Amit IDG761AM-0P001 Скачать руководство пользователя страница 1

 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 

 

 
 
 
 
 
 
 
 

 

 
 
 

 

User Manual 

IDG761AM-0P001 

Cellular M2M Gateway 

FW: 00SA0.1003 
UM: V1.2_20140717 

Содержание IDG761AM-0P001

Страница 1: ...User Manual IDG761AM 0P001 Cellular M2M Gateway FW 00SA0 1003 UM V1 2_20140717...

Страница 2: ...2 2 EASY SETUP BY CONFIGURING WEB UI 15 2 2 1 Wizard 15 2 2 2 Status 22 CHAPTER 3 MAKING CONFIGURATIONS 28 3 1 BASIC NETWORK 29 3 1 1 WAN Setup 30 3 1 1 1 Physical Interface 31 3 1 1 2 Internet Setup...

Страница 3: ...Static Routing 90 3 1 6 2 Dynamic Routing 90 3 1 6 3 Routing Information 92 3 1 7 Client Server Proxy 93 3 1 7 1 Dynamic DNS 93 3 1 7 2 DHCP Server 94 3 2 ADVANCED NETWORK 97 3 2 1 Firewall 97 3 2 1...

Страница 4: ...3 2 3 1 3 Tunnel List Status 119 3 2 3 1 4 Tunnel Configuration 120 3 2 3 1 5 Local Remote Configuration 121 3 2 3 1 6 Authentication 121 3 2 3 1 7 IKE Phase 122 3 2 3 1 8 IKE Proposal Definition 123...

Страница 5: ...Configuration 135 3 2 4 Redundancy 136 3 2 4 1 VRRP 136 3 2 5 System Management 138 3 2 5 1 TR 069 138 3 2 5 2 SNMP 138 3 2 5 3 Telnet with CLI 140 3 2 5 4 UPnP 140 3 3 APPLICATIONS 141 3 3 1 Mobile...

Страница 6: ...transmitted in any form or by any means mechanical magnetic electronic optical photocopying manual or otherwise without the prior written permission Trademarks All products company brand names are tra...

Страница 7: ...s This IDG761 series product is loaded with luxuriant security features including VPN firewall NAT port forwarding DHCP server and many other powerful features for complex and demanding business and M...

Страница 8: ...Gateway 1pcs 2 Cellular Antenna 2pcs 3 WiFi Antenna 2pcs 4 Power Adapter DC 12V 2A 1 1pcs 5 DC Jack Converter 1pcs 6 RJ45 Cable 1pcs 7 Console Cable 1pcs 8 CD Manual 1pcs 9 Wall Mount Kits 2pcs 10 DI...

Страница 9: ...Firefox 3 0 or higher Safari 3 0 or higher CD Installation Wizard Requirements Computer with the following Windows 7 Vista or XP with Service Pack 2 An installed Ethernet adapter CD ROM drive Do not...

Страница 10: ...default setting Press the RESET button continuously for 6 seconds and then release it The device will restore to factory default settings Reset Button USB Port LED Indicators Auto MDI MDIX RJ 45 Port...

Страница 11: ...Cellular M2M Gateway Power Terminal Block 2 4G WiFi Antenna 2 4G WiFi Antenna PWR1 GND PWR2 GND IDG761 0P001 User Manual 11...

Страница 12: ...n for connection LAN 1 LAN 4 Green Steady ON Ethernet connection of LAN is established Flash Data packets are transferred High Cellular Signal Green Steady ON The signal strength of Cellular is strong...

Страница 13: ...se screw the wall mount kits and DIN rail bracket on the product first 2 1 2 Insert the SIM Card WARNNING BEFORE INSERTING OR CHANGING THE SIM CARD PLEASE MAKE SURE THAT POWER OF THE DEVICE IS SWITCHE...

Страница 14: ...A power adapter5 in the package for you to easily connect DC power adapter to this terminal block 2 1 4 Connecting to the Network or a Host The IDG761 series provides four RJ 45 ports to connect 10 10...

Страница 15: ...web UI to configure the device First you need to launch the Setup Wizard browser and then the Setup Wizard will guide you step by step to finish the setup process Browse and Activate the Setup Wizard...

Страница 16: ...tart the wizard Step 2 Change Password Password Configuration You can change the login password of Web UI here It s strongly recommending you to change this login password from default value Press Nex...

Страница 17: ...lly This option is usually chosen when you get a fixed IP address from ISP Press Next to continue Step 4 2 Ethernet Dynamic IP Address If choosing Ethernet Dynamic IP Address you can input host name o...

Страница 18: ...requests it Press Next to continue Step 4 6 3G 4G If choosing 3G 4G 3G 4G please make sure you have inserted SIM card If not please power off this gateway and insert SIM card first Then you can selec...

Страница 19: ...xt step Press Next to continue Step 7 Confirm and Apply Check the new settings again If all information is correct please press Apply button to save new settings Then it will take 65 seconds to restar...

Страница 20: ...s to connect to office For other options please go to Advanced Network VPN to setup Input the required network information and pre shared key for VPN connection For Dynamic VPN you don t need to input...

Страница 21: ...options of authentication and MPPE You also need to create a set of username and password for PPTP clients In this wizard you can only create one user account If you want to create more user accounts...

Страница 22: ...o create a set of username and password for L2TP clients In this wizard you can only create one user account If you want to create more user accounts please go to Advanced Network VPN L2TP to add more...

Страница 23: ...Indicates if 3G 4G connection is established or not 2 xDSL Cable Icon Indicates if Ethernet WAN connection is established or not 3 Wired Client Icon Indicates how many Ethernet clients are connected...

Страница 24: ...hange settings LAN Interface Status Display IPv4 and IPv6 information of local network Press Edit button if you want to change settings 3G 4G Modem Status Display modem information link status signal...

Страница 25: ...to link to the configuration page of that dedicated virtual AP WiFi Traffic Statistics In order to view the traffic statistics of WiFi virtual APs it will display operation band virtual AP ID and the...

Страница 26: ...of firewall Packet Filters Display all detected contents of firing activated packet filter rules URL Blocking Display all blocked URLs of firing activated URL blocking rules Web Content Filters Displ...

Страница 27: ...atus L2TP Server status and L2TP Client status IPSec Status Display the status of all activated tunnels of IPSec PPTP Server Status Display the status of all activated accounts of PPTP server PPTP Cli...

Страница 28: ...section you may want to check the connection status of the device to do Basic or Advanced Network setup or to check the system status These task buttons can be easily found in the cover page of the U...

Страница 29: ...s below You can also check status of WiFi at WiFi Status page connected clients at LAN Client List page and other advanced function status at Firewall Status page and VPN Status page 3 1 Basic Network...

Страница 30: ...LTE USB dongle and follow UI setting to setup Ethernet WAN The 1st Ethernet port can be configured as WAN connection Please plug in RJ45 cable from your external DSL modem and follow UI setting to set...

Страница 31: ...es as the primary Internet connection You can click on the respective Edit button and configure the rest items for this interface 2 WAN 2 The operation mode of this interface is disabled by default yo...

Страница 32: ...AN you have to further identify which WAN interface is to be failover and fallback For some mission critical applications this gateway supports Seamless failover 10 to shorten switch time between WAN...

Страница 33: ...ive specifications However if your 3G data plan is not with a flat rate it s recommended to set Connection Control mode to Connect on Demand or Manually Dynamic IP Address You may choose this WAN type...

Страница 34: ...nection is also broken That is SIM A and SIM B are used iteratively but either one will keep being used for data transferring when current connection is still alive In the same way the gateway will tr...

Страница 35: ...ut dial up profile for SIM A and SIM B respectively 2 PIN Code Enter PIN code of SIM card if your SIM card needs it to unlock 3 Dial Number Enter the dialed number that is provided by your ISP 4 Accou...

Страница 36: ...ime of replied keep alive packets may increase when WAN bandwidth is fully occupied To avoid keep alive feature work abnormally enable this option will stop sending keep alive packets when there are c...

Страница 37: ...get the detail WAN settings and then configure the settings as well 3 1 1 2 2 1 Dynamic IP Address 1 WAN Type choose Dynamic IP from the drop list 2 Host Name Optional required by some ISPs for examp...

Страница 38: ...d If you disable this option there will be no NAT mechanism between LAN side and WAN side 7 Network Monitoring You can do preferred settings by using this feature to monitor the connection status of W...

Страница 39: ...from Internet You may enable as auto mode or select by IGMP v1 IGMP v2 IGMP v3 or Auto 9 WAN IP Alias In some cases ISP will provide you another fixed IP address for management purpose You can enter...

Страница 40: ...ts Loading Checking The response time of replied keep alive packets may increase when WAN bandwidth is fully occupied To avoid keep alive feature work abnormally enable this option will stop sending k...

Страница 41: ...n this field 3 1 1 2 2 3 PPP over Ethernet Select this option if your ISP requires you to use a PPPoE connection This option is typically used for ADSL services 1 WAN Type Choose PPPoE from the drop l...

Страница 42: ...rt to establish WAN connection until you press Connect button on web UI After that this gateway will disconnect WAN connection if idle time reaches value of Maximum Idle Time 6 Service Name Assigned I...

Страница 43: ...esponse time of replied packet is longer than this setting Fail Threshold Times of failed checking This WAN connection will be recognized as broken if the times of continuous failed keep alive checkin...

Страница 44: ...our ISP 3 Server IP Address Name IP address of the PPTP server provided by ISP 4 PPTP Account and Password The account and password your ISP assigned to you Please note the account and password is cas...

Страница 45: ...ported or not 9 NAT By default it is enabled If you disable this option there will be no NAT mechanism between LAN side and WAN side 10 Network Monitoring You can do preferred settings by using this f...

Страница 46: ...value Target1 Target2 Set host that is used for keep alive checking It can be DNS1 DNS2 default Gateway or other host that you need to input IP address manually 11 IGMP Enable or disable multicast tr...

Страница 47: ...4 L2TP Account and Password The account and password your ISP assigned to you Please note the account and password is case sensitive For security concern the password you input won t be displayed on...

Страница 48: ...r the connection status of WAN interface Checking mechanism depends on several parameters defined here The network monitoring provides the WAN interface status and then system can prevent embedded 3G...

Страница 49: ...hat IP address in this field 3 1 1 3 Load Balance This device support multi WAN load balance function and more than one WAN interface can access to Internet at a time The load balance function can hel...

Страница 50: ...rnet By User Policy If you choose the By User Policy strategy you have to create the expected policies one by one Click the add button to add your load balance policy You can manage the outbound traff...

Страница 51: ...e All Port Range Single Port or Well known Applications Just choose one type of the destination port and specify its value as well If you don t want to specify a certain destination port for this poli...

Страница 52: ...if necessary It s also the IP address of web UI If you change it you need to type new IP address in the browser to see web UI 3 Subnet Mask Input your Subnet mask Subnet mask defines how many clients...

Страница 53: ...AN However in Tag based VLAN all packets with same VLAN ID will be treated as the same group of them and own same access property and QoS property It is especially useful when individuals of a VLAN gr...

Страница 54: ...a group of ports on an Ethernet or Virtual APs of Wired or Wireless Gateway that form a logical Ethernet segment Following is an example In SMB or a company administrator schemes out 4 segments Lobby...

Страница 55: ...anet These flows can be directed to different destination because they have differentiated tags The approach is very useful to group some hosts in different geographic location to be a same department...

Страница 56: ...wever he configure Office segment with VLAN ID 10 The VLAN group is equipped with DHCP 1 server to construct a 192 168 10 x subnet In this example VLAN 10 and 12 groups can access the Internet as foll...

Страница 57: ...can communicate with C that doesn t mean A can communicate with C An example is shown at following diagram VLAN groups of VID is 1 and 3 can access each other but the ones between VID 3 and VID 4 and...

Страница 58: ...ID Specify a VLAN identifier for this port The ports with the same VID are in the same VLAN group 3 Tx TAG If ISP requests a VLAN Tag with your outgoing data please check the checkbox of Tx TAG 4 DHCP...

Страница 59: ...ting please refer to Basic Network WiFi section The last one policy is the Bridge to WAN Policy that includes only Port 4 Afterwards click on Save to store your settings or click Undo to give up the c...

Страница 60: ...ward to the destination belongs to this configuring VLAN group in the Intranet 3 Port 1 Port 4 VAP 1 VAP 8 Specify whether they belong to the VLAN group or not You just have to check the boxes for ded...

Страница 61: ...nfigure 2 4G Hz operation band s wireless settings and then activate your WLAN There are several wireless operation modes provided by this device They are AP Router Mode WDS Hybrid Mode and WDS Only M...

Страница 62: ...from ISP 1 Operation Band Select the WiFi operation band that you want to configure But the device supports only 2 4G single WiFi band 2 WPS Click on the button to setup WPS 1 Wireless Module Enable t...

Страница 63: ...d on the Regulatory Domain The factory default setting is auto channel selection It s recommended to choose a channel that is not used in your environment to reduce radio interference 10 Wireless Syst...

Страница 64: ...Encryption mode and enter RADIUS Server related information You have to specify the IP address and port number for the RADIUS Server and then fill in 64 hexadecimal 0 1 2 8 9 A B F digits or 8 to 63 A...

Страница 65: ...support WPA but most of them can support WPA2 You can choose this option to support both of them Select Encryption mode and enter RADIUS Server related information You have to specify the IP address...

Страница 66: ...ower consumption when there are no wireless traffics 5 Channel The radio channel number The permissible channels depend on the Regulatory Domain The factory default setting is auto channel selection 6...

Страница 67: ...d according to WiFi client s request automatically WPA PSK Select Encryption mode and enter the Pre share Key You can fill in 64 hexadecimal 0 1 2 8 9 A B F digits or 8 to 63 ASCII characters as the p...

Страница 68: ...on Save to store your settings or click Undo to give up the changes 3 1 3 1 3 WDS Hybrid Mode WDS Wireless Distributed System Hybrid function let this access point acts as a wireless LAN access point...

Страница 69: ...cified By default the wireless radio is always turned on when the wireless module is enabled If you want to add a new schedule rule please go to System Scheduling menu 7 Network ID SSID Network ID is...

Страница 70: ...hared key authentication are available today for home or small office WLAN environments Auto The gateway will select appropriate authentication method according to WiFi client s request automatically...

Страница 71: ...less network by clinking on the 2 4G WPS Setup button 1 WPS13 You can enable this function by checking Enable box WPS offers a safe and easy way to allow the wireless clients connected to your wireles...

Страница 72: ...rate to get a new AP PIN 7 WPS status According to your setting and activity the status will show IDLE STARTPROCESS or NOT USED The status is IDLE by default If you want to start a WPS connection you...

Страница 73: ...r the specific installation environment 1 Operation Band Select the WiFi operation band that you want to configure But the device supports only 2 4G single WiFi band 2 Regulatory Domain Indicate numbe...

Страница 74: ...ess frames can be divided into smaller units fragments to improve performance in the presence of RF interference and at the limits of RF coverage 7 WMM Capable WMM can help control latency and jitter...

Страница 75: ...ching beyond your corporate home office or designated wireless area 3 1 4 IPv6 Setup The growth of the Internet has created a need for more addresses than are possible with IPv4 IPv6 Internet Protocol...

Страница 76: ...ypes of IPv6 connection Static IPv6 DHCPv6 PPPoE 6 to 4 IPv6 in IPv4 tunnel Please ask your ISP of what type of IPv6 is supported before you proceed with IPv6 setup 3 1 4 1 Static IPv6 When Static IPv...

Страница 77: ...node on the computer network that the network software uses when an IP address does not match any other routes in the routing table 4 Primary Secondary DNS You may select to obtain DNS server address...

Страница 78: ...mmediate advertisements rather than waiting for the next periodic ones to arrive if and only if no advertisements are forthcoming the host may retransmit the solicitation a small number of times but t...

Страница 79: ...etime You can set the time for the period that the router send broadcast its router advertisement Each router periodically multicasts a Router Advertisement from each of its multicast interfaces annou...

Страница 80: ...Maximum Transmission Unit Most ISP offers MTU value to users The default MTU value is 0 auto 6 MLD Snooping MLD snooping IPv6 multicast data is selectively forwarded to a list of ports that want to re...

Страница 81: ...for immediate advertisements rather than waiting for the next periodic ones to arrive if and only if no advertisements are forthcoming the host may retransmit the solicitation a small number of times...

Страница 82: ...e time for the period that the router send broadcast its router advertisement Each router periodically multicasts a Router Advertisement from each of its multicast interfaces announcing the IP address...

Страница 83: ...s 3 MLD Snooping MLD snooping IPv6 multicast data is selectively forwarded to a list of ports that want to receive the data instead of being flooded to all ports in a VLAN This list is constructed by...

Страница 84: ...times but then must desist from sending any more solicitations Any routers that subsequently start up or that were not discovered because of packet loss or temporary link partitioning are eventually d...

Страница 85: ...osts discover the addresses of their neighboring routers simply by listening for advertisements When a host attached to a multicast link starts up it may multicast a Router Solicitation to ask for imm...

Страница 86: ...ide your network 3 1 5 2 Virtual Server Virtual Computer 3 1 5 2 1 Virtual Server This gateway s NAT firewall filters out unrecognized packets to protect your Intranet so all hosts behind this device...

Страница 87: ...rivate Port Protocol Rule 21 192 168 123 1 TCP Enable 80 192 168 123 2 TCP Enable 8080 192 168 123 3 80 TCP Enable 1723 192 168 123 6 Both Enable 3 1 5 2 2 Virtual Computer Virtual Computer enables yo...

Страница 88: ...ith a pure NAT router The Special Applications feature allows some of these applications to work with this product If the mechanism of Special Applications fails to make an application work try settin...

Страница 89: ...lve this problem 1 IP Address of DMZ Host Enter IP address of Server or Host 2 DHCP Relay DHCP Relay Agent component relays DHCP messages between DHCP clients and DHCP servers on different IP networks...

Страница 90: ...ed destination 2 Subnet Mask Input your subnet mask Subnet mask defines the range of IP address in destination network 3 Gateway The IP address of gateway that you want to route for this destination s...

Страница 91: ...erwise please select RIPv1 if you need this protocol 2 OSPF OSPF is an interior gateway protocol that routes Internet Protocol IP packets solely within a single routing domain autonomous system It gat...

Страница 92: ...n it is more appropriately termed a reach ability protocol rather than routing protocol You can enable the BGP routing function by click on the Setting button and fill in the corresponding setting for...

Страница 93: ...omain name service DDNS Therefore anyone wishing to reach your host only needs to know the name of it Dynamic DNS will map the name of your host to your current IP address which changes each time you...

Страница 94: ...his gateway will assign IP address to LAN computers or devices through DHCP protocol This device provides up to 4 DHCP servers to serve the DHCP requests from different VLANs 2 LAN IP Address Specify...

Страница 95: ...e maximum number of subnet network that according to the subnet mask you set 5 Lease Time DHCP lease time to the DHCP client 6 Domain Name Optional this information will be passed to the clients Press...

Страница 96: ...the end of each record in the list and click on the Fixed Mapping to record the mapping of IP address and MAC address in the device Press Fixed Mapping button at the bottom of one DHCP server configu...

Страница 97: ...and System Management You can finish those configurations in this section 3 2 1 Firewall The firewall functions include Packet Filters URL Blocking Web Content Filters MAC Control Application Filters...

Страница 98: ...active filter rules However the second one is the white list System will allow the packets to pass the gateway which match the active filter rules 1 Allow all to pass except those match the specified...

Страница 99: ...or someone WAN interface 3 To Interface Any interface or someone LAN interface or someone WAN interface 4 Source IP Specify the Source IP address of packets that want to be filtered out in the packet...

Страница 100: ...u specified and give user more flexibility on access control By default it is always turned on when the rule is enabled For more details please refer to the System Scheduling menu 9 Rule Enable Check...

Страница 101: ...edirection Users will see a specific web page to know their access is blocked by rules 5 Help At the right upper corner of screen one Help command let you see the on line help message about URL Blocki...

Страница 102: ...ma com 3 Destination Port Specify the destination port in URL requests that want to be blocked in the URL blocking rule You can define a single port 80 or a range of ports 1000 1999 An empty or 0 impl...

Страница 103: ...nt filtering events when filtering rules are fired 3 2 1 4 2 Web Content Filter Rule List It is a list of all Web Content Filter rules You can add one new rule by clicking on the Add command button Bu...

Страница 104: ...n a rule by using to concatenate these file extensions 3 Schedule The rule can be turn on according to the schedule rule you specified and give user more flexibility on access control By default it is...

Страница 105: ...e the log alerting so that system will record MAC control events when control rules are fired 4 Known MAC from LAN PC List You can see all of connected clients from this list and copy their MAC addres...

Страница 106: ...e turn on according to the schedule rule you specified and give user more flexibility on access control By default it is always turned on when the rule is enabled For more details please refer to the...

Страница 107: ...n Filters function is enabled For more details please refer to the System Scheduling menu 3 2 1 7 IPS IPS Intrusion Prevention Systems are network security appliances that monitor network and or syste...

Страница 108: ...et is valid 3 Discard PING from WAN If this feature is enabled this gateway won t reply any ICMP request packet from WAN side It means any remote host can t get response when ping to this gateway Ping...

Страница 109: ...of Service and Bandwidth Management is prioritizing incoming data and preventing data loss due to factors such as jitter delay and dropping Another important aspect of QoS is ensuring that prioritizi...

Страница 110: ...ement FBM Adjust the bandwidth distribution dynamically based on current bandwidth usage situation to get the maximum system network performance and it is transparent to all users Before QoS BWM funct...

Страница 111: ...section Flexible QoS Rule Definition Multiple Group Categories Specify the group category in a QoS rule for the target objects that rule to be applied on Group Category can bases on VLAN ID MAC Addres...

Страница 112: ...d direction of packet flow even them both This feature depends on model 3 2 2 2 1 Configuration It supports the activation of Rule based QoS 1 Rule based QoS Enable Check the box if you want to enable...

Страница 113: ...haring Method Time Schedule and finally the rule enable 1 WAN Interface Select the WAN interface for the QoS rule 2 Group Specify the target client members for the rule by their VLAN ID MAC Address IP...

Страница 114: ...rvices is selected two more parameters Protocol Number and Service Port Range must be defined Protocol Number is either TCP or UDP or Both Finally when Well known Service is selected you can choose th...

Страница 115: ...osts in the Group you need to select Group Control For example you define Control Function as Set Session Limitation and the limited sessions are 2000 sessions You also define Sharing Method as Indivi...

Страница 116: ...trol function with AF Class 2 High Drop value at any time Example 2 for adding a Connection Sessions type QoS rule Interface Select WAN 1 Group Select IP and enter IP range 192 168 75 10 40 Service Se...

Страница 117: ...for securing Internet Protocol IP communications by authenticating and encrypting each IP packet of a communication session IPSec includes protocols for establishing mutual authentication between age...

Страница 118: ...the tunnel establishing process first in this application scenario There is one more advanced IPSec VPN application Site to Site Support Full Tunnel Application When Full Tunnel function of remote Bus...

Страница 119: ...sal Some NAT routers will block IPSec packets if they don t support IPSec pass through If your Business Security Gateway connects to this kind of NAT router which doesn t support IPSec pass through yo...

Страница 120: ...nter the name of tunnel 2 Interface Decide the WAN Interface to establish the tunnel 3 Operation Mode Default is Always on and other options depend on product models 4 Tunnel Scenario Support Site to...

Страница 121: ...bnet of other IPSec tunnels That is both application data and Internet access packets land up at the VPN concentrator 4 Remote subnet The subnet of LAN site of remote Business Security Gateway It can...

Страница 122: ...urity in the meanwhile Hosts in both ends of the tunnel must support this mode so as to establish the tunnel properly 2 X Auth For the extended authentication function XAUTH the VPN client or initiato...

Страница 123: ...you and used in IKE phase of negotiation between two VPN peers 1 Encryption There are six algorithms can be selected DES 3DES AES auto AES 128 AES 192 and AES 256 2 Authentication There are five algo...

Страница 124: ...tted from local gateway The value of outbound SPI should be set in hex formatted 2 Inbound SPI Inbound SPI will be included in the inbound packet transmitted from remote VPN peer It will be used to de...

Страница 125: ...the Microsoft Windows product families implements various levels of authentication and encryption natively as standard features of the Windows PPTP stack The intended use of this protocol is to provid...

Страница 126: ...tunnels for the Business Security Gateway beneath the choosing screen 3 2 3 2 2 PPTP Server Configuration The Business Security Gateway can behave as a PPTP server and it allows remote hosts to access...

Страница 127: ...encryption 40 bits 56 bits or 128 bits 3 2 3 2 3 PPTP Server Status The user name and connection information for each connected PPTP client to the PPTP server of the Business Security Gateway will be...

Страница 128: ...vers behind the PPTP server 1 PPTP Client Enable or disable PPTP client function 3 2 3 2 7 PPTP Client List Status You can add new up to 22 different PPTP client tunnels by clicking on the Add button...

Страница 129: ...y one PPTP tunnel to own the Default Gateway property However when Peer Subnet is chosen peer subnet parameter needs to be filled and it should be the LAN subnet of remote PPTP server If an Intranet p...

Страница 130: ...mputer networking Layer 2 Tunneling Protocol L2TP is a tunneling protocol used to support virtual private networks VPNs or as part of the delivery of services by ISPs It does not provide any encryptio...

Страница 131: ...ient This value indicates the beginning of IP pool 5 IP Pool Ending Address This device will assign an IP address for each remote L2TP client This value indicates the end of IP pool 6 Authentication P...

Страница 132: ...ach user account list 3 2 3 3 4 User Account Configuration Add or edit one user account will activate the User Account Configuration screen 1 User Name Enter the user name of user account 2 Password E...

Страница 133: ...he tunnel 4 Edit You can edit oneL2TPTP client tunnel configuration by clicking on the Edit button at the end of each tunnel list 3 2 3 3 7 L2TP Client Configuration 1 L2TP Client Name The name of thi...

Страница 134: ...fore Tunneling Check the Enable box to let hosts in the Intranet of Business Security Gateway can go to access Internet via remote PPTP server By default it is enabled However if you want the remote P...

Страница 135: ...el by clicking on the Add button 2 Delete Delete selected tunnels by checking the Select box at the end of each tunnel list and then clicking on the Delete button 3 Tunnel Check the Enable box to acti...

Страница 136: ...Intranet of Business Security Gateway goes over this GRE tunnel if these packets don t match the Peer Subnet of other GRE tunnels There is only one GRE tunnel to own the Default Gateway property Howev...

Страница 137: ...is selected to automatically replace it The physical router that is forwarding packets at any given time is called the master router 1 VRRP Enable or disable the VRRP function 2 Virtual Server ID Mea...

Страница 138: ...col it provides the communication between customer premises equipment CPE and Auto Configuration Servers ACS The Security Gateway is such CPE TR 069 is a customized feature for ISP it is not recommend...

Страница 139: ...through remote modification of these variables The variables accessible via SNMP are organized in hierarchies These hierarchies and other metadata such as type and description of the variable are des...

Страница 140: ...nagement PCs consequently Afterwards click on Save to store your settings or click Undo to give up the changes 3 2 5 3 Telnet with CLI A command line interface CLI also known as command line user inte...

Страница 141: ...me and business gateways Without IGD one has to manually configure the gateway to allow traffic through a process which is error prone and time consuming This device supports the UPnP Internet Gateway...

Страница 142: ...hysical Interface Indicate which 3G LTE modem is used for SMS feature 2 SMS Indicate which SIM card is used for SMS feature 3 SMS Storage Select storage for SMS message This gateway only supports SIM...

Страница 143: ...slog server if choosing By Syslog 4 Enable Enable this rule SMS Summary 1 Unread SMS Indicate number of unread SMS message 2 Received SMS Indicate number of total received SMS message 3 Remaining SMS...

Страница 144: ...he checkbox on the right of each message to delete reply or forward this message 3 3 1 2 USSD Unstructured Supplementary Service Data USSD is a protocol used by GSM cellular telephones to communicate...

Страница 145: ...file for some common used command Press Add button to add new profile And select some existed profiles to delete by clicking on Delete button USSD Profile Configuration 1 Profile Name Indicate name of...

Страница 146: ...n cellular network nearby in your environment and select one network provider to apply by clicking on the Apply button Note Incorrect setting here may cause 3G LTE connection problems 3 3 1 4 Remote M...

Страница 147: ...ty key is empty access control needs to be activated The security key can be empty if access control is activated Command Settings 1 Status Enable it and you can send command status to query WAN conne...

Страница 148: ...WAN is Up Enable it and this gateway will send a message to users if secondary WAN is connected This message will also include WAN IP address 4 Secondary WAN is Down Enable it and this gateway will s...

Страница 149: ...device system Administrator Time out in seconds defines the idle time out for administrator to configure the device by using Web UI 3 4 1 System Related In this section you can change login password...

Страница 150: ...in New Password otherwise an error message will be shown out 3 4 1 2 System Information You can view the System Information in this page It includes the WAN Type Display Time and Modem Information But...

Страница 151: ...with If you do not specify port number the default value is 25 For example mail your_url com or 192 168 1 100 26 E mail Addresses The recipients are the ones who will receive these logs You can assign...

Страница 152: ...ault it is Auto to let system query pre defined NTP servers for the system time one after one 3 Daylight Saving Time Check the Enable checkbox to enable this function 4 Set Date Time Manually Set the...

Страница 153: ...e check Accept unofficial firmware NOTE PLEASE DO NOT TURN THE DEVICE OFF WHEN UPGRADE IS PROCEEDING Ping Test This allows you to specify an IP FQDN and the test interface so system will try to ping t...

Страница 154: ...P or ICMP and by default it is UDP Then system will try to trace the specified device to test whether it is alive after clicking on the Traceroute button A test result window will appear beneath it Th...

Страница 155: ...backup your settings by clicking the Backup button and save it as a bin file Once you want to restore these settings please click Firmware Upgrade button and use the bin file you have saved 3 4 2 Sch...

Страница 156: ...You also can specify the rule is to define the enable timing Inactive except the selected days and hours below or disable timing Active except the selected days and hours below Afterwards click save t...

Страница 157: ...party software licensed under the terms of the GNU General Public License Please refer to the GNU General Public License below to check the detailed terms of this license Availability of source code P...

Страница 158: ...tect your rights with two steps 1 copyright the software and 2 offer you this license which gives you legal permission to copy distribute and or modify the software Also for each author s protection a...

Страница 159: ...part of a whole which is a work based on the Program the distribution of the whole must be on the terms of this License whose permissions for other licensees extend to the entire whole and thus to ea...

Страница 160: ...ectly or indirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program If any portion of this section is held invali...

Страница 161: ...ESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU SHOULD THE PROGRAM PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CO...

Отзывы: