Thank you for choosing our product. Before using the product, read this manual carefully.
The contents of this manual cannot be copied or reproduced in any form without the written permission of InHand.
Due to continuous updating, InHand cannot promise that the contents are consistent with the actual product information, and does not assume any disputes caused by the inconsistency of technical parameters. The information in this document is subject to change without notice. InHand reserves the right of final change and interpretation.
© 2023 InHand Networks. All rights reserved.
Symbol |
Indication |
< > |
Content in angle brackets “<>” indicates a button name. For example, the <OK> button. |
"" |
'''' indicates a window name or menu name. For example, the pop-up window "New User." |
> |
A multi-level menu is separated by the double brackets ">". For example, the multi-level menu File > New > Folder indicates the menu item [Folder] under the sub-menu [New], which is under the menu [File]. |
Cautions |
Means reader be careful. Improper action may result in loss of data or device damage. |
Note |
Notes contain detailed descriptions and helpful suggestions. |
Contact Us
Add: 43671 Trade Center Place, Suite 100, Dulles, VA 20166 USA
E-mail: support@inhandneworks.com
T: +1 (703) 348-2988
Accessories |
Quantity |
Description |
IR900 |
1 |
IR900 series industrial 4G router |
DIN-Rail |
1 |
Router fixation |
Power Terminal |
1 |
2-pin green power terminal |
Cable |
1 |
1.5m cable |
Antenna |
1 |
3G/4G antenna |
Accessories |
Quantity |
Description |
AC power cord |
1 |
AC power cord |
Power Adapter |
1 |
12VDC power adapter |
Antenna |
1 |
Wi-Fi antenna |
Serial port cable |
1 |
Serial port cable |
Status Description:
POWER |
STATUS |
WARN |
ERROR |
Description |
(Red) |
(Green) |
(Yellow) |
(Red) | |
On |
On |
On |
Off |
Powered On |
On |
Blinking |
On |
Off |
Powered on succeed |
On |
Blinking |
Blinking |
Off |
Dialing |
On |
Blinking |
Off |
Off |
Dialing succeed |
On |
Blinking |
Blinking |
Blinking |
Upgrading |
On |
Blinking |
On |
Blinking |
Reset Succeed |
Signal status LED and description:
Green LED 1
|
Green LED 2
|
Green LED 3
|
Description
|
Off
|
Off
|
Off
|
No signal
|
On
|
Off
|
Off
|
Signal strength 1-9 (Signal strength is
weak, please check antenna and the signal strength of current
location)
|
On
|
On
|
Off
|
Signal strength 10-19 (signal strength is basically
normal, and equipment can be used under normal
conditions)
|
On
|
On
|
On
|
Signal
strength 20-31 (signal strong)
|
Green LED |
Description |
On |
ETH 100M, normal, no data transmission |
Blinking |
ETH 100M, normal, there is data transmission |
Off |
No
connection |
MODEM Green LED |
Description |
On |
Dialing succeed |
Blinking |
Dialing failed |
WLAN Green LED |
Description |
On |
Enable WLAN |
Off |
Disable WLAN |
Parameters |
Description |
Default |
Enable |
Enable/Disable SNTP client |
Disable |
Update Interval |
Synchronization time intervals with SNTP server |
3600 |
Source Interface |
Cellular1, Fastethernet 0/1 and Fastethernet 0/2 |
None |
Source IP |
The corresponding IP of source interface |
None |
SNTP Servers List |
||
Server Address |
SNTP server address (domain name /IP), maximum to set 10 SNTP servers |
None |
Port |
The service port of SNTP server |
123 |
Parameters |
Description |
Default |
HTTP |
Hypertext Transfer Protocol, Plaintext Transmission, Port: 80. |
On |
HTTPS |
Secure SSL Encryption Transmission Protocol. Port: 443 |
Off |
TELNET |
Standard protocol and main way for Internet telnet service. Port: 23 |
On |
SSH |
Port: 22 Timeout: timeout of
SSH session. No operation within this period on SSH Client, SSH Server
disconnect. Default: 120s Cipher Mode: set up public key
encryption method (currently only RSA supported). Cipher Code Length: set up cipher code length, 512 or 1024. default: 1024
|
Off |
Parameters |
Description |
Default |
Name |
Customized server name |
None |
Server Address |
Server address (domain name / IP) |
None |
Port |
Consistent with the server port |
None |
Base DN |
The top of LDAP directory tree |
None |
Username |
Username accessing the server |
None |
Password |
Password accessing the server |
None |
Security |
Encryption mod: None, SSL, StartTLS |
None |
Verify opposite end |
Click to enable |
Unopened |
Parameters |
Description |
Default |
Browse |
Choose the configuration file |
None |
Import |
Import configuration file to router startup-config |
None |
Backup running-config |
Backup running-config file to host. |
None |
Backup startup-config |
Backup startup-config file to host. |
None |
Automatically save modified configuration |
Decide whether to automatically save configuration after modify the configuration. |
On |
Restore default configuration |
Restore factory configuration |
None |
Parameters
|
Description
|
Default
|
Enable SNMP
|
Enable/disable
SNMP
|
Disable
|
SNMP version
|
Select SNMP version of management router, support
SNMP v1/v2c/v3
|
v2c
|
Contact information
|
Fill contact
information
|
Beijing_Inhand_Networ
ks_Technology_Co.,Ltd.
|
Location information
|
Fill location
information
|
Beijing_China
|
Community Management
|
||
Community
Name
|
User define Community Name
|
Public and private
|
Access Limit
|
Select access
limit
|
ro (Read-only )
|
MIB View
|
Select MIB View
|
defaultView
|
Parameters |
Description |
Default |
User Group Management |
||
Groupname |
User define, length: 1-32 characters |
None |
Security Level |
Includes NoAuth/NoPriv, Auth/NoPriv, Auth/priv |
NoAuth/NoPriv |
Read-only View |
Only support defaultView at present |
defaultView |
Read-write View |
Only support defaultView at present |
defaultView |
Inform View |
Only support defaultView at present |
defaultView |
User Management |
||
Username |
User define, length: 1-32 characters |
None |
Authentication mode |
Select authentication mode, including two authentication modes: MD5 and SHA. Select "NoAuth" to disable it |
SHA |
Authentication Password |
Enter authentication password only when authentication mode is not "NoAuth". |
None |
Encryption mode |
Select whether employ DES encryption mode |
DES |
Encrypted password |
Enter encrypted password only when encryption mode is not "NoPriv". Length: 8-32 characters |
None |
Groupname |
Select corresponding user group, which should be identified firstly in management table of groupname |
None |
Parameters |
Description |
Default |
Host Address |
Fill in the NMS IP address |
None |
Security Name |
Fill in the groupname when use the SNMP v1/v2c; Fill in the username when use the SNMP v3. Length :1-32 characters |
None |
UDP Port |
Fill in UDP port, the default port range is 1-65535 |
162 |
Parameters |
Description |
Default |
Schema |
Message +IP |
Forbidden |
Supplier |
Set name of equipment supplier |
default |
Equipment ID |
Unaltered equipment ID |
|
server |
Set IP address of device management |
c.inhandnetworks.com |
Port |
Set port No. of device management |
9002 |
Login retry times |
Set retry times |
3 |
Heartbeat interval time |
Set heartbeat interval |
120 秒 |
Serial port type |
RS232/RS485 |
RS232 |
Parameters |
Description |
Parameters |
GPS IP Transfer-Client |
||
Protocol |
TCP or UDP |
TCP |
Connection Type |
Long connection or short connection Keep consistency with server |
Long connection |
Heartbeat interval time |
User define |
100s |
Heartbeat retry times |
User define |
10 |
Min. Reconnect Interval |
User define |
15s |
Max. Reconnect Interval |
User define |
180s |
Source Interface |
Interface used to connect equipment with server |
None |
Information reporting interval |
User define |
30s |
Including RMC |
Send PMC data of GPS data |
Enabled |
Including GSA |
Send GSA data of GPS data |
Enabled |
Including GGA |
Send GGA data of GPS data |
Enabled |
Including GSV |
Send GSV data of GPS data |
Enabled |
Message prefix |
User define |
None |
Message suffix |
User define |
None |
GPS IP Transfer-Client-Objective IP Address |
||
Server Address |
Server address reported by GPS data |
None |
Server Port |
Report the port number of server |
None |
GPS IP Transfer-Server |
||
Connection Type |
Long connection or short connection Keep consistency with client |
Long connection |
Heartbeat interval time |
User define |
60s |
Heartbeat retry times |
User define |
5 |
Information reporting interval |
User define |
30s |
Including RMC |
Send PMC data of GPS data |
Enabled |
Including GSA |
Send GSA data of GPS data |
Enabled |
Including GGA |
Send GGA data of GPS data |
Enabled |
Including GSV |
Send GSV data of GPS data |
Enabled |
Message prefix |
User define |
None |
Message suffix |
User define |
none |
Parameters |
Description |
Default |
Serial Port Type |
Keep consistency with opposite end |
RS232 |
Baud Rate |
Keep consistency with opposite end |
9600 |
Data Bit |
Keep consistency with opposite end |
8 bits |
Parity |
Keep consistency with opposite end |
No check |
Stop Bit |
Keep consistency with opposite end |
1 bits |
Software Flow Control |
Click to enable |
Disabled |
Including RMC |
Send PMC data of GPS data |
Enabled |
Including GSA |
Send GSA data of GPS data |
Enabled |
Including GGA |
Send GGA data of GPS data |
Enabled |
Including GSV |
Send GSV data of GPS data |
Enabled |
Parameters |
Description |
Default |
Primary IP |
IP address could be configured or changed according to demand |
192.168.1.1 |
Subnet Mask |
Auto generation |
255.255.255.0 |
MTU |
Maximal transmission unit, byte as the unit |
1500 |
Speed/Duplex |
Five options: Auto Negotiation, 100M Full Duplex, 100M Half -Duplex, 10M Full Duplex and 10M Half-Duplex |
Auto Negotiation |
Track L2 State |
On: Port status after disconnection: Down Off: Port status after disconnection: UP |
Off |
Description |
User defines the description |
N/A |
Multi-IP Settings |
In addition to the primary IP, user could set Secondary IP addresses, 10 maximal. |
N/A |
Parameters |
Description |
Default |
Bridge ID |
Bridge ID can only be matched with 1 |
No |
Bridge Interface |
||
IP Address of Main Address and Subnet Mask |
Main IP address and subnet mask can be matched or modified according to the demand |
No |
IP Address of Slave Address and Subnet Mask |
Users can be matched with IP address and subnet mask except for main IP |
No |
Bridge Member |
||
Click through the name of interface starting bridge interface |
|
No |
Parameters |
Description |
Default |
Dialup parameter set |
Dial-up strategy |
1 |
Roaming |
Enable/Disable roaming |
Enable |
PIN Code |
SIM card PIN code |
None |
Network Type |
Five options: Auto, 2G, 3G, 4G and 3G2G |
Auto |
Static IP |
Enable Static IP if your SIM card can get static IP address |
Disable |
Connection Mode |
Optional Always Online, dial on demand (data activation, phone activation, SMS activation are allowed), manual dialing |
Always Online |
Redial Interval |
The time interval between first dial fails can redial |
10s |
ICMP Detection Server |
Far-end IP address to be detected |
None |
ICMP Detection Interval |
Set ICMP Detection Interval |
30s |
ICMP Detection Timeout |
Set ICMP Detection Timeout |
5s |
ICMP Detection Max Retries |
Set the max number of retries if ICMP failed (redial if reaching max. times) |
5 |
ICMP Detection Strict |
Click to enable |
Disable |
Dialup Parameter Set |
||
Network Type |
Choose mobile network type |
GSM |
APN (inapplicable to CDMA2000 series) |
Mobile operator provides relevant parameters (according to ISP) |
3gnet |
Access Number |
Mobile operator provides relevant parameters (according to ISP) |
*99***1# |
Username |
Mobile operator provides relevant parameters (according to ISP) |
gprs |
Password |
Mobile operator provides relevant parameters (according to ISP) |
****** |
Advanced Options (following items are relevant parameters after enabling advanced options) |
||
Initial Commands |
Used for advanced parameters, no need to be filled in generally |
None |
RSSI Poll interval |
Set the signal query interval |
120s |
Dial Timeout |
Dial timeout, the system will redial |
120s |
MTU |
Set max transmit unit, In bytes |
1500 |
MRU |
Set max receive unit, In bytes |
1500 |
Use default asyncmap |
Enable default asyncmap |
Forbidden |
Use Peer DNS |
Receiving mobile operators assigned DNS |
Enable |
Link detection interval |
Set link detection interval |
55s |
Link detection Max Retries |
Set the max retries if link detection failed (redial if reaching max. times) |
5 |
Debug |
System can print a more detailed log |
Enable |
Expert Option |
Provide extra PPP parameters, normally user needn’t set this. |
None |
Dual SIM Enable |
Enable dual SIM card mode (following items are relevant parameter configuration after enabling) |
Disable |
Main SIM |
Choose to be a SIM car of main card |
SIM1 |
Max Number of Dial |
Set Max. dialing times (Reach the max number, SIM card will be switched) |
5 |
Min Connected Time |
Set min. connection time |
0s |
Signal threshold |
Set signal threshold (signal detection will be performed again when lower than signal threshold) |
0 |
Signal detect interval |
Set signal detect interval |
0 |
Signal detect retries |
Set signal detect retries (redial if reaching max. times) |
0 |
Backup SIM Timeout |
From beginning to switch to the backup card counting, exceeds the timeout, router will switch to the primary card |
0 |
Parameters |
Description |
Default |
Pool ID |
User define, easy to memorize and manage |
None |
Interface |
Fastethernet0/1 and Fastethernet0/2 are choosable |
Fastethernet0/1 |
PPPoE List |
||
ID |
User define, easy to memorize and manage |
1 |
Pool ID |
Same as the dialup pool |
None |
Authentication Type |
Auto, PAP, CHAP |
Auto |
User Name |
Operators provide the relevant parameters |
None |
Password |
Operators provide the relevant parameters |
None |
Local IP Address |
Set the IP address assigned for Ethernet interface |
None |
Remote IP Address |
Set the IP of remote device |
None |
Parameters |
Description |
Default |
IP Address |
Users can not change |
127.0.0.1 |
Netmask |
Users can not change |
255.0.0.0 |
Multi-IP Settings |
Apart from above IP, user can configure other IP address |
N/A |
Parameters |
Description |
Default |
Enable |
On/Off |
Off |
Interface |
Fastethernet 0/1 and Fastethernet 0/2 available |
Fastethernet 0/1 |
Starting Address |
Dynamical distribution of starting IP address |
N/A |
Ending Address |
Dynamical distribution of ending IP address |
N/A |
Lease |
Dynamical distribution of IP validity |
1440 |
DNS Server |
One or two, or None |
N/A |
WINS |
Setup of WINS, generally left blank |
N/A |
Static IP Setup |
||
MAC Address |
Set up a static specified DHCP’s MAC address (different from other MACs to avoid confliction) |
0000.0000.0000 |
IP Address |
Set up a static specified IP address (within the scope from start IP to end IP) |
N/A |
Parameters |
Description |
Default |
Enable |
On/Off |
Off |
DHCPSever |
Set DHCP server; up to 4 servers can be configured |
N/A |
Source address |
Address of the interface connected to the DHCP server |
N/A |
Parameters |
Description |
Default |
Primary DNS |
User define Primary DNS address |
N/A |
Secondary DNS |
User define Secondary DNS address |
N/A |
Parameters |
Description |
Default |
Enable DNS Relay |
On/Off |
On |
Host |
Domain Name |
N/A |
IP Address 1 |
Set IP Address 1 |
N/A |
IP Address 2 |
Set IP Address 2 |
N/A |
Parameters |
Description |
Default |
Method Name |
User define |
None |
Service Type |
Select the domain name service providers |
None |
User Name |
User name assigned in the application for dynamic domain name |
None |
Password |
Password assigned in the application for dynamic domain name |
None |
Host Name |
Host name assigned in the application for dynamic domain name |
None |
Method |
The update method of specified interface |
None |
Parameters |
Description |
Default |
Enable |
On/Off |
Off |
Mode |
TEXT and PDU |
TEXT |
Poll Interval |
User define Poll Interval |
120 |
SMS Access Control |
||
ID |
User define ID |
1 |
Action |
Permit and refuse are available |
Permit |
Phone Number |
Trusting phone number |
N/A |
Parameters |
Description |
Default |
|
VLAN ID |
i.e. VLAN ID, user defined |
N/A |
|
SMS Access Control |
|||
Primary IP address |
IP address |
User can configure or change the primary IP address as required |
N/A |
Subnet mask |
User can configure or change the subnet mask as required |
||
Secondary IP address |
IP address |
Besides the primary IP, user can also configure 10 secondary IP addresses |
N/A |
Subnet mask |
Configure required |
Parameters |
Description |
Default |
Access point |
||
SSID broadcast |
After turning on, use can search the WLAN via SSID name |
Turn on |
RF type |
Six type for options: 802.11g/n, 802.11g, 802.11n, 802.11b, 802.11b/g , 802.11b/g/n |
802.11g/n |
Channel |
Select the channel |
11 |
SSID |
SSID name defined by user |
InRouter900 |
Authentication method |
Four authentication methods for option: open type, shared type, WPA-PSK and WPA2-PSK |
Open type |
Encryption |
Support NONE, WEP40 and WEP104 as per different authentication methods |
NONE |
Wireless bandwidth |
Both 20MHz and 40MHz for selection |
20MHz |
Maximum Number of Clients |
User defined (at most 128) |
N/A |
Client |
||
SSID |
Fill in the name of the SSID to be connected |
N/A |
Authentication method |
Stay the same with the authentication method of the SSID to be connected |
Open type |
Encryption |
Stay the same with the encryption method of the SSID to be connected |
NONE |
Parameters |
Description |
Default |
Index |
SLAindex orID |
1 |
Type |
Detection type, default is icmp-echo, the user cannot change |
icmp-echo |
IP Address |
Detected IP address |
None |
Data Size |
User define data size |
56 |
Interval |
User define detection interval |
30 |
Timeout (ms) |
User define, Timeout for detection to fail |
5000 |
Connective |
Detection retries |
5 |
Life |
Default is “forever”, user cannot change |
forever |
Start-time |
Detection Start-time, select “now” or None |
now |
Parameters |
Description |
Default |
Index |
Track index or ID |
1 |
Type |
Default “sla”,User cannot change |
sla |
SLA ID |
Defined SLA Index or ID |
None |
Interface |
Detect interface’s up/down state |
cellular 1 |
Negative Delay |
In case of negative status, switching can be delayed based on the set time (0 represents immediate switching), rather than immediate switching. |
0 |
Positive Delay |
In case of failure recovery, switching can be delayed based on the set time (0 represents immediate switching), rather than immediate switching. |
0 |
Parameters |
Description |
Default |
Enable |
Enable/Disable |
Enable |
Virtual Route ID |
User define Virtual Route ID |
None |
Interface |
Configure the interface of Virtual Route |
None |
Virtual IP Address |
Configure the IP address of Virtual Route |
None |
Priority |
The VRRP priority range is 0-255 (a larger number indicates a higher priority). The router with higher priority will be more likely to become the gateway router. |
100 |
Advertisement Interval |
Heartbeat package transmission time interval between routers in the virtual ip group |
1 |
Preemptive Mode |
If the router works in the preemptive mode, once it finds that its own priority is higher than that of the current gateway router, it will send VRRP notification package, resulting in re-election of gateway router and eventually replacing the original gateway router. Accordingly, the original gateway router will become a Backup router. |
Enable |
Track ID |
Trace Detection, select the defined Track index or ID |
None |
Parameters |
Description |
Default |
Primary Interface |
The interface being used |
cellular 1 |
Backup Interface |
Interface to be switched |
cellular 1 |
Start-up Delay |
Set how long to wait for the start-up tracking detection policy to take effect |
60 |
Up Delay |
When the primary interface switches from failed detection to successful detection, switching can be delayed based on the set time (0 represents immediate switching), rather than immediate switching. |
0 |
Down Delay |
When the primary interface switches from successful detection to failed detection, switching can be delayed based on the set time (0 represents immediate switching), rather than immediate switching. |
0 |
Track ID |
Trace Detection, select the definedTrack index or ID |
None |
Parameters |
Description |
Default |
Destination address |
Enter the destination IP address need to be reached |
0.0.0.0 |
Subnet Mask |
Enter the subnet mask of destination address need to be reached |
0.0.0.0 |
Interface |
The interface through which the data reaches the destination address |
Cellular1 |
Gateway |
IP address of the next router to be passed by before the input data reaches the destination address |
None |
Distance |
Priority, smaller value contributes to higher priority |
None |
Track ID |
Select the definedTrack index or ID |
None |
Parameters |
Description |
Default |
Enable |
Enable/ Disable |
Disable |
Update timer |
It defines the interval to send routing updates |
30 |
Timeout timer |
It defines the routing aging time. If no update package on a routing is received within the aging time, the routing’s Routing Cost in the routing table will be set to 16. |
180 |
Clear Timer |
It defines the time from the time when the RoutingCost of a routing becomes 16 to the time when it is deleted from the routing table. In the time of Garbage-Collection, RIP uses 16 as the RoutingCost for sending updates of the routing. In case of timeout of Garbage-Collection and the routing still has not been updated, the routing will be completely removed from the routing table. |
120 |
Version |
Version number of RIP |
V2 |
Network |
The first IP address and subnet mask of the segment |
None |
Advanced Options |
||
Filter In |
Only send RIP packets do not receive RIP packets |
Disable |
Filter Out |
RIP packets sent to the default routing interface |
Disable |
Default-Information Originate |
Default information will be released |
Disable |
Default Metric |
The default overhead of the router reach to destination |
1 |
Distance |
Set the RIP routing administrative distance |
120 |
Redistribute router |
Introduce the directly connected, static, OSPF protocols into the RIP protocol |
Disable |
Passive Default |
Interface only receives RIP packets, do not send RIP packets |
None |
Neighbour |
For neighbouring routers, after configuring neighbours, rip package will only be sent to neighbouring routers |
None |
Parameters |
Description |
Default |
Enable |
Enable/Disable |
Disable |
Router ID |
RouterID of the originating the LSA |
None |
Advanced Options |
||
Default Metric |
The default overhead of the router reach to destination |
None |
Redistribute Router |
Introduce the directly connected, static, RIP protocols into the OSPF protocol |
Disable |
Network |
||
IP Address |
IP Address of local network |
None |
Subnet Mask |
Subnet Mask of IP Address of local network |
None |
Area ID |
Area ID of router which originating LSA |
None |
Interface |
||
Interface |
The interface |
None |
Hello Interval |
Send interval of Hello packet. If the Hello time between two adjacent routers is different, you can not establish a neighbour relationship. |
None |
Dead Interval |
Dead Time. If no Hello packet is received from the neighbours, the neighbour is considered failed. If dead times of two adjacent routers are different, the neighbour relationship can not be established. |
None |
Network |
Select OSPF network type |
None |
Priority |
Set the OSPF priority of interface |
None |
Retransmit Interval |
When the router notifies an LSA to its neighbour, it is required to make acknowledgement. If no acknowledgement packet is received within the retransmission interval, this LSA will be retransmitted to the neighbour. |
None |
Interface |
The interface |
None |
Hello Interval |
Send interval of Hello packet. If the Hello time between two adjacent routers is different, you can not establish a neighbour relationship. |
None |
Parameters |
Description |
Default |
Access Control List |
||
Access list |
User defined |
None |
Action |
Permit and deny |
Permit |
Any Address |
Any address after clicking, no matching IP address and subnet mask again |
Forbidde n |
IP Address |
User defined |
None |
Subnet Mask |
User defined |
None |
Prefix List |
||
Prefix Name List |
User defined |
None |
Serial Number |
A prefix name list can be matched with multiple rules, one rule is matched with one serial number |
None |
Action |
Permit and deny |
Permit |
Any Address |
Any address after clicking, no matching IP address and subnet mask again |
None |
IP Address |
User defined |
None |
Subnet Mask |
User defined |
None |
Grand Equal Prefix Length |
Filling in network marking length of subnet mask and restricting the minimum IP address in IP section |
None |
Less Equal Prefix Length |
Filling in network marking length of subnet mask and restricting the maximum IP address in IP section |
None |
Parameters |
Description |
Default |
Enable |
Open/Close |
Close |
Source |
IP Address of Source |
None |
Netmask |
Netmask of Source |
255.255.255.0 |
Interface |
Interface of Source |
cellular1 |
Parameters |
Description |
Default |
Upper port |
The port connecting the upper-level network device |
N/A |
Lower port list |
||
Lower port |
The port connecting the lower terminal device |
cellular 1 |
Upper port |
The port connecting the upper-level network device |
cellular 1 |
Parameters |
Description |
Default |
|||||||
Type |
Standard ACL can prevent all the communication flow of some network or permit all the communication flow of some network or refuse all the communication flow of some protocol stack (like IP). Expanded ACL can provide more extensive control scope than standard ACL does. For instance, network manager can make use of expanded ACL instead of standard ACL to permit Web communication flow, refuse FTP and Telnet because the control of ACL is not as desired. |
Expanded |
|||||||
ID |
User self-defined number |
No |
|||||||
Action |
Permit/refuse |
Permit |
|||||||
Agreement |
ACP |
Ip |
|||||||
Source address |
IP |
Source network address (blank in case of any configuration) |
No |
||||||
Source address wildcard mask |
Radix-minus-one complement of mask in source network address |
No |
|||||||
Destination address |
IP |
Destination network configuration) |
address |
(blank |
in |
case |
of |
any |
No |
Destination address wildcard mask |
Radix-minus-one complement of mask in destination address |
No |
|||||||
Writing log |
Click starting and the log about access control will be recorded in the system after starting |
Forbidden |
|||||||
Description |
Convenient for recording parameters of access control |
No |
|||||||
Network Interface List |
|||||||||
Port name |
Select the name of network interface |
cellular1 |
|||||||
Rule |
Select the rules for in and out and management |
none |
Parameters |
Description |
Default |
Action
|
SNAT: Source NAT: Translate IP packet's source address into another address DNAT: Destination NAT: Map a set of local internal addresses to a set of legal global addresses. 1:1NAT: Transfer IP address one to one. |
SNAT |
Source Network |
Inside: Inside address Outside: Outside address |
Inside |
Translation Type |
Select the Translation Type |
IP to IP |
Parameters |
Description |
Default |
MAC address |
Set the binding MAC address |
00:00:00: 00:00:00 |
IP address |
Set the binding MAC address |
Empty |
description |
convenient for recording the meaning of the binding rule of each piece of MAC-IP |
Empty |
Parameters |
Description |
Default |
Type |
||
Name |
Name of user self-defined flow control |
No |
Any Message |
Click starting, control the flow of any message after starting |
Forbidde n |
Source Address |
Source address of flow control (blank in case of any configuration) |
No |
Destination Address |
Destination address of flow control (blank in case of any configuration) |
No |
Protocol |
Click protocol type |
No |
Strategy |
||
Name |
Name of user self-defined flow control strategy |
No |
Type |
Name of defined types above |
No |
Assured Bandwidth Kbps |
Assured bandwidth in user self-definition |
No |
Maximum Bandwidth Kbps |
Maximum bandwidth in user self-definition |
No |
Local Preference |
Local preference in selecting strategy |
No |
Application Qos |
||
Port |
Control port of selecting flow |
cellular1 |
Maximum Input Bandwidth Kbps |
Maximum bandwidth more than input strategy in user self-definition |
No |
Maximum Output Bandwidth Kbps |
Maximum bandwidth more than output strategy in user self-definition |
No |
Input Strategy |
Strategy name defined above |
No |
Output Strategy |
Strategy name defined above |
No |
Parameters |
Description |
Default |
IKEv1 Policy |
||
Identification |
Policy identification of user defined IKE |
N/A |
Authentication |
Alternative authentication: shared key and digital certificate |
AES128 |
Encryption |
3DES: encrypt plaintext with three DES cipher codes of 64bit DES: encrypt a 64bit plaintext block with 64bit cipher code AES: encrypt plaintext block with AES Algorithm with cipher code length of 128bit, 192bit or 256bit |
SHA1 |
Hash |
MD5: input information of arbitrary length to obtain 128bit message digest. SHA-1: input information with shorter length of bit to obtain 160bit message digest. Comparing both, md5 is faster while sha-1 is safer. |
Group2 |
Diffie-Hellman Key Exchange |
Three options: Group 1, Group 2 and Group 5 |
86400 |
IKEv2 policy |
||
Identification |
User defined IKE policy identification |
N/A |
Encryption algorithm |
3DES encrypt plaintext with three DES cipher codes of 64bit DES: encrypt a 64bit plaintext block with 64bit cipher code AES: encrypt plaintext block with AES Algorithm with cipher code length of 128bit, 192bit or 256bit |
AES128 |
Integrity |
MD5: input information of arbitrary length to obtain 128bit message digest. SHA-1: input information with shorter length of bit to obtain 160bit message digest. |
SHA1 |
Diffie-Hellman key exchange |
Multiple options |
Group2 |
Lifetime |
Valid time of policy |
86400 |
IPSec Policy |
||
Name |
User define Transform Set name |
N/A |
Encapsulation |
Choose encapsulation forms of data packet AH: protect integrity and authenticity of data packet from hacker intercepting data packet or inserting false data packet on the internet. ESP: encrypt the user data needing protection, and then enclose into IP packet for the purpose of confidentiality of data. |
ESP |
Encryption |
Multiple options |
AES128 |
Authentication |
Multiple options |
SHA1 |
IPSec Mode |
Tunnel Mode: besides source host and destination host, special gateway will be operated with password to ensure the safety from gateway to gateway. Transmission Mode: source host and destination host must directly be operated with all passwords for the purpose of higher work efficiency, but comparing with tunnel mode the security will be inferior. |
Tunnel Mode |
IPSec tunnel configuration-basic parameters |
||
Opposite end address |
Opposite end IP address |
|
Interface name |
Select the interface name |
Cellular 1 |
IKE version |
Select the IKE version |
IKEv1 |
IKEv1 policy |
Policy identification defined in the IKEv1 policy list |
|
Ipsec policy |
Policy identification defined in the IPsec policy list |
|
Negotiation Mode |
Main mode: as an exchange method of IKE, main mode shall be established in the situation where stricter identity protection is required. Aggressive mode: as an exchange method of IKE, aggressive mode exchanging fewer message, can accelerate negotiation in the situation where ordinary identity protection is required. |
Main mode |
Authentication |
Alternative authentication: shared key and digital certificate |
Shared key |
Local subnet address |
The source network in the reverse crypto map ACL defined by IPESC |
N/A |
Subnet address of subnet addresses |
The source network in the destination network defined by IPESC |
N/A |
IPSec tunnel configuration-IKE advanced option (stage 1) |
||
Local identification |
The local identification corresponds to the selected local identification |
N/A |
Opposite end identification |
The opposite end identification corresponds to the selected opposite end identification |
N/A |
IKE connection detection (DPD) |
Receiving end will make DPD check and send request message automatically to opposite end for check. If it does not receive IPSec cryptographic message from peer end beyond timeout, ISAKMP Profile will be deleted. Used for detection interval of IPSec neighbour state. After initiating DPD, If receiving end can not receive IPSec cryptographic message sent by peer end within interval of triggering DPD, receiving end can make DPD check, send request message to opposite end automatically, detect whether IKE peer pair exists. |
0, 0 Proposed parameter 60, 180 |
XAUTH |
XAUTH user name, XAUTH code |
N/A |
IPSec tunnel configuration- IPSec advanced option (stage 2) |
||
Perfect Forward Security (PFS) |
Means the reveal of one cipher code will not endanger information protected by other cipher codes. |
Ban |
IPsec SA Lifetime |
Lifetime of IPSec Profile |
3600 |
IPSec tunnel configuration-Tunnel advanced option |
||
Respond Only |
If it is used, the local can only passively receive the Ipsec request and will not connect actively. It is commonly used in the server mode. |
Ban |
Rules for local/remote sending of certificates |
When using the certificate to build Ipsec, both ends shall know the certificate of each other and pass the verification before a successful connection can be built. The local certificate is generally kept but the certificate of the opposite end may be kept or may be not (common situation); generally, both ends will send the request for “certificate request” when IPSEC is being connected. The ipsec server will send its certificate to the opposite end after having received this request. Always send certificate: Some ipsec server does not send a “certificate request” request and it has not place to keep the certificate send from the opposite end, so the opposite end can build Ipsec only by being configured as “always send certificate”. Send certificate under request: The local certificate is sent only when the opposite end sends a request. Not send certificate: The certificate will be send to the opposite end no matter the opposite end sends a request or not. |
Always send certificate |
ICMP detection |
Detection server, detecting local address, detection interval, detection time-out, maximum number of retries |
N/A, N/A, 60, 5, 10 |
Parameters |
Description |
Default |
Basic parameters |
||
Name |
User defined |
admin |
IKE version |
Select the IKE version |
IKEv1 |
IKEv1 policy |
Policy identification defined in the IKEv1 policy list |
N/A |
Ipsec policy |
Policy identification defined in the IPsec policy list |
N/A |
Negotiation Mode |
Main mode: as an exchange method of IKE, main mode shall be established in the situation where stricter identity protection is required. Aggressive mode: as an exchange method of IKE, aggressive mode exchanging fewer message, can accelerate negotiation in the situation where ordinary identity protection is required. |
Main mode |
Authentication |
Alternative authentication: shared key and digital certificate |
Shared key |
IKE advanced option (stage 1) |
||
Local identification |
The local identification corresponds to the selected local identification |
N/A |
Opposite end identification |
The opposite end identification corresponds to the selected opposite end identification |
N/A |
IKE connection detection (DPD) |
Receiving end will make DPD check and send request message automatically to opposite end for check. If it does not receive IPSec cryptographic message from peer end beyond timeout, ISAKMP Profile will be deleted. Used for detection interval of IPSec neighbour state. After initiating DPD, If receiving end can not receive IPSec cryptographic message sent by peer end within interval of triggering DPD, receiving end can make DPD check, send request message to opposite end automatically, detect whether IKE peer pair exists. |
0, 0 |
IPSec advanced option (stage 2) |
||
Perfect Forward Security (PFS) |
Means the reveal of one cipher code will not endanger information protected by other cipher codes. |
Ban
|
IPsec SA Lifetime |
Lifetime of IPSec Profile |
3600 |
Parameters |
Description |
Default |
Enable |
Click to enable |
Enabled |
Interface Identifier |
Configure the name of GRE tunnel |
NO |
Network type |
Select GRE network type |
Point-to-point |
Local visual IP |
Configure local visual IP address |
NO |
Peer visual IP |
Configure peer visual IP address |
NO |
Source address type |
Select source address type, and configure corresponding types of IP addresses or interface names |
IP |
Local IP address |
Configure local IP address |
NO |
Peer address |
Configure peer address |
NO |
Password |
Configure tunnel password |
NO |
MTU |
Configure maximum transmission unit, in bytes |
NO |
Enable NHRP |
Next Hop Resolution Protocol applied in access connected source stations with to non-broadcast multiple access (NBMA) sub-network (mainframe or router). It also determines the network layer address and NBMA sub-network address of “NBMA next hop” before reaching targeted stations. |
Enabled |
Description |
Add description |
NO |
Parameters |
Description |
Default |
||||||
L2TP Class |
||||||||
Name |
User-defined L2TP Class name |
No |
||||||
Authentication |
Click to enable, authentication of backend is needed in network connection |
Disable |
||||||
Host Name |
Host name for home terminal network connection, unmatched is acceptable |
No |
||||||
Tunnel Authentication Password |
When authentication is enabled, tunnel authentication password must be configured, or no configuration will be required |
No |
||||||
Pseudowire Class |
||||||||
Name |
User defined pseudowire class name |
No |
||||||
L2TP Class |
L2TP class name defined above |
No |
||||||
Source port |
Select Source port name |
cellular 1 |
||||||
L2TP Tunnel |
||||||||
Enable |
Click to enable |
Enabled |
||||||
Identifier |
Generated Automatically |
1 |
||||||
L2TP Server |
Set L2TP Server address |
No |
||||||
Pseudowire Class |
Pseudowire class name defined above |
No |
||||||
Authentication Type |
Select authentication type |
Auto |
||||||
Username |
Peer server username |
No |
||||||
Password |
Peer server password |
No |
||||||
Local IP Address |
Set local IP automatically |
address, |
or |
let |
peer |
server |
allocate |
No |
Remote IP Address |
Set remote IP address, unmatched is acceptable |
No |
Parameters |
Description |
Default |
Enable |
Click to enable |
Enabled |
ID |
Set channel ID |
No |
Server IP Address |
Fill in IP address of backend server |
No |
Port Number |
Fill in port number of backend server |
1194 |
Certification Type |
Select certification type and configure corresponding parameters of certification type |
Username/Pas sword |
Username |
Keep consistency with server |
No |
Password |
Keep consistency with server |
No |
Channel Description |
Content described in user’s self-defined channel |
No |
Advanced Options |
||
Source Port |
Select name of source port |
No |
Network Type |
Select type of network |
net30 |
Port Type |
Select the data form sending out from the port. tun-data package, tap-data frame |
Tun |
Protocol Type |
Protocol in server communication and keep consistency with server protocol |
Udp |
Encryption Algorithm |
Keep consistency with server |
Default |
LZO Compression |
Click to enable |
Off |
Connection Testing Interval |
Set connecting testing time interval |
No |
Connection Testing Overtime |
Set connecting testing overtime |
No |
Expert Configuration |
Set expert option: blank advisable |
No |
Parameters |
Description |
Default |
Authentication Protected Password |
Configure authentication protected password |
No |
Confirmation of Authentication Protected Password |
Confirm authentication protected password |
No |
Parameters |
Description |
Default |
Serial Port Type |
Serial Port 1 is RS232, Serial Port 2 is RS485; cannot be changed |
RS232/RS485 |
Baud Rate |
Same with the baud rate of connected terminal device |
9600 |
Data Bit |
Same with the data bit of connected terminal device |
8 bits |
Parity |
Same with the parity of connected terminal device |
None |
Stop Bit |
Same with the stop bit of connected terminal device |
1 bits |
Software Flow Control |
Click to enable |
Off |
Description |
User define |
No |
Parameters |
Description |
Default |
|
Enable |
Click to enable |
Off |
|
DTU Protocol |
Transparent and TCP: router used as client when Transparent is chosen, router used as server when TCP is chosen. RFC2217: no need to configure serial port IEC101-104: for power industry, similar with TCP in function |
Transparent |
|
Protocol |
TCP or UDP |
TCP Protocol |
|
Connection Type |
Long connection or Short connection |
Long connection |
|
Heartbeat interval time |
User define |
60 |
|
Heartbeat Retry |
User define, TOP connection is off when reaching retry limit |
5 |
|
Serial Frames |
Buffer |
User define |
4 |
Serial Frame Length |
User define |
1024 |
|
Serial Interval |
Frame |
User define |
100 |
Min Interval |
Reconnect |
User define. If connection fails in device star-up, reconnection will be done based on this min interval, until the max reconnection interval reaches user defined value. |
15 |
Max Interval |
Reconnect |
User define. When connection interval reaches maximum, reconnection will be done according to this interval (user defined value). |
180 |
Multi-Server Policy |
Parallel: connect the center of destination IP address list at the same time Polling: connect to the first address in the list, if connect fail, continue to connect next address until connect one successfully, then stop. |
Parallel |
|
Source port |
4 options; No need to choose |
IP |
|
Local IP Address |
The device’s IP in Source port “IP” selection. No need to configure |
No |
|
DTU Identification |
User defined. DTU identification will be sent automatically to server after successful connection. Can remain empty without configuration. |
No |
|
Debug Log |
Click to enable |
Off |
|
Destination IP Address |
|||
Server Address |
User define |
No |
|
Server Port |
User define |
No |
Parameters |
Description |
Default |
Digital Input |
||
Digital Input 1 |
Voltage under 10V correspond to “low” (0) Voltage equals and above 10V correspond to “high” (1) |
Low (0) |
Relay Output |
||
Relay Output 1 |
Off by default. Can be turned on manually, otherwise it is remains off. |
On |
Action |
Off: Click to turn off On: Click to turn on Off->On: user define off time, after off time, it turns on automatically |
Off time: 1000ms |
Parameters |
Description |
Default |
Host |
Address of the destination host of PING detection is required. |
192.168.2.1 |
PING Count |
Set the PING count |
4 times |
Packet Size |
Set the packet size |
32 bytes |
Expert Options |
Advanced parameter of PING is available. |
No |
Parameters |
Description |
Default |
Host |
Address of the destination host which to be detected is required. |
192.168.2.1 |
Maximum Hops |
Set the maximum hops for traceroute |
20 |
Timeout |
Set the timeout of traceroute |
3 seconds |
Protocol |
Optional: ICMP/UDP |
UDP |
Expert Options |
Advanced parameter for traceroute is available. |
No |
Parameters |
Description |
Default |
Port |
Select new LAN port |
fastethernet 0/2 |
Host IP |
Host IP address can be configured all altered according to user definition |
No |
Subnet Mask |
User define subnet mask (generates automatically) |
255.255.255.0 |
DHCP Service |
Enable/Disable |
Disabled |
Start Address |
Set a starting IP address of dynamic allocation |
No |
End Address |
Set an ending IP address of dynamic allocation |
No |
Validity Period |
Set IP time limits of dynamic allocation |
1440 |
Parameters |
Description |
Default |
Port |
Select new WAN port |
fastethernet 0/1 |
Type |
Configuration type of WAN port IP Address |
Static IP |
Host IP |
Host IP address can be configured all altered according to user definition |
No |
Subnet Mask |
User define subnet mask (generates automatically) |
255.255.255.0 |
Gateway |
Configure gateway IP address |
No |
Network Address Switch |
Click to enable, can switch IP address of private network into public ones |
Disabled |
Parameters |
Description |
Default |
APN |
Select new WAN port |
3gnet |
Dialing Number |
Relevant dialing parameters provided be mobile operators (select according to local operator) |
*99***1# |
Username |
Relevant dialing parameters provided be mobile operators (select according to local operator) |
gprs |
Password |
Relevant dialing parameters provided be mobile operators (select according to local operator) |
●●●● |
Network Address Switch |
Click to enable, can switch IP address of private network into public ones |
Disabled |
Parameters |
Description |
Default |
Basic Parameters |
||
Tunnel Serial Number |
Set a serial number for new tunnel |
1 |
Port Name |
Select port name |
cellular 1 |
Peer Address |
Set VPN peer IP |
No |
Negotiation Mode |
Main mode or aggressive mode selectable.(Main mode is chosen normally) |
Main Mode |
Local Subnet Address |
Set IPSec local protection subnet |
No |
Local Subnet Mask |
Set IPSec local protection subnet mask |
255.255.255.0 |
Peer Subnet Address |
Set IPSec peer protection subnet |
No |
Peer Subnet Mask |
Set IPSec peer protection subnet mask |
255.255.255.0 |
Phase I Parameters |
||
IKE Strategy |
3DES-MD5-DH1 or 3DES-MD5-DH2 |
3DES-MD5-DH2 |
IKE Life Cycle |
Set IKE life cycle |
86400 seconds |
Local Identifier Type |
FQDN, USERFQDN, IP address |
IP address |
Local Identifier |
FQDN and USER FQDN only. Fill in the identifier according to the identifier type (USER FQDN is standard email format) |
No |
Peer Identifier Type |
FQDN, USER FQDN, IP address |
IP address |
Peer Identifier |
FQDN and USER FQDN only. Fill in the identifier according to the identifier type (USER FQDN is standard email format) |
No |
Authentication Type |
Shared key, digital certificate |
Shared key |
Password |
This item is displayed if the authentication type is shared password. Set the IPSec VPN negotiation password |
No |
Phase II Parameters |
||
IPSec Strategy |
3DES-MD5-96 or 3DES –SHA1-96 |
3DES-MD5-96 |
IPSec Life Cycle |
Set IPSec life cycle |
3600 seconds |
Parameters |
Description |
Default |
Protocol |
TCP or UDP |
TCP |
Outside Port |
Outer net connection port selected by user |
Cellular |
Service Port |
TCP or UDP data transmission port |
No |
Internal Address |
The device address of mapping subject |
No |
Internal Port |
TCP or UDP port of mapping subject |
No |
Description |
User define |
No |