Page 1
User's Manual For InHand IR720 Series Router (Version: V2) Beijing InHand Network Technology Co., Ltd. http://www.inhandnetworks.com...
Page 2
The contents of this manual may be changed due to product version upgrade or other reasons. InHand reserves the right to modify the contents of this manual without any notice or prompt. This manual is only used as the guidance. InHand makes every effort to provide accurate information in this manual, but InHand does not guarantee that there is no error in the manual.
Page 3
Preface The User’s Manual for InHand IR720 Series Industrial Grade Router will guide you in detail on how to set page or command line through Web for local management. The preface includes the following contents: Readers Conventions in the Manual ...
Way of Information Acquisition The latest product information is available on the website of InHand (www. InHand.com.cn): The main columns related to product information on the website of InHand are described as follows: [Service Support / Document Center]: Product information in terms of hardware installation, software upgrade, configuration, etc., is available.
Contents 1 WHAT DO YOU WANT TO KNOW? ...................... 2 Product Overview ............................9 2.1 Product Description ..........................9 2.2 Major Characteristics ..........................10 2.3 Typical Networking Applications .......................11 3 Login Web Setting Page ..........................12 3.1 Preparations ..............................12 3.2 Login the Web Setting Page of Router ....................15 4 Get Familiar with the Web Setting Page ....................16...
Page 6
6 Layer2 Switch ..............................33 6.1 Port ................................33 6.2 RSTP ................................35 6.3 Port Security ............................. 37 6.4 802.1x ................................38 6.5 Mac Address ...............................39 7 Network ................................42 7.1 VLAN ................................42 7.2 Cellular Port ............................44 7.3 Loopback ..............................46 7.4 DHCP Service ............................47 7.5 DNS service .............................48 7.6 DDNS...
What do you want to know? “Product Overview” Preliminary acquaintance of the general form of product, business characteristics or its positioning in the actual network applications “Login web setting page" Manage device through setting Web environment and "Get further get familiar with its setting page familiar with the web setting page”...
Typical Networking Applications 2.1 Product Description Thank you for selecting IR720 series industrial grade router (hereinafter referred to as the “Router”). InRouter 720 Series is an industrial grade wireless router integrating the managerial industrial Ethernet switch, industrial grade wireless router and highly secure firewall. It is now widely used in various typical SCADA systems, e.g.
For details, please contact the marketing personnel or technical support personnel of InHand company. 2.2 Major Characteristics 2.2.1 Powerful Functional Characteristics ...
Intelligent centralized management Device management platform of InHand Device Networks SNMP 2.2.2 User-friendly Interface It provides a very simple Web setting page which has intuitive configuration and low use complexity and is easy to operate.
Login Web Setting Page This chapter mainly contains the following contents: Preparations Login the Web Setting Page of Router 3.1 Preparations After the hardware installation and before login the Web setting page of router, you are required to ensure that the supervisory computer and network meet some basic requirements. 3.1.1 Requirements on Supervisory Computer Please confirm that the supervisory computer has been installed with an Ethernet card.
Page 13
1) Open “Control Panel”, double click “Network Connections” icon, and enter “Network Connections” Screen. (2) Click the button <Properties> to enter the window of "Local Connection Properties”...
Page 14
(3) Select "Internet Protocol (TCP / IP), and click button Properties > to enter the window "Internet Protocol (TCP / IP) Properties”. Select the radio button "Use the following IP address", enter the IP address (any value in the range of 192.168.2.2 ~ 192.168.2.254), subnet mask (255.255.255.0) and default gateway (192.168.2.1).
checked,please cancel and click the button<OK>. 3.2 Login the Web Setting Page of Router Run the Web browser, enter “http://192.168.2.1” in the address bar, and press Enter to skip to the Web login page, as shown in Figure 3-1. Enter the “User Name” (default: adm) and “Password” (default: 123456), and click button <OK>...
Get Familiar with the Web Setting Page The router provides a very simple Web setting page allowing you to quickly complete the configuration for the required functions through this setting page. This chapter will let you first understand and get familiar with the Web setting page. This chapter mainly contains the following contents: ...
Check box is used to enable (checked) and disable (unchecked) the function or service. Drop-down list box is used to select the appropriate list item. When you have finished the setting items of a page, you need to click on the button <apply and save > on this page to validate the setting and save the configuration.
Management This chapter mainly includes the following contents: System System Time Admin Access Config Management SNMP Alarm System Log System Upgrade System Reboot 5.1 System 5.1.1 System Status Page Wizard:Administration → System → System Status This page provides the following function: Show the router’s basic information and status.
PC Time The time of PC which is accessing to the router via Web. CPU Load(1/5/15 The average load of CPU in the past 1, 5,15 miutes minutes) Memory Total/Free The total memory and free memory of Router 5.1.2 Basic Settings Page Wizard:Administration→System→Basic Settings This page provides the following function: Router basic setting...
Page 20
NTP Client Settings: The meanings of key items in the page are shown in the table below.. Key Items Description SNTP Client Start/Close SNTP Client Update Event Interval The interval synchronize with SNTP server Server Address SNTP Server Address (domain/IP),10 servers at most Port SNTP service port of SNTP server Before setting a SNTP server, should ensure SNTP server reachable.
5.3 Admin Access 5.3.1 Create a User Page Wizard:Administrator →Admin Access→ Create a user Create a user 5.3.2 Modify a User Page Wizard:Administrator →Admin Access→ Modify a user Modify user information...
Page 22
5.3.3 Remove Users Page Wizard:Administrator →Admin Access→ Remove users Remove users 5.3.4 Management Service Page Wizard:Administrator →Admin Access→ Management Service Managem service: For the super user (adm), can’t modify the username, also can’t delete it.
The meanings of key items in the page are shown in the table below.. Key Items Description radius Authentication and Authorization Serve Tacacs+ Authentication and Authorization Server local The local username and password Authentication、 Authorization、 Accounting. The purpose is to control which users can access the web server, what services they can get and how to charge the users who are using network source.
When import the configuration, the system will filter incorrect configuration files, and save the correct configuration files, when system restart, it will orderly execute theses configuration files. If the configuration files didn’t be arranged according to effective order, the system won’t enter the desired state. In order not to affect current system running, when performing the import configuration and restore the default configuration, need to reboot the router new configuration will take effect.
Page 26
SNMPv3 basic settings: 5.6.2 SnmpTrap Setting Page Wizard:Administrator → SNMP→ SnmpTrap The meanings of key items in the page are shown in the table below.. Key Items Description SNMP Version Choose the SNMP version, support v1/v2/v3 Contact Information Fill contact information...
Local Information Fill local information Access Limit Choose access limit Username Fill username Group name Choose the groupname which user attend Destination IP Fill the IP of manage station Security Name Fill the security name UDP Port Fill the UDP port 5.7 Alarm Alarm function is a way which is provided for users to get exceptions of device, which can make the users find and solve exceptions as soon as possible.
Page 28
5.7.1 Alarm Status Page Wizard:Administrator → Alarm→ Alarm Status Check and manage the alarm status: 5.7.2 Alarm Input Page Wizard:Administrator → Alarm→ Alarm Input Set the alarm input:...
Page 29
5.7.3 Alarm Output Page Wizard:Administrator → Alarm→ Alarm Output Set the alarm output: 5.7.4 Alarm Map Page Wizard:Administrator → Alarm→ Alarm Map Set the alarm map:...
The meanings of key items in the page are shown in the table below.. Key Items Description Level The alarm level Date It is the time when the alarm created System Time It is a period of time from system restart to the alarm created. Warm Start Open/close warm start Cold Start...
5.8.2 System Log Setting Page Wizard:Administrator → Log →System Log System Log Setting: The meanings of key items in the page are shown in the table below. Key Items Description Log to Remote System Open/close remote log function Set remote server’s IP address/Port IP Address/ Port(UDP) 5.9 System Upgrading Page Wizard: AdministrationUpgrade...
Layer 2 Switch This chapter mainly includes the following parts: Port RSTP Port Security 802.1x Mac Address 6.1 Port 6.1.1 Port Status Page Wizard: Layer 2 SwitchPort Port Status Port Status display: 6.1.2 Ethernet Port Statistics Page Wizard: Layer 2 Switch Port Port Statistics Port statistics display: 6.1.3 Clear Port Statistics...
6.1.6 Port Mirroring Port mirroring is used on a network switch to send a copy of network packets seen on one switch port (or an entire VLAN) to a network monitoring connection on another switch port. Network engineers or administrators use port mirroring to analyze and debug data or diagnose errors on a network.
The meanings of key items in the page are shown in the table below.: Key items Description Bridge Priority Configure RSTP priority, the range is 0~61440,default value is 32768 Hello Time Configure the interval sending BPDU packet, the range is from 1 to 10. Max Age Configure the max lifetime of RSTP BPDU, the range is form 6 to 40s...
Page 38
6.3.2 Configure Port Security Click the row to configure security feature on the port. For example, we’ll enable port security on FE1/1 and configure the number of Max Secure Mac is 1, Secure MAC address is 0000.0000.0001, then the port only forward ingress traffic that has source addresses 0000.0000.0001. Here is the configuration page: The meaning of key items is as shown as following Key Items...
6.4.2 Configure 802.1x The meaning of key items is as shown as following Key Items Description Disable Disable 802.1x authentication Auto Enable 802.1x authentication 6.5 Mac Address MAC Address list features: Check the learning MAC address Delete unicast MAC table items ...
Page 40
6.5.1 Configure static MAC address Page Wizard: Layer2 Switch MAC Address TablesConfigure static MAC 6.5.2 Configure dynamic MAC address Page Wizard: Layer2 Switch MAC Address TablesConfigure dynamic MAC The meaning of key item is as shown in the following table Key Items Description Dynamic MAC Address...
Page 41
Port Input the MAC address corresponding port Priority Input the MAC address corresponding priority Clear MAC Address ON Choose the MAC address range which will be cleared/ Aging Time Input the aging time of MAC address...
Network This chapter mainly includes the following parts: VLAN Cellular LoopBack DHCP DNS DDNS 7.1 VLAN VLAN introduction Virtual Local Area Network, Virtual LAN or VLAN is a concept of portioning a physical network, so that distinct broadcast domains are created.
Page 43
7.1.2 Configure VLAN Parameters Page Wizard: Network VLANConfigure VLAN Parameters By default, all LAN IP addresses are belong VLAN 1. Click Add to create a new VLAN, and configure the VLAN ID, Primary IP, etc After Apply & Save the page shows current VLAN in router. The meanings of key items in the page are shown in the table below..
Trunk: when it is trunk mode, port can have untagged and tagged attribute, that means the port is permitted to belong to multiple VLANs Native VLAN The default VLAN that port belong to VLAN Member Ports Choose the role of member, it can be none (isn’t member), tagged (tagged member), untagged (untagged member) 7.2 Cellular Port...
Page 45
The meaning of key items is as shown in the table: Key Items Desription Enable Enable PPP dialup Profile Choose the dial up profile Roaming Enable/disenable roaming PIN Code Cell phone pin code Network Type Choose mobile network type Static IP Enable Static IP if your SIM card can get...
static IP address Connection Mode Optional Always Online, Redial Interval When Dial fails, InRouter will redial after the interval APN parameters provided by Local ISP, you can set TWO different group of dialup parameters (APN/Username/Password) and set one as backup Access Number Dialup parameters provided by Local Username...
7.4 DHCP Service DHCP: Dynamic Host Configuration Protocol (DHCP) is a network protocol of LAN. It uses UDP protocol and mainly two purposes: to automatically assign an IP address to the internal network or network service provider; a means for user or internal network administrator to conduct central management for all computers.
7.4.3 DHCP relay Page Wizard: Network →DHCP service →DHCP relay DHCP relay configuration The meanings of key Items are shown in the table below. Key Items Description DNS server Set the domain name server Windows Name Server Set WINDOWS name server (WINS) DHCP server (1-4) Set DHCP server;...
Configuration of domain name server 7.5.2 DNS forwarding Page Wizard: Network →DNS →DNS Relay Configuration of DNS Relay 7.6 DDNS DDNS is the abbreviation of Dynamic Domain Name Server. DDNS maps user's dynamic IP address to a fixed DNS service. When the user connects to the network, the client program will pass the host’s dynamic IP address to the server program on the service provider’s host through information passing.
Page 50
Dynamic Domain Name The meanings of key items in the page are shown in the table below. Key Items Description Method Name Designate / denominate a name User Name User name assigned in the application for domain name Password Password assigned in the application for domain name Host Name Applied domain name...
Basic principles of InHand SLA: 1.Object track: Track the reachability of the specified object. 2. SLA probe: The object track function can use InHand SLA to send different types of detections to the object. 3. Policy-based routing using route mapping table: It associates the track results with the routing process.
SLA Status Display 8.1.2 SLA Page Wizard: Link Backup → SLA SLA setting The meanings of key items in the page are shown in the table below. Key Items Description It is abbreviation of Service-Level Agreement. Type Detection type Identification Index or ID of SLA IP address Detected IP address...
8.2.2 Track Module Track setting The meanings of key items in the page are shown in the table below. Key Items Description Track Track Identification Index or ID of Track Abnormal status delay In case of abnormal status, switching can be delayed based on the set time (0 represents immediate switching), rather than immediate switching.
Page 54
Default route provides convenience for user’s configuration operations but also imposes high requirements on stability of the default gateway device. Increasing exit gateway is a common method for improving system reliability. Then, the problem to be solved is how to select route among multiple exits.
Page 55
• 1 router will be selected from the set of routers based on priority to undertake the gateway function. Other routers will be used as backup routers to perform the duties of gateway for the gateway router in case of fault of gateway router, thus to guarantee uninterrupted communication between the host and external network.
Key Items Description Notification interval Heartbeat package transmission time interval between routers in the virtual ip group Priority The VRRP priority range is 0-255 (a larger number indicates a higher priority). The router with higher priority will be more likely to become the gateway router.
Page 57
The meanings of key items in the page are shown in the table below. Key Items Description Primary interface The interface being used Backup interface Interface to be switched Start-up delay Set how long to wait for the start-up tracking detection policy to take effect Up Delay When the primary interface switches from failed detection to successful detection, switching can be delayed based on the set time...
Routing This chapter mainly contains the following contents: Static Routing Dynamic Routing 9.1 Static Route Static routing is a special routing that requires your manual setting. After setting static routing, the package for the specified destination will be forwarded according to the path designated by you. In the network with relatively simple networking structure, it is required to set static routing to achieve network interworking.
Static routing setting The meanings of key items in the page are shown in the table below. Key Items Description Destination address Enter the destination IP address need to be reached Subnet Mask Enter the subnet mask of destination address need to be reached Interface Output interface Gateway...
Page 60
Routing status display 9.2.2 RIP Brief Introduction of RIP RIP (Routing Information Protocol) is a relatively simple interior gateway protocol (IGP), mainly used for smaller networks. The complex environments and large networks general do not use RIP. 9.2.2.1 Working Mechanism of RIP 1.
Page 61
3. Timers Used by RIP It is specified in RFC1058 RIP that RIP is controlled by three timers, i.e. Period update, Timeout and Garbage-Collection: Period update timer defines the time interval between routing updates. Timeout timer defines the routing aging time. If a routing update package is not received within the aging time, the RoutingCost of the routing in the routing table will be set to 16.
Page 62
effective routing. 9.2.2.3 RIP Configuration Page Wizard: Routing →Dynamic Routing →RIP RIP Setting The meanings of key items in the page are shown in the table below. Key Items Description Neighbor For neighboring routers, after configuring neighbors, rip package will only be sent to neighboring routers Update timer It defines the interval to send routing updates Timeout timer...
Page 63
Open Shortest Path First (OSPF) is a link status based interior gateway protocol developed by IETF. The current version is version 2 (RFC2328) and its characteristics are as follows: Wide scope of application – It supports networks of all sizes and can support up to hundreds of routers.
Page 64
relations between routers, to let any router’s routing changes will result in multiple transmissions, which is not only unnecessary, but also wastes the precious bandwidth resources. To solve this problem, OSPF protocol defines the "designated router" (DR) and “backup designated router” (BDR). OSPF protocol supports interface-based package authentication to ensure the safety of routing calculation;...
Page 65
the other end are required by local LSDB. Then, it is required to send LSR packet to request to the opposite for the required LSAs. The contents include the summary of the required LSA. Link State Update Packet (LSU Packet): It is used to send the required LSA to the router at the other end.
Page 66
ID originating from the router of this LSA. Dead timer Dead Time. If no Hello packet is received from the neighbors, the neighbor is considered failed. If dead times of two adjacent routers are different, the neighbor relationship can not be established.
Firewall This chapter mainly contains the following contents: Access Control NAT Brief Introduction of ACL With the expansion of network and increase in flow, the control over network safety and the allocation of bandwidth become the important contents of network management. The access to network by illegal users can be effectively prevented through filtering data package.
Key Items Description Standard Standard ACL can block all communication flows from a network, or allow all communication flows from a particular network, or deny all communication flows of a protocol stack (e.g. IP) of. Extended The extended ACL provides a wider range of control than that provided by the standard ACL.
Page 69
NAT setting The meanings of key items in the page are shown in the table below. Key Items Description Source address translation: is to convert the source address of ip data SNAT package into another address. Destination address translation: is to map a set of local internal DNAT addresses to a set of global addresses.
This chapter mainly contains the following contents: Layer 2 QOS Flow Control 11.1 Layer 2 QOS QoS (i.e. Quality of Service) can ensure the reception of high priority data frame, and accelerate the transmission of high priority data frame, thus to ensure that critical business will not be affected by network congestion.
Page 71
DSCP--- Queue Mapping Setting 11.1.3 Configuration Port QOS Page Wizard: QOS → Layer 2 QOS → Configuration Port QOS Configuration Port QOS The meanings of key items in the page are shown in the table below. Key Items Description Queue Service levels, range <0-3>, the greater the value is, the higher the service level will be Policy...
forwarding) Priority Default priority of port. Range <0-7>. When the data frame does not have Tag priority or IP priority, the default priority of port will be used as the Tag priority when the frame forwards. 11.2 Flow Control While bringing convenience to users, some applications also take up a lot of network bandwidth. The total bandwidth of network is limited.
This chapter mainly contains the following contents: IPSec L2TP Certificate Management VPN is a new technology that rapidly developed in recent years with the extensive application of Internet. It is for building a private dedicated network on a public network. 'Virtuality" mainly refers to that the network is a logical network.
Page 74
ESP is a packet security encapsulating protocol with the protocol number of 50. Different from AH protocol, ESP encrypts the user data required to be protected and then encapsulates it into IP packets, in order to guarantee the confidentiality of data. Common encryption algorithms include DES, 3DES, AES, etc.
Page 75
Authentication Description Algorithm MD5 generates 128bit message digest through the input of message of arbitrary length. Compared with SHA-1: it has fast calculating speed, but the security strength is slightly lower. SHA-1 generates 160bit message digest through the 64 power bit message SHA-1 with the input length of less than 2.
Page 76
The manual configuration is relatively complicated. All the information required for creating SA must be manually configured. However, some advanced features are not supported (e.g. regular updating key), but the advantage is that it may not rely on IKE to independently achieve the function of IPSec.
Page 78
IPsec Phase 2 setting 12.1.3.4 IPsec configuration Page Wizard: VPN →IPsec →IPsec setting IPsec configuration The meanings of key items in the page are shown in the table below. Key Items Description Internet Key Exchange Protocol Main Mode An IKE exchange method; the main mode should be used in the occasions with higher requirements on Identity Protection.
Tunnel mode A protocol encapsulation mode. The entire IP data package of user is used to calculate the AH or ESP header. AH or ESP header and ESP encrypted user data are encapsulated in a new IP data package. Typically, the tunnel mode is applied in the communication between two security gateways.
Page 80
After processing by GRE module, the original IP header has been encapsulated behind the new IP header and GRE header. The protocol number of IP header of the new IP data package is 47. The new IP data package can be considered as the encapsulation structure as follows 12.2.3 Encapsulation Process ...
Page 81
12.2.4 GRE Configuration Page Wizard: VPN → GRE GRE configuration 1 Click the Add button and the following setting interface will appear GRE configuration 2 The meanings of key items in the page are shown in the table below. Key Items Description Name Set GRE tunnel name...
Page 82
Set the key of tunnel NHRP Next Hop Resolution Protocol...
Page 83
12.3 L2TP 12.3.1 Brief Introduction of L2TP L2TP-Layer Two Tunneling Protocol The data has no encryption mechanism and the data security can be ensured through IPSEC. It is different from layer 3 VPN (IPSec \ GRE) that L2TP is to encapsulate the private data from the user network from the layer 2 PPP header, while layer 3 VPN is to encapsulate the private data from the user network from the layer 3 IP header.
Page 84
Upon receipt of packet by LAC, if it is found to be sent to LNS, it will be forwarded to LNS after adding L2TP encapsulation. In case the received packet is found to be L2TP packet by LNS, the packet will be processed by appropriate processes in accordance with the Tunnel ID and Session ID in L2TP packet header.
The meanings of key items in the page are shown in the table below. Key Items Description User Name Set server user name Password Set server password Local IP address Set local IP address Remote IP address Set remote IP address 12.4 Certificate Management Page Wizard: VPN →...
The meanings of key items in the page are shown in the table below. Key Items Description Certificate protection key Set certificate protection key Confirmation of certificate Confirmation of certificate protection key protection key 12.5 DMVPN 12.5.1 Technical Principle of DMVPN Background Information Many companies want to connect their offices and branches at various places with their headquarters through the public network in a safe way, and connect the offices and branches.
Page 87
routing protocols, e.g. OSPF or EIGRP, etc. When the center router loses efficacy, a backup router can be used to replace the center router to manage the routing between branches. There maybe a fundamental problem between the IPSec tunnel and dynamic routing protocol, i.e. the dynamic routing protocol relies on multicast or broadcast packet to provide routing reachability notice, while IPSec tunnel does not support multicast or broadcast packet for encryption.
Page 88
to maintain a network with full mesh structure even though some branches do not need to conduct direct communication through IPSec VPN. Since each router maintains tunnel connectivity with all other routers, it can not be achieved on small routers, so it is required to use more powerful routers on smaller branches.
Page 89
this new routing and the new branch routers can also learn the routing information to reach all other routers. 2.3 Dynamic Tunnel Establishment of Spoke−to−Spoke In DMVPN network, the Spoke−to−Hub tunnel, once established, will persist, while it is not required to directly configure a continuous tunnel between branches. When a branch wants to transmit data package to another branch, it will use NHRP to dynamically acquire the IP address of destination branch.
Page 90
port instead of the address of other branch router’s tunnel port. Thus, the data transmission between branches will still pass through the center router. To solve this problem, it is required to set on the center router. When a branch subnet’s reachable routing is announced on the port of mGRE tunnel, the "next hop"...
Page 92
Note: When you use DMVPN, it is not required to define encryption map. Please keep the name of IPSec Profile in mind, which will also be used in the GRE tunnel. Next, we will begin to set the GRE tunnel.
Page 93
12.5.3.4 GRE and NHRP Configuration Page Wizard: VPN → GRE GRE Configuration 12.5.3.5 NHRP Configuration Page Wizard: VPN → GRE NHRP Configuration...
Tools Tools include three parts, i.e. PING detection, routing detection and internet speed testing. PING Detection Routing Detection Internet Speed Testing 13.1 PING detection Page Wizard: Tools → PING detection PING detection setting The meanings of key items in the page are shown in the table below. Key Items Description Host...
13.3 Internet Speed Testing Page Wizard: Tools → Internet Speed Testing Internet Speed Testing Setting The meanings of key items in the page are shown in the table below. Key Items Description Function: It is used to detect the internet speed. The internet speed can be tested through uploading and downloading files.
Typical Networking Configuration Examples Environment: 1:R1: possession of a fixed public IP address: HUB 2:R2/R3/R4: dial-up, dynamically obtain the public network IP address: SPOKE Requirements: 1: R2/R3/R4 and HUB establish DMVPN, making intranets can exchange visits. Knowledge points involved: Configuration / IPSec VPN of GRE tunnel / NHRP / dynamic routing. Steps: 1: Configuring IPSec VPN 2: Configuring Tunnel GRE...
Page 99
==>R2/R3/R4 Configuring: crypto isakmp policy 10 hash md5 authentication pre-share group 2 crypto isakmp key inhand address 0.0.0.0 0.0.0.0 crypto ipsec transform-set TS esp-des esp-md5-hmac crypto ipsec profile POLICY set transform-set TS int tun 0 tunnel prote ipsec pro POLICY...
Page 100
SPOKE Configuring: interface Tunnel0 ip address 192.168.77.2 255.255.255.0 tunnel source cellular 1 tunnel mode gre multipoint tunnel key 123 3: Configuring NHRP (next-hop routing protocol) HUB Configuring: ip nhrp network-id 10 SPOKE Configuring: interface Tunnel0 ip nhrp map 192.168.77.1 203.86.63.234 ip nhrp network-id 10 ip nhrp nhs 192.168.77.1 4: Configuration of dynamic routing protocol:...
Appendix - Setting of Command Line You can locally log in to the router through the console port or Telnet in the LAN to set command line. Local login through the Console port: If is required to first set up a configuration environment, Port”...
15.1 Set up Configuration Environment through the Console Port 1. Connect the supervisory computer to the router Connect the serial ports of supervisory computer through configuring the Console port between the cable and router. 2. Configure parameters of supervisory computer The operating steps are as follows (taking Windows XP system as an example):...
15.2 Online Help of Command Line (1) In any view, enter <?> to obtain all the commands in this view and their brief descriptions. (2) Enter a command, followed by "?" separated by a space. If there is a keyword at the location of this command line, list all the keywords and their brief descriptions.
15.3 Command Line Operation 15.3.1 Modify Router Login Password Enter the password command and press Enter. Enter a new password according to the system prompts. In default, the router login password is 123456. The password length is 1 to 31 characters (case sensitive). 15.3.2 View the IP address of Router’s VLAN Interface Enter the show interface vlan command and press Enter to display the IP address of router’s VLAN interface.
Page 106
15.3.4 Reboot the Router Enter the reboot command and press Enter. After confirmation, the router will reboot. 15.3.5 Display the Version Information of Router Software Enter the show version command and press Enter. 15.3.6 Display the Router’s Current Configuration Information Enter the show running-config command and press Enter.
Appendix - Troubleshooting This manual only simply describes the troubleshooting methods for the router. If the methods fail, you can access to after-sales service in Table 16-2. Table 16-1 Troubleshooting Common problems Solutions Power light is not on (1) Please check whether the power line is connected correctly (2) Please check if the power line is plugged tightly and not loose...
Page 108
of router’s WAN port are loose (2) Check if the router has conducted ARP binding for all hosts in the (3) Log in the router's Web setting page, check the access control list, check whether an IP address segment that is not allowed to access the external network is configured...
Page 109
Table 16-2 Access to After-sales Service Type of Fault Description How to access to after-sales service Hardware fault For example: the device Please contact InHand technical can not be normally support service hotline: 010-64391099 energized, the network Getting Help cable is not connected,...
Appendix - Default Settings Table 17-1 lists some important default settings of router for your reference. Table 17-1 Default Settings of Router Options Default settings Management IP address of Vlan IP address: 192.168.2.1 1 interface Subnet Mask: 255.255.255.0 User management User: adm Password: 123456 Layer...
Appendix - Glossary of Terms Table 18-1 Glossary of Terms Abbreviation Full English Name Meaning 100Base-TX 100Base-TX 100Mbit / s baseband Ethernet specification uses two pairs of category 5 twisted-pair connection, which can provide the maximum transmission rate of 100Mbit / s 10Base-T 10Base-T 10Mbit / s baseband Ethernet specification uses two pairs of...
Page 112
Network Network Address Translation convert multiple Address computers within the LAN through NAT to share one or Translation more public network IP addresses and access to the Internet. This way can not only shield LAN users, but also has the effect of network security.
Page 113
Local Area Local Area Network generally refers to the internal network, Network e.g. home network, internal network of small and medium-sized enterprises, etc.
Need help?
Do you have a question about the IR720 series and is the answer not in the manual?
Questions and answers