M2M
Cellular
Gateway
Index
skipping
is
used
to
reserve
slots
for
new
function
insertion,
when
required.
4
5.5.1
Configuration
....................................................................................................................
228
5.5.3
IPSec
...................................................................................................................................
230
5.5.5
PPTP
....................................................................................................................................
254
5.5.7
L2TP
....................................................................................................................................
268
5.5.9
GRE......................................................................................................................................
281
5.5.d
OpenVPN
...........................................................................................................................
289
5.7
Redundancy
...................................................................................................................................
308
5.7.1
VRRP
...................................................................................................................................
308
5.9
System
Management
..................................................................................................................
312
5.9.1
TR
‐
069
................................................................................................................................
312
5.9.3
SNMP
..................................................................................................................................
316
5.9.5
Telnet
with
CLI
.................................................................................................................
328
5.9.7
UPnP
...................................................................................................................................
332
5.b
Certificate
.......................................................................................................................................
336
5.b.1
Configuration
....................................................................................................................
336
5.b.3
My
Certificates
.................................................................................................................
339
5.b.5
Trusted
Certificates
.........................................................................................................
347
5.b.7
Issue
Certificates
..............................................................................................................
354
Chapter
7
Applications
................................................................................................................................
359
7.1
Mobile
Application
.......................................................................................................................
359
7.1.1
SMS
.....................................................................................................................................
359
7.1.3
USSD
Usage
......................................................................................................................
363
7.1.5
Network
Scan
...................................................................................................................
368
7.1.7
SMS
Management
...........................................................................................................
370
7.5
Captive
Portal
...............................................................................................................................
373
7.5.1
Configuration
....................................................................................................................
373
Chapter
9
System
........................................................................................................................................
380
9.1
System
Related
.............................................................................................................................
380
9.1.1
System
Related
.................................................................................................................
380
9.1.3
Packet
Analyzer
................................................................................................................
387