Teltonika RUT850 User Manual
Hide thumbs Also See for RUT850:
Table of Contents

Advertisement

USER MANUAL
RUT850 LTE Router
1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the RUT850 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Teltonika RUT850

  • Page 1 USER MANUAL RUT850 LTE Router...
  • Page 2: Legal Notice

    Copyright © 2015 TELTONIKA Ltd. All rights reserved. Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the prior written permission of TELTONIKA Ltd is prohibited. The manufacturer reserves the right to modify the product and manual for the purpose of technical improvement without prior notice.
  • Page 3: Table Of Contents

    Table of Contents Legal notice ................................2 Attention.................................. 2 SAFETY INFORMATION ............................6 Device connection ............................... 7 Introduction ..............................8 Specifications ..............................8 Wi-Fi ................................8 Hardware ..............................8 Electrical, Mechanical & Environmental ....................8 Setting up your router ........................... 9 Installation ..............................
  • Page 4 6.10.2 System Events ..........................30 6.10.3 Network Events ..........................31 Network ............................... 32 Mobile ..............................32 7.1.1 General ............................. 32 7.1.2 Network Operators .......................... 34 7.1.3 Mobile Data Limit..........................35 WAN ................................. 36 7.2.1 Operation Mode ..........................36 7.2.2 Common configuration ........................36 LAN ................................
  • Page 5 8.5.3 Scheduled Messages ........................77 8.5.4 Auto Reply Configuration ......................... 77 8.5.5 SMS Forwarding ..........................78 Hotspot ..............................80 8.6.1 General settings ..........................81 8.6.2 Internet Access Restriction Settings ....................83 8.6.3 Logging ............................. 84 8.6.4 Landing Page ............................ 85 8.6.5 Radius server configuration ......................
  • Page 6: Safety Information

    SAFETY INFORMATION In this document you will be introduced on how to use a RUT850 router safely. We suggest you to adhere to the following recommendations in order to avoid personal injuries and or property damage. You have to be familiar with the safety requirements before using the device! To avoid burning and voltage caused traumas, of the personnel working with the device, please follow these safety requirements.
  • Page 7: Device Connection

    Device connection...
  • Page 8: Introduction

    Thank you for purchasing a RUT850 LTE router! RUT850 is compact mobile router with high speed wireless connections. This router is ideal for people who‘d like to share their internet on the go, as it is not restricted by a cumbersome cable connection.
  • Page 9: Setting Up Your Router

    Setting up your router 3.1 Installation After you unpack the box, follow the steps, documented below, in order to properly connect the device. For better Wi-Fi performance, put the device in clearly visible spot, as obstacles such as walls and door hinder the signal. 1.
  • Page 10: Hardware Installation

    2. Attach LTE antennas. 3. Connect the power adapter to the socket on the front panel of the device. Then plug the other end of the power adapter into power source. 4. Connect to the device wirelessly (SSID: rut850). 3.1.4 Product installation Mounting kit consist of 4 screws and double-side adhevise tape.
  • Page 11: Logging In

    Search wireless networks with your device. A list should pop up with all available wireless networks. Select “rut850” and click connect. Then we launch our favorite browser and enter the routers IP into the address field: Press enter.
  • Page 12: Operation Modes

    Operation Modes The RUT850 router supports various operation modes. It can be connected to the internet (WAN) via mobile or via a wireless network. When connecting to the internet, you may also backup your main WAN connection with backup connection. Any interface can act like backup if configured so. At first router uses its main WAN connection, if it is lost, then router tries to connect via backup.
  • Page 13: Status

    Status The status section contains various information, like current IP addresses of various network interfaces; the state of the routers memory; firmware version; DHCP leases; associated wireless stations; graphs indicating load, traffic, etc.; and much more. 6.1 Overview Overview section contains various information summaries.
  • Page 14: System Information

    Name of the router (hostname of the routers system). Can be changed in System -> Administration. 2. Host name Teltonika-RUT850.com Indicates how router will be seen by other devices on the network. Can be changed in System -> Administration. 3. Router Model Teltonika RUT850 LTE Routers model.
  • Page 15: Network Information

    resource. 9. Temperature 33° C Device’s temperature Memory explanation: Field Name Sample Value Explanation 1. Free 26216 kB / 61600 kB (42%) The amount of memory that is completely free. Should this rapidly decrease or get close to 0, it would indicate that the router is running out of memory, which could cause crashes and unexpected reboots.
  • Page 16 Mobile information: Field Name Sample Value Explanation Data connection Connected Mobile data connection status state IMEI 868323023148429 Modem's IMEI (International Mobile Equipment Identity) number IMSI 246012101426458 IMSI (International Mobile Subscriber Identity) is used to identify the user in a cellular network ICCID 8937001010001426458 Integrated Circuit Card ID...
  • Page 17 WAN information: Field Name Sample Value Explanation Interface Mobile Specifies through what medium the router is connecting to the internet. This can either be Wired, Mobile or Wi-Fi. Type Specifies the type of connection. This can Static, DHCP, Qmi and etc. IP address 10.136.137.58 The IP address that the routers uses to connect the internet.
  • Page 18 2. Country code 00 (World) Country code. 3. SSID Teltonika The SSID that the AP, to which the routers is connected to, uses. 4. Mode Station (STA) Connection mode – Client indicates that the router is a client to some local AP.
  • Page 19 Wireless AP information Field Name Sample Value Explanation 1. Channel 11 (2.46 GHz) The channel which is used to broadcast the SSID and to establish new connections to devices. 2. Country code 00(World) Country code. 3. SSID Teltonika_Router_Test The SSID that is being broadcast. Other devices will see this and will be able to use to connect to your wireless network.
  • Page 20 6.3.1.6 Access Display information about local and remote active connections status. Field Name Sample Value Explanation 1. Type SSH; HTTP; HTTPS Type of connection protocol 2. Status Disabled/Enabled Connection status 3. Port 22; 80; 443 Connection port used 4. Active 0(0.00B);1(9.26 KB);...
  • Page 21: Device Information

    6.3.1.6.1 Last Connections Displays information about local and remote last 3 connections status Field Name Sample Value Explanation 1. Type SSH; HTTP; HTTPS Type of connection protocol 2. Date 2016-03-03, 13:40:59 Date and time of connection 3. IP 192.168.2.10 IP address from which the connection was made 4.
  • Page 22: Services

    Field Name Sample Value Explanation Serial number 12345678 Serial number of the device Product code RUT85000S1S0 Product code of the device Batch number 0001 Batch number used during device’s manufacturing process Hardware revision 0009 Hardware revision of the device IMEI 860461024164561 Identification number of the internal modem IMSI...
  • Page 23: Active Ip-Routes

    Field Name Sample Value Explanation 1. IP Address 192.168.99.17 Recently cashed IP addresses of every immediate device that was communicating with the router 2. MAC Address 00:25:22:D7:CA:A7 Recently cached MAC addresses of every immediate device that was communicating with the router 3.
  • Page 24: Realtime Load

    Field Name Sample Value Explanation 1. Connection type 4G (LTE) Type of mobile connection used 2. Signal -58 dBm Current signal strength value 3. Average -58.0 dBm Average signal strength value 4. Peak -58 dBm Peak signal strength value 6.7.2 Realtime Load This tri-graph illustrates average CPU load values in real time.
  • Page 25: Realtime Traffic

    Field Name Sample Value Explanation 1. 1/5/15 Minutes 0.83 Time interval for load averaging, colour of the diagram Load 2. Average 0.86 Average CPU load value over time interval (1/5/15 Minute) 3. Peak 1.50 Peak CPU load value of the time interval 6.7.3 Realtime Traffic This graph illustrates average system inbound and outbound traffic over the course of ~3 minutes;...
  • Page 26: Realtime Wireless

    6.7.4 Realtime Wireless Display the wireless radio signal, signal noise and theoretical maximum channel permeability. Average and peak signal levels are displayed.
  • Page 27: Realtime Connections

    6.7.5 Realtime Connections Displays currently active network connections with the information about network, protocol, source and destination addresses, transfer speed.
  • Page 28: Mobile Traffic

    6.8 Mobile Traffic Displays mobile connection data sent and received in KB of this day, week, Month. By default mobile traffic usage logging is disabled. To use this functionality is needed to enable it. Field Name Sample Value Explanation 1. Enable Enable/Disable Make a functionality active/inactive 2.
  • Page 29: Speed Test

    6.9 Speed Test Speed test is a tool for measuring your internet connection upload and download speeds. You can select servers for manual testing, or use auto test.
  • Page 30: Events Log

    6.10 Events Log Event log displays such actions as: login, reboot, firmware flashing and reset. 6.10.1 All Events Display all router events, their types and time of occurrence. 6.10.2 System Events Display all system events, their type and time of occurrence. Events include authentication or reboot requests, incoming and outgoing SMS and calls, Mails, Configuration changes, DHCP events.
  • Page 31: Network Events

    6.10.3 Network Events Display information about recent network events like connection status change, lease status change, network type or operator change.
  • Page 32: Network

    Network 7.1 Mobile 7.1.1 General 7.1.1.1 Mobile configuration Here you can configure mobile settings which are used when connecting to your local 3G/LTE network. Field Name Sample value Explanation Connection PPP / QMI PPP mode uses dialling number to establish data connection. type QMI mode (default) does not use dialling and PPP protocol to establish data connection it is usually faster than PPP mode.
  • Page 33 authentication method (i.e. authentication method is not “none”). These fields are always enabled on the alternate model. Service mode 2G only, 3G only, 4G Your network preference. If your local mobile network supports 2G, (LTE) only or automatic. 3G and 4G (LTE) you can specify to which network you wish to connect.
  • Page 34: Network Operators

    7.1.2 Network Operators 7.1.2.1 Network Operators This function lets you Scan, Select and enter manual Network Operator to which router should connect. Function will provide great utility when router is in Roaming conditions. Field Name Sample Value Explanation Current operator LT BITE GSM Operator's name of the connected GSM network Note:...
  • Page 35: Mobile Data Limit

    Period for which mobile data limiting should apply 4. Start day/ Start hour A starting time for mobile data limiting period * Your carrier's data usage accounting may differ. Teltonika is not liable should any accounting discrepancies occur. 7.1.3.2 SMS Warning Configuration...
  • Page 36: Wan

    +37012345678 A phone number to send warning SMS message to, e.g. +37012345678 * Your carrier's data usage accounting may differ. Teltonika is not liable should any accounting discrepancies occur. 7.2 WAN 7.2.1 Operation Mode Your WAN configuration determines how the router will be connecting to the internet.
  • Page 37 You can switch between the Static or DHCP protocol by selecting the protocol that you want to use and then pressing Switch Protocol. 7.2.2.1 General Setup 7.2.2.1.1 Static: This is the configuration setup for when you select the static protocol. Filed name Sample Explanation...
  • Page 38 7.2.2.1.2 DHCP: When you select the DHCP protocol you can use it as is, because most networks will not require any additional advanced configuration. 7.2.2.2 Advanced These are the advanced settings for each of the protocols, if you are unsure of how to alter these attributes it is highly recommended to leave them to a trained professional: 7.2.2.2.1 Static Field name...
  • Page 39 7.2.2.2.2 DHCP Field name Sample value Explanation 1. Disable NAT Enable/Disable If checked, router will not perform NAT (masquerade) on this interface Use broadcast flag Enable/Disable Required for certain ISPs, e.g. Charter with DOCSIS 3 3. Use default gateway Enable/Disable If unchecked, no default route is configured 4.
  • Page 40 As you can see, the configuration is very similar to the static protocol; only in the example a 99th subnet is defined. Now if some device has an IP in the 99 subnet (192.168.99.xxx) and the subnets gateway metric is “higher” and the device is trying to reach the internet it will reroute it’s traffic not to the gateway that is defined in common configurations but through the one that is specified in IP aliases.
  • Page 41 primary connection. When the connections state starts to change (READY->NOT READY and vice versa) a necessary amount of failed or passed health checks has to be reached before the state changes completely. This delay is instituted so as to mitigate “spikes” in connection availability, but it also extends the time before the backup link can be brought up or down.
  • Page 42: Lan

    7.3 LAN This page is used to configure the LAN network, where all your devices and computers that you connect to the router will reside. 7.3.1 Configuration 7.3.1.1 General Setup Field name Sample value Explanation 1. IP address 192.168.1.1 Address that the router uses on the LAN network IP netmask 255.255.255.0 A mask used to define how large the LAN network is...
  • Page 43 7.3.2.1 General Setup Field Name Sample value Explanation 1. DHCP Enable / Disable/ Manage DHCP server DHCP Relay 2. Start The starting address of the range that the DHCP server can use to give out to devices. E.g.: if your LAN IP is 192.168.2.1 and your subnet mask is 255.255.255.0 that means that in your network a valid IP address has to be in the range of [192.168.2.1 –...
  • Page 44 7.3.2.2 Advanced settings You can also define some advanced options that specify how the DHCP server will operate on your LAN network. Field Name Sample Value Explanation 1. Dynamic DHCP Checked/Unchecked Dynamically allocate client addresses, if set to only clients present in the ethers files are served...
  • Page 45 7.3.2.4 IP Aliases 7.3.2.4.1 General Setup IP aliases are the way of defining or reaching a subnet that works in the same space as the regular network. 7.3.2.4.2 Advanced Settings You may also optionally define a broadcast address and a custom DNS server.
  • Page 46: Wireless

    7.4 Wireless On this page you can configure your wireless settings. Depending on whether your WAN mode is set to Wi-Fi or not, the page will display either the options for configuring an Access Point or options for configuring a connection to some local access point.
  • Page 47 7.4.1.1 Device 7.4.1.1.1 Advanced Settings Here you can configure more advanced parameters: Field name Sample value Explanation 1. Mode Auto, b, g, g+n Different modes provide different throughput and security options. 2. HT mode 20 MHz/40 Mhz 2nd HT(High Throughput) mode. 40 MHz bandwidth provides channel above better perfomance 3.
  • Page 48 7.4.1.3 Client RUT850 can work as a Wi-Fi client. Client mode is nearly identical to AP, except for the fact that most for the options are dictated by the wireless access point that the router is connecting to. Changing them can result in an...
  • Page 49: Firewall

    In addition to standard options you can also click the Scan button to rescan the surrounding area and attempt to connect to a new wireless access point. 7.5 Firewall In this section we will look over the various firewall features that come with RUT9. 7.5.1 General Settings The routers firewall is a standard Linux iptables package, which uses routing chains and policies to facilitate control over inbound and outbound traffic.
  • Page 50: Dmz

    Accept – Packet gets to continue down the next chain. Drop – Packet is stopped and deleted. Reject – Packet is stopped, deleted and, differently from Drop, an ICMP packet containing a message of rejection is sent to the source of the dropped packet. 7.5.2 DMZ By enabling DMZ for a specific internal host (for e.g.: your computer), you will expose that host and its services to the routers WAN network (i.e.
  • Page 51 You can use port forwarding to set up servers and services on local LAN machines. The above picture shows how you can set up a rule that would allow a website that is being hosted on 192.168.1.109, to be reached from the outside by entering http://routersExternalIp:12345/.
  • Page 52: Traffic Rules

    Source zone LAN/WAN Match incoming traffic from this zone only Source MAC address Match incoming traffic from these MACs only Source IP address Match incoming traffic from this IP or range only Source port Match incoming traffic originating from the given source port or port range on the client host only External IP address Match incoming traffic directed at the given IP...
  • Page 53 Destination Redirect matched traffic to the given IP address and destination port Action Action to be taken for the packet if it matches the rule Enable Self-explanatory. Uncheck to make the rule inactive. The rule will not be deleted, but it also will not be loaded into the firewall.
  • Page 54 address Source address Match incoming traffic from this IP or range only Source port Match incoming traffic originating from the given source port or port range on the client host only Destination zone Device/Any zone/LAN/WAN Match forwarded traffic to the given destination zone only 10.
  • Page 55 7.5.4.3 Source NAT Source NAT is a specific form of masquerading which allows fine grained control over the source IP used for outgoing traffic, for example to map multiple WAN addresses to internal subnets. Field Name Sample value Explanation 1. Name SNAT Used to make rule management easier 2.
  • Page 56 Field Name Sample value Explanation Name SNAT Used to make rule management easier Protocol Protocol of the packet that is being matched against protocols/TCP+UDP/TCP/UD traffic rules. P/ICMP/custom Source zone LAN/WAN Match incoming traffic from this zone only Source MAC address Match incoming traffic from these MACs only Source address Match incoming traffic from this IP or range only...
  • Page 57: Custom Rules

    7.5.5 Custom Rules Here you have the ultimate freedom in defining your rules – you can enter them straight into the iptables program. Just type them out into the text field ant it will get executed as a Linux shell script. If you are unsure of how to use iptables, check out the internet for manuals, examples and explanations.
  • Page 58 Field Name Sample value Explanation Enable SYN flood protection Enable/Disable Makes router more resistant to SYN flood attacks. SYN flood rate “25” Set rate limit (packets/second) for SYN packets above which the traffic is considered a flood. SYN flood burst “50”...
  • Page 59 Field Name Sample value Explanation Enable SSH limit Enable/Disable Enable SSH connections limit in selected period Limit period Second/Minute/Hour/Day Select in what period limit SSH connections Limit “10” Maximum SSH connections during the period Limit burst “5” Indicating the maximum burst before the above limit kicks in.
  • Page 60: Port Scan Prevention

    7.5.6.5 HTTPS Attack Prevention Field Name Sample value Explanation Enable HTTPS limit Enable/Disable Limits HTTPS connections per period Limit period Second/Minute/Hour/Day Select in what period limit HTTPS connections Limit “10” Maximum HTTPS connections during the period Limit burst “10” Indicating the maximum burst 7.5.7 Port Scan Prevention 7.5.7.1 Port Scan Field Name...
  • Page 61: Routing

    7.5.7.2 Defending type Field Name Explanation SYN-FIN attack Protect from SYN-FIN attack SYN-RST attack Protect from SYN-RST attack X-Mas attack Protect from X-Mas attack FIN scan Protect from FIN scan NULLflags attack Protect from NULLflags attack 7.6 Routing 7.6.1 Static Routes Static routes specify over which interface and gateway a certain host or network can be reached.
  • Page 62 Field name Value Explanation 1. Routing table WAN/WAN2 Defines the table to use for the route 2. Interface WAN (Mobile)/WAN2 The zone where the target network resides (WiFi) 3. Destination address IP address The address of the destination network 4. Netmask IP mask Mask that is applied to the Target to determine to what actual IP addresses the routing rule applies...
  • Page 63: Services

    Services 8.1 Web filter 8.1.1 Site blocking Field name Sample Explanation 1. Enable Enable/Disable Enable host name based websites blocking 2. Mode Whitelist/Blacklist Whitelist - allow every site on the list and block everything else. Blacklist - block every site on the list and allow everything else. 3.
  • Page 64: Ntp

    Field name Sample Explanation 1. Enable Enable/Disable Enable proxy server based URL content blocking. Works with HTTP protocol only 2. Mode Whitelist/Blacklist Whitelist - allow every part of URL on the list and block everything else. Blacklist - block every part of URL on the list and allow everything else 3.
  • Page 65: Dynamic Dns

    8.3 Dynamic DNS Dynamic DNS (DDNS) is a domain name service allowing to link dynamic IP addresses to static hostname. To start using this feature firstly you should register to DDNS service provider (example list is given in description). You are provided with add/delete buttons to manage and use different DDNS configurations at the same time! You can configure many different DDNS Hostnames in the main DDNS Configuration section.
  • Page 66: Sms Utilities

    Password your_password Password of the user account. IP Source Public This option allows you to select specific RUT interface, and then send Private the IP address of that interface to DDNS server. So if, for example, Custom your RUT has Private IP (i.e. 10.140.56.57) on its WAN (3G interface), then you can send this exact IP to DDNS server by selecting "Private", or by selecting "Custom"...
  • Page 67 FW upgrade from server Config update from server Switch monitoring on/off Monitoring status You can choose your SMS Keyword (text to be sent) and authorized phone number in the main menu. You can edit each created rule by hitting Edit button. Field name Explanation Notes...
  • Page 68 SMS Reboot rule. Message text Which status information You can select which status elements to display. should be included in SMS: Data state, Operator, Connection type, Signal Strength, Connection State, IP Get status Enable Check this to receive Allows to get router‘s status via SMS. This is both connection status via SMS.
  • Page 69 SMS text SMS text which will turn mobile SMS text can contain letters, numbers, spaces and data ON/OFF. special symbols. Capital letters also matters. Authorization method What kind of authorization to No authorization, by serial or by router admin use for SIM management. password.
  • Page 70  Sender phone number must contain country code. You can check sender phone number format by reading the details of old SMS text massages you receiving usually. Field name Explanation Notes Web access Control Enable This check box will enable and Allows Web access control via SMS.
  • Page 71: Call Utilities

    Important Notes:  3G settings must be configured correctly. If SIM card has PIN number you must enter it at “Network” > “3G” settings. Otherwise SMS reboot function will not work.  Sender phone number must contain country code. You can check sender phone number format by reading the details of old SMS text massages you receiving usually.
  • Page 72: User Groups

    8.4.3 User Groups Give possibility to group phone numbers for SMS management purposes. You can then later use these groups in all related SMS functionalities. This option helps if there are several Users who should have same roles when managing router via SMS.
  • Page 73 8.4.4.2 Send SMS Field name Sample Explanation 1. Phone number +3701111111 Recipients phone number. Should be preceded with country code, i.e. “+370” 2. Message My text. Message text, special characters are allowed. 8.4.4.3 Storage With storage option you can choose for router NOT to delete SMS from SIM card. If this option is not used, router will automatically delete all incoming messages after they have been read.
  • Page 74: Statistics

    8.4.5 Statistics In statistics page you can review how much SMS was sent and received on both SIM card slots. You can also reset the counters. 8.5 SMS Gateway 8.5.1 Post/Get Configuration Post/Get Configuration allows you to perform actions by writing these requests URI after your device IP address. Field name Values Notes...
  • Page 75 1. View mobile /cgi-bin/sms_list?username=admin&password=admin01 messages list 2. Read mobile /cgi-bin/sms_read?username=admin&password=admin01&number=1 message 3. Send mobile /cgi-bin/sms_send?username=admin&password=admin01&number=0037060000001&text=testmessage messages 4. View mobile /cgi-bin/sms_total?username=admin&password=admin01 messages total 5. Delete mobile /cgi-bin/sms_delete?username=admin&password=admin01&number=1 message 8.5.1.2 Syntax of HTTP POST/GET string HTTP POST/GET string Explanation http://{IP_AD /cgi-bin/sms_read? Read message DRESS} username={your_user_name}&password={your_password}&number={MESSAG E_INDEX}...
  • Page 76: Email To Sms

    8.5.1.4 Possible responses after command execution Response Explanation 1. OK Command executed successfully 2. ERROR An error occurred while executing command 3. TIMEOUT No response from the module received 4. WRONG_NUMBER SMS receiver number format is incorrect or SMS index number is incorrect 5.
  • Page 77: Scheduled Messages

    everyone and a private or secret key known only to the recipient of the message. 7. Check mail every Minutes Mail checking period Hours Days 8.5.3 Scheduled Messages Scheduled messages allow to periodically sending mobile messages to specified number. 8.5.3.1 Scheduled Messages Configuration Field name Values Notes...
  • Page 78: Sms Forwarding

    Field name Values Notes 1. Enable Enable/Disable Enable auto reply to every received mobile message. 2. Don’t save received Enable/Disable If enabled, received messages are not going to be message saved 3. Mode Everyone / Specifies from which senders received messages are Listed numbers going to be replied.
  • Page 79 7. Extra data pair 2 Var2 – “go” If you want to transfer some extra information through HTTP query, enter variable name on the left field and its value on the right 8. Mode All messages/From listed numbers Specifies which senders messages to forward 8.5.5.2 SMS Forwarding to SMS This functionality allows forwarding mobile messages from specified senders to one or several recipients.
  • Page 80: Hotspot

    If enabled, original senders number will be added at the end of the forwarded message Subject “forwarded message” Text that will be inserted in email Subject field SMTP server mail.teltonika.lt Your SMTP server’s address SMTP server port Your SMTP server’s port number Secure connection Enable / Disable...
  • Page 81: General Settings

    8.6.1 General settings 8.6.1.1 Main settings Field name Explanation Enabled Check this flag to enable hotspot functionality on the router. AP IP Access Point IP address. This will be the address of the router on the hotspot network. The router will automatically create a network according to its own IP and the CIDR number that you specify after the slash.
  • Page 82 Radius server #2 The IP address of the second RADIUS server. Authentication port RADIUS server authentication port. Accounting port RADIUS server accounting port. Radius secret key The secret key is used for authentication with the RADIUS server UAM port Port to bind for authenticating clients UAM UI port UAM UI port UAM secret...
  • Page 83: Internet Access Restriction Settings

    8.6.1.2 Session settings Field name Explanation 1. Logout address IP address to instantly logout a client addressing it 2. Enable Enable address accessing without first authenticating 3. Address Domain name, IP address or network segment 4. Port Port number 5. Allow subdomains Enable/Disable subdomains 8.6.2 Internet Access Restriction Settings Allows disable internet access on specified day and hour of every week.
  • Page 84: Logging

    8.6.3 Logging 8.6.3.1 Configuration Field name Explanation 1. Enable Check this box if you want to enable wireless traffic logging. This feature will produce logs which contain data on what websites each client was visiting during the time he was connected to your hotspot.
  • Page 85: Landing Page

    Field name Explanation 1. Mode The mode of the schedule. Use “Fixed” if you want the uploading to be done on a specific time of the day. Use “Interval” if you want the uploading to be done at fixed interval. 2.
  • Page 86 Field name Explanation 1. Page title Will be seen as landing page title 2. Theme Landing page theme selection 3. Upload login page Allows to upload custom landing page theme 4. Login page file Allows to download and save your landing page file In the sections –...
  • Page 87: Radius Server Configuration

    8.6.4.2 Template In this page you can review landing page template HTML code and modify it. 8.6.5 Radius server configuration An authentication and accounting system used by many Internet Service Providers (ISPs). When you dial in to the ISP you must enter your username and password. This information is passed to a RADIUS server, which checks that the information is correct, and then authorizes access to the ISP system.
  • Page 88: Statistics

    Field name Explanation 1. Enable Activates an authentication and accounting system 2. Remote access Activates remote access to radius server 3. Accounting port Port on which to listen for accounting 4. Authentication port Port on which to listen for authentication 8.6.6 Statistics On hotspot statistics page you can review statistical information about hotspot instances.
  • Page 89: Periodic Reboot

    Field name Explanation Notes 1. Enable This check box will enable or disable Ping reboot Ping Reboot is disabled by feature. default. 2. Action if no echo is Action after the defined number of unsuccessful No echo reply for sent ICMP received retries (Internet Control Message...
  • Page 90: System

    System 9.1 Setup Wizard The configuration wizard provides a simple way of quickly configuring the device in order to bring it up to basic functionality. The wizard is comprised out of 4 steps and they are as follows: Step 1 (General) First, the wizard prompts you to change the default password.
  • Page 91: Administration

    When you’re done with the configuration wizard, press Finish. 9.2 Administration 9.2.1 General...
  • Page 92: Troubleshoot

    Field name Explanation Router name Enter your new router name. Host name Enter your new host name New Password Enter your new administration password. Changing this password will change SSH password as well. Confirm new password Re-enter your new administration password. Language Website will be translated into selected language Enable sleep mode...
  • Page 93: Backup

    Field name Explanation 1. System log level Debug level should always be used, unless instructed otherwise. 2. Save log in Default RAM memory should always be used unless instructed otherwise. 3. Include GSMD information Default setting – enabled should be used, unless instructed otherwise. 4.
  • Page 94 9.2.3.1 Access control 9.2.3.1.1 General Field name Explanation Enable HTTP access Enables HTTP access to router Enable remote HTTP access Enables remote HTTP access to router Port Port to be used for HTTP communication Enable remote HTTPS access Enables remote HTTPS access to router Port Port to be used for HTTPS communication Note:...
  • Page 95: Diagnostics

    9.2.3.1.2 Safety Field name Explanation 1. WebUI access Check box to enable secure WebUI access. secure enable 2. Clean after reboot If check box is selected – blocked addresses are removed after every reboot. 3. Fail count Specifies maximum connection attempts count before access blocking. 9.2.4 Diagnostics Field name Explanation...
  • Page 96: Overview

    9.2.5 Overview Select which information you want to get in Overview window (Status -> Overview). Field name Explanation Mobile Check box to show Mobile table in Overview page SMS counter Check box to show SMS counter table in Overview page System Check box to show System table in Overview page Wireless...
  • Page 97: User Scripts

    Field name Explanation 1. Enable remote monitoring Check box to enable/disable remote monitoring 2. Monitoring Shows monitoring status. 3. Router LAN MAC address MAC address of the Ethernet LAN ports 4. Router serial number Serial number of the device 9.3 User scripts Advanced users can insert their own commands that will be executed at the end of booting process.
  • Page 98: Firmware

    9.4 Firmware 9.4.1 Firmware STM8 Firmware –it is responsible for sleep mode functionality and signal strength leds. Keep all settings – if the check box is selected router will keep saved user configuration settings after firmware upgrade. When check box is not selected all router settings will be restored to factory defaults after firmware upgrade. When upgrading firmware, you can choose settings that you wish to keep after the upgrade.
  • Page 99: Licenses

    General Public License ("GPL"). Teltonika provides mail in service of a machine readable copy of the corresponding GPL source code on CD upon request via email or traditional paper mail. Teltonika reserves the right to charge for shipping and media as allowed under the GPL. This offer will be valid for at least 3 years. For more information, please contact us gpl@teltonika.lt...
  • Page 100: Device Recovery

    10 Device Recovery Reset button is located in the front of the device. Reset button has several functions: Reboot the device. After the device has started and if the reset button is pressed for up to 4 seconds the device will reboot.
  • Page 101 BOOTP – Bootstrap Protocol – an internet protocol that enables a diskless workstation to discover its own IP address, the IP address of a BOOTP server on the network, and a file to be loaded into memory to boot the machine. This enables the workstation to boot without requiring a hard or floppy disk drive.

Table of Contents