Teltonika RUT950 LTE User Manual
Hide thumbs Also See for RUT950 LTE:
Table of Contents

Advertisement

USER MANUAL
1

Advertisement

Table of Contents
loading

Summary of Contents for Teltonika RUT950 LTE

  • Page 1 USER MANUAL...
  • Page 2: Legal Notice

    Copyright © 2014 TELTONIKA Ltd. All rights reserved. Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the prior written permission of TELTONIKA Ltd is prohibited. The manufacturer reserves the right to modify the product and manual for the purpose of technical improvement without prior notice.
  • Page 3: Table Of Contents

    Table of Contents Legal notice ................................2 Attention.................................. 2 SAFETY INFORMATION ............................7 Device connection ............................... 8 Introduction ..............................9 Specifications ............................. 9 1.1.1 LTE ..............................9 1.1.2 UMTS ..............................9 1.1.3 GSM/GPRS/EDGE ..........................9 1.1.4 Ethernet ............................. 9 1.1.5 Wi-Fi ..............................
  • Page 4 5.7.1 All ..............................30 5.7.2 Authentication ..........................30 5.7.3 Reboot .............................. 31 5.7.4 Safemode ............................31 Network ............................... 32 Mobile ..............................32 6.1.1 General ............................. 32 6.1.2 SIM Management ..........................34 6.1.3 Network Operators .......................... 35 6.1.4 Mobile Data Limit..........................35 WAN .................................
  • Page 5 7.4.2 TRAP Settings ........................... 64 VPN ................................65 7.5.1 OpenVPN ............................65 7.5.2 IPSec ..............................67 7.5.3 GRE Tunnel ............................70 7.5.4 PPTP ..............................71 7.5.5 L2TP ..............................71 7.5.6 Dynamic DNS ............................ 72 SMS Utilities ............................. 74 7.6.1 SMS Utilities ............................. 74 7.6.2 Call Utilities ............................
  • Page 6 Reboot ..............................92 Functionality not listed in menu ........................93 SMS by HTTP POST/GET ........................... 93 9.1.1 Syntax of HTTP POST/GET string ...................... 93 9.1.2 Parameters of HTTP POST/GET string ....................93 9.1.3 Possible responses after command execution ................93 9.1.4 HTTP POST/GET string examples .....................
  • Page 7: Safety Information

    SAFETY INFORMATION In this document you will be introduced on how to use a RUT950 router safely. We suggest you to adhere to the following recommendations in order to avoid personal injuries and or property damage. You have to be familiar with the safety requirements before using the device! To avoid burning and voltage caused traumas, of the personnel working with the device, please follow these safety requirements.
  • Page 8: Device Connection

    Device connection...
  • Page 9: Introduction

    1 Introduction Thank you for purchasing a RUT950 LTE router! RUT950 is part of the RUT9xx series of compact mobile routers with high speed wireless and Ethernet connections. This router is ideal for people who‘d like to share their internet on the go, as it is not restricted by a cumbersome cable connection.
  • Page 10: Hardware

    1.1.6 Hardware  High performance 560 MHz CPU with 128 Mbytes of DDR2 memory  5.5/2.5mm DC power socket  Reset/restore to default button  2 x SMA for LTE , 2 x RP-SMA for Wi-Fi antenna connectors  4 x Ethernet LEDs, 1 x Power LED ...
  • Page 11: Applications

    1.1.9 Applications...
  • Page 12: Setting Up Your Router

    2 Setting up your router 2.1 Installation After you unpack the box, follow the steps, documented below, in order to properly connect the device. For better Wi-Fi performance, put the device in clearly visible spot, as obstacles such as walls and door hinder the signal. 1.
  • Page 13: Logging In

    2.2 Logging in After you’re complete with the setting up as described in the section above, you are ready to start logging into your router and start configuring it. This example shows how to connect on Windows 7. On windows Vista: click Start -> Control Panel ->...
  • Page 14 5. Select Internet Protocol Version 4 (TCP/IPv4) and then click 6. By default the router is going to have DHCP enabled, which means that if you select “Obtain an IP address automatically” Properties and “Obtain DNS server address automatically”, the router should lease you an IP and you should be ready to login.
  • Page 15 Right click on the Wireless network icon and select Connect / Disconnect. A list should pop up with all available wireless networks. Select “Teltonika” and click connect. Then we launch our favorite browser and enter the routers IP into the address field: Press enter.
  • Page 16: Operation Modes

    3 Operation Modes The RUT9xx series router supports various operation modes. It can be connected to the internet (WAN) via mobile, standard Ethernet cable or via a wireless network. If you connect to the internet via an Ethernet cable of Wi-Fi, you may also backup your connection with mobile for added stability.
  • Page 17: Powering The Device From Higher Voltage

    If you want to use high voltage power supplies it is recommended to also use additional safety equipment to suppress voltage peaks from power supply. One of the options is to use “Teltonika” PR1000 overvoltage protection device conforming ISO 7637-2.
  • Page 18: Status

    Teltonika Indicates how router will be seen by other devices on the network. Can be changed in System -> Administration. 3. Router Model Teltonika RUT9xx Routers model. 4. Firmware RUT9XX_T_00.00.372 Shows the version of the firmware that is currently loaded in the router.
  • Page 19: Network Information

    Memory explanation: Field Name Sample Value Explanation 1. Free 94532 kB / 126452 kB The amount of memory that is completely free. Should this rapidly (74%) decrease or get close to 0, it would indicate that the router is running out of memory, which could cause crashes and unexpected reboots.
  • Page 20 5.2.1.2 WAN Displays information about WAN connection. WAN information: Field Name Sample Value Explanation Interface Wired Specifies through what medium the router is connecting to the internet. This can either be Wired, Mobile or Wi-Fi. Type DHCP Specifies the type of connection. This can either be static or DHCP. IP address 192.168.99.199 The IP address that the routers uses to connect the internet.
  • Page 21 5.2.1.3 LAN LAN information: Field Name Sample Value Explanation 1. IP address 192.168.1.1 Address that the router uses on the LAN network. 2. Netmask 255.255.255.0 Indicates the networks netmask. 3. Connected 1h 6m 14s How long LAN has been successfully maintained. DHCP Leases If you have enabled a DHCP server this field will show how many devices have received an IP address and what those IP addresses are.
  • Page 22 5.2.1.4 Wireless Wireless can work in two modes, Access Point (AP) or Station (STA). AP is when the wireless radio is used to create an Access Point that other devices can connect to. STA is when the radio is used to connect to an Access Point via WAN.
  • Page 23 5.2.1.4.2 Access Point Wireless AP information Field Name Sample Value Explanation 1. SSID Teltonika_Router_Test The SSID that is being broadcast. Other devices will see this and will be able to use to connect to your wireless network. 2. Mode Access Point (AP) Connection mode –...
  • Page 24 5.2.1.5 Associated Stations Outputs a list of all devices and their MAC addresses that are maintain a connection with your router right now. This can either be the information of the Access Point that the router is connecting to in STA mode or a list of all devices that are connecting to the router in AP mode: Field Name Sample Value...
  • Page 25 5.2.1.7 OpenVPN Server Field Name Sample Value Explanation 1. Status Enabled OpenVPN status 2. Type Client A type of OpenVPN instance that has been created 3. IP Remote virtual network's IP address 4. Mask Remote virtual network's subnet mask 5. Time 4h 23m 15s For how long the connection has been established 5.2.1.8 Client information...
  • Page 26: Device Information

    5.3 Device information The page displays factory information that was written into the device during manufacturing process Field Name Sample Value Explanation 1. Serial number 12345678 Serial number of the device 2. Product code RUT950101000 Product code of the device 3.
  • Page 27: Routes

    5.5 Routes The page displays ARP table active IP routes of the device 5.5.1 ARP Shows the routers active ARP table. An ARP table contains recently cached MAC addresses of every immediate device that was communicating with the router. Field Name Sample Value Explanation 1.
  • Page 28: Active Ip-Routes

    5.5.2 Active IP-Routes Shows the routers routing table. The routing table indicates where a TCP/IP packet, with a specific IP address, should be directed to. Field Name Sample Value Explanation 1. Network Interface to be used to transmit TCP/IP packets through 2.
  • Page 29: Traffic

    5.6.1 Traffic Field Name Explanation 1. Load This tri-graph illustrates average system load over the course of ~3 minutes; each new measurement is taken every 3 seconds. The graph consists out of three color coded graphs, each one corresponding to the average system load over 1 (red), 5 (orange) and 15 (yellow) most recent minutes.
  • Page 30: Events Log

    5.7 Events Log Event log displays such actions as: login, reboot, firmware flashing and reset. 5.7.1 All 5.7.2 Authentication...
  • Page 31: Reboot

    5.7.3 Reboot 5.7.4 Safemode...
  • Page 32: Mobile Configuration

    6 Network 6.1 Mobile 6.1.1 General 6.1.1.1 Mobile configuration Here you can configure the mobile specific settings which are used when connecting to your local 3G/LTE network. Field Name Sample value Explanation Mobile Use PPPD mode/Use PPPD mode uses dialling number to establish data connection. connection NDIS mode/Use bridge NDIS mode (default) does not use dialling and PPP protocol to establish...
  • Page 33 Username “username” Your username and password that you would use to connect to your carriers network. These field become available when you select an authentication method (i.e. authentication method is not “none”). These fields are always enabled on the alternate model. Password “password”...
  • Page 34: Sim Management

    6.1.2 SIM Management Field name Possible values Explanation Primary SIM card SIM 1 / SIM 2 SIM card that will be used in the system as a primary SIM card Enable automatic Enable/Disable Automatically switch between primary and secondary SIM cards based switching on the various rules and criterions defined below On weak signal...
  • Page 35: Network Operators

    (min) should occur 13. Subsequent A subsequent timeout value in minutes after which a SIM card's switch- timeout (min) back should occur. This value is increased every time an unsuccessful switch-back is made: new_timeout = old_timeout + subsequent_timeout 14. Subsequent A subsequent timeout value in minutes after which a SIM card's switch- timeout (min) back should occur.
  • Page 36 6.1.4.1 Data Connection Limit Configuration Field Name Sample value Explanation 1. Enable data Enable/Disable Disables mobile data when a limit for current period is reached connection limit 2. Data limit (MB) Disable mobile data after limit value in MB is reached 3.
  • Page 37: Wan

    6.2 WAN 6.2.1 Operation Mode Type Explanation 1. Wired An Ethernet cable connected to the WAN port of the router. 2. Wi-Fi The router will be able to connect to a local wireless access point and reach the internet through it. 3.
  • Page 38 6.2.2.1 General Setup 6.2.2.1.1 Static: This is the configuration setup for when you select the static protocol. Filed name Sample Explanation 1. IPv4 address 192.168.99.162 Your routers address on the WAN network 2. IPv4 netmask 255.255.255.0 A mask used to define how “large” the WAN network is 3.
  • Page 39 When you select the DHCP protocol you can use it as is, because most networks will not require any additional advanced configuration. 6.2.2.1.3 PPPoE This protocol is mainly used by DSL providers: This is the configuration setup for when you select PPPoE protocol. Filed name Sample Explanation...
  • Page 40 Field name Sample value Explanation 1. Disable NAT On/Off Toggle NAT on and off. Override MAC address 86:48:71:B7:E9:E4 Override MAC address of the WAN interface. If your ISP gives you a static IP address it might also bind it to your computers MAC address (i.e.
  • Page 41 6.2.2.2.3 PPPoE Field name Sample value Explanation 1. Disable NAT Enable/Disable If checked, router will not perform NAT (masquerade) on this interface Use default gateway Enable/Disable If unchecked, no default route is configured 3. Use gateway metric 4. Use DNS servers Enable/Disable If unchecked, the advertised DNS server addresses are ignored advertised by peer...
  • Page 42: Lan

    As you can see, the configuration is very similar to the static protocol; only in the example a 99th subnet is defined. Now if some device has an IP in the 99 subnet (192.168.99.xxx) and the subnets gateway metric is “higher” and the device is trying to reach the internet it will reroute it’s traffic not to the gateway that is defined in common configurations but through the one that is specified in IP aliases.
  • Page 43: Dhcp Server

    6.3.1.2 Advanced settings Field name Sample value Explanation 1. Enable LAN interface Enable/Disable Use custom DNS servers 8.8.8.8 Multiple DNS servers can be entered by clicking new entry button near a text input field 3. Override MTU 1500 MTU (Maximum Transmission Unit) specifies the largest possible size of a data packet 4.
  • Page 44: Wireless

    6.3.2.2 Advanced settings You can also define some advanced options that specify how the DHCP server will operate on your LAN network. Field Name Sample Value Explanation 1. Dynamic DHCP Checked/Unchecked Dynamically allocate client addresses, if set to only clients present in ethers files are served 2.
  • Page 45 Here you can toggle the availability of the wireless radio and the physical channel frequency. Important note: As seen in the picture you should always Save before toggling the radio on and off. ESSID – Your wireless networks identification string. This is the name of your Wi-Fi network. When other Wi-Fi capable computers or devices scan the area for Wi-Fi networks they will see your network with this name.
  • Page 46 6.4.1.2 Interface 6.4.1.2.1 Security Encryption – There are many modes of encryption, a distinctive class is pointed out below. First select an encryption method: TKIP, CCMP, TKIP&CCMP and auto. Note: Some authentication methods won’t support TKIP (and TKIP&CCMP) encryption. After you’ve selected your encryption method, you should enter your passphrase, which must be at least 8 characters long.
  • Page 47: Backup Wan

    6.4.1.3 Client RUT9xx can work as a Wi-Fi client (check 6.5 Chapter of this manual). Client mode is nearly identical to AP, except for the fact that most for the options are dictated by the wireless access point that the router is connecting to. Changing them can result in an interrupted connection to an AP.
  • Page 48 3. Health monitor ICMP host(s) Disable/DNS/WAN Where to Ping for a health check. As there is no GW/Custom definitive way to determine when the connection to internet is down for good, you’ll have to define a host whose availability that of the internet as a whole.
  • Page 49: Firewall

    6.6 Firewall In this section we will look over the various firewall features that come with RUT950. 6.6.1 General Settings The routers firewall is a standard Linux iptables package, which uses routing chains and policies to facilitate control over inbound and outbound traffic. Field Name Sample value Explanation...
  • Page 50: Dmz

    6.6.2 DMZ By enabling DMZ for a specific internal host (for e.g.: your computer), you will expose that host and its services to the routers WAN network (i.e. - internet). 6.6.3 Port Forwarding Here you can define your own port forwarding rules. You can use port forwarding to set up servers and services on local LAN machines.
  • Page 51 When you click edit you can fine tune a rule to near perfection, if you should desire that. Field Name Sample value Explanation Name “localWebsite” Name of the rule. Used purely to make it easier to manage rules. Protocol TCP/UDP/TCP+ You may specify multiple by selecting (custom) and then UDP/ICMP/Custom entering protocols separated by space...
  • Page 52: Traffic Rules

    External port 12345 Match incoming traffic directed at the given destination port or port range on this host only 10. Internal zone LAN/VPN/WAN Redirect matched incoming traffic to the specified internal zone 11. Internal IP address 192.168.1.109 Redirect matched incoming traffic to the specified internal host 12.
  • Page 53 Field Name Sample value Explanation Name “Allow-DHCP-Relay” Used to make rule management easier Restrict to address IPv4-only Match traffic from selected address family only family Protocol TCP/UDP/Any/ICMP/Custom Protocol of the packet that is being matched against traffic rules. Match ICMP type Match traffic with selected ICMP type only Source zone Any zone/LAN/VPN/WAN...
  • Page 54 port or port range on the client host only Destination zone Device/Any Match forwarded traffic to the given destination zone zone/LAN/VPN/WAN only 10. Destination address Match forwarded traffic to the given destination IP address or IP range only 11. Destination port Match forwarded traffic to the given destination port or port range only 12.
  • Page 55 6.6.4.3 Source NAT Field Name Sample value Explanation 1. Name Forward_rule_new Used to make rule management easier 2. Protocol TCP/UDP/Any/ICMP/Custom Protocol of the packet that is being matched against traffic rules. 3. Source LAN/VPN/WAN Match incoming traffic from selected address family only 4.
  • Page 56 Field Name Sample value Explanation Name “Allow-DHCP-Relay” Used to make rule management easier Protocol TCP/UDP/Any/ICMP/Custom Protocol of the packet that is being matched against traffic rules. Source zone LAN/VPN/WAN Match incoming traffic from this zone only Source MAC address Match incoming traffic from these MACs only Source address Match incoming traffic from this IP or range only Source port...
  • Page 57: Custom Rules

    Destination port Match forwarded traffic to the given destination port or port range only 10. SNAT IP address “10.101.1.10” Rewrite matched traffic to the given IP address 11. SNAT port “22” Rewrite matched traffic to the given source port. May be left empty to only rewrite the IP address' 12.
  • Page 58: Static Routes

    6.7 Static Routes Static routes provide a way of entering custom entries in the internal routing table of the router. Field name Value Explanation 1. Interface LAN/WAN/PPP/WAN2 The zone where the ‘Target’ resides 2. Target IP address The source of the traffic. 3.
  • Page 59: Services

    7 Services 7.1 VRRP 7.1.1 LAN/WAN Settings Field name Sample Explanation 1. Enable Enable/Disable Enable VRRP (Virtual Router Redundancy Protocol) for LAN 2. IP address 192.168.1.253 Virtual IP address for LAN's VRRP (Virtual Router Redundancy Protocol) cluster 3. Virtual ID Routers with same IDs will be grouped in the same VRRP (Virtual Router Redundancy Protocol) cluster 4.
  • Page 60: Web Filter

    Field name Sample Explanation 1. Enable Enable/Disable Enable WAN's connection monitoring 2. Ping IP address 8.8.4.4 A host to send ICMP (Internet Control Message Protocol) packets to 3. Ping interval Time interval in minutes between two Pings 4. Ping timeout (sec) Response timeout value, interval [1 - 9999] 5.
  • Page 61: Proxy Based Url Content Blocker

    7.2.2 Proxy based URL content blocker Field name Sample Explanation 1. Enable Enable/Disable Enable proxy server based URL content blocking. Works with HTTP protocol only 2. Mode Whitelist/Blacklist Whitelist - allow every part of URL on the list and block everything else. Blacklist - block every part of URL on the list and allow everything else 3.
  • Page 62: Ntp

    7.3 NTP NTP configuration lets you setup and synchronize routers time. Field name Description Notes 1. Current System time Local time of router. 2. Time zone Time zone of your country. 3. Enable NTP Enables the functionality 4. Update interval How often router updates systems time 5.
  • Page 63: Snmp

    7.4 SNMP SNMP settings window allows you to remotely monitor and send GSM event information to the server. 7.4.1 SNMP Settings Field name Sample Explanation 1. Enable SNMP service Enable/Disable Run SNMP (Simple Network Management Protocol) service on system's start up 2.
  • Page 64: Trap Settings

    10. 1.3.6.1.4.1.99999.1.1.10 Signal level 11. 1.3.6.1.4.1.99999.1.1.11 Operator currently in use 12. 1.3.6.1.4.1.99999.1.1.12 Operator number (MCC+MNC) 13. 1.3.6.1.4.1.99999.1.1.13 Data session connection state 14. 1.3.6.1.4.1.99999.1.1.14 Data session connection type 15. 1.3.6.1.4.1.99999.1.1.15 Signal strength trap 16. 1.3.6.1.4.1.99999.1.1.16 Connection type trap 7.4.2 TRAP Settings Field name Sample Explanation...
  • Page 65: Vpn

    7.5 VPN 7.5.1 OpenVPN VPN (Virtual Private Network) is a method for secure data transfer through unsafe public network. This section explains how to configure OpenVPN, which is implementation of VPN supported by the RUT950 router. A picture below demonstrates default OpenVPN configurations list, which is empty, so you have to define a new configuration to establish any sort of OpenVPN connection.
  • Page 66 You can set custom settings here according to your VPN needs. Below is summary of parameters available to set: Field name Explanation Enabled Switches configuration on and off. This must be selected to make configuration active. TUN/TAP Selects virtual VPN interface type. TUN is most often used in typical IP-level VPN connections, however, TAP is required to some Ethernet bridging configurations.
  • Page 67: Ipsec

    Remote host IP IP address of OpenVPN server (applicable only for client configuration). address Resolve Retry Sets time in seconds to try resolving server hostname periodically in case of first resolve failure before generating service exception. Keep alive Defines two time intervals: one is used to periodically send ICMP request to OpenVPN server, and another one defines a time window, which is used to restart OpenVPN service, if no ICPM request is received during the window time slice.
  • Page 68 Field name Explanation Enable IPSec Check box to enable IPSec. IPSec key exchange mode Automatic Key exchange. Enable NAT traversal Enable this function if client-to-client applications will be used. Enable initial contact Enable this to send an INITIAL-CONTACT message. Peers identifier type Choose “fqdn”...
  • Page 69 Phase 1 and Phase 2 must be configured accordingly to the IPSec server configuration, thus algorithms, authentication and lifetimes of each phase must be identical. Remote Network Secure Group – Set the remote network (Secure Policy Database) information. It must be LAN network of remote IPSec host.
  • Page 70: Gre Tunnel

    7.5.3 GRE Tunnel GRE (Generic Routing Encapsulation RFC2784) is a solution for tunneling RFC1812 private address-space traffic over an intermediate TCP/IP network such as the Internet. GRE tunneling does not use encryption it simply encapsulates data and sends it over the WAN. In the example network diagram two distant networks LAN1 and LAN2 are connected.
  • Page 71: Pptp

    Field name Explanation 1. Enable GRE Tunnel Check the box to enable the GRE Tunnel function. 2. TTL Specify the fixed time-to-live (TTL) value on tunneled packets [0-255]. The 0 is a special value meaning that packets inherit the TTL value. 3.
  • Page 72: Dynamic Dns

    7.5.6 Dynamic DNS Dynamic DNS (DDNS) is a domain name service allowing to link dynamic IP addresses to static hostname. To start using this feature firstly you should register to DDNS service provider (example list is given in description). You are provided with add/delete buttons to manage and use different DDNS configurations at the same time! You can configure many different DDNS Hostnames in the main DDNS Configuration section.
  • Page 73 Field name Value Explanation 1. Enable Enables current DDNS configuration. 2. Status Timestamp of the last IP check or update. 3. Service 1. dydns.org Your dynamic DNS service provider selected from the list. 2. 3322.org In case your DDNS provider is not present from the ones provided, 3.
  • Page 74: Sms Utilities

    7.6 SMS Utilities RUT950 has extensive amount of various SMS Utilities. These are subdivided into 4 sections: general SMS Utilities, Send SMS, SMS Management and Remote Configuration. 7.6.1 SMS Utilities You can choose your SMS Keyword (text to be sent) and authorized phone number in the main menu. You can edit each created rule by hitting Edit button.
  • Page 75 Field name Explanation Notes Enable SMS Reboot This check box will enable and If you select Get Status, it will send routers status once disable SMS reboot function. it has rebooted and is operational again. For Get Status description see item No. 4 of this table. SMS text SMS text which will reboot SMS text can contain letters, numbers, spaces and...
  • Page 76 Mobile Settings via SMS parameters: Parameter Value(s) Explanation 1. apn= i.e. internet.gprs Sets APN. i.e: apn=internet.gprs 2. dialnumber= i.e. *99***1# Sets dial number 3. auth_mode= none Sets authentication mode chap 4. service= auto You can add as many phone numbers as you need. 3gpreferred Dropdown list with additional rows will show up if you 3gonly...
  • Page 77: Call Utilities

    7.6.2 Call Utilities Allows users to Call the router in order to perform one of the actions: Reboot, Get Status, turn WiFi ON/OFF, turn Mobile data ON/OFF. Only thing that is needed is to call routers SIM card number from allowed phone (user) and RUT950 will perform all actions that are assigned for this particular number.
  • Page 78: Hotspot

    7.6.5.1 Receive configuration This section controls how should configuation initiation party should identify itself. In this scenario RUT950 itself is being configured. Field name Values Notes 1. Authorization method No authorization Method on Receiving and Sending ends must match By serial By administration password 2.
  • Page 79: General Settings

    7.7.1 General settings Field name Explanation Enabled Check this flag to enable hotspot functionality on the router. AP IP Access Point IP address. This will be the address of the router on the hotspot network. The router will automatically create a network according to its own IP and the CIDR number that you specify after the slash.
  • Page 80: Logging

    network of the client Authentication Without radius mode Doesn’t require any RADIUS configuration. Allows simple user connection based on username/password. Hotspot name The name of your hotspot. Will appear on the login screen. Secret Key The secret key used for authenticating with the RADIUS server. Protocol Either HTTP or HTTPs 7.7.2 Logging...
  • Page 81 Field name Explanation 1. Mode The mode of the schedule. Use “Fixed” if you want the uploading to be done on a specific time of the day. Use “Interval” If you want the uploading to be done at fixed interval. 2.
  • Page 82: Landing Page

    7.7.3 Landing Page Field name Explanation 1. Page title Will be seen as landing page title 2. Logo image Logo seen on landing page. 3. Link title You can add an additional link, example yoursite.com 4. Link address Example http://www.yoursite.co 7.8 Auto Reboot 7.8.1 Ping Reboot Ping Reboot function will periodically send Ping command to server and waits for echo receive.
  • Page 83 Field name Explanation Notes 1. Enable This check box will enable or disable Ping reboot Ping Reboot is disabled by feature. default. 2. Reboot router if no echo This check box will disable router rebooting after This check box must be received the defined number of unsuccessful retries.
  • Page 84: Periodic Reboot

    7.8.2 Periodic Reboot Field name Explanation 1. Enable This check box will enable or disable Periodic reboot feature. 2. Days This check box will enable router rebooting at the defined days. 3. Hours, Minutes Uploading will be done on that specific time of the day 8 System 8.1 Configuration Wizard The configuration wizard provides a simple way of quickly configuring the device in order to bring it up to basic...
  • Page 85 Step 2 (Mobile Configuration) Next we have to enter your mobile configuration. On a detailed instruction on how this should be done see the Mobile section under Network Step 3 (LAN) Next, you are given the chance to configure your LAN and DHCP server options. For a detailed explanation see LAN under Network.
  • Page 86 Step 4 (Wi-Fi) The final step allows you to configure your wireless settings in order to set up a rudimentary Access Point. When you’re done with the configuration wizard, press Finish.
  • Page 87: Configuration Profiles

    8.2 Configuration profiles Router can have virtually unlimited number or configuration profiles, which you can later apply either via WebUI or via SMS. When you add New Profile, you save current full configuration of the router. Note: profile names cannot exceed 10 symbols. 8.3 Administration 8.3.1 General...
  • Page 88: Troubleshoot

    Field name Explanation 1. Router name Enter your new router name. 2. Host name Enter your new host name 3. Password Enter your new administration password. Changing this password will change SSH password as well. 4. Confirmation Re-enter your new administration password. 5.
  • Page 89: Backup

    information 6. System Log Provides on-screen System logging information. It does not, however, substitute troubleshooting file that can be downloaded from System -> Backup and Firmware menu. 7. Kernel Log Provides on-screen Kernel logging information. It does not, however, substitute troubleshooting file that can be downloaded from System ->...
  • Page 90: Diagnostics

    Field name Explanation 1. Enable SSH access Check box to enable SSH access functionality. 2. Remote SSH access If check box is selected – user can access the router via SSH from outside (WAN). 3. Port Port to listen for SSH access. 4.
  • Page 91: Mac Clone

    8.3.6 MAC Clone Field name Explanation 1. WAN MAC address Enter new WAN MAC address. 2. Wireless MAC address Enter new Wireless MAC address. 8.4 User scripts Advanced users can insert their own commands to execute at the end of the boot process. 8.5 Safe mode Router contains two firmware images in its internal flash memory.
  • Page 92: Firmware

    8.6 Firmware Keep settings – when check box is selected router will keep saved user configuration settings after firmware upgrade. When check box is not selected all router settings will be restored to factory defaults after firmware upgrade. When upgrading firmware, you can choose settings that you wish to keep after the upgrade. This function is useful when firmware is being upgraded via Internet (remotely) and you must not lose connection to the router afterwards.
  • Page 93: Functionality Not Listed In Menu

    9 Functionality not listed in menu 9.1 SMS by HTTP POST/GET It is possible to read and send SMS by using valid HTTP POST/GET syntax. Use web browser or any other compatible software to submit HTTP POST/GET string to router. Router must be connected to GSM network when using “SMS send”...
  • Page 94: Device Recovery

    The following section describes available option for recovery of malfunctioning device. Usually device can become unreachable due to power failure during firmware upgrade or if core files were wrongly modified in the file system. Teltonika’s router does offer several ways to recover from these situations 10.1 Reset button Reset button is located on the back panel of the device.
  • Page 95: Glossary

    Manually. Bootloader’s webserver can be requested by holding reset button for 3 seconds while powering the device on. Flashing all 4 Ethernet LEDs indicate that bootloader’s webserver has started. Bootloader’s WebUI can be accessed by typing this address in the web browser: http://192.168.1.1/index.html Note: it may be necessary to clear web browser’s cache and to use incognito/anonymous window to access bootloader’s WebUI...
  • Page 96 BOOTP – Bootstrap Protocol – an internet protocol that enables a diskless workstation to discover its own IP address, the IP address of a BOOTP server on the network, and a file to be loaded into memory to boot the machine. This enables the workstation to boot without requiring a hard or floppy disk drive.

Table of Contents