The InGateway902 (IG902 for short) series is a new-generation series of 4G edge computing gateways developed by InHand Networks for the Industrial IoT sector. It provides omnipresent, uninterrupted Internet access over globally deployed 3G or 4G wireless networks and various broadband services. With superb edge computing capability and comprehensive features such as security guarantee and wireless services, the product is able to connect tens of thousands of devices and provide high-speed data channels for IT-based device management.The powerful edge computing capability of the IG902 enables it to provide data optimization, real-time response, agile connection, and intelligent analysis at the edge of the IoT. Using IG902 gateways as edge nodes can significantly reduce the data traffic between the data center and on-site devices, and prevent bottlenecks of cloud computing. In addition, the IG902 optimizes the network architecture, and provides higher security, faster response, and more intelligent services.
The following figure shows common application scenarios of the IG902.
Each edge computing gateway product is delivered with accessories (such as standard accessories) frequently used at the customer site. Check the received product against the packing list carefully. If any accessory is missing or damaged, contact the InHand sales personnel promptly.InHand provides customers with optional accessories based on the characteristics of different sites. For details, see the optional accessories list.
Standard accessories
Optional accessories
Wi-Fi Antenna
The panel introduction of IG902 is shown in the figure below (The IG900 series product is applicable to multiple panel appearances, as they have the same installation method. Refer to the actual product during operation.):
The structural and dimensions of IG902 are shown in the following figure:
Note: Two SIM card indicators are provided. The indicator for SIM card 1 is turned on during the startup process and when startup is successful. In the last four situations, the indicator for the used SIM card is turned on. The following figure shows the indicator for SIM card 1.
Signal: 1–9, there might be a signal problem. Check whether the antenna is installed properly and whether the signal quality in the operating area is good.
Signal: 10–19, indicating that signal and device operation are normal.
Signal: 20–31, indicating good signal.
Procedure:
Step 1: Select an installation place and reserve enough space for installation.
Step 2: Insert the upper part of the DIN rail seat onto the DIN rail. Grab the lower end of the device and revolve it upward in the direction indicated by arrow 2 with gentle force, to insert the DIN rail seat onto the DIN rail. Check that the device is installed reliably on the DIN rail, as shown in following figure on the right.
Procedure:
Step 1: Press the device downward in the direction indicated by arrow 1 in following figure to create a gap near the lower end of the device so that the device isolates from the DIN rail.
Step 2: Revolve the device in the direction indicated by arrow 2, and grab the lower end of the device and move the device outward. Lift the device when its lower end isolates from the DIN rail. Then, take off the device from the DIN rail.
Procedure:
Step 1: Select an installation place and reserve enough space for installation.
Step 2: Install the wall mounting bracket on the back of the device by using a screwdriver, as shown in following figure.
Step 3: Take out the screws (packaged with the wall mounting bracket), fasten the screws in the installation positions by using the screwdriver, and pull down the device to make it secure, as shown in following figure.
Procedure: Hold the device with one hand and unfasten the screws that fix the upper end of the device with the other hand, to remove the device from the installation place.
IG902 supports Dual SIM card. Unfasten the screws on the cover of the SIM card holder by using a screwdriver and insert a SIM card.
Revolve the movable part of the metal SMAJ interface with gentle force until it cannot be revolved, in which state the outer thread of the antenna connection cable is invisible. Do not wring the antenna with force by grabbing the black plastic cover.
Note:
Procedure:
Step 1: Remove the terminal from the gateway.
Step 2: Unfasten the locking screw on the terminal.
Step 3: Connect the power cable to the terminal and fasten the locking screw.
Procedure:
Caution: Ground the gateway to improve its interference resistance. Connect the ground cable to the ground post of the gateway based on the operation environment.
Connect the gateway to a PC directly by using the Ethernet cable.
Terminals provide the RS232 and RS485 interface modes. Connect cables to the corresponding terminals before using the interfaces. During installation, remove the terminals from the device, unfasten the locking screws on the terminals, connect cables to the corresponding terminals, and fasten the screws. Sort the cables in order.
Note: This section is only applicable to IG902 with industrial interfaces.
Step 1: Set an IP address for your PC, which is on the same network segment as the IP address of interface GE 0/2 on the IG902. The default IP address of GE 0/2 is 192.168.2.1.
Method 1: Enable the PC to obtain an IP address automatically (recommended).
Method 2: Use a fixed IP address.
Select Use the following IP address, enter an IP address (any value between 192.168.2.2 and 192.168.2.254 by default), subnet mask (255.255.255.0 by default), default gateway (192.168.2.1 by default), and DNS server address, and click OK.
Step 2: Start the browser to visit the IP address of GE 0/2 on the IG902, and enter the user name and password on the login page that appears. The factory default user name and password of the IG902 are adm and 123456, respectively.
Step 3: After logging in, you will see the web page as shown in the following figure.
The Overview page displays information about the IG902, such as its network connection status, system information, and data usage. You can quickly obtain the IG902 running status on this page.After you log in to the IG902 web page, the Overview page appears by default. You can also click Overview to display this page. This page displays the following information:
Network Connection Status: shows the IG902’s network connection status and network configuration.
Edge Computing: shows the status of Python edge computing.
Data Usage Monitoring: shows the usage of data traffic in the last 24 hours. One data record is produced every hour.
CPU Load: shows the CPU usage in the last 1 minute, 5 minutes, and 15 minutes.
Memory: shows the current memory usage.
System Information: You can click the Edit icon to change name of the IG902.
The Cellular page displays the configuration and status of the IG902’s dial-up interface. You can set dial-up interface parameters to connect the IG902 to a cellular network or view details about the dial-up interface on this page. Follow these steps to configure the dial-up interface:
The cellular network parameters are described as follows:
*99***1#
.#777
.gprs
.gprs
.The Ethernet page displays the configuration and status of Ethernet interfaces on the IG902. You can set Ethernet interface parameters or view details about the Ethernet interfaces on this page. Follow these steps to configure the Ethernet interfaces:
gigabitethernet 0/2
from the Bridge page first.)The following figure shows the configuration of GE 0/1, with Network Type set to DHCP.
The following figure shows the configuration of GE 0/1, with Network Type set to Static IP.
The following figure shows the configuration of GE 0/2, with Network Type set to Static IP.
The Ethernet parameters are described as follows:
The WLAN page displays the WLAN configuration and status on the IG902. You can set WLAN parameters or view detailed WLAN status information on this page. Follow these steps to configure WLAN parameters:
The following figure shows the configuration of the gateway as a wireless access point (AP).
The following figure shows the configuration of the gateway as a wireless client.
The WLAN parameters are described as follows:
The bridge interface is a logical, virtual interface on the IG902. You can bridge the radio interface with interface GE 0/2. (If Station Role
is set to client
on the WLAN
page, the radio interface cannot be selected as a bridge member.) Follow these steps to configure the bridge interface:
As shown in the following figure, the radio interface is bridged with interface GE 0/2.
The bridge interface parameters are described as follows:
The loopback interface is a logical, virtual interface on the IG902. After you create and configure the loopback interface, you can ping its IP address or set up a Telnet connection to it to test the network connectivity. You can set or view loopback interface parameters on the Loopback page. Follow these steps to configure the loopback interface:
As shown in the following figure, a secondary IP address 127.0.0.2 is set for the loopback interface.
Caution: You can set a maximum of 10 secondary IP addresses for the loopback interface.
The Dynamic Host Configuration Protocol (DHCP) uses the client/server communication model. The client sends a configuration request to the server, and the server replies with the IP address allocated to the client and other configuration information. In this way, the client IP address and other configuration is assigned dynamically. You can configure a DHCP server and view its configuration on the DHCP Server page. Follow these steps to configure a DHCP server:
The following figure shows the DHCP server configuration.
The DHCP server parameters are described as follows:
Windows Name Server (WINS): specifies the IP address of the WINS server.
Static IP Setting: allows you to bind a fixed IP address to a MAC address, as shown in the following figure.
A DHCP relay (or DHCP relay agent) can process and forward DHCP information between subnets and physical network segments. You can configure a DHCP relay and view its configuration on the DHCP Relay page. Follow these steps to configure a DHCP relay:
The following figure shows the DHCP relay configuration.
The DHCP relay parameters are described as follows:
A domain name system (DNS) is a distributed database used for TCP/IP applications and provides translation between domain names and IP addresses. DNS allows users to access some applications by using easy-to-remember, meaningful domain names, which are then translated into the correct IP addresses by a DNS server on the network. You can configure a DNS server and the DNS relay service and view the configuration on the DNS page.
Follow these steps to configure a DNS server:
The following figure shows the DNS server configuration.
Follow these steps to configure the DNS relay service:
The following figure shows the configuration of the DNS relay service.
On the GPS page, you can enable or disable the GPS service, view the IG902 location information, and configure IP forwarding and serial forwarding for GPS. The IG902 can act as a GPS client or server for IP forwarding. Choose Network > Network Services > GPS to display the GPS page.
Follow these steps to configure GPS forwarding:
The following figure shows the configuration of GPS IP forwarding.
The following figure shows the configuration of GPS serial forwarding.
The parameters of GPS IP forwarding are described as follows:
Parameters of GPS serial forwarding are described as follows:
You can view information about hosts connected to the IG902 on the Host List page. Choose Network > Network Services > Host List to display the Host List page, as shown in the following figure.
Choose Network > Routing > Routing Status to display the Routing Status page. This page displays information about static routes configured on the IG902, as shown in the following figure.
You can configure static routes on the Static Routing page. Then, packets sent to a specific destination are forwarded through the specified route. (Generally, you do not need to configure static routes.) Follow these steps to configure a static route:
The following figure shows the configuration of a static route.
Parameters of a static route are described as follows:
An access control list (ACL) permits or denies specified data flows (such as the data flow from a specified source IP address or account) based on a series of matching rules to filter the data reaching a network interface. You can configure a data filtering policy for a network interface on the ACL page. The configuration procedure is as follows:
The following figure shows the configuration of a standard access control policy.
The following figure shows the configuration of an extended access control policy.
The following figure shows the configuration of an access control list.
Network address translation (NAT) allows multiple hosts in a LAN to connect to the Internet by using one or multiple public IP addresses. This feature maps a few public IP addresses to many private IP addresses to conserve public IP addresses. You can view and configure NAT rules on the NAT page. The configuration procedure is as follows:
As shown in the following figure, the NAT rule allows hosts connected to the IG902 to connect to the Internet by using the IP address of interface GE 0/2.
Parameters of the NAT rule are described as follows:
The Python Edge Computing page displays information about the Python secondary development environment on the IG902, as well as the configuration and running status of Python apps on the IG902. You can use the secondary development environment to develop custom Python apps, and set or view app status.Follow these steps to configure the Python secondary development environment:
Follow these steps to configure a Python app:
The following figure shows the configuration of the Python development environment on the IG902.
The following figure shows the app running status (HelloWorld as an example).
The app configuration functions are described as follows:
The IG902 supports hosting of Docker images. You can release your Docker images on the IG902 to deploy and run self-developed applications quickly.Follow these steps to configure a Docker environment:
As shown in the following figure, the Docker manager is enabled.
Parameters on the Docker management page are described as follows:
To enable the IG902 to cooperate with other devices properly, you may need to set an accurate system time for it. For this purpose, set the system time on the System Time page and enable the NTP protocol to implement clock synchronization among all clock-supporting devices on the network. In this way, all devices maintain the same clock to provide applications based on the consistent time. Follow these steps to set the system time:
Follow these steps to enable the NTP server to synchronize time to other devices.
The following figure shows how to select a time zone or set a system time manually.
The following figure shows how to enable SNTP clients.
The following figure shows how to enable the NTP server to synchronize time to other devices.
SNTP client parameters are described as follows:
The NTP server parameters are described as follows:
Choose System > Log to display the Log page. This page displays a large amount of information about the network and IG902, such as its running status and changes of configuration. On the Configure page, you can set a remote log server. Then, the IG902 will synchronize all system logs to the remote log server. The host used as the remote log server must run a remote log program (for example, Kiwi Syslog Daemon
).
Choose System > Configuration Management to display the Configuration Management page. On this page, you can back up configuration parameters, import parameter settings, and restore factory settings of the IG902. These functions are described as follows:
The Device Manager developed by InHand Networks allows you to monitor the status of IG902 gateways, maintain on-site devices remotely, configure and upgrade a batch of IG902 gateways at the same time remotely, and perform other management operations to manage IG902 gateways and on-site devices more conveniently and efficiently. You can connect an IG902 to the Device Manager on the Device Manager page to use the functions and services of the platform. Follow these steps to connect to the Device Manager:
The following figure shows the configuration that connects the IG902 to the iot.inhandnetworks.com
(DM) platform.
Parameters of the Device Manager are described as follows:
You can upgrade the firmware version for the IG902 on the Firmware Upgrade page, so that the IG902 can provide new functions or better user experiences. Follow these steps to upgrade the firmware version:
To facilitate IG902 management and configuration, you can configure the IG902 management and access methods on the Access Tools page. Follow these steps to complete the configuration:
The following figure shows the configuration of HTTPS-based management.
The following figure shows the configuration of Telnet-based management.
The following figure shows the configuration of SSH-based management.
The HTTPS parameters are described as follows:
The Telnet parameters are described as follows:
The SSH parameters are described as follows:
On the User Management page, you can add user accounts and manage the password and access rights of each account. These accounts allow multiple users to access and manage the IG902. Follow these steps to add a user:
Choose System > Reboot to display the Reboot page, and then reboot the IG902 or set a scheduled reboot plan for it.As shown in the following figure, the IG902 is configured to reboot on 0:00 every day.
Choose System > Network Tools to display the Network Tools page. You can diagnose network problems of the IG902 on this page. You can enter some extension options in the Expert Options area. For example, expert option -t for the ping tool enables the IG902 to ping a specified host continuously until you stop the ping. The ping tool can be used to check whether a network is reachable. The following figure shows the configuration of a ping test.
The traceroute tool can be used to determine the route used to transmit IP datagrams to a destination. The following figure shows the configuration of a traceroute test.
The Tcpdump tool can be used to capture packets transmitted on a specified interface. The following figure shows the Tcpdump configuration.
Choose System > 3rd Party Notification to display the 3rd Party Notification page. You can view the statement about the third-party software used for the IG902.
You can click the InGateway logo in the upper left corner of any web page of the IG902 to return to the Overview page quickly.
To log out from the IG902, click the user name in the upper right corner.
You can click the globe icon in the upper right corner to change the language of web pages. The IG902 supports simplified Chinese and English.
On this page, you can view the system status and network status (including the firmware version, MAC address, system time, and start time of the gateway), specify the language of the web pages, and set a host name for the gateway. In the Network Status area, you can click Settings next to Cellular1, Gigabitethernet 0/1, Gigabitethernet 0/2, or Bridge 1 to enter the corresponding interface configuration page.
AAA is a method to determine who can access a server and what services they can use on the server. It is a structure used to configure three independent security functions in the same way. This structure provides the following service modules:
Note: When RADIUS, TACACS+, and local modes are all configured, they are used following the preference order of 1 > 2 > 3.
The RADIUS protocol uses the client/server (C/S) model. A network access server (NAS) is a RADIUS client that transmits user authentication information to a specified RADIUS server and processes the response packets received from the RADIUS server. The RADIUS server receives users’ access requests, authenticates their identities, and sends the required configuration information for users to the client. All data transmitted between the server and client is verified using a shared key. The client and server encrypt user passwords before transmitting them to each other, ensuring the security of passwords. The RADIUS service uses UDP as the transmission protocol and is often used in network environments that require high security and allow remote access.
The RADIUS parameters are described as follows:
The Terminal Access Controller Access Control System Plus (TACACS+) protocol is a security protocol that enhances functions of the TACACS protocol. This protocol provides functions similarly to RADIUS and uses the client/server model for communication between the NAS and TACACS+ server. TACACS+ supports independent authentication, authorization, and accounting.
The TACACS+ parameters are described as follows:
The Lightweight Directory Access Protocol (LDAP) is based on the X.500 standard but is much simpler and is customizable. Unlike X.500, LDAP supports TCP/IP. In simple words, LDAP provides centralized management of user access, authentication, and authorization. This protocol is easy to customize and supports centralized management of users and user groups, centralized information storage, setting of security and access control policies, security delegation reading, change of user rights, and other related functions.
The LDAP parameters are described as follows:
The IG902 supports the following authentication methods:
The IG902 supports the following authorization methods:
Caution: Authentication method 1 must be consistent with authorization method 1. Authentication method 2 must be consistent with authorization method 2. Authentication method 3 must be consistent with authorization method 3.
The alarm function allows you to discover exceptions on the gateway in real time, so that you can fix the exceptions quickly. When an exception occurs, the gateway raises an alarm. You can select types of exceptions defined in the system and choose an appropriate alarm reporting way to obtain exception information. All alarms are recorded in alarm logs to facilitate troubleshooting.Alarms are classified into system alarms and port alarms:
Alarms have the following states:
Alarms are classified into the following levels:
On the Alarm page, you can perform the following operations:
Backup connections are often used between devices in a network environment to improve the network robustness and stability. These backup connections are also called backup links or redundant links.
InHand SLA is implemented in the following way: 1. Object tracking: This module traces the reachability of a specified object. 2. SLA probe: The object tracking module uses the InHand SLA function to send different types of probes to the specified object. 3. Policy-based routing using a route mapping table: This module associates tracking results with routing processes. 4. Static routing and tracking options.Follow these steps to configure InHand SLA:
The SLA parameters are described as follows:
The track module implements the association function together with application modules and monitoring modules. Located between application and monitoring modules, the track module shields the difference in monitoring modules and provides the same interface for application modules.Parameters of the track module are described as follows:
The Virtual Router Redundancy Protocol (VRRP) enables multiple routers on a LAN to function as one virtual router. A router can be virtualized into multiple virtual routers based on IP addresses of VLAN interfaces on different network segments. Each virtual router is identified by an ID. A router can be virtualized into up to 255 virtual routers.The interface tracking capability of VRRP extends the backup function, providing backup for not only interfaces on other routers but also other interfaces on the local router (such as an upstream interface) when these interfaces are faulty. When an upstream interface is in Down or Removed state, the local router lowers its own priority to enable another router with a higher priority in the VRRP group to become the gateway for traffic forwarding.The VRRP parameters are described as follows:
Interface backup refers to master-backup bindings between interfaces on the same device. When the main interface in a binding cannot transmit service traffic properly due to an interface failure or sufficient bandwidth, traffic can be quickly switched to the backup interface. The backup interface then transmits all traffic or shares a part of traffic. This feature improves the reliability of data communication between devices.The interface backup parameters are described as follows:
Routing is a process that determines the end-to-end route of packets sent from a source to a destination. Routing works on data packet forwarding devices on Layer 3 of the OSI reference model. A router connects networks by forwarding data packets between them. When the router receives a data packet, it determines the outbound interface and next-hop IP address by searching for the destination IP address of the data packet in its routing table, and then rewrites the link-layer header of the data packet for forwarding. The router dynamically maintains a routing table to record the current network topology and updates routing information based on link information received from other routers on the network.
Static routes are manually configured. After you configure a static route to a destination address, packets destined for this address will be forwarded along this route. Generally, you do not need to configure static routes.Parameters of a static route are described as follows:
The interior gateway protocol used in an autonomous system (AS) can be the Open Shortest Path First (OSPF) protocol or Routing Information Protocol (RIP).
The RIP protocol is applicable to small-sized networks. It measures the distance to a destination by hop count, which is called metric. The number of hops from a router to a directly connected network is 0, and the number of hops to a network reachable through another router is 1. That is, the hop count increases with the number of intermediate routers. To limit the convergence time, RIP defines a metric range of 0-15. A hop count of 16 or larger is considered infinite, indicating that the destination network or host is unreachable. To improve the routing performance and prevent routing loops, RIP provides the split horizon feature. RIP can also import routing information learned by other routing protocols.
The RIP parameters are described as follows:
The Open Shortest Path First (OSPF) protocol is a link state-based interior gateway protocol developed by the IETF.The OSPF parameters are described as follows:
The parameters of a route filtering policy are described as follows:
Multicast routing establishes loop-free transmission paths from a data source to multiple receivers. These paths form a multicast distribution tree. A multicast routing protocol establishes and maintains a multicast routing table, and forwards multicast data packets correctly and efficiently based on the multicast routing table.
On the Basic tab page, you can specify a multicast data source. The basic parameters are described as follows:
The Internet Group Management Protocol (IGMP) is a multicast protocol in the IP protocol suite, and is used by IP hosts to report their group membership to any immediately neighboring router. This protocol defines the model of multicast communication between hosts on different network segments. Routers on these network segments must support multicast communication. IGMP establishes and maintains multicast group memberships between IP hosts and immediately neighboring multicast routers. It defines how the group memberships of hosts on a network segment are maintained on a multicast router.The IGMP parameters are described as follows:
A VPN is a virtual private communication network established over the Internet depending on an Internet service provider (ISP) and a network service provider (NSP). A virtual network refers to a logical network.
IPsec is a group of open network security protocols formulated by the IETF, which provide data source authentication, data encryption, data integrity check, and anti-replay on the IP layer to ensure the security of data transmission over the Internet. IPsec lowers the risk of data leakage and interception, ensures data integrity and confidentiality, and protects security of service data transmission.
The IPsec parameters are described as follows:
The IPsec extension parameters are described as follows:
Note:
Generic Routing Encapsulation (GRE) is a protocol that encapsulates packets of any network-layer protocol with another network-layer protocol. GRE can be used as a Layer 3 tunneling protocol to provide a transparent transmission channel for VPN data. To put it simply, GRE is a tunneling technology that provides a channel to transmit encapsulated data packets. Data packets are encapsulated on one end of the tunnel and decapsulated on the other end.The GRE parameters are described as follows:
Note:
The Layer 2 Tunneling Protocol (L2TP) is a virtual private dial-up network (VPDN) tunneling protocol that extends Point-to-Point Protocol (PPP) applications. It is an important VPN technology that enables users to dial up to headquarters networks of their enterprises remotely.
The parameters of an L2TP client are described as follows:
Parameters of an L2TP server are described as follows:
In the OpenVPN architecture, when a user accesses a remote virtual address (an address of a virtual NIC, not a real address), the operating system uses the routing mechanism to send the datagrams (TUN mode) or data frames (TAP mode) to the virtual NIC. When the service program receives the data, it processes the data and sends the data to the external network through the socket. When the remote service program receives the data from the external network through its socket, it processes the data and sends the data to the virtual NIC. The application software then receives the data. At this time, a unidirectional transmission process is completed. The reverse transmission process is similar.
The parameters of an OpenVPN client are described as follows:
The parameters of an OpenVPN server are described as follows:
The Simple Certificate Enrollment Protocol (SCEP) is a certificate management protocol formulated jointly by Cisco and Verisign. This protocol combines PKCS#7 and PKCS#10 standards, and supports extensive clients and certification authorities (CAs).The certification management parameters are described as follows:
Note: When using a certificate, ensure that the system time is consistent with the actual time.
The IG902 provides industrial interfaces to connect to terminals with industrial interfaces. It forwards data from these terminals to the upstream device wirelessly through the gateway, implementing wireless communication between the terminals and upstream device. Industrial interfaces of the IG902 include serial interfaces and I/O interfaces. Serial interfaces include RS232 and RS485 interfaces. I/O interfaces include digital input, relay output, and analog input interfaces.
To ensure proper communication between the IG902 and terminals, you need to set its serial port parameters based on serial port settings on the terminals.The serial port parameters are described as follows:
Caution:
The parameters of DTU1 are described as follows:
Note: You can specify a maximum of 10 destination IP addresses.
The parameters are same as those of DUT1.
The relay output is ON by default. You can set the relay output status to OFF or ON, or set the OFF timer to enable relay output to turn on automatically.States of I/O interfaces are as follows:
The I/O interface parameters are described as follows:
The Wizards page provides simplified configuration of general settings to help you complete simple, basic configuration of the IG902 quickly. The configuration result is not displayed on the Wizards page, but you can view the configuration result on the page of the corresponding feature.
The parameters on the New LAN page are described as follows:
The parameters on the New WAN page are described as follows:
The parameters on the New Cellular page are described as follows:
The parameters on the New IPsec Tunnel page are described as follows:
Caution: You must create inbound and outbound rules for each tunnel. A filtering policy will not be applied if it contains only the rule for one direction.
Follow these steps: