Advantech B+B SmartWorx LR77 v2 Configuration Manual

Advantech B+B SmartWorx LR77 v2 Configuration Manual

Lte
Hide thumbs Also See for B+B SmartWorx LR77 v2:
Table of Contents

Advertisement

Configuration Manual
for v2 Routers

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the B+B SmartWorx LR77 v2 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Advantech B+B SmartWorx LR77 v2

  • Page 1 Configuration Manual for v2 Routers...
  • Page 2: Firmware Version

    GPL licence Source codes under GPL licence are available free of charge by sending an email to: cellularsales@advantech-bb.com Advantech B+B SmartWorx s.r.o., Sokolska 71, 562 04 Usti nad Orlici, Czech Republic Manual Rev. 1 released in CZ, September 12, 2016...
  • Page 3: Table Of Contents

    CONTENTS Contents 1 Access to the Web Conf. 1.1 Secured access to web configuration ......2 Status 2.1 General Status .
  • Page 4 CONTENTS 3.13 L2TP Tunnel Configuration ......3.13.1 Example of the L2TP Tunnel Configuration .
  • Page 5 LIST OF FIGURES List of Figures Example of the Web Configuration ......Mobile WAN status ........WiFi Status .
  • Page 6 LIST OF FIGURES Topology of L2TP Tunnel Configuration Example ....PPTP Tunnel Configuration ......Topology of PPTP Tunnel Configuration Example .
  • Page 7 LIST OF TABLES List of Tables Mobile Connection ........Peripheral Ports .
  • Page 8 LIST OF TABLES GRE Tunnel Configuration Example ......L2TP Tunnel Configuration ......L2TP Tunnel Configuration Example .
  • Page 9: Access To The Web Conf

    1. ACCESS TO THE WEB CONF. 1. Access to the Web Configuration Attention! The cellular router will not operate unless the cellular carrier has been cor- rectly configured and the account activated and provisioned for data communications. For UMTS and LTE carriers, a SIM card must be inserted into the router. Do not insert the SIM card when the router is powered up.
  • Page 10: Secured Access To Web Configuration

    1. ACCESS TO THE WEB CONF. For enhanced security, you should change the default password. If the router’s default password is set, the menu item Change password is highlighted in red. If the green LED is blinking, you may restore the router to its factory default settings by pressing RST on front panel.
  • Page 11: Status

    2. STATUS 2. Status 2.1 General Status You can access a summary of basic router information and its activities by opening the General page. This page is the default dialog displayed when you login to the device. Infor- mation is divided into several sections, based upon the type of router activity or the properties area: Mobile Connection, Primary LAN, Peripherals Ports and System Information.
  • Page 12: Primary Lan, Secondary Lan, Wifi

    2. STATUS 2.1.2 Primary LAN, Secondary LAN, WiFi Items displayed in this part have the same meaning as items in the previous part. More- over, the MAC Address item shows the MAC address of the corresponding router’s interface (Primary LAN – eth0, Secondary LAN – eth1, WiFi – wlan0). Visible information depends on configuration (see or 3.5).
  • Page 13: Mobile Wan Status

    2. STATUS 2.2 Mobile WAN Status The XR5i v2 routers do not display the Mobile WAN status option. The Mobile WAN menu item contains current information about connections to the mobile network. The first part of this page (Mobile Network Information) displays basic information about mobile network the router operates in.
  • Page 14: Description Of Periods

    2. STATUS If a neighboring cell is highlighted in red, there is a risk that the router may repeatedly switch between the neighboring cell and the primary cell. This can affect the performance of the router. To prevent this, re-orient the antenna or use a directional antenna. The next section of this window displays historical information about the quality of the cel- lular WAN connection during each logging period.
  • Page 15: Mobile Wan Status

    2. STATUS The middle part of this page displays information about transferred data and the number of connections for both SIM cards (for each period). Item Description RX data Total volume of received data TX data Total volume of sent data Connections Number of connection to mobile network establishment Table 7: Traffic Statistics...
  • Page 16: Wifi

    2. STATUS 2.3 WiFi This item is available only if the router is equipped with a WiFi module. Selecting the WiFi item in the main menu of the web interface will display information about the WiFi access point (AP) and associated stations. Item Description hostapd state dump...
  • Page 17: Wifi Scan

    2. STATUS 2.4 WiFi Scan This item is available only if the router is equipped with a WiFi module. Selecting the WiFi Scan item scans for neighboring WiFi networks and displays the re- sults. Scanning can only be performed if the access point (WiFi AP) is off. Item Description MAC address of access point (AP)
  • Page 18: Wifi Scan

    2. STATUS WiFi Scan output may look like this: Figure 4: WiFi Scan...
  • Page 19: Network Status

    2. STATUS 2.5 Network Status To view information about the interfaces and the routing table, open the Network item in the Status menu. The upper part of the window displays detailed information about the active interfaces only: Interface Description eth0, eth1 Network interfaces (Ethernet connection) ppp0 Active PPP connection to the mobile network –...
  • Page 20: Network Status

    2. STATUS Continued from previous page Item Description packets – transmit packets errors – number of errors dropped – dropped packets overruns – outgoing packets lost because of overload carrier – wrong outgoing packets with errors resulting from the physical layer collisions Number of collisions on physical layer txqueuelen...
  • Page 21: Dhcp Status

    2. STATUS 2.6 DHCP Status Information about the DHCP server activity is accessible via DHCP item. The DHCP server provides automatic configuration of the client devices connected to the router. The DHCP server assigns each device an IP address, subnet mask, default gateway (IP address of router) and DNS server (IP address of router).
  • Page 22: Ipsec Status

    2. STATUS 2.7 IPsec Status Selecting the IPsec option in the status menu of the web page will bring up the information for any IPsec Tunnels that have been established. If the tunnel has been built correctly, the screen will display IPsec SA established (highlighted in red in the figure below.) If there is no such text in log, the tunnel was not created! Figure 7: IPsec Status...
  • Page 23: Dyndns Status

    2. STATUS 2.8 DynDNS Status The router supports DynamicDNS using a DNS server on www.dyndns.org. If Dynamic DNS is configured, the status can be displayed by selecting menu option DynDNS. Refer to www.dyndns.org for more information on how to configure a Dynamic DNS client. You can use the following servers for the Dynamic DNS service: www.dyndns.org www.spdns.de...
  • Page 24: System Log

    2. STATUS 2.9 System Log If there are any connection problems you may view the system log by selecting the System Log menu item. Detailed reports from individual applications running in the router will be dis- played. Use the Save Log button to save the system log to a connected computer. (It will be saved as a text file with the .log extension.) The Save Report button is used for creating de- tailed reports.
  • Page 25: Example Program Syslogd Start With The Parameter -R

    2. STATUS The following example (figure) shows how to send syslog information to a remote server at 192.168.2.115 on startup. Figure 10: Example program syslogd start with the parameter -R...
  • Page 26: Configuration

    3. CONFIGURATION 3. Configuration 3.1 LAN Configuration To enter the Local Area Network configuration, select the LAN menu item in the Configu- ration section. The Primary LAN subitem is for the router’s main Ethernet interface (ETH). If the router has additional Ethernet ports (PORT1 or PORT2), they are configured using the Secondary LAN subitem.
  • Page 27: Configuration Of The Network Interface

    3. CONFIGURATION Continued from previous page Item Description Default Gateway Specifies the IP address of default gateway. When entering the IP address of default gateway, every packet for which the destination IP address was not found in the routing table, is sent to this IP address. DNS server Specifies the IP address of the DNS server.
  • Page 28: Example 1 - Network Topology For Dynamic Dhcp Server

    3. CONFIGURATION Item Description Enable static Select this option to enable a static DHCP server. DHCP leases MAC Address MAC address of a DHCP client. IP Address Assigned IP address. Table 16: Configuration of Static DHCP Server Do not to overlap ranges of static allocated IP addresses with addresses allocated by the dynamic DHCP server.
  • Page 29: Example 1 - Lan Configuration Page

    3. CONFIGURATION Figure 12: Example 1 – LAN Configuration Page...
  • Page 30: Example 2 - Network Topology With Both Static And Dynamic Dhcp Servers

    3. CONFIGURATION Example 2: Configure the network interface to connect to a dynamic and static DHCP server: The range of allocated addresses is from 192.168.1.2 to 192.168.1.4. The address is allocated for 600 seconds (10 minutes). The client with the MAC address 01:23:45:67:89:ab has the IP address 192.168.1.10. The client with the MAC address 01:54:68:18:ba:7e has the IP address 192.168.1.11.
  • Page 31: Example 3 - Network Topology

    3. CONFIGURATION Example 3: Configure the network interface to connect to a default gateway and DNS server: Default gateway IP address is 192.168.1.20 DNS server IP address is 192.168.1.20 Figure 15: Example 3 – Network Topology Figure 16: Example 3 – LAN Configuration Page...
  • Page 32: Vrrp Configuration

    3. CONFIGURATION 3.2 VRRP Configuration Select the VRRP menu item to enter the VRRP configuration. VRRP protocol (Virtual Router Redundancy Protocol) allows you to transfer packet routing from the main router to a backup router in case the main router fails. (This can be used to provide a wireless cellular backup to a primary wired router in critical applications.) If the Enable VRRP is checked, you may set the following parameters.
  • Page 33: Topology Of Vrrp Configuration Example

    3. CONFIGURATION The Enable traffic monitoring option can be used to reduce the number of messages that are sent to test the PPP connection. When this parameter is set, the router will monitor the interface for any packets different from a ping. If a response to the packet is received within the timeout specified by the Ping Timeout parameter, then the router knows that the connection is still active.
  • Page 34: Example Of Vrrp Configuration - Backup Router

    3. CONFIGURATION Figure 19: Example of VRRP configuration – backup router...
  • Page 35: Mobile Wan Configuration

    3. CONFIGURATION 3.3 Mobile WAN Configuration The XR5i v2 routers do not display the Mobile WAN configuration option. Select the Mobile WAN item in the Configuration menu section to enter the cellular network configuration page. 3.3.1 Connection to Mobile Network If you mark the Create connection to mobile network checkbox, then the router automati- cally attempts to establish a connection after booting up.
  • Page 36: Mobile Wan Connection Configuration

    3. CONFIGURATION Continued from previous page Item Description Specifies the PIN used to unlock the SIM card. Use a PIN parameter only if the network requires a SIM card router. The SIM card is blocked after several failed attempts to enter the PIN. Specifies the Maximum Receive Unit which is the maximum size of a packet that the router can receive in a given environment.
  • Page 37: Dns Address Configuration

    3. CONFIGURATION Parameters identified with an asterisk require you to enter the appropriate information only if this information is required by the mobile network carrier. When the router is unsuccessful in establishing a connection to mobile network, verify accuracy of the entered data. Alternatively, you can try a different authentication method or network type.
  • Page 38: Data Limit Configuration

    3. CONFIGURATION 3.3.4 Data Limit Configuration Item Description Data Limit Specifies the maximum expected amount of data transmitted (sent and received) over GPRS in one billing period (month). Maximum value is 2 TB (2097152 MB). Warning Threshold Specifies the percentage of the "Data Limit" in the range of 50 % to 99 %.
  • Page 39: Switch Between Sim Cards Configuration

    3. CONFIGURATION Continued from previous page Item Description Roaming State Configure the use of SIM cards based on roaming. This roaming feature has to be activated for the SIM card on which it is enabled! not applicable – It is possible to use the SIM card every- where.
  • Page 40: Parameters For Sim Card Switching

    3. CONFIGURATION Continued from previous page Item Description Initial State Specifies the action of the cellular module after the SIM card has been selected. online – establish connection to the mobile network after the SIM card has been selected (default). offline –...
  • Page 41: Dial-In Access Configuration

    3. CONFIGURATION Example: If you mark the Switch to default SIM card after timeout check box, and you enter the following values: Initial Timeout – 60 min, Subsequent Timeout – 30 min, Additional Timeout – 20 min. The first attempt to change to the primary SIM card or APN is carried out after 60 minutes. When the first attempt fails, a second attempt is made after 30 minutes.
  • Page 42: Mobile Wan Configuration

    3. CONFIGURATION Figure 20: Mobile WAN Configuration...
  • Page 43: Example 1 - Mobile Wan Configuration

    3. CONFIGURATION Example 1: The figure below displays the following scenario: the connection to the mobile network is controlled on the address 8.8.8.8 with the time interval of 60 seconds for the pri- mary SIM card and on the address www.google.com with the time interval 80 seconds for the secondary SIM card.
  • Page 44: Pppoe Configuration

    3. CONFIGURATION 3.4 PPPoE Configuration PPPoE (Point-to-Point over Ethernet) is a network protocol which encapsulates PPPoE frames into Ethernet frames. The router uses the PPPoE client to connect to devices support- ing a PPPoE bridge or server. The bridge or server is typically an ADSL router. To open the PPPoE Configuration page, select the PPPoE menu item.
  • Page 45: Wifi Configuration

    3. CONFIGURATION 3.5 WiFi Configuration This item is available only if the router is equipped with a WiFi module. Configure the WiFi network by selecting the WiFi item in the main menu of the router web interface. Activate WiFi by selecting Enable WiFi at the top of the form. You may set the following properties listed in the table below.
  • Page 46 3. CONFIGURATION Continued from previous page Item Description Client Isolation In access point (AP) mode only. If checked, the access point will isolate every connected client so they do not see each other (they are in different networks, they cannot PING between each other). If unchecked, the access point behavior is like a switch, but wireless –...
  • Page 47 3. CONFIGURATION Continued from previous page Item Description Authentication Access control and authorization of users in the WiFi network. Open – Authentication is not required (free access point). Shared – Basic authentication using WEP key. WPA-PSK – Authentication using higher authentication meth- ods PSK-PSK.
  • Page 48 3. CONFIGURATION Continued from previous page Item Description WEP Key 1–4 Allows entry of four different WEP keys: WEP key in ASCII format must be entered in quotes. This key can be specified in the following lengths. – 5 ASCII characters (40b WEP key) –...
  • Page 49: Wifi Configuration

    3. CONFIGURATION Continued from previous page Item Description RADIUS Acct Access password of RADIUS accounting server. Define only if dif- Password ferent from the authentication and authorization server. In AP mode only and with one of RADIUS authentications selected. RADIUS Acct Port RADIUS accounting server port.
  • Page 50: Wifi Configuration

    3. CONFIGURATION Figure 24: WiFi Configuration...
  • Page 51: Wlan Configuration

    3. CONFIGURATION 3.6 WLAN Configuration This item is available only if the router is equipped with a WiFi module. The WiFi LAN and DHCP server page is displayed by selecting WLAN in the configuration section. You will then be able to set the following properties (see table below). Use the Enable WLAN interface check box at the top of this form to enable WiFi LAN interface.
  • Page 52: Wlan Configuration

    3. CONFIGURATION Use Enable dynamic DHCP leases item at the bottom of this form to enable dynamic allocation of IP addresses using the DHCP server. You may also specify these values: Item Description IP Pool Start Beginning of the range of IP addresses which will be assigned to DHCP clients.
  • Page 53: Backup Routes

    3. CONFIGURATION 3.7 Backup Routes Using the configuration form on the Backup Routes page, you can back up the primary con- nection with alternative connections to the Internet (mobile network) or enable Multiple WANs mode. It is also possible to prioritize each backup connection option. Switching between connections is carried out according to order of priority and the state of the connections.
  • Page 54: Backup Routes Configuration

    3. CONFIGURATION Item Description Enable backup The default route is selected according to the settings below. If dis- routes switching abled (unchecked), the backup routes system operates in the back- ward compatibility mode based on the default priorities of the network interfaces (listed below).
  • Page 55 3. CONFIGURATION Network interfaces belonging to individual backup routes are also checked before use for flags which indicate the state of the interface. (E.g. RUNNING on the Network Status page.) This prevents, for example, the disconnection of an Ethernet cable. Any changes made to settings will be applied after pressing the Apply button.
  • Page 56: Firewall Configuration

    3. CONFIGURATION 3.8 Firewall Configuration The first security element which incoming packets pass is a check of the enabled source IP addresses and destination ports. You can specify the IP addresses as an IP address from which you can remotely access the router and the internal network connected behind a router. To enable this function, marking the Enable filtering of incoming packets check box located at the top of the Firewall Configuration page.
  • Page 57: Forwarding Filtering

    3. CONFIGURATION Item Description Source IP address from which access to the router is allowed. Destination IP address of destination device. Protocol Specifies the protocol used for remote access: all – Access for all protocols is active. TCP – Access for the TCP protocol is active. UDP –...
  • Page 58: Firewall Configuration

    3. CONFIGURATION Figure 27: Firewall Configuration Example of the firewall configuration: The router allows the following access: from IP address 171.92.5.45 using any protocol from IP address 10.0.2.123 using the TCP protocol on port 1000 from IP address 142.2.26.54 using the ICMP protocol...
  • Page 59: Topology For The Firewall Configuration Example

    3. CONFIGURATION Figure 28: Topology for the Firewall Configuration Example Figure 29: Firewall Configuration Example...
  • Page 60: Nat Configuration

    3. CONFIGURATION 3.9 NAT Configuration To configure the address translation function, open the NAT Configuration page, click on NAT in the Configuration section of the main menu. The router actually uses Port Address Translation (PAT), which is a method of mapping a TCP/UDP port to another TCP/UDP port. The router modifies the information in the packet header as the packets traverse a router.
  • Page 61: Example 1 - Topology Of Nat Configuration

    3. CONFIGURATION If you enable the following options and enter the port number, the router allows you to remotely access to the router from a PPP interface. Item Description Enable remote HTTP access on port If field and port number are filled in, configura- tion of the router over web interface is allowed (disabled in default configuration).
  • Page 62: Example 1 - Nat Configuration

    3. CONFIGURATION Figure 31: Example 1 – NAT Configuration It is important to mark the Send all remaining incoming packets to default server check box for this configuration. The IP address in this example is the address of the device behind the router.
  • Page 63: Example 2 - Topology Of Nat Configuration

    3. CONFIGURATION Example 2: Configuration with more equipment connected. Figure 32: Example 2 – Topology of NAT Configuration Figure 33: Example 2 – NAT Configuration...
  • Page 64 3. CONFIGURATION In this example there is additional equipment connected behind the router, using a Switch. Every device connected behind the router has its own IP address. This is the address to enter in the Server IP Address field in the NAT configuration. All of these devices will be communi- cating on port 80, but you can configure the Port Forwarding in the NAT configuration Public Port and Private Port fields.
  • Page 65: Openvpn Tunnel Configuration

    3. CONFIGURATION 3.10 OpenVPN Tunnel Configuration Select the OpenVPN item to configure an OpenVPN tunnel. The menu item will expand and you will see four separate configuration pages: 1st Tunnel, 2nd Tunnel, 3rd Tunnel and 4th Tunnel. The OpenVPN tunnel function allows you to create a secure connection between two separate LAN networks.
  • Page 66 3. CONFIGURATION Continued from previous page Item Description Renegotiate Interval Specifies the renegotiate period (reauthorization) of the Open- VPN tunnel. You can only set this parameter when the Authen- ticate Mode is set to username/password or X.509 certificate. After this time period, the router changes the tunnel encryption to help provide the continues safety of the tunnel.
  • Page 67: Openvpn Configuration

    3. CONFIGURATION Continued from previous page Item Description DH Parameters Specifies the protocol for the DH parameters key exchange which you can use for X.509 Certificate authentication in the server mode. Local Certificate Specifies the certificate used in the local device. You can use this authentication certificate for the X.509 Certificate authentication mode.
  • Page 68: Openvpn Tunnel Configuration

    3. CONFIGURATION The changes in settings will apply after pressing the Apply button. Figure 34: OpenVPN tunnel configuration...
  • Page 69: Topology Of Openvpn Configuration Example

    3. CONFIGURATION Example of the OpenVPN tunnel configuration: Figure 35: Topology of OpenVPN Configuration Example OpenVPN tunnel configuration: Configuration Protocol UDP Port 1194 1194 Remote IP Address 10.0.0.2 10.0.0.1 Remote Subnet 192.168.2.0 192.168.1.0 Remote Subnet Mask 255.255.255.0 255.255.255.0 Local Interface IP Address 19.16.1.0 19.16.2.0 Remote Interface IP Address...
  • Page 70: Ipsec Tunnel Configuration

    3. CONFIGURATION 3.11 IPsec Tunnel Configuration To open the IPsec Tunnel Configuration page, click IPsec in the Configuration section of the main menu. The menu item will expand and you will see four separate configuration pages: 1st Tunnel, 2nd Tunnel, 3rd Tunnel and 4th Tunnel. The IPsec tunnel function allows you to create a secured connection between two separate LAN networks.
  • Page 71 3. CONFIGURATION Continued from previous page Item Description Encapsulation Mode Specifies the IPsec mode, according to the method of encap- sulation. You can select the tunnel mode in which the entire IP datagram is encapsulated or the transport mode in which only IP header is encapsulated.
  • Page 72: Ipsec Tunnel Configuration

    3. CONFIGURATION Continued from previous page Item Description PFS DH Group Specifies the Diffie-Hellman group number (see IKE DH Group). Key Lifetime Lifetime key data part of tunnel. The minimum value of this pa- rameter is 60 s. The maximum value is 86400 s. IKE Lifetime Lifetime key service part of tunnel.
  • Page 73 3. CONFIGURATION Do not miss: If local and remote subnets are not configured then only packets between local and remote IP address are encapsulated, so only communication between two routers is encrypted. If protocol/port fields are configured then only packets matching these settings are encapsulated.
  • Page 74 3. CONFIGURATION ******************** server cert ************************************* openssl genrsa -des3 -passout pass:router -out private/server.pem 2048 openssl req -new -key private/server.pem -out tmp/server.req openssl x509 -req -days 7305 -sha1 -extensions v3_req -CA ca.crt -CAkey private/ca.key -in tmp/server.req -CAserial ca.srl -CAcreateserial -out server.crt ******************** client cert ************************************** openssl genrsa -des3 -passout pass:router -out private/client.pem 2048 openssl req -new -key private/client.pem -out tmp/client.req...
  • Page 75: Ipsec Tunnels Configuration

    3. CONFIGURATION Figure 36: IPsec Tunnels Configuration...
  • Page 76: Topology Of Ipsec Configuration Example

    3. CONFIGURATION Example of the IPSec tunnel configuration: Figure 37: Topology of IPsec Configuration Example IPsec tunnel configuration: Configuration Remote IP Address 10.0.0.2 10.0.0.1 Remote Subnet 192.168.2.0 192.168.1.0 Remote Subnet Mask 255.255.255.0 255.255.255.0 Local Subnet 192.168.1.0 192.168.2.0 Local Subnet Mas: 255.255.255.0 255.255.255.0 Authenticate mode...
  • Page 77: Gre Tunnels Configuration

    3. CONFIGURATION 3.12 GRE Tunnels Configuration GRE is an unencrypted protocol. To open the GRE Tunnel Configuration page, click GRE in the Configuration section of the main menu. The menu item will expand and you will see four separate configuration pages: 1st Tunnel, 2nd Tunnel, 3rd Tunnel and 4th Tunnel.
  • Page 78: Example Of The Gre Tunnel Configuration

    3. CONFIGURATION Figure 38: GRE Tunnel Configuration 3.12.1 Example of the GRE Tunnel Configuration Figure 39: Topology of GRE Tunnel Configuration Example...
  • Page 79: Gre Tunnel Configuration Example

    3. CONFIGURATION GRE tunnel configuration: Configuration Remote IP Address 10.0.0.2 10.0.0.1 Remote Subnet 192.168.2.0 192.168.1.0 Remote Subnet Mask 255.255.255.0 255.255.255.0 Table 41: GRE Tunnel Configuration Example Examples of different options for configuration of GRE tunnel can be found in the application note GRE Tunnel [7].
  • Page 80: L2Tp Tunnel Configuration

    3. CONFIGURATION 3.13 L2TP Tunnel Configuration L2TP is an unencrypted protocol. To open the L2TP Tunnel Configuration page, click L2TP in the Configuration section of the main menu. The L2TP tunnel function allows you to create a password protected connection between 2 LAN networks.
  • Page 81: Example Of The L2Tp Tunnel Configuration

    3. CONFIGURATION 3.13.1 Example of the L2TP Tunnel Configuration Figure 41: Topology of L2TP Tunnel Configuration Example Configuration of the L2TP tunnel: Configuration Mode L2TP Server L2TP Client Server IP Address — 10.0.0.1 Client Start IP Address 192.168.2.5 — Client End IP Address 192.168.2.254 —...
  • Page 82: Pptp Tunnel Configuration

    3. CONFIGURATION 3.14 PPTP Tunnel Configuration PPTP is an unencrypted protocol. Select the PPTP item in the menu to configure a PPTP tunnel. PPTP tunnel allows pass- word protected connections between two LANs. It is similar to L2TP. The tunnels are active after selecting Create PPTP tunnel.
  • Page 83: Example Of The Pptp Tunnel Configuration

    3. CONFIGURATION 3.14.1 Example of the PPTP Tunnel Configuration Figure 43: Topology of PPTP Tunnel Configuration Example Configuration of the PPTP tunnel: Configuration Mode PPTP Server PPTP Client Server IP Address — 10.0.0.1 Local IP Address 192.168.1.1 — Remote IP Address 192.168.2.1 —...
  • Page 84: Dyndns Configuration

    3. CONFIGURATION 3.15 DynDNS Configuration The DynDNS function allows you to access the router remotely using an easy to remem- ber custom hostname. This DynDNS client monitors the IP address of the router and up- dates the address whenever it changes. In order for DynDNS to function, you require a pub- lic IP address, either static or dynamic, and an active Remote Access service account at www.dyndns.org.
  • Page 85: Ntp Configuration

    3. CONFIGURATION 3.16 NTP Configuration The NTP configuration form allows you to configure the NTP client. To open the NTP page, click NTP in the Configuration section of the main menu. NTP (Network Time Protocol) allows you to periodically set the internal clock of the router. The time is set from servers that provide the exact time to network devices.
  • Page 86: Snmp Configuration

    3. CONFIGURATION 3.17 SNMP Configuration The SNMP page allows you to configure the SNMP v1/v2 or v3 agent which sends in- formation about the router (and its expansion ports) to a management station. To open the SNMP page, click SNMP in the Configuration section of the main menu. SNMP (Simple Net- work Management Protocol) provides status information about the network elements such as routers or endpoint computers.
  • Page 87: Snmp Configuration - Mbus Extension

    3. CONFIGURATION In addition, you can continue with this configuration: Activating the Enable I/O extension function allows you monitor the binary I/O inputs on the router. Selecting the Enable XC-CNT extension lets you monitor the expansion port CNT inputs and outputs status. Selecting Enable M-BUS extension and entering the Baudrate, Parity and Stop Bits lets you monitor the meter status connected to the expansion port MBUS status.
  • Page 88: Oid Basic Structure

    3. CONFIGURATION Each monitored value is uniquely identified using a numerical identifier OID – Object Iden- tifier. This identifier consists of a progression of numbers separated by a point. The shape of each OID is determined by the identifier value of the parent element and then this value is complemented by a point and current number.
  • Page 89: Object Identifier For Cnt Port

    3. CONFIGURATION For the expansion port CNT, the following range of OID is used: Description .1.3.6.1.4.1.30140.2.1.1.0 Analogy input AN1 (range 0-4095) .1.3.6.1.4.1.30140.2.1.2.0 Analogy input AN2 (range 0-4095) .1.3.6.1.4.1.30140.2.1.3.0 Counter input CNT1 (range 0-4294967295) .1.3.6.1.4.1.30140.2.1.4.0 Counter input CNT2 (range 0-4294967295) .1.3.6.1.4.1.30140.2.1.5.0 Binary input BIN1 (values 0,1) .1.3.6.1.4.1.30140.2.1.6.0 Binary input BIN2 (values 0,1)
  • Page 90: Snmp Configuration Example

    3. CONFIGURATION Starting with firmware version 3.0.4, all v2 routers with board RB-v2-6 and newer pro- vide information About the internal temperature of the device (OID 1.3.6.1.4.1.30140.3.3) and power voltage (OID 1.3.6.1.4.1.30140.3.4). The list of available and supported OIDs and other details can be found in the application note SNMP Object Identifier [8].
  • Page 91: Mib Browser Example

    3. CONFIGURATION Figure 48: MIB Browser Example In order to access a particular device enter the IP address of the SNMP agent which is the router, in the Remote SNMP agent field. The dialog displayed the internal variables in the MIB tree after entering the IP address.
  • Page 92: Smtp Configuration

    3. CONFIGURATION 3.18 SMTP Configuration You use the SMTP form to configure the Simple Mail Transfer Protocol client (SMTP) for sending e-mails. Item Description SMTP Server Address IP or domain address of the mail server. SMTP Port Port the SMTP server is listening on. Secure Method none, SSL/TLS, or STARTTLS.
  • Page 93 3. CONFIGURATION Commands and parameters can be entered only in lowercase. Example of sending an e-mail: email –t name@domain.com –s "subject" –m "message" –a c: directory abc.doc –r 5 The command above sends an e-mail address to name@domain.com with the subject "subject", body message "message"...
  • Page 94: Sms Configuration

    3. CONFIGURATION 3.19 SMS Configuration The SMS Configuration page is not available for the XR5i v2 routers. Open the SMS Configuration page, click SMS in the Configuration section of the main menu. The router can automatically send SMS messages to a cell phone or SMS message server when certain events occur.
  • Page 95: Sms Configuration

    3. CONFIGURATION Continued from previous page Item Description BIN1 – SMS SMS text messages when activate the binary input on the expansion port. BIN2 – SMS SMS text messages when activate the binary input on the router. BIN3 – SMS SMS text messages when activate the binary input on the router.
  • Page 96: Reboot

    3. CONFIGURATION Control SMS messages do not change the router configuration. For example, if the router is changed to the off line mode using an SMS message, then the router remains in this mode.To return the router to the on-line mode, reboot or power cycle the device. The behavior is the same for every SMS control message.
  • Page 97: Sending Sms

    3. CONFIGURATION Setting the parameters in the Enable AT-SMS protocol over TCP frame, you can enable the router to send and receive SMS messages on a TCP port. This function requires you to specify a TCP port number. The router sends SMS messages using a standard AT command. Item Description TCP Port...
  • Page 98: List Of At Commands

    3. CONFIGURATION Continued from previous page AT Command Description AT+CSQ Returns the signal strength of the registered network. AT+GMI Returns the specific identity of the manufacturer. AT+GMM Returns the specific model identity of the manufacturer. AT+GMR Returns the specific model revision identity of the manufacturer. AT+GSN Returns the product serial number.
  • Page 99: Example 1 - Sms Configuration

    3. CONFIGURATION Example 1: SMS sending configuration. After powering up the router, the phone with the number entered in the dialog receives an SMS in the following form: Router (Unit ID) has been powered up. Signal strength –xx dBm. After connecting to mobile network, the phone with the number entered in the dialog receives an SMS in the following form: Router (Unit ID) has established connection to mobile network.
  • Page 100: Example 2 - Sms Configuration

    3. CONFIGURATION Example 2: Configuration for sending SMS via serial interface on the Port 1. Figure 51: Example 2 – SMS Configuration...
  • Page 101: Example 3 - Sms Configuration

    3. CONFIGURATION Example 3: Control the router using an SMS from any phone number. Figure 52: Example 3 – SMS Configuration...
  • Page 102: Example 4 - Sms Configuration

    3. CONFIGURATION Example 4: Control the router using an SMS from two phone numbers. Figure 53: Example 4 – SMS Configuration...
  • Page 103: Expansion Port Configuration

    3. CONFIGURATION 3.20 Expansion Port Configuration Configuration of the expansion port can be done via Expansion Port 1 or Expansion Port 2 items in the menu. In the upper part of the configuration window, the port can be enabled and the type of the connected port is shown in the Port Type item.
  • Page 104: Expansion Port Configuration

    3. CONFIGURATION If you mark the Reject new connections check box, then the router rejects any other con- nection attempt. This means that the router no longer supports multiple connections. If you mark the Check TCP connection check box, the router verifies the TCP connection. Item Description Keepalive Time...
  • Page 105: Expansion Port Configuration

    3. CONFIGURATION Figure 54: Expansion Port Configuration...
  • Page 106: Example Of Ethernet To Serial Communication

    3. CONFIGURATION Examples of the expansion port configuration: Figure 55: Example of Ethernet to serial communication Figure 56: Example of serial port extension...
  • Page 107: Usb Port Configuration

    3. CONFIGURATION 3.21 USB Port Configuration You can use a USB to RS232 converter to send data out of the serial port from the Ethernet network in the same manner as the RS232 expansion port function. To specify the values for the USB port parameters, click USB Port in the Configuration section of the main menu.
  • Page 108: Usb Port Configuration

    3. CONFIGURATION If you mark the Reject new connections check box, then the router rejects any other con- nection attempt. This means that the router no longer supports multiple connections. If you mark the Check TCP connection check box, the router verifies the TCP connection. Item Description Keepalive Time...
  • Page 109: Usb Configuration

    3. CONFIGURATION Figure 57: USB configuration Examples of USB port configuration: Figure 58: Example 1 – USB port configuration...
  • Page 110: Example 2 - Usb Port Configuration

    3. CONFIGURATION Figure 59: Example 2 – USB port configuration...
  • Page 111: Scripts

    3. CONFIGURATION 3.22 Scripts There is possibility to create your own shell scripts executed in the specific situations. Go to the Scripts page in the Configuration section in the menu. The menu item will expand and there are Startup Script and Up/Down scripts you can use. For more examples of Scripts and possible commands see the Application Note Commands and Scripts [1].
  • Page 112: Up/Down Script

    3. CONFIGURATION 3.22.2 Up/Down Script Use the Up/Down page to create scripts executed when the Mobile WAN connection is established (up) or lost (down). Up/Down Script runs only on the WAN connection established or lost. Any scripts entered into the Up Script window will run after a WAN connection is established.
  • Page 113: Automatic Update Configuration

    3. CONFIGURATION 3.23 Automatic Update Configuration The router can be configured to automatically check for firmware updates from an FTP site or a web server and update its firmware or configuration information. Use the Automatic update menu to configure the automatic update settings. It is also possible to update the configuration and firmware through the USB host connector of the router.
  • Page 114: Example Of Automatic Update

    3. CONFIGURATION The firmware file name consists of Base URL, type of router and bin extension. For the proper firmware filename, see the Update Firmware page in Administration section – it us written out there. See Chapter 5.10. It is necessary to load two files (.bin and .ver) to the HTTP/FTP server. If only the .bin file is uploaded and the HTTP server sends the incorrect answer of 200 OK (instead of the expected 404 Not Found) when the device tries to download the nonexistent .ver file, then there is a risk that the router will download the .bin file over and over again.
  • Page 115: Example Of Automatic Update

    3. CONFIGURATION The following examples check for new firmware or configurations each day at 1:00 a.m. An example is given for the LR77 v2 router with MAC address 00:11:22:33:44:55. Firmware: http://example.com/LR77-v2.bin Configuration file: http://example.com/00.11.22.33.44.55.cfg Figure 63: Example of Automatic Update 2...
  • Page 116: Customization

    4. CUSTOMIZATION 4. Customization 4.1 User Modules You may run custom software programs in the router to enhance the features of the router. Use the User Modules menu item to add new software modules to the router, to remove them, or to change their configuration.
  • Page 117 4. CUSTOMIZATION Module name Description MODBUS TCP2RTU Provides a conversion of MODBUS TCP/IP protocol to MDBUS RTU protocol, which can be operated on the serial line. Easy VPN client Provides secure connection of LAN network behind our router with LAN network behind CISCO router. NMAP Enables TCP and UDP scan.
  • Page 118: Administration

    5. ADMINISTRATION 5. Administration 5.1 Users This configuration function is only available for users assigned the admin role! To assign roles and manage user accounts open the Users form in the Administration section of the main menu. The first frame of this configuration form contains an overview of available users.
  • Page 119: Change Profile

    5. ADMINISTRATION Ordinary users are not able to access router via Telnet, or SFTP. Read only FTP access is allowed for these users. Figure 66: Users 5.2 Change Profile In addition to the standard profile, up to three alternate router configurations or profiles can be stored in router’s non-volatile memory.
  • Page 120: Change Password

    5. ADMINISTRATION 5.3 Change Password Use the Change Password configuration form in the Administration section of the main menu for changing your password used to log on the device. Enter the new password in the New Password field, confirm the password using the Confirm Password field, and press the Apply button.
  • Page 121: Set Sms Service Center Address

    5. ADMINISTRATION 5.5 Set SMS Service Center Address The XR5i v2 router does not support the Set SMS Service Center Address option. The function requires you to enter the phone number of the SMS service center to send SMS messages. To specify the SMS service center phone number use the Set SMS Ser- vice Center configuration form in the Administration section of the main menu.
  • Page 122: Send Sms

    5. ADMINISTRATION 5.7 Send SMS The XR5i v2 router does not support the Send SMS option. You can send an SMS message from the router to test the cellular network. Use the Send SMS dialog in the Administration section of the main menu to send SMS messages. Enter the Phone number and text of your message in the Message field, then click the Send button.
  • Page 123: Update Firmware

    5. ADMINISTRATION 5.10 Update Firmware Select the Update Firmware menu item to view the current router firmware version and load new firmware into the router. There is current firmware version and firmware filename written out. When loading the new firmware, it has to have this name. To load new firmware, browse to the new firmware file and press the Update button to begin the update.
  • Page 124: Reboot

    5. ADMINISTRATION 5.11 Reboot To reboot the router select the Reboot menu item and then press the Reboot button. Figure 75: Reboot...
  • Page 125: Configuration Over Telnet

    6. CONFIGURATION OVER TELNET 6. Configuration over Telnet Attention! The router cannot operate unless an activated SIM card has been inserted. Monitoring of status, configuration and administration of the router can be performed over the Telnet interface. The default IP address of the modem is 192.168.1.1. Configuration may be performed only by the user "root"...
  • Page 126: Telnet Commands

    6. CONFIGURATION OVER TELNET Continued from previous page Command Description passwd password change ping ICMP ping displaying of processes information dump of actual directory reboot reboot file delete rmdir directory delete route displaying/change of route table service start/stop of service sleep pause on set seconds number slog...
  • Page 127: Glossary And Acronyms

    7. GLOSSARY AND ACRONYMS 7. Glossary and Acronyms Backup Routes Allows user to back up the pri- the router’s IP address and updates it whenever mary connection with alternative connections to it changes. the Internet/mobile network. Each backup con- nection can have assigned a priority. Switching GRE Generic Routing Encapsulation (GRE) is between connections is done based upon set pri- a tunneling protocol that can encapsulate a wide...
  • Page 128 7. GLOSSARY AND ACRONYMS The designers of the Internet Protocol defined an ries the vast majority of Internet traffic as of IP address as a 32-bit number and this system, 2013. As of late November 2012, IPv6 traffic known as Internet Protocol Version 4 (IPv4), is share was reported to be approaching 1%.
  • Page 129 7. GLOSSARY AND ACRONYMS tablish and maintain Internet protocol connec- ubiquitous nature of the RADIUS protocol, it is tions across gateways that implement network often used by ISPs and enterprises to manage address translation (NAT). access to the Internet or internal networks, wire- less networks, and integrated e-mail services.
  • Page 130 7. GLOSSARY AND ACRONYMS fault uses TCP port 25. The protocol for mail sub- or the public Internet. It resides at the transport mission is the same, but uses port 587. SMTP layer. connections secured by SSL, known as SMTPS, Web browsers use TCP when they connect to default to port 465.
  • Page 131 7. GLOSSARY AND ACRONYMS sites. From a user perspective, the extended net- regional, or national boundaries) using private or work resources are accessed in the same way as public network transports. Business and govern- resources available from the private network. ment entities utilize WANs to relay data among employees, clients, buyers, and suppliers from various geographical locations.
  • Page 132: Index

    8. INDEX 8. Index Dynamic Host Configuration Protocol ..see DHCP DynDNS ........Access Point Configuration .
  • Page 133 Primary LAN ......Secondary LAN ..... . . Location Area Code .
  • Page 134 WiFi ........Virtual private network.
  • Page 135: Recommended Literature

    9. RECOMMENDED LITERATURE 9. Recommended Literature Advantech B+B SmartWorx: Commands and Scripts for v2 and v3 Routers, Application Note Advantech B+B SmartWorx: SmartCluster, Application Note Advantech B+B SmartWorx: R-SeeNet, Application Note Advantech B+B SmartWorx: R-SeeNet Admin, Application Note Advantech B+B SmartWorx:...

This manual is also suitable for:

B+b smartworx ur5i v2

Table of Contents