5G ODU12 Product User Manual

5G ODU12 Product User Manual

Declaration

Thank you for choosing our company's product! Before use, please carefully read this user manual. By complying with the following statements, you will help maintain intellectual property rights and legal compliance, ensuring that your user experience aligns with the latest product information. If you have any questions or need written permission, please feel free to contact our technical support team.

  1. Copyright Statement

This user manual contains copyrighted content, and the copyright belongs to InHand Networks Technology and its licensors. Without written permission, no organization or individual may excerpt, copy any part of the content of this manual, or distribute it in any form.

  1. Disclaimer

Due to ongoing updates in product technology and specifications, the company cannot guarantee that the information in the user manual is entirely consistent with the actual product. Therefore, no disputes arising from any discrepancies between the actual technical parameters and the user manual are accepted. Any changes to the product will not be notified in advance, and the company reserves the right to make the final changes and interpretations.

  1. Copyright Information

The content of this user manual is protected by copyright laws, and the copyright belongs to InHand Networks and its licensors, reserving all rights. Without written permission, the content of this manual may not be used, copied, or distributed without authorization.


Conventions

Symbol

Indication

   ‘’

Button name, for example, click ‘ Save’  button. 

“”

Indicates a window name or menu name, for example, the pop-up window “New User”.

>>

A multi-level menu is separated by the double brackets “>>”. For example, the multi-level menu File >> New >> Folder indicates the menu item [Folder] under the sub-menu [New], which is under the menu [File]. 

Cautions

Please be careful of the content under Cautions, improper action may result in loss of data or device damage.

Note

Note contains detailed descriptions and helpful suggestions.


Technical Support

Email: support@inhandnetworks.com

URL: www.inhand.com


1. Overview

ODU12 is an innovative outdoor 5G router and a cloud-managed, high-performance network access device, built upon a pioneering “structure–thermal integration” design concept. It seamlessly combines high-performance connectivity with architectural aesthetics, and is purpose-built for residential and light commercial applications. The product integrates advanced features—including 5G NSA/SA dual-mode cellular connectivity, dual-band Wi-Fi 7, and 2.5 Gbps wired networking—within a compact enclosure rated at IP67.
ODU12 departs from the bulky form factor and exposed external antennas typical of conventional outdoor routers. It adopts a minimalist all-in-one design with a fully integrated 360° omnidirectional antenna system. This ensures reliable performance even under extreme weather conditions, while minimizing visual impact and blending harmoniously into the architectural environment.
ODU12 is a truly AI agent–native router, engineered for the future of digital work.

Fig. 1 Application case

2. Hardware

2.1 Indicator Description

LED

status and definition

System

Off --- Power off

Steady in red --- System starting

Blink in red --- System error

Steady in green --- System working

Blink in blue --- System Upgrading

Wi-Fi

Off --- Wi-Fi disable

Blink in green --- Wi-Fi driver loading

Steady in green --- AP working

Cellular Signal

Off --- Cellular disable

Blink in red --- Dialled up

Steady in red --- Signal value ≤9

Steady in blue --- 10≤Signal level≤19

Steady in green --- Signal level ≥ 20,

Ethernet Port

Off --- Ethernet disconnected

Steady in red --- Only WAN port connected

Steady in green --- Only LAN port connected

Steady in blue --- Both LAN and WAN ports connected

2.2 Restoring to Default Settings via the Reset Button

To restore to default settings by the reset button, when the router power on, press and hold the reset button for 10 seconds, the system LED will change from solid blue to blinking blue. The unit has been restored to default settings and will start up normally later. 

3. Default Settings

No.

Function

Default Settings

1

Cellular

SIM1 enabled.

2

Wi-Fi

  1. Wi-Fi 2.4G AP mode enabled.
    -SSID: ODU12-followed with the last 6 letters of the MAC address.
    -Auth Method is WPA2-PSK.
    -Password is the last 8 digits of the S/N
  2. Wi-Fi 2.4G AP mode enabled.
    -SSID: ODU12-5G-followed with the last 6 letters of the MAC address.
    -Auth Method is WPA2-PSK.
    -Password is the last 8 digits of the S/N

3

Ethernet

  1. PoE LAN1 enabled, IP address: 192.168.1.1, Netmask: 255.255.255.0. DHCP server enabled, 192.168.1.2~ 192.168.1.254.
  2. WAN/LAN2 enabled as WAN, DHCP client mode.

4

Management Services

  1. HTTPS(443) enabled.
  2. Disable HTTPS/SSH/ping from the cellular/WAN interface.

5

Username and password

Please check the product nameplate to obtain it

4. Login and Access to the Internet

Before powering on, please insert the SIM card and connect the 5G antenna to the device. Or connect the Ethernet cable to the WAN/LAN2 interface.

4.1 Connect via Mobile Phone

Step 1: Install the InCloud APP by scanning the following QR code on a mobile phone.

Step 2: Click the "Device" directory below to enter the [Device] page, click the menu button in the upper right corner, and select [Add Device]. Scan the QR code on the ODU to add a device. 


Step 3: After scanning the code successfully, configure the name, serial number, and description information of the device. 

Step 4: If ODU cannot connect to the Internet, click "Configure local device" on the [Device] page, scan the QR code on the device again and then configure the device to connect to the Internet. Mobile phones will connect to ODU’s Wi-Fi after scanning the QR code in "Configure local device".

      

4.2 Connection via PC 

Step 1: Connect PoE LAN1 interface on ODU and PC with Ethernet cable. 

Step 2: Set the IP of the PC via DHCP or fixed IP address, the PC IP address and ODU address should be in the same segment. 

Use DHCP to obtain the address automatically (recommended). The DHCP server function is enabled by default on the LAN port of ODU.

Fig. 4-2-1 Network Configuration

Use a fixed IP address, the PC and the device must be in the same segment. On the PC side, the IP address needs to be configured as any address in 192.168.1.2~192.168.1.254, the gateway should be 192.168.1.1, the subnet mask should be 255.255.255.0, and the DNS server should be 8.8.8.8 or operator DNS server address.

Fig. 4-2-2 Network Configuration

Step 3: Open a browser and enter the device's default address 192.168.1.1 in the browser address bar. After entering the username and password (please check the product nameplate to obtain them), enter the device's WEB management interface. If the page prompts that the webpage is not secure, open the hidden or advanced options and select "Proceed to website".

Fig. 4-2-3 Login Page

Step 4: Check the network status in the "Interface Status" in "Dashboard". The device connects to the Internet successfully if the "Cellular" or “WAN” icon turns green. Click the corresponding icon to view interface information such as signal strength, IP address, and traffic consumption.
Fig. 4-2-4 Interface Status

Step 5: If ODU cannot connect to a network, click "Internet" on the left navigation bar, and click the edit button behind the "Cellular" or “WAN” to set up network parameters. The device enables the dial-up function and WAN by default, please wait for a few minutes to go online, and re-enable the dial-up if it is not dialled.

Fig. 4-2-5 uplink Interface Configuration

4.3 Connect to InCloud Manager

5G ODU12 is a cloud-managed router, and with InCloud Manager, you can achieve batch configuration deployment and software upgrades. The cloud platform offers rich visual charts and advanced features such as Connector for remote maintenance, enabling small and medium-sized enterprise branches to complete their digital network infrastructure. Also, the cloud platform is equipped with an AI assistant that enables management of all devices via natural language. It supports device monitoring, troubleshooting, data statistics and analysis, as well as configuration management, acting as your intelligent digital communications expert. 
To use InCloud Manager to manage your ODU12, please follow the steps below:

4.3.1 Registration

In your web browser (we recommend using Google Chrome), enter the following URL: https://star.inhandcloud.com. You will be automatically redirected to the portal page, where you can select "InCloud Manager" to access the SaaS platform for enterprise branch networking.Click 'Create now' to create a new platform account.

Fig. 4-3-1 Create a new account

4.3.2 Login

After completing the email registration, you can log in to InCloud Manager using the username and password you used during the registration.

Fig. 4-3-2 Choose your SaaS Service
Note:
  1. When a device is initially added to the platform account, it will automatically receive a 1-year  Essential license. Users can renew the license through the "License" menu.

4.4.3 Add Device

After logging in, go to the "Devices" menu, click the "Add" button, fill in the device's name, serial number, and MAC address, and then click "Finish" to complete the addition.

Fig. 4-3-3 Add your device

5. Monitoring

Once the device is added to the platform, you can manage and monitor the network from the platform while also supporting users in remotely viewing real-time status information on the device's local interface.

5.1 Overview of Device

In the "Devices" section, you can click on the "Device Name" to access the device's details page

5.1.1 Overview

Click “Dashboard” in the left menu, and check Device Information, Interface Status, Traffic Statistics and Wi-Fi information of the device.

Fig. 5-1-1 Status Overview

5.1.2 Data Usage

In this function, you can view the traffic usage and historical data of various upstream links.

Fig. 5-1-2 Data Usage

5.1.3 Cellular Signal

In this function, you can view cellular signal curves such as RSSI, RSRP, RSRQ, and SINR.

Fig. 5-1-3 Cellular Signal

5.2 Local Device Information

Through the platform's "Remote Access" feature, you can assist in real-time viewing and configuring of devices. Select the target device, click "Remote Access," and it will open the device's local login interface.

Fig. 5-2-a  Remote access to the device locally

Fig. 5-2-b  Local interface

5.2.1 Device Information

In the [ Dashboard ] interface, users can find basic device information at the top, including the device name, device model, device serial number, MAC address, online duration, and upstream interface address.

Fig. 5-2-1 Local Page
  1. Name: Identifies the device's name, which is initially set to "ODU12" but can be customized.
  2. MAC Address: Identifies the device's physical MAC address.
  3. Local Gateway Address: The default gateway address of the device's subnet.
  4. Model: Specifies the device's specific model, which can help determine if it supports cellular and WLAN features.
  5. Uptime: Reflects the device's running time since it was powered on.
  6. System Time: Displays the device's time zone and system time.
  7. Serial: A unique code that serves as an identifier for the device and can be used for indexing or adding the device to a platform account.
  8. Internet Access: The upstream interface used by the device for internet connectivity.
  9. License Status: Information about the applied license on the device, distinguishing between InCloud Manager Essential and  InCloud Manager Professional.
  10. Firmware Version: Shows the device's current software version.
  11. Uplin IP: The IP address of the upstream interface used for device internet connectivity.
  12. Detection Adress: Probe address for the system to detect the device’s network connectivity

5.2.2 Interface Status

In the "Dashboard > Interface Status" feature, you can visually inspect the operational status of each interface. By clicking on the "Interface Icon," you can access detailed information for each interface in a pop-up box on the right-hand side of the interface.
Fig. 5-2-2 Interface Status

5.2.3 Traffic Statistics


Fig. 5-2-3 Traffic Statistics

5.2.4 Wi-Fi Connections

In the "Dashboard > Wi-Fi Client Count" feature, users can check the number of active SSIDs on the ODU12.

Fig. 5-2-4 Traffic Statistics

5.2.5 Clients Traffic Top 5

In the "Dashboard > Top 5 Client Traffic" feature, users can view the current ranking of client traffic usage for devices connected to the router. It displays up to 5 records, and when a client disconnects, its statistical data will be cleared.
The Link Monitor page displays the health of each uplink, as well as the throughput, latency and packet loss rate on each uplink interface.


Fig. 5-2-6 Link Monitoring

5.2.7 Cellular Signal

The Cellular Signal page displays the SIM card signal strength on the cellular interface, as well as other parameters such as RSSI, SINR, and RSRP


Fig. 5-2-7 Cellular Signal

5.2.8 Clients

The Clients page displays details about each client connected to ODU, such as device name, IP address, MAC address, traffic statistics, and online duration.


Fig. 5-2-8 Clients

5.2.9 VPN

Check the status and the traffic consumed by the VPN in ODU on the VPN page.

Fig. 5-2-9 VPN Status

5.2.10 Passthrough Status

Through this interface, you can view detailed information about whether Passthrough has successfully passed the WAN or Cellular address to the terminal.

Fig. 5-2-10 Passthrough Status

5.2.11 Session

Through this page, you can check whether the TCP/ICMP/UDP protocols in the traffic are taking effect.

Fig. 5-2-11 Firewall Session

5.2.12 Events

ODU12 will record event logs like user log-in, configuration change, link change, reboot and other events on the Events page,By selecting start date, end date and event type, narrow the scope of retrieval and view a certain type of event.

Fig. 5-2-12 Events

5.2.13 Logs

Check the logs recorded during the operation of the device, which can be used for troubleshooting when the ODU12 can not work properly. 
  1. Clear Logs: clear current running logs.
  2. Download Logs: download running logs. 
  3. Download Diagnostic Logs: download log information for troubleshooting, it contains system running logs, device information, and device configuration.

Fig. 5-2-13 Logs

6. Configuartion

You can achieve batch configuration of devices through the platform's remote configuration. Select the target device, click "Edit" in the remote configuration section, and complete the configuration for the device. Below is an introduction to the configuration for a single device:

6.1 Internet

Click “Internet” in the left menu to check and configure the uplink interfaces and multi-link work mode of ODU12.
Please exercise caution when changing Internet settings which may cause network interruption.


Fig. 6-1 Uplink Settings
Check and edit WAN and Cellular interface in Uplink Table. It supports editing the cellular threshold policy on this page and dragging icons in the Priority column to reprioritize the interfaces.

Notes:

  1. If delete the WAN interface on this page, the WAN/LAN2 port will work as LAN. 
  2. The WAN/LAN2 port will change back to WAN if add WAN interface again.
  3. When deleting WAN, all configurations on this interface like the static routes, inbound and outbound rules, port forwarding etc. will be removed.

6.1.2 WAN Setting

    ODU12 supports three types of WAN interfaces:

  1. DHCP: The DHCP service is enabled on the WAN interface by default. Therefore, ODU12 can connect to the Internet immediately if connects the WAN interface to the upstream network device which enables the DHCP server. 
  1. Static IP: Manually assign an IP address obtained from the carrier or upstream network device. 
Fig. 6-1-2-a Static IP Settings
  1. PPPoE: Set the PPPoE service on WAN so that ODU can dial up to the Internet through the broadband service.

Fig. 6-1-2-b PPPoE Settings

6.1.3 Cellular Setting

You can configure the SIM card operating mode for the Cellular interface.. By default, only SIM1 is enabled. After switching to multi-SIM mode, multiple SIM cards are supported.
In addition, ODU12 supports band locking.


Fig. 6-1-3 Cellular Settings
  1. Status:The enable switch for the cellular interface is turned on by default. Once disabled, all features related to the cellular function will no longer take effect.
  2. NAT:Traffic initiated from the internal network to external networks will be forwarded through NAT. This option is enabled by default.  
  3. Work Mode:Set the working mode of the SIM card. The device defaults to multi-SIM mode, which supports automatic SIM card switching. Users may select to use only a single SIM card.
  4. MTU: Supports customizing the MTU for the cellular interface.
  5. Mask:Supports setting the subnet mask for the cellular interface.
  6. Dialing Parameters: Configure the two APN dialing methods.The default is Automatic, and Custom APN is also supported.
  7. IP Type: Supports configuring IPv4, IPv6, or IPv4 & IPv6 modes
  8. APN: Enter the APN name.
  9. Authentication: Set the APN authentication method
  10. User Name: Enter the APN username for authentication
  11. Password: Enter the APN password for authentication
  12. Service Type: Select the cellular interface service type. The default is Auto; you can choose 4G or 4G & 5G.
  13. 4G Band: 4G band lock, default is All. Users can specify the 4G frequency band here.
  14. 5G Band: 5G band lock, default is All. Users can specify the 5G frequency band here.
  15. PIN Code:Mainly used to verify the user’s identity.
  16. IMS:Convert voice traffic and video data into IP packets.
  17. Roaming: Supports cellular roaming across different carriers.

6.1.4 Link Detection Setting

Configure link detection items and optimal forwarding mode for uplink interfaces.

Fig. 6-1-4 Link detection Settings
Link detection is enabled by default. In the private network environment, please manually configure the address in “Test Connectivity to” or disable the link detection function to prevent the cellular interface from working abnormally. 
  1. If the detection function is disabled, it will not display latency, jitter, packet loss rate, or signal strength on the Status page. 
  1. If the “Test Connectivity to” address is empty, the system will detect the primary DNS server address obtained by each interface, otherwise, the system will use this address as the detection address for all uplink interfaces. 
  2. In Link Backup mode, ODU will monitor enabled items and trigger a link switch when any item exceeds the threshold. If there is no item enabled, the link switch will only be triggered based on the priority and connectivity of the links. 
  3. In Load-balancing mode, ODU will distribute data traffic to all available links.

6.2 Local Network

In the [ Local Network ] feature, users have the flexibility to define their local subnets. This includes configuring the address range, VLAN ID, DHCP services, and other related parameters for the local LAN. Once the configuration is complete, users need to further apply these settings to the device's LAN port through [ Interface Management ] or apply them to the desired SSID in the Wi-Fi settings. This series of operations is intended to ensure that client devices can smoothly connect to the local network according to the planned network addresses.
Fig. 6-2-1 Local Networks List

    Edit the network: Click the Edit button on the right to edit LAN IP, enable/disable the DHCP server and change the range of DHCP address.


Fig. 6-2-2 Network Settings
  1. Name: Used to identify the network. Users can select this name to apply the network in both [ Wi-Fi ] and [ Interface Management ].
  2. Mode: Choose whether the current subnet operates in 2-layer transparent mode or 3-layer IP mode. The default is "IP mode."
  3. VLAN: This allows for the division of the local network into different virtual logical networks. The default VLAN for all interfaces and Wi-Fi is "default (VLAN1)."
  4. IP Address/Subnet Mask: This is the gateway address for accessing the router through the LAN port or Wi-Fi. The default is "192.168.2.1."
  5. DHCP Server: Clients connecting to the router can obtain IP addresses through this function. It is enabled by default, and the address range is generated based on the "IP Address/Subnet Mask."
Note:
  1. The default local network cannot be deleted, and you can only modify the IP address/subnet mask and DHCP server settings.
  2. Once a local network is added, you cannot change its mode.
  3. The VLAN Only mode is designed for 2-layer transparent operation and doesn't require configuration of IP address/subnet mask or DHCP server settings.

6.3 Wi-Fi

Configure ODU to serve as Wi-Fi AP to provide SSID for wireless network access.
Fig. 6-3-1 Wi-Fi List
Edit Wi-Fi: Click the Edit button on the right, and configure SSID, password or other parameters of this Wi-Fi.

Fig. 6-3-2 Wi-Fi Settings
In the [Radio] section, you can select the bandwidth, channel, and transmit power.
Fig. 6-3-3 Radio Settings

6.4 VPN

VPN is intended to establish a private network on the public network for encrypted communication. A VPN router enables remote access by encrypting data packets and converting the destination address of data packets. VPN can be realized by a server, hardware, or software. Compared with the traditional DDN private line or frame relay, VPN provides a more secure and convenient remote access solution. 

6.4.1 IPSec VPN

IPsec is a group of open network security protocols developed by IETF. At the IP layer, data source authentication, data encryption, data integrity, and anti-replay functions are used to ensure the security of data transmission between communication parties on the Internet, which reduces the risk of leakage and eavesdropping, ensures the integrity and confidentiality of data, and the security of service transmission for users.
On the IPSec VPN page, click the Add button on the left to build a new IPSec tunnel.

Fig. 6-4-1 IPSec Settings
The following parameters must be set in the IPSec tunnel.
  1. Name: specify the name of the IPSec VPN created on the device, which is used for local VPN management. 
  1. IKE Version: specify the version of the IKE protocol used on ODU, IKEv1 or IKEv2.
  1. Pre-Shared Key: specify the authentication key for IKE negotiation, which must be consistent on both sides.
  1. Uplink Interface: specify the local uplink interface used to establish the IPSec VPN tunnel. 
  1. Peer Address: specify the IP address of the peer device. 

Notes: The peer IP address must be set to 0.0.0.0 if working as an IPSec server.

  1. Tunnel Mode: specify the IP packet encapsulation mode on the IPSec VPN tunnel, which can be tunnel mode or transmission mode. 
  1. Local Subnet: specify the IP address segment of the traffic to be sent out by the ODU through the IPSec VPN tunnel. 
  1. Peer Subnet: specify the IP address segment used for communication on the other end of the IPSec VPN tunnel.

IKE Policy: 

  1. Encryption: specify the encryption algorithm for IKE. 
  2. Authenticationspecify the authentication algorithm for IKE. 
  3. DH Groupsspecify the DH key exchange mode. 
  4. Lifetimespecify the lifetime of the IKE SA. The default value is 86400 seconds.  
  1. IPSec Policy: 
  2. Security Protocolspecify the security protocol used for ERP. 
  1. Encryption: specify the encryption algorithm of the ESP protocol. 
  1. Authentication: specify the authentication algorithm for ESP. 
  1. PFS Groups: specify the Perfect Forward Secrecy (PFS) mode, which improves the communication security through an additional key exchange in Phase 2 negotiation.  
  1. Lifetime: specify the lifetime of the IPSec SA. The default value is 86400 seconds.

6.4.2 L2TP VPN

Layer 2 Tunneling Protocol (L2TP) is a tunnelling protocol for virtual private dial networks (VPDNs). This protocol establishes a tunnel from a remote site to the headquarters of an enterprise over a public switched telephone network (PSTN) or integrated services digital network (ISDN) through Point-to-Point Protocol (PPP) negotiation. This tunnel allows remote users to connect to the intranet of the enterprise securely.
6.4.2.1 Server
Generally, an L2TP server is deployed at the headquarters of an enterprise to provide remote access for employees. On the VPN page, choose L2TP VPN > Server to display the L2TP server configuration.
Fig. 6-4-2-a L2TP Server Settings
  1. Name: the name of the L2TP server, cannot be changed. 
  2. Status: enable or disable L2TP server. This function is disabled by default.
  3. Uplink Interfacespecify the uplink interface used to establish a tunnel from L2TP server. 
  4. VPN Connection Address: specify the gateway address for the L2TP client. 
  5. IP PoolSystem will assign an IP address to the L2TP client from the specified IP address pool.
  6. User Name/Passwordspecify the user name and password for L2TP negotiation, which must be consistent on both ends of the tunnel. 
  7. Authentication Mode: specify the authentication mode for the L2TP tunnel. 
  8. Enable Tunnel Authentication: Please make sure both ends of the tunnel are configured with the same user name and password if enable this option.
6.4.2.2 Client
Click Add button on the left to configure L2TP client parameters and establish a tunnel with remote L2TP server.

Fig. 6-4-2-b L2TP Client Settings
  1. Name: specify the local name of L2TP client tunnel. 
  2. Status: enable or disable L2TP client tunnel. 
  3. NAT: enable or disable NAT for packets forwarded by the ODU for the LAN device. 
  4. Uplink Interface: specify the uplink interface used to establish L2TP tunnel. 
  5. Server Address: specify the IP address used by the remote L2TP server.
  6. User Name/Password: specify the user name and password for L2TP negotiation, which must be consistent on both ends of the tunnel. 
  7. Authentication Mode: specify the authentication mode for the L2TP tunnel. 
  8. Enable Tunnel Verification: Please make sure both ends of the tunnel are configured with the same server name and verification key if enable this option.

6.5 Security

In the [ Security ] menu, users can configure advanced features related to firewalls, policy routing, and traffic shaping.

6.5.1 Firewall

The firewall currently includes functions such as inbound rules, outbound rules, port forwarding, MAC address filtering, and more.

6.5.1.1 Inbound/Outbound Rules

User can set rules to control data traffic based on interface. 
  1. Outbound rules: Inside network access to outside network, allow all data by default.
  1. Inbound rules: Outside network access to inside network, forbid all data by default. 

Fig. 6-5-1-1a Firewall Settings

Click the Add button in the left to add a new rule.

Fig. 6-5-1-1b Inbound Settings
  1. Name: Set the name of the inbound/outbound rule for local identification.
  2. Status: Rule function switch.
  3. Interface: For outbound rules, it specifies the upstream interface where traffic leaves the router. For inbound rules, it specifies the upstream interface where traffic enters the router
  4. Protocol: Match traffic based on the protocol type, with options like Any, TCP, UDP, ICMP, or custom.
  5. Source: Match the source address for traffic, supporting custom, with the default as Any.
  6. Destination: Match the destination address for traffic, supporting custom, with the default as Any.
  7. Action: Action taken for matching traffic in inbound/outbound rules, supporting allow and deny.
  8. Inbound Rules: Traffic management rules for external network accessing the router, with the default as deny all.
  9. Outbound Rules: Traffic management rules for traffic going out through the router, with the default allowing all.
  10. Support for adjusting the priority of inbound and outbound rules.
6.5.1.2 Port Forwarding

When outside network accesses to specific ports of the ODU, system will transfer this data to corresponding ports of inside device according to relevant port forwarding rules. So that the service deployed in LAN will be available in public network, and the same public IP address can be used to access to plenty of services by using multiple port forwarding rules.
For example, after set port forwarding rules like below, when users from public network try to access to ODU’s port 2000 on WAN, system will transfer request to 192.168.1.23:8080 in LAN.

Fig. 6-5-1-2 Port Forwarding Settings
  1. Name: set the local identifier of the port forwarding rule. 
  2. Status: enable or disable the port forwarding rule. 
  3. Interface: set the uplink interface that provides port mapping for internal clients. This interface must have a public IP address. 
  4. Protocol: set the protocol type to which port mapping is applied. TCPUDP, and TCP&UDP
  5. Public Port: set the protocol port on the uplink interface to be mapped. 
  6. Local Address: set the IP address of the target client that external users need to access.
  7. Local Port: set the protocol port that external users need to access on the target client. 
6.5.1.3 NAT

NAT (Network Address Translator) is a technology used to use a private address in a local network and switch to a global IP address when connecting to the Internet. You can set source or destination address translation as needed  in "Security > Firewall > NAT".

Fig. 6-5-1-3 NAT Settings
  1. Name:The user sets a name for the rule.
  2. Type: The type of this rule.
    1.   SNAT: Translate the source IP address.
    2.   DNAT: Translate the destination IP address
  3. Protocol: The scope of the rule.
    1.   Any: This rule is effective for all agreements.
    2.   TCP: This rule takes effect only for TCP protocol.
    3.   UDP: This rule takes effect only for UDP protocol.
    4.   TCP&UDP: This rule takes effect only for TCP and UDP protocols.
  4. Source: The source IP address that needs to be translated.
  5. Destination: The destination IP address that needs to be translated.
  6. Converted Address: Translated address.
6.5.1.4 MAC Address Filter

Configure MAC address filter rules for LAN devices to allow or forbid LAN devices to access to Internet.


Fig. 6-5-1-4 MAC Address Filter Settings
  1.     Blacklist: Devices in the blacklist will not be able to access the Internet.
  1.     Whitelist: Only devices in the whitelist are allowed to access the Internet.

6.5.1.5 Domain Name Filtering

Allow or disallow (White/Black List) the domain names that can be accessed by clients as needed.

Fig. 6-5-1-5 Domain Name Filtering

6.5.2 Policy-Based Routing

Policy-based routing (PBR) allows ODU to forward different data flows through different links based on configured policies. This feature enables flexible route selection and control, thus improving the link utilization and reducing operational cost of the enterprise. Choose Security > Policy-based Routing and click Add to add a PBR rule.

Fig. 6-5-2 Policy-Based Routing

Notes:

The source and destination addresses of the PBR cannot be set as Any at the same time.

6.5.3 Traffic Shaping

Create shaping policies to apply per-user controls on a per-protocol basis to optimize the network. This function can also reduce bandwidth for recreational traffic, and prioritize bandwidth for critical business traffics.
Choose Security > Traffic Shaping and click Edit to modify the bandwidth of the uplink interfaces.

Fig. 6-5-3-1 Traffic Shaping
Click Add to create a new traffic shaping rule. Traffic shaping policies consist of a series of rules that are performed in order, which is similar to custom firewall rules. There are two main components to each rule: the type of traffic to be limited or shaped (rule definition), and how that traffic should be limited or shaped (rule actions).


Fig. 6-5-3-2 Traffic Shaping Rules Configuration

Notes:
  1. Traffic forwarding priority for unmatched rules is medium. 
  2. When Limit Bandwidth is set to 0, system will not limit the bandwidth.
  3. The value of Reserved Bandwidth should not be greater than the Limit Bandwidth.

6.6 Authentication

The ODU12 supports the following network access authentication method:
Portal: Configures web portal authentication. After connecting to the network, users must be redirected to an authentication page via a browser, where they enter their account credentials or complete verification (such as QR code scanning) to gain network access.
Fig. 6-6-1 Portal Settings
In scenarios where hotels and restaurants provide zero-hour Wi-Fi for customers, the Wi-Fi portal function can ensure the security of wireless access to a certain extent, and merchants can customize slogans and backgrounds on the authentication page for publicity.

1. Internal Portal
Ideal for scenarios that do not require integration with external systems, allowing direct customization of the authentication page on the router.
Internal portal setting:
  1. Name the policy and specify the target SSID (e.g., guest Wi-Fi)
  2. Select an authentication type, such as Click-Passthrough or username/password authentication
Guest Login Page:
  1. Customize background images, logos, titles, welcome messages, and button text
  2. Adjust color schemes and transparency, with real-time previews of how the page appears on desktop and mobile
  3. Set post-authentication behavior (e.g., stay on the page or redirect to a specified URL)
Use Cases: Guest Wi-Fi in hotels, restaurants, and industrial campuses, enabling quick deployment of branded authentication entry points.
2. External Portal
Designed for scenarios that require integration with third-party authentication systems (e.g., enterprise SSO).
Fig. 6-6-2 External Portal Settings
External portal setting:
  1. Configure the URL of the external authentication page (provided by the third-party system)
  2. Enable Walled Garden to allow unauthenticated users to access specific whitelisted domains/IPs (e.g., the authentication server address)
  3. Define behavior when the server disconnects:
  4. Open: Unauthenticated users can access the internet directly
  5. Restricted: Only authenticated users and whitelisted addresses are granted access
Use Cases: Scenarios requiring integration with existing enterprise identity systems or third-party marketing-driven authentication.
3. Operation Steps
1. Select Internal Portal or External Portal from the Portal Service dropdown menu.
2. Fill in required fields (e.g., name, target SSID) and customize the page or configure external parameters based on the mode.
3. Click Save to create the policy, and Portal authentication will be enabled for the target SSID.

6.7 Services

6.7.1 Interface Management

You can configure local networks allowed through a specific interface and set the interface's speed in the "Services > Interface Management" function.

Fig. 6-7-1 Interface Management

6.7.2 DHCP server

DHCP implements dynamic IP address allocation in a client/server model. The LAN device sends a request to ODU, and ODU replies with an IP address assigned to the client. 

Fig. 6-7-2 DHCP Settings

6.7.3 DNS server

Set global DNS server for ODU. System will use DNS server in this page if the original DNS server from uplink interface cannot work.


Fig. 6-7-3 DNS Settings

6.7.4 Fixed Address List

ODU can distribute IP address based on client device’s MAC address by using fixed address list. Distributed IP address should in the range of IP address of the local network.

Fig. 6-7-4 Fixed Address Settings

6.7.5 Static Routes

Configure static routes to forward data by specific route or interface. This list will only display the rules created by user, and will not show the routes created automatically after modifying WAN or LAN interface.

Fig. 6-7-5 Static Routes Settings
Static routes to the same destination IP address or network cannot have the same next-hop address, outbound interface, or priority.

6.7.6 DDNS

Dynamic DNS (Dynamic Domain Name System) is used to automatically update the name server content in the domain system. According to internet domain rules, domain names are typically associated with fixed IP addresses. Dynamic DNS technology allows users with dynamic IP addresses to have a fixed name server. This enables external users to connect to the URL of users with dynamic IP addresses through regular updates.
You can manually configure the Dynamic DNS server address under the "Services > Dynamic DNS" feature.

Fig. 6-7-6 DDNS Settings
  1. Service Provider: Provided by the Dynamic DNS service operator, you can choose from dyndns, 3322, oray, no-ip, or use a custom option (requires a URL).
  2. Hostname: Register for a hostname by clicking on the URL below the service provider.
  3. Username: Register for a username by clicking on the URL below the service provider.
  4. PasswordThe password set by the user during registration.

6.7.7 Passthrough Settings

Configure IP passthrough to transparently forward data from uplink interface to one client device. 

Fig. 6-7-7
IP Passthrough Settings

Notes:

After the IP Passthrough mode is enabled, only one client can access to Internet, and Static routing, VPN, Port Forwarding and Policy-Based Routing functions will not work. 
The inbound rule needs to be released when accessing the client device.

6.8 System

6.8.1 Change the Password

The default username and password of ODU is in the product nameplate. Please change the password for securiry after first login. Click “adm” on the top right of the web page, click Modify Password in the menu to change the password.

Fig. 6-8-1 Password Settings

6.8.2 Cloud Management

InCloud Manager (star.inhandcloud.com) is a cloud platform developed by InHand to help enterprises accelerate network deployment, simplify network maintenance, and improve service experience. This platform provides zero touch deployment, intelligent maintenance and security features to create good service experiencefor users. Users can log in to the platform to manage the devices temotely, perform batch configuration, and monitor traffic on the devices.
ODU connects to InCloud Manager automatically. User can select which InHand platform to connect to in this page, and also disable InCloud Manager in this page.

Fig. 6-8-2 Cloud Management Settings

6.8.3 Access Control

User can allow or forbid public network to access to ODU and which port for public network to access to ODU in this page. The rules in this page will not influence LAN device to access to ODU. ODU supports HTTPS when access to its web configuration page.

Fig. 6-8-3 
Access Control Settings

6.8.4 Country & System Clock

Select a time zone for the system and enable the NTP server to synchronize time with the target NTP server.

Fig. 6-8-4 Country & System Clock Settings

6.8.5 Device Options

Reboot, upgrade firmware or reset ODU to default factory settings in this page.

Fig. 6-8-5 Device Options

Notes

  1. Before upgrading the firmware, please make sure the new firmware is obtained froman official source. 
  2. If the ODU is connected to InCloud Manager, the platform will synchronizes the settings before restore to factory settings. The ODU will only clear historical data.

6.8.6 Configuration Management

User can export system configuration to local PC as backup, and import the configuration to device to restore the configuration. 

Fig. 6-8-6 Configuration Management

6.8.7 Device Alarms

When user needs to pay attention to some of events that may occur on the device, user can select corresponding alarm events and set an email address for alarm email. ODU will send out alarm if a selected event occurs, and record unselected events in log.
ODU supports recording and alarming following events at present:

Fig. 6-8-7-1 Alarms Options
After configure mail server address, port, username and password, ODU will send alarm email through this email. Configure Receiving Email Address and send a test email to this address to check the correctness of the configuration above.


Fig. 6-8-7-2 Receiving Email Settings


6.8.8 Tools

6.8.8.1 Ping

Use ICMP protocol to check the connectivity between source address (ODU itself if Source is blank) and other IP address or domain name in Target. 
Enter IP address or domain name in Target, and click Start to start ping.

Fig. 6-8-8-1 Ping

6.8.8.2 Traceroute

Enter target IP address or domain name, select interface, and click “Start” to test and trace the link situation from ODU to the target.

Fig. 6-8-8-2 Traceroute

6.8.8.3 Capture

User can use this feature to catch the data forwarding through specified interfaces.
By selecting options in the Output drop-downlist, user can view information about the captured data packets or export the information to PC.

Fig. 6-8-8-3 Capture

6.8.9 Scheduled reboot

Scheduled reboot is a network device management strategy that allows administrators to automatically restart a device at a specific time or under certain conditions to ensure the device's normal operation and performance.
In practice, users can set up scheduled reboots in the "System > Scheduled Reboot" function based on their business requirements. The device supports scheduled reboots at fixed times daily, weekly, or monthly.
In the case of monthly reboots, if the selected reboot day exceeds the actual number of days in the month, the device will reboot on the last day of the month. For example, if you choose to reboot on the 31st of every month, it will reboot on the 30th in a month with only 30 days.
Fig. 6-8-9 Scheduled reboot

6.8.10 Log Server

Set a remote log server and ODU will upload system logs to this remote log server.

Fig. 6-8-10 Log Server

6.8.11 Other Settings

Set web login timeout, enable or disable accelerated forwarding and configure other system settings in this page.
Fig. 6-8-11 Other Settings

Notes:

Cellular forwarding speed will be significantly increased after enabling Accelerated Forwarding, but other functions like traffic shaping or IPSec will not take effort.

7. Troubleshooting

7.1 Unable to connect to the cellular network

1. Ensure that the SIM card is properly installed and valid.
2. Check the cellular network signal strength and try moving the router to an area with better signal coverage.
3. Ensure that the data plan is still active and not exceeding data limits.
4. Restart the device and wait for it to establish a connection.

7.2 Unable to connect to the WAN network

1. Check if the cellular network connection is functioning properly and ensure adequate signal strength.
2. Verify that the device is correctly configured, including APN settings and username/password, if applicable.
3. Use the ping tool to check the connection of the device itself to the Internet.
4. Check whether the firewall inbound and outbound rules and MAC address filtering configuration prohibit the address from accessing the network.
5. Reconnect the client with the device to regain the address.

7.3 Slow or unstable speeds

  1. Check the cellular network signal strength and ensure that the router is positioned in an area with strong signal reception.
  2. Connect the device to the 5Ghz band.
  3. Update the router firmware to access the latest performance and stability improvements.

8. FAQ

Unable to Connect to 4G/5G Network?

1. Physical Environment: Start by checking if the SIM card is inserted into the correct slot and ensure all cellular antennas are properly installed.

2. APN Settings: Make sure that the APN configuration matches the information provided by your service provider.

3. Check Device Connectivity: Log in to the device's local interface and use the built-in ICMP tool to ping 8.8.8.8 to test connectivity. If it can connect, then check the connectivity between your device (e.g., computer or smartphone) and the router.

4. Check SIM Card: Take out the SIM card and insert it into a phone to see if it can connect to the internet.

5. Restart: Try powering off the router, wait a few seconds, and then reconnect the power to retry the network connection.

6. Factory Reset: Perform a factory reset on the router and then attempt to connect again.

If you cannot resolve the issue using the above steps or encounter any other problems, please contact InHand Networks immediately for technical support. You can visit www.inhandnetworks.com. for more information.

Is the cloud platform free of charge?

InHand Networks has been committed to providing high-quality network services for small and medium-sized chain organizations. When users utilize the cloud platform services, they are required to purchase licenses for each device to access the extensive cloud-based features.

How to add devices to the cloud platform?

1. Start by registering for InCloud Manager account at https://star.inhandcloud.com/.

2. Log in to the cloud platform using your registered account. Under the device menu, click "Add," and follow the prompts to enter the device's serial number and MAC address. This will complete the device addition process. When a device is added for the first time, it comes with a complimentary 1-year free Basic Edition license. Users can renew their licenses as needed in the future.

Is it possible to use the device without the cloud platform?

Yes, it is possible. Users can complete the majority of configuration tasks locally. However, for features like bulk configuration deployment, firmware upgrades, SD-WAN, Connector, and more, you would need to combine local device settings with the cloud platform.

If you are unable to resolve the issue using the above steps or encounter any other problems, please contact InHand Networks for technical support. You can visit www.inhandnetworks.com for more information.



     






    • Related Articles

    • 5G ODU2002 Product User Manual

      Declaration Thank you for choosing our company's product! Before use, please carefully read this user manual. By complying with the following statements, you will help maintain intellectual property rights and legal compliance, ensuring that your ...
    • 5G FWA02 Product User Manual

      Declaration Thank you for choosing our company's product! Before use, please carefully read this user manual. By complying with the following statements, you will help maintain intellectual property rights and legal compliance, ensuring that your ...
    • 5G FWA12 Product User Manual

      Declaration Thank you for choosing our company's product! Before use, please carefully read this user manual. By complying with the following statements, you will help maintain intellectual property rights and legal compliance, ensuring that your ...
    • Industrial Router IR900 Product User Manual

      Declaration Thank you for choosing our product. Before using the product, read this manual carefully. The contents of this manual cannot be copied or reproduced in any form without the written permission of InHand. Due to continuous updating, InHand ...
    • Industrial Router IR305 Product User Manual

      Declaration Thank you for choosing our product. Before using the product, read this manual carefully. The contents of this manual cannot be copied or reproduced in any form without the written permission of InHand. Due to continuous updating, InHand ...