background image

 

31 

Parameters 

Description 

Default 

Server Address 

Server address (domain name / IP) 

None 

Port 

Consistent with the server port 

49 

Key 

Consistent with the server authentication key 

None 

3.2.4.3 LDAP 

One of the great advantages of LDAP is rapid response to users’ searching request. For instance, user’s 

authentication which may general a large amount of information sent as the same time. If database is adopted for 

this purpose, since it is divided into many tables, each time to meet such a simple requirement, the whole database 

has to be searched, integrated and filtered slowly and disadvantageously. LDAP, simple as a table, only requires 

username and command and something else. Authentication is met from efficiency and structure.   

From the left navigation panel, select 

Administration << AAA

, then enter “

LDAP

” page, as shown below. 

 

Page description is shown below: 

Parameters 

Description 

Default 

Name   

Define server name 

None 

Server Address 

Server address (domain name / IP) 

None 

Port 

Consistent with the server port 

None 

Base DN 

The top of LDAP

None 

directory tree 

Username 

Username accessing the server 

None 

Password 

Password accessing the server 

None 

Security   

Encryption mod: None,SSL,StartTLS 

None 

Verify Peer   

Verify Peer 

Unopened 

3.2.4.4 AAA Settings 

AAA supports following authentication ways:   

  None: with great confidence to users, legal check omitted, generally not recommended.   

  Local: Have user’s information stored on NAS. Advantages: rapidness, cost reduction. Disadvantages: 

storage capacity limited by hardware.   

  Remote: Have user’s information stored on authentication server. Radius,  and LDAP supported 

Summary of Contents for InRouter900 Series

Page 1: ...1 InRouter900 Series User s Manual InHand Network www inhandnetworks com Version V3 0 July 2015...

Page 2: ...d Keywords of command line the part that should be remained unchanged in command and be entered as it is are expressed with bold font Italic The parameters of command line the part that must be replac...

Page 3: ...ing Documentation The latest product information is available on the website of InHand www inhandnetworks com The main columns related to product information on the website of InHand are described as...

Page 4: ...cel the Proxy Server 16 3 WEB CONFIGURATION 18 3 1 Login the Web Setting Page of Router 19 3 2 Management 19 3 2 1 System 20 3 2 2 System Time 21 3 2 3 Admin Access 24 3 2 4 AAA 28 3 2 5 Configuration...

Page 5: ...3 8VPN 99 3 8 1IPSec 100 3 8 2GRE 107 3 8 3 DMVPN 109 3 8 4L2TP 117 3 8 5OPENVPN 118 3 8 6 Certificate Management 122 3 9 Industrial 123 3 9 1 DTU 123 3 9 2 IO 130 3 10 Tools 130 3 10 1PING 130 3 10...

Page 6: ...6 APPENDIX 2 INSTRUCTION OF COMMAND LINE 139 APPENDIX 3 GLOSSARY OF TERMS 145 APPENDIX 4 DESCRIPTION OF LEDS 147...

Page 7: ...N port access but also effectively save additional purchasing cost on switch equipments 1 2 Product Features Uninterrupted Access to Internet from Anywhere Redundant WAN connection 2 Ethernet ports 3G...

Page 8: ...system across multiple operators SNMP software platform so as to integrate into enterprise level IT management system Multiple diagnostic tools supporting 3G 4G modem status IMEI IMSI and registration...

Page 9: ...nd Networks legacy on best in class ruggedized design From component selection to circuit layout InRouter 900 satisfies electric power and industrial applications on EMC IP protection temperature rang...

Page 10: ...10 throughput Easily establish wireless LAN support WEP WPA WPA2 for network security WIFI can be the backup WAN link for 3G 4G...

Page 11: ...n of IP address recommended Please set the supervisory computer to automatic acquisition of IP address and automatic acquisition of DNS server address default configuration of computer system to let t...

Page 12: ...12 3 Click Properties to enter the window of Local Connection Properties as shown below...

Page 13: ...Version 4 TCP IPv4 click Properties to enter Internet Portocol Version 4 TCP IPv4 Properties page Select Obtain an IP address automatically and Obtain DNS Server address automatically then click OK to...

Page 14: ...rtocol Version 4 TCP IPv4 Properties page select Use the following IP address type IP address arbitrary value between 192 168 2 2 192 168 2 254 Subnet Mask 255 255 255 0 and Defafult Gateway 192 168 2...

Page 15: ...15 2 2 Confirm that the network between the supervisory PC and router is connected 1 Click the button Start at the lower left corner to research cmd exe and run cmd exe...

Page 16: ...ter side it indicates that the network is connected otherwise check the network connection 2 3 Cancel the Proxy Server If the current supervisory computer uses a proxy server to access the Internet it...

Page 17: ...ct the tab Connect and click the button LAN Setting L to enter the page of LAN Setting Please confirm if the option Use a Proxy Server for LAN is checked if it is checked please cancel and click the b...

Page 18: ...18 3 Web Configuration...

Page 19: ...default adm and Password default 123456 and click button OK or directly press Enter to enter the Web setting page At the same time the router allows up to four users to manage through the Web setting...

Page 20: ...clicking Sync Time you can make the time of router synchronized with the system time of the host Click the Set behind Cellular1 Fastethernet 0 1 and Fastethernet 0 2 respectively on network status to...

Page 21: ...em time as well as system time zone The device supports manual setting of system time and the time to pass self synchronistic SNTP server 3 2 2 1 System Time Time synchronization of router with connec...

Page 22: ...er network protocol and provides comprehensive mechanisms to access national time and frequency dissemination services organize the time synchronization subnet and adjust the local clock in each parti...

Page 23: ...ess domain name IP maximum to set10 SNTP server None Port The service port of SNTP server 123 The meanings of key items in the page are shown in the table below Before setting a SNTP server should ens...

Page 24: ...Select Administration Admin Access then enter Create a User page as shown below Create a user Page description is shown below Parameters Description Default Username New username None New Password Ne...

Page 25: ...ssword None Confirm New Password Confirm the new password None 3 2 3 3 Remove Users From the left navigation panel select Administration Admin Access then enter Remove Users page as shown below Press...

Page 26: ...ce Encrypt the data exchanged between client and device to guarantee security and integrality of data transmission so as to achieve the safe management of device An access control strategy based on ce...

Page 27: ...network Support RAS authentication Support encryption algorithms such as DES 3DES and AES128 to encrypt username password and data transmission IR900 only supports SSH Server and could connect with mu...

Page 28: ...of SSH session No operation within this period on SSH Client SSH Server disconnect Default 120s Cipher Mode set up public key encryption method currently only RSA supported Cipher Code Length set up...

Page 29: ...rk from any disturbance from unauthorized access and is generally applied in various network environments with higher requirements on security and that permit remote user access The protocol has defin...

Page 30: ...Client Server mode to achieve the communication between NAS and Tacacs Server But Tacacs adopts TCP while Radius adopts UDP Tacacs ismainly used for authentication authorization and charging of access...

Page 31: ...rom efficiency and structure From the left navigation panel select Administration AAA then enter LDAP page as shown below Page description is shown below Parameters Description Default Name Define ser...

Page 32: ...shown below Page description is shown below Key Items Description radius Authentication and Authorization Server tacacs Authentication and Authorization Server ldap Authentication and Authorization Se...

Page 33: ...tion files and save the correct configuration files when system restarts it will orderly execute theses configuration files If the configuration files didn t be arranged according to effective order t...

Page 34: ...the same network which are scattered making onsite device configuration impracticable Moreover in case that those network devices are supplied from different sources and each source has its independe...

Page 35: ...and report all the events to NMS 3 2 6 1 SNMP Basic Setting SNMP agent of device supports SNMPv1 SNMPv2 and SNMPv3 at present SNMPv1 and SNMPv2 adopt community name to authenticate SNMPv3 adopt userna...

Page 36: ...View Read write View Only support defaultView at present defaultView Inform View Only support defaultView at present defaultView 3 2 6 2 SnmpTrap Setting SNMP trap A certain port where devices under t...

Page 37: ...appened to some exception divided into temperature hot start cold start power failure power recovery insufficient memory Port Alarm It produces because of the network interface is up or down divided i...

Page 38: ...set all the alarm to clear state Click Confirm All Alarms to set all the alarm to cconfirm state Click Reload to reload all the alarms Page description is shown below Parameters Description Default ID...

Page 39: ...PoE Up Down alarm Off Ethernet Up Down On Off Ethernet Up Down alarm Off 3 2 7 3 Alarm Output When an alarm happens the system configured with this function will send the alarm content to intended ema...

Page 40: ...Addresses Destination address of receiving alarm email 1 10 None When the email parameters had been configured you should click the send test email button so that ensure the configuration is correct...

Page 41: ...ystem Log could provide information to help network administrator to find network problems or safety hazard so as to take more targeted measures 3 2 8 1 Log From the left navigation panel select Admin...

Page 42: ...of free log server software used in Windows which could receive record and display logs formed when powering on the host of syslog for example router exchange board Unix host After downloading and in...

Page 43: ...ve the configurations before reboot otherwise the configurations that are not saved will be lost after reboot 3 2 11 Device Management Device Management is a software platform to manage equipment The...

Page 44: ...t c inhandnetworks com Port Set port No of device management 9002 Login retry times Set retry times 3 Heartbeat interval time Set heartbeat interval 120 sec Serial port type RS232 RS485 RS232 3 2 11 2...

Page 45: ...onfiguration interface as PPPoE Client PPPoE the short form of Point to Point Protocol over Ethernet achieves networking of a large number of hosts through Ethernet connects with internet through a re...

Page 46: ...ere is manual mode namely manually configuring an IP address and subnet mask The configuration of the two Ethernet ports is the same Take Ethernet 0 1 as an example From navigation panel select Networ...

Page 47: ...status after disconnection Down Off Port status after disconnection UP Off Description User defines the description N A Multi IP Settings In addition to the primary IP user could set Secondary IP add...

Page 48: ...ridge Member Click through the name of interface starting bridge interface No 3 3 2 Dialup Port SIM card dial out through dial access to achieve the wireless network connection function of router IR90...

Page 49: ...el select Network Cellular then enter Status page as shown below 3 3 2 2 Dialup Port In Cellular page wireless dialup can be configured From navigation panel select Network Cellular then enter Cellula...

Page 50: ...50 Advanced Options are shown below Page description is shown below...

Page 51: ...rameters APN Username Password and set one as backup 3gnet Access Number APN parameters provided by Local ISP 99 1 Username APN parameters provided by Local ISP gprs Password APN parameters provided b...

Page 52: ...and charging of each accessed user Connection mode at Ethernet port is PPPoE namely configuration interface as PPPoE Client From navigation panel select Network ADSL Dialup then enter PPPoE page as sh...

Page 53: ...l select Network Loopback then enter Loopback page as shown below Page description is shown below Parameters Description Default IP Address Users can not change 127 0 0 1 Netmask Users can not change...

Page 54: ...Server are in different physical network segment Client could communicate with Server through DHCP Relay to obtain IP address and other configuration information as the following figure shows 3 3 5 1...

Page 55: ...r None N A WINS Setup of WINS generally left blank N A Static IP Setup MAC Address Set up a static specified DHCP s MAC address different from other MACs to avoid confliction 0000 0000 0000 IP Address...

Page 56: ...navigation panel select Network DHCP then enter DHCP Relay page as shown below Page description is shown below Parameters Description Default Enable On Off Off DHCPSever Set DHCP server up to 4 server...

Page 57: ...t domain name resolution in lieu of DNS Client 3 3 6 1 DNS Server Domain Name Server DNS stands for Domain Name System It is a core service of the Internet As a distributed database that can let the d...

Page 58: ...erver has to be closed firstly 3 3 7 Dynamic Domain Name DDNS is the abbreviation of Dynamic Domain Name Server DDNS maps user s dynamic IP address to a fixed DNS service When the user connects to the...

Page 59: ...S From navigation panel select Network DDNS then enter DDNS page as shown below Page description is shown below Parameters Description Default Method Name User define None Service Type Select the doma...

Page 60: ...pment Refer to Fig 3 3 7 2 for configuration in case of tailored domain name parameters and refer to Fig 3 3 7 3 for configuration in case of general domain name parameters Fig 3 3 7 2 Dynamic Domain...

Page 61: ...Save After that you can send reboot command to restart the device or cellular 1 ppp up down to redial or disconnect the device Page description is shown below Parameters Description Default Enable On...

Page 62: ...static routing Basic principles of InHand SLA 1 Object track Track the reachability of the specified object 2 SLA probe The object track function can use InHand SLA to send different types of detecti...

Page 63: ...carry out timely change of the status of Track item Successful detection corresponding track item is Positive Failed detection corresponding track item is Negative Track Module and Application Module...

Page 64: ...network segment can t communicate with external network Increasing exit gateway is a common method for improving system reliability Then the problem to be solved is how to select route among multiple...

Page 65: ...ke the function of gateway Another router will be used as a Backup router Monitor interface function of VRRP better expands backup function the backup function can be offered when interface of a certa...

Page 66: ...replacing the original gateway router Accordingly the original gateway router will become a Backup router Enable Track ID Trace Detection select the definedTrack index or ID None 3 4 3 2 VRRP Typical...

Page 67: ...face configure VRRP as shown in the following figure Click navigation panel Link Backup VRRP enter VRRP interface examine VRRP as shown in the following figure Second Configure F0 2 Click navigation p...

Page 68: ...0 1 Click navigation panel Link Backup VRRP enter VRRP interface configure VRRP as shown in the following figure Click navigation panel Link Backup VRRP enter VRRP interface examine VRRP as shown in t...

Page 69: ...to backup interface quickly and the backup interface will carry out service transmission and share network flow so as to raise reliability of communication of data equipment When link state of main i...

Page 70: ...to failed detection switching can be delayed based on the set time 0 represents immediate switching rather than immediate switching 0 Track ID Trace Detection select the definedTrack index or ID None...

Page 71: ...tion Step 3 Open Link Backup SLA configure corresponding parameters the IP address shall be the host address explored by ICMP in public network or private network for instance 203 86 63 233 is the gat...

Page 72: ...hown in the following figure Step 6 Open Routing Static Routing configure corresponding parameters and add 3 routes 10 5 3 234 is the gateway of LAN where PC is affiliated as shown below The distance...

Page 73: ...ee bandwidth for important network applications Disadvantages of static routing It cannot automatically adapt to the changes in the network topology The network failure or changes in topology may caus...

Page 74: ...Mask Enter the subnet mask of destination address need to be reached 0 0 0 0 Interface The interface through which the data reaches the destination address Cellular1 Gateway IP address of the next rou...

Page 75: ...s Step 1 Configure IR900a the parameter configuration is shown in the following figure Step 2 Configure IR900b parameter configuration is as follows Step 3 PC1 and PC2 can be intercommunicated adding...

Page 76: ...way protocol IGP mainly used for smaller networks The complex environments and large networks general do not use RIP RIP uses Hop Count to measure the distance to the destination address and it is cal...

Page 77: ...ce for the router to forward package RoutingCost Cost for the router to reach the destination Routing time The time from the last update of router entry to the present Each time the router entry is up...

Page 78: ...s Routing Cost in the routing table will be set to 16 180 Clear Timer It defines the time from the time when the RoutingCost of a routing becomes 16 to the time when it is deleted from the routing ta...

Page 79: ...ally configured If no Router ID is configured the system will automatically select one IP address of interface as the Router ID The selection order is as follows If a Loopback interface address is con...

Page 80: ...connected static RIP protocols into the OSPF protocol Disable Network IP Address IP Address of local network None Subnet Mask Subnet Mask of IP Address of local network None Area ID Area ID of router...

Page 81: ...igure Page information is shown below Parameter Name Description Default Value Access Control List Access list User defined None Action Permit and deny Permit Any Address Any address after clicking no...

Page 82: ...icting the maximum IP address in IP section None 3 5 2 5 Dynamic Routing Application Example Example Establish dynamic routing between two LANs for intercommunication refer to the following figure for...

Page 83: ...dynamic routing is successful 2 OSPF Configuration procedures of router are as follows First Configure IR900a and refer to the following figure for parameter configuration Second Configure IR900b and...

Page 84: ...e establishment of a multicast distribution tree The multicast routing protocol is used for establishing and maintaining the multicast routing and forrelaying multicast data packet correctly and effic...

Page 85: ...ceiver will be collected and maintained by network facility IGMP is such a signaling mechanism for a host used in the network segment of receiver to the router IGMP informs the router the information...

Page 86: ...ter to receive the multicast data from network and refer to the following figure for topological graph Configuration procedures of router are as follows Step 1 Start multicast routing and configure pa...

Page 87: ...ta flow at entry direction from Internet to local area network and exit direction from local area network to Internet according to the content features of message such as protocol style source destina...

Page 88: ...trategy ACL classifies data packages through a series of matching conditions These conditions can be data packages source MAC address destination MAC address source IP address destination IP address p...

Page 89: ...nication flows to pass through and reject external communication flows e g FTP and Telnet the extended ACL can be used to achieve the objective The standard ACL can not be controlled so precisely Exte...

Page 90: ...o Action Permit refuse Permit Agreement ACP Ip Source IP address Source network address blank in case of any configuration No Source address wildcard mask Radix minus one complement of mask in source...

Page 91: ...be realized when FE 0 1 is connected with intranet Configuration procedures of router are as follows Step 1 Open ACL click add for access control list and configure parameters as shown in the followi...

Page 92: ...hin the LAN through one or more public network IP addresses It means that few public network IP addresses represent more private network IP addresses thus saving public network IP addresses From navig...

Page 93: ...ivate network IP address refers to the IP address of internal network or host while public network IP address is a globally unique IP address on the Internet RFC 1918 three IP address blocks for the p...

Page 94: ...to apply ACL into address pool and only address matched with ACL can be translated Click Add enter new configuration interface and add new NAT rules as shown in the following figure Page information...

Page 95: ...public network refers to the only global IP address on the internet RFC 1918 reserves 3 IP addresses for private network as shown followed A 10 0 0 0 10 255 255 255 B 172 16 0 0 172 31 255 255 C 192 1...

Page 96: ...l function can limit the flow of specified host on local network QoS provides users with dedicated bandwidth and different service quality for different applications greatly improving the network serv...

Page 97: ...me of style defined above N A Guaranteed Bandwidth Kbps User defined guaranteed bandwidth N A Maximum Bandwidth Kbps User defined maximum bandwidth N A Local Priority Local priority of selection strat...

Page 98: ...ge after starting Forbidde n Source Address Source address of flow control blank in case of any configuration No Destination Address Destination address of flow control blank in case of any configurat...

Page 99: ...ading flow for example the IP address of local mainframe appointed shall be the destination Step 2 Add strategy to guarantee the bandwidth and local preference of each type Step 3 Select the out port...

Page 100: ...k etc After disposal of IPSec on the network it can protect data transmission and reduce risk of information disclosure IPSec is a group of open network security protocol made by IETF which can ensure...

Page 101: ...ith cipher code length of 128bit 192bit or 256bit 3des Hash md5 input information of arbitrary length to obtain 128bit message digest sha 1 input information with shorter length of bit to obtain 160bi...

Page 102: ...PD check send request message to opposite end automatically detect whether IKE peer pair exists N A DPD Timeout Receiving end will make DPD check and send request message automatically to opposite end...

Page 103: ...ode source host and destination host must directly be operated with all passwords for the purpose of higher work efficiency but comparing with tunnel mode the security will be inferior Tunnel Mode 3 8...

Page 104: ...nformation protected by other cipher codes Forbidden Lifetime Validity of Crypto Map N A Rekey Margin S Reconnection time for the second stage N A Rekey Fuzz Deviation percentage of the reconnection t...

Page 105: ...Remote ID Type Step 2 IPSec Setting Phase 2 From navigation panel select VPN IPSec then enter IPSec Setting Phase 2 page as shown below Step 3 IPSec Setting From navigation panel select VPN IPSec then...

Page 106: ...file setting is needed only when it s DMVPN 2 Router B Settings Step 1 IPSec Setting Phase 1 From navigation panel select VPN IPSec then enter IPSec Setting Phase 1 page as shown below Step 2 IPSec Se...

Page 107: ...ec Setting Phase 2 page as shown below Step 3 IPSec Setting From navigation panel select VPN IPSec then enter IPSec Setting page as shown below 3 VPN Status Checking From navigation panel select VPN I...

Page 108: ...In following circumstances GRE tunnel transmission GRE tunnel could transmit multicast data packets as if it were a true network interface Single use of IPSec can not achieve the encryption of multic...

Page 109: ...ey of tunnel None Description Add description None 3 8 3 DMVPN 3 8 3 1DMVPN Introduction VPN is a combination of MGRE NHRP and IPSec shortened as DMVPN It could provide a low cast safe interconnection...

Page 110: ...ation has included the address of GRE tunnel s opposite end This address is also on the address of the opposite terminal of IPSec tunnel Therefore it is unnecessary to separately define matching ACL f...

Page 111: ...ulates multicast broadcast packet in GRE packet and GRE packet is a unicast packet and can be encrypted by IPSec In encryption of GRE packet with IPSec IPSec can be configured to the transmission mode...

Page 112: ...rs will not be able to learn the routing to the other branch subnets For RIP this is enough because when RIP sends the routing to the routing information source port its next hop address will not be c...

Page 113: ...blic IP address as Spoke 3 Establish DMVPN between R2 R3 R4 and HUB make all the LANs can access each other 4 Related to the points GRE tunnel NHRP Dynamical routing IPsec VP 1 Configuration 1 Setting...

Page 114: ...114 Navigate to VPN IPsec enter the page IPsec Phase 2 configuration is shown below Navigate to VPN IPsec enter the page IPsec Setting configuration is shown below...

Page 115: ...115 Step 2 Configure GRE Navigate to VPN GRE enter the GRE page click on Add configuration is shown below Step 3 Configure RIP...

Page 116: ...ity association lifetime seconds 86400 crypto ipsec transform set ESP_3DES_MD5 esp 3des esp md5 hmac mode transport crypto ipsec profile abc set security association lifetime seconds 3600 set transfor...

Page 117: ...f PPP could establish a tunnel between enterprise branches and enterprise headquarters so that remote user has access to the network of enterprise headquarters PPPoE is applicable in L2TP Through the...

Page 118: ...2TP Server Set L2TP Server address None Pseudowire Class Pseudowire Class name None Authentication Type Select Authentication Type Auto Username Peer Server username None Password Peer Server password...

Page 119: ...ose data and send them out through outer net by SOCKET owing to which the remote service program will receive those data and carry out processing then send them to the virtual network card then applic...

Page 120: ...s of certification type User name Password User Name Keep consistency with server No Password Keep consistency with server No Channel Description Content described in user s self defined channel No Ad...

Page 121: ...erver The virtual IPs at both sides of the channel are respectively 192 168 5 2 and 192 168 5 1 a If OpenVPN of equipment A is in routing mode the routing to 192 168 8 0 24 will be to OpenVPN channel...

Page 122: ...ublic key certificate equipment private key certificate like ca crt my crt my key 1 The suffix of CA and public key certificate is crt and the suffix of private key certificate is key 2 The time of eq...

Page 123: ...meters Digital input of IO interface can convert electrical signals into binary digital control signals The digital is a logical variable or switch variable with only two values 0 and 1 Low voltage co...

Page 124: ...232 RS485 Baudrate Same with the baudrate of connected terminal device 9600 Data Bit Same with the data bit of connected terminal device 8 bits Parity Same with the parity of connected terminal device...

Page 125: ...panel select Industrial DTU then enter DTU 1 page as shown below Page description is shown below Parameters Description Default Enable Click to enable Off DTU Protocol Transparent and TCP router used...

Page 126: ...of destination IP address list at the same time Polling connect to the first address in the list if connect fail continue to connect next address until connect one successfully then stop Parallel Sour...

Page 127: ...Step 1 Configure DTU serial port parameter The serial port parameter shall be kept in consistency with the serial port parameter of end equipment as shown in the following figure Step 2 Configure DTU...

Page 128: ...with server via DTU function and will automatically send DTU marks no sending in case of the blank parameter of DTU mark to server as shown below Step 4 Via DTU function the PC connected with IR900 a...

Page 129: ...129...

Page 130: ...atus page as shown below Page description is shown below Parameters Description Default Digital Input 1 Digital Input 1 Vlotage under 10Vcorrespond to LOW 0 Vlotage above 10Vcorrespond to High 1 LOW 0...

Page 131: ...e destination host address of PING detection 192 168 2 1 Ping Count Set Ping detection count 4 Packet Size Set packet size of ping detection 32 bytes Expert Options Advanced parameters of ping can be...

Page 132: ...rs of ping can be used 3 10 3 Link Speed Test Through upload and download files link speed can be tested From navigation panel select Tools Link Speed Test then enter Link Speed Test page as shown bel...

Page 133: ...hen enter New LAN page as shown below 3 11 2 New WAN From navigation panel select Wizards New WAN then enter New WAN page as shown below 3 11 3 New Cellular From navigation panel select Wizards New Ce...

Page 134: ...134 3 11 4 New IPSec Tunnel From navigation panel select Wizards New IPSec Tunnel then enter New IPSec Tunnel page as shown below...

Page 135: ...d Cellular 1 Service Port TCP or UDP data communication port None Internal Address Equipment address of mapping object None Internal Port TCP or UDP port of mapping object None Description User define...

Page 136: ...SL dial up PPPoE are respectively shown in Fig 3 12 2 and Fig 3 12 3 Fig 3 12 2 Fig 3 12 3 Step 3 Configure corresponding parameters of DNS service in case that static IP type is applied in the step a...

Page 137: ...IM card is suspended because of an overdue charge Whether the dialup parameters e g APN dialup number account and password are correctly configured Whether the IP Address of your computer is the same...

Page 138: ...enter cannot connect to your PC under InRouter Please make sure Shared Connection on Network WAN or Network Dialup is enabled in the configuration of InRouter 7 After InRouter establishes VPN with the...

Page 139: ...o factory default settings Appendix 2 Instruction of Command Line Help command can be obtained after entering help or into console can be entered at any time during the process of command input to obt...

Page 140: ...Function Exit the privileged user level View Super user view configure view Parameter No Example Enter disable in super user view Return to ordinary user view 2 3 end and Command end or Function Exit...

Page 141: ...eter No Example enter show clock Display the following information For example Sat Jan 1 00 01 28 UTC 2000 3 4 show modem Command show modem Function Display the MODEM state of router View all views P...

Page 142: ...onfig Function display the operational configuration of router View super user view configuration view Parameter No Example Enter show running config Display the operational configuration of system 4...

Page 143: ...telnet logs in 192 168 2 2 5 3 traceroute Command traceroute hostname maxhops n timeout n Function test the acting routing of appointed mainframe View all views Parameter hostname tests the address o...

Page 144: ...China s standard time enter default clock timezone in configuration view The time zone of recovered router is at the factory setting Command clock set YEAR MONTH DAY HH MM SS 6 4 clock set Function se...

Page 145: ...uration view Delete the ordinary user with the name of abc enter default username in configuration view Delete all the ordinary users Appendix 3 Glossary of Terms Abbreviation Full English Name Meanin...

Page 146: ...ress Media Access Control address Media Access Control address is the permanent physical address assigned by the manufacturer to the device It is composed of 6 pairs of hexadecimal digits For example...

Page 147: ...rotocol Internet Protocol Transmission Control Protocol Internet Protocol is the cluster of basic communication protocols for network communication TCP IP defines a set of protocols including not only...

Page 148: ...ion VPN Green LED Description On IPSec VPN established Off No IPSec VPN connection MODEM LED Description MODEM Green LED Description On There is wireless module Off No wireless module POWER LED Descri...

Page 149: ...equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help This equipment complies with FCC radiatio...

Page 150: ...1 703 348 2988 info inhandnetworks com www inhandnetworks com InHand Networks InHand Networks p M2M solution for commercial and me customers and par Expanding with i development Endur InHand Networks...

Reviews: