Page 2
The contents of this manual cannot be copied or reproduced in any form without the written permission of InHand. Due to continuous updating, InHand cannot promise that the contents are consistent with the actual product information, and does not assume any disputes caused by the inconsistency of technical parameters.
Contents 1. Preface ..............................1 2. Packing List ............................1 2.1. Panel ................................3 2.2. Structure and Dimensions........................4 3. Installation .............................. 5 3.1. Installing and Uninstalling the Device on a DIN-Rail ................ 5 3.1.1. Installing with a DIN-Rail ......................5 3.1.2.
Each edge computing gateway product is delivered with accessories (such as standard accessories) frequently used at the customer site. Check the received product against the packing list carefully. If any accessory is missing or damaged, contact the InHand sales personnel promptly.
Page 6
Quick installation manual and user manual ( Obtained by scanning a QR Product document code) Guide rail installation Used to fix the gateway accessory 7-pin industrial terminaland Power terminal 8- pin industrial terminaland Network cable 1.5 m long Antenna 3G or 4G specification Product warranty card Warranty period: 1 year Certificate of...
computing gateway. 2.1. Panel Figure 2-1 IG502 Caution The IG502 series product is applicable to multiple panel appearances, as they have the same installation method. Refer to the actual product during operation.
3. Installation Precautions: Power supply requirements: 12V DC (12–48 V DC). ⚫ Environment requirements: operating temperature –25°C to 75°C; storage ⚫ temperature –40°C to 85°C; relative humidity 5% to 95% (non-condensing). The temperature on the device surface may be high. Install the device in a restricted area and assess the surrounding environment.
the device and revolve it upward in the direction indicated by arrow 2 with gentle force, to insert the DIN rail seat onto the DIN rail. Check that the device is installed reliably on the DIN rail, as shown in Figure 3-1 on the right. DIN rail seat DIN rail Figure 3-1-1 DIN rail installation schematic diagram...
Figure 3-1-2 DIN rail disassembly schematic diagram 3.2. Installing and Uninstalling the Device in Wall-mounted Mode 3.2.1. Installing in Wall-mounted Mode 3.2.1.1. Wall Mounting (A)
Page 12
Procedure: Step 1: Select an installation place and reserve enough space for installation. Step 2: Install the wall mounting bracket on the back of the device by using a screwdriver, as shown in Figure 3-2-1-1. Figure 3-2-1-1 Wall mounted installation diagram Step 3: Take out the screws (packaged with the wall mounting bracket), fasten the screws in the installation positions by using the screwdriver, and pull down the device to make it secure, as shown in Figure 3-2-1-1-2.
Page 13
3.2.1.2. Wall Mounting (B) Step 1: Select an installation place and reserve enough space for installation. Step 2: Install the wall mounting bracket on the back of the device by using a screwdriver, as shown in Figure 3-2-2-1. Figure 3-2-1-2-1 Wall mounted installation diagram Step 3: Take out the screws (packaged with the wall mounting bracket), fasten the screws...
in the installation positions by using the screwdriver, and pull down the device to make it secure, as shown in Figure 3-2-2-1-2. Figure 3-2-1-2 Wall mounted installation diagram 3.2.2. Uninstalling in Wall-mounted Mode Procedure: Hold the device with one hand and unfasten the screws that fix the upper end of the device with the other hand, to remove the device from the installation place.
3.3. Installing a SIM Card IG502 supports Dual SIM card. Figure 3-3 Install SIM card 3.4. Installing an Antenna Revolve the movable part of the metal SMAJ interface with gentle force until it cannot be revolved, in which state the outer thread of the antenna connection cable is invisible. Do...
Page 16
not wring the antenna with force by grabbing the black plastic cover. Figure 3-4 Installing an Antenna Note IG502 supports dual antenna: ANT antenna and AUX antenna. The ANT ⚫ antenna sends and receives data. The AUX antenna only increases the antenna signal strength and cannot be used independently for data transmission.
3.5. Installing the Power Supply Procedure: Step 1: Remove the terminal from the gateway. Step 2: Unfasten the locking screw on the terminal. Step 3: Connect the power cable to the terminal and fasten the locking screw. Figure 3-5 Installing the Power Supply 3.6.
Step 3: Fasten the ground screw cap. Caution Ground the gateway to improve its interference resistance. Connect the ground cable to the ground post of the gateway based on the operation environment. 3.7. Connecting the Network Cable Connect the gateway to a PC directly by using the Ethernet cable. Figure 3-7 Network connection 3.8.
Terminals provide the RS232 and RS485 interface modes. Connect cables to the corresponding terminals before using the interfaces. During installation, remove the terminals from the device, unfasten the locking screws on the terminals, connect cables to the corresponding terminals, and fasten the screws. Sort the cables in order. power Reserved(RS232) Reserved(RS485)
Page 20
Dry contacts Wet contacts 0: disconnected 0: 0 V DC to 3 V DC/-3 V DC to 0 V DC 1: connected 1: 10 V DC to 30 V DC/-30 V DC to -10 V DC (4 mA min) Figure 3-8-2-1. Digital input Pulse counting 3.8.2.2.
Page 21
Digital output 3.8.2.3. According to the external power output voltage, if no external power supply is connected, no voltage is output. The maximum voltage output is 30 V, 500 mA. The following figure shows the connection modes. 0: OFF 1: ON. Figure 3-8-2-3 Digital output 3.8.2.4.
Page 22
Figure 3-8-2-4 Pulse output Note This section is only applicable to IG500 with industrial interfaces.
4. Configuring Network Connection for a Wireless Gateway 4.1. Connecting to the Gateway Step 1: By default, the IP address of WAN/LAN on IG502 is 192.168.1.1; the IP address of LAN on IG502 is 192.168.2.1. This document uses the LAN port to access the IG502 as an example.
Page 24
Figure 4-1-1 Gateway Settings(1) Method 2: Set a fixed IP address Select Use the following IP address, enter an IP address (By default,any from 192.168.2.2 to 192.168.2.254), subnet mask (By default,255.255.255.0), default gateway (By default,192.168.2.1), and DNS server address, and click OK. Figure 4-2-2 Gateway Settings(2)
4.2. Logging in to the Gateway Connect the PC to the gateway directly by using the network cable, start the web browser, enter https://192.168.2.1 in the address bar, and press Enter to jump to the web login page. Enter the user name (default: adm) and password (default: 123456), and click OK or press Enter to access the web configuration page.
4.3.2. Logging Out To log out from the IG502, click the user name in the upper right corner. 4.3.3. Changing the Language You can click the globe icon in the upper right corner to change the language of web pages. The IG502 supports simplified Chinese and English. 4.4.
configuration. 4.5. Network 4.5.1. Network interface 4.5.1.1. Cellular Cellular page displays the configuration and status of the IG502’s dial-up interface. You can set dial-up interface parameters to connect the IG502 to a cellular network or view details about the dial-up interface on this page.
Page 28
Submit 4. Click to complete the configuration of the dial-up interface. The cellular network parameters are described as follows: Enable Cellular: enables or disables the cellular network connection. • Profile • Network Type: specifies the type of the mobile network to which the •...
Page 29
CHAP: specifies the Challenge Handshake Authentication Protocol, a • security authentication method that verifies message digests through three-way handshakes. MS-CHAP: specifies the CHAP standard defined by Microsoft. • MS-CHAPv2: specifies the upgraded version of MS-CHAP, which requires • two-way authentication. Username: specifies the user name used for connection to the public data network (PDN).
Page 30
value, the number of dial-up attempts is reset. When the value is set to 0, this function is disabled. Backup SIM Timeout: specifies the timeout period of the backup SIM card used currently. The gateway switches to the main SIM card when the timeout period of the backup SIM card is reached.
Page 31
Static IP: enables or disables the use of a static IP address. If you select this option, specify an IP address manually. Then, the gateway obtains the specified static IP address every time it dials up to a network. Connection Mode Always Online: indicates that the gateway stays online when it is running properly and will be disconnected and redial up only if the dial-up interface does not transmit any traffic in 30 minutes.
Page 32
a backup server. After two servers are configured, the gateway probes the primary server first. It probes the secondary server only when the number of probe retries on the primary server reaches the maximum value. If both the servers fail to be detected, the gateway dials up again and starts a new round of ICMP probe.
Page 33
RSSI Poll Interval: specifies the interval at which the gateway checks the signal status after dialing up successfully. For example, the interval is set to 60s. If you remove the antennas after the gateway dials up successfully, the signal strength will remain unchanged in 60s and decrease 60s later. If the interval is set to 0, RSSI polling is disabled.
Page 34
Expert Options: allows you to set command parameters. 4.5.1.2. The following figure shows the configuration of WAN/LAN, with Interface Type set to WAN. The Ethernet parameters are described as follows:...
Page 35
Network Type (Static IP by default) • Static IP: uses a manually configured IP address, matching subnet • mask, and other information for the Ethernet interface. Dynamic Address (DHCP): configures the interface as a DHCP client • to obtain an IP address, the matching subnet mask, and other information through DHCP.
Page 36
10M Half Duplex • Track L2 State: enables or disables tracking of L2 interface status. After this feature is enabled, the interface is Down when it is not physically connected and is Up when it is physically connected. After this feature is disabled, the interface state is displayed as UP regardless of whether the interface is physically connected.
Page 37
4.5.1.3. Primary IP: specifies the primary IP address of the interface. • Netmask: specifies the subnet mask of the interface. • Secondary IP Setting: allows you to set up to 10 secondary IP addresses in • addition to the primary IP address. 4.5.1.4.
Page 38
to it to test the network connectivity. You can set or view loopback interface parameters on the Loopback page. Follow these steps to configure the loopback interface: 1. Choose Network > Network Interfaces > Loopback to display the Loopback page. You can set or view loopback interface parameters on this page.
4.5.2. Network Services 4.5.2.1. DHCP The Dynamic Host Configuration Protocol (DHCP) uses the client/server communication model. The client sends a configuration request to the server, and the server replies with the IP address allocated to the client and other configuration information. In this way, the client IP address and other configuration is assigned dynamically.
Page 40
The DHCP server parameters are described as follows: • Enable DHCP Service: enables or disables the DHCP service. • Interface: LAN • Starting Address: specifies the start IP address of the IP address pool • for address allocation to DHCP clients. Ending Address: specifies the end IP address of the IP address pool •...
Page 41
Static IP Setting: allows you to bind a fixed IP address to a MAC address, as • shown in the following figure. 4.5.2.2. A domain name system (DNS) is a distributed database used for TCP/IP applications and provides translation between domain names and IP addresses. DNS allows users to access some applications by using easy-to-remember, meaningful domain names, which are then translated into the correct IP addresses by a DNS server on the network.
Page 42
Follow these steps to configure the DNS relay service: 1. Choose Network > Network Services > DNS to display the DNS page. 2. Enable the DNS relay service. The DNS relay service cannot be disabled when the DHCP server feature is enabled.
4.5.2.3. Host List You can view information about hosts connected to the IG502 on the Host List page. Choose Network > Network Services > Host List to display the Host List page, as shown in the following figure. 4.5.3. Routing 4.5.3.1.
Page 44
4.5.3.2. Static Routing Static Routing You can configure static routes on the page. Then, packets sent to a specific destination are forwarded through the specified route. (Generally, you do not need to configure static routes.) Follow these steps to configure a static route: Network >...
Page 45
2. Click the icon to add a static route. 3. Set the parameters. For details about these parameters, see static routing parameter description. Submit 4. Click to save the configuration, and then click to apply the configuration. The following figure shows the configuration of a static route. Parameters of a static route are described as follows: Destination: specifies the destination IP address to which packets are sent.
Interface: specifies the interface through which data packets are forwarded to • the destination network. Gateway: specifies the IP address of the next router that data packets pass • through before reaching the destination IP address. Distance: specifies the priority of the route. A smaller value indicates a higher •...
Page 47
3. Set the parameters. For details about these parameters, see access control policy parameter description. 4. Click the Add or Edit icon under to add an access control list on a specified interface. 5. Set the parameters. For details about these parameters, see access control list parameter description.
Page 48
The following figure shows the configuration of an extended access control policy.
Page 49
The following figure shows the configuration of an access control list.
Page 50
Parameters of a standard access control policy are described as follows: • ID: specifies the ID of an ACL rule, in the range of 1-99. A smaller • value indicates a higher priority of the rule. Sequence Number: specifies the sequence number of the ACL rule. •...
Page 51
Parameters of an extended access control policy are described as follows: • ID: specifies the ID of an ACL rule, in the range of 100-199. A smaller • value indicates a higher priority of the rule. Sequence Number: specifies the sequence number of the ACL rule. •...
Page 52
Destination Port: specifies the destination port number of packets. • The value any indicates that TCP/UDP packets with any destination ports match the rule. This parameter is available only when the TCP or UDP protocol is selected. Established Connection: specifies the range of TCP packets •...
Page 53
4.5.4.2. Network address translation (NAT) allows multiple hosts in a LAN to connect to the Internet by using one or multiple public IP addresses. This feature maps a few public IP addresses to many private IP addresses to conserve public IP addresses.
Page 54
Parameters of the NAT rule are described as follows: Action • SNAT: uses the source network address translation feature that • translates source IP addresses of data packets into another IP address. Generally, this feature is used for data packets sent to the Internet through the router.
Page 55
address. Generally, this feature is used for data packets sent to the private network through the router. 1:1NAT: uses one-to-one IP address translation. • Source Network (available when the action is set to SNAT or DNAT): • Inside: translates private IP addresses. •...
4.6. Edge Computing 4.6.1. Python Edge Computing 4.6.1.1. Install and run Python App To install and run Python App (App for short) in IG502, please refer to the following process, this document takes Device Supervisor as an example: ⚫ Step 1: Install the App Before installing the App, you need to ensure that the Python Edge Computing Engine is enabled and the Python SDK is installed, as shown in the following figure:...
Page 57
After importing, you can view the imported Apps, as shown in the following figure: ⚫ Step 2: Run the App Select enable App and click Submit.
Page 58
Once enabled, the App automatically runs and will run every time the IG502 is started.
Page 59
4.6.1.2. Update Configuration File for App If the installed App supports importing configuration files to modify the running mode, you can update the App running configuration by referring to the following process: ⚫ Step 1: Choose Edge Computing > Python Edge Computing, click the Import Configuration button and select the configuration file to be imported, then click Confirm.
Page 60
⚫ Step 2: Restart the App after the import is successful. After the App restarts, it will runing according to the imported configuration file.
Page 61
4.6.1.3. Update Python App version Generally, if you need to update the Python App version, you only need to import the new version of the App on the Edge Computing > Python Edge Computing page.
Page 62
After the update is completed, as shown below:...
Page 63
4.6.1.4. Enable the Debug Mode To run and debug Python code on IG502, you need to enable IG502's debug mode. Choose Edge Computing > Python Edge Computing, select Enable Debug Mode. After enabling, you can develop IG502 through VS Code. How to use VS Code for Python development of IG502, please refer to Quick Start for MobiusPi Python Development.
Page 64
After the debugging mode is enabled, IG502 will start an SSH server to listen on port 22 of LAN (default IP address being 192.168.2.1). The user name and password of the SSH server are displayed on the previous web page. A random password is generated every time the debugging mode is enabled or the IG502 is restarted to ensure security.
4.6.2. IO Module The procedure for configuring I/O and obtaining I/O status data is as follows: Step 1: configure the I/O functions Choose "Edge Computing > IO Module > Configuration" and configure the I/O functions based on the site requirements. The following figures show a configuration example. Digital input...
Page 66
Pulse counting The starting value is 0. After power down, the value counted by the power down is retained.
Page 67
Digital output Pulse output According to the frequency of 5000 Hz, the duty cycle is 50% for the pulse output.
Page 68
Step 2 (optional): Set the pulse counting and pulse output. After setting DI to the pulse counting, click Start to count the pulses received by the DI. Otherwise, do not count it. Click Reset to reset the count value to the starting value.
Page 69
After setting DO to the pulse counting, click Start to output pulses based on the specified output frequency. Otherwise, do not output pulses. Step 3: Set Modbus TCP Slave. Turn on the Enable switch to enable the Modbus TCP Slave function. This function allows Modbus TCP Master to read the I/O status of IG502.
Page 70
Step 4: Read the I/O status through Modbus TCP. Use Device Supervisor to read the I/O status of IG502 in Step 3 as an example. First, add a Modbus TCP controller and set the controller communication parameters based on Modbus TCP Slave. Then, configure the data to be collected according to the Modbus mapping table.
After the configuration is completed, you can obtain DI0 Counter Value. 4.7. System 4.7.1. System Time...
Page 73
To enable the IG502 to cooperate with other devices properly, you may need to set an accurate system time for it. For this purpose, set the system time on the System Time page and enable the NTP protocol to implement clock synchronization among all clock- supporting devices on the network.
1. Choose System > System Time to display the System Time page. 2. The IG502 can obtain the time of the PC as its local time. 3. Click Sync next to the Device Time field. Method 4: Enable SNTP clients. 1.
Page 75
Choose System > Configuration Management to display the Configuration Management page. On this page, you can back up configuration parameters, import parameter settings, and restore factory settings of the IG502. These functions are described as follows: Configuration Management • Auto Save: enables or disables automatic saving of modified •...
IG502 batch upgrade, helping users to conveniently and efficiently manage IG502 and field devices. In order to enable the InHand Cloud to remotely manage the IG502 and field devices, the IG502 needs to be connected to the cloud platform. The connection method is...
Page 77
Choose System Management > InHand Cloud, tick Enable InHand Cloud and configure the corresponding server address and registered account, and click Submit after the configuration is complete. The InHand Connect Service platform mainly provides users with remote maintenance channels, and the InHand Device Manager platform mainly provides users with gateway management services (such as batch remote upgrades, etc.).
Page 78
After the IG502 is successfully connected to the InHand Device Manager, the status is described as Connection Accepted.
4.7.5. Firmware Upgrade Firmware Upgrade You can upgrade the firmware version for the IG502 on the page, so that the IG502 can provide new functions or better user experiences. Follow these steps to upgrade the firmware version: System > Firmware Upgrade Firmware 1.
4.7.6. Access Tools To facilitate IG502 management and configuration, you can configure the IG502 Access Tools management and access methods on the page. Follow these steps to complete the configuration: Configure HTTPS • System > Access Tools Access 1. Choose to display the Tools page.
Page 81
Enable SSH 2. Select and set the parameters. For details about these parameters, see SSH parameter description. Submit 3. Click to apply the configuration. The following figure shows the configuration of HTTPS-based management. The HTTPS parameters are described as follows: 1.
Page 82
4. Remote Control: enables or disables remote access to the IG502 through HTTPS. If no remote control network is specified, the IG502 can be remotely controlled through any network. The following figure shows the configuration of Telnet-based management. The Telnet parameters are described as follows: 1.
The SSH parameters are described as follows: 1. Listen IP Address: specifies the listening IP address. Options include Any, 127.0.0.1, and other IP addresses. 2. Port: specifies the listening port number of SSH. 3. Timeout: specifies the SSH timeout period. The valid value range is 0-120. 4.
User Management On the page, you can add user accounts and manage the password and access rights of each account. These accounts allow multiple users to access and manage the IG502. Follow these steps to add a user: System > User Management User 1.
4.7.9. Network Tools System > Network Tools Network Choose to display the Tools page. You can diagnose network problems of the IG502 on this page. You can enter some extension options in the Expert Options area. For example, expert option -t for the ping tool enables the IG502 to ping a specified host continuously until you stop the ping.The ping tool can be used to check whether a network is reachable.
Page 86
The traceroute tool can be used to determine the route used to transmit IP datagrams to a destination. The following figure shows the configuration of a traceroute test. The Tcpdump tool can be used to capture packets transmitted on a specified interface.
4.7.10. 3rd Party Notification Choose System > 3rd Party Notification to display the 3rd Party Notification page. You can view the statement about the third-party software used for the IG502. 4.8. Advanced 4.8.1. Administration 4.8.1.1 System On this page, you can view the system status and network status (including the firmware version, MAC address, system time, and start time of the gateway), specify the language of the web pages, and set a host name for the gateway.
4.8.2. Services 4.8.2.1. DDNS The DDNS parameters are described as follows: Method Name : specifies the name Service Type : specifies the type of the software Dynamic Domain Name Service Disable ⚫ DynAccess...
Page 89
⚫ QDNS(3322)-Dynamic ⚫ QDNS(3322)-Static ⚫ DynDNS-Dynamic ⚫ DynDNS-Static Url : the address of a web page on the world wide web Username : Registered username for DDNS Password : Registered password for DDNS Hostname : Registered hostname for DDNS 4.8.2.2. Data Usage Monitoring: enables the monitoring usage...
Daily Limit: specifies the maximum daily flow , which is expressed in KB/MB/GM. Start Hour: 0~23 When Over Daily Limit: which can be Only Reporting or Stop Forward or Shutdown Interface Monthly Limit: specifies the maximum monthly flow , which is expressed in MB/GM. Start Day:1~31 When Over Monthly Limit : which can be Only Reporting or Stop Forward or Shutdown Interface...
Page 91
• SHA1: generates a 160-bit message digest for a message of a length less than 128 bits. • SHA2-256: generates a 256-bit message digest. • SHA2-384: generates a 384-bit message digest. • SHA2-512: generates a 512-bit message digest. Diffie-Hellman Group: specifies the Diffie-Hellman algorithm, an open key algorithm.
Page 92
calculate a shared key. Other parties (such as hackers) cannot calculate the key even if they intercept all the data exchanged for key calculation. Lifetime: specifies the lifetime of the IKE SA. The two parties negotiate another SA to replace the old one before the lifetime expires. •...
Page 93
• Transport Mode: inserts an IPsec header (AH or ESP) between the IP header and upper-layer protocol header. This mode retains the original IP header but changes the IP protocol field to AH or ESP, and calculates a new checksum for the IP header.
Page 94
IKE Advance (Phase 1) Local ID: specifies the type of the local device’s identifier for IKE negotiation. ▪ • IP Address: specifies the peer IP address used to establish the IPsec interface. • FQDN: specifies the character string used as the identifier of the local device. •...
Page 95
IPsec SA Lifetime: specifies the duration in which the IPsec SA is alive. When ▪ the two ends perform IPsec negotiation to establish an SA, the smaller value between the lifetime values set on the local and peer devices takes effect. IPsec SA Idletime: specifies the maximum idle duration of an IPsec SA.
Page 96
• ICMP Detection Timeout: specifies the timeout period of an ICMP probe. If the local device does not receive any ICMP Reply packet within this period, it considers that the ICMP probe times out. • ICMP Detection Max Retries: specifies the maximum number of retries after an ICMP probe failure.
Page 97
multiple access (NBMA) subnet to determine the next-hop IP address and NBMA subnet address toward the destination station. • NHS IP Address: specifies the next-hop server address. • Authentication Key: specifies the NHRP authentication key. • Hold Time: The valid value range is 1-65535. •...
Page 98
network through its socket, it processes the data and sends the data to the virtual NIC. The application software then receives the data. At this time, a unidirectional transmission process is completed. The reverse transmission process is similar. OpenVPN Client The parameters of an OpenVPN client are described as follows: Enable: enables or disables the OpenVPN client.
Page 99
Source Interface: specifies the interface used to establish the • OpenVPN tunnel. Interface Type: specifies the type of data sent from the interface. • Tun: mostly used for IP-based communication. • Tap: allows complete Ethernet frames to pass through the •...
Page 100
subnet mask of the virtual NIC is used as the peer IP address. Cipher: specifies the protocol used to encrypt the data transmitted over the OpenVPN tunnel. The setting must be the same on the client and server. HMAC: specifies the authentication method used for data transmitted over the OpenVPN tunnel.
Page 101
Link Detection Timeout: specifies the timeout period of OpenVPN link detection. After the number of link detection failures reaches the maximum value, the local device initiates a new L2TP connection. The valid value range is 60-3600. MTU: specifies the maximum transmit unit on the OpenVPN interface, which is expressed in bytes.
Page 102
◆ Local IP Address: specifies the virtual IP address of the OpenVPN server interface. ◆ Remote IP Address: specifies the virtual IP address of the OpenVPN client. ◆ Description: specifies the description of the OpenVPN tunnel. Show Advanced Options: enables or disables display of advanced options.
Page 103
Cipher: specifies the protocol used to encrypt the data transmitted ⚫ over the OpenVPN tunnel. The setting must be the same on the client and server. HMAC: specifies the authentication method used for data transmitted ⚫ over the OpenVPN tunnel. Data cannot be transmitted if the authentication fails.
Page 104
⚫ Enable Debug: enables or disables debugging logs. ⚫ Expert Configuration: specifies OpenVPN extension parameters. ⚫ Username/Password: specifies the user name and password used for server access when password authentication is used. 4.8.3.4. Certificate Management The Simple Certificate Enrollment Protocol (SCEP) is a certificate management protocol formulated jointly by Cisco and Verisign.
Page 105
Protect Key Confirm: Enter the protection key again to confirm the key. • Strict CA: sets the ID of a trusted CA. The certificate of a device is enrolled and • issued by a trusted CA. Therefore, you must specify the ID of a trusted CA to bind the device to the CA.
Page 106
Challenge: specifies the challenge code of the certificate, which is required for • certificate revocation (optional). Challenge Confirm: Enter the challenge code again to confirm the setting. • Unstructured address: specifies the IP address of the certificate. • RSA Key Length: specifies the length of the RSA key. The valid value range is •...
5. FAQ How Do I Restore Factory Settings Through Hardware? Follow these steps: 1. Find the RESET button on the operation panel. 2. Hold down the RESET button within 10s after the device is powered on. 3. When the ERR indicator turns red, release the RESET button. 4.
Need help?
Do you have a question about the InGateway502 and is the answer not in the manual?
Questions and answers