USED SYMBOLS Used symbols Danger – Information regarding user safety or potential damage to the router. Attention – Problems that can arise in specific situations. Information, notice – Useful tips or information of special interest. Example – example of function, command or script. Firmware version Current version of firmware is 6.0.0 (May 31, 2016).
Page 6
LIST OF FIGURES List of Figures Example of the Web Configuration ......Mobile WAN status ........WiFi Status .
Page 7
LIST OF FIGURES NAT Configuration for Example 2 ......OpenVPN Tunnels List ....... . OpenVPN tunnel configuration .
Page 8
LIST OF FIGURES Access to the Internet from LAN – LAN configuration ....119 Access to the Internet from LAN – Mobile WAN configuration ..119 Backup access to the Internet –...
Page 9
LIST OF TABLES List of Tables Mobile Connection ........PoE PSE information .
Page 10
LIST OF TABLES IPsec Tunnels Overview ....... IPsec Tunnel Configuration .
1. BASIC INFORMATION 1. Basic Information SmartMotion is Twin cellular module LTE router designed for reliable and backed up com- munication across cellular networks using LTE, HSPA+, UMTS, EDGE or GPRS technology. There are applications where mobile communication is used as the main communication line even for important applications requiring a high degree of reliability.
Examples would include using SMS or checking the status of the binary input. SmartMotion routers can automatically update their configurations and firmware from a central server, allowing for mass reconfiguration of multiple routers at the same time.
1. BASIC INFORMATION 1.7 This Configuration Manual Describes Configuration of the router item by item according to the web interface (chapters to 6). Configuration in typical situations examples (chapter 7): – Access to the Internet from (Local Area Network) via mobile network, Ch. 7.1. –...
2. ACCESS TO THE WEB CONF. 2. Access to the Web Configuration Attention! Wireless transmissions work only when you activate the SIM card for data traffic and insert it into the router. Remove the power source before inserting the SIM card.
2. ACCESS TO THE WEB CONF. https://192.168.1.1. When accessing the router for the first time you will need to install a se- curity certificate if you don’t want the browser to show you a domain disagreement message. To avoid receiving domain disagreement messages, follow the procedure described in the following subchapter.
3. STATUS 3. Status 3.1 General Status Selecting the General item will open a screen displaying a summary of basic information about the router and its activities. This page is also displayed when you login to the web interface. Information is divided into several sections, based upon the type of router activity or the properties area: Mobile Connection of 1st Module, Mobile Connection of 2nd Module, Primary LAN, Secondary LAN and System Information.
3. STATUS Continued from previous page Item Description Tx Overruns Lost sent packets because of overload. Uptime Indicates how long the connection to the cellular network has been established. Table 1: Mobile Connection 3.1.2 Primary LAN, Secondary LAN, WiFi Items displayed in this part have the same meaning as items in the previous part. More- over, the MAC Address item shows the MAC address of the corresponding router’s interface (Primary LAN –...
3. STATUS 3.1.3 System Information Item Description Firmware Version Information about the firmware version Serial Number Serial number of the router (in case of N/A is not available) Profile Current profile – standard or alternative profiles (profiles are used for example to switch between different modes of operation) Power Board If the power board is installed in the router, shows the type of power board: PoE PD or PoE PSE.
3. STATUS 3.2 Mobile WAN Status The Mobile WAN menu item contains current information about connections to the mobile network. On the upper part of the page there are Mobile Network Information for 1st Module and Mobile Network Information for 2nd Module displayed (information about mobile networks the router operates in).
3. STATUS If a neighboring cell is highlighted in red, there is a risk that the router may repeatedly switch between the neighboring cell and the primary cell. This can affect the performance of the router. To prevent this, re-orient the antenna or use a directional antenna. The next section of this window displays historical information about the quality of the cel- lular WAN connection during each logging period.
3. STATUS Figure 2: Mobile WAN status The last part (Mobile Network Connection Log) displays information about the mobile net- work connections and any problems that occurred while establishing them.
3. STATUS 3.3 WiFi This item is available only if the router is equipped with a WiFi module. Selecting the WiFi item in the main menu of the web interface will display information about the WiFi access point (AP) and associated stations. Item Description hostapd state dump...
3. STATUS 3.4 WiFi Scan This item is available only if the router is equipped with a WiFi module. Selecting the WiFi Scan item scans for neighboring WiFi networks and displays the re- sults. Scanning can only be performed if the access point (WiFi AP) is off. Item Description MAC address of access point (AP)
3. STATUS 3.5 Network Status To view information about the interfaces and the routing table, open the Network item in the Status menu. The upper part of the window displays detailed information about the active interfaces only: Interface Description eth0, eth1, eth2 Network interfaces (Ethernet connection) usb0 Active PPP connection to the mobile network –...
3. STATUS Continued from previous page Item Description packets – received packets errors – number of errors dropped – dropped packets overruns – incoming packets lost because of overload. frame – wrong incoming packets because of incorrect packet size. packets – transmit packets errors –...
3. STATUS 3.6 DHCP Status Information about the DHCP server activity is accessible via DHCP item. The DHCP server provides automatic configuration of the client devices connected to the router. The DHCP server assigns each device an IP address, subnet mask, default gateway (IP address of router) and DNS server (IP address of router).
3. STATUS Item Description lease Assigned IPv4 address iaaddr Assigned IPv6 address starts Time that the IP address was assigned ends Time that the IP address lease expires hardware ethernet Unique hardware MAC address Unique ID client-hostname Host computer name Table 13: DHCP Status Description 3.7 IPsec Status Selecting the IPsec option in the status menu of the web page will bring up the information...
3. STATUS www.dyndns.org www.spdns.de www.dnsdynamic.org www.noip.com Figure 8: DynDNS Status When the router detects a DynDNS record update, the dialog displays one or more of the following messages: DynDNS client is disabled. Invalid username or password. Specified hostname doesn’t exist. Invalid hostname format.
3. STATUS The Syslogd program will output the system log. It can be started with two options to modify its behavior. Option "-S" followed by decimal number sets the maximal number of lines in one log file. Option "-R" followed by hostname or IP address enables logging to a remote syslog daemon.
4. CONFIGURATION 4. Configuration 4.1 LAN Configuration To enter the Local Area Network configuration, select the LAN menu item in the Configura- tion section. The LAN item will expand in the menu on the left, so you can choose the proper Ethernet interface to configure: Primary LAN for the router’s first Ethernet interface (ETH0) and Secondary LAN for the router’s second Ethernet interface (ETH1).
4. CONFIGURATION Item Description DHCP Client Enables/disables the DHCP client function. If in IPv6 column, the DHCPv6 client is enabled. disabled – The router does not allow automatic allocation of an IP address from a DHCP server in LAN network. enabled –...
4. CONFIGURATION Item Description Bridged Activates/deactivates the bridging function on the router. no – The bridging function is inactive (default). yes – The bridging function is active. Media Type Specifies the type of duplex and speed used in the network. Auto-negation –...
4. CONFIGURATION Item Description Enable dynamic DHCP leases Select this option to enable a dynamic DHCP server. IP Pool Start Starting IP addresses allocated to the DHCP clients. Use proper notation in IPv4 and IPv6 column. IP Pool End End of IP addresses allocated to the DHCP clients. Use proper IP address notation in IPv4 and IPv6 column.
4. CONFIGURATION Item Description Enable IPv6 prefix delegation Enables prefix delegation configuration filled-in below. Subnet ID The decimal value of the Subnet ID of the Ethernet inter- face. Maximum value depends on the Subnet ID Width. Subnet ID Width The maximum Subnet ID Width depends on your Site Prefix –...
4. CONFIGURATION Figure 14: LAN Configuration for Example 1 Example 2: IPv4 Dynamic and Static DHCP server The range of allocated addresses is from 192.168.1.2 to 192.168.1.4. The address is allocated for 600 seconds (10 minutes). The client with the MAC address 01:23:45:67:89:ab has the IP address 192.168.1.10. The client with the MAC address 01:54:68:18:ba:7e has the IP address 192.168.1.11.
4. CONFIGURATION Example 3: IPv6 Dynamic DHCP Server The range of dynamic allocated IPv6 addresses is from 2001:db8::1 to 2001:db8::ffff. The address is allocated for 600 second (10 minutes). The router is still accessible via IPv4 (192.168.1.1). Figure 17: Network Topology for Example 3 Figure 18: LAN Configuration for Example 3...
4. CONFIGURATION 4.2 VRRP Configuration Select the VRRP menu item to enter the VRRP configuration. VRRP protocol (Virtual Router Redundancy Protocol) allows you to transfer packet routing from the main router to a backup router in case the main router fails. (This can be used to provide a wireless cellular backup to a primary wired router in critical applications.) If the Enable VRRP is checked, you may set the following parameters.
4. CONFIGURATION You may set the Check connection flag in the second part of the window to enable au- tomatic test messages for the cellular network. In some cases, the mobile WAN connection could still be active but the router will not be able to send data over the cellular network. This feature is used to verify that data can be sent over the PPP connection and supplements the normal VRRP message handling.
4. CONFIGURATION 4.3 Mobile WAN Configuration Select the Mobile WAN item in the Configuration menu section to enter the cellular network configuration pages. The menu item will expand and you will see three configuration pages: 1st module, 2nd module and Module Switching. This last one page – Module Switching – is the most important in the hierarchy of decision making politics when connecting to mobile network.
4. CONFIGURATION 4.4.1 Connection to Mobile Network If you mark the Create connection to mobile network checkbox, then the router automati- cally attempts to establish a connection after booting up. You can specify the following param- eters for each SIM card separately. Item Description Network identifier (Access Point Name).
4. CONFIGURATION Continued from previous page Item Description Specifies the Maximum Receive Unit which is the maximum size of a packet that the router can receive in a given environment. The default value is 1500 B. Other settings can cause the router to incorrectly trans- mit data.
4. CONFIGURATION from the primary and secondary DNS server of the mobile network carrier. To specify the IP addresses of the Primary DNS servers manually, from the DNS Server pull down list, select the value set manually. You can fill-in the IPv4 or IPv6 address of the DNS server (or both) based on the IP Mode option.
4. CONFIGURATION 4.4.4 Example of Check Connection Configuration The figure below displays the following scenario: the connection to the mobile network in IPv4 IP Mode is controlled on the address 8.8.8.8 with the time interval of 60 seconds for the first SIM card and on the address www.google.com with the time interval 80 seconds for the second SIM card.
4. CONFIGURATION 4.4.6 Switch between SIM Cards Configuration In the bottom part of the 1st (2nd) Mobile WAN Configuration page you can specify the rules for toggling between the two SIM cards. The router will automatically toggle between the SIM cards and their setups depending on the configuration here (manual permission, roaming, data limit, binary inputs state).
4. CONFIGURATION Continued from previous page Item Description BIN1 Configure usage of SIM cards based on binary input 1 state: don’t care – It is possible to use the SIM regardless to BIN1 state. 1 – Only use the SIM card if the BIN1 state is logical 1 – no voltage.
4. CONFIGURATION Continued from previous page Item Description Switch to default SIM If enabled, the items below are applied – the router will try to card after timeout switch back to the default SIM card. It applies only when there is default SIM card defined and the other one was selected beacuse of fail of the default one or roaming caused switch.
4. CONFIGURATION Example 2: Data Limit Switching The following configuration illustrates a scenario in which the router changes to a second SIM card after exceeding the data limits of 800 MB on the first (default) SIM card. The router sends a warning SMS upon reaching 400 MB (it has to be enabled on SMS Configuration page).
4. CONFIGURATION 4.5 Module Switching Configuration On this page you can configure the overall politics of cellular modules switching. Tick the Create connection to mobile network to activate the connecting of modules to the cellular network. The cellular module selected is the result of the logical product (AND) of the config- uration on this page.
Page 54
4. CONFIGURATION Continued from previous page Item Description BIN0 Cellular module usage based on binary input 0 state: don’t care – Use the cellular module regardless to BIN0 state. 1 – Only use the cellular module if the BIN0 is logical 1 – no voltage.
ETH port of the router. You assign the IP address of the SIM card to the PC. For SmartMotion ST355 routers only: If you enable PPPoE bridge mode, it is not pos- sible to use SMS Configuration features – the router will not send SMS and you can not control the router via SMS! Send SMS feature in Administartion section will not work.
4. CONFIGURATION 4.6 PPPoE Configuration PPPoE (Point-to-Point over Ethernet) is a network protocol which encapsulates PPPoE frames into Ethernet frames. The router uses the PPPoE client to connect to devices support- ing a PPPoE bridge or server. The bridge or server is typically an ADSL router. To open the PPPoE Configuration page, select the PPPoE menu item.
4. CONFIGURATION Continued from previous page Item Description Specifies the Maximum Receiving Unit. The MRU identifies the max- imum packet size, that the router can receive in a given environ- ment. The default value is 1492 bytes. Other settings can cause in- correct data transmission.
4. CONFIGURATION 4.7 WiFi Configuration This item is available only if the router is equipped with a WiFi module. Configure the WiFi network by selecting the WiFi item in the main menu of the router web interface. Activate WiFi by selecting Enable WiFi at the top of the form. You may also set the following properties: Item Description...
Page 59
4. CONFIGURATION Continued from previous page Item Description Country Code Code of the country where the router is installed. This code must be entered in ISO 3166-1 alpha-2 format. If a country code isn’t specified and the router has not implemented a system to determine this code, it will use "US"...
Page 60
4. CONFIGURATION Continued from previous page Item Description Encryption Type of data encryption in the WiFi network: None – No data encryption. WEP – Encryption using static WEP keys. This encryption can be used for Shared authentication. TKIP – Dynamic encryption key management that can be used for WPA-PSK and WPA2-PSK authentication.
4. CONFIGURATION Continued from previous page Item Description WPA PSK Key for WPA-PSK authentication. This key must be entered accord- ing to the selected WPA PSK type as follows. 256-bit secret – 64 hexadecimal digits ASCII passphrase – 8 to 63 characters PSK File –...
4. CONFIGURATION 4.8 WLAN Configuration This item is available only if the router is equipped with a WiFi module. The WiFi LAN and DHCP server page is displayed by selecting WLAN in the configuration section. You will then be able to set the following properties (see table below). Use the Enable WLAN interface check box at the top of this form to enable WiFi LAN interface.
4. CONFIGURATION Continued from previous page Item Description DHCP Client Activates/deactivates DHCP client. If in IPv6 column, the DHCPv6 client is enabled. IP Address A fixed IP address of the WiFi interface. Use IPv4 notation in IPv4 column and IPv6 notation in IPv6 column. Shortened IPv6 notation is supported.
4. CONFIGURATION 4.9 Backup Routes Using the configuration form on the Backup Routes page, you can back up the primary con- nection with alternative connections to the Internet (mobile network) or enable Multiple WANs mode. It is also possible to prioritize each backup connection option. Switching between connections is carried out according to order of priority and the state of the connections.
4. CONFIGURATION Item Description Enable backup The default route is selected according to the settings below. If dis- routes switching abled (unchecked), the backup routes system operates in the back- ward compatibility mode based on the default priorities of the network interfaces (listed below).
4. CONFIGURATION Network interfaces belonging to individual backup routes are also checked before use for flags which indicate the state of the interface. (E.g. RUNNING on the Network Status page.) This prevents, for example, the disconnection of an Ethernet cable. You can fill-in one or both Ping IP Addresses (IPv4 and IPv6) –...
4. CONFIGURATION 4.10 Firewall Configuration The first security element for incoming packets is a check of the enabled source IP ad- dresses and destination ports. There is independent IPv4 and IPv6 firewall since there is dual stack IPv4 and IPv6 implemented in the router. If you click the Firewall item in the Configura- tion menu on the left, it will expand to IPv4 and IPv6 options and you can click IPv6 to enable and configure the IPv6 firewall –...
4. CONFIGURATION Item Description Source IP address the rule applies to. Use IPv4 address in IPv4 Firewall Configuration and IPv6 address in IPv6 Firewall Configuration. Protocol Specifies the protocol the rule applies to: all – The rule applies to all protocols. TCP –...
4. CONFIGURATION Continued from previous page Item Description Protocol Specifies the protocol the rule applies to: all – The rule applies to all protocols. TCP – The rule applies to TCP protocol. UDP – The rule applies to UDP protocol. ICMP/ICMPv6 –...
4. CONFIGURATION 4.11 NAT Configuration To configure the address translation function, click on NAT in the Configuration section of the main menu. There is independent IPv4 and IPv6 NAT configuration since there is dual stack IPv4 and IPv6 implemented in the router. The NAT item in the menu on the left will expand to IPv4 and IPv6 options and you can click IPv6 to enable and configure the IPv6 NAT –...
4. CONFIGURATION Item Description Public Port Public port for the translation rule. Private Port Private port for the translation rule. Type Protocol type – TCP or UDP. Server IPv4 address In IPv4 NAT Configuration only. IPv4 address where the router forwards incoming data.
4. CONFIGURATION Continued from previous page Item Description Enable remote SNMP access on port Select this option to allow access to the router using SNMP (disabled in default configuration). Masquerade outgoing packets Activates/deactivates the network address translation function. Table 36: Remote Access Configuration Use the following parameters to set the routing of incoming data from the WAN (Mobile WAN) to a connected computer.
4. CONFIGURATION same IP address as displayed in the Default Server IPv4 Address field. The connected device replies if a PING is sent to the IP address of the SIM card. Figure 39: NAT Configuration for Example 1 Example 2: IPv4 NAT Configuration with More Equipment Connected In this example, using the switch you can connect more devices behind the router.
4. CONFIGURATION 4.12 OpenVPN Tunnel Configuration Select the OpenVPN item to configure an OpenVPN tunnel. The OpenVPN tunnel function allows you to create a secure connection between two separate LAN networks. The router allows you to create up to four OpenVPN tunnels. IPv4 and IPv6 dual stack is supported. Item Description Create...
Page 78
4. CONFIGURATION Continued from previous page Item Description Remote Subnet IPv4 address of a network behind opposite side of the tunnel. Remote Subnet Mask IPv4 subnet mask of a network behind opposite tunnel’s side. Redirect Gateway Activates/deactivates redirection of data on Layer 2. Local Interface IP Specifies the IPv4 address of a local interface.
4. CONFIGURATION Continued from previous page Item Description Authenticate Mode Specifies the authentication mode: none – No authentication is set. Pre-shared secret – Specifies the shared key function for both sides of the tunnel. Username/password – Specifies authentication using a CA Certificate, Username and Password.
4. CONFIGURATION 4.12.1 Example of the OpenVPN Tunnel Configuration in IPv4 Network Figure 44: Topology of OpenVPN Configuration Example OpenVPN tunnel configuration: Configuration Protocol UDP Port 1194 1194 Remote IP Address 10.0.0.2 10.0.0.1 Remote Subnet 192.168.2.0 192.168.1.0 Remote Subnet Mask 255.255.255.0 255.255.255.0 Local Interface IP Address...
4. CONFIGURATION 4.13 IPsec Tunnel Configuration To open the IPsec Tunnel Configuration page, click IPsec in the Configuration section of the main menu. The IPsec tunnel function allows you to create a secured connection between two separate LAN networks. The router allows you to create up to four IPsec tunnels. IPv4 and IPv6 tunnels are supported (dual stack), you can transport IPv6 traffic through IPv4 tunnel and vice versa.
Page 83
4. CONFIGURATION Continued from previous page Item Description Remote ID Identifier (ID) of remote side of the tunnel. It consists of two parts: a hostname and a domain-name. Tunnel IP Mode IPv4 – The IPv4 communication runs inside the tunnel. IPv6 –...
Page 84
4. CONFIGURATION Continued from previous page Item Description IKE Algorithm Specifies the means by which the router selects the algorithm: auto – The encryption and hash algorithm are selected au- tomatically. manual – The encryption and hash algorithm are defined by the user.
4. CONFIGURATION Continued from previous page Item Description Authenticate Mode Specifies the means by which the router authenticates: Pre-shared key – Sets the shared key for both sides of the tunnel. X.509 Certificate – Allows X.509 authentication in multi- client mode. Pre-shared Key Specifies the shared key for both sides of the tunnel.
4. CONFIGURATION We recommend that you maintain the default settings. When you set key exchange times higher, the tunnel produces lower operating costs, but the setting also provides less security. Conversely, when you reducing the time, the tunnel produces higher operating costs, but provides for higher security.
4. CONFIGURATION 4.14 GRE Tunnels Configuration GRE is an unencrypted protocol. GRE via IPv6 is not supported. To open the GRE Tunnel Configuration page, click GRE in the Configuration section of the main menu. The GRE tunnel function allows you to create an unencrypted connection between two separate LAN networks.
4. CONFIGURATION Continued from previous page Item Description Pre-shared Key Specifies an optional value for the 32 bit shared key in numeric format, with this key the router sends the filtered data through the tunnel. Specify the same key on both routers, otherwise the router drops received packets.
4. CONFIGURATION 4.14.1 Example of the GRE Tunnel Configuration Figure 50: Topology of GRE Tunnel Configuration Example GRE tunnel configuration: Configuration Remote IP Address 10.0.0.2 10.0.0.1 Remote Subnet 192.168.2.0 192.168.1.0 Remote Subnet Mask 255.255.255.0 255.255.255.0 Table 46: GRE Tunnel Configuration Example Examples of different options for configuration of GRE tunnel can be found in the application note GRE Tunnel [7].
4. CONFIGURATION 4.15 L2TP Tunnel Configuration L2TP is an unencrypted protocol. L2TP via IPv6 is not supported. To open the L2TP Tunnel Configuration page, click L2TP in the Configuration section of the main menu. The L2TP tunnel function allows you to create a password protected connection between 2 LAN networks.
4. CONFIGURATION 4.15.1 Example of the L2TP Tunnel Configuration Figure 52: Topology of L2TP Tunnel Configuration Example Configuration of the L2TP tunnel: Configuration Mode L2TP Server L2TP Client Server IP Address — 10.0.0.1 Client Start IP Address 192.168.2.5 — Client End IP Address 192.168.2.254 —...
4. CONFIGURATION 4.16 PPTP Tunnel Configuration PPTP is an unencrypted protocol. PPTP via IPv6 is not supported. Select the PPTP item in the menu to configure a PPTP tunnel. PPTP tunnel allows pass- word protected connections between two LANs. It is similar to L2TP. The tunnels are active after selecting Create PPTP tunnel.
4. CONFIGURATION 4.16.1 Example of the PPTP Tunnel Configuration Figure 54: Topology of PPTP Tunnel Configuration Example Configuration of the PPTP tunnel: Configuration Mode PPTP Server PPTP Client Server IP Address — 10.0.0.1 Local IP Address 192.168.1.1 — Remote IP Address 192.168.2.1 —...
4. CONFIGURATION 4.17 DynDNS Configuration The DynDNS function allows you to access the router remotely using an easy to remem- ber custom hostname. This DynDNS client monitors the IP address of the router and up- dates the address whenever it changes. In order for DynDNS to function, you require a pub- lic IP address, either static or dynamic, and an active Remote Access service account at www.dyndns.org.
4. CONFIGURATION 4.18 NTP Configuration The NTP configuration form allows you to configure the NTP client. To open the NTP page, click NTP in the Configuration section of the main menu. NTP (Network Time Protocol) allows you to periodically set the internal clock of the router. The time is set from servers that provide the exact time to network devices.
4. CONFIGURATION 4.19 SNMP Configuration The SNMP page allows you to configure the SNMP v1/v2 or v3 agent which sends in- formation about the router (and its expansion ports) to a management station. To open the SNMP page, click SNMP in the Configuration section of the main menu. SNMP (Simple Net- work Management Protocol) provides status information about the network elements such as routers or endpoint computers.
4. CONFIGURATION Activating the Enable I/O extension function allows you monitor the binary I/O inputs on the router. Selecting Enable M-BUS extension and entering the Baudrate, Parity and Stop Bits lets you monitor the meter status connected to the expansion port MBUS status. Selecting Enable reporting to supervisory system and entering the IP Address and Period lets you send statistical information to the monitoring system, R-SeeNet.
4. CONFIGURATION This means that the router provides for example, information about the internal temperature (OID 1.3.6.1.4.1.248.40.1.3.3) or about the power voltage (OID 1.3.6.1.4.1.248.40.1.3.4). For binary inputs and output, the following range of OID is used: Description .1.3.6.1.4.1.30140.2.3.1.0 Binary input BIN0 (values 0,1) .1.3.6.1.4.1.30140.2.3.2.0 Binary output OUT0 (values 0,1) .1.3.6.1.4.1.30140.2.3.3.0...
4. CONFIGURATION Figure 59: MIB Browser Example In order to access a particular device enter the IP address of the SNMP agent which is the router, in the Remote SNMP agent field. The dialog displayed the internal variables in the MIB tree after entering the IP address.
4. CONFIGURATION 4.20 SMTP Configuration Use the SMTP form to configure the Simple Mail Transfer Protocol client (SMTP) for send- ing e-mails. IPv6 e-mail servers are supported. Item Description SMTP Server Address IPv4 address, IPv6 address or domain name of the mail server. SMTP Port Port the SMTP server is listening on.
Page 102
4. CONFIGURATION Commands and parameters can be entered only in lowercase. Example of sending an e-mail: email –t john@doe.com –s "System Log" -m "Attached" -a /var/log/messages The command above sends an e-mail to address john@doe.com with the subject "System Log", body message "Attached" and attachment messages file with System Log of the router directly from the directory /var/log/.
4. CONFIGURATION 4.21 SMS Configuration Open the SMS Configuration page, click SMS in the Configuration section of the main menu. The router can automatically send SMS messages to a cell phone or SMS message server when certain events occur. The form allows you to select which events generate an SMS message.
4. CONFIGURATION Continued from previous page Item Description Send SMS when binary input on Automatic sending SMS message after binary input I/O port (BIN0) is active on I/O port (BIN0) is active. Text of message is in- tended parameter BIN0. Add timestamp to SMS Activates/deactivates the adding a time stamp to the SMS messages.
4. CONFIGURATION If you leave the phone number field blank, then you can restart the router using an SMS Reboot message from any phone number. If you enter one or more phone numbers, then you can control the router using SMS messages sent only from the specified phone numbers.
4. CONFIGURATION 4.21.1 Sending SMS If you establish a connection to the router via Ethernet, then you can use AT commands to manage SMS messages. The following table lists only the commands that the router supports. For other AT commands the router sends an OK response. The router sends an ERROR response for complex AT commands.
4. CONFIGURATION A detailed description and examples of these AT commands can be found in the application note AT commands [9]. 4.21.2 Examples of SMS Configuration Example 1: Sending SMS Configuration After powering up the router, the phone with the number entered in the dialog receives an SMS in the following form: Router (Unit ID) has been powered up.
4. CONFIGURATION Example 2: Control the Router Sending SMS from any Phone Number Figure 63: SMS Configuration for Example 2 Example 3: Control the Router Sending SMS from Two Phone Numbers Figure 64: SMS Configuration for Example 3...
4. CONFIGURATION 4.22 USB Port Configuration You can use a USB to RS232 converter to send data out of the serial port from the Ethernet network in the same manner as the RS232 expansion port function. To specify the values for the USB port parameters, click USB Port in the Configuration section of the main menu.
4. CONFIGURATION If you mark the Reject new connections check box, then the router rejects any other con- nection attempt. This means that the router no longer supports multiple connections. If you mark the Check TCP connection check box, the router verifies the TCP connection. Item Description Keepalive Time...
4. CONFIGURATION 4.23 Scripts There is possibility to create your own shell scripts executed in the specific situations. Go to the Scripts page in the Configuration section in the menu. The menu item will expand and there are Startup Script, Up/Down IPv4 and Up/Down IPv6 scripts you can use – there is IPv4 and IPv6 independent dual stack.
4. CONFIGURATION When the router starts up, stop syslogd program and start syslogd with remote logging on address 192.168.2.115 and limited to 100 entries. Add these lines to the Startup Script: killall syslogd syslogd -R 192.168.2.115 -S 100 4.23.3 Up/Down Scripts Use the Up/Down IPv4 and Up/Down IPv6 page to create scripts executed when the Mobile WAN connection is established (up) or lost (down).
Page 115
4. CONFIGURATION After establishing or losing an IPv6 WAN connection (connection to mobile network), the router sends an email with information about the connection state. It is necessary to configure SMTP before. Add this line to the Up Script field: email -t name@domain.com -s "Router"...
4. CONFIGURATION 4.24 Automatic Update Configuration The router can be configured to automatically check for firmware updates from an FTP site or a web server and update its firmware or configuration information. IPv6 sites/servers are supported. Use the Automatic update menu to configure the automatic update settings. It is also possible to update the configuration and firmware through the USB host connector of the router.
4. CONFIGURATION The configuration file name consists of Base URL, hardware MAC address of ETH0 inter- face and cfg extension. Hardware MAC address and cfg extension are added to the file name automatically and it isn’t necessary to enter them. When the parameter Unit ID is enabled, it defines the concrete configuration name which will be downloaded to the router, and the hardware MAC address in the configuration name will not be used.
4. CONFIGURATION 4.24.2 Example of Automatic Update Based on MAC In the following example the router checks for new firmware or configuration each day at 1:00 a.m. An example is given for the SmartFlex router with MAC address 00:11:22:33:44:55. Firmware file: http://example.com/BIVIAS-v3LL.bin Configuration file: http://example.com/00.11.22.33.44.55.cfg...
5. CUSTOMIZATION 5. Customization 5.1 User Modules You may run custom software programs in the router to enhance the features of the router. Use the User Modules menu item to add new software modules to the router, to remove them, or to change their configuration.
Page 120
5. CUSTOMIZATION Module name Description MODBUS TCP2RTU Provides a conversion of MODBUS TCP/IP protocol to MDBUS RTU protocol, which can be operated on the serial line. Easy VPN client Provides secure connection of LAN network behind our router with LAN network behind CISCO router. NMAP Enables TCP and UDP scan.
6. ADMINISTRATION 6. Administration 6.1 Users This configuration function is only available for users assigned the admin role! To assign roles and manage user accounts open the Users form in the Administration section of the main menu. The first frame of this configuration form contains an overview of available users.
6. ADMINISTRATION Ordinary users are not able to access router via Telnet, or SFTP. Read only FTP access is allowed for these users. Figure 74: Users 6.2 Change Profile In addition to the standard profile, up to three alternate router configurations or profiles can be stored in router’s non-volatile memory.
6. ADMINISTRATION 6.3 Change Password Use the Change Password configuration form in the Administration section of the main menu for changing your password used to log on the device. Enter the new password in the New Password field, confirm the password using the Confirm Password field, and press the Apply button.
6. ADMINISTRATION 6.5 Set SMS Service Center Address This feature works on the 1st cellular module only! (1st or 2nd SIM card.) It is not possible to set the SMS Service Center on the 2nd cellular module this way. The function requires you to enter the phone number of the SMS service center to send SMS messages.
6. ADMINISTRATION 6.7 Send SMS This feature works on the 1st cellular module only! (1st or 2nd SIM card.) It is not possible to send SMS from 2nd cellular module this way. You can send an SMS message from the router to test the cellular network. Use the Send SMS dialog in the Administration section of the main menu to send SMS messages.
6. ADMINISTRATION 6.10 Update Firmware Select the Update Firmware menu item to view the current router firmware version and load new firmware into the router. There is current firmware version and firmware filename written out. When loading the new firmware, it has to have this name. To load new firmware, browse to the new firmware file and press the Update button to begin the update.
7. TYPICAL SITUATIONS 7. Configuration in Typical Situations Although Advantech B+B SmartWorx routers have wide variety of uses, they are commonly used in the following ways. All the examples below are for IPv4 networks. 7.1 Access to the Internet from LAN Figure 84: Access to the Internet from LAN –...
7. TYPICAL SITUATIONS Figure 85: Access to the Internet from LAN – LAN configuration Mobile WAN Configuration Use the Mobile WAN item in the Configuration section to con- figure the connection to the mobile network. (Fig. 86.) In this case (depending on the SIM card) the configuration form can be blank.
7. TYPICAL SITUATIONS 7.2 Backup Access to the Internet from LAN Figure 87: Backup access to the Internet – sample topology The configuration form on the Backup Routes page lets you back up the primary connection with alternative connections to the Internet/mobile network. Each backup connection can be assigned a priority.
7. TYPICAL SITUATIONS LAN configuration In the LAN item, Primary LAN, you can use the factory default configu- ration as in the previous situation. The ETH1 interface on the front panel of the router is used for connection to the Internet. It can be configured in Secondary LAN. Connect the cable to the router and set the appropriate values as in Fig.
7. TYPICAL SITUATIONS Figure 90: Backup access to the Internet – WLAN configuration Mobile WAN configuration To configure the mobile connection it should be sufficient to in- sert the SIM card into the SIM1 slot and attach the antenna to the ANT connector. (Depending on the SIM card you are using).
7. TYPICAL SITUATIONS Backup Routes configuration After setting up the backup routes you will need to set their priorities. In Figure the eth1 wired connection has the highest priority. If that connection fails, the second choice will be the WiFi wlan0 network interface. The third choice will be the mobile connection –...
7. TYPICAL SITUATIONS 7.3 Secure Networks Interconnection or Using VPN Figure 93: Secure networks interconnection – sample topology VPN (Virtual Private Network) is a protocol used to create a secure connection between two LANs, allowing them to function as a single network. The connection is secured (encrypted) and authenticated (verified).
7. TYPICAL SITUATIONS Mobile WAN configuration The mobile connection can be configured as described in the previous situations. (The router connects itself after a SIM card is inserted into SIM1 slot and an antenna is attached to the ANT connector.) Configuration is accessible via the Mobile WAN item the Configuration section.
8. GLOSSARY AND ACRONYMS 8. Glossary and Acronyms Backup Routes Allows user to back up the pri- GRE Generic Routing Encapsulation (GRE) is mary connection with alternative connections to a tunneling protocol that can encapsulate a wide the Internet/mobile network. Each backup con- variety of network layer protocols inside virtual nection can have assigned a priority.
Page 137
8. GLOSSARY AND ACRONYMS growth of the Internet and the predicted deple- (2001:0db8:85a3:0042:1000:8a2e:0370:7334), tion of available addresses, a new version of IP but methods of abbreviation of this full notation (IPv6), using 128 bits for the address, was de- exist. veloped in 1995.
Page 138
8. GLOSSARY AND ACRONYMS tween computer systems over packet-switched, an overlay internetwork. A router is connected variable-latency data networks. to two or more data lines from different net- works. When a data packet comes in one of the OpenVPN OpenVPN implements virtual pri- lines, the router reads the address information vate network (VPN) techniques for creating se- in the packet to determine its ultimate destina-...
Page 139
8. GLOSSARY AND ACRONYMS sists of a set of standards for network manage- URL of a web page is displayed on top in- ment, including an application layer protocol, a side an address bar. An example of a typi- database schema, and a set of data objects. cal URL would be http://www.example.com/ index.html, which indicates a protocol (http), a...
Page 140
8. GLOSSARY AND ACRONYMS mode of telecommunication allows a business X.509 In cryptography, X.509 is an ITU-T to effectively carry out its daily function regard- standard for a public key infrastructure (PKI) less of location. The Internet can be considered and Privilege Management Infrastructure (PMI).