? to display interface information: (config serial USB_port)> ... network interface ? Interfaces Additional Configuration ------------------------------------------- defaultip Default IP defaultlinklocal Default Link-local IP eth1 ETH1 eth2 ETH2 loopback Loopback modem Modem (config serial USB_port)> Repeat this step to list additional interfaces. n To limit access based on firewall zones: (config serial USB_port)> add service tcp acl zone end value Where value is a firewall zone defined on your device, or the any keyword. Display a list of available firewall zones: Type ... firewall zone ? at the config prompt: (config serial USB_port)> ... firewall zone ? Zones: A list of groups of network interfaces that can be referred to by packet filtering rules and access control lists. Additional Configuration ------------------------------------------------------------------------------ any dynamic_routes edge external internal ipsec loopback IX20 User Guide 160 Serial port Configure the serial port setup (config serial USB_port)> Repeat this step to list additional firewall zones. v. (Optional) Enable mDNS. mDNS is a protocol that resolves host names in small networks that do not have a DNS server. (config serial USB_port)> service tcp mdns enable true (config serial USB_port)> h. Configure telnet access to this port: CAUTION! This connection is not authenticated or encrypted. i. Enable telnet access: (config serial USB_port)> service telnet enable false (config serial USB_port)> ii. Set the telnet port: (config serial USB_port)> service telnet port port (config serial USB_port)> iii. (Optional) Configure the access control list to limit access to the telnet connection: n To limit access to specified IPv4 addresses and networks: (config serial USB_port)> add service telnet acl address end value (config serial USB_port)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the telnet port. Repeat this step to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: (config serial USB_port)> add service telnet acl address6 end value (config serial USB_port)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the telnet port. Repeat this step to list additional IP addresses or networks. IX20 User Guide 161 Serial port Configure the serial port n To limit access to hosts connected through a specified interface on the IX20 device: (config serial USB_port)> add service telnet acl interface end value (config serial USB_port)> Where value is an interface defined on your device. Display a list of available interfaces: Use ... network interface ? to display interface information: (config serial USB_port)> ... network interface ? Interfaces Additional Configuration ------------------------------------------- defaultip Default IP defaultlinklocal Default Link-local IP eth1 ETH1 eth2 ETH2 loopback Loopback modem Modem (config serial USB_port)> Repeat this step to list additional interfaces. n To limit access based on firewall zones: (config serial USB_port)> add service telnet acl zone end value Where value is a firewall zone defined on your device, or the any keyword. Display a list of available firewall zones: Type ... firewall zone ? at the config prompt: (config serial USB_port)> ... firewall zone ? Zones: A list of groups of network interfaces that can be referred to by packet filtering rules and access control lists. Additional Configuration ------------------------------------------------------------------------------ any dynamic_routes edge IX20 User Guide 162 Serial port Configure the serial port external internal ipsec loopback setup (config serial USB_port)> Repeat this step to list additional firewall zones. iv. (Optional) Enable mDNS. mDNS is a protocol that resolves host names in small networks that do not have a DNS server. (config serial USB_port)> service telnet mdns enable true (config serial USB_port)> i. Configure ssh access to this port: i. Enable ssh access: (config serial USB_port)> service ssh enable false (config serial USB_port)> ii. Set the ssh port: (config serial USB_port)> service ssh port port (config serial USB_port)> iii. (Optional) Configure the access control list to limit access to the ssh connection: n To limit access to specified IPv4 addresses and networks: (config serial USB_port)> add service ssh acl address end value (config serial USB_port)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the ssh port. Repeat this step to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: (config serial USB_port)> add service ssh acl address6 end value (config serial USB_port)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the ssh port. Repeat this step to list additional IP addresses or networks. IX20 User Guide 163 Serial port Configure the serial port n To limit access to hosts connected through a specified interface on the IX20 device: (config serial USB_port)> add service ssh acl interface end value (config serial USB_port)> Where value is an interface defined on your device. Display a list of available interfaces: Use ... network interface ? to display interface information: (config serial USB_port)> ... network interface ? Interfaces Additional Configuration ------------------------------------------- defaultip Default IP defaultlinklocal Default Link-local IP eth1 ETH1 eth2 ETH2 loopback Loopback modem Modem (config serial USB_port)> Repeat this step to list additional interfaces. n To limit access based on firewall zones: (config serial USB_port)> add service ssh acl zone end value Where value is a firewall zone defined on your device, or the any keyword. Display a list of available firewall zones: Type ... firewall zone ? at the config prompt: (config serial USB_port)> ... firewall zone ? Zones: A list of groups of network interfaces that can be referred to by packet filtering rules and access control lists. Additional Configuration ------------------------------------------------------------------------------ any dynamic_routes edge external IX20 User Guide 164 Serial port Show serial status and statistics internal ipsec loopback setup (config serial USB_port)> Repeat this step to list additional firewall zones. iv. (Optional) Enable mDNS. mDNS is a protocol that resolves host names in small networks that do not have a DNS server. (config serial USB_port)> service ssh mdns enable true (config serial USB_port)> 8. Save the configuration and apply the change: (config)> save Configuration saved. > 9. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Show serial status and statistics To show the status and statistics for the serial port: WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. On the main menu, click Status 3. Under Connections, click Serial. Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. Use the show serial command: > show serial Label -------Serial 1 > Port ----port1 Enable -----true Mode ----login Baudrate -------9600 IX20 User Guide 165 Serial port Log serial port messages 3. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Log serial port messages To display and configure the serial port log: WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. On the main menu, click Status 3. Under Connections, click Serial. 4. Click Log. The Serial port log window displays. 5. Click Start to start serial port logging. 6. Click Stop to stop serial port logging if it has been started. 7. Click Refresh to refresh the log display. 8. Click Download to download the serial port log. 9. (Optional) For Log size, configure the maximum allowed log size for the serial port log. The default is 65536. IX20 User Guide 166 Wi-Fi This chapter applies to the IX20W Wi-Fi enabled model only. This chapter contains the following topics: Wi-Fi configuration 168 Configure the Wi-Fi radio's channel 170 Configure the Wi-Fi radio's band and protocol 172 Configure the Wi-Fi radio's transmit power 173 Configure a Wi-Fi access point with no security 175 Configure a Wi-Fi access point with personal security 180 Configure a Wi-Fi access point with enterprise security 185 Isolate Wi-Fi clients 192 Show Wi-Fi access point status and statistics 199 Configure a Wi-Fi client and add client networks 200 Show Wi-Fi client status and statistics 207 IX20 User Guide 167 Wi-Fi Wi-Fi configuration Wi-Fi configuration The Wi-Fi enabled IX20W device has one Wi-Fi radio. You can configure the Wi-Fi radio for Wi-Fi access point mode or Wi-Fi client mode. By default, the IX20W radio is configured to use access point mode. Default access point SSID and password By default, the IX20 device has one access point enabled. The default SSID for the access points is: Digi-IX20W-serial_number Digi-IX20-serial_number The password for the default access point is the unique password as found on the device's label. Prior to saving any configuration changes to the device, you will need to configure the access point to change the default SSID and password. See Reset default SSID and pre-shared key for the preconfigured Wi-Fi access point for information about changing the default SSID and password. Default Wi-Fi configuration The default Wi-Fi configuration of the IX20W device is: IX20 User Guide 168 Wi-Fi n Wi-Fi radio: Enabled or disabled Frequency band TX power percentage Access point mode Channel Channel width Beacon interval n Access point: Name Enabled or disabled SSID SSID broadcast Encyrption Pre-shared key Group rekey interval n Client mode connections: none. Wi-Fi configuration Default setting Enabled 2.4 GHz 100 802.11b/g/n Automatic 20/40 MHz 100 Default setting Digi AP Enabled Digi-IX20W-serial_number Enabled WAP2 Personal (PSK) The unique password printed on the bottom label of the device. 10 minutes IX20 User Guide 169 Wi-Fi Configure the Wi-Fi radio's channel Configure the Wi-Fi radio's channel By default, the Wi-Fi radio is configured to automatically select the best channel to use with respect to other Wi-Fi networks. You can configure a specific channel to use for the Wi-Fi Wi-Fi radio by using the following steps. Note For the 2.4 GHz band, only channels 1 to 11 are supported; channels 12, 13, and 14 are not supported. For the 5.0 GHz band, only non-Dynamic Frequency Selection (DFS) channels are supported. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > WiFi. 4. For Channel, select the channel. Only channels appropriate for the band are displayed. IX20 User Guide 170 Wi-Fi 5. Click Apply to save the configuration and apply the change. Configure the Wi-Fi radio's channel Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Set the channel for the radio: a. Determine the band for the radio: (config)> network wifi radio phy0 band 2400mhz (config)> b. Set the channel for the Wi-Fi radio: (config)> network wifi radio phy0 2400mhz channel value (config)> where value is: n For 2.4 GHz: l 1 through 11 l auto n For 5 GHz: l 36 l 40 l 44 l 48 l auto 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 171 Wi-Fi Configure the Wi-Fi radio's band and protocol Configure the Wi-Fi radio's band and protocol For Wi-Fi radios that support both 2.4 GHz and 5 GHz modes, you can configure the band. Wi-Fi radio defaults to use 2.4 GHz b/g/n band. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > WiFi. 4. For Frequency band, select either 2.4 GHz or 5 GHz. 5. For Access point mode, select the appropriate mode. Only modes appropriate for the selected band are displayed. 6. Click Apply to save the configuration and apply the change. Command line IX20 User Guide 172 Wi-Fi Configure the Wi-Fi radio's transmit power 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Set channel for the radio: a. Set the band for the radio: (config)> network wifi radio phy0 band value (config)> where value is either 2400mhz or 5000mhz. b. Set the mode for the Wi-Fi radio. For example: n If the Wi-Fi radio has a band of 2400mhz: (config)> network wifi radio phy0 2400mhz mode value (config)> where value is one of b, bg, bgn, g, gn, or n. n If the Wi-Fi radio has a band of 5000mhz: (config)> network wifi radio phy0 5000mhz mode value (config)> where value is one of ac, acn, or n. 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure the Wi-Fi radio's transmit power The default Wi-Fi transmit power that the Wi-Fi radio will use when in access point or client mode is 100 percent. You can configure the Wi-Fi radio to transmit at a lower power. WebUI IX20 User Guide 173 Wi-Fi Configure the Wi-Fi radio's transmit power 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > WiFi. 4. For Tx power percentage, type or select the appropriate percentage for the Wi-Fi radio's transmit power. 5. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> IX20 User Guide 174 Wi-Fi Configure a Wi-Fi access point with no security 3. Set the transmit power percentage for the radio: (config)> network wifi radio phy0 tx_power value (config)> where value is any integer between 1 and 100 and represents the percentage of transmit power that the Wi-Fi module should use. 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure a Wi-Fi access point with no security This procedure configures a Wi-Fi access point that does not require a password for client connections, and uses no security or encryption. By default, the IX20 device comes with one preconfigured access point, Digi AP. You cannot delete default access points, but you can modify them or you can create your own access points. Required configuration items n Enable the Wi-Fi access point n Select a Wi-Fi radio for the access point. n The Service Set Identifier (SSID) for the access point. n Configure security for the access point to unencrypted. n LAN/bridge assignment. Once you configure a Wi-Fi access point, you must assign the Wi-Fi access point to a LAN interface or to a bridge. See Configure a LAN and Configure a bridge for more information. Additional configuration items n Determine whether to broadcast the access point's SSID. n Determine whether to isolate clients connected to this access point, so that they cannot communicate with each other. n The amount of time to wait before changing the group key. To configure a Wi-Fi access point with no security: WebUI IX20 User Guide 175 Wi-Fi Configure a Wi-Fi access point with no security 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > WiFi > Access points. 4. Create a new access point or modify an existing access point: n To create a new access point, for Add WiFi access point:, type a name for the access point and click . n To modify an existing access point, click to expand the access point. The Wi-Fi access point configuration window is displayed. 5. Enable the access point. New access points are enabled by default. The default preconfigured access points are disabled by default. 6. For SSID, type the SSID. Up to 32 characters are allowed. 7. Enable SSID broadcast to configure the radio to broadcast the SSID. 8. (Optional) Enable Isolate clients to prevent clients that are connected to this access point from communicating with each other. See Isolate Wi-Fi clients for information about how to prevent clients connected to different access points from communicating with each other. IX20 User Guide 176 Wi-Fi Configure a Wi-Fi access point with no security 9. For Encryption, select Open (Unencrypted). 10. (Optional) For Group rekey interval, type the amount of time to wait before changing the group key. The group key is shared by all in clients of the access point, and after a client has disconnected, it will be able to use the group key to decrypt broadcast packets until the key is changed. Allowed values are any number of days, hours, minutes, or seconds, and take the format number{d|h|m|s}. For example, to set Group rekey interval to ten minutes, enter 10m or 600s. Increasing the time between rekeys can improve connectivity issues in noisy environments. To disable group rekeys, set to 0. This will allow any client that has previously connected see all broadcast traffic on the wireless network until the Wi-Fi radio is restarted. The default is 10 minutes. 11. Assign the Wi-Fi access point to a LAN interface or to a bridge. See Configure a LAN and Configure a bridge for more information. The access point must be assigned to an active LAN, or a bridge that is assigned to an active LAN. 12. Click Apply to save the configuration and apply the change. Command line Configure a new Access point 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Create a new access point: (config)> add network wifi ap new_AP (config network wifi ap new_AP)> New access points are enabled by default. 4. Set the SSID for the Wi-Fi access point. Up to 32 characters are allowed. (config network wifi ap new_AP)> ssid my_SSID (config network wifi ap new_AP)> SSID broadcasting is enabled by default for new access points. IX20 User Guide 177 Wi-Fi Configure a Wi-Fi access point with no security 5. Set the security for the access point to none : (config network wifi ap new_AP)> encryption type none (config network wifi ap new_AP)> 6. (Optional) Determine whether to prevent clients that are connected to this access point from communicating with each other: (config)> network wifi ap digi_ap isolate_client true (config)> See Isolate Wi-Fi clients for information about how to prevent clients connected to different access points from communicating with each other. 7. (Optional) Set the amount of time to wait before changing the group key. The group key is shared by all in clients of the access point, and after a client has disconnected, it will be able to use the group key to decrypt broadcast packets until the key is changed. (config network wifi ap new_AP)> encryption group_rekey value (config network wifi ap new_AP)> where value is any number of days, hours, minutes, or seconds, and takes the format number {d|h|m|s}. For example, to set group rekey interval to ten minutes, enter either 10m or 600s: (config network wireless ap new_AP)> encryption group_rekey 600s (config network wireless ap new_AP)> Increasing the time between rekeys can improve connectivity issues in noisy environments. To disable group rekeys, set to 0. This will allow any client that has previously connected see all broadcast traffic on the wireless network until the Wi-Fi radio is restarted. The default is 10 minutes. 1. Assign the Wi-Fi access point to a LAN interface or to a bridge. See Configure a LAN and Configure a bridge for more information. The access point must be assigned to an active LAN, or a bridge that is assigned to an active LAN. 2. Save the configuration and apply the change: (config)> save Configuration saved. > 3. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Edit an existing Access point 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. IX20 User Guide 178 Wi-Fi Configure a Wi-Fi access point with no security 2. At the command line, type config to enter configuration mode: > config (config)> 3. Show available access points: (config)> network wifi ap ? Additional Configuration -------------------------------------------------------------------------- ----- digi_ap Digi AP (config)> 4. Set the SSID for the appropriate access point: (config)> network wifi ap digi_ap ssid my_SSID (config)> 5. SSID broadcasting is enabled by default for the preconfigured access points. If SSID broadcasting is disabled: (config)> network wifi ap digi_ap ssid_broadcast true (config)> 6. Set the security for the access point to none : (config)> network wifi ap digi_ap encryption type none (config)> 7. (Optional) Determine whether to prevent clients that are connected to this access point from communicating with each other: (config)> network wifi ap digi_ap isolate_client true (config)> See Isolate Wi-Fi clients for information about how to prevent clients connected to different access points from communicating with each other. 8. (Optional) Set the amount of time to wait before changing the group key. The group key is shared by all in clients of the access point, and after a client has disconnected, it will be able to use the group key to decrypt broadcast packets until the key is changed. (config)> network wifi ap digi_ap encryption group_rekey value (config)> where value is any number of days, hours, minutes, or seconds, and takes the format number {d|h|m|s}. For example, to set group rekey interval to ten minutes, enter either 10m or 600s: IX20 User Guide 179 Wi-Fi Configure a Wi-Fi access point with personal security (config)> network wireless ap digi_ap encryption group_rekey 600s (config)> Increasing the time between rekeys can improve connectivity issues in noisy environments. To disable group rekeys, set to 0. This will allow any client that has previously connected see all broadcast traffic on the wireless network until the Wi-Fi radio is restarted. The default is 10 minutes. 1. Assign the Wi-Fi access point to a LAN interface or to a bridge. See Configure a LAN and Configure a bridge for more information. The access point must be assigned to an active LAN, or a bridge that is assigned to an active LAN. 2. Save the configuration and apply the change: (config)> save Configuration saved. > 3. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure a Wi-Fi access point with personal security The WPA and WPA2 personal security modes allow a Wi-Fi access point to authenticate clients by using a preshared key that the client enters when connecting to the access point. By default, the IX20 device comes with one preconfigured access point, Digi AP. You cannot delete default access points, but you can modify them or you can create your own access points. Required configuration items n Enable the Wi-Fi access point n Select a Wi-Fi radio for the access point. n The Service Set Identifier (SSID) for the access point. n Configure security for the access point to WPA personal (PSK) or WPA2 personal (PSK). n The password (preshared key) that clients will used to connect to the access point. n LAN/bridge assignment. Once you configure a Wi-Fi access point, you must assign the Wi-Fi access point to a LAN interface or to a bridge. See Configure a LAN and Configure a bridge for more information. Additional configuration items n Determine whether to broadcast the access point's SSID. n Determine whether to isolate clients connected to this access point, so that they cannot communicate with each other. n The amount of time to wait before changing the group key. To configure a Wi-Fi access point with WPA personal (PSK) or WPA2 personal (PSK) security: IX20 User Guide 180 Wi-Fi Configure a Wi-Fi access point with personal security WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > WiFi > Access points. 4. Create a new access point or modify an existing access point: n To create a new access point, for Add WiFi access point:, type a name for the access point and click . n To modify an existing access point, click to expand the access point. The Wi-Fi access point configuration window is displayed. 5. Enable the access point. New access points are enabled by default. The default preconfigured access points are disabled by default. 6. For SSID, type the SSID. Up to 32 characters are allowed. 7. Enable SSID broadcast to configure the radio to broadcast the SSID. IX20 User Guide 181 Wi-Fi Configure a Wi-Fi access point with personal security 8. (Optional) Enable Isolate clients to prevent clients that are connected to this access point from communicating with each other. See Isolate Wi-Fi clients for information about how to prevent clients connected to different access points from communicating with each other. 9. For Encryption, select WPA Personal (PSK) or WPA2 Personal (PSK). 10. For Pre-shared key, enter the password that clients will use when connecting to the access point. 11. (Optional) For Group rekey interval, type the amount of time to wait before changing the group key. The group key is shared by all in clients of the access point, and after a client has disconnected, it will be able to use the group key to decrypt broadcast packets until the key is changed. Allowed values are any number of days, hours, minutes, or seconds, and take the format number{d|h|m|s}. For example, to set Group rekey interval to ten minutes, enter 10m or 600s. Increasing the time between rekeys can improve connectivity issues in noisy environments. To disable group rekeys, set to 0. This will allow any client that has previously connected see all broadcast traffic on the wireless network until the Wi-Fi radio is restarted. The default is 10 minutes. 12. Assign the Wi-Fi access point to a LAN interface or to a bridge. See Configure a LAN and Configure a bridge for more information. The access point must be assigned to an active LAN, or a bridge that is assigned to an active LAN. 13. Click Apply to save the configuration and apply the change. Command line Configure a new Access point 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Create a new access point: (config)> add network wifi ap new_AP (config network wifi ap new_AP)> New access points are enabled by default. IX20 User Guide 182 Wi-Fi Configure a Wi-Fi access point with personal security 4. Set the SSID for the Wi-Fi access point. Up to 32 characters are allowed. (config network wifi ap new_AP)> ssid my_SSID (config network wifi ap new_AP)> SSID broadcasting is enabled by default for new access points. 5. Set the security for the access point to psk or psk2 : (config network wifi ap new_AP)> encryption type psk2 (config network wifi ap new_AP)> 6. (Optional) Determine whether to prevent clients that are connected to this access point from communicating with each other: (config)> network wifi ap digi_ap isolate_client true (config)> See Isolate Wi-Fi clients for information about how to prevent clients connected to different access points from communicating with each other. 7. Set the password that clients will use when connecting to the access point: (config network wifi ap new_AP)> encryption key_psk2 password (config network wifi ap new_AP)> 8. (Optional) Set the amount of time to wait before changing the group key. The group key is shared by all in clients of the access point, and after a client has disconnected, it will be able to use the group key to decrypt broadcast packets until the key is changed. (config network wifi ap new_AP)> encryption group_rekey value (config network wifi ap new_AP)> where value is any number of days, hours, minutes, or seconds, and takes the format number {d|h|m|s}. For example, to set group rekey interval to ten minutes, enter either 10m or 600s: (config network wireless ap new_AP)> encryption group_rekey 600s (config network wireless ap new_AP)> Increasing the time between rekeys can improve connectivity issues in noisy environments. To disable group rekeys, set to 0. This will allow any client that has previously connected see all broadcast traffic on the wireless network until the Wi-Fi radio is restarted. The default is 10 minutes. 1. Assign the Wi-Fi access point to a LAN interface or to a bridge. See Configure a LAN and Configure a bridge for more information. The access point must be assigned to an active LAN, or a bridge that is assigned to an active LAN. 2. Save the configuration and apply the change: (config)> save Configuration saved. > IX20 User Guide 183 Wi-Fi Configure a Wi-Fi access point with personal security 3. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Edit an existing Access point 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Show available access points: (config)> network wifi ap ? Additional Configuration -------------------------------------------------------------------------- ----- digi_ap Digi AP (config)> 4. Set the SSID for the appropriate access point: (config)> network wifi ap digi_ap ssid my_SSID (config)> 5. SSID broadcasting is enabled by default for the preconfigured access points. If SSID broadcasting is disabled: (config)> network wifi ap digi_ap ssid_broadcast true (config)> 6. Set the security for the access point to psk or psk2 : (config)> network wifi ap digi_ap encryption type psk2 (config)> 7. (Optional) Determine whether to prevent clients that are connected to this access point from communicating with each other: (config)> network wifi ap digi_ap isolate_client true (config)> See Isolate Wi-Fi clients for information about how to prevent clients connected to different access points from communicating with each other. IX20 User Guide 184 Wi-Fi Configure a Wi-Fi access point with enterprise security 8. Set the password that clients will use when connecting to the access point: (config)> network wifi ap digi_ap encryption key_psk2 password (config)> 9. (Optional) Set the amount of time to wait before changing the group key. The group key is shared by all in clients of the access point, and after a client has disconnected, it will be able to use the group key to decrypt broadcast packets until the key is changed. (config)> network wifi ap digi_ap encryption group_rekey value (config)> where value is any number of days, hours, minutes, or seconds, and takes the format number {d|h|m|s}. For example, to set group rekey interval to ten minutes, enter either 10m or 600s: (config)> network wireless ap digi_ap encryption group_rekey 600s (config)> Increasing the time between rekeys can improve connectivity issues in noisy environments. To disable group rekeys, set to 0. This will allow any client that has previously connected see all broadcast traffic on the wireless network until the Wi-Fi radio is restarted. The default is 10 minutes. 1. Assign the Wi-Fi access point to a LAN interface or to a bridge. See Configure a LAN and Configure a bridge for more information. The access point must be assigned to an active LAN, or a bridge that is assigned to an active LAN. 2. Save the configuration and apply the change: (config)> save Configuration saved. > 3. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure a Wi-Fi access point with enterprise security The WPA2 enterprise security mode allows a Wi-Fi access point to authenticate clients by using one or more RADIUS servers. When the Wi-Fi access point receives a connection request from a client, it authenticates the client with the RADIUS server before allowing the client to connect. Using enterprise security modes allows each client to have different usernames and passwords configured in the RADIUS server, rather than using preshared key on the IX20 device. By default, the IX20 device comes with one preconfigured access point, Digi AP. You cannot delete default access points, but you can modify them or you can create your own access points. IX20 User Guide 185 Wi-Fi Configure a Wi-Fi access point with enterprise security Required configuration items n Enable the Wi-Fi access point n Select a Wi-Fi radio for the access point. n The Service Set Identifier (SSID) for the access point. n Configure security for the access point to WPA2 enterprise. n The IP address for one or more RADIUS servers. n The secret key for one or more RADIUS servers. n LAN/bridge assignment. Once you configure a Wi-Fi access point, you must assign the Wi-Fi access point to a LAN interface or to a bridge. See Configure a LAN and Configure a bridge for more information. Additional configuration items n Determine whether to broadcast the access point's SSID. n Determine whether to isolate clients connected to this access point, so that they cannot communicate with each other. n The server port for one or more RADIUS server. n The amount of time to wait before changing the group key. To configure a Wi-Fi access point with WPA2 enterprise security: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > WiFi > Access points. 4. Create a new access point or modify an existing access point: n To create a new access point, for Add WiFi access point:, type a name for the access point and click . IX20 User Guide 186 Wi-Fi Configure a Wi-Fi access point with enterprise security n To modify an existing access point, click to expand the access point. The Wi-Fi access point configuration window is displayed. 5. Enable the access point. New access points are enabled by default. The default preconfigured access points are disabled by default. 6. For SSID, type the SSID. Up to 32 characters are allowed. 7. Enable SSID broadcast to configure the radio to broadcast the SSID. 8. (Optional) Enable Isolate clients to prevent clients that are connected to this access point from communicating with each other. See Isolate Wi-Fi clients for information about how to prevent clients connected to different access points from communicating with each other. 9. For Encryption, select WPA2 Enterprise. 10. Configure one or more RADIUS servers: a. Click to expand RADIUS server list. b. Click to expand RADIUS server. c. For RADIUS IP/hostname, type the IP address or hostname of the RADIUS server. d. (Optional) Change the RADIUS port. The default port is 1812. e. For RADIUS secret key, type the secret key as configured on the RADIUS server. IX20 User Guide 187 Wi-Fi Configure a Wi-Fi access point with enterprise security f. To add additional RADIUS servers, click 11. (Optional) For Group rekey interval, type the amount of time to wait before changing the group key. The group key is shared by all in clients of the access point, and after a client has disconnected, it will be able to use the group key to decrypt broadcast packets until the key is changed. Allowed values are any number of days, hours, minutes, or seconds, and take the format number{d|h|m|s}. For example, to set Group rekey interval to ten minutes, enter 10m or 600s. Increasing the time between rekeys can improve connectivity issues in noisy environments. To disable group rekeys, set to 0. This will allow any client that has previously connected see all broadcast traffic on the wireless network until the Wi-Fi radio is restarted. The default is 10 minutes. 12. Assign the Wi-Fi access point to a LAN interface or to a bridge. See Configure a LAN and Configure a bridge for more information. The access point must be assigned to an active LAN, or a bridge that is assigned to an active LAN. 13. Click Apply to save the configuration and apply the change. Command line Configure a new Access point 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Create a new access point: (config)> add network wifi ap new_AP (config network wifi ap new_AP)> New access points are enabled by default. 4. Set the SSID for the Wi-Fi access point. Up to 32 characters are allowed. (config network wifi ap new_AP)> ssid my_SSID (config network wifi ap new_AP)> IX20 User Guide 188 Wi-Fi Configure a Wi-Fi access point with enterprise security SSID broadcasting is enabled by default for new access points. 5. Set the security for the access point to wpa2: (config network wifi ap new_AP)> encryption type wpa2 (config network wifi ap new_AP)> 6. (Optional) Determine whether to prevent clients that are connected to this access point from communicating with each other: (config)> network wifi ap digi_ap isolate_client true (config)> See Isolate Wi-Fi clients for information about how to prevent clients connected to different access points from communicating with each other. 7. Configure one or more RADIUS servers: a. Set the IP address of the RADIUS server: (config network wifi ap new_AP)> encryption radius_servers 0 host IP_ address (config network wifi ap new_AP)> b. Set the secret key as configured on the RADIUS server: (config network wifi ap new_AP)> encryption radius_servers 0 key secret_ key (config network wifi ap new_AP)> c. (Optional) Set the RADIUS server's port. The default is 1812. (config network wifi ap new_AP)> encryption radius_servers 0 port port (config network wifi ap new_AP)> d. (Optional) Add and configure additional radius servers: i. Add a server: (config network wifi ap new_AP)> add encryption radius_servers end (config network wifi ap new_AP encryption radius_servers 1)> ii. Configure the new server as described above. For example, set the server IP address: (config network wifi ap new_AP encryption radius_servers 1)> host IP_address (config network wifi ap new_AP encryption radius_servers 1)> iii. Repeat for additional radius servers. 8. (Optional) Set the amount of time to wait before changing the group key. The group key is shared by all in clients of the access point, and after a client has disconnected, it will be able to use the group key to decrypt broadcast packets until the key is changed. (config network wifi ap new_AP)> encryption group_rekey value (config network wifi ap new_AP)> IX20 User Guide 189 Wi-Fi Configure a Wi-Fi access point with enterprise security where value is any number of days, hours, minutes, or seconds, and takes the format number {d|h|m|s}. For example, to set group rekey interval to ten minutes, enter either 10m or 600s: (config network wireless ap new_AP)> encryption group_rekey 600s (config network wireless ap new_AP)> Increasing the time between rekeys can improve connectivity issues in noisy environments. To disable group rekeys, set to 0. This will allow any client that has previously connected see all broadcast traffic on the wireless network until the Wi-Fi radio is restarted. The default is 10 minutes. 1. Assign the Wi-Fi access point to a LAN interface or to a bridge. See Configure a LAN and Configure a bridge for more information. The access point must be assigned to an active LAN, or a bridge that is assigned to an active LAN. 2. Save the configuration and apply the change: (config)> save Configuration saved. > 3. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Edit an existing Access point 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Show available access points: (config)> network wifi ap ? Additional Configuration -------------------------------------------------------------------------- ----- digi_ap Digi AP (config)> 4. Set the SSID for the appropriate access point: (config)> network wifi ap digi_ap ssid my_SSID (config)> IX20 User Guide 190 Wi-Fi Configure a Wi-Fi access point with enterprise security 5. SSID broadcasting is enabled by default for the preconfigured access points. If SSID broadcasting is disabled: (config)> network wifi ap digi_ap ssid_broadcast true (config)> 6. Set the security for the access point to wpa2: (config)> network wifi ap digi_ap encryption type wpa2 (config)> 7. (Optional) Determine whether to prevent clients that are connected to this access point from communicating with each other: (config)> network wifi ap digi_ap isolate_client true (config)> See Isolate Wi-Fi clients for information about how to prevent clients connected to different access points from communicating with each other. 8. Set the IP address or hostname of the RADIUS server: (config)> network wifi ap digi_ap encryption host_wpa2 hostname (config)> 9. Set the secret key as configured on the RADIUS server: (config)> network wifi ap digi_ap encryption key_wpa2 secret_key (config)> 10. (Optional) Set the RADIUS server's port. The default is 1812. (config)> network wifi ap digi_ap encryption port_wpa2 port (config)> 11. (Optional) Set the amount of time to wait before changing the group key. The group key is shared by all in clients of the access point, and after a client has disconnected, it will be able to use the group key to decrypt broadcast packets until the key is changed. (config)> network wifi ap digi_ap encryption group_rekey value (config)> where value is any number of days, hours, minutes, or seconds, and takes the format number {d|h|m|s}. For example, to set group rekey interval to ten minutes, enter either 10m or 600s: (config)> network wireless ap digi_ap encryption group_rekey 600s (config)> Increasing the time between rekeys can improve connectivity issues in noisy environments. To disable group rekeys, set to 0. This will allow any client that has previously connected see all broadcast traffic on the wireless network until the Wi-Fi radio is restarted. The default is 10 minutes. IX20 User Guide 191 Wi-Fi Isolate Wi-Fi clients 1. Assign the Wi-Fi access point to a LAN interface or to a bridge. See Configure a LAN and Configure a bridge for more information. The access point must be assigned to an active LAN, or a bridge that is assigned to an active LAN. 2. Save the configuration and apply the change: (config)> save Configuration saved. > 3. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Isolate Wi-Fi clients Client isolation prevents wireless clients connected to the IX20 device from communicating with other clients. There are two mechanisms for client isolation configuration: n Isolate clients connected to the same access point n Isolate clients connected to different access points This section provides instructions for both mechanisms. Isolate clients connected to the same access point WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > WiFi > Access points. IX20 User Guide 192 Wi-Fi Isolate Wi-Fi clients 4. Create a new access point or modify an existing access point. See Configure a Wi-Fi access point with no security, Configure a Wi-Fi access point with personal security, or Configure a WiFi access point with enterprise security. 5. Enable Isolate clients. 6. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Create a new access point or modify an existing access point. See Configure a Wi-Fi access point with no security, Configure a Wi-Fi access point with personal security, or Configure a WiFi access point with enterprise security. 4. (Optional) Set the client isolation: (config)> network wifi ap digi_ap isolate_client true (config)> 5. Save the configuration and apply the change: (config)> save Configuration saved. > 6. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Isolate clients connected to different access points Isolating clients that are on different access points involves the following steps: 1. Create new access points. 2. Assign the access points to separate LAN interfaces. 3. Assign those LAN interfaces to separate firewall zones. 4. Create firewall filters to prevent traffic between the two firewall zones. WebUI IX20 User Guide 193 Wi-Fi Isolate Wi-Fi clients 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Create a new access point. By default, the IX20 comes with one preconfigured access point, named Digi AP. In these instructions, we will use the existing Digi AP access point and create another new access point, named new_AP. a. Click Network > WiFi > Access points. b. For Add WiFi access point:, type a name for the access point and click . c. For SSID, type the SSID. Up to 32 characters are allowed. d. Select the appropriate type of Encryption and complete the encryption-related fields as appropriate. See Configure a Wi-Fi access point with no security, Configure a Wi-Fi access point with personal security, or Configure a Wi-Fi access point with enterprise security for details. 4. Configure the firewall: a. Click Firewall > Zones. b. In Add Zone, enter LAN2_isolation_zone for the name of the zone and click . Note We will be creating LAN2 later in the procedure. IX20 User Guide 194 Wi-Fi Isolate Wi-Fi clients c. Create a firewall filter to provide internet access for the LAN2_isolation_zone: i. For Add packet filter, click . ii. For Label, type Allow LAN2_isolation_zone to External. iii. For Source zone, select LAN2_isolation_zone. iv. For Destination zone, select External. d. Create a firewall filter to drop traffic from the Internal zone (used by the LAN1 interface) to the LAN2_isolation_zone: i. Click Firewall > Packet filtering. ii. For Add packet filter, click . iii. For Label, type Drop traffic from Internal to LAN2_isolation_zone. iv. For Action, select Drop. v. For Source zone, select Internal. vi. For Destination zone, select LAN2_isolation_zone. e. Rearrange the firewall filters. Firewall filters are applied in the order that they are listed. As a result, in order to drop traffic from the Internal zone to the LAN2_isolation_zone, this filter must be listed prior to the Allow all outgoing traffic filter, which allows the Internal zone to have access to any zone. To move the Drop traffic from Internal to LAN2_isolation_zone filter to the top of the list: i. Click the filter title. ii. Drag-and-drop the filter to the top of the list. 5. Create a new LAN: By default, the IX20 device comes with one preconfigured LAN, which includes the default access point. We will use that LAN for the default access point, and create a new LAN for the second access point. IX20 User Guide 195 Wi-Fi a. Click Configuration > Network > Interfaces. b. For Add interface, type a name for the LAN and click . Isolate Wi-Fi clients c. For Zone, select LAN2_isolation_zone. d. For Device, select the new Wi-Fi access point. e. Click to expand IPv4. f. For Address, type an IP address and subnet for the LAN. g. Click to expand DHCP server. h. Enable the DHCP server. 6. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Configure a new access point: a. Create a new access point: (config)> add network wifi ap new_AP (config network wifi ap new_AP)> New access points are enabled by default. b. Set the SSID for the Wi-Fi access point. Up to 32 characters are allowed. (config network wifi ap new_AP)> ssid my_SSID (config network wifi ap new_AP)> c. Set the security for the access point: (config network wifi ap new_AP)> encryption type value (config network wifi ap new_AP)> where value is one of: IX20 User Guide 196 Wi-Fi Isolate Wi-Fi clients n none n psk n psk2 n wpa2: d. Complete other encryption-related fields as appropriate based on the type of encryption. See Configure a Wi-Fi access point with no security, Configure a Wi-Fi access point with personal security, or Configure a Wi-Fi access point with enterprise security for details. 4. Configure the firewall: a. Return to the root config prompt by typing three periods (...): (config network wifi ap new_AP)> ... (config)> b. Add a new firewall zone named LAN2_isolation_zone. We will be creating LAN2 later in the procedure. (config)> add firewall zone LAN2_isolation_zone (config firewall zone LAN2_isolation_zone)> c. Create a firewall filter to provide internet access for the LAN2_isolation_zone. i. Return to the root config prompt by typing three periods (...): (config firewall zone LAN2_isolation_zone)> ... (config)> ii. Add the new packet filter: (config)> add firewall filter end (config firewall filter 1)> iii. Set the label for the filter: (config firewall filter 1)> label "Allow LAN2_isolation_zone to External" (config firewall filter 1)> iv. Set the source zone to LAN2_isolation_zone: (config firewall filter 1)> src_zone LAN2_isolation_zone (config firewall filter 1)> v. Set the destination zone to external: (config firewall filter 1)> dst_zone external (config firewall filter 1)> d. Create a firewall filter to drop traffic from the Internal zone (used by the LAN1 interface) to the LAN2_isolation_zone: Firewall filters are applied in the order that they are listed. As a result, in order to drop traffic from the Internal zone to the LAN2_isolation_zone, this filter must be added before the Allow all outgoing traffic filter, which allows the Internal zone to have access IX20 User Guide 197 Wi-Fi Isolate Wi-Fi clients to any zone. In this example, we will add the new to the first position in the list (index position 0). i. Add the new packet filter: (config firewall filter 1)> add .. 0 (config firewall filter 0)> ii. Set the label for the filter: (config firewall filter 0)> label "Drop traffic from Internal to LAN2_isolation_zone" (config firewall filter 0> iii. Set the source zone to internal: (config firewall filter 0)> src_zone internal (config firewall filter 0)> iv. Set the destination zone to LAN2_isolation_zone: (config firewall filter 0)> dst_zone LAN2_isolation_zone (config firewall filter 0)> v. Set the filter to drop traffic between the zones: (config firewall filter 0)> action drop (config firewall filter 0)> 5. Create a new LAN: By default, the IX20 device comes with one preconfigured LAN, which includes the default access point. We will use that LAN for the default access point, and create a new LAN for the second access point. a. Return to the root config prompt by typing three periods (...): (config firewall filter 0)> ... (config)> b. Add the new LAN: (config)> add network interface LAN2 (config network interface LAN2)> c. Set the device to the new Wi-Fi access point: (config network interface LAN2)> device /network/wifi/ap/new_AP (config network interface LAN2)> d. Set the zone to LAN2_isolation_zone: (config network interface LAN2)> zone LAN2_isolation_zone (config network interface LAN2)> IX20 User Guide 198 Wi-Fi Show Wi-Fi access point status and statistics e. Set the IP address and subnet mask of the LAN: (config network interface LAN2)> ipv4 address address/mask (config network interface LAN2)> f. Enable the DHCP server: (config network interface LAN2)> ipv4 dhcp_server enable true (config network interface LAN2)> 6. Save the configuration and apply the change: (config network interface LAN2)> save Configuration saved. > 7. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Show Wi-Fi access point status and statistics You can show summary status for all Wi-Fi access points, and detailed status and statistics for individual Wi-Fi access points. WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. On the main menu, click Status. 3. Under Connections, click Wi-Fi > Access Points. Command line Show summary of Wi-Fi access points To show the status and statistics for Wi-Fi access points, use the show wifi command. 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the Admin CLI prompt, type show wifi ap: > show wifi ap AP -------my_AP digi_ap Enabled ------true true Status -----up up SSID ------------my_SSID Digi2 BSSID ----------------01:41:D1:14:36:37 00:40:D0:13:35:36 > IX20 User Guide 199 Wi-Fi Configure a Wi-Fi client and add client networks 3. To view information about both active and inactive access points, include the all parameter: > show wifi ap all AP -------my_AP digi_ap digi_ap2 Enabled ------true true false Status -----up up down SSID ------------my_SSID Digi2 BSSID ----------------01:41:D1:14:36:37 00:40:D0:13:35:36 > Show detailed status and statistics of a specific Wi-Fi access point To show a detailed status and statistics of a Wi-Fi access point, use the show wifi ap name name command. 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the Admin CLI prompt, type show wifi ap name name: > show wifi ap name my_AP Enabled Status : true : up SSID Security : my_AP : none Channel Channel Width Radio BSSID : : : wifi : 01:41:D1:14:36:37 Client ----------------cc:c0:78:34:d5:a2 Signal ------68 RX -----260997 TX -----279481 Uptime -----801 > Configure a Wi-Fi client and add client networks Required configuration items n Create the Wi-Fi client. n The IX20 device's Wi-Fi radio that the Wi-Fi client will use. n The Wi-Fi network that the client will log into: l SSID of the Wi-Fi network's access point. l Type of security, and user name and/or password if applicable, used by the access point. IX20 User Guide 200 Wi-Fi Configure a Wi-Fi client and add client networks n WAN assignment. Once you configure a Wi-Fi client, you must assign the Wi-Fi client to a WAN. See Wide Area Networks (WANs) and Wireless Wide Area Networks (WWANs) for further information. Additional configuration items n Enable and configure background scanning, which allows the Wi-Fi client to move between access points that have the same SSID as their signal strength varies. n Additional access points that client will attempt to use. If connection to one access point fails, the device will attempt to connect to the next access point in the list. To configure a Wi-Fi client: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > WiFi > Client mode connections. 4. For Add WiFi client:, type the name of the client and click . The Wi-Fi client configuration window is displayed. IX20 User Guide 201 Wi-Fi Configure a Wi-Fi client and add client networks New Wi-Fi clients are enabled by default. To disable, or to enable a client if it has been disabled, click Enable. 5. For Radio, select the appropriate Wi-Fi radio. 6. Configure the Wi-Fi network that the client will use: a. Click to expand SSID list. b. Enter the SSID of the access point that the client will use to connect to the Wi-Fi network. c. Select the type of Encryption used by the access point. n If WPA Personal (PSK) or WPA2 Personal (PSK) is selected as the type of Encryption, for Pre-shared key, enter the password that the client will use to connect to the access point. n If WPA2 Enterprise is selected as the type of Encryption, enter the Username and Password that the client will use to connect to the access point. 7. (Optional) Configure Background scanning. Background scanning allows the device to scan for nearby access points and to move between access points that have the same SSID that is configured for the client connection, based on the signal strength of the access points. a. Click to expand Background scanning. b. Click Enable background scanning to enable. c. For Scan threshold, enter a value in dB that is used to determine the scanning frequency. The allowed value is an integer between-113 and 0. The Scan threshold works with the Short interval and Long interval options to determine how often the device should scan for available access points: n If the signal strength from the access point to which the client is currently connected is below the Scan threshold, it will use the Short interval to determine how often to scan for available access points. n If the signal strength from the access point to which the client is currently connected is stronger the Scan threshold, it will use the Long interval to determine how often to scan for available access points. n If Short interval and Long interval are set to the same value, Scan threshold is ignored. For example, the default configuration has both Short interval and Long interval set to 1 second, which means that the device will scan for access points once per second regardless of the Scan threshold. d. For Short interval, type the number of seconds to wait between scans for access points, when the signal strength from the access point to which the client is currently connected is below the Scan threshold. e. For Long interval, type the number of seconds to wait between scans for access points, when the signal strength from the access point to which the client is currently connected is stronger than the Scan threshold. IX20 User Guide 202 Wi-Fi Configure a Wi-Fi client and add client networks f. Click to expand Scan frequencies list. The IX20 device has three preconfigured channels that will be scanned for available access points: n Channel 1 (2412 MHz) n Channel 6 (2437 MHz) n Channel 11 (2462 MHz) You can delete the preconfigured channels and add additional channels. At least one channel is required. g. To delete a preconfigured channel, click the menu icon (...) next to the channel and select Delete. h. To add a channel, click Add Scan frequency and select the appropriate channel. 8. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Create a new Wi-Fi client: (config)> add network wifi client new_client (config network wifi client new_client)> New access points are enabled by default. IX20 User Guide 203 Wi-Fi Configure a Wi-Fi client and add client networks 4. Set the Wi-Fi radio for the new access point: (config network wifi client new_client)> radio wifi (config network wifi client new_client)> 5. Configure the Wi-Fi network that the client will use: a. Set the SSID of the access point that the client will use to connect to the Wi-Fi network: (config network wifi client new_client)> ssid 0 ssid value where value is the SSID of the access point. b. Set the security for the access point: (config network wifi client new_client)> ssid 0 encryption type value (config network wifi client new_client)> where value is the type of encryption used by the access point. Allowed values are: n none: no encryption. n psk: WPA personal encryption. n psk2: WPA2 personal encryption. n wpa2: WPA2 enterprise encryption. c. If the type of encryption is set to: n psk or psk2, set the password that the client will use to connect to the access point: (config network wifi client new_client)> ssid 0 encryption key_ psk2 password (config network wifi client new_client)> n wpa2: i. Set the username that the client will use to connect to the access point: (config network wifi client new_client)> ssid 0 encryption id_ wpa2 username (config network wifi client new_client)> ii. Set the password that the client will use to connect to the access point: (config network wifi client new_client)> ssid 0 encryption password_wpa2 pwd (config network wifi client new_client)> 6. (Optional) Configure background scanning. Background scanning allows the device to scan for nearby access points and to move between access points that have the same SSID that is configured for the client connection, based on the signal strength of the access points. IX20 User Guide 204 Wi-Fi Configure a Wi-Fi client and add client networks a. Enable background scanning: (config network wifi client new_client)> background_scanning enable true (config network wifi client new_client)> b. Set the scan threshold (bgscan_strength), in dB, that is used to determine the scanning frequency. (config network wifi client new_client)> bgscan_strength value (config network wifi client new_client)> where value is an integer between -113 and 0. The scan threshold works with the short and long intervals (bgscan_short_interval and bgscan_long_interval) to determine how often the device should scan for available access points: n If the signal strength from the access point to which the client is currently connected is below the value of bgscan_strength, it will use bgscan_short_ interval to determine how often to scan for available access points. n If the signal strength from the access point to which the client is currently connected is stronger than the value of bgscan_strength, it will use bgscan_long_ interval to determine how often to scan for available access points. n If bgscan_short_interval and bgscan_long_interval are set to the same value, bgscan_strength is ignored. For example, the default configuration has both bgscan_short_interval and bgscan_long_interval set to 1 second, which means that the device will scan for access points once per second regardless of the value of bgscan_strength. c. Set the number of seconds to wait between scans for access points, when the signal strength from the access point to which the client is currently connected is below the value of bgscan_strength: (config network wifi client new_client)> bgscan_short_interval value (config network wifi client new_client)> where value is any integer greater than 0. The default is 1. d. Set the number of seconds to wait between scans for access points, when the signal strength from the access point to which the client is currently connected is greater than the value of bgscan_strength: (config network wifi client new_client)> bgscan_long_interval value (config network wifi client new_client)> where value is any integer greater than 0. The default is 1. e. Configure the frequencies that will be scanned for available access points. The IX20 device has three preconfigured frequencies: n 2412 MHz n 2437 MHz n 2462 MHz IX20 User Guide 205 Wi-Fi Configure a Wi-Fi client and add client networks You can delete the preconfigured frequencies and add additional frequencies. At least one frequencies is required. f. To delete a preconfigured frequencies: i. Use the show command to determine the index number of the channel to be deleted: (config network wifi client new_client)> show background_scanning scan_freq 0 2412 1 2437 2 2462 (config network wifi client new_client)> ii. Use the appropriate index number to delete the channel. For example, to delete the 2412 frequency: (config network wifi client new_client)> del 0 (config network wifi client new_client)> g. To add a frequency: i. Use the ? with an existing index number to determine the allowed values for frequencies: (config network wifi client new_client)> background_scanning scan_ freq 1 Scan frequency: Enable this frequency in the background scan. Format: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 Current value: 2437 ii. Add the appropriate frequency. For example, to add the 2457 frequency to the end of the list: (config network wifi client new_client)> add background_scanning scan_freq end 2457 (config network wifi client new_client)> IX20 User Guide 206 Wi-Fi Show Wi-Fi client status and statistics 7. Save the configuration and apply the change: (config network wireless client new_client)> save Configuration saved. > 8. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Show Wi-Fi client status and statistics You can show summary status for all Wi-Fi clients, and detailed status and statistics for individual Wi-Fi clients. WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. On the main menu, click Status. 3. Under Connections, click Wi-Fi > Clients. Command line Show summary of Wi-Fi clients To show the status and statistics for Wi-Fi client, use the show wifi command. 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the Admin CLI prompt, type show wifi client: > show wifi client Client Enabled SSID Status Sig MAC --------- ------- -------- ------ --- ----------------- my_client true my_SSID up -43 91:fe:86:d1:0e:81 > 3. To view information about both active and inactive clients, include the all parameter: > show wifi client all Client Enabled SSID Status Sig MAC --------- ------- -------- ------ --- ----------------- my_client true my_SSID up -43 91:fe:86:d1:0e:81 client2 true SSID2 down > Show detailed status and statistics of a specific Wi-Fi client IX20 User Guide 207 Wi-Fi Show Wi-Fi client status and statistics To show a detailed status and statistics of a Wi-Fi client, use the show wifi client name name command. 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the Admin CLI prompt, type show wifi cleint name name: > show wifi client name my_client Client Enabled SSID Status Signal MAC Channel Radio TX Power Link Quality BSSID : my_client : true : my_SSID : up : -43 : 91:fe:86:d1:0e:81 : 48 : wifi1 : 23 : 67/70 : 6D:B9:DD:BD:EE:C4 > IX20 User Guide 208 Routing This chapter contains the following topics: IP routing 210 Show the routing table 236 Dynamic DNS 237 Virtual Router Redundancy Protocol (VRRP) 243 IX20 User Guide 209 Routing IP routing IP routing The IX20 device uses IP routes to decide where to send a packet it receives for a remote network. The process for deciding on a route to send the packet is as follows: 1. The device examines the destination IP address in the IP packet, and looks through the IP routing table to find a match for it. 2. If it finds a route for the destination, it forwards the IP packet to the configured IP gateway or interface. 3. If it cannot find a route for the destination, it uses a default route. 4. If there are two or more routes to a destination, the device uses the route with the longest mask. 5. If there are two or more routes to a destination with the same mask, the device uses the route with the lowest metric. This section contains the following topics: Configure a static route 211 Delete a static route 214 Policy-based routing 216 Configure a routing policy 216 Example: Dual WAN policy-based routing 224 Example: Route traffic to a specific WAN interface based on the client MAC address 227 Routing services 232 Configure routing services 233 IX20 User Guide 210 Routing IP routing Configure a static route A static route is a manually configured routing entry. Information about the route is manually entered rather than obtained from dynamic routing traffic. Required configuration items n The destination address or network. n The interface to use to reach the destination. Additional configuration items n A label used to identify this route. n The IPv4 address of the gateway used to reach the destination. n The metric for the route. When multiple routes are available to reach the same destination, the route with the lowest metric is used. n The Maximum Transmission Units (MTU) of network packets using this route. To configure a static route: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > Routes > Static routes. 4. Click the to add a new static route. The new static route configuration page is displayed: IX20 User Guide 211 Routing IP routing New static route configurations are enabled by default. To disable, click to toggle Enable to off. 5. (Optional) For Label, type a label that will be used to identify this route. 6. For Destination, type the IP address or network of the destination of this route. For example, to route traffic to the 192.168.47.0 network that uses a subnet mask of 255.255.255.0, type 192.168.47.0/24. The any keyword can also be used to route packets to any destination with this static route. 7. For Interface, select the interface on the IX20 device that will be used with this static route. 8. (Optional) For Gateway, type the IPv4 address of the gateway used to reach the destination. Set to blank if the destination can be accessed without a gateway. 9. (Optional) For Metric, type the metric for the route. When multiple routes are available to reach the same destination, the route with the lowest metric is used. 10. (Optional) For MTU, type the Maximum Transmission Units (MTU) of network packets using this route. 11. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add a new static route: (config)> add network route static end (config network route static 0)> New static route instances are enabled by default. To disable: (config network route static 0)> enable false (config network route static 0)> IX20 User Guide 212 Routing IP routing 4. (Optional) set a label that will be used to identify this route. For example: (config network route static 0)> label "route to accounting network" (config network route static 0)> 5. Set the IP address or network of the destination of this route. For example: (config network route static 0)> destination ip_address[/netmask] (config network route static 0)> For example, to route traffic to the 192.168.47.0 network that uses a subnet mask of 255.255.255.0: (config network route static 0)> dst 192.168.47.0/24 (config network route static 0)> The any keyword can also be used to route packets to any destination with this static route. 6. Set the interface on the IX20 device that will be used with this static route: a. Use the ? to determine available interfaces: (config network route static 0)> interface ? Interface: The network interface to use to reach the destination. Format: /network/interface/defaultip /network/interface/defaultlinklocal /network/interface/eth1 /network/interface/eth2 /network/interface/loopback Current value: (config network route static 0)> interface b. Set the interface. For example: (config network route static 0)> interface /network/interface/eth1 (config network route static 0)> 7. (Optional) Set the IPv4 address of the gateway used to reach the destination. Set to blank if the destination can be accessed without a gateway. (config network route static 0)> gateway IPv4_address (config network route static 0)> 8. (Optional) Set the metric for the route. When multiple routes are available to reach the same destination, the route with the lowest metric is used. (config network route static 0)> metric value (config network route static 0)> where value is an interger between 0 and 65535. The default is 0. IX20 User Guide 213 Routing IP routing 9. (Optional) Set the Maximum Transmission Units (MTU) of network packets using this route: (config network route static 0)> mtu integer (config network route static 0)> 10. Save the configuration and apply the change: (config)> save Configuration saved. > 11. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Delete a static route WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > Routes > Static routes. 4. Click the menu icon (...) for a static route and select Delete. 5. Click Apply to save the configuration and apply the change. IX20 User Guide 214 Routing IP routing Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Determine the index number of the static route to be deleted: (config)> show network route static 0 dst 10.0.0.1 enable true no gateway interface /network/interface/lan1 label new_static_route metric 0 mtu 0 1 dst 192.168.5.1 enable true gateway 192.168.5.1 interface /network/interface/lan2 label new_static_route_1 metric 0 mtu 0 (config)> 4. Use the index number to delete the static route: (config)> del network route static 0 (config)> 5. Save the configuration and apply the change: (config)> save Configuration saved. > 6. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 215 Routing IP routing Policy-based routing Normally, a routing device determines how to route a network packet based on its destination address. However, you can use policy-based routing to forward the packet based on other criteria, such as the source of the packet. For example, you can configure the IX20 device so that high-priority traffic is routed through the cellular connection, while all other traffic is routed through an Ethernet (WAN) connection. Policy-based routing for the IX20 device uses the following criteria to determine how to route traffic: n Firewall zone (for example, internal/outbound traffic, external/inbound traffic, or IPSec tunnel traffic). n Network interface (for example, the cellular connection, the WAN, or the LAN). n IPv4 address. n IPv6 address. n MAC address. n Domain. n Protocol type (TCP, UDP, ICMP, or all). The order of the policies is important. Routing policies are processed sequentially; as a result, if a packet matches an earlier policy, it will be routed using that policy's rules. It will not be processed by any subsequent rules. Configure a routing policy Required configuration items n The packet matching parameters. It can any combination of the following: l Source interface. l Source address. This can be a firewall zone, an interface, a single IPv4/IPv6 address or network, or a MAC address. l Destination address. This can be a firewall zone, an interface, a single IPv4/IPv6 address or network, or a domain. l Protocol. This can be any, tcp, udp or icmp. l Source port. This is only used if the protocol is set to tcp or udp. l Destination port. This is only used if protocol is set to tcp or udp. n The network interface used to reach the destination. Additional configuration items n A label for the routing policy. n Whether packets that match this policy should be dropped when the gateway interface is disconnected, rather than forwarded through other interfaces. To configure a routing policy: WebUI IX20 User Guide 216 Routing 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. IP routing The Configuration window is displayed. 3. Click Network > Routes > Policy-based routing. 4. Click the to add a new route policy. The new route policy page is displayed: New route policies are enabled by default. To disable, click to toggle Enable to off. 5. (Optional) For Label, type a label that will be used to identify this route policy. 6. For Interface, select the interface on the IX20 device that will be used with this route policy. 7. (Optional) Enable Exclusive to configure the policy to drop packets that match the policy when the gateway interface is disconnected, rather than forwarded through other interfaces. 8. For IP version, select Any, IPv4, or IPv6. 9. For Protocol, select Any, TCP, UDP, or ICMP. n If TCP or UDP is selected for Protocol, type the port numbers of the Source port and Destination port, or set to any to match for any port. n If ICMP is selected for Protocol, type the ICMP type and optional code, or set to any to match for any ICMP type. 10. For DSCP, type the 6-bit hexadecimal Differentiated Services Code Point (DSCP) field match criteria. This will match packets based on the DHCP field within the ToS field of the IP header. IX20 User Guide 217 Routing IP routing 11. Configure source address information: a. Click to expand Source address. b. For Type, select one of the following: n Zone: Matches the source IP address to the selected firewall zone. See Firewall configuration for more information about firewall zones. n Interface: Matches the source IP address to the selected interface's network address. n IPv4 address: Matches the source IP address to the specified IP address or network. Use the format IPv4_address[/netmask], or use any to match any IPv4 address. n IPv6 address: Matches the source IP address to the specified IP address or network. Use the format IPv6_address[/prefix_length], or use any to match any IPv6 address. n MAC address: Matches the source MAC address to the specified MAC address. 12. Configure the destination address information: a. Click to expand Destination address. b. For Type, select one of the following: n Zone: Matches the destination IP address to the selected firewall zone. See Firewall configuration for more information about firewall zones. n Interface: Matches the destination IP address to the selected interface's network address. n IPv4 address: Matches the destination IP address to the specified IP address or network. Use the format IPv4_address/[netmask], or use any to match any IPv4 address. n IPv6 address: Matches the destination IP address to the specified IP address or network. Use the format IPv6_address/[prefix_length], or use any to match any IPv6 address. n Domain: Matches the destination IP address to the specified domain names. To specify domains: i. Click to expand Domains. ii. Click the to add a domain. iii. For Domain, type the domain name. iv. Repeat to add additional domains. n Default route: Matches packets destined for the default route, excluding routes for local networks. 13. Click Apply to save the configuration and apply the change. Command line IX20 User Guide 218 Routing IP routing 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add a new routing policy: (config)> add network route policy end (config network route policy 0)> New route policies are enabled by default. To disable: (config network route policy 0)> enable false (config network route policy 0)> 4. (Optional) Set the label that will be used to identify this route policy: (config network route policy 0)> label "New route policy" (config network route policy 0)> 5. Set the interface on the IX20 device that will be used with this route policy: a. Use the ? to determine available interfaces: (config network route policy 0)> interface ? Interface: The network interface used to reach the destination. Packets that satisfy the matching criteria will be routed through this interface. If the interface has a gateway then it will be used as the next hop. Format: /network/interface/defaultip /network/interface/defaultlinklocal /network/interface/eth1 /network/interface/eth2 /network/interface/loopback Current value: (config network route policy 0)> interface b. Set the interface. For example: (config network route policy 0)> interface /network/interface/eth1 (config network route policy 0)> 6. (Optional) Enable exclusive to configure the policy to drop packets that match the policy when the gateway interface is disconnected, rather than forwarded through other interfaces: (config network route policy 0)> exclusive true (config network route policy 0)> IX20 User Guide 219 Routing IP routing 7. Select the IP version: (config network route policy 0)> ip_version value (config network route policy 0)> where value is one of any, ipv4, or ipv6. 8. Set the protocol: (config network route policy 0)> protocol value (config network route policy 0)> where value is one of: n any: All protocols are matched. n tcp: Source and destination ports are matched: a. Set the source port: (config network route policy 0)> src_port value (config network route policy 0)> where value is the port number, or the keyword any to match any port as the source port. b. Set the destination port: (config network route policy 0)> dst_port value (config network route policy 0)> where value is the port number, or the keyword any to match any port as the destination port. n upd: Source and destination ports are matched: a. Set the source port: (config network route policy 0)> src_port value (config network route policy 0)> where value is the port number, or the keyword any to match any port as the source port. b. Set the destination port: (config network route policy 0)> dst_port value (config network route policy 0)> where value is the port number, or the keyword any to match any port as the destination port. n icmp: The ICMP protocol is matched. Identify the ICMP type: (config network route policy 0)> icmp_type value (config network route policy 0)> where value is the ICMP type and optional code, or set to any to match for any ICMP type. IX20 User Guide 220 Routing IP routing 9. Set the source address type: (config network route policy 0)> src type value (config network route policy 0)> where value is one of: n zone: Matches the source IP address to the selected firewall zone. Set the zone: a. Use the ? to determine available zones: (config network route policy 0)> src zone ? Zone: Match the IP address to the specified firewall zone. Format: any dynamic_routes edge external internal ipsec loopback setup Default value: any Current value: any (config network route policy 0)> src zone b. Set the zone. For example: (config network route policy 0)> src zone external (config network route policy 0)> See Firewall configuration for more information about firewall zones. n interface: Matches the source IP address to the selected interface's network address. Set the interface: a. Use the ? to determine available interfaces: (config network route policy 0)> src interface ? Interface: The network interface. Format: /network/interface/defaultip /network/interface/defaultlinklocal /network/interface/eth1 /network/interface/eth2 /network/interface/loopback Current value: (config network route policy 0)> src interface IX20 User Guide 221 Routing IP routing b. Set the interface. For example: (config network route policy 0)> src interface /network/interface/eth1 (config network route policy 0)> n address: Matches the source IPv4 address to the specified IP address or network. Set the address that will be matched: (config network route policy 0)> src address value (config network route policy 0)> where value uses the format IPv4_address[/netmask], or any to match any IPv4 address. n address6: Matches the source IPv6 address to the specified IP address or network. Set the address that will be matched: (config network route policy 0)> src address6 value (config network route policy 0)> where value uses the format IPv6_address[/prefix_length], or any to match any IPv6 address. n mac: Matches the source MAC address to the specified MAC address. Set the MAC address to be matched: (config network route policy 0)> src mac MAC_address (config network route policy 0)> 10. Set the destination address type: (config network route policy 0)> dst type value (config network route policy 0)> where value is one of: n zone: Matches the destination IP address to the selected firewall zone. Set the zone: a. Use the ? to determine available zones: (config network route policy 0)> dst zone ? Zone: Match the IP address to the specified firewall zone. Format: any dynamic_routes edge external internal ipsec loopback setup Default value: any IX20 User Guide 222 Routing IP routing Current value: any (config network route policy 0)> dst zone b. Set the zone. For example: (config network route policy 0)> dst zone external (config network route policy 0)> See Firewall configuration for more information about firewall zones. n interface: Matches the destination IP address to the selected interface's network address. Set the interface: a. Use the ? to determine available interfaces: (config network route policy 0)> dst interface ? Interface: The network interface. Format: /network/interface/defaultip /network/interface/defaultlinklocal /network/interface/eth1 /network/interface/eth2 /network/interface/loopback Current value: (config network route policy 0)> dst interface b. Set the interface. For example: (config network route policy 0)> dst interface /network/interface/eth1 (config network route policy 0)> n address: Matches the destination IPv4 address to the specified IP address or network. Set the address that will be matched: (config network route policy 0)> dst address value (config network route policy 0)> where value uses the format IPv4_address[/netmask], or any to match any IPv4 address. n address6: Matches the destination IPv6 address to the specified IP address or network. Set the address that will be matched: (config network route policy 0)> dst address6 value (config network route policy 0)> where value uses the format IPv6_address[/prefix_length], or any to match any IPv6 address. n mac: Matches the destination MAC address to the specified MAC address. Set the MAC address to be matched: IX20 User Guide 223 Routing IP routing (config network route policy 0)> dst mac MAC_address (config network route policy 0)> 11. Save the configuration and apply the change: (config)> save Configuration saved. > 12. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Example: Dual WAN policy-based routing This example routes traffic to a specific IP address to go through the cellular WWAN interface, while all other traffic uses the Ethernet WAN interface. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > Routes > Policy-based routing. IX20 User Guide 224 Routing 4. Click the to add a new route policy. IP routing 5. For Label, enter Route through cellular. 6. For Interface, select Modem. 7. Configure the source address: a. Click to expand Source address. b. For Type, select Zone. c. For Zone, select Internal. 8. Configure the destination address: a. Click to expand Destination address. b. For Type, select IPv4 address. c. For IPv4 address, type the IP address that will be the destination for outgoing traffic routed through the WWAN interface. In the above example, this is 241.236.162.59. 9. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. IX20 User Guide 225 Routing IP routing 2. At the command line, type config to enter configuration mode: > config (config)> 3. Create the route policy: a. Add a new routing policy: (config)> add network route policy end (config network route policy 0)> b. Set the label that will be used to identify this route policy: (config network route policy 0)> label "Route through cellular" (config network route policy 0)> c. Set the interface: (config network route policy 0)> interface /network/interface/modem (config network route policy 0)> d. Configure the source address: i. Set the source type to zone: (config network route policy 0)> src type zone (config network route policy 0)> ii. Set the zone to internal: (config network route policy 0)> src zone internal (config network route policy 0)> e. Configure the destination address: i. Set the destination to use an IPv4 address: (config network route policy 0)> dst type address (config network route policy 0)> ii. Set the IP address that will be the destination for outgoing traffic routed through the WWAN interface. In the above example, this is 241.236.162.59. (config network route policy 0)> dst address 241.236.162.59 (config network route policy 0)> 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 226 Routing IP routing Example: Route traffic to a specific WAN interface based on the client MAC address This example routes all data from a certain client device through a cellular WAN based on the device's MAC address, while all other client devices are routed through the Ethernet WAN. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 227 Routing 3. Create new firewall zones: a. Create a firewall zone named CellularWAN with Source NAT enabled: i. Click Firewall > Zones. ii. For Add Zone, type CellularWAN and click . IP routing iii. Enable Source NAT. b. Create second firewall zone named EthernetWAN with Source NAT enabled: i. For Add Zone, type EthernetWAN and click . ii. Enable Source NAT. 4. Configure the WAN interfaces to use the new zones: a. Configure the cellular WAN interface: i. Click Network > Interfaces > Modem. ii. For Zone, select CellularWAN. b. Configure the Ethernet WAN interface: i. Click Network > Interfaces > ETH1. ii. For Zone, select EthernetWAN. 5. Configure the policy-based route for traffic from the client device that will be sent over the cellular WAN: a. Click Network > Routes > Policy-based routing. b. Click the to add a new route policy. IX20 User Guide 228 Routing c. For Label, type VoIP phone. d. For Interface, select Modem. e. Configure the source as the MAC address of the VoIP phone: i. Click to expand Source address. ii. For Type, select MAC address. iii. For MAC address, type 26:88:0E:23:50:C2. f. Configure the destination zone: i. Click to expand Destination address. ii. For Type, select Zone. iii. For Zone, select CellularWAN. IP routing 6. Create a packet filtering rule that rejects all other LAN packets on the cellular WAN interface. a. Click Firewall > Packet filtering. b. Click the to add a new packet filtering rule. c. For Label, type Reject LAN traffic to cellular WAN. d. For Action, select Drop. e. For Source zone, select Internal. f. For Destination zone, select CellularWAN. 7. Click Apply to save the configuration and apply the change. IX20 User Guide 229 Routing IP routing Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Create new firewall zones: a. Create a firewall zone named CellularWAN with Source NAT enabled: i. Create the firewall zone: (config)> add firewall zone CellularWAN (config firewall zone CellularWAN)> i. Enable Source NAT on the new zone: (config firewall zone CellularWAN)> src_nat true (config firewall zone CellularWAN)> b. Create second firewall zone named EthernetWAN with Source NAT enabled: i. Type .. to move back one node in the configuration: (config firewall zone CellularWAN)> .. (config firewall zone)> ii. Create the firewall zone: (config firewall zone)> add EthernetWAN (config firewall zone EthernetWAN)> i. Enable Source NAT on the new zone: (config firewall zone EthernetWAN)> src_nat true (config firewall zone EthernetWAN)> 4. Configure the WAN interfaces to use the new zones: a. Set the zone for the cellular WAN interface: i. Type ... to move to the root of the configuration: (config firewall zone EthernetWAN)> ... (config)> IX20 User Guide 230 Routing IP routing ii. Set the zone: (config)> network interface modem zone CellularWAN (config)> b. Set the zone for the Ethernet WAN interface: (config)> network interface eth1 zone EthernetWAN (config)> 5. Configure the policy-based route for traffic from the client device that will be sent over the cellular WAN: a. Add a new routing policy: (config)> add network route policy end (config network route policy 0)> b. Set the label that will be used to identify this route policy: (config network route policy 0)> label "VoIP phone" (config network route policy 0)> c. Set the interface: (config network route policy 0)> interface /network/interface/modem (config network route policy 0)> d. Configure the source as the MAC address of the VoIP phone: i. Set the source type to mac: (config network route policy 0)> src type mac (config network route policy 0)> ii. Set the MAC address to the MAC address of the VoIP phone: (config network route policy 0)> src mac 26:88:0E:23:50:C2 (config network route policy 0)> e. Configure the destination zone: i. Set the source destination to zone: (config network route policy 0)> dst type zone (config network route policy 0)> ii. Set the zone to CellularWAN: (config network route policy 0)> dst zone CellularWAN (config network route policy 0)> IX20 User Guide 231 Routing IP routing 6. Create a packet filtering rule that rejects all other LAN packets on the cellular WAN interface: a. Create a new packet filtering rule: i. Type ... to move to the root of the configuration: (config network route policy 0)> ... (config)> ii. Create the packet filtering rule: (config)> add firewall filter end (config firewall filter 2)> b. Set the lable to Reject LAN traffic to cellular WAN: (config firewall filter 2)> label "Reject LAN traffic to cellular WAN" (config firewall filter 2)> c. Set the action to drop: (config firewall filter 2)> action drop (config firewall filter 2)> d. Set the source zone to internal: (config firewall filter 2)> src_zone internal (config firewall filter 2)> e. Set the destination zone to CellularWAN: (config firewall filter 2)> dst_zone CellularWAN (config firewall filter 2)> 7. Save the configuration and apply the change: (config firewall filter 2)> save Configuration saved. > 8. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Routing services Your IX20 includes support for dynamic routing services and protocols. The following routing services are supported: Service or protocol RIP Information The IPv4 Routing Information Protocol (RIP) service supports RIPv2 (RFC2453) and RIPv1 (RFC1058). IX20 User Guide 232 Routing IP routing Service or protocol RIPng OSPFv2 OSPFv3 BGP Babel IS-IS Information The IPv6 Routing Information Protocol (RIP) service supports RIPng (RFC2080). The IPv4 Open Shortest Path First (OSPF) service supports OSPFv2 (RFC2328). The IPv6 Open Shortest Path First (OSPF) service supports OSPFv3 (RFC2740). The Border Gateway Protocol (BGP) service supports BGP-4 (RFC1771). The IPv4 and IPv6 Babel service. The IPv4 and IPv6 Intermediate System to Intermediate System (IS-IS) service. Configure routing services Required configuration items n Enable routing services. n Enable and configure the types of routing services that will be used. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > Routes > Routing services. IX20 User Guide 233 Routing 4. Click Enable. IP routing The default firewall zone setting, Dynamic routes, is specifically designed to work with routing services and should be left as the default. 5. Configure the routing services that will be used: a. Click to expand a routing service. b. Enable the routing service. c. Complete the configuration of the routing service. 6. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Enable routing services: (config)> network route service enable true (config)> 4. Configure routing services that will be used: a. Use the ? to display available routing services: (config)> network route service ? Routing services: Settings for dynamic routing services and protocols. Parameters Current Value ----------------------------------------------------------------------- -------- enable true Enable IX20 User Guide 234 Routing IP routing zone dynamic_routes Zone Additional Configuration ----------------------------------------------------------------------- -------- babel Babel bgp BGP isis IS-IS ospfv2 OSPFv2 ospfv3 OSPFv3 rip RIP ripng RIPng (config)> b. Enable a routing service that will be used. For example, to enable the RIP service: (config)> network route service rip enable true (config)> c. Complete the configuration of the routing service. For example, use the ? to view the available parameters for the RIP service: (config)> network route service rip ? Parameters Current Value ----------------------------------------------------------------------- -------- ecmp false Allow ECMP enable true Enable Additional Configuration ----------------------------------------------------------------------- -------- interface Interfaces neighbour Neighbours redis Route redistribution timer Timers (config)> 5. Save the configuration and apply the change: (config)> save Configuration saved. > 6. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 235 Routing Show the routing table Show the routing table To display the routing table: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Status > Routes. The Network Routing window is displayed. 4. Click IPv4 Load Balance to view IPv4 load balancing. 5. Click IPv6 Load Balance to view IPv6 load balancing. Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the Admin CLI prompt, type show route: > show route Destination Gateway Interface ------------------------ ------------------------ - ------------------------ default 10.1.21.1 10.1.14.25 10.1.21.1 /network/device/eth1 10.1.14.27 10.1.21.1 /network/device/eth1 10.1.25.0/24 /network/device/eth1 Source ----------- 10.1.21.99 10.1.21.99 10.1.21.99 Metric --------1 1 1 1 IX20 User Guide 236 Routing Dynamic DNS 127.0.0.0/8 /network/device/loopback fd00:2704::1 fe80::204:f3ff:fe80:e231 fd00:2704::/64 fd00:2704::/48 2147483647 fe80::204:f3ff:fe80:e231 fe80::204:f3ff:fe80:e231 fe80::204:f3ff:ff80:c525 fe80::204:f3ff:fe80:e231 fe80::/64 fe80::/64 default fe80::204:f3ff:fe80:e231 default 127.0.0.1 1 1 1 1 256 256 1 1024 IPv4 Route ---------eth1 modem Load Balance (%) ---------------75.0 25.0 IPv6 Route ---------eth1 modem Load Balance (%) ---------------75.0 25.0 > You can limit the display to only IPv4 entries by using show route ipv4, or to IPv6 entries by using show route ipv6. You can also display more information by adding the verbose option to the show route and show route ip_type commands. 3. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Dynamic DNS The Domain Name System (DNS) uses name servers to provide a mapping between computerreadable IP addresses and human-readable hostnames. This allows users to access websites and personal networks with easy-to-remember URLs. Unfortunately, IP addresses change frequently, invalidating these mappings when they do. Dynamic DNS has become the standard method of addressing this problem, allowing devices to update name servers with their new IP addresses. By providing the IX20 device with the domain name and credentials obtained from a dynamic DNS provider, the router can automatically update the remote nameserver whenever your WAN or public IP address changes. Your IX20 device supports a number of Dynamic DNS providers as well as the ability to provide a custom provider that is not included on the list of providers. Configure dynamic DNS This section describes how to cofigure dynamic DNS on a IX20 device. IX20 User Guide 237 Routing Dynamic DNS Required configuration items n Add a new Dynamic DNS service. n The interface that has its IP address registered with the Dynamic DNS provider. n The name of a Dynamic DNS provider. n The domain name that is linked to the interface's IP address. n The username and password to authenticate with the Dynamic DNS provider. Additional configuration items n If the Dynamic DNS service provider is set to custom, identify the URL that should be used to update the IP address with the Dynamic DNS provider. n The amount of time to wait to check if the interface's IP address needs to be updated. n The amount of time to wait to force an update of the interface's IP address. n The amount of time to wait for an IP address update to succeed before retrying the update. n The number of times to retry a failed IP address update. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > Dynamic DNS. 4. Type a name for this Dynamic DNS instance in Add Service and click . IX20 User Guide 238 Routing The Dynamic DNS configuration page displays. Dynamic DNS New Dynamic DNS configurations are enabled by default. To disable, click to toggle Enable to off. 5. For Interface, select the interface that has its IP address registered with the Dynamic DNS provider. 6. For Service, select the Dynamic DNS provider, or select custom to enter a custom URL for the Dynamic DNS provider. 7. If custom is selected for Service, type the Custom URL that should be used to update the IP address with the Dynamic DNS provider. 8. Type the Domain name that is linked to the interface's IP address. 9. Type the Username and Password used to authenticate with the Dynamic DNS provider. 10. (Optional) For Check Interval, type the amount of time to wait to check if the interface's IP address needs to be updated. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Check interval to ten minutes, enter 10m or 600s. 11. (Optional) For Forced update interval, type the amount of time to wait to force an update of the interface's IP address. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Forced update interval to ten minutes, enter 10m or 600s. The setting for Forced update interval must be larger than the setting for Check Interval. 12. (Optional) For Retry interval, type the amount of time to wait for an IP address update to succeed before retrying the update. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Retry interval to ten minutes, enter 10m or 600s. 13. (Optional) For Retry count, type the number of times to retry a failed IP address update. 14. Click Apply to save the configuration and apply the change. IX20 User Guide 239 Routing Dynamic DNS Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add a new Dynamic DNS instance. For example, to add an instance named new_ddns_ instance: (config)> add network ddns new_ddns_instance (config network ddns new_ddns_instance)> New Dynamic DNS instances are enabled by default. To disable: (config network ddns new_ddns_instance)> enable false (config network ddns new_ddns_instance)> 4. Set the interface for the Dynamic DNS instance: a. Use the ? to determine available interfaces: (config network ddns new_ddns_instance)> interface ? Interface: The network interface from which to obtain the IP address to register with the dynamic DNS service. Format: defaultip defaultlinklocal eth1 eth2 loopback Current value: (config network ddns new_ddns_instance)> interface b. Set the interface. For example: (config network ddns new_ddns_instance)> interface eth1 (config network ddns new_ddns_instance)> IX20 User Guide 240 Routing Dynamic DNS 5. Set the Dynamic DNS provider service: a. Use the ? to determine available services: (config network ddns new_ddns_instance)> service ? Service: The provider of the dynamic DNS service. Format: custom 3322.org changeip.com ddns.com.br dnsdynamic.org ... Default value: custom Current value: custom (config network ddns new_ddns_instance)> service b. Set the service: (config network ddns new_ddns_instance)> service service_name (config network ddns new_ddns_instance)> 6. If custom is configured for service, set the custom URL that should be used to update the IP address with the Dynamic DNS provider: (config network ddns new_ddns_instance)> custom url (config network ddns new_ddns_instance)> 7. Set the domain name that is linked to the interface's IP address: (config network ddns new_ddns_instance)> domain domain_name (config network ddns new_ddns_instance)> 8. Set the username to authenticate with the Dynamic DNS provider: (config network ddns new_ddns_instance)> username name (config network ddns new_ddns_instance)> 9. Set the password to authenticate with the Dynamic DNS provider: (config network ddns new_ddns_instance)> password pwd (config network ddns new_ddns_instance)> 10. (Optional) Set the amount of time to wait to check if the interface's IP address needs to be updated: (config network ddns new_ddns_instance)> check_interval value (config network ddns new_ddns_instance)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. IX20 User Guide 241 Routing Dynamic DNS For example, to set check_interval to ten minutes, enter either 10m or 600s: (config network ddns new_ddns_instance)> check_interval 600s (config network ddns new_ddns_instance)> The default is 10m. 11. (Optional) Set the amount of time to wait to force an update of the interface's IP address: (config network ddns new_ddns_instance)> force_interval value (config network ddns new_ddns_instance)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set force_interval to ten minutes, enter either 10m or 600s: (config network ddns new_ddns_instance)> force_interval 600s (config network ddns new_ddns_instance)> The default is 3d. 12. (Optional) Set the amount of time to wait for an IP address update to succeed before retrying the update: (config network ddns new_ddns_instance)> retry_interval value (config network ddns new_ddns_instance)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set retry_interval to ten minutes, enter either 10m or 600s: (config network ddns new_ddns_instance)> retry_interval 600s (config network ddns new_ddns_instance)> The default is 60s. 13. (Optional) Set the number of times to retry a failed IP address update: (config network ddns new_ddns_instance)> retry_count value (config network ddns new_ddns_instance)> where value is any interger. The default is 5. 14. Save the configuration and apply the change: (config)> save Configuration saved. > 15. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 242 Routing Virtual Router Redundancy Protocol (VRRP) Virtual Router Redundancy Protocol (VRRP) Virtual Router Redundancy Protocol (VRRP) is a standard for gateway device redundancy and failover that creates a "virtual router" with a floating IP address. Devices connected to the LAN then use this virtual router as their default gateway. Responsibility for the virtual router is assigned to one of the VRRP-enabled devices on a LAN (the "master router"), and this responsibility transparently fails over to backup VRRP devices if the master router fails. This prevents the default gateway from being a single point of failure, without requiring configuration of dynamic routing or router discovery protocols on every host. Multiple IX20 devices can be configured as VRRP devices and assigned a priority. The router with the highest priority will be used as the master router. If the master router fails, then the IP address of the virtual router is mapped to the backup device with the next highest priority. Each VRRP router is configured with a unique LAN IP address, and the same shared VRRP address. VRRP+ VRRP+ is an extension to the VRRP standard that uses network probing to monitor connections through VRRP-enabled devices and can dynamically change the priority of the devices, including changing devices from master to backup, and from backup to master, even if the device has not failed. For example, if a host becomes unreachable on the far end of a network link, then the physical default gateway can be changed by adjusting the VRRP priority of the IX20 device connected to the failing link. This provides failover capabilities based on the status of connections behind the router, in addition to the basic VRRP device failover. For IX20 devices, SureLink is used to probe network connections. VRRP+ can be configured to probe a specified IP address by either sending an ICMP echo request (ping) or attempting to open a TCP socket to the IP address. Configure VRRP This section describes how to configure VRRP on a IX20 device. Required configuration items n Enable VRRP. n The interface used by VRRP. n The Router ID that identifies the virtual router instance. The Router ID must be the same on all VRRP devices that participate in the same VRRP device pool. n The VRRP priority of this device. n The shared virtual IP address for the VRRP virtual router. Devices connected to the LAN will use this virtual IP address as their default gateway. See Configure VRRP+ for information about configuring VRRP+, an extension to VRRP that uses network probing to monitor connections through VRRP-enabled devices and dynamically change the VRRP priorty of devices based on the status of their network connectivity. WebUI IX20 User Guide 243 Routing Virtual Router Redundancy Protocol (VRRP) 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > VRRP. 4. For Add VRRP instance, type a name for the VRRP instance and click . The new VRRP instance configuration is displayed. 5. Click Enable. 6. For Interface, select the interface on which this VRRP instance should run. 7. For Router ID field, type the ID of the virtual router instance. The Router ID must be the same on all VRRP devices that participate in the same VRRP device pool. Allowed values are from 1 and 255, and it is configured to 50 by default. 8. For Priority, type the priority for this router in the group. The router with the highest priority will be used as the master router. If the master router fails, then the IP address of the virtual router is mapped to the backup device with the next highest priority. If this device's actual IP address is being used as the virtual IP address of the VRRP pool, then the priority of this device should be set to 255 . Allowed values are from 1 and 255, and it is configured to 100 by default. IX20 User Guide 244 Routing Virtual Router Redundancy Protocol (VRRP) 9. (Optional) For Password, type a password that will be used to authenticate this VRRP router with VRRP peers. If the password length exceeds 8 characters, it will be truncated to 8 characters. 10. Configure the virtual IP addresses associated with this VRRP instance: a. Click to expand Virtual IP addresses. b. Click to add a virtual IP address. c. For Virtual IP, type the IPv4 or IPv6 address for a virtual IP of this VRRP instance. d. (Optional) Repeat to add additional virtual IPs. 11. See Configure VRRP+ for information about configuring VRRP+. 12. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add a VRRP instance. For example: (config)> add network vrrp VRRP_test (config network vrrp VRRP_test)> 4. Enable the VRRP instance: (config network vrrp VRRP_test)> enable true (config network vrrp VRRP_test)> 5. Set the interface on which this VRRP instance should run: a. Use the ? to determine available interfaces: (config network vrrp VRRP_test)> interface ? Interface: The network interface to communicate with VRRP peers on and listen for traffic to virtual IP addresses. Format: /network/interface/defaultip IX20 User Guide 245 Routing Virtual Router Redundancy Protocol (VRRP) /network/interface/defaultlinklocal /network/interface/eth1 /network/interface/eth2 /network/interface/loopback Current value: (config network vrrp VRRP_test)> interface b. Set the interface, for example: (config network vrrp VRRP_test)> interface /network/interface/eth2 (config network vrrp VRRP_test)> c. Repeat for additional interfaces. 6. Set the router ID. The Router ID must be the same on all VRRP devices that participate in the same VRRP device pool. Allowed values are from 1 and 255, and it is configured to 50 by default. (config network vrrp VRRP_test)> router_id int (config network vrrp VRRP_test)> 7. Set the priority for this router in the group. The router with the highest priority will be used as the master router. If the master router fails, then the IP address of the virtual router is mapped to the backup device with the next highest priority. If this device's actual IP address is being used as the virtual IP address of the VRRP pool, then the priority of this device should be set to 255 . Allowed values are from 1 and 255, and it is configured to 100 by default. (config network vrrp VRRP_test)> priority int (config network vrrp VRRP_test)> 8. (Optional) Set a password that will be used to authenticate this VRRP router with VRRP peers. If the password length exceeds 8 characters, it will be truncated to 8 characters. (config network vrrp VRRP_test)> password pwd (config network vrrp VRRP_test)> 9. Add a virtual IP address associated with this VRRP instance. This can be an IPv4 or IPv6 address. (config network vrrp VRRP_test)> add virtual_address end ip_address (config network vrrp VRRP_test)> Additional virtual IP addresses can be added by repeating this step with different values for ip_ address. 10. Save the configuration and apply the change: (config network vrrp new_vrrp_instance)> save Configuration saved. > IX20 User Guide 246 Routing Virtual Router Redundancy Protocol (VRRP) 11. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure VRRP+ VRRP+ is an extension to the VRRP standard that uses SureLink network probing to monitor connections through VRRP-enabled devices and adjust devices' VRRP priority based on the status of the SureLink tests. This section describes how to configure VRRP+ on a IX20 device. Required configuration items n Both master and backup devices: l A configured and enabled instance of VRRP. See Configure VRRP for information. l Enable VRRP+. l WAN interfaces to be monitored by using VRRP+. Note SureLink is enabled by default on all WAN interfaces, and should not be disabled on the WAN interfaces that are being monitored by VRRP+. If multiple WAN interfaces are being monitored on the same device, the VRRP priority will be adjusted only if all WAN interfaces fail SureLink tests. l The amount that the VRRP priority will be modified when SureLink determines that the VRRP interface is not functioning correctly. l Configure the VRRP interface's DHCP server to use a custom gateway that corresponds to one of the VRRP virtual IP addresses. n Backup devices only: l Enable and configure SureLink on the VRRP interface. l Set the IP gateway to the IP address of the VRRP interface on the master device. Additional configuration items n For backup VRRP devices, enable the ability to monitor the VRRP master, so that a backup device can increase its priority when the master device fails SureLink tests. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 247 Routing Virtual Router Redundancy Protocol (VRRP) 3. Click Network > VRRP. 4. Create a new VRRP instance, or click to expand an existing VRRP instance. See Configure VRRP for information about creating a new VRRP instance. 5. Click to expand VRRP+. 6. Click Enable. 7. Add interfaces to monitor: a. Click to expand Monitor interfaces. b. Click to add an interface for monitoring. c. For Interface, select the local interface to monitor. Generally, this will be a cellular or WAN interface. d. (Optional) Click again to add additional interfaces. 8. (Optional) For backup devices, click to enable Monitor VRRP+ master. This parameter allows a backup VRRP device to monitor the master device, and increase its priority when the master device is failing SureLink tests. This can allow a device functioning as a backup device to promote itself to master. 9. For Priority modifier, type or select the amount that the device's priority should be decreased due to SureLink connectivity failure, and increased when SureLink succeeds again. Along with the priority settings for devices in this VRRP pool, the amount entered here should be large enough to automatically demote a master device when SureLink connectivity fails. For example, if the VRRP master device has a priority of 100 and the backup device has a priority of 80, then the Priority modifier should be set to an amount greater than 20 so that if SureLink IX20 User Guide 248 Routing Virtual Router Redundancy Protocol (VRRP) fails on the master, it will lower its priority to below 80, and the backup device will assume the master role. 10. Configure the VRRP interface. The VRRP interface is defined in the Interface parameter of the VRRP configuration, and generally should be a LAN interface: To configure the VRRP interface: a. Click to expand Network > Interfaces. b. Click to expand the appropriate VRRP interface (for example, LAN1). c. For backup devices, for Default Gateway, type the IP address of the VRRP interface on the master device. d. Configure the VRRP interface's DHCP server to use a custom gateway that corresponds to one of the VRRP virtual IP addresses: i. Click to expand DHCP Server > Advanced settings. ii. For Gateway, select Custom. iii. For Custom gateway, enter the IP address of one of the virtual IPs used by this VRRP instance. e. For backup devices, enable and configure SureLink on the VRRP interface. Generally, this should be a LAN interface; VRRP+ will then monitor the LAN using SureLink to determine if the interface has network connectivity and promote a backup to master if SureLink fails. IX20 User Guide 249 Routing Virtual Router Redundancy Protocol (VRRP) i. Click to expand IPv4 > SureLink. ii. Click Enable. iii. For Interval, type a the amount of time to wait between connectivity tests. To guarantee seamless internet access for VRRP+ purposes, SureLink tests should occur more often than the default of 15 minutes. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Interval to five seconds, enter 5s. iv. Click to expand Test targets > Test target. v. Configure the test target. For example, to configure SureLink to verify internet connectivity on the LAN by pinging my.devicecloud.com: i. For Test Type, select Ping test. ii. For Ping host, type my.devicecloud.com. 11. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Create a new VRRP instance, or edit an existing one. See Configure VRRP for information about creating a new VRRP instance. 4. Enable VRRP+: (config)> network vrrp VRRP_test vrrp_plus enable true (config)> IX20 User Guide 250 Routing Virtual Router Redundancy Protocol (VRRP) 5. Add interfaces to monitor. Generally, this will be a cellular or WAN interface. a. Use the ? to determine available interfaces: (config)> network vrrp test interface ? Interface: The network interface. Format: /network/interface/defaultip /network/interface/defaultlinklocal /network/interface/eth1 /network/interface/eth2 /network/interface/loopback Current value: (config)> network vrrp test interface b. Set the interface, for example: (config)> add network vrrp VRRP_test vrrp_plus monitor_interface end /network/interface/modem (config)> c. (Optional) Repeat for additional interfaces. 6. Set the amount that the device's priority should be decreased or increased due to SureLink connectivity failure or success: (config)> network vrrp VRRP_test vrrp_plus weight value (config)> where value is an integer between 1 and 254. The default is 10. Along with the priority settings for devices in this VRRP pool, the amount entered here should be large enough to automatically demote a master device when SureLink connectivity fails. For example, if the VRRP master device has a priority of 100 and the backup device has a priority of 80, then weight should be set to an amount greater than 20 so that if SureLink fails on the master, it will lower its priority to below 80, and the backup device will assume the master role. 7. (Optional) For backup devices, enable the ability for the device to monitor the master device. This allows a backup VRRP device to monitor the master device, and increase its priority when the master device is failing SureLink tests. This can allow a device functioning as a backup device to promote itself to master. (config)> network vrrp VRRP_test vrrp_plus monitor_master true (config)> 8. Configure the VRRP interface: a. Configure the VRRP interface's DHCP server to use a custom gateway that corresponds to one of the VRRP virtual IP addresses: IX20 User Guide 251 Routing Virtual Router Redundancy Protocol (VRRP) i. Set the DHCP server gateway type to custom: (config)> network interface eth2 ipv4 dhcp_server advanced gateway custom (config)> ii. Determine the VRRP virtual IP addresses: (config)> show network vrrp VRRP_test virtual_address 0 192.168.3.3 1 10.10.10.1 (config)> iii. Set the custom gateway to one of the VRRP virtual IP addresses. For example: (config)> network interface eth2 ipv4 dhcp_server advanced gateway_ custom 192.168.3.3 (config)> b. For backup devices, set the default gateway to the IP address of the VRRP interface on the master device. For example: (config)> network interface eth2 ipv4 gateway 192.168.3.1 (config)> c. For backup devices, enable and configure SureLink on the VRRP interface. i. Determine the VRRP interface. Generally, this should be a LAN interface; VRRP+ will then monitor the LAN using SureLink to determine if the interface has network connectivity and promote a backup to master if SureLink fails. (config)> show network vrrp VRRP_test interface /network/interface/eth2 (config)> ii. Enable SureLink on the interface: (config)> network interface eth2 ipv4 surelink enable true (config)> iii. Set the amount of time to wait between connectivity tests: (config)> network interface eth2 ipv4 surelink interval value (config)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set interval to ten minutes, enter 5s: (config)> network interface eth2 ipv4 surelink interval 5s (config)> IX20 User Guide 252 Routing Virtual Router Redundancy Protocol (VRRP) iv. Create a SureLink test target: (config)> add network interface eth2 ipv4 surelink target end (config network interface eth2 ipv4 surelink target 0)> v. Configure the type of test for the test target: (config network interface eth2 ipv4 surelink target 0)> test value (config network interface eth2 ipv4 surelink target 0)> where value is one of: n ping: Tests connectivity by sending an ICMP echo request to a specified hostname or IP address. l Specify the hostname or IP address: (config network interface eth2 ipv4 surelink target 0)> ping_host host (config network interface eth2 ipv4 surelink target 0)> l (Optional) Set the size, in bytes, of the ping packet: (config network interface eth2 ipv4 surelink target 0)> ping_size [num] (config network interface eth2 ipv4 surelink target 0)> n dns: Tests connectivity by sending a DNS query to the specified DNS server. l Specify the DNS server. Allowed value is the IP address of the DNS server. (config network interface eth2 ipv4 surelinktarget 0)> dns_ server ip_address (config network interface eth2 ipv4 surelinktarget 0)> n dns_configured: Tests connectivity by sending a DNS query to the DNS servers configured for this interface. n http: Tests connectivity by sending an HTTP or HTTPS GET request to the specified URL. l Specify the url: (config network interface eth2 ipv4 surelink target 0)> http_url value (config network interface eth2 ipv4 surelink target 0)> where value uses the format http[s]://hostname/[path] n interface_up: The interface is considered to be down based on the interfaces down time, and the amount of time an initial connection to the interface takes before this test is considered to have failed. l (Optional) Set the amount of time that the interface can be down before this test is considered to have failed: IX20 User Guide 253 Routing Virtual Router Redundancy Protocol (VRRP) (config network interface eth2 ipv4 surelink target 0)> interface_down_time value (config network interface eth2 ipv4 surelink target 0)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set interface_down_time to ten minutes, enter either 10m or 600s: (config network interface eth2 ipv4 surelink target 0)> interface_down_time 600s (config network interface eth2 ipv4 surelink target 0)> The default is 60 seconds. l (Optional) Set the amount of time to wait for an initial connection to the interface before this test is considered to have failed: (config network interface eth2 ipv4 surelink target 0)> interface_timeout value (config network interface eth2 ipv4 surelink target 0)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set interface_timeout to ten minutes, enter either 10m or 600s: (config network interface eth2 ipv4 surelink target 0)> interface_timeout 600s (config network interface eth2 ipv4 surelink target 0)> The default is 60 seconds. 9. Save the configuration and apply the change: (config)> save Configuration saved. > 10. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Example: VRRP/VRRP+ configuration This example configuration creates a VRRP pool containing two IX20 devices: IX20 User Guide 254 Routing Virtual Router Redundancy Protocol (VRRP) Configure device one (master device) WebUI Task 1: Configure VRRP on device one 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > VRRP. IX20 User Guide 255 Routing Virtual Router Redundancy Protocol (VRRP) 4. For Add VRRP instance, type a name for the VRRP instance and click . The new VRRP instance configuration is displayed. 5. Click Enable. 6. For Interface, select Interface: ETH2. 7. For Router ID, leave at the default setting of 50. 8. For Priority, leave at the default setting of 100. 9. Click to expand Virtual IP addresses. 10. Click to add a virtual IP address. 11. For Virtual IP, type 192.168.3.3. Task 2: Configure VRRP+ on device one 1. Click to expand VRRP+. 2. Click Enable. 3. Click to expand Monitor interfaces. 4. Click to add an interface for monitoring. 5. Select Interface: Modem. 6. For Priority modifier, type 30. IX20 User Guide 256 Routing Virtual Router Redundancy Protocol (VRRP) Task 3: Configure the IP address for the VRRP interface, ETH2, on device one 1. Click Network > Interfaces > ETH2 > IPv4 2. For Address, type 192.168.3.1/24. Task 4: Configure the DHCP server for ETH2 on device one 1. Click to expand Network > Interfaces > ETH2 > IPv4 > DHCP Server 2. For Lease range start, leave at the default of 100. 3. For Lease range end, type 199. 4. Click to expand Advanced settings. 5. For Gateway, select Custom. 6. For Custom gateway, enter 192.168.3.3. 7. Click Apply to save the configuration and apply the change. Command line Task 1: Configure VRRP on device one 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> IX20 User Guide 257 Routing Virtual Router Redundancy Protocol (VRRP) 3. Create the VRRP instance: (config)> add network vrrp VRRP_test (config network vrrp VRRP_test)> 4. Enable the VRRP instance: (config network vrrp VRRP_test)> enable true (config network vrrp VRRP_test)> 5. Set the VRRP interface to ETH2: (config network vrrp VRRP_test)> interface /network/interface/eth2 (config network vrrp VRRP_test)> 6. Add the virtual IP address associated with this VRRP instance. (config network vrrp VRRP_test)> add virtual_address end 192.168.3.3 (config network vrrp VRRP_test)> Task 2: Configure VRRP+ on device one 1. Enable VRRP+: (config network vrrp VRRP_test)> vrrp_plus enable true (config network vrrp VRRP_test )> 2. Add the interface to monitor: (config network vrrp VRRP_test)> add vrrp_plus monitor_interface end /network/interface/modem (config network vrrp VRRP_test)> 3. Set the amount that the device's priority should be decreased or increased due to SureLink connectivity failure or success to 30: (config network vrrp VRRP_test )> network vrrp VRRP_test vrrp_plus weight 30 (config network vrrp VRRP_test )> Task 3: Configure the IP address for the VRRP interface, ETH2, on device one 1. Type ... to return to the root of the config prompt: (config network vrrp VRRP_test )> ... (config)> 2. Set the IP address for ETH2: (config)> network interface eth2 ipv4 address 192.168.3.1/24 (config)> IX20 User Guide 258 Routing Virtual Router Redundancy Protocol (VRRP) Task 4: Configure the DHCP server for ETH2 on device one 1. Set the start and end addresses of the DHCP pool to use to assign DHCP addresses to clients: a. Set the start address to 100: (config)> network interface eth2 ipv4 dhcp_server lease_start 100 (config)> b. Set the end address to 199: (config)> network interface eth2 ipv4 dhcp_server lease_end 199 (config)> 2. Set the DHCP server gateway type to custom: (config)> network interface eth2 ipv4 dhcp_server advanced gateway custom (config)> 3. Set the custom gateway to 192.168.3.3: (config)> network interface eth2 ipv4 dhcp_server advanced gateway_custom 192.168.3.3 (config)> 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure device two (backup device) WebUI Task 1: Configure VRRP on device two 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 259 Routing Virtual Router Redundancy Protocol (VRRP) 3. Click Network > VRRP. 4. For Add VRRP instance, type a name for the VRRP instance and click . The new VRRP instance configuration is displayed. 5. Click Enable. 6. For Interface, select Interface: ETH2. 7. For Router ID, leave at the default setting of 50. 8. For Priority, type 80. 9. Click to expand Virtual IP addresses. 10. Click to add a virtual IP address. 11. For Virtual IP, type 192.168.3.3. Task 2: Configure VRRP+ on device two 1. Click to expand VRRP+. 2. Click Enable. 3. Click to expand Monitor interfaces. IX20 User Guide 260 Routing 4. Click to add an interface for monitoring. Virtual Router Redundancy Protocol (VRRP) 5. Select Interface: Modem. 6. Click to enable Monitor VRRP+ master. 7. For Priority modifier, type 30. Task 3: Configure the IP address for the VRRP interface, ETH2, on device two 1. Click Network > Interfaces > ETH2 > IPv4 2. For Address, type 192.168.3.2/24. 3. For Default gateway, type the IP address of the VRRP interface on the master device, configured above in Task 3, step 2 (192.168.3.1). Task 4: Configure SureLink for ETH2 on device two 1. Click Network > Interfaces > ETH2 > IPv4 > SureLink. 2. Click Enable. 3. For Interval, type 15s. 4. Click to expand Test targets > Test target. 5. For Test Type, select Ping test. 6. For Ping host, type my.devicecloud.com. Task 5: Configure the DHCP server for ETH2 on device two 1. Click to expand Network > Interfaces > ETH2 > IPv4 > DHCP Server 2. For Lease range start, type 200. IX20 User Guide 261 Routing 3. For Lease range end, type 250. 4. Click Advanced settings. 5. For Gateway, select Custom. 6. For Custom gateway, enter 192.168.3.3. Virtual Router Redundancy Protocol (VRRP) 7. Click Apply to save the configuration and apply the change. Command line Task 1: Configure VRRP on device two 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Create the VRRP instance: (config)> add network vrrp VRRP_test (config network vrrp VRRP_test)> 4. Enable the VRRP instance: (config network vrrp VRRP_test)> enable true (config network vrrp VRRP_test)> 5. Set the VRRP interface to ETH2: (config network vrrp VRRP_test)> interface /network/interface/eth2 (config network vrrp VRRP_test)> 6. Add the virtual IP address associated with this VRRP instance. (config network vrrp VRRP_test)> add virtual_address end 192.168.3.3 (config network vrrp VRRP_test)> IX20 User Guide 262 Routing Virtual Router Redundancy Protocol (VRRP) Task 2: Configure VRRP+ on device two 1. Enable VRRP+: (config network vrrp VRRP_test)> vrrp_plus enable true (config network vrrp VRRP_test )> 2. Add the interface to monitor: (config network vrrp VRRP_test)> add vrrp_plus monitor_interface end /network/interface/modem (config network vrrp VRRP_test)> 3. Enable the ability to monitor the master device: (config network vrrp VRRP_test)> vrrp_plus monitor_master true (config network vrrp VRRP_test)> 4. Set the amount that the device's priority should be decreased or increased due to SureLink connectivity failure or success to 30: (config network vrrp VRRP_test )> network vrrp VRRP_test vrrp_plus weight 30 (config network vrrp VRRP_test )> Task 3: Configure the IP address for the VRRP interface, ETH2, on device two 1. Type ... to return to the root of the config prompt: (config network vrrp VRRP_test )> ... (config)> 2. Set the IP address for ETH2: (config)> network interface eth2 ipv4 address 192.168.3.2 (config)> 3. Set the default gateway to the IP address of the VRRP interface on the master device, configured above in Task 3, step 2 (192.168.3.1). (config)> network interface eth2 ipv4 gateway 192.168.3.1 (config)> Task 4: Configure SureLink for ETH2 on device two 1. Enable SureLink on the ETH2 interface: (config)> network interface eth2 ipv4 surelink enable true (config)> IX20 User Guide 263 Routing Virtual Router Redundancy Protocol (VRRP) 2. Create a SureLink test target: (config)> add network interface eth2 ipv4 surelink target end (config network interface eth2 ipv4 surelink target 0)> 3. Set the type of test to ping: (config network interface eth2 ipv4 surelink target 0)> test ping (config network interface eth2 ipv4 surelink target 0)> 4. Set my.devicecloud.com as the hostname to ping: (config network interface eth2 ipv4 surelink target 0)> ping_host my.devicecloud.com (config network interface eth2 ipv4 surelink target 0)> Task 5: Configure the DHCP server for ETH2 on device two 1. Type ... to return to the root of the configuration prompt: (config network interface eth2 ipv4 surelink target 0)> ... (config)> 2. Set the start and end addresses of the DHCP pool to use to assign DHCP addresses to clients: a. Set the start address to 200: (config)> network interface eth2 ipv4 dhcp_server lease_start 200 (config)> b. Set the end address to 250: (config)> network interface eth2 ipv4 dhcp_server lease_end 250 (config)> 3. Set the DHCP server gateway type to custom: (config)> network interface eth2 ipv4 dhcp_server advanced gateway custom (config)> 4. Set the custom gateway to 192.168.3.3: (config)> network interface eth2 ipv4 dhcp_server advanced gateway_custom 192.168.3.3 (config)> 5. Save the configuration and apply the change: (config)> save Configuration saved. > 6. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 264 Routing Virtual Router Redundancy Protocol (VRRP) Show VRRP status and statistics This section describes how to display VRRP status and statistics for a IX20 device. VRRP status is available from the Web UI only. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Status > VRRP. The Virtual Router Redundancy Protocol window is displayed. Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the Admin CLI prompt, type show vrrp: > show vrrp VRRP ---- Status Proto State Virtual IP ------ ----- ------ ------------- IX20 User Guide 265 Routing Virtual Router Redundancy Protocol (VRRP) VRRP_test Up VRRP_test Up > IPv4 Backup 10.10.10.1 IPv4 Backup 100.100.100.1 3. To display additional information about a specific VRRP instance, at the Admin CLI prompt, type show vrrp name name: > show vrrp name VRRP_test VRRP_test VRRP Status --------------------Enabled Status Interface : True : Up : lan IPv4 ---- Virtual IP address(es) : 10.10.10.1, 100.100.100.1 Current State : Master Current Priority : 100 Last Transition : Tue Jan 1 00:00:39 2019 Became Master :1 Released Master :0 Adverts Sent : 71 Adverts Received :4 Priority Zero Sent :0 Priority zero Received : 0 > IX20 User Guide 266 Virtual Private Networks (VPN) Virtual Private Networks (VPNs) are used to securely connect two private networks together so that devices can connect from one network to the other using secure channels. This chapter contains the following topics: IPsec 268 OpenVPN 303 Generic Routing Encapsulation (GRE) 334 NEMO 355 IX20 User Guide 267 Virtual Private Networks (VPN) IPsec IPsec IPsec is a suite of protocols for creating a secure communication link--an IPsec tunnel--between a host and a remote IP network or between two IP networks across a public network such as the Internet. IPsec data protection IPsec protects the data being sent across a public network by providing the following: Data origin authentication Authentication of data to validate the origin of data when it is received. Data integrity Authentication of data to ensure it has not been modified during transmission. Data confidentiality Encryption of data sent across the IPsec tunnel to ensure that an unauthorized device cannot read the data. Anti-Replay Authentication of data to ensure an unauthorized device has not injected it into the IPsec tunnel. IPsec modes IPsec can run in two different modes: Tunnel and Transport. Tunnel The entire IP packet is encrypted and/or authenticated and then encapsulated as the payload in a new IP packet. Transport Only the payload of the IP packet is encrypted and/or authenticated. The IP header is left untouched. This mode has limitations when using an authentication header, because the IP addresses in the IP header cannot be translated (for example, with Network Address Translation (NAT), as it would invalidate the authentication hash value. Internet Key Exchange (IKE) settings IKE is a key management protocol that allows IPsec to negotiate the security associations (SAs) that are used to create the secure IPsec tunnel. Both IKEv1 and IKEv2 are supported. SA negotiations are performed in two phases, known as phase 1 and phase 2. Phase 1 In phase 1, IKE creates a secure authenticated communication channel between the device and the peer (the remote device which is at the other end of the IPsec tunnel) using the configured pre-shared key and the Diffie-Hellman key exchange. This creates the IKE SAs that are used to encrypt further IKE communications. For IKEv1, there are two modes for the phase 1 negotiation: Main mode and Aggressive mode. IKEv2 does not use these modes. Main mode Main mode is the default mode. It is slower than aggressive mode, but more secure, in that all sensitive information sent between the device and its peer is encrypted. Aggressive mode Aggressive mode is faster than main mode, but is not as secure as main mode, because the device and its peer exchange their IDs and hash information in clear text instead of being encrypted. IX20 User Guide 268 Virtual Private Networks (VPN) IPsec Aggressive mode is usually used when one or both of the devices have a dynamic external IP address. Phase 2 In phase 2, IKE negotiates the SAs for IPsec. This creates two unidirectional SAs, one for each direction. Once the phase 2 negotiation is complete, the IPsec tunnel should be fully functional. IPsec and IKE renegotiation To reduce the chances of an IPsec tunnel being compromised, the IPsec SAs and IKE SA are renegotiated at a regular interval. This results in different encryption keys being used in the IPsec tunnel. Authentication Client authenticaton XAUTH (extended authentication) pre-shared key authentication mode provides additional security by using client authentication credentials in addition to the standard pre-shared key. The IX20 device can be configured to authenticate with the remote peer as an XAUTH client. RSA Signatures With RSA signatures authentication, the IX20 device uses a private RSA key to authenticate with a remote peer that is using a corresponding public key. Certificate-based Authentication X.509 certificate-based authentication makes use of private keys on both the server and client which are secured and never shared. Both the server and client have a certificate which is generated with their respective private key and signed by a Certificate Authority (CA). The IX20 implementation of IPsec can be configured to use X.509 certificate-based authentication using the private keys and certificates, along with a root CA certificate from the signing authority and, if available, a Certificate Revocation List (CRL). Configure an IPsec tunnel Configuring an IPsec tunnel with a remote device involves configuring the following items: Required configuration items n IPsec tunnel configuration items: l The mode: either tunnel or transport. l Enable the IPsec tunnel. The IPsec tunnel is enabled by default. l The firewall zone of the IPsec tunnel. l The routing metric for routes associated with this IPsec tunnel. l The authentication type and pre-shared key or other applicable keys and certificates. l The local endpoint type and ID values, and the remote endpoint host and ID values. IX20 User Guide 269 Virtual Private Networks (VPN) IPsec n IKE configuration items l The IKE version, either IKEv1 or IKEv2. l Whether to initiate a key exchange or wait for an incoming request. l The IKE mode, either main aggressive. l The IKE authentication protocol to use for the IPsec tunnel negotiation during phase 1 and phase 2. l The IKE encryption protocol to use for the IPsec tunnel negotiation during phase 1 and phase 2. l The IKE Diffie-Hellman group to use for the IPsec tunnel negotiation during phase 1 and phase 2. n Enable dead peer detection and configure the delay and timeout. n Destination networks that require source NAT. n Active recovery configuration. See Configure SureLink active recovery for IPsec for information about IPsec active recovery. Additional configuration items The following additional configuration settings are not typically configured to get an IPsec tunnel working, but can be configured as needed: n Determine whether the device should use UDP encapsulation even when it does not detect that NAT is being used. n If using IPsec failover, identify the primary tunnel during configuration of the backup tunnel. n The Network Address Translation (NAT) keep alive time. n The protocol, either Encapsulating Security Payload (ESP) or Authentication Header (AH). n The management priority for the IPsec tunnel interface. The active interface with the highest management priority will have its address reported as the preferred contact address for central management and direct device access. n Enable XAUTH client authentication, and the username and password to be used to authenticate with the remote peer. n Enable Mode-configuration (MODECFG) to receive configuration information, such as the private IP address, from the remote peer. n Disable the padding of IKE packets. This should normally not be done except for compatibility purposes. n Destination networks that require source NAT. n Tunnel and key renegotiating l The lifetime of the IPsec tunnel before it is renegotiated. l The amount of time before the IKE phase 1 lifetime expires. l The amount of time before the IKE phase 2 lifetime expires l The lifetime margin, a randomizing amount of time before the IPsec tunnel is renegotiated. WebUI IX20 User Guide 270 Virtual Private Networks (VPN) 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. IPsec The Configuration window is displayed. 3. Click VPN > IPsec. 4. (Optional) Change the NAT keep alive time. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set NAT keep alive time to ten minutes, enter 10m or 600s. The default is 40 seconds. 5. Click to expand Tunnels. 6. For Add IPsec tunnel, type a name for the tunnel and click . The new IPsec tunnel configuration is displayed. IX20 User Guide 271 Virtual Private Networks (VPN) IPsec 7. The IPsec tunnel is enabled by default. To disable, click Enable. 8. (Optional) Preferred tunnel provides an optional mechanism for IPsec failover behavior. See Configure IPsec failover for more information. 9. (Optional) Enable Force UDP encapsulation to force the tunnel to use UDP encapsulation even when it does not detect that NAT is being used. 10. For Zone, select the firewall zone for the IPsec tunnel. Generally this should be left at the default of IPsec. 11. For Metric, enter or select the priority of routes associated with this IPsec tunnel. When more than one active route matches a destination, the route with the lowest metric is used. The metric can also be used in tandem with SureLink to configure IPsec failover behavior. See Configure IPsec failover for more information. 12. Select the Mode, either: n Tunnel: The entire IP packet is encrypted and/or authenticated and then encapsulated as the payload in a new IP packet. n Transport: Only the payload of the IP packet is encrypted and/or authenticated. The IP header is unencrypted. 13. Select the Protocol, either: n ESP (Encapsulating Security Payload): Provides encryption as well as authentication and integrity. n AH (Authentication Header): Provides authentication and integrity only. 14. Click to expand Authentication. a. For Authentication type, select one of the following: n Pre-shared key: Uses a pre-shared key (PSK) to authenticate with the remote peer. i. Type the Pre-shared key. IX20 User Guide 272 Virtual Private Networks (VPN) IPsec n RSA signature: Uses a private RSA key to authenticate with the remote peer. i. For Private key, paste the device's private RSA key in PEM format. ii. Type the Private key passphrase that is used to decrypt the private key. Leave blank if the private key is not encrypted. iii. For Peer public key, paste the peer's public RSA key in PEM format. n X.509 certificate: Uses private key and X.509 certificates to authenticate with the remote peer. i. For Private key, paste the device's private RSA key in PEM format. ii. Type the Private key passphrase that is used to decrypt the private key. Leave blank if the private key is not encrypted. iii. For Certificate, paste the local X.509 certificate in PEM format. iv. For Peer verification, select either: l Peer certificate: For Peer certificate, paste the peer's X.509 certificate in PEM format. l Certificate Authority: For Certificate Authority chain, paste the Certificate Authority (CA) certificates. These must include all peer certificates in the chain up to the root CA certificate, in PEM format. 15. (Optional) For Management Priority, set the priority for this IPsec tunnel. 16. (Optional) To configure the device to connect to its remote peer as an XAUTH client: a. Click to expand XAUTH client. b. Click Enable. c. Type the Username and Password that the device will use to authenticate as an XAUTH client with the peer. 17. (Optional) Click Enable MODECFG client to receive configuration information, such as the private IP address, from the remote peer. 18. Click to expand Local endpoint. a. For Type, select either: n Default route: Uses the same network interface as the default route. n Interface: Select the Interface to be used as the local endpoint. b. Click to expand ID. i. Select the ID type: n Auto: The ID will be automatically determined from the value of the tunnels endpoints. n Raw: Enter an ID and have it passed unmodified to the underlying IPsec stack. For Raw ID value, type the ID that will be passed. n Any: Any ID will be accepted. IX20 User Guide 273 Virtual Private Networks (VPN) IPsec n IPv4: The ID will be interpreted as an IP address and sent as an ID_IPV4_ADDR IKE identity. For IPv4 ID value, type an IPv4 formatted ID. This can be a fully-qualified domain name or an IPv4 address. n IPv6: The ID will be interpreted as an IP address and sent as an ID_IPV6_ADDR IKE identity. For IPv6 ID value, type an IPv6 formatted ID. This can be a fully-qualified domain name or an IPv6 address. n RFC822/Email: The ID will be interpreted as an RFC822 (email address). For RFC822 ID value, type the ID in internet email address format. n FQDN: The ID will be interpreted as FQDN (Fully Qualified Domain Name) and sent as an ID_FQDN IKE identity. For FQDN ID value, type the ID as an FQDN. n KeyID: The ID will be interpreted as a Key ID and sent as an ID_KEY_ID IKE identity. For KEYID ID value, type the key ID. 19. Click to expand Remote endpoint. a. For Hostname, select either a hostname or IP address. If your device is not configured to initiate the IPsec connection (see IKE > Initiate connection), you can also use the keyword any, which means that the hostname is dynamic or unknown. b. Click to expand ID. i. Select the ID type: n Auto: The ID will be automatically determined from the value of the tunnels endpoints. n Raw: Enter an ID and have it passed unmodified to the underlying IPsec stack. For Raw ID value, type the ID that will be passed. n Any: Any ID will be accepted. n IPv4: The ID will be interpreted as an IPv4 address and sent as an ID_IPV4_ ADDR IKE identity. For IPv4 ID value, type an IPv4 formatted ID. This can be a fully-qualified domain name or an IPv4 address. n IPv6: The ID will be interpreted as an IPv6 address and sent as an ID_IPV6_ ADDR IKE identity. For IPv6 ID value, type an IPv6 formatted ID. This can be a fully-qualified domain name or an IPv6 address. n RFC822/Email: The ID will be interpreted as an RFC822 (email address). For RFC822 ID value, type the ID in internet email address format. n FQDN: The ID will be interpreted as FQDN (Fully Qualified Domain Name) and sent as an ID_FQDN IKE identity. For FQDN ID value, type the ID as an FQDN. n KeyID: The ID will be interpreted as a Key ID and sent as an ID_KEY_ID IKE IX20 User Guide 274 Virtual Private Networks (VPN) identity. For KEYID ID value, type the key ID. 20. Click to expand Policies. Policies define the network traffic that will be encapsulated by this tunnel. a. Click to create a new policy. The new policy configuration is displayed. b. Click to expand Local network. IPsec c. For Type, select one of the following: n Address: The address of a local network interface. For Address, select the appropriate interface. n Network: The subnet of a local network interface. For Address, select the appropriate interface. n Custom network: A user-defined network. For Custom network, enter the IPv4 address and optional netmask. The keyword any can also be used. n Request a network: Requests a network from the remote peer. d. For Remote network, enter the IP address and optional netmask of the remote network. The keyword any can also be used. . 21. Click to expand IKE. IX20 User Guide 275 Virtual Private Networks (VPN) IPsec a. For IKE version, select either IKEv1 or IKEv2. This setting must match the peer's IKE version. b. Initiate connection instructs the device to initiate the key exchange, rather than waiting for an incoming request. This must be disabled if Remote endpoint > Hostname is set to any. c. For Mode, select either Main mode or Aggressive mode. d. For Enable padding, click to disable the padding of IKE packets. This should normally not be disabled except for compatibility purposes. e. For Phase 1 lifetime, enter the amount of time that the IKE security association expires after a successful negotiation and must be re-authenticated. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Phase 1 lifetime to ten minutes, enter 10m or 600s. f. For Phase 2 lifetime, enter the amount of time that the IKE security association expires after a successful negotiation and must be rekeyed. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Phase 2 lifetime to ten minutes, enter 10m or 600s. g. For Lifetime margin, enter a randomizing amount of time before the IPsec tunnel is renegotiated. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Lifetime margin to ten minutes, enter 10m or 600s. h. Click to expand Phase 1 Proposals. i. Click to create a new phase 1 proposal. ii. For Cipher, select the type of encryption. iii. For Hash, select the type of hash to use to verify communication integrity. iv. For Diffie-Hellman group, select the type of Diffie-Hellman group to use for key exchange. v. You can add additional Phase 1 proposals by clicking next to Add Phase 1 Proposal. i. Click to expand Phase 2 Proposals. i. Click to create a new phase 2 proposal. ii. For Cipher, select the type of encryption. iii. For Hash, select the type of hash to use to verify communication integrity. iv. For Diffie-Hellman group, select the type of Diffie-Hellman group to use for key exchange. v. You can add additional Phase 2 proposals by clicking next to Add Phase 2 Proposal. 22. (Optional) Click to expand Dead peer detection. Dead peer detection is enabled by default. Dead peer detection uses periodic IKE transmissions to the remote endpoint to detect whether tunnel communications have failed, allowing the tunnel to be automatically restarted when failure occurs. IX20 User Guide 276 Virtual Private Networks (VPN) IPsec a. To enable or disable dead peer detection, click Enable. b. For Delay, type the number of seconds between transmissions of dead peer packets. Dead peer packets are only sent when the tunnel is idle. c. For Timeout, type the number of seconds to wait for a response from a dead peer packet before assuming the tunnel has failed. 23. (Optional) Click to expand NAT to create a list of destination networks that require source NAT. a. Click next to Add NAT destination. b. For Destination network, type the IPv4 address and optional netmask of a destination network that requires source NAT. You can also use any, meaning that any destination network connected to the tunnel will use source NAT. 24. See Configure SureLink active recovery for IPsec for information about IPsec Active recovery. 25. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add an IPsec tunnel. For example, to add an IPsec tunnel named ipsec_example: (config)> add vpn ipsec tunnel ipsec_example (config vpn ipsec tunnel ipsec_example)> The IPsec tunnel is enabled by default. To disable: (config vpn ipsec tunnel ipsec_example)> enable false (config vpn ipsec tunnel ipsec_example)> 4. (Optional) Set the tunnel to use UDP encapsulation even when it does not detect that NAT is being used: (config vpn ipsec tunnel ipsec_example)> force_udp_encap true (config vpn ipsec tunnel ipsec_example)> 5. Set the firewall zone for the IPsec tunnel. Generally this should be left at the default of ipsec. (config vpn ipsec tunnel ipsec_example)> zone zone (config vpn ipsec tunnel ipsec_example)> To view a list of available zones: IX20 User Guide 277 Virtual Private Networks (VPN) IPsec (config vpn ipsec tunnel ipsec_example)> zone ? Zone: The firewall zone assigned to this IPsec tunnel. This can be used by packet filtering rules and access control lists to restrict network traffic on this tunnel. Format: any dynamic_routes edge external internal ipsec loopback setup Default value: ipsec Current value: ipsec (config vpn ipsec tunnel ipsec_example)> 6. Set the metric for the IPsec tunnel. When more than one active route matches a destination, the route with the lowest metric is used. The metric can also be used in tandem with SureLink to configure IPsec failover behavior. See Configure IPsec failover for more information. (config vpn ipsec tunnel ipsec_example)> metric value (config vpn ipsec tunnel ipsec_example)> where value is any integer between 0 and 65535. 7. Set the mode: (config vpn ipsec tunnel ipsec_example)> mode mode (config vpn ipsec tunnel ipsec_example)> where mode is either: n tunnel: The entire IP packet is encrypted and/or authenticated and then encapsulated as the payload in a new IP packet. n transport: Only the payload of the IP packet is encrypted and/or authenticated. The IP header is unencrypted. The default is tunnel. 8. Set the protocol: (config vpn ipsec tunnel ipsec_example)> type protocol (config vpn ipsec tunnel ipsec_example)> where protocol is either: n esp (Encapsulating Security Payload): Provides encryption as well as authentication and integrity. n ah (Authentication Header): Provides authentication and integrity only. The default is esp. IX20 User Guide 278 Virtual Private Networks (VPN) IPsec 9. (Optional) Set the management priority for this IPsec tunnel: (config vpn ipsec tunnel ipsec_example)> mgmt value (config vpn ipsec tunnel ipsec_example)> where value is any interger between 0 and 1000. 10. Set the authentication type: (config vpn ipsec tunnel ipsec_example)> auth type value (config vpn ipsec tunnel ipsec_example)> where value is one of: n secret: Uses a pre-shared key (PSK) to authenticate with the remote peer. a. Set the pre-shared key: (config vpn ipsec tunnel ipsec_example)> auth secret key (config vpn ipsec tunnel ipsec_example)> n rsasig: Uses a private RSA key to authenticate with the remote peer. a. For the private_key parameter, paste the device's private RSA key in PEM format: (config vpn ipsec tunnel ipsec_example)> auth private_key key (config vpn ipsec tunnel ipsec_example)> b. Set the private key passphrase that is used to decrypt the private key. Leave blank if the private key is not encrypted. (config vpn ipsec tunnel ipsec_example)> auth private_key_ passphrase passphrase (config vpn ipsec tunnel ipsec_example)> c. For the peer_public_key parameter, paste the peer's public RSA key in PEM format: (config vpn ipsec tunnel ipsec_example)> auth peer_public_key key (config vpn ipsec tunnel ipsec_example)> n x509: Uses private key and X.509 certificates to authenticate with the remote peer. a. For the private_key parameter, paste the device's private RSA key in PEM format: (config vpn ipsec tunnel ipsec_example)> auth private_key key (config vpn ipsec tunnel ipsec_example)> b. Set the private key passphrase that is used to decrypt the private key. Leave blank if the private key is not encrypted. (config vpn ipsec tunnel ipsec_example)> auth private_key_ passphrase passphrase (config vpn ipsec tunnel ipsec_example)> IX20 User Guide 279 Virtual Private Networks (VPN) IPsec c. For the cert parameter, paste the local X.509 certificate in PEM format: (config vpn ipsec tunnel ipsec_example)> auth cert certificate (config vpn ipsec tunnel ipsec_example)> d. Set the method for verifying the peer's X.509 certificate: (config vpn ipsec tunnel ipsec_example)> auth peer_verify value (config vpn ipsec tunnel ipsec_example)> where value is either: l cert: Uses the peer's X.509 certificate in PEM format for verification. o For the peer_cert parameter, paste the peer's X.509 certificate in PEM format: (config vpn ipsec tunnel ipsec_example)> auth peer_cert certificate (config vpn ipsec tunnel ipsec_example)> l ca: Uses the Certificate Authority chain for verification. o For the ca_cert parameter, paste the Certificate Authority (CA) certificates. These must include all peer certificates in the chain up to the root CA certificate, in PEM format. (config vpn ipsec tunnel ipsec_example)> auth ca_cert cert_ chain (config vpn ipsec tunnel ipsec_example)> 11. (Optional) Configure the device to connect to its remote peer as an XAUTH client: a. Enable XAUTH client functionality: (config vpn ipsec tunnel ipsec_example)> xauth_client enable true (config vpn ipsec tunnel ipsec_example)> b. Set the XAUTH client username: (config vpn ipsec tunnel ipsec_example)> xauth_client username name (config vpn ipsec tunnel ipsec_example)> c. Set the XAUTH client password: (config vpn ipsec tunnel ipsec_example)> xauth_client password pwd (config vpn ipsec tunnel ipsec_example)> 12. (Optional) Enable MODECFG client functionality: MODECFG client functionality configures the device to receive configuration information, such as the private IP address, from the remote peer. a. Enable MODECFG client functionality: (config vpn ipsec tunnel ipsec_example)> modecfg_client enable true (config vpn ipsec tunnel ipsec_example)> IX20 User Guide 280 Virtual Private Networks (VPN) IPsec 13. Configure the local endpoint: a. Set the method for determining the local network interface: (config vpn ipsec tunnel ipsec_example)> local type value (config vpn ipsec tunnel ipsec_example)> where value is either: n defaultroute: Uses the same network interface as the default route. n interface: Select the Interface to be used as the local endpoint. b. Set the ID type: (config vpn ipsec tunnel ipsec_example)> local id type value (config vpn ipsec tunnel ipsec_example)> where value is one of: n auto: The ID will be automatically determined from the value of the tunnels endpoints. n raw: Enter an ID and have it passed unmodified to the underlying IPsec stack. Set the unmodified ID that will be passed: (config vpn ipsec tunnel ipsec_example)> local id raw_id id (config vpn ipsec tunnel ipsec_example)> n any: Any ID will be accepted. n ipv4: The ID will be interpreted as an IPv4 address and sent as an ID_IPV4_ADDR IKE identity. Set an IPv4 formatted ID. This can be a fully-qualified domain name or an IPv4 address. (config vpn ipsec tunnel ipsec_example)> local id ipv4_id id (config vpn ipsec tunnel ipsec_example)> n ipv6: The ID will be interpreted as an IPv6 address and sent as an ID_IPV6_ADDR IKE identity. Set an IPv6 formatted ID. This can be a fully-qualified domain name or an IPv6 address. (config vpn ipsec tunnel ipsec_example)> local id ipv6_id id (config vpn ipsec tunnel ipsec_example)> n rfc822: The ID will be interpreted as an RFC822 (email address). Set the ID in internet email address format: (config vpn ipsec tunnel ipsec_example)> local id rfc822_id id (config vpn ipsec tunnel ipsec_example)> n fqdn: The ID will be interpreted as FQDN (Fully Qualified Domain Name) and sent as an ID_FQDN IKE identity. IX20 User Guide 281 Virtual Private Networks (VPN) IPsec Set the ID as an FQDN: (config vpn ipsec tunnel ipsec_example)> local id rfc822_id id (config vpn ipsec tunnel ipsec_example)> n keyid: The ID will be interpreted as a Key ID and sent as an ID_KEY_ID IKE identity. Set the key ID: (config vpn ipsec tunnel ipsec_example)> local id keyid_id id (config vpn ipsec tunnel ipsec_example)> 14. Configure the remote endpoint: a. Set the hostname or IP address of the remote endpoint: (config vpn ipsec tunnel ipsec_example)> remote hostname value (config vpn ipsec tunnel ipsec_example)> If your device is not configured to initiate the IPsec connection (see ike initiate), you can also use the keyword any, which means that the hostname is dynamic or unknown. b. Set the ID type: (config vpn ipsec tunnel ipsec_example)> remote id type value (config vpn ipsec tunnel ipsec_example)> where value is one of: n auto: The ID will be automatically determined from the value of the tunnels endpoints. n raw: Enter an ID and have it passed unmodified to the underlying IPsec stack. Set the unmodified ID that will be passed: (config vpn ipsec tunnel ipsec_example)> remote id raw_id id (config vpn ipsec tunnel ipsec_example)> n any: Any ID will be accepted. n ipv4: The ID will be interpreted as an IPv4 address and sent as an ID_IPV4_ADDR IKE identity. Set an IPv4 formatted ID. This can be a fully-qualified domain name or an IPv4 address. (config vpn ipsec tunnel ipsec_example)> remote id ipv4_id id (config vpn ipsec tunnel ipsec_example)> n ipv6: The ID will be interpreted as an IPv6 address and sent as an ID_IPV6_ADDR IKE identity. Set an IPv6 formatted ID. This can be a fully-qualified domain name or an IPv6 address. (config vpn ipsec tunnel ipsec_example)> remote id ipv6_id id (config vpn ipsec tunnel ipsec_example)> IX20 User Guide 282 Virtual Private Networks (VPN) IPsec n rfc822: The ID will be interpreted as an RFC822 (email address). Set the ID in internet email address format: (config vpn ipsec tunnel ipsec_example)> remote id rfc822_id id (config vpn ipsec tunnel ipsec_example)> n fqdn: The ID will be interpreted as FQDN (Fully Qualified Domain Name) and sent as an ID_FQDN IKE identity. Set the ID as an FQDN: (config vpn ipsec tunnel ipsec_example)> remote id rfc822_id id (config vpn ipsec tunnel ipsec_example)> n keyid: The ID will be interpreted as a Key ID and sent as an ID_KEY_ID IKE identity. Set the key ID: (config vpn ipsec tunnel ipsec_example)> remote id keyid_id id (config vpn ipsec tunnel ipsec_example)> 15. Configure IKE settings: a. Set the IKE version: (config vpn ipsec tunnel ipsec_example)> ike version value (config vpn ipsec tunnel ipsec_example)> where value is either ikev1 or ikev2. This setting must match the peer's IKE version. b. Determine whether the device should initiate the key exchange, rather than waiting for an incoming request. By default, the device will initiate the key exchange. This must be disabled if remote hostname is set to any. To disable: (config vpn ipsec tunnel ipsec_example)> ike initiate false (config vpn ipsec tunnel ipsec_example)> c. Set the IKE phase 1 mode: (config vpn ipsec tunnel ipsec_example)> ike mode value (config vpn ipsec tunnel ipsec_example)> where value is either aggressive or main. d. Padding of IKE packets is enabled by default and should normally not be disabled except for compatibility purposes. To disable: (config vpn ipsec tunnel ipsec_example)> ike pad false (config vpn ipsec tunnel ipsec_example)> e. Set the amount of time that the IKE security association expires after a successful negotiation and must be re-authenticated: (config vpn ipsec tunnel ipsec_example)> ike phase1_lifetime value (config vpn ipsec tunnel ipsec_example)> IX20 User Guide 283 Virtual Private Networks (VPN) IPsec where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set phase1_lifetime to ten minutes, enter either 10m or 600s: (config vpn ipsec tunnel ipsec_example)> ike phase1_lifetime 600s (config vpn ipsec tunnel ipsec_example)> The default is three hours. f. Set the amount of time that the IKE security association expires after a successful negotiation and must be rekeyed. (config vpn ipsec tunnel ipsec_example)> ike phase2_lifetime value (config vpn ipsec tunnel ipsec_example)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set phase2_lifetime to ten minutes, enter either 10m or 600s: (config vpn ipsec tunnel ipsec_example)> ike phase2_lifetime 600s (config vpn ipsec tunnel ipsec_example)> The default is one hour. g. Set a randomizing amount of time before the IPsec tunnel is renegotiated: (config vpn ipsec tunnel ipsec_example)> ike lifetime_margin value (config vpn ipsec tunnel ipsec_example)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set lifetime_margin to ten minutes, enter either 10m or 600s: (config vpn ipsec tunnel ipsec_example)> ike lifetime_margin 600s (config vpn ipsec tunnel ipsec_example)> The default is nine minutes. h. Configure the types of encryption, hash, and Diffie-Hellman group to use during phase 1: i. Add a phase 1 proposal: (config vpn ipsec tunnel ipsec_example)> add ike phase1_proposal end (config vpn ipsec tunnel ipsec_example ike phase1_proposal 0)> ii. Set the type of encryption to use during phase 1: (config vpn ipsec tunnel ipsec_example ike phase1_proposal 0)> cipher value (config vpn ipsec tunnel ipsec_example ike phase1_proposal 0)> where value is one of 3des, aes128, aes192, aes256, or null. The default is 3des. IX20 User Guide 284 Virtual Private Networks (VPN) IPsec iii. Set the type of hash to use during phase 1 to verify communication integrity: (config vpn ipsec tunnel ipsec_example ike phase1_proposal 0)> hash value (config vpn ipsec tunnel ipsec_example ike phase1_proposal 0)> where value is one of md5, sha1, sha256, sha384, or sha512. The default is sha1. iv. Set the type of Diffie-Hellman group to use for key exchange during phase 1: (config vpn ipsec tunnel ipsec_example ike phase1_proposal 0)> dh_ group value (config vpn ipsec tunnel ipsec_example ike phase1_proposal 0)> where value is one of ecp384, modp768, modp1024, modp1536, modp2048, modp3072, modp4096, modp6144, or modp8192, . The default is modp1024. v. (Optional) Add additional phase 1 proposals: i. Move back one level in the schema: (config vpn ipsec tunnel ipsec_example ike phase1_proposal 0)> .. (config vpn ipsec tunnel ipsec_example ike phase1_proposal)> ii. Add an additional proposal: (config vpn ipsec tunnel ipsec_example ike phase1_proposal)> add end (config vpn ipsec tunnel ipsec_example ike phase1_proposal 1)> Repeat the above steps to set the type of encryption, hash, and Diffie-Hellman group for the additional proposal. iii. Repeat to add more phase 1 proposals. i. Configure the types of encryption, hash, and Diffie-Hellman group to use during phase 2: i. Move back two levels in the schema: (config vpn ipsec tunnel ipsec_example ike phase1_proposal 0)> .. .. (config vpn ipsec tunnel ipsec_example ike)> ii. Add a phase 2 proposal: (config vpn ipsec tunnel ipsec_example ike)> add ike phase2_proposal end (config vpn ipsec tunnel ipsec_example ike phase2_proposal 0)> iii. Set the type of encryption to use during phase 2: (config vpn ipsec tunnel ipsec_example ike phase2_proposal 0)> cipher value (config vpn ipsec tunnel ipsec_example ike phase2_proposal 0)> where value is one of 3des, aes128, aes192, aes256, or null. The default is 3des. IX20 User Guide 285 Virtual Private Networks (VPN) IPsec iv. Set the type of hash to use during phase 2 to verify communication integrity: (config vpn ipsec tunnel ipsec_example ike phase2_proposal 0)> hash value (config vpn ipsec tunnel ipsec_example ike phase2_proposal 0)> where value is one of md5, sha1, sha256, sha384, or sha512. The default is sha1. v. Set the type of Diffie-Hellman group to use for key exchange during phase 2: (config vpn ipsec tunnel ipsec_example ike phase2_proposal 0)> dh_ group value (config vpn ipsec tunnel ipsec_example ike phase2_proposal 0)> where value is one of ecp384, modp768, modp1024, modp1536, modp2048, modp3072, modp4096, modp6144, or modp8192, . The default is modp1024. vi. (Optional) Add additional phase 2 proposals: i. Move back one level in the schema: (config vpn ipsec tunnel ipsec_example ike phase2_proposal 0)> .. (config vpn ipsec tunnel ipsec_example ike phase2_proposal)> ii. Add an additional proposal: (config vpn ipsec tunnel ipsec_example ike phase2_proposal)> add end (config vpn ipsec tunnel ipsec_example ike phase2_proposal 1)> Repeat the above steps to set the type of encryption, hash, and Diffie-Hellman group for the additional proposal. iii. Repeat to add more phase 2 proposals. 16. (Optional) Configure dead peer detection: Dead peer detection is enabled by default. Dead peer detection uses periodic IKE transmissions to the remote endpoint to detect whether tunnel communications have failed, allowing the tunnel to be automatically restarted when failure occurs. a. Change to the root of the configuration schema: (config vpn ipsec tunnel ipsec_example ike phase2_proposal 0)> ... (config)> b. To disable dead peer detection: (config)> vpn ipsec tunnel ipsec_example dpd enable false (config)> c. Set the number of seconds between transmissions of dead peer packets. Dead peer packets are only sent when the tunnel is idle. The default is 60. (config)> vpn ipsec tunnel ipsec_example dpd delay value (config)> IX20 User Guide 286 Virtual Private Networks (VPN) IPsec d. Set the number of seconds to wait for a response from a dead peer packet before assuming the tunnel has failed. The default is 90. (config)> vpn ipsec tunnel ipsec_example dpd timeout value (config)> 17. (Optional) Create a list of destination networks that require source NAT: a. Add a destination network: (config)> add vpn ipsec tunnel ipsec_example nat end (config vpn ipsec tunnel ipsec_example nat 0)> b. Set the IPv4 address and optional netmask of a destination network that requires source NAT. You can also use any, meaning that any destination network connected to the tunnel will use source NAT. (config vpn ipsec tunnel ipsec_example nat 0)> dst value (config vpn ipsec tunnel ipsec_example nat 0)> 18. Configure policies that define the network traffic that will be encapsulated by this tunnel: a. Change to the root of the configuration schema: (config vpn ipsec tunnel ipsec_example nat 0)> ... (config)> b. Add a policy: (config)> add vpn ipsec tunnel ipsec_example policy end (config vpn ipsec tunnel ipsec_example policy 0)> c. Set the type of local network policy: (config vpn ipsec tunnel ipsec_example policy 0)> local type value (config vpn ipsec tunnel ipsec_example policy 0)> where value is one of: n address: The address of a local network interface. Set the address: i. Use the ? to determine available interfaces: (config vpn ipsec tunnel ipsec_example policy 0)> local address ? Address: The local network interface to use the address of. This field must be set when 'Type' is set to 'Address'. Format: defaultip defaultlinklocal eth1 eth2 loopback IX20 User Guide 287 Virtual Private Networks (VPN) IPsec Current value: (config vpn ipsec tunnel ipsec_example policy 0)> local address ii. Set the interface. For example: (config vpn ipsec tunnel ipsec_example policy 0)> local address eth1 (config vpn ipsec tunnel ipsec_example policy 0)> n network: The subnet of a local network interface. Set the network: i. Use the ? to determine available interfaces: (config vpn ipsec tunnel ipsec_example policy 0)> local network ? Interface: The network interface. Format: defaultip defaultlinklocal eth1 eth2 loopback Current value: (config vpn ipsec tunnel ipsec_example policy 0)> local network ii. Set the interface. For example: (config vpn ipsec tunnel ipsec_example policy 0)> local network eth1 (config vpn ipsec tunnel ipsec_example policy 0)> n custom: A user-defined network. Set the custom network: (config vpn ipsec tunnel ipsec_example policy 0)> local custom value (config vpn ipsec tunnel ipsec_example policy 0)> where value is the IPv4 address and optional netmask. The keyword any can also be used. n request: Requests a network from the remote peer. d. Set the IP address and optional netmask of the remote network. The keyword any can also be used. IX20 User Guide 288 Virtual Private Networks (VPN) IPsec (config vpn ipsec tunnel ipsec_example policy 0)> remote network value (config vpn ipsec tunnel ipsec_example policy 0)> 19. (Optional) Change the NAT keep alive time: a. Change to the root of the configuration schema: (config vpn ipsec tunnel ipsec_example policy 0)> ... (config)> b. (config)> vpn ipsec advanced keep_alive value (config)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set keep_alive to ten minutes, enter either 10m or 600s: (config)> vpn ipsec advanced keep_alive 600s (config)> The default is 40 seconds. 20. Save the configuration and apply the change: (config)> save Configuration saved. > 21. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 289 Virtual Private Networks (VPN) IPsec Configure IPsec failover There are two methods to configure the IX20 device to fail over from a primary IPsec tunnel to a backup tunnel: n SureLink active recovery--You can use SureLink along with the IPsec tunnel's metric to configure two or more tunnels so that when the primary tunnel is determined to be inactive by SureLink, a secondary tunnel can begin serving traffic that the primary tunnel was serving. n Preferred tunnel--When multiple IPsec tunnels are configured, one tunnel can be configured as a backup to another tunnel by defining a preferred tunnel for the backup device. Required configuration items n Two or more configured IPsec tunnels: The primary tunnel, and one or more backup tunnels. n Either: l SureLink configured on the primary tunnel with Restart Interface enabled, and the metric for all tunnels set appropriately to determine which IPsec tunnel has priority. With this failover configuration, both tunnels are active simultaneously, and there is minimal downtime due to failover. l Identify the preferred tunnel during configuration of the backup tunnel. In this scenario, the backup tunnel is not active until the preferred tunnel fails. IPsec failover using SureLink With this configuration, when two IPsec tunnels are configured with the same local and remote endpoints but different metrics, traffic addressed to the remote endpoint will be routed through the IPsec tunnel with the lower metric. If SureLink > Restart Interface is enabled for the tunnel with the lower metric, and SureLink determines that the tunnel is not functioning properly (for example, pings to a host at the other end of the tunnel are failing), then: 1. SureLink will shut down the tunnel and renegotiate its IPsec connection. 2. While the tunnel with the lower metric is down, traffic addressed to the remote endpoint will be routed through the tunnel with the higher metric. For example: n Tunnel_1: l Metric: 10 l Local endpoint > Interface: ETH2 l Remote endpoint > Hostname: 192.168.10.1 l SureLink configuration: o Restart Interface enabled o Test target: o Test type: Ping test o Ping host: 192.168.10.2 n Tunnel_2: IX20 User Guide 290 Virtual Private Networks (VPN) IPsec l Metric: 20 l Local endpoint > Interface: ETH2 l Remote endpoint > Hostname: 192.168.10.1 In this configuration: 1. Tunnel_1 will normally be used for traffic destined for the 192.168.10.1 endpoint. 2. If pings to 192.168.10.2 fail, SureLink will shut down the tunnel and renegotiate its IPsec connection. 3. While Tunnel_1 is down, Tunnel_2 will be used for traffic destined for the 192.168.10.1 endpoint. WebUI 1. Configure the primary IPsec tunnel. See Configure an IPsec tunnel for instructions. n During configuration of the IPsec tunnel, set the metric to a low value (for example, 10). n Configure SureLink for the primary IPsec tunnel and enable Restart interface. See Configure SureLink active recovery for IPsec for instructions. 2. Create a backup IPsec tunnel. Configure this tunnel to use the same local and remote endpoints as the primary tunnel. See Configure an IPsec tunnel for instructions. n During configuration of the IPsec tunnel, set the metric to a value that is higher than the metric of the primary tunnel (for example, 20). Command line IX20 User Guide 291 Virtual Private Networks (VPN) IPsec 1. Configure the primary IPsec tunnel. See Configure an IPsec tunnel for instructions. n During configuration of the IPsec tunnel, set the metric to a low value (for example, 10): (config vpn ipsec tunnel IPsecFailoverPrimaryTunnel)> metric 10 (config vpn ipsec tunnel IPsecFailoverPrimaryTunnel)> n Configure SureLink for the primary IPsec tunnel and enable Restart interface. See Configure SureLink active recovery for IPsec for instructions. (config vpn ipsec tunnel IPsecFailoverPrimaryTunnel)> surelink restart true (config vpn ipsec tunnel IPsecFailoverPrimaryTunnel)> 2. Create a backup IPsec tunnel. Configure this tunnel to use the same local and remote endpoints as the primary tunnel. See Configure an IPsec tunnel for instructions. n During configuration of the IPsec tunnel, set the metric to a value that is higher than the metric of the primary tunnel (for example, 20): (config vpn ipsec tunnel IPsecFailoverBackupTunnel)> metric 20 (config vpn ipsec tunnel IPsecFailoverBackupTunnel)> IPsec failover using Preferred tunnel WebUI 1. Configure the primary IPsec tunnel. See Configure an IPsec tunnel for instructions. 2. Create a backup IPsec tunnel. See Configure an IPsec tunnel for instructions. 3. During configuration of the backup IPsec tunnel, identify the primary IPsec tunnel in the Preferred tunnel parameter: Command line 1. Configure the primary IPsec tunnel. See Configure an IPsec tunnel for instructions. 2. Create a backup IPsec tunnel. See Configure an IPsec tunnel for instructions. 3. During configuration of the backup IPsec tunnel, identify the primary IPsec tunnel: a. Use the ? to view a list of available tunnels: (config vpn ipsec tunnel backup_ipsec_tunnel)> ipsec_failover ? Preferred tunnel: This tunnel will not start until the preferred tunnel has failed. It will continue to operate until the preferred tunnel returns to full operation status. IX20 User Guide 292 Virtual Private Networks (VPN) IPsec Format: primary_ipsec_tunnel backup_ipsec_tunnel Optional: yes Current value: (config vpn ipsec tunnel backup_ipsec_tunnel)> ipsec_failover b. Set the primary IPsec tunnel: (config vpn ipsec tunnel backup_ipsec_tunnel)> ipsec_failover primary_ ipsec_tunnel (config vpn ipsec tunnel backup_ipsec_tunnel)> Configure SureLink active recovery for IPsec You can configure the IX20 device to regularly probe IPsec client connections to determine if the connection has failed and take remedial action. You can also configure the IPsec tunnel to fail over to a backup tunnel. See Configure IPsec failover for further information. Required configuration items n A valid IPsec configuration. See Configure an IPsec tunnel for configuration instructions. n Enable IPsec active recovery. n The behavior of the IX20 device upon IPsec failure: either l Restart the IPsec interface l Reboot the device. Additional configuration items n The interval between connectivity tests. n Whether the interface should be considered to have failed if one of the test targets fails, or all of the test targets fail. n The number of probe attempts before the IPsec connection is considered to have failed. n The amount of time that the device should wait for a response to a probe attempt before considering it to have failed. To configure the IX20 device to regularly probe the IPsec connection: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. IX20 User Guide 293 Virtual Private Networks (VPN) The Configuration window is displayed. IPsec 3. Click VPN > IPsec. 4. Create a new IPsec tunnel or select an existing one: n To create a new IPsec tunnel, see Configure an IPsec tunnel. n To edit an existing IPsec tunnel, click to expand the appropriate tunnel. 5. After creating or selecting the IPsec tunnel, click Active recovery. 6. Enable active recovery. 7. For Restart interface, enable to configure the device to restart the interface when its connection is considered to have failed. This is useful for interfaces that may regain connectivity after restarting, such as a cellular modem. 8. For Reboot device, enable to instruct the device to reboot when the WAN connection is considered to have failed. 9. Change the Interval between connectivity tests. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Interval to ten minutes, enter 10m or 600s. The default is 15 minutes. IX20 User Guide 294 Virtual Private Networks (VPN) IPsec 10. For Success condition, determine whether the interface should fail over based on the failure of one of the test targets, or all of the test targets. 11. For Attempts, type the number of probe attempts before the WAN is considered to have failed. 12. For Response timeout, type the amount of time that the device should wait for a response to a probe attempt before considering it to have failed. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Response timeout to ten minutes, enter 10m or 600s. The default is 15 seconds. 13. Add a test target: a. Click to expand Test targets. b. For Add Test target, click . c. Select the Test type: n Ping test or Ping test (IPv6): Tests connectivity by sending an ICMP echo request to the hostname or IP address specified in Ping host. You can also optionally change the number of bytes in the Ping payload size. n DNS test or DNS test (IPv6): Tests connectivity by sending a DNS query to the specified DNS server. n HTTP test HTTP test (IPv6): Tests connectivity by sending an HTTP or HTTPS GET request to the URL specified in Web servers. The URL should take the format of http[s]://hostname/[path]. n Test DNS servers configured for this interface or Test DNS servers configured for this interface (IPv6): Tests connectivity by sending a DNS query to the DNS servers configured for this interface. n Test the interface status or Test the interface status IPv6: The interface is considered to be down based on: l Down time: The amount of time that the interface can be down before this test is considered to have failed. IX20 User Guide 295 Virtual Private Networks (VPN) IPsec Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Down time to ten minutes, enter 10m or 600s. The default is 60 seconds. l Initial connection time: The amount of time to wait for an initial connection to the interface before this test is considered to have failed. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Initial connection time to ten minutes, enter 10m or 600s. The default is 60 seconds. 14. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Create a new IPsec tunnel, or edit an existing one: n To create a new IPsec tunnel, see Configure an IPsec tunnel. n To edit an existing IPsec tunnel, change to the IPsec tunnel's node in the configuration schema. For example, for an IPsec tunnel named ipsec_example, change to the ipsec_ example node in the configuration schema: (config)> vpn ipsec tunnel ipsec_example (config vpn ipsec tunnel ipsec_example)> 4. Enable active recovery: (config vpn ipsec tunnel ipsec_example)> connection_monitor enable true (config vpn ipsec tunnel ipsec_example)> 5. To configure the device to restart the interface when its connection is considered to have failed: (config vpn ipsec tunnel ipsec_example)> connection_monitor restart true (config vpn ipsec tunnel ipsec_example)> This is useful for interfaces that may regain connectivity after restarting, such as a cellular modem. IX20 User Guide 296 Virtual Private Networks (VPN) IPsec 6. To configure the device to reboot when the interface is considered to have failed: (config vpn ipsec tunnel ipsec_example)> connection_monitor reboot enable (config vpn ipsec tunnel ipsec_example)> 7. Set the Interval between connectivity tests: (config vpn ipsec tunnel ipsec_example)> connection_monitor interval value (config vpn ipsec tunnel ipsec_example)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set interval to ten minutes, enter either 10m or 600s: (config vpn ipsec tunnel ipsec_example)> connection_monitor interval 600s (config vpn ipsec tunnel ipsec_example)> The default is 15 minutes. 8. Determine whether the interface should fail over based on the failure of one of the test targets, or all of the test targets: (config vpn ipsec tunnel ipsec_example)> connection_monitor success_ condition value (config vpn ipsec tunnel ipsec_example)> Where value is either one or all. 9. Set the number of probe attempts before the WAN is considered to have failed: (config vpn ipsec tunnel ipsec_example)> connection_monitor attempts num (config vpn ipsec tunnel ipsec_example)> The default is 3. 10. Set the amount of time that the device should wait for a response to a probe attempt before considering it to have failed: (config vpn ipsec tunnel ipsec_example)> connection_monitor timeout value (config vpn ipsec tunnel ipsec_example)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set timeout to ten minutes, enter either 10m or 600s: (config vpn ipsec tunnel ipsec_example)> connection_monitor interval 600s (config vpn ipsec tunnel ipsec_example)> The default is 15 seconds. 11. Configure test targets: a. Add a test target: IX20 User Guide 297 Virtual Private Networks (VPN) IPsec (config vpn ipsec tunnel ipsec_example)> add connection_monitor target end (config vpn ipsec tunnel ipsec_example connection_monitor target 0)> b. Set the test type: (config vpn ipsec tunnel ipsec_example connection_monitor target 0)> test value (config vpn ipsec tunnel ipsec_example connection_monitor target 0)> where value is one of: n ping (IPv4) or ping6 (IPv6): Tests connectivity by sending an ICMP echo request to a specified hostname or IP address. l Specify the hostname or IP address by using ping_host or ping_host6: (config vpn ipsec tunnel ipsec_example connection_monitor target 0)> ping_host host (config vpn ipsec tunnel ipsec_example connection_monitor target 0)> l (Optional) Set the size, in bytes, of the ping packet by using ping_size or ping_ size6: (config vpn ipsec tunnel ipsec_example connection_monitor target 0)> ping_size [num] (config vpn ipsec tunnel ipsec_example connection_monitor target 0)> n dns (IPv4) or dns6 (IPv6): Tests connectivity by sending a DNS query to the specified DNS server. l Specify the DNS server. Allowed value is the IP address of the DNS server. (config vpn ipsec tunnel ipsec_example connection_monitor target 0)> dns_server ip_address (config vpn ipsec tunnel ipsec_example connection_monitor target 0)> n dns_configured (IPv4) or dns_configured6 (IPv6): Tests connectivity by sending a DNS query to the DNS servers configured for this interface. n http (IPv4) or http6 (IPv6): Tests connectivity by sending an HTTP or HTTPS GET request to the specified URL. l Specify the url. Allowed value uses the format http[s]://hostname/[path]. (config vpn ipsec tunnel ipsec_example connection_monitor target 0)> http_url url (config vpn ipsec tunnel ipsec_example connection_monitor target 0)> n interface_up (IPv4) or interface_up6 (IPv6): : The interface is considered to be down based on the interfaces down time, and the amount of time an initial connection to the interface takes before this test is considered to have failed. IX20 User Guide 298 Virtual Private Networks (VPN) IPsec l (Optional) Set the amount of time that the interface can be down before this test is considered to have failed: (config vpn ipsec tunnel ipsec_example connection_monitor target 0)> interface_down_time value (config vpn ipsec tunnel ipsec_example connection_monitor target 0)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set interface_down_time to ten minutes, enter either 10m or 600s: (config ipsec tunnel ipsec_example connection_monitor target 0)> interface_down_time 600s (config ipsec tunnel ipsec_example connection_monitor target 0)> The default is 60 seconds. l (Optional) Set the amount of time to wait for an initial connection to the interface before this test is considered to have failed: (config vpn ipsec tunnel ipsec_example connection_monitor target 0)> interface_timeout value (config vpn ipsec tunnel ipsec_example connection_monitor target 0)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set interface_timeout to ten minutes, enter either 10m or 600s: (config network interface my_wan ipv4 connection_monitor target 0)> interface_timeout 600s (config network interface my_wan ipv4 connection_monitor target 0)> The default is 60 seconds. 12. Save the configuration and apply the change: (config ipsec tunnel ipsec_example connection_monitor target 0)> save Configuration saved. > 13. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Show IPsec status and statistics WebUI IX20 User Guide 299 Virtual Private Networks (VPN) IPsec 1. Log into the IX20 WebUI as a user with Admin access. 2. On the menu, select Status > IPsec. The IPsec page appears. 3. To view configuration details about an IPsec tunnel, click the (configuration) icon in the upper right of the tunnel's status pane. Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. To display details about all configured IPsec tunnels, type the following at the prompt: > show ipsec all Name -----ipsec1 vpn1 Enable -----true false Status ------up pending Hostname --------------192.168.2.1 192.168.3.1 > 3. To display details about a specific tunnel: > show ipsec tunnel ipsec1 Tunnel Enable Status Hostname Zone Mode Type : ipsec1 : true : pending : 192.168.2.1 : ipsec : tunnel : esp > 4. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Debug an IPsec configuration If you experience issues with an IPsec tunnel not being successfully negotiated with the remote end of the tunnel, you can enable IPsec debug messages to be written to the system log. See View system and event logs for more information about viewing the system log. There are two methods to enable IPsec debug messages: n From the Admin CLI--Sets the debug level to 1 (basic debugging information only). n From the interactive shell--Allows for more detailed debug information. IX20 User Guide 300 Virtual Private Networks (VPN) IPsec Use the Admin CLI to set the IPsec debug level to 1 To set the debug level to 1 by using the Admin CLI: Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Set the action ipsec debug command to true: config> action ipsec debug true config> 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. This sets the IPsec debug level to 1. Use the interactive shell to set the IPsec debug level By using the interactive shell to set the debug level, you can enable the IX20 device to write additional debug messages to the system log. The command accepts the following values to set the debug level: n -1 -- (Default) No debug information is written. This is the equivalent of turning off debug messages for IPsec. n 0 -- Basic auditing logs, (for example, SA up/SA down). n 1 -- Generic control flow with errors. Select this for basic debugging information. n 2 -- More detailed debugging control flow. n 3 -- Includes RAW data dumps in hexadecimal format. n 4 -- Also includes sensitive material in dumps (for example, encryption keys). To access the shell menu option, you must have shell access enabled. See Authentication groups for information about configuring authentication groups that include shell access. Command line 1. Log into the IX20 command line as a user with shell access. Depending on your device configuration, you may be presented with an Access selection menu. Type shell to access the device shell. IX20 User Guide 301 Virtual Private Networks (VPN) IPsec 2. At the shell prompt, execute the following command: # ipsec stroke loglevel ike debug_level # where debug_level is one of the following: n -1 -- (Default) No debug information is written. This is the equivalent of turning off debug messages for IPsec. n 0 -- Basic auditing logs, (for example, SA up/SA down). n 1 -- Generic control flow with errors. Select this for basic debugging information. n 2 -- More detailed debugging control flow. n 3 -- Includes RAW data dumps in hexadecimal format. n 4 -- Also includes sensitive material in dumps (for example, encryption keys). 3. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 302 Virtual Private Networks (VPN) OpenVPN OpenVPN OpenVPN is an open-source Virtual Private Network (VPN) technology that creates secure point-topoint or site-to-site connections in routed or bridged configurations. OpenVPN uses a custom security protocol that is Secure Socket Layer (SSL) / Transport Layer Security (TLS) for key exchange. It uses standard encryption and authentication algorithms for data privacy and authentication over TCP or UDP. The OpenVPN server can push the network configuration, such as the topology and IP routes, to OpenVPN clients. This makes OpenVPN simpler to configure as it reduces the chances of a configuration mismatch between the client and server. OpenVPN also supports cipher negotiation between the client and server. This means you can configure the OpenVPN server and clients with a range of different cipher options and the server will negotiate with the client on the cipher to use for the connection. For more information on OpenVPN, see www.openvpn.net. OpenVPN modes: There are two modes for running OpenVPN: n Routing mode, also known as TUN. n Bridging mode, also known as TAP. Routing (TUN) mode In routing mode, each OpenVPN client is assigned a different IP subnet from the OpenVPN server and other OpenVPN clients. OpenVPN clients use Network Address Translation (NAT) to route traffic from devices connected on its LAN interfaces to the OpenVPN server. The manner in which the IP subnets are defined depends on the OpenVPN topology in use. The IX20 device supports two types of OpenVPN topology: OpenVPN Topology net30 Subnet definition method Each OpenVPN client is assigned a /30 subnet within the IP subnet specified in the OpenVPN server configuration. With net30 topology, pushed routes are used, with the exception of the default route. . Automatic route pushing (exec) is not allowed, because this would not inform the firewall and would be blocked. subnet Each OpenVPN client connected to the OpenVPN server is assigned an IP address within the IP subnet specified in the OpenVPN server configuration. For the IX20 device, pushed routes are not allowed; you will need to manually configure routes on the device. For more information on OpenVPN topologies, see OpenVPN topology. Bridging (TAP) mode In bridging mode, a LAN interface on the OpenVPN server is assigned to OpenVPN. The LAN interfaces of the OpenVPN clients are on the same IP subnet as the OpenVPN server's LAN interface. This means that devices connected to the OpenVPN client's LAN interface are on the same IP subnet as devices. The IX20 device supports two mechanisms for configuring an OpenVPN server in TAP mode: IX20 User Guide 303 Virtual Private Networks (VPN) OpenVPN n OpenVPN managed--The IX20 device creates the interface and then uses its standard configuration to set up the connection (for example, its standard DHCP server configuration). n Device only--IP addressing is controlled by the system, not by OpenVPN. Additional OpenVPN information For more information on OpenVPN, see these resources: Bridging vs. routing OpenVPN/Routing Configure an OpenVPN server Required configuration items n Enable the OpenVPN server. The OpenVPN server is enabled by default. n The mode used by the OpenVPN server, one of: l TUN (OpenVPN managed)--Also known as routing mode. Each OpenVPN client is assigned a different IP subnet from the OpenVPN server and other OpenVPN clients. OpenVPN clients use Network Address Translation (NAT) to route traffic from devices connected on its LAN interfaces to the OpenVPN server. l TAP - OpenVPN managed--Also know as bridging mode. A more advanced implementation of OpenVPN. The IX20 device creates an OpenVPN interface and uses standard interface configuration (for example, a standard DHCP server configuration). l TAP - Device only--An alternate form of OpenVPN bridging mode, in which the device, rather than OpenVPN, controls the interface configuration. If this method is is, the OpenVPN server must be included as a device in either an interface or a bridge. n The firewall zone to be used by the OpenVPN server. n The IP network and subnet mask of the OpenVPN server. n The server's Certificate authority (CA) certificate, and public, private and Diffie-Hellman (DH) keys. n An OpenVPN authentication group and an OpenVPN user. n Determine the method of certificate management: l Certificates managed by the server. l Certificates created externally and added to the server. n If certificates are created and added to the server, determine the level of authentication: l Certificate authentication only. l Username and password authentication only. l Certificate and username and password authentication. If username and password authentication is used, you must create an OpenVPN authentication group and user. See Configure an OpenVPN Authentication Group and User for instructions. n Certificates and keys: l The CA certificate (usually in a ca.crt file). l The Public key (for example, server.crt) IX20 User Guide 304 Virtual Private Networks (VPN) OpenVPN l The Private key (for example, server.key). l The Diffie Hellman key (usually in dh2048.pem). n Active recovery configuration. See Configure active recovery for OpenVPN for information about OpenVPN active recovery. Additional configuration items n The route metric for the OpenVPN server. n The range of IP addresses that the OpenVPN server will provide to clients. n The TCP/UDP port to use. By default, the IX20 device uses port 1194. n Access control list configuration to restrict access to the OpenVPN server through the firewall. n Additional OpenVPN parameters. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click VPN > OpenVPN > Servers. 4. For Add, type a name for the OpenVPN server and click . The new OpenVPN server configuration is displayed. IX20 User Guide 305 Virtual Private Networks (VPN) OpenVPN The OpenVPN server is enabled by default. To disable, click Enable. 5. For Device type, select the mode used by the OpenVPN server, either: n TUN (OpenVPN managed) n TAP - OpenVPN managed n TAP - Device only See OpenVPN for information about OpenVPN server modes. 6. If TUN (OpenVPN managed) or TAP - OpenVPN managed is selected for Device type: a. For Zone, select the firewall zone for the OpenVPN server. For TUN device types, this should be set to Internal to treat clients as LAN devices. b. (Optional) Select the Metric for the OpenVPN server. If multiple active routes match a destination, the route with the lowest metric will be used. The default setting is 0. c. For Address, type the IP address and subnet mask of the OpenVPN server. d. (Optional) For First IP address and Last IP address, set the range of IP addresses that the OpenVPN server will use when providing IP addresses to clients. The default is from 80 to 99. 7. (Optional) Set the VPN port that the OpenVPN server will use. The default is 1194. 8. For Server managed certificates, determine the method of certificate management. If enabled, the server will manage certificates. If not enabled, certificates must be created externally and added to the server. 9. If Server managed certificates is not enabled: a. Select the Authentication type: n Certificate only: Uses only certificates for client authentication. Each client requires a public and private key. n Username/password only: Uses a username and password for client authentication. You must create an OpenVPN authentication group and user. See Configure an OpenVPN Authentication Group and User for instructions. n Certificate and username/password: Uses both certificates and a username and password for client authentication. Each client requires a public and private key, and you must create an OpenVPN authentication group and user. See Configure an OpenVPN Authentication Group and User for instructions. IX20 User Guide 306 Virtual Private Networks (VPN) OpenVPN b. Paste the contents of the CA certificate (usually in a ca.crt file), the Public key (for example, server.crt), the Private key (for example, server.key), and the Diffie Hellman key (usually in dh2048.pem) into their respective fields. The contents will be hidden when the configuration is saved. 10. (Optional) Click to expand Access control list to restrict access to the OpenVPN server: n To limit access to specified IPv4 addresses and networks: a. Click IPv4 Addresses. b. For Add Address, click . c. For Address, enter the IPv4 address or network that can access the device's service-type. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the service-type. d. Click again to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: a. Click IPv6 Addresses. b. For Add Address, click . c. For Address, enter the IPv6 address or network that can access the device's service-type. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the service-type. d. Click again to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: a. Click Interfaces. b. For Add Interface, click . c. For Interface, select the appropriate interface from the dropdown. d. Click again to allow access through additional interfaces. n To limit access based on firewall zones: a. Click Zones. b. For Add Zone, click . c. For Zone, select the appropriate firewall zone from the dropdown. See Firewall configuration for information about firewall zones. d. Click again to allow access through additional firewall zones. 11. (Optional) Click to expand Advanced Options to manually set additional OpenVPN parameters. a. Click Enable to enable the use of additional OpenVPN parameters. b. Click Override if the additional OpenVPN parameters should override default options. c. For OpenVPN parameters, type the additional OpenVPN parameters. 12. Click Apply to save the configuration and apply the change. IX20 User Guide 307 Virtual Private Networks (VPN) OpenVPN Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. At the config prompt, type: (config)> add vpn openvpn server name (config vpn openvpn server name)> where name is the name of the OpenVPN server. The OpenVPN server is enabled by default. To disable the server, type: (config vpn openvpn server name)> enable false (config vpn openvpn server name)> 4. Set the mode used by the OpenVPN server: (config vpn openvpn server name)> device_type value (config vpn openvpn server name)> where value is one of: n TUN (OpenVPN managed)--Also known as routing mode. Each OpenVPN client is assigned a different IP subnet from the OpenVPN server and other OpenVPN clients. OpenVPN clients use Network Address Translation (NAT) to route traffic from devices connected on its LAN interfaces to the OpenVPN server. n TAP - OpenVPN managed--Also know as bridging mode. A more advanced implementation of OpenVPN. The IX20 device creates an OpenVPN interface and uses standard interface configuration (for example, a standard DHCP server configuration). n TAP - Device only--An alternate form of OpenVPN bridging mode, in which the device, rather than OpenVPN, controls the interface configuration. If this method is is, the OpenVPN server must be included as a device in either an interface or a bridge. See OpenVPN for information about OpenVPN modes. The default is tun. 5. If tap or tun are set for device_type: a. Set the IP address and subnet mask of the OpenVPN server. (config vpn openvpn server name)> address ip_address/netmask (config vpn openvpn server name)> IX20 User Guide 308 Virtual Private Networks (VPN) OpenVPN b. Set the firewall zone for the OpenVPN server. For TUN device types, this should be set to internal to treat clients as LAN devices. (config vpn openvpn server name)> zone value (config vpn openvpn server name)> To view a list of available zones: (config vpn openvpn server name)> firewall zone ? Zone: The zone for the local TUN interface. To treat clients as LAN devices this would usually be set to internal. Format: any dynamic_routes edge external internal ipsec loopback setup Current value: (config vpn openvpn server name)> c. (Optional) Set the route metric for the OpenVPN server. If multiple active routes match a destination, the route with the lowest metric will be used. (config vpn openvpn server name)> metric value (config vpn openvpn server name)> where value is an interger between 0 and 65535. The default is 0. d. (Optional) Set the range of IP addresses that the OpenVPN server will use when providing IP addresses to clients: i. Set the first address in the range limit: (config vpn openvpn server name)> server_first_ip value (config vpn openvpn server name)> where value is a number between 1 and 255. The number entered here will represent the first client IP address. For example, if address is set to 192.168.1.1/24 and server_first_ip is set to 80, the first client IP address will be 192.168.1.80. The default is from 80. ii. Set the last address in the range limit: (config vpn openvpn server name)> server_last_ip value (config vpn openvpn server name)> IX20 User Guide 309 Virtual Private Networks (VPN) OpenVPN where value is a number between 1 and 255. The number entered here will represent the last client IP address. For example, if address is set to 192.168.1.1/24 and server_last_ip is set to 99, the last client IP address will be 192.168.1.80. The default is from 80. 6. (Optional) Set the port that the OpenVPN server will use: (config vpn openvpn server name)> port port (config vpn openvpn server name)> The default is 1194. 7. Determine the method of certificate management: a. To allow the server to manage certificates: (config vpn openvpn server name)> autogenerate true (config vpn openvpn server name)> b. To create certificates externally and add them to the server (config vpn openvpn server name)> autogenerate false (config vpn openvpn server name)> The default setting is false. c. If autogenerate is set to false: i. Set the authentication type: (config vpn openvpn server name)> authentication value (config vpn openvpn server name)> where value is one of: n cert: Uses only certificates for client authentication. Each client requires a public and private key. n passwd: Uses a username and password for client authentication. You must create an OpenVPN authentication group and user. See Configure an OpenVPN Authentication Group and User for instructions. n cert_passwd: Uses both certificates and a username and password for client authentication. Each client requires a public and private key, and you must create an OpenVPN authentication group and user. See Configure an OpenVPN Authentication Group and User for instructions. ii. Paste the contents of the CA certificate (usually in a ca.crt file) into the value of the cacert parameter: (config vpn openvpn server name)> cacert value (config vpn openvpn server name)> iii. Paste the contents of the public key (for example, server.crt) into the value of the server_cert parameter: (config vpn openvpn server name)> server_cert value (config vpn openvpn server name)> IX20 User Guide 310 Virtual Private Networks (VPN) OpenVPN iv. Paste the contents of the private key (for example, server.key) into the value of the server_key parameter: (config vpn openvpn server name)> server_key value (config vpn openvpn server name)> v. Paste the contents of the Diffie Hellman key (usually in dh2048.pem) into the value of the diffie parameter: (config vpn openvpn server name)> diffie value (config vpn openvpn server name)> 8. (Optional) Set the access control list to restrict access to the OpenVPN server: n To limit access to specified IPv4 addresses and networks: (config vpn openvpn server name)> add acl address end value (config vpn openvpn server name)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the service-type. Repeat this step to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: (config vpn openvpn server name)> add acl address6 end value (config vpn openvpn server name)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the service-type. Repeat this step to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: (config vpn openvpn server name)> add acl interface end value (config vpn openvpn server name)> Where value is an interface defined on your device. Display a list of available interfaces: Use ... network interface ? to display interface information: (config vpn openvpn server name)> ... network interface ? Interfaces Additional Configuration ------------------------------------------- IX20 User Guide 311 Virtual Private Networks (VPN) OpenVPN defaultip defaultlinklocal eth1 eth2 loopback modem Default IP Default Link-local IP ETH1 ETH2 Loopback Modem (config vpn openvpn server name)> Repeat this step to list additional interfaces. n To limit access based on firewall zones: (config vpn openvpn server name)> add acl zone end value Where value is a firewall zone defined on your device, or the any keyword. Display a list of available firewall zones: Type ... firewall zone ? at the config prompt: (config vpn openvpn server name)> ... firewall zone ? Zones: A list of groups of network interfaces that can be referred to by packet filtering rules and access control lists. Additional Configuration ------------------------------------------------------------------------------ any dynamic_routes edge external internal ipsec loopback setup (config vpn openvpn server name)> Repeat this step to list additional firewall zones. 9. (Optional) Set additional OpenVPN parameters. a. Enable the use of additional OpenVPN parameters: (config vpn openvpn server name)> advanced_options enable true (config vpn openvpn server name)> b. Configure whether the additional OpenVPN parameters should override default options: (config vpn openvpn server name)> advanced_options override true (config vpn openvpn server name)> IX20 User Guide 312 Virtual Private Networks (VPN) OpenVPN c. Set the additional OpenVPN parameters: (config vpn openvpn server name)> extra parameters (config vpn openvpn server name)> 10. Save the configuration and apply the change: (config)> save Configuration saved. > 11. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure an OpenVPN Authentication Group and User If username and password authentication is used for the OpenVPN server, you must create an OpenVPN authentication group and user. See Configure an OpenVPN server for information about configuring an OpenVPN server to use username and password authentication. See IX20 user authentication for more information about creating authentication groups and users. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 313 Virtual Private Networks (VPN) OpenVPN 3. Add an OpenVPN authentication group: a. Click Authentication > Groups. b. For Add Group, type a name for the group (for example, OpenVPN_Group) and click . The new authentication group configuration is displayed. c. Click OpenVPN access to enable OpenVPN access rights for users of this group. d. Click to expand the OpenVPN node. e. Click to add a tunnel. f. For Tunnel, select an OpenVPN tunnel to which users of this group will have access. g. Repeat to add additional OpenVPN tunnels. IX20 User Guide 314 Virtual Private Networks (VPN) OpenVPN 4. Add an OpenVPN authentication user: a. Click Authentication > Users. b. For Add, type a name for the user (for example, OpenVPN_User) and click . c. Type a password for the user. This password is used for local authentication of the user. You can also configure the user to use RADIUS or TACACS+ authentication by configuring authentication methods. See User authentication methods for information. d. Click to expand the Groups node. e. Click to add a group to the user. f. Select a Group with OpenVPN access enabled. 5. Click Apply to save the configuration and apply the change. IX20 User Guide 315 Virtual Private Networks (VPN) OpenVPN Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Use the add auth group command to add a new authentication. For example, to add a group named OpenVPN_Group: (config)> add auth group OpenVPN_Group (config auth group OpenVPN_Group)> 4. Enable OpenVPN access rights for users of this group: (config auth group OpenVPN_Group)> acl openvpn enable true 5. Add an OpenVPN tunnel to which users of this group will have access: a. Determine available tunnels: (config auth group OpenVPN_Group)> .. .. .. vpn openvpn server ? Servers: A list of openvpn servers Additional Configuration ----------------------------------------------------------------------- -------- OpenVPN_server1 OpenVPN server (config auth group OpenVPN_Group)> b. Add a tunnel: (config auth group OpenVPN_Group)> add auth group test acl openvpn tunnels end /vpn/openvpn/server/OpenVPN_server1 (config auth group OpenVPN_Group)> 6. Save the configuration and apply the change: (config)> save Configuration saved. > 7. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 316 Virtual Private Networks (VPN) OpenVPN Configure an OpenVPN client by using an .ovpn file Required configuration items n Enable the OpenVPN client. The OpenVPN client is enabled by default. n The firewall zone to be used by the OpenVPN client. Additional configuration items n The route metric for the OpenVPN client. n The login credentials for the OpenVPN client, if configured on the OpenVPN server. See Configure active recovery for OpenVPN for information about OpenVPN active recovery. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click VPN > OpenVPN > Clients. 4. For Add, type a name for the OpenVPN client and click . The new OpenVPN client configuration is displayed. IX20 User Guide 317 Virtual Private Networks (VPN) OpenVPN 5. The OpenVPN client is enabled by default. To disable, click Enable. 6. The default behavior is to use an OVPN file for client configuration. To disable this behavior and configure the client manually, click Use .ovpn file to disable. If Use .ovpn file is disabled, see Configure an OpenVPN client without using an .ovpn file for configuration information. 7. For Zone, select the firewall zone for the OpenVPN client. 8. (Optional) Select the Metric for the OpenVPN client. If multiple active routes match a destination, the route with the lowest metric will be used. 9. (Optional) For Username and Password, type the login credentials as configured on the OpenVPN server. 10. For OVPN file, paste the content of the client.ovpn file. 11. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. At the config prompt, type: (config)> add vpn openvpn client name (config vpn openvpn client name)> where name is the name of the OpenVPN server. The OpenVPN client is enabled by default. To disable the client, type: (config vpn openvpn client name)> enable false (config vpn openvpn client name)> IX20 User Guide 318 Virtual Private Networks (VPN) OpenVPN 4. Set the firewall zone for the OpenVPN client: (config vpn openvpn client name)> zone value (config vpn openvpn client name)> To view a list of available zones: (config vpn openvpn client name)> zone ? Zone: The zone for the openvpn client interface. Format: any dynamic_routes edge external internal ipsec loopback setup Current value: (config vpn openvpn client name)> 5. (Optional) Set the route metric for the OpenVPN server. If multiple active routes match a destination, the route with the lowest metric will be used. (config vpn openvpn client name)> metric value (config vpn openvpn client name)> where value is an interger between 0 and 65535. The default is 0. 6. (Optional) Set the login credentials as configured on the OpenVPN server: (config vpn openvpn client name)> username value (config vpn openvpn client name)> password value (config vpn openvpn client name)> 7. Paste the content of the client.ovpn file into the value of the config_file parameter: (config vpn openvpn client name)> config_file value (config vpn openvpn client name)> 8. Save the configuration and apply the change: (config)> save Configuration saved. > 9. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 319 Virtual Private Networks (VPN) OpenVPN Configure an OpenVPN client without using an .ovpn file Required configuration items n Enable the OpenVPN client. The OpenVPN client is enabled by default. n The mode used by the OpenVPN server, either routing (TUN), or bridging (TAP). n The firewall zone to be used by the OpenVPN client. n The IP address of the OpenVPN server. n Certificates and keys: l The CA certificate (usually in a ca.crt file). l The Public key (for example, client.crt) l The Private key (for example, client.key). Additional configuration items n The route metric for the OpenVPN client. n The login credentials for the OpenVPN client, if configured on the OpenVPN server. n Additional OpenVPN parameters. See Configure active recovery for OpenVPN for information about OpenVPN active recovery. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click VPN > OpenVPN > Clients. IX20 User Guide 320 Virtual Private Networks (VPN) 4. For Add, type a name for the OpenVPN client and click . The new OpenVPN client configuration is displayed. OpenVPN 5. The OpenVPN client is enabled by default. To disable, click Enable. 6. The default behavior is to use an OVPN file for client configuration. To disable this behavior and configure the client manually, click Use .ovpn file to disable. 7. For Device type, select the mode used by the OpenVPN server, either TUN or TAP. 8. For Zone, select the firewall zone for the OpenVPN client. 9. (Optional) Select the Metric for the OpenVPN client. If multiple active routes match a destination, the route with the lowest metric will be used. 10. (Optional) For Username and Password, type the login credentials as configured on the OpenVPN server. 11. For VPN server IP, type the IP address of the OpenVPN server. 12. (Optional) Set the VPN port used by the OpenVPN server. The default is 1194. 13. Paste the contents of the CA certificate (usually in a ca.crt file), the Public key (for example, client.crt), and the Private key (for example, client.key) into their respective fields. The contents will be hidden when the configuration is saved. 14. (Optional) Click to expand Advanced Options to manually set additional OpenVPN parameters. IX20 User Guide 321 Virtual Private Networks (VPN) OpenVPN a. Click Enable to enable the use of additional OpenVPN parameters. b. Click Override if the additional OpenVPN parameters should override default options. c. For OpenVPN parameters, type the additional OpenVPN parameters. For example, to override the configuration by using a configuration file, enter --config filename, for example, --config /etc/config/openvpn_config. 15. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. At the config prompt, type: (config)> add vpn openvpn client name (config vpn openvpn client name)> where name is the name of the OpenVPN server. The OpenVPN client is enabled by default. To disable the client, type: (config vpn openvpn client name)> enable false (config vpn openvpn client name)> 4. The default behavior is to use an OVPN file for client configuration. To disable this behavior and configure the client manually: (config vpn openvpn client name)> use_file false (config vpn openvpn client name)> 5. Set the mode used by the OpenVPN server: (config vpn openvpn client name)> device_type value (config vpn openvpn client name)> where value is either tun or tap. The default is tun. 6. Set the firewall zone for the OpenVPN client: (config vpn openvpn client name)> zone value (config vpn openvpn client name)> To view a list of available zones: IX20 User Guide 322 Virtual Private Networks (VPN) OpenVPN (config vpn openvpn client name)> zone ? Zone: The zone for the openvpn client interface. Format: any dynamic_routes edge external internal ipsec loopback setup Current value: (config vpn openvpn client name)> 7. (Optional) Set the route metric for the OpenVPN server. If multiple active routes match a destination, the route with the lowest metric will be used. (config vpn openvpn client name)> metric value (config vpn openvpn client name)> where value is an interger between 0 and 65535. The default is 0. 8. (Optional) Set the login credentials as configured on the OpenVPN server: (config vpn openvpn client name)> username value (config vpn openvpn client name)> password value (config vpn openvpn client name)> 9. Set the IP address of the OpenVPN server: (config vpn openvpn client name)> server ip_address (config vpn openvpn client name)> 10. (Optional) Set the port used by the OpenVPN server: (config vpn openvpn client name)> port port (config vpn openvpn client name)> The default is 1194. 11. Paste the contents of the CA certificate (usually in a ca.crt file) into the value of the cacert parameter: (config vpn openvpn client name)> cacert value (config vpn openvpn client name)> 12. Paste the contents of the public key (for example, client.crt) into the value of the public_cert parameter: (config vpn openvpn client name)> public_cert value (config vpn openvpn client name)> IX20 User Guide 323 Virtual Private Networks (VPN) OpenVPN 13. Paste the contents of the private key (for example, client.key) into the value of the private_ key parameter: (config vpn openvpn client name)> private_key value (config vpn openvpn client name)> 14. (Optional) Set additional OpenVPN parameters. a. Enable the use of additional OpenVPN parameters: (config vpn openvpn client name)> advanced_options enable true (config vpn openvpn client name)> b. Configure whether the additional OpenVPN parameters should override default options: (config vpn openvpn client name)> advanced_options override true (config vpn openvpn client name)> c. Set the additional OpenVPN parameters: (config vpn openvpn client name)> advanced_options extra parameters (config vpn openvpn client name)> 15. Save the configuration and apply the change: (config)> save Configuration saved. > 16. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure active recovery for OpenVPN You can configure the IX20 device to regularly probe OpenVPN client connections to determine if the connection has failed and take remedial action. Required configuration items n A valid OpenVPN client configuration. See Configure an OpenVPN client by using an .ovpn file or Configure an OpenVPN client without using an .ovpn file for configuration instructions. n Enable OpenVPN active recovery. n The behavior of the IX20 device upon OpenVPN failure: either l Restart the OpenVPN interface l Reboot the device. Additional configuration items n The interval between connectivity tests. n Whether the interface should be considered to have failed if one of the test targets fails, or all of the test targets fail. n The number of probe attempts before the OpenVPN connection is considered to have failed. IX20 User Guide 324 Virtual Private Networks (VPN) OpenVPN n The amount of time that the device should wait for a response to a probe attempt before considering it to have failed. To configure the IX20 device to regularly probe the OpenVPN connection: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click VPN > OpenVPN > Clients. 4. Create a new OpenVPN client or select an existing one: n To create a new OpenVPN client, see Configure an OpenVPN client by using an .ovpn file or Configure an OpenVPN client without using an .ovpn file. n To edit an existing OpenVPN client, click to expand the appropriate client. 5. After creating or selecting the OpenVPN client, click Active recovery. IX20 User Guide 325 Virtual Private Networks (VPN) OpenVPN 6. Enable active recovery. 7. For Restart interface, enable to configure the device to restart the interface when its connection is considered to have failed. This is useful for interfaces that may regain connectivity after restarting, such as a cellular modem. 8. For Reboot device, enable to instruct the device to reboot when the WAN connection is considered to have failed. 9. Change the Interval between connectivity tests. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Interval to ten minutes, enter 10m or 600s. The default is 15 minutes. 10. For Success condition, determine whether the interface should fail over based on the failure of one of the test targets, or all of the test targets. 11. For Attempts, type the number of probe attempts before the WAN is considered to have failed. 12. For Response timeout, type the amount of time that the device should wait for a response to a probe attempt before considering it to have failed. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Response timeout to ten minutes, enter 10m or 600s. The default is 15 seconds. 13. Add a test target: a. Click to expand Test targets. b. For Add Test target, click . c. Select the Test type: n Ping test or Ping test (IPv6): Tests connectivity by sending an ICMP echo request to the hostname or IP address specified in Ping host. You can also optionally change the number of bytes in the Ping payload size. n DNS test or DNS test (IPv6): Tests connectivity by sending a DNS query to the specified DNS server. IX20 User Guide 326 Virtual Private Networks (VPN) OpenVPN n HTTP test HTTP test (IPv6): Tests connectivity by sending an HTTP or HTTPS GET request to the URL specified in Web servers. The URL should take the format of http[s]://hostname/[path]. n Test DNS servers configured for this interface or Test DNS servers configured for this interface (IPv6): Tests connectivity by sending a DNS query to the DNS servers configured for this interface. n Test the interface status or Test the interface status IPv6: The interface is considered to be down based on: l Down time: The amount of time that the interface can be down before this test is considered to have failed. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Down time to ten minutes, enter 10m or 600s. The default is 60 seconds. l Initial connection time: The amount of time to wait for an initial connection to the interface before this test is considered to have failed. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Initial connection time to ten minutes, enter 10m or 600s. The default is 60 seconds. 14. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Create a new OpenVPN client, or edit an existing one: n To create a new OpenVPN client, see Configure an OpenVPN client by using an .ovpn file or Configure an OpenVPN client without using an .ovpn file. n To edit an existing OpenVPN client, change to the OpenVPN client's node in the configuration schema. For example, for an OpenVPN client named openvpn_client1, change to the openvpn_client1 node in the configuration schema: (config)> vpn openvpn client openvpn_client1 (config vpn openvpn client openvpn_client1)> IX20 User Guide 327 Virtual Private Networks (VPN) OpenVPN 4. Enable active recovery: (config vpn openvpn client openvpn_client1)> connection_monitor enable true (config vpn openvpn client openvpn_client1)> 5. To configure the device to restart the interface when its connection is considered to have failed: (config vpn openvpn client openvpn_client1)> connection_monitor restart true (config vpn openvpn client openvpn_client1)> This is useful for interfaces that may regain connectivity after restarting, such as a cellular modem. 6. To configure the device to reboot when the interface is considered to have failed: (config vpn openvpn client openvpn_client1)> connection_monitor reboot enable (config vpn openvpn client openvpn_client1)> 7. Set the Interval between connectivity tests: (config vpn openvpn client openvpn_client1)> connection_monitor interval value (config vpn openvpn client openvpn_client1)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set interval to ten minutes, enter either 10m or 600s: (config vpn openvpn client openvpn_client1)> connection_monitor interval 600s (config vpn openvpn client openvpn_client1)> The default is 15 minutes. 8. Determine whether the interface should fail over based on the failure of one of the test targets, or all of the test targets: (config vpn openvpn client openvpn_client1)> connection_monitor success_ condition value (config vpn openvpn client openvpn_client1)> Where value is either one or all. 9. Set the number of probe attempts before the WAN is considered to have failed: (config vpn openvpn client openvpn_client1)> connection_monitor attempts num (config vpn openvpn client openvpn_client1)> The default is 3. 10. Set the amount of time that the device should wait for a response to a probe attempt before considering it to have failed: IX20 User Guide 328 Virtual Private Networks (VPN) OpenVPN (config vpn openvpn client openvpn_client1)> connection_monitor timeout value (config vpn openvpn client openvpn_client1)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set timeout to ten minutes, enter either 10m or 600s: (config vpn openvpn client openvpn_client1)> connection_monitor interval 600s (config vpn openvpn client openvpn_client1)> The default is 15 seconds. 11. Configure test targets: a. Add a test target: (config vpn openvpn client openvpn_client1)> add connection_monitor target end (config vpn openvpn client openvpn_client1 connection_monitor target 0)> b. Set the test type: (config vpn openvpn client openvpn_client1 connection_monitor target 0)> test value (config vpn openvpn client openvpn_client1 connection_monitor target 0)> where value is one of: n ping (IPv4) or ping6 (IPv6): Tests connectivity by sending an ICMP echo request to a specified hostname or IP address. l Specify the hostname or IP address by using ping_host or ping_host6: (config vpn openvpn client openvpn_client1 connection_monitor target 0)> ping_host host (config vpn openvpn client openvpn_client1 connection_monitor target 0)> l (Optional) Set the size, in bytes, of the ping packet by using ping_size or ping_ size6: (config vpn openvpn client openvpn_client1 connection_monitor target 0)> ping_size [num] (config vpn openvpn client openvpn_client1 connection_monitor target 0)> n dns (IPv4) or dns6 (IPv6): Tests connectivity by sending a DNS query to the specified DNS server. l Specify the DNS server. Allowed value is the IP address of the DNS server. (config vpn openvpn client openvpn_client1 connection_monitor target 0)> dns_server ip_address IX20 User Guide 329 Virtual Private Networks (VPN) OpenVPN (config vpn openvpn client openvpn_client1 connection_monitor target 0)> n dns_configured (IPv4) or dns_configured6 (IPv6): Tests connectivity by sending a DNS query to the DNS servers configured for this interface. n http (IPv4) or http6 (IPv6): Tests connectivity by sending an HTTP or HTTPS GET request to the specified URL. l Specify the url. Allowed value uses the format http[s]://hostname/[path]. (config vpn openvpn client openvpn_client1 connection_monitor target 0)> http_url url (config vpn openvpn client openvpn_client1 connection_monitor target 0)> n interface_up (IPv4) or interface_up6 (IPv6): : The interface is considered to be down based on the interfaces down time, and the amount of time an initial connection to the interface takes before this test is considered to have failed. l (Optional) Set the amount of time that the interface can be down before this test is considered to have failed: (config vpn openvpn client openvpn_client1 connection_monitor target 0)> interface_down_time value (config vpn openvpn client openvpn_client1 connection_monitor target 0)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set interface_down_time to ten minutes, enter either 10m or 600s: (config openvpn client openvpn_client1 connection_monitor target 0)> interface_down_time 600s (config openvpn client openvpn_client1 connection_monitor target 0)> The default is 60 seconds. l (Optional) Set the amount of time to wait for an initial connection to the interface before this test is considered to have failed: (config vpn openvpn client openvpn_client1 connection_monitor target 0)> interface_timeout value (config vpn openvpn client openvpn_client1 connection_monitor target 0)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set interface_timeout to ten minutes, enter either 10m or 600s: IX20 User Guide 330 Virtual Private Networks (VPN) OpenVPN (config network interface my_wwan ipv4 connection_monitor target 0)> interface_timeout 600s (config network interface my_wwan ipv4 connection_monitor target 0)> The default is 60 seconds. 12. Save the configuration and apply the change: (config openvpn client openvpn_client1 connection_monitor target 0)> save Configuration saved. > 13. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Show OpenVPN server status and statistics You can view status and statistics for OpenVPN servers from either the web interface or the command line: WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. On the menu, select Status > OpenVPN > Servers. The OpenVPN Servers page appears. 3. To view configuration details about an OpenVPN server, click the (configuration) icon in the upper right of the OpenVPN server's status pane. Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. To display details about all configured OpenVPN servers, type the following at the prompt: > show openvpn server all Server --------------OpenVPN_server1 OpenVPN_server2 Enable -----true false Type ---tun tun Zone -------internal internal Address --------------192.168.30.1/24 192.168.40.1/24 Port ---1194 1194 > 3. To display details about a specific server: > show openvpn server name OpenVPN_server1 IX20 User Guide 331 Virtual Private Networks (VPN) OpenVPN Server Enable Type Zone Address Port Use File Metric Protocol First IP Last IP : OpenVPN_server1 : true : tun : internal : 192.168.30.1/24 : 1194 : true :0 : udp : 80 : 99 > 4. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Show OpenVPN client status and statistics You can view status and statistics for OpenVPN clients from either web interface or the command line: WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. On the menu, select Status > OpenVPN > Clients. The OpenVPN Clients page appears. 3. To view configuration details about an OpenVPN client, click the (configuration) icon in the upper right of the OpenVPN client's status pane. Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. To display details about all configured OpenVPN clients, type the following at the prompt: > show openvpn client all Client --------------OpenVPN_Client1 OpenVPN_Client2 Enable -----true true Status ------connected pending Username Use File Zone -------- -------- -------- true internal true internal > 3. To display details about a specific server: > show openvpn client name OpenVPN_client1 IX20 User Guide 332 Virtual Private Networks (VPN) OpenVPN 4. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 333 Virtual Private Networks (VPN) Generic Routing Encapsulation (GRE) Generic Routing Encapsulation (GRE) Generic Routing Encapsulation (GRE) is an IP packet encapsulation protocol that allow for networks and routes to be advertized from one network device to another. You can use GRE to encapsulate a wide variety of network layer protocols inside virtual point-to-point links over an IP network. Configuring a GRE tunnel Configuring a GRE tunnel involves the following items: Required configuration items n A GRE loopback endpoint interface. n GRE tunnel configuration: l Enable the GRE tunnel. The GRE tunnels are enabled by default. l The local endpoint interface. l The IP address of the remote device/peer. Additional configuration items n A GRE key. n Enable the device to respond to keepalive packets. Task One: Create a GRE loopback endpoint interface WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 334 Virtual Private Networks (VPN) Generic Routing Encapsulation (GRE) 3. Click Network > Interfaces. 4. For Add Interface, type a name for the GRE loopback endpoint interface and click . 5. Enable the interface. New interfaces are enabled by default. To disable, or to enable if it has been disabled, click Enable. 6. For Interface type, select Ethernet. 7. For Zone, select Internal. 8. For Device, select Ethernet: Loopback. 9. Click to expand IPv4. 10. For Address, enter the IP address and subnet mask of the local GRE endpoint, for example 10.10.1.1/24. 11. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add the GRE endpoint interface. For example, to add an interface named gre_endpoint: (config)> add network interface gre_interface (config network interface gre_interface)> 4. Set the interface zone to internal: (config network interface gre_interface)> zone internal (config network interface gre_interface)> 5. Set the interface device to loopback: (config network interface gre_interface)> device /network/device/loopback (config network interface gre_interface)> 6. Set the IP address and subnet mask of the local GRE endpoint. For example, to set the local GRE endpoint's IP address and subnet mask to 10.10.1.1/24: (config network interface gre_interface)> ipv4 address 10.10.1.1/24 (config network interface gre_interface)> IX20 User Guide 335 Virtual Private Networks (VPN) Generic Routing Encapsulation (GRE) 7. Save the configuration and apply the change: (config network interface gre_interface)> save Configuration saved. > 8. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Task Two: Configure the GRE tunnel WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click VPN > IP Tunnels. 4. For Add IP tunnel, type a name for the GRE tunnel and click . 5. Enable the tunnel. New tunnels are enabled by default. To disable, or to enable if it has been disabled, click Enable. 6. For Local endpoint, select the GRE endpoint interface created in Task One. 7. For Remote endpoint, type the IP address of the GRE endpoint on the remote peer. 8. (Optional) For Key, enter a key that will be inserted in GRE packets created by this tunnel. It must match the key set by the remote endpoint. Allowed value is an interger between 0 and 4294967295, or an IP address. 9. (Optional) Enable keepalive reply to enable the device to reply to Cisco GRE keepalive packets. 10. Click Apply to save the configuration and apply the change. IX20 User Guide 336 Virtual Private Networks (VPN) Generic Routing Encapsulation (GRE) Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add the GRE endpoint tunnel. For example, to add a tunnel named gre_example: (config)> add vpn iptunnel gre_example (config vpn iptunnel gre_example)> GRE tunnels are enabled by default. To disable: (config vpn iptunnel gre_example)> enable false (config vpn iptunnel gre_example)> 4. Set the local endpoint to the GRE endpoint interface created in Task One, for example: (config vpn iptunnel gre_example)> local /network/interface/gre_endpoint (config vpn iptunnel gre_example)> 5. Set the IP address of the GRE endpoint on the remote peer: (config vpn iptunnel gre_example)> remote ip_address (config vpn iptunnel gre_example)> 6. (Optional) Set a key that will be inserted in GRE packets created by this tunnel. The key must match the key set by the remote endpoint. (config vpn iptunnel gre_example)> key value (config vpn iptunnel gre_example)> where value is an interger between 0 and 4294967295, or an IP address. 7. (Optional) Enable the device to reply to Cisco GRE keepalive packets: (config vpn iptunnel gre_example)> keepalive true (config vpn iptunnel gre_example)> 8. Save the configuration and apply the change: (config vpn iptunnel gre_example)> save Configuration saved. > IX20 User Guide 337 Virtual Private Networks (VPN) Generic Routing Encapsulation (GRE) 9. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 338 Virtual Private Networks (VPN) Generic Routing Encapsulation (GRE) Show GRE tunnels To view information about currently configured GRE tunnels: WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. On the menu, click Status > IP tunnels. The IP Tunnelspage appears. 3. To view configuration details about a GRE tunnel, click the (configuration) icon in the upper right of the tunnel's status pane. IX20 User Guide 339 Virtual Private Networks (VPN) Generic Routing Encapsulation (GRE) Example: GRE tunnel over an IPSec tunnel The IX20 device can be configured as an advertised set of routes through an IPSec tunnel. This allows you to leverage the dynamic route advertisement of GRE tunnels through a secured IPSec tunnel. The example configuration provides instructions for configuring the IX20 device with a GRE tunnel through IPsec. IX20-1 configuration tasks 1. Create an IPsec tunnel named ipsec_gre1 with: n A pre-shared key. n Remote endpoint set to the public IP address of the IX20-2 device. n A policy with: l Local network set to the IP address and subnet of the local GRE tunnel, 172.30.0.1/32. l Remote network set to the IP address and subnet of the remote GRE tunnel, 172.30.0.2/32. 2. Create an IPsec endpoint interface named ipsec_endpoint1: a. Zone set to Internal. b. Device set to Ethernet: Loopback. c. IPv4 Address set to the IP address of the local GRE tunnel, 172.30.0.1/32. 3. Create a GRE tunnel named gre_tunnel1: a. Local endpoint set to the IPsec endpoint interface, Interface: ipsec_endpoint1. b. Remote endpoint set to the IP address of the GRE tunnel on IX20-2, 172.30.0.2. 4. Create an interface named gre_interface1 and add it to the GRE tunnel: a. Zone set to Internal. b. Device set to IP tunnel: gre_tunnel1. c. IPv4 Address set to a virtual IP address on the GRE tunnel, 172.31.0.1/30. IX20-2 configuration tasks 1. Create an IPsec tunnel named ipsec_gre2 with: n The same pre-shared key as the ipsec_gre1 tunnel on IX20-1. n Remote endpoint set to the public IP address of IX20-1. n A policy with: l Local network set to the IP address and subnet of the local GRE tunnel, 172.30.0.2/32. l Remote network set to the IP address of the remote GRE tunnel, 172.30.0.1/32. IX20 User Guide 340 Virtual Private Networks (VPN) Generic Routing Encapsulation (GRE) 2. Create an IPsec endpoint interface named ipsec_endpoint2: a. Zone set to Internal. b. Device set to Ethernet: Loopback. c. IPv4 Address set to the IP address of the local GRE tunnel, 172.30.0.2/32. 3. Create a GRE tunnel named gre_tunnel2: a. Local endpoint set to the IPsec endpoint interface, Interface: ipsec_endpoint2. b. Remote endpoint set to the IP address of the GRE tunnel on IX20-1, 172.30.0.1. 4. Create an interface named gre_interface2 and add it to the GRE tunnel: a. Zone set to Internal. b. Device set to IP tunnel: gre_tunnel2. c. IPv4 Address set to a virtual IP address on the GRE tunnel, 172.31.1.1/30. Configuration procedures Configure the IX20-1 device Task one: Create an IPsec tunnel WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click VPN > IPsec > Tunnels. 4. For Add IPsec Tunnel, type ipsec_gre1 and click . 5. Click to expand Authentication. IX20 User Guide 341 Virtual Private Networks (VPN) 6. For Pre-shared key, type testkey. Generic Routing Encapsulation (GRE) 7. Click to expand Remote endpoint. 8. For Hostname, type public IP address of the IX20-2 device. 9. Click to expand Policies. 10. For Add Policy, click to add a new policy. 11. Click to expand Local network. 12. For Type, select Custom network. 13. For Address, type the IP address and subnet of the local GRE tunnel, 172.30.0.1/32. 14. For Remote network, type the IP address and subnet of the remote GRE tunnel, 172.30.0.2/32. 15. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> IX20 User Guide 342 Virtual Private Networks (VPN) Generic Routing Encapsulation (GRE) 3. Add an IPsec tunnel named ipsec_gre1: (config)> add vpn ipsec tunnel ipsec_gre1 (config vpn ipsec tunnel ipsec_gre1)> 4. Set the pre-shared key to testkey: (config vpn ipsec tunnel ipsec_gre1)> auth secret testkey (config vpn ipsec tunnel ipsec_gre1)> 5. Set the remote endpoint to public IP address of the IX20-2 device: (config vpn ipsec tunnel ipsec_gre1)> remote hostname 192.168.101.1 (config vpn ipsec tunnel ipsec_gre1)> 6. Add a policy: (config vpn ipsec tunnel ipsec_gre1)> add policy end (config vpn ipsec tunnel ipsec_gre1 policy 0)> 7. Set the local network policy type to custom: (config vpn ipsec tunnel ipsec_gre1 policy 0)> local type custom (config vpn ipsec tunnel ipsec_gre1 policy 0)> 8. Set the local network address to the IP address and subnet of the local GRE tunnel, 172.30.0.1/32: (config vpn ipsec tunnel ipsec_gre1 policy 0)> local custom 172.30.0.1/32 (config vpn ipsec tunnel ipsec_gre1 policy 0)> 9. Set the remote network address to the IP address and subnet of the remote GRE tunnel, 172.30.0.2/32: (config vpn ipsec tunnel ipsec_gre1 policy 0)> remote network 172.30.0.2/32 (config vpn ipsec tunnel ipsec_gre1 policy 0)> 10. Save the configuration and apply the change: (config ipsec tunnel ipsec_gre1 policy 0)> save Configuration saved. > Task two: Create an IPsec endpoint interface WebUI IX20 User Guide 343 Virtual Private Networks (VPN) Generic Routing Encapsulation (GRE) 1. Click Network > Interface. 2. For Add Interface, type ipsec_endpoint1 and click . 3. For Zone, select Internal. 4. For Device, select Ethernet: loopback. 5. Click to expand IPv4. 6. For Address, type the IP address of the local GRE tunnel, 172.30.0.1/32. 7. Click Apply to save the configuration and apply the change. Command line 1. At the command line, type config to enter configuration mode: > config (config)> IX20 User Guide 344 Virtual Private Networks (VPN) Generic Routing Encapsulation (GRE) 2. Add an interface named ipsec_endpoint1: (config)> add network interface ipsec_endpoint1 (config network interface ipsec_endpoint1)> 3. Set the zone to internal: (config network interface ipsec_endpoint1)> zone internal (config network interface ipsec_endpoint1)> 4. Set the device to /network/device/loopback: (config network interface ipsec_endpoint1)> device /network/device/loopback (config network interface ipsec_endpoint1)> 5. Set the IPv4 address to the IP address of the local GRE tunnel, 172.30.0.1/32: (config network interface ipsec_endpoint1)> ipv4 address 172.30.0.1/32 (config network interface ipsec_endpoint1)> 6. Save the configuration and apply the change: (config vpn ipsec tunnel ipsec_endpoint1 policy 0)> save Configuration saved. > Task three: Create a GRE tunnel WebUI 1. Click VPN > IP Tunnels. 2. For Add IP Tunnel, type gre_tunnel1 and click . 3. For Local endpoint, select the IPsec endpoint interface created in Task two (Interface: ipsec_endpoint1). 4. For Remote endpoint, type the IP address of the GRE tunnel on IX20-2, 172.30.0.2. 5. Click Apply to save the configuration and apply the change. IX20 User Guide 345 Virtual Private Networks (VPN) Generic Routing Encapsulation (GRE) Command line 1. At the command line, type config to enter configuration mode: > config (config)> 2. Add a GRE tunnel named gre_tunnel1: (config)> add vpn iptunnel gre_tunnel1 (config vpn iptunnel gre_tunnel1)> 3. Set the local endpoint to the IPsec endpoint interface created in Task two (/network/interface/ipsec_endpoint1): (config vpn iptunnel gre_tunnel1)> local /network/interface/ipsec_endpoint1 (config vpn iptunnel gre_tunnel1)> 4. Set the remote endpoint to the IP address of the GRE tunnel on IX20-2, 172.30.0.2: (config vpn iptunnel gre_tunnel1)> remote 172.30.0.2 (config vpn iptunnel gre_tunnel1)> 5. Save the configuration and apply the change: (config vpn iptunnel gre_tunnel1)> save Configuration saved. > Task four: Create an interface for the GRE tunnel device WebUI 1. Click Network > Interfaces. 2. For Add Interface, type gre_interface1 and click . 3. For Zone, select Internal. IX20 User Guide 346 Virtual Private Networks (VPN) Generic Routing Encapsulation (GRE) 4. For Device, select the GRE tunnel created in Task three (IP tunnel: gre_tunnel1). 5. Click to expand IPv4. 6. For Address, type 172.31.0.1/30 for a virtual IP address on the GRE tunnel. 7. Click Apply to save the configuration and apply the change. Command line 1. At the command line, type config to enter configuration mode: > config (config)> 2. Add an interface named gre_interface1: (config)> add network interface gre_interface1 (config network interface gre_interface1)> 3. Set the zone to internal: (config network interface gre_interface1)> zone internal (config network interface gre_interface1)> 4. Set the device to the GRE tunnel created in Task three (/vpn/iptunnel/gre_tunnel1): (config network interface gre_interface1)> device /vpn/iptunnel/gre_tunnel1 (config network interface gre_interface1)> IX20 User Guide 347 Virtual Private Networks (VPN) Generic Routing Encapsulation (GRE) 5. Set 172.31.0.1/30 as the virtual IP address on the GRE tunnel: (config network interface gre_interface1)> ipv4 address 172.31.0.1/30 (config network interface gre_interface1)> 6. Save the configuration and apply the change: (config network interface gre_interface1)> save Configuration saved. > 7. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure the IX20-2 device Task one: Create an IPsec tunnel WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click VPN > IPsec > Tunnels. 4. For Add IPsec Tunnel, type ipsec_gre2 and click . 5. Click to expand Authentication. 6. For Pre-shared key, type the same pre-shared key that was configured for the IX20-1 (testkey). IX20 User Guide 348 Virtual Private Networks (VPN) Generic Routing Encapsulation (GRE) 7. Click to expand Remote endpoint. 8. For Hostname, type public IP address of the IX20-1 device. 9. Click to expand Policies. 10. For Add Policy, click to add a new policy. 11. Click to expand Local network. 12. For Type, select Custom network. 13. For Address, type the IP address and subnet of the local GRE tunnel, 172.30.0.2/32. 14. For Remote network, type the IP address and subnet of the remote GRE tunnel, 172.30.0.1/32. 15. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add an IPsec tunnel named ipsec_gre2: (config)> add vpn ipsec tunnel ipsec_gre2 (config vpn ipsec tunnel ipsec_gre2)> IX20 User Guide 349 Virtual Private Networks (VPN) Generic Routing Encapsulation (GRE) 4. Set the pre-shared key to the same pre-shared key that was configured for the IX20-1 (testkey): (config vpn ipsec tunnel ipsec_gre2)> auth secret testkey (config vpn ipsec tunnel ipsec_gre2)> 5. Set the remote endpoint to public IP address of the IX20-1 device: (config vpn ipsec tunnel ipsec_gre2)> remote hostname 192.168.100.1 (config vpn ipsec tunnel ipsec_gre2)> 6. Add a policy: (config vpn ipsec tunnel ipsec_gre2)> add policy end (config vpn ipsec tunnel ipsec_gre2 policy 0)> 7. Set the local network policy type to custom: (config vpn ipsec tunnel ipsec_gre2 policy 0)> local type custom (config vpn ipsec tunnel ipsec_gre2 policy 0)> 8. Set the local network address to the IP address and subnet of the local GRE tunnel, 172.30.0.2/32: (config vpn ipsec tunnel ipsec_gre2 policy 0)> local custom 172.30.0.2/32 (config vpn ipsec tunnel ipsec_gre2 policy 0)> 9. Set the remote network address to the IP address and subnet of the remote GRE tunnel, 172.30.0.1/32: (config vpn ipsec tunnel ipsec_gre2 policy 0)> remote network 172.30.0.1/32 (config vpn ipsec tunnel ipsec_gre2 policy 0)> 10. Save the configuration and apply the change: (config vpn ipsec tunnel ipsec_gre2 policy 0)> save Configuration saved. > Task two: Create an IPsec endpoint interface WebUI IX20 User Guide 350 Virtual Private Networks (VPN) Generic Routing Encapsulation (GRE) 1. Click Network > Interfaces. 2. For Add Interface, type ipsec_endpoint2 and click . 3. For Zone, select Internal. 4. For Device, select Ethernet: loopback. 5. Click to expand IPv4. 6. For Address, type the IP address of the local GRE tunnel, 172.30.0.2/32. 7. Click Apply to save the configuration and apply the change. Command line 1. At the command line, type config to enter configuration mode: > config (config)> IX20 User Guide 351 Virtual Private Networks (VPN) Generic Routing Encapsulation (GRE) 2. Add an interface named ipsec_endpoint2: (config)> add network interface ipsec_endpoint2 (config network interface ipsec_endpoint2)> 3. Set the zone to internal: (config network interface ipsec_endpoint2)> zone internal (config network interface ipsec_endpoint2)> 4. Set the device to /network/device/loopback: (config network interface ipsec_endpoint2)> device /network/device/loopback (config network interface ipsec_endpoint2)> 5. Set the IPv4 address to the IP address of the local GRE tunnel, 172.30.0.2/32: (config network interface ipsec_endpoint2)> ipv4 address 172.30.0.2/32 (config network interface ipsec_endpoint2)> 6. Save the configuration and apply the change: (config vpn ipsec tunnel ipsec_endpoint2)> save Configuration saved. > Task three: Create a GRE tunnel WebUI 1. Click VPN > IP Tunnels. 2. For Add IP Tunnel, type gre_tunnel2 and click . 3. For Local endpoint, select the IPsec endpoint interface created in Task two (Interface: ipsec_endpoint2). 4. For Remote endpoint, type the IP address of the GRE tunnel on IX20-1, 172.30.0.1. 5. Click Apply to save the configuration and apply the change. IX20 User Guide 352 Virtual Private Networks (VPN) Generic Routing Encapsulation (GRE) Command line 1. At the command line, type config to enter configuration mode: > config (config)> 2. Add a GRE tunnel named gre_tunnel2: (config)> add vpn iptunnel gre_tunnel2 (config vpn iptunnel gre_tunnel2)> 3. Set the local endpoint to the IPsec endpoint interface created in Task two (/network/interface/ipsec_endpoint2): (config vpn iptunnel gre_tunnel2)> local /network/interface/ipsec_endpoint2 (config vpn iptunnel gre_tunnel2)> 4. Set the remote endpoint to the IP address of the GRE tunnel on IX20-1, 172.30.0.1: (config vpn iptunnel gre_tunnel2)> remote 172.30.0.1 (config vpn iptunnel gre_tunnel2)> 5. Save the configuration and apply the change: (config vpn iptunnel gre_tunnel2)> save Configuration saved. > Task four: Create an interface for the GRE tunnel device WebUI 1. Click Network > Interfaces. 2. For Add Interface, type gre_interface2 and click . 3. For Zone, select Internal. IX20 User Guide 353 Virtual Private Networks (VPN) Generic Routing Encapsulation (GRE) 4. For Device, select the GRE tunnel created in Task three (IP tunnel: gre_tunnel2). 5. Click to expand IPv4. 6. For Address, type 172.31.1.1/30 for a virtual IP address on the GRE tunnel. 7. Click Apply to save the configuration and apply the change. Command line 1. At the command line, type config to enter configuration mode: > config (config)> 2. Add an interface named gre_interface2: (config)> add network interface gre_interface2 (config network interface gre_interface2)> 3. Set the zone to internal: (config network interface gre_interface2)> zone internal (config network interface gre_interface2)> 4. Set the device to the GRE tunnel created in Task three (/vpn/iptunnel/gre_tunnel2): (config network interface gre_interface2)> device /vpn/iptunnel/gre_tunnel2 (config network interface gre_interface2)> IX20 User Guide 354 Virtual Private Networks (VPN) NEMO 5. Set 172.31.0.1/30 as the virtual IP address on the GRE tunnel: (config network interface gre_interface2)> ipv4 address 172.31.1.1/30 (config network interface gre_interface2)> 6. Save the configuration and apply the change: (config network interface gre_interface2)> save Configuration saved. > 7. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. NEMO Network Mobility (NEMO) is a mobile networking technology that provides access to one or more Local Area Networks (LANs) on your device. NEMO creates a tunnel between the home agent on the mobile private network and the IX20 device, isolating the connection from internet traffic and advertising the IP subnets of the LANs for remote access and device management. Dynamic Mobile Network Routing (DMNR) is the implementation of NEMO for Verizon Wireless Private Networks. DMNR support requires the use of Verizon SIM cards that have DMNR enabled. Configure a NEMO tunnel Configuring an NEMO tunnel with a remote device involves configuring the following items: Required configuration items n Enable the NEMO tunnel. The NEMO tunnel is enabled by default. n The IP address of the NEMO virtual network interface. n The firewall zone of the NEMO tunnel. n The IP address of the NEMO home agent server. This is provided by your cellular carrier. n The home agent's authentication key. This is provided by your cellular carrier. IX20 User Guide 355 Virtual Private Networks (VPN) NEMO n Home agent registration lifetime. This is provided by your cellular carrier. n The local network interfaces that will be advertised on NEMO. Additional configuration items n The home agent Software Parameter Index (SPI). n Path MTU discovery. Path MTU discovery is enabled by default. If it is disabled, identify the MTU. n Care of address: the local network interface that is used to communicate with the peer. l If set to Interface, identify the local interface to be used. Generally, this will be the Wirelesss WAN (Modem). l If set to IP address, enter the IP address. n The local network of the GRE endpoint negotiated by NEMO. l If the local network is set to Interface, identify the local interface to be used. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click VPN > NEMO. The NEMO tunnel is enabled by default. To disable, click to toggle off Enable. 4. For Home IP address, type the IPv4 address of the NEMO virtual network interface. 5. For Zone, select the firewall zone for the NEMO tunnel. 6. For Home agent server IP address, type the IPv4 address of the NEMO home agent. This is provided by your cellular carrier. 7. For Key, type the key used to authenticate to the home agent. This is provided by your cellular carrier. 8. For Home agent SPI, type the Security Parameter Index (SPI) value, which is used in the authentication extension when registering. This should be normally left at the default setting of 256 unless your service provider indicates a different value. IX20 User Guide 356 Virtual Private Networks (VPN) NEMO 9. For Home agent registration lifetime, in seconds, type the number of seconds number of seconds until the authorization key expires. This is provided by your cellular carrier. 10. For MTU discovery, leave enabled to determine the maximum transmission unit (MTU) size. If disabled, for MTU, type the MTU size. The default MTU size for LANs on the IX20 device is 1500. The MTU size of the NEMO tunnel will be smaller, to take into account the required headers. 11. Click to expand Care of address to configure the local WAN interface of the internet facing network. a. For Type, select the method to determine the local network interface that is used to communicate with the peer. n If Default route is selected, the network interface that is used will be the same as the default route. n If Interface is selected, specify the local network interface. n If IP address is selected, type the IP address. The default is Default route. 12. Click to expand GRE tunnel local endpoint. a. For Type, select the local endpoint of the GRE endpoint negotiated by NEMO. n If Default route is selected, the network interface that is used will be the same as the default route. n If Interface is selected, specify the local network interface. The default is Default route. 13. Click to expand Local networks. a. For Add Interface, click to add a local network to use as a virtual NEMO network interface. b. For Interface, select the local interface to use as a virtual NEMO network interface. Generally, this will be the a Local Area Network (LAN). c. (Optional) Repeat for additional interfaces. 14. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. IX20 User Guide 357 Virtual Private Networks (VPN) NEMO 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add a NEMO tunnel. For example, to add a NEMO tunnel named nemo_example: (config)> add vpn nemo nemo_example (config vpn nemo nemo_example)> The NEMO tunnel is enabled by default. To disable: (config vpn nemo nemo_example)> enable false (config vpn nemo nemo_example)> 4. Set the IPv4 address of the NEMO virtual network interface: (config vpn nemo nemo_example)> home_address IPv4_address (config vpn nemo nemo_example)> 5. Set the IPv4 address of the NEMO home agent. This is provided by your cellular carrier. (config vpn nemo nemo_example)> home_agent IPv4_address (config vpn nemo nemo_example)> 6. Set the key used to authenticate to the home agent. This is provided by your cellular carrier. (config vpn nemo nemo_example)> key value (config vpn nemo nemo_example)> 7. Set the the number of seconds number of seconds until the authorization key expires. This is provided by your cellular carrier. (config vpn nemo nemo_example)> lifetime integer (config vpn nemo nemo_example)> Allowed values are any integer between 1 and 65535. 8. MTU discovery is enabled by default, which allows the device to determine the maximum transmission unit (MTU) size. To disable: (config vpn nemo nemo_example)> mtu_discovery false (config vpn nemo nemo_example)> If disabled, set the MTU size. The default MTU size for LANs on the IX20 device is 1500. The MTU size of the NEMO tunnel will be smaller, to take into account the required headers. (config vpn nemo nemo_example)> mtu integer (config vpn nemo nemo_example)> Allowed values are any integer between 68 and 1476. 9. Set the Security Parameter Index (SPI) value, which is used in the authentication extension when registering. This should be normally left at the default setting of 256 unless your service provider indicates a different value. IX20 User Guide 358 Virtual Private Networks (VPN) NEMO (config vpn nemo nemo_example)> spi integer (config vpn nemo nemo_example)> Allowed values are any integer between 256 and 4294967295. 10. Set the firewall zone for the NEMO tunnel: (config vpn nemo nemo_example)> zone zone (config vpn nemo nemo_example)> To view a list of available zones: (config vpn nemo nemo_example)> zone ? Zone: The firewall zone assigned to this network interface. This can be used by packet filtering rules and access control lists to restrict network traffic on this interface. Format: any dynamic_routes edge external internal ipsec loopback setup Current value: (config vpn nemo nemo_example)> zone 11. Configure the Care-of-Address, the local WAN interface of the internet facing network. a. Set the method to determine the Care-of-Address: (config vpn nemo nemo_example)> coaddress type value (config vpn nemo nemo_example)> where value is one of: n defaultroute: Uses the same network interface as the default route. n interface If interface is used, set the interface: i. Use the ? to determine available interfaces: (config vpn nemo nemo_example)> coaddress interface ? Interface: Use the IP address of this network interface as this node's Care-of-Address. Format: defaultip defaultlinklocal IX20 User Guide 359 Virtual Private Networks (VPN) NEMO eth1 eth2 loopback Current value: (config vpn nemo nemo_example)> coaddress interface ii. Set the interface. For example: (config vpn nemo nemo_example)> coaddress interface eth1 (config vpn nemo nemo_example)> n ip If ip is used, set the IP address: (config vpn nemo nemo_example)> coaddress address IP_address (config vpn nemo nemo_example)> The default is defaultroute. 12. Set the GRE tunnel local endpoint: a. Set the method to determine the GRE tunnel local endpoint: (config vpn nemo nemo_example)> tun_local type value (config vpn nemo nemo_example)> where value is one of: n defaultroute: Uses the same network interface as the default route. n interface If interface is used, set the interface. i. Use the ? to determine available interfaces: (config vpn nemo nemo_example)> tun_local interface ? Interface: The network interface to use to communicate with the peer. Set this field to blank if using the default route. Format: defaultip defaultlinklocal eth1 eth2 loopback Current value: (config vpn nemo nemo_example)> tun_local interface ii. Set the interface. For example: (config vpn nemo nemo_example)> tun_local interface eth1 (config vpn nemo nemo_example)> The default is defaultroute. IX20 User Guide 360 Virtual Private Networks (VPN) NEMO 13. Configure one or more local networks to use as a virtual NEMO network interface. Generally, this will be a Local Area Network (LAN): a. Add a local network to use as a virtual NEMO network interface: (config vpn nemo nemo_example)> add network end eth2 (config vpn nemo nemo_example)> b. (Optional) Repeat for additional interfaces. 14. Save the configuration and apply the change: (config)> save Configuration saved. > 15. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Show NEMO status WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. On the menu, select Status > NEMO. The NEMO page appears. 3. To view configuration details about an NEMO tunnel, click the (configuration) icon in the upper right of the tunnel's status pane. Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. To display details about all configured NEMO tunnel, type the following at the prompt: > show nemo NEMO ---demo test Enable -----false true Status ------ up Address ------- 1.2.3.4 Agent ------- 4.3.2.1 CoAddress ---------- 10.10.10.1 > 3. To display details about a specific tunnel: > show nemo name test IX20 User Guide 361 Virtual Private Networks (VPN) NEMO test NEMO Status ---------------Enabled Status Home Agent Care of Address Interface GRE Tunnel Metric MTU Lifetime (Actual) : true : up : 4.3.2.1 : 10.10.10.1 : modem : 10.10.10.1 === 4.3.2.1 : 255 : 1476 : 600 Local Network ------------lan1 LAN2 Subnet -------------192.168.2.1/24 192.168.3.1/24 Status ---------Advertized Advertized > 4. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 362 Services This chapter contains the following topics: Allow remote access for web administration and SSH 364 Configure the web administration service 367 Configure SSH access 377 Use SSH with key authentication 383 Configure telnet access 386 Configure DNS 391 Simple Network Management Protocol (SNMP) 397 Location information 403 Modbus gateway 421 System time 438 Configure the system time 438 Network Time Protocol 441 Configure the device as an NTP server 441 Configure a multicast route 446 Ethernet network bonding 449 Enable service discovery (mDNS) 452 Use the iPerf service 455 Configure the ping responder service 460 IX20 User Guide 363 Services Allow remote access for web administration and SSH Allow remote access for web administration and SSH By default, only devices connected to the IX20's LAN have access to the device via web administration and SSH. To enable these services for access from remote devices: n The IX20 device must have a publicly reachable IP address. n The External firewall zone must be added to the web administration or SSH service. See Firewall configuration for information on zones. n See Set the idle timeout for IX20 users for information about setting the inactivity timeout for the web administration and SSH services. To allow web administration or SSH for the External firewall zone: Add the External firewall zone to the web administration service WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Services > Web administration > Access Control List > Zones. 4. For Add Zone, click . IX20 User Guide 364 Services 5. Select External. Allow remote access for web administration and SSH 6. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add the external zone to the web administration service: (config)> add service web_admin acl zone end external (config)> 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Add the External firewall zone to the SSH service WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 365 Services Allow remote access for web administration and SSH 3. Click Configuration > Services > SSH > Access Control List > Zones. 4. For Add Zone, click . 5. Select External. 6. Click Apply to save the configuration and apply the change. IX20 User Guide 366 Services Configure the web administration service Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add the External zone to the SSH service: (config)> add service ssh acl zone end external (config)> 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure the web administration service The web administration service allows you to monitor and configure the IX20 device by using the WebUI, a browser-based interface. By default, the web administration service is enabled and uses the standard HTTPS port, 443. The default access control for the service uses the Internal firewall zone, which means that only devices connected to the IX20's LAN can access the WebUI. If this configuration is sufficient for your needs, no further configuration is required. See Allow remote access for web administration and SSH for information about configuring the web administration service to allow access from remote devices. Required configuration items n The web administration service is enabled by default. n Configure access control for the service. Additional configuration items n Port to use for web administration service communication. n Multicast DNS (mDNS) support. n An SSL certificate to use for communications with the service. n Support for legacy encryption protocols. See Set the idle timeout for IX20 users for information about setting the inactivity timeout for the web administration services. IX20 User Guide 367 Services Configure the web administration service Enable or disable the web administration service The web administration service is enabled by default. To disable the service, or enable it if it has been disabled: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Services > Web administration. 4. Click Enable. 5. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Enable or disable the web administration service: n To enable the service: (config)> service web_admin enable true (config)> IX20 User Guide 368 Services Configure the web administration service n To disable the sevice: (config)> service web_admin enable false (config)> 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure the service WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Services > Web administration. 4. (Optional) For Port, enter the port number for the service. Normally this should not be changed. 5. Click Access control list to configure access control: n To limit access to specified IPv4 addresses and networks: a. Click IPv4 Addresses. b. For Add Address, click . c. For Address, enter the IPv4 address or network that can access the device's web administration service. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the web administration service. IX20 User Guide 369 Services Configure the web administration service d. Click again to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: a. Click IPv6 Addresses. b. For Add Address, click . c. For Address, enter the IPv6 address or network that can access the device's web administration service. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the web administration service. d. Click again to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: a. Click Interfaces. b. For Add Interface, click . c. For Interface, select the appropriate interface from the dropdown. d. Click again to allow access through additional interfaces. n To limit access based on firewall zones: a. Click Zones. b. For Add Zone, click . c. For Zone, select the appropriate firewall zone from the dropdown. See Firewall configuration for information about firewall zones. d. Click again to allow access through additional firewall zones. 6. Multicast DNS (mDNS) is enabled by default. mDNS is a protocol that resolves host names in small networks that do not have a DNS server. To disable mDNS, or enable it if it has been disabled, click Enable mDNS. 7. For SSL certificate, if you have your own signed SSL certificate, paste the certificate and private key. If SSL certificate is blank, the device will use an automatically-generated, selfsigned certificate. n The SSL certificate and private key must be in PEM format. n The private key can use one of the following algorithms: l RSA l DSA l ECDSA l ECDH Note Password-protected certificate keys are not supported. Example: a. Generate the SSL certificate and private key, for example: # openssl req -newkey rsa:2048 -nodes -keyout key.pem -x509 -days 365 out certificate.pem IX20 User Guide 370 Services Configure the web administration service b. Paste the contents of certificate.pem and key.pem into the SSL certificate field. The contents of the certificate.pem must be first. For example: 8. For Allow legacy encryption protocols, enable this option to allow clients to connect to the HTTPS session by using encryption protocols older than TLS 1.2, in addition to TLS 1.2 and later protocols. This option is disabled by default, which means that only TLS 1.2 and later encryption protocols are allowed with HTTPS connections. 9. View is set to Auto by default and normally should not be changed. 10. Legacy port redirection is used to redirect client HTTP requests to the HTTPS service. Legacy port redirection is enabled by default, and normally these settings should not be changed. To disable legacy port redirection, click to expand Legacy port redirection and deselect Enable. 11. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Configure access control: n To limit access to specified IPv4 addresses and networks: (config)> add service web_admin acl address end value (config)> Where value can be: IX20 User Guide 371 Services Configure the web administration service l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the web administratrion service. Repeat this step to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: (config)> add service web_admin acl address6 end value (config)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the web administratrion service. Repeat this step to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: (config)> add service web_admin acl interface end value (config)> Where value is an interface defined on your device. Display a list of available interfaces: Use ... network interface ? to display interface information: (config)> ... network interface ? Interfaces Additional Configuration ------------------------------------------- defaultip Default IP defaultlinklocal Default Link-local IP eth1 ETH1 eth2 ETH2 loopback Loopback modem Modem (config)> Repeat this step to list additional interfaces. n To limit access based on firewall zones: (config)> add service web_admin acl zone end value Where value is a firewall zone defined on your device, or the any keyword. Display a list of available firewall zones: IX20 User Guide 372 Services Configure the web administration service Type ... firewall zone ? at the config prompt: (config)> ... firewall zone ? Zones: A list of groups of network interfaces that can be referred to by packet filtering rules and access control lists. Additional Configuration ------------------------------------------------------------------------------ any dynamic_routes edge external internal ipsec loopback setup (config)> Repeat this step to list additional firewall zones. 4. (Optional) If you have your own signed SSL certificate, if you have your own signed SSL certificate, set the certificate and private key by pasting their contents into the service web_ admin cert command. Enclose the certificate and private key contents in quotes ("). (config)> service web_admin cert "ssl-cert-and-private-key" (config)> n If SSL certificate is blank, the device will use an automatically-generated, self-signed certificate. n The SSL certificate and private key must be in PEM format. n The private key can use one of the following algorithms: l RSA l DSA l ECDSA l ECDH Note Password-protected certificate keys are not supported. Example a. Generate the SSL certificate and private key, for example: # openssl req -newkey rsa:2048 -nodes -keyout key.pem -x509 -days 365 out certificate.pem b. Paste the contents of certificate.pem and key.pem into the service web_admin cert command. Enclose the contents of certificate.pem and key.pem in quotes. For example: IX20 User Guide 373 Services Configure the web administration service (config)> service web_admin cert "-----BEGIN CERTIFICATE----MIID8TCCAtmgAwIBAgIULOwezcmbnQmIC9pT9txwCfUbkWQwDQYJKoZIhvcNAQEL BQAwgYcxCzAJBgNVBAYTAlVTMQ8wDQYDVQQIDAZPcmVnb24xDjAMBgNVBAcMBUFs b2hhMRMwEQYDVQQKDApNY0JhbmUgSW5jMRAwDgYDVQQLDAdTdXBwb3J0MQ8wDQYD VQQDDAZtY2JhbmUxHzAdBgkqhkiG9w0BCQEWEGptY2JhbmVAZGlnaS5jb20wHhcN MjAwOTIyMTY1OTUyWhcNMjEwOTIyMTY1OTUyWjCBhzELMAkGA1UEBhMCVVMxDzAN BgNVBAgMBk9yZWdvbjEOMAwGA1UEBwwFQWxvaGExEzARBgNVBAoMCk1jQmFuZSBJ bmMxEDAOBgNVBAsMB1N1cHBvcnQxDzANBgNVBAMMBm1jYmFuZTEfMB0GCSqGSIb3 DQEJARYQam1jYmFuZUBkaWdpLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC AQoCggEBAOBn19AX01LO9plYtfRZq0bETwNwSCYGeEIOGJ7gHt/rihLVBJS1woYv u1Oq1ohYxIawBY1iIPBD2GtzyEJXzBZdQRhwi/dRyRi4vr7EkjGDr0Vb/NVT0L5w UzcMeT+71DYvKYm6GpcWx+LoKqFTjbMFBIze5pbBfru+SicId6joCHIuYq8Ehflx 6sy6s4MDbyTUAEN2YhsBaOljej64LNzcsHeISbAWibXWjOSsK+N1MivQq5uwIYw/ 1fsnD8KDS43Wg57+far9fQ2MIHsgnoAGz+w6PIKJR594y/MfqQffDFNCh2lJY49F hOqEtA5B9TyXRKwoa3j/lIC/t5cpIBcCAwEAAaNTMFEwHQYDVR0OBBYEFDVtrWBH E1ZcBg9TRRxMn7chKYjXMB8GA1UdIwQYMBaAFDVtrWBHE1ZcBg9TRRxMn7chKYjX MA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBALj/mrgaKDNTspv9 ThyZTBlRQ59wIzwRWRYRxUmkVcR8eBcjwdBTWjSBLnFlD2WFOEEEnVz2Dzcixmj4 /Fw7GQNcYIKj+aIGJzbcKgox10mZB3VKYRmPpnpzHCkvFi4o81+bC8HJQfK9U80e vDV0/vA5OB2j/DrjvlOrapCTkuyA0TVyGvgTASx2ATu9U45KZofm4odThQs/9FRQ +cwSTb5v47KYffeyY+g3dyJw1/KgMJGpBUYNJDIsFQC9RfzPjKE2kz41hx4VksT/ q81WGstDXH++QTu2sj7vWkFJH5xPFt80HjtWKKpIfeOIlBPGeRHvdH2PQibx0OOt Sa+P5O8= -----END CERTIFICATE---------BEGIN PRIVATE KEY----MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQDgZ9fQF9NSzvaZ WLX0WatGxE8DcEgmBnhCDhie4B7f64oS1QSUtcKGL7tTqtaIWMSGsAWNYiDwQ9hr c8hCV8wWXUEYcIv3UckYuL6+xJIxg69FW/zVU9C+cFM3DHk/u9Q2LymJuhqXFsfi 6CqhU42zBQSM3uaWwX67vkonCHeo6AhyLmKvBIX5cerMurODA28k1ABDdmIbAWjp Y3o+uCzc3LB3iEmwFom11ozkrCvjdTIr0KubsCGMP9X7Jw/Cg0uN1oOe/n2q/X0N jCB7D56ABs/sOjyCiUefeMvzH6kH3wxTQodpSWOPRYTqhLQOQfU8l0SsKGt4/5SA v7eXKSAXAgMBAAECggEBAMDKdi7hSTyrclDsVeZH4044+WkK3fFNPaQCWESmZ+AY i9cCC513SlfeSiHnc8hP+wd70klVNNc2coheQH4+z6enFnXYu2cPbKVAkx9x4eeI Ktx72wurpnr2JYf1v3Vx+S9T9WvN52pGuBPJQla3YdWbSf18wr5iHm9NXIeMTsFc esdjEW07JRnxQEMZ1GPWT+YtH1+FzQ3+W9rFsFFzt0vcp5Lh1RGg0huzL2NQ5EcF 3brzIZjNAavMsdBFzdc2hcbYnbv7o1uGLujbtZ7WurNy7+Tc54gu2Ds25J0/0mgf OxmqFevIqVkqp2wOmeLtI4o77y6uCbhfA6I+GWTZEYECgYEA/uDzlbPMRcWuUig0 CymOKlhEpx9qxid2Ike0G57ykFaEsKxVMKHkv/yvAEHwazIEzlc2kcQrbLWnDQYx oKmXf87Y1T5AXs+ml1PlepXgveKpKrWwORsdDBd+OS34lyNJ0KCqqIzwAaf8lcSW tyShAZzvuH9GW9WlCc8g3ifp9WUCgYEA4WSSfqFkQLA09sI76VLvUqMbb31bNgOk ZuPg7uxuDk3yNY58LGQCoV8tUZuHtBJdrBDCtcJa5sasJZQrWUlZ8y/5zgCZmqQn MzTD062xaqTenL0jKgKQrWig4DpUUhfc4BFJmHyeitosDPG98oCxuh6HfuMOeM1v Xag6Z391VcsCgYBgBnpfFU1JoC+L7m+lIPPZykWbPT/qBeYBBki5+0lhzebR9Stn VicrmROjojQk/sRGxR7fDixaGZolUwcRg7N7SH/y3zA7SDp4WvhjFeKFR8b6O1d4 PFnWO2envUUiE/50ZoPFWsv1o8eK2XT67Qbn56t9NB5a7QPvzSSR7jG77QKBgD/w BrqTT9wl4DBrsxEiLK+1g0/iMKCm8dkaJbHBMgsuw1m7/K+fAzwBwtpWk21alGX+ Ly3eX2j9zNGwMYfXjgO1hViRxQEgNdqJyk9fA2gsMtYltTbymVYHyzMweMD88fRC Ey2FlHfxIfPeE7MaHNCeXnN5N56/MCtSUJcRihh3AoGAey0BGi4xLqSJESqZZ58p e71JHg4M46rLlrxi+4FXaop64LCxM8kPpROfasJJu5nlPpYHye959BBQnYcAheZZ IX20 User Guide 374 Services Configure the web administration service 0siGswIauBd8BrZMIWf8JBUIC5EGkMiIyNpLJqPbGEImMUXk4Zane/cL7e06U8ft BUtOtMefbBDDxpP+E+iIiuM= -----END PRIVATE KEY-----" (config)> 5. (Optional) Configure Multicast DNS (mDNS): mDNS is a protocol that resolves host names in small networks that do not have a DNS server. mDNS is enabled by default. To disable mDNS, or enable it if it has been disabled: n To enable the mDNS protocol: (config)> service web_admin mdns enable true (config> n To disable the mDNS protocl: (config)> service web_admin mdns enable false (config)> 6. (Optional) Set the port number for this service. The default setting of 443 normally should not be changed. (config)> service web_admin port 444 (config)> 7. (Optional) Configure the device to allow legacy encryption protocols. Legacy encryption protocols allow clients to connect to the HTTPS session by using encryption protocols older than TLS 1.2, in addition to TLS 1.2 and later protocols. This option is disabled by default, which means that only TLS 1.2 and later encryption protocols are allowed with HTTPS connections. To enable legacy encryption protocols: (config)> service web_admin legacy_encryption true (config)> 8. (Optional) Disable legacy port redirection. Legacy port redirection is used to redirect client HTTP requests to the HTTPS service. Legacy port redirection is enabled by default, and normally these settings should not be changed. To disable legacy port redirection: (config)> service web_admin legacy enable false (config)> 9. Save the configuration and apply the change: (config)> save Configuration saved. > IX20 User Guide 375 Services Configure the web administration service 10. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 376 Services Configure SSH access Configure SSH access The IX20's default configuration has SSH access enabled, and allows SSH access to the device from authorized users within the Internal firewall zone. If this configuration is sufficient for your needs, no further configuration is required. See Allow remote access for web administration and SSH for information about configuring the SSH service to allow access from remote devices. Required configuration items n Enable SSH access. n Configure access control for the SSH service. Additional configuration items n Port to use for communications with the SSH service. n Multicast DNS (mDNS) support. n A private key to use for communications with the SSH service. See Set the idle timeout for IX20 users for information about setting the inactivity timeout for the SSH service. Enable or disable the SSH service The SSH service is enabled by default. To disable the service, or enable it if it has been disabled: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Services > SSH. 4. Click Enable. IX20 User Guide 377 Services 5. Click Apply to save the configuration and apply the change. Configure SSH access Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Enable or disable the SSH service: n To enable the service: (config)> service ssh enable true (config)> n To disable the sevice: (config)> service ssh enable false (config)> 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure the service WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 378 Services Configure SSH access 3. Click Services > SSH. 4. (Optional) For Port, enter the port number for the service. Normally this should not be changed. 5. Click Access control list to configure access control: n To limit access to specified IPv4 addresses and networks: a. Click IPv4 Addresses. b. For Add Address, click . c. For Address, enter the IPv4 address or network that can access the device's SSH service. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the SSH service. d. Click again to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: a. Click IPv6 Addresses. b. For Add Address, click . c. For Address, enter the IPv6 address or network that can access the device's SSH service. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the SSH service. d. Click again to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: a. Click Interfaces. b. For Add Interface, click . c. For Interface, select the appropriate interface from the dropdown. d. Click again to allow access through additional interfaces. n To limit access based on firewall zones: a. Click Zones. b. For Add Zone, click . c. For Zone, select the appropriate firewall zone from the dropdown. See Firewall configuration for information about firewall zones. d. Click again to allow access through additional firewall zones. IX20 User Guide 379 Services Configure SSH access 6. Multicast DNS (mDNS) is enabled by default. mDNS is a protocol that resolves host names in small networks that do not have a DNS server. To disable mDNS, or enable it if it has been disabled, click Enable mDNS. 7. For Private key, type the private key in PEM format. If Private key is blank, the device will use an automatically-generated key. 8. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Configure access control: n To limit access to specified IPv4 addresses and networks: (config)> add service ssh acl address end value (config)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the SSH service. Repeat this step to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: (config)> add service ssh acl address6 end value (config)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the SSH service. Repeat this step to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: (config)> add service ssh acl interface end value (config)> IX20 User Guide 380 Services Configure SSH access Where value is an interface defined on your device. Display a list of available interfaces: Use ... network interface ? to display interface information: (config)> ... network interface ? Interfaces Additional Configuration ------------------------------------------- defaultip Default IP defaultlinklocal Default Link-local IP eth1 ETH1 eth2 ETH2 loopback Loopback modem Modem (config)> Repeat this step to list additional interfaces. n To limit access based on firewall zones: (config)> add service ssh acl zone end value Where value is a firewall zone defined on your device, or the any keyword. Display a list of available firewall zones: Type ... firewall zone ? at the config prompt: (config)> ... firewall zone ? Zones: A list of groups of network interfaces that can be referred to by packet filtering rules and access control lists. Additional Configuration ------------------------------------------------------------------------------ any dynamic_routes edge external internal ipsec loopback setup (config)> Repeat this step to list additional firewall zones. IX20 User Guide 381 Services Configure SSH access 4. (Optional) Set the private key in PEM format. If not set, the device will use an automaticallygenerated key. (config)> service ssh key key.pem (config)> 5. (Optional) Configure Multicast DNS (mDNS) mDNS is a protocol that resolves host names in small networks that do not have a DNS server. mDNS is enabled by default. To disable mDNS, or enable it if it has been disabled: n To enable the mDNS protocol: (config)> service ssh mdns enable true (config> n To disable the mDNS protocl: (config)> service ssh mdns enable false (config)> 6. (Optional) Set the port number for this service. The default setting of 22 normally should not be changed. (config)> service ssh port 24 (config)> 7. Save the configuration and apply the change: (config)> save Configuration saved. > 8. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 382 Services Use SSH with key authentication Use SSH with key authentication Rather than using passwords, you can use SSH keys to authenticate users connecting via SSH, SFTP, or SCP. SSH keys provide security and scalability: n Security: Using SSH keys for authentication is more secure than using passwords. Unlike a password that can be guessed by an unauthorized user, SSH key pairs provide more sophisticated security. A public key configured on the IX20 device is paired with a private key on the user's PC. The private key, once generated, remains on the user's PC. n Scalability: SSH keys can be used on more than one IX20 device. Generating SSH key pairs On a Microsoft Windows PC, you can generate SSH key pairs using a terminal emulator application, such as PuTTY or Tera Term. On a Linux host, an SSH key pair is usually created automatically in the user's .ssh directory. The private and public keys are named id_rsa and id_rsa.pub. If you need to generate an SSH key pair, you can use the ssh-keygen application. For example, the following entry generates an RSA key pair in the user's .ssh directory: ssh-keygen -t rsa -f ~/.ssh/id_rsa The private key file is named id_rsa and the public key file is named id_rsa.pub. (The .pub extension is automatically appended to the name specified for the private key output file.) Required configuration items n Name for the user n SSH public key for the user Additional configuration items n If you want to access the IX20 device using SSH over a WAN interface, configure the access control list for the SSH service to allow SSH access for the External firewall zone. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 383 Services Use SSH with key authentication 3. Click Authentication > Users. 4. Select an existing user or create a new user. See User authentication for information about creating a new user. 5. Click SSH keys. 6. In Add SSH key, enter a name for the SSH key and click . 7. Enter the public SSH key by pasting or typing a public encryption key that this user can use for passwordless SSH login. 8. Click Apply to save the configuration and apply the change. Command line You can add configure passwordless SSH login for an existing user or include the support when creating a new user. See User authentication for information about creating a new user. These instructions assume an existing user named temp_user. 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add an SSH key for the user by using the ssh_key command and pasting or typing a public encryption key: (config)> add auth user maria ssh_key key_name key (config)> where: n key_name is a name for the key. n key is a public SSH key, which you can enter by pasting or typing a public encryption key that this user can use for passwordless SSH login IX20 User Guide 384 Services Use SSH with key authentication 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 385 Services Configure telnet access Configure telnet access By default, the telnet service is disabled. Note Telnet is an insecure protocol and should only be used for backward-compatibility reasons, and only if the network connection is otherwise secured. Required configuration items n Enable telnet access. n Configure access control for the telnet service. Additional configuration items n Port to use for communications with the telnet service. n Multicast DNS (mDNS) support. See Set the idle timeout for IX20 users for information about setting the inactivity timeout for the telnet service. Enable the telnet service The telnet service is disabled by default. To enable the service: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Services > telnet. 4. Click Enable. IX20 User Guide 386 Services 5. Click Apply to save the configuration and apply the change. Configure telnet access Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Enable the telnet service: (config)> service telnet enable true (config)> 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure the service WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 387 Services Configure telnet access 3. Click Services > telnet. 4. (Optional) For Port, enter the port number for the service. Normally this should not be changed. 5. Click Access control list to configure access control: n To limit access to specified IPv4 addresses and networks: a. Click IPv4 Addresses. b. For Add Address, click . c. For Address, enter the IPv4 address or network that can access the device's telnet service. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the telnet service. d. Click again to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: a. Click IPv6 Addresses. b. For Add Address, click . c. For Address, enter the IPv6 address or network that can access the device's telnet service. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the telnet service. d. Click again to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: a. Click Interfaces. b. For Add Interface, click . c. For Interface, select the appropriate interface from the dropdown. d. Click again to allow access through additional interfaces. n To limit access based on firewall zones: a. Click Zones. b. For Add Zone, click . c. For Zone, select the appropriate firewall zone from the dropdown. See Firewall configuration for information about firewall zones. d. Click again to allow access through additional firewall zones. IX20 User Guide 388 Services Configure telnet access 6. Multicast DNS (mDNS) is disabled by default. mDNS is a protocol that resolves host names in small networks that do not have a DNS server. To enable mDNS, click Enable mDNS. 7. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Configure access control: n To limit access to specified IPv4 addresses and networks: (config)> add service telnet acl address end value (config)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the telnet service. Repeat this step to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: (config)> add service telnet acl address6 end value (config)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the telnet service. Repeat this step to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: (config)> add service telnet acl interface end value (config)> Where value is an interface defined on your device. Display a list of available interfaces: IX20 User Guide 389 Services Configure telnet access Use ... network interface ? to display interface information: (config)> ... network interface ? Interfaces Additional Configuration ------------------------------------------- defaultip Default IP defaultlinklocal Default Link-local IP eth1 ETH1 eth2 ETH2 loopback Loopback modem Modem (config)> Repeat this step to list additional interfaces. n To limit access based on firewall zones: (config)> add service telnet acl zone end value Where value is a firewall zone defined on your device, or the any keyword. Display a list of available firewall zones: Type ... firewall zone ? at the config prompt: (config)> ... firewall zone ? Zones: A list of groups of network interfaces that can be referred to by packet filtering rules and access control lists. Additional Configuration ------------------------------------------------------------------------------ any dynamic_routes edge external internal ipsec loopback setup (config)> Repeat this step to list additional firewall zones. 4. (Optional) Configure Multicast DNS (mDNS) mDNS is a protocol that resolves host names in small networks that do not have a DNS server. mDNS is disabled by default. To enable: IX20 User Guide 390 Services Configure DNS (config)> service telnet mdns enable true (config> 5. (Optional) Set the port number for this service. The default setting of 23 normally should not be changed. (config)> service telnet port 25 (config)> 6. Save the configuration and apply the change: (config)> save Configuration saved. > 7. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure DNS The IX20 device includes a caching DNS server which forwards queries to the DNS servers that are associated with the network interfaces, and caches the results. This server is used within the device, and cannot be disabled. Use the access control list to restrict external access to this server. Required configuration items n Configure access control for the DNS service. Additional configuration items n Whether the device should cache negative responses. n Whether the device should always perform DNS queries to all available DNS servers. n Whether to prevent upstream DNS servers from returning private IP addresses. n Additional DNS servers, in addition to the ones associated with the device's network interfaces. n Specific host names and their IP addresses. To configure the DNS server: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 391 Services Configure DNS 3. Click Services > DNS. 4. Click Access control list to configure access control: n To limit access to specified IPv4 addresses and networks: a. Click IPv4 Addresses. b. For Add Address, click . c. For Address, enter the IPv4 address or network that can access the device's DNS service. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the DNS service. d. Click again to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: a. Click IPv6 Addresses. b. For Add Address, click . c. For Address, enter the IPv6 address or network that can access the device's DNS service. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the DNS service. d. Click again to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: a. Click Interfaces. b. For Add Interface, click . c. For Interface, select the appropriate interface from the dropdown. d. Click again to allow access through additional interfaces. n To limit access based on firewall zones: a. Click Zones. b. For Add Zone, click . c. For Zone, select the appropriate firewall zone from the dropdown. See Firewall configuration for information about firewall zones. d. Click again to allow access through additional firewall zones. IX20 User Guide 392 Services Configure DNS 5. (Optional) Cache negative responses is enabled by default. Disabling this option may improve performance on networks with transient DNS results, when one or more DNS servers may have positive results. To disable, click Cache negative responses. 6. (Optional) Query all servers is enabled by default. This option is useful when only some DNS servers will be able to resolve hostnames. To disable, click Query all servers. 7. (Optional) Rebind protection, if enabled, prevents upstream DNS servers from returning private IP addresses. To enable, click Rebind protection. 8. (Optional) Allow localhost rebinding is enabled by default if Rebind protection is enabled. This is useful for Real-time Black List (RBL) servers. 9. (Optional) To add additional DNS servers: a. Click DNS servers. b. For Add Server, click . c. (Optional) Enter a label for the DNS server. d. For DNS server, enter the IP address of the DNS server. e. Domain restricts the device's use of this DNS server based on the domain. If no domain are listed, then all queries may be sent to this server. 10. (Optional) To add host names and their IP addresses that the device's DNS server will resolve: a. Click Additional DNS hostnames. b. For Add Host, click . c. Type the IP address of the host. d. For Name, type the hostname. 11. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Configure access control: n To limit access to specified IPv4 addresses and networks: (config)> add service dns acl address end value (config)> Where value can be: IX20 User Guide 393 Services Configure DNS l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the DNS service. Repeat this step to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: (config)> add service dns acl address6 end value (config)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the DNS service. Repeat this step to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: (config)> add service dns acl interface end value (config)> Where value is an interface defined on your device. Display a list of available interfaces: Use ... network interface ? to display interface information: (config)> ... network interface ? Interfaces Additional Configuration ------------------------------------------- defaultip Default IP defaultlinklocal Default Link-local IP eth1 ETH1 eth2 ETH2 loopback Loopback modem Modem (config)> Repeat this step to list additional interfaces. n To limit access based on firewall zones: (config)> add service dns acl zone end value Where value is a firewall zone defined on your device, or the any keyword. Display a list of available firewall zones: IX20 User Guide 394 Services Configure DNS Type ... firewall zone ? at the config prompt: (config)> ... firewall zone ? Zones: A list of groups of network interfaces that can be referred to by packet filtering rules and access control lists. Additional Configuration ------------------------------------------------------------------------------ any dynamic_routes edge external internal ipsec loopback setup (config)> Repeat this step to list additional firewall zones. 4. (Optional) Cache negative responses By default, the device's DNS server caches negative responses. Disabling this option may improve performance on networks with transient DNS results, when one or more DNS servers may have positive results. To disable: (config)> service dns cache_negative_responses false (config> 5. (Optional) Query all servers By default, the device's DNS server queries all available DNS servers. Disabling this option may improve performance on networks with transient DNS results, when one or more DNS servers may have positive results. To disable: (config)> service dns query_all_servers false (config> 6. (Optional) Rebind protection By default, rebind protection is disabled. If enabled, this prevents upstream DNS servers from returning private IP addresses. To enable: (config)> service dns stop_dns_rebind false (config)> 7. (Optional) Allow localhost rebinding By default, localhost rebinding is enabled by default if rebind protection is enabled. This is useful for Real-time Black List (RBL) servers. To disable: IX20 User Guide 395 Services Configure DNS (config)> service dns rebind_localhost_ok false (config)> 8. (Optional) Add additional DNS servers a. Add a DNS server: (config)> add service dns server end (config service dns server 0)> b. Set the IP address of the DNS server: (config service dns server 0)> address ip-addr (config service dns server 0)> c. To restrict the device's use of this DNS server based on the domain, use the domain command. If no domain are listed, then all queries may be sent to this server. (config service dns server 0)> domain domain (config service dns server 0)> d. (Optional) Set a label for this DNS server: (config service dns server 0)> label label (config service dns server 0)> 9. (Optional) Add host names and their IP addresses that the device's DNS server will resolve a. Add a host: (config)> add service dns host end (config service dns host 0)> b. Set the IP address of the host: (config service dns host 0)> address ip-addr (config service dns host 0)> c. Set the host name: (config service dns host 0)> name host-name (config service dns host 0)> 10. Save the configuration and apply the change: (config)> save Configuration saved. > 11. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 396 Services Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) is a protocol for remotely managing and monitoring network devices. Network administrators can use the SNMP architecture to manage nodes, including servers, workstations, routers, switches, hubs, and other equipment on an IP network, manage network performance, find and solve network problems, and plan for network growth. The IX20 device supports SNMPv3, read-only mode. SNMPv1 and v2 are not supported. SNMP Security By default, the IX20 device automatically blocks SNMP packets from being received over WAN and LAN interfaces. As a result, if you want a IX20 device to receive SNMP packets, you must configure the SNMP access control list to allow the device to receive the packets. See Configure Simple Network Management Protocol (SNMP). Configure Simple Network Management Protocol (SNMP) Required configuration items n Enable SNMP. n Firewall configuration using access control to allow remote connections to the SNMP agent. n The user name and password used to connect to the SNMP agent. Additional configuration items n The port used by the SNMP agent. n Authentication type (either MD5 or SHA). n Privacy protocol (either DES or AES). n Privacy passphrase, if different that the SNMP user password. n Enable Multicast DNS (mDNS) support. To configure the SNMP agent on your IX20 device: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 397 Services Simple Network Management Protocol (SNMP) 3. Click Services > SNMP. 4. Click Enable. 5. Click Access control list to configure access control: n To limit access to specified IPv4 addresses and networks: a. Click IPv4 Addresses. b. For Add Address, click . c. For Address, enter the IPv4 address or network that can access the device's SNMP agent. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the SNMP agent. d. Click again to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: a. Click IPv6 Addresses. b. For Add Address, click . c. For Address, enter the IPv6 address or network that can access the device's SNMP agent. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the SNMP agent. d. Click again to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: a. Click Interfaces. b. For Add Interface, click . c. For Interface, select the appropriate interface from the dropdown. d. Click again to allow access through additional interfaces. n To limit access based on firewall zones: a. Click Zones. b. For Add Zone, click . c. For Zone, select the appropriate firewall zone from the dropdown. See Firewall configuration for information about firewall zones. d. Click again to allow access through additional firewall zones. IX20 User Guide 398 Services Simple Network Management Protocol (SNMP) 6. Type the Username used to connect to the SNMP agent. 7. Type the Password used to connect to the SNMP agent. 8. (Optional) For Port, type the port number. The default is 161. 9. (Optional) Multicast DNS (mDNS) is disabled by default. mDNS is a protocol that resolves host names in small networks that do not have a DNS server. To enable mDNS, click Enable mDNS. 10. (Optional) Select the Authentication type, either MD5 or SHA. The default is MD5. 11. (Optional) Type the Privacy passphrase. If not set, the password, entered above, is used. 12. (Optional) Select the Privacy protocol, either DES or AES. The default is DES. 13. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Enable the SNMP agent: (config)> service snmp enable true (config)> 4. Configure access control: n To limit access to specified IPv4 addresses and networks: (config)> add service snmp acl address end value (config)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the SNMP service. Repeat this step to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: (config)> add service snmp acl address6 end value (config)> Where value can be: IX20 User Guide 399 Services Simple Network Management Protocol (SNMP) l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the SNMP service. Repeat this step to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: (config)> add service snmp acl interface end value (config)> Where value is an interface defined on your device. Display a list of available interfaces: Use ... network interface ? to display interface information: (config)> ... network interface ? Interfaces Additional Configuration ------------------------------------------- defaultip Default IP defaultlinklocal Default Link-local IP eth1 ETH1 eth2 ETH2 loopback Loopback modem Modem (config)> Repeat this step to list additional interfaces. n To limit access based on firewall zones: (config)> add service snmp acl zone end value Where value is a firewall zone defined on your device, or the any keyword. Display a list of available firewall zones: Type ... firewall zone ? at the config prompt: (config)> ... firewall zone ? Zones: A list of groups of network interfaces that can be referred to by packet filtering rules and access control lists. Additional Configuration ------------------------------------------------------------------------------ any dynamic_routes IX20 User Guide 400 Services Simple Network Management Protocol (SNMP) edge external internal ipsec loopback setup (config)> Repeat this step to list additional firewall zones. 5. Set the name of the user that will be used to connect to the SNMP agent. (config)> service snmp username name (config)> 6. Set the password for the user that will be used to connect to the SNMP agent: (config)> service snmp password pwd (config)> 7. (Optional) Set the port number for the SNMP agent. The default is 161. (config)> service snmp port port (config)> 8. (Optional) Configure Multicast DNS (mDNS) mDNS is a protocol that resolves host names in small networks that do not have a DNS server. For the SNMP agent, mDNS is disabled by default. To enable: (config)> service snmp mdns enable true (config> 9. (Optional) Set the authentication type. Allowed values are MD5 or SHA. The default is MD5. (config)> service snmp auth_type SHA (config)> 10. (Optional) Set the privacy passphrase. If not set, the password, entered above, is used. (config)> service snmp privacy pwd (config)> 11. (Optional) Set the privacy protocol, either DES or AES. The default is DES. (config)> service snmp privacy_protocol AES (config)> 12. Save the configuration and apply the change: (config)> save Configuration saved. > IX20 User Guide 401 Services Simple Network Management Protocol (SNMP) 13. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Download MIBs This procedure is available from the WebUI only. Required configuration items n Enable SNMP. To download a .zip archive of the SNMP MIBs supported by this device: WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. Enable SNMP. See Configure Simple Network Management Protocol (SNMP) for information about enabling and configuring SNMP support on the IX20 device. 3. On the main menu, click Status. Under Services, click SNMP. The SNMP page is displayed. 4. Click Download. IX20 User Guide 402 Services Location information Location information The IX20 device contains a Global Navigation Satellite System (GNSS) module that provides information about the current location of the device. The device can also be configured to: n Dead reckoning by using an external USB GNSS receiver. External dead reckoning USB GNSS receivers are available to be purchased separately from Digi International Inc.. n Accept location messages from other location-enabled devices. n Forward location messages, either from the IX20 device or from external sources, to a remote host. This section contains the following topics: Configure the location server 404 Enable or disable the internal GNSS module 408 Configure the device to accept location messages from external sources 409 Forward location information to a remote host 414 Show location information 420 IX20 User Guide 403 Services Location information Configure the location server The location server is enabled by default. You can disable it, or you can enable it if it has been disabled. You can also optionally configure the UDP listening port for location information. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Services > Location. 4. The location server is enabled by default. To disable, or to enable if it has been disabled, click Enable the location server. 5. (Optional) For Location server port, type the port number that should be used to listen for location messages. The default is 2948. 6. (Optional) Configure the Access control list: n To limit access to specified IPv4 addresses and networks: a. Click IPv4 Addresses. b. For Add Address, click . c. For Address, enter the IPv4 address or network that can access the device's service-type. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the service-type. d. Click again to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: a. Click IPv6 Addresses. b. For Add Address, click . c. For Address, enter the IPv6 address or network that can access the device's service-type. Allowed values are: IX20 User Guide 404 Services Location information l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the service-type. d. Click again to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: a. Click Interfaces. b. For Add Interface, click . c. For Interface, select the appropriate interface from the dropdown. d. Click again to allow access through additional interfaces. n To limit access based on firewall zones: a. Click Zones. b. For Add Zone, click . c. For Zone, select the appropriate firewall zone from the dropdown. See Firewall configuration for information about firewall zones. d. Click again to allow access through additional firewall zones. 7. See Enable or disable the internal GNSS module for more information about Enable GNSS module. 8. (Optional) For Location update interval, set the amount of time that the IX20 device will wait between updating location information, and sending location information to a destination server. Allowed values are any number of hours, minutes, or seconds, and take the format number {h|m|s}. For example, to set Location update interval to ten minutes, enter 10m or 600s. The default is 10 seconds. 9. See Forward location information to a remote host for more information about Destination servers. 10. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> IX20 User Guide 405 Services Location information 3. Enable or disable the GNSS module: n To enable the module: (config)> service location gnss true (config)> n To disable the module: (config)> service location gnss false (config)> 4. (Optional) Set the port number that should be used to listen for location messages. (config)> service location port port_num (config)> where port_num is the port number of the listenting port. The default is 2948. 5. (Optional) Configure access control: n To limit access to specified IPv4 addresses and networks: (config)> add service location acl address end value (config)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the service-type. Repeat this step to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: (config)> add service location acl address6 end value (config)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the service-type. Repeat this step to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: (config)> add service location acl interface end value (config)> Where value is an interface defined on your device. Display a list of available interfaces: IX20 User Guide 406 Services Location information Use ... network interface ? to display interface information: (config)> ... network interface ? Interfaces Additional Configuration ------------------------------------------- defaultip Default IP defaultlinklocal Default Link-local IP eth1 ETH1 eth2 ETH2 loopback Loopback modem Modem (config)> Repeat this step to list additional interfaces. n To limit access based on firewall zones: (config)> add service location acl zone end value Where value is a firewall zone defined on your device, or the any keyword. Display a list of available firewall zones: Type ... firewall zone ? at the config prompt: (config)> ... firewall zone ? Zones: A list of groups of network interfaces that can be referred to by packet filtering rules and access control lists. Additional Configuration ------------------------------------------------------------------------------ any dynamic_routes edge external internal ipsec loopback setup (config)> Repeat this step to list additional firewall zones. 6. (Optional) Set the amount of time that the IX20 device will wait between updating location information, and sending location information to a destination server: IX20 User Guide 407 Services Location information (config)> service location interval value (config)> where value is any number of hours, minutes, or seconds, and takes the format number{h|m|s}. For example, to set interval to ten minutes, enter either 10m or 600s: (config)> service location interval 600s (config)> The default is 10 seconds. 7. Save the configuration and apply the change: (config)> save Configuration saved. > 8. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Enable or disable the internal GNSS module The internal GNSS module is enabled by default. You can disable it, or you can enable it if it has been disabled. Note In order for the internal GNSS module to be able to provide location information, you must connect an antenna to the GNSS antenna connector. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Services > Location. IX20 User Guide 408 Services Location information 4. Click Enable GNSS module to disable the internal GNSS module, or to enable it if it has been disabled. 5. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Enable or disable the GNSS module: n To enable the module: (config)> service location gnss true (config)> n To disable the module: (config)> service location gnss false (config)> 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure the device to accept location messages from external sources You can configure the IX20 device to accept NMEA or TAIP messages from external sources. For example, location-enabled devices connected to the IX20 device can forward their location information to the device, and then the IX20 device can serve as a central repository for this location information and forward it to a remote host. See Forward location information to a remote host for information about configuring the IX20 device to forward location messages. This procedure configures a UDP port on the IX20 device that will be used to listen for incoming messages. IX20 User Guide 409 Services Location information Note The location server functionality is enabled by default on the IX20 device. However, because the default configuration of the access control list for the location server only allows connections for the loopback firewall zone, the location server by default can only collect information from the device's local GNSS module. To enable the device to receive location messages from external hosts, you must modify the access control list to allow the hosts to connect to the location server's UDP port. Required configuration items n The location server must be enabled. n UDP port that the IX20 device will listen to for incoming location messages. n Access control list configuration to provide access to the port through the firewall. Additional configuration items n Location update interval, which determines how often the device will poll the specified UDP port for incoming location messages. To configure the device to accept location messages from external sources: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Services > Location. 4. The location server is enabled by default. If it has been disabled, enable the server by clicking Enable the location server. 5. For Location server port, type the number of the UDP port that will receive incoming location messages. The default is 2948. 6. Click Access control list to configure access control: n To limit access to specified IPv4 addresses and networks: a. Click IPv4 Addresses. b. For Add Address, click . IX20 User Guide 410 Services Location information c. For Address, enter the IPv4 address or network that can access the device's location server UDP port. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the location server UDP port. d. Click again to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: a. Click IPv6 Addresses. b. For Add Address, click . c. For Address, enter the IPv6 address or network that can access the device's location server UDP port. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the location server UDP port. d. Click again to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: a. Click Interfaces. b. For Add Interface, click . c. For Interface, select the appropriate interface from the dropdown. d. Click again to allow access through additional interfaces. n To limit access based on firewall zones: a. Click Zones. b. For Add Zone, click . c. For Zone, select the appropriate firewall zone from the dropdown. See Firewall configuration for information about firewall zones. d. Click again to allow access through additional firewall zones. 7. (Optional) For Location update interval, type the amount of time to wait between polling the specified UPD port for incoming location messages. The default is ten seconds. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Location update interval to ten minutes, enter 10m or 600s. 8. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. IX20 User Guide 411 Services Location information 2. At the command line, type config to enter configuration mode: > config (config)> 3. The location server is enabled by default. If it has been disabled, enable the server: (config)> service location enable true (config)> 4. Set the UDP port that will receive incoming location messages. The default is 2948. (config)> service location port 8000 (config)> 5. Click Access control list to configure access control: n To limit access to specified IPv4 addresses and networks: (config)> add service location acl address end value (config)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the location server UDP port. Repeat this step to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: (config)> add service location acl address6 end value (config)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the location server UDP port. Repeat this step to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: (config)> add service location acl interface end value (config)> Where value is an interface defined on your device. Display a list of available interfaces: Use ... network interface ? to display interface information: (config)> ... network interface ? Interfaces IX20 User Guide 412 Services Location information Additional Configuration ------------------------------------------- defaultip Default IP defaultlinklocal Default Link-local IP eth1 ETH1 eth2 ETH2 loopback Loopback modem Modem (config)> Repeat this step to list additional interfaces. n To limit access based on firewall zones: (config)> add service location acl zone end value Where value is a firewall zone defined on your device, or the any keyword. Display a list of available firewall zones: Type ... firewall zone ? at the config prompt: (config)> ... firewall zone ? Zones: A list of groups of network interfaces that can be referred to by packet filtering rules and access control lists. Additional Configuration ------------------------------------------------------------------------------ any dynamic_routes edge external internal ipsec loopback setup (config)> Repeat this step to list additional firewall zones. 6. (Optional) Set the amount of time to wait between polling the specified UPD port for incoming location messages. The default is ten seconds. (config)> service location interval value (config)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set the location update interval to ten minutes, enter either 10m or 600s: IX20 User Guide 413 Services Location information (config)> service location interval 600s (config)> 1. Save the configuration and apply the change: (config)> save Configuration saved. > 2. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Forward location information to a remote host You can configure location clients on the IX20 device that forward location messages in either NMEA or TAIP format to a remote host. Depending on how the IX20 device's location feature is enabled, you can forward the device's location information based on its GNSS module, or location information from an external source, or both: n If the location server is enabled, location information from external sources is forwarded. n If the GNSS module is enabled, the device's location information based on its GNSS module is forwarded. Required configuration items n Enable either the location server, or the GNSS module, or both. n The hostname or IP address of the remote host to which the location messages will be forwarded. n The destination UDP port on the remote host to which the messages will be forwarded. n Protocol type of the messages being forwarded, either NMEA or TAIP. Additional configuration items n Additional remote hosts to which the location messages will be forwarded. n Location update interval, which determines how often the device will forward location information to the remote hosts. n A description of the remote hosts. n Specific types of NMEA or TAIP messages that should be forwarded. n Text that will be prepended to the forwarded message. n A vehicle ID that is used in the TAIP ID message and can also be prepended to the forwarded message. Configure the IX20 device to forward location information: WebUI IX20 User Guide 414 Services Location information 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Services > Location. 4. Location features are enabled by default. If they have been disabled, enable the appropriate features: n Click Enable the location server to forward information that the IX20 device receives from external location sources. See Configure the device to accept location messages from external sources for more information. n Click Enable GNSS module to forward the device's location information based on its GNSS module. 5. (Optional) For Location update interval, type the amount of time to wait to forward location information to remote hosts. The default is ten seconds. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Location update interval to ten minutes, enter 10m or 600s. 6. Click Destination servers. 7. For Add destination server, click . 8. (Optional) For Label, type a description of the location destination server. 9. For Destination server, enter the hostname or IP address of the remote host to which location messages will be sent. 10. For Destination server port, enter the UDP port on the remote host to which location messages will be sent. 11. For Outgoing message type, select the protocol type for the messages, either TAIP or NMEA. 12. (Optional) For NMEA and TAIP filters, select the filters that represent the types of messages that will be forwarded. By default, all message types are forwarded. n To remove a filter: a. Click the down arrow () next to the appropriate message type. b. Click Delete. IX20 User Guide 415 Services Location information n To add a message type: a. For Add NMEA filter or Add TAIP filter, click . b. Select the message type. Allowed values depend on the protocol type: n If the protocol type is NMEA, allowed values are: l GGA: Reports time, position, and fix related data. l GLL: Reports position data: position fix, time of position fix, and status. l GSA: Reports GPS DOP and active satellites. l GSV: Reports the number of SVs in view, PRN, elevation, azimuth, and SNR. l RMC: Reports position, velocity, and time. l VTG: Reports direction and speed over ground. n If the protocol type is TAIP, allowed values are: l AL: Reports altitude and vertical velocity. l CP: Compact position: reports time, latitude, and longitude. l ID: Reports the vehicle ID. l LN: Long navigation: reports the latitude, longitude, and altitude, the horizontal and vertical speed, and heading. l PV: Position/velocity: reports the latitude, longitude, and heading. 13. (Optional) For Prepend text, enter text to prepend to the forwarded message. Two variables can be included in the prepended text: n %s: Includes the IX20 device's serial number in the prepended text. n %v: Includes the vehicle ID in the prepended text. For example, to include both the device's serial number and vehicle ID in the prepend message, you can enter the following in the Prepend field: __|%s|__|%v|__ 14. Type a four-digit alphanumeric Vehicle ID that will be included with to location messages. If no vehicle ID is configured, this setting defaults to 0000. 15. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. IX20 User Guide 416 Services Location information 2. At the command line, type config to enter configuration mode: > config (config)> 3. Location features are enabled by default. If they have been disabled, enable the appropriate features: n Enable the IX20 device to forward information that it receives from external location sources: (config)> service location enable true (config)> See Configure the device to accept location messages from external sources for more information. n Configure the IX20 device to forward the device's location information based on its GNSS module: (config)> service location gnss true (config)> 4. (Optional) Set the amount of time to wait to forward location information to remote hosts. The default is ten seconds. (config)> service location interval value (config)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set the location update interval to ten minutes, enter either 10m or 600s: (config)> service location interval 600s (config)> 5. Add a remote host to which location messages will be sent: (config)> add service location forward end (config service location forward 0)> 6. Set the hostname or IP address of the remote host to which location messages will be sent: (config service location forward 0)> server host (config service location forward 0)> 7. Set the UDP port on the remote host to which location messages will be sent: (config service location forward 0)> server_port 8000 (config service location forward 0)> IX20 User Guide 417 Services Location information 8. Set the protocol type for the messages. Allowed values are taip or nmea; the default is taip: (config service location forward 0)> type nmea (config service location forward 0)> 9. (Optional) Set the text to prepend to the forwarded message. Two variables can be included in the prepended text: n %s: Includes the IX20 device's serial number in the prepended text. n %v: Includes the vehicle ID in the prepended text. (config service location forward 0)> prepend __|%s|__|%v|__ (config service location forward 0)> 10. (Optional) Set the vehicle ID. Allowed value is a four digit alphanumerical string (for example, 01A3 or 1234). If no vehicle ID is configured, this setting defaults to 0000. (config service location forward 0)> vehicle-id 1234 (config service location forward 0)> 11. (Optional) Provide a description of the remote host: (config service location forward 0)> label "Remote host 1" (config service location forward 0)> 12. (Optional) Specify types of messages that will be forwarded. Allowed values vary depending on the protocol type. By default, all message types are forwarded. n If the protocol type is NMEA: Allowed values are: l gga: Reports time, position, and fix related data. l gll: Reports position data: position fix, time of position fix, and status. l gsa: Reports GPS DOP and active satellites. l gsv: Reports the number of SVs in view, PRN, elevation, azimuth, and SNR. l rmc: Reports position, velocity, and time. l vtg: Reports direction and speed over ground. To remove a message type: a. Use the show command to determine the index number of the message type to be deleted: (config service location forward 0)> show filter_nmea 0 gga 1 gll 2 gsa 3 gsv 4 rmc 5 vtg (config service location forward 0)> b. Use the index number to delete the message type. For example, to delete the gsa (index number 2) message type: IX20 User Guide 418 Services Location information (config service location forward 0)> del filter_nmea 2 (config service location forward 0)> To add a message type: a. Change to the filter_nmea node: (config service location forward 0)> filter_nmea (config service location forward 0 filter_nmea)> b. Use the add command to add the message type. For example, to add the gsa message type: (config service location forward 0 filter_nmea)> add gsa end (config service location forward 0 filter_nmea)> n If the protocol type is TAIP: Allowed values are: l al: Reports altitude and vertical velocity. l cp: Compact position: reports time, latitude, and longitude. l id: Reports the vehicle ID. l ln: Long navigation: reports the latitude, longitude, and altitude, the horizontal and vertical speed, and heading. l pv: Position/velocity: reports the latitude, longitude, and heading. To remove a message type: a. Use the show command to determine the index number of the message type to be deleted: (config service location forward 0)> show filter_taip 0 al 1 cp 2 id 3 ln 4 pv (config service location forward 0)> b. Use the index number to delete the message type. For example, to delete the id (index number 2) message type: (config service location forward 0)> del filter_taip 2 (config service location forward 0)> To add a message type: a. Change to the filter_taip node: (config service location forward 0)> filter_taip (config service location forward 0 filter_taip)> b. Use the add command to add the message type. For example, to add the id message type: IX20 User Guide 419 Services Location information (config service location forward 0 filter_taip)> add id end (config service location forward 0 filter_taip)> 13. Save the configuration and apply the change: (config)> save Configuration saved. > 14. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Show location information You can view status and statistics about location information from either the WebUI or the command line. WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. At the Status page, click Location. Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. Use the show location command at the system prompt: > show location Location Status --------------- State : enabled Source : 192.168.2.3 Latitude : 40* 49' 20.000" N (40.822245) Longitude : 73* 12' 32.000" E (-73.209048) Altitude : 15 meters Velocity : 0 meters per second Direction : None Quality : Standard GNSS (2D/3D) UTC Date and Time : Wed, 2 Dec 2020 8:44:23 03 No. of Satellites : 7 > 3. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 420 Services Modbus gateway Modbus gateway The IX20 supports the ability to function as a Modbus gateway, to provide serial-to-Ethernet connectivity to Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs), and other industrial devices. MODBUS provides client/server communication between devices connected on different types of buses and networks, and the IX20 gateway allows for communication between buses and and networks that use the Modbus protocol. This section contains the following topics: Configure the Modbus gateway 422 Show Modbus gateway status and statistics 435 IX20 User Guide 421 Services Modbus gateway Configure the Modbus gateway Required configuration items n Server configuration: l Enable the server. l Connection type, either socket or serial. o If the connection type is socket, the IP protocol to be used. o If the connection type is serial, the serial port to be used. n Client configuration: l Enable the client. l Connection type, either socket or serial. o If the connection type is socket: o The IP protocol to be used. o The hostname or IPv4 address of the remote host on which the Modbus server is running. o If the connection type is serial: o The serial port to be used. l Modbus address or addresses to determine if messages should be forwarded to a destination device. Additional configuration items n Server configuration: l The packet mode. l The maximum time between bytes in a packet. l If the connection type is set to socket: o The port to use. o The inactivity timeout. o Access control list. l If the connection type is set to serial: o Whether to use half duplex (two wire) mode. n Client configuration: l The packet mode. l The maximum time between bytes in a packets. l Whether to send broadcast messages. l Response timeout l If connection type is set to socket: o The port to use. o The inactivity timeout. l If connection type is set to serial: o Whether to use half duplex (two wire) mode. IX20 User Guide 422 Services Modbus gateway l Whether packets should be delivered to a fixed Modbus address. l Whether packets should have their Modbus address adjusted downward before to delivery. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Services > Modbus Gateway. 4. Click Enable to enable the gateway. 5. Click Debug to allow verbose logging in the system log. Configure gateway servers 1. Click to expand Gateway Servers. 2. For Add Modbus server, type a name for the server and click . The new Modbus gateway server configuration is displayed. IX20 User Guide 423 Services Modbus gateway 3. The new Modbus gateway server is enabled by default. Toggle off Enable the server to disable. 4. For Connection type, select Socket or Serial. Available options in the gateway server configuration vary depending on this setting. n If Socket is selected for Connection type: a. For IP Protocol, select TCP or UDP. The default is TCP. b. For Port, enter or select an appropriate port. The default is port 502. n If Serial is selected for Connection type: a. For Serial port, select the appropriate serial port on the IX20 device. 5. For Packet mode, select RTU or RAW (if Connection type is set to Socket) or ASCII (if Connection typeis set to Serial) for the type of packet that will be used by this connection. The default is RTU. 6. For Packet idle gap, type the maximum allowable time between bytes in a packet. Allowed values are between 10 milliseconds and one second, and take the format number {ms|s}. For example, to set Packet idle gap to 20 milliseconds, enter 20ms. 7. If Connection type is set to Socket, for Inactivity timeout, type the amount of time to wait before disconnecting the socket when it has become inactive. Allowed values are any number of minutes or seconds up to a maximum of 15 minutes, and take the format number{m|s}. For example, to set Inactivity timeout to ten minutes, enter 10m or 600s. 8. (Optional) If Connection type is set to Serial, click Half duplex to enable half duplex (two wire) mode. 9. (Optional) If Connection type is set to Socket, click to expand Access control list: n To limit access to specified IPv4 addresses and networks: a. Click IPv4 Addresses. b. For Add Address, click . c. For Address, enter the IPv4 address or network that can access the device's web administration service. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the web administration service. d. Click again to list additional IP addresses or networks. IX20 User Guide 424 Services Modbus gateway n To limit access to specified IPv6 addresses and networks: a. Click IPv6 Addresses. b. For Add Address, click . c. For Address, enter the IPv6 address or network that can access the device's web administration service. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the web administration service. d. Click again to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: a. Click Interfaces. b. For Add Interface, click . c. For Interface, select the appropriate interface from the dropdown. d. Click again to allow access through additional interfaces. n To limit access based on firewall zones: a. Click Zones. b. For Add Zone, click . c. For Zone, select the appropriate firewall zone from the dropdown. See Firewall configuration for information about firewall zones. d. Click again to allow access through additional firewall zones. 10. Repeat these steps to configure additional servers. Configure clients 1. Click to expand Clients. 2. For Add Modbus client, type a name for the client and click . The new Modbus gateway client configuration is displayed. IX20 User Guide 425 Services Modbus gateway 3. The new Modbus gateway client is enabled by default. Toggle off Enable the client to disable. 4. For Connection type, select Socket or Serial. Available options in the gateway server configuration vary depending on this setting. n If Socket is selected for Connection type: a. For IP Protocol, select TCP or UDP. The default is TCP. b. For Port, enter or select an appropriate port. The default is port 502. c. For Remote host, type the hostname or IP address of the remote host on which the Modbus server is running. n If Serial is selected for Connection type: a. For Serial port, select the appropriate serial port on the IX20 device. 5. For Packet mode, select RTU or RAW (if Connection type is set to Socket) or ASCII (if Connection typeis set to Serial) for the type of packet that will be used by this connection. The default is RTU. 6. For Packet idle gap, type the maximum allowable time between bytes in a packet. Allowed values are between 10 milliseconds and one second, and take the format number {ms|s}. For example, to set Packet idle gap to 20 milliseconds, enter 20ms. 7. If Connection type is set to Socket, for Inactivity timeout, type the amount of time to wait before disconnecting the socket when it has become inactive. Allowed values are any number of minutes or seconds up to a maximum of 15 minutes, and take the format number{m|s}. For example, to set Inactivity timeout to ten minutes, enter 10m or 600s. 8. (Optional) If Connection type is set to Serial, click Half duplex to enable half duplex (two wire) mode. 9. (Optional) If Connection type is set to Socket, click to expand Access control list: n To limit access to specified IPv4 addresses and networks: a. Click IPv4 Addresses. b. For Add Address, click . c. For Address, enter the IPv4 address or network that can access the device's web administration service. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the web administration service. d. Click again to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: a. Click IPv6 Addresses. b. For Add Address, click . c. For Address, enter the IPv6 address or network that can access the device's web administration service. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. IX20 User Guide 426 Services Modbus gateway l any: No limit to IPv6 addresses that can access the web administration service. d. Click again to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: a. Click Interfaces. b. For Add Interface, click . c. For Interface, select the appropriate interface from the dropdown. d. Click again to allow access through additional interfaces. n To limit access based on firewall zones: a. Click Zones. b. For Add Zone, click . c. For Zone, select the appropriate firewall zone from the dropdown. See Firewall configuration for information about firewall zones. d. Click again to allow access through additional firewall zones. 10. (Optional) Enable Send broadcast messages to configure the gateway to send broadcast messages to this client. 11. For Response timeout, type the maximum time to wait for a response to a message. Allowed values are between 1 millisecond and 700 milliseconds, and take the format numberms. For example, to set Response timeout to 100 milliseconds, enter 100ms. The default is 700ms. 12. Click to expand Modbus address filter. This filter is used by the gateway to determine if a message should be forwarded to a destination device. If the Modbus address in the message matches one or more of the filters, the message is forwarded. If it does not match the filters, the message is not forwarded. 13. For Address or address range, type a Modbus address or range of addresses. Allowed values are 1 through 255 or a hyphen-separated range. For example, to have this client filter for incoming messages that contain the Modbus address of 10, type 10. To filter for all messages with addresses in the range of 20 to 30, type 20-30. To add additional address filters for this client, click . 14. For Fixed Modbus server address, if request messages handled by this client should always be forwarded to a specific device, type the device's Modbus address. Leave at the default setting of 0 to allow messages that match the Modbus address filter to be forwarded to devices based on the Modbuss address in the message. 15. For Adjust Modbus server address, type a value to adjust the Modbus server address downward by the specified value prior to delivering the message. Allowed values are 0 through 255. Leave at the default setting of 0 to not adjust the server address. If a packet contains a Modbus server address above the amount entered here, the address will be adjusted downward by this amount before the packet is delivered. This allows you to configure clients on the gateway that will forward messages to remote devices with the same IX20 User Guide 427 Services Modbus gateway Modbus address on different buses. For example, if there are two devices on two different buses that have the same Modbus address of 10, you can create two clients on the gateway: n Client one: l Modbus address filter set to 10. This will configure the gateway to deliver all messages that have the Modbus server address of 10 to this device. n Client two: l Modbus address filter set to 20. l Adjust Modbus server address set to 10. This will configure the gateway to deliver all messages that have the Modbus server address address of 20 to the device with address 10. 16. Repeat these steps to configure additional clients. 17. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Enable the Modbus gateway: (config)> service modbus_gateway enable true (config)> 4. Configure servers: a. Add a server: (config)> add service modbus_gateway server name (config service modbus_gateway server name)> where name is a name for the server, for example: (config)> add service modbus_gateway server test_modbus_server (config service modbus_gateway server test_modbus_server)> The Modbus server is enabled by default. To disable: (config service modbus_gateway server test_modbus_server)> enable false (config service modbus_gateway server test_modbus_server)> IX20 User Guide 428 Services Modbus gateway b. Set the connection type: (config service modbus_gateway server test_modbus_server)> connection_ type type (config service modbus_gateway server test_modbus_server)> where type is either socket or serial. The default is socket. n If connection_type is set to socket: i. Set the IP protocol: (config service modbus_gateway server test_modbus_server)> socket protocol value (config service modbus_gateway server test_modbus_server)> where value is either tcp or udp. ii. Set the port: (config service modbus_gateway server test_modbus_server)> socket port (config service modbus_gateway server test_modbus_server)> where port is an integer between 1 and 65535. The default is 502. iii. Set the packet mode: (config service modbus_gateway server test_modbus_server)> socket packet_mode value (config service modbus_gateway server test_modbus_server)> where value is either rtu or raw. The default is rtu. iv. Set the maximum allowable time between bytes in a packet: (config service modbus_gateway server test_modbus_server)> socket idle_gap value (config service modbus_gateway server test_modbus_server)> where value is any number between 10 milliseconds and one second, and take the format number{ms|s}. For example, to set idle_gap to 20 milliseconds, enter 20ms. v. Set the amount of time to wait before disconnecting the socket when it has become inactive: (config service modbus_gateway server test_modbus_server)> inactivity_timeout value (config service modbus_gateway server test_modbus_server)> where value is any number of minutes or seconds up to a maximum of 15 minutes, and takes the format number{m|s}. For example, to set inactivity_timeout to ten minutes, enter either 10m or 600s: IX20 User Guide 429 Services Modbus gateway (config service modbus_gateway server test_modbus_server)> inactivity_timeout 600s (config service modbus_gateway server test_modbus_server)> n If connection_type is set to serial: i. Set the serial port: i. Use the ? to determine available serial ports: (config service modbus_gateway server test_modbus_server)> ... serial port ? Serial Additional Configuration --------------------------------------------------------- ---------------------- port1 Port 1 (config service modbus_gateway server test_modbus_server)> ii. Set the port: (config service modbus_gateway server test_modbus_server)> serial port (config service modbus_gateway server test_modbus_server)> ii. Set the packet mode: (config service modbus_gateway server test_modbus_server)> serial packet_mode value (config service modbus_gateway server test_modbus_server)> where value is either rtu or ascii. The default is rtu. iii. Set the maximum allowable time between bytes in a packet: (config service modbus_gateway server test_modbus_server)> serial idle_gap value (config service modbus_gateway server test_modbus_server)> where value is any number between 10 milliseconds and one second, and take the format number{ms|s}. For example, to set idle_gap to one second, enter 1000ms or 1s. iv. (Optional) Enable half-duplex (two wire) mode: (config service modbus_gateway server test_modbus_server)> serial half_duplex true (config service modbus_gateway server test_modbus_server)> c. Repeat the above instructions for additional servers. IX20 User Guide 430 Services Modbus gateway 5. Configure clients: a. Type ... to return to the root of the configuration: (config)> add service modbus_gateway server test_modbus_server)> ... (config)> b. Add a client: (config)> add service modbus_gateway client name (config service modbus_gateway client name)> where name is a name for the client, for example: (config)> add service modbus_gateway client test_modbus_client (config service modbus_gateway client test_modbus_client)> The Modbus client is enabled by default. To disable: (config service modbus_gateway client test_modbus_client)> enable false (config service modbus_gateway client test_modbus_client)> c. Set the connection type: (config service modbus_gateway client test_modbus_client)> connection_ type type (config service modbus_gateway client test_modbus_client)> where type is either socket or serial. The default is socket. n If connection_type is set to socket: i. Set the IP protocol: (config service modbus_gateway client test_modbus_client)> socket protocol value (config service modbus_gateway client test_modbus_client)> where value is either tcp or udp. ii. Set the port: (config service modbus_gateway client test_modbus_client)> socket port (config service modbus_gateway client test_modbus_client)> where port is an integer between 1 and 65535. The default is 502. iii. Set the packet mode: (config service modbus_gateway client test_modbus_client)> socket packet_mode value (config service modbus_gateway client test_modbus_client)> where value is either rtu or ascii. The default is rtu. IX20 User Guide 431 Services Modbus gateway iv. Set the maximum allowable time between bytes in a packet: (config service modbus_gateway client test_modbus_client)> socket idle_gap value (config service modbus_gateway client test_modbus_client)> where value is any number between 10 milliseconds and one second, and take the format number{ms|s}. For example, to set idle_gap to 20 milliseconds, enter 20ms. v. Set the amount of time to wait before disconnecting the socket when it has become inactive: (config service modbus_gateway client test_modbus_client)> inactivity_timeout value (config service modbus_gateway client test_modbus_client)> where value is any number of minutes or seconds up to a maximum of 15 minutes, and takes the format number{m|s}. For example, to set inactivity_timeout to ten minutes, enter either 10m or 600s: (config service modbus_gateway client test_modbus_client)> inactivity_timeout 600s (config service modbus_gateway client test_modbus_client)> vi. Set the hostname or IP address of the remote host on which the Modbus server is running: (config service modbus_gateway client test_modbus_client)> remote_host ip_address|hostname (config service modbus_gateway client test_modbus_client)> n If connection_type is set to serial: i. Set the serial port: i. Use the ? to determine available serial ports: (config service modbus_gateway client test_modbus_client)> ... serial port ? Serial Additional Configuration --------------------------------------------------------- ---------------------- port1 Port 1 (config service modbus_gateway client test_modbus_client)> IX20 User Guide 432 Services Modbus gateway ii. Set the port: (config service modbus_gateway client test_modbus_client)> serial port (config service modbus_gateway client test_modbus_client)> ii. Set the packet mode: (config service modbus_gateway client test_modbus_client)> serial packet_mode value (config service modbus_gateway client test_modbus_client)> where value is either rtu or ascii. The default is rtu. iii. Set the maximum allowable time between bytes in a packet: (config service modbus_gateway client test_modbus_client)> serial idle_gap value (config service modbus_gateway client test_modbus_client)> where value is any number between 10 milliseconds and one second, and take the format number{ms|s}. For example, to set idle_gap to one second, enter 1000ms or 1s. iv. (Optional) Enable half-duplex (two wire) mode: (config service modbus_gateway client test_modbus_client)> serial half_duplex true (config service modbus_gateway client test_modbus_client)> d. (Optional) Enable the gateway to send broadcast messages to this client: (config service modbus_gateway client test_modbus_client)> broadcast true (config service modbus_gateway client test_modbus_client)> e. Set the maximum time to wait for a response to a message: (config service modbus_gateway client test_modbus_client)> response_ timeout value (config service modbus_gateway client test_modbus_client)> Allowed values are between 1 millisecond and 700 milliseconds, and take the format numberms. For example, to set response_timeout to 100 milliseconds: (config service modbus_gateway client test_modbus_client)> response_ timeout 100ms (config service modbus_gateway client test_modbus_client)> The default is 700ms. IX20 User Guide 433 Services Modbus gateway f. Configure the address filter: This filter is used by the gateway to determine if a message should be forwarded to a destination device. If the Modbus address in the message matches one or more of the filters, the message is forwarded. If it does not match the filters, the message is not forwarded. Allowed values are 1 through 255 or a hyphen-separated range. For example: n To have this client filter for incoming messages that contain the Modbus address of 10, set the index 0 entry to 10: (config service modbus_gateway client test_modbus_client)> filter 0 10 (config service modbus_gateway client test_modbus_client)> n To filter for all messages with addresses in the range of 20 to 30, set the index 0 entry to 20-30: (config service modbus_gateway client test_modbus_client)> filter 0 20-30 (config service modbus_gateway client test_modbus_client)> To add additional filters, increment the index number. For example, to add an additional filter for addresses in the range of 50-100: (config service modbus_gateway client test_modbus_client)> filter 1 50100 (config service modbus_gateway client test_modbus_client)> g. If request messages handled by this client should always be forwarded to a specific device, , use fixed_server_address to set the device's Modbus address: (config service modbus_gateway client test_modbus_client)> fixed_server_ address value (config service modbus_gateway client test_modbus_client)> Leave at the default setting of 0 to allow messages that match the Modbus address filter to be forwarded to devices based on the Modbuss address in the message. h. To adjust the Modbus server address downward by the specified value prior to delivering the message, use adjust_server_address: (config service modbus_gateway client test_modbus_client)> adjust_ server_address value (config service modbus_gateway client test_modbus_client)> where value is an integer from 0 to 255. Leave at the default setting of 0 to not adjust the server address. If a packet contains a Modbus server address above the amount entered here, the address will be adjusted downward by this amount before the packet is delivered. This allows you to configure clients on the gateway that will forward messages to remote devices with the same Modbus address on different buses. For example, if there are two devices on two IX20 User Guide 434 Services Modbus gateway different buses that have the same Modbus address of 10, you can create two clients on the gateway: n Client one: l filter set to 10. This will configure the gateway to deliver all messages that have the Modbus server address of 10 to this device. n Client two: l filter set to 20. l adjust_server_address set to 10. This will configure the gateway to deliver all messages that have the Modbus server address address of 20 to the device with address 10. i. Repeat the above instructions for additional clients. 6. Save the configuration and apply the change: (config)> save Configuration saved. > 7. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Show Modbus gateway status and statistics You can view status and statistics about location information from either the WebUI or the command line. WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. On the menu, select Status > Modbus Gateway. The Modbus Gateway page appears. Statistics related to the Modbus gateway server are displayed. If the message Server connections not available is displayed, this indicates that there are no connected clients. n To view information about Modbus gateway clients, click Clients. n To view statistics that are common to both the clients and server, click Common Statistics. n To view configuration details about the gateway, click the (configuration) icon in the upper right of the gateway's status pane. Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. IX20 User Guide 435 Services Modbus gateway 2. Use the show modbus-gateway command at the system prompt: > show modbus-gateway Server Connection ----------------modbus_socket modbus_socket IP Address ----------10.45.1.139 10.45.1.139 Port ----49570 49568 Uptime -----6 13 Client -------------------modbus_socket_41 modbus_socket_21 modbus_serial_client Uptime -----0 0 428 > If the message Server connections not available is displayed, this indicates that there are no connected clients. 3. Use the show modbus-gateway verbose command at the system prompt to display more information: > show modbus-gateway verbose Client -------------------modbus_socket_41 modbus_socket_21 modbus_serial_client Uptime -----0 0 506 Common Statistics ----------------- Configuration Updates :1 Client Configuration Failure : 0 Server Configuration Failure : 0 Configuration Load Failure :0 Incoming Connections :4 Internal Error :0 Resource Shortages :0 Servers ------- modbus_socket ------------Client Lookup Errors Incoming Connections Packet Errors RX Broadcasts RX Requests TX Exceptions :0 :4 :0 :0 : 12 :0 IX20 User Guide 436 Services Modbus gateway TX Responses : 12 Clients ------- modbus_socket_41 ---------------- Address Translation Errors :0 Connection Errors :0 Packet Errors :0 RX Responses :4 RX Timeouts :0 TX Broadcasts :0 TX Requests :4 modbus_socket_21 ---------------- Address Translation Errors :0 Connection Errors :0 Packet Errors :0 RX Responses :4 RX Timeouts :0 TX Broadcasts :0 TX Requests :4 modbus_serial_client -------------------- Address Translation Errors :0 Connection Errors :0 Packet Errors :0 RX Responses :4 RX Timeouts :0 TX Broadcasts :0 TX Requests :4 > 4. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 437 Services System time System time By default, the IX20 device synchronizes the system time by periodically connecting to the Digi NTP server, time.devicecloud.com. In this mode, the device queries the time server based on following events and schedule: n At boot time. n Once a day. The default configuration has the system time zone set to UTC. No additional configuration is required for the system time if the default configuration is sufficient. However, you can change the default time zone and the default NTP server, as well as configuring additional NTP servers. If multiple servers are configured, a number of time samples are obtained from each of the servers and a subset of the NTP clock filter and selection algorithms are applied to select the best of these. See Configure the system time for details about changing the default configuration. The IX20 device can also be configured to use Network Time Protocol (NTP). In this configuration, the device serves as an NTP server, providing NTP services to downstream devices. See Network Time Protocol for more information about NTP server support. Configure the system time This procedure is optional. The IX20 device's default system time configuration uses the Digi NTP server, time.devicecloud.com, and has the time zone set to UTC. You can change the default NTP server and the default time zone, as well as configuring additional NTP servers. Required Configuration Items n The time zone for the IX20 device. n At least one upstream NTP server for synchronization. Additional Configuration Options n Additional upstream NTP servers. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 438 Services Configure the system time 3. Click System > Time 4. (Optional) For Timezone, select either UTC or select the location nearest to your current location to set the timezone for your IX20 device. The default is UTC. 5. (Optional) Add upstream NTP servers that the device will use to synchronize its time. The default setting is time.devicecloud.com. n To change the default value of the NTP server: a. Click NTP servers. b. For Server, type a new server name. n To add an NTP server: a. Click NTP servers. b. For Add Server, click . c. For Server, enter the hostname of the upstream NTP server that the device will use to synchronize its time. d. Click to add additional NTP servers. If multiple servers are included, servers are tried in the order listed until one succeeds. Note This list is synchronized with the list of servers included with NTP server configuration, and changes made to one will be reflected in the other. See Configure the device as an NTP server for more information about NTP server configuration. 6. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. (Optional) Set the timezone for the location of your IX20 device. The default is UTC. IX20 User Guide 439 Services Configure the system time (config)> system time timezone value (config)> Where value is the timezone using the format specified with the following command: (config)> system time timezone ? Timezone: The timezone for the location of this device. This is used to adjust the time for log messages. It also affects actions that occur at a specific time of day. Format: Africa/Abidjan Africa/Accra Africa/Addis_Ababa ... (config)> 4. (Optional) Add an upstream NTP server that the device will use to synchronize its time to the appropriate location in the list of NTP servers. The default setting is time.devicecloud.com. n To delete the default NTP server, time.devicecloud.com: (config)> del service ntp server 0 n To add the NTP server to the beginning of the list, use the index value of 0 to indicate that it should be added as the first server: (config)> add service ntp server 0 time.server.com (config)> n To add the NTP server to the end of the list, use the index keyword end: (config)> add service ntp server end time.server.com (config)> n To add the NTP server in another location in the list, use an index value to indicate the appropriate position. For example: (config)> add service ntp server 1 time.server.com (config)> Note This list is synchronized with the list of servers included with NTP server configuration, and changes made to one will be reflected in the other. See Configure the device as an NTP server for more information about NTP server configuration. 5. Save the configuration and apply the change: (config)> save Configuration saved. > IX20 User Guide 440 Services Network Time Protocol 6. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Network Time Protocol Network Time Protocol (NTP) enables devices connected on local and worldwide networks to synchronize their internal software and hardware clocks to the same time source. The IX20 device can be configured as an NTP server, allowing downstream hosts that are attached to the device's Local Area Networks to synchronize with the device. When the device is configured as an NTP server, it also functions as an NTP client. The NTP client will be consistently synchronized with one or more upstream NTP servers, which means that NTP packets are transferred every few seconds. A minimum of one upstream NTP server is required. Additional NTP servers can be configured. If multiple servers are configured, a number of time samples are obtained from each of the servers and a subset of the NTP clock filter and selection algorithms are applied to select the best of these. See Configure the device as an NTP server for information about configuring your device as an NTP server. Configure the device as an NTP server Required Configuration Items n Enable the NTP service. n At least one upstream NTP server for synchronization. The default setting is the Digi NTP server, time.devicecloud.com. Additional Configuration Options n Additional upstream NTP servers. n Access control list to limit downstream access to the IX20 device's NTP service. n The time zone setting, if the default setting of UTC is not appropriate. To configure the IX20 device's NTP service: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 441 Services Configure the device as an NTP server 3. Click Services > NTP. 4. Enable the IX20 device's NTP service by clicking Enable. 5. (Optional) Configure the access control list to limit downstream access to the IX20 device's NTP service. n To limit access to specified IPv4 addresses and networks: a. Click IPv4 Addresses. b. For Add Address, click . c. For Address, enter the IPv4 address or network that can access the device's NTP service. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the NTP service. d. Click again to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: a. Click IPv6 Addresses. b. For Add Address, click . c. For Address, enter the IPv6 address or network that can access the device's NTP service. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the NTP service. d. Click again to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: a. Click Interfaces. b. For Add Interface, click . c. For Interface, select the appropriate interface from the dropdown. d. Click again to allow access through additional interfaces. n To limit access based on firewall zones: a. Click Zones. b. For Add Zone, click . c. For Zone, select the appropriate firewall zone from the dropdown. See Firewall configuration for information about firewall zones. d. Click again to allow access through additional firewall zones. IX20 User Guide 442 Services Configure the device as an NTP server Note By default, the access control list for the NTP service is empty, which means that all downstream hosts connected to the IX20 device can use the NTP service. 6. (Optional) Add upstream NTP servers that the device will use to synchronize its time. The default setting is time.devicecloud.com. n To change the default value of the NTP server: a. Click NTP servers. b. For Server, type a new server name. n To add an NTP server: a. Click NTP servers. b. For Add Server, click . c. For Server, enter the hostname of the upstream NTP server that the device will use to synchronize its time. d. Click to add additional NTP servers. If multiple servers are included, servers are tried in the order listed until one succeeds. Note This list is synchronized with the list of servers included with NTP client configuration, and changes made to one will be reflected in the other. See Configure the system time for more information about NTP client configuration. 7. (Optional) Configure the system time zone. The default is UTC. a. Click System > Time b. Select the Timezone for the location of your IX20 device. 8. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Enable the NTP service: (config)> service NTP enable true (config)> 4. (Optional) Add an upstream NTP server that the device will use to synchronize its time to the appropriate location in the list of NTP servers. The default setting is time.devicecloud.com. IX20 User Guide 443 Services Configure the device as an NTP server n To delete the default NTP server, time.devicecloud.com: (config)> del service ntp server 0 n To add the NTP server to the beginning of the list, use the index value of 0 to indicate that it should be added as the first server: (config)> add service ntp server 0 time.server.com (config)> n To add the NTP server to the end of the list, use the index keyword end: (config)> add service ntp server end time.server.com (config)> n To add the NTP server in another location in the list, use an index value to indicate the appropriate position. For example: (config)> add service ntp server 1 time.server.com (config)> Note This list is synchronized with the list of servers included with NTP client configuration, and changes made to one will be reflected in the other. See Configure the system time for more information about NTP client configuration. 5. (Optional) Configure the access control list to limit downstream access to the IX20 device's NTP service. n To limit access to specified IPv4 addresses and networks: (config)> add service ntp acl address end value (config)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the NTP server agent. Repeat this step to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: (config)> add service ntp acl address6 end value (config)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the NTP server agent. Repeat this step to list additional IP addresses or networks. IX20 User Guide 444 Services Configure the device as an NTP server n To limit access to hosts connected through a specified interface on the IX20 device: (config)> add service ntp acl interface end value (config)> Where value is an interface defined on your device. Display a list of available interfaces: Use ... network interface ? to display interface information: (config)> ... network interface ? Interfaces Additional Configuration ------------------------------------------- defaultip Default IP defaultlinklocal Default Link-local IP eth1 ETH1 eth2 ETH2 loopback Loopback modem Modem (config)> Repeat this step to list additional interfaces. n To limit access based on firewall zones: (config)> add service ntp acl zone end value Where value is a firewall zone defined on your device, or the any keyword. Display a list of available firewall zones: Type ... firewall zone ? at the config prompt: (config)> ... firewall zone ? Zones: A list of groups of network interfaces that can be referred to by packet filtering rules and access control lists. Additional Configuration ------------------------------------------------------------------------------ any dynamic_routes edge external internal ipsec loopback IX20 User Guide 445 Services Configure a multicast route setup (config)> Repeat this step to list additional firewall zones. Note By default, the access control list for the NTP service is empty, which means that all downstream hosts connected to the IX20 device can use the NTP service. 6. (Optional) Set the timezone for the location of your IX20 device. The default is UTC. (config)> system time timezone value (config)> Where value is the timezone using the format specified with the following command: (config)> system time timezone ? Timezone: The timezone for the location of this device. This is used to adjust the time for log messages. It also affects actions that occur at a specific time of day. Format: Africa/Abidjan Africa/Accra Africa/Addis_Ababa ... (config)> 7. Save the configuration and apply the change: (config)> save Configuration saved. > 8. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure a multicast route Multicast routing allows a device to transmit data to a single multicast address, which is then distributed to a group of devices that are configured to be members of that group. To configure a multicast route: WebUI IX20 User Guide 446 Services Configure a multicast route 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Services > Multicast. 4. For Add Multicast route, type a name for the route and click . 5. The new route is enabled by default. To disable, uncheck Enable. 6. Type the Source address for the route. This must be a multicast IP address between 224.0.0.1 and 239.255.255.255. 7. Type the Source port. Ensure the port is not used by another protocol. 8. Select a Source interface where multicast packets will arrive. 9. Select a Destination interface that the IX20 device will use to send mutlicast packets. 10. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add the multicast route. For example, to add a route named test: (config)> add service multicast test (config service multicast test)> IX20 User Guide 447 Services Configure a multicast route 4. The multicast route is enabled by default. If it has been disabled, enable the route: (config service multicast test)> enable true (config service multicast test)> 5. Set the source address for the route. This must be a multicast IP address between 224.0.0.1 and 239.255.255.255. (config service multicast test)> dst ip-address (config service multicast test)> 6. Set the source port for the route. Ensure the port is not used by another protocol. (config service multicast test)> port port (config service multicast test)> 7. Set the source interface for the route where multicast packets will arrive: a. Use the ? to determine available interfaces: (config service multicast test)> src_interface ? Source interface: Where the multicast packets will arrive. IP routes do not have an effect in the incoming stream. Format: /network/interface/defaultip /network/interface/defaultlinklocal /network/interface/eth1 /network/interface/eth2 /network/interface/loopback Current value: (config service multicast test)> src_interface b. Set the interface. For example: (config service multicast test)> src_interface /network/interface/eth1 (config service multicast test)> 8. Set the destination interface that the IX20 device will use to send mutlicast packets. (config service multicast test)> interface interface (config service multicast test)> a. Use the ? to determine available interfaces: (config service multicast test)> interface ? Destination interface: Which interface to send the multicast packets. Format: /network/interface/defaultip /network/interface/defaultlinklocal /network/interface/eth1 IX20 User Guide 448 Services Ethernet network bonding /network/interface/eth2 /network/interface/loopback Current value: (config service multicast test)> interface b. Set the interface. For example: (config service multicast test)> interface /network/interface/eth1 (config service multicast test)> 9. Save the configuration and apply the change: (config)> save Configuration saved. > 10. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Ethernet network bonding The IX20 device supports bonding mode for the Ethernet network. This allows you to configure the device so that Ethernet ports share one IP address. When both ports are being used, they act as one Ethernet network port. Required configuration items n Enable Ethernet bonding. n The mode, either: l Active-backup. Provides fault tolerance. l Round-robin. Provides load balancing as well as fault tolerance. n The Ethernet devices in the bonded pool. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 449 Services Ethernet network bonding 3. Click Network > Ethernet bonding. 4. For Add Bond device, click The bond device is enabled by default. To disable, click to toggle off Enable. 5. For Mode, selected either: n Active-backup: Transmits data on only one of the bonded devices at a time. When the active device fails, the next available device in the list is chosen. This mode provides for fault tolerance. n Round-robin: Alternates between bonded devices to provide load balancing as well as fault tolerance. 6. Click to expand Devices. 7. Add Ethernet devices: a. For Add device, click b. For Device, select an Ethernet device to participate in the bond pool. c. Repeat for each appropriate Ethernet device. 8. Click Apply to save the configuration and apply the change. Command line IX20 User Guide 450 Services Ethernet network bonding 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add a network bond: (config)> add network bond name (config network bond name)> The new network bond is enabled by default. To disable: (config network bond name)> enable false (config network bond name)> 4. Set the mode: (config network bond name)> mode value (config network bond name)> where value is either: n active-backup: Transmits data on only one of the bonded devices at a time. When the active device fails, the next available device in the list is chosen. This mode provides for fault tolerance. n round-robin: Alternates between bonded devices to provide load balancing as well as fault tolerance. 5. Add Ethernet devices: a. Use the ? to determine available devices: (config network bond name)> ... network device ? Additional Configuration --------------------------------------------------------------------------eth1 eth2 loopback (config network bond name)> b. Add a device: (config network bond name)> add device /network/device/eth1 (config network bond name)> c. Repeat to add additional devices. IX20 User Guide 451 Services Enable service discovery (mDNS) 6. Save the configuration and apply the change: (config)> save Configuration saved. > 7. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Enable service discovery (mDNS) Multicast DNS mDNS is a protocol that resolves host names in small networks that do not have a DNS server. You can enable the IX20 device to use mDNS. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Services > Service Discovery (mDNS). 4. Enable the mDNS service. 5. Click Access control list to configure access control: n To limit access to specified IPv4 addresses and networks: a. Click IPv4 Addresses. b. For Add Address, click . c. For Address, enter the IPv4 address or network that can access the device's mDNS service. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the mDNS service. d. Click again to list additional IP addresses or networks. IX20 User Guide 452 Services Enable service discovery (mDNS) n To limit access to specified IPv6 addresses and networks: a. Click IPv6 Addresses. b. For Add Address, click . c. For Address, enter the IPv6 address or network that can access the device's mDNS service. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the mDNS service. d. Click again to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: a. Click Interfaces. b. For Add Interface, click . c. For Interface, select the appropriate interface from the dropdown. d. Click again to allow access through additional interfaces. n To limit access based on firewall zones: a. Click Zones. b. For Add Zone, click . c. For Zone, select the appropriate firewall zone from the dropdown. See Firewall configuration for information about firewall zones. d. Click again to allow access through additional firewall zones. 6. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Enable the mDNS service: (config)> service mdns enable true (config)> 4. Configure access control: IX20 User Guide 453 Services Enable service discovery (mDNS) n To limit access to specified IPv4 addresses and networks: (config)> add service mdns acl address end value (config)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the mDNS service. Repeat this step to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: (config)> add service mdns acl address6 end value (config)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the mDNS service. Repeat this step to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: (config)> add service mdns acl interface end value (config)> Where value is an interface defined on your device. Display a list of available interfaces: Use ... network interface ? to display interface information: (config)> ... network interface ? Interfaces Additional Configuration ------------------------------------------- defaultip Default IP defaultlinklocal Default Link-local IP eth1 ETH1 eth2 ETH2 loopback Loopback modem Modem (config)> Repeat this step to list additional interfaces. n To limit access based on firewall zones: (config)> add service mdns acl zone end value IX20 User Guide 454 Services Use the iPerf service Where value is a firewall zone defined on your device, or the any keyword. Display a list of available firewall zones: Type ... firewall zone ? at the config prompt: (config)> ... firewall zone ? Zones: A list of groups of network interfaces that can be referred to by packet filtering rules and access control lists. Additional Configuration ------------------------------------------------------------------------------ any dynamic_routes edge external internal ipsec loopback setup (config)> Repeat this step to list additional firewall zones. 5. Save the configuration and apply the change: (config)> save Configuration saved. > 6. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Use the iPerf service Your IX20 device includes an iPerf3 server that you can use to test the performance of your network. IPerf3 is a command-line tool that measures the maximum network throughput an interface can handle. This is useful when diagnosing network speed issues, to determine, for example, whether a cellular connection is providing expected throughput. The IX20 implementation of iPerf3 supports testing with both TCP and UDP. Note Using iPerf clients that are at a version earlier than iPerf3 to connect to the IX20 device's iPerf3 server may result in unpredictable results. As a result, Digi recommends using an iPerf client at version 3 or newer to connect to the IX20 device's iPerf3 server. IX20 User Guide 455 Services Use the iPerf service Required configuration items n Enable the iPerf server on the IX20 device. n An iPerf3 client installed on a remote host. iPerf3 software can be downloaded at https://iperf.fr/iperf-download.php. Additional configuration Items n The port that the IX20 device's iPerf server will use to listen for incoming connections. n The access control list for the iPerf server. When the iPerf server is enabled, the IX20 device will automatically configure its firewall rules to allow incoming connections on the configured listening port. You can restrict access by configuring the access control list for the iPerf server. To enable the Iperf3 server: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Services > IPerf. 4. Click Enable. 5. (Optional) For Iperf Server Port, type the appropriate port number for the iPerf server listening port. 6. (Optional) Click to expand Access control list to restrict access to the iPerf server: n To limit access to specified IPv4 addresses and networks: a. Click IPv4 Addresses. b. For Add Address, click . c. For Address, enter the IPv4 address or network that can access the device's iperf service. Allowed values are: IX20 User Guide 456 Services Use the iPerf service l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the iperf service. d. Click again to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: a. Click IPv6 Addresses. b. For Add Address, click . c. For Address, enter the IPv6 address or network that can access the device's iperf service. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the iperf service. d. Click again to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: a. Click Interfaces. b. For Add Interface, click . c. For Interface, select the appropriate interface from the dropdown. d. Click again to allow access through additional interfaces. n To limit access based on firewall zones: a. Click Zones. b. For Add Zone, click . c. For Zone, select the appropriate firewall zone from the dropdown. See Firewall configuration for information about firewall zones. d. Click again to allow access through additional firewall zones. 7. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> IX20 User Guide 457 Services Use the iPerf service 3. Enable the iPerf server: (config)> service iperf enable true (config)> 4. (Optional) Set the port number for the iPerf server listening port. The default is 5201. (config)> service iperf port port_number (config)> 5. (Optional) Set the access control list to restrict access to the iPerf server: n To limit access to specified IPv4 addresses and networks: (config)> add service iperf acl address end value (config)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the service-type. Repeat this step to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: (config)> add service iperf acl address6 end value (config)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the service-type. Repeat this step to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: (config)> add service iperf acl interface end value (config)> Where value is an interface defined on your device. Display a list of available interfaces: Use ... network interface ? to display interface information: (config)> ... network interface ? Interfaces Additional Configuration ------------------------------------------- defaultip Default IP defaultlinklocal Default Link-local IP IX20 User Guide 458 Services Use the iPerf service eth1 eth2 loopback modem ETH1 ETH2 Loopback Modem (config)> Repeat this step to list additional interfaces. n To limit access based on firewall zones: (config)> add service iperf acl zone end value Where value is a firewall zone defined on your device, or the any keyword. Display a list of available firewall zones: Type ... firewall zone ? at the config prompt: (config)> ... firewall zone ? Zones: A list of groups of network interfaces that can be referred to by packet filtering rules and access control lists. Additional Configuration ------------------------------------------------------------------------------ any dynamic_routes edge external internal ipsec loopback setup (config)> Repeat this step to list additional firewall zones. 6. Save the configuration and apply the change: (config)> save Configuration saved. > 7. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 459 Services Configure the ping responder service Example performance test using Iperf3 On a remote host with Iperf3 installed, enter the following command: $ iperf3 -c device_ip where device_ip is the IP address of the IX20 device. For example: $ iperf3 -c 192.168.2.1 Connecting to host 192.168.2.1, port 5201 [ 4] local 192.168.3.100 port 54934 connected to 192.168.1.1 port 5201 [ ID] Interval Transfer Bandwidth Retr Cwnd [ 4] 0.00-1.00 sec 26.7 MBytes 224 Mbits/sec 8 2.68 MBytes [ 4] 1.00-2.00 sec 28.4 MBytes 238 Mbits/sec 29 1.39 MBytes [ 4] 2.00-3.00 sec 29.8 MBytes 250 Mbits/sec 0 1.46 MBytes [ 4] 3.00-4.00 sec 31.2 MBytes 262 Mbits/sec 0 1.52 MBytes [ 4] 4.00-5.00 sec 32.1 MBytes 269 Mbits/sec 0 1.56 MBytes [ 4] 5.00-6.00 sec 32.5 MBytes 273 Mbits/sec 0 1.58 MBytes [ 4] 6.00-7.00 sec 33.9 MBytes 284 Mbits/sec 0 1.60 MBytes [ 4] 7.00-8.00 sec 33.7 MBytes 282 Mbits/sec 0 1.60 MBytes [ 4] 8.00-9.00 sec 33.5 MBytes 281 Mbits/sec 0 1.60 MBytes [ 4] 9.00-10.00 sec 33.2 MBytes 279 Mbits/sec 0 1.60 MBytes ------------------------- [ ID] Interval Transfer Bandwidth Retr [ 4] 0.00-10.00 sec 315 MBytes 264 Mbits/sec 37 sender [ 4] 0.00-10.00 sec 313 MBytes 262 Mbits/sec receiver iperf Done. $ Configure the ping responder service Your IX20 device's ping responder service replies to ICMP and ICMPv6 echo requests. The service is enabled by default. You can disable the service, or you can configure the service to use an access control list to limit the service to specified IP address, interfaces, and/or zones. To enable the Iperf3 server: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 460 Services Configure the ping responder service 3. Click Services > Ping responder. The ping responder service is enabled by default. Click Enable to disable all ping responses. 4. Click to expand Access control list to restrict ping responses to specified IP address, interfaces, and/or zones: n To limit access to specified IPv4 addresses and networks: a. Click IPv4 Addresses. b. For Add Address, click . c. For Address, enter the IPv4 address or network that can access the device's ping responder. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the ping responder. d. Click again to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: a. Click IPv6 Addresses. b. For Add Address, click . c. For Address, enter the IPv6 address or network that can access the device's ping responder. Allowed values are: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the ping responder. d. Click again to list additional IP addresses or networks. n To limit access to hosts connected through a specified interface on the IX20 device: a. Click Interfaces. b. For Add Interface, click . c. For Interface, select the appropriate interface from the dropdown. d. Click again to allow access through additional interfaces. n To limit access based on firewall zones: a. Click Zones. b. For Add Zone, click . c. For Zone, select the appropriate firewall zone from the dropdown. See Firewall configuration for information about firewall zones. IX20 User Guide 461 Services Configure the ping responder service d. Click again to allow access through additional firewall zones. 5. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Enable the iPerf server: (config)> service iperf enable true (config)> 4. (Optional) Set the port number for the iPerf server listening port. The default is 5201. (config)> service iperf port port_number (config)> 5. (Optional) Set the access control list to restrict access to the iPerf server: n To limit access to specified IPv4 addresses and networks: (config)> add service iperf acl address end value (config)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 192.168.1.0/24. l any: No limit to IPv4 addresses that can access the service-type. Repeat this step to list additional IP addresses or networks. n To limit access to specified IPv6 addresses and networks: (config)> add service iperf acl address6 end value (config)> Where value can be: l A single IP address or host name. l A network designation in CIDR notation, for example, 2001:db8::/48. l any: No limit to IPv6 addresses that can access the service-type. Repeat this step to list additional IP addresses or networks. IX20 User Guide 462 Services Configure the ping responder service n To limit access to hosts connected through a specified interface on the IX20 device: (config)> add service iperf acl interface end value (config)> Where value is an interface defined on your device. Display a list of available interfaces: Use ... network interface ? to display interface information: (config)> ... network interface ? Interfaces Additional Configuration ------------------------------------------- defaultip Default IP defaultlinklocal Default Link-local IP eth1 ETH1 eth2 ETH2 loopback Loopback modem Modem (config)> Repeat this step to list additional interfaces. n To limit access based on firewall zones: (config)> add service iperf acl zone end value Where value is a firewall zone defined on your device, or the any keyword. Display a list of available firewall zones: Type ... firewall zone ? at the config prompt: (config)> ... firewall zone ? Zones: A list of groups of network interfaces that can be referred to by packet filtering rules and access control lists. Additional Configuration ------------------------------------------------------------------------------ any dynamic_routes edge external internal ipsec loopback IX20 User Guide 463 Services Configure the ping responder service setup (config)> Repeat this step to list additional firewall zones. 6. Save the configuration and apply the change: (config)> save Configuration saved. > 7. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Example performance test using Iperf3 On a remote host with Iperf3 installed, enter the following command: $ iperf3 -c device_ip where device_ip is the IP address of the IX20 device. For example: $ iperf3 -c 192.168.2.1 Connecting to host 192.168.2.1, port 5201 [ 4] local 192.168.3.100 port 54934 connected to 192.168.1.1 port 5201 [ ID] Interval Transfer Bandwidth Retr Cwnd [ 4] 0.00-1.00 sec 26.7 MBytes 224 Mbits/sec 8 2.68 MBytes [ 4] 1.00-2.00 sec 28.4 MBytes 238 Mbits/sec 29 1.39 MBytes [ 4] 2.00-3.00 sec 29.8 MBytes 250 Mbits/sec 0 1.46 MBytes [ 4] 3.00-4.00 sec 31.2 MBytes 262 Mbits/sec 0 1.52 MBytes [ 4] 4.00-5.00 sec 32.1 MBytes 269 Mbits/sec 0 1.56 MBytes [ 4] 5.00-6.00 sec 32.5 MBytes 273 Mbits/sec 0 1.58 MBytes [ 4] 6.00-7.00 sec 33.9 MBytes 284 Mbits/sec 0 1.60 MBytes [ 4] 7.00-8.00 sec 33.7 MBytes 282 Mbits/sec 0 1.60 MBytes [ 4] 8.00-9.00 sec 33.5 MBytes 281 Mbits/sec 0 1.60 MBytes [ 4] 9.00-10.00 sec 33.2 MBytes 279 Mbits/sec 0 1.60 MBytes ------------------------- [ ID] Interval Transfer Bandwidth Retr [ 4] 0.00-10.00 sec 315 MBytes 264 Mbits/sec 37 sender [ 4] 0.00-10.00 sec 313 MBytes 262 Mbits/sec receiver iperf Done. $ IX20 User Guide 464 Applications The IX20 supports Python 3.6 and provides you with the ability to run Python applications on the device interactively or from a file. You can also specify Python applications and other scripts to be run each time the device system restarts, at specific intervals, or at a specified time. This chapter contains the following topics: Configure applications to run automatically 466 Run a Python application at the shell prompt 472 Start an interactive Python session 474 Digidevice module 476 Use Python to access serial ports 498 Use the Paho MQTT python library 498 Stop a script that is currently running 502 Show script information 502 IX20 User Guide 465 Applications Configure applications to run automatically Configure applications to run automatically You can configure an application to run automatically when the system restarts, at specific intervals, or at a specified time. By default, scripts execute in a "sandbox," which restricts access to the file system and available commands that can be used by the script. Required configuration items n Upload or create the Python application. n Enable the Python application to be run automatically. n Select whether the application should run: l When the device boots. l At a specified time. l At a specified interval. l During system maintenance. Additional configuration items n A label used to identify the application. n The action to take if the Python application finishes. The actions that can be taken are: l None. l Restart the script. l Reboot the device. n The arguments for the Python application. n Whether to write the application output and errors to the system log. n The memory available to be used by the application. n Whether the script should run one time only. Task one: Upload the application WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. On the menu, click System. Under Administration, click File System. The File System page appears. IX20 User Guide 466 Applications Configure applications to run automatically 3. Highlight the scripts directory and click to open the directory. 4. Click (upload). 5. Browse to the location of the script on your local machine. Select the file and click Open to upload the file. The uploaded file is uploaded to the /etc/config/scripts directory. Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, use the scp command to upload the Python application script to the IX20 device: > scp host hostname-or-ip user username remote remote-path local local-path to local where: n hostname-or-ip is the hostname or ip address of the remote host. n username is the name of the user on the remote host. n remote-path is the path and filename of the file on the remote host that will be copied to the IX20 device. n local-path is the location on the IX20 device where the copied file will be placed. For example: To upload a Python application from a remote host with an IP address of 192.168.4.1 to the /etc/config/scripts directory on the IX20 device, issue the following command: > scp host 192.168.4.1 user admin remote /home/admin/bin/test.py local /etc/config/scripts/ to local admin@192.168.4.1's password: adminpwd test.py 100% 36MB 11.1MB/s 00:03 > 3. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Note You can also create Python applications by using the vi command when logged in with shell access. IX20 User Guide 467 Applications Configure applications to run automatically Task two: Configure the application to run automatically Note This feature does not provide syntax or error checking. Certain commands can render the device inoperable. Use with care. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click System > Scheduled tasks > Custom scripts. 4. For Add Script, click . The schedule script configuration window is displayed. Scheduled scripts are enabled by default. To disable, click Enable to toggle off. 5. (Optional) For Label, provide a label for the script. IX20 User Guide 468 Applications Configure applications to run automatically 6. For Run mode, select the mode that will be used to run the script. Available options are: n On boot: The script will run once each time the device boots. l If On boot is selected, select the action that will be taken when the script completes in Exit action. Available options are: o None: Action taken when the script exits. o Restart script: Runs the script repeatedly. o Reboot: The device will reboot when the script completes. n Interval: The script will start running at the specified interval, within 30 seconds after the configuration change is saved. l If Interval is selected, in Interval, type the interval. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Interval to ten minutes, enter 10m or 600s. l Click to enable Run single to run only a single instance of the script at a time. If Run single is not selected, a new instance of the script will be started at every interval, regardless of whether the script is still running from a previous interval. n Set time: Runs the script at a specified time of the day. l If Set Time is selected, specify the time that the script should run in Run time, using the format HH:MM. n During system maintenance: The script will run during the system maintenance time window. 7. For Commands, enter the commands that will execute the script. If the script begins with #!, then the script will be invoked in the location specified by the path for the script command. Otherwise, the default shell will be used (equivalent to #!/bin/sh). 8. Script logging options: a. Click to enable Log script output to log the script's output to the system log. b. Click to enable Log script errors to log script errors to the system log. If neither option is selected, only the script's exit code is written to the system log. 9. For Maximum memory, enter the maximum amount of memory available to be used by the script and its subprocesses, using the format number{b|bytes|KB|k|MB|MB|M|GB|G|TB|T}. 10. Click to enable Once to configure the script to run only once at the specified time. If Once is enabled, rebooting the device will cause the script to not run again. The only way to re-run the script is to: n Remove the script from the device and add it again. n Make a change to the script. n Uncheck Once. 11. Sandbox is enabled by default, which restricts access to the file system and available commands that can be used by the script. This option protects the script from accidentally destroying the system it is running on. 12. Click Apply to save the configuration and apply the change. IX20 User Guide 469 Applications Configure applications to run automatically Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add a script: (config)> add system schedule script end (config system schedule script 0)> Scheduled scripts are enabled by default. To disable: (config system schedule script 0)> enable false (config system schedule script 0)> 4. (Optional) Provide a label for the script. (config system schedule script 0)> label value (config system schedule script 0)> where value is any string. if spaces are used, enclose value within double quotes. 5. Set the mode that will be used to run the script: (config system schedule script 0)> when mode (config system schedule script 0)> where mode is one of the following: n boot: The script will run once each time the device boots. l If boot is selected, set the action that will be taken when the script completes: (config system schedule script 0)> exit_action action (config system schedule script 0)> where action is one of the following: o none: Action taken when the script exits. o restart: Runs the script repeatedly. o reboot: The device will reboot when the script completes. n interval: The script will start running at the specified interval, within 30 seconds after the configuration change is saved. If interval is selected: IX20 User Guide 470 Applications Configure applications to run automatically l Set the interval: (config system schedule script 0)> on_interval value (config system schedule script 0)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set on_interval to ten minutes, enter either 10m or 600s: (config system schedule script 0)> on_interval 600s (config system schedule script 0)> l (Optional) Configure the script to run only a single instance at a time: (config system schedule script 0)> once true (config system schedule script 0)> If once is set to false, a new instance of the script will be started at every interval, regardless of whether the script is still running from a previous interval. n set_time: Runs the script at a specified time of the day. l If set_time is set, set the time that the script should run, using the format HH:MM: (config system schedule script 0)> run_time HH:MM (config system schedule script 0)> n maintenance_time: The script will run during the system maintenance time window. 6. Set the commands that will execute the script: (config system schedule script 0)> commands filename (config system schedule script 0)> where filename is the path and filename of the script, and any related command line information. If the script begins with #!, then the script will be invoked in the location specified by the path for the script command. Otherwise, the default shell will be used (equivalent to #!/bin/sh). 7. Script logging options: n To log the script's output to the system log: (config system schedule script 0)> syslog_stdout true (config system schedule script 0)> n To log script errors to the system log: (config system schedule script 0)> syslog_stderr true (config system schedule script 0)> If syslog_stdout and syslog_stderr are not enabled, only the script's exit code is written to the system log. IX20 User Guide 471 Applications Run a Python application at the shell prompt 8. Set the maximum amount of memory available to be used by the script and its subprocesses: (config system schedule script 0)> max_memory value (config system schedule script 0)> where value uses the syntax number{b|bytes|KB|k|MB|MB|M|GB|G|TB|T}. 9. To run the script only once at the specified time: (config system schedule script 0)> once true (config system schedule script 0)> If once is enabled, rebooting the device will cause the script to run again. The only way to rerun the script is to: n Remove the script from the device and add it again. n Make a change to the script. n Disable once. 10. Sandbox is enabled by default. This option protects the script from accidentally destroying the system it is running on. (config system schedule script 0)> sandbox true (config system schedule script 0)> 11. Save the configuration and apply the change: (config)> save Configuration saved. > 12. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Run a Python application at the shell prompt Python applications can be run from a file at the shell prompt. The Python application will run until it completes, displaying output and prompting for additional user input if needed. To interrupt the application, enter CTRL-C. Note Python applications cannot be run from the Admin CLI. You must access the device shell in order to run Python applications from the command line. See Authentication groups for information about configuring authentication groups that include shell access. 1. Upload the Python application to the IX20 device: WebUI IX20 User Guide 472 Applications Run a Python application at the shell prompt a. Log into the IX20 WebUI as a user with Admin access. b. On the menu, click System. Under Administration, click File System. The File System page appears. c. Highlight the scripts directory and click to open the directory. d. Click (upload). e. Browse to the location of the script on your local machine. Select the file and click Open to upload the file. The uploaded file is uploaded to the /etc/config/scripts directory. Command line a. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. b. At the command line, use the scp command to upload the Python application script to the IX20 device: > scp host hostname-or-ip user username remote remote-path local localpath to local where: n hostname-or-ip is the hostname or ip address of the remote host. n username is the name of the user on the remote host. n remote-path is the path and filename of the file on the remote host that will be copied to the IX20 device. n local-path is the location on the IX20 device where the copied file will be placed. For example: To upload a Python application from a remote host with an IP address of 192.168.4.1 to the /etc/config/scripts directory on the IX20 device, issue the following command: IX20 User Guide 473 Applications Start an interactive Python session > scp host 192.168.4.1 user admin remote /home/admin/bin/test.py local /etc/config/scripts/ to local admin@192.168.4.1's password: adminpwd test.py 100% 36MB 11.1MB/s 00:03 > c. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Note You can also create Python applications by using the vi command when logged in with shell access. 2. Log into the IX20 command line as a user with shell access. Depending on your device configuration, you may be presented with an Access selection menu. Type shell to access the device shell. 3. Use the python command to run the Python application. In the following example, the Python application, test.py, takes 3 parameters: 120, ports and storage: # python /etc/config/scripts/test.py 120 ports storage Start an interactive Python session Use the python command without specifying any parameters to start an interactive Python session. The Python session operates interactively using REPL (Read Evaluate Print Loop) to allow you to write Python code on the command line. Note The Python interactive session is not available from the Admin CLI. You must access the device shell in order to run Python applications from the command line. See Authentication groups for information about configuring authentication groups that include shell access. 1. Log into the IX20 command line as a user with shell access. Depending on your device configuration, you may be presented with an Access selection menu. Type shell to access the device shell. 2. At the shell prompt, use the python command with no parameters to enter an interactive Python session: # python Python 3.6.10 (default, Jan 31 2020, 08:45:19) [GCC 8.3.0] on linux Type "help", "copyright", "credits" or "license" for more information. >>> 3. Type Python commands at the Python prompt. For example, to view help for the digidevice module, type: >>> help("digidevice") Help on package digidevice: IX20 User Guide 474 Applications Start an interactive Python session NAME digidevice - Digi device python extensions DESCRIPTION This module includes various extensions that allow Python to interact with additional features offered by the device. ... 4. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit(). IX20 User Guide 475 Applications Digidevice module Digidevice module The Python digidevice module provides platform-specific extensions that allow you to interact with the device's configuration and interfaces. The following submodules are included with the digidevice module: This section contains the following topics: Use digidevice.cli to execute CLI commands 477 Use digidevice.datapoint to upload custom datapoints to Digi Remote Manager 478 Use digidevice.config for device configuration 480 Use Python to respond to Digi Remote Manager SCI requests 483 Use digidevice runtime to access the runtime database 491 Use Python to upload the device name to Digi Remote Manager 493 Use Python to send and receive SMS messages 495 IX20 User Guide 476 Applications Digidevice module Use digidevice.cli to execute CLI commands Use the digidevice.cli Python module to issue CLI commands from Python to retrieve status and statistical information about the device. For example, to display the system status and statistics by using an interactive Python session, use the show system command with the cli module: 1. Log into the IX20 command line as a user with shell access. Depending on your device configuration, you may be presented with an Access selection menu. Type shell to access the device shell. 2. At the shell prompt, use the python command with no parameters to enter an interactive Python session: # python Python 3.6.10 (default, Jan 31 2020, 08:45:19) [GCC 8.3.0] on linux Type "help", "copyright", "credits" or "license" for more information. >>> 3. Import the cli submodule: >>> from digidevice import cli >>> 4. Execute a CLI command using the cli.execute(command) function. For example, to print the system status and statistics to stdout using the show system command: >>> response = cli.execute("show system") >>> >>> print (response) Model Serial Number SKU Hostname MAC : Digi IX20 : IX20-000065 : IX20 : IX20 : DF:DD:E2:AE:21:18 Hardware Version Firmware Version Alt. Firmware Version Bootloader Version : 50001947-01 1P : 20.11.32.138 : 20.11.32.138 : 19.7.23.0-15f936e0ed Current Time CPU Uptime (541317s) Temperature : Wed, 2 Dec 2020 8:44:23 +0000 : 1.4% : 6 days, 6 hours, 21 minutes, 57 seconds : 40C >>> 5. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit(). IX20 User Guide 477 Applications Digidevice module Help for using Python to execute IX20 CLI commands Get help executing a CLI command from Python by accessing help for cli.execute: 1. Log into the IX20 command line as a user with shell access. Depending on your device configuration, you may be presented with an Access selection menu. Type shell to access the device shell. 2. At the shell prompt, use the python command with no parameters to enter an interactive Python session: # python Python 3.6.10 (default, Jan 31 2020, 08:45:19) [GCC 8.3.0] on linux Type "help", "copyright", "credits" or "license" for more information. >>> 3. Import the cli submodule: >>> from digidevice import cli >>> 4. Use the help command with cli.execute: >>> help(cli.execute) Help on function execute in module digidevice.cli: execute(command, timeout=5) Execute a CLI command with the timeout specified returning the results. ... 5. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit(). Use digidevice.datapoint to upload custom datapoints to Digi Remote Manager Use the datapoint Python module to upload custom datapoints to Digi Remote Manager. The following characteristics can be defined for a datapoint: n Stream ID n Value n (Optional) Data type l integer l long l float l double l string l binary n Units (optional) n Timestamp (optional) IX20 User Guide 478 Applications Digidevice module n Location (optional) l Tuple of latitude, longitude and altitude n Description (optional) n Quality (optional) l An integer describing the quality of the data point For example, to use an interactive Python session to upload datapoints related to velocity, temperature, and the state of the emergency door: 1. Log into the IX20 command line as a user with shell access. Depending on your device configuration, you may be presented with an Access selection menu. Type shell to access the device shell. 2. At the shell prompt, use the python command with no parameters to enter an interactive Python session: # python Python 3.6.10 (default, Jan 31 2020, 08:45:19) [GCC 8.3.0] on linux Type "help", "copyright", "credits" or "license" for more information. >>> 3. Import the datapoint submodule and other necessary modules: >>> from digidevice import datapoint >>> import time >>> 4. Upload the datapoints to Remote Manager: >>> datapoint.upload("Velocity", 69, units="mph") >>> datapoint.upload("Temperature", 24, geo_location=(54.409469, -1.718836, 129)) >>> datapoint.upload("Emergency_Door", "closed", timestamp=time.time()) 5. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit(). Once the datapoints have been uploaded to Remote Manager, they can be viewed via Remote Manager or accessed using Web Services calls. See the Digi Remote Manager Programmers Guide for more information on web services and datapoints. Help for using Python to upload custom datapoints to Remote Manager Get help for uploading datapoints to your Digi Remote Manager account by accessing help for datapoint.upload: 1. Log into the IX20 command line as a user with shell access. Depending on your device configuration, you may be presented with an Access selection menu. Type shell to access the device shell. 2. At the shell prompt, use the python command with no parameters to enter an interactive Python session: IX20 User Guide 479 Applications Digidevice module # python Python 3.6.10 (default, Jan 31 2020, 08:45:19) [GCC 8.3.0] on linux Type "help", "copyright", "credits" or "license" for more information. >>> 3. Import the datapoint submodule and other necessary modules: >>> from digidevice import datapoint >>> 4. Use the help command with datapoint.upload: >>> help(datapoint.upload) Help on function upload in module digidevice.datapoint: upload(stream_id:str, data, *, description:str=None, timestamp:float=None, units:str=None, geo_location:Tuple[float, float, float]=None, quality:int=None, data_type:digidevice.datapoint.DataType=None, timeout:float=None) ... 5. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit(). Use digidevice.config for device configuration Use the config Python module to access and modify the device configuration. Read the device configuration 1. Log into the IX20 command line as a user with shell access. Depending on your device configuration, you may be presented with an Access selection menu. Type shell to access the device shell. 2. At the shell prompt, use the python command with no parameters to enter an interactive Python session: # python Python 3.6.10 (default, Jan 31 2020, 08:45:19) [GCC 8.3.0] on linux Type "help", "copyright", "credits" or "license" for more information. >>> 3. Import the config submodule: >>> from digidevice import config >>> 4. Use config.load() and the get() method to return the device's configuration: a. Return the entire configuration: >>> cfg = config.load() >>> print(cfg) IX20 User Guide 480 Applications Digidevice module This returns the device configuration: ... network.interface.lan1.device=/network/bridge/lan1 network.interface.lan1.enable=true network.interface.lan1.ipv4.address=192.168.2.1/24 network.interface.lan1.ipv4.connection_monitor.attempts=3 ... b. Print a list of available interfaces: >>> cfg = config.load() >>> interfaces = cfg.get("network.interface") >>> print(interfaces.keys()) This returns the following: ['defaultip', 'defaultlinklocal', 'lan1', 'loopback', 'wan1', 'wwan1', 'wwan2'] c. Print the IPv4 address of the LAN interface: >>> cfg = config.load() >>> print(interfaces.get("lan.ipv4.address")) Which returns: 192.168.2.1/24 Modify the device configuration Use the set() and commit() methods to modify the device configuration: 1. Log into the IX20 command line as a user with shell access. Depending on your device configuration, you may be presented with an Access selection menu. Type shell to access the device shell. 2. At the shell prompt, use the python command with no parameters to enter an interactive Python session: # python Python 3.6.10 (default, Jan 31 2020, 08:45:19) [GCC 8.3.0] on linux Type "help", "copyright", "credits" or "license" for more information. >>> 3. Import the config submodule: >>> from digidevice import config >>> IX20 User Guide 481 Applications Digidevice module 4. Use config.load(writable=True) to enable write mode for the configuration: >>> cfg = config.load(writable=True) >>> 5. Use the set() method to make changes to the configuration: >>> cfg.set("system.name", "New-Name") >>> 6. Use the commit() method to save the changes: >>> cfg.commit() True >>> 7. Use the get() method to verify the change: >>> print(cfg.get("system.name")) New-Name >>> Help for using Python to read and modify device configuration Get help for reading and modifying the device configuration by accessing help for digidevice.config: 1. Log into the IX20 command line as a user with shell access. Depending on your device configuration, you may be presented with an Access selection menu. Type shell to access the device shell. 2. At the shell prompt, use the python command with no parameters to enter an interactive Python session: # python Python 3.6.10 (default, Jan 31 2020, 08:45:19) [GCC 8.3.0] on linux Type "help", "copyright", "credits" or "license" for more information. >>> 3. Import the config submodule: >>> from digidevice import config >>> 4. Use the help command with config: >>> help(config) Help on module acl.config in acl: NAME acl.config - Python interface to ACL configuration (libconfig). ... 5. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit(). IX20 User Guide 482 Applications Digidevice module Use Python to respond to Digi Remote Manager SCI requests The device_request Python module allows you to interact with Digi Remote Manager by using Remote Manager's Server Command Interface (SCI), a web service that allows users to access information and perform commands that relate to their devices. Use Remote Manager's SCI interface to create SCI requests that are sent to your IX20 device, and use the device_request module to send responses to those requests to Remote Manager. See the Digi Remote Manager Programmers Guide for more information on SCI. Task one: Use the device_request module on your IX20 device to create a response 1. Log into the IX20 command line as a user with shell access. Depending on your device configuration, you may be presented with an Access selection menu. Type shell to access the device shell. 2. At the shell prompt, use the python command with no parameters to enter an interactive Python session: # python Python 3.6.10 (default, Jan 31 2020, 08:45:19) [GCC 8.3.0] on linux Type "help", "copyright", "credits" or "license" for more information. >>> 3. Import the device_request module: >>> from digidevice import device_request >>> 4. Create a function to handle the request from Remote Manager: >>> def handler(target, request): print ("received request %s for target %s" % (request, target)) return "OK" >>> 5. Register a callbackup function that will be called when the device receives a SCI request from Remote Manager: >>> device_request.register("myTarget", handler) >>> Note Leave the interactive Python session active while completing task two, below. Once you have completed task two, exit the interactive session by using Ctrl-D. You can also exit the session using exit() or quit(). Task two: Create and send an SCI request from Digi Remote Manager The second step in using the device_request module is to create an SCI request that Remote Manager will forward to the device. For example, you can create in SCI request a the Remote Manager API explorer: IX20 User Guide 483 Applications Digidevice module 1. In Remote Manager, click Documentation > API Explorer. 2. Select the device to use as the SCI target: a. Click SCI Targets. b. Click Add Targets. c. Enter or select the device ID of the device. d. Click Add. e. Click OK. 3. Click Examples > SCI > Data Service > Send Request. Code similar to the following will be displayed in the HTTP message body text box: <sci_request version="1.0"> <data_service> <targets> <device id="00000000-00000000-0000FFFF-A83CF6A3"/> </targets> <requests> <device_request target_name="myTarget"> my payload string </device_request> </requests> </data_service> </sci_request> Note The value of the target_name parameter in the device_request element must correspond to the target parameter of the device_request.register function in the Python script. In this example, the two are the same. 4. Click Send. Once that the request has been sent to the device, the handler on the device is executed. n On the device, you will receive the following output: >>> received request my payload string for target myTarget >>> n In Remote Manager, you will receive a response similar to the following: <sci_reply version="1.0"> <data_service> <device id="00000000-00000000-0000FFFF-A83CF6A3"/> <requests> <device_request target_name="myTarget" status="0">OK</device_ request> </requests> </device> </data_service> </sci_request> Example: Use digidevice.cli with digidevice.device_request IX20 User Guide 484 Applications Digidevice module In this example, we will use the digidevice.cli module in conjunction with the digidevice.device_ request module to return information about multiple devices to Remote Manager. 1. Create a Python application, called showsystem.py, that uses the digidevice.cli module to create a response containing information about device and the device_request module to respond with this information to a request from Remote Manager: from digidevice import device_request from digidevice import cli import time def handler(target, request): return cli.execute("show system verbose") def status_cb(error_code, error_description): if error_code != 0: print("error handling showSystem device request: %s" % error_ description) device_request.register("showSystem", handler, status_callback = status_cb) # Do not let the process finish so that it handles device requests while True: time.sleep(10) 2. Upload the showsystem.py application to the /etc/config/scripts directory on two or more Digi devices. In this example, we will upload it to two devices, and use the same request in Remote Manager to query both devices. See Configure applications to run automatically for information about uploading Python applications to your device. You can also create the script on the device by using the vi command when logged in with shell access. 3. For both devices: a. Configure the device to automatically run the showsystem.py application on reboot, and to restart the application if it crashes. This can be done from either the WebUI or the command line: WebUI i. Log into the IX20 WebUI as a user with full Admin access rights. ii. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 485 Applications Digidevice module iii. Click System > Scheduled tasks > Custom scripts. iv. Click to add a custom script. v. For Label, type Show system application. vi. For Run mode, select On boot. vii. For Exit action, select Restart script. viii. For Commands, type python /etc/config/scripts/showsystem.py. ix. Click Apply to save the configuration and apply the change. Command line i. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. IX20 User Guide 486 Applications Digidevice module ii. At the command line, type config to enter configuration mode: > config (config)> iii. Add an application entry: (config)> add system schedule script end (config system schedule script 0)> Scheduled scripts are enabled by default. To disable: (config system schedule script 0)> enable false (config system schedule script 0)> iv. Provide a label for the script: (config system schedule script 0)> label "Show system application" v. Configure the application to run automatically when the device reboots: (config system schedule script 0)> when boot (config system schedule script 0)> vi. Configure the application to restart if it crashes: (config system schedule script 0)> exit_action restart (config system schedule script 0)> vii. Set the command that will execute the application: (config system schedule script 0)> commands "python /etc/config/scripts/showsystem.py" (config system schedule script 0)> viii. Save the configuration and apply the change: (config)> save Configuration saved. > b. Run the showsystem.py application. You can run the application by either rebooting the device, or by running it from the shell prompt. n To reboot the device: i. From the WebUI: i. From the main menu, click System. ii. Click Reboot. i. From the command line, at the Admin CLI prompt, type: > reboot IX20 User Guide 487 Applications Digidevice module n To run the application from the shell prompt: i. Log into the IX20 command line as a user with shell access. Depending on your device configuration, you may be presented with an Access selection menu. Type shell to access the device shell. ii. Type the following at the shell prompt: # python /etc/config/scripts/showsystem.py & # iii. Exit the shell: # exit 4. In Remote Manager, click Documentation > API Explorer. 5. Select the devices to use as the SCI targest: a. Click SCI Targets. b. Click Add Targets. c. Enter or select the device ID of one of the devices. d. Click Add. e. Enter or select the device ID of the second device and click Add. f. Click OK. 6. Click Examples > SCI > Data Service > Send Request. Code similar to the following will be displayed in the HTTP message body text box: <sci_request version="1.0"> <data_service> <targets> <device id="00000000-00000000-0000FFFF-A83CF6A3"/> <device id="00000000-00000000-0000FFFF-485740BC"/> </targets> <requests> <device_request target_name="myTarget"> my payload string </device_request> </requests> </data_service> </sci_request> 7. For the device_request element, replace the value of target_name with showSystem. This matches the target parameter of the device_request.register function in the showsystem.py application. <device_request target_name="showSystem"> 8. Click Send. You should receive a response similar to the following: <sci_reply version="1.0"> <data_service> IX20 User Guide 488 Applications Digidevice module <device id="00000000-00000000-0000FFFF-A83CF6A3"/> <requests> <device_request target_name="showSystem" status="0">Model : Digi IX20 Serial Number : IX20-000068 Hostname : IX20 MAC : 00:40:D0:13:35:36 Hardware Version Firmware Version Bootloader Version Firmware Build Date Schema Version : 50001959-01 A : 20.11.32.138 :1 : Wed, 2 Dec 2020 8:44:23 : 461 Timezone Current Time CPU Uptime seconds (164987s) Temperature : UTC : Wed, 2 Dec 2020 8:44:23 : 1.1 : 1 day, 21 hours, 49 minutes, 47 : 39C Contact : Jane Smith Disk ---- Load Average : 0.10, 0.05, 0.00 RAM Usage : 85.176MB/250.484MB(34%) Disk /etc/config Usage : 0.068MB/13.416MB(1%) Disk /opt Usage : 47.724MB/5309.752MB(1%) Disk /overlay Usage : MB/MB(%) Disk /tmp Usage : 0.004MB/40.96MB(0%) Disk /var Usage : 0.820MB/32.768MB(3%)</device_request> </requests> </device> <device id="00000000-00000000-0000FFFF-485740BC"/> <requests> <device_request target_name="showSystem" status="0">Model : Digi IX20 Serial Number : IX20-000023 Hostname : IX20 MAC : 00:40:D0:26:79:1C Hardware Version Firmware Version Bootloader Version Firmware Build Date Schema Version : 50001959-01 A : 20.11.32.138 :1 : Wed, 2 Dec 2020 8:44:23 : 461 Timezone Current Time CPU Uptime seconds (395002s) Temperature : UTC : Wed, 2 Dec 2020 8:44:23 : 1.1 : 4 day, 13 hours, 43 minutes, 22 : 37C Contact Disk : Omar Ahmad IX20 User Guide 489 Applications Digidevice module ---Load Average RAM Usage Disk /etc/config Usage Disk /opt Usage Disk /overlay Usage Disk /tmp Usage Disk /var Usage </requests> </device> </data_service> </sci_request> : 0.10, 0.05, 0.00 : 85.176MB/250.484MB(34%) : 0.068MB/13.416MB(1%) : 47.724MB/5309.752MB(1%) : MB/MB(%) : 0.004MB/40.96MB(0%) : 0.820MB/32.768MB(3%)</device_request> Help for using Python to respond to Digi Remote Manager SCI requests Get help for respond to Digi Remote Manager Server Command Interface (SCI) requests by accessing help for digidevice.device_request: 1. Log into the IX20 command line as a user with shell access. Depending on your device configuration, you may be presented with an Access selection menu. Type shell to access the device shell. 2. At the shell prompt, use the python command with no parameters to enter an interactive Python session: # python Python 3.6.10 (default, Jan 31 2020, 08:45:19) [GCC 8.3.0] on linux Type "help", "copyright", "credits" or "license" for more information. >>> 3. Import the device_request submodule: >>> from digidevice import device_request >>> 4. Use the help command with device_request: >>> help(device_request) Help on module digidevice.device_request in digidevice: NAME digidevice.device_request - APIs for registering device request handlers ... You can also use the help command with available device_request functions: n Use the help command with device_request.register: >>> help(device_request.register) Help on function register in module digidevice.device_request: register(target:str, response_callback:Callable[[str, str], str], status_callback:Callable[[int, str], NoneType]=None, xml_ IX20 User Guide 490 Applications Digidevice module encoding:str='UTF-8') ... n Use the help command with device_request.unregister: >>> help(device_request.unregister) Help on function unregister in module digidevice.device_request: unregister(target:str) -> bool ... 5. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit(). Use digidevice runtime to access the runtime database Use the runt submodule to access and modify the device runtime database. Read from the runtime database Use the keys() and get() methods to read the device configuration: 1. Log into the IX20 command line as a user with shell access. Depending on your device configuration, you may be presented with an Access selection menu. Type shell to access the device shell. 2. At the shell prompt, use the python command with no parameters to enter an interactive Python session: # python Python 3.6.10 (default, Jan 31 2020, 08:45:19) [GCC 8.3.0] on linux Type "help", "copyright", "credits" or "license" for more information. >>> 3. Import the runt submodule: >>> from digidevice import runt >>> 4. Use the start() method to open the runtime database: >>> runt.start() >>> 5. Use the keys() method to display available keys in the runtime database, and use the get() method to print information from the runtime database: a. Print available keys: >>> print(runt.keys("")) This returns available keys: IX20 User Guide 491 Applications Digidevice module ['advanced', 'drm', 'firmware', 'location', 'manufacture', 'metrics', 'mm', 'network', 'pam', 'serial', 'system'] b. Print available keys for the system key: >>> print(runt.keys("system")) This will return the following: ['boot_count', 'chassis', 'cpu_temp', 'cpu_usage', 'disk', 'load_avg', 'local_time', 'mac', 'mcu', 'model', 'ram', 'serial', 'uptime'] c. Use the get() method to print the device's MAC address: >>> print(runt.get("system.mac")) This will return the MAC address of the device. 6. Use the stop() method to close the runtime database: 7. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit(). Modify the runtime database Use the set() method to modify the runtime database: 1. Log into the IX20 command line as a user with shell access. Depending on your device configuration, you may be presented with an Access selection menu. Type shell to access the device shell. 2. At the shell prompt, use the python command with no parameters to enter an interactive Python session: # python Python 3.6.10 (default, Jan 31 2020, 08:45:19) [GCC 8.3.0] on linux Type "help", "copyright", "credits" or "license" for more information. >>> 3. Import the runt submodule: >>> from digidevice import runt >>> 4. Use start() method to open the runtime database: >>> runt.start() >>> 5. Use the set() method to make changes to the runtime database: >>> runt.set("my-variable", "my-value") >>> IX20 User Guide 492 Applications Digidevice module 6. Use the get() method to verify the change: >>> print(runt.get("my-variable")) my-variable >>> 7. Close the runtime database: >>> runt.stop() >>> 8. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit(). Help for using Python to access the runtime database Get help for reading and modifying the device runtime database by accessing help for digidevice.runt: 1. Log into the IX20 command line as a user with shell access. Depending on your device configuration, you may be presented with an Access selection menu. Type shell to access the device shell. 2. At the shell prompt, use the python command with no parameters to enter an interactive Python session: # python Python 3.6.10 (default, Jan 31 2020, 08:45:19) [GCC 8.3.0] on linux Type "help", "copyright", "credits" or "license" for more information. >>> 3. Import the runt submodule: >>> from digidevice import runt >>> 4. Use the help command with runt: >>> help(runt) Help on module acl.runt in digidevice: NAME acl.runt - Python interface to ACL runtime database (runtd). ... 5. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit(). Use Python to upload the device name to Digi Remote Manager The name submodule can be used to upload a custom name for your device to Digi Remote Manager. When you use the name submodule to upload a custom device name to Remote Manager, the following issues apply: IX20 User Guide 493 Applications Digidevice module n If the name is being used by to another device in your Remote Manager account, the name will be removed from the previous device and added to the new device. n If Remote Manager is configured to apply a profile to a device based on the device name, changing the name of the device may cause Remote Manager to automatically push a profile onto the device. Together, these two features allow you to swap one device for another by using the name submodule to change the device name, while guaranteeing that the new device will have the same configuration as the previous one. Note Because causing a profile to be automatically pushed from Remote Manager may change the behavior of the device, including overwriting existing usernames and passwords, the name submodule should be used with caution. As a result, support for this functionality is disabled by default on Remote Manager. Enable support on Digi Remote Manager for uploading custom device names 1. In Remote Manager, select Documentation > API Explorer. 2. For Path, type /ws/v1/settings/inventory/AllowDeviceToSetOwnNameEnabled. 3. For HTTP Method, select POST. 4. In the HTTP message body text box, type the following: { "name" : "AllowDeviceToSetOwnNameEnabled", "value" : "true" } 5. Click Send. Upload a custom name 1. Log into the IX20 command line as a user with shell access. Depending on your device configuration, you may be presented with an Access selection menu. Type shell to access the device shell. 2. At the shell prompt, use the python command with no parameters to enter an interactive Python session: # python Python 3.6.10 (default, Jan 31 2020, 08:45:19) [GCC 8.3.0] on linux Type "help", "copyright", "credits" or "license" for more information. >>> 3. Import the name submodule: >>> from digidevice import name 4. Upload the name to Remote Manager: >>> name.upload("my_name") IX20 User Guide 494 Applications Digidevice module 5. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit(). Help for upload the device name to Digi Remote Manager Get help for uploading the device name to Digi Remote Managerby accessing help for digidevice.name: 1. Log into the IX20 command line as a user with shell access. Depending on your device configuration, you may be presented with an Access selection menu. Type shell to access the device shell. 2. At the shell prompt, use the python command with no parameters to enter an interactive Python session: # python Python 3.6.10 (default, Jan 31 2020, 08:45:19) [GCC 8.3.0] on linux Type "help", "copyright", "credits" or "license" for more information. >>> 3. Import the name submodule: >>> from digidevice import name >>> 4. Use the help command with name: >>> help(name) Help on module digidevice.name in digidevice: NAME digidevice.name - API for uploading name from the device ... 5. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit(). Use Python to send and receive SMS messages You can create Python scripts that send and receive SMS message in tandem with the Digi Remote Manager or Digi aView by using the digidevice.sms module. To use a script to send or receive SMS messages, you must also enable the ability to schedule SMS scripting. Enable the ability to schedule SMS scripting WebUI IX20 User Guide 495 Applications Digidevice module 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click System > Scheduled tasks. 4. Click to enable Allow scheduled scripts to handle SMS. 5. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> IX20 User Guide 496 Applications Digidevice module 3. At the config prompt, type: (config)> system schedule sms_script_handling true (config)> 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. See Configure applications to run automatically for more information about scheduling scripts. Example digidevice.sms code The following example code receives an SMS message and sends a response: #!/usr/bin/python3.6 import os import threading from digidevice.sms import Callback, send c = threading.Condition() def sms_test_callback(sms): print(f"SMS message from {sms['from']}received" print(sms['message']) c.acquire() c.notify() c.release() my_callback = Callback(sms_test_callback) print "sending SMS message" send("destination", "message") print " Please send an SMS message now." print "Execution halted until a message is received or 60 seconds have passed." # acquire the semaphore and wait until a callback occurs c.acquire() try: c.wait(60.0) except Exception, e: print "exception occured while waiting" print e c.release() my_callback.unregister_callback() IX20 User Guide 497 Applications Use Python to access serial ports Use Python to access serial ports You can use the Python serial module to access serial ports on your IX20 device that are configured to be in Application mode. See Configure the serial port for information about configuring a serial port in Application mode. To use Python to access serial ports: 1. Log into the IX20 command line as a user with shell access. Depending on your device configuration, you may be presented with an Access selection menu. Type shell to access the device shell. 2. Determine the path to the serial port: # ls /dev/serial/ by-id by-path by-usb # port1 3. At the shell prompt, use the python command with no parameters to enter an interactive Python session: # python Python 3.6.10 (default, Jan 31 2020, 08:45:19) [GCC 8.3.0] on linux Type "help", "copyright", "credits" or "license" for more information. >>> 4. Import the serial module: >>> import serial >>> 5. You can now perform operations on the serial port. For example, to write a message to the serial port: >>> s = serial.Serial("/dev/serial/port1", 115200) >>> s.write(b"Hello from serial port") 26 >>> 6. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit(). Use the Paho MQTT python library Your IX20 device includes support for the Paho MQTT python library. MQTT is a lightweight messaging protocol used to communicate with various applications including cloud-based applications such as Amazon Web Services and Microsoft Azure. The following is example code that reads some data from updates the device firmware, then publishes information about DHCP clients and system information to the MQTT server. """ MQTT client example: - Reporting some device metrics from runt - Reporting DHCP clients - Firmware update feature (simple implementation, read TODO in cmd_fwupdate) IX20 User Guide 498 Applications Use the Paho MQTT python library """ import sys import time import paho.mqtt.client as mqtt import json from acl import runt, config from http import HTTPStatus import urllib.request import tempfile import os from digidevice import cli POLL_TIME = 60 def cmd_reboot(params): print("Rebooting unit...") try: cli.execute("reboot", 10) except: print("Failed to run 'reboot' command") return HTTPStatus.INTERNAL_SERVER_ERROR return HTTPStatus.OK def cmd_fwupdate(params): try: fw_uri = params["uri"] except: print("Firmware file URI not passed") return HTTPStatus.BAD_REQUEST print("Request to update firmware with URI: {}".format(fw_uri)) try: fd, fname = tempfile.mkstemp() os.close(fd) try: urllib.request.urlretrieve(fw_uri, fname) except: print("Failed to download FW file from URI {}".format(fw_uri)) return HTTPStatus.NOT_FOUND try: ret = cli.execute("system firmware update file " + fname, 60) except: print("Failed to run firmware update command") return HTTPStatus.INTERNAL_SERVER_ERROR if not "Firmware update completed" in ret: print("Failed to update firmware") return HTTPStatus.INTERNAL_SERVER_ERROR finally: os.remove(fname) print("Firmware update finished") return HTTPStatus.OK CMD_HANDLERS = { IX20 User Guide 499 Applications Use the Paho MQTT python library "reboot": cmd_reboot, "fw-update": cmd_fwupdate } def send_cmd_reply(client, cmd_path, cid, cmd, status): if not status or not cid: return if cmd_path.startswith(PREFIX_CMD): path = cmd_path[len(PREFIX_CMD):] else: print("Invalid command path ({}), cannot send reply".format(cmd_path)) return reply = { "cmd": cmd, "status": status } client.publish(PREFIX_RSP + path + "/" + cid, json.dumps(reply, separators= (',',':'))) def on_connect(client, userdata, flags, rc): print("Connected to MQTT server") client.subscribe(PREFIX_CMD + "/system") def on_message(client, userdata, msg): """ Supporting only a single topic for now, no need for filters Expects the following message format: { "cid": "<client-id>", "cmd": "<command>", "params": { <optional_parameters> } } Supported commands: - "fw-update" params: - "uri": "<firmware_file_URL>" - "reboot" params: """ try: m = json.loads(msg.payload) cid = m["cid"] cmd = m["cmd"] try: payload = m["params"] except: payload = None except: print("Invalid command format: {}".format(msg.payload)) if not cid: # Return if client-ID not passed return None send_cmd_reply(client, msg.topic, cid, cmd, HTTPStatus.BAD_REQUEST) IX20 User Guide 500 Applications Use the Paho MQTT python library try: status = CMD_HANDLERS[cmd](payload) except: print("Invalid command: {}".format(cmd)) status = HTTPStatus.NOT_IMPLEMENTED send_cmd_reply(client, msg.topic, cid, cmd, status) def publish_dhcp_leases(): leases = [] try: with open('/etc/config/dhcp.leases', 'r') as f: for line in f: elems = line.split() if len(elems) != 5: continue leases.append({"mac": elems[1], "ip": elems[2], "host": elems [3]}) if leases: client.publish(PREFIX_EVENT + "/leases", json.dumps(leases, separators=(',',':'))) except: print("Failed to open DHCP leases file") def publish_system(): avg1, avg5, avg15 = runt.get("system.load_avg").split(', ') ram_used = runt.get("system.ram.per") disk_opt = runt.get("system.disk./opt.per") disk_config = runt.get("system.disk./etc/config.per") msg = json.dumps({ "load_avg": { "1min": avg1, "5min": avg5, "15min": avg15 }, "disk_usage": { "/opt": disk_opt, "/etc/config:": disk_config, "ram": ram_used } }) client.publish(PREFIX_EVENT + "/system", json.dumps(msg)) runt.start() serial = runt.get("system.serial") PREFIX = "router/" + serial PREFIX_EVENT = "event/" + PREFIX PREFIX_CMD = "cmd/" + PREFIX PREFIX_RSP = "rsp/" + PREFIX client = mqtt.Client() client.on_connect = on_connect client.on_message = on_message try: IX20 User Guide 501 Applications Stop a script that is currently running client.connect("192.168.1.100", 1883, 60) client.loop_start() except: print("Failed to connect to MQTT server") sys.exit(1) while True: publish_dhcp_leases() publish_system() time.sleep(POLL_TIME) Stop a script that is currently running You can stop a script that is currently running by using the system script stop name command. Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. Determine the name of scripts that are currently running: )> system script stop 0 script1 1 script2 > 3. Stop the appropriate script: )> system script stop script1 > 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Show script information You can view status and statistics about location information from either the WebUI or the command line. WebUI IX20 User Guide 502 Applications 1. Log into the IX20 WebUI as a user with Admin access. 2. At the Status page, click Scripts. The Scripts page displays: Show script information Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. Use the show scripts command at the system prompt: > show scripts Index Label Script Enabled Status Run time ----- --------------- ------ ------- ------ -------- 0 mgmt_intf_fixup #!/bin/sh -x send_mgmt_intf_update() { pri="$(runt get network.mgmt.log.default)" if [ "$pri" = 'pri' ]; then default_net="$(runt dump network.route.default | grep -m 1 -o "interface_.*=" | cut -f2 -d'_' | tr -d '=')" if [ -n "$default_net" ]; then default_intf="$(runt get network.interface.${default_net}.device)" runt set network.mgmt.log.intf "$default_intf" fi log=$(runt log network.mgmt.log) accns_log network_mgmt "${log:+type=mgmt~}$log" fi } ... > 3. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 503 User authentication This chapter contains the following topics: IX20 user authentication 505 User authentication methods 505 Authentication groups 512 Local users 522 Terminal Access Controller Access-Control System Plus (TACACS+) 534 Remote Authentication Dial-In User Service (RADIUS) 542 LDAP 549 Disable shell access 556 Set the idle timeout for IX20 users 557 Example user configuration 560 IX20 User Guide 504 User authentication IX20 user authentication IX20 user authentication User authentication on the IX20 has the following features and default configuration: Feature Idle timeout Allow shell Description Determines how long a user session can be idle before the system automatically disconnects. If disabled, prevents all authentication prohibits access to the shell prompt for all authentication groups. This does not prevent access to the Admin CLI. Default configuration n 10 minutes. n Enabled. Note If shell access is disabled, re-enabling it will erase the device's configuration and perform a factory reset. Methods Groups Users TACACS+ RADIUS LDAP Determines how users are authenticated for access: local users, TACACS+, or RADIUS. Associates access permissions for a group. . You can modify the released groups and create additional groups as needed for your site. A user can be assigned to more than one group. Defines local users for the IX20. Configures support for TACACS+ (Terminal Access Controller Access-Control System Plus) servers and users. Configures support for RADIUS (Remote Authentication Dial-In User Service) servers and users. Configures support for LDAP (Lightweight Directory Access Protocol) servers and users. n local users. n admin: Provides the logged-in user with administrative and shell access. n serial: Provides the logged-in user with access to serial ports. n admin: Belongs to both the admin and serial groups. n Not configured. n Not configured. n Not configured. User authentication methods Authentication methods determine how users of the IX20 device are authenticated. Available authentication methods are: IX20 User Guide 505 User authentication User authentication methods n Local users: User are authenticated on the local device. n RADIUS: Users authenticated by using a remote RADIUS server for authentication. See Remote Authentication Dial-In User Service (RADIUS) for information about configuring RADIUS authentication. n TACACS+: Users authenticated by using a remote TACACS+ server for authentication. See Terminal Access Controller Access-Control System Plus (TACACS+) for information about configuring TACACS+ authentication. n LDAP: Users authenticated by using a remote LDAP server for authentication. See LDAP for information about configuring LDAP authentication. IX20 User Guide 506 User authentication Add a new authentication method Required configuration items n The types of authentication method to be used: To add an authentication method: User authentication methods WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Authentication > Methods. 4. For Add Method, click . 5. Select the appropriate authentication type for the new method from the Method drop-down. Note Authentication methods are attempted in the order they are listed until the first successful authentication result is returned. See Rearrange the position of authentication methods for information about how to reorder the authentication methods. IX20 User Guide 507 User authentication 6. Repeat these steps to add additional methods. 7. Click Apply to save the configuration and apply the change. User authentication methods Command line Authentication methods are attempted in the order they are listed until the first successful authentication result is returned. This procedure describes how to add methods to various places in the list. 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add the new authentication method to the appropriate location in the list: n To determine the current list of authentication methods: a. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. b. At the command line, type config to enter configuration mode: > config (config)> c. Use the show auth method command to display the current authentication methods configuration: (config)> show auth method 0 local (config)> n To add the new authentication method to the beginning of the list, use the index value of 0 to indicate that it should be added as the first method: (config)> add auth method 0 auth_type (config)> where auth_type is one of local, radius, tacacs+, or ldap. n To add the new authentication method to the end of the list, use the index keyword end: IX20 User Guide 508 User authentication User authentication methods (config)> add auth method end auth_type (config)> where auth_type is one of local, radius, tacacs+, or ldap. n To add the new authentication in another location in the list, use an index value to indicate the appropriate position. For example: (config)> add auth method 1 auth_type (config)> where auth_type is one of local, radius, tacacs+, or ldap. n You can also use the move command to rearrange existing methods. See Rearrange the position of authentication methods for information about how to reorder the authentication methods. 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Delete an authentication method WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Authentication > Methods. IX20 User Guide 509 User authentication User authentication methods 4. Click the menu icon (...) next to the method and select Delete. 5. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Use the show auth method command to determine the index number of the authentication method to be deleted: (config)> show auth method 0 local 1 radius 2 tacacs+ (config)> 4. Delete the appropriate authentication method: (config)> del auth method n Where n is index number of the authentication method to be deleted. For example, to delete the TACACS+ authentication method as displayed by the example show command, above: (config)> del auth method 2 5. Save the configuration and apply the change: (config)> save Configuration saved. > 6. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 510 User authentication User authentication methods Rearrange the position of authentication methods WebUI Authentication methods are reordered by changing the method type in the Method drop-down for each authentication method to match the appropriate order. For example, the following configuration has Local users as the first method, and RADIUS as the second. To reorder these so that RADIUS is first and Local users is second: 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click to expand the first Method. 4. In the Method drop-down, select RADIUS. 5. Click to expand the second Method. 6. In the Method drop-down, select Local users. IX20 User Guide 511 User authentication 7. Click Apply to save the configuration and apply the change. Authentication groups Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Use the show command to display current configuration: (config)> show auth method 0 local 1 radius (config)> 4. Use the move command to rearrange the methods: (config)> move auth method 1 0 (config)> 5. Use the show command again to verify the change: (config)> show auth method 0 radius 1 local (config)> 6. Save the configuration and apply the change: (config)> save Configuration saved. > 7. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Authentication groups Authentication groups are used to assign access rights to IX20 users. Three types of access rights can be assigned: IX20 User Guide 512 User authentication Authentication groups n Admin access: Users with Admin access can be configured to have either: l The ability to manage the IX20 device by using the WebUI or the Admin CLI. l Read-only access to the WebUI and Admin CLI. n Shell access: Users with Shell access have the ability to access the shell when logging into the IX20 via ssh, telnet, or the serial console. Shell access is not available if the Allow shell parameter has been disabled. See Disable shell access for more information about the Allow shell parameter. n Serial access: Users with Serial access have the ability to log into the IX20 device by using the serial console. Preconfigured authentication groups The IX20 device has two preconfigured authentication groups: n The admin group is configured by default to have full Admin access and Shell access. Shell access is not available if the Allow shell parameter has been disabled. See Disable shell access for more information about the Allow shell parameter. n The serial group is configured by default to have Serial access. The preconfigured authentication groups cannot be deleted, but the access rights defined for the group are configurable. This section contains the following topics: Change the access rights for a predefined group 514 Add an authentication group 516 Delete an authentication group 520 IX20 User Guide 513 User authentication Authentication groups Change the access rights for a predefined group By default, two authentication groups are predefined: admin and serial. To change the access rights of the predefined groups: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Authentication > Groups. 4. Click the authentication group to be changed, either admin or serial, to expand its configuration node. 5. Click the box next to the following options, as appropriate, to enable or disable access rights for each: n Admin access For groups assigned Admin access, you can also determine whether the Access level should be Full access or Read-only access. l Full access provides users of this group with the ability to manage the IX20 device by using the WebUI or the Admin CLI. l Read-only access provides users of this group with read-only access to the WebUI and Admin CLI. The default is Full access. n Interactive shell access Shell access is not available if the Allow shell parameter has been disabled. See Disable shell access for more information about the Allow shell parameter. n Serial access IX20 User Guide 514 User authentication Authentication groups 6. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Enable or disable access rights for the group. For example: n Admin access: l To set the access level for Admin access of the admin group: (config)> auth group admin acl admin level value (config)> where value is either: o full: provides users of this group with the ability to manage the IX20 device by using the WebUI or the Admin CLI. o read-only: provides users of this group with read-only access to the WebUI and Admin CLI. The default is full. IX20 User Guide 515 User authentication Authentication groups l To disable Admin access for the admin group: (config)> auth group admin acl admin enable false (config)> n Shell access: l To enable Shell access for the serial group: (config)> auth group serial acl shell enable true (config)> Shell access is not available if the Allow shell parameter has been disabled. See Disable shell access for more information about the Allow shell parameter. n Serial access: l To enable Serial access for the admin group: (config)> auth group admin acl serial enable true (config)> 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Add an authentication group Required configuration items n The access rights to be assigned to users that are assigned to this group. Additional configuration items n Access rights to OpenVPN tunnels, and the tunnels to which they have access. n Access rights to captive portals, and the portals to which they have access. n Access rights to query the device for Nagios monitoring. To add an authentication group: WebUI IX20 User Guide 516 User authentication Authentication groups 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Authentication > Groups. 4. For Add, type a name for the group and click . The group configuration window is displayed. 5. Click the following options, as appropriate, to enable or disable access rights for each: n Admin access For groups assigned Admin access, you can also determine whether the Access level should be Full access or Read-only access. where value is either: l Full access full: provides users of this group with the ability to manage the IX20 device by using the WebUI or the Admin CLI. l Read-only access read-only: provides users of this group with read-only access to the WebUI and Admin CLI. IX20 User Guide 517 User authentication Authentication groups The default is Full access full. n Shell access Shell access is not available if the Allow shell parameter has been disabled. See Disable shell access for more information about the Allow shell parameter. n Serial access 6. (Optional) Configure OpenVPN access. See for further information. 7. (Optional) Configure captive portal access: a. Enable captive portal access rights for users of this group by checking the box next to Captive portal access. b. Click Captive portals to expand the Captive portal node. c. For Add Captive portal, click . d. In the Captive portal dropdown, select a captive portal to which users of this group will have access. e. Click again to add additional captive portals. 8. (Optional) Enable users that belong to this group to query the device for Nagios monitoring by checking the box next to Nagios access. 9. (Optional) Enable users that belong to this group to access the Bluetooth scanning service by checking the box next to Bluetooth scanner access. 10. (Optional) Enable users that belong to this group to access the Wi-Fi scanning service by checking the box next to Wi-Fi scanner access. 11. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Use the add auth group command to add a new authentication. For example, to add a group named test: (config)> add auth group test (config auth group test)> IX20 User Guide 518 User authentication Authentication groups 4. Enable access rights for the group: n Admin access: (config auth group test)> acl admin enable true (config)> n Set the access level for Admin access: (config)> auth group admin acl admin level value (config)> where value is either: l full: provides users of this group with the ability to manage the IX20 device by using the WebUI or the Admin CLI. l read-only: provides users of this group with read-only access to the WebUI and Admin CLI. The default is full. n Shell access: (config auth group test)> acl shell enable true (config)> Shell access is not available if the Allow shell parameter has been disabled. See Disable shell access for more information about the Allow shell parameter. n Serial access: (config auth group test)> acl serial enable true (config)> 5. (Optional) Configure captive portal access: a. Return to the config prompt by typing three periods (...): (config auth group test)> ... (config)> b. Enable captive portal access rights for users of this group: (config)> auth group test acl portal enable true (config)> c. Add a captive portal to which users of this group will have access: i. Determine available portals: (config)> show firewall portal portal1 auth none enable true http redirect no interface no message IX20 User Guide 519 User authentication Authentication groups no redirect_url no terms timeout 24h no title (config)> ii. Add a captive portal: (config)> add auth group test acl portal portals end portal1 (config)> 6. (Optional) Configure Nagios monitoring: (config)> auth group test acl nagios enable true (config)> 7. (Optional) Enable users that belong to this group to access the Bluetooth scanning service: (config)> auth group test acl bluetooth_scanner enable true (config)> 8. (Optional) Enable users that belong to this group to access the Wi-Fi scanning service: (config)> auth group group test acl wifi_scanner enable true (config)> 9. Save the configuration and apply the change: (config)> save Configuration saved. > 10. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Delete an authentication group By default, the IX20 device has two preconfigured authentication groups: admin and serial. These groups cannot be deleted. To delete an authentication group that you have created: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 520 User authentication Authentication groups 3. Click Authentication > Groups. 4. Click the menu icon (...) next to the group to be deleted and select Delete. 5. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. At the config prompt, type: (config)> del auth group groupname 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 521 User authentication Local users Local users Local users are authenticated on the device without using an external authentication mechanism such as TACACS+ or RADIUS. Local user authentication is enabled by default, with one preconfiged default user. Default user At manufacturing time, each IX20 device comes with a default user configured as follows: n Username: admin. n Password: The default password is displayed on the label on the bottom of the device. Note The default password is a unique password for the device, and is the most critical security feature for the device. If you reset the device to factory defaults, you must log in using the default user and password, and you should immediately change the password to a custom password. Before deploying or mounting the IX20 device, record the default password, so you have the information available when you need it even if you cannot physically access the label on the bottom of the device. The default admin user is preconfigured with both Admin and Serial access. You can configure the admin user account to fit with the needs of your environment. This section contains the following topics: Change a local user's password 523 Configure a local user 524 Delete a local user 532 IX20 User Guide 522 User authentication Local users Change a local user's password To change a user's password: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Authentication > Users. 4. Click the username to expand the user's configuration node. 5. For Password, enter the new password. The password must be at least ten characters long and must contain at least one uppercase letter, one lowercase letter, one number, and one special character. You can also change the password for the active user by clicking the user name in the menu bar: IX20 User Guide 523 User authentication Local users The active user must have full Admin access rights to be able to change the password. 6. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. At the config prompt, type: (config)> auth user username password pwd Where: n username is the name of the user. n pwd is the new password for the user. The password must be at least ten characters long and must contain at least one uppercase letter, one lowercase letter, one number, and one special character. 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure a local user Required configuration items n A username. n A password. The password must be at least ten characters long and must contain at least one uppercase letter, one lowercase letter, one number, and one special character. For security reasons, passwords are stored in hash form. There is no way to get or display passwords in clear-text form, although prior to saving the configuration, the password can be shown by clicking Reveal. n The authentication group or groups from which the user will inherit access rights. See Authentication groups for information about configuring groups. IX20 User Guide 524 User authentication Local users Additional configuration items n The number of unsuccessful login attempts before the user is locked out of the system. n The amount of time that the user is locked out of the system after the specified number of unsuccessful login attempts. n An optional public ssh key, to authenticate the user when using passwordless SSH login. n Two-factor authentication information for user login over SSH, telnet, and the serial console: l The verification type for two-factor authentication: Either time-based or counter-based. l The security key. l Whether to allow passcode reuse (time based verification only). l The passcode refresh interval (time based verification only). l The valid code window size. l The login limit. l The login limit period. l One-time use eight-digit emergency scratch codes. To configure a local user: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Authentication > Users. IX20 User Guide 525 User authentication 4. In Add User, type a name for the user and click . Local users The user configuration window is displayed. The user is enabled by default. To disable, click to toggle off Enable. 5. Enter a password for the user. The password must be at least ten characters long and must contain at least one uppercase letter, one lowercase letter, one number, and one special character. 6. Click to expand Login failure lockout. The login failure lockout feature is enabled by default. To disable, click to toggle off Enable. a. For Lockout tries, type the number of unsuccessful login attempts before the user is locked out of the device. The default is 5. b. For Lockout duration, type the amount of time that the user is locked out after the number of unsuccessful login attempts defined in Lockout tries. Allowed values are any number of minutes, or seconds, and take the format number{m|s}. For example, to set Lockout duration to ten minutes, enter 10m or 600s. The minimum value is 1 second, and the maximum is 15 minutes. The default is 15 minutes. 7. Add groups for the user. Groups define user access rights. See Authentication groups for information about configuring groups. a. Click to expand Groups. b. For Add Group, click . IX20 User Guide 526 User authentication c. For Group, select an appropriate group. Local users Note Every user must be configured with at least one group. You can add multiple groups to a user by clicking Add again and selecting the next group. 8. (Optional) Add SSH keys for the user to use passwordless SSH login: a. Click SSH keys. b. In Add SSH key, paste or type a public encryption key that this user can use for passwordless SSH login and click . 9. (Optional) Configure two-factor authentication for SSH, telnet, and serial console login: a. Click Two-factor authentication. b. Check Enable to enable two-factor authentication for this user. c. Select the Verification type: n Time-based (TOTP): Time-based One-Time Password (TOTP) authentication uses the current time to generate a one-time password. n Counter-based (HOTP): HMAC-based One-Time Password (HOTP) uses a counter to validate a one-time password. d. Generate a Secret key: i. Click ... next to the field label and select Generate secret key. ii. To display the QR code for the secret key, click ... next to the field label and select Show secret key QR code. iii. Copy the secret key, or scan or copy the QR code, for use with an application or mobile device to generate passcodes. Note To copy the QR code, right-click the QR code and select your browser's save image functionality. e. For time-based verification only, select Disallow code reuse to prevent a code from being used more than once during the time that it is valid. f. For time-based verification only, in Code refresh interval, type the amount of time that a code will remain valid. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Code refresh interval to ten minutes, enter 10m or 600s. IX20 User Guide 527 User authentication Local users g. In Valid code window size, type the allowed number of concurrently valid codes. In cases where TOTP is being used, increasing the Valid code window size may be necessary when the clocks used by the server and client are not synchronized. h. For Login limit, type the number of times that the user is allowed to attempt to log in during the Login limit period. Set Login limit to 0 to allow an unlimited number of login attempts during the Login limit period. i. For Login limit period, type the amount of time that the user is allowed to attempt to log in. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Login limit period to ten minutes, enter 10m or 600s. j. Scratch codes are emergency codes that may be used once, at any time. To add a scratch code: i. Click Scratch codes. ii. For Add Code, click . iii. For Code, enter the scratch code. The code must be eight digits, with a minimum of 10000000. iv. Click again to add additional scratch codes. 10. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add a user. For example, to create a user named new_user: (config)> add auth user new_user (config auth user new_user)> The user is enabled by default. To disable the user, type: (config auth user new_user)> enable false (config auth user new_user)> 4. Set the user's password. The password must be at least ten characters long and must contain at least one uppercase letter, one lowercase letter, one number, and one special character. IX20 User Guide 528 User authentication Local users (config auth user new_user> password pwd (config auth user new_user)> 5. Configure login failure lockout settings: The login failure lockout feature is enabled by default. To disable: (config auth user new_user> lockout enable false (config auth user new_user)> a. Set the number of unsuccessful login attempts before the user is locked out of the device. where value is any integer. The minimum value is 1, and the default value is 5. b. Set the amount of time that the user is locked out after the number of unsuccessful login attempts defined in lockout tries: (config auth user new_user> lockout duration value (config auth user new_user)> where value is any number of minutes, or seconds, and takes the format number{m|s}. For example, to set duration to ten minutes, enter either 10m or 600s: (config auth user new_user)> lockout duration 600s (config auth user new_user)> The minimum value is 1 second, and the maximum is 15 minutes. The default is 15 minutes. 6. Add groups for the user. Groups define user access rights. See Authentication groups for information about configuring groups. a. Add a group to the user. For example, to add the admin group to the user: (config auth user new_user> add group end admin (config auth user new_user)> Note Every user must be configured with at least one group. b. (Optional) Add additional groups by repeating the add group command: (config auth user new_user> add group end serial (config auth user new_user)> To remove a group from a user: a. Use the show command to determine the index number of the group to be deleted: (config auth user new_user> show group 0 admin 1 serial (config auth user new_user> IX20 User Guide 529 User authentication Local users b. Type the following: (config auth user new_user)> del group n (config auth user new_user)> Where n is index number of the authentication method to be deleted. For example, to delete the serial group as displayed by the example show command, above: (config auth user new_user)> del group 1 (config auth user new_user)> 7. (Optional) Add SSH keys for the user to use passwordless SSH login: a. Change to the user's ssh_key node: (config auth user new_user)> ssh_key (config auth user new_user ssh_key)> b. Add the key by using the ssh_key command and pasting or typing a public encryption key that this user can use for passwordless SSH login: (config auth user new_user ssh_key)> ssh_key key (config auth user new_user ssh_key)> 8. (Optional) Configure two-factor authentication for SSH, telnet, and serial console login: a. Change to the user's two-factor authentication node: (config auth user new_user)> 2fa (config auth user new_user 2fa)> b. Enable two-factor authentication for this user: (config auth user new_user 2fa)> enable true (config auth user new_user 2fa)> c. Configure the verification type. Allowed values are: n totp: Time-based One-Time Password (TOTP) authentication uses the current time to generate a one-time password. n hotp: HMAC-based One-Time Password (HOTP) uses a counter to validate a onetime password. The default value is totp. (config auth user new_user 2fa)> type totp (config auth user new_user 2fa)> d. Add a secret key: (config auth user new_user 2fa)> secret key (config auth user new_user 2fa)> This key should be used by an application or mobile device to generate passcodes. e. For time-based verification only, enable disallow_reuse to prevent a code from being used more than once during the time that it is valid. IX20 User Guide 530 User authentication Local users (config auth user new_user 2fa)> disallow_reuse true (config auth user new_user 2fa)> f. For time-based verification only, configure the code refresh interval. This is the amount of time that a code will remain valid. (config auth user new_user 2fa)> refresh_interval value (config auth user new_user 2fa)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set refresh_interval to ten minutes, enter either 10m or 600s: (config auth user name 2fa)> refresh_interval 600s (config auth user name 2fa)> The default is 30s. g. Configure the valid code window size. This represents the allowed number of concurrently valid codes. In cases where TOTP is being used, increasing the valid code window size may be necessary when the clocks used by the server and client are not synchronized. (config auth user new_user 2fa)> window_size 3 (config auth user new_user 2fa)> h. Configure the login limit. This represents the number of times that the user is allowed to attempt to log in during the Login limit period. Set to 0 to allow an unlimited number of login attempts during the Login limit period (config auth user new_user 2fa)> login_limit 3 (config auth user new_user 2fa)> i. Configure the login limit period. This is the amount of time that the user is allowed to attempt to log in. (config auth user new_user 2fa)> login_limit_period value (config auth user new_user 2fa)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set login_limit_period to ten minutes, enter either 10m or 600s: (config auth user name 2fa)> login_limit_period 600s (config auth user name 2fa)> The default is 30s. j. Scratch codes are emergency codes that may be used once, at any time. To add a scratch code: IX20 User Guide 531 User authentication Local users i. Change to the user's scratch code node: (config auth user new_user 2fa)> scratch_code (config auth user new_user 2fa scratch_code)> ii. Add a scratch code: (config auth user new_user 2fa scratch_code)> add end code (config auth user new_user 2fa scratch_code)> Where code is an digit number, with a minimum of 10000000. iii. To add additional scratch codes, use the add end code command again. 9. Save the configuration and apply the change: (config auth user new 2fa scratch_code)> save Configuration saved. > 10. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Delete a local user To delete a user from your IX20: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Authentication > Users. IX20 User Guide 532 User authentication Local users 4. Click the menu icon (...) next to the name of the user to be deleted and select Delete. 5. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. At the config prompt, type: (config)> del auth user username 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 533 User authentication Terminal Access Controller Access-Control System Plus (TACACS+) Terminal Access Controller Access-Control System Plus (TACACS+) Your IX20 device supports Terminal Access Controller Access-Control System Plus (TACACS+), a networking protocol that provides centralized authentication and authorization management for users who connect to the device. With TACACS+ support, the IX20 device acts as a TACACS+ client, which sends user credentials and connection parameters to a TACACS+ server over TCP. The TACACS+ server then authenticates the TACACS+ client requests and sends back a response message to the device. When you are using TACACS+ authentication, you can have both local users and TACACS+ users able to log in to the device. To use TACACS+ authentication, you must set up a TACACS+ server that is accessible by the IX20 device prior to configuration. The process of setting up a TACACS+ server varies by the server environment. This section contains the following topics: TACACS+ user configuration 535 TACACS+ server failover and fallback to local authentication 536 Configure your IX20 device to use a TACACS+ server 536 IX20 User Guide 534 User authentication Terminal Access Controller Access-Control System Plus (TACACS+) TACACS+ user configuration When configured to use TACACS+ support, the IX20 device uses a remote TACACS+ server for user authentication (password verification) and authorization (assigning the access level of the user). Additional TACACS+ servers can be configured as backup servers for user authentication. This section outlines how to configure a TACACS+ server to be used for user authentication on your IX20 device. Example TACACS+ configuration With TACACS+, users are defined in the server configuration file. On Ubuntu, the default location and filename for the server configuration file is /etc/tacacs+/tac_plus.conf. Note TACACS+ configuration, including filenames and locations, may vary depending on your platform and installation. This example assumes a Ubuntu installation. To define users: 1. Open the TACACS+ server configuration file in a text editor. For example: $ sudo gedit /etc/tacacs+/tac_plus.conf 2. Add users to the file using the following format. This example will create two users, one with admin and serial access, and one with only serial access. user = user1 { name ="User1 for IX20" pap = cleartext password1 service = system { groupname = admin,serial } } user = user2 { name ="User2 for IX20" pap = cleartext password2 service = system { groupname = serial } } The groupname attribute is optional. If used, the value must correspond to authentication groups configured on your IX20. Alternatively, if the user is also configured as a local user on the IX20 device and the LDAP server authenticates the user but does not return any groups, the local configuration determines the list of groups. See Authentication groups for more information about authentication groups. The groupname attribute can contain one group or multiple groups in a comma-separated list. 3. Save and close the file. 4. Verify that your changes did not introduce any syntax errors: $ sudo tac_plus -C /etc/tacacs+/tac_plus.conf -P If successful, this command will echo the configuration file to standard out. If the command encounters any syntax errors, a message similar to this will display: IX20 User Guide 535 User authentication Terminal Access Controller Access-Control System Plus (TACACS+) Error: Unrecognised token on line 1 5. Restart the TACACS+ server: $ sudo /etc/init.d/tacacs_plus restart TACACS+ server failover and fallback to local authentication In addition to the primary TACACS+ server, you can also configure your IX20 device to use backup TACACS+ servers. Backup TACACS+ servers are used for authentication requests when the primary TACACS+ server is unavailable. Falling back to local authentication With user authentication methods, you can configure your IX20 device to use multiple types of authentication. For example, you can configure both TACACS+ authentication and local authentication, so that local authentication can be used as a fallback mechanism if the primary and backup TACACS+ servers are unavailable. Additionally, users who are configured locally but are not configured on the TACACS+ server are still able to log into the device. Authentication methods are attempted in the order they are listed until the first successful authentication result is returned; therefore if you want to ensure that users are authenticated first through the TACACS+ server, and only authenticated locally if the TACACS+ server is unavailable or if the user is not defined on the TACACS+ server, then you should list the TACACS+ authentication method prior to the Local users authentication method. See User authentication methods for more information about authentication methods. If the TACACS+ servers are unavailable and the IX20 device falls back to local authentication, only users defined locally on the device are able to log in. TACACS+ users cannot log in until the TACACS+ servers are brought back online. Configure your IX20 device to use a TACACS+ server This section describes how to configure a IX20 device to use a TACACS+ server for authentication and authorization. Required configuration items n Define the TACACS+ server IP address or domain name. n Define the TACACS+ server shared secret. n The group attribute configured in the TACACS+ server configuration. n The service field configured in the TACACS+ server configuration. n Add TACACS+ as an authentication method for your IX20 device. Additional configuration items n Whether other user authentication methods should be used in addition to the TACACS+ server, or if the TACACS+ server should be considered the authoritative login method. n The TACACS+ server port. It is configured to 49 by default. n Add additional TACACS+ servers in case the first TACACS+ server is unavailable. WebUI IX20 User Guide 536 User authentication Terminal Access Controller Access-Control System Plus (TACACS+) 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Authentication > TACACS+ > Servers. 4. Add TACACS+ servers: a. For Add server, click . b. For Hostname, type the hostname or IP address of the TACACS+ server. c. (Optional) Change the default Port setting to the appropriate port. Normally this should be left at the default setting of port 49. d. For Secret, type the TACACS+ server's shared secret. This is configured in the key parameter of the TACACS+ server's tac_plus.conf file, for example: key = testing123 e. (Optional) Click again to add additional TACACS+ servers. 5. (Optional) Enable Authoritative to prevent other authentication methods from being used if TACACS+ authentication fails. Other authentication methods will only be used if the TACACS+ server is unavailable. 6. (Optional) For Group attribute, type the name of the attribute used in the TACACS+ server's configuration to identify the IX20 authentication group or groups that the user is a member of. For example, in TACACS+ user configuration, the group attribute in the sample tac_plus.conf file is groupname, which is also the default setting in the IX20 configuration. IX20 User Guide 537 User authentication Terminal Access Controller Access-Control System Plus (TACACS+) 7. (Optional) For Service, type the value of the service attribute in the the TACACS+ server's configuration. For example, in TACACS+ user configuration, the value of the service attribute in the sample tac_plus.conf file is system, which is also the default setting in the IX20 configuration. 8. Add TACACS+ to the authentication methods: a. Click Authentication > Methods. b. For Add method, click . c. Select TACACS+ for the new method from the Method drop-down. Authentication methods are attempted in the order they are listed until the first successful authentication result is returned. See Rearrange the position of authentication methods for information about rearranging the position of the methods in the list. 9. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. (Optional) Prevent other authentication methods from being used if TACACS+ authentication fails. Other authentication methods will only be used if the TACACS+ server is unavailable. (config)> auth tacacs+ authoritative true (config)> 4. (Optional) Configure the group_attribute. This is the name of the attribute used in the TACACS+ server's configuration to identify the IX20 authentication group or groups that the user is a member of. For example, in TACACS+ user configuration, the group attribute in the sample tac_plus.conf file is groupname, which is also the default setting for the group_ IX20 User Guide 538 User authentication Terminal Access Controller Access-Control System Plus (TACACS+) attribute in the IX20 configuration. (config)> auth tacacs+ group_attribute attribute-name (config)> 5. (Optional) Configure the type of service. This is the value of the service attribute in the the TACACS+ server's configuration. For example, in TACACS+ user configuration, the value of the service attribute in the sample tac_plus.conf file is system, which is also the default setting in the IX20 configuration. (config)> auth tacacs+ service service-name (config)> 6. Set the type of TLS connection used by the LDAP server: (config)> auth ldap tls value (config)> where value is one of: n off: Uses a non-secure TCP connection on the LDAP standard port, 389. n on: Uses an SSL/TLS encrypted connection on port 636. n start_tls: Makes a non-secure TCP connection to the LDAP server on port 389, then sends a request to upgrade the connection to a secure TLS connection. This is the preferred method for LDAP. The default is off. 7. If tls is set to on or start_tls, configure whether to verify the server certificate: (config)> auth ldap verify_server_cert value (config)> where value is either: n true: Verifies the server certificate with a known Certificate Authority. n false: Does not verify the certificate. Use this option if the server is using a self-signed certificate. The default is true. 8. Set the distinguished name (DN) that is used to bind to the LDAP server and search for users. Leave this option unset if the server allows anonymous connections. (config)> auth ldap bind_dn dn_value (config)> For example: (config)> auth ldap bind_dn cn=user,dc=example,dc=com (config)> 9. Set the password used to log into the LDAP server. Leave this option unset if the server allows anonymous connections. IX20 User Guide 539 User authentication Terminal Access Controller Access-Control System Plus (TACACS+) (config)> auth ldap bind_password password (config)> 10. Set the distinguished name (DN) on the server to search for users. This can be the root of the directory tree (for example, dc=example,dc=com) or a sub-tree (for example. ou=People,dc=example,dc=com). (config)> auth ldap base_dn value (config)> 11. (Optional) Set the name of the user attribute that contains the list of IX20 authentication groups that the authenticated user has access to. See LDAP user configuration for further information about the group attribute. (config)> auth ldap group_attribute value (config)> For example: (config)> auth ldap group_attribute ou (config)> 12. Configure the amount of time in seconds to wait for the TACACS+ server to respond. (config)> auth ldap timeout value (config)> where value is any integer from 3 to 60. The default value is 3. 13. Add an TACACS+ server: a. Add the server: (config)> add auth tacacs+ server end (config auth tacacs+ server 0)> b. Enter the TACACS+ server's IP address or hostname: (config auth tacacs+ server 0)> hostname hostname|ip-address (config auth tacacs+ server 0)> c. (Optional) Change the default port setting to the appropriate port: (config auth tacacs+ server 0)> port port (config auth tacacs+ server 0)> d. Enter the TACACS+ server's shared secret. This is configured in the key parameter of the TACACS+ server's tac_plus.conf file. For example: (config auth tacacs+ server 0)> secret testing123 (config auth tacacs+ server 0)> e. (Optional) Repeat the above steps to add additional TACACS+ servers. 14. Add TACACS+ to the authentication methods. Authentication methods are attempted in the order they are listed until the first successful authentication result is returned. This example IX20 User Guide 540 User authentication Terminal Access Controller Access-Control System Plus (TACACS+) will add TACACS+ to the end of the list. See User authentication methods for information about adding methods to the beginning or middle of the list. (config)> add auth method end tacacs+ (config)> 15. Save the configuration and apply the change: (config)> save Configuration saved. > 16. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 541 User authentication Remote Authentication Dial-In User Service (RADIUS) Remote Authentication Dial-In User Service (RADIUS) Your IX20 device supports Remote Authentication Dial-In User Service (RADIUS), a networking protocol that provides centralized authentication and authorization management for users who connect to the device. With RADIUS support, the IX20 device acts as a RADIUS client, which sends user credentials and connection parameters to a RADIUS server over UDP. The RADIUS server then authenticates the RADIUS client requests and sends back a response message to the device. When you are using RADIUS authentication, you can have both local users and RADIUS users able to log in to the device. To use RADIUS authentication, you must set up a RADIUS server that is accessible by the IX20 device prior to configuration. The process of setting up a RADIUS server varies by the server environment. An example of a RADIUS server is FreeRADIUS. This section contains the following topics: RADIUS user configuration 543 RADIUS server failover and fallback to local configuration 543 Configure your IX20 device to use a RADIUS server 544 IX20 User Guide 542 User authentication Remote Authentication Dial-In User Service (RADIUS) RADIUS user configuration When configured to use RADIUS support, the IX20 device uses a remote RADIUS server for user authentication (password verification) and authorization (assigning the access level of the user). Additional RADIUS servers can be configured as backup servers for user authentication. This section outlines how to configure a RADIUS server to be used for user authentication on your IX20 device. Example FreeRADIUS configuration With FreeRADIUS, users are defined in the users file in your FreeRADIUS installation. To define users: 1. Open the FreeRadius user file in a text editor. For example: $ sudo gedit /etc/freeradius/3.0/users 2. Add users to the file using the following format: user1 Cleartext-Password := "user1" Unix-FTP-Group-Names := "admin" user2 Cleartext-Password := "user2" Unix-FTP-Group-Names := "serial" The Unix-FTP-Group-Names attribute is optional. If used, the value must correspond to authentication groups configured on your IX20. Alternatively, if the user is also configured as a local user on the IX20 device and the RADIUS server authenticates the user but does not return any groups, the local configuration determines the list of groups. See Authentication groups for more information about authentication groups. The Unix-FTP-Group-Names attribute can contain one group or multiple groups in a comma-separated list. 3. Save and close the file. 4. Verify that your changes did not introduce any syntax errors: $ sudo freeradius -CX This should return a message that completes similar to: ... Configuration appears to be OK 5. Restart the FreeRADIUS server: $ sudo /etc/init.d/freeradius restart RADIUS server failover and fallback to local configuration In addition to the primary RADIUS server, you can also configure your IX20 device to use backup RADIUS servers. Backup RADIUS servers are used for authentication requests when the primary RADIUS server is unavailable. Falling back to local authentication With user authentication methods, you can configure your IX20 device to use multiple types of authentication. For example, you can configure both RADIUS authentication and local authentication, so that local authentication can be used as a fallback mechanism if the primary and backup RADIUS IX20 User Guide 543 User authentication Remote Authentication Dial-In User Service (RADIUS) servers are unavailable. Additionally, users who are configured locally but are not configured on the RADIUS server are still able to log into the device. Authentication methods are attempted in the order they are listed until the first successful authentication result is returned; therefore if you want to ensure that users are authenticated first through the RADIUS server, and only authenticated locally if the RADIUS server is unavailable or if the user is not defined on the RADIUS server, then you should list the RADIUS authentication method prior to the Local users authentication method. See User authentication methods for more information about authentication methods. If the RADIUS servers are unavailable and the IX20 device falls back to local authentication, only users defined locally on the device are able to log in. RADIUS users cannot log in until the RADIUS servers are brought back online. Configure your IX20 device to use a RADIUS server This section describes how to configure a IX20 device to use a RADIUS server for authentication and authorization. Required configuration items n Define the RADIUS server IP address or domain name. n Define the RADIUS server shared secret. n Add RADIUS as an authentication method for your IX20 device. Additional configuration items n Whether other user authentication methods should be used in addition to the RADIUS server, or if the RADIUS server should be considered the authoritative login method. n The RADIUS server port. It is configured to 1812 by default. n Add additional RADIUS servers in case the first RADIUS server is unavailable. n The server NAS ID. If left blank, the default value is used: l If you are access the IX20 device by using the WebUI, the default value is for NAS ID is httpd. l If you are access the IX20 device by using ssh, the default value is sshd. n Time in seconds before the request to the server times out. The default is 3 seconds and the maximum possible value is 60 seconds. n Enable additional debug messages from the RADIUS client. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 544 User authentication Remote Authentication Dial-In User Service (RADIUS) 3. Click Authentication > RADIUS > Servers. 4. Add RADIUS servers: a. For Add server, click . b. For Hostname, type the hostname or IP address of the RADIUS server. c. (Optional) Change the default Port setting to the appropriate port. Normally this should be left at the default setting of port 1812. d. For Secret, type the RADIUS server's shared secret. This is configured in the secret parameter of the RADIUS server's client.conf file, for example: secret=testing123 e. For Timeout, type or select the amount of time in seconds to wait for the RADIUS server to respond. Allowed value is any integer from 3 to 60. The default value is 3. f. (Optional) Click again to add additional RADIUS servers. 5. (Optional) Enable Authoritative to prevent other authentication methods from being used if RADIUS authentication fails. Other authentication methods will only be used if the RADIUS server is unavailable. 6. (Optional) Click RADIUS debug to enable additional debug messages from the RADIUS client. 7. (Optional) For NAS ID, type the unique identifier for this network access server (NAS). You can use the fully-qualified domain name of the NAS or any arbitrary string. If not set, the default value is used: n If you are accessing the IX20 device by using the WebUI, the default value is for NAS ID is httpd. n If you are accessing the IX20 device by using ssh, the default value is sshd. IX20 User Guide 545 User authentication Remote Authentication Dial-In User Service (RADIUS) 8. Add RADIUS to the authentication methods: a. Click Authentication > Methods. b. For Add method, click . c. Select RADIUS for the new method from the Method drop-down. Authentication methods are attempted in the order they are listed until the first successful authentication result is returned. See Rearrange the position of authentication methods for information about rearranging the position of the methods in the list. 9. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. (Optional) Prevent other authentication methods from being used if RADIUS authentication fails. Other authentication methods will only be used if the RADIUS server is unavailable. (config)> auth tacacs+ authoritative true (config)> 4. (Optional) Enable debug messages from the RADIUS client: (config)> auth radius debug true (config)> 5. (Optional) Configure the NAS ID. This is a unique identifier for this network access server (NAS). You can use the fully-qualified domain name of the NAS or any arbitrary string. If not set, the default value is used: IX20 User Guide 546 User authentication Remote Authentication Dial-In User Service (RADIUS) n If you are accessing the IX20 device by using the WebUI, the default value is for NAS ID is httpd. n If you are accessing the IX20 device by using ssh, the default value is sshd. (config)> auth radius nas_id id (config)> 6. Set the type of TLS connection used by the LDAP server: (config)> auth ldap tls value (config)> where value is one of: n off: Uses a non-secure TCP connection on the LDAP standard port, 389. n on: Uses an SSL/TLS encrypted connection on port 636. n start_tls: Makes a non-secure TCP connection to the LDAP server on port 389, then sends a request to upgrade the connection to a secure TLS connection. This is the preferred method for LDAP. The default is off. 7. If tls is set to on or start_tls, configure whether to verify the server certificate: (config)> auth ldap verify_server_cert value (config)> where value is either: n true: Verifies the server certificate with a known Certificate Authority. n false: Does not verify the certificate. Use this option if the server is using a self-signed certificate. The default is true. 8. Set the distinguished name (DN) that is used to bind to the LDAP server and search for users. Leave this option unset if the server allows anonymous connections. (config)> auth ldap bind_dn dn_value (config)> For example: (config)> auth ldap bind_dn cn=user,dc=example,dc=com (config)> 9. Set the password used to log into the LDAP server. Leave this option unset if the server allows anonymous connections. (config)> auth ldap bind_password password (config)> 10. Set the distinguished name (DN) on the server to search for users. This can be the root of the directory tree (for example, dc=example,dc=com) or a sub-tree (for example. ou=People,dc=example,dc=com). IX20 User Guide 547 User authentication Remote Authentication Dial-In User Service (RADIUS) (config)> auth ldap base_dn value (config)> 11. (Optional) Set the name of the user attribute that contains the list of IX20 authentication groups that the authenticated user has access to. See LDAP user configuration for further information about the group attribute. (config)> auth ldap group_attribute value (config)> For example: (config)> auth ldap group_attribute ou (config)> 12. Configure the amount of time in seconds to wait for the RADIUS server to respond. (config)> auth ldap timeout value (config)> where value is any integer from 3 to 60. The default value is 3. 13. Add an RADIUS server: a. Add the server: (config)> add auth radius server end (config auth radius server 0)> b. Enter the RADIUS server's IP address or hostname: (config auth radius server 0)> hostname hostname|ip-address (config auth radius server 0)> c. (Optional) Change the default port setting to the appropriate port: (config auth radius server 0)> port port (config auth radius server 0)> d. Enter the RADIUS server's shared secret. This is configured in the secret parameter of the RADIUS server's client.conf file. For example: (config auth radius server 0)> secret testing123 (config auth radius server 0)> e. Configure the amount of time in seconds to wait for the RADIUS server to respond. Allowed value is any integer from 3 to 60. The default value is 3. (config auth radius server 0)> timeout value (config auth radius server 0)> f. (Optional) Repeat the above steps to add additional RADIUS servers. 14. Add RADIUS to the authentication methods. Authentication methods are attempted in the order they are listed until the first successful authentication result is returned. This example will add RADIUS to the end of the list. See User authentication methods for information about IX20 User Guide 548 User authentication LDAP adding methods to the beginning or middle of the list. (config)> add auth method end radius (config)> 15. Save the configuration and apply the change: (config)> save Configuration saved. > 16. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. LDAP Your IX20 device supports LDAP (Lightweight Directory Access Protocol), a protocol used for directory information services over an IP network. LDAP can be used with your IX20 device for centralized authentication and authorization management for users who connect to the device. With LDAP support, the IX20 device acts as an LDAP client, which sends user credentials and connection parameters to an LDAP server. The LDAP server then authenticates the LDAP client requests and sends back a response message to the device. When you are using LDAP authentication, you can have both local users and LDAP users able to log in to the device. To use LDAP authentication, you must set up a LDAP server that is accessible by the IX20 device prior to configuration. The process of setting up a LDAP server varies by the server environment. This section contains the following topics: LDAP user configuration 550 LDAP server failover and fallback to local configuration 551 Configure your IX20 device to use an LDAP server 551 IX20 User Guide 549 User authentication LDAP LDAP user configuration When configured to use LDAP support, the IX20 device uses a remote LDAP server for user authentication (password verification) and authorization (assigning the access level of the user). Additional LDAP servers can be configured as backup servers for user authentication. This section outlines how to configure a LDAP server to be used for user authentication on your IX20 device. There are several different implementations of LDAP, including Microsoft Active Directory. This section uses OpenLDAP as an example configuration. Other implementations of LDAP will have different configuration methods. Example OpenLDAP configuration With OpenLDAP, users can be configured in a text file using the LDAP Data Interchange Format (LDIF). In this case, we will be using a file called add_user.ldif. 1. Create the add_user.ldif file in a text editor. For example: $ gedit ./add_user.ldif 2. Add users to the file using the following format: dn: uid=john,dc=example,dc=com objectClass: inetOrgPerson cn: John Smith sn: Smith uid: john userPassword: password ou: admin serial n The value of uid and userPassword must correspond to the username and password used to log into the IX20 device. n The ou attribute is optional. If used, the value must correspond to authentication groups configured on your IX20. Alternatively, if the user is also configured as a local user on the IX20 device and the LDAP server authenticates the user but does not return any groups, the local configuration determines the list of groups. See Authentication groups for more information about authentication groups. Other attributes may be required by the user's objectClass. Any objectClass may be used as long it allows the uid, userPassword, and ou attributes. 3. Save and close the file. 4. Add the user to the OpenLDAP server: $ ldapadd -x -H 'ldap:///' -D 'cn=admin,dc=example,dc=com' -W -f add_ user.ldif adding new entry "uid=john,dc=example,dc=com" 5. Verify that the user has been added by performing an LDAP search: $ ldapsearch -x -LLL -H 'ldap:///' -b 'dc=example,dc=com' uid=john dn: uid=john,dc=example,dc=com objectClass: inetOrgPerson IX20 User Guide 550 User authentication LDAP cn: John Smith sn: Smith uid: john ou: admin serial LDAP server failover and fallback to local configuration In addition to the primary LDAP server, you can also configure your IX20 device to use backup LDAP servers. Backup LDAP servers are used for authentication requests when the primary LDAP server is unavailable. Falling back to local authentication With user authentication methods, you can configure your IX20 device to use multiple types of authentication. For example, you can configure both LDAP authentication and local authentication, so that local authentication can be used as a fallback mechanism if the primary and backup LDAP servers are unavailable. Additionally, users who are configured locally but are not configured on the LDAP server are still able to log into the device. Authentication methods are attempted in the order they are listed until the first successful authentication result is returned; therefore if you want to ensure that users are authenticated first through the LDAP server, and only authenticated locally if the LDAP server is unavailable or if the user is not defined on the LDAP server, then you should list the LDAP authentication method prior to the Local users authentication method. See User authentication methods for more information about authentication methods. If the LDAP servers are unavailable and the IX20 device falls back to local authentication, only users defined locally on the device are able to log in. LDAP users cannot log in until the LDAP servers are brought back online. Configure your IX20 device to use an LDAP server This section describes how to configure a IX20 device to use an LDAP server for authentication and authorization. Required configuration items n Define the LDAP server IP address or domain name. n Add LDAP as an authentication method for your IX20 device. Additional configuration items n Whether other user authentication methods should be used in addition to the LDAP server, or if the LDAP server should be considered the authoritative login method. n The LDAP server port. It is configured to 389 by default. n Whether to use Transport Layer Security (TLS) when communicating with the LDAP server. n The distinguished name (DN) and password used to communicate with the server. n The distinguished name used to search to user base. n The group attribute. n The number of seconds to wait to receive a message from the server. n Add additional LDAP servers in case the first LDAP server is unavailable. WebUI IX20 User Guide 551 User authentication 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. LDAP The Configuration window is displayed. 3. Click Authentication > LDAP > Servers. 4. Add LDAP servers: a. For Add server, click . b. For Hostname, type the hostname or IP address of the LDAP server. c. (Optional) Change the default Port setting to the appropriate port. Normally this should be left at the default setting of port 389. d. (Optional) Click again to add additional LDAP servers. 5. (Optional) Enable Authoritative to prevent other authentication methods from being used if LDAP authentication fails. Other authentication methods will only be used if the LDAP server is unavailable. 6. For TLS connection, select the type of TLS connection used by the server: n Disable TLS: Uses a non-secure TCP connection on the LDAP standard port, 389. n Enable TLS: Uses an SSL/TLS encrypted connection on port 636. IX20 User Guide 552 User authentication LDAP n Start TLS: Makes a non-secure TCP connection to the LDAP server on port 389, then sends a request to upgrade the connection to a secure TLS connection. This is the preferred method for LDAP. 7. If Enable TLS or Start TLS are selected for TLS connection: n Leave Verify server certificate at the default setting of enabled to verify the server certificate with a known Certificate Authority. n Disable Verify server certificate if the server is using a self-signed certificate. 8. (Optional) For Server login, type a distinguished name (DN) that is used to bind to the LDAP server and search for users, for example cn=user,dc=example,dc=com. Leave this field blank if the server allows anonymous connections. 9. (Optional) For Server password, type the password used to log into the LDAP server. Leave this field blank if the server allows anonymous connections. 10. For User search base, type the distinguished name (DN) on the server to search for users. This can be the root of the directory tree (for example, dc=example,dc=com) or a sub-tree (for example. ou=People,dc=example,dc=com). 11. (Optional) For Group attribute, type the name of the user attribute that contains the list of IX20 authentication groups that the authenticated user has access to. See LDAP user configuration for further information about the group attribute. 12. For Timeout, type or select the amount of time in seconds to wait for the LDAP server to respond. Allowed value is between 3 and 60 seconds. 13. Add LDAP to the authentication methods: a. Click Authentication > Methods. b. For Add method, click . c. Select LDAP for the new method from the Method drop-down. Authentication methods are attempted in the order they are listed until the first successful authentication result is returned. See Rearrange the position of authentication methods for information about rearranging the position of the methods in the list. 14. Click Apply to save the configuration and apply the change. Command line IX20 User Guide 553 User authentication LDAP 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. (Optional) Prevent other authentication methods from being used if LDAP authentication fails. Other authentication methods will only be used if the LDAP server is unavailable. (config)> auth tacacs+ authoritative true (config)> 4. Set the type of TLS connection used by the LDAP server: (config)> auth ldap tls value (config)> where value is one of: n off: Uses a non-secure TCP connection on the LDAP standard port, 389. n on: Uses an SSL/TLS encrypted connection on port 636. n start_tls: Makes a non-secure TCP connection to the LDAP server on port 389, then sends a request to upgrade the connection to a secure TLS connection. This is the preferred method for LDAP. The default is off. 5. If tls is set to on or start_tls, configure whether to verify the server certificate: (config)> auth ldap verify_server_cert value (config)> where value is either: n true: Verifies the server certificate with a known Certificate Authority. n false: Does not verify the certificate. Use this option if the server is using a self-signed certificate. The default is true. 6. Set the distinguished name (DN) that is used to bind to the LDAP server and search for users. Leave this option unset if the server allows anonymous connections. (config)> auth ldap bind_dn dn_value (config)> For example: (config)> auth ldap bind_dn cn=user,dc=example,dc=com (config)> 7. Set the password used to log into the LDAP server. Leave this option unset if the server allows anonymous connections. IX20 User Guide 554 User authentication LDAP (config)> auth ldap bind_password password (config)> 8. Set the distinguished name (DN) on the server to search for users. This can be the root of the directory tree (for example, dc=example,dc=com) or a sub-tree (for example. ou=People,dc=example,dc=com). (config)> auth ldap base_dn value (config)> 9. (Optional) Set the name of the user attribute that contains the list of IX20 authentication groups that the authenticated user has access to. See LDAP user configuration for further information about the group attribute. (config)> auth ldap group_attribute value (config)> For example: (config)> auth ldap group_attribute ou (config)> 10. Configure the amount of time in seconds to wait for the LDAP server to respond. (config)> auth ldap timeout value (config)> where value is any integer from 3 to 60. The default value is 3. 11. Add an LDAP server: a. Add the server: (config)> add auth ldap server end (config auth ldap server 0)> b. Enter the LDAP server's IP address or hostname: (config auth ldap server 0)> hostname hostname|ip-address (config auth ldap server 0)> c. (Optional) Change the default port setting to the appropriate port: (config auth ldap server 0)> port port (config auth ldap server 0)> d. (Optional) Repeat the above steps to add additional LDAP servers. 12. Add LDAP to the authentication methods. Authentication methods are attempted in the order they are listed until the first successful authentication result is returned. This example will add LDAP to the end of the list. See User authentication methods for information about adding methods to the beginning or middle of the list. (config)> add auth method end ldap (config)> IX20 User Guide 555 User authentication Disable shell access 13. Save the configuration and apply the change: (config)> save Configuration saved. > 14. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Disable shell access To prohibit access to the shell prompt for all authentication groups, disable the Allow shell parameter.. This does not prevent access to the Admin CLI. Note If shell access is disabled, re-enabling it will erase the device's configuration and perform a factory reset. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Authentication. 4. Click to disable Allow shell. IX20 User Guide 556 User authentication Set the idle timeout for IX20 users Note If shell access is disabled, re-enabling it will erase the device's configuration and perform a factory reset. 5. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Set the allow_shell parameter to false: (config)> auth allow_shell false Note If shell access is disabled, re-enabling it will erase the device's configuration and perform a factory reset. 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Set the idle timeout for IX20 users To configure the amount of time that the user's active session can be inactive before it is automatically disconnected, set the Idle timeout parameter. By default, the Idle timeout is set to 10 minutes. WebUI IX20 User Guide 557 User authentication Set the idle timeout for IX20 users 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Authentication. 4. For Idle timeout, enter the amount of time that the active session can be idle before the user is automatically logged out. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Idle timeout to ten minutes, enter 10m or 600s. 5. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. IX20 User Guide 558 User authentication Set the idle timeout for IX20 users 2. At the command line, type config to enter configuration mode: > config (config)> 3. At the config prompt, type: (config)# auth idle_timeout value where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set idle_timeout to ten minutes, enter either 10m or 600s: (config)> auth idle_timeout 600s (config)> 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 559 User authentication Example user configuration Example user configuration Example 1: Administrator user with local authentication Goal: To create a user with administrator rights who is authenticated locally on the device. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Authentication > Users. 4. In Add User: enter a name for the user and click . The user configuration window is displayed. 5. Enter a Password for the user. IX20 User Guide 560 User authentication Example user configuration 6. Assign the user to the admin group: a. Click Groups. b. For Add Group, click . c. For Group, select the admin group. d. Verify that the admin group has full administrator rights: i. Click Authentication > Groups. ii. Click admin. iii. Verify that the admin group has Admin access enabled. If not, click Admin access to enable. iv. Verify that Access level is set to Full access. If not, select Full access. e. Verify that Local users is one of the configured authentication methods: i. Click Authentication > Methods. ii. Verify that Local users is one of the methods listed in the list. If not: i. For Add Method, click . ii. For Method, select Local users. 7. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Verify that the admin group has full administrator rights: (config)> show auth group admin acl admin enable true level full ... (config)> If admin > enable is set to false: (config)> auth group admin acl admin enable true (config)> IX20 User Guide 561 User authentication Example user configuration If admin > level is set to read-only: (config)> auth group admin acl admin level full (config)> 4. Verify that local is one of the configured authentication methods: (config)> show auth method 0 local (config)> If local is not listed: (config)> add auth method end local (config)> 5. Create the user. In this example, the user is being created with the username adminuser: (config)> add auth user adminuser (config auth user adminuser)> 6. Assign a password to the user: (config auth user adminuser)> password pwd (config auth user adminuser)> 7. Assign the user to the admin group: (config auth user adminuser)> add group end admin (config auth user adminuser)> 8. Save the configuration and apply the change: (config auth user adminuser)> save Configuration saved. > 9. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Example 2: RADIUS, TACACS+, and local authentication for one user Goal: To create a user with administrator rights who is authenticated by using all three authentication methods. In this example, when the user attempts to log in to the IX20 device, user authentication will occur in the following order: 1. The user is authenticated by the RADIUS server. If the RADIUS server is unavailable, 2. The user is authenticated by the TACACS+ server. If both the RADIUS and TACACS+ servers are unavailable, 3. The user is authenticated by the IX20 device using local authentication. IX20 User Guide 562 User authentication Example user configuration This example uses a FreeRadius 3.0 server running on ubuntu, and a TACACS+ server running on ubuntu. Server configuration may vary depending on the platforms or type of servers used in your environment. IX20 User Guide 563 User authentication Example user configuration WebUI 1. Configure a user on the RADIUS server: a. On the ubuntu machine hosting the FreeRadius server, open the /etc/freeradius/3.0/users file: $ sudo gedit /etc/freeradius/3.0/users b. Add a RADIUS user to the users file: admin1 Cleartext-Password := "password1" Unix-FTP-Group-Names := "admin" In this example: n The user's username is admin1. n The user's password is password1. n The authentication group on the IX20 device, admin, is identified in the Unix-FTPGroup-Names parameter. c. Save and close the users file. 2. Configure a user on the TACACS+ server: a. On the ubuntu machine hosting the TACACS+ server, open the /etc/tacacs+/tac_plus.conf file: $ sudo gedit /etc/tacacs+/tac_plus.conf b. Add a TACACS+ user to the tac_plus.conf file: user = admin1 { name ="Admin1 for TX64" pap = cleartext password1 service = system { groupname = admin } } } In this example: n The user's username is admin1. n The user's password is password1. n The authentication group on the IX20 device, admin, is identified in the groupname parameter. c. Save and close the tac_plus.conf file. 3. Log into the IX20 WebUI as a user with full Admin access rights. 4. On the menu, click System. Under Configuration, click Device Configuration. IX20 User Guide 564 User authentication The Configuration window is displayed. Example user configuration 5. Configure the authentication methods: a. Click Authentication > Methods. b. For Method, select RADIUS. c. For Add Method, click to add a new method. d. For the new method, select TACACS+. e. Click to add another new method. f. For the new method, select Local users. 6. Create the local user: a. Click Authentication > Users. b. In Add User:, type admin1 and click . c. For password, type password1. d. Assign the user to the admin group: i. Click Groups. ii. For Add Group, click . IX20 User Guide 565 User authentication iii. For Group, select the admin group. Example user configuration a. Verify that the admin group has full administrator rights: i. Click Authentication > Groups. ii. Click admin. iii. Verify that the admin group has Admin access enabled. If not, click Admin access to enable. iv. Verify that Access level is set to Full access. If not, select Full access. 7. Click Apply to save the configuration and apply the change. Command line 1. Configure a user on the RADIUS server: a. On the ubuntu machine hosting the FreeRadius server, open the /etc/freeradius/3.0/users file: $ sudo gedit /etc/freeradius/3.0/users b. Add a RADIUS user to the users file: admin1 Cleartext-Password := "password1" Unix-FTP-Group-Names := "admin" In this example: n The user's username is admin1. n The user's password is password1. n The authentication group on the IX20 device, admin, is identified in the Unix-FTPGroup-Names parameter. c. Save and close the users file. 2. Configure a user on the TACACS+ server: a. On the ubuntu machine hosting the TACACS+ server, open the /etc/tacacs+/tac_plus.conf file: $ sudo gedit /etc/tacacs+/tac_plus.conf b. Add a TACACS+ user to the tac_plus.conf file: user = admin1 { name ="Admin1 for TX64" pap = cleartext password1 IX20 User Guide 566 User authentication Example user configuration service = system { groupname = admin } } } In this example: n The user's username is admin1. n The user's password is password1. n The authentication group on the IX20 device, admin, is identified in the groupname parameter. c. Save and close the tac_plus.conf file. 3. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 4. At the command line, type config to enter configuration mode: > config (config)> 5. Configure the authentication methods: a. Determine the current authentication method configuration: (config)> show auth method 0 local (config)> This output indicates that on this example system, only local authentication is configured. b. Add RADIUS authentication to the beginning of the list: (config)> add auth method 0 radius (config)> c. Add TACACS+ authentication second place in the list: (config)> add auth method 1 tacacs+(config)> d. Verify that authentication will occur in the correct order: (config)> show auth method 0 radius 1 tacacs+ 2 local (config)> 6. Verify that the admin group has full administrator rights: (config)> show auth group admin acl admin IX20 User Guide 567 User authentication Example user configuration enable true level full ... (config)> If admin > enable is set to false: (config)> auth group admin acl admin enable true (config)> If admin > level is set to read-only: (config)> auth group admin acl admin level full (config)> 7. Configure the local user: a. Create a local user with the username admin1: (config)> add auth user admin1 (config auth user admin1)> b. Assign a password to the user: (config auth user adminuser)> password password1 (config auth user adminuser)> c. Assign the user to the admin group: (config auth user adminuser)> add group end admin (config auth user adminuser)> 8. Save the configuration and apply the change: (config auth user adminuser)> save Configuration saved. > 9. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 568 Firewall This chapter contains the following topics: Firewall configuration 570 Port forwarding rules 575 Packet filtering 583 Configure custom firewall rules 590 Configure Quality of Service options 592 IX20 User Guide 569 Firewall Firewall configuration Firewall configuration Firewall configuration includes the following configuration options: n Zones: A zone is a firewall access group to which network interfaces can be added. You then use zones to configure packet filtering and access control lists for interfaces that are included in the zone. Preconfigured zones include: l Any: Matches any network interface, even if they are not assigned to this zone. l Loopback: Zone for interfaces that are used for communication between processes running on the device. l Internal: Used for interfaces connected to trusted networks. By default, the firewall will allow most access from this zone. l External: Used for interfaces to connect to untrusted zones, such as the internet. This zone has Network Address Translation (NAT) enabled by default. By default, the firewall will block most access from this zone. l Edge: Used for interfaces connected to trusted networks, where the device is a client on the edge of the network rather than a router or gateway. l Setup: Used for interfaces involved in the initial setup of the device. By default, the firewall will only allow this zone to access administration services. l IPsec: The default zone for IPsec tunnels. l Dynamic routes: Used for routes learned using routing services. n Port forwarding: A list of rules that allow network connections to the IX20 to be forwarded to other servers by translating the destination address. n Packet filtering: A list of packet filtering rules that determine whether to accept or reject network connections that are forwarded through the IX20. n Custom rules: A script that is run to install advanced firewall rules beyond the scope/capabilities of the standard device configuration. n Quality Of Service: Quality of Service (QOS) options for bandwidth allocation and policy-based traffic shaping and prioritizing. Create a custom firewall zone In addition to the preconfigured zones, you can create your custom zones that can be used to configure packet filtering and access control lists for network interfaces. To create a zone: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 570 Firewall Firewall configuration 3. Click Firewall > Zones. 4. In Add Zone, enter a name for the zone and click . The firewall configuration window is displayed. 5. (Optional) If traffic on this zone will be forwarded from a private network to the internet, enable Network Address Translation (NAT). 6. Click Apply to save the configuration and apply the change. See Configure the firewall zone for a network interface for information about how to configure network interfaces to use a zone. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add the new zone. For example, to add a zone named my_zone: (config)> add firewall zone my_zone (config firewall zone my_zone)> IX20 User Guide 571 Firewall Firewall configuration 4. (Optional) Enable Network Address Translation (NAT): (config firewall zone my_zone)> src_nat true (config firewall zone my_zone)> 5. Save the configuration and apply the change: (config firewall zone my_zone)> save Configuration saved. > 6. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. See Configure the firewall zone for a network interface for information about how to configure network interfaces to use a zone. Configure the firewall zone for a network interface Firewall zones allow you to group network interfaces for the purpose of packet filtering and access control. There are several preconfigured firewall zones, and you can create custom zones as well. The firewall zone that a network interfaces uses is selected during interface configuration. This example procedure uses an existing network interface named ETH2 and changes the firewall zone from the default zone, Internal, to External. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > Interfaces > ETH2. IX20 User Guide 572 Firewall 4. For Zone, select External. Firewall configuration 5. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. At the config prompt, type: (config)> network interface eth2 zone my_zone (config)> 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. IX20 User Guide 573 Firewall Firewall configuration 2. At the command line, type config to enter configuration mode: > config (config)> 3. At the config prompt, type: (config)> network interface eth2 zone my_zone (config)> 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Delete a custom firewall zone You cannot delete preconfigured firewall zones. To delete a custom firewall zone: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Firewall > Zones. 4. Click the menu icon (...) next to the appropriate custom firewall zone and select Delete. IX20 User Guide 574 Firewall 5. Click Apply to save the configuration and apply the change. Port forwarding rules Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Use the del command to delete a custom firewall rule. For example: (config)> del firewall zone my_zone 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Port forwarding rules Most computers are protected by a firewall that prevents users on a public network from accessing servers on the private network. To allow a computer on the Internet to connect to a specific server on a private network, set up one or more port forwarding rules. Port forwarding rules provide mapping instructions that direct incoming traffic to the proper device on a LAN. Configure port forwarding Required configuration items n The network interface for the rule. Network connections will only be forwarded if their destination address matches the IP address of the selected network interface. n The public-facing port number that network connections must use for their traffic to be forwarded. n The IP address of the server to which traffic should be forwarded. n The port on the server to which traffic should be forwarded. IX20 User Guide 575 Firewall Port forwarding rules Additional configuration items n A label for the port forwarding rule. n The IP version (either IPv4 or IPv6) that incoming network connections must match. n The protocols that incoming network connections must match. n A white list of devices, based on either IP address or firewall zone, that are authorized to leverage this forwarding rule. To configure a port forwarding rule: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Firewall > Port forwarding. 4. For Add port forward, click . The port forwarding rule configuration window is displayed. Port forwarding rules are enabled by default. To disable, click to toggle off Enable. IX20 User Guide 576 Firewall Port forwarding rules 5. (Optional) Type a Label that will be used to identify the rule. 6. For Interface, select the network interface for the rule. Network connections will only be forwarded if their destination address matches the IP address of the selected network interface. 7. For IP version, select either IPv4 or IPv6. Network connections will only be forwarded if they match the selected IP version. 8. For Protocol, select the type of internet protocol. Network connections will only be forwarded if they match the selected protocol. 9. For Port, type the public-facing port number that network connections must use for their traffic to be forwarded. 10. For To Address, type the IP address of the server to which traffic should be forwarded. 11. For To port, type the port number of the port on the server to which traffic should be forwarded. 12. (Optional) Click Access control list to create a white list of devices that are authorized to leverage this forwarding rule, based on either the IP address or firewall zone: n To white list IP addresses: a. Click Addresses. b. For Add Address, enter an IP address and click . c. Repeat for each additional IP address that should be white listed. n To specify firewall zones for white listing: a. Click Zones. b. For Add zone, click . c. For Zone, select the appropriate zone. d. Repeat for each additional zone. 13. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> IX20 User Guide 577 Firewall Port forwarding rules 3. At the config prompt, type: (config)> add firewall dnat end (config firewall dnat 0)> Port forwarding rules are enabled by default. To disable the rule: (config firewall dnat 0)> enable false (config firewall dnat 0)> 4. Set the network interface for the rule. (config firewall dnat 0)> interface (config firewall dnat 0)> Network connections will only be forwarded if their destination address matches the IP address of this network interface. a. Use the ? to determine available interfaces: (config firewall dnat 0)> interface ? Interface: Network connections will only be forwarded if their destination address matches the IP address of this network interface. Format: defaultip defaultlinklocal eth1 eth2 loopback Current value: (config firewall dnat 0)> interface b. Set the interface. For example: (config firewall dnat 0)> interface eth1 (config firewall dnat 0)> 5. Set the IP version. Allowed values are ipv4 and ipv6. The default is ipv4. (config firewall dnat 0)> ip_version ipv6 (config firewall dnat 0)> 6. Set the public-facing port number that network connections must use for their traffic to be forwarded. (config firewall dnat 0)> port port (config firewall dnat 0)> IX20 User Guide 578 Firewall Port forwarding rules 7. Set the type of internet protocol . (config firewall dnat 0)> protocol value (config firewall dnat 0)> Network connections will only be forwarded if they match the selected protocol. Allowed values are custom, tcp, tcpudp, or upd. The default is tcp. 8. Set the IP address of the server to which traffic should be forwarded: n For IPv4 addresses: (config firewall dnat 0)> to_address ip-address (config firewall dnat 0)> n For IPv6 addresses: (config firewall dnat 0)> to_address6 ip-address (config firewall dnat 0)> 9. Set the public-facing port number that network connections must use for their traffic to be forwarded. (config firewall dnat 0)> to_port port (config firewall dnat 0)> 10. (Optional) To create a white list of devices that are authorized to leverage this forwarding rule, based on either the IP address or firewall zone, change to the acl node: (config firewall dnat 0)> acl (config firewall dnat 0 acl)> n To white list an IP address: l For IPv4 addresses: (config firewall dnat 0 acl> add address end ip-address (config firewall dnat 0 acl)> l For IPv6 addresses: (config firewall dnat 0 acl> add address6 end ip-address (config firewall dnat 0 acl)> Repeat for each appropriate IP address. n To specify the firewall zone for white listing: (config firewall dnat 0 acl)> add zone end zone Repeat for each appropriate zone. To view a list of available zones: (config firewall dnat 0 acl)> .. .. .. zone ? IX20 User Guide 579 Firewall Port forwarding rules Zones: A list of groups of network interfaces that can be referred to by packet filtering rules and access control lists. Additional Configuration ----------------------------------------------------------------------------- any dynamic_routes edge external internal ipsec loopback setup (config firewall dnat 0 acl)> 11. Save the configuration and apply the change: (config)> save Configuration saved. > 12. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Delete a port forwarding rule To delete a port forwarding rule: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 580 Firewall Port forwarding rules 3. Click Firewall > Port forwarding. 4. Click the menu icon (...) next to the appropriate port forwarding rule and select Delete. 5. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Determine the index number of the port forwarding rule you want to delete: (config)> show firewall dnat 0 acl no address no zone enable true interface ip_version ipv4 label IPv4 port forwarding rule port 10000 protocol tcp to_address6 10.10.10.10 to_port 10001 IX20 User Guide 581 Firewall Port forwarding rules 1 acl no address6 no zone enable false interface ip_version ipv6 label IPv6 port forwarding rule port 10002 protocol tcp to_address6 c097:4533:bd63:bb12:9a6f:5569:4b53:c29a to_port 10003 (config)> 4. To delete the rule, use the index number with the del command. For example: (config)> del firewall dnat 1 5. Save the configuration and apply the change: (config)> save Configuration saved. > 6. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 582 Firewall Packet filtering Packet filtering By default, one preconfigured packet filtering rule, Allow all outgoing traffic, is enabled and monitors traffic going to and from the IX20 device. The predefined settings are intended to block unauthorized inbound traffic while providing an unrestricted flow of outgoing data. You can modify the default packet filtering rule and create additional rules to define how the device accepts or rejects traffic that is forwarded through the device. Configure packet filtering Required configuration items n The action that the packet filtering rule will perform, either Accept, Reject, or Drop. n The source firewall zone: Packets originating from interfaces on this zone will be monitored by this rule. n The destination firewall zone: Packets destined for interfaces on this zone will be accepted, rejected, or dropped by this rule. Additional configuration requirements n A label for the rule. n The IP version to be matched, either IPv4, IPv6, or Any. n The protocol to be matched, one of: l TCP l UDP l ICMP l ICMP6 l Any To configure a packet filtering rule: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 583 Firewall Packet filtering 3. Click Firewall > Packet filtering. n To create a new packet filtering rule, for Add packet filter, click . n To edit the default packet filtering rule or another existing packet filtering rule, click to expand the rule. The packet filtering rule configuration window is displayed. Packet filters are enabled by default. To disable, click to toggle off Enable. 4. (Optional) Type a Label that will be used to identify the rule. 5. For Action, select one of: n Accept: Allows matching network connections. n Reject: Blocks matching network connections, and sends an ICMP error if appropriate. n Drop: Blocks matching network connections, and does not send a reply. 6. Select the IP version. 7. Select the Protocol. 8. For Source zone, select the firewall zone that will be monitored by this rule for incoming connections from network interfaces that are a member of this zone. See Firewall configuration for more information about firewall zones. 9. For Destination zone, select the firewall zone. Packets destined for network interfaces that are members of this zone will either be accepted, rejected or dropped by this rule. See Firewall configuration for more information about firewall zones. 10. Click Apply to save the configuration and apply the change. IX20 User Guide 584 Firewall Packet filtering Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> To edit the default packet filtering rule or another existing packet filtering rule: a. Determine the index number of the appropriate packet filtering rule: (config)> show firewall filter 0 action accept dst_zone any enable true ip_version any label Allow all outgoing traffic protocol any src_zone internal 1 action drop dst_zone internal enable true ip_version any label myfilter protocol any src_zone external (config)> b. Select the appropriate rule by using its index number: (config)> firewall filter 1 (config firewall filter 1)> To create a new packet filtering rule: (config)> add firewall filter end (config firewall filter 1)> Packet filtering rules are enabled by default. To disable the rule: (config firewall filter 1)> enable false (config firewall filter 1)> IX20 User Guide 585 Firewall Packet filtering 3. (Optional) Set the label for the rule. (config firewall filter 1)> label "My filter rule" (config firewall filter 1)> 4. Set the action to be performed by the filter rule. (config firewall filter 1)> action value (config firewall filter 1)> where value is one of: n accept: Allows matching network connections. n reject: Blocks matching network connections, and sends an ICMP error if appropriate. n drop: Blocks matching network connections, and does not send a reply. 5. Set the firewall zone that will be monitored by this rule for incoming connections from network interfaces that are a member of this zone: See Firewall configuration for more information about firewall zones. (config firewall filter 1)> src_zone my_zone (config firewall filter 1)> 6. Set the destination firewall zone. Packets destined for network interfaces that are members of this zone will either be accepted, rejected or dropped by this rule. See Firewall configuration for more information about firewall zones. (config firewall filter 1)> dst_zone my_zone (config firewall filter 1)> 7. Set the IP version. (config firewall filter 1)> ip_version value (config firewall filter 1)> where value is one of: n any n ipv4 n ipv6 n The default is any. 8. Set the protocol. (config firewall filter 1)> protocol value (config firewall filter 1)> where value is one of: n any n icmp n icmpv6 IX20 User Guide 586 Firewall Packet filtering n tcp n upd The default is any. 9. Save the configuration and apply the change: (config)> save Configuration saved. > 10. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Enable or disable a packet filtering rule To enable or disable a packet filtering rule: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Firewall > Packet filtering. 4. Click the appropriate packet filtering rule. 5. Click Enable to toggle the rule between enabled and disabled. IX20 User Guide 587 Firewall 6. Click Apply to save the configuration and apply the change. Packet filtering Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Determine the index number of the appropriate port forwarding rule: (config)> show firewall filter 0 action accept dst_zone any enable true ip_version any label Allow all outgoing traffic protocol any src_zone internal 1 action drop dst_zone internal enable true ip_version any label My packet filter protocol any src_zone external (config)> 4. To enable a packet filtering rule, use the index number with the enable true command. For example: (config)> firewall filter 1 enable true 5. To disable a packet filtering rule, use the index number with the enable false command. For example: (config)> firewall filter 1 enable false 6. Save the configuration and apply the change: IX20 User Guide 588 Firewall Packet filtering (config)> save Configuration saved. > 7. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Delete a packet filtering rule To delete a packet filtering rule: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Firewall > Packet filtering. 4. Click the menu icon (...) next to the appropriate packet filtering rule and select Delete. 5. Click Apply to save the configuration and apply the change. Command line IX20 User Guide 589 Firewall Configure custom firewall rules 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Determine the index number of the packet filtering rule you want to delete: (config)> show firewall filter 0 action accept dst_zone any enable true ip_version any label Allow all outgoing traffic protocol any src_zone internal 1 action drop dst_zone internal enable true ip_version any label My packet filter protocol any src_zone external (config)> 4. To delete the rule, use the index number with the del command. For example: (config)> del firewall filter 1 5. Save the configuration and apply the change: (config)> save Configuration saved. > 6. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure custom firewall rules Custom firewall rules consist of a script of shell commands that can be used to install firewall rules, ipsets, and other system configuration. These commands are run whenever system configuration changes occur that might cause changes to the firewall. To configure custom firewall rules: WebUI IX20 User Guide 590 Firewall Configure custom firewall rules 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Firewall > Custom rules. 4. Enable the custom rules. 5. (Optional) Enable Override to override all preconfigured firewall behavior and rely solely on the custom firewall rules. 6. For Rules, type the shell command that will execute the custom firewall rules script. 7. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> IX20 User Guide 591 Firewall Configure Quality of Service options 3. Enable custom firewall rules: (config)> firewall custom enable true (config)> 4. (Optional) Instruct the device to override all preconfigured firewall behavior and rely solely on the custom firewall rules: (config)> firewall custom override true (config)> 5. Set the shell command that will execute the custom firewall rules script: (config)> firewall custom rules "shell-command" (config)> 6. Save the configuration and apply the change: (config)> save Configuration saved. > 7. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure Quality of Service options Quality of Service (QoS) options allow you to manage the traffic performance of various services, such as Voice over IP (VoIP), cloud computing, traffic shaping, traffic prioritizing, and bandwidth allocation. When configuring QOS, you can only control the queue for outgoing packets on each interface (egress packets), not what is received on the interface (packet ingress). A QoS binding contains the policies and rules that apply to packets exiting the IX20 device on the binding's interface. By default, the IX20 device has two preconfigured QoS bindings, Outbound and Inbound. These bindings are an example configuration designed for a typical VoIP site: n Outbound provides an example of matching packets as they are routed from the device onto the WAN interface. n Inbound provides an example of matching packets as they are routed from the device onto a LAN interface. These example bindings are disabled by default. Enable the preconfigured bindings WebUI IX20 User Guide 592 Firewall Configure Quality of Service options 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Firewall > Quality of Service. 4. Click to expand either Outbound or Inbound. 5. Enable the binding. 6. Select an Interface. 7. Examine the remaining default settings and modify as appropriate for your network. 8. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Enable one of the preconfiged bindings: n To enable the Outbound binding: (config)> firewall qos 0 enable true (config)> IX20 User Guide 593 Firewall Configure Quality of Service options n To enable the Inbound binding: (config)> firewall qos 1 enable true (config)> 4. Set the interface for the binding. Use the index number of the binding; for example, to set the interface for the Outbound binding: a. Use the ? to determine available interfaces: (config)> firewall qos 0 interface ? Interface: The network interface. Format: /network/interface/defaultip /network/interface/defaultlinklocal /network/interface/eth1 /network/interface/eth2 /network/interface/loopback Current value: (config)> firewall qos 0 interface b. Set the interface. For example: (config)> firewall qos 0 interface /network/interface/eth1 (config)> 5. Examine the remaining default settings and modify as appropriate for your network. 6. Save the configuration and apply the change: (config)> save Configuration saved. > 7. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Create a new binding WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 594 Firewall Configure Quality of Service options 3. Click Firewall > Quality of Service. 4. For Add Binding, click . The quality of service binding configuration window is displayed. 5. Enable the binding. 6. (Optional) Type a Label for the binding. 7. Select an Interface to queue egress packets on. The binding will only match traffic that is being sent out on this interface. 8. (Optional) For Interface bandwidth (Mbit), set the maximum egress bandwidth of the interface, in megabits, allocated to this binding. Typically, this should be 95% of the available bandwidth. Allowed value is any integer between 1 and 1000. 9. Create a policy for the binding: At least one policy is required for each binding. Each policy can contain up to 30 rules. a. Click to expand Policy. b. For Add Policy, click . The QoS binding policy configuration window is displayed. IX20 User Guide 595 Firewall Configure Quality of Service options New QoS binding policies are enabled by default. To disable, click Enable. c. (Optional) Type a Label for the binding policy. d. For Weight, type a value for the amount of available bandwidth allocated to the policy, relative to other policies for this binding. The larger the weight, with respect to the other policy weights, the larger portion of the maximum bandwidth is available for this policy. For example, if a binding contains three policies, and each policy contains a weight of 10, each policy will be allocated one third of the total interface bandwidth. e. For Latency, type the maximum delay before the transmission of packets. A lower latency means that the packets will be scheduled more quickly for transmission. f. Select Default to identify this policy as a fall-back policy. The fall-back policy will be used for traffic that is not matched by any other policy. If there is no default policy associated with this binding, packets that do not match any policy rules will be dropped. g. If Default is disabled, you must configure at least one rule: i. Click to expand Rule. ii. For Add Rule, click . The QoS binding policy rule configuration window is displayed. New QoS binding policy rules are enabled by default. To disable, click Enable. iii. (Optional) Type a Label for the binding policy rule. iv. For Type Of Service, type the value of the Type of Service (ToS) packet header that defines packet priority. If unspecified, this field is ignored. See https://www.tucny.com/Home/dscp-tos for a list of common TOS values. IX20 User Guide 596 Firewall Configure Quality of Service options v. For Protocol, select the IP protocol matching criteria for this rule. vi. For Source port, type the port, or any, as a source traffic matching criteria. vii. For Destination port, type the port, or any, as a destination traffic matching criteria. viii. Click to expand Source address and select the Type: n Any: Source traffic from any address will be matched. n Interface: Only traffic from the selected Interface will be matched. n IPv4 address: Only traffic from the IP address typed in IPv4 address will be matched. Use the format IPv4_address[/netmask], or use any to match any IPv4 address. n IPv6 address: Only traffic from the IP address typed in IPv6 address will be matched. Use the format IPv6_address[/prefix_length], or use any to match any IPv6 address. n MAC address: Only traffic from the MAC address typed in MAC address will be matched. ix. Click to expand Destination address and select the Type: n Any: Traffic destined for anywhere will be matched. n Interface: Only traffic destined for the selected Interface will be matched. n IPv4 address: Only traffic destined for the IP address typed in IPv4 address will be matched. Use the format IPv4_address[/netmask], or use any to match any IPv4 address. n IPv6 address: Only traffic destined for the IP address typed in IPv6 address will be matched. Use the format IPv6_address[/prefix_length], or use any to match any IPv6 address. Repeat to add a new rule. Up to 30 rules can be configured. 10. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add a binding: (config)> add firewall qos end (config firewall qos 2)> New binding are enabled by default. To disable: IX20 User Guide 597 Firewall Configure Quality of Service options (config firewall qos 2)> enable false (config firewall qos 2)> 4. (Optional) Set a label for the new binding: (config firewall qos 2)> label my_binding (config firewall qos 2)> 5. Set the interface to queue egress packets on. The binding will only match traffic that is being sent out on this interface: a. Use the ? to determine available interfaces: (config firewall qos 2)> interface ? Interface: The network interface. Format: /network/interface/defaultip /network/interface/defaultlinklocal /network/interface/eth1 /network/interface/eth2 /network/interface/loopback Current value: (config firewall qos 2)> interface b. Set the interface. For example: (config firewall qos 2)> interface /network/interface/eth1 (config firewall qos 2)> 6. (Optional) Set the maximum egress bandwidth of the interface, in megabits, allocated to this binding. (config firewall qos 2)> bandwidth int (config firewall qos 2)> where int is an integer between 1 and 1000. Typically, this should be 95% of the available bandwidth. The default is 95. 7. Create a policy for the binding: At least one policy is required for each binding. Each policy can contain up to 30 rules. a. Change to the policy node of the configuration: (config firewall qos 2)> policy (config firewall qos 2 policy)> b. Add a policy: (config firewall qos 2 policy)> add end (config firewall qos 2 policy 0)> New QoS binding policies are enabled by default. To disable: IX20 User Guide 598 Firewall Configure Quality of Service options (config firewall qos 2 policy 0)> enable false (config firewall qos 2 policy 0)> c. (Optional) Set a label for the new binding policy: (config firewall qos 2 policy 0)> label my_binding_policy (config firewall qos 2 policy 0)> d. Set a value for the amount of available bandwidth allocated to the policy, relative to other policies for this binding. The larger the weight, with respect to the other policy weights, the larger portion of the maximum bandwidth is available for this policy. For example, if a binding contains three policies, and each policy contains a weight of 10, each policy will be allocated one third of the total interface bandwidth. (config firewall qos 2 policy 0)> weight int (config firewall qos 2 policy 0)> where int is any integer between 1 and 65535. The default is 10. e. Set the maximum delay before the transmission of packets. A lower number means that the packets will be scheduled more quickly for transmission. (config firewall qos 2 policy 0)> latency int (config firewall qos 2 policy 0)> where int is any integer, 1 or greater. The default is 100. f. To identify this policy as a fall-back policy: (config firewall qos 2 policy 0)> default true (config firewall qos 2 policy 0)> The fall-back policy will be used for traffic that is not matched by any other policy. If there is no default policy associated with this binding, packets that do not match any policy rules will be dropped. If the policy is not a fall-back policy, you must configure at least one rule: i. Change to the rule node of the configuration: (config firewall qos 2 policy 0)> rule (config firewall qos 2 policy 0 rule)> ii. Add a rule: (config firewall qos 2 policy 0 rule)> add end (config firewall qos 2 policy 0 rule 0)> New QoS binding policy rules are enabled by default. To disable: (config firewall qos 2 policy 0 rule 0)> enable false (config firewall qos 2 policy 0 rule 0)> IX20 User Guide 599 Firewall Configure Quality of Service options iii. (Optional) Set a label for the new binding policy rule: (config firewall qos 2 policy 0 rule 0)> label my_binding_policy_ rule (config firewall qos 2 policy 0 rule 0)> iv. Set the value of the Type of Service (ToS) packet header that defines packet priority. If unspecified, this field is ignored. (config firewall qos 2 policy 0 rule 0)> tos value (config firewall qos 2 policy 0 rule 0)> where value is a hexadecimal number. See https://www.tucny.com/Home/dscp-tos for a list of common TOS values. v. Set the IP protocol matching criteria for this rule: (config firewall qos 2 policy 0 rule 0)> protocol value (config firewall qos 2 policy 0 rule 0)> where value is one of tcp, udp, or any. vi. Set the source port to define a source traffic matching criteria: (config firewall qos 2 policy 0 rule 0)> srcport value (config firewall qos 2 policy 0 rule 0)> where value is the IP port number, a range of port numbers using the format IP_portIP_port, or any. vii. Set the destination port to define a destination matching criteria: (config firewall qos 2 policy 0 rule 0)> dstport value (config firewall qos 2 policy 0 rule 0)> where value is the IP port number, a range of port numbers using the format IP_portIP_port, or any. viii. Set the source address type: (config network qos 2 policy 0 rule 0)> src type value (config network qos 2 policy 0 rule 0)> where value is one of: n any: Source traffic from any address will be matched. See Firewall configuration for more information about firewall zones. n interface: Only traffic from the selected interface will be matched. Set the interface: i. Use the ? to determine available interfaces: (config network qos 2 policy 0 rule 0)> src interface ? Interface: Match the IP address with the specified IX20 User Guide 600 Firewall Configure Quality of Service options interface's network address. Format: /network/interface/defaultip /network/interface/defaultlinklocal /network/interface/eth1 /network/interface/eth2 /network/interface/loopback Current value: (config network qos 2 policy 0 rule 0)> src interface ii. Set the interface. For example: (config network qos 2 policy 0 rule 0)> src interface /network/interface/eth1 (config network qos 2 policy 0 rule 0)> n address: Only traffic from the IP address typed in IPv4 address will be matched. Set the address that will be matched: (config network qos 2 policy 0 rule 0)> src address value (config network qos 2 policy 0 rule 0)> where value uses the format IPv4_address[/netmask], or any to match any IPv4 address. n address6: Only traffic from the IP address typed in IPv6 address will be matched. Set the address that will be matched: (config network qos 2 policy 0 rule 0)> src address6 value (config network qos 2 policy 0 rule 0)> where value uses the format IPv6_address[/prefix_length], or any to match any IPv6 address. n mac: Only traffic from the MAC address typed in MAC address will be matched. Set the MAC address to be matched: (config network qos 2 policy 0 rule 0)> src mac MAC_address (config network qos 2 policy 0 rule 0)> ix. Set the destination address type: (config network qos 2 policy 0 rule 0)> dst type value (config network qos 2 policy 0 rule 0)> where value is one of: n any: Traffic destined for anywhere will be matched. See Firewall configuration for more information about firewall zones. n interface: Only traffic destined for the selected Interface will be matched. Set the interface: IX20 User Guide 601 Firewall Configure Quality of Service options i. Use the ? to determine available interfaces: (config network qos 2 policy 0 rule 0)> dst interface ? Interface: Match the IP address with the specified interface's network address. Format: /network/interface/defaultip /network/interface/defaultlinklocal /network/interface/eth1 /network/interface/eth2 /network/interface/loopback Current value: (config network qos 2 policy 0 rule 0)> dst interface ii. Set the interface. For example: (config network qos 2 policy 0 rule 0)> dst interface /network/interface/eth1 (config network qos 2 policy 0 rule 0)> n address: Only traffic destined for the IP address typed in IPv4 address will be matched. Set the address that will be matched: (config network qos 2 policy 0 rule 0)> src address value (config network qos 2 policy 0 rule 0)> where value uses the format IPv4_address[/netmask], or any to match any IPv4 address. n address6: Only traffic destined for the IP address typed in IPv6 address will be matched. Set the address that will be matched: (config network qos 2 policy 0 rule 0)> src address6 value (config network qos 2 policy 0 rule 0)> where value uses the format IPv6_address[/prefix_length], or any to match any IPv6 address. Repeat to add a new rule. Up to 30 rules can be configured. 8. Save the configuration and apply the change: (config)> save Configuration saved. > 9. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 602 System administration This chapter contains the following topics: Review device status 604 Configure system information 605 Update system firmware 607 Update cellular module firmware 611 Reboot your IX20 device 615 Reset the device to factory defaults 617 Configuration files 621 Schedule system maintenance tasks 626 Disable device encryption 633 Configure the speed of your Ethernet ports 635 IX20 User Guide 603 System administration Review device status Review device status You can review the system of your device from either the Status page of the Web interface, or from the command line: WebUI To display system information: 1. Log into the IX20 WebUI as a user with Admin access. 2. On the main menu, click Status. A secondary menu appears, along with a status panel. 3. On the secondary menu, click to display the details panel for the status you want to view. Command line To display system information, use the show system command. n Show basic system information: 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. Enter show system at the prompt: > show system Model Serial Number SKU Hostname MAC : Digi IX20 : IX20-000065 : IX20 : IX20 : DF:DD:E2:AE:21:18 Hardware Version Firmware Version Alt. Firmware Version Bootloader Version : 50001947-01 1P : 20.11.32.138 : 20.11.32.138 : 19.7.23.0-15f936e0ed Current Time CPU Uptime (541317s) Temperature : Wed, 2 Dec 2020 8:44:23 +0000 : 1.4% : 6 days, 6 hours, 21 minutes, 57 seconds : 40C > n Show more detailed system information: IX20 User Guide 604 System administration Configure system information 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. Enter show system verbose at the prompt: > show system verbose Model Serial Number SKU Hostname MAC : Digi IX20 : IX20-000065 : IX20 : IX20 : DF:DD:E2:AE:21:18 Hardware Version Firmware Version Alt. Firmware Version Bootloader Version : 50001947-01 1P : 20.11.32.138 : 20.11.32.138 : 19.7.23.0-15f936e0ed Schema Version Timezone Current Time CPU Uptime (541317s) Temperature : 715 : UTC : Wed, 2 Dec 2020 8:44:23 +0000 : 1.4% : 6 days, 6 hours, 21 minutes, 57 seconds : 40C Disk ---Load Average RAM Usage Disk /etc/config Usage Disk /opt Usage Disk /overlay Usage Disk /tmp Usage Disk /var Usage : 0.09, 0.10, 0.08 : 127.843MB/1880.421MB(6%) : 18.421MB/4546.371MB(0%) : -4523.-46MB/549.304MB(-822%) : MB/MB(%) : 0.007MB/256.0MB(0%) : 1.765MB/256.0MB(1%) > Configure system information You can configure information related to your IX20 device, such as providing a name and location for the device. Configuration items n A name for the device. n The name of a contact for the device. n The location of the device. n A description of the device. n A banner that will be displayed when users access terminal services on the device. IX20 User Guide 605 System administration Configure system information To enter system information: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click System. 4. For Name, type a name for the device. This name will appear in log messages and at the command prompt. 5. For Contact, type the name of a contact for the device. 6. For Location, type the location of the device. 7. For Banner, type a banner message that will be displayed when users log into terminal services on the device. 8. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> IX20 User Guide 606 System administration Update system firmware 3. Set a name for the device. This name will appear in log messages and at the command prompt. (config)> system name 192.168.3.1 192.168.3.1(config)> 4. Set the contact for the device: 192.168.3.1(config)> system contact "Jane User" 192.168.3.1(config)> 5. Set the location for the device: 192.168.3.1(config)> system location "9350 Excelsior Blvd., Suite 700, Hopkins, MN" 192.168.3.1(config)> 6. Set the banner for the device. This is displayed when users access terminal services on the device. 192.168.3.1(config)> system banner "Welcome to the Digi IX20." 192.168.3.1(config)> 7. Save the configuration and apply the change: 192.168.3.1(config)> save Configuration saved. 192.168.3.1> 8. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Update system firmware The IX20 operating system firmware images consist of a single file with the following naming convention: platform-version.bin For example, IX20-20.11.32.138.bin. Manage firmware updates using Digi Remote Manager If you have a network of many devices, you can use Digi Remote Manager Profiles to manage firmware updates. Profiles ensure all your devices are running the correct firmware version and that all newly installed devices are updated to that same version. For more information, see the Profiles section of the Digi Remote Manager User Guide. Certificate management for firmware images The system firmware files are signed to ensure that only Digi-approved firmware load onto the device. The IX20 device validates the system firmware image as part of the update process and only successfully updates if the system firmware image can be authenticated. IX20 User Guide 607 System administration Update system firmware Downgrading Downgrading to an earlier release of the firmware may result in the device configuration being erased. WebUI Install firmware from the Digi firmware server 1. Log into the IX20 WebUI as a user with Admin access. 2. On the main menu, click System. Under Administration, click Firmware Update. 3. Click Download from server. 4. For Version:, select the appropriate version of the device firmware. 5. Click Update Firmware. Update firmware from a local file 1. Download the IX20 operating system firmware from the Digi Support FTP site to your local machine. 2. Log into the IX20 WebUI as a user with Admin access. 3. On the main menu, click System. Under Administration, click Firmware Update. 4. Click Choose file. IX20 User Guide 608 System administration Update system firmware 5. Browse to the location of the firmware on your local file system and select the file. 6. Click Update Firmware. Command line 1. Download the IX20 operating system firmware from the Digi Support FTP site to your local machine. 2. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 3. Load the firmware image onto the device: > scp host hostname-or-ip user username remote remote-path local local-path to local where: n hostname-or-ip is the hostname or ip address of the remote host. n username is the name of the user on the remote host. n remote-path is the path and filename of the file on the remote host that will be copied to the IX20 device. n local-path is the location on the IX20 device where the copied file will be placed. For example: > scp host 192.168.4.1 user admin remote /home/admin/bin/IX20- 20.11.32.138.bin local /etc/config/ to local admin@192.168.4.1's password: adminpwd IX20->20.11.32.138.bin 100% 36MB 11.1MB/s > 4. Verify that the firmware file has been successfully uploaded to the device: 00:03 > ls /etc/config/ -rw-r--r-- 1 root 20.11.32.138.bin -rw-r--r-- 1 root drw------- 2 root -rw-r--r-- 1 root drwxr-xr-x 2 root ... > root root root root root 37511229 May 16 20:10 IX20- 2580 May 16 16:44 accns.json 4096 Apr 29 18:51 analyzer 47 Apr 30 06:59 dhcp.leases 4096 May 15 17:53 fcron 5. Update the firmware by entering the update firmware command, specifying the firmware file name: > system firmware update file IX20-20.11.32.138.bin 36632K netflash: got "/etc/config/IX20-20.11.32.138.bin", length=37511229 IX20 User Guide 609 System administration Update system firmware netflash: authentication successful netflash: programming FLASH device /dev/flash/image 36633K 100% Firmware update completed, reboot device > 6. Reboot the device to run the new firmware image using the reboot command. > reboot Rebooting system > 7. Once the device has rebooted, log into the IX20's command line as a user with Admin access and verify the running firmware version by entering the show system command. > show system Hostname FW Version MAC Model Current Time Uptime : IX20 : 20.11.32.138 : 0040FF800120 : Digi IX20 : Wed, 2 Dec 2020 8:44:23 +0000 : 42 seconds (42s) > Dual boot behavior By default, the IX20 device stores two copies of firmware in two flash memory banks: n The current firmware version that is used to boot the device. n A copy of the firmware that was in use prior to your most recent firmware update. When the device reboots, it will attempt to use the current firmware version. If the current firmware version fails to load after three consecutive attempts, it is marked as invalid and the device will use the previous firmware version stored in the alternate memory bank. If the device consistently looses power during the boot process, this may result in the current firmware being marked as invalid and the device downgrading to a previous version of the firmware. As a result of this behavior, you can use the following procedure to guarantee that the same firmware is stored in both memory banks: WebUI IX20 User Guide 610 System administration Update cellular module firmware 1. Log into the IX20 WebUI as a user with Admin access. 2. On the main menu, click System. Under Administration, click Firmware Update. 3. Click Duplicate firmware. 4. Click Duplicate Firmware. Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. Duplicate the firmware: > system duplicate-firmware > Update cellular module firmware You can update modem firmware by downloading firmware from the Digi firmware repository, or by uploading firmware from your local storage onto the device. You can also schedule modem firmware updates. See Schedule system maintenance tasks for details. WebUI 1. (Optional) Download the appropriate modem firmware from the Digi repository to your local machine. 2. Log into the IX20 WebUI as a user with Admin access. 3. From the main menu, click Status > Modems. IX20 User Guide 611 System administration 4. Click the modem firmware version. Update cellular module firmware The Modem firmware update window opens. 5. To update using firmware from the Digi firmware repository: a. Click to view available versions. b. For Available firmware, select the firmware. 6. To update using firmware from your local file system: a. Click Choose File. b. Select the firmware. 7. To schedule firmware updates, click System maintenance configuration page. See Schedule system maintenance tasks for details. 8. Click Update. Command line Update modem firmware over the air (OTA) You can update your modem firmware by querying the Digi firmware repository to determine if there is new firmware available for your modem and performing an OTA modem firmware update: 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. Use the modem firmware ota check command to determine if new modem firmware is available on the Digi firmware repository. > modem firmware ota check Checking for latest ATT firmware ... Retrieving modem firmware list ... Newest firmware version available to download is '24.01.5x4_ATT' Modem firmware update from '24.01.544_ATT' to '24.01.5x4_ATT' is needed IX20 User Guide 612 System administration Update cellular module firmware 24.01.5x4_ATT 24.01.544_ATT > 3. Use the modem firmware ota list command to list available firmware on the Digi firmware repository. > modem firmware ota list Retrieving modem firmware list ... 25.20.664_CUST_044_3 25.20.666_CUST_067_1 25.20.663_CUST_040 > 4. Perform an OTA firmware update: n To perform an OTA firmware update by using the most recent available modem firmware from the Digi firmware repository, type: > modem firmware ota update Checking for latest Generic firmware ... Retrieving modem firmware list ... Newest firmware version available to download is '25.20.666_CUST_067_ 1' Retrieving download location for modem firmware '25.20.666_CUST_067_1' ... > n To perform an OTA firmware update by using a specific version from the Digi firmware repository, use the version parameter to identify the appropriate firmware version as determined using the modem firmware ota check or modem firmware ota list command. For example:: > modem firmware ota update version 24.01.5x4_ATT Retrieving download location for modem firmware '24.01.5x4_ATT' ... Downloading modem firmware '24.01.5x4_ATT' to '/opt/LE910C4_NF/Custom_ Firmware' ... Modem firmware '24.01.5x4_ATT' downloaded Updating modem firmware ... Programming modem firmware ... Found modem ... Validate modem firmware ... Getting ready for update ... Stopping services ... IX20 User Guide 613 System administration Update cellular module firmware Running update pass 1 of 3 ... Restarting services ... ----------------------------Successfully updated firmware Modem firmware update complete > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Update modem firmware by using a local firmware file You can update your modem firmware by uploading a modem firmware file to your IX20 device. Firmware should be uploaded to /opt/MODEM_MODEL/Custom_Firmware, for example, /opt/LM940/Custom_Firmware. Modem firmware can be downloaded from Digi at https://ftp1.digi.com/support/firmware/dal/carrier_firmware/. See Use the scp command for information about uploading files to the IX20 device. 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. Use the modem firmware check command to determine if new modem firmware is available on local device. > modem firmware check Checking for latest ATT firmware in flash ... Newest firmware version available in flash is '05.05.58.00_ATT_005.026_000' Modem firmware up to date 05.05.58.00_ATT_005.026_000 > modem firmware check 3. Use the modem firmware list command to list available firmware on the IX20 device. > modem firmware list ATT, 24.01.544_ATT, current Generic, 24.01.514_Generic, image Verizon, 24.01.524_Verizon, image ATT, 24.01.544_ATT, image Sprint, 24.01.531-B003_Sprint, image > 4. To perform an firmware update by using a local file, use the version parameter to identify the appropriate firmware version as determined using the modem firmware check or modem firmware list command. For example:: IX20 User Guide 614 System administration Reboot your IX20 device > modem firmware update version 24.01.5x4_ATT Updating modem firmware ... ----------------------------Successfully updated firmware Modem firmware update complete > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Reboot your IX20 device You can reboot the IX20 device immediately or schedule a reboot for a specific time every day. Note You may want to save your configuration settings to a file before rebooting. See Save configuration to a file. Reboot your device immediately WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. From the main menu, click System. 3. Click Reboot. 4. Click Reboot to confirm that you want to reboot the device. Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the prompt, type: > reboot IX20 User Guide 615 System administration Reboot your IX20 device Schedule reboots of your device WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Select System > Scheduled tasks. 4. For Reboot time, enter the time of the day that the device should reboot, using the format HH:MM. The device will reboot at this time every day. If a value is set for Reboot time but the device is unable to synchronize its time with an NTP server, the device will reboot after it has been up for 24 hours. See System time for information about configuring NTP servers. 5. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> IX20 User Guide 616 System administration Reset the device to factory defaults 3. Set the reboot time: (config>> system schedule reboot_time time (config)> where time is the time of the day that the device should reboot, using the format HH:MM. For example, the set the device to reboot at two in the morning every day: (config>> system schedule reboot_time 02:00 (config)> If a value is set for reboot_time but the device is unable to synchronize its time with an NTP server, the device will reboot after it has been up for 24 hours. See System time for information about configuring NTP servers. 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Reset the device to factory defaults Resetting the device to factory defaults performs the following actions: n Clears all configuration settings. When the device restarts, it uses the default configuration. n Deletes all user files including Python scripts. n Erases all automatically generated keys. n Clears event and system log files. You can reset the device in the WebUI, at the command line, or by using the Reset button on the device. You can also reset the device to the default configuration without removing scripts, keys, and logfiles by using the revert command. WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. On the main menu, click System. Under Configuration, click Configuration Maintenance. The Configuration Maintenance windows is displayed. IX20 User Guide 617 System administration Reset the device to factory defaults 3. In the Erase configuration section, click ERASE. 4. Click CONFIRM. 5. After resetting the device: a. Connect to the IX20 by using the serial port or by using an Ethernet cable to connect the IX20 ETH2 port to your PC. b. Log into the IX20: User name: Use the default user name: admin. Password: Use the unique password printed on the bottom label of the device (or the printed label included in the package). When you first log into the WebUI or the command line, you must change the password for the admin user. See Change the default password for the admin user for instructions. Additionally, for Wi-Fi enabled models, when you first log into the WebUI or the command line, you will be required the change the SSID and pre-shared key (password) for the preconfigured Wi-Fi access point. See Reset default SSID and pre-shared key for the preconfigured Wi-Fi access point for instructions. c. Reset the default password for the admin account. See Change the default password for the admin user for further information. Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. Enter the following: > system factory-erase 3. After resetting the device: a. Connect to the IX20 by using the serial port or by using an Ethernet cable to connect the IX20 ETH2 port to your PC. b. Log into the IX20: User name: Use the default user name: admin. IX20 User Guide 618 System administration Reset the device to factory defaults Password: Use the unique password printed on the bottom label of the device (or the printed label included in the package). When you first log into the WebUI or the command line, you must change the password for the admin user. See Change the default password for the admin user for instructions. Additionally, for Wi-Fi enabled models, when you first log into the WebUI or the command line, you will be required the change the SSID and pre-shared key (password) for the preconfigured Wi-Fi access point. See Reset default SSID and pre-shared key for the preconfigured Wi-Fi access point for instructions. c. Reset the default password for the admin account. See Change the default password for the admin user for further information. Reset the device by using the ERASE button. 1. Locate the ERASE button on your device. 2. Press and hold the ERASE button perform a device reset. The ERASE button has two modes: n Configuration reset: l Press and release the ERASE button. l The device reboots automatically and resets to factory defaults. This does not remove any automatically generated certificates and keys. n Full device reset: l After the device reboots from the first button press, immediately press and release the ERASE button again. l The device reboots again and resets to factory defaults, as well as also removing generated certificates and keys. 3. After resetting the device: a. Connect to the IX20 by using the serial port or by using an Ethernet cable to connect the IX20 ETH2 port to your PC. b. Log into the IX20: User name: Use the default user name: admin. Password: Use the unique password printed on the bottom label of the device (or the printed label included in the package). When you first log into the WebUI or the command line, you must change the password for the admin user. See Change the default password for the admin user for instructions. IX20 User Guide 619 System administration Reset the device to factory defaults Additionally, for Wi-Fi enabled models, when you first log into the WebUI or the command line, you will be required the change the SSID and pre-shared key (password) for the preconfigured Wi-Fi access point. See Reset default SSID and pre-shared key for the preconfigured Wi-Fi access point for instructions. c. Reset the default password for the admin account. See Change the default password for the admin user for further information. Reset the device with the revert command You can reset the device to the default configuration without removing scripts, keys, and logfiles by using the revert command: 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. At the config prompt, enter revert: (config)> revert (config)> 4. Set the password for the admin user prior to saving the changes: (config)> auth user admin password pwd (config)> 5. Save the configuration and apply the change: (config)> save Configuration saved. > 6. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 620 System administration Configuration files Configuration files The IX20 configuration file, /etc/config/accns.json, contains all configuration changes that have been made to the device. It does not contain the complete device configuration; it only contains changes to the default configuration. Both the default configuration and the changes contained in the accns.json file are applied when the device reboots. Save configuration changes When you make changes to the IX20 configuration, the changes are not automatically saved. You must explicitly save configuration changes, which also applies the changes. If you do not save configuration changes, the system discards the changes. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Make any necessary configuration changes. 4. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. IX20 User Guide 621 System administration Configuration files 2. At the command line, type config to enter configuration mode: > config (config)> 3. Make any necessary configuration changes. 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Save configuration to a file You can save your IX20 device's configuration to a file and use this file to restore the configuration, either to the same device or to similar devices. WebUI This procedure creates a binary archive file containing the device's configuration, certificates and keys, and other information. 1. Log into the IX20 WebUI as a user with Admin access. 2. On the main menu, click System. Under Configuration, click Configuration Maintenance. The Configuration Maintenance windows is displayed. 3. In the Configuration backup section: a. (Optional) To encrypt the configuration using a passphrase, for Passphrase (save/restore), enter the passphrase. b. Click SAVE. IX20 User Guide 622 System administration Configuration files The file will be downloaded using your browser's standard download process. Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. Enter the following: > system backup path [passphrase passphrase] type type where n path is the location on the IX20's filesystem where the configuration backup file should be saved. n passphrase (optional) is a passphrase used to encrypt the configuration backup. n type is the type of backup, either: l archive: Creates a binary archive file containing the device's configuration, certificates and keys, and other information. l cli-config: Creates a text file containing only the configuration changes. For example: > system backup /etc/config/ type archive 3. (Optional) Use scp to copy the file from your device to another host: > scp host hostname-or-ip user username remote remote-path local local-path to remote where: n hostname-or-ip is the hostname or ip address of the remote host. n username is the name of the user on the remote host. n remote-path is the location on the remote host where the file will be copied. n local-path is the path and filename on the IX20 device. For example: > scp host 192.168.4.1 user admin remote /home/admin/bin/ local /etc/config/backup-archive-0040FF800120-19.05.17-19.01.17.bin to remote Restore the device configuration You can restore a configuration file to your IX20 device by using a backup from the device, or a backup from a similar device. WebUI IX20 User Guide 623 System administration Configuration files 1. Log into the IX20 WebUI as a user with Admin access. 2. On the main menu, click System. Under Configuration, click Configuration Maintenance. The Configuration Maintenance windows is displayed. 3. In the Configuration Restore section: a. If a passphrase was used to create the configuration backup, for Passphrase (save/restore), enter the passphrase. b. Under Configuration Restore, click Choose File. c. Browse to the system firmware file location on your local computer and select the file. d. Click RESTORE. 4. Click CONFIRM. The configuration will be restored and the device will be rebooted. Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. If the configuration backup is on a remote host, use scp to copy the file from the host to your device: > scp host hostname-or-ip user username remote remote-path local local-path to local where: n hostname-or-ip is the hostname or ip address of the remote host. n username is the name of the user on the remote host. n remote-path is the path and filename of the file on the remote host that will be copied to the IX20 device. n local-path is the location on the IX20 device where the copied file will be placed. IX20 User Guide 624 System administration Configuration files For example: > scp host 192.168.4.1 user admin remote /home/admin/bin/backup-archive0040FF800120-19.05.17-19.01.17.bin local /etc/config/ to local 3. Enter the following: > system restore path [passphrase passphrase] where n path is the location of configuration backup file on the IX20's filesystem (local-path in the previous step). n passphrase (optional) is the passphrase to restore the configuration backup, if a passphrase was used when the backup was created. For example: > system restore /etc/config/ IX20 User Guide 625 System administration Schedule system maintenance tasks Schedule system maintenance tasks You can configure tasks and custom scripts to be run during a specified maintenance window. Required configuration items n The time that the system maintenance tasks will start. n The duration window during which the system maintenance tasks can run. n The frequency (either daily or weekly) that the tasks will run. n The tasks to be performed. Options are: l Modem firmware update. l Configuration check. Additional configuration items n Custom scripts that should be run as part of the configuration check. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click System > Scheduled tasks > System maintenance. IX20 User Guide 626 System administration Schedule system maintenance tasks 4. For Start time, type the time of day that the maintenance window should start, using the syntax HH:MM. If Start time is not set, maintenance tasks are not scheduled and will not be run. The behavior of Start time varies depending on the setting of Duration window, which is configured in the next step. n If Duration window is set to Immediately, all scheduled tasks will begin at the exact time specified in Start time. n If Duration window is set to 24 hours, Start time is effectively obsolete and the maintenance tasks will be scheduled to run at any time. Setting Duration window to 24 hours can potentially overstress the device and should be used with caution. n If Duration window is set to any value other than to Immediately or 24 hours, the maintenance tasks will run at a random time during the time allotted for the duration window. n If Duration window is set to one or more hours, the minutes field in Start time is ignored and the duration window will begin at the beginning of the specified hour. 5. For Duration window, select the amount of time that the maintenance tasks will be run. If Immediately is selected, all scheduled tasks will begin at the exact time specified in Start time. 6. For Frequency, select either Daily or Weekly for the frequency that the maintenance tasks should be run. 7. (Optional) Click to enable Modem firmware update to instruct the system to look for any updated modem firmware during the maintenance window. If updated firmware is found, it will then be installed. Modem firmware update looks for updated firmware both on the local device and over the network, using either a WAN or cellular connection. 8. (Optional) Click to enable Configuration check to allow for the configuration to be updated, including by custom scripts, during the maintenance window. 9. (Optional) To schedule custom scripts: a. Click Custom scripts. Note This feature does not provide syntax or error checking. Certain commands can render the device inoperable. Use with care. Scripts created here are also automatically entered in Configuration > Applications. b. For Add Script, click . The schedule script configuration window is displayed. IX20 User Guide 627 System administration Schedule system maintenance tasks Scheduled scripts are enabled by default. To disable, click Enable to toggle off. c. (Optional) For Label, provide a label for the script. d. For Run mode, select the mode that will be used to run the script. Available options are: n On boot: The script will run once each time the device boots. l If On boot is selected, select the action that will be taken when the script completes in Exit action. Available options are: o None: Action taken when the script exits. o Restart script: Runs the script repeatedly. o Reboot: The device will reboot when the script completes. n Interval: The script will start running at the specified interval, within 30 seconds after the configuration change is saved. l If Interval is selected, in Interval, type the interval. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Interval to ten minutes, enter 10m or 600s. l Click to enable Run single to run only a single instance of the script at a time. If Run single is not selected, a new instance of the script will be started at every interval, regardless of whether the script is still running from a previous interval. n Set time: Runs the script at a specified time of the day. l If Set Time is selected, specify the time that the script should run in Run time, using the format HH:MM. n During system maintenance: The script will run during the system maintenance time window. e. For Commands, enter the commands that will execute the script. If the script begins with #!, then the script will be invoked in the location specified by the path for the script command. Otherwise, the default shell will be used (equivalent to #!/bin/sh). f. Script logging options: i. Click to enable Log script output to log the script's output to the system log. ii. Click to enable Log script errors to log script errors to the system log. If neither option is selected, only the script's exit code is written to the system log. IX20 User Guide 628 System administration Schedule system maintenance tasks g. For Maximum memory, enter the maximum amount of memory available to be used by the script and its subprocesses, using the format number {b|bytes|KB|k|MB|MB|M|GB|G|TB|T}. h. Click to enable Once to configure the script to run only once at the specified time. If Once is enabled, rebooting the device will cause the script to not run again. The only way to re-run the script is to: n Remove the script from the device and add it again. n Make a change to the script. n Uncheck Once. i. Sandbox is enabled by default, which restricts access to the file system and available commands that can be used by the script. This option protects the script from accidentally destroying the system it is running on. 10. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Schedule system maintenance: a. Configure the time of day that the maintenance window should start, using the syntax HH:MM. If the start time is not set, maintenance tasks are not scheduled and will not be run. (config)> system schedule maintenance from HH:MM (config)> The behavior of the start time varies depending on the setting of the duration length, which is configured in the next step. n If the duration length is set to 0, all scheduled tasks will begin at the exact time specified in the start time. n If the duration length is set to 24 hours, the start time is effectively obsolete and the maintenance tasks will be scheduled to run at any time. Setting the duration length to 24 hours can potentially overstress the device and should be used with caution. IX20 User Guide 629 System administration Schedule system maintenance tasks n If the duration length is set to any value other than to 0 or 24 hours, the maintenance tasks will run at a random time during the time allotted for the duration window. n If the duration length is set to one or more hours, the minutes field in the start time is ignored and the duration window will begin at the beginning of the specified hour. b. Configure the duration length (the amount of time that the maintenance tasks will be run). If 0 is used, all scheduled tasks will begin at the start time, defined in the previous step. system schedule maintenance length num (config)> where num is any whole number between 0 and 24. c. Configure the frequency that the maintenance tasks should be run: system schedule maintenance frequency value (config)> where value is either daily or weekly. Daily is the default. d. Configure the device to look for any updated modem firmware during the maintenance window. If updated firmware is found, it will then be installed. The device will look for updated firmware both on the local device and over the network, using either a WAN or cellular connection. system schedule maintenance modem_fw_update value (config)> where value is either true or false. yes or no, and 1 or 0 are also allowed. e. Allow for the configuration to be updated, including by custom scripts, during the maintenance window: system schedule maintenance config_check value (config)> where value is either true or false. yes or no, and 1 or 0 are also allowed. 4. (Optional) Schedule custom scripts: a. Add a script: (config)> add system schedule script end (config system schedule script 0)> Scheduled scripts are enabled by default. To disable: (config system schedule script 0)> enable false (config system schedule script 0)> b. (Optional) Provide a label for the script. (config system schedule script 0)> label value (config system schedule script 0)> where value is any string. if spaces are used, enclose value within double quotes. IX20 User Guide 630 System administration Schedule system maintenance tasks c. Set the mode that will be used to run the script: (config system schedule script 0)> when mode (config system schedule script 0)> where mode is one of the following: n boot: The script will run once each time the device boots. l If boot is selected, set the action that will be taken when the script completes: (config system schedule script 0)> exit_action action (config system schedule script 0)> where action is one of the following: o none: Action taken when the script exits. o restart: Runs the script repeatedly. o reboot: The device will reboot when the script completes. n interval: The script will start running at the specified interval, within 30 seconds after the configuration change is saved. If interval is selected: l Set the interval: (config system schedule script 0)> on_interval value (config system schedule script 0)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set on_interval to ten minutes, enter either 10m or 600s: (config system schedule script 0)> on_interval 600s (config system schedule script 0)> l (Optional) Configure the script to run only a single instance at a time: (config system schedule script 0)> once true (config system schedule script 0)> If once is set to false, a new instance of the script will be started at every interval, regardless of whether the script is still running from a previous interval. n set_time: Runs the script at a specified time of the day. l If set_time is set, set the time that the script should run, using the format HH:MM: (config system schedule script 0)> run_time HH:MM (config system schedule script 0)> n maintenance_time: The script will run during the system maintenance time window. IX20 User Guide 631 System administration Schedule system maintenance tasks d. Set the commands that will execute the script: (config system schedule script 0)> commands filename (config system schedule script 0)> where filename is the path and filename of the script, and any related command line information. If the script begins with #!, then the script will be invoked in the location specified by the path for the script command. Otherwise, the default shell will be used (equivalent to #!/bin/sh). e. Script logging options: n To log the script's output to the system log: (config system schedule script 0)> syslog_stdout true (config system schedule script 0)> n To log script errors to the system log: (config system schedule script 0)> syslog_stderr true (config system schedule script 0)> If syslog_stdout and syslog_stderr are not enabled, only the script's exit code is written to the system log. f. Set the maximum amount of memory available to be used by the script and its subprocesses: (config system schedule script 0)> max_memory value (config system schedule script 0)> where value uses the syntax number{b|bytes|KB|k|MB|MB|M|GB|G|TB|T}. g. To run the script only once at the specified time: (config system schedule script 0)> once true (config system schedule script 0)> If once is enabled, rebooting the device will cause the script to run again. The only way to re-run the script is to: n Remove the script from the device and add it again. n Make a change to the script. n Disable once. h. Sandbox is enabled by default. This option protects the script from accidentally destroying the system it is running on. (config system schedule script 0)> sandbox true (config system schedule script 0)> IX20 User Guide 632 System administration Disable device encryption 5. Save the configuration and apply the change: (config)> save Configuration saved. > 6. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Disable device encryption You can disable the cryptography on your IX20 device. This can be used to ship unused devices from overseas without needing export licenses from the country from which the device is being shipped. When device encryption is disabled, the following occurs: n The device is reset to the default configuration and rebooted. n After the reboot: l Access to the device via the WebUI and SSH are disabled. l All internet connectivity is disabled, including WAN and WWAN. Connectivity to central management software is also disabled. l All IP networks and addresses are disabled except for the default 192.168.210.1/24 network on the local LAN Ethernet port. DHCP server is also disabled. The device can only be accessed by using telnet from a local machine connecting to the 192.168.210.1/24 network. Disabling device encryption is not available in the WebUI. It can only be performed from the Admin CLI. Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. Disable encryption with the following command: > system disable-cryptography > 3. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Re-enable cryptography after it has been disabled. To re-enable cryptography: 1. Configure your PC network to connect to the 192.168.210 subnet. For example, on a Windows PC: IX20 User Guide 633 System administration Disable device encryption a. Select the Properties of the relevant network connection on the Windows PC. b. Click the Internet Protocol Version 4 (TCP/IPv4) parameter. c. Click Properties. The Internet Protocol Version 4 (TCP/IPv4) Properties dialog appears. d. Configure with the following details: n IP address for PC: 192.168.210.2 n Subnet: 255.255.255.0 n Gateway: 192.168.210.1 IX20 User Guide 634 System administration Configure the speed of your Ethernet ports 2. Connect the PC's Ethernet port to the ETH1 Ethernet port on your IX20 device. 3. Open a telnet session and connect to the IX20 device at the IP address of 192.168.210.1. 4. Log into the device: n Username: admin n Password: The default unique password for your device is printed on the device label. 5. At the shell prompt, type: # rm /etc/config/.nocrypt # flatfsd -i This will re-enable encryption and leave the device at its factory default setting. Configure the speed of your Ethernet ports You can configure the speed of your IX20 device's Ethernet ports. WebUI IX20 User Guide 635 System administration Configure the speed of your Ethernet ports 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > Device. 4. Click to expand the Ethernet port to be configured. 5. For Speed, select the appropriate speed for the Ethernet port, or select Auto to automatically detect the speed. The default is Auto. 6. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. At the config prompt, type: (config)> network device eth_port value where: n eth_port is the name of the Ethernet port (for example, eth1) n value is one of: l 10--Sets the speed to 10 Mbps. l 100--Sets the speed to 100 Mbps. IX20 User Guide 636 System administration Configure the speed of your Ethernet ports l 1000--Sets the speed to 1 Gbps. Available only for devices with Gigabit Ethernet ports. auto--Configures the device to automatically determine the best speed for the Ethernet port. The default is auto. 4. Save the configuration and apply the change: (config)> save Configuration saved. > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 637 Monitoring This chapter contains the following topics: intelliFlow 639 Configure NetFlow Probe 646 IX20 User Guide 638 Monitoring intelliFlow intelliFlow intelliFlow monitors system information, network data usage, and traffic information, and displays the information in a series of charts available in the local WebUI. To use intelliFlow, the IX20 must be powered on and you must have access to the local WebUI. Once you enable intelliFlow, the Status > intelliFlow option is available in the main menu. By default, intelliFlow is disabled. intelliFlow provides charts on the following information: n System utilisation n Top data usage by host n Top data usage by server n Top data usage by service n Host data usage over time intelliFlow charts are dymanic; at any point, you can click inside the chart to drill down to view more granular information, and menu options allow you to change various aspects of the information being displayed. Note When intelliFlow is enabled, it adds an estimated 50MB of data usage for the device by reporting the metrics to Digi Remote Manager. Enable intelliFlow Required configuration items n Enable intelliFlow. Additional configuration items n The firewall zone for internal clients being monitored by intelliFlow. To enable intelliFlow: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 639 Monitoring intelliFlow 3. Click Monitoring > intelliFlow. The intelliFlow configuration window is displayed. 4. Click Enable intelliFlow. 5. For Zone, select the firewall zone. Internal clients that are being monitored by IntelliFlow should be present on the specified zone. 6. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Enable IntelliFlow: (config)> monitoring intelliflow enable true 4. Set the firewall zone. Internal clients that are being monitored by IntelliFlow should be present on the specified zone: a. Determine available zones: (config)> monitoring intelliflow zone ? Zone: The firewall zone which is assigned to the network interface(s) IX20 User Guide 640 Monitoring intelliFlow that intelliFlow will see as internal clients. intelliFlow relies on an internal to external relationship, where the internal clients are present on the zone specified. Format: any dynamic_routes edge external internal ipsec loopback setup Default value: internal Current value: internal (config)> b. Set the zone to be used by IntelliFlow: (config)> monitoring intelliflow zone my_zone 5. Save the configuration and apply the change: (config)> save Configuration saved. > 6. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 641 Monitoring Use intelliFlow to display average CPU and RAM usage This procedure is only available from the WebUI. To display display average CPU and RAM usage: WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. If you have not already done so, enable intelliFlow. See Enable intelliFlow. 3. From the menu, click Status > intelliFlow. The System Utilisation chart is displayed: intelliFlow n Display more granular information: 1. Click and drag over an area in the chart to zoom into that area and provide more granular information. 2. Release to display the selected portion of the chart: IX20 User Guide 642 Monitoring 3. Click Reset zoom to return to the original display: intelliFlow n Change the time period displayed by the chart. By default, the System utilisation chart displays the average CPU and RAM usage over the last minute. You can change this to display the average CPU and RAM usage: l Over the last hour. l Over the last day. l Over the last 30 days. l Over the last 180 days. 1. Click the menu icon (). 2. Select the time period to be displayed. n Save or print the chart. 1. Click the menu icon (). 2. To save the chart to your local filesystem, select Export to PNG. 3. To print the chart, select Print chart. Use intelliFlow to display top data usage information With intelliFlow, you can display top data usage information based on the following: n Top data usage by host n Top data usage by server n Top data usage by service To generate a top data usage chart: WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. If you have not already done so, enable intelliFlow. See Enable intelliFlow. 3. From the menu, click Status > intelliFlow. IX20 User Guide 643 Monitoring intelliFlow 4. Display a data usage chart: n To display the Top Data Usage by Host chart, click Top Data Usage by Host. n To display the Top Data Usage by Server chart, click Top Data Usage by Server. n To display the Top Data Usage by Service chart, click Top Data Usage by Service. 5. Change the type of chart that is used to display the data: a. Click the menu icon (). b. Select the type of chart. 6. Change the number of top users displayed. You can display the top five, top ten, or top twenty data users. IX20 User Guide 644 Monitoring a. Click the menu icon (). b. Select the number of top users to displayed. intelliFlow 7. Save or print the chart. a. Click the menu icon (). b. To save the chart to your local filesystem, select Export to PNG. c. To print the chart, select Print chart. Use intelliFlow to display data usage by host over time To generate a chart displaying a host's data usage over time: WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. If you have not already done so, enable intelliFlow. See Enable intelliFlow. 3. From the menu, click Status > intelliFlow. 4. Click Host Data Usage Over Time. n Display more granular information: a. Click and drag over an area in the chart to zoom into that area and provide more granular information. IX20 User Guide 645 Monitoring b. Release to display the selected portion of the chart: Configure NetFlow Probe c. Click Reset zoom to return to the original display: n Save or print the chart. a. Click the menu icon (). b. To save the chart to your local filesystem, select Export to PNG. c. To print the chart, select Print chart. Configure NetFlow Probe NetFlow probe is used to probe network traffic on the IX20 device and export statistics to NetFlow collectors. Required configuration items n Enable NetFlow. n The IP address of a NetFlow collector. Additional configuration items n The NetFlow version. n Enable flow sampling and select the flow sampling technique. n The number of flows from which the flow sampler can sample. n The number of seconds that a flow is inactive before it is exported to the NetFlow collectors. n The number of seconds that a flow is active before it is exported to the NetFlow collectors. n The maximum number of simultaneous flows. n A label for the NetFlow collector. n The port of the NetFlow collector. n Additional NetFlow collectors. To probe network traffic and export statistics to NetFlow collectors: IX20 User Guide 646 Monitoring Configure NetFlow Probe WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Monitoring > NetFlow probe. 4. Enable NetFlow probe. 5. Protocol version: Select the Protocol version. Available options are: n NetFlow v5--Supports IPv4 only. n NetFlow v9--Supports IPv4 and IPv6. n NetFlow v10 (IPFIX)--Supports both IPv4 and IPv6 and includes IP Flow Information Export (IPFIX). The default is NetFlow v10 (IPFIX). 6. Enable Flow sampler by selecting a sampling technique. Flow sampling can reduce flow processing and transmission overhead by providing a representative subset of all flows. Available options are: n None--No flow sampling method is used. Each flow is accounted. n Deterministic--Selects every nth flow, where n is the value of Flow sampler population. n Random--Randomly selects one out of every n flows, where n is the value of Flow sampler population. IX20 User Guide 647 Monitoring Configure NetFlow Probe n Hash--Randomly selects one out of every n flows using the hash of the flow key, where n is the value of Flow sampler population. 7. For Flow sampler population, if you selected a flow sampler, enter the number of flows for the sampler. Allowed value is any number between 2 and 16383. The default is 100. 8. For Inactive timeout, type the the number of seconds that a flow can be inactive before sent to a collector. Allowed value is any number between 1 and 15. The default is 15. 9. For Active timeout, type the number of seconds that a flow can be active before sent to a collector. Allowed value is any number between 1 and 1800. The default is 1800. 10. For Maximum flows, type the maximum number of flows to probe simultaneously. Allowed value is any number between 0 and 2000000. The default is 2000000. 11. Add collectors: a. Click to expand Collectors. b. For Add Collector, click . c. (Optional) Type a Label for the collector. d. For Address, type the IP address of the collector. e. (Optional) For Port, enter the port number used by the collector. The default is 2055. Repeat to add additional collectors. 12. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Enable NetFlow: (config)> monitoring netflow enable true (config)> 4. Set the protocol version: (config)> monitoring netflow protocol version (config)> where version is one of: n v5--NetFlow v5 supports IPv4 only. n v9--NetFlow v9 supports IPv4 and IPv6. IX20 User Guide 648 Monitoring Configure NetFlow Probe n v10--NetFlow v10 (IPFIX) supports both IPv4 and IPv6 and includes IP Flow Information Export (IPFIX). The default is v10. 1. Enable flow sampling by selecting a sampling technique. Flow sampling can reduce flow processing and transmission overhead by providing a representative subset of all flows. (config)> monitoring netflow sampler type (config)> where type is one of: n none--No flow sampling method is used. Each flow is accounted. n deterministic--Selects every nth flow, where n is the value of the flow sample population. n random--Randomly selects one out of every n flows, where n is the value of the flow sample population. n hash--Randomly selects one out of every n flows using the hash of the flow key, where n is the value of the flow sample population. 5. If you are using a flow sampler, set the number of flows for the sampler: (config)> monitoring netflow sampler_population value (config)> where value is any number between 2 and 16383. The default is 100. 6. Set the number of seconds that a flow can be inactive before sent to a collector: (config)> monitoring netflow inactive_timeout value (config)> where value is any is any number between 1 and 15. The default is 15. 7. Set the number of seconds that a flow can be active before sent to a collector: (config)> monitoring netflow active_timeout value (config)> where value is any is any number between 1 and 1800. The default is 1800. 8. Set the maximum number of flows to probe simultaneously: (config)> monitoring netflow max_flows value (config)> where value is any is any number between 0 and 2000000. The default is 2000000. 9. Add collectors: a. Add a collector: (config)> add monitoring netflow collector end (config monitoring netflow collector 0)> IX20 User Guide 649 Monitoring Configure NetFlow Probe b. Set the IP address of the collector: (config monitoring netflow collector 0)> address ip_address (config monitoring netflow collector 0)> c. (Optional) Set the port used by the collector: (config monitoring netflow collector 0)> port port (config monitoring netflow collector 0)> d. (Optional) Set a label for the collector: (config monitoring netflow collector 0)> label "This is a collector." (config monitoring netflow collector 0)> Repeat to add additional collectors. 10. Save the configuration and apply the change: (config monitoring netflow collector 0)> save Configuration saved. > 11. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 650 Central management This chapter contains the following topics: Digi Remote Manager support 652 Configure Digi Remote Manager 652 Collect device health data and set the sample interval 658 Log into Digi Remote Manager 661 Use Digi Remote Manager to view and manage your device 663 Add a device to Digi Remote Manager 664 View Digi Remote Manager connection status 664 Use the Digi Remote Manager mobile app 665 Configure multiple devices using profiles 665 Learn more 666 IX20 User Guide 651 Central management Digi Remote Manager support Digi Remote Manager support Digi Remote Manager is a hosted remote configuration and management system that allows you to remotely manage a large number of devices. Remote Manager includes a web-based interface that you can use to perform device operations, such as viewing and changing device configurations and performing firmware updates. Remote Manager servers also provide a data storage facility. The Digi Remote Manager is the default cloud-based management system, and is enabled by default. You can also select to use Digi aView as the cloud-based management system. See Digi aView User Guide for information about aView. To use Remote Manager, you must set up a Remote Manager account. To set up a Remote Manager account and learn more about Digi Remote Manager, go to www.digi.com/products/cloud/digiremote-manager. To learn more about Remote Manager features and functions, see the Digi Remote Manager User Guide. Configure Digi Remote Manager By default, your IX20 device is configured to use central management using Digi Remote Manager. Additional configuration options These additional configuration settings are not typically configured, but you can set them as needed: n Disable the Digi Remote Manager connection if it is not required. You can also configure an alternate cloud-based central management application. n Change the reconnection timer. n The non-cellular keepalive timeout. n The cellular keepalive timeout. n The keepalive count before the Remote Manager connection is dropped. n SMS support. n HTTP proxy server support. To configure Digi Remote Manager: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. IX20 User Guide 652 Central management Configure Digi Remote Manager IX20 User Guide 653 Central management Configure Digi Remote Manager 3. Click Central management. The Central management configuration window is displayed. Digi Remote Manager support is enabled by default. To disable, click Enable central management. 4. (Optional) For Service, select either Digi Remote Manager or Digi aView. The default is Digi Remote Manager. 5. (Optional) For Management server, type the URL for the central management server. The default is the Digi Remote Manager server, my.devicecloud.com. 6. (Optional) For Management port, type the destination port for the remote cloud services connection. The default is 3199. 7. (Optional) For Retry interval, type the amount of time that the IX20 device should wait before reattempting to connect to remote cloud services after being disconnected. The default is 30 seconds. Allowed values are any number of hours, minutes, or seconds, and take the format number {h|m|s}. For example, to set Retry interval to ten minutes, enter 10m or 600s. 8. (Optional) For Keep-alive interval, type the amount of time that the IX20 device should wait between sending keep-alive messages to remote cloud services when using a non-cellular interface. The default is 60 seconds. Allowed values are any number of hours, minutes, or seconds, and take the format number {h|m|s}. For example, to set Keep-alive interval to ten minutes, enter 10m or 600s. 9. (Optional) For Cellular keep-alive interval, type the amount of time that the IX20 device should wait between sending keep-alive messages to remote cloud services when using a cellular interface. The default is 290 seconds. Allowed values are any number of hours, minutes, or seconds, and take the format number {h|m|s}. For example, to set Cellular keep-alive interval to ten minutes, enter 10m or 600s. 10. (Optional) For Allowed keep-alive misses, type the number of allowed keep-alive misses. The default is 3. 11. Enable watchdog is used to monitor the connection to remote cloud services. If the connection is down, you can configure the device to restart the connection, or to reboot. The watchdog is enabled by default. IX20 User Guide 654 Central management Configure Digi Remote Manager 12. If Enable watchdog is enabled: a. (Optional) For Restart Timeout, type the amount of time to wait before restarting the connection to the remote cloud services, once the connection is down. Allowed values are any number of hours, minutes, or seconds, and take the format number {h|m|s}. For example, to set Restart Timeout to ten minutes, enter 10m or 600s. The minimum value is 30 minutes and the maximum is 48 hours. If not set, this option is disabled. The default is 30 minutes. b. (Optional) For Reboot Timeout, type the amount of time to wait before rebooting the device, once the connection to the remote cloud servicesis down. By default, this option is not set, which means that the option is disabled. Allowed values are any number of hours, minutes, or seconds, and take the format number {h|m|s}. For example, to set Reboot Timeout to ten minutes, enter 10m or 600s. The minimum value is 30 minutes and the maximum is 48 hours. If not set, this option is disabled. The default is disabled. 13. (Optional) Enable Locally authenticate CLI to require a login and password to authenticate the user from the remote cloud services CLI. If disabled, no login prompt will be presented and the user will be logged in as admin. The default is disabled. 14. (Optional) Configure the IX20 device to communicate with remote cloud services by using SMS: a. Click to expand Short message service. b. Enable SMS messaging. c. For Destination phone number, type the phone number for the remote cloud services. d. (Optional) Type the Service identifier. 15. (Optional) Configure the IX20 device to communicate with remote cloud services by using an HTTP proxy server: a. Click to expand HTTP Proxy. b. Enable the use of an HTTP proxy server. c. For Server, type the hostname of the HTTP proxy server. d. For Port, type or select the port number on the HTTP proxy server that the device should connect to. The default is 2138. 16. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. IX20 User Guide 655 Central management Configure Digi Remote Manager 2. At the command line, type config to enter configuration mode: > config (config)> 3. Digi Remote Manager support is enabled by default. To disable Digi Remote Manager support: (config)> cloud enable false (config)> 4. (Optional) Set the service: (config)> cloud service value (config)> where value is either: n drm: Digi Remote Manager n aview: Digi aView The default is Digi Remote Manager. 5. (Optional) Set the URL for the central management server. The default is the Digi Remote Manager server, my.devicecloud.com. (config)> cloud drm drm_url url (config)> 6. (Optional) Set the amount of time that the IX20 device should wait before reattempting to connect to the remote cloud services after being disconnected. The minimum value is ten seconds. The default is 30 seconds. (config)> cloud drm retry_interval value where value is any number of hours, minutes, or seconds, and takes the format number{h|m|s}. For example, to set the retry interval to ten minutes, enter either 10m or 600s: (config)> cloud drm retry_interval 600s (config)> 7. (Optional) Set the amount of time that the IX20 device should wait between sending keep-alive messages to the Digi Remote Manager when using a non-cellular interface. Allowed values are from 30 seconds to two hours. The default is 60 seconds. (config)> cloud drm keep_alive value (config)> where value is any number of hours, minutes, or seconds, and takes the format number{h|m|s}. For example, to set the keep-alive interval to ten minutes, enter either 10m or 600s: (config)> cloud drm keep_alive 600s (config)> 8. (Optional) Set the amount of time that the IX20 device should wait between sending keep-alive messages to the Digi Remote Manager when using a cellular interface. Allowed values are from IX20 User Guide 656 Central management Configure Digi Remote Manager 30 seconds to two hours. The default is 290 seconds. (config)> cloud drm cellular_keep_alive value (config)> where value is any number of hours, minutes, or seconds, and takes the format number{h|m|s}. For example, to set the cellular keep-alive interval to ten minutes, enter either 10m or 600s: (config)> cloud drm cellular_keep_alive 600s (config)> 9. Set the number of allowed keep-alive misses. Allowed values are any integer between 2 and 64. The default is 3. (config)> cloud drm keep_alive_misses integer (config)> 10. The watchdog is used to monitor the connection to remote cloud services. If the connection is down, you can configure the device to restart the connection, or to reboot. The watchdog is enabled by default. To disable: (config)> cloud drm watchdog false (config)> 11. If watchdog is enabled: a. (Optional) Set the amount of time to wait before restarting the connection to the remote cloud services, once the connection is down. where value is any number of hours, minutes, or seconds, and takes the format number {h|m|s}. For example, to set restart_timeout to ten minutes, enter either 10m or 600s: (config)> cloud drm restart_timeout 600s (config)> The minimum value is 30 minutes and the maximum is 48 hours. If not set, this option is disabled. The default is 30 minutes. b. (Optional) Set the amount of time to wait before rebooting the device, once the connection to the remote cloud servicesis down. By default, this option is not set, which means that the option is disabled. where value is any number of hours, minutes, or seconds, and takes the format number {h|m|s}. For example, to set reboot_timeout to ten minutes, enter either 10m or 600s: (config)> cloud drm reboot_timeout 600s (config)> The minimum value is 30 minutes and the maximum is 48 hours. If not set, this option is disabled. The default is disabled. 12. (Optional) Determine whether to require a login and password to authenticate the user from the remote cloud services CLI: IX20 User Guide 657 Central management Collect device health data and set the sample interval (config)> cloud drm cli_local_auth true (config)> If set to false, no login prompt will be presented and the user will be logged in as admin. The default is false. 13. (Optional) Configure the IX20 device to communicate with remote cloud services by using SMS: a. Enable SMS messaging: (config)> cloud drm sms enable true (config)> b. Set the phone number for Digi Remote Manager: (config)> cloud drm sms destination drm_phone_number (config)> c. (Optional) Set the service identifier: (config)> cloud drm sms sercice_id id (config)> 1. (Optional) Configure the IX20 device to communicate with remote cloud services by using an HTTP proxy server: a. Enable the use of an HTTP proxy server: (config)> cloud drm proxy enable true (config)> b. Set the hostname of the proxy server: (config)> cloud drm proxy host hostname (config)> c. (Optional) Set the port number on the proxy server that the device should connect to. The default is 2138. (config)> cloud drm proxy port integer (config)> 14. Save the configuration and apply the change: (config)> save Configuration saved. > 15. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Collect device health data and set the sample interval You can enable or disable the collection of device health data to upload to Digi Remote Manager, and configure the interval between health sample uploads. By default, device health data upload is IX20 User Guide 658 Central management Collect device health data and set the sample interval enabled, and the health sample interval is set to 60 minutes. To avoid a situation where several devices are uploading health metrics information to Remote Manager at the same time, the IX20 device includes a preconfigured randomization of two minutes for uploading metrics. For example, if Health sample interval is set to five minutes, the metrics will be uploaded to Remote Manager at a random time between five and seven minutes. To disable the collection of device health data or enable it if it has been disabled, or to change the health sample interval: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Monitoring > Device Health. Device health data upload is enabled by default. To disable, click to toggle off Enable Device Health samples upload. 4. For Health sample interval, select the interval between health sample uploads. 5. Only report changed values to Digi Remote Manager is enabled by default. When enabled: n The device only reports device health metrics that have changed health metrics were last uploaded. This is useful to reduce the bandwidth used to report health metrics. n All metrics are uploaded once every hour. When disabled, all metrics are uploaded every Health sample interval. 6. (Optional) Click to expand Data point tuning. Data point tuning options allow to you configure what data are uploaded to the Digi Remote Manager. All options are enabled by default. IX20 User Guide 659 Central management Collect device health data and set the sample interval 7. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Device health data upload is enabled by default. To enable or disable: n To enable: (config)> monitoring devicehealth enable true (config)> n To disable: (config)> monitoring devicehealth enable false (config)> 4. The interval between health sample uploads is set to 60 minutes by default. To change: (config)> monitoring devicehealth interval value (config)> where value is one of 1, 5, 15, 30, or 60, and represents the number of minutes between uploads of health sample data. 5. By default, the device will only report health metrics values to Digi Remote Manager that have changed health metrics were last uploaded. This is useful to reduce the bandwidth used to report health metrics. This is useful to reduce the bandwidth used to report health metrics. Even if enabled, all metrics are uploaded once every hour. To disable: (config)> monitoring devicehealth only_send_deltas false (config)> When disabled, all metrics are uploaded every Health sample interval. 6. (Optional) Tuning parameters allow to you configure what data are uploaded to the Digi Remote Manager. By default, all tuning parameters are enabled. To view a list of all available tuning parameters, use the show command: IX20 User Guide 660 Central management Log into Digi Remote Manager (config)> show monitoring devicehealth tuning all cellular rx bytes enable true tx bytes enable true eth rx bytes enable true tx bytes enable true serial rx bytes enable true tx bytes enable true cellular 1 rx bytes enable true packets enable true ... (config)> To disable a tuning parameter, set its value to false. For example, to turn off all reporting for the serial port: (config)> monitoring devicehealth tuning all serial rx bytes enabled false (config)> monitoring devicehealth tuning all serial tx bytes enabled false (config)> 7. Save the configuration and apply the change: (config)> save Configuration saved. > 8. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Log into Digi Remote Manager To start Digi Remote Manager IX20 User Guide 661 Central management Log into Digi Remote Manager 1. If you have not already done so, click here to sign up for a Digi Remote Manager account. 2. Check your email for Digi Remote Manager login instructions. 3. Go to remotemanager.digi.com. 4. Log into your Digi Remote Manager account. IX20 User Guide 662 Central management Use Digi Remote Manager to view and manage your device Use Digi Remote Manager to view and manage your device To view and manage your device: 1. If you have not already done so, connect to your Digi Remote Manager account. 2. Click Device Management to display a list of your devices. 3. Use the Search bar to locate the device you want to manage. 4. Select the device and click Properties to view general information for the device. 5. Click the More menu to perform a task. IX20 User Guide 663 Central management Add a device to Digi Remote Manager Add a device to Digi Remote Manager 1. If you have not already done so, connect to your Digi Remote Manager account. 2. Click Device Management to display a list of your devices. 3. Click Add Devices. 4. Select MAC Address and enter the Ethernet MAC address for your device. 5. For Install Code, enter the default password on the printed label packaged with your device. The same default password is also shown on the label affixed to the bottom of the device. 6. Click Add. 7. Click OK. Digi Remote Manager adds your IX20 device to your account and it appears in the Device Management view. View Digi Remote Manager connection status To view the current Digi Remote Manager configuration: WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. The dashboard includes a Digi Remote Manager status pane: Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. View the central management configuration: (config)> show cloud drm cellular_keep_alive 290s drm_url my.devicecloud.com keep_alive 60s keep_alive_misses 3 retry_interval 30s enable true (config)> 1. Type cancel to exit configuration mode: (config)> cancel > IX20 User Guide 664 Central management Use the Digi Remote Manager mobile app 2. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. To view the status of your device's connection to Remote Manager, use the show cloud command at the command line: Command line > show cloud Device Cloud Status ------------------- Status : Connected Server : my.devicecloud.com Device ID : 00000000-00000000-0040FFFF-FF0F4594 > The Device ID is the unique identifier for the device, as used by the Remote Manager. Use the Digi Remote Manager mobile app If you have a smart phone or tablet, you can use the Digi Remote Manager mobile app to automatically provision a new devices and monitor devices in your account. To download the mobile app: n For iPhone, go to the App Store n For Android phones, go to Google Play To sign up for a new Digi Remote Manager account using the mobile app: 1. From the menu, click Log in or Sign Up. 2. Click Sign up to create a new account. 3. You'll receive an email with login instructions. 4. From the Digi Remote Manager mobile app, click Log in and log into your new account. To register a new device: 1. From the menu, select Install a device with a QR or bar code and scan the installation QR code on the label. 2. Follow the prompts to complete your IX20 registration. Digi Remote Manager registers your IX20 and adds it to your Digi Remote Manager device list. You can now manage the device remotely using Digi Remote Manager. Configure multiple devices using profiles Digi recommends you take advantage of Digi Remote Manager profiles to manage multiple IX20 routers. Typically, if you want to provision multiple IX20 routers: IX20 User Guide 665 Central management Learn more 1. Using the IX20 local WebUI, configure one IX20 router to use as the model configuration for all subsequent IX20s you need to manage. 2. Register the configured IX20 device in your Digi Remote Manager account. 3. In Digi Remote Manager, create a profile based on the configured IX20. 4. Apply the profile to the IX20 devices you need to configure. Digi Remote Manager provides multiple methods for applying profiles to registered devices. You can also include site-specific settings with a profile to override settings on a device-by-device basis. Learn more n For information on using Digi Remote Manager to configure and manage IX20 routers, see the Digi Remote Manager User Guide. n For information on using Digi Remote Manager APIs to develop custom applications, see the Digi Remote Manager Programmer Guide. IX20 User Guide 666 File system This chapter contains the following topics: The IX20 local file system 668 Display directory contents 668 Create a directory 669 Display file contents 670 Copy a file or directory 670 Move or rename a file or directory 671 Delete a file or directory 672 Upload and download files 673 IX20 User Guide 667 File system The IX20 local file system The IX20 local file system The IX20 local file system has approximately 150 MB of space available for storing files, such as Python programs, alternative configuration files and firmware versions, and release files, such as cellular module images. The writable directories within the filesystem are: n /tmp n /opt n /etc/config Files stored in the /tmp directory do not persist across reboots. Therefore, /tmp is a good location to upload temporary files, such as files used for firmware updates. Files stored in /opt and /etc/config do persist across reboots, but are deleted if a factory reset of the system is performed. See Reset the device to factory defaults for more information. Display directory contents To display directory contents by using the WebUI or the Admin CLI: WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. On the menu, click System. Under Administration, click File System. The File System page appears. 3. Highlight a directory and click to open the directory and view the files in the directory. Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the Admin CLI prompt, type ls /path/dir_name. For example, to display the contents of the /etc/config directory: IX20 User Guide 668 File system Create a directory > ls /etc/config -rw-r--r-- 1 root drw------- 2 root drwxr-xr-x 3 root -rw-r--r-- 1 root ... > root root root root 856 Nov 20 20:12 accns.json 160 Sep 23 04:02 analyzer 224 Sep 23 04:02 cc_acl 47 Sep 23 04:02 dhcp.leases 3. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Create a directory Command line This procedure is not available through the WebUI. To make a new directory, use the mkdir command, specifying the name of the directory. For example: 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the Admin CLI prompt, type mkdir /path/dir_name. For example, to create a directory named temp in /etc/config: > mkdir /etc/config/temp > 3. Verify that the directory was created: > ls /etc/config ... -rw-r--r-- 1 root -rw------- 1 root -rw-r--r-- 1 root drwxr-xr-x 2 root > root root root root 1436 Aug 12 21:36 ssl.crt 3895 Aug 12 21:36 ssl.pem 10 Aug 5 06:41 start 160 Aug 25 17:49 temp 4. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 669 File system Display file contents Display file contents This procedure is not available through the WebUI. To display the contents of a file by using the Admin CLI, , use the more command, specifying the name of the directory. For example: Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the Admin CLI prompt, type more /path/filename. For example, to view the contenct of the file accns.json in /etc/config: > more /etc/config/accns.json { "auth": "user": { "admin": { "password": "$2a$05$W1sls1oxsadf/n4J0XT.Rgr6ewr1yerHtXQdbafsatGswKg0YUm" } } }, "schema": { "version": "461" } } > 3. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Copy a file or directory This procedure is not available through the WebUI. To copy a file or directory by using the Admin CLI, use the cp command, specifying the existing path and filename followed by the path and filename of the new file, or specifying the existing path and directory name followed by the path and directory name of the new directory. Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the Admin CLI prompt, type cp /path/filename|dir_name /path[filename]|dir_name. For example: IX20 User Guide 670 File system Move or rename a file or directory n To copy the file /etc/config/accns.json to a file named backup_cfg.json in a directory named /etc/config/test, enter the following: > cp /etc/config/accns.json /etc/config/test/backup_cfg.json > n To copy a directory named /etc/config/test to /opt: > cp /etc/config/test/ /opt/ > 3. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Move or rename a file or directory This procedure is not available through the WebUI. To move or rename a file or directory by using the Admin CLI, use the mv command. Command line To rename a file named test.py in /etc/config/scripts to final.py: 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the Admin CLI prompt, type: > mv /etc/config/scripts/test.py /etc/config/scripts/final.py > 3. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. To move test.py from /etc/config/scripts to /opt: 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the Admin CLI prompt, type: > mv /etc/config/scripts/test.py /opt/ > 3. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 671 File system Delete a file or directory Delete a file or directory To delete a file or directory by using the WebUI or the Admin CLI: WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. On the menu, click System. Under Administration, click File System. The File System page appears. 3. Highlight the directory containing the file to be deleted and click to open the directory. 4. Highlight the file to be deleted and click . 5. Click OK to confirm. Command line To delete a file named test.py in /etc/config/scripts: 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the Admin CLI prompt, type: > rm /etc/config/scripts/test.py rm: remove '/etc/config/scripts/test.py'? yes > 3. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. To delete a directory named temp from /opt: 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. IX20 User Guide 672 File system Upload and download files 2. At the Admin CLI prompt, type: > rm /opt/temp/ rm: descend into directory '/opt/temp'? yes rm: remove directory '/opt/temp'? yes > 3. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Upload and download files You can download and upload files by using the WebUI or from the command line by using the scp Secure Copy command, or by using a utility such as SSH File Transfer Protocol (SFTP) or an SFTP application like FileZilla. Upload and download files by using the WebUI Upload files 1. Log into the IX20 WebUI as a user with Admin access. 2. On the menu, click System. Under Administration, click File System. The File System page appears. 3. Highlight the directory to which the file will be uploaded and click to open the directory. 4. Click (upload). 5. Browse to the location of the file on your local machine. Select the file and click Open to upload the file. IX20 User Guide 673 File system Upload and download files Download files 1. Log into the IX20 WebUI as a user with Admin access. 2. On the menu, click System. Under Administration, click File System. The File System page appears. 3. Highlight the directory to which the file will be uploaded and click to open the directory. 4. Highlight the appropriate file and click (download). Upload and download files by using the Secure Copy command Copy a file from a remote host to the IX20 device To copy a file from a remote host to the IX20 device, use the scp command as follows: > scp host hostname-or-ip user username remote remote-path local local-path to local where: n hostname-or-ip is the hostname or ip address of the remote host. n username is the name of the user on the remote host. n remote-path is the path and filename of the file on the remote host that will be copied to the IX20 device. n local-path is the location on the IX20 device where the copied file will be placed. For example: To copy firmware from a remote host with an IP address of 192.168.4.1 to the /etc/config directory on the IX20 device, issue the following command: > scp host 192.168.4.1 user admin remote /home/admin/bin/IX20-20.11.32.138.bin local /etc/config/ to local admin@192.168.4.1's password: adminpwd IX20-20.11.32.138.bin 100% 36MB 11.1MB/s 00:03 > IX20 User Guide 674 File system Upload and download files Transfer a file from the IX20 device to a remote host To copy a file from the IX20 device to a remote host, use the scp command as follows: > scp host hostname-or-ip user username remote remote-path local local-path to remote where: n hostname-or-ip is the hostname or ip address of the remote host. n username is the name of the user on the remote host. n remote-path is the location on the remote host where the file will be copied. n local-path is the path and filename on the IX20 device. For example: To copy a support report from the IX20 device to a remote host at the IP address of 192.168.4.1: 1. Use the system support-report command to generate the report: > system support-report /etc/config/ Saving support report to /etc/config/support-report-0040D0133536-20-12-028:44:23.bin Support report saved. > 2. Use the scp command to transfer the report to a remote host: > scp host 192.168.4.1 user admin remote /home/admin/temp/ local /etc/config/support-report-00:40:D0:13:35:36-20-12-02-8:44:23.bin to remote admin@192.168.4.1's password: adminpwd support-report-0040D0133536-20-12-02-8:44:23.bin > Upload and download files using SFTP Transfer a file from a remote host to the IX20 device This example uploads firmware from a remote host to the IX20 device with an IP address of 192.168.2.1, using the username ahmed: $ sftp ahmed@192.168.2.1 Password: Connected to 192.168.2.1 sftp> put IX20-20.11.32.138 Uploading IX20-20.11.32.138 to IX20-20.11.32.138 IX20-20.11.32.138 100% 24M 830.4KB/s 00:00 sftp> exit $ Transfer a file from the IX20 device to a remote host This example downloads a file named test.py from the IX20 device at the IP address of 192.168.2.1 with a username of ahmed to the local directory on the remote host: IX20 User Guide 675 File system $ sftp ahmed@192.168.2.1 Password: Connected to 192.168.2.1 sftp> get test.py Fetching test.py to test.py test.py 100% 254 0.3KB/s 00:00 sftp> exit $ Upload and download files IX20 User Guide 676 Diagnostics This chapter contains the following topics: Generate a support report 678 View system and event logs 679 Configure syslog servers 683 Configure options for the event and system logs 685 Analyze network traffic 690 Use the ping command to troubleshoot network connections 702 Use the traceroute command to diagnose IP routing problems 702 IX20 User Guide 677 Diagnostics Generate a support report Generate a support report To generate and download a support report: WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. On the main menu, click System. Under Administration, click Support Report. 3. Click to generate and download the support report. Attach the support report to any support requests. Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. Use the system support-report command to generate the report: > system support-report /etc/config/ Saving support report to /etc/config/support-report-0040D0133536-20-12-028:44:23.bin Support report saved. > 3. Use the scp command to transfer the report to a remote host: > scp host 192.168.4.1 user admin remote /home/admin/temp/ local /etc/config/support-report-00:40:D0:13:35:36-20-12-02-8:44:23.bin to remote admin@192.168.4.1's password: adminpwd support-report-0040D0133536-20-12-02-8:44:23.bin > 4. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 678 Diagnostics View system and event logs View system and event logs See Configure options for the event and system logs for information about configuring the information displayed in event and system logs. View System Logs WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. On the main menu, click System > Logs. The system log displays: 3. Limit the display in the system log by using the Find search tool. 4. Use filters to configure the types of information displayed in the system logs. IX20 User Guide 679 Diagnostics 5. Click to download the system log. View system and event logs Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. Use show log at the Admin CLI prompt: > show log Timestamp Message -------------- ----------------------------------------------------------- -- Nov 26 21:54:34 IX20 netifd: Interface 'interface_wan' is setting up now Nov 26 21:54:35 IX20 firewalld[621]: reloading status ... > 3. (Optional) Use the show log number num command to limit the number of lines that are displayed. For example, to limit the log to the most recent ten lines: > show log number 10 Timestamp Message -------------- ----------------------------------------------------------- -- Nov 26 21:54:34 IX20 netifd: Interface 'interface_wan' is setting up now Nov 26 21:54:35 IX20 firewalld[621]: reloading status ... > 4. (Optional) Use the show log filter value command to limit the number of lines that are displayed. Allowed values are critical, warning, info, and debug. For example, to limit the event list to only info messages: > show log filter info Timestamp Type Category Message ---------------- ------- --------- ---------------------------------------- --- Nov 26 22:01:26 info user name=admin~service=cli~state=opened~remote=192.168.1.2 Nov 26 22:01:25 info user name=admin~service=cli~state=closed~remote=192.168.1.2 ... > IX20 User Guide 680 Diagnostics View system and event logs 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. View Event Logs WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. On the main menu, click System > Logs. 3. Click System Logs to collapse the system logs viewer, or scroll down to Events. 4. Click Events to expand the event viewer. 5. Limit the display in the event log by using the Find search tool. 6. Click to download the event log. Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. IX20 User Guide 681 Diagnostics View system and event logs 2. Use show event at the Admin CLI prompt: > show event Timestamp Type Category Message ---------------- ------- --------- ---------------------------------------- --- Nov 26 21:42:37 status stat intf=eth1~type=ethernet~rx=11332435~tx=5038762 Nov 26 21:42:35 status system local_time=Thu, 08 Aug 2019 21:42:35 +0000~uptime=3 hours, 0 minutes, 48 seconds ... > 3. (Optional) Use the show event number num command to limit the number of lines that are displayed. For example, to limit the event list to the most recent ten lines: > show event number 10 Timestamp Type Category Message ---------------- ------- --------- ---------------------------------------- --- Nov 26 21:42:37 status stat intf=eth1~type=ethernet~rx=11332435~tx=5038762 Nov 26 21:42:35 status system local_time=Thu, 08 Aug 2019 21:42:35 +0000~uptime=3 hours, 0 minutes, 48 seconds ... > 4. (Optional) Use the show event table value command to limit the number of lines that are displayed. Allowed values are error, info, and status. For example, to limit the event list to only info messages: > show event table info Timestamp Type Category Message ---------------- ------- --------- ---------------------------------------- --- Nov 26 22:01:26 info user name=admin~service=cli~state=opened~remote=192.168.1.2 Nov 26 22:01:25 info user name=admin~service=cli~state=closed~remote=192.168.1.2 ... > 5. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 682 Diagnostics Configure syslog servers Configure syslog servers You can configure remote syslog servers for storing event and system logs. WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click System > Log. 4. Add and configure a remote syslog server: a. Click to expand Server list. b. For Add Server, click . The log server configuration window is displayed. IX20 User Guide 683 Diagnostics Configure syslog servers Log servers are enabled by default. To disable, click to toggle off Enable. c. Type the host name or IP address of the Server. d. Select the event categories that will be sent to the server. By default, all event categories are enabled. You can disable logging for error, informational, and status event categories by clicking to toggle off the category. e. For Syslog egress port, type the port number to use for the syslog server. The default is 514. f. For Protocol, select the IP protocol to use for communication with the syslog server. Available options are TCP and UPD. The default is UPD. 5. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. (Optional) To configure remote syslog servers: a. Add a remote server: (config)> add system log remote end (config system log remote 0)> b. Enable the server: (config system log remote 0)> enable true (config system log remote 0)> c. Set the host name or IP address of the server: (config system log remote 0)> server hostname (config system log remote 0)> IX20 User Guide 684 Diagnostics Configure options for the event and system logs d. The event categories that will be sent to the server are automatically enabled when the server is enabled. n To disable informational event messages: (config system log remote 0)> info false (config system log remote 0)> n To disable status event messages: (config system log remote 0)> status false (config system log remote 0)> n To disable informational event messages: (config system log remote 0)> error false (config system log remote 0)> 4. Set the port number to use for the syslog server: (config system log remote 0)> port value (config system log remote 0)> where value is any integer between 1 and 65535. The default is 514. 5. Set the IP protocol to use for communication with the syslog server: (config system log remote 0)> protocol value (config system log remote 0)> where value is either tcp or udp. The default is udp. 6. Save the configuration and apply the change: (config)> save Configuration saved. > 7. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Configure options for the event and system logs The default configuration for event and system logging is: n The heartbeat interval, which determines the amount of time to wait before sending a heartbeat event if no other events have been sent, is set to 30 minutes. n All event categories are enabled. To change or disable the heartbeat interval, or to disable event categories, and to perform other log configuration: WebUI IX20 User Guide 685 Diagnostics Configure options for the event and system logs 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click System > Log. 4. (Optional) To change the Heartbeat interval from the default of 30 minutes, type a new value. The heartbeat interval determines the amount of time to wait before sending a heartbeat event if no other events have been sent. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Heartbeat interval to ten minutes, enter 10m or 600s. To disable the Heartbeat interval, enter 0s. 5. (Optional) To disable event categories, or to enable them if they have been disabled: a. Click to expand Event Categories. b. Click an event category to expand. c. Depending on the event category, you can enable or disable informational events, status events, and error events. Some categories also allow you to set the Status interval, which is the time interval between periodic status events. 6. (Optional) See Configure syslog servers for information about configuring remote syslog servers to which log messages will be sent. 7. Enable Preserve system logs to save the current session's system log after a reboot. By default, the IX20 device erases system logs each time the device is powered off or rebooted. IX20 User Guide 686 Diagnostics Configure options for the event and system logs Note You should only enable Preserve system logs temporarily to debug issues. Once you are finished debugging, immediately disable Preserve system logs to avoid unnecessary wear to the flash memory. 8. Click Apply to save the configuration and apply the change. Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. (Optional) To change the heartbeat interval from the default of 30 minutes, set a new value. The heartbeat interval determines the amount of time to wait before sending a heartbeat event if no other events have been sent. (config)> system log heartbeat_interval value (config)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set the heartbeat interval to ten minutes, enter either 10m or 600s: (config)> system log heartbeat_interval 600s (config)> To disable the heartbeat interval, set the value to 0s 4. Enable preserve system logs functionality to save the current session's system log after a reboot. By default, the IX20 device erases system logs each time the device is powered off or rebooted. Note You should only enable Preserve system logs temporarily to debug issues. Once you are finished debugging, immediately disable Preserve system logs to avoid unnecessary wear to the flash memory. (config)> system log persistent true (config)> IX20 User Guide 687 Diagnostics Configure options for the event and system logs 5. (Optional) To disable event categories, or to enable them if they have been disabled: a. Use the question mark (?) to determine available event categories: (config)> system log event ? Event categories: Settings to enable individual event categories. Additional Configuration ----------------------------------------------------------------------- -------- arping ARP ping config Configuration dhcpserver DHCP server firmware Firmware location Location modem Modem netmon Active recovery network Network interfaces openvpn OpenVPN portal Captive portal remote Remote control restart Restart serial Serial sms SMS commands speed Speed stat Network statistics user User wireless WiFi wol Wake-On-LAN (config)> system log event b. Depending on the event category, you can enable or disable informational events, status events, and error events. Some categories also allow you to set the status interval, which is the time interval between periodic status events. For example, to configure DHCP server logging: i. Use the question mark (?) to determine what events are available for DHCP server logging configuration: (config)> system log event dhcpserver ? ... DHCP server: Settings for DHCP server events. Informational events are generated when a lease is obtained or released. Status events report the current list of leases. Parameters Current Value ------------------------------------------------------------------- ------------ IX20 User Guide 688 Diagnostics Configure options for the event and system logs info status status_interval true true 30m Enable informational events Enable status events Status interval (config)> system log event dhcpserver ii. To disable informational messages for the DHCP server: (config)> system log event dhcpserver info false (config)> iii. To change the status interval: (config)> system log event dhcpserver status_interval value (config)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set the status interval to ten minutes, enter either 10m or 600s: (config)> system log event dhcpserver status_interval 600s (config)> 6. (Optional) See Configure syslog servers for information about configuring remote syslog servers to which log messages will be sent. 7. Save the configuration and apply the change: (config)> save Configuration saved. > 8. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 689 Diagnostics Analyze network traffic Analyze network traffic The IX20 device includes a network analyzer tool that captures data traffic on any interface and decodes the captured data traffic for diagnostics. You can capture data traffic on multiple interfaces at the same time and define capture filters to reduce the captured data. You can capture up to 10 MB of data traffic in two 5 MB files per interface. To perform a more detailed analysis, you can download the captured data traffic from the device and view it using a third-party application. Note Data traffic is captured to RAM and the captured data is lost when the device reboots unless you save the data to a file. See Save captured data traffic to a file. This section contains the following topics: Configure packet capture for the network analyzer 691 Example filters for capturing data traffic 695 Capture packets from the command line 696 Stop capturing packets 697 Show captured traffic data 697 Save captured data traffic to a file 699 Download captured data to your PC 700 Clear captured data 701 IX20 User Guide 690 Diagnostics Analyze network traffic Configure packet capture for the network analyzer To use the network analyzer, you must create one or more packet capture configuration. Required configuration items n The interface used by this packet capture configuration. Additional configuration items n The filter expression for this packet capture configuration. n Schedule the analyzer to run based on a specified event or at a particular time: l The events or time that will trigger the analyzer to run, using this capture configuration. l The amount of time that the analyzer session will run. l The frequency with which captured events will be saved. To configure a packet capture configuration: WebUI 1. Log into the IX20 WebUI as a user with full Admin access rights. 2. On the menu, click System. Under Configuration, click Device Configuration. The Configuration window is displayed. 3. Click Network > Analyzer. 4. For Add Capture settings, type a name for the capture filter and click . The new capture filter configuration is displayed. IX20 User Guide 691 Diagnostics Analyze network traffic 5. Add one or more interface to the capture filter: a. Click to expand Device. b. Click to add an interface to the capture setting instance. c. For Device, select an interface. d. Repeat to add additional interfaces to the capture filter. 6. (Optional) For Berkeley packet filter expression, type a filter using Berkeley Packet Filter (BPF) syntax. See Example filters for capturing data traffic for examples of filters using BPF syntax. 7. (Optional) Schedule the analyzer to run, using this capture filter, based on a specified event or at a particular time: a. For Run mode, select the mode that will be used to run the capture filter. Available options are: n On boot: The capture filter will run once each time the device boots. n Interval: The capture filter will start running at the specified interval, within 30 seconds after the configuration change is saved. l If Interval is selected, in Interval, type the interval. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Interval to ten minutes, enter 10m or 600s. n Set time: Runs the capture filter at a specified time of the day. l If Set Time is selected, specify the time that the capture filter should run in Run time, using the format HH:MM. n During system maintenance: The capture filter will run during the system maintenance time window. b. Enable the capture filter schedule. c. For Duration, type the amount of time that the scheduled analyzer session will run. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Duration to ten minutes, enter 10m or 600s. d. For Save interval, type the frequency with which captured events will be saved. Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the format number{w|d|h|m|s}. For example, to set Save interval to ten minutes, enter 10m or 600s. IX20 User Guide 692 Diagnostics 8. Click Apply to save the configuration and apply the change. Analyze network traffic Command line 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> 3. Add a new capture filter: (config)> add network analyzer name (config network analyzer name)> 4. Add an interface to the capture filter: (config network analyzer name)> add device end device (config network analyzer name)> Determine available devices and the proper syntax. To determine available devices and proper syntax, use the space bar autocomplete feature: (config network analyzer name)> add device end <space> /network/device/eth1 /network/device/eth2 /network/device/loopback /network/bridge/lan /network/interface/defaultip /network/interface/defaultlinklocal /network/interface/eth1 /network/interface/eth2 /network/interface/loopback /network/interface/modem (config network analyzer name)> add interface end /network/ Repeat to add additional interfaces. 5. (Optional) Set a filter for the capture filter: (config network analyzer name)> filter value (config network analyzer name)> where value is a filter using Berkeley Packet Filter (BPF) syntax. Values that contain spaces must be enclosed in double quotes ("). See Example filters for capturing data traffic for examples of filters using BPF syntax. 6. (Optional) Schedule the analyzer to run, using this capture filter, based on a specified event or at a particular time: IX20 User Guide 693 Diagnostics Analyze network traffic a. Enable scheduling for this capture filter: (config network analyzer name)> schedule enable true (config network analyzer name)> b. Set the mode that will be used to run the capture filter: (config network analyzer name)> when mode (config network analyzer name)> where mode is one of the following: n boot: The script will run once each time the device boots. n interval: The script will start running at the specified interval, within 30 seconds after the configuration change is saved. If interval is selected, set the interval: (config add network analyzer name)> on_interval value (config add network analyzer name)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set on_interval to ten minutes, enter either 10m or 600s: (config network analyzer name)> on_interval 600s (config network analyzer name)> n set_time: Runs the script at a specified time of the day. If set_time is set, set the time that the script should run, using the format HH:MM: (config network analyzer name)> run_time HH:MM (config network analyzer name)> n maintenance_time: The script will run during the system maintenance time window. c. Set the amount of time that the scheduled analyzer session will run: (config network analyzer name)> duration value (config network analyzer name)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. For example, to set duration to ten minutes, enter either 10m or 600s: (config network analyzer name)> save_interval 600s (config network analyzer name)> d. Set the frequency with which captured events will be saved: (config network analyzer name)> save_interval value (config network analyzer name)> where value is any number of weeks, days, hours, minutes, or seconds, and takes the format number{w|d|h|m|s}. IX20 User Guide 694 Diagnostics Analyze network traffic For example, to set save_interval to ten minutes, enter either 10m or 600s: (config network analyzer name)> save_interval 600s (config network analyzer name)> 7. Save the configuration and apply the change: (config)> save Configuration saved. > 8. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Example filters for capturing data traffic The following are examples of filters using Berkeley Packet Filter (BPF) syntax for capturing several types of network data. See https://biot.com/capstats/bpf.html for detailed information about BPF syntax. Example IPv4 capture filters n Capture traffic to and from IP host 192.168.1.1: ip host 192.168.1.1 n Capture traffic from IP host 192.168.1.1: ip src host 192.168.1.1 n Capture traffic to IP host 192.168.1.1: ip dst host 192.168.1.1 n Capture traffic for a particular IP protocol: ip proto protocol where protocol is a number in the range of 1 to 255 or one of the following keywords: icmp, icmp6, igmp, pim, ah, esp, vrrp, udp, or tcp. n Capture traffic to and from a TCP port 80: ip proto tcp and port 80 n Capture traffic to UDP port 53: ip proto udp and dst port 53 n Capture traffic from UDP port 53: ip proto udp and src port 53 IX20 User Guide 695 Diagnostics Analyze network traffic n Capture to and from IP host 10.0.0.1 but filter out ports 22 and 80: ip host 10.0.0.1 and not (port 22 or port 80) Example Ethernet capture filters n Capture Ethernet packets to and from a host with a MAC address of 00:40:D0:13:35:36: ether host 00:40:D0:13:35:36 n Capture Ethernet packets from host 00:40:D0:13:35:36: ether src 00:40:D0:13:35:36: n Capture Ethernet packets to host 00:40:D0:13:35:36: ether dst 00:40:D0:13:35:36 Capture packets from the command line You can start packet capture at the command line with the analyzer start command. Alternatively, you can schedule the network analyzer to run based on a specified event or at a particular time. See Configure packet capture for the network analyzer for information about scheduling packet capturing. Additional analyzer commands allow you to: n Stop capturing packets. n Save captured data traffic to a file. n Clear captured data. Required configuration items n A configured packet capture. See Configure packet capture for the network analyzer for packet capture configuration information. To start packet capture from the command line: Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. Type the following at the Admin CLI prompt: > analyzer start name capture_filter > where capture_filter is the name of a packet capture configuration. See Configure packet capture for the network analyzer for more information. To determine available packet capture configurations, use the ?: IX20 User Guide 696 Diagnostics Analyze network traffic > analyzer start name ? name: Name of the capture filter to use. Format: test_capture capture_ping > analyzer start name You can capture up to 10 MB of data traffic in two 5 MB files per interface. Note Data traffic is captured to RAM and the captured data is lost when the device reboots unless you save the data to a file. See Save captured data traffic to a file. Stop capturing packets You can stop packet capture at the command line with the analyzer stop command. To stop packet capture from the command line: Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. Type the following at the Admin CLI prompt: > analyzer stop name capture_filter > where capture_filter is the name of a packet capture configuration. See Configure packet capture for the network analyzer for more information. To determine available packet capture configurations, use the ?: > analyzer stop name ? name: Name of the capture filter to use. Format: test_capture capture_ping > analyzer stop name Show captured traffic data To view captured data traffic, use the show analyzer command. The command output show the following information for each packet: n The packet number. n The timestamp for when the packet was captured. IX20 User Guide 697 Diagnostics Analyze network traffic n The length of the packet and the amount of data captured. n Whether the packet was sent or received by the device. n The interface on which the packet was sent or received. n A hexadecimal dump of the packet of up to 256 bytes. n Decoded information of the packet. To show captured data traffic: Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. Type the following at the Admin CLI prompt: > show analyzer name capture_filter Packet 1 : Dec-02-2020 8:44:23.287682, Length 60 bytes (Captured Length 60 bytes) Received on interface eth1 00 40 ff 80 01 20 b4 b6 00 28 3d 36 40 00 80 06 4a 48 cd ae 00 16 a4 4b 08 02 c7 40 00 00 00 00 86 21 b5 73 08 00 45 00 14 bc 0a 0a 4a 82 0a 0a ff 5f ee 1f d8 23 50 10 00 00 00 00 .@... .. .!.s..E. .(=6@... ....J.. JH.....K ._...#P. ...@.... .... Ethernet Header Destination MAC Addr : 00:40:D0:13:35:36 Source MAC Addr : fb:03:53:05:11:2f Ethernet Type : IP (0x0800) IP Header IP Version :4 Header Length : 20 bytes ToS : 0x00 Total Length : 40 bytes ID : 15670 (0x3d36) Flags : Do not fragment Fragment Offset : 0 (0x0000) TTL : 128 (0x80) Protocol : TCP (6) Checksum : 0x14bc Source IP Address : 10.10.74.130 Dest. IP Address : 10.10.74.72 TCP Header Source Port : 52654 Destination Port : 22 Sequence Number : 2756443999 Ack Number : 3995064355 Data Offset :5 IX20 User Guide 698 Diagnostics Analyze network traffic Flags Window Checksum Urgent Pointer TCP Data 00 00 00 00 00 00 : ACK : 2050 : 0xc740 :0 ...... > where capture_filter is the name of a packet capture configuration. See Configure packet capture for the network analyzer for more information. To determine available packet capture configurations, use the ?: > show anaylzer name ? name: Name of the capture filter to use. Format: test_capture capture_ping > show anaylzer name Save captured data traffic to a file Data traffic is captured to RAM and when the device reboots, the data is lost. To retain the captured data, first save the data to a file and then upload the file to a PC. To save captured traffic data to a file, use the analyzer save command: Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. Type the following at the Admin CLI prompt: > analyzer save filename filename name capture_filter > where: n filename is the name of the file that the captured data will be saved to. Determine filenames already in use: Use the tab autocomplete feature to determine filenames that are currently in use: > analyzer save name <tab> test1_analyzer_capture test2_analyzer_capture > analyzer save name n capture_filter is the name of a packet capture configuration. See Configure packet capture for the network analyzer for more information. IX20 User Guide 699 Diagnostics Analyze network traffic To determine available packet capture configurations, use the ?: > analyzer save name ? name: Name of the capture filter to use. Format: test_capture capture_ping > analyzer save name The file is stored in the /etc/config/analyzer directory. To transfer the file to your PC, see Download captured data to your PC. Download captured data to your PC After saving captured data to a file (see Save captured data traffic to a file), you can download the file from the WebUI or from the command line by using the scp (secure copy file) command. WebUI 1. Log into the IX20 WebUI as a user with Admin access. 2. On the menu, click System. Under Administration, click File System. The File System page appears. 3. Highlight the analyzer directory and click to open the directory. 4. Select the saved analyzer report you want to download and click (download). Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. IX20 User Guide 700 Diagnostics Analyze network traffic 2. Type scp to use the Secure Copy program to copy the file to your PC: > scp host hostname-or-ip user username remote remote-path local local-path to remote where: n hostname-or-ip is the hostname or ip address of the remote host. n username is the name of the user on the remote host. n remote-path is the location on the remote host where the file will be copied. n local-path is the path and filename on the IX20 device. For example: To download the traffic saved in the file /etc/config/analyzer/eth0.pcpng to a PC with the IP 192.168.210.2, for a user named maria, to the /home/maria directory: > scp host 192.168.210.2 user maria remote /home/maria local /etc/config/analyzer/eth0.pcpng to remote maria@192.168.210.2's password: eth0.pcpng 100% 11KB 851.3KB/s 00:00 Clear captured data To clear captured data traffic in RAM, use the analyzer clear command: Command line 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. Type the following at the Admin CLI prompt: > analyzer clear name capture_filter > where capture_filter is the name of a packet capture configuration. See Configure packet capture for the network analyzer for more information. To determine available packet capture configurations, use the ?: > anaylzer clear name ? name: Name of the capture filter to use. Format: test_capture capture_ping > anaylzer clear name Note You can remove data traffic saved to a file using the rm command. IX20 User Guide 701 Diagnostics Use the ping command to troubleshoot network connections Use the ping command to troubleshoot network connections Use the ping command troubleshoot connectivity problems. Ping to check internet connection To check your internet connection: 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the Admin CLI prompt, type the ping command followed by the host name or IP address of the server to be pinged: > ping 8.8.8.8 PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data. 64 bytes from 8.8.8.8: icmp_seq=1 ttl=54 time=11.1 ms 64 bytes from 8.8.8.8: icmp_seq=2 ttl=54 time=10.8 ms 64 bytes from 8.8.8.8: icmp_seq=3 ttl=54 time=10.7 ms ... > 3. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Stop ping commands To stop pings when the number of pings to send (the count parameter) has been set to a high value, enter Ctrl+C. Use the traceroute command to diagnose IP routing problems Use the traceroute command to diagnose IP routing problems. This command traces the route to a remote IP host and displays results. The traceroute command differs from ping in that traceroute shows where the route fails, while ping simply returns a single error on failure. See the traceroute command description for command syntax and examples. The traceroute command has several parameters. Only host is required. n host: The IP address of the destination host. n bypass: Send directly to a host on an attached network. n debug: Enable socket level debugging. n dontfragment: Do not fragment probe packets. n first_ttl: Specifies with what TTL to start. (Default: 1) n gateway: Route the packet through a specified gateway. n icmp: Use ICMP ECHO for probes. n interface: Specifies the interface. IX20 User Guide 702 Diagnostics Use the traceroute command to diagnose IP routing problems n ipchecksums: Calculate ip checksums. n max_ttl: Specifies the maximum number of hops. (Default: 30) n nomap: Do not map IP addresses to host names n nqueries: Sets the number of probe packets per hop. (Default: 3) n packetlen: Total size of the probing packet. (Default: -1) n pausemsecs: Minimal time interval between probes (Default: 0) n port: Specifies the destination port. (Default: -1) n src_addr: Chooses an alternative source address. n tos: Set Type of Service. (Default: -1) n verbose: Verbose output. n waittime: Max wait for a response to a probe. (Default: 5) Example This example shows using traceroute to verify that the IX20 device can route to host 8.8.8.8 (www.google.com) through the default gateway. The command output shows that 15 routing hops were required to reach the host: 1. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the Admin CLI prompt, use the traceroute command to view IP routing information: > traceroute 8.8.8.8 traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 52 byte packets 1 192.168.8.1 (192.168.8.1) 0 ms 0 ms 0 ms 2 10.10.10.10 (10.10.10.10) 0 ms 2 ms 2 ms 3 * 10.10.8.23 (10.10.8.23) 1 ms 1 ms 4 96.34.84.22 (96.34.84.22) 1 ms 1 ms 1 ms 5 96.34.81.190 (96.34.81.190) 2 ms 2 ms 2 ms 6 *** 7 96.34.2.12 (96.34.2.12) 11 ms 11 ms 11 ms 8 *** 9 8.8.8.8 (8.8.8.8) 11 ms 11 ms 11 ms > By entering a whois command on a Unix device, the output shows that the route is as follows: 1. 192/8: The local network of the IX20 device. 2. 192.168.8.1: The local network gateway to the Internet. 3. 96/8: Charter Communications, the network provider. 4. 216/8: Google Inc. Stop the traceroute process To stop the traceroute process, enter Ctrl-C. IX20 User Guide 703 Digi IX20 regulatory and safety statements RF exposure statement In order to comply with RF exposure limits established in the ANSI C95.1 standards, the distance between the antenna or antennas and the user should not be less than 20 cm. Federal Communication (FCC) Part 15 Class B Radio Frequency Interference (RFI) (FCC 15.105) The Digi IX20 has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to correct the interference by one or more of the following measures: n Reorient or relocate the receiving antenna. n Increase the separation between the equipment and the receiver. n Connect the equipment into an outlet that is on a circuit different from the receiver. n Consult the dealer or an experienced radio/TV technician for help. Labeling Requirements (FCC 15.19) IX20 complies with Part 15 of FCC rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. If the FCC ID is not visible when installed inside another device, then the outside of the device into which the module is installed must also display a label referring to the enclosed module FCC ID. Modifications (FCC 15.21) Changes or modifications to this equipment not expressly approved by Digi may void the user's authority to operate this equipment. FCC ID Digi IX20 with CMG4 CORE module utilizes a cellular modem by Quectel, model EG25-G with FCC ID: XMR201903EG25G and Type Allocation Code (TAC): 86769804, assigned by the GSMA. IX20 User Guide 704 Digi IX20 regulatory and safety statements European Community - CE Mark Declaration of Conformity (DoC) European Community - CE Mark Declaration of Conformity (DoC) Digi has issued Declarations of Conformity for the IX20 concerning emissions, EMC, and safety. For more information, see www.digi.com/resources/certifications. Important note Digi customers assume full responsibility for learning and meeting the required guidelines for each country in their distribution market. Refer to the radio regulatory agency in the desired countries of operation for more information. CE mark (Europe) The IX20 is certified for use in several European countries. For information, visit www.digi.com/resources/certifications. If the IX20 is incorporated into a product, the manufacturer must ensure compliance of the final product with articles 3.1a and 3.1b of the RE Directive (Radio Equipment Directive). A Declaration of Conformity must be issued for each of these standards and kept on file as described in the RE Directive (Radio Equipment Directive). Furthermore, the manufacturer must maintain a copy of the (product name) user manual documentation and ensure the final product does not exceed the specified power ratings, antenna specifications, and/or installation requirements as specified in the user manual. OEM labeling requirements The 'CE' marking must be affixed to a visible location on the OEM product. CE labeling requirements The CE mark shall consist of the initials "CE" taking the following form: n If the CE marking is reduced or enlarged, the proportions given in the above graduated drawing must be respected. n The CE marking must have a height of at least 5mm except where this is not possible on IX20 User Guide 705 Digi IX20 regulatory and safety statements European Community - CE Mark Declaration of Conformity (DoC) account of the nature of the apparatus. n The CE marking must be affixed visibly, legibly, and indelibly. IX20 User Guide 706 Digi IX20 regulatory and safety statements Maximum transmit power for radio frequencies Maximum transmit power for radio frequencies The following tables show the maximum transmit power for frequency bands. Cellular frequency bands Frequency bands Cellular LTE 700 MHz Cellular LTE 800 MHz Cellular LTE 850 MHz Cellular LTE 900 MHz Cellular LTE 1700 MHz Cellular LTE 1800 MHz Cellular LTE 1900 MHz Cellular LTE 2100 MHz Cellular LTE 2600 MHz Cellular LTE 2300 MHz Cellular LTE 2500 MHz Wi-Fi frequency bands Maximum transmit power 200 mW 158.49 mW Frequency bands 13 overlapping channels at 22 MHz or 40 MHz wide spaced at 5 MHz Centered at 2.412 MHz to 2.472 MHz Maximum transmit power 651.784 mW 165 overlapping channels at 22 MHz or 40 MHz or 80 MHz wide spaced at 351.295 mW 5 MHz Centered at 5180 MHz to 5825 MHz Innovation, Science, and Economic Development Canada (IC) certifications This digital apparatus does not exceed the Class B limits for radio noise emissions from digital apparatus set out in the Radio Interference Regulations of the Canadian Department of Communications. Le present appareil numerique n'emet pas de bruits radioelectriques depassant les limites applicables aux appareils numeriques de la class B prescrites dans le Reglement sur le brouillage radioelectrique edicte par le ministere des Communications du Canada. IX20 User Guide 707 RoHS compliance statement RoHS compliance statement All Digi International Inc. products that are compliant with the RoHS Directive (EU Directive 2002/95/EC and subsequent amendments) are marked as RoHS COMPLIANT. RoHS COMPLIANT means that the substances restricted by the EU Directive 2002/95/EC and subsequent amendments of the European Parliament are not contained in a finished product above threshold limits mandated by EU Directive 2002/95/EC and subsequent amendments, unless the restrictive substance is subject of an exemption contained in the RoHS Directive. Digi International Inc., cannot guarantee that inventory held by distributors or other third parties is RoHS compliant. Safety notices n Read all instructions before installing and powering the router. You should keep these instructions in a safe place for future reference. n If the power supply shows signs of damage or malfunction, stop using it immediately, turn off the power and disconnect the power supply before contacting your supplier for a repair or replacement. n Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. Use only the accessories, attachments, and power supplies provided by the manufacturer-connecting non-approved antennas or power supplies may damage the router, cause interference or create an electric shock hazard, and will void the warranty. n Do not attempt to repair the product. The router contains no electronic components that can be serviced or replaced by the user. Any attempt to service or repair the router by the user will void the product warranty. n Ports that are capable of connecting to other apparatus are defined as SELV ports. To ensure conformity with IEC60950 ensure that these ports are only connected to ports of the same type on other apparatus. Safety statements WARNING! RISK OF EXPLOSION IF BATTERY IS REPLACED BY INCORRECT BATTERY TYPE. DISPOSE OF USED BATTERIES ACCORDING TO THE INSTRUCTIONS. ATTENTION! IL Y A RISQUE D'EXPLOSION SI LA BATTERIE EST REMPLACÉE PAR UNE BATTERIE DE TYPE INCORRECT. METTRE AU REBUT LES BATTERIES USAGÉES CONFORMÉMENT AUX INSTRUCTIONS WARNING! For ambient temperatures above 60° C, this equipment must be installed in a Restricted Access Location only. IX20 User Guide 708 Special safety notes for wireless routers AVERTISSEMENT! Cet équipement est destiné à être installé dans un lieu d'accès restreint uniquement. CAUTION! Hot parts! To avoid burns when handling device parts, wait at least one half hour after switching off the device before handling parts. PRUDENCE! Pièces chaudes! Doigts brûlés lors de la manipulation des pièces. Attendez une demi-heure après la mise hors tension avant de manipuler les pièces Special safety notes for wireless routers Digi International products are designed to the highest standards of safety and international standards compliance for the markets in which they are sold. However, cellular-based products contain radio devices which require specific consideration. Take the time to read and understand the following guidance. Digi International assumes no liability for an end user's failure to comply with these precautions. Wireless routers incorporate a wireless radio module. Users should ensure that the antenna(s) is (are) positioned at least 1 meter away from themselves and other persons in normal operation. When in a hospital or other health care facility, observe the restrictions on the use of mobile phones. Do not use the router in areas where guidelines posted in sensitive areas instruct users to switch off mobile phones. Medical equipment may be sensitive to RF energy. The operation of cardiac pacemakers, other implanted medical equipment and hearing aids can be affected by interference from cellular terminals such as the wireless routers when places close to the device. If in doubt about potential danger, contact the physician or the manufacturer of the device to verify that the equipment is properly shielded. Pacemaker patients are advised to keep the wireless router away from the pacemaker while it is on. Wireless routers must NOT be operated on aircraft. The operation of wireless appliances in an aircraft is forbidden to prevent interference with communications systems. Failure to observe these instructions may lead to the suspension or denial of cellular services to the offender, legal action, or both. As with any electrical equipment, do not operate the router in the presence of flammable gases, fumes or potentially explosive atmospheres. Do not use radio devices anywhere that blasting operations occur. Wireless routers receive and transmit radio frequency energy when power is on. Interference can occur when using the router close to TV sets, radios, computers or inadequately shielded equipment. Follow any special regulations and always power off your router wherever forbidden or when it may cause interference or danger. IX20 User Guide 709 DigiIX20 Certifications Product disposal instructions SOS IMPORTANT! Wireless routers operate using radio signals and cellular networks cannot be guaranteed to connect in all possible conditions. Therefore, never rely solely upon any wireless device for life critical communications. Product disposal instructions The WEEE (Waste Electrical and Electronic Equipment: 2002/96/EC) directive has been introduced to ensure that electrical/ electronic products are recycled using the best available recovery techniques to minimize the impact on the environment. This product contains high quality materials and components which can be recycled. At the end of its life this product MUST NOT be mixed with other commercial waste for disposal. Check with the terms and conditions of your supplier for disposal information. Digi International Ltd WEEE Registration number: WEE/HF1515VU DigiIX20 Certifications International EMC (Electromagnetic Compatibility) and safety standards This product complies with the requirements of the following Electromagnetic Compatibility standards. There are no user-serviceable parts inside the product. Contact your Digi representative for repair information. Certification category Electromagnetic Compatibility (EMC) compliance standards Standards n EN 300 328 v1.8.1 n EN 301 893 v1.7.2 n EN 301 489 n FCC Part 15 Subpart B Class B Safety compliance standards EN 62368 E-UTRA CA, E-UTRA FDD, E-UTRA TDD, UMTS FDD Cellular carriers PTCRB See the current list of carriers on the IX20 datasheet, available on the Digi IX20 Specifications page. IX20 User Guide 710 Command line interface This chapter contains the following topics: Access the command line interface 712 Log in to the command line interface 712 Exit the command line interface 713 Execute a command from the web interface 713 Display help for commands and parameters 714 Auto-complete commands and parameters 715 Available commands 717 Use the scp command 718 Display status and statistics using the show command 719 Device configuration using the command line interface 720 Execute configuration commands at the root Admin CLI prompt 721 Configuration mode 723 Command line reference 735 IX20 User Guide 711 Command line interface Access the command line interface Access the command line interface You can access the IX20 command line interface using an SSH connection, a telnet connection, or a serial connection. You can use an open-source terminal software, such as PuTTY or TeraTerm, to access the device through one of these mechanisms. You can also access the command line interface in the WebUI by using the Terminal, or the Digi Remote Manager by using the Console. To access the command line, your device must be configured to allow access, and you must log in as a user who has been configured for the appropriate access. For further information about configuring access to these services, see: n Serial: Configure the serial port n WebUI: Configure the web administration service n SSH: Configure SSH access n Telnet: Configure telnet access Log in to the command line interface Command line 1. Connect to the IX20 device by using a serial connection, SSH or telnet, or the Terminal in the WebUI or the Console in the Digi Remote Manager. See Access the command line interface for more information. n For serial connections, the default configuration is: l 115200 baud rate l 8 data bits l no parity l 1 stop bit l no flow control n For SSH and telnet connections, the default IP address of the device is 192.168.2.1 on the . The device is also accessible at the default IP address of 192.168.210.1. However, because this IP address does not use a DHCP server, to connect to this address you must configure your local PC with an appropriate static IP address (for example, 192.168.210.2). 2. At the login prompt, enter the username and password of a user with Admin access: login: admin Password: ********** The default username is admin. The default unique password for your device is printed on the device label. 3. Depending on the device configuration, you may be presented with another menu, for example: Access selection menu: IX20 User Guide 712 Command line interface Exit the command line interface a: Admin CLI s: Shell q: Quit Select access or quit [admin] : Type a or admin to access the IX20 command line. You will now be connected to the Admin CLI: Connecting now, 'exit' to disconnect from Admin CLI ... > See Command line interface for detailed instructions on using the command line interface. Exit the command line interface Command line 1. At the command prompt, type exit. > exit 2. Depending on the device configuration, you may be presented with another menu, for example: Access selection menu: a: Admin CLI s: Shell q: Quit Select access or quit [admin] : Type q or quit to exit. Execute a command from the web interface 1. Log into the IX20 WebUI as a user with Admin access. 2. At the main menu, click Terminal. The device console appears. IX20 login: 3. Log into the IX20 command line as a user with Admin access. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. The Admin CLI prompt appears. > IX20 User Guide 713 Command line interface Display help for commands and parameters Display help for commands and parameters The help command When executed from the root command prompt, help displays information about autocomplete operations, how to move the cursor on the IX20 command line, and other keyboard shortcuts: > help Commands ------------------------------------------------------------------------------- ? Show commands help <Tab> Tab completion, displays all valid commands to complete command, if only one command is possible, it is used <Space> Like tab except shortest prefix is used if command is valid <Enter> Enter an input. If quoting then a new line is created instead. If the input is invalid then characters will be deleted until a prefix for a valid command is found. Ctrl + A Move cursor to start of line Ctrl + E Move cursor to end of line Ctrl + W Delete word under cursor until start of line or [\',", ,\,/,.] Ctrl + R If the current input is invalid then characters will be deleted until a prefix for a valid command is found. Ctrl + left Jump cursor left until start of line or [\',", ,\,/,.] Ctrl + right Jump cursor right until start of line or [\',", ,\,/,.] > The question mark (?) command When executed from the root command prompt, ? displays available commands: >? Commands ------------------------------------------------------------------------------- config View and modify the configuration exit Exit the CLI analyzer Analyzer commands. cp Copy a file or directory. help Show CLI editing and navigation commands. ls List a directory. mkdir Create a directory. modem Modem commands. more View a file. mv Move a file or directory. ping Ping a host. reboot Reboot the system. rm Remove a file or directory. scp Copy a file or directory over SSH. show Show instance statistics. system System commands. traceroute Print the route packets trace to network host. update Update firmware. IX20 User Guide 714 Command line interface Auto-complete commands and parameters > Display help for individual commands When included with a command name, both ? and help provide further information about the command. For example: 1. To display further information about the show command, type either show ? or show help: > show ? Commands -------------------------------------------------------------------------- arp Show ARP tables cloud Show drm statistics config Show config deltas. dhcp-lease Show DHCP leases. event Show event list ipsec Show IPsec statistics. log Show syslog. manufacture Show manufacturer information. modem Show modem statistics. network Show network interface statistics. openvpn Show OpenVPN statistics. route Show IP routing information. serial Show serial statistics. system Show system statistics. version Show firmware version. > show Use the Tab key or the space bar to display abbreviated help When executed from the root command prompt, pressing the Tab key or the space bar displays an abbreviated list of available commands: Similar behavior is available with any command name: > config network interface <space> .. ... defaultip loopback > config network interface defaultlinklocal lan Auto-complete commands and parameters When entering a command and parameter, press the Tab key to cause the command line interface to auto-complete as much of the command and parameter as possible. Typing the space bar has similar behavior. If multiple commands are available that will match the entered text, auto-complete is not performed and the available commands are displayed instead. Auto-complete applies to these command elements only : IX20 User Guide 715 Command line interface Auto-complete commands and parameters n Command names. For example, typing net<Tab> auto-completes the command as network. n Parameter names. For example: l ping hostname int<Tab> auto-completes the parameter as interface. l system b<Tab> auto-completes the parameter as backup. n Parameter values, where the value is one of an enumeration or an on|off type; for example: (config)> serial port1 enable t<Tab> auto-completes to (config)> serial port1 enable true Auto-complete does not function for: n Parameter values that are string types. n Integer values. n File names. n Select parameters passed to commands that perform an action. IX20 User Guide 716 Command line interface Available commands Available commands The following commands are available from the Admin CLI prompt: Command Description config Used to view and modify the configuration. exit cp help ls mkdir modem more mv ping reboot rm scp See Device configuration using the command line interface for more information about using the config command. Exits the CLI. Copies a file or directory. Displays: n CLI editing and navigation commands, when executed from the root of the Admin CLI prompt. n Available commands, syntax diagram, and parameter information, when executed in conjunction with another command. See Display help for commands and parameters for information about the help command. Lists the contents of a directory. Creates a directory. Executes modem commands. Displays the contents of a file. Moves a file or directory. Pings a remote host using Internet Control Message Protocol (ICMP) Echo Request messages. Reboots the IX20 device. Removes a file. Uses the secure copy protocol (SCP) to transfer files between the IX20 device and a remote host. show See Use the scp command for information about using the scp command. Displays information about the device and the device's configuration. See Display status and statistics using the show command for more information about the show command. system Issues commands related to system functionality. traceroute Sends and tracks route packets to a destination host. update Updates the device firmware. IX20 User Guide 717 Command line interface Use the scp command Note For commands that operate on the IX20's file system, such as the cp, ls, and mkdir commands, see File system for information about the file system, including how to copy, move and delete files and directories. Use the scp command The scp command uses Secure Copy Protocol (SCP) to transfer files between the IX20 device and a remote host. Required configuration items n The hostname or IP address of the remote host. n The username and password of the user on the remote host. n Whether the file is being copied to the IX20 device from a remote host, or to the remote host from the IX20 device. l If the file is being copied to the IX20 device from a remote host: o The path and filename of the file on the remote host that will be copied to the IX20 device. o The location on the IX20 device where the file will be copied. l If the file is being copied to a remote host from the IX20 device: o The path and filename of the file on the IX20 device that will be copied to the remote host. o The location on the remote host where the file will be copied. Copy a file from a remote host to the IX20 device To copy a file from a remote host to the IX20 device, use the scp command as follows: > scp host hostname-or-ip user username remote remote-path local local-path to local where: n hostname-or-ip is the hostname or ip address of the remote host. n username is the name of the user on the remote host. n remote-path is the path and filename of the file on the remote host that will be copied to the IX20 device. n local-path is the location on the IX20 device where the copied file will be placed. For example: To copy firmware from a remote host with an IP address of 192.168.4.1 to the /etc/config directory on the IX20 device, issue the following command: > scp host 192.168.4.1 user admin remote /home/admin/bin/IX20-20.11.32.138.bin local /etc/config/ to local admin@192.168.4.1's password: adminpwd IX20-20.11.32.138.bin 100% 36MB 11.1MB/s 00:03 > IX20 User Guide 718 Command line interface Display status and statistics using the show command Transfer a file from the IX20 device to a remote host To copy a file from the IX20 device to a remote host, use the scp command as follows: > scp host hostname-or-ip user username remote remote-path local local-path to remote where: n hostname-or-ip is the hostname or ip address of the remote host. n username is the name of the user on the remote host. n remote-path is the location on the remote host where the file will be copied. n local-path is the path and filename on the IX20 device. For example: To copy a support report from the IX20 device to a remote host at the IP address of 192.168.4.1: 1. Use the system support-report command to generate the report: > system support-report /etc/config/ Saving support report to /etc/config/support-report-0040D0133536-20-12-028:44:23.bin Support report saved. > 2. Use the scp command to transfer the report to a remote host: > scp host 192.168.4.1 user admin remote /home/admin/temp/ local /etc/config/support-report-00:40:D0:13:35:36-20-12-02-8:44:23.bin to remote admin@192.168.4.1's password: adminpwd support-report-0040D0133536-20-12-02-8:44:23.bin > Display status and statistics using the show command The IX20 show command display status and statistics for various features. For example: show config The show config command displays all the configuration settings for the device that have been changed from the default settings. This is a particularly useful when troubleshooting the device. > show config auth tacacs+ service "login" auth user admin password "$2a$05$WlJQhquI7BgsytkpobKhaeLPtWraGANBcrlEaJX/wJv63JENW/HOu" add auth user test add auth user test group end "admin" add auth user test group end "serial" auth user test password "$2a$05$RdGYz1sLKbWrqe6cZjlsd.otg03JZR6n9939XV6EYWUSP0tMAzO5W" network interface lan ipv4 type "dhcp" IX20 User Guide 719 Command line interface Device configuration using the command line interface network interface lan zone "external" network interface modem modem apn 0 apn "00000.000" network interface modem modem apn_lock "true" schema version "445" > show system The show system command displays system information and statistics for the device, including CPU usage. > show system Model Serial Number SKU Hostname MAC : Digi IX20 : IX20-000065 : IX20 : IX20 : DF:DD:E2:AE:21:18 Hardware Version Firmware Version Alt. Firmware Version Bootloader Version : 50001947-01 1P : 20.11.32.138 : 20.11.32.138 : 19.7.23.0-15f936e0ed Current Time CPU Uptime Temperature : Wed, 2 Dec 2020 8:44:23 +0000 : 1.4% : 6 days, 6 hours, 21 minutes, 57 seconds (541317s) : 40C > show network The show network command displays status and statistics for network interfaces. > show network Interface Proto Status Address ---------------- ----- ------- ------------------------------- defaultip IPv4 up 192.168.210.1/24 defaultlinklocal IPv4 up 169.254.100.100/16 lan IPv4 up 192.168.2.1 lan IPv6 up 0:0:0:0:0:ffff:c0a8:301 loopback IPv4 up 127.0.0.1/8 wan IPv4 up 192.168.3.1/24 wan IPv6 up fd00:2704::240:ffff:fe80:120/64 > Device configuration using the command line interface The config command allows for device configuration from the command line. All configuration tasks that can be performed by using the WebUI can also be performed by using the config command. There are two ways to invoke the config command from the CLI: IX20 User Guide 720 Command line interface Execute configuration commands at the root Admin CLI prompt n Execute the config command and parameters at the root prompt. See Execute configuration commands at the root Admin CLI prompt for more information. n Enter configuration mode by executing the config command without any parameters. See Configuration mode for more information. Execute configuration commands at the root Admin CLI prompt You can execute the config command at the root Admin CLI prompt with any appropriate parameters. When the config command is used in this way, changes to the device's configuration are automatically saved when the command is executed. For example, to disable the SSH service from the root prompt, enter the following command: > config service ssh enable false > The IX20 device's ssh service is now disabled. Note When the config command is executed at the root prompt, certain configuration actions that are available in configuration mode cannot be performed. This includes validating configuration changes, canceling and reverting configuration changes, and performing actions on elements in lists. See Configuration mode for information about using configuration mode. Display help for the config command from the root Admin CLI prompt Display additional configuration commands, as well as available parameters and values, by entering the question mark (?) character after the config command. 1. For example: > config ? Will display the following help information: > config ? Additional Configuration -------------------------------------------------------------------------- application Custom scripts auth Authentication cloud Central management firewall Firewall monitoring Monitoring network Network serial Serial service Services system System vpn VPN Run "config" with no arguments to enter the configuration editing mode. IX20 User Guide 721 Command line interface Execute configuration commands at the root Admin CLI prompt > config 2. You can then display help for the additional configuration commands. For example, to display help for the config service command: > config service ? Services Additional Configuration -------------------------------------------------------------------------- dns DNS mdns Service Discovery (mDNS) multicast Multicast ntp NTP remote_control Remote control snmp SNMP ssh SSH telnet Telnet web_admin Web administration > config service 3. Next, display help for the config service ssh command: > config service ssh ? SSH: An SSH server for managing the device. Parameters Current Value -------------------------------------------------------------------------- enable true Enable key [private] Private key port 22 Port Additional Configuration -------------------------------------------------------------------------- acl Access control list mdns > config service ssh 4. Lastly, display the allowed values and other information for the enable parameter: > config service ssh enable ? Enable: Enable the service. Format: true, false, yes, no, 1, 0 Default value: true Current value: true > config service ssh enable IX20 User Guide 722 Command line interface Configuration mode Configuration mode Configuration mode allows you to perform multiple configuration tasks and validate the changes prior to saving them. You can cancel all changes without saving them at any time. Configuration changes do not take effect until the configuration is saved. Enable configuration mode To enable configuration mode, at the root prompt, enter the config command without any parameters: > config (config)> When the command line is in configuration mode, the prompt will change to include (config), to indicate that you are currently in configuration mode. Enter configuration commands in configuration mode There are two ways to enter configuration commands while in configuration mode: n Enter the full command string from the config prompt. For example, to disable the ssh service by entering the full command string at the config prompt: (config)> service ssh enable false (config)> n Execute commands by moving through the configuration schema. For example, to disable the ssh service by moving through the configuration and then executing the enable false command: 1. At the config prompt, enter service to move to the service node: (config)> service (config service)> 2. Enter ssh to move to the ssh node: (config service)> ssh (config service ssh)> 3. Enter enable false to disable the ssh service: (config service ssh)> enable false (config service ssh)> See Move within the configuration schema for more information about moving within the configuration. Save changes and exit configuration mode To save changes that you have made to the configuration while in configuration mode, use save. The save command automatically validates the configuration changes; the configuration will not be saved if it is not valid. Note that you can also validate configuration changes at any time while in IX20 User Guide 723 Command line interface Configuration mode configuration mode by using the validate command. (config)> save Configuration saved. > After using save to save changes to the configuration, you will automatically exit configuration mode. To return to configuration mode, type config again. Exit configuration mode without saving changes You can discard any unsaved configuration changes and exit configuration mode by using the cancel command: (config)> cancel > After using cancel to discard unsaved changes to the configuration, you will automatically exit configuration mode. Configuration actions In configuration mode, configuration actions are available to perform tasks related to saving or canceling the configuration changes, and to manage items and elements in lists. The commands can be listed by entering a question mark (?) at the config prompt. The following actions are available: Configuration actions cancel save validate revert show add del move Description Discards unsaved configuration changes and exits configuration mode. Saves configuration changes and exits configuration mode. Validates configuration changes. Reverts the configuration to default settings. See The revert command for more information. Displays configuration settings. Adds a named element, or an element in a list. See Manage elements in lists for information about using the add command with lists. Deletes a named element, or an element in a list. See Manage elements in lists for information about using the del command with lists. Moves elements in a list. See Manage elements in lists for information about using the move command with lists. IX20 User Guide 724 Command line interface Configuration mode Display command line help in configuration mode Display additional configuration commands, as well as available parameters and values, by entering the question mark (?) character at the config prompt. For example: 1. Enter ? at the config prompt: (config)> ? This will display the following help information: (config)> ? Additional Configuration -------------------------------------------------------------------------- application Custom scripts auth Authentication cloud Central management firewall Firewall monitoring Monitoring network Network serial Serial service Services system System vpn VPN (config)> 2. You can then display help for the additional configuration commands. For example, to display help for the config service command, use one of the following methods: n At the config prompt, enter service ?: (config)> service ? n At the config prompt: a. Enter service to move to the service node: (config)> service (config service)> b. Enter ? to display help for the service node: (config service)> ? Either of these methods will display the following information: config> service ? Services Additional Configuration -------------------------------------------------------------------------- dns DNS IX20 User Guide 725 Command line interface Configuration mode mdns multicast ntp remote_control snmp ssh telnet web_admin Service Discovery (mDNS) Multicast NTP Remote control SNMP SSH Telnet Web administration (config)> service 3. Next, to display help for the service ssh command, use one of the following methods: n At the config prompt, enter service ssh ?: (config)> service ssh ? n At the config prompt: a. Enter service to move to the service node: (config)> service (config service)> b. Enter ssh to move to the ssh node: (config service)> ssh (config service ssh)> c. Enter ? to display help for the ssh node: (config service ssh)> ? Either of these methods will display the following information: (config)> service ssh ? SSH: An SSH server for managing the device. Parameters Current Value -------------------------------------------------------------------------- enable true Enable key [private] Private key port 22 Port Additional Configuration -------------------------------------------------------------------------- acl Access control list mdns (config)> service ssh 4. Lastly, to display allowed values and other information for the enable parameter, use one of the following methods: IX20 User Guide 726 Command line interface Configuration mode n At the config prompt, enter service ssh enable ?: (config)> service ssh enable ? n At the config prompt: a. Enter service to move to the service node: (config)> service (config service)> b. Enter ssh to move to the ssh node: (config service)> ssh (config service ssh)> c. Enter enable ? to display help for the enable parameter: (config service ssh)> enable ? (config service ssh)> Either of these methods will display the following information: (config)> service ssh enable ? Enable: Enable the service. Format: true, false, yes, no, 1, 0 Default value: true Current value: true (config)> service ssh enable Move within the configuration schema You can perform configuration tasks at the CLI by moving within the configuration. n Move forward one node in the configuration by entering the name of an Additional Configuration option: 1. At the config prompt, type service to move to the service node: (config)> service (config service)> 2. Type ssh to move to the ssh node: (config service)> ssh (config service ssh)> 3. Type acl to move to the acl node: (config service ssh)> acl (config service ssh acl)> IX20 User Guide 727 Command line interface Configuration mode 4. Type zone to move to the zone node: (config service ssh acl)> zone (config service ssh acl zone)> You can also enter multiple nodes at once to move multiple steps in the configuration: (config)> service ssh acl zone (config service ssh acl zone)> n Move backward one node in the configuration by entering two periods (..): (config service ssh acl zone)> .. (config service ssh acl)> You can also move back multiples nodes in the configuration by typing multiple sets of two periods: (config service ssh acl zone)> .. .. .. (config service)> n Move to the root of the config prompt from anywhere within the configuration by entering three periods (...): (config service ssh acl zone)> ... (config)> Manage elements in lists While in configuration mode, you can use the add, del, and move action commands to manage elements in a list. When working with lists, these actions require an index number to identify the list item that will be acted on. Add elements to a list When used with parameters that contains lists of elements, the add command is used to add an element to the list. For example, to add an authentication method: 1. Display current authentication method by using the show command: (config)> show auth method 0 local (config)> 2. Add an authentication method by using the add index_item command. For example: n To add the TACACS+ authentication method to the beginning of the list, use the index number 0: (config)> add auth method 0 tacacs+ (config)> show auth method 0 tacacs+ IX20 User Guide 728 Command line interface Configuration mode 1 local (config)> n To add the TACACS+ authentication method to the end of the list, use the end keyword: (config)> add auth method end tacacs+ (config)> show auth method 0 local 1 tacacs+ (config)> The end keyword As demonstrated above, the end keyword is used to add an element to the end of a list. Additionally, the end keyword is used to add an element to a list that does not have any elements. For example, to add an authentication group to a user that has just been created: 1. Use the show command to verify that the user is not currently a member of any groups: (config)> show auth user new-user group (config)> 2. Use the end keyword to add the admin group to the user's configuration: (config)> add auth user new-user group end admin (config)> 3. Use the show command again to verify that the admin group has been added to the user's configuration: (config)> show auth user new-user group 0 admin (config)> Delete elements from a list When used with parameters that contains lists of elements, the del command is used to delete an element in the list. For example, to delete an authentication method: 1. Use the show command to display current authentication method configuration: (config)> show auth method 0 local 1 tacacs+ 2 radius (config)> 2. Delete one of the authentication methods by using the del index_number command. For example: a. To delete the local authentication method, use the index number 0: (config)> del auth method 0 (config)> IX20 User Guide 729 Command line interface Configuration mode b. Use the show command to verify that the local authentication method was removed: (config)> show auth method 0 tacacs+ 1 radius (config)> Move elements within a list Use the move command to reorder elements in a list. For example, to reorder the authentication methods: 1. Use the show command to display current authentication method configuration: (config)> show auth method 0 local 1 tacacs+ 2 radius (config)> 2. To configure the device to use TACACS+ authentication first to authenticate a user, use the move index_number_1 index_number_2 command: (config)> move auth method 1 0 (config)> 3. Use the show command again to verify the change: (config)> show auth method 0 tacacs+ 1 local 2 radius (config)> The revert command The revert command is used to revert changes to the IX20 device's configuration and restore default configuration settings. The behavior of the revert command varies depending on where in the configuration hierarchy the command is executed, and whether the optional path parameter is used. After executing the revert command, you must save the configuration changes by using the save command. You can also discard the configuration changes by using the cancel command. CAUTION! The revert command reverts all changes to the default configuration, not only unsaved changes. Revert all configuration changes to default settings To discard all configuration changes and revert to default settings, use the revert command at the config prompt without the optional path parameter: IX20 User Guide 730 Command line interface Configuration mode 1. At the config prompt, enter revert: (config)> revert (config)> 2. Set the password for the admin user prior to saving the changes: (config)> auth user admin password pwd (config)> 3. Save the configuration and apply the change: (config)> save Configuration saved. > 4. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Revert a subset of configuration changes to the default settings There are two methods to revert a subset of configuration changes to the default settings. n Enter the revert command with the path parameter. For example, to revert all changes to the authentication methods configuration: 1. Enter the revert command with the path set to auth method: (config)> revert auth method (config)> 2. Save the configuration and apply the change: (config)> save Configuration saved. > 3. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. n Move to the location in the configuration and enter the revert command without the path parameter. For example: 1. Change to the auth method node: (config)> auth method (config auth method)> 2. Enter the revert command: (config auth method)> revert (config auth method)> IX20 User Guide 731 Command line interface Configuration mode 3. Save the configuration and apply the change: (config auth method)> save Configuration saved. > 4. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. n You can also use a combination of both of these methods: 1. Change to the auth node: (config)> auth (config auth)> 2. Enter the revert command with the path set to method: (config auth)> revert method (config auth)> 3. Save the configuration and apply the change: (config auth)> save Configuration saved. > 4. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. Enter strings in configuration commands For string parameters, if the string value contains a space, the value must be enclosed in quotation marks. For example, to assign a descriptive name for the device using the system command, enter: (config)> system description "Digi IX20" Example: Create a new user by using the command line In this example, you will use the IX20 command line to create a new user, provide a password for the user, and assign the user to authentication groups. 1. Log into the IX20 command line as a user with full Admin access rights. Depending on your device configuration, you may be presented with an Access selection menu. Type admin to access the Admin CLI. 2. At the command line, type config to enter configuration mode: > config (config)> IX20 User Guide 732 Command line interface Configuration mode 3. At the config prompt, create a new user with the username user1: n Method one: Create a user at the root of the config prompt: (config)> add auth user user1 (config auth user user1)> n Method two: Create a user by moving through the configuration: a. At the config prompt, enter auth to move to the auth node: (config)> auth (config auth)> b. Enter user to move to the user node: (config auth)> user (config auth user)> c. Create a new user with the username user1: (config auth user)> add user1 (config auth user user1)> 4. Configure a password for the user: (config auth user user1)> password pwd1 (config auth user user1)> 5. List available authentication groups: (config auth user user1)> show .. .. group admin acl admin enable true nagios enable false openvpn enable false no tunnels portal enable false no portals serial enable false no ports shell enable false serial acl admin IX20 User Guide 733 Command line interface Configuration mode enable true nagios enable false openvpn enable false no tunnels portal enable false no portals serial enable true ports 0 port1 shell enable false (config auth user user1)> 6. Add the user to the admin group: (config auth user user1)> add group end admin (config auth user user1)> 7. Save the configuration and apply the change: (config auth user user1)> save Configuration saved. > 8. Type exit to exit the Admin CLI. Depending on your device configuration, you may be presented with an Access selection menu. Type quit to disconnect from the device. IX20 User Guide 734 Command line interface Command line reference analyzer cp help ls mkdir modem modem puk status [imei STRING] [name STRING] more mv ping reboot rm scp show ssh system traceroute Command line reference 736 737 738 739 740 741 746 749 750 751 753 754 755 756 764 766 770 IX20 User Guide 735 Command line interface Command line reference analyzer Analyzer commands. analyzer clear name STRING Clears the traffic captured by the analyzer. Parameters name Name of the capture filter to use. Syntax: STRING analyzer save filename STRING name STRING Saves the current captured traffic to a file. Parameters filename The filename to save captured traffic to. The file will be saved to the device's /etc/config/analyzer directory. Syntax: STRING name Name of the capture filter to use. Syntax: STRING analyzer start name STRING Start a capture session of packets on this devices interfaces. Parameters name Name of the capture filter to use. Syntax: STRING analyzer stop name STRING Stops the traffic capture session. Parameters name Name of the capture filter to use. Syntax: STRING IX20 User Guide 736 Command line interface cp cp commands. [force] SOURCE DESTINATION Copy a file or directory. Parameters source The source file or directory to copy. Syntax: STRING destination The destination path to copy the source file or directory to. Syntax: STRING force Do not ask to overwrite the destination file if it exists. Syntax: BOOLEAN Default: False Optional: True Command line reference IX20 User Guide 737 Command line interface help Show CLI editing and navigation commands. Parameters None Command line reference IX20 User Guide 738 Command line interface ls Directory listing command. ls [show-hidden] PATH List a directory. Parameters path List files and directories under this path. Syntax: STRING show-hidden Show hidden files and directories. Hidden filenames begin with '.'. Syntax: BOOLEAN Default: False Optional: True Command line reference IX20 User Guide 739 Command line interface mkdir mkdir PATH Create a directory. Parent directories are created as needed. Parameters path The directory path to create. Syntax: STRING Command line reference IX20 User Guide 740 Command line interface Command line reference modem Modem commands. modem at [imei STRING] [name STRING] CMD Send an AT command to the modem and display the response. Parameters cmd The AT command string. Syntax: STRING imei The IMEI of the modem to execute this CLI command on. Syntax: STRING Optional: True name The configured name of the modem to execute this CLI command on. Syntax: STRING Optional: True modem at-interactive [imei STRING] [name STRING] Start an AT command session on the modem's AT serial port. Parameters imei The IMEI of the modem to execute this CLI command on. Syntax: STRING Optional: True name The configured name of the modem to execute this CLI command on. Syntax: STRING Optional: True modem firmware Commands for interacting with cellular modem firmware. See Update cellular module firmware for further information about using the modem firmware commands. firmware check [imei STRING] [name STRING] Inspect /opt/[MODEM_MODEL]/Custom_Firmware/ directory for new modem firmware file. IX20 User Guide 741 Command line interface Command line reference Parameters imei The IMEI of the modem to execute this CLI command on Optional: True Type: string name The configured name of the modem to execute this CLI command on Optional: True Ref: /network/modem Type: string firmware list [imei STRING] [name STRING] List modem firmware files found in the /opt/[MODEM_MODEL]/ directory. Parameters imei The IMEI of the modem to execute this CLI command on Optional: True Type: string name The configured name of the modem to execute this CLI command on Optional: True Ref: /network/modem Type: string firmware ota Commands for performing FOTA (firmware-over-the-air) interactions with cellular modem. ota check [imei STRING] [name STRING] Query the Digi firmware server for the latest remote modem firmware version. Parameters imei The IMEI of the modem to execute this CLI command on Optional: True Type: string name The configured name of the modem to execute this CLI command on Optional: True Ref: /network/modem Type: string IX20 User Guide 742 Command line interface Command line reference ota list [imei STRING] [name STRING] Query the Digi firmware server for a list of modem firmware versions. Parameters imei The IMEI of the modem to execute this CLI command on Optional: True Type: string name The configured name of the modem to execute this CLI command on Optional: True Ref: /network/modem Type: string ota update [imei STRING] [name STRING] [version STRING] Perform FOTA (firmware-over-the-air) update. The modem will be updated to the latest modem firmware image unless a specific firmware version is specified. Parameters imei The IMEI of the modem to execute this CLI command on Optional: True Type: string name The configured name of the modem to execute this CLI command on Optional: True Ref: /network/modem Type: string version Firmware version name Optional: True Type: string firmware update [imei STRING] [name STRING] [version STRING] Update modem firmware using local firmware file. The modem will be updated to the firmware specified in the /opt/[MODEM_MODEL]/Custom_Firmware/ directory unless a specific firmware version is specified. Parameters imei The IMEI of the modem to execute this CLI command on IX20 User Guide 743 Command line interface Command line reference Optional: True Type: string name The configured name of the modem to execute this CLI command on Optional: True Ref: /network/modem Type: string version Firmware version name Optional: True Type: string modem pin PIN commands. pin change [imei STRING] [name STRING] OLD-PIN NEW-PIN Change the SIM's PIN code. Warning: Attempting to use an incorrect PIN code may PUK lock the SIM. Parameters old-pin The SIM's PIN code. Syntax: STRING new-pin The PIN code to change to. Syntax: STRING imei The IMEI of the modem to execute this CLI command on. Syntax: STRING Optional: True name The configured name of the modem to execute this CLI command on. Syntax: STRING Optional: True pin disable [imei STRING] [name STRING] PIN Disable the PIN lock on the SIM card that is active in the modem. Warning: Attempting to use an incorrect PIN code may PUK lock the SIM. Parameters pin The SIM's PIN code. IX20 User Guide 744 Command line interface Command line reference Syntax: STRING imei The IMEI of the modem to execute this CLI command on. Syntax: STRING Optional: True name The configured name of the modem to execute this CLI command on. Syntax: STRING Optional: True pin enable [imei STRING] [name STRING] PIN Enable the PIN lock on the SIM card that is active in the modem. The SIM card will need to be unlocked before each use. Warning: Attempting to use an incorrect PIN code may PUK lock the SIM. Parameters pin The SIM's PIN code. Syntax: STRING imei The IMEI of the modem to execute this CLI command on. Syntax: STRING Optional: True name The configured name of the modem to execute this CLI command on. Syntax: STRING Optional: True pin status [imei STRING] [name STRING] Print the PIN lock status and the number of PIN enable/disable/unlock attempts remaining. The SIM will be PUK locked when there are no remaining retries Parameters imei The IMEI of the modem to execute this CLI command on. Syntax: STRING Optional: True name The configured name of the modem to execute this CLI command on. Syntax: STRING Optional: True IX20 User Guide 745 Command line interface Command line reference pin unlock [imei STRING] [name STRING] PIN Temporarily unlock the SIM card with a PIN code. Set the PIN field in the modem interface's configuration to unlock the SIM card automatically before use. Warning: Attempting to use an incorrect PIN code may PUK lock the SIM. Parameters pin The SIM's PIN code. Syntax: STRING imei The IMEI of the modem to execute this CLI command on. Syntax: STRING Optional: True name The configured name of the modem to execute this CLI command on. Syntax: STRING Optional: True modem puk PUK commands. puk status [imei STRING] [name STRING] Print the PUK status and the number of PUK unlock attempts remaining. Parameters modem puk status [imei STRING] [name STRING] Print the PUK status and the number of PUK unlock attempts remaining. imei The IMEI of the modem to execute this CLI command on. Syntax: STRING Optional: True name The configured name of the modem to execute this CLI command on. Syntax: STRING Optional: True puk unlock [imei STRING] [name STRING] PUK NEW-PIN Unlock the SIM with a PUK code from the SIM provider. IX20 User Guide 746 Command line interface Command line reference Parameters puk The SIM's PUK code. Syntax: STRING new-pin The PIN code to change to. Syntax: STRING imei The IMEI of the modem to execute this CLI command on. Syntax: STRING Optional: True name The configured name of the modem to execute this CLI command on. Syntax: STRING Optional: True modem reset [imei STRING] [name STRING] Reset the modem hardware (reboot it). This can be useful if the modem has stopped responding to the network or is behaving inconsistently. Parameters imei The IMEI of the modem to execute this CLI command on. Syntax: STRING Optional: True name The configured name of the modem to execute this CLI command on. Syntax: STRING Optional: True modem sim-slot [imei STRING] [name STRING] SLOT Show or change the modem's active SIM slot. This applies only to modems with multiple SIM slots. Parameters slot The SIM slot to change to. Syntax: (1|2|show) imei The IMEI of the modem to execute this CLI command on. IX20 User Guide 747 Command line interface Syntax: STRING Optional: True name The configured name of the modem to execute this CLI command on. Syntax: STRING Optional: True Command line reference IX20 User Guide 748 Command line interface more path The file to view. Syntax: STRING Command line reference IX20 User Guide 749 Command line interface mv Move a file or directory. mv [force] SOURCE DESTINATION Parameters source The source file or directory to move. Syntax: STRING destination The destination path to move the source file or directory to. Syntax: STRING force Do not ask to overwrite the destination file if it exists. Syntax: BOOLEAN Default: False Optional: True Command line reference IX20 User Guide 750 Command line interface Command line reference ping Ping a host using ICMP echo. ping [broadcast|ipv6] [count INTEGER] [interface STRING] [size INTEGER] [source STRING] HOST Parameters host The name or address of the remote host to send ICMP ping requests to. If broadcast is enabled, can be the broadcast address. Syntax: STRING broadcast Enable broadcast ping functionality Syntax: BOOLEAN Default: False Optional: True count The number of ICMP ping requests to send before terminating. Syntax: INT Minimum: 1 Default: 100 interface The network interface to send ping packets from when the host is reachable over a default route. If not specified, the system's primary default route will be used. Syntax: STRING Optional: True ipv6 If a hostname is defined as the value of the 'host' parameter, use the hosts IPV6 address. Syntax: BOOLEAN Default: False Optional: True size The number of bytes sent in the ICMP ping request. Syntax: INT Minimum: 0 Default: 56 IX20 User Guide 751 Command line interface Command line reference source The ping command will send a packet with the source address set to the IP address of this interface, rather than the address of the interface the packet is sent from. Syntax: STRING Optional: True IX20 User Guide 752 Command line interface reboot Reboot the system. Parameters None Command line reference IX20 User Guide 753 Command line interface rm Remove a file or directory. rm [force] PATH Parameters path The path to remove. Syntax: STRING force Force the file to be removed without asking. Syntax: BOOLEAN Default: False Optional: True Command line reference IX20 User Guide 754 Command line interface Command line reference scp Copy a file or directory over SSH. scp host STRING local STRING [port INTEGER] remote STRING to STRING user STRING Parameters host The name or address of the remote host. Syntax: STRING local The file to copy to or from on the local device. Syntax: STRING port The SSH port to use to connect to the remote host. Syntax: INT Maximum: 65535 Minimum: 1 Default: 22 remote The file to copy to or from on the remote host. Syntax: STRING to Copy the file from the local device to the remote host, or from the remote host to the local device. Syntax: (remote|local) user The username to use when connecting to the remote host. Syntax: STRING IX20 User Guide 755 Command line interface Command line reference show Show instance status and statistics. show analyzer name STRING Show packets from a specified analyzer capture. Parameters name Name of the capture filter to use. Syntax: STRING show arp [ipv4|ipv6|verbose] Show ARP tables, if no IP version is specififed IPv4 IPV6 will be displayed. Parameters ipv4 Display IPv4 routes. If no IP version is specififed IPv4 and IPV6 will be displayed Syntax: BOOLEAN Default: False Optional: True ipv6 Display IPv6 routes. If no IP version is specififed IPv4 and IPV6 will be displayed Syntax: BOOLEAN Default: False Optional: True verbose Display more information (less concise, more detail). Syntax: BOOLEAN Default: False Optional: True show cloud Show Digi Remote Manager status and statistics. Parameters None show config Show changes made to default configuration. IX20 User Guide 756 Command line interface Command line reference Parameters None show dhcp-lease [all|verbose] Show DHCP leases. Parameters all Show all leases (active and inactive (not in etc/config/dhcp.*lease)). Syntax: BOOLEAN Default: False Optional: True verbose Display more information (less concise, more detail). Syntax: BOOLEAN Default: False Optional: True show event [number INTEGER] [table STRING] Show event list (high level). Parameters number Number of lines to retrieve from log. Syntax: INT Minimum: 1 Default: 20 table Type of event log to be displayed (status, error, info). Syntax: (status|error|info) Optional: True show hotspot [ip STRING] [name STRING] Show hotspot statistics. Parameters ip IP address of a specific client, to limit the status display to only this client. Syntax: STRING Optional: True IX20 User Guide 757 Command line interface Command line reference name The configured instance name of the hotspot. Syntax: STRING Optional: True show ipsec [all] [tunnel STRING] Show IPsec status statistics. Parameters all Display all tunnels including disabled tunnels. Syntax: BOOLEAN Default: False Optional: True tunnel Display more details and config data for a specific IPsec tunnel. Syntax: STRING Optional: True verbose Display status of one or all tunnels in plain text. Syntax: BOOLEAN Default: False Optional: True show location Show location information. Parameters None show log [filter STRING] [number INTEGER] Show system log (low level). Parameters filter Filters for type of log message displayed (critical, warning, info, debug). Note, filters from the number of messages retrieved not the whole log (this can be very time consuming). If you require more messages of the filtered type, increase the number of messages retrieved using 'number'. Syntax: (critical|warning|debug|info) Optional: True IX20 User Guide 758 Command line interface number Number of lines to retrieve from log. Syntax: INT Minimum: 1 Default: 20 show manufacture [verbose] Show manufacturer information. Parameters verbose Display more information (less concise, more detail). Syntax: BOOLEAN Default: False Optional: True show modbus-gateway [verbose] Show Modbus gateway status and statistics. verbose Display more information. Syntax: BOOLEAN Default: False Optional: True show modem [verbose] [imei STRING] [name STRING] Show modem status and statistics. Parameters imei The IMEI of the modem to execute this CLI command on. Syntax: STRING Optional: True name The configured name of the modem to execute this CLI command on. Syntax: STRING Optional: True verbose Display more information (less concise, more detail). Syntax: BOOLEAN Default: False Command line reference IX20 User Guide 759 Command line interface Optional: True show nemo [name STRING] Show NEMO status and statistics. Parameters name The name of a specific NEMO instance. show network [all|verbose] [interface STRING] Show network interface status and statistics. Parameters all Display all interfaces including disabled interfaces. Syntax: BOOLEAN Default: False Optional: True interface Display more details and config data for a specific network interface. Syntax: STRING Optional: True verbose Display more information (less concise, more detail). Syntax: BOOLEAN Default: False Optional: True show openvpn Show OpenVPN status and statistics. openvpn client [all] [name STRING] Show OpenVPN client status statistics. Parameters all Display all clients including disabled clients. Syntax: BOOLEAN Default: False Optional: True Command line reference IX20 User Guide 760 Command line interface name Display more details and config data for a specific OpenVPN client. Syntax: STRING Optional: True openvpn server [all] [name STRING] Show OpenVPN server status and statistics. Parameters all Display all servers including disabled servers. Syntax: BOOLEAN Default: False Optional: True name Display more details and config data for a specific OpenVPN server. Syntax: STRING Optional: True show route [ipv4|ipv6|verbose] Show IP routing information. Parameters ipv4 Display IPv4 routes. Syntax: BOOLEAN Default: False Optional: True ipv6 Display IPv6 routes. Syntax: BOOLEAN Default: False Optional: True verbose Display more information (less concise, more detail). Syntax: BOOLEAN Default: False Optional: True show scripts Show scheduled system scripts Command line reference IX20 User Guide 761 Command line interface Parameters None show serial PORT Show serial status and statistics. Parameters port Display more details and config data for a specific serial port. Syntax: STRING Optional: True show system [verbose] Show system status and statistics. Parameters verbose Display more information (disk usage, etc) Syntax: BOOLEAN Default: False Optional: True show usb Show USB information. Parameters None show version [verbose] Show firmware version. Parameters verbose Display more information (build date) Syntax: BOOLEAN Default: False Optional: True show vrrp [all|verbose] [name STRING] Show VRRP status and statistics. Command line reference IX20 User Guide 762 Command line interface Command line reference Parameters all Display all VRRP instances including disabled instances. Syntax: {True|False} Type: boolean name Display more details and configuration data for a specific VRRP instance. Optional: True Type: string verbose Display all VRRP status and statistics including disabled instances. Syntax: {True|False} Type: boolean show web-filter Show web filter status and statistics. Parameters None show wifi Show Wi-Fi status and statistics. wifi ap [all] [name STRING] Display details for Wi-Fi access points. Parameters all Display all Wi-Fi access points including disabled Wi-Fi access points. Syntax: BOOLEAN Default: False Optional: True name Display more details for a specific Wi-Fi access point. Syntax: STRING Optional: True wifi client [all] [name STRING] Display details for Wi-Fi client mode connections. IX20 User Guide 763 Command line interface Command line reference Parameters all Display all Wi-Fi clients including disabled Wi-Fi client mode connections. Syntax: BOOLEAN Default: False Optional: True name Display more details for a specific Wi-Fi client mode connection. Syntax: STRING Optional: True show wifi-scanner Show Wi-Fi scanner information. wifi-scanner log Show output log for the last update interval. Parameters None ssh Use SSH protocol to log into a remote server. ssh [command STRING] host STRING [port INTEGER] user STRING Parameters command The command that will be automatically executed once the SSH session to the remote host is established. Optional: True Type: string host The hostname or IP address of the remote host Syntax: {hostname|IPv4_address|IPv6_address} Type: string port The SSH port to use to connect to the remote host. Default: 22 Maximum: 65535 Minimum: 1 Syntax: {Integer} IX20 User Guide 764 Command line interface Type: integer user The username to use when connecting to the remote host. Type: string Command line reference IX20 User Guide 765 Command line interface Command line reference system System commands. system backup [passphrase STRING] type STRING PATH Save the device's configuration to a file. Archives are full backups including generated SSH keys and dynamic DHCP lease information. Command backups are a list of CLI commands required to build the device's configuration. Parameters passphrase Encrypt the archive with a passphrase. Syntax: STRING Optional: True Depends on: type equals 'archive' type The type of backup file to create. Archives are full backups including generated SSH keys and dynamic DHCP lease information. CLI configuration backups are a list of CLI commands used to build the device's configuration. Syntax: (cli-config|archive) Default: archive system disable-cryptography Erase the device's configuration and reboot into a limited mode with no cryptography available. The device's shell will be accessible over Telnet (port 23) at IP address 192.168.210.1. To return the device to normal operation, perform the configuration erase procedure with the device's ERASE button twice consecutively. Parameters None system duplicate-firmware Duplicate the running firmware to the alternate partition so that the device will always boot the same firmware version. Parameters None system factory-erase Erase the device to restore to factory defaults. All configuration and automatically generated keys will be erased. Parameters None IX20 User Guide 766 Command line interface Command line reference system firmware update file STRING Update the current firmware image. Upon reboot the new firmware will be run. Parameters file Firmware filename and path. Type: string system restore [passphrase STRING] PATH Restore the device's configuration from a backup archive or CLI commands file. Parameters path The path to the backup file. Syntax: STRING passphrase Decrypt the archive with a passphrase. Syntax: STRING Optional: True system script stop SCRIPT Stop an active running script. Scripts scheduled to run again will still run again (disable a script to prevent it from running again). Parameters script Script to stop. Syntax: STRING system serial clear PORT Clears the serial log. Parameters port Serial port. Type: string system serial save PORT FILENAME Saves the current serial log to a file. IX20 User Guide 767 Command line interface Command line reference Parameters port Serial port. Type: string filename The filename to save the serial log. The file will be saved to the device's /etc/config/serial directory. Type: string system serial show PORT Displays the serial log on the screen. Parameters port Serial port. Type: string system serial start [size INTEGER] PORT Start logging data on a serial port. Parameters size Maximum size of serial log. Default: 65536 Syntax: {Integer} Type: integer port Serial port. Type: string system serial stop PORT Start logging data on a serial port. Parameters port Serial port. Type: string system support-report PATH Save a support report to a file and include with support requests. IX20 User Guide 768 Command line interface Parameters path The file path to save the support report to. Syntax: STRING path The file path to save the backup to. Syntax: STRING Command line reference IX20 User Guide 769 Command line interface Command line reference traceroute Print the route packets trace to network host. traceroute [bypass|debug|dontfragment|icmp|ipv6|nomap] [first_ttl INTEGER] [gateway STRING] [interface STRING] [max_ttl INTEGER] [nqueries INTEGER] [packetlen INTEGER] [pausemsecs INTEGER] [port INTEGER] [src_addr STRING] [tos INTEGER] [waittime INTEGER] HOST Parameters bypass Bypass the normal routing tables and send directly to a host on an attached network. Syntax: BOOLEAN Default: False Optional: True debug Enable socket level debugging. Syntax: BOOLEAN Default: False Optional: True dontfragment Do not fragment probe packets. Syntax: BOOLEAN Default: False Optional: True first_ttl Specifies with what TTL to start. Syntax: INT Minimum: 1 Default: 1 gateway Tells traceroute to add an IP source routing option to the outgoing packet that tells the network to route the packet through the specified gateway Syntax: STRING Optional: True icmp Use ICMP ECHO for probes. Syntax: BOOLEAN Default: False IX20 User Guide 770 Command line interface Command line reference Optional: True interface Specifies the interface through which traceroute should send packets. By default, the interface is selected according to the routing table. Syntax: STRING Optional: True ipv6 If a hostname is defined as the value of the 'host' parameter, use the hosts IPV6 address. Syntax: BOOLEAN Default: False Optional: True max_ttl Specifies the maximum number of hops (max time-to-live value) traceroute will probe. Syntax: INT Minimum: 1 Default: 30 nomap Do not try to map IP addresses to host names when displaying them. Syntax: BOOLEAN Default: False Optional: True nqueries Sets the number of probe packets per hop. A value of -1 indicated Syntax: INT Minimum: 1 Default: 3 packetlen Total size of the probing packet. Default 60 bytes for IPv4 and 80 for Ipv6. A value of -1 specifies that the default value will be used. Syntax: INT Minimum: -1 Default: -1 pausemsecs Minimal time interval between probes Syntax: INT Minimum: 0 Default: 0 IX20 User Guide 771 Command line interface Command line reference port Specifies the destination port base traceroute will use (the destination port number will be incremented by each probe). A value of -1 specifies that no specific port will be used. Syntax: INT Minimum: -1 Default: -1 src_addr Chooses an alternative source address. Note that you must select the address of one of the interfaces. By default, the address of the outgoing interface is used. Syntax: STRING Optional: True tos For IPv4, set the Type of Service (ToS) and Precedence value. Useful values are 16 (low delay) and 8 (high throughput). Note that in order to use some TOS precedence values, you have to be super user. For IPv6, set the Traffic Control value. A value of -1 specifies that no value will be used. Syntax: INT Minimum: -1 Default: -1 waittime Determines how long to wait for a response to a probe. Syntax: INT Minimum: 1 Default: 5 host The host that we wish to trace the route packets for. Syntax: STRING IX20 User Guide 772madbuild