ADVANTECH ICR-3231 Industrial EMEA IoT Router User Manual

June 6, 2024
Advantech

ADVANTECH logo

ICR-OS

ADVANTECH ICR-3231 Industrial EMEA IoT Router User Manual

ADVANTECH ICR-3231 Industrial EMEA IoT Router FRONT
VIEW

ADVANTECH ICR-3231 Industrial EMEA IoT Router BACK
VIEW

Abstract

This document describes:

  • Firmware update instructions.
  • Description of all new features, fixes and other changes implemented in the firmware.
  • Known issues related to a firmware version.

Firmware Details

  • Firmware version: 6.3.1
  • Release date: July 21, 2021
  • Hardware compatibility: applicable to the Advantech routers

Please note that not all new Advantech routers are produced and shipped with the latest release
of the firmware. The reason for this is usually an existing certification valid for a specific
carrier or a region. For more information about the latest version of the firmware for your router, see the Firmware Distribution Overview document.

For current and detailed information about the router configuration see the latest version of the
Configuration Manual for your router. Product related documents and applications including the firmware can be obtained on Engineering Portal at icr.advantech.cz address.

Advantech Czech s.r.o., Sokolska 71, 562 04 Usti nad Orlici, Czech Republic
This document was issued on July 22, 2021

Part I: Firmware Update Instructions

General Update Instructions and Notices
HTTPS certificates: The HTTPS certificate format in the router was updated in FW 5.3.5 to improve the security. Existing HTTPS certificates on previously manufactured routers will not automatically be updated with the firmware update! It is possible to update the HTTPS certificates by deleting the files within /etc/certs/https* in the router (e.g. via SSH). The certificates will be re-created automatically during the router’s next start.

Specific Update Instructions

New filename: If the filename of firmware for your router was changed, you will meet with an issue during manual firmware updating or with automatic firmware update feature. This warning message will appear during the firmware updating process: “You are trying to upload file “xx.bin” but “yy.bin” is expected. Are you sure to continue?”

To proceed with the firmware updating please follow these steps: Check the table below for details about recent firmware filename changes and make sure you have the correct firmware file for your router. Go ahead with manual firmware updating and confirm the displayed warning
message.

To proceed with automatic firmware updating, rename new firmware files (.bin and .ver) to filenames valid before the filename change. This should allow the router to pass through the process of automatic firmware updating. Next time, the automatic firmware update feature will work as expected with no need to rename the file.

FIG 1 Recent Firmware Filename Changes

Table 1: Recent Firmware Filename Changes

Updating Firmware of Version Less than 5.3.0

It is necessary to follow specific update instructions below only if you are updating from firmware older than 5.3.0.

Due to a bug in the firewall (now fixed) when aWAN device is part of a bridged interface, caution should be taken when updating in following case:

  • Condition: When a WAN device is part of a bridged interface, access to that WAN device (HTTPS, SSH) is always granted regardless of configuration.
  • Problem: If this is your configuration, it is highly likely that you are not aware of this, so the undesired effect of the bridge firewall fix may render the router inaccessible.
  • Recommended Action: Enable access to both the web and ssh services before updating if you want to retain the current behavior (access to the WAN interface). This can be done on the NAT page in the Configuration section of the router’s Web interface.

Change the root’s password:
It is necessary to change the password for the root user when updating to the firmware version
5.3.0 or newer. The reason for this is an update of the authentication system (encryption algorithm crypt was changed to MD5; passwords are now stored in the /etc/shadow file instead of /etc/passwd). The change of the password is required before setting up the remote access on the NAT Configuration page.

Please note that when downgrading from 5.3.0+ to previous firmware versions, the password for the root user is reset to the default one, which is root.

Part II: Changelog

Note icon Legend: Affected products are marked as shown below for every changelog item:

Affected product: Not affected product

SMS Configuration Enhancement

FIG 2 SMS Configuration Enhancement

There is a new BIN1 – SMS option in the SMS configuration page. The SMS message text, to be sent when the second binary input is activated, can be configured here.

PPTP Configuration Enhancement

FIG 3 PPTP Configuration Enhancement

There are two new options in the PPTP configuration page available to configure the MTU (Maximum Transmission Unit) and the MRU (Maximum Receive Unit) parameters. The default value for both options is 1460 bytes to avoid sending fragmented packets.

L2TP Configuration Enhancement

FIG 4 L2TP Configuration Enhancement

There are two new options in the L2TP configuration page available to configure the MTU
(Maximum Transmission Unit) and the MRU (Maximum Receive Unit) parameters. The default
value for both options is 1400 bytes, the same as used so far.

Firewall Rules Increased

FIG 5 Firewall Rules Increased

The total amount of the firewall rules, that can be configured on the Firewall configuration page, was increased from eight to sixteen rules for both, the incoming and forwarded packets.

Fixed IPsec Issue

FIG 5 Fixed IPsec Issue

We have fixed the IPsec SA checking for when multiple tunnels with the same IDs and different
local or remote subnets are established. This issue was introduced in the firmware 6.3.0.

Fixed WiFi Statistics

FIG 6 Fixed WiFi Statistics

We have made a fix for the WiFi statistics, which may be not displayed in some cases. This issue was introduced in the firmware 6.3.0.

Fixed Linux Kernel Vulnerabilities

FIG 7 Fixed Linux Kernel Vulnerabilities

This update has fixed CVE-2020-24586 (low), CVE-2020-24587 (low), CVE-2020-24588 (low),
CVE-2020-26139 (medium), CVE-2020-26147 (medium), CVE-2020-26558 (medium), CVE-
2020-36386 (high) in the Linux kernel.

WiFi Firmware and Driver Update

FIG 8 WiFi Firmware and Driver Update

We have updated the firmware of the Laird SU60 WiFi module to version 5.5.38.5. Moreover, the module driver was updated to the version 8.5.0.7.

WiFi Firmware Update

FIG 9 WiFi Firmware Update

We have updated the firmware of the Texas Instrument WL1807 WiFi module to version
8.9.0.0.86.

Updated dhcp-isc Software

FIG 10 Updated dhcp-isc Software

We have updated the dhcp-isc program to version 4.1-ESV-R16-P1. This update has fixed
CVE-2021-25217 (high). For more details about this release, see the webpage at https://downloads.isc.org/isc/dhcp/4.1-ESV-R16-P1/dhcp-4.1-ESV-R16-P1-RELNOTES

Updated curl Program

FIG 11 Updated curl Program

We have updated the curl program to version 7.78.0. This update has fixed CVE-2021-
22897 (medium), CVE-2021-22898 (low), CVE-2021-22901 (high), CVE-2021-22922, CVE-
2021-22923, CVE-2021-22924, CVE-2021-22925 and CVE-2021-22926. For more details
about this curl release, see https://curl.haxx.se/changes.html#7_78_0

Updated strongSwan Software

FIG 12 Updated strongSwan Software

We have updated the strongSwan software to version 5.9.3. For more details about this release,
see the webpage at https://github.com/strongswan/strongswan/releases/tag/5.
9.3

Part III: Known Issues

Firmware Update – Unexpected Filename
If the filename of firmware for your router was changed, you could have an issue during manual
firmware updating or with Automatic Update feature. This warning message will appear: “You are trying to upload file “xx.bin” but “yy.bin” is expected. Are you sure to continue?” To fix this issue follow instructions in Part I – Firmware Update Instructions.

Automatic Update – Update to Version 6.1.10
The feature of automatic firmware update will not recognize the firmware version 6.1.10 as
a new version in case the installed version of firmware is from 6.1.0 to 6.1.8. To fix this issue,
either update the firmware by the automatic update to version 6.1.9 first or update it manually
directly to the version 6.1.10.

WiFi Configuration – Lost After Firmware Downgrade
If the firmware is downgraded to the version less than 6.2.0, the WiFi configuration will be lost
completely.

ICR-3200 – Country Code for WiFi
The first version of the firmware for the WiFi module does not support the settings of the country code. Due to this issue, the settings of the country code made on the configuration page
has no effect at all. The country code is set up during the manufacturing process according to the product destination region.

SmartStart – Cellular Network Registration
It is necessary to use router’s firmware version 6.1.5 or higher if the Telit cellular module
installed in your SmartStart router has following version of the firmware:

  • Telit LE910-EU V2 cellular module with firmware version 20.00.403 or newer,
  • Telit LE910-NA1 cellular module with firmware version 20.00.014 or newer.

Note: The model name and firmware version of the cellular module can be found on router’s
web GUI at Mobile WAN Status page in Mobile Network Information section.

SmartStart SL302 – Cellular Network Authentication
It is not possible to use username and password when connecting to Mobile WAN network (on
Mobile WAN Configuration page) if your SmartStart SL302 router has the 20.00.522 firmware version inside the Telit LE910-NA1 cellular module. The version of cellular module firmware can be found at Mobile WAN Status page in Mobile Network Information section.

SmartStart SL302 – SMS in Verizon Network
SmartStart SL302 router (equipped with the Telit modules LE910-SV1 or LE910-NA1) supports
sending and receiving of SMS in Verizon cellular network since the firmware version 6.1.4. Please note that to support SMS receiving, cellular module with Verizon firmware version
higher than 20.00.012 is required.

Read More About This Manual & Download PDF:

Read User Manual Online (PDF format)

Read User Manual Online (PDF format)  >>

Download This Manual (PDF format)

Download this manual  >>

Related Manuals