"Конфигурационный руководство для Lucom lr77 v2 теперь доступен для загрузки бесплатно! Руководство поможет вам настроить ваш продукт для оптимальной работы. Скачайте его с manualshive.com прямо сейчас и узнайте все возможности вашего устройства."
Configuration Manual
for v2 Routers
09-05-16
LUCOM GmbH * Ansbacher Str. 2a * 90513 Zirndorf * Tel. 09127/59 460-10 * Fax. 09127/59 460-20 * www.lucom.de
w
.luco
m.d
e
inf
o@lucom
.de
Страница 1: ...Configuration Manual for v2 Routers 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 2: ...erest Firmware version Current version of firmware is 5 3 4 March 10 2016 GPL licence Source codes under GPL licence are available free of charge by sending an email to info conel cz Conel s r o Sokolska 71 562 04 Usti nad Orlici Czech Republic Manual Rev 1 released in CZ March 11 2016 i 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lu...
Страница 3: ...n to Mobile Network 27 3 3 2 DNS Address Configuration 29 3 3 3 Check Connection to Mobile Network Configuration 29 3 3 4 Data Limit Configuration 30 3 3 5 Switch between SIM Cards Configuration 30 3 3 6 Dial In access configuration 33 3 3 7 PPPoE Bridge Mode Configuration 33 3 4 PPPoE Configuration 36 3 5 WiFi Configuration 37 3 6 WLAN Configuration 42 3 7 Backup Routes 44 3 8 Firewall Configurat...
Страница 4: ...tomization 104 4 1 User Modules 104 5 Administration 106 5 1 Users 106 5 2 Change Profile 107 5 3 Change Password 108 5 4 Set Real Time Clock 108 5 5 Set SMS Service Center Address 109 5 6 Unlock SIM Card 109 5 7 Send SMS 110 5 8 Backup Configuration 110 5 9 Restore Configuration 110 5 10 Update Firmware 111 5 11 Reboot 112 6 Configuration over Telnet 113 7 Glossary and Acronyms 115 8 Index 120 9 ...
Страница 5: ...uter 26 20 Mobile WAN Configuration 34 21 Example 1 Mobile WAN Configuration 35 22 Example 2 Mobile WAN Configuration 35 23 Example 3 Mobile WAN Configuration 35 24 PPPoE configuration 36 25 WiFi Configuration 41 26 WLAN Configuration 43 27 Backup Routes 44 28 Firewall Configuration 48 29 Topology for the Firewall Configuration Example 49 30 Firewall Configuration Example 49 31 Example 1 Topology ...
Страница 6: ...1 58 Expansion Port Configuration 94 59 Example of Ethernet to serial communication 95 60 Example of serial port extension 95 61 USB configuration 98 62 Example 1 USB port configuration 98 63 Example 2 USB port configuration 99 64 Startup script 100 65 Example of a Startup script 100 66 Up Down script 101 67 Example of Up Down script 101 68 Example of Automatic Update 1 103 69 Example of Automatic...
Страница 7: ...AN Connection Configuration 28 20 Check Connection to Mobile Network Configuration 29 21 Data Limit Configuration 30 22 Default and Backup SIM Configuration 30 23 Switch between SIM Card Configurations 31 24 Timeout Configuration 32 25 Dial In access configuration 33 26 PPPoE configuration 36 27 WiFi Configuration 40 28 WLAN Configuration 42 29 Configuration of DHCP Server 43 30 Backup Routes 45 3...
Страница 8: ... identifier for M BUS port 78 58 SMTP client configuration 81 59 SMS Configuration 84 60 Control via SMS 84 61 Control SMS 85 62 Send SMS on the serial Port 1 85 63 Send SMS on the serial Port 2 85 64 Send SMS on ethernet PORT1 configuration 86 65 List of AT Commands 87 66 Expansion Port Configuration 1 92 67 Expansion Port Configuration 2 93 68 CD Signal Description 93 69 DTR Signal Description 9...
Страница 9: ...the URL for the browser where xxx xxx xxx xxx is the router IP address The router s default IP address is 192 168 1 1 The default username is root and the default password is root When you successfully enter login information on the login page web interface will be displayed The left side of the web interface displays the menu You will find links for the Status Configuration Customization and Admi...
Страница 10: ... self signed certificate in the router to prevent the security message domain disagreement from pop up every time you log into the router you can take the fol lowing steps Note You will have to use the domain name based on the MAC address of the router and it is not guaranteed to work with every combination of an operating system and a browser Add the DNS record to your DNS system Edit etc hosts L...
Страница 11: ...e Defines the interface Flags Displays network interface flags IP Address IP address of the interface MTU Maximum packet size that the equipment is able to transmit Rx Data Total number of received bytes Rx Packets Received packets Rx Errors Erroneous received packets Rx Dropped Dropped received packets Rx Overruns Lost received packets because of overload Tx Data Total number of sent bytes Tx Pac...
Страница 12: ...at this position is equipped with no port Binary Input State of binary input Binary Output State of binary output Table 2 Peripheral Ports 2 1 4 System Information Item Description Firmware Version Information about the firmware version Serial Number Serial number of the router in case of N A is not available Profile Current profile standard or alternative profiles profiles are used for example to...
Страница 13: ...cted cell EC IO for UMTS and CDMA it s the ratio of the signal received from the pilot channel EC to the overall level of the spectral density ie the sum of the signals of other cells IO RSRQ for LTE technology Defined as the ratio N RSRP RSSI The value is not available for the EDGE technology CSQ Cell Signal Quality relative value is given by RSSI dBm 2 9 range means Marginal 10 14 range means OK...
Страница 14: ...Last week from Monday 0 00 to Sunday 23 59 This period This accounting period Last period Last accounting period Table 5 Description of Periods Item Description Signal Min Minimal signal strength Signal Avg Average signal strength Signal Max Maximal signal strength Cells Number of switch between cells Availability Availability of the router via the mobile network expressed as a percent age Table 6...
Страница 15: ... of sent data Connections Number of connection to mobile network establishment Table 7 Traffic Statistics The last part Mobile Network Connection Log displays information about the mobile net work connections and any problems that occurred while establishing them Figure 2 Mobile WAN status 8 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de ww...
Страница 16: ...umber of stations not supporting the Short Slot Time num_sta_no_short_preamble Number of stations not supporting the Short Preamble Table 8 Access Point State Information Detailed information is displayed for each connected client Most of them have an internal character Here are two examples Item Description STA MAC address of connected device station AID Identifier of connected device 1 2007 If 0...
Страница 17: ...of access point AP properties signal Signal level of access point AP last seen Last response time of access point AP SSID Identifier of access point AP Supported rates Supported rates of access point AP DS Parameter set The channel on which access point AP broadcasts ERP Extended Rate PHY information element providing backward compatibility Extended supported rates Supported rates of access point ...
Страница 18: ...2 STATUS Figure 4 WiFi Scan 11 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 19: ...f Interfaces in Network Status Each of the interfaces displays the following information Item Description HWaddr Hardware unique address of networks interface inet IP address of interface P t P IP address second ends connection Bcast Broadcast address Mask Mask of network MTU Maximum packet size that the equipment is able to transmit Metric Number of routers over which packet must go trought RX pa...
Страница 20: ...ceived bytes TX bytes Total number of transmitted bytes Table 12 Description of Information in Network Status You may view the status of the mobile network connection on the network status screen If the connection to the mobile network is active it will appear in the system information as an usb0 interface The Route Table is displayed at the bottom For the XR5i v2 routers interface ppp0 indicates ...
Страница 21: ... address starts Time that the IP address was assigned ends Time that the IP address lease expires hardware ethernet Unique hardware MAC address uid Unique ID client hostname Host computer name Table 13 DHCP Status Description The DHCP status may occasionally display two records for one IP address This may be caused by resetting the client network interface Figure 6 DHCP Status Note Records in the ...
Страница 22: ...atus The router supports DynamicDNS using a DNS server on www dyndns org If Dynamic DNS is configured the status can be displayed by selecting menu option DynDNS Refer to www dyndns org for more information on how to configure a Dynamic DNS client You can use the following servers for the Dynamic DNS service www dyndns org www spdns de www dnsdynamic org www noip com Figure 8 DynDNS Status 15 09 0...
Страница 23: ...ile with the txt extension The file will include statistical data routing and process tables system log and configuration The default length of the system log is 1000 lines After reaching 1000 lines a new file is created for storing the system log After completion of 1000 lines in the second file the first file is overwritten with a new file The Syslogd program will output the system log It can be...
Страница 24: ...to send syslog information to a remote server at 192 168 2 115 on startup Figure 10 Example program syslogd start with the parameter R 17 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 25: ... set of IP addresses for the network interfaces ETH Subnet Mask Specifies a Subnet Mask for the IP address Bridged Activates deactivates the bridging function on the router no The bridging function is inactive default yes The bridging function is active Media type Specifies the type of duplex and speed used in the network Auto negation The router automatically sets the best speed and duplex mode o...
Страница 26: ...et Mask parameters are used to configure the bridge Primary LAN has higher priority when both interfaces eth0 eth1 are added to the bridge Other interfaces wlan0 wifi can be added to or deleted from an existing bridge at any time The bridge can be created on demand for such interfaces but not if it is configured by their respective parameters The DHCP server assigns the IP address gateway IP addre...
Страница 27: ...by the dynamic DHCP server IP address conflicts and incorrect network function can occur if you overlap the ranges Example 1 Configure the network interface to connect to a dynamic DHCP server The range of dynamic allocated addresses is from 192 168 1 2 to 192 168 1 4 The address is allocated 600 second 10 minutes Figure 11 Example 1 Network Topology for Dynamic DHCP Server 20 09 05 16 LUCOM GmbH ...
Страница 28: ...3 CONFIGURATION Figure 12 Example 1 LAN Configuration Page 21 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 29: ...es The client with the MAC address 01 23 45 67 89 ab has the IP address 192 168 1 10 The client with the MAC address 01 54 68 18 ba 7e has the IP address 192 168 1 11 Figure 13 Example 2 Network Topology with both Static and Dynamic DHCP Servers Figure 14 Example 2 LAN Configuration Page 22 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www...
Страница 30: ...erver Default gateway IP address is 192 168 1 20 DNS server IP address is 192 168 1 20 Figure 15 Example 3 Network Topology Figure 16 Example 3 LAN Configuration Page 23 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 31: ... You may set the Check connection flag in the second part of the window to enable au tomatic test messages for the cellular network In some cases the mobile WAN connection could still be active but the router will not be able to send data over the cellular network This feature is used to verify that data can be sent over the PPP connection and supplements the normal VRRP message handling The curre...
Страница 32: ...cified by the Ping Timeout parameter then the router knows that the connection is still active If the router does not receive a response within the timeout period it will attempt to test the mobile WAN connection using standard Ping commands Example of the VRRP protocol Figure 17 Topology of VRRP configuration example Figure 18 Example of VRRP configuration main router 25 09 05 16 LUCOM GmbH Ansba...
Страница 33: ... CONFIGURATION Figure 19 Example of VRRP configuration backup router 26 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 34: ... the CHAP authentication method IP Address Specifies the IP address of SIM card You manually enter the IP ad dress only when mobile network carrier assigned the IP address Phone Number Specifies the telephone number the router dials for a GPRS or CSD connection The router uses a default telephone number 99 1 Operator Specifies the carrier code You can specify the parameter as the PLNM preferred ca...
Страница 35: ...If the IP address field is left blank when the router establishes a connection then the mobile network carrier automatically assigns an IP address If you assign an IP address then the router accesses the network quicker If the APN field is left blank then the router automatically selects the APN using the IMSI code of the SIM card If the PLMN operator number format is not in the APN list then the ...
Страница 36: ...wo SIM cards or two APNs Send an IMCP to an IP address that you know is still functional The operator s DNS server for example If the Check Connection item is set to the enabled option ping requests are sent on the basis of routing table Thus the requests may be sent through any available interface If you require each ping request to be sent through the network interface which was created when est...
Страница 37: ...ta limit is exceeded see SMS configuration are not selected the data limit will be ignored 3 3 5 Switch between SIM Cards Configuration At the bottom of this configuration form you can specify the rules for toggling between the two APNs a single SIM card or between the two SIM cards if you have inserted two SIM cards The router can automatically toggle between the network setups in the following c...
Страница 38: ... card If the home network is detected this option enables switching back to the default SIM card For proper operation it is necessary to enable roaming on your SIM card Switch to backup SIM card when data limit is exceeded and switch to default SIM card when data limit isn t exceeded This option enables the router to switch to the sec ondary SIM card or secondary APN of the SIM card when the data ...
Страница 39: ...empts to change back to the primary SIM card or APN The length time is the sum of the time specified in the Subsequent Timeout parameter and the time specified in this parameter the range is from 1 to 10000 minutes Table 24 Timeout Configuration Example If you mark the Switch to default SIM card after timeout check box and you enter the following values Initial Timeout 60 min Subsequent Timeout 30...
Страница 40: ...tion Username User name for secured Dial In access Password Password for secured Dial In access Table 25 Dial In access configuration 3 3 7 PPPoE Bridge Mode Configuration If you mark the Enable PPPoE bridge mode check box the router activates the PPPoE bridge protocol PPPoE point to point over ethernet is a network protocol for encapsulating Point to Point Protocol PPP frames inside Ethernet fram...
Страница 41: ...3 CONFIGURATION Figure 20 Mobile WAN Configuration 34 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 42: ...cenario in which the router changes to a backup SIM card after exceeding the data limits of 800MB The router sends a warning SMS upon reaching 400MB The accounting period starts on the 18th day of the month Figure 22 Example 2 Mobile WAN Configuration Example 3 The Primary SIM card changes to the off line mode after the router detects roaming The first attempt to change back to the default SIM car...
Страница 43: ...ccess to PPPoE Authentication Authentication protocol in GSM network PAP or CHAP The router selects the authentication method PAP The router uses the PAP authentication method CHAP The router uses the CHAP authentication method MRU Specifies the Maximum Receiving Unit The MRU identifies the max imum packet size that the router can receive in a given environ ment The default value is 1492 bytes Oth...
Страница 44: ... type of response to a request for sending the beacon frame Enabled SSID is broadcasted in beacon frame Zero length Beacon frame does not include SSID Requests for sending beacon frame are ignored Clear All SSID characters in beacon frames are replaced by 0 Original length is kept Requests for sending beacon frames are ignored Probe Hidden SSID Probes hidden SSID only for station STA mode Country ...
Страница 45: ...put It is suitable for sim ple applications that require QoS Authentication Access control and authorization of users in the WiFi network Open Authentication is not required free access point Shared Base authentication using WEP key WPA PSK Authentication using better authentication meth ods PSK PSK WPA2 PSK WPA PSK using new encryption AES Encryption Type of data encryption in the WiFi network No...
Страница 46: ...in hexadecimal digits This key can be specified in the following lengths 10 hexadecimal digits 40b WEP key 26 hexadecimal digits 104b WEP key 32 hexadecimal digits 128b WEP key WPA PSK Type Type of key for WPA PSK authentication 256 bit secret ASCII passphrase PSK File WPA PSK Key for WPA PSK authentication This key must be entered accord ing to the selected WPA PSK type as follows 256 bit secret ...
Страница 47: ...ses that set network ac cess Each MAC address is separated by new line Syslog Level Logging level when system writes to the system log Verbose debugging The highest level of logging Debugging Informational Default level of logging Notification Warning The lowest level of communicativeness Extra options Allows the user to define additional parameters Table 27 WiFi Configuration 40 09 05 16 LUCOM Gm...
Страница 48: ...3 CONFIGURATION Figure 25 WiFi Configuration 41 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 49: ...eactivates DHCP client IP Address Fixed set IP address of WiFi network interface Subnet Mask Subnet mask of WiFi network interface Bridged Activates bridge mode no Bridged mode is not allowed default value WLAN network is not connected with LAN network of the router yes Bridged mode is allowed WLAN network is connected with one or more LAN networks of the router In this case the setting of most it...
Страница 50: ... will be assigned to DHCP clients IP Pool End End of the range of IP addresses which will be assigned to DHCP clients Lease Time Time in seconds for which the client may use the IP address Table 29 Configuration of DHCP Server All changes in settings will apply after pressing the Apply button Figure 26 WLAN Configuration 43 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fa...
Страница 51: ... routes switching for Mobile WAN Enable backup routes switching for PPPoE Enable backup routes switching for WiFi STA Enable backup routes switching for Primary LAN or Enable backup routes switching for Secondary LAN Network interfaces belonging to individual backup routes should display a flag that says they are RUNNING This check fixes for example the disconnection of an Ethernet cable Attention...
Страница 52: ...e default route only if you unmark the Create connection to mobile network check box on the Mobile WAN page Alternatively if you unmark the Create PPPoE connection check box on the PPPoE page To select the Primary LAN delete the IP address for the Secondary LAN and disabled the DHCP Client for the Secondary LAN Item Description Priority Priority for the type of connection Ping IP Address Destinati...
Страница 53: ... Port The port number on which access to the router is allowed Action Specifies the type of action the router performs allow The router allows the packets to enter the network deny The router denies the packets from entering the network Table 31 Filtering of Incoming Packets The next section of the configuration form specifies the forwarding policy If you unmark the Enabled filtering of forwarded ...
Страница 54: ...s allow The router allows the packets to enter the network deny The router denies the packets from entering the net work Table 32 Forwarding filtering When you enable the Enable filtering of locally destined packets function the router drops receives packets requesting an unsupported service The packet is dropped automatically without any information As a protection against DoS attacks the Enable ...
Страница 55: ...ollowing access from IP address 171 92 5 45 using any protocol from IP address 10 0 2 123 using the TCP protocol on port 1000 from IP address 142 2 26 54 using the ICMP protocol 48 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 56: ...9 Topology for the Firewall Configuration Example Figure 30 Firewall Configuration Example 49 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 57: ...e main menu When creating your rules in the start up script use the following format iptables t nat A napt p tcp dport PORT _PUBLIC j DNAT to destination IPADDR PORT1 _PRIVATE Enter the IP address IPADDR the public ports numbers PORT_PUBLIC and private PORT_PRIVATE in square bracket You use the following parameters to set the routing of incoming data from the PPP to a connected computer Item Descr...
Страница 58: ...tion to allow the router using FTP Enable remote SSH access on port Select this option to allow access to the router using SSH disabled in default configuration Enable remote Telnet access on port Select this option to allow the router using Telnet Enable remote SNMP access on port Select this option to allow access to the router using SNMP disabled in default configuration Masquerade outgoing pac...
Страница 59: ...he address of the device behind the router The default gateway of the devices in the subnetwork connected to router is the same IP address as displayed in the Default Server IP Address field The connected device replies if a PING is sent to the IP address of the SIM card 52 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lu...
Страница 60: ...more equipment connected Figure 33 Example 2 Topology of NAT Configuration Figure 34 Example 2 NAT Configuration 53 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 61: ...0 socket behind the router when accessing 10 0 0 1 81 from the Internet and so on If you send the ping request to the public IP address of the router 10 0 0 1 the router will respond as usual not forwarding If you access the IP address 10 0 0 1 in the browser it is port 80 nothing will happen Port 80 in the Public Port list is not defined and you have not checked the Enable remote HTTP access on p...
Страница 62: ...cription Specifies the description or name of tunnel Protocol Specifies the communication protocol UDP The OpenVPN communicates using UDP TCP server The OpenVPN communicates using TCP in server mode TCP client The OpenVPN communicates using TCP in client mode UDP TCP port Specifies the port of the relevant protocol UDP or TCP Remote IP Address Specifies the IP address of opposite tunnel side You c...
Страница 63: ...rval Renegotiate Interval Specifies the renegotiate period reauthorization of the Open VPN tunnel You can only set this parameter when the Authen ticate Mode is set to username password or X 509 certificate After this time period the router changes the tunnel encryption to help provide the continues safety of the tunnel Max Fragment Size Maximum size of a sent packet Compression Compression of the...
Страница 64: ...fies the protocol for the DH parameters key exchange which you can use for X 509 Certificate authentication in the server mode Local Certificate Specifies the certificate used in the local device You can use this authentication certificate for the X 509 Certificate authentication mode Local Private Key Specifies the key used in the local device You can use the key for the X 509 Certificate authent...
Страница 65: ... in settings will apply after pressing the Apply button Figure 36 OpenVPN tunnel configuration 58 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 66: ...sk 255 255 255 0 255 255 255 0 Local Interface IP Address 19 16 1 0 19 16 2 0 Remote Interface IP Address 19 16 2 0 19 18 1 0 Compression LZO LZO Authenticate mode none none Table 38 OpenVPN Configuration Example Examples of different options for configuration and authentication of OpenVPN tunnel can be found in the application note OpenVPN Tunnel 5 59 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zi...
Страница 67: ...r encapsulates only the packets matching the settings Item Description Create Activates deactivates the individual IPsec tunnels Description Displays the name of the tunnel specified in the configuration of the tunnel Edit Opens the IPsec tunnel configuration form Table 39 IPsec Tunnels Overview Figure 38 IPsec Tunnels List Item Description Description Name or description of the tunnel Remote IP A...
Страница 68: ... according to the method of encap sulation You can select the tunnel mode in which the entire IP datagram is encapsulated or the transport mode in which only IP header is encapsulated NAT traversal Enable disables NAT address translation on the tunnel If you use NAT between the end points of the tunnel then enable this parameter IKE Mode Specifies the mode for establishing a connection main or ag ...
Страница 69: ...inimum value of this pa rameter is 60 s The maximum value is 86400 s IKE Lifetime Lifetime key service part of tunnel The minimum value of this parameter is 60 s The maximum value is 86400 s Rekey Margin Specifies how long before a connection expires that the router attempts to negotiate a replacement Specify a maximum value that is less than half of IKE and Key Lifetime parameters Rekey Fuzz Perc...
Страница 70: ...ds the FQDN User FQDN for example director conel cz The certificates and private keys have to be in the PEM format Use only certificates containing start and stop tags The random time after which the router re exchanges new keys is defined as follows Lifetime Rekey margin random value in range from 0 to Rekey margin Rekey Fuzz 100 The default exchange of keys is in the following time range Minimal...
Страница 71: ...3 CONFIGURATION Figure 39 IPsec Tunnels Configuration 64 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 72: ... 255 0 Local Subnet 192 168 1 0 192 168 2 0 Local Subnet Mas 255 255 255 0 255 255 255 0 Authenticate mode pre shared key pre shared key Pre shared key test test Table 41 Example IPsec configuration Examples of different options for configuration and authentication of IPsec tunnel can be found in the application note IPsec Tunnel 6 65 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 5...
Страница 73: ...nnels List Item Description Description Description of the GRE tunnel Remote IP Address IP address of the remote side of the tunnel Remote Subnet IP address of the network behind the remote side of the tunnel Remote Subnet Mask Specifies the mask of the network behind the remote side of the tunnel Local Interface IP Address IP address of the local side of the tunnel Remote Interface IP Address IP ...
Страница 74: ... tunnel Specify the same key on both routers otherwise the router drops received packets Table 43 GRE Tunnel Configuration Attention the GRE tunnel does not pass through NAT The changes in settings will apply after pressing the Apply button Figure 42 GRE Tunnel Configuration 67 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de inf...
Страница 75: ...10 0 0 1 Remote Subnet 192 168 2 0 192 168 1 0 Remote Subnet Mask 255 255 255 0 255 255 255 0 Table 44 GRE Tunnel Configuration Example Examples of different options for configuration of GRE tunnel can be found in the application note GRE Tunnel 7 68 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 76: ...Start IP Address IP address to start with in the address range The range is offered by the server to the clients Client End IP Address The last IP address in the address range The range is offered by the server to the clients Local IP Address IP address of the local side of the tunnel Remote IP Address IP address of the remote side of the tunnel Remote Subnet Address of the network behind the remo...
Страница 77: ...Start IP Address 192 168 2 5 Client End IP Address 192 168 2 254 Local IP Address 192 168 1 1 Remote IP Address Remote Subnet 192 168 2 0 192 168 1 0 Remote Subnet Mask 255 255 255 0 255 255 255 0 Username username username Password password password Table 46 L2TP Tunnel Configuration Example 70 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom d...
Страница 78: ...P address of the local side of the tunnel Remote IP Address IP address of the remote side of the tunnel Remote Subnet Address of the network behind the remote side of the tunnel Remote Subnet Mask The mask of the network behind the remote side of the tunnel Username Username for the PPTP tunnel login Password Password for the PPTP tunnel login Table 47 PPTP Tunnel Configuration The changes in sett...
Страница 79: ...er IP Address 10 0 0 1 Local IP Address 192 168 1 1 Remote IP Address 192 168 2 1 Remote Subnet 192 168 2 0 192 168 1 0 Remote Subnet Mask 255 255 255 0 255 255 255 0 Username username username Password password password Table 48 PPTP Tunnel Configuration Example 72 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 80: ...d order domain registered on the www dyndns org server Username Username for logging into the DynDNS server Password Password for logging into the DynDNS server Server Specifies a DynDNS service other than the www dyndns org Possible other services www spdns de www dnsdynamic org www noip com Enter the update server service information in this field If you leave this field blank the default server...
Страница 81: ...omatically adjusts the internal clock every 24 hours Item Description Primary NTP Server Address IP or domain address of primary NTP server Secondary NTP Server Address IP or domain address of secondary NTP server Timezone Specifies the time zone where you installed the router Daylight Saving Time Activates deactivates the DST shift No The time shift is inactive Yes The time shift is active Table ...
Страница 82: ... SNMP agent The default setting is public You can define a different password for the Read community read only and the Write community read and write for SNMPv1 v2 You can also define 2 SNMP users for SNMPv3 You can define a user as read only Read and another as read and write Write The router allows you to configure the parameters in the following table for every user separately The router uses t...
Страница 83: ...ata will be sent without parity even Data will be sent with even parity odd Data will be sent with odd parity Stop Bits Number of stop bits Table 53 SNMP configuration MBUS extension Parameters Enable XC CNT extension and Enable M BUS extension cannot be checked at the same time Selecting Enable reporting to supervisory system and entering the IP Address and Period lets you send statistical inform...
Страница 84: ...0 OID Basic Structure The SNMP values that are specific for Conel routers create the tree starting at OID 1 3 6 1 4 1 30140 You interpret the OID in the following manner iso org dod internet private enterprises conel This means that the router provides for example information about the binary input and output The following table shows the range of used OID values OID Description 1 3 6 1 4 1 30140 ...
Страница 85: ...cturer 1 3 6 1 4 1 30140 2 2 address 3 0 Version specified meter version 1 3 6 1 4 1 30140 2 2 address 4 0 Medium type of metered medium 1 3 6 1 4 1 30140 2 2 address 5 0 Status errors report 1 3 6 1 4 1 30140 2 2 address 6 0 0 VIF value information field 1 3 6 1 4 1 30140 2 2 address 7 0 0 measured value 1 3 6 1 4 1 30140 2 2 address 8 0 1 VIF value information field 1 3 6 1 4 1 30140 2 2 address...
Страница 86: ... OID 1 3 6 1 4 1 30140 3 3 and power voltage OID 1 3 6 1 4 1 30140 3 4 The list of available and supported OIDs and other details can be found in the application note SNMP Object Identifier 8 Figure 51 SNMP Configuration Example 79 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 87: ...e MIB tree after entering the IP address Furthermore you can find the status of the internal variables by entering their OID The path to the objects is iso org dod internet private enterprises conel protocols The path to information about the router is iso org dod internet mgmt mib 2 system 80 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de ...
Страница 88: ...ender Table 58 SMTP client configuration The mobile service provider can block other SMTP servers then you can only use the SMTP server of the service provider Figure 53 SMTP Client Configuration Example You send e mails from the Startup script The Startup Script dialog is located in the Con figuration section of the main menu The router also allows you to send e mails using an SSH connection Use ...
Страница 89: ... doc r 5 The command above sends an e mail address to name domain com with the subject subject body message message and attachment abc doc directly from the directory c directory The router attempts to send the message five times 82 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 90: ...en the data limit exceeded Send SMS when binary input on I O port BIN0 is active Send an SMS message when the binary input on the I O port BIN0 goes active The text of the message is set using parameter BIN0 Send SMS when binary input on expansion port BIN1 BIN4 is active Automatic sending SMS message after binary input on expansion port BIN1 BIN4 is active Text of message is intended parameter BI...
Страница 91: ...lt setting of the remote control function is active Item Description Phone Number 1 Specifies the first phone number allowed to access the router us ing an SMS Phone Number 2 Specifies the second phone number allowed to access the router using an SMS Phone Number 3 Specifies the third phone number allowed to access the router using an SMS Table 60 Control via SMS If you leave the phone number fiel...
Страница 92: ...inary output of XC CNT to 0 set out1 1 Sets the binary output of XC CNT to 1 set profile std Sets the standard profile set profile alt1 Sets the alternative profile 1 set profile alt2 Sets the alternative profile 2 set profile alt3 Sets the alternative profile 3 reboot The router reboots get ip The router responds with the IP address of the SIM card Table 61 Control SMS Choosing Enable AT SMS prot...
Страница 93: ...ns the specific model revision identity of the manufacturer AT CGPADDR Displays the IP address of the usb0 interface AT CGSN Returns the product serial number AT CIMI Returns the International Mobile Subscriber Identity number IMSI AT CMGD Deletes a message from the location AT CMGF Sets the presentation format for short messages AT CMGL Lists messages of a certain status from a message storage ar...
Страница 94: ...el revision identity of the manufacturer AT GSN Returns the product serial number ATE Determines whether or not the device echoes characters ATI Transmits the manufacturer specific information about the device Table 65 List of AT Commands A detailed description and examples of these AT commands can be found in the application note AT commands 9 87 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndor...
Страница 95: ... receives an SMS in the following form Router Unit ID has established connection to mobile network IP address xxx xxx xxx xxx After disconnecting from the mobile network the phone with the number entered in the dialog receives an SMS in the following form Router Unit ID has lost connection to mobile network IP address xxx xxx xxx xxx Figure 54 Example 1 SMS Configuration 88 09 05 16 LUCOM GmbH Ans...
Страница 96: ...guration for sending SMS via serial interface on the Port 1 Figure 55 Example 2 SMS Configuration 89 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 97: ... Control the router using an SMS from any phone number Figure 56 Example 3 SMS Configuration 90 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 98: ...Control the router using an SMS from two phone numbers Figure 57 Example 4 SMS Configuration 91 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 99: ...he parameter in milliseconds any buffered characters will be sent over the Ethernet port Protocol Protocol TCP communication using a linked protocol TCP UDP communication using a unlinked protocol UDP Mode Mode of connection TCP server The router will listen for incoming TCP connection requests TCP client The router will connect to a TCP server on the specified IP address and TCP port Server Addre...
Страница 100: ...en you mark the Use DTR as control of TCP connection check box the router uses the data terminal ready DTR single to control the TCP connection The remote device sends a DTR single to the router indicating that the remote device is ready for communications DTR Description server Description client Active The router allows the establishment of TCP connections The router initiates a TCP connec tion ...
Страница 101: ...3 CONFIGURATION Figure 58 Expansion Port Configuration 94 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 102: ...t configuration Figure 59 Example of Ethernet to serial communication Figure 60 Example of serial port extension 95 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 103: ...o characters exceeds the parameter in milliseconds any buffered characters will be sent over the Ethernet port Protocol Communication protocol TCP communication using a linked protocol TCP UDP communication using a unlinked protocol UDP Mode Mode of connection TCP server The router will listen for incoming TCP connection requests TCP client The router will connect to a TCP server on the specified ...
Страница 104: ...le CD Description Active TCP connection is enabled Nonactive TCP connection is disabled Table 72 CD Signal description When you mark the Use DTR as control of TCP connection check box the router uses the data terminal ready DTR single to control the TCP connection The remote device sends a DTR single to the router indicating that the remote device is ready for communications DTR Description server...
Страница 105: ...SB configuration Examples of USB port configuration Figure 62 Example 1 USB port configuration 98 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 106: ...3 CONFIGURATION Figure 63 Example 2 USB port configuration 99 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 107: ... will take effect the next time the router is power cycled or rebooted This can be done with the Reboot button in the web administration or by SMS message Example of Startup script When the router starts up stop syslogd program and start sys logd with remote logging on address 192 168 2 115 and limited to 100 entries Figure 65 Example of a Startup script 100 09 05 16 LUCOM GmbH Ansbacher Str 2a 90...
Страница 108: ...ipt window will run when the PPP WAN connection is lost The changes in settings will apply after pressing the Apply button Figure 66 Up Down script Example of Up Down script After establishing or losing a PPP connection connection to mobile network the router sends an email with information about the PPP connection Figure 67 Example of Up Down script 101 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 ...
Страница 109: ...The router finds the current firmware or con figuration in the root directory of the connected USB device Both Looking for the current firmware or configuration from both sources Base URL Base URL or IP address from which the configuration file will be down loaded This option also specifies the communication protocol HTTP HTTPS FTP or FTPS see examples below Unit ID Name of configuration name of t...
Страница 110: ...77 v2 bin Configuration file http example com test cfg Figure 68 Example of Automatic Update 1 The following examples check for new firmware or configurations each day at 1 00 a m An example is given for the LR77 v2 router with MAC address 00 11 22 33 44 55 Firmware http example com LR77 v2 bin Configuration file http example com 00 11 22 33 44 55 cfg Figure 69 Example of Automatic Update 2 Firmwa...
Страница 111: ...page the module name serves as a link to this page The module can be deleted using the Delete button Updating a module is done the same way Click the Add button and the module with the higher newer version will replace the existing module The current module configuration is left in the same state Programming and compiling of modules are described in the programming guide Figure 71 Added user modul...
Страница 112: ...t messages SMS to specified number GPS Allows the router to provide location and time information in all weather anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites Pinger Allows you to manually or automatically verify the functionallity of the connection between two network interfaces ping IS IS Adds support of IS IS protocol Table 75 User mod...
Страница 113: ...verview Be careful If you lock every account with the permission role Admin you can not unlock these accounts This also means that the Users dialog is unavailable for every user because every admin account is locked and the users do not have sufficient permissions The second block contains configuration form which allows you to add new user All items are described in the table below Item Descripti...
Страница 114: ...rofile to selected profile box is checked The current settings will be stored in the alternate profile after the Apply button is pressed Any changes will take effect after restarting router through the Reboot menu in the web administrator or using an SMS message Example of usage profiles Profiles can be used to switch between different modes of op eration of the router such as PPP connection VPN t...
Страница 115: ...e access to the router for example in NAT until you change the password Figure 74 Change Password 5 4 Set Real Time Clock You can set the internal clock directly using the Set Real Time Clock dialog in the Adminis tration section of in the main menu You can set the Date and Time manually When entering the values manually use the format yyyy mm dd as seen in the figure below You can also adjust the...
Страница 116: ...send or receive SMS messages contact your carrier to find out if this parameter is required Figure 76 Set SMS Service Center Address 5 6 Unlock SIM Card The XR5i v2 router does not support the Unlock SIM Card option If your SIM card is protected using a 4 8 digit PIN number Personal Identification Num ber open the Unlock SIM Card form in the Administration section of the main menu and enter the PI...
Страница 117: ...ils of this method see the application note Commands and Scripts 1 5 8 Backup Configuration You can save the configuration of the router using the Backup Configuration function If you click on Backup Configuration in the Administration section of the main menu then the router allows you to select a directory in which the router saves the configuration file 5 9 Restore Configuration You can restore...
Страница 118: ... progress is shown in the form of adding dots After the firmware update the router will automatically reboot Uploading firmware intended for a different device can cause damage to the router Starting with FW 5 1 0 a mechanism to prevent multiple startups of the firmware update is included Firmware update can cause incompatibility with the user modules It is recom mended to update user modules to t...
Страница 119: ... reboot the router select the Reboot menu item and then press the Reboot button Figure 81 Reboot 112 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 120: ...splaying of kernel diagnostics messages echo string write email Email send free displaying of informations about memory gsmat sends AT commands cdmaat for routers with CDMA module gsminfo displaying of informations about signal quality gsmsms SMS send hwclock displaying change of time in RTC ifconfig displaying change of interface configuration io reading writing input output pins ip displaying ch...
Страница 121: ...ry delete route displaying change of route table service start stop of service sleep pause on set seconds number slog displaying of system log tail displaying of file end tcpdump monitoring of network touch file create actualization of file time stamp vi text editor Table 78 Telnet commands 114 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de...
Страница 122: ... using an easy to re member custom hostname This client monitors the router s IP address and updates it whenever it changes GRE Generic Routing Encapsulation GRE is a tunneling protocol that can encapsulate a wide variety of network layer protocols inside virtual point to point links over an Internet Protocol net work It is possible to create four different tun nels HTTP The Hypertext Transfer Pro...
Страница 123: ...still car ries the vast majority of Internet traffic as of 2013 As of late November 2012 IPv6 traffic share was reported to be approaching 1 IPv6 addresses are represented as eight groups of four hexadecimal digits separated by colons 2001 0db8 85a3 0042 1000 8a2e 0370 7334 but methods of abbreviation of this full notation exist L2TP Layer 2 Tunnelling Protocol L2TP is a tunnelling protocol used t...
Страница 124: ... based on the ITU T X 509 stan dard which normally includes a digital signature from a certificate authority CA Digital certificates are verified using a chain of trust The trust anchor for the digital certificate is the Root Certificate Authority CA See X 509 Router A router is a device that forwards data packets between computer networks creating an overlay internetwork A router is connected to ...
Страница 125: ... Internet protocol suite the set of network protocols used for the Inter net With UDP computer applications can send messages in this case referred to as datagrams to other hosts on an Internet Protocol IP net work without prior communications to set up spe cial transmission channels or data paths The protocol was designed by David P Reed in 1980 and formally defined in RFC 768 URL A uniform resou...
Страница 126: ...ence this mode of telecommunication allows a business to effectively carry out its daily function regard less of location The Internet can be considered a WAN as well and is used by businesses gov ernments organizations and individuals for al most any purpose imaginable X 509 In cryptography X 509 is an ITU T standard for a public key infrastructure PKI and Privilege Management Infrastructure PMI ...
Страница 127: ... SIM card 31 Default username 2 DHCP 19 Dynamic 20 Static 21 DNS server 20 30 DoS attacks 48 DynDNS 74 E Expansion Port CNT 93 MBUS 93 RS232 93 RS485 422 93 F Firewall 47 Filtering of Forwarded Packets 47 Filtering of Incoming Packets 47 Protection against DoS attacks 48 Firmware update 103 112 Firmware version 6 G GRE 67 I IPsec 61 Authenticate Mode 63 Encapsulation Mode 62 IKE Mode 62 L L2TP 70 ...
Страница 128: ...2 93 RS485 93 Serial number 6 Set internal clock 109 Signal Quality 7 Signal Strength 7 SMS 84 SMS Service Center 110 SMTP 82 SNMP 76 Startup Script 101 Switch between SIM Cards 31 System Log 17 T Telnet 114 U Unlock SIM card 110 Up Down script 102 Usage Profiles 108 USB USB RS232 converters 98 USB Port 97 User module 105 Users 107 V VRRP 25 W WiFi 38 Authentication 39 HW Mode 39 Operating mode 38...
Страница 129: ...ion Note 4 Conel R SeeNet Admin Application Note 5 Conel OpenVPN Tunnel Application Note 6 Conel IPsec Tunnel Application Note 7 Conel GRE Tunnel Application Note 8 Conel SNMP Object Identifier Application Note 9 Conel AT Commands Application Note 122 09 05 16 LUCOM GmbH Ansbacher Str 2a 90513 Zirndorf Tel 09127 59 460 10 Fax 09127 59 460 20 www lucom de www lucom de info lucom de ...
Страница 130: ...ubject to the copyrights of one or more authors Please refer to the following GNU General Public License for further information Firmware mit Open Source GPL LGPL Die Firmware von Advantech Router enthält open Source Software unter GPL LGPL Bedingungen Gemäß des Abschnitts 3b von GPL und des Abschnitts 6b von LGPL bieten Advantech B B SmartWorx s r o Ihnen den Quellcode an Sie können den Quellcode...
Страница 131: ... with two steps 1 copyright the software and 2 offer you this license which gives you legal permission to copy distribute and or modify the software Also for each author s protection and ours we want to make certain that everyone understands that there is no warranty for this free software If the software is modified by someone else and passed on we want its recipients to know that what they have ...
Страница 132: ...for at least three years to give any third party free except for a nominal charge for the cost of distribution a complete machine readable copy of the corresponding source code to be distributed under the terms of Paragraphs 1 and 2 above or c accompany it with the information you received as to where the corresponding source code may be obtained This alternative is allowed only for noncommercial ...
Страница 133: ... AND PERFORMANCE OF THE PROGRAM IS WITH YOU SHOULD THE PROGRAM PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 10 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL...
Страница 134: ...istribute it under certain conditions type show c for details The hypothetical commands show w and show c should show the appropriate parts of the General Public License Of course the commands you use may be called something other than show w and show c they could even be mouse clicks or menu items whatever suits your program You should also get your employer if you work as a programmer or your sc...
Страница 135: ...ou must make sure that they too receive or can get the source code And you must show them these terms so they know their rights We protect your rights with two steps 1 copyright the software and 2 offer you this license which gives you legal permission to copy distribute and or modify the software Also for each author s protection and ours we want to make certain that everyone understands that the...
Страница 136: ...hat you provide a warranty and that users may redistribute the program under these conditions and telling the user how to view a copy of this License Exception if the Program itself is interactive but does not normally print such an announcement your work based on the Program is not required to print an announcement These requirements apply to the modified work as a whole If identifiable sections ...
Страница 137: ... are not required to accept this License since you have not signed it However nothing else grants you permission to modify or distribute the Program or its derivative works These actions are prohibited by law if you do not accept this License Therefore by modifying or distributing the Program or any work based on the Program you indicate your acceptance of this License to do so and all its terms a...
Страница 138: ...ogram into other free programs whose distribution conditions are different write to the author to ask for permission For software which is copyrighted by the Free Software Foundation write to the Free Software Foundation we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the shari...
Страница 139: ...t output a short notice like this when it starts in an interactive mode Gnomovision version 69 Copyright C year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY for details type show w This is free software and you are welcome to redistribute it under certain conditions type show c for details The hypothetical commands show w and show c should show the appropriate parts of the General ...
Страница 140: ...the same freedoms that you received You must make sure that they too receive or can get the source code And you must show them these terms so they know their rights Developers that use the GNU GPL protect your rights with two steps 1 assert copyright on the software and 2 offer you this License giving you legal permission to copy distribute and or modify it For the developers and authors protectio...
Страница 141: ... of user commands or options such as a menu a prominent item in the list meets this criterion 1 Source Code The source code for a work means the preferred form of the work for making modifications to it Object code means any non source form of a work A Standard Interface means an interface that either is an official standard defined by a recognized standards body or in the case of interfaces speci...
Страница 142: ...tion 10 makes it unnecessary 3 Protecting Users Legal Rights From Anti Circumvention Law No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under article 11 of the WIPO copyright treaty adopted on 20 December 1996 or similar laws prohibiting or restricting circumvention of such measures When you convey a covered work you waive...
Страница 143: ...duct including a physical distribution medium accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange b Convey the object code in or embodied in a physical product including a physical distribution medium accompanied by a written offer valid for at least three years and valid for as long as you offer spare parts or customer support for t...
Страница 144: ...term regardless of how the transaction is characterized the Corresponding Source conveyed under this section must be accompanied by the Installation Information But this requirement does not apply if neither you nor any third party retains the ability to install modified object code on the User Product for example the work has been installed in ROM The requirement to provide Installation Informati...
Страница 145: ...erned by the terms of that license document provided that the further restriction does not survive such relicensing or conveying If you add terms to a covered work in accord with this section you must place in the relevant source files a statement of the additional terms that apply to those files or a notice indicating where to find the applicable terms Additional terms permissive or non permissiv...
Страница 146: ...te litigation including a cross claim or counterclaim in a lawsuit alleging that any patent claim is infringed by making using selling offering for sale or importing the Program or any portion of it 11 Patents A contributor is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based The work thus licensed is called the contributor s contributo...
Страница 147: ...mplied license or other defenses to infringement that may otherwise be available to you under applicable patent law 12 No Surrender of Others Freedom If conditions are imposed on you whether by court order agreement or otherwise that contradict the conditions of this License they do not excuse you from the conditions of this License If you cannot convey a covered work so as to satisfy simultaneous...
Страница 148: ...THER PROGRAMS EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES 17 Interpretation of Sections 15 and 16 If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection ...
Страница 149: ...rse your program s commands might be different for a GUI interface you would use an about box You should also get your employer if you work as a programmer or school if any to sign a copyright disclaimer for the program if necessary For more information on this and how to apply and follow the GNU GPL see http www gnu org licenses The GNU General Public License does not permit incorporating your pr...
Страница 150: ...t on the Linked Version The Corresponding Application Code for a Combined Work means the object code and or source code for the Application including any data and utility programs needed for reproducing the Combined Work from the Application but excluding the System Libraries of the Combined Work 1 Exception to Section 3 of the GNU GPL You may convey a covered work under sections 3 and 4 of this L...
Страница 151: ...uitable mechanism is one that a uses at run time a copy of the Library already present on the user s computer system and b will operate properly with a modified version of the Library that is interface compatible with the Linked Version e Provide Installation Information but only if you would otherwise be required to provide such information under section 6 of the GNU GPL and only to the extent th...
Страница 152: ...it you have the option of following the terms and conditions either of that published version or of any later version published by the Free Software Foundation If the Library as you received it does not specify a version number of the GNU Lesser General Public License you may choose any version of the GNU Lesser General Public License ever published by the Free Software Foundation If the Library a...
Страница 153: ... display the following acknowledgement This product includes software developed by the University of California Berkeley and its contributors 4 Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS AS IS AND ANY EXP...
Страница 154: ... this file you may extend this exception to your version of the file but you are not obligated to do so If you do not wish to do so delete this exception statement from your version LZO license LZO is Copyright C Markus F X J Oberhumer and is licensed under the GPL Special exception for linking OpenVPN with both OpenSSL and LZO Hereby I grant a special exception to the OpenVPN project http openvpn...
Страница 155: ...e distribution 3 All advertising materials mentioning features or use of this software must display the following acknowledgment This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit http www openssl org 4 The names OpenSSL Toolkit and OpenSSL Project must not be used to endorse or promote products derived from this software without prior written permission...
Страница 156: ...stribution 3 All advertising materials mentioning features or use of this software must display the following acknowledgement This product includes cryptographic software written by Eric Young eay cryptsoft com The word cryptographic can be left out if the rouines from the library being used are not cryptographic related 4 If you include any Windows specific code or a derivative thereof from the a...