User Manual for Inhand models including: IR305, 2AANYIR305, InRouter305 Industrial Router, Industrial Router

聂小盈

User Manual

Beijing InHand Networks Technology Co., Ltd. IR305 WCDMA, LTE,2.4G WiFi Cellular Router 2AANYIR305 2AANYIR305 ir305

Not Your Device? Search For Manuals / Datasheets:

File Info : application/pdf, 76 Pages, 1.11MB

Document
Current View
GetApplicationAttachment.html?id=5428250
InRouter305 Industrial Router
User Manual
Issue: V1.0-- August, 2021

Declaration

Thank you for choosing our product. Before using the product, read this manual carefully.

The contents of this manual cannot be copied or reproduced in any form without the written permission of InHand.

Due to continuous updating, InHand cannot promise that the contents are consistent with the actual product information, and does not assume any disputes caused by the inconsistency of technical parameters. The information in this document is subject to change without notice. InHand reserves the right of final change and interpretation.

© 2020 InHand Networks. All rights reserved.

Conventions

Symbol < > ""
>
Cautions Note

Indication
Content in angle brackets "<>" indicates a button name. For example, the <OK> button.
'''' indicates a window name or menu name. For example, the pop-up window "New User."
A multi-level menu is separated by the double brackets ">". For example, the multi-level menu File > New > Folder indicates the menu item [Folder] under the sub-menu [New], which is under the menu [File].
Means reader be careful. Improper action may result in loss of data or device damage.
Notes contain detailed descriptions and helpful suggestions.

Contact Us
Add: 3900 Jermantown Rd., Suite 150, Fairfax, VA 22030 USA E-mail: support@inhandneworks.com T: +1 (703) 348-2988
URL: www.inhandnetworks.com

UL MARKINGS: 1.UL FileE364742E509340. 2.Electrical ratingsInput: 9-36 Vdc, 0.1-0.2A. (Optional) 3.Model numberIR305 5.Ambient temperature range-20 C to +70 C 6. Temperature classT-5 7.Class I, Division 2, Groups A, B, C and D Hazardous Locations
UL INSTALLATION AND OPERATING INSTRUCTIONS: 1.These devices are open-type devices that are to be installed in an enclosure suitable for the environment and where the internal compartment is only accessible by the use of tool. 2."Suitable foruse in class 1, division 2, groups A, B, C and D hazerdous locations, or nonhazardous locations only." 3.Warning - explosion hazard - do not disconnect equipment while the circuit is live or unless the area is known to be free of ignitable concentrations. 4.The unit shall be powered by a UL listed external AC adapter, output rated 9-36 VDC, MIN-MUM: 0.1-0.2A, marked LPS or CLASS 2

Contents I. INTRODUCTION................................................................................................................................. 1
1.1 OVERVIEW ................................................................................................................................... 1 1.2 PANEL INTRODUCTION.............................................................................................................1 1.3 LED INDICATION &SIGNAL ...................................................................................................... 2 1.4 RESET TO DEFAULT SETTINGS .......................................................................................................... 3
II. INSTALLATION ................................................................................................................................. 4
2.1 PREPARATIPNS............................................................................................................................4 2.2 INSTALLATION............................................................................................................................5
2.2.1 SIM/UIM Card ........................................................................................................................ 5 2.2.2 Antenna ................................................................................................................................... 5 2.2.3 Power Supply .......................................................................................................................... 5 2.3 LOGIN ROUTER...........................................................................................................................5
III. WEB CONFIGURATION .................................................................................................................. 7
3. 1 SYSTEM ....................................................................................................................................... 7 3.1.1 Basic Setup..............................................................................................................................7 3.1.2 System Time............................................................................................................................7 3.1.3 Admin Access..........................................................................................................................8 3.1.4 System Log ........................................................................................................................... 10 3.1.5 Configuration Management...................................................................................................10 3.1.6 Schedule ................................................................................................................................ 11 3.1.7 Upgrade ................................................................................................................................. 12 3.1.8 Reboot ................................................................................................................................... 12 3.1.9 Logout ................................................................................................................................... 12
3.2 NETWORK .................................................................................................................................. 12 3.2.1 CELLULAR .......................................................................................................................... 12 3.2.2 WAN......................................................................................................................................14 3.2.3 VLAN....................................................................................................................................17 3.2.4 Switch WLAN Mode ............................................................................................................ 18

3.2.5 WLAN Client (AP Mode) ..................................................................................................... 18 3.2.6 WLAN Client (STA Mode) ................................................................................................... 19 3.2.7 Link Backup .......................................................................................................................... 19 3.2.8 VRRP .................................................................................................................................... 20 3.2.9 IP Passthrough ....................................................................................................................... 21 3.2.10 Static Route ......................................................................................................................... 22 3.2.11 OSPF ................................................................................................................................... 22 3.3 SERVICE......................................................................................................................................22 3.3.1 DHCP service ........................................................................................................................ 23 3.3.2 DNS.......................................................................................................................................23 3.3.3 DNS Relay ............................................................................................................................ 24 3.3.4 DDNS....................................................................................................................................25 3.3.5 Device Manager .................................................................................................................... 26 3.3.6 SNMP....................................................................................................................................27 3.3.7 SNMP Trap............................................................................................................................ 29 3.3.8 I/O ......................................................................................................................................... 30 3.3.9 SMS.......................................................................................................................................30 3.3.10 Traffic Manager...................................................................................................................31 3.3.11 Alarm Settings ..................................................................................................................... 31 3.3.12 User Experience Plan .......................................................................................................... 32 3.4 FIREWALL .................................................................................................................................. 32 3.4.1 Basic......................................................................................................................................32 3.4.2 Filtering ................................................................................................................................. 33 3.4.3 Content Filtering ................................................................................................................... 34 3.4.4 Port Mapping......................................................................................................................... 34 3.4.5 Virtual IP Mapping ................................................................................................................ 35 3.4.6 DMZ......................................................................................................................................35 3.4.7 MAC-IP Binding ................................................................................................................... 36 3.4.8 NAT.......................................................................................................................................36 3.5 QOS .............................................................................................................................................. 37

3.5.1 IP BW Limit .......................................................................................................................... 37 3.6 VPN .............................................................................................................................................. 37
3.6.1 IPSec Settings........................................................................................................................ 39 3.6.2 IPSec Tunnels........................................................................................................................ 40 3.6.3 GRE Tunnels ......................................................................................................................... 41 3.6.4 L2TP Client ........................................................................................................................... 43 3.6.5 PPTP Client ........................................................................................................................... 45 3.6.6 OpenVPN .............................................................................................................................. 45 3.6.7 OpenVPN Advanced ............................................................................................................. 47 3.6.8 Certificate Management ........................................................................................................ 47 3.7 TOOLS ......................................................................................................................................... 48 3.7.1 PING ..................................................................................................................................... 49 3.7.2 Traceroute.............................................................................................................................. 49 3.7.3 Link Speed Test ..................................................................................................................... 49 3.7.4 TCPDUMP ............................................................................................................................ 50 3.8 APPLICATION ............................................................................................................................ 50 3.8.1 Smart ATM ............................................................................................................................ 50 3.8.2 Status Report ......................................................................................................................... 51 3.8.3 Smart-EMS............................................................................................................................ 51 3.9 STATUS........................................................................................................................................52 3.9.1 System ................................................................................................................................... 52 3.9.2 Modem .................................................................................................................................. 52 3.9.3 Traffic Statistics..................................................................................................................... 52 3.9.4 Alarm.....................................................................................................................................53 3.9.5 WLAN...................................................................................................................................53 3.9.6 Network Connections ............................................................................................................ 53 3.9.7 Device Manager .................................................................................................................... 54 3.9.8 Route Table ........................................................................................................................... 54 3.9.9 Device List ............................................................................................................................ 54 3.9.10 Log ...................................................................................................................................... 54

3.9.11 Third Party Software Notices .............................................................................................. 55 APPENDIX A FAQ ................................................................................................................................ 56 APPENDIX B INSTRUCTION OF COMMAND LINE ....................................................................... 58

I. INTRODUCTION
1.1 OVERVIEW
The InRouter305 (IR305) is an IoT cellular router that integrates 4G LTE, Wi-Fi, and VPN technologies to provide an easy, reliable, and secure Internet connectivity. With technologies such as 4G wireless wide area network and Wi-Fi wireless local area network, it provides uninterrupted multiple network access capabilities, and with its comprehensive security and wireless services, it realizes up to 10 thousands equipment networking and provides high-speed data access for equipment networking. This product is suitable for the networking of unattended devices and sites. It is embedded with watchdog and multi-layer link detection mechanisms to ensure reliable and stable communications. The router can be deployed easily to build large scale networks scaling up to tens of thousands of devices. Using our InHand Device Manager cloud platform, users can manage their network efficiently. The IR305 can be used in a wide range of industrial and commercial IoT applications, providing an option of good balance between cost and performance
1.2 PANEL INTRODUCTION
1

1.3 LED INDICATION &SIGNAL

ER305  PWR SYS Wi-Fi NET

LED 
Red off --- Power off Steady in red --- Power on Green off --- System error Blink in Green --- System upgrading Steady in Green --- System working Green off --- Wi-Fi disable Blink in Green --- Wi-Fi connecting Steady in Green --- Wi-Fi working Green off --- Network disconnected Blink in Green --- Network connecting Steady in Green --- Network connected

2

1.4 Reset to default settings
1. When the device is powered on, press the reset button immediately and keep it for 10 seconds until the SYS is steady on 2. Loosen the Reset button the SYS will off. 3. Immediately press and hold the Reset button, SYS will flash, then loosen the Reset button. Then device will reset to default settings.
3

II. INSTALLATION
2.1 PREPARATIPNS
Precautions: Please be sure there is 3G/4G network coverage and there is no shield on site. 220V AC or 9~36VDC shall be provided on site. First installation shall be done under direction of the engineer recognized by InHand Networks.
 1 PC OS: Windows XP, Windows 7, Windows 10 CPU: PII 233 higher Memory: 32M higher Hard disk: 6.4G higher Serial port: At least one Ethernet port: At least one (10M/100M) IE version: 10.0 higher Resolution: 640*480 higher
 1 or 2 SIM card: Ensure the card is enabled with data service and its service is not suspended because of an overdue charge.
 Power supply: 220V AC: can be used with DC power of the device 9~36V DC: Ripple voltage < 100 mV
 Fixation: Please place InRouter on flat level and have it installed in an environment with small vibrational frequency.
The device shall be installed and operated in powered-off status!
4

2.2 INSTALLATION
2.2.1 SIM/UIM Card
InRouter305 uses pop-up card holder. Stab the hollow at the left of the card holder and the card holder will pop up. Then, install the SIM/UIM card and press the card holder back to the card slot.
2.2.2 Antenna
Slightly rotate the movable part of metal SMA-J interface until it cannot be rotated (at this time, external thread of antenna cable cannot be seen). Do not forcibly screw the antenna by holding black rubber lining.
2.2.3 Power Supply
Upon installation of the antenna, connect the device to 9~36V DC power and see if the Power LED on the panel of the device is on. If not, please contact technical support of InHand Networks immediately.
2.3 LOGIN ROUTER
Upon installation of hardware, be sure the Ethernet card has been mounted in the supervisory PC prior to logging in the page of Web settings of the router. I. Automatic Acquisition of IP Address (Recommended) Please set the supervisory computer to "automatic acquisition of IP address" and "automatic acquisition of DNS server address" (default configuration of computer system) to let the device automatically assign IP address for supervisory computer. II. Set a Static IP Address Set the IP address of supervisory PC (such as 192. 168. 2. 2) and LAN interface of device in same
5

network segment (initial IP address of LAN interface of device: 192. 168. 2. 1, subnet mask: 255. 255. 255. 0). III. Cancel the Proxy Server If the current supervisory PC uses a proxy server to access the Internet, it is required to cancel the proxy service. The operating steps are shown below: 1) In the browser window, select "tools>>Internet options"; 2) select "connection" page and click the button of LAN Settings to enter "LAN Settings" window interface. Please confirm if the option "Use a Proxy Server for LAN" is checked; if it is checked, please cancel and click the button <OK>. IV. Log in/Exit Web Settings Page Open IE or other browser and enter IP address of InRouter305, such as http://192.168.2.1 in address bar (default setting of InRouter305). Upon connection, log in from the login interface as Admin, i.e. enter username and password at the login interface (user name /password default: adm/123456).
For security, you are suggested to modify the default login password after the first login and safe keep the password information.
6

III. WEB CONFIGURATION
The device need to be effectively configured before using. This chapter will introduce how to configure your router via Web.

3. 1 SYSTEM

Here, system and network state and system time of synchronizing device and PC can be checked and router WEB configuration interface language can be set as well as the name of mainframe of router can be customized.

3.1.1 Basic Setup

Here, WEB configuration interface language can be set; name of mainframe of router can be

customized.

From the navigation tree, select System >> Basic Setup, then enter the "Basic Setup" page.

Table 3-1-1 Basic Setup Parameters

Basic settings

Function description: Select display language of the router configuration interface and set

personalized name.

Parameters

Description

Default

Language

Configure language of WEB configuration interface

Chinese

Host Name

Set a name for the host or device connected to the router Router
for viewing.

3.1.2 System Time

To ensure the coordination between this device and other devices, user is required to set the system time in an accurate way since this function is used to configure and check system time as well as system time zone. System time is used to configure and view system time and system time zone. It aims to achieve time synchronization of all devices equipped with a clock on network so as to provide multiple applications based on synced time. From the navigation tree, select System >> Time, then enter the "Time" webpage, as shown below.
7

Click <Sync Time> to synchronize the time of the gateway with the system time of the host.

Table 3-1-2 Parameters of System Time

System Time

Function description: Set local time zone and automatic updating time of NTP.

Parameters

Description

Default

Time of Router

Display present time of router

8:00:00 AM, 12/12/2015

PC Time

Display present time of PC

Present time

Timezone Custom TZ String
Auto update Time

Set time zone of router Set TZ string of router Select whether to automatically update time, you may select when startup or every 1/2/...hours.

Custom CST-8
Disable

3.1.3 Admin Access

Admin services include HTTP, HTTPS, TELNET, SSHD and HTTP API. HTTP HTTP (Hypertext Transfer Protocol) is used for transferring web pages on Internet. After enabling HTTP service on device, users can log on via HTTP and access and control the device using a web browser. HTTPS HTTPS (Secure Hypertext Transfer Protocol) is the secure version of hypertext transfer protocol. As a HTTP protocol which supports SSL protocol, it is more secure. TELNET Telnet protocol provides telnet and virtual terminal functions through a network. Depending on Server/Client, Telnet Client could send request to Telnet server which provides Telnet services. The device supports Telnet Client and Telnet Server. SSHD SSH protocol provides security for remote login sessions and other network services. The SSHD service uses the SSH protocol, which has higher security than Telnet. HTTP_API User can check router's status and configure router without login the router remotely by sending HTTP request with HTTP API. Please ask to technical support for more information about HTTP
8

API.

From the navigation tree, select System >> Admin Access, then enter "Admin Access" page.

Table3-1-3 Parameters of Admin Access

Admin Access

Function description:

1. Modify username and password of router.

2. The router may be set by the following 5 ways, i.e. http, https, telnet, SSHD and console.

3. Set login timeout.

Parameters

Description

Default

Username/Password

Username Set name of user who logs in WEB configuration

adm

Old

Previous password access to WEB configuration

123456

Password

New

New password access to WEB configuration

N/A

Password

Confirm

Reconfirm the new password

N/A

New

Password

Amin functions

Service Port Service port of

80/443/23/22/4444

HTTP/HTTPS/TELNET/SSHD/HTTP_API

Enable - Allow local LAN to administrate the router

Local

with corresponding service (e.g. HTTP)

Enable

Access

Disable - Local LAN cannot administrate the router with

corresponding service (e.g. HTTP)

Enable - Allow remote host to administrate the router

Remote

with corresponding service (e.g. HTTP)

Enable

Access

Disable - Remote host cannot administrate the router

with corresponding service (e.g. HTTP)

The host

controlling service

Allowed

at this moment can

Access from Set allowed access from WAN
WAN

be set, e.g. 192.168.2.1/30

(Optional)

or

192.168.2.1-192.1

68.2.10

For recording significance of various parameters of

admin functions (without influencing router

Description

N/A

configuration)

Console Login User (Click <new> button after setting a group of username and

9

Username Password
Log Timeout

password) Configure console login user, custom Configure the password, custom
Other Parameters Set login timeout (router will automatically disconnect the configuration interface after login timeout)

N/A N/A
500 seconds

 In "Username/Password" section, users can modify username and password rather than create new username, i.e. only this username can be used in logins.
 In "Console Login User" section, we can create multiple usernames, i.e. multiple usernames can be used by serial port or TELNET console logins.
3.1.4 System Log

A remote log server can be set through "System Log Settings," and all system logs will be

uploaded to the remote log server through the gateway. This makes remote log software, such as

Kiwi Syslog Daemon, a necessity on the host.

Kiwi Syslog Daemon is free log server software for Windows. It can receive, record and display

logs from host (such as gateway, exchange board and Unix host). After downloading and installing

Kiwi Syslog Daemon, it must be configured through the menus "File >> Setup >> Input >> UDP.

From the navigation tree, select System >> System Log, then enter "System Log" page.

Table 3-1-4 Parameters of System Log

System Log

Function description: Configure IP address and port number of remote log server which will

record router log.

Parameters

Description

Default

Log to Remote System Enable log server

Disable

Log server address and Set address and port of remote log server
port (UDP)

N/A: 514

Log to Console

Output device log by serial port

Disable

3.1.5 Configuration Management

Here you can back up the configuration parameters, import the desired parameters backup and

10

reset the router.

From the navigation tree, select System >> Config Management, then enter the "Config

Management" page.

Table 3-1-5 Parameters of Configuration Management

Configuration Management

Function description: Set parameters of configuration management.

Parameters

Description

Browse

Choose the configuration file

Import

Import configuration file to router

Backup

Backup configuration file to host

Restore default

Select to restore default configuration (effective after

configuration

rebooting)

Disable the

hardware reset

Select to disable hardware reset button of the router

button

Modem drive program

For configuring drive program of module

Network Provider For configuring APN, username, password and other

(ISP)

parameters of the network providers across the world

Default N/A N/A N/A N/A
Disable
N/A
N/A

Validity and order of imported configurations should be ensured. The good configs will later be serially executed in order after system reboot. If the configuration files didn't be arranged according to effective order, the system won't enter the desired state.
In order not to affect the operation of the current system, when performing an import configuration and restore default configuration, users need to restart the device to make the new configuration to take effect.
3.1.6 Schedule
After this function is enabled, the device will restart as the scheduled time. From the navigation tree, select System >> Task Schedule, then enter "Task Schedule" page.
11

3.1.7 Upgrade
The upgrading process can be divided into two steps. In the first step, upgrading files will be written in backup firmware zone, in the second step: files in backup firmware zone will be copied to main firmware zone, which should be carried out during system restart. During software upgrading, any operation on web page is not allowed, otherwise software upgrading may be interrupted. From the navigation tree, select System >> Upgrade, then enter the "Upgrade" page. To upgrade the system, firstly, click <Browse> choose the upgrade file, secondly, click <Upgrade> and then click <OK> to begin upgrade; thirdly, upgrade firmware succeed, and click <Reboot> to restart the device.
3.1.8 Reboot
Please save the configurations before reboot, otherwise the configurations that are not saved will be lost after reboot. To reboot the system, please click the System>>Reboot, then click <OK>.
3.1.9 Logout
To logout, click System >> Logout, and then click <OK>.
3.2 NETWORK
3.2.1 CELLULAR
Insert SIM card and dial to achieve the wireless network connection function of router. Click the "Network>>Dial Interface" menu in the navigation tree to enter the "Dial Interface".
Table3-2-1-1 Parameters of Dialup/Cellular Dialup/Cellular Connection
Function description: Configure parameters of PPP dialup. Generally, users only need to set basic configuration instead of advanced options.
12

Parameters

Description

Default

Enable

Enable PPP dialup.

Enable

Time Schedule

Set time schedule

ALL

Enable--Local device connected to Router

Shared (NAT)

connection can access to the Internet via Router. Disable--Local device connected to Router Enable

cannot access to the Internet via Router.

Default Route

Enable default route

Enable

For selecting network provider providing

Network Provider (ISP)

Custom

service at present

APN (inapplicable to Mobile carrier provides relevant parameters

cmnet/uninet

CDMA2000 series)

(subject to local carrier)

"*99#""*99***1#"

Dialing Number

(China Mobile, Relevant dialing parameters provided be
China mobile carriers (subject to local carrier)
Unicom)#777(Chin

a Telecom)

"gprs"

(China

Username

Mobile, China Relevant dialing parameters provided be
Unicom) mobile carriers (subject to local carrier)
CARD(China

Telecom)

"gprs"

(China

Password

Mobile, China Relevant dialing parameters provided be
Unicom) mobile carriers (subject to local carrier)
CARD(China

Telecom)

Network Type

Auto, 2G Only, 3G Only, 4G Only

Auto

Connection Mode

Optional always online, dial on demand, Always Online
manual dialing

Redial Interval

Set the redialing time when login fails.

30 s

Show Advanced Options

Initial Commands

Set initial commands

AT

PIN Code

For setting PIN code

N/A

MTU

Set max. transmission unit

1500

Authentication method Optional: Auto, PAP, CHAP

Auto

Use Peer DNS

Click to receive peer DNS assigned by the Enable
mobile carrier

Link detection interval Set link detection interval

55 s

Debug

Enable debug mode

Disable

Debug Modem

Enable debug modem

Disable

ICMP Detection Mode Ignore Traffic/ Monitor Traffic

Ignore Traffic

ICMP Detection Server Set the ICMP Detection Server. N/A N/A

13

ICMP Interval ICMP Timeout

Detection Detection

ICMP Detection Retries

SIM2

Network

Provider (ISP)

SIM2 Access Number

SIM2 Username

SIM2 Password

SIM2 PIN Code

SIM2 Authentication

Type

Main SIM

Max Number of Dial

CSQ Threshold

Min Connected Time

represents not to enable ICMP detection.
Set ICMP Detection Interval
Set ICMP Detection Timeout (the detection server will reboot if ICMP times out) Set the max. number of retries if ICMP fails (redial if reaching max. times)
Dual SIM Enable
Select current carrier
Please consult local carrier Please consult local carrier Please consult local carrier Set PIN code
Select from: Auto, PAP, CHAP
Select from: SIM1, SIM2 Number of redial after disconnect Set CSQ threshold (the router will switch to another SIM if signal is below threshold). Set min connected time (the router will switch to another SIM if it's more than min time).

30 s
20 s
5
Custom Empty Empty Empty Empty Empty Empty 5 0 (0: disabled)
0 (0: disabled)

able3-2-1-2 Parameters of Dialup/Cellular - Schedule

Administration of dialup/Cellular - Schedule

Function description: Online or offline based on the specified time.

Parameters

Description

Name of Schedule

schedule 1

Sunday ~ Saturday

Click to enable

Time Range 1

Set time range 1

Time Range 2

Set time range 2

Time Range 3

Set time range 3

Description

Set description content

Default schedule1
9:00-12:00 14::00-18:00 0:00-0:00 N/A

3.2.2 WAN
Click the "Network>>WAN" to set WAN port. WAN supports three types of wired access including static IP, dynamic address (DHCP) and ADSL (PPPoE) dialing.
14

DHCP adopts Client/Server communication mode. Client sends configuration request to Server

which feeds back corresponding configuration information, including distributed IP address to the

Client to achieve the dynamic configuration of IP address and other information.

PPPoE is a point-to-point protocol over Ethernet. User has to install a PPPoE Client on the basis

of original connection way. Through PPPoE, remote access devices could achieve the control and

charging of each accessed user.

WAN of the device is disabled by default.

Click the "Network>>WAN" menu in the navigation tree to enter the "WAN" Interface.

Table 3-2-2-1 Static IP Parameters of WAN

WAN - Static IP

Function description: Access to Internet via wired lines with fixed IP.

Parameters

Description

Enable--Local device connected to

Router can access to the Internet via

Shared connection (NAT)

Router. Disable--Local device connected to

Router cannot access to the Internet via

Router.

Default Enable

Default route

Enable default route

Enable

00:18:05:08:07:3D

(provided

by

MAC Address

MAC Address of the device

InHand Networks),

provided for device

manufacturer

IP Address

Set IP address of WAN

192.168.1.29

Subnet mask

Set subnet mask of WAN

255. 255. 255. 0

Gateway

Set gateway of WAN

192. 168. 1. 1

MTU

Max. transmission unit, default/manual default (1500)
settings

Multiple IP support (at most 8 additional IP addresses can be set)

IP Address

Set additional IP address of LAN

N/A

Subnet mask

Set subnet mask

N/A

Description

For recording significance of additional N/A
IP address

Table 3-2-2-2 Dynamic Address (DHCP) Parameters of WAN

WAN - Dynamic Address (DHCP) Function description: Support DHCP and can automatically get the address allocated by other

15

routers. Parameters
Shared connection (NAT)
Default route MAC Address MTU

Description Enable--Local device connected to Router can access to the Internet via Router. Disable--Local device connected to Router cannot access to the Internet via Router.

Default Enable

Enable default route

Enable

MAC Address of the device
Max. transmission unit, default/manual settings

00:18:05:08:07:3D

(provided

by

InHand Networks),

provided for device

manufacturer

default (1500)

Table 3-2-2-3 ADSL Dialing (PPPoE) Parameters of WAN

WAN - ADSL Dialing (PPPoE)

Function description: Set ADSL dialing parameters.

Parameters

Description

Default

Enable--Local device connected to

Router can access to the Internet via

Shared connection

Router. Disable--Local device connected to Enable

Router cannot access to the Internet via

Router.

Default route

Enable default route

Enable

MAC Address
MTU
Username Password Static IP Connection Mode

00:18:05:08:07:3D

(provided

by

MAC Address of the device

InHand Networks),

provided for device

manufacturer

Max. transmission unit, default/manual default (1492)
settings

WAN - ADSL Dialing (PPPoE)

Set name of dialing user

N/A

Set dialing password

N/A

Click to enable static IP

Disable

Set dialing connection method (always Always online
online, dial on demand, manual dialing)

16

Parameters of Advanced Options

Service Name

Set service name

Set length of transmit queue. Set length of transmit queue.

Enable IP header compression

Click to enable IP header compression

Use Peer DNS

Click to enable use peer DNS

Link detection interval

Set link detection interval

Link detection Max. Retries Set link detection max. retries

Enable Debug

Click to enable debug

Expert Option

Set expert options

ICMP Detection Server

Set ICMP detection server

ICMP Detection Interval

Set ICMP Detection Interval

ICMP Detection Timeout Set ICMP detection timeout

ICMP Detection Retries

Set ICMP detection max. retries

N/A 3
Disable
Enable 55 s 10 Disable N/A N/A 30 s 20 s 3

3.2.3 VLAN

A virtual LAN (VLAN) comprises a group of logical devices and users. These devices and users

are not limited by physical locations, but can be organized base on functions, departments,

applications, and other factors. They communicate with each other as if they are in the same

network segment, which contributes to the name of VLAN.

Click "Network >> VLAN" to configure VLAN in router.

Table 3-2-3 VLAN Parameters

VLAN

Function description: Set VLAN parameters for LAN port.

Parameters

Description

VLAN ID

Set VLAN ID

LAN1~LAN4

Set which LAN port to be a part of VLAN

Primary IP/Netmask

Set VLAN's IP and netmask

Port mode

MAC

Device's MAC address

Enable

Able to configure Trunk mode after enable

Speed Duplex

Set speed and duplex of LAN port

Mode

Set LAN mode, Access or Trunk

Native LAN

Traffic will not have VLAN tag if it is

Default 1 LAN1~LAN4 enabled
192.168.2.1/255.255.255.0
Hardware MAC address Enable Auto Negotiation Access 1

17

transferred by native VLAN

3.2.4 Switch WLAN Mode

IR305 supports two types of WLAN mode: AP and STA Click the "Network>>Switch WLAN Mode" menu in the navigation tree to set WLAN mode of the router.

3.2.5 WLAN Client (AP Mode)

When working in AP mode, the device WLAN will provide network access point for other

wireless network devices so that they will have normal network communication.

Click the "Network>>WLAN" menu in the navigation tree to enter the "WLAN" interface.

Table 3-2-5 Parameters of WLAN Access Port

WLAN

Function description: Support WiFi function and provide wireless LAN access on site and

identity authentication of wireless user.

Parameters

Description

Default

SSID broadcast After turning on, use can search the WLAN via SSID name Enable

Mode

Six type for options: 802. 11g/n, 802. 11g, 802. 11n, 802. 802.11b/g/n
11b, 802. 11b/g , 802. 11b/g/n

Channel

Select the channel

11

SSID

SSID name defined by user

inhand

Authentication method

Support open type, shared type, auto selection of WEP, WPA-PSK, WPA, WPA2-PSK, WPA2, WPA/WPA2, Open type WPAPSK/WPA2PSK

Encryption

Support NONE, WEP

NONE

Wireless bandwidth

Both 20MHz and 40MHz for selection

20MHz

Enable WDS Click to enable WDS

Disable

Default Route Click to enable Route

Disable

Bridged SSID Set bridged SSID

None

Bridged BSSID Set bridged BSSID

None

Scan

Click "Scan" to scan the available AP nearby

Auth Mode

Open type, shared type, WPA-PSK, WPA2-PSK

Open type

Encryption Method

Support NONE, WEP

None

18

3.2.6 WLAN Client (STA Mode)

When working in STA mode, the router can access the Internet by connecting to access point. The

Router need to reboot after this operation.

Click the "Network>>WLAN Client" menu in the navigation tree to enter the "WLAN" interface.

Select "Client" for the interface type and configure relevant parameters. (At this moment, the

dialing interface in the "Network>>Dialing Interface" should be closed.)

The scanning function of the SSID is enabled only when Client is selected as WLAN interface. In

the "SSID scanning" interface, all available SSID names as well as the connection status of the

device as Client will be displayed.

Table 3-2-6 Parameters of WLAN Client

WLAN Client

Function description: Support Wi-Fi function and access to wireless LAN as client.

Parameters

Description

Default

Mode

Support many modes including 802.11b/g/n

802.11b/g/n

SSID

Name of the SSID to be connected

inhand

Authentication method Keep consistent with the access point to be Open type

connected

Encryption

Keep consistent with the access point to be NONE

connected

3.2.7 Link Backup

Click the "Network>>Link Backup" in the navigation tree to configuration interface.

Table 3-2-7-1 Parameters of Link Backup

Link Backup

Function description: When the system runs, main link will first be enabled for communication.

However, when the main link is disconnected due to certain reason, the system will

automatically switch to the backup link to ensure normal communication.

Parameters

Description

Default

Enable

Click to enable link backup

Disable

Main Link

Optional WAN or dialing interface

WAN

ICMP Detection Server Set ICMP detection server

N/A

ICMP Detection Interval Set ICMP Detection Interval

10 s

19

ICMP Detection Timeout ICMP Detection Retries Backup Link

Set ICMP detection timeout Set ICMP detection max. retries Optional dialup/cellular or WAN

Backup mode

Optional hot or cold backup

3 s 3 Dialup/Cellular Connection Hot backup

Table 3-2-7-2 Parameters of Link Backup - Backup Mode

Link Backup - Backup Mode

Function description: Select the way of link backup.

Parameters

Description

Hot Backup

Main link and backup Link keep online at the same time.

Cold Backup

Backup line will only be online when the main link is

disconnected.

3.2.8 VRRP
VRRP (Virtual Router Redundancy Protocol) adds a set of routers that can undertake gateway function into a backup group to form a virtual router. The election mechanism of VRRP will decide which router to undertake the forwarding task and the host in LAN is only required to configure the default gateway for the virtual router. VRRP will bring together a set of routers in LAN. It consists of multiple routers and is similar to a virtual router in respect of function. According to the VLAN interface IP of different network segments, it can be virtualized into multiple virtual routers. Each virtual router has an ID number and up to 255 can be virtualized. VRRP has the following characteristics:
 Virtual router has an IP address, known as the Virtual IP address. For the host in LAN, it is only required to know the IP address of virtual router, and set it as the address of the next hop of the default route.
 Host in the network communicates with the external network through this virtual router.
 A router will be selected from the set of routers based on priority to undertake the gateway function. Other routers will be used as backup routers to perform the duties of gateway for the gateway router in case of fault of gateway router, thus to guarantee uninterrupted communication between the host and external network
20

Monitor interface function of VRRP better expands backup function: the backup function can be

offered when interface of a certain router has fault or other interfaces of the router are unavailable.

When uplink interface is Down or Removed, the router actively reduces its priority so that the

priority of other routers in the backup group is higher and thus the router with highest priority

becomes the gateway for the transmission task.

From navigation tree, select "Network >>VRRP" menu, then enter "VRRP" page.

Table 3-2-8 VRRP Parameters

VRRP

Function description: Configure parameters of VRRP.

Parameters

Description

Enable VRRP-I Click to enable VRRP function

Group ID

Select ID of router group (range: 1-255)

Priority

Select a priority (range: 1-254)

Advertisement Interval Virtual IP Authentication method

Set an advertisement interval.
Set a virtual IP Select "None" or Password type

Monitor VRRP-II

Set monitor Set as above

Default Disable 1 20 (the larger the numerical value, the higher the priority) 60 s
N/A None (a password is needed when password type is selected) N/A Disable

3.2.9 IP Passthrough

IP penetration function distributes the address obtained by WAN port to the device at the lower

end of LAN port. When external access to the router downstream devices the router transmits data

to the downstream device. Click "Network >>IP Passthrough" menu, then enter "IP Passthrough"

page.

Table 3-2-9 IP Passthrough Parameters

IP Passthrough

Function description: LAN port device to obtain WAN port address, used for external access to router downstream devices.

Parameters

Description

Default

21

IP Passthrough Mode
FIX MAC
DHCP lease

Enable IP Passthrough

Disable

Select work modeDHCP Dynamic/DHCP fix MAC) DHCP

Set fix MAC address

Dynamic 000000 000000

Set DHCP lease time and reacquired after expiration 120S

3.2.10 Static Route

Static route needs to be set manually, after which packets will be transferred to appointed routes.

To set static route, click the "Network >> Static Route" menu in the navigation tree, then enter

"Static Route" interface.

Table 3-2-10 Static Route Parameters

Static Route

Function description: Add/delete additional static rote of router. Generally, it's unnecessary

for users to set it.

Parameters

Description

Default

Destination

Set IP address of the destination

N/A

Address

Subnet Mask Set subnet mask of the destination

255. 255. 255. 0

Gateway

Set the gateway of the destination

N/A

Interface

Select LAN/CELLULAR/WAN/WAN(STA)

N/A

Description

For recording significance of static route address (not N/A
support Chinese characters)

3.2.11 OSPF

The Open Shortest Path First (OSPF) protocol is a link-status-based internal gateway protocol mainly used on large-scale networks

3.3 SERVICE

22

3.3.1 DHCP service

DHCP adopts Client/Server communication mode. Client sends configuration request to Server

which feeds back corresponding configuration information, including distributed IP address to the

Client to achieve the dynamic configuration of IP address and other information.  The duty of DHCP Server is to distribute IP address when Workstation logs on and ensure

each workstation is supplied with different IP address. DHCP Server has simplified some

network management tasks requiring manual operations before to the largest extent.  As DHCP Client, the device receives the IP address distributed by DHCP server after logging

in the DHCP server, so the Ethernet interface of the device needs to be configured into an

automatic mode.

To enable the DHCP server, find the navigation tree, select Services >> DHCP Service, then enter

"DHCP Service" page.

Table 3-3-1 Parameters of DHCP Service

DHCP Service

Function description: If the host connected with router chooses to obtain IP address

automatically, then such service must be activated. Static designation of DHCH

allocation could help certain host to obtain specified IP address.

Parameters

Description

Default

Enable DHCP

Enable DHCP service and dynamically allocate Enable

IP address

IP Pool Starting Address Set starting IP address of dynamic allocation

192.168. 2.2

IP Pool Ending Address Set ending IP address of dynamic allocation

192.168.2.100

Lease

Set lease of IP allocated dynamically

60 minutes

DNS

Set DNS Server

192.168.2.1

Windows Name Server Set windows name server.

N/A

Static designation of DHCH allocation (at most 20 DHCPs designated statically can be set)

MAC Address

Set a statically specified DHCP's MAC address N/A

(different from other MACs to avoid confliction)

IP Address

Set a statically specified IP address

192.168.2.2

Host

Set the hostname.

N/A

3.3.2 DNS
DNA (Domain Name System) is a DDB used in TCP/IP application programs, providing switch
23

between domain name and IP address. Through DNS, user could directly use some meaningful

domain name which could be memorized easily and DNS Server in network could resolve the

domain name into correct IP address. The device makes analysis on dynamic domain name via

DNS.

Manually set the DNS, use DNS via dialing if it is empty. Generally, it needs to set only when

static IP is used on the WAN port.

Click the "Service>>Domain Name Service" menu in the navigation tree to enter the "Domain

Name Service" interface.

Table 3-3-2 DNS Parameters

DNS (DNS Settings)

Function description: Configure parameters of DNS.

Parameters

Description

Primary DNS

Set Primary DNS

Secondary DNS

Set Secondary DNS

Default 0. 0. 0. 0 0. 0. 0. 0

3.3.3 DNS Relay

The device, as a DNS Agent, relays DNS request and response message between DNS Client and

DNS Server to carry out domain name resolution in lieu of DNS Client.

From navigation tree, select "Service>>DNS Relay" menu, then enter "DNS Relay" page.

Table 3-3-3 DNS Transfer Parameters

DNS Relay service

Function description: If the host connected with router chooses to obtain DNS address

automatically, then such service must be activated.

Parameters

Description

Default

Enable (DNS will be

Enable DNS Relay Click to enable DNS service
service

available

when

DHCP service is

enabled.)

Designate [IP address <=> domain name] pair (20 IP address <=> domain name pairs can

be designated)

IP Address

Set IP address of designated IP address <=> N/A
domain name

Host

Domain Name

N/A

Description

For recording significance of IP address <=> N/A

24

domain name

When enabling DHCP, the DHCP relay is also enabled automatically. Relay cannot be disabled without disabling DHCP.

3.3.4 DDNS

DDNS maps user's dynamic IP address to a fixed DNS service. When the user connects to the

network, the client program will pass the host's dynamic IP address to the server program on the

service provider's host through information passing. The server program is responsible for

providing DNS service and realizing dynamic DNS. It means that DDNS captures user's each

change of IP address and matches it with the domain name, so that other Internet users can

communicate through the domain name. What end customers have to remember is the domain

name assigned by the dynamic domain name registrar, regardless of how it is achieved.

DDNS serves as a client tool of DDNS and is required to coordinate with DDNS Server. Before

the application of this function, a domain name shall be applied for and registered on a proper

website such as www. 3322. org.

InRouter305 DDNS service types include QDNS (3322)-Dynamic, QDNS(3322)-Static,

DynDNS-Dynamic, DynDNS-Static, DynDNS-Custom and No-IP.com.

To set DDNS, click the "Service >> Dynamic Domain Name" menu in the navigation tree, then

enter "Dynamic Domain Name" interface.

Table 3-3-4-1 Parameters of Dynamic Domain Name

Dynamic Domain Name

Function description: Set dynamic domain name binding.

Parameters

Description

Current Address

Display present IP of router

Service Type

Select the domain name service

providers

Default N/A Disable

25

Table 3-2-4-2 Main Parameters of Dynamic Domain Name

Enable function of dynamic domain name

Function description: Set dynamic domain name binding. (Explain with the configuration of

QDNS service type)

Parameters

Description

Default

Service Type

QDNS (3322)-Dynamic

Disable

URL

http://www.3322.org/

http://www.3322.org/

Username

User name assigned in the application N/A

for dynamic domain name

Password

Password assigned in the application for N/A

dynamic domain name

Host Name

Host name assigned in the application N/A

for dynamic domain name

Wildcard

Enable wildcard character

Disable

MX

Set MX

N/A

Backup MX

Enable backup MX

Disable

Force Update

Enable force update

Disable

3.3.5 Device Manager

Inhand provides a software platform to manage devices. The device can be managed and operated

via software platform. For instance, the operating status of device can be checked, device software

can be upgraded, device can be restarted, configuration parameters can be sent down to device,

and transmitting control or message query can be realized on device via Device Manager.

Click the "Service>>Device Manager" menu in the navigation tree to enter the "Device Manager"

interface. It only supports three modes, i.e. "Device manager, InConnect Service, Custom"

DM: North American users should select Servicer address-----iot.inhandnetworks.com

Table 3-3-5 Device remote management platform

Device Manager - Only SMS

Function description: Configuration of device manager functions can connect the router to the

platform

Parameters

Description

Default

Enable

Enable platform

Disable

Platform work mode:

Service Type

Device Manager

Device Manager

InConnect Service

Custom

26

Server Secure Channel

Input address of server Enable Secure Channel

Ics.inhand.com.cn Enable

3.3.6 SNMP
Network devices are usually sparsely-located on a network. It is time-consuming for the administrator to configure and manage these network devices on site. In addition, if these devices are from different vendors, each of which provides a suite of independent management interfaces (for example, different command line interfaces), the workload of configuring the devices in batches is huge. In this situation, traditional manual configuration method has the deficiencies of high cost and low efficiency. The network administrator can use the Simple Network Management Protocol (SNMP) to remotely configure and manage the devices and perform real-time monitoring on them.

Figure 3-3-6 SNMP Topology To run the SNMP protocol on a network, configure the NMS program on the management side and SNMP agent on the managed devices. By using SNMP:  The NMS can collect status information of the managed devices anytime and anywhere
through agents and remotely control these devices.  The agents can promptly report the current status and faults of managed devices to the NMS. Currently, the SNMP agents support SNMPv1, SNMPv2c and SNMPv3. SNMPv1 and SNMPv2c use community names for authentication; SNMPv3 uses user names and passwords for authentication. Click "Service>>SNMP" menu to configure.
27

Table 3-3-6-1 SNMPv1 and SNMPv2c Parameters

Parameters

Description

Enable

Enable/disable the SNMP function.

Set the version of the SNMP protocol used to

manage the router. The versions of SNMPv1, v2c,

and v3 are available.

SNMPv1 is applicable to small-sized networks

with simple networking and low security

requirements, or the secure and stable small

networks, such as campus networks and small

enterprise networks.

SNMPv2c is applicable to the medium- and

Version

large-sized networks with low security requirements, or with good security (for example,

VPNs) but running many services, which may lead

to traffic congestion.

SNMPv3 is applicable to networks of various

sizes, especially the networks that have strict

security requirements and can be managed only by

authorized network administrators. For example,

SNMPv3 can be used if data between the NMS

and managed device is transmitted over a public

network.

Contact Information Fill in the contact information.

Location Information

Fill in the location.

Community Management

Community Name User-defined community name.

The community names of SNMPv1 and SNMPv2c

are the passwords used by the NMS to read and

write data on agents. This parameter must be set

the same on both agents and NMS.

Access Limit

Access limit includes the MIB objects that can be

read only or read/written by the NMS.

MIB View

Select the MIB objects that can be monitored and

managed by the NMS. Only the default view is

supported currently.

Default Disabled
v1
Empty Empty public and private Read-Only defaultView

Table 3-3-6-2 SNMPv3 Parameters

Parameters Description

Default

User Group Management

Groupname User-defined user group name. The length is 1 to 32 None

28

Security Level Read-only View Read-write View Inform View
Username
Groupname
Authenticati on
Authenticati on Password
Encryption
Encryption Password

characters. Select a security level for the group. The values include NoAuth/NoPriv, Auth/NoPriv, and Auth/Priv. Select the SNMP read-only view. Only the default view is supported currently. Select the SNMP read-write view. Only the default view is supported currently. Select the SNMP inform view. Only the default view is supported currently.
Usm Management User-defined user name. The length is 1 to 32 characters. The group to which a user is added must have been configured in the user group management table. Select an authentication mode. Three authentication modes are available: MD5, SHA, and None. If you select None, authentication is disabled. This parameter is available only when the authentication mode is not None. The length is 8 to 32 characters. Select the encryption mode. The values are None, AES, and DES. This parameter is available only when the authentication mode is not None. The length is 8 to 32 characters.

NoAuth/NoPriv defaultView defaultView defaultView None None None
None None None

3.3.7 SNMP Trap

SNMP trap is a type of entrance. When this entrance is reached, the SNMP managed devices

actively notify the NMS, instead of waiting for the polling of NMS. On an SNMP-enabled

network, the agents on managed devices can report errors to the NMS anytime, without the need

of waiting for the polling of NMS. The errors are reported to the NMS through traps. Click

"Service>>SNMP Trap" menu to configure.

Parameters Trap SigLevel
Destination Address

Table 3-3-7 SNMP Trap Configuration Parameters

Description

Default

Set the trap signal threshold. When this threshold is reached, the 10

agent outputs logs to the NMS.

Fill in the IP address of the NMS.

None

29

Security Name UDP Port

Fill in the community name for SNMPv1 or SNMPv2c, and fill in None
the user name for SNMPv3. The length is 1 to 32 characters.

Fill in the UDP port number, ranging from 1 to 65535.

162

3.3.8 I/O

Click "Service >> I/O" in the navigation menu to check and configure I/O and relay of the device.

Table 3-3-8 I/O Parameters

I/O

Function description: Configuration I/O mode and relay of the device.

Parameters

Description

I/O mode

Set I/O mode, input or output

Relay configuration

Relay Default Configure relay status

status

Input triggered Report when relay triggers in some situation

report

Trigger edge

Set trigger edge of the relay

Default Output
ON
Disable
Falling edge

3.3.9 SMS

SMS permits message-based reboot and manual dialing. Configure Permit to Phone Number and

click <Apply and Save>. After that you can send "reboot" command to restart the device or send

custom connection or disconnection command to redial or disconnect the device.

From navigation tree, select "Service>>SMS" menu, then enter "SMS" page.

Table 3-3-9 SMS Parameters

Short message

Function description: Configuration SMS function to manage the router in the form of SMS.

Parameters

Description

Default

Enable

Click to enable backup DTU function

Disable

Status Query

Users define the English query instruction to inquire current N/A

working status of the router.

Reboot

Users define the English query instruction to reboot the router. N/A

SMS Access Control

Default Policy Select the manner of access processing.

Accept

Phone Number Fill in accessible mobile number

N/A

30

Action Description

Accept or block Describe SMS control.

3.3.10 Traffic Manager

Accept

Choose Services >> Traffic Manager to go to the "Traffic Manager" page.

Table 3-3-10 Traffic Manager - Basic Configuration Parameters

Traffic Manager

Function: Monitor and manage the traffic use of the router.

Parameters

Description

Enable

Click to enable the traffic manager function.

Alarm Threshold When the traffic volume used within a month reaches the

threshold, the router reports an alarm.

Disconnect

When the traffic volume used within a month reaches the

Threshold

threshold, the router tears down the network connection.

Default Enabled 0
0

3.3.11 Alarm Settings

The alarm function allows you to learn router abnormalities in real time so that you can fix the problems as early as possible. When an abnormality occurs, the router reports an alarm. You can select system-defined abnormalities and choose an appropriate inform way to obtain the abnormality information. All alarms are recorded in alarm logs to facilitate troubleshooting. Based on types, the alarms are classified into system alarms and port alarms.  System alarm: reported when a system or environment error occurs.  Port alarm: reported when a network port error occurs. In the Alarm Manager interface, you can perform the following operations:  Select your interested alarm types in the "Alarm Input" area.  Set the alarm notification method of the console in the "Alarm Output" area. The default
output method is log recording. After this function is configured, the system sends generated alarms to the console. Choose Services >> Alarm Manager to go to the "Alarm Manager" page.
Table 3-3-11 Alarm Manager Parameters Alarm Manager
Function: Set your interested alarm types.
31

Parameters System Service Fault
Memory Low
WAN Link-Up/Down
LAN Link-Up/Down
Dialup Up/Down
Traffic Alarm Traffic Disconnect Alarm
SIM/UIM Card Fault
Signal Quality Fault Console

Description

Default

Click to enable the system service fault Disabled

alarming.

Click to enable the memory insufficiency Disabled

alarming.

Click to enable the link up/down alarming Disabled

of the WAN port.

Click to enable the link up/down alarming Disabled

of LAN ports.

Click to enable the up/down alarming of the Disabled

dialing interface.

Click to enable the traffic alarming.

Disabled

Click to enable the traffic termination Disabled

alarming.

Click to enable the SIM/UIM card fault Disabled

alarming.

Click to enable the signal quality alarming. Disabled

Click to enable alarm notification of the Disabled

console.

3.3.12 User Experience Plan

InHand Networks' User Experience Program is designed to improve the product user experience and customer service quality. You can reject this program. Once you join this program, you understand and agree to the following statements from InHand Networks. User can disable or enable User Experience Plan in "Services >> User Experience Plan"

3.4 FIREWALL
The firewall function of the router implements corresponding control to data flow at entry direction (from Internet to local area network) and exit direction (from local area network to Internet) according to the content features of message (such as: protocol style, source/destination IP address, etc. ) and ensures safe operation of router and host in local area network.
3.4.1 Basic
From the navigation tree, select Firewall >> Basic Setup, then enter the "Basic Setup" page. Table 3-4-1 Firewall - Basic Setup Parameters
32

Basic Setup of Firewall

Function description: Set basic firewall rules.

Parameters

Description

Default Filter Policy

Select accept/block

Filter PING detection from Internet Select to filter PING detection

Filter Multicast

Select to filter multicast function

Defend DoS Attack

Select to defend DoS attack

3.4.2 Filtering

Default Accept Disable Enable Enable

It implements permission or prohibition of access for appointed data flow via configuration of

some matching rules so as to filter the network interface data. After message is received by port of

router, the field is analyzed according to the rule applied on the current port. And after the special

message is identified, the permission or prohibition of corresponding packet is implemented

according to present strategy.

To enable Access Control from the navigation tree, select Firewall >> Filtering, then enter

"Filtering" page.

Table 3-4-2 Filtering Parameters

Access Control of Firewall

Function description: Control the protocol, source/destination address and source/destination

port passing through network packet of the router to provide a safe intranet.

Parameters

Description

Default

Enable

Check to enable filtering.

Enable

Protocol

Select all/TCP/UDP/ICMP

ALL

Source address Set source address of access control

0.0.0.0/0

Source Port

Set source port of access control

Not

available

Destination

Set destination address

N/A

Address

Destination

Set destination port of access control

Not

Port

available

Action

Select accept/block

Accept

Log

Click to enable log and the log about access control will be Disable

recorded in the system.

Description

Convenient for recording parameters of access control

N/A

33

3.4.3 Content Filtering

Configuration of mapping rules is generally used to disable access to network settings.

From navigation tree, select "Firewall>>Content Filtering" menu, then enter "Content Filtering"

page.

Table 3-4-3 Content - Filtering Parameters

Filtering

Function description: Set settings of firewall related to filtering and generally set forbidden

URL.

Parameters

Description

Default

Enable

Click to enable filtering

Enable

URL

Set URL that needs to be filtered

N/A

Action

Select accept/block

Accept

Log

Click to write log and the log about filtering will be recorded Disable

in the system.

Description

Record the meanings of various parameters of filtering

N/A

3.4.4 Port Mapping

Port mapping is also called virtual server. Setting of port mapping can enable the host of extranet

to access to specific port of host corresponding to IP address of intranet.

To configure port mapping, go into the navigation tree, select "Firewall >> Port Mapping", then

enter "Port Mapping" page.

Table 3-4-4 Firewall - Port Mapping Parameters

Port Mapping (at most 50 port mappings can be set)

Function description: Configure parameters of port mapping.

Parameters

Description

Enable

Check to enable port mapping.

Protocol

Select TCP/UDP/ICMP

Source address

Set source address of port mapping

Service Port

Set service port number of port mapping

Internal Address

Set external address of port mapping

Internal Port

Set internal address of port mapping

Log

Click to enable log and the log about port mapping will

be recorded in the system.

External

address Set external address/tunnel name of port mapping

(optional)

Description

For recording significance of each port mapping rule

Default Enable TCP 0.0.0.0/0 8080 N/A 8080 Disable
N/A
N/A

34

3.4.5 Virtual IP Mapping

Both router and the IP address of the host of intranet can correspond with one virtual IP. Without

changing IP allocation of intranet, the extranet can access to the host of intranet via virtual IP.

This is always used with VPN.

To configure virtual IP mapping, go into the navigation tree, select "Firewall >> Virtual IP

Mapping", then enter "Virtual IP Mapping" page.

Table 3-4-5 Firewall - Virtual IP Mapping Parameters

Virtual IP Address

Function description: Configure parameters of virtual IP address.

Parameters

Description

Virtual IP address of Set virtual IP address of router

router

Range of source address Set range of the external source IP addresses.

Enable

Click to enable virtual IP address

Virtual IP

Set virtual IP address of virtual IP mapping

Real IP

Set real IP address of virtual IP mapping

Log

Click to enable log and the log about virtual IP

address will be recorded in the system.

Description

For recording significance of each virtual IP address

rule

Default N/A
N/A Enable N/A N/A Disable
N/A

3.4.6 DMZ

After mapping all ports, extranet PC can access to all ports of internal device by DMZ settings.

From the navigation tree, select Firewall >> DMZ, then enter the "DMZ" page.

Table 3-4-6 Firewall - DMZ Parameters

DMZ

Function description: Configure DMZ settings.

Parameters

Description

Enable DMZ

Check to enable the DMZ.

DMZ Host

Set address of DMZ Host

Range of Source Address Enter range of source address

Interface

Select interface as DMZ: CELLULAR/WAN/VPN

Interface

Default Disable N/A N/A N/A

35

3.4.7 MAC-IP Binding

If the default process in the basic setting of firewall is disabled, only hosts specified in MAC-IP

can have an access to outer net.

From the navigation tree, select Firewall >> MAC-IP Binding, then enter the "MAC-IP Binding"

page.

Table 3-4-7 Firewall - MAC-IP Binding Parameters

MAC-IP Binding (at most 20 MAC-IP Bindings can be set)

Function description: Configure MAC-IP parameters.

Parameters

Description

Default

MAC Address

Set the binding MAC address

00:00:00:00:00:00

IP Address

Set the binding MAC address

192. 168. 2. 2

Description

For recording the significance of each MAC-IP N/A

binding configuration

3.4.8 NAT

NAT is the network address translation function, including source address translation (SNAT) and

destination address translation (DNAT).

Source NAT refers to the communication between the internal network and the external network

when the destination address remains unchanged. Destination NAT refers to the translation of the

destination address of the internal network into the external network without changing the source

address when accessing the internal network.

Table 3-4-8 NAT Parameters

NAT

Function description: Configure parameters of NAT

Parameters

Description

NAT

Enable NAT

Type

Set convert type

Protocol

Select protocol

Souce NAT

Set SNAT

Default Enable SNAT TCP 0.0.0.0/0 all

Destination NAT

Set DNAT

 all

Destination address

The ip address of destination

0.0.0.0/0 all

Destination port

Convert the port of destination

 all

36

Convert address Convert port

Convert the IP address of destination Convert the port of destination

0.0.0.0/0all  all

3.5 QoS

Some applications bring convenience to users, but they also take up a lot of network bandwidth. To ensure all LAN users can normally get access to network resources, IP traffic control function can limit the flow of specified host on local network. QoS provides users with dedicated bandwidth and different service quality for different applications, greatly improving the network service capabilities. Users can meet various requirements of different applications.

3.5.1 IP BW Limit

Bandwidth control sets a limit on the upload and download speeds when accessing external

networks.

From the navigation tree, select QoS >> Bandwidth Control, then enter the "IP BW Limit" page.

Table 3-5-1 Parameters of IP BW Limit

IP Bandwidth Limit

Function description: Configure parameters of IP bandwidth limit.

Parameters

Description

Enable

Click to enable IP bandwidth limit

Download bandwidth

Set download total bandwidth

Upload bandwidth

Set upload total bandwidth

Control port of flow

Select CELLULAR/WAN

Host Download Bandwidth

Enable

Click to enable

IP Address

Set IP address

Guaranteed Rate (kbit/s)

Set rate

Priority

Select priority

Description

Describe IP bandwidth limit

Default Disable 100000kbit/s 100000kbit/s CELLULAR
Enable N/A 1000kbit/s Medium N/A

3.6 VPN

37

VPN is for building a private dedicated network on a public network via the Internet. "Virtuality" is a logical network. Two Basic Features of VPN:
 Private: the resources of VPN are unavailable to unauthorized VPN users on the internet; VPN can ensure and protect its internal information from external intrusion.
 Virtual: the communication among VPN users is realized via public network which, meanwhile can be used by unauthorized VPN users so that what VPN users obtained is only a logistic private network. This public network is regarded as VPN Backbone.
Build a credible and secure link by connecting remote users, company branches, partners to the network of the headquarters via VPN so as to realize secure transmission of data. It is shown in the figure below:
Remote Access

Enterprise Headquarter

VPN VPN VPN

Embranchment
Cooperative Partner

Fundamental Principle of VPN The fundamental principle of VPN indicates to enclose VPN message into tunnel with tunneling technology and to establish a private data transmission channel utilizing VPN Backbone so as to realize the transparent message transmission. Tunneling technology encloses the other protocol message with one protocol. Also, encapsulation protocol itself can be enclosed or carried by other encapsulation protocols. To the users, tunnel is logical extension of PSTN/link of ISDN, which is similar to the operation of actual physical link.
38

3.6.1 IPSec Settings

A majority of data contents are Plaintext Transmission on the Internet, which has many potential

dangers such as password and bank account information stolen and tampered, user identity

imitated, suffering from malicious network attack, etc. After disposal of IPSec on the network, it

can protect data transmission and reduce risk of information disclosure.

IPSec is a group of open network security protocol made by IETF, which can ensure the security

of data transmission between two parties on the Internet via data origin authentication, data

encryption, data integrity and anti-replay function on the IP level. It is able to reduce the risk of

disclosure and guarantee data integrity and confidentiality and well as maintain security of service

transmission of users.

IPSec, including AH, ESP and IKE, can protect one and more date flows between hosts, between

host and gateway, and between gateways. The security protocols of AH and ESP can ensure

security and IKE is used for cipher code exchange.

IPSec can establish bidirectional Security Alliance on the IPSec peer pairs to form a secure and

interworking IPSec tunnel and to realize the secure transmission of data on the Internet.

From navigation tree, select VPN>>IPSec Settings, then enter "IPSec Settings" page.

Table 3-6-1 Parameters of IPSec Settings

IPSec settings

Function description: 1. Select whether to enable NATT, generally this is enabled, unless it is

confirmed that there is no NAT router in the network. In order to keep VPN

tunnel connected, NATT interval should be properly set.

2. Select whether to enable compression and debug mode.

Parameters

Description

Default

Enable NAT-Traversal (NATT)

Click to enable NAT-Traversal

Enable

Keep alive time interval of

Set alive time interval of NAT

60 s

NAT

Enable Compression

Click to enable compression

Enable

Force NATT

Click to enable force NATT

Disable

Dynamic NATT Port

Click to enable dynamic NATT port

Disable

39

3.6.2 IPSec Tunnels

From navigation tree, select VPN>>IPSec Tunnels, enter "IPSec Tunnels" and click <add>.

Table 3-6-2 Parameters of IPSec Tunnels

IPSec Tunnels

Function description: Configure IPSec tunnels

Parameters

Description

Show Advanced Options

Click to enable advanced options

Basic parameters

Tunnel Name

User defines tunnel name

Destination Address

Set destination IP address or domain name

Startup Modes

Select Auto Activated/Triggered by Data/Passive/Manually Activated

Restart WAN when failed Click to enable

Negotiation Mode

Select main mode or aggressive mode

IPSec Protocol (Advanced Select ESP/AH
Option)

IPSec Mode (Advanced Select tunnel mode/transmission

Option)

mode

VPN over IPSec (Advanced Select L2TP over IPSec/GRE over

Option)

IPSec/None

Select

Tunnel Type

Host-Host/Host-Subnet/Subnet-Host/

Subnet-Subnet

Local subnet address

Set local subnet IP address

Local Subnet Mask

Set local subnet mask

Peer Subnet Address

Set peer subnet IP address

Peer Subnet Mask

Set remote netmask

Phase I Parameters

IKE Strategy

Multiple strategies available

IKE Life Cycle

Set IKE life cycle

Select IP address/User FQDN/FQDN

Local ID Type

Fill in the ID according to the ID type (USERFQDN is standard email

format)

Peer ID Type

Select IP address/User FQDN/FQDN

Authentication method

Select shared key/digital certificate

Key

Set IPSec VPN key

XAUTH Parameters (Advanced Option)

Default Disable(open advanced options after enabling)
IPSec_tunnel_1 0. 0. 0. 0
Auto Activated Enable Main Mode
ESP
Tunnel Mode
None
Subnet-Subnet
192. 168. 2. 1 255. 255. 255. 0 0. 0. 0. 0 255. 255. 255. 0
3DES-MD5-DH2 86400 s
IP Address
IP Address Shared key N/A

40

XAUTH Mode

Click to enable XAUTH mode

Disable

XATUTH username

User defines XATUTH username

N/A

XATUTH password

User defines XATUTH password

N/A

MODECFG

Click to enable MODECFG

Disable

Phase II Parameters

IPSec Strategy

Multiple strategies available

3DES-MD5-96

IPSec Life Cycle

Set IPSec life cycle

3600 s

Perfect Forward Secrecy Select disable/Group 1/Group Disable (this needs to

(PFS) (Advanced Option) 2/Group 5

match the server)

Link Detection Parameters (Advanced Option)

DPD Interval

Set time interval.

60 s

DPD Timeout

Set the timeout for dropped packets. 180 s

ICMP Detection Server

Set ICMP detection server

N/A

ICMP Detection Local IP Set ICMP detection local IP

N/A

ICMP Detection Interval

Set ICMP Detection Interval

60 s

ICMP Detection Timeout Set ICMP detection timeout

5 s

ICMP Detection Retries

Set ICMP detection max. retries

10

The security level of three encryption algorithms ranks successively: AES, 3DES, DES. The implementation mechanism of encryption algorithm with stricter security is complex and slow arithmetic speed. DES algorithm can satisfy the ordinary safety requirements.
3.6.3 GRE Tunnels
Generic Route Encapsulation (GRE) defines the encapsulation of any other network layer protocol on a network layer protocol. GRE could be used as the L3TP of VPN to provide a transparent transmission channel for VPN data. In simple terms, GRE is a tunneling technology which provides a channel through which encapsulated data message could be transmitted and encapsulation and decapsulation could be realized at both ends. GRE tunnel application networking shown as the following figure:

41

X Network

X Network

GRE Tunnel
Along with the extensive application of IPv4, to have messages from some network layer protocol transmitted on IPv4 network, those messages could by encapsulated by GRE to solve the transmission problems between different networks. In following circumstances GRE tunnel transmission is applied:  GRE tunnel could transmit multicast data packets as if it were a true network interface.
Single use of IPSec cannot achieve the encryption of multicast.  A certain protocol adopted cannot be routed.  A network of different IP address shall be required to connect other two similar networks. GRE application example: combined with IPSec to protect multicast data GRE can encapsulate and transmit multicast data in GRE tunnel, but IPSec, currently, could only carry out encryption protection against unicast data. In case of multicast data requiring to be transmitted in IPSec tunnel, a GRE tunnel could be established first for GRE encapsulation of multicast data and then IPSec encryption of encapsulated message so as to achieve the encryption transmission of multicast data in IPSec tunnel. As shown below:

Enterprise Intranet

Telecommuting

IP Multicast Streams

From navigation tree, select VPN>>GRE Tunnels and enter "GRE Tunnels".

Table 3-6-3 Parameters of GRE Tunnels

2 GRE Tunnels

Function description: Configure GRE tunnels

Parameters

Description

42

Default

Enable Name Local visual IP Destination Address Peer visual IP Peer Subnet Address Peer Subnet Mask Key NAT
Description

Click to enable GRE User defines name of GRE tunnel Set local virtual IP Set remote IP address Set peer virtual IP Set peer subnet IP address Set remote netmask Configure the key of GRE tunnel Click to enable NAT For recording the significance of each GRE tunnel configuration

Enable tun0 0. 0. 0. 0 0. 0. 0. 0 0. 0. 0. 0 0. 0. 0. 0 255. 255. 255. 0 N/A Disable
N/A

3.6.4 L2TP Client

L2TP, one of VPDN TPs, has expanded the applications of PPP, known as a very important VPN technology for remote dial-in user to access the network of enterprise headquarters. L2TP, through dial-up network (PSTN/ISDN), based on negotiation of PPP, and could establish a tunnel between enterprise branches and enterprise headquarters so that remote user has access to the network of enterprise headquarters. PPPoE is applicable in L2TP. Through the connection of Ethernet and Internet, a L2TP tunnel between remote mobile officers and enterprise headquarters could be established. L2TP-Layer 2 Tunnel Protocol encapsulates private data from user network at the head of L2 PPP. No encryption mechanism is available, thus IPSes is required to ensure safety. Main Purpose: branches in other places and employees on a business trip could access to the network of enterprise headquarter through a virtual tunnel by public network remotely. Typical L2TP network diagram is shown below:

43

Enterprise Branch

RADIUS Server

RADIUS Server

Enterprise Headquarter

Dialling User
Mobile Office Staff (L2TP Dialling Software)

L2TP Tunnel L2TP Tunnel

From navigation tree, select VPN>>L2TP Client, enter "L2TP Client" and click <add>.

Table 3-6-4 Parameters of L2TP Client

3 L2TP Client

Function description: Configure parameters of L2TP client.

Parameters

Description

Enable

Click to enable L2TP client

Tunnel Name

User defines tunnel name of L2TP client

L2TP Server

Set L2TP Server address

Username

Set server's username

Password

Set server's password

Server Name

Set server name

Select Auto Activated/Triggered by

Startup Modes

Data/Passive/Manually

Activated/L2TPOverIPSec

Authentication Method

Select CHAP/PAP

Enable Challenge secrets

Click to enable challenge secrets

Challenge secret (after Set challenge secret
enabling)

Local IP Address

Set local IP address

Remote IP Address

Set remote IP address

Remote Subnet

Set remote subnet address

Remote Netmask

Set remote subnet mask

Link Detection Interval Max. Retries for Link Detection Enable NAT MTU MRU

Set link detection interval
Set the max. number of retries
Click to enable NAT Set max. transmission unit Set max. receiving unit

Default Disable L2TP_tunnel_1 N/A N/A N/A l2tpserver

Auto Activated

CHAP Disable

N/A

N/A

N/A

N/A

255.

255.

255. 0

60 s

5

Disable 1500 1500

44

Enable Debug Expert Option recommended)

Enable debug mode. (not
Set expert option, not recommended

3.6.5 PPTP Client

Disable N/A

From navigation tree, select VPN>>PPTP Client, enter "PPTP Client" and click <add>.

Table 3-6-5 Parameters of PPTP Client

4 PPTP Client

Function description: Configure parameters of PPTP client.

Parameters

Description

Enable

Click to enable PPTP client

Tunnel Name

User defines tunnel name

PPTP Server Username Password
Startup Modes
Authentication method Local IP Address Remote IP Address Remote Subnet

Set PPTP Server address Set username of PPTP server Set password of PPTP server Select Auto Activated/Triggered by Data/Passive/Manually Activated Select Auto/CHAP/PAP/MS-CHAPv1/MS-CHAPv2 Set local IP address Set remote IP address Set remote subnet address

Remote Netmask

Set remote subnet mask

Link Detection Interval Max. Retries for Link Detection Enable NAT Enable MPPE Enable MPPC MTU MRU Enable Debug Set expert option (not recommended)

Set link detection interval
Set the max. number of retries
Click to enable NAT Click to enable MPPE Click to enable MPPC Set max. transmission unit Set max. receiving unit Enable debug mode.
Set expert option, not recommended

Default Disable PPTP_tun nel_1 N/A N/A N/A Auto Activated Auto N/A N/A N/A 255. 255. 255. 0 60 s
5
Disable Disable Disable 1500 1500 Disable
N/A

3.6.6 OpenVPN

Single point participating in the establishment of VPN is allowed to carry out ID verification by

45

preset private key, third-party certificate or username/password. OpenSSL encryption library and

SSLv3/TLSv1 protocol are massively used.

In OpenVPN, if a user needs to access to a remote virtual address (address family matching virtual

network card), then OS will send the data packet (TUN mode) or data frame (TAP mode) to the

visual network card through routing mechanism. Upon the reception, service program will

receive and process those data and send them out through outer net by SOCKET, owing to which,

the remote service program will receive those data and carry out processing, then send them to the

virtual network card, then application software receive and accomplish a complete unidirectional

transmission, vice versa.

From navigation tree, select "VPN>>OpenVPN", then enter "OpenVPN" page, and click <Add>.

Table 3-6-6 IPSec Configuration Parameters

OpenVPN

Function description: Configure OpenVPN parameters.

Parameters

Description

Tunnel Name

OpenVPN tunnel name, cannot be changed by the system

Enable

Click to enable

Mode

Client/server

Protocol

UDP/ICMP

Port

Set port

OPENVPN Server

Set OPENVPN Server address

N/A, pre-shared key, username/password,

Authentication method

digital certificate (multiple client), digital

certificate, username+digital certificate

Local IP Address

Set local IP address

Remote IP Address

Set remote IP address

Remote Subnet

Set remote subnet address

Remote Netmask

Set remote subnet mask

Link Detection Interval Link Detection Timeout Enable NAT Enable LZO
Encryption Algorithms
MTU Max. Fragment Size

Set link detection interval Set link detection timeout Click to enable NAT Click to enable LZO compression Blowfish(128)/DES(128)/3DES(192)/AES(12 8) /AES(192)/AES(256) Set max. transmission unit Set max. fragment size

Default OpenVPN_T_ 1 Enable Client UDP 1194 N/A
N/A
N/A N/A N/A 255. 255. 255. 0 60 s 305 s Enable Enable
Blowfish(128)
1500 N/A

46

Debug Level Interface Type Expert Option recommended)

Error/warning/information/debug TUN/TAP (not Set expert option, not recommended

3.6.7 OpenVPN Advanced

Warning TUN
N/A

From navigation tree, select "VPN>>OpenVPN Advanced" and enter "OpenVPN Advanced"

interface.

Table 3-6-7 Configuration Parameters of OpenVPN Advanced

OpenVPN Advanced

Function description: Configure parameters of OpenVPN Advanced.

Parameters

Description

Enable Client-to-Client (Server Mode Only)

Click to enable

Client Management

Enable

Click to enable client management

Tunnel Name

Set tunnel name

Username/CommonName Password Client IP (4th byte must be 4n+1) Local Static Route Remote Static Route

Set username/commonname Set client password
Set client IP address
Set local static route Set remote static route

Default Disable
Enable OpenVPN_T_ 1 N/A N/A N/A N/A N/A

3.6.8 Certificate Management

From navigation tree, select VPN >> Certificate Management, then enter "Certificate

Management" page.

Table 3-6-8 Parameters of Certificate Management

Certificate Management

Function description: Configure parameters of certificate management.

Parameters

Description

Enable SCEP (Simple

Certificate

Enrollment Click to enable

Protocol)

Protect Key

Set protect key

Protect Key Confirm

Confirm protect key

Default
Disable
N/A N/A

47

Enable SCEP (Simple Certificate Enrollment Protocol)

Force to Re-enroll

Click to enable force to re-enroll

Request Status

The system is "ready to refile an enrollment", cannot be changed

Server URL

Set server URL

Common Name

Set common name

FQDN

Set FQDN

Unit 1

Set unit 1

Unit 2

Set unit 2

Domain

Set domain

Serial Number

Set serial number

Challenge

Set challenge

Challenge Confirm

Challenge confirm

Protect Key

Set protect key

Protect Key Confirm

Confirm protect key

Unstructured address

Set unstructured address

RSA Key Length

Set RSA key length

Poll Interval

Set poll interval

Poll Timeout

Set poll timeout

Import/Export Certificate

Import CA Certificate

Manually import local CA to the router

Export CA Certificate

Manually export CA to local computer

Import CRL

Manually import CRL to the router

Export CRL

Manually export CRL to local computer

Import Public Key

Manually import Public Key Certificate to the

Certificate

router

Export Public Key

Manually export Public Key Certificate to

Certificate

local computer

Import Private Key

Manually import Private Key Certificate to

Certificate

the router

Export Private Key

Manually export Private Key Certificate to

Certificate

local computer

Import PKCS12

Manually import PKCS12 to the router

Export PKCS12

Manually export PKCS12 to local computer

Disable Ready to refile an enrollment N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A 1024 60 s 3600 s
N/A N/A N/A N/A
N/A
N/A
N/A
N/A
N/A N/A

Note: When using certificate, please make sure the time of the router is sync with real time.

3.7 TOOLS

48

3.7.1 PING

To do a ping, enter the navigation tree, select Tools>>Ping Detection, then enter the "Ping

Detection" page.

Table 3-7-1 PING Detection Parameters

1 PING Detection

Function description: PING outside network.

Parameters

Description

Address of the destination host of PING Host
detection is required.

PING Count

Set the PING count

Packet Size

Set the size of PING detection

Expert Option

Advanced parameter of PING is available.

Default N/A 4 32 bytes N/A

3.7.2 Traceroute

To perform traceroute, select "Tools>>Traceroute" menu in the navigation tree, then enter the

"Traceroute" page.

Table 3-7-2 Traceroute Parameters

Traceroute

Function description: Applied for network routing failures detection.

Parameters

Description

Address of the destination host which to Host
be detected is required.

Max. Hops

Set the max. hops for traceroute

Timeout

Set the timeout of traceroute

Protocol

ICMP/UDP

Expert Option

Advanced parameter for traceroute is available.

Default
N/A
20 3 s UDP
N/A

3.7.3 Link Speed Test

Enter the navigation tree, select "Tools>>Link Speed Test", then enter the "Link Speed Test" page.

49

3.7.4 TCPDUMP

Enter the navigation tree, select "Tools>>TCPDUMP", then enter the TCP dump page.

Table 3-7-4 TCPDUMP Parameters

TCPDUMP

Function description: Capture the packet transferring through specific interface

Parameters

Description

Default

Interface

Select the interface to capture the packet ANY

Capture number

Stop TCP dump after capture this 10
number of packets

Expert Option

Advanced parameter for TCPDUMP

N/A

3.8 APPLICATION

3.8.1 Smart ATM

Select Application >> Smart ATM, then enter the "Smart ATM" page. You can set the

configuration about ATM platform.

Table 3-8-1 Smart Parameters

Smart ATM

Function description: configure parameters for docking intelligent ATM cloud platform

Parameters

Description

Default

Smart ATM

Enable Smart ATM

disable

Server

Configure parameters of server,Click iot.inhand.com.cn
Edit to show more information

Enable SSL proxy

Enable proxy of SSL

diable

Multi Server

Click add to set multi server

N/A

Protocol

Configure listener protocol type standard Standard 1/3
1/3,Visa Standard 3

TLS Encryption

Enable TLS encryption

Enable

Get TID

Matching TID

Disable

Incoming TCP Port

Set TCP Port of inbound direction

N/A

Outgoing IP/Host

Set IP/Host name of outbound direction N/A

Outgoing TCP Port

Set TCP Port of outbound direction

N/A

Set Backup TCP Port of outbound N/A Outgoing Backup TCP Port
direction

Outgoing TCP Source Port Set TCP Source port of outbound 0 (All)

50

direction

3.8.2 Status Report

Select Application >> Status Report, then enter the "Status Report" page. You can set the

configuration about Status Report.

Table 3-8-2 Smart Report Parameters

Status Report

Function description: Monitor device status and Report to cloud platform

Parameters

Description

Default

Status Report

Enable status upload service

Disable

Server

Set server name

N/A

Server Port

Set server port

N/A

Username

Set user name

test

User Password

Set user password

test

Status info Upload Interval Time of upload interval

60 second

Protocol

Monitor protocol type

TCP

Log Enable

Enable log

Close

HTTP API

Enable HTTP API

OPEN

Show router report args Setting status upload message
settiong

Disable

Router hostname

show router name

Disable

Router serial number

Show router serial number

Enable

Cellular ip address

Show cellular ip address

Enable

Signal strength

Show signal strength

Enable

Terminal ID

Show terminal ID

Disable

MNCMCCCell IDLAC Show MNC  MCC  Cell ID  LAC Disable

Uptime

Uptime

Current firmware version Show current firmware version

Disable

Timestamp

Show timestamp

Disable

Advice config

Set advance config

N/A

3.8.3 Smart-EMS
Select Application >> Smart-EMS, then enter the "Smart-EMS" page. You can set the configuration about Smart-EMS.
51

Table 3-8-3 Smart-EMS Parameters

Smart-EMS

Function description: configure parameters for docking intelligent Smart-EMS cloud platform

Parameters

Description

Default

Server URL

Fill in server address

N/A

Username

Fill in user name

N/A

Password

Fill in user password

N/A

Contact interval

Set time of contacting interval

N/A

Send running config

Enable send run configuration

Disable

Write startup

Enable write startup

Disable

3.9 STATUS
3.9.1 System
From navigation tree, select Status >> System, then enter the "System" page. This page displays system statistics, including name, model, serial number, description, current version, current Bootloader version, router time, PC time, UP time, CPU load and memory consumption. Technicians may click the <Sync Time> button to synchronize the router with the system time of the host, as covered in the set-up chapter.
3.9.2 Modem
From navigation tree, select Status >> Modem, then enter the "Modem" page. This page displays the basic information of dialup, including status, signal level, register status, IMEI (ESN) code, IMSI code, LAC and cell ID. Click Status >> Modem, then enter the "Modem" page to configure parameters.
3.9.3 Traffic Statistics
Choose Status >> Traffic Statistics to go to the "Traffic Statistics" page to query traffic statistics. This page displays the traffic statistics on the dialing interface, including the statistics on the traffic received in the latest month, traffic transmitted in the latest month, traffic received on the
52

last day, traffic transmitted on the last day, traffic received in the last hour, and traffic transmitted in the last hour.
3.9.4 Alarm
Choose Status >> Alarm to go to the "Alarm" page to view all alarms generated in the system since power-on. You can clear or confirm the alarms. The alarms have the following states:  Raise: indicates that the alarm has been generated but not been confirmed.  Confirm: indicates that the alarm cannot be solved currently.  All: indicates all generated alarms. The alarms are classified into the following levels:  EMERG: The device undergoes a serious error that causes a system reboot.  CRIT: The device undergoes an unrecoverable error.  WARN: The device undergoes an error that affects system functions.  NOTICE: The device undergoes an error that affects system performance.  INFO: A normal event occurs.
3.9.5 WLAN
Choose Status >> WLAN to go to the "WLAN" page to query the WLAN connection status. This page displays the WLAN connection information, including channel, SSID, BSSID, security, signal (%), mode, and status.
3.9.6 Network Connections
From navigation tree, select Status >> Network Connections, then enter "Network Connections" page to see the connections status. This page shows the basis information of dialup and LAN. WAN includes MAC address, connection type, IP address, netmask, gateway, DNS, MTU, Status
53

and etc. Dialup includes connection type, IP address, netmask, gateway, DNS, MTU, status and connection time. LAN includes connection type, MAC address, IP address, netmask, gateway, MTU and DNS.
3.9.7 Device Manager
From navigation tree, select Status >> Device Manager, then enter "Device Manager" page to check the connections status between router and Device Manager.
3.9.8 Route Table
From navigation tree, select Status >> Route Table, then enter "Route Table" page to see router status. This page displays the active route table, including destination, netmask, gateway, metric and interface.
3.9.9 Device List
From navigation tree, select Status >> Device List, then enter "Device List" page to inquire the device list. This page displays the device list, including interface, MAC address, IP address, host and lease (click MAC address to link to IEEE to inquire validity of the address).
3.9.10 Log
From navigation tree, select Status >> Log, then enter "Log" page. This page displays the logs, including select to see the number of log lines (20/50/....../all), log level (information, debug and warning), time, module and content. Clear log, download log file, download system diagnosis record (refresh rate of this page is 5/10/...... 1min by default)
54

3.9.11 Third Party Software Notices
From navigation tree, select Status >> Third Party Software Notices, then enter "Third Party Software Notices" page to check the third party software used in router system.
55

Appendix A FAQ
1. InRouter is powered on, but can't access Internet through it? Please first check:  Whether the InRouter is inserted with a SIM card.  Whether the SIM card is enabled with data service, whether the service of the SIM card is suspended because of an overdue charge.  Whether the dialup parameters, e.g. APN, dialup number, username and password are correctly configured.  Whether the IP Address of your computer is the same subnet with InRouter and the gateway address is InRouter LAN address.
2. InRouter is powered on, have a ping to detect InRouter from your PC and find packet loss? Please check if the network crossover cable is in good condition.
3. Forget the setting after revising IP address and can't configure InRouter? Method 1: connect InRouter with serial cable, configure it through console port. Method 2: Within 5 seconds after InRouter is powered on, press and hold the Restore button until the ERROR LED flashes, then release the button and the ERROR LED should goes off, press and hold the button again until the ERROR LED blinks 6 times, the InRouter is now restored to factory default settings. You may configure it now.
4. After InRouter is powered on, it frequently auto restarts. Why does this happen? First check:  Whether the module works normally.  Whether the InRouter is inserted with a SIM card.  Whether the SIM card is enabled with data service, whether the service of the SIM card is suspended because of an overdue charge.  Whether the dialup parameters, e.g. APN, dialup number, username and password are correctly configured.  Whether the signal is normal.  Whether the power supply voltage is normal.
5. Why does upgrading the firmware of my InRouter always fail? Examination:
 When upgrading locally, check if the local PC and InRouter are in the same network segment.
 When upgrading remotely, please first make sure the InRouter can access Internet. 6. After InRouter establishes VPN with the VPN server, your PC under InRouter can connect to the server, but the center can't connect to your PC under InRouter?
Please make sure the firewall of your computer is disabled. 7. After InRouter establishes VPN with the VPN server, your PC under InRouter can't connect to
56

the server ping? Please make sure "Shared Connection" on "Network=>WAN" or "Network=>Dialup" is enabled
in the configuration of InRouter. 8. InRouter is powered on, but the Power LED is not on?
 Check if the protective tube is burn out.  Check the power supply voltage range and if the positive and negative electrodes are
correctly connected. 9. InRouter is powered on, but the Network LED is not on when connected to PC?
 When the PC and InRouter are connected with a network cable, please check whether a network crossover cable is used.
 Check if the network cable is in good condition.  Please set the network card of the PC to 10/100M and full duplex. 10. InRouter is powered on, when connected with PC, the Network LED is normal but can't have a ping detection to the InRouter?  Check if the IP Address of the PC and InRouter are in the same subnet and the gateway
address is InRouter LAN address. 11. InRouter is powered on, but can't configure through the web interface?
 Whether the IP Address of your computer is the same subnet with InRouter and the gateway address is InRouter LAN address.
 Check the firewall settings of the PC used to configure InRouter, whether this function is shielded by the firewall.
 Please check whether your IE has any third-party plugin (e.g. 3721 and IEMate). It is recommended to configure after unloading the plugin.
12. The InRouter dialup always fails, I can't find out why? Please restore InRouter to factory default settings and configure the parameters again.
13. How to restore InRouter to factory default settings? The method to restore InRouter to factory default settings:
1. Press and hold the Restore button, power on InRouter; 2. Release the button until after the STATUS LED flashes and the ERROR LED is on; 3. After the button is released, the ERROR LED will go off, within 30s press and hold the Restore button again until the ERROR LED flashes; 4. Release the button, the system is now successfully restored to factory default settings.
57

Appendix B Instruction of Command Line

1 Help Command

Help command can be obtained after entering help or "?" into console, "?" can be entered at

any time during the process of command input to obtain the current command or help from

command parameters, and command or parameters can be automatically complemented in case of

only command or command parameter.

1.1 Help

[Command] Help [<cmd>]

[Function] Get help from command.

[View] All views

[Parameter]

<cmd> command name

[Example]
 Enter:

help

Get the list of all current available command.
 enter:

help show

Display all the parameters of show command and using instructions thereof.

2 View Switchover Command

2.1 Enable

[Command] Enable [15 [<password>]]

[Function] Switchover to privileged user level.

[View] Ordinary user view.

[Parameter]15

User right limit level, only supports right limit 15 (super users) at current.

<password> Password corresponded to privileged user limit level, hint of password

inputting will be given in case of no entering.

[Example]

Enter exit in ordinary user view:

enable 123456

Switchover to super users and the password 123456.

2.2 Disable

[Command] Disable

[Function] Exit the privileged user level.

[View] Super user view, configure view

[Parameter] No

[Example]

58

Enter in super user view:

disable

Return to ordinary user view.

2. 3 End and !

[Command] End or !

[Function] Exit the current view and return to the last view.

[View] Configure view.

[Parameter] No

[Example]

Enter in configured view:

end

Return to super user view.

2. 4 Exit

[Command] Exit

[Function] Exit the current view and return to the last view (exit console in case that it is ordinary

user)

[View] All views

[Parameter] No

[Example]
 Enter in configured view:

exit

Return to super user view.
 enter exit in ordinary user view:

exit

Exit console.

3 Check system state command

3. 1 Show version

[Command] Show version

[Function] Display the type and version of software of router

[View] All views

[Parameter] No

[Example]

Enter:

show version

Display the following information:

Type

: display the current factory type of equipment

Serial number

: display the current factory serial number of equipment

Description

: www.inhand.com.cn

Current version

: display the current version of equipment

59

Current version of Bootloader: display the current version of equipment 3. 2 Show system [Command] Show system [Function] Display the information of router system [View] All views [Parameter] No [Example]
Enter: show system Display the following information: Example: 00:00:38 up 0 min, load average: 0.00, 0.00, 0.00
3. 3 show clock
[Command] Show clock [Function] Display the system time of router [View] All views [Parameter] No [Example]
Enter: show clock Display the following information: For example Sat Jan 1 00:01:28 UTC 2000
3. 4 Show modem
[Command] Show modem [Function] Display the MODEM state of router [View] All views [Parameter] No [Example]
Enter: show modem Display the following information:
Modem type state manufacturer Product name signal level register state IMSI number Network Type 3. 5 Show log
60

[Command] Show log [lines <n>] [Function] Display the log of router system and display the latest 100 logs in default. [View] All views [Parameter]
Lines <n> limits the log numbers displayed, wherein, n indicates the latest n logs in case that it is positive integer and indicates the earliest n logs in case that it is negative integer and indicates all the logs in case that it is 0. [Example] Enter: show log Display the latest 100 log records. 3. 6 Show users [Command] Show users [Function] Display the user list of router. [View] All views [Parameter] No [Example] Enter: show users Displayed user list of system is as follows:
User: ------------------------------------------------* adm -----Wherein, user marked with * is super user. 3. 7 Show startup-config [Command] Show startup-config [Function] Display the starting device of router. [View] Super user view and configuration view [Parameter] No [Example] Enter: show startup-config Display the starting configuration of system. 3. 8 Show running-config [Command] Show running-config [Function] Display the operational configuration of router [View] Super user view and configuration view [Parameter] No [Example]
61

Enter: show startup-config Display the operational configuration of system.
4 Check Network Status Command
4. 1 Show interface [Command] Show interface [Function] Display the information of port state of router [View] All views [Parameter] No [Example]
Enter: show interface Display the state of all ports. 4. 2 Show ip [Command] Show ip [Function] Display the information of port state of router [View] All views [Parameter] No [Example] Enter: Show ip Display system ip status 4. 3 Show route [Command] Show route [Function] Display the routing list of router [View] All views [Parameter] No [Example] enter: show route Display the routing list of system 4. 4 Show arp [Command] Show arp [Function] Display the ARP list of router [View] All views [Parameter] No [Example] Enter: show arp Display the ARP list of system
62

5 Internet Testing Command
Router has provided ping , telnet and traceroute for Internet testing. 5. 1 Ping [Command] Ping <hostname> [count <n>] [size <n>] [source <ip>] [Function] Apply ICMP testing for appointed mainframe. [View] All views [Parameter]
<hostname> tests the address or domain name of mainframe. count <n> testing times size <n> tests the size of data package (byte) source <ip> IP address of appointed testing [Example] Enter: ping www.g.cn Test www. g. cn and display the testing results 5. 2 Telnet [Command] Telnet <hostname> [<port>] [source <ip>] [Function] Telnet logs in the appointed mainframe [View] All views [Parameter] <hostname> in need of the address or domain name of mainframe logged in. <port>telnet port source <ip> appoints the IP address of telnet logged in. [Example] Enter: telnet 192.168.2.2 telnet logs in 192. 168. 2. 2 5. 3 Traceroute [Command] Traceroute <hostname> [maxhops <n>] [timeout <n>] [Function] Test the acting routing of appointed mainframe. [View] All views [Parameter] <hostname> tests the address or domain name of mainframe. maxhops <n> tests the maximum routing jumps timeout <n> timeout of each jumping testing (sec) [Example] Enter: traceroute www.g.cn Apply the routing of www. g. cn and display the testing results.
63

6 Configuration Command
In super user view, router can use configure command to switch it over configure view for management. Some setting command can support no and default, wherein, no indicates the setting of canceling some parameter and default indicates the recovery of default setting of some parameter. 6. 1 Configure [Command] Configure terminal [Function] Switchover to configuration view and input the equipment at the terminal end. [View] Super user view [Parameter] No [Example]
Enter in super user view: configure terminal Switchover to configuration view. 6. 2 Hostname [Command] Hostname [<hostname>] default hostname [Function] Display or set the mainframe name of router. [View] Configure view. [Parameter]
<hostname> new mainframe name [Example]
 Enter in configured view:
hostname Display the mainframe name of router.
 Enter in configured view:
hostname MyRouter Set the mainframe name of router MyRouter.  Enter in configured view: defaulthostname Recover the mainframe name of router to the factory setting. 6. 3 Clock timezone [Command] Clock timezone <timezone><n> default clock timezone [Function] Set the time zone information of the router. [View] Configure view. [Parameter]
<timezone> timezone name, 3 capitalized English letters <n> time zone deviation value, -12~+12
64

[Example]
 Enter in configured view:
clock timezone CST -8 The time zone of IG601is east eighth area and the name is CST (China's standard time).  Enter in configured view: default clock timezone Recover the timezone of router to the factory setting. 6. 4 Ntp server [Command] ntp server <hostname> no ntp server default ntp server [Function] Set the customer end of Internet time server [View] Configure view. [Parameter] <hostname> address or domain name of mainframe of time server [Example]  Enter in configured view: ntp server pool.ntp.org Set the address of Internet time server pool. ntp. org.  Enter in configured view: no ntp server Disable the router to get system time via network.  Enter in configured view: default ntp server Recover the network time server of router to the factory setting. 6.5 Config export [Command] Config export [Function] Export config [View] Configure view. [Parameter] No [Example] Enter in configured view: config export The current config. is exported. 6.6 Config import [Command] Config import [Function] Import config [View] Configure view. [Parameter] No
65

[Example] Enter in configured view: config import The config. is imported.
7 System Management Command
7. 1 Reboot [Command] Reboot [Function] System restarts. [View] Super user view and configuration view [Parameter] No [Example]
Enter in super user view: reboot System restarts. 7. 2 Enable username [Command] Enable password [<name>] [Function] Modify the username of super user. [View] Configure view. [Parameter] <name> new super user username [Example]
Enter in configured view:
enable username admin The username of super user is changed to admin. 7.3 Enable password [Command] Enable password [<password>] [Function] Modify the password of super user. [View] Configure view. [Parameter] <password> new super user password [Example]
 Enter in configured view:
enable password Enter password according to the hint. 7.4 Username [Command] Username <name> [password [<password>]] no username <name> default username [Function] Set user name, password
66

[View] Configure view. [Parameter] No [Example]
 Enter in configured view:
username abc password 123 Add an ordinary user, the name is abc and the password is 123.  Enter in configured view: no username abc Delete the ordinary user with the name of abc.  Enter in configured view: default username Delete all the ordinary users.
67

FCC STATEMENT This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. NOTE 1: This equipment has been tested and found to comply with the limits for a Class B digital device , pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: - Reorient or relocate the receiving antenna. - Increase the separation between the equipment and receiver. -Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. -Consult the dealer or an experienced radio/TV technician for help. NOTE 2: Any changes or modifications tothis unit not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. RF Exposure The equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This device should be installed and operated with minimum distance 20cm between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. The availability of some specific channels and/or operational frequency bands is country dependent and firmware programmed at the factory to match the intended destination. The firmware setting is not accessible by the end user.
68

IC STATEMENT This device complies with Industry Canada license-exempt RSS standard(s): Operation is subject to the following Two conditions: (1) this device may not cause interference, and (2) This device must accept any interference, including interference that may cause undesired operation of the device. Le present appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radio exempts de licence. L'exploitation est autorisée aux deux conditions suivantes : (1) l'appareil ne doit pas produire de brouillage, et (2) l'utilisateur de l'appareildoit accepter tout brouillage radioélectrique subi, même si le brouillage est susceptible d'en compromettre le fonctionnement. CAN ICES-3 (B) Avis d'Industrie Canada Le présent appareil est conforme aux CNR d'industrie Canada applicables aux appareils radio exem pts de licence L'exploitation est autorisée aux deux conditions suivantes: 1) I'appareil ne doit pas produire de brouillage; et 2) I'utillsateur de I'appareil doit accepterbrouillage radioélectrique subi meme si le brouillage est susceptible d'encompromettre le fonctionnement. mauvais fonctionnement de I'appareil. Cet appareil numériquie de la classe B est conforme à la norme NMB-003 du Canada. CAN NMB-3 (B) Radiation Exposure Statement: This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. Déclaration d'exposition aux radiations: Cet équipement est conforme aux limites d'exposition auxrayonnements IC établies pour un environnement non contrôlé. Cet équipement doit être installé et utilisé avec un minimum de 20cm de distance entre la source de rayonnement et votre corps.
69


Microsoft Word 2013