Table of Contents

Advertisement

Quick Links

Configuration Manual
for v3 Routers

Advertisement

Table of Contents
loading

Summary of Contents for B+B SmartWorx V3

  • Page 1 Configuration Manual for v3 Routers...
  • Page 2: Firmware Version

    USED SYMBOLS Used symbols Danger – important notice, which may have an influence on the user’s safety or the function of the device. Attention – notice on possible problems, which can arise in specific cases. Information, notice – information, which contains useful advice or special interest. Firmware version Actual version of firmware is 5.1.0 (March 17, 2015).
  • Page 3: Table Of Contents

    CONTENTS Contents 1 Basic Information 2 Access to the Web Conf. 2.1 Preventing the domain disagreement message ....3 Status 3.1 General Status ........3.1.1 Mobile Connection .
  • Page 4 CONTENTS 4.13 PPTP Tunnel Configuration ......4.14 DynDNS Client Configuration ......4.15 NTP Client Configuration .
  • Page 5 LIST OF FIGURES List of Figures Example of the web configuration ......Mobile WAN status ........WiFi Status .
  • Page 6 LIST OF FIGURES L2TP tunnel configuration ......Topology of example L2TP tunnel configuration ....PPTP tunnel configuration .
  • Page 7 LIST OF FIGURES Backed up access to the Internet – Backup Routes configuration ..Secure networks interconnection – topology of the example ... 100 Secure networks interconnection –...
  • Page 8 LIST OF TABLES List of Tables Mobile Connection ........Peripheral Ports .
  • Page 9 LIST OF TABLES Example GRE tunnel configuration ......L2TP tunnel configuration ......Example L2TP tunel configuration .
  • Page 10: Basic Information

    SSH are described in Commands and Scripts for v2 and v3 Routers – Application Note [1]. The standard and optional equipment and technical parameters of your router can be found in User’s Manual of your router. You can use additional software –...
  • Page 11: Access To The Web Conf

    2. ACCESS TO THE WEB CONF. 2. Access to the Web Configuration Attention! If the SIM card with activated data traffic is not inserted in the router, wireless transmissions will not work. Insert the SIM card when the router is switched-off. For monitoring, configuring and managing the router, use the web interface which can be invoked by entering the IP address of the router into your browser.
  • Page 12: Preventing The Domain Disagreement Message

    2. ACCESS TO THE WEB CONF. The left part of the web interface contains the menu with sections for monitoring (Status), Configuration, Customization and Administration of the router. Name and Location items in the right upper corner displays the name and location of the router filled in the SNMP configuration (see SNMP Configuration).
  • Page 13: Status

    3. STATUS 3. Status 3.1 General Status A summary of basic information about the router and its activities can be invoked by se- lecting the General item. This page is also displayed when you login to the web interface. Information is divided into a several of separate blocks according to the type of router activity or the properties area –...
  • Page 14: Peripheral Ports

    3. STATUS 3.1.3 Peripheral Ports Item Description Expansion Port 1 Expansion port fitted to the position 1 (None indicates that this position is equipped with no port) Expansion Port 2 Expansion port fitted to the position 2 (None indicates that this position is equipped with no port) Binary Input State of binary input...
  • Page 15: Mobile Network Information

    3. STATUS Continued from previous page Item Description Channel Channel the router communicates on Signal Strength Signal strength of the selected cell Signal Quality Signal quality of the selected cell: EC/IO for UMTS and CDMA (it’s the ratio of the signal received from the pilot channel –...
  • Page 16: Mobile Network Statistics

    3. STATUS Item Description Signal Min Minimal signal strength Signal Avg Average signal strength Signal Max Maximal signal strength Cells Number of switch between cells Availability Availability of the router via the mobile network (expressed as a percent- age) Table 6: Mobile Network Statistics Tips for Mobile Network Statistics table: Availability of connection to mobile network is information expressed as a percentage that is calculated by the ratio of time when connection to mobile network is established...
  • Page 17: Mobile Wan Status

    3. STATUS Figure 2: Mobile WAN status...
  • Page 18: Wifi

    3. STATUS 3.3 WiFi This item is available only if the router is equipped with a WiFi module. After selecting the WiFi item in the main menu of the web interface, information about WiFi access point (AP) and associated stations is displayed. Item Description hostapd state dump...
  • Page 19: Wifi Scan

    3. STATUS 3.4 WiFi Scan This item is available only if the router is equipped with a WiFi module. After selecting the WiFi Scan item in the menu of the web interface, scanning of neigh- bouring WiFi networks and subsequent printing of results are invoked. Scanning can be per- formed only if the access point (WiFi AP) is off.
  • Page 20: Wifi Scan

    3. STATUS Figure 4: WiFi Scan...
  • Page 21: Network Status

    3. STATUS 3.5 Network Status To view system information about the router operation, select the Network item in the Sta- tus menu. The upper part of the window displays detailed information about active interfaces: Interface Description eth0, eth1, eth2 Network interfaces (ethernet connection) usb0 Active PPP connection to the mobile network –...
  • Page 22: Network Status

    3. STATUS Continued from previous page Item Description packets – transmit packets errors – number of errors dropped – dropped packets overruns – outgoing packets lost because of overload carrier – wrong outgoing packets with errors resulting from the physical layer collisions Number of collisions on physical layer txqueuelen...
  • Page 23: Dhcp Status

    3. STATUS 3.6 DHCP Status Information about the DHCP server activity is accessible via DHCP item. The DHCP server provides automatic configuration of devices connected to the network managed router. DHCP server assigns IP address, netmask, default gateway (IP address of router) and DNS server (IP address of router) to each device.
  • Page 24: Ipsec Status

    3. STATUS 3.7 IPsec Status Information on actual IPsec tunnel state can be called up in option IPsec in the menu. After correct build the IPsec tunnel, status display IPsec SA established (highlighted in red) in IPsec status information. Other information has only internal character. Figure 7: IPsec Status 3.8 DynDNS status The result of DynDNS record update (from the server www.dyndns.org) can be invoked...
  • Page 25: System Log

    3. STATUS Following messages are possible when detecting the status of DynDNS record update: DynDNS client is disabled. Invalid username or password. Specified hostname doesn’t exist. Invalid hostname format. Hostname exists, but not under specified username. No update performed yet. DynDNS record is already up to date.
  • Page 26: System Log

    3. STATUS Figure 9: System Log Example of logging into the remote daemon at 192.168.2.115: Figure 10: Example program syslogd start with the parameter -r...
  • Page 27: Configuration

    4. CONFIGURATION 4. Configuration 4.1 LAN Configuration To enter the Local Area Network configuration, select the LAN menu item in the Configu- ration section. Primary LAN is for the first ETH router’s interface (ETH0), Secondary LAN is for the second ETH router’s interface (ETH1). Tertiary LAN is for the SWITCH (3x Ethernet) Expansion Port if installed, it is the ETH2 interface.
  • Page 28: Configuration Of Dynamic Dhcp Server

    4. CONFIGURATION Default Gateway and DNS Server items are used only if the DHCP Client item is set to disabled and if the Primary or Secondary LAN is selected by Backup routes system as a default route (selection algorithm is described in section 4.6 Backup Routes). There can be only one active bridge on the router at the moment.
  • Page 29: Example 1 Topology Of Lan Configuration

    4. CONFIGURATION Figure 11: Example 1 Topology of LAN Configuration Figure 12: Example 1 LAN Configuration...
  • Page 30: Example 2 Topology Of Lan Configuration

    4. CONFIGURATION Example 2: The network interface with dynamic and static DHCP server The range of allocated addresses from 192.168.1.2 to 192.168.1.4. The address is allocated 10 minutes. Client with MAC address 01:23:45:67:89:ab has IP address 192.168.1.10. Client with MAC address 01:54:68:18:ba:7e has IP address 192.168.1.11. Figure 13: Example 2 Topology of LAN Configuration Figure 14: Example 2 LAN Configuration...
  • Page 31: Example 3 Topology Of Lan Configuration

    4. CONFIGURATION Example 3: The network interface with default gateway and DNS server Default gateway IP address is 192.168.1.20 DNS server IP address is 192.168.1.20 Figure 15: Example 3 Topology of LAN Configuration Figure 16: Example 3 LAN Configuration...
  • Page 32: Mobile Wan Configuration

    4. CONFIGURATION 4.2 Mobile WAN Configuration Configuration of a connection to the mobile network can be invoked by selecting the Mobile WAN item in the Configuration menu section. 4.2.1 Connection to Mobile Network If the Create connection to mobile network item is selected, the router automatically tries to establish connection after switching-on.
  • Page 33: Dns Address Configuration

    4. CONFIGURATION Tips for working with the Mobile WAN configuration form: If the size is set incorrectly, data transfer may not be succeeded. By setting a lower MTU it occurs to more frequent fragmentation of data, which means higher overhead and also the possibility of damage of packet during defragmentation.
  • Page 34: Data Limit Configuration

    4. CONFIGURATION ones. Checking can be set separately for two SIM cards or two APNs. As a ping address can be used an IP address for which it is certain that it is still functional and is possible to send ICMP ping (e.g.
  • Page 35: Switch Between Sim Cards Configuration

    4. CONFIGURATION 4.2.5 Switch Between SIM Cards Configuration At the bottom of configuration it is possible to set rules for switching between two APN’s on the SIM card, in the event that one SIM card is inserted or between two SIM cards, in the event that two SIM cards are inserted.
  • Page 36: Pppoe Bridge Mode Configuration

    4. CONFIGURATION Continued from previous page Item Description Switch to backup SIM card when This parameter enables switching to secondary SIM binary input is active switch to card or secondary APN of the SIM card, when binary default SIM card when binary in- input ‘bin0’...
  • Page 37: Mobile Wan Configuration

    4. CONFIGURATION Figure 17: Mobile WAN configuration...
  • Page 38: Example 1 - Mobile Wan Configuration

    4. CONFIGURATION Example 1: The figure below describes the situation, when the connection to mobile network is controlled on the address 8.8.8.8 in the time interval of 60 s for primary SIM card and on the address www.google.com in the time interval 80 s for secondary SIM card. In the case of traffic on the router the control pings are not sent, but the traffic is monitored.
  • Page 39: Pppoe Configuration

    4. CONFIGURATION 4.3 PPPoE Configuration To enter the PPPoE configuration select the PPPoE menu item. If the Create PPPoE con- nection option is selected, the router tries to establish PPPoE connection after switching-on. PPPoE (Point-to-Point over Ethernet) is a network protocol, which PPP frames encapsulat- ing to the Ethernet frames.
  • Page 40: Wifi Configuration

    4. CONFIGURATION 4.4 WiFi Configuration This item is available only if the router is equipped with a WiFi module. The form for configuration of WiFi network can be invoked by pressing the WiFi item in the main menu of the router web interface. Enable WiFi check box at the top of this form is used to activate WiFi.
  • Page 41 4. CONFIGURATION Continued from previous page Item Description HW Mode HW mode of WiFi standard the access point (AP) will support. IEE 802.11b IEE 802.11b+g IEE 802.11b+g+n Channel Channel where the WiFi AP is transmitting BW 40 MHz Option for HW mode 802.11n that allows using of two standard 20 MHz channels simultaneously.
  • Page 42 4. CONFIGURATION Continued from previous page Item Description WEP Key 1-4 Items for different four WEP keys WEP key in ASCII format must be entered in quotes and must have the following lengths: – 5 ASCII characters (40b WEP key) –...
  • Page 43: Wifi Configuration

    4. CONFIGURATION Continued from previous page Item Description Syslog Level Communicativeness level when system writes to the system log Verbose debugging – the highest level of communicativeness Debugging Informational – default level of communicativeness which is used for writing standard events Notification Warning –...
  • Page 44: Wlan Configuration

    4. CONFIGURATION 4.5 WLAN Configuration This item is available only if the router is equipped with a WiFi module. The form for configuration of WiFi network and DHCP server functioning on this network can be invoked by pressing the WLAN item in the main menu of the router web interface. Enable WLAN interface check box at the top of this form is used to activate WIFi LAN interface.
  • Page 45: Configuration Of Dhcp Server

    4. CONFIGURATION Use Enable dynamic DHCP leases item at the bottom of this form to enable dynamic allocation of IP addresses using DHCP server. It is also possible to specify these values: Item Description IP Pool Start Beginning of the range of IP addresses which will be assigned to DHCP clients IP Pool End End of the range of IP addresses which will be assigned to DHCP clients...
  • Page 46: Backup Routes

    4. CONFIGURATION 4.6 Backup Routes Using the configuration form on the Backup Routes page can be set backing up primary connection by other connections to internet/mobile network. For each back up connection can be defined a priority. Own switching is done based on set priorities and state of the connection (for Primary LAN and Secondary LAN).
  • Page 47: Firewall Configuration

    4. CONFIGURATION If Enable backup routes switching option is not checked, Backup routes system operates in the so-called backward compatibility mode. The default route is selected based on implicit priorities according to the status of enabling settings for each of network interface, as the case may be enabling services that set these network interfaces.
  • Page 48: Filtering Of Incoming Packets

    4. CONFIGURATION Item Description Source IP address from which access to the router is allowed Protocol Specifies protocol for remote access: all – access is enabled for all protocols TCP – access is enabled for TCP protocol UDP – access is enabled for UDP protocol ICMP –...
  • Page 49: Firewall Configuration

    4. CONFIGURATION Continued from previous page Item Description Action Type of action: allow – access is allowed deny – access is denied Table 29: Forwarding filtering There is also the possibility to drop a packet whenever request for service which is not in the router comes (check box named Enable filtering of locally destinated packets).
  • Page 50: Topology Of Example Firewall Configuration

    4. CONFIGURATION Example of the firewall configuration: The router has allowed the following access: from address 171.92.5.45 using any protocol from address 10.0.2.123 using TCP protocol on port 1000 from address 142.2.26.54 using ICMP protocol Figure 26: Topology of example firewall configuration Figure 27: Example firewall configuration...
  • Page 51: Nat Configuration

    4. CONFIGURATION 4.8 NAT Configuration To enter the Network Address Translation configuration, select the NAT menu item. NAT (Network address Translation / Port address Translation - PAT) is a method of adjusting the net- work traffic through the router default transcript and/or destination IP addresses often change the number of TCP/UDP port for walk-through IP packets.
  • Page 52: Example 1 - Topology Of Nat Configuration

    4. CONFIGURATION Enable the following options and enter the port number is allowed remote access to the router from the Internet. Attention! Enable remote HTTP access on port activates the redirect from HTTP to HTTPS protocol only. Router doesn’t allow unsecured HTTP protocol to access the web configuration.
  • Page 53: Example 1 - Nat Configuration

    4. CONFIGURATION Figure 29: Example 1 – NAT configuration In these configurations it is important to have marked choice of Send all remaining incom- ing packets it default server, IP address in this case is the address of the device behind the router.
  • Page 54: Example 2 - Topology Of Nat Configuration

    4. CONFIGURATION Example 2: Configuration with more connected equipment. Figure 30: Example 2 – topology of NAT configuration Figure 31: Example 2 – NAT configuration...
  • Page 55: Openvpn Tunnel Configuration

    4. CONFIGURATION In this example there is more equipment connected behind the router, using a Switch. Every device connected behind the router has its own IP address and this is the address to fill in the Server IP Address field in the NAT configuration. These devices are all communicating on the port 80, but you can set the Port Forwarding in the NAT configuration –...
  • Page 56 4. CONFIGURATION Continued from previous page Item Description UDP/TCP port Port of the relevant protocol (UDP or TCP) Remote IP Address IP address of opposite tunnel side (domain name can be used) Remote Subnet IP address of a network behind opposite tunnel side Remote Subnet Mask Subnet mask of a network behind opposite tunnel side Redirect Gateway...
  • Page 57: Openvpn Tunnels Configuration

    4. CONFIGURATION Continued from previous page Item Description Authenticate Mode Sets authentication mode: none – no authentication is set Pre-shared secret – sets the shared key for both sides of the tunnel Username/password – enables authentication using CA Certificate, Username and Password X.509 Certificate (multiclient) –...
  • Page 58 4. CONFIGURATION The changes in settings will apply after pressing the Apply button. Figure 33: OpenVPN tunnel configuration...
  • Page 59: Topology Of Example Openvpn Configuration

    4. CONFIGURATION Example of the OpenVPN tunnel configuration: Figure 34: Topology of example OpenVPN configuration OpenVPN tunnel configuration: Configuration Protocol UDP Port 1194 1194 Remote IP Address 10.0.0.2 10.0.0.1 Remote Subnet 192.168.2.0 192.168.1.0 Remote Subnet Mask 255.255.255.0 255.255.255.0 Local Interface IP Address 19.16.1.0 19.16.2.0 Remote Interface IP Address...
  • Page 60: Ipsec Tunnel Configuration

    4. CONFIGURATION 4.10 IPsec Tunnel Configuration IPsec tunnel configuration can be called up by option IPsec item in the menu. IPsec tunnel allows protected (encrypted) connection of two networks LAN to the one which looks like one homogenous. In the IPsec Tunnels Configuration window are four rows, each row for one configured one IPsec tunnel.
  • Page 61 4. CONFIGURATION Continued from previous page Item Description Local Protocol/Port Specifies Procokol/Port of a local network. The general form is protocol/port, for example 17/1701 for UDP (protocol 17) and port 1701. It is also possible to enter only the number of protocol, however, the above mentioned format is preferred.
  • Page 62 4. CONFIGURATION Continued from previous page Item Description IKE Lifetime Lifetime key service part of tunnel. The minimum value of this parameter is 60 s. The maximum value is 86400 s. Rekey Margin Specifies how long before connection expiry should attempt to negotiate a replacement begin.
  • Page 63 4. CONFIGURATION Random time, the new keys are re-exchanged after, is defined this way: Lifetime - (Rekey margin + random value in range (from 0 to Rekey margin * Rekey Fuzz/100)) By default, the repeated exchange of keys held in the time range: Minimal time: 1h - (9m + 9m) = 42m Maximal time: 1h - (9m + 0m) = 51m When setting the times for key exchange is recommended to leave the default setting in...
  • Page 64: Ipsec Tunnels Configuration

    4. CONFIGURATION Figure 36: IPsec tunnels configuration...
  • Page 65: Gre Tunnels Configuration

    4. CONFIGURATION Example of the IPSec Tunnel configuration: Figure 37: Topology of example IPsec configuration IPsec tunnel configuration: Configuration Remote IP Address 10.0.0.2 10.0.0.1 Remote Subnet 192.168.2.0 192.168.1.0 Remote Subnet Mask 255.255.255.0 255.255.255.0 Local Subnet 192.168.1.0 192.168.2.0 Local Subnet Mas: 255.255.255.0 255.255.255.0 Authenticate mode...
  • Page 66: Gre Tunnels Configuration

    4. CONFIGURATION Item Description Create Enables the individual tunnels Description Displays the name of the tunnel specified in the configuration form Edit Configuration of GRE tunnel Table 39: Overview GRE tunnels Figure 38: GRE tunnels configuration Item Description Description Description of tunnel. Remote IP Address IP address of the remote side of the tunnel Local Interface IP...
  • Page 67: Gre Tunnel Configuration

    4. CONFIGURATION Figure 39: GRE tunnel configuration Example of the GRE Tunnel configuration: Figure 40: Topology of GRE tunnel configuration GRE tunnel configuration: Configuration Remote IP Address 10.0.0.2 10.0.0.1 Remote Subnet 192.168.2.0 192.168.1.0 Remote Subnet Mask 255.255.255.0 255.255.255.0 Table 41: Example GRE tunnel configuration Examples of different options for configuration of GRE tunnel can be found in the applica- tion note GRE Tunnel [7].
  • Page 68: L2Tp Tunnel Configuration

    4. CONFIGURATION 4.12 L2TP Tunnel Configuration L2TP is an unencrypted protocol. To enter the L2TP tunnels configuration, select the L2TP menu item. L2TP tunnel allows protected connection by password of two networks LAN to the one which it looks like one homogenous.
  • Page 69: Topology Of Example L2Tp Tunnel Configuration

    4. CONFIGURATION Example of the L2TP Tunnel configuration: Figure 42: Topology of example L2TP tunnel configuration Configuration of the L2TP tunnel: Configuration Mode L2TP Server L2TP Client Server IP Address — 10.0.0.1 Client Start IP Address 192.168.1.2 — Client End IP Address 192.168.1.254 —...
  • Page 70: Pptp Tunnel Configuration

    4. CONFIGURATION 4.13 PPTP Tunnel Configuration PPTP is an unencrypted protocol. To enter the PPTP tunnels configuration, select the PPTP menu item. PPTP tunnel allows protected connection by password of two networks LAN to the one which it looks like one homogenous.
  • Page 71: Topology Of Example Pptp Tunnel Configuration

    4. CONFIGURATION Example of the PPTP Tunnel configuration: Figure 44: Topology of example PPTP tunnel configuration Configuration of the PPTP tunnel: Configuration Mode PPTP Server PPTP Client Server IP Address — 10.0.0.1 Local IP Address 192.168.1.1 — Remote IP Address —...
  • Page 72: Dyndns Client Configuration

    4. CONFIGURATION 4.14 DynDNS Client Configuration With the DynDNS service you can access the router remotely using an easy to remember custom hostname. This client monitors the router’s IP address and update it whenever it changes. To make DynDNS work it is necessary to have a public IP address (static or dynamic) and an active account at www.dyndns.org (Remote Access service).
  • Page 73: Ntp Client Configuration

    4. CONFIGURATION 4.15 NTP Client Configuration NTP client Configuration can be called up by option NTP item in the menu. NTP (Network Time Protocol) allows set the exact time to the router from the servers, which provide the exact time on the network. By parameter Enable local NTP service router is set to a mode in which it operates as an NTP server for other devices in the LAN behind the router.
  • Page 74: Snmp Configuration

    SNMP (Simple Network Management Protocol) provides status information about network elements such as routers or end computers. v1, v2 and v3 are just different versions of the SNMP. In the version v3 the communication is secured (encrypted), except of the notification messages (such as notifications of events –...
  • Page 75: Snmp Configuration (R-Seenet)

    Binary input BIN1 (values 0,1) Table 51: Object identifier for binary input and output All SPECTRE v3 routers also provide information about internal temperature of the device (OID 1.3.6.1.4.1.30140.3.3) and power voltage (OID 1.3.6.1.4.1.30140.3.4). It is important to set the IP address of the SNMP agent (router) in field Remote SNMP agent.
  • Page 76: Example Of The Mib Browser

    4. CONFIGURATION Figure 47: Example of the MIB browser Figure 48: Example of SNMP configuration...
  • Page 77: Smtp Configuration

    4. CONFIGURATION 4.17 SMTP Configuration The item SMTP is used for configuring SMTP (Simple Mail Transfer Protocol) client for sending e-mails. Item Description SMTP Server Address IP or domain address of the mail server. SMTP Port Port the SMTP server is listening on Secure Method none, SSL/TLS, or STARTTLS.
  • Page 78: Sms Configuration

    4. CONFIGURATION This command sends e-mail to address name@domain.com with the subject "subject", body message "message" and attachment "abc.doc" right from the directory c: directory and attempts to send 5 times. 4.18 SMS Configuration SMS configuration can be invoked by SMS item in the Configuration section. Sending of SMS can be defined in various events and states of the router.
  • Page 79: Control Via Sms Configuration

    4. CONFIGURATION Item Description Phone Number 1 This control can be configured for up to three numbers. If is set Enable remote control via SMS, all incoming SMS are processed and deleted. In the default settings this parameter is turned on. Phone Number 2 This control can be configured for up to three numbers.
  • Page 80: Sending Sms

    4. CONFIGURATION Choosing Enable AT-SMS protocol on expansion port 1 and Baudrate it is possible to send/receive an SMS on the serial Port 1. Item Description Baudrate Communication speed on expansion port 1 Table 56: Send SMS on serial PORT1 configuration Choosing Enable AT-SMS protocol on expansion port 2 and Baudrate it is possible to send/receive an SMS on the serial Port 2.
  • Page 81: List Of At Commands

    4. CONFIGURATION Continued from previous page AT Command Description AT+CMGF Sets the presentation format of short messages AT+CMGL Lists messages of a certain status from a message storage area AT+CMGR Reads a message from a message storage area AT+CMGS Sends a short message from the device to entered tel. number AT+CMGW Writes a short message to SIM storage AT+CMSS...
  • Page 82: Example 1 - Sms Configuration

    4. CONFIGURATION Figure 50: Example 1 – SMS configuration Example 2: Configuration of sending SMS via serial interface on the PORT1. Figure 51: Example 2 – SMS configuration...
  • Page 83: Example 3 - Sms Configuration

    4. CONFIGURATION Example 3: Configuration of controlling the router via SMS from any phone number. Figure 52: Example 3 – SMS configuration Example 4: Configuration of controlling the router via SMS from the two phone numbers. Figure 53: Example 4 – SMS configuration...
  • Page 84: Expansion Port Configuration

    4. CONFIGURATION 4.19 Expansion Port Configuration Configuration of the expansion port can be done via Expansion Port 1 or Expansion Port 2 items in the menu. If the version of router is with the RS232 interface, configuration of the Expansion Port 1 only is needed (Expansion Port 2 item is not used).
  • Page 85: Expansion Port Configuration - Serial Interface

    4. CONFIGURATION Continued from previous page Item Description Mode Mode of connection: TCP server – router will listen to incoming requests about TCP connection TCP client – router will connect to a TCP server on the specified IP address and TCP port Server Address In mode TCP client it is necessary to enter the Server IP address.
  • Page 86: Expansion Port Configuration

    4. CONFIGURATION Figure 54: Expansion port configuration Examples of the expansion port configuration: Figure 55: Example 1 – expansion port configuration...
  • Page 87: Example 2 - Expansion Port Configuration

    Figure 56: Example 2 – expansion port configuration All v3 routers provide a program called getty which allows user to connect to the router via the serial line (router must be fitted with an expansion port RS232!). Getty displays the prompt and after entering the username passes it on login program, which asks for a password, verifies it and runs the shell.
  • Page 88: Usb Port Configuration

    4. CONFIGURATION 4.20 USB Port Configuration The USB port configuration can be made choosing USB Port option in the menu. Config- uration can be done, if USB/RS232 converter connected. Item Description Baudrate Applied communication speed. Data Bits Number of data bits. Parity Control parity bit: none –...
  • Page 89: Usb Port Configuration

    4. CONFIGURATION If the Check TCP connection item is ticked, check of the established TCP connection is activated. Item Description Keepalive Time Time, after which it will carry out verification of the connection Keepalive Interval Waiting time on answer Keepalive Probes Number of tests Table 65: USB PORT configuration 2 When item Use CD as indicator of the TCP connection selected, indication of the TCP...
  • Page 90: Usb Configuration

    4. CONFIGURATION Figure 57: USB configuration Examples of USB port configuration: Figure 58: Example 1 – USB port configuration...
  • Page 91: Example 2 - Usb Port Configuration

    4. CONFIGURATION Figure 59: Example 2 – USB port configuration...
  • Page 92: Startup Script

    4. CONFIGURATION 4.21 Startup Script In the window Startup Script it is possible to create own scripts which will be executed after all initial scripts. The changes in settings will apply after pressing the Apply button. Figure 60: Startup script Change will take effect after shut down and turn on the router.
  • Page 93: Up/Down Script

    4. CONFIGURATION 4.22 Up/Down Script In the window Up/Down Script it is possible to create own scripts. In the item Up script is defined a script, which begins after establishing a PPP/WAN connection. In the item Down Script is defined script, which begins after lost a PPP/WAN connection. The changes in settings will apply after pressing the Apply button.
  • Page 94: Automatic Update Configuration

    4. CONFIGURATION 4.23 Automatic Update Configuration In the Automatic update item it is possible to set the automatic configuration update. This choice enables the router to download the configuration and the newest firmware from the server automatically. The configuration and firmware files are stored on the server. To prevent possible unwanted manipulation of the files, downloaded file (tar.gz format) is controlled.
  • Page 95: Example Of Automatic Update

    Figure 64: Example of automatic update 1 The following examples find if there is a new firmware or configuration each day at 1:00 in the morning. An example is for the SPECTRE v3 LTE type of router with MAC address 00:11:22:33:44:55.
  • Page 96: Customization

    5. CUSTOMIZATION 5. Customization 5.1 User Modules Configuration of user modules can be accessed by selecting the User Modules item. It is possible to add new modules, delete them or switch to their configuration. Use the Browse button to select the user module (compiled module has tgz extension). The module is added using the Add button.
  • Page 97 5. CUSTOMIZATION There are for example these user’s modules available. User modules can be downloaded from web pages www.conel.cz or can be custom-programmed. Module name Description MODBUS TCP2RTU Provides a conversion of MODBUS TCP/IP protocol to MDBUS RTU protocol, which can be operated on the serial line. Easy VPN client Provides secure connection of LAN network behind our router with LAN network behind CISCO router.
  • Page 98: Administration

    6. ADMINISTRATION 6. Administration 6.1 Change Profile Using profiles it is possible to switch between different configurations of the router. It can be used for example to switch between different modes of operation of the router (router has established connection, the router has not established connection and the router creates a tunnel to the service center).
  • Page 99: Set Real Time Clock

    6. ADMINISTRATION 6.3 Set Real Time Clock Disposable setting of the router internal clock can be invoked by pressing the Set Real Time Clock item in the main menu of the web interface. Date and time can be set manually through the Date and Time items.
  • Page 100: Send Sms

    6. ADMINISTRATION 6.6 Send SMS This option is not available in cable routers. Sending SMS messages is possible in menu Send SMS. The SMS message will be sent after entering the Phone number and text SMS (Message) and by pushing button Send. Mes- sages of the standard length 160 characters can be sent.
  • Page 101: Update Firmware

    6. ADMINISTRATION 6.9 Update Firmware To view the information about the firmware version and instructions for its update select the Update Firmware menu item. New firmware is selected via Browse button form your PC (it is necessary to have the firmware file on your computer) and update is run pressing the Update button.
  • Page 102: Configuration In Typ. Situations

    7. CONFIGURATION IN TYP. SITUATIONS 7. Configuration in Typ. Situations Although Conel routers have wide variety of usage, they are used in these typical situations mostly. In this chapter, there are four examples of router’s configuration in the typical situations. Examples include the configuration of all items needed for router to work properly in that situation.
  • Page 103: Access To The Internet From Lan - Lan Configuration

    7. CONFIGURATION IN TYP. SITUATIONS Figure 78: Access to the Internet from LAN – LAN configuration Mobile WAN Configuration Connection to the mobile network can be configured in the Mobile WAN item in the Configuration section, see fig. 79. In this case (depending on the SIM card) the configuration form can be blank, just make sure that Create connection to mobile network on the top is checked (factory default).
  • Page 104: Backed Up Access To The Internet From Lan

    7. CONFIGURATION IN TYP. SITUATIONS 7.2 Backed Up Access to the Internet from LAN Figure 80: Backed up access to the Internet – topology of the example In the situation on the fig. 80 it’s necessary to configure all the connections to the Internet in items LAN for Ethernet, WLAN and WiFi for WiFi connection and Mobile WAN for mobile connection.
  • Page 105: Backed Up Access To The Internet - Wlan Configuration

    7. CONFIGURATION IN TYP. SITUATIONS LAN configuration In the LAN item – Primary LAN – you can leave the factory default configuration as in the previous situation. The ETH1 interface on the front panel of the router is used for connection to the Internet. It can be configured in Secondary LAN. Connect the cable to the router and set appropriate values as in the fig.
  • Page 106: Backed Up Access To The Internet - Wifi Configuration

    7. CONFIGURATION IN TYP. SITUATIONS Figure 83: Backed up access to the Internet – WiFi configuration Figure 84: Backed up access to the Internet – Mobile WAN configuration...
  • Page 107 7. CONFIGURATION IN TYP. SITUATIONS Backup Routes configuration Finally configure the priorities of the backup routes. The eth1 wired connection has the highest priority in this situation. In case of failure, the second priority has WiFi wlan0 network interface, and then the mobile connection – usb0 network interface.
  • Page 108: Secure Networks Interconnection Or Using Vpn

    7. CONFIGURATION IN TYP. SITUATIONS 7.3 Secure Networks Interconnection or Using VPN Figure 86: Secure networks interconnection – topology of the example VPN (Virtual Private Network) is a secured (encrypted) and authenticated (verified) con- nection of two LANs into one, so it performs as one homogenous LAN. LANs are connected over public untrusted network (Internet), see fig.
  • Page 109: Secure Networks Interconnection – Openvpn Configuration

    7. CONFIGURATION IN TYP. SITUATIONS Mobile WAN configuration The mobile connection can be configured the same way as in the previous situations (router connects itself after inserting the SIM card into SIM1 slot and attaching the antenna to the ANT connector), configuration is accessible in the Configuration section, the Mobile WAN item (see chapter 4.2.1), where mobile connection has to be enabled.
  • Page 110: Serial Gateway

    7. CONFIGURATION IN TYP. SITUATIONS 7.4 Serial Gateway Figure 88: Serial Gateway – topology of the example With the serial gateway you can enable the serial line communicating devices to access the internet or another network. These devices (meters, PLC, etc.) can upload and download the useful data then.
  • Page 111 7. CONFIGURATION IN TYP. SITUATIONS configured. The TCP protocol is chosen in this situation and the router will work as the server listening on the 2345 TCP port. Confirm the configuration clicking the Apply button. Figure 89: Serial Gateway – konfigurace Expansion Port 1 To communicate with the serial device (PLC), connect from the PC (in fig.
  • Page 112: Recommended Literature

    8. RECOMMENDED LITERATURE 8. Recommended Literature Conel: Commands and Scripts for v2 and v3 Routers, Application Note Conel: SmartCluster, Application Note Conel: R-SeeNet, Application Note Conel: R-SeeNet Admin, Application Note Conel: OpenVPN Tunnel, Application Note Conel: IPsec Tunnel, Application Note...

Table of Contents