USED SYMBOLS Used symbols Danger – important notice, which may have an influence on the user’s safety or the function of the device. Attention – notice on possible problems, which can arise in specific cases. Information, notice – information, which contains useful advice or special interest. Firmware version Actual version of firmware is 5.1.0 (March 17, 2015).
CONTENTS Contents 1 Basic Information 2 Access to the Web Conf. 2.1 Preventing the domain disagreement message ....3 Status 3.1 General Status ........3.1.1 Mobile Connection .
Page 5
LIST OF FIGURES List of Figures Example of the web configuration ......Mobile WAN status ........WiFi Status .
Page 6
LIST OF FIGURES L2TP tunnel configuration ......Topology of example L2TP tunnel configuration ....PPTP tunnel configuration .
Page 7
LIST OF FIGURES Backed up access to the Internet – Backup Routes configuration ..Secure networks interconnection – topology of the example ... 100 Secure networks interconnection –...
Page 8
LIST OF TABLES List of Tables Mobile Connection ........Peripheral Ports .
Page 9
LIST OF TABLES Example GRE tunnel configuration ......L2TP tunnel configuration ......Example L2TP tunel configuration .
SSH are described in Commands and Scripts for v2 and v3 Routers – Application Note [1]. The standard and optional equipment and technical parameters of your router can be found in User’s Manual of your router. You can use additional software –...
2. ACCESS TO THE WEB CONF. 2. Access to the Web Configuration Attention! If the SIM card with activated data traffic is not inserted in the router, wireless transmissions will not work. Insert the SIM card when the router is switched-off. For monitoring, configuring and managing the router, use the web interface which can be invoked by entering the IP address of the router into your browser.
2. ACCESS TO THE WEB CONF. The left part of the web interface contains the menu with sections for monitoring (Status), Configuration, Customization and Administration of the router. Name and Location items in the right upper corner displays the name and location of the router filled in the SNMP configuration (see SNMP Configuration).
3. STATUS 3. Status 3.1 General Status A summary of basic information about the router and its activities can be invoked by se- lecting the General item. This page is also displayed when you login to the web interface. Information is divided into a several of separate blocks according to the type of router activity or the properties area –...
3. STATUS 3.1.3 Peripheral Ports Item Description Expansion Port 1 Expansion port fitted to the position 1 (None indicates that this position is equipped with no port) Expansion Port 2 Expansion port fitted to the position 2 (None indicates that this position is equipped with no port) Binary Input State of binary input...
3. STATUS Continued from previous page Item Description Channel Channel the router communicates on Signal Strength Signal strength of the selected cell Signal Quality Signal quality of the selected cell: EC/IO for UMTS and CDMA (it’s the ratio of the signal received from the pilot channel –...
3. STATUS Item Description Signal Min Minimal signal strength Signal Avg Average signal strength Signal Max Maximal signal strength Cells Number of switch between cells Availability Availability of the router via the mobile network (expressed as a percent- age) Table 6: Mobile Network Statistics Tips for Mobile Network Statistics table: Availability of connection to mobile network is information expressed as a percentage that is calculated by the ratio of time when connection to mobile network is established...
3. STATUS 3.3 WiFi This item is available only if the router is equipped with a WiFi module. After selecting the WiFi item in the main menu of the web interface, information about WiFi access point (AP) and associated stations is displayed. Item Description hostapd state dump...
3. STATUS 3.4 WiFi Scan This item is available only if the router is equipped with a WiFi module. After selecting the WiFi Scan item in the menu of the web interface, scanning of neigh- bouring WiFi networks and subsequent printing of results are invoked. Scanning can be per- formed only if the access point (WiFi AP) is off.
3. STATUS 3.5 Network Status To view system information about the router operation, select the Network item in the Sta- tus menu. The upper part of the window displays detailed information about active interfaces: Interface Description eth0, eth1, eth2 Network interfaces (ethernet connection) usb0 Active PPP connection to the mobile network –...
3. STATUS Continued from previous page Item Description packets – transmit packets errors – number of errors dropped – dropped packets overruns – outgoing packets lost because of overload carrier – wrong outgoing packets with errors resulting from the physical layer collisions Number of collisions on physical layer txqueuelen...
3. STATUS 3.6 DHCP Status Information about the DHCP server activity is accessible via DHCP item. The DHCP server provides automatic configuration of devices connected to the network managed router. DHCP server assigns IP address, netmask, default gateway (IP address of router) and DNS server (IP address of router) to each device.
3. STATUS 3.7 IPsec Status Information on actual IPsec tunnel state can be called up in option IPsec in the menu. After correct build the IPsec tunnel, status display IPsec SA established (highlighted in red) in IPsec status information. Other information has only internal character. Figure 7: IPsec Status 3.8 DynDNS status The result of DynDNS record update (from the server www.dyndns.org) can be invoked...
3. STATUS Following messages are possible when detecting the status of DynDNS record update: DynDNS client is disabled. Invalid username or password. Specified hostname doesn’t exist. Invalid hostname format. Hostname exists, but not under specified username. No update performed yet. DynDNS record is already up to date.
3. STATUS Figure 9: System Log Example of logging into the remote daemon at 192.168.2.115: Figure 10: Example program syslogd start with the parameter -r...
4. CONFIGURATION 4. Configuration 4.1 LAN Configuration To enter the Local Area Network configuration, select the LAN menu item in the Configu- ration section. Primary LAN is for the first ETH router’s interface (ETH0), Secondary LAN is for the second ETH router’s interface (ETH1). Tertiary LAN is for the SWITCH (3x Ethernet) Expansion Port if installed, it is the ETH2 interface.
4. CONFIGURATION Default Gateway and DNS Server items are used only if the DHCP Client item is set to disabled and if the Primary or Secondary LAN is selected by Backup routes system as a default route (selection algorithm is described in section 4.6 Backup Routes). There can be only one active bridge on the router at the moment.
4. CONFIGURATION Example 2: The network interface with dynamic and static DHCP server The range of allocated addresses from 192.168.1.2 to 192.168.1.4. The address is allocated 10 minutes. Client with MAC address 01:23:45:67:89:ab has IP address 192.168.1.10. Client with MAC address 01:54:68:18:ba:7e has IP address 192.168.1.11. Figure 13: Example 2 Topology of LAN Configuration Figure 14: Example 2 LAN Configuration...
4. CONFIGURATION Example 3: The network interface with default gateway and DNS server Default gateway IP address is 192.168.1.20 DNS server IP address is 192.168.1.20 Figure 15: Example 3 Topology of LAN Configuration Figure 16: Example 3 LAN Configuration...
4. CONFIGURATION 4.2 Mobile WAN Configuration Configuration of a connection to the mobile network can be invoked by selecting the Mobile WAN item in the Configuration menu section. 4.2.1 Connection to Mobile Network If the Create connection to mobile network item is selected, the router automatically tries to establish connection after switching-on.
4. CONFIGURATION Tips for working with the Mobile WAN configuration form: If the size is set incorrectly, data transfer may not be succeeded. By setting a lower MTU it occurs to more frequent fragmentation of data, which means higher overhead and also the possibility of damage of packet during defragmentation.
4. CONFIGURATION ones. Checking can be set separately for two SIM cards or two APNs. As a ping address can be used an IP address for which it is certain that it is still functional and is possible to send ICMP ping (e.g.
4. CONFIGURATION 4.2.5 Switch Between SIM Cards Configuration At the bottom of configuration it is possible to set rules for switching between two APN’s on the SIM card, in the event that one SIM card is inserted or between two SIM cards, in the event that two SIM cards are inserted.
4. CONFIGURATION Continued from previous page Item Description Switch to backup SIM card when This parameter enables switching to secondary SIM binary input is active switch to card or secondary APN of the SIM card, when binary default SIM card when binary in- input ‘bin0’...
4. CONFIGURATION Example 1: The figure below describes the situation, when the connection to mobile network is controlled on the address 8.8.8.8 in the time interval of 60 s for primary SIM card and on the address www.google.com in the time interval 80 s for secondary SIM card. In the case of traffic on the router the control pings are not sent, but the traffic is monitored.
4. CONFIGURATION 4.3 PPPoE Configuration To enter the PPPoE configuration select the PPPoE menu item. If the Create PPPoE con- nection option is selected, the router tries to establish PPPoE connection after switching-on. PPPoE (Point-to-Point over Ethernet) is a network protocol, which PPP frames encapsulat- ing to the Ethernet frames.
4. CONFIGURATION 4.4 WiFi Configuration This item is available only if the router is equipped with a WiFi module. The form for configuration of WiFi network can be invoked by pressing the WiFi item in the main menu of the router web interface. Enable WiFi check box at the top of this form is used to activate WiFi.
Page 41
4. CONFIGURATION Continued from previous page Item Description HW Mode HW mode of WiFi standard the access point (AP) will support. IEE 802.11b IEE 802.11b+g IEE 802.11b+g+n Channel Channel where the WiFi AP is transmitting BW 40 MHz Option for HW mode 802.11n that allows using of two standard 20 MHz channels simultaneously.
Page 42
4. CONFIGURATION Continued from previous page Item Description WEP Key 1-4 Items for different four WEP keys WEP key in ASCII format must be entered in quotes and must have the following lengths: – 5 ASCII characters (40b WEP key) –...
4. CONFIGURATION Continued from previous page Item Description Syslog Level Communicativeness level when system writes to the system log Verbose debugging – the highest level of communicativeness Debugging Informational – default level of communicativeness which is used for writing standard events Notification Warning –...
4. CONFIGURATION 4.5 WLAN Configuration This item is available only if the router is equipped with a WiFi module. The form for configuration of WiFi network and DHCP server functioning on this network can be invoked by pressing the WLAN item in the main menu of the router web interface. Enable WLAN interface check box at the top of this form is used to activate WIFi LAN interface.
4. CONFIGURATION Use Enable dynamic DHCP leases item at the bottom of this form to enable dynamic allocation of IP addresses using DHCP server. It is also possible to specify these values: Item Description IP Pool Start Beginning of the range of IP addresses which will be assigned to DHCP clients IP Pool End End of the range of IP addresses which will be assigned to DHCP clients...
4. CONFIGURATION 4.6 Backup Routes Using the configuration form on the Backup Routes page can be set backing up primary connection by other connections to internet/mobile network. For each back up connection can be defined a priority. Own switching is done based on set priorities and state of the connection (for Primary LAN and Secondary LAN).
4. CONFIGURATION If Enable backup routes switching option is not checked, Backup routes system operates in the so-called backward compatibility mode. The default route is selected based on implicit priorities according to the status of enabling settings for each of network interface, as the case may be enabling services that set these network interfaces.
4. CONFIGURATION Item Description Source IP address from which access to the router is allowed Protocol Specifies protocol for remote access: all – access is enabled for all protocols TCP – access is enabled for TCP protocol UDP – access is enabled for UDP protocol ICMP –...
4. CONFIGURATION Continued from previous page Item Description Action Type of action: allow – access is allowed deny – access is denied Table 29: Forwarding filtering There is also the possibility to drop a packet whenever request for service which is not in the router comes (check box named Enable filtering of locally destinated packets).
4. CONFIGURATION Example of the firewall configuration: The router has allowed the following access: from address 171.92.5.45 using any protocol from address 10.0.2.123 using TCP protocol on port 1000 from address 142.2.26.54 using ICMP protocol Figure 26: Topology of example firewall configuration Figure 27: Example firewall configuration...
4. CONFIGURATION 4.8 NAT Configuration To enter the Network Address Translation configuration, select the NAT menu item. NAT (Network address Translation / Port address Translation - PAT) is a method of adjusting the net- work traffic through the router default transcript and/or destination IP addresses often change the number of TCP/UDP port for walk-through IP packets.
4. CONFIGURATION Enable the following options and enter the port number is allowed remote access to the router from the Internet. Attention! Enable remote HTTP access on port activates the redirect from HTTP to HTTPS protocol only. Router doesn’t allow unsecured HTTP protocol to access the web configuration.
4. CONFIGURATION Figure 29: Example 1 – NAT configuration In these configurations it is important to have marked choice of Send all remaining incom- ing packets it default server, IP address in this case is the address of the device behind the router.
4. CONFIGURATION Example 2: Configuration with more connected equipment. Figure 30: Example 2 – topology of NAT configuration Figure 31: Example 2 – NAT configuration...
4. CONFIGURATION In this example there is more equipment connected behind the router, using a Switch. Every device connected behind the router has its own IP address and this is the address to fill in the Server IP Address field in the NAT configuration. These devices are all communicating on the port 80, but you can set the Port Forwarding in the NAT configuration –...
Page 56
4. CONFIGURATION Continued from previous page Item Description UDP/TCP port Port of the relevant protocol (UDP or TCP) Remote IP Address IP address of opposite tunnel side (domain name can be used) Remote Subnet IP address of a network behind opposite tunnel side Remote Subnet Mask Subnet mask of a network behind opposite tunnel side Redirect Gateway...
4. CONFIGURATION Continued from previous page Item Description Authenticate Mode Sets authentication mode: none – no authentication is set Pre-shared secret – sets the shared key for both sides of the tunnel Username/password – enables authentication using CA Certificate, Username and Password X.509 Certificate (multiclient) –...
Page 58
4. CONFIGURATION The changes in settings will apply after pressing the Apply button. Figure 33: OpenVPN tunnel configuration...
4. CONFIGURATION Example of the OpenVPN tunnel configuration: Figure 34: Topology of example OpenVPN configuration OpenVPN tunnel configuration: Configuration Protocol UDP Port 1194 1194 Remote IP Address 10.0.0.2 10.0.0.1 Remote Subnet 192.168.2.0 192.168.1.0 Remote Subnet Mask 255.255.255.0 255.255.255.0 Local Interface IP Address 19.16.1.0 19.16.2.0 Remote Interface IP Address...
4. CONFIGURATION 4.10 IPsec Tunnel Configuration IPsec tunnel configuration can be called up by option IPsec item in the menu. IPsec tunnel allows protected (encrypted) connection of two networks LAN to the one which looks like one homogenous. In the IPsec Tunnels Configuration window are four rows, each row for one configured one IPsec tunnel.
Page 61
4. CONFIGURATION Continued from previous page Item Description Local Protocol/Port Specifies Procokol/Port of a local network. The general form is protocol/port, for example 17/1701 for UDP (protocol 17) and port 1701. It is also possible to enter only the number of protocol, however, the above mentioned format is preferred.
Page 62
4. CONFIGURATION Continued from previous page Item Description IKE Lifetime Lifetime key service part of tunnel. The minimum value of this parameter is 60 s. The maximum value is 86400 s. Rekey Margin Specifies how long before connection expiry should attempt to negotiate a replacement begin.
Page 63
4. CONFIGURATION Random time, the new keys are re-exchanged after, is defined this way: Lifetime - (Rekey margin + random value in range (from 0 to Rekey margin * Rekey Fuzz/100)) By default, the repeated exchange of keys held in the time range: Minimal time: 1h - (9m + 9m) = 42m Maximal time: 1h - (9m + 0m) = 51m When setting the times for key exchange is recommended to leave the default setting in...
4. CONFIGURATION Item Description Create Enables the individual tunnels Description Displays the name of the tunnel specified in the configuration form Edit Configuration of GRE tunnel Table 39: Overview GRE tunnels Figure 38: GRE tunnels configuration Item Description Description Description of tunnel. Remote IP Address IP address of the remote side of the tunnel Local Interface IP...
4. CONFIGURATION Figure 39: GRE tunnel configuration Example of the GRE Tunnel configuration: Figure 40: Topology of GRE tunnel configuration GRE tunnel configuration: Configuration Remote IP Address 10.0.0.2 10.0.0.1 Remote Subnet 192.168.2.0 192.168.1.0 Remote Subnet Mask 255.255.255.0 255.255.255.0 Table 41: Example GRE tunnel configuration Examples of different options for configuration of GRE tunnel can be found in the applica- tion note GRE Tunnel [7].
4. CONFIGURATION 4.12 L2TP Tunnel Configuration L2TP is an unencrypted protocol. To enter the L2TP tunnels configuration, select the L2TP menu item. L2TP tunnel allows protected connection by password of two networks LAN to the one which it looks like one homogenous.
4. CONFIGURATION Example of the L2TP Tunnel configuration: Figure 42: Topology of example L2TP tunnel configuration Configuration of the L2TP tunnel: Configuration Mode L2TP Server L2TP Client Server IP Address — 10.0.0.1 Client Start IP Address 192.168.1.2 — Client End IP Address 192.168.1.254 —...
4. CONFIGURATION 4.13 PPTP Tunnel Configuration PPTP is an unencrypted protocol. To enter the PPTP tunnels configuration, select the PPTP menu item. PPTP tunnel allows protected connection by password of two networks LAN to the one which it looks like one homogenous.
4. CONFIGURATION Example of the PPTP Tunnel configuration: Figure 44: Topology of example PPTP tunnel configuration Configuration of the PPTP tunnel: Configuration Mode PPTP Server PPTP Client Server IP Address — 10.0.0.1 Local IP Address 192.168.1.1 — Remote IP Address —...
4. CONFIGURATION 4.14 DynDNS Client Configuration With the DynDNS service you can access the router remotely using an easy to remember custom hostname. This client monitors the router’s IP address and update it whenever it changes. To make DynDNS work it is necessary to have a public IP address (static or dynamic) and an active account at www.dyndns.org (Remote Access service).
4. CONFIGURATION 4.15 NTP Client Configuration NTP client Configuration can be called up by option NTP item in the menu. NTP (Network Time Protocol) allows set the exact time to the router from the servers, which provide the exact time on the network. By parameter Enable local NTP service router is set to a mode in which it operates as an NTP server for other devices in the LAN behind the router.
SNMP (Simple Network Management Protocol) provides status information about network elements such as routers or end computers. v1, v2 and v3 are just different versions of the SNMP. In the version v3 the communication is secured (encrypted), except of the notification messages (such as notifications of events –...
Binary input BIN1 (values 0,1) Table 51: Object identifier for binary input and output All SPECTRE v3 routers also provide information about internal temperature of the device (OID 1.3.6.1.4.1.30140.3.3) and power voltage (OID 1.3.6.1.4.1.30140.3.4). It is important to set the IP address of the SNMP agent (router) in field Remote SNMP agent.
4. CONFIGURATION 4.17 SMTP Configuration The item SMTP is used for configuring SMTP (Simple Mail Transfer Protocol) client for sending e-mails. Item Description SMTP Server Address IP or domain address of the mail server. SMTP Port Port the SMTP server is listening on Secure Method none, SSL/TLS, or STARTTLS.
4. CONFIGURATION This command sends e-mail to address name@domain.com with the subject "subject", body message "message" and attachment "abc.doc" right from the directory c: directory and attempts to send 5 times. 4.18 SMS Configuration SMS configuration can be invoked by SMS item in the Configuration section. Sending of SMS can be defined in various events and states of the router.
4. CONFIGURATION Item Description Phone Number 1 This control can be configured for up to three numbers. If is set Enable remote control via SMS, all incoming SMS are processed and deleted. In the default settings this parameter is turned on. Phone Number 2 This control can be configured for up to three numbers.
4. CONFIGURATION Choosing Enable AT-SMS protocol on expansion port 1 and Baudrate it is possible to send/receive an SMS on the serial Port 1. Item Description Baudrate Communication speed on expansion port 1 Table 56: Send SMS on serial PORT1 configuration Choosing Enable AT-SMS protocol on expansion port 2 and Baudrate it is possible to send/receive an SMS on the serial Port 2.
4. CONFIGURATION Continued from previous page AT Command Description AT+CMGF Sets the presentation format of short messages AT+CMGL Lists messages of a certain status from a message storage area AT+CMGR Reads a message from a message storage area AT+CMGS Sends a short message from the device to entered tel. number AT+CMGW Writes a short message to SIM storage AT+CMSS...
4. CONFIGURATION Figure 50: Example 1 – SMS configuration Example 2: Configuration of sending SMS via serial interface on the PORT1. Figure 51: Example 2 – SMS configuration...
4. CONFIGURATION Example 3: Configuration of controlling the router via SMS from any phone number. Figure 52: Example 3 – SMS configuration Example 4: Configuration of controlling the router via SMS from the two phone numbers. Figure 53: Example 4 – SMS configuration...
4. CONFIGURATION 4.19 Expansion Port Configuration Configuration of the expansion port can be done via Expansion Port 1 or Expansion Port 2 items in the menu. If the version of router is with the RS232 interface, configuration of the Expansion Port 1 only is needed (Expansion Port 2 item is not used).
4. CONFIGURATION Continued from previous page Item Description Mode Mode of connection: TCP server – router will listen to incoming requests about TCP connection TCP client – router will connect to a TCP server on the specified IP address and TCP port Server Address In mode TCP client it is necessary to enter the Server IP address.
4. CONFIGURATION Figure 54: Expansion port configuration Examples of the expansion port configuration: Figure 55: Example 1 – expansion port configuration...
Figure 56: Example 2 – expansion port configuration All v3 routers provide a program called getty which allows user to connect to the router via the serial line (router must be fitted with an expansion port RS232!). Getty displays the prompt and after entering the username passes it on login program, which asks for a password, verifies it and runs the shell.
4. CONFIGURATION 4.20 USB Port Configuration The USB port configuration can be made choosing USB Port option in the menu. Config- uration can be done, if USB/RS232 converter connected. Item Description Baudrate Applied communication speed. Data Bits Number of data bits. Parity Control parity bit: none –...
4. CONFIGURATION If the Check TCP connection item is ticked, check of the established TCP connection is activated. Item Description Keepalive Time Time, after which it will carry out verification of the connection Keepalive Interval Waiting time on answer Keepalive Probes Number of tests Table 65: USB PORT configuration 2 When item Use CD as indicator of the TCP connection selected, indication of the TCP...
4. CONFIGURATION 4.21 Startup Script In the window Startup Script it is possible to create own scripts which will be executed after all initial scripts. The changes in settings will apply after pressing the Apply button. Figure 60: Startup script Change will take effect after shut down and turn on the router.
4. CONFIGURATION 4.22 Up/Down Script In the window Up/Down Script it is possible to create own scripts. In the item Up script is defined a script, which begins after establishing a PPP/WAN connection. In the item Down Script is defined script, which begins after lost a PPP/WAN connection. The changes in settings will apply after pressing the Apply button.
4. CONFIGURATION 4.23 Automatic Update Configuration In the Automatic update item it is possible to set the automatic configuration update. This choice enables the router to download the configuration and the newest firmware from the server automatically. The configuration and firmware files are stored on the server. To prevent possible unwanted manipulation of the files, downloaded file (tar.gz format) is controlled.
Figure 64: Example of automatic update 1 The following examples find if there is a new firmware or configuration each day at 1:00 in the morning. An example is for the SPECTRE v3 LTE type of router with MAC address 00:11:22:33:44:55.
5. CUSTOMIZATION 5. Customization 5.1 User Modules Configuration of user modules can be accessed by selecting the User Modules item. It is possible to add new modules, delete them or switch to their configuration. Use the Browse button to select the user module (compiled module has tgz extension). The module is added using the Add button.
Page 97
5. CUSTOMIZATION There are for example these user’s modules available. User modules can be downloaded from web pages www.conel.cz or can be custom-programmed. Module name Description MODBUS TCP2RTU Provides a conversion of MODBUS TCP/IP protocol to MDBUS RTU protocol, which can be operated on the serial line. Easy VPN client Provides secure connection of LAN network behind our router with LAN network behind CISCO router.
6. ADMINISTRATION 6. Administration 6.1 Change Profile Using profiles it is possible to switch between different configurations of the router. It can be used for example to switch between different modes of operation of the router (router has established connection, the router has not established connection and the router creates a tunnel to the service center).
6. ADMINISTRATION 6.3 Set Real Time Clock Disposable setting of the router internal clock can be invoked by pressing the Set Real Time Clock item in the main menu of the web interface. Date and time can be set manually through the Date and Time items.
6. ADMINISTRATION 6.6 Send SMS This option is not available in cable routers. Sending SMS messages is possible in menu Send SMS. The SMS message will be sent after entering the Phone number and text SMS (Message) and by pushing button Send. Mes- sages of the standard length 160 characters can be sent.
6. ADMINISTRATION 6.9 Update Firmware To view the information about the firmware version and instructions for its update select the Update Firmware menu item. New firmware is selected via Browse button form your PC (it is necessary to have the firmware file on your computer) and update is run pressing the Update button.
7. CONFIGURATION IN TYP. SITUATIONS 7. Configuration in Typ. Situations Although Conel routers have wide variety of usage, they are used in these typical situations mostly. In this chapter, there are four examples of router’s configuration in the typical situations. Examples include the configuration of all items needed for router to work properly in that situation.
7. CONFIGURATION IN TYP. SITUATIONS Figure 78: Access to the Internet from LAN – LAN configuration Mobile WAN Configuration Connection to the mobile network can be configured in the Mobile WAN item in the Configuration section, see fig. 79. In this case (depending on the SIM card) the configuration form can be blank, just make sure that Create connection to mobile network on the top is checked (factory default).
7. CONFIGURATION IN TYP. SITUATIONS 7.2 Backed Up Access to the Internet from LAN Figure 80: Backed up access to the Internet – topology of the example In the situation on the fig. 80 it’s necessary to configure all the connections to the Internet in items LAN for Ethernet, WLAN and WiFi for WiFi connection and Mobile WAN for mobile connection.
7. CONFIGURATION IN TYP. SITUATIONS LAN configuration In the LAN item – Primary LAN – you can leave the factory default configuration as in the previous situation. The ETH1 interface on the front panel of the router is used for connection to the Internet. It can be configured in Secondary LAN. Connect the cable to the router and set appropriate values as in the fig.
7. CONFIGURATION IN TYP. SITUATIONS Figure 83: Backed up access to the Internet – WiFi configuration Figure 84: Backed up access to the Internet – Mobile WAN configuration...
Page 107
7. CONFIGURATION IN TYP. SITUATIONS Backup Routes configuration Finally configure the priorities of the backup routes. The eth1 wired connection has the highest priority in this situation. In case of failure, the second priority has WiFi wlan0 network interface, and then the mobile connection – usb0 network interface.
7. CONFIGURATION IN TYP. SITUATIONS 7.3 Secure Networks Interconnection or Using VPN Figure 86: Secure networks interconnection – topology of the example VPN (Virtual Private Network) is a secured (encrypted) and authenticated (verified) con- nection of two LANs into one, so it performs as one homogenous LAN. LANs are connected over public untrusted network (Internet), see fig.
7. CONFIGURATION IN TYP. SITUATIONS Mobile WAN configuration The mobile connection can be configured the same way as in the previous situations (router connects itself after inserting the SIM card into SIM1 slot and attaching the antenna to the ANT connector), configuration is accessible in the Configuration section, the Mobile WAN item (see chapter 4.2.1), where mobile connection has to be enabled.
7. CONFIGURATION IN TYP. SITUATIONS 7.4 Serial Gateway Figure 88: Serial Gateway – topology of the example With the serial gateway you can enable the serial line communicating devices to access the internet or another network. These devices (meters, PLC, etc.) can upload and download the useful data then.
Page 111
7. CONFIGURATION IN TYP. SITUATIONS configured. The TCP protocol is chosen in this situation and the router will work as the server listening on the 2345 TCP port. Confirm the configuration clicking the Apply button. Figure 89: Serial Gateway – konfigurace Expansion Port 1 To communicate with the serial device (PLC), connect from the PC (in fig.