RG2I UR32 Economic 4G Modem Router User Guide

June 9, 2024
0 3 baby

UR32 Economic 4G Modem Router

Industrial Router Pro Series UR32
User Guide

Preface
Thanks for choosing Milesight UR32 industrial cellular router. The UR32 industrial cellular router delivers tenacious connection over network with full-featured design such as automated failover/failback, extended operating temperature, dual SIM cards, hardware watchdog, VPN, Fast Ethernet and beyond.
This guide describes how to configure and operate the UR32 industrial cellular router. You can refer to it for detailed functionality and router configuration.

Readers
This guide is mainly intended for the following users: – Network Planners – On-site technical support and maintenance personnel – Network administrators responsible for network configuration and maintenance
© 2011-2022 Xiamen Milesight IoT Co., Ltd. All rights reserved. All information in this user guide is protected by copyright law. Whereby, no organization or individual shall copy or reproduce the whole or part of this user guide by any means without written authorization from Xiamen Milesight Iot Co., Ltd.

Related Documents

Document UR32 Datasheet

Description Datasheet for the UR32 industrial cellular router.

UR32 Quick Start Guide Quick Installation guide for the UR32 industrial cellular router.

Declaration of Conformity
UR32 is in conformity with the essential requirements and other relevant provisions of the CE, FCC, and RoHS.

2

For assistance, please contact Milesight technical support: Email: iot.support@milesight.com Tel: 86-592-5085280 Fax: 86-592-5023065 Address: Building C09, Software Park III,
Xiamen 361024, China

Revision History
Date May. 16, 2019 Nov. 14, 2019 May 11, 2020 Dec. 9, 2020
Sept. 17, 2021

Doc Version V 1.1 V 1.2 V 1.3 V 2.0
V 2.1

Description Initial version Add Python, SMS, IP passthrough functions Web interfaces upgrade Layout replace 1. Cellular and ping detection support IPv6 2. Add WAN connection type: DHCPv6 client, DS-Lite 3. Add DHCPv6 Server feature 4. Add IPv6 static routing feature 5. Add Expert Option box in IPsec settings 6. Support SMS inbox and outbox record clear

3

Contents
Chapter 1 Product Introduction…………………………………………………………………………………………………………….8 1.1 Overview…………………………………………………………………………………………………………………………………. 8 1.2 Advantages…………………………………………………………………………………………………………………………….. 8 1.3 Specifications…………………………………………………………………………………………………………………………. 9 1.4 Dimensions (mm)…………………………………………………………………………………………………………………. 11
Chapter 2 Access to Web GUI……………………………………………………………………………………………………………. 12 Chapter 3 Web Configuration…………………………………………………………………………………………………………….. 14
3.1 Status…………………………………………………………………………………………………………………………………….14 3.1.1 Overview…………………………………………………………………………………………………………………….. 14 3.1.2 Cellular……………………………………………………………………………………………………………………….. 15 3.1.3 Network……………………………………………………………………………………………………………………….17 3.1.4 WLAN (Only Applicable to Wi-Fi Version)…………………………………………………………………….18 3.1.5 VPN……………………………………………………………………………………………………………………………..19 3.1.6 Routing……………………………………………………………………………………………………………………….. 20 3.1.7 Host List………………………………………………………………………………………………………………………20 3.1.8 GPS (Only Applicable to GPS Version)…………………………………………………………………………21
3.2 Network………………………………………………………………………………………………………………………………… 22 3.2.1 Interface………………………………………………………………………………………………………………………22 3.2.1.1 Link Failover………………………………………………………………………………………………………22 3.2.1.2 Cellular………………………………………………………………………………………………………………24 3.2.1.3 Port……………………………………………………………………………………………………………………26 3.2.1.4 WAN…………………………………………………………………………………………………………………. 27 3.2.1.5 Bridge………………………………………………………………………………………………………………..32 3.2.1.6 WLAN (Only Applicable to Wi-Fi Version)…………………………………………………………. 32 3.2.1.7 Switch………………………………………………………………………………………………………………. 35 3.2.1.8 Loopback…………………………………………………………………………………………………………..35 3.2.2 DHCP………………………………………………………………………………………………………………………….. 36 3.2.2.1 DHCP/DHCPv6 Server……………………………………………………………………………………….36 3.2.2.2 DHCP Relay………………………………………………………………………………………………………. 38 3.2.3 Firewall………………………………………………………………………………………………………………………..39 3.2.3.1 Security……………………………………………………………………………………………………………..39 3.2.3.2 ACL…………………………………………………………………………………………………………………… 40 3.2.3.3 Port Mapping……………………………………………………………………………………………………. 41 3.2.3.4 DMZ…………………………………………………………………………………………………………………..42 3.2.3.5 MAC Binding…………………………………………………………………………………………………….. 43 3.2.3.6 Custom Rules…………………………………………………………………………………………………… 43 3.2.3.7 SPI……………………………………………………………………………………………………………………. 44 3.2.4 QoS…………………………………………………………………………………………………………………………….. 45 3.2.5 VPN……………………………………………………………………………………………………………………………..46 3.2.5.1 DMVPN…………………………………………………………………………………………………………….. 46 3.2.5.2 IPSec Server………………………………………………………………………………………………………47 3.2.5.3 IPSec………………………………………………………………………………………………………………… 51
4

3.2.5.4 GRE……………………………………………………………………………………………………………………53 3.2.5.5 L2TP…………………………………………………………………………………………………………………. 54 3.2.5.6 PPTP………………………………………………………………………………………………………………… 56 3.2.5.7 OpenVPN Client…………………………………………………………………………………………………58 3.2.5.8 OpenVPN Server………………………………………………………………………………………………..60 3.2.5.9 Certifications……………………………………………………………………………………………………. 62 3.2.6 IP Passthrough…………………………………………………………………………………………………………… 64 3.2.7 Routing……………………………………………………………………………………………………………………….. 64 3.2.7.1 Static Routing…………………………………………………………………………………………………… 64 3.2.7.2 RIP……………………………………………………………………………………………………………………. 65 3.2.7.3 OSPF………………………………………………………………………………………………………………… 68 3.2.7.4 Routing Filtering……………………………………………………………………………………………….. 74 3.2.8 VRRP……………………………………………………………………………………………………………………………74 3.2.9 DDNS………………………………………………………………………………………………………………………….. 76 3.3 System…………………………………………………………………………………………………………………………………..78 3.3.1 General Settings…………………………………………………………………………………………………………. 78 3.3.1.1 General………………………………………………………………………………………………………………78 3.3.1.2 System Time……………………………………………………………………………………………………..79 3.3.1.3 Email………………………………………………………………………………………………………………… 81 3.3.1.4 Storage…………………………………………………………………………………………………………….. 82 3.3.2 Phone&SMS…………………………………………………………………………………………………………………83 3.3.2.1 Phone………………………………………………………………………………………………………………..83 3.3.2.2 SMS………………………………………………………………………………………………………………….. 84 3.3.3 User Management……………………………………………………………………………………………………….85 3.3.3.1 Account……………………………………………………………………………………………………………. 85 3.3.3.2 User Management……………………………………………………………………………………………. 86 3.3.4 SNMP…………………………………………………………………………………………………………………………. 87 3.3.4.1 SNMP……………………………………………………………………………………………………………….. 87 3.3.4.2 MIB View……………………………………………………………………………………………………………88 3.3.4.3 VACM……………………………………………………………………………………………………………….. 88 3.3.4.4 Trap………………………………………………………………………………………………………………….. 89 3.3.4.5 MIB…………………………………………………………………………………………………………………… 90 3.3.5 AAA……………………………………………………………………………………………………………………………..90 3.3.5.1 Radius………………………………………………………………………………………………………………. 90 3.3.5.2 TACACS+…………………………………………………………………………………………………………..91 3.3.5.3 LDAP………………………………………………………………………………………………………………… 92 3.3.5.4 Authentication………………………………………………………………………………………………….. 93 3.3.6 Device Management…………………………………………………………………………………………………… 93 3.3.6.1 DeviceHub………………………………………………………………………………………………………… 93 3.3.6.2 Milesight VPN……………………………………………………………………………………………………94 3.3.7 Events………………………………………………………………………………………………………………………….96 3.3.7.1 Events………………………………………………………………………………………………………………. 96 3.3.7.2 Events Settings………………………………………………………………………………………………….96 3.4 Industrial Interface……………………………………………………………………………………………………………….. 98
5

3.4.1 I/O………………………………………………………………………………………………………………………………. 99 3.4.1.1 DI……………………………………………………………………………………………………………………….99 3.4.1.2 DO……………………………………………………………………………………………………………………100
3.4.2 Serial Port………………………………………………………………………………………………………………….100 3.4.3 Modbus Slave…………………………………………………………………………………………………………… 104
3.4.3.1 Modbus TCP……………………………………………………………………………………………………104 3.4.3.2 Modbus RTU……………………………………………………………………………………………………105 3.4.3.3 Modbus RTU Over TCP…………………………………………………………………………………… 105 3.4.4 Modbus Master………………………………………………………………………………………………………… 106 3.4.4.1 Modbus Master……………………………………………………………………………………………….106 3.4.4.2 Channel………………………………………………………………………………………………………….. 107 3.4.5 GPS (Only Applicable to GPS Version)……………………………………………………………………… 109 3.4.5.1 GPS………………………………………………………………………………………………………………… 109 3.4.5.2 GPS IP Forwarding…………………………………………………………………………………………. 110 3.4.5.3 GPS Serial Forwarding……………………………………………………………………………………. 111 3.5 Maintenance………………………………………………………………………………………………………………………..112 3.5.1 Tools………………………………………………………………………………………………………………………… 112 3.5.1.1 Ping………………………………………………………………………………………………………………… 112 3.5.1.2 Traceroute……………………………………………………………………………………………………….112 3.5.1.3 Packet Analyzer……………………………………………………………………………………………… 113 3.5.1.4 Qxdmlog…………………………………………………………………………………………………………. 113 3.5.2 Debugger………………………………………………………………………………………………………………….. 114 3.5.2.1 Cellular Debugger…………………………………………………………………………………………… 114 3.5.2.2 Firewall Debugger……………………………………………………………………………………………114 3.5.3 Log…………………………………………………………………………………………………………………………….115 3.5.3.1 System Log…………………………………………………………………………………………………….. 115 3.5.3.2 Log Download………………………………………………………………………………………………… 116 3.5.3.3 Log Settings…………………………………………………………………………………………………….117 3.5.4 Upgrade……………………………………………………………………………………………………………………. 118 3.5.5 Backup and Restore…………………………………………………………………………………………………..118 3.5.6 Reboot……………………………………………………………………………………………………………………….119 3.6 APP…………………………………………………………………………………………………………………………………….. 120 3.6.1 Python………………………………………………………………………………………………………………………. 120 3.6.1.1 Python……………………………………………………………………………………………………………..120 3.6.1.2 App Manager Configuration…………………………………………………………………………….121 3.6.1.3 Python App…………………………………………………………………………………………………….. 121 Chapter 4 Application Examples……………………………………………………………………………………………………… 123 4.1 Restore Factory Defaults……………………………………………………………………………………………………..123 4.1.1 Via Web Interface………………………………………………………………………………………………………123 4.2.2 Via Hardware……………………………………………………………………………………………………………. 124 4.2 Firmware Upgrade……………………………………………………………………………………………………………….124 4.3 Events Application Example……………………………………………………………………………………………….. 125 4.4 SNMP Application Example…………………………………………………………………………………………………126 4.5 Network Connection…………………………………………………………………………………………………………… 129
6

4.5.1 Cellular Connection……………………………………………………………………………………………………129 4.5.2 Ethernet WAN Connection…………………………………………………………………………………………131 4.6 Wi-Fi Application Example (Only Applicable to Wi-Fi Version)……………………………………………..133 4.6.1 AP Mode…………………………………………………………………………………………………………………… 133 4.6.2 Client Mode………………………………………………………………………………………………………………. 134 4.7 VRRP Application Example…………………………………………………………………………………………………. 135 4.8 NAT Application Example…………………………………………………………………………………………………… 138 4.9 Access Control Application Example…………………………………………………………………………………..138 4.10 QoS Application Example…………………………………………………………………………………………………. 140 4.11 DTU Application Example…………………………………………………………………………………………………. 141 4.12 PPTP Application Example………………………………………………………………………………………………..144
7

Chapter 1 Product Introduction
1.1 Overview
UR32 is an industrial cellular router with embedded intelligent software features that are designed for multifarious M2M/IoT applications. Supporting global WCDMA and 4G LTE, UR32 provides drop-in connectivity for operators and makes a giant leap in maximizing uptime. Adopting high-performance and low- power consumption industrial grade CPU and wireless module, the UR32 is capable of providing wire-speed network with low power consumption and ultra- small package to ensure the extremely safe and reliable connection to the wireless network. Meanwhile, the UR32 also supports Fast Ethernet ports, serial port (RS232/RS485) and I/O (input/output), which enables you to scale up M2M application combining data and video in limited time and budget. UR32 is particularly ideal for smart grid, digital media installations, industrial automation, telemetry equipment, medical device, digital factory, finance, payment device, environment protection, water conservancy and so on. For details of hardware and installation, please check UR32 Quick Start Guide.
Figure 1-1
1.2 Advantages Benefits
– Built-in industrial strong NXP CPU, big memory – Fast Ethernets for fast data transmission – Dual SIM cards for backup between multiple carriers networking and global 2G/3G/LTE options
make it easy to get connected – Equipped with Ethernet, I/O, serial port, Wi- Fi, GPS for connecting diverse field assets – Embedded Python SDK for second development – Rugged enclosure, optimized for DIN rail or shelf mounting – 3-year warranty included
8

Security & Reliability – Automated failover/failback between Ethernet and Cellular (dual SIM) – Enable unit with security frameworks like IPsec/OpenVPN/GRE/L2TP/PPTP/ DMVPN – Embed hardware watchdog, automatically recovering from various failure, and ensuring highest
level of availability – Establish a secured mechanism on centralized authentication and authorization of device access
by supporting AAA (TACACS+, Radius, LDAP, local authentication) and multiple levels of user authority

Easy Maintenance – Milesight DeviceHub provides easy setup, mass configuration, and centralized management of
remote devices – The user-friendly web interface design and several upgrade options help administrator to manage
the device as easy as pie – Web GUI and CLI enable the admin to achieve simple management and quick configuration
among a large quantity of devices – Efficiently manage the remote routers on the existing platform through the industrial standard
SNMP

Capabilities – Link remote devices in an environment where communication technologies are constantly
changing – Industrial 32-bit ARM Cortex-A7 processor, high-performance operating up to 528MHz and 128
MB memory available to support more applications – Support rich protocols like SNMP, Modbus bridging, RIP, OSPF – Support wide operating temperature ranging from -40°C to 70°C/-40°F to 158°F

1.3 Specifications
Hardware System CPU Memory Storage Cellular Interfaces Connectors SIM Slots

528MHz, 32-bit ARM Cortex-A7 128 MB Flash, 128 MB DDR3 RAM 1 × Micro SD
2 × 50 SMA (Center pin: SMA Female) 2

9

Wi-Fi Interface (Optional)

Connectors

1 × 50 SMA (Center pin: RP-SMA Female)

Standards

IEEE 802.11 b/g/n

802.11b: 16 dBm +/-1.5 dBm (11 Mbps)

Tx Power

802.11g: 14 dBm +/-1.5 dBm (54 Mbps)

802.11n: 13 dBm +/-1.5 dBm (65 Mbps, HT20/40 MCS7)

Modes

Support AP and Client mode, multiple SSID

Security

WPA/WPA2 authentication, WEP/TKIP/AES encryption

GPS (Optional)

Connectors

1 × 50 SMA (Center pin: SMA Female)

Protocols

NMEA 0183, PMTK

Ethernet

Ports

2 × RJ-45 (PoE PSE Optional)

Physical Layer

10/100 Base-T (IEEE 802.3)

Data Rate

10/100 Mbps (auto-sensing)

Interface

Auto MDI/MDIX

Mode Serial Interface

Full or half duplex (auto-sensing)

Ports

1 × RS232 (RS485 Optional)

Connector

Terminal block

Baud Rate

300bps to 230400bps

IO

Connector

Terminal block

Digital

1 × DI + 1 × DO

Software

IPv4/IPv6, PPP, PPPoE, SNMP v1/v2c/v3, TCP, UDP, DHCP, RIPv1/v2,

Network Protocols

OSPF, DDNS, VRRP, HTTP, HTTPS, DNS, ARP, QoS, SNTP, Telnet, VLAN,

SSH, etc.

VPN Tunnel

DMVPN/IPsec/OpenVPN/PPTP/L2TP/GRE

Access Authentication CHAP/PAP/MS-CHAP/MS-CHAPV2

Firewall

ACL/DMZ/Port Mapping/MAC Binding/SPI/DoS&DDoS Protection /IP Passthrough

Management

Web, CLI, SMS, On-demand dial up, DeviceHub

AAA

Radius, TACACS+, LDAP, Local Authentication

10

Multilevel Authority

Multiple levels of user authority

Reliability

VRRP, WAN Failover, Dual SIM Backup

Serial Port

Transparent (TCP Client/Server, UDP), Modbus Gateway (Modbus RTU to Modbus TCP)

Power Supply and Consumption

Connector

2-pin with 5.08 mm terminal block

Input Voltage

9-48 VDC

Power Consumption

Typical 1.9 W, Max 2.4 W (In Non-PoE mode)

Power Output

2 × 802.3 af/at PoE output

Physical Characteristics

Ingress Protection

IP30

Housing & Weight

Metal, 271 g

Dimensions

108 x 90 x 26 mm (4.25 x 3.54 x 1.02 in)

Mounting

Desktop, wall or DIN rail mounting

Others

Reset Button

1 × RESET

LED Indicators

1 × POWER, 1 × SYSTEM, 1 × SIM, 3 × Signal strength

Built-in Environmental

Watchdog, Timer

-40°C to +70°C (-40°F to +158°F) Operating Temperature
Reduced cellular performance above 60°C

Storage Temperature -40°C to +85°C (-40°F to +185°F)

Ethernet Isolation

1.5 kV RMS

Relative Humidity

0% to 95% (non-condensing) at 25°C/77°F

1.4 Dimensions (mm)

Figure 1-2 11

Chapter 2 Access to Web GUI
This chapter explains how to access to Web GUI of the UR32 router. Connect PC to LAN port of UR32 router directly. The following steps are based on Windows 10 operating system for your reference. Username: admin Password: password IP Address: 192.168.1.1 1. Go to “Control Panel” “Network and Internet” “Network and Sharing Center”, then click “Ethernet” (May have different names).
2. Go to “Properties” “Internet Protocol Version 4(TCP/IPv4) “, select “Obtain an IP address automatically” or “Use the following IP address”, then assign a static IP manually within the same subnet of the device.
3. Open a Web browser on your PC (Chrome is recommended), type in the IP address 192.168.1.1, and press Enter on your keyboard. 4. Enter the username, password, and click “Login”.
12

If you enter the username or password incorrectly more than 5 times, the login page will be locked for 10 minutes. 5. When you login with the default username and password, you will be asked to modify the password. It’s suggested that you change the password for the sake of security. Click “Cancel” button if you want to modify it later.
6. After you login the Web GUI, you can view system information and perform configuration on the router.
13

Chapter 3 Web Configuration
3.1 Status 3.1.1 Overview
You can view the system information of the router on this page.

Figure 3-1-1-1

System Information

Item Model Serial Number

Description Show the model name of router. Show the serial number of router.

Firmware Version

Show the currently firmware version of router.

Hardware Version

Show the currently hardware version of router.

Table 3-1-1-1 System Information

System Status Item

Description

Local Time

Show the currently local time of system.

Uptime CPU Load

Show the information on how long the router has been running. Show the current CPU utilization of the router.

RAM (Available/Capacity) Show the RAM capacity and the available RAM memory. Flash (Available/Capacity) Show the Flash capacity and the available Flash memory.

Table 3-1-1-2 System Status

14

Cellular Item Status

Description Show the real-time status of the currently SIM card

Current SIM

Show the SIM card currently used for the data connection.

IPv4/IPv6

Show the IPv4/IPv6 address obtained from the mobile carrier.

Connection Duration Data Usage Monthly

Show the connection duration of the currently SIM card. Show the monthly data usage statistics of currently used SIM card.

Table 3-1-1-3 Cellular Status

WAN Item

Description

Status

Show the currently status of WAN port.

IPv4/IPv6

The IPv4/IPv6 address configured WAN port.

MAC Connection Duration

The MAC address of the Ethernet port. Show the connection duration of the WAN port.

Table 3-1-1-4 WAN Status

WLAN (Only applicable for Wi-Fi model)

Item

Description

Status

Show the currently status of WLAN.

IP

Show the WLAN mode (AP or client).

SSID

Show the SSID of the WLAN AP or client.

Connected Clients

Show the amount of connected devices when mode is AP.

Table 3-1-1-5 WLAN Status

LAN Item

Description

IP4/IPv6 Connected Devices

Show the IP4/IPv6 address of the LAN port. Number of devices that connected to the router’s LAN.

Table 3-1-1-6 LAN Status

3.1.2 Cellular You can view the cellular network status of router on this page.

15

Figure 3-1-2-1

Modem Information

Item Status Version

Description Show corresponding detection status of module and SIM card. Show the cellular module firmware version.

Current SIM

Show the current SIM card used.

Signal Level

Show the cellular signal level.

Register Status IMEI IMSI

Show the registration status of SIM card. Show the IMEI of the module. Show IMSI of the SIM card.

ICCID

Show ICCID of the SIM card.

ISP Network Type PLMN ID LAC

Show the network provider which the SIM card registers on. Show the connected network type, such as LTE, 3G, etc. Show the current PLMN ID, including MCC, MNC, LAC and Cell ID. Show the location area code of the SIM card.

Cell ID

Show the Cell ID of the SIM card location.

Table 3-1-2-1 Modem Information

Network

Item

Description

Status

Show the connection status of cellular network.

IPv4/IPv6 Address IPv4/IPv6 Gateway IPv4/IPv6 DNS

Show the IPv4/IPv6 address and netmask of cellular network. Show the IPv4/IPv6 gateway and netmask of cellular network. Show the IPv4/IPv6 DNS of cellular network.

Show information on how long the cellular network has been Connection Duration
connected.

Table 3-1-2-2 Network Status

Data Usage Monthly

Item

Description

SIM-1

Show the monthly data usage statistics of SIM-1.

SIM-2

Show the monthly data usage statistics of SIM-2.

16

Table 3-1-2-3 Data Usage Information
3.1.3 Network On this page you can check the WAN and LAN status of the router.

WAN Status Item Port
Status
Type IPv4/IPv6 Gateway DNS Connection Duration

Figure 3-1-3-1
Description Show the name of WAN port. Show the status of WAN port. “up” refers to a status that WAN is enabled and Ethernet cable is connected. “down” means Ethernet cable is disconnected or WAN function is disabled. Show the dial-up connection type of WAN port. Show the IPv4 address with netmask or IPv6 address with prefix-length of WAN port. Show the gateway of WAN port. Show the DNS of WAN port. Show the information on how long the Ethernet cable has been connected on WAN port when WAN function is enabled. Once WAN function is disabled or Ethernet connection is disconnected, the duration will stop.
Table 3-1-3-1 WAN Status

Bridge Item Name STP IPv4/IPv6 Netmask Members

Figure 3-1-3-2
Description Show the name of the bridge interface. Show if STP is enabled. Show the IPv4/IPv6 address and netmask of the bridge interface. Show the Netmask of the bridge interface. Show the members of the bridge interface.
Table 3-1-3-2 Bridge Status

17

3.1.4 WLAN (Only Applicable to Wi-Fi Version) You can check Wi-Fi status on this page, including the information of access point and client.

WLAN Status Item WLAN Status Name Status Type SSID
IP Address
Netmask Associated Stations SSID
MAC Address
IP Address
Connection Duration

Figure 3-1-4-1
Description
Show the name of the Wi-Fi interface . Show the status of the Wi-Fi interface. Show the Wi-Fi interface type. Show the SSID of the router when the interface type is AP. Show the SSID of AP which the router connected to when the interface type is Client. Show the IP address of the router when the interface type is AP. Show the IP address of AP which the router connected to when the interface type is Client. Show the netmask of the router when the interface type is AP. Show the netmask of AP which the router connected to when the interface type is Client.
Show the SSID of the router when the interface type is AP. Show the SSID of AP which the router connected to when the interface type is Client. Show the MAC address of the client which connected to the router when the interface type is AP. Show the MAC address of the AP which the router connected to when the interface type is Client. Show the IP address of the client which connected to the router when the interface type is AP. Show the IP address of the AP which the router connected to when the interface type is Client. Show the connection duration between client device and router when the interface type is AP. Show the connection duration between router and the AP when the interface type is Client.
Table 3-1-4-1 WLAN Status

18

3.1.5 VPN You can check VPN status on this page, including PPTP, L2TP, IPsec, OpenVPN and DMVPN.

VPN Status Item Clients Name
Status
Local IP Remote IP Server Name Status Connected List Server Type Client IP
Duration

Figure 3-1-5-1
Description
Show the name of the enabled VPN clients. Show the status of client. “Connected” refers to a status that client is connected to the server. “Disconnected” means client is disconnected to the server. Show the local IP address of the tunnel. Show the real remote IP address of the tunnel.
Show the name of the enabled VPN Server. Show the status of Server.
Show the type of the server. Show the IP address of the client which connected to the server. Show the information about how long the client has been connected to this server when the server is enabled. Once the server is disabled or connection is disconnected, the duration will stop counting.
Table 3-1-5-1 VPN Status

19

3.1.6 Routing You can check routing status on this page, including the routing table and ARP cache.

Item Routing Table Destination Netmask/Prefix Length Gateway Interface Metric ARP Cache IP MAC Interface

Description

Figure 3-1-6-1

Show the IP address of destination host or destination network. Show the netmask or prefix length of destination host or destination network. Show the IP address of the gateway. Show the outbound interface of the route. Show the metric of the route.

Show the IP address of ARP pool. Show the IP address’s corresponding MAC address. Show the binding interface of ARP.
Table 3-1-6-1 Routing Information

3.1.7 Host List You can view the host information on this page.

20

Host List Item DHCP Leases IP Address MAC/DUID Lease Time Remaining MAC Binding
IP & MAC

Figure 3-1-7-1
Description
Show IP address of DHCP client Show MAC address of DHCPv4 client or DUID of DHCPv6 client. Show the remaining lease time of DHCP client.
Show the IP address and MAC address set in the Static IP list of DHCP service.
Table 3-1-7-1 Host List Description

3.1.8 GPS (Only Applicable to GPS Version) When GPS function is enabled and the GPS information is obtained successfully, you can view the latest GPS information including GPS Time, Latitude, Longitude and Speed on this page.

Figure 3-1-8-1
21

GPS Status Item Status Time for Locating Satellites In Use Satellites In View Latitude Longitude Altitude Speed

Description Show the status of GPS. Show the time for locating. Show the quantity of satellites in use. Show the quantity of satellites in view. Show the Latitude of the location. Show the Longitude of the location. Show the Altitude of the location. Show the speed of movement.
Table 3-1-8-1 GPS Status Description

3.2 Network
3.2.1 Interface
3.2.1.1 Link Failover This section describes how to configure link failover strategies, their priority and the ping settings, each rule owns its own ping rules by default. Router will follow the priority to choose the next available interface to access the internet, make sure you have enable the full interface that you need to use here. If priority 1 can only use IPv4, UR32 will select a second link which IPv6 works as main IPv6 link and vice versa.

Link Failover Item Link Priority Priority
Enable Rule

Figure 3-2-1-1
Description
Display the priority of each interface, you can modify it by the operation’s up and down button. If enabled, the router will choose this interface into its switching rule. For the Cellular interface, if it’s not enabled here, the interface will be disabled as well.

22

Link In Use Interface Connection type IP Operation Settings Revert Interval Emergency Reboot

Mark whether this interface is in use with Green color Display the name of the interface. Display how to obtain the IP address in this interface, like static IP or DHCP. Display the IP address of the interface. You can change the priority of the rules and configure the ping detection rules here.
Specify the number of seconds to waiting for switching to the link with higher priority, 0 means disable the function. Enable to reboot the device if no link is available.
Table 3-2-1-1 Link Failover Parameters

Ping Detection Item
Enable
IPv4/IPv6 Primary Server
IPv4/IPv6 Secondary Server Interval
Retry Interval
Timeout

Figure 3-2-1-2
Description If enabled, the router will periodically detect the connection status of the link. The router will send ICMP packet to the IPv4/IPv6 address or hostname to determine whether the Internet connection is still available or not. The router will try to ping the secondary server name if primary server is not available. Time interval (in seconds) between two Pings. Set the ping retry interval. When ping failed, the router will ping again in every retry interval. The maximum amount of time the router will wait for a

23

Max Ping Retries

response to a ping request. If it does not receive a response for the amount of time defined in this field, the ping request will be considered to have failed. The retry times of the router sending ping request until determining that the connection has failed.
Table 3-2-1-2 Ping Detection Parameters

3.2.1.2 Cellular This section explains how to set the related parameters for cellular network. The UR32 cellular router has two cellular interfaces, namely SIM1 and SIM2. Only one cellular interface is active at one time. If both cellular interfaces are enabled, it will follow the priority rule configured in `Link Failover’ page.

Cellular Settings Item Protocol
APN

Figure 3-2-1-3
Description Select from “IPv4”, “IPv6” and “IPv4/IPv6”. Enter the Access Point Name for cellular dial-up connection provided by local ISP.

24

Username Password PIN Code Access Number Authentication Type
Network Type
PPP Preferred SMS Center Enable NAT Roaming Data Limit
Billing Day

Enter the username for cellular dial-up connection provided by local ISP. Enter the password for cellular dial-up connection provided by local ISP. Enter a 4-8 characters PIN code to unlock the SIM. Enter the dial-up center NO. For cellular dial-up connection provided by local ISP. Select from “Auto”, “PAP”, “CHAP”, “MS-CHAP”, and “MS-CHAPv2”. Select from “Auto”, “4G Only”, “3G Only”, and “2G Only”. Auto: connect to the network with the strongest signal automatically. 4G Only: connect to 4G network only. And so on. The PPP dial-up method is preferred. Enter the local SMS center number for storing, forwarding, converting and delivering SMS message. Enable or disable NAT function. Enable or disable roaming. When you reach the specified data usage limit, the data connection of currently used SIM card will be disabled. 0 means disable the function. Choose the billing day of the SIM card, the router will reset the data used to 0.
Table 3-2-1-3 Cellular Parameters

Connection Setting Item Connection Mode Re-dial Interval(s)

Figure 3-2-1-4
Description Select from “Always Online” and “Connect on Demand”. Set the interval to dial into ISP when it lost connection, the default value is

25

Max Idle Times Triggered by Call Call Group
Triggered by SMS
SMS Group SMS Text Triggered by IO

5s. Set the maximum duration of router when current link is under idle status. Range: 10-3600 The router will switch from offline mode to cellular network mode automatically when it receives a call from the specific phone number. Select a call group for call trigger. Go to “System > Phone&SMS > Phone” to set up phone group. The router will switch from offline mode to cellular network mode automatically when it receives a specific SMS from the specific mobile phone. Select an SMS group for trigger. Go to “System > Phone&SMS > SMS” to set up SMS group. Fill in the SMS content for triggering. The router will switch from offline mode to cellular network mode automatically when the DI status is changed. Go to “Industrial > I/O > DI” to configure trigger condition.
Table 3-2-1-4 Cellular Parameters

Related Topics Cellular Network Connection Phone Group DI Setting

3.2.1.3 Port
This section describes how to configure the Ethernet port parameters. UR32 cellular router supports 2 Fast Ethernet ports.

Port Setting Item Port
Status
Property Speed

Figure 3-2-1-5
Description Users can define the Ethernet ports according to their needs. Set the status of Ethernet port; select “up” to enable and “down” to disable. Show the Ethernet port’s type, as a WAN port or a LAN port. Set the Ethernet port’s speed. The options are “auto”, “100 Mbps”,

26

Duplex

and “10 Mbps”. Set the Ethernet port’s mode. The options are “auto”, “full”, and “half”.
Table 3-2-1-5 Port Parameters

3.2.1.4 WAN
WAN port can be connected with Ethernet cable to get Internet access. It supports 5 connection types. – Static IP: configure IP address, netmask and gateway for Ethernet WAN interface. – DHCP Client: configure Ethernet WAN interface as DHCP Client to obtain IP address automatically. – PPPoE: configure Ethernet WAN interface as PPPoE Client. – DHCPv6 Client: configure Ethernet WAN interface as DHCP Client to obtain IPv6 address automatically. – Dual-Stack Lite: use IPv4-in-IPv6 tunneling to send terminal device’s IPv4 packet through a tunnel on
the IPv6 access network to the ISP.

WAN Setting Item Enable Port

Figure 3-2-1-6
Description Enable WAN function. The port that is currently set as WAN port.

Default Enable WAN

27

Connection Type
MTU IPv4 Primary DNS IPv4 Secondary DNS IPv6 Primary DNS IPv6 Secondary DNS
Enable NAT

Select from “Static IP”, “DHCP Client”, “DHCPv6 Client” , “Dual-Stack Lite” and “PPPoE”. Set the maximum transmission unit. Set the primary IPv4 DNS server.
Set the secondary IPv4 DNS server.
Set the primary IPv6 DNS server.
Set the secondary IPv6 DNS server. Enable or disable NAT function. When enabled, a private IP can be translated to a public IP.
Table 3-2-1-6 WAN Parameters

Static IP 1500 8.8.8.8 — — — -Enable

1. Static IP Configuration If the external network assigns a fixed IP for the WAN interface, user can select “Static IP” mode.

Static IP Item IPv4 Address Netmask

Figure 3-2-1-7
Description Set the IPv4 address of the WAN port. Set the Netmask for WAN port.

Default 192.168.0.1 255.255.255.0
28

IPv4 Gateway IPv6 Address
Prefix-length
IPv6 Gateway

Set the gateway for WAN port’s IPv4 address.
Set the IPv6 address which can access Internet.
Set the IPv6 prefix length to identify how many bits of a Global Unicast IPv6 address are there in network part. For example, in 2001:0DB8:0000:000b::/64, the number 64 is used to identify that the first 64 bits are in network part. Set the gateway for WAN port’s IPv6 address. E.g.2001:DB8:ACAD:4::2.

Multiple IP Address

Set the multiple IP addresses for WAN port.

Table 3-2-1-7 Static Parameters

192.168.0.2 Generated from Mac address
64
-Null

2. DHCP Client/DHCPv6 Client If the external network has DHCP server enabled and has assigned IP addresses to the Ethernet WAN interface, user can select “DHCP client” mode to obtain IP address automatically.

Figure 3-2-1-8

Figure 3-2-1-9
29

DHCP Client Item Use Peer DNS DHCPv6 Client
Request IPv6-address
Request prefix length of IPv6

Description Obtain peer DNS automatically during PPP dialing. DNS is necessary when visiting domain name.
Choose the ways to obtain the IPv6 address from the DHCP Server. Select from try, force, none. Try: The DHCP Server will assign specific address in priority. Force: The DHCP Server assigns specific address only. None: The DHCP Server will randomly assign address.The specific address is relevant to the prefix length of IPv6 address you set. Set the prefix length of IPv6 address which router is expected to obtain from DHCP Server.
Table 3-2-1-8 DHCP Client Parameters

3. PPPoE PPPoE refers to a point to point protocol over Ethernet. User has to install a PPPoE client on the basis of original connection way. With PPPoE, remote access devices can get control of each user.

PPPoE Item Username

Figure 3-2-1-10
Description Enter the username provided by your Internet Service Provider (ISP).

30

Password Link Detection Interval (s) Max Retries
Use Peer DNS

Enter the password provided by your Internet Service Provider (ISP).
Set the heartbeat interval for link detection. Range: 1-600.
Set the maximum retry times after it fails to dial up. Range: 0-9. Obtain peer DNS automatically during PPP dialing. DNS is necessary when visiting domain name.
Table 3-2-1-9 PPPoE Parameters

4. Dual-Stack Lite Dual-Stack Lite (DS-Lite) uses IPv4-in-IPv6 tunneling to send a subscriber’s IPv4 packet through a tunnel on the IPv6 access network to the ISP. The IPv6 packet is decapsulated to recover the subscriber’s IPv4 packet and is then sent to the Internet after NAT address and port translation and other LSN related processing. The response packets traverse through the same path to the subscriber.

Dual-Stack Lite Item IPv6 Gateway DS-Lite AFTR Address Local IPv6 Address

Figure 3-2-1-11
Description Set the gateway for WAN port’s IPv6 address. Set the DS-Lite AFTR server address. Set the WAN port IPv6 address which use the same subnet as IPv6 gateway.
Table 3-2-1-10 Dual-Stack Lite Parameters

31

Related Configuration Example Ethernet WAN Connection
3.2.1.5 Bridge Bridge setting is used for managing local area network devices which are connected to LAN ports of the UR32, allowing each of them to access the Internet.

Bridge Item
Name
STP IP Address

Figure 3-2-1-12
Description Show the name of bridge. “Bridge0” is set by default and cannot be changed. Enable/disable STP. Set the IP address for bridge.

Netmask

Set the Netmask for bridge.

IPv6 Address MTU Multiple IP Address

Set the IPv6 address for bridge. Set the maximum transmission unit. Range: 68-1500. Set the multiple IP addresses for bridge.
Table 3-2-1-11 Bridge Settings

Default
Bridge0
Disable 192.168.1.1 255.255.255. 0 2004::1/64 1500 Null

3.2.1.6 WLAN (Only Applicable to Wi-Fi Version) This section explains how to set the related parameters for Wi-Fi network. UR32 supports 802.11 b/g/n, as AP or client mode.

32

WLAN Item Enable Work Mode
Encryption Mode
BSSID
SSID Client Mode Scan SSID Channel Signal BSSID

Figure 3-2-1-13
Description Enable/disable WLAN. Select router’s work mode. The options are “Client” or “AP”. Select encryption mode. The options are “No Encryption”, “WEP Open System” , “WEP Shared Key”, “WPA-PSK”, “WPA2-PSK” and “WPA- PSK/WPA2-PSK”. Fill in the MAC address of the access point. Either SSID or BSSID can be filled to joint the network. Fill in the SSID of the access point.
Click “Scan” button to search the nearby access point. Show SSID. Show wireless channel. Show wireless signal. Show the MAC address of the access point.

33

Cipher Security

Show the cipher of the access point. Show the encryption mode.

Frequency Show the frequency of radio.

Join Network AP Mode
Radio Type
Channel Cipher Key Bandwidth
SSID Broadcast
AP Isolation
Guest Mode Max Client Number IP Setting Protocol IP Address Netmask Gateway

Click the button to join the wireless network.
Select Radio type. The options are “802.11b (2.4 GHz)”, “802.11g (2.4 GHz)”, “802.11n (2.4 GHz)”. Select wireless channel. The options are “Auto”, “1”, “2”……”11″. Select cipher. The options are “Auto”, “AES”, “TKIP” and “AES/TKIP”. Fill the pre-shared key of WPA encryption. Select bandwidth. The options are “20MHz” and “40MHz”. When SSID broadcast is disabled, other wireless devices can’t not find the SSID, and users have to enter the SSID manually to access to the wireless network. When AP isolation is enabled, all users which access to the AP are isolated without communication with each other. The internal network is not allowed to visit if the guest mode is enabled. Set the maximum number of client to access when the router is configured as AP.
Set the IP address in wireless network. Set the IP address in wireless network. Set the netmask in wireless network. Set the gateway in wireless network.
Table 3-2-1-12 WLAN Parameters

MAC Filtering Item Type
Allow and block the rest

Figure 3-2-1-14
Description In this mode, you can choose the rule according to your security policy, which is Allow and Block the Rest’ andBlock and Allow the Rest’, the default value is Disabled. Only the listed MAC addresses are allowed to connect to the router’s wireless access point.

34

Block and allow the rest
Related Topic Wi-Fi Application Example

The listed MAC addresses are not allowed to connect to the router’s wireless access point.
Table 3-2-1-13 MAC Filtering Parameters

3.2.1.7 Switch VLAN is a kind of new data exchange technology that realizes virtual work groups by logically dividing the LAN device into network segments.

Figure 3-2-1-15

Switch

Item

Description

LAN Settings

Name

Set interface name of VLAN.

VLAN ID

Select VLAN ID of the interface.

IP Address Set IP address of LAN port.

Netmask

Set Netmask of LAN port.

MTU

Set the maximum transmission unit of LAN port. Range: 68-1500.

VLAN Settings

VLAN ID

Set the label ID of the VLAN. Range: 1-4094.

LAN 1/2

Make the VLAN bind with the corresponding ports and select status from “Tagged”, “Untagged” and “Close” for Ethernet frame on trunk link.

CPU

Control communication between VLAN and other networks.

Table 3-2-1-14 VLAN Trunk Parameters

3.2.1.8 Loopback

Loopback interface is used for replacing router’s ID as long as it is activated. When the interface is DOWN, the ID of the router has to be selected again which leads to long convergence time of OSPF. Therefore, Loopback interface is generally recommended as the ID of the router. Loopback interface is a logic and virtual interface on router. Under default conditions, there’s no loopback interface on router, but it can be created as required.

35

Loopback Item IP Address Netmask Multiple IP Addresses

Figure 3-2-1-16
Description Unalterable Unalterable Apart from the IP above, user can configure other IP addresses.
Table 3-2-1-15 Loopback Parameters

Default 127.0.0.1 255.0.0.0
Null

3.2.2 DHCP DHCP adopts Client/Server communication mode. The Client sends configuration request to the Server which feeds back corresponding configuration information and distributes IP address to the Client so as to achieve the dynamic configuration of IP address and other information.
3.2.2.1 DHCP Server/DHCPv6 Server UR32 can be set as a DHCP server or DHCPv6 server to distribute IP address when a host logs on and ensures each host is supplied with different IP addresses. DHCP Server has simplified some previous network management tasks requiring manual operations to the largest extent. UR32 only supports stateful DHCPv6 when working as DHCPv6 server.

36

Figure 3-2-2-1

DHCP Server Item Enable Interface Start Address
End Address
Netmask

Figure 3-2-2-2

Description Enable or disable DHCP server. Select interface. Define the beginning of the pool of IP addresses which will be leased to DHCP clients. Define the end of the pool of IP addresses which will be leased to DHCP clients. Define the subnet mask of IPv4 address obtained by DHCP clients from DHCP server.

Default Enable Bridge0 192.168.1.1 00 192.168.1.1 99 255.255.255 .0

37

Prefix Length
Lease Time (Min) Primary DNS Server Secondary DNS Server Windows Name Server Static IP
MAC Address
DUID
IP Address

Set the IPv6 prefix length of IPv6 address obtained by DHCP clients from DHCP server. Set the lease time on which the client can use the IP address obtained from DHCP server. Range: 1-10080. Set the primary DNS server.

64 1440 192.168.1.1

Set the secondary DNS server.

Null

Define the Windows Internet Naming Service obtained by DHCP clients from DHCP sever. Generally you can leave it Null blank.

Set a static and specific MAC address for the DHCP client

(it should be different from other MACs so as to avoid

Null

conflict).

Set a static and specific DUID for the DHCPv6 client (it Null
should be different from other DUID so as to avoid conflict).

Set a static and specific IP address for the DHCP client (it should be outside of the DHCP range).

Null

Table 3-2-2-1 DHCP Server Parameters

3.2.2.2 DHCP Relay

UR32 can be set as DHCP Relay to provide a relay tunnel to solve the problem that DHCP Client and DHCP Server are not in the same subnet.

DHCP Relay Item Enable
DHCP Server

Figure 3-2-2-3
Description Enable or disable DHCP relay. Set DHCP server, up to 10 servers can be configured; separate them by blank space or “,”.
Table 3-2-2-2 DHCP Relay Parameters

38

3.2.3 Firewall
This section describes how to set the firewall parameters, including security, ACL, DMZ, Port Mapping, MAC Binding and SPI. The firewall implements corresponding control of data flow at entry direction (from Internet to local area network) and exit direction (from local area network to Internet) according to the content features of packets, such as protocol style, source/destination IP address, etc. It ensures that the router operate in a safe environment and host in local area network.
3.2.3.1 Security

Figure 3-2-3-1

Item

Description

Prevent Attack

DoS/DDoS Protection Enable/disable Prevent DoS/DDoS Attack.

Access Service Control

Port

Set port number of the services. Range: 1-65535.

Local

Access the router locally.

Remote

Access the router remotely.

HTTP

Users can log in the device locally via HTTP to

Default
Disable
-Enable Disable 80

39

HTTPS
TELNET SSH FTP Website Blocking URL Blocking Keyword Blocking

access and control it through Web after the option

is checked.

Users can log in the device locally and remotely

via HTTPS to access and control it through Web 443

after option is checked.

Users can log in the device locally and remotely

23

via Telnet after the option is checked.

Users can log in the device locally and remotely 22
via SSH after the option is checked.

Users can log in the device locally and remotely 21
via FTP after the option is checked.

Enter the HTTP address which you want to block. You can block specific website by entering keyword. The maximum number of character allowed is 64.
Table 3-2-3-1 Security Parameters

3.2.3.2 ACL
Access control list, also called ACL, implements permission or prohibition of access for specified network traffic (such as the source IP address) by configuring a series of matching rules so as to filter the network interface traffic. When router receives packet, the field will be analyzed according to the ACL rule applied to the current interface. After the special packet is identified, the permission or prohibition of corresponding packet will be implemented according to preset strategy. The data package matching rules defined by ACL can also be used by other functions requiring flow distinction.

Item ACL Setting

Figure 3-2-3-2
Description

40

Default Filter Policy
Access Control List Type ID Action Protocol Source IP Source Wildcard Mask Destination IP Destination Wildcard Mask Description ICMP Type ICMP Code Source Port Type Source Port Start Source Port End Source Port
Destination Port Type
Destination Port Start Destination Port End Destination Port More Details Interface List Interface In ACL Out ACL

Select from “Accept” and “Deny”. The packets which are not included in the access control list will be processed by the default filter policy.
Select type from “Extended” and “Standard”. User-defined ACL number. Range: 1-199. Select from “Permit” and “Deny”. Select protocol from “ip”, “icmp”, “tcp”, “udp”, and “1-255”. Source network address (leaving it blank means all). Wildcard mask of the source network address. Destination network address (0.0.0.0 means all).
Wildcard mask of destination address.
Fill in a description for the groups with the same ID. Enter the type of ICMP packet. Range: 0-255. Enter the code of ICMP packet. Range: 0-255. Select source port type, such as specified port, port range, etc. Set source port number. Range: 1-65535. Set start source port number. Range: 1-65535. Set end source port number. Range: 1-65535. Select destination port type, such as specified port, port range, etc. Set destination port number. Range: 1-65535. Set start destination port number. Range: 1-65535. Set end destination port number. Range: 1-65535. Show information of the port.
Select network interface for access control. Select a rule for incoming traffic from ACL ID. Select a rule for outgoing traffic from ACL ID.
Table 3-2-3-2 ACL Parameters

Related Configuration Example Access Control Application Example

3.2.3.3 Port Mapping Port mapping is an application of network address translation (NAT) that redirects a communication request from the combination of an address and port number to another while the packets are traversing a network gateway such as a router or firewall.
Click to add a new port mapping rules.

41

Port Mapping Item Source IP
Source Port
Destination IP
Destination Port Protocol Description

Figure 3-2-3-3
Description Specify the host or network which can access local IP address. 0.0.0.0/0 means all. Enter the TCP or UDP port from which incoming packets are forwarded. Range: 1-65535. Enter the IP address that packets are forwarded to after being received on the incoming interface. Enter the TCP or UDP port that packets are forwarded to after being received on the incoming port(s). Range: 1-65535. Select from “TCP” and “UDP” as your application required. The description of this rule.
Table 3-2-3-3 Port Mapping Parameters

Related Configuration Example NAT Application Example

3.2.3.4 DMZ DMZ is a host within the internal network that has all ports exposed, except those forwarded ports in port mapping.

Figure 3-2-3-4
42

DMZ Item Enable DMZ Host
Source Address

Description Enable or disable DMZ. Enter the IP address of the DMZ host on the internal network. Set the source IP address which can access to DMZ host. “0.0.0.0/0” means any address.
Table 3-2-3-4 DMZ Parameters

3.2.3.5 MAC Binding MAC Binding is used for specifying hosts by matching MAC addresses and IP addresses that are in the list of allowed outer network access.

MAC Binding List Item MAC Address IP Address
Description

Figure 3-2-3-5
Description Set the binding MAC address. Set the binding IP address. Fill in a description for convenience of recording the meaning of the binding rule for each piece of MAC-IP.
Table 3-2-3-5 MAC Binding Parameters

3.2.3.6 Custom Rules

In this page, you can configure your own custom firewall iptables rules.

Figure 3-2-3-6
43

Custom Rules Item
Rule
Description

Description Specify an iptables rule like the example shows. Tips: You must reboot the device to take effect after modifying or deleting the iptables rules. Enter the description of the rule.

Table 3-2-3-6 Custom Rules Parameters

3.2.3.7 SPI

SPI Firewall Item Enable Filter Proxy
Filter Cookies
Filter ActiveX Filter Java Applets Filter Multicast Filter IDENT(port 113) Block WAN SNMP access
Filter WAN NAT Redirection
Block Anonymous WAN Requests

Figure 3-2-3-7
Description Enable/disable SPI firewall. Blocks HTTP requests containing the “Host”: string. Identifies HTTP requests that contain “Cookie”: String and mangle the cookie. Attempts to stop cookies from being used. Blocks HTTP requests of the URL that ends in “.ocx” or “.cab”. Blocks HTTP requests of the URL that ends in “.js” or “.class”. Prevent multicast packets from reaching the LAN. Prevent WAN access to Port 113. Block SNMP requests from the WAN. Prevent hosts on LAN from using WAN address of router to connect servers on the LAN (which have been configured using port redirection).
Stop the router from responding to “pings” from the WAN.
Table 3-2-3-7 SPI Parameters

44

3.2.4 QoS Quality of service (QoS) refers to traffic prioritization and resource reservation control mechanisms rather than the achieved service quality. QoS is engineered to provide different priority for different applications, users, data flows, or to guarantee a certain level of performance to a data flow.

QoS Item Download/Upload Enable Default Category Download/Upload Bandwidth Capacity Service Category Name Percent (%)
Max BW(kbps)
Min BW(kbps)
Service Category Rules Item

Figure 3-2-4-1
Description
Enable or disable QoS. Select the default category from Service Category list. The download/upload bandwidth capacity of the network that the router is connected with, in kbps. Range: 1-8000000.
You can use characters such digits, letters and “-“. Set percent for the service category. Range: 0-100. The maximum bandwidth that this category is allowed to consume, in kbps. The value should be less than the “Download/Upload Bandwidth Capacity” when the traffic is blocked. The minimum bandwidth that can be guaranteed for the category, in kbps.The value should be less than the “MAX BW” value.
Description

45

Name

Give the rule a descriptive name.

Source IP

Source address of flow control (leaving it blank means any).

Source Port Destination IP Destination Port

Source port of flow control. Range: 0-65535 (leaving it blank means any). Destination address of flow control (leaving it blank means any). Destination port of flow control. Range: 0-65535 (leaving it blank means any).

Protocol

Select protocol from “ANY”, “TCP”, “UDP”, “ICMP”, and “GRE”.

Service Category

Set service category for the rule.

Table 3-2-4-1 QoS (Download/Upload) Parameters

Related Configuration Example

QoS Application Example

3.2.5 VPN
Virtual Private Networks, also called VPNs, are used to securely connect two private networks together so that devices can connect from one network to the other network via secure channels. The UR32 supports DMVPN, IPsec, GRE, L2TP, PPTP, OpenVPN, as well as GRE over IPsec and L2TP over IPsec.
3.2.5.1 DMVPN
A dynamic multi-point virtual private network (DMVPN), combining mGRE and IPsec, is a secure network that exchanges data between sites without passing traffic through an organization’s headquarter VPN server or router.

46

DMVPN Item Enable Hub Address Local IP address GRE Hub IP Address GRE Local IP Address GRE Netmask GRE Key Negotiation Mode Authentication Algorithm Encryption Algorithm
DH Group
Key Local ID Type IKE Life Time (s)
SA Algorithm
PFS Group
Life Time (s) DPD Interval Time (s) DPD Timeout (s) Cisco Secret NHRP Holdtime (s)

Figure 3-2-5-1
Description Enable or disable DMVPN. The IP address or domain name of DMVPN Hub. DMVPN local tunnel IP address. GRE Hub tunnel IP address. GRE local tunnel IP address. GRE local tunnel netmask. GRE tunnel key. Select from “Main” and “Aggressive”. Select from “DES”, “3DES”, “AES128”, “AES192” and “AES256”. Select from “MD5” and “SHA1”. Select from “MODP768_1”, “MODP1024_2” and “MODP1536_5”. Enter the preshared key. Select from “Default”, “ID”, “FQDN”, and “User FQDN” Set the lifetime in IKE negotiation. Range: 60-86400. Select from “DES_MD5”, “DES_SHA1”, “3DES_MD5”, “3DES_SHA1”, “AES128_MD5”, “AES128_SHA1”, “AES192_MD5”, “AES192_SHA1”, “AES256_MD5” and “AES256_SHA1”. Select from “NULL”, “MODP768_1”, “MODP1024_2” and “MODP1536-5”. Set the lifetime of IPsec SA. Range: 60-86400. Set DPD interval time Set DPD timeout. Cisco Nhrp key. The holdtime of NHRP protocol.
Table 3-2-5-1 DMVPN Parameters

3.2.5.2 IPSec Server
IPsec is especially useful for implementing virtual private networks and for remote user access through dial-up connection to private networks. A big advantage of IPsec is that security arrangements can be handled without requiring changes to individual user computers. IPsec provides three choices of security service: Authentication Header (AH), Encapsulating Security Payload (ESP), and Internet Key Exchange (IKE). AH essentially allows authentication of the senders’ data. ESP supports both authentication of the sender and data encryption. IKE is used for cipher code exchange. All of them can protect one and more data flows between hosts, between host and gateway, and between gateways.

47

IPsec Server Item Enable IPsec Mode IPsec Protocol Local Subnet Local Subnet Netmask Local ID Type Remote Subnet Remote Subnet Mask Remote ID type

Figure 3-2-5-2
Description Enable IPsec tunnel. A maximum of 3 tunnels is allowed. Select from “Tunnel” and “Transport”. Select from “ESP” and “AH”. Enter the local subnet IP address that IPsec protects. Enter the local netmask that IPsec protects. Select from “Default”, “ID”, “FQDN”, and “User FQDN”. Enter the remote subnet IP address that IPsec protects. Enter the remote netmask that IPsec protects. Select from “Default”, “ID”, “FQDN”, and “User FQDN”.
Table 3-2-5-2 IPsec Parameters

48

Figure 3-2-5-3

IKE Parameter Item IKE Version Negotiation Mode Encryption Algorithm Authentication Algorithm DH Group Local Authentication

Figure 3-2-5-4
Description Select from “IKEv1” and “IKEv2”. Select from “Main” and “Aggressive”. Select from “DES”, “3DES”, “AES128”, “AES192” and “AES256”. Select from “MD5″ and ” SHA1″ Select from “MODP768_1”, “MODP1024_2” and “MODP1536_5”. Select from “PSK” and “CA”.

49

XAUTH Lifetime (s) XAUTH List Username Password PSK List Selector PSK SA Parameter
SA Algorithm
PFS Group
Lifetime (s) DPD Interval Time(s) DPD Timeout(s) IPsec Advanced Enable Compression
VPN Over IPsec Type
Expert Options

Enter XAUTH username and password after XAUTH is enabled. Set the lifetime in IKE negotiation. Range: 60-86400.
Enter the username used for the xauth authentication. Enter the password used for the xauth authentication.
Enter the corresponding identification number for PSK authentication. Enter the pre-shared key.
Select from “DES_MD5”, “DES_SHA1”, “3DES_MD5”, “3DES_SHA1”, “AES128_MD5”, “AES128_SHA1”, “AES192_MD5”, “AES192_SHA1”, “AES256_MD5” and “AES256_SHA1”. Select from “NULL”, “MODP768_1” , “MODP1024_2” and “MODP1536_5”. Set the lifetime of IPsec SA. Range: 60-86400. Set DPD interval time to detect if the remote side fails. Set DPD timeout. Range: 10-3600.
The head of IP packet will be compressed after it’s enabled. Select from “NONE”, “GRE” and “L2TP” to enable VPN over IPsec function. User can enter some other initialization strings in this field and separate the strings with “;”. For example, if more local or remote subnet need to be added, users can add contents here.
Table 3-2-5-3 IPsec Server Parameters

50

3.2.5.3 IPSec

IPsec Item Enable
IPsec Gateway Address
IPsec Mode IPsec Protocol Local Subnet Local Subnet Netmask Local ID Type Remote Subnet Remote Subnet Mask Remote ID type

Figure 3-2-5-5
Description Enable IPsec tunnel. A maximum of 3 tunnels is allowed. Enter the IP address or domain name of remote IPsec server. Select from “Tunnel” and “Transport”. Select from “ESP” and “AH”. Enter the local subnet IP address that IPsec protects. Enter the local netmask that IPsec protects. Select from “Default”, “ID”, “FQDN”, and “User FQDN”. Enter the remote subnet IP address that IPsec protects. Enter the remote netmask that IPsec protects. Select from “Default”, “ID”, “FQDN”, and “User FQDN”.
Table 3-2-5-4 IPsec Parameters

51

IKE Parameter Item IKE Version Negotiation Mode Encryption Algorithm Authentication Algorithm DH Group Local Authentication Local Secrets XAUTH Lifetime (s) SA Parameter
SA Algorithm

Figure 3-2-5-6
Description Select from “IKEv1” and “IKEv2”. Select from “Main” and “Aggressive”. Select from “DES”, “3DES”, “AES128”, “AES192” and “AES256”. Select from “MD5″ and ” SHA1″ Select from “MODP768_1”, “MODP1024_2” and “MODP1536_5”. Select from “PSK” and “CA”. Enter the pre-shared key. Enter XAUTH username and password after XAUTH is enabled. Set the lifetime in IKE negotiation. Range: 60-86400.
Select from “DES_MD5”, “DES_SHA1”, “3DES_MD5”, “3DES_SHA1”, “AES128_MD5”, “AES128_SHA1”, “AES192_MD5”, “AES192_SHA1”, “AES256_MD5” and “AES256_SHA1”.

52

PFS Group Lifetime (s) DPD Interval Time(s) DPD Timeout(s) IPsec Advanced Enable Compression VPN Over IPsec Type
Expert Option

Select from “NULL”, “MODP768_1” , “MODP1024_2” and “MODP1536_5”. Set the lifetime of IPsec SA. Range: 60-86400. Set DPD interval time to detect if the remote side fails. Set DPD timeout. Range: 10-3600.
The head of IP packet will be compressed after it’s enabled. Select from “NONE”, “GRE” and “L2TP” to enable VPN over IPsec function. User can enter some other initialization strings in this field and separate the strings with “;”. For example, if more local or remote subnet need to be added, users can add contents here.
Table 3-2-5-5 IPsec Parameters

3.2.5.4 GRE
Generic Routing Encapsulation (GRE) is a protocol that encapsulates packets in order to route other protocols over IP networks. It’s a tunneling technology that provides a channel through which encapsulated data message could be transmitted and encapsulation and decapsulation could be realized at both ends. In the following circumstances the GRE tunnel transmission can be applied: – GRE tunnel could transmit multicast data packets as if it were a true network interface. Single use
of IPSec cannot achieve the encryption of multicast. – A certain protocol adopted cannot be routed. – A network of different IP addresses shall be required to connect other two similar networks.

53

GRE Item Enable Remote IP Address Local IP Address Local Virtual IP Address Netmask Peer Virtual IP Address Global Traffic Forwarding Remote Subnet Remote Netmask MTU Key Enable NAT

Figure 3-2-5-7
Description Check to enable GRE function. Enter the real remote IP address of GRE tunnel. Set the local IP address.
Set the local tunnel IP address of GRE tunnel.
Set the local netmask. Enter remote tunnel IP address of GRE tunnel. All the data traffic will be sent out via GRE tunnel when this function is enabled. Enter the remote subnet IP address of GRE tunnel. Enter the remote netmask of GRE tunnel. Enter the maximum transmission unit. Range: 64-1500. Set GRE tunnel key. Enable NAT traversal function.
Table 3-2-5-6 GRE Parameters

3.2.5.5 L2TP
Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an Internet service provider (ISP) to enable the operation of a virtual private network (VPN) over the Internet.

Figure 3-2-5-8
54

L2TP Item Enable Remote IP Address Username Password
Authentication
Global Traffic Forwarding Remote Subnet Remote Subnet Mask Key

Description Check to enable L2TP function. Enter the public IP address or domain name of L2TP server. Enter the username that L2TP server provides. Enter the password that L2TP server provides. Select from “Auto”, “PAP”, “CHAP”, “MS-CHAPv1” and “MS-CHAPv2”. All of the data traffic will be sent out via L2TP tunnel after this function is enabled. Enter the remote IP address that L2TP protects. Enter the remote netmask that L2TP protects. Enter the password of L2TP tunnel.
Table 3-2-5-7 L2TP Parameters

Advanced Settings Item
Local IP Address
Peer IP Address Enable NAT Enable MPPE

Figure 3-2-5-9
Description Set tunnel IP address of L2TP client. Client will obtain tunnel IP address automatically from the server when it’s null. Enter tunnel IP address of L2TP server. Enable NAT traversal function. Enable MPPE encryption.

55

Address/Control Compression Protocol Field Compression Asyncmap Value MRU MTU Link Detection Interval (s)
Max Retries
Expert Options

For PPP initialization. User can keep the default option.
For PPP initialization. User can keep the default option.
One of the PPP protocol initialization strings. User can keep the default value. Range: 0-ffffffff. Set the maximum receive unit. Range: 64-1500. Set the maximum transmission unit. Range: 64-1500 Set the link detection interval time to ensure tunnel connection. Range: 0-600. Set the maximum times of retry to detect the L2TP connection failure. Range: 0-10. User can enter some other PPP initialization strings in this field and separate the strings with blank space.
Table 3-2-5-8 L2TP Parameters

3.2.5.6 PPTP

Point-to-Point Tunneling Protocol (PPTP) is a protocol that allows corporations to extend their own corporate network through private “tunnels” over the public Internet. Effectively, a corporation uses a wide-area network as a single large local area network.

Figure 3-2-5-10
56

PPTP Item Enable
Remote IP Address
Username Password
Authentication
Global Traffic Forwarding Remote Subnet Remote Subnet Mask

Description Enable PPTP client. A maximum of 3 tunnels is allowed. Enter the public IP address or domain name of PPTP server. Enter the username that PPTP server provides. Enter the password that PPTP server provides. Select from “Auto”, “PAP”, “CHAP”, “MS-CHAPv1”, and “MS-CHAPv2”. All of the data traffic will be sent out via PPTP tunnel once enable this function. Set the peer subnet of PPTP. Set the netmask of peer PPTP server.
Table 3-2-5-9 PPTP Parameters

Figure 3-2-5-11

PPTP Advanced Settings

Item

Description

Local IP Address

Set IP address of PPTP client.

Peer IP Address

Enter tunnel IP address of PPTP server.

Enable NAT

Enable the NAT faction of PPTP.

Enable MPPE

Enable MPPE encryption.

Address/Control Compression

For PPP initialization. User can keep the default option.

Protocol Field

For PPP initialization. User can keep the default option.

57

Compression Asyncmap Value MRU MTU Link Detection Interval (s) Max Retries
Expert Options

One of the PPP protocol initialization strings. User can keep the default value. Range: 0-ffffffff. Enter the maximum receive unit. Range: 0-1500. Enter the maximum transmission unit. Range: 0-1500. Set the link detection interval time to ensure tunnel connection. Range: 0-600. Set the maximum times of retrying to detect the PPTP connection failure. Range: 0-10. User can enter some other PPP initialization strings in this field and separate the strings with blank space.
Table 3-2-5-10 PPTP Parameters

Related Configuration Example PPTP Application Example

3.2.5.7 OpenVPN Client
OpenVPN is an open source virtual private network (VPN) product that offers a simplified security framework, modular network design, and cross-platform portability. Advantages of OpenVPN include: – Security provisions that function against both active and passive attacks. – Compatibility with all major operating systems. – High speed (1.4 megabytes per second typically). – Ability to configure multiple servers to handle numerous connections simultaneously. – All encryption and authentication features of the OpenSSL library. – Advanced bandwidth management. – A variety of tunneling options. – Compatibility with smart cards that support the Windows Crypt application program interface
(API).

58

OpenVPN Client Item Enable Protocol Remote IP Address
Port
Interface
Authentication
Local Tunnel IP Remote Tunnel IP
Global Traffic Forwarding
Enable TLS Authentication Username Password

Figure 3-2-5-12
Description Enable OpenVPN client. A maximum of 3 tunnels is allowed. Select from “UDP” and “TCP”. Enter remote OpenVPN server’s IP address or domain name. Enter the listening port number of remote OpenVPN server. Range: 1-65535. Select from “tun” and “tap”. Select from “None”, “Pre-shared”, “Username/Password”, “X.509 cert”, and “X.509 cert+user”. Set local tunnel address. Enter remote tunnel address. All the data traffic will be sent out via OpenVPN tunnel when this function is enabled. Check to enable TLS authentication. Enter username provided by OpenVPN server. Enter password provided by OpenVPN server.

59

Enable NAT Compression Link Detection Interval (s)
Link Detection Timeout (s)
Cipher MTU Max Frame Size Verbose Level Expert Options Local Route Subnet Subnet Mask

Enable NAT traversal function. Select LZO to compress data. Set link detection interval time to ensure tunnel connection. Range: 10-1800. Set link detection timeout. OpenVPN will be reestablished after timeout. Range: 60-3600. Select from “NONE”, “BF-CBC”, “DE-CBC”, “DES-EDE3-CBC”, “AES-128-CBC”, “AES-192-CBC” and “AES-256-CBC”. Enter the maximum transmission unit. Range: 128-1500. Set the maximum frame size. Range: 128-1500. Select from “ERROR”, “WARING”, “NOTICE” and “DEBUG”. User can enter some other PPP initialization strings in this field and separate the strings with blank space.
Set the local route’s IP address. Set the local route’s netmask.
Table 3-2-5-11 OpenVPN Client Parameters

3.2.5.8 OpenVPN Server

The UR32 supports OpenVPN server to create secure point-to-point or site-to- site connections in routed or bridged configurations and remote access facilities.

Figure 3-2-5-13
60

OpenVPN Server Item Enable Protocol Port
Listening IP
Interface
Authentication
Local Virtual IP Remote Virtual IP Client Subnet Client Netmask Renegotiation Interval(s) Max Clients Enable CRL Enable Client to Client Enable Dup Client Enable NAT Compression
Link Detection Interval
Cipher
MTU Max Frame Size Verbose Level
Expert Options
Local Route Subnet Netmask

Figure 3-2-5-14
Description Enable/disable OpenVPN server. Select from TCP and UDP. Fill in listening port number. Range: 1-65535. Enter WAN IP address or LAN IP address. Leaving it blank refers to all active WAN IP and LAN IP address. Select from ” tun” and “tap”. Select from “None”, “Pre-shared”, “Username/Password”, “X.509 cert” and “X. 509 cert +user”. The local tunnel address of OpenVPN’s tunnel. The remote tunnel address of OpenVPN’s tunnel. Local subnet IP address of OpenVPN client. Local netmask of OpenVPN client.
Set interval for renegotiation. Range: 0-86400.
Maximum OpenVPN client number. Range: 1-128. Enable CRL Allow access between different OpenVPN clients. Allow multiple users to use the same certification. Check to enable the NAT traversal function. Select “LZO” to compress data. Set link detection interval time to ensure tunnel connection. Range: 10-1800. Select from “NONE”, “BF-CBC”, “DES-CBC”, “DES-EDE3-CBC”, “AES-128-CBC”, “AES-192-CBC” and “AES-256-CBC”. Enter the maximum transmission unit. Range: 64-1500. Set the maximum frame size. Range: 64-1500. Select from “ERROR”, “WARING”, “NOTICE” and “DEBUG”. User can enter some other PPP initialization strings in this field and separate the strings with blank space.
The real local IP address of OpenVPN client. The real local netmask of OpenVPN client.

61

Account Username & Password

Set username and password for OpenVPN client.
Table 3-2-5-12 OpenVPN Server Parameters

3.2.5.9 Certifications User can import/export certificate and key files for OpenVPN and IPsec on this page.

OpenVPN Client Item CA Public Key Private Key TA Preshared Key PKCS12

Figure 3-2-5-15
Description Import/Export CA certificate file. Import/Export public key file. Import/Export private key file. Import/Export TA key file. Import/Export static key file. Import/Export PKCS12 certificate file.
Table 3-2-5-13 OpenVPN Client Certification Parameters

Figure 3-2-5-16
62

OpenVPN Server Item CA Public Key Private Key DH TA CRL Preshared Key

Description Import/Export CA certificate file. Import/Export public key file. Import/Export private key file. Import/Export DH key file. Import/Export TA key file. Import/Export CRL. Import/Export static key file.
Table 3-2-5-14 OpenVPN Server Parameters

IPsec Item CA Client Key Server Key Private Key CRL

Figure 3-2-5-17
Description Import/Export CA certificate. Import/Export client key. Import/Export server key. Import/Export private key. Import/Export certificate recovery list.
Table 3-2-5-15 IPsec Parameters

Figure 3-2-5-18
63

IPsec Server Item CA Local Certificate Private Key CRL

Description Import/Export CA certificate. Import/Export Local Certificate file. Import/Export private key. Import/Export certificate recovery list.
Table 3-2-5-16 IPsec Server Parameters

3.2.6 IP Passthrough IP Passthrough mode shares or “passes” the Internet providers assigned IP address to a single LAN client device connected to the router.

IP Passthrough Item Enable
Passthrough Mode
MAC

Figure 3-2-6-1
Description Enable or disable IP Passthrough. Select passthrough mode from “DHCPS-Fixed” and “DHCPS-Dynamic”. Set MAC address.
Table 3-2-6-1 IP Passthrough Parameters

3.2.7 Routing
3.2.7.1 Static Routing A static routing is a manually configured routing entry. Information about the routing is manually entered rather than obtained from dynamic routing traffic. After setting static routing, the package for the specified destination will be forwarded to the path designated by user.

64

Static Routing Item Destination Netmask/Prefix Length Interface
Gateway
Distance

Figure 3-2-7-1
Description Enter the destination IP address. Enter the subnet mask or prefix length of destination address. The interface through which the data can reach the destination address. IP address of the next router that will be passed by before the input data reaches the destination address. Priority, smaller value refers to higher priority. Range: 1-255.
Table 3-2-7-1 Static Routing Parameters

3.2.7.2 RIP RIP is mainly designed for small networks. RIP uses Hop Count to measure the distance to the destination address, which is called Metric. In RIP, the hop count from the router to its directly connected network is 0 and the hop count of network to be reached through a router is 1 and so on. In order to limit the convergence time, the specified metric of RIP is an integer in the range of 0 – 15 and the hop count larger than or equal to 16 is defined as infinity, which means that the destination network or host is unreachable. Because of this limitation, the RIP is not suitable for large-scale networks. To improve performance and prevent routing loops, RIP supports split horizon function. RIP also introduces routing obtained by other routing protocols. Each router that runs RIP manages a routing database, which contains routing entries to reach all reachable destinations.

65

Figure 3-2-7-2

RIP

Item

Description

Enable

Enable or disable RIP.

Update Timer Timeout Timer
Garbage Collection Timer

It defines the interval to send routing updates. Range: 5-2147483647, in seconds. It defines the routing aging time. If no update package on a routing is received within the aging time, the routing’s Routing Cost in the routing table will be set to 16. Range: 5-2147483647, in seconds. It defines the period from the routing cost of a routing becomes 16 to it is deleted from the routing table. In the time of Garbage-Collection, RIP uses 16 as the routing cost for sending routing updates. If Garbage Collection times out and the routing still has not been updated, the routing will be completely removed from the routing table. Range: 5-2147483647, in seconds.

Version

RIP version. The options are v1 and v2.

Advanced Settings

Default Information Originate Default information will be released when this function is enabled.

Default Metric

The default cost for the router to reach destination. Range: 0-16

Redistribute Connected

Check to enable.

66

Metric Redistribute Static Metric Redistribute OSPF Metric

Set metric after “Redistribute Connected” is enabled. Range: 0-16. Check to enable. Set metric after “Redistribute Static” is enabled. Range: 0-16. Check to enable. Set metric after “Redistribute OSPF” is enabled. Range: 0-16.
Table 3-2-7-2 RIP Parameters

Figure 3-2-7-3

Item

Description

Distance/Metric Management

Distance

Set the administrative distance that a RIP route learns. Range:

67

IP Address Netmask ACL Name
Metric
Policy in/out Interface ACL Name Filter Policy Policy Type Policy Name Policy in/out Interface Passive Interface Passive Interface Interface Interface Send Version Receive Version Split-Horizon Authentication Mode Authentication String Authentication Key-chain Neighbor IP Address Network IP Address Netmask

1-255. Set the IP address of RIP route. Set the netmask of RIP route. Set ACL name of RIP route. The metric of received route or sent route from the interface. Range: 0-16. Select from “in” and “out”. Select interface of the route. Access control list name of the route strategy.
Select from “access-list” and “prefix-list”. User-defined prefix-list name. Select from “in” and “out”. Select interface from “cellular0”, “LAN1/WAN” and “Bridge0”.
Select interface from “cellular0” and “LAN1/WAN”, “Bridge0”.
Select interface from “cellular0”, “LAN1/WAN” and “Bridge0”. Select from “default”, “v1” and “v2”. Select from “default”, “v1” and “v2”. Select from “enable” and “disable”. Select from “text” and “md5”. The authentication key for package interaction in RIPV2. The authentication key-chain for package interaction in RIPV2.
Set RIP neighbor’s IP address manually.
The IP address of interface for RIP publishing. The netmask of interface for RIP publishing.
Table 3-2-7-3

3.2.7.3 OSPF
OSPF, short for Open Shortest Path First, is a link status based on interior gateway protocol developed by IETF. If a router wants to run the OSPF protocol, there should be a Router ID that can be manually configured. If no Router ID configured, the system will automatically select an IP address of interface

68

as the Router ID. The selection order is as follows: – If a Loopback interface address is configured, then the last configured IP address of Loopback
interface will be used as the Router ID; – If no Loopback interface address is configured, the system will choose the interface with the
biggest IP address as the Router ID.
Five types of packets of OSPF: – Hello packet – DD packet (Database Description Packet) – LSR packet (Link-State Request Packet) – LSU packet (Link-State Update Packet) – LSAck packet (Link-Sate Acknowledgment Packet)
Neighbor and Neighboring After OSPF router starts up, it will send out Hello Packets through the OSPF interface. Upon receipt of Hello packet, OSPF router will check the parameters defined in the packet. If it’s consistent, a neighbor relationship will be formed. Not all matched sides in neighbor relationship can form the adjacency relationship. It is determined by the network type. Only when both sides successfully exchange DD packets and LSDB synchronization is achieved, the adjacency in the true sense can be formed. LSA describes the network topology around a router, LSDB describes entire network topology.

OSPF Item Enable

Figure 3-2-7-4
Description Enable or disable OSPF.

69

Router ID ABR Type RFC1583 Compatibility
OSPF Opaque-LSA
SPF Delay Time SPF Initial-holdtime SPF Max-holdtime Reference Bandwidth

Router ID (IP address) of the originating LSA.
Select from cisco, ibm, standard and shortcut.
Enable/Disable. Enable/Disable LSA: a basic communication means of the OSPF routing protocol for the Internet Protocol (IP). Set the delay time for OSPF SPF calculations. Range: 0-6000000, in milliseconds. Set the initialization time of OSPF SPF. Range: 0-6000000, in milliseconds. Set the maximum time of OSPF SPF. Range: 0-6000000, in milliseconds. Range: 1-4294967, in Mbit.
Table 3-2-7-4 OSPF Parameters

Item Interface Interface Hello Interval (s)
Dead Interval (s)
Retransmit Interval (s) Transmit Delay (s)

Description

Figure 3-2-7-5

Select interface from “cellular0”,”WAN”and “Bridge0”. Send interval of Hello packet. If the Hello time between two adjacent routers is different, the neighbour relationship cannot be established. Range: 1-65535. Dead Time. If no Hello packet is received from the neighbours within the dead time, then the neighbour is considered failed. If dead times of two adjacent routers are different, the neighbour relationship cannot be established. When the router notifies an LSA to its neighbour, it is required to make acknowledgement. If no acknowledgement packet is received within the retransmission interval, this LSA will be retransmitted to the neighbour. Range: 3-65535. It will take time to transmit OSPF packets on the link. So a certain delay

70

time should be increased before transmission the aging time of LSA. This

configuration needs to be further considered on the low-speed link.

Range: 1-65535.

Interface Advanced Options

Interface

Select interface.

Network

Select OSPF network type.

Cost

Set the cost of running OSPF on an interface. Range: 1-65535.

Priority

Set the OSPF priority of interface. Range: 0-255.

Set the authentication mode that will be used by the OSPF area.

Authentication

Simple: a simple authentication password should be configured and confirmed again.

MD5: MD5 key & password should be configured and confirmed again.

Key ID

It only takes effect when MD5 is selected. Range 1-255.

Key

The authentication key for OSPF packet interaction.

Table 3-2-7-5 OSPF Parameters

Item Passive Interface Passive Interface Network IP Address Netmask Area ID Area Area ID
Area

Description

Figure 3-2-7-6

Select interface from “cellular0”, “LAN1/WAN” and “Bridge0”.

The IP address of local network. The netmask of local network. The area ID of original LSA’s router.

Set the ID of the OSPF area (IP address). Select from “Stub” and “NSSA”. The backbone area (area ID 0.0.0.0) cannot be set as “Stub” or “NSSA”.

71

No Summary Authentication

Forbid route summarization. Select authentication from “simple” and “md5”.
Table 3-2–7-6 OSPF Parameters

Figure 3-2-7-7

Area Advanced Options

Item

Description

Area Range Area ID IP Address Netmask No Advertise Cost Area Filter Area ID Filter Type

The area ID of the interface when it runs OSPF (IP address). Set the IP address. Set the netmask. Forbid the route information to be advertised among different areas. Range: 0-16777215
Select an Area ID for Area Filter. Select from “import”, “export”, “filter- in”, and “filter-out”.

ACL Name

Enter an ACL name which is set on “Routing > Routing Filtering” webpage.

Area Virtual Link Area ID ABR Address Authentication Key ID Key
Hello Interval
Dead Interval

Set the ID number of OSPF area. ABR is the router connected to multiple outer areas. Select from “simple” and “md5”. It only takes effect when MD5 is selected. Range 1-15. The authentication key for OSPF packet interaction. Set the interval time for sending Hello packets through the interface. Range: 1-65535. The dead interval time for sending Hello packets through the interface. Range: 1-65535.

Retransmit

The retransmission interval time for re-sending LSA. Range: 1-65535.

72

Interval Transmit Delay

The delay time for LSA transmission. Range: 1-65535.
Table 3-2-7-7 OSPF Parameters

Figure 3-2-7-8

Item

Description

Redistribution Redistribution Type Metric Metric Type Route Map

Select from “connected”, “static” and “rip”. The metric of redistribution router. Range: 0-16777214. Select Metric type from “1” and “2”. Mainly used to manage route for redistribution.

Redistribution Advanced Options

Always Redistribute Default Route

Send redistribution default route after starting up.

Redistribute Default Route Metric Redistribute Default Route Metric Type

Send redistribution default route metric. Range: 0-16777214. Select from “0”, “1” and “2”.

Distance Management

Area Type Distance

Select from “intra-area”, “inter-area” and “external”. Set the OSPF routing distance for area learning. Range: 1-255.

Table 3-2-7-8 OSPF Parameters

73

3.2.7.4 Routing Filtering

Figure 3-2-7-9

Routing Filtering

Item

Description

Access Control List

Name

User-defined name, need to start with a letter. Only letters, digits and underline (_) are allowed.

Action

Select from “permit” and “deny”.

Match Any

No need to set IP address and subnet mask.

IP Address User-defined.

Netmask

User-defined.

IP Prefix-List

Name

User-defined name, need to start with a letter. Only letters, digits and underline (_) are allowed.

Sequence

A prefix name list can be matched with multiple rules. One rule is matched with

Number

one sequence number. Range: 1-4294967295.

Action

Select from “permit” and “deny”.

Match Any

No need to set IP address, subnet mask, FE Length, and LE Length.

IP Address User-defined.

Netmask

User-defined.

FE Length

Specify the minimum number of mask bits that must be matched. Range: 0-32.

LE Length

Specify the maximum number of mask bits that must be matched. Range: 0-32.

Table 3-2-7-9 Routing Filtering Parameters

3.2.8 VRRP
The Virtual Router Redundancy Protocol (VRRP) is a computer networking protocol that provides automatic assignment of available Internet Protocol (IP) routers for participating hosts. This increases the availability and reliability of routing paths via automatic default gateway selections in

74

an IP sub-network. Increasing the number of exit gateway is a common method for improving system reliability. VRRP adds a group of routers that undertake gateway function into a backup group so as to form a virtual router. The election mechanism of VRRP will decide which router undertakes the forwarding task, and the host in LAN is only required to configure the default gateway for the virtual router. In VRRP, routers need to be aware of failures in the virtual master router. To achieve this, the virtual master router sends out multicast “alive” announcements to the virtual backup routers in the same VRRP group. The VRRP router who has the highest number will become the virtual master router. The VRRP router number ranges from 1 to 255 and usually we use 255 for the highest priority and 100 for backup. If the current virtual master router receives an announcement from a group member (Router ID) with a higher priority, then the latter will pre-empt and become the virtual master router. VRRP has the following characteristics: – The virtual router with an IP address is known as the Virtual IP address. For the host in LAN, it is
only required to know the IP address of virtual router, and set it as the address of the next hop of the default route. – The network Host communicates with the external network through this virtual router. – A router will be selected from the set of routers based on its priority to undertake the gateway function. Other routers will be used as backup routers to perform the duties of gateway for the gateway router in the case of any malfunction, so as to guarantee uninterrupted communication between the host and external network. When interface connected with the uplink is at the state of Down or Removed, the router actively lowers its priority so that priority of other routers in the backup group will be higher. Thus the router with the highest priority becomes the gateway for the transmission task.
Figure 3-2-8-1
75

VRRP Item Enable Interface Virtual Router ID Virtual IP Priority Advertisement Interval (s)
Preemption Mode
IPV4 Primary Server
IPV4 Secondary Server Interval Retry Interval
Timeout
Max Ping Retries

Description Enable or disable VRRP. Select the interface of Virtual Router. User-defined Virtual Router ID. Range: 1-255. Set the IP address of Virtual Router. The VRRP priority range is 1-254 (a bigger number indicates a higher priority). The router with higher priority will be more likely to become the gateway router. Heartbeat package transmission time interval between routers in the virtual ip group. Range: 1-255. If the router works in the preemption mode, once it finds that its own priority is higher than that of the current gateway router, it will send VRRP notification package, resulting in re- election of gateway router and eventually replacing the original gateway router. Accordingly, the original gateway router will become a Backup router. The router will send ICMP packet to the IP address or hostn ame to determine whether the Internet connection is still av ailable or not. The router will try to ping the secondary server name if prim ary server is not available. Time interval (in seconds) between two Pings. Set the ping retry interval. When ping failed, the router will pi ng again every retry interval. The maximum amount of time the router will wait for a resp onse to a ping request. If it does not receive a response for the amount of time defined in this field, the ping request will be considered as failure. The retry times of the router sending ping request until dete rmining that the connection has failed.

Default Disable None None None 100
1
Disable
8.8.8.8 114.114. 114.114 300 5
3
3

Table 3-2-8-1 VRRP Parameters

Related Configuration Example VRRP Application Example

3.2.9 DDNS
Dynamic DNS (DDNS) is a method that automatically updates a name server in the Domain Name System, which allows user to alias a dynamic IP address to a static domain name. DDNS serves as a client tool and needs to coordinate with DDNS server. Before starting configuration, user shall register on a website of proper domain name provider and apply for a domain name.

76

DDNS Item Enable Name Interface Service Type Username User ID Password Server Server Path Hostname Append IP

Figure 3-2-9-1
Description Enable/disable DDNS. Give the DDNS a descriptive name. Set interface bundled with the DDNS. Select the DDNS service provider. Enter the username for DDNS register. Enter User ID of the custom DDNS server. Enter the password for DDNS register. Enter the name of DDNS server. By default the hostname is appended to the path. Enter the hostname for DDNS. Append your current IP to the DDNS server update path.

77

Use HTTPS

Enable HTTPS for some DDNS providers.
Table 3-2-9-1 DDNS Parameters

3.3 System
This section describes how to configure general settings, such as administration account, access service, system time, common user management, SNMP, AAA, event alarms, etc. 3.3.1 General Settings
3.3.1.1 General General settings include system info and HTTPS certificates.

General Item System Hostname Web Login Timeout (s) Encrypting Cleartext Passwords HTTPS Certificates
Certificate
Key

Figure 3-3-1-1

Description

Default

User-defined router name, needs to start with a letter.
You need to log in again if it times out. Range: 100-3600.
This function will encrypt all of cleartext passwords into ciphertext passwords.

ROUTER 1800 Enable

Click “Browse” button, choose certificate file on the PC, and then click “Import” button to upload the file into
-router. Click “Export” button will export the file to the PC. Click “Delete” button will delete the file. Click “Browse” button, choose key file on the PC, and then —

78

click “Import” button to upload the file into router. Click “Export” button will export file to the PC. Click “Delete” button will delete the file.
Table 3-3-1-1 General Setting Parameters
3.3.1.2 System Time This section explains how to set the system time including time zone and time synchronization type. Note: to ensure that the router runs with the correct time, it’s recommended that you set the system time when configuring the router.
Figure 3-3-1-2
Figure 3-3-1-3
79

Figure 3-3-1-4

System Time Item Current Time Time Zone Sync Type Sync with Browser Browser Time Set up Manually GPS Time Synchronization Primary NTP Server Secondary NTP Server NTP Server

Figure 3-3-1-5
Description Show the current system time. Click the drop down list to select the time zone you are in. Click the drop down list to select the time synchronization type. Synchronize time with browser. Show the current time of browser. Manually configure the system time.
Synchronize time with GPS.
Enter primary NTP Server’s IP address or domain name. Enter secondary NTP Server’s IP address or domain name.

80

Enable NTP Server

NTP client on the network can achieve time synchronization with router after “Enable NTP Server” option is checked.
Table 3-3-1-2 System Time Parameters

3.3.1.3 Email
SMTP, short for Simple Mail Transfer Protocol, is a TCP/IP protocol used in sending and receiving e-mail. This section describes how to configure email settings and add email groups for alarms and events.

SMTP Client Settings Item Enable Email Address Password SMTP Server Address Port
Encryption

Figure 3-3-1-6
Description Enable or disable SMTP client function. Enter the sender’s email account. Enter the sender’s email password. Enter SMTP server’s domain name. Enter SMTP server port. Range: 1-65535. Select from: None, TLS/SSL, STARTTLS. None: No encryption. The default port is 25. STARTTLS: STARTTLS is a way to take an existing insecure connection and upgrade it to a secure connection by using SSL/TLS. The default port is 587. TLS/SSL: SSL and TLS both provide a way to encrypt a communication channel between two computers (e.g. your computer and our server). TLS is the successor to SSL and the terms SSL and TLS are used interchangeably unless you’re referring to a specific version of the protocol.The default port is 465.
Table 3-3-1-3 SMTP Setting

81

Figure 3-3-1-7

Item Email List Email Address Description Email Group List Group ID Description List Selected

Description
Enter the Email address. The description of the Email address.
Set number for email group. Range: 1-100. The description of the Email group. Show the Email address list. Show the selected Email address.
Table 3-3-1-4 Email Settings

Related Topics DI Setting Events Setting Events Application Example

3.3.1.4 Storage You can view Micro SD card information on this page.

82

Storage Item Status Storage (Capacity/Available) Format

Figure 3-3-1-8
Description Show the status of Micro SD card, such as “Available” or “Not Inserted”. The total capacity of the Micro SD Card. Format the Micro SD card.
Table 3-3-1-5 Storage Information

3.3.2 Phone&SMS 3.3.2.1 Phone Phone settings involve in call/SMS trigger, SMS control and SMS alarm for events.

Phone Item Phone Number List Number

Figure 3-3-2-1
Description Enter the telephone number. Digits, “+” and “-” are allowed.

83

Description Phone Group List Group ID Description List Selected
Related Topic Connect on Demand

The description of the telephone number.
Set number for phone group. Range: 1-100. The description of the phone group. Show the phone list. Show the selected phone number.
Table 3-3-2-1 Phone Settings

3.3.2.2 SMS SMS settings involve in remote SMS control, sending SMS and SMS receiving and sending status.

SMS Settings Item SMS Mode SMS Remote Control
Authentication Type
Password
Phone Group

Figure 3-3-2-2
Description Select SMS mode from “TEXT” and “PDU”.
Enable/disable SMS Remote Control.
You can choose “phone number” or “password + phone number”. Phone number: Use phone number for authentication. Password + phone number: Use both “”Password”” and “”Phone number”” for authentication. Set password for authentication. Select the Phone group which used for remote control. User can click the Phone Group and set phone number.
Table 3-3-2-2 SMS Remote Control Parameters

84

SMS Item Send SMS Phone Number Content Inbox/Outbox Sender Recipient From To Search Clear All

Figure 3-3-2-3
Description
Enter the number to receive the SMS. SMS content.
SMS sender from outside. SMS recipient which UR32 send to. Select the start date. Select the end date. Search for SMS record. Clear all SMS records in web GUI.
Table 3-3-2-3 SMS Settings

3.3.3 User Management
3.3.3.1 Account Here you can change the login username and password of the administrator. Note: it is strongly recommended that you modify them for the sake of security.

85

Figure 3-3-3-1

Account Item
Username
Old Password New Password Confirm New Password

Description Enter a new username. You can use characters such as a-z, 0-9, “_”, “-“, “$”. The first character can’t be a digit. Enter the old password. Enter a new password. Enter the new password again.
Table 3-3-3-1 Account Settings

3.3.3.2 User Management
This section describes how to create common user accounts. The common user permission includes Read-Only and Read-Write.

Figure 3-3-3-2

User Management

Item Username

Description Enter a new username. You can use characters such as a-z, 0-9, “_”, “-“, “$”. The first character can’t be a digit.

Password

Set password.

Permission

Select user permission from “Read-Only” and “Read-Write”. – Read-Only: users can only view the configuration of router in this level. – Read-Write: users can view and set the configuration of router in this level.

Table 3-3-3-2 User Management

86

3.3.4 SNMP SNMP is widely used in network management for network monitoring. SNMP exposes management data with variables form in managed system. The system is organized in a management information base (MIB) which describes the system status and configuration. These variables can be remotely queried by managing applications. Configuring SNMP in networking, NMS, and a management program of SNMP should be set up at the Manager. Configuration steps are listed as below for achieving query from NMS: 1. Enable SNMP setting. 2. Download MIB file and load it into NMS. 3. Configure MIB View. 4. Configure VCAM.
Related Configuration Example SNMP Application Example
3.3.4.1 SNMP UR32 supports SNMPv1, SNMPv2c and SNMPv3 version. SNMPv1 and SNMPv2c employ community name authentication. SNMPv3 employs authentication encryption by username and password.

SNMP Settings Item Enable
Port
SNMP Version Location Information

Figure 3-3-4-1
Description Enable or disable SNMP function. Set SNMP listened port. Range: 1-65535. The default port is 161. Select SNMP version; support SNMP v1/v2c/v3. Fill in the location information.

87

Contact Information

Fill in the contact information.
Table 3-3-4-1 SNMP Parameters

3.3.4.2 MIB View This section explains how to configure MIB view for the objects.

MIB View Item View Name View Filter View OID Included Excluded

Figure 3-3-4-2
Description Set MIB view’s name. Select from “Included” and “Excluded”. Enter the OID number. You can query all nodes within the specified MIB node. You can query all nodes except for the specified MIB node.
Table 3-3-4-2 MIB View Parameters

3.3.4.3 VACM This section describes how to configure VCAM parameters.

Figure 3-3-4-3

VACM Item SNMP v1 & v2 User List

Description

Community Permission

Set the community name. Select from “Read-Only” and “Read-Write”.

88

MIB View Network Read-Write

Select an MIB view to set permissions from the MIB view list. The IP address and bits of the external network accessing the MIB view. The permission of the specified MIB node is read and write.

Read-Only

The permission of the specified MIB node is read only.

SNMP v3 User Group

Group Name Security Level Read-Only View

Set the name of SNMPv3 group. Select from “NoAuth/NoPriv”, “Auth/NoPriv”, and ” Auth/Priv”. Select an MIB view to set permission as “Read-only” from the MIB view list.

Read-Write View Select an MIB view to set permission as “Read-write” from the MIB view list.

Inform View

Select an MIB view to set permission as “Inform” from the MIB view list.

SNMP v3 User List

Username

Set the name of SNMPv3 user.

Group Name

Select a user group to be configured from the user group.

Authentication Authentication Password

Select from “MD5”, “SHA”, and “None”. The password should be filled in if authentication is “MD5” and “SHA”.

Encryption

Select from “AES”, “DES”, and “None”.

Encryption Password

The password should be filled in if encryption is “AES” and “DES”.

Table 3-3-4-3 VACM Parameters

3.3.4.4 Trap

This section explains how to enable network monitoring by SNMP trap.

SNMP Trap Item Enable SNMP Version Server Address Port
Name

Figure 3-3-3-4
Description Enable or disable SNMP Trap function. Select SNMP version; support SNMP v1/v2c/v3. Fill in NMS’s IP address or domain name. Fill in UDP port. Port range is 1-65535. The default port is 162. Fill in the group name when using SNMP v1/v2c; fill in the username when using SNMP v3.

89

Auth/Priv Mode Select from “NoAuth & No Priv”, “Auth & NoPriv”, and “Auth & Priv”.
Table 3-3-4-4 Trap Parameters
3.3.4.5 MIB This section describes how to download MIB files. The last MIB file “LTE-ROUTER-MIB.txt” is for the UR32 router.

MIB Item MIB File Download

Figure 3-3-4-5
Description Select the MIB file you need. Click “Download” button to download the MIB file to PC.
Table 3-3-4-5 MIB Download

3.3.5 AAA AAA access control is used for visitors control and the available corresponding services once access is allowed. It adopts the same method to configure three independent safety functions. It provides modularization methods for following services: – Authentication: verify if the user is qualified to access to the network. – Authorization: authorize related services available for the user. – Charging: record the utilization of network resources.
3.3.5.1 Radius Using UDP for its transport, Radius is generally applied in various network environments with higher requirements of security and permission of remote user access.

90

Radius Item Enable Server IP Address Server Port
Key

Figure 3-3-5-1
Description Enable or disable Radius. Fill in the Radius server IP address/domain name. Fill in the Radius server port. Range: 1-65535. Fill in the key consistent with that of Radius server in order to get connected with Radius server.
Table 3-3-5-1 Radius Parameters

3.3.5.2 TACACS+
Using TCP for its transport, TACACS+ is mainly used for authentication, authorization and charging of the access users and terminal users by adopting PPP and VPDN.

Figure 3-3-5-2
91

TACACS+ Item Enable Server IP Address Server Port
Key

Description Enable or disable TACACS+. Fill in the TACACS+ server IP address/domain name. Fill in the TACACS+ server port. Range: 1-65535. Fill in the key consistent with that of TACACS+ server in order to get connected with TACACS+ server.
Table 3-3-5-2 TACACS+ Parameters

3.3.5.3 LDAP
A common usage of LDAP is to provide a central place to store usernames and passwords. This allows many different applications and services to connect the LDAP server to validate users.
LDAP is based on a simpler subset of the standards contained within the X.500 standard. Because of this relationship, LDAP is sometimes called X.500-lite as well.

LDAP Item Enable
Server IP Address
Server Port Base DN Security

Figure 3-3-5-3
Description Enable or Disable LDAP. Fill in the LDAP server’s IP address/domain name. The maximum count is 10. Fill in the LDAP server’s port. Range: 1-65535 The top of LDAP directory tree. Select secure method from “None”, “StartTLS” and “SSL”.

92

Username Password

Enter the username to access the server. Enter the password to access the server.
Table 3-3-5-3 LDAP Parameters

3.3.5.4 Authentication
AAA supports the following authentication ways: – None: uses no authentication, generally not recommended. – Local: uses the local username database for authentication.
Advantages: rapidness, cost reduction. Disadvantages: storage capacity limited by hardware. – Remote: has user’s information stored on authentication server. Radius, TACACS+ and LDAP supported for remote authentication. When radius, TACACS+, and local are configured at the same time, the priority level is: 1

2 >3.

Authentication Item Console Web Telnet SSH

Figure 3-3-5-4
Description Select authentication for Console access. Select authentication for Web access. Select authentication for Telnet access. Select authentication for SSH access.
Table 3-3-5-4 Authentication Parameters

3.3.6 Device Management

3.3.6.1 DeviceHub
You can connect the device to the Milesight DeviceHub on this page so as to manage the router centrally and remotely. For more details please refer to DeviceHub User Guide.

93

DeviceHub Item Status
Disconnected Server Address
Activation Method
Authentication Code Account name Password

Figure 3-3-6-1
Description Show the connection status between the router and the DeviceHub. Click this button to disconnect the router from the DeviceHub. IP address or domain of the device management server. Select activation method to connect the router to the DeviceHub server, options are “By Authentication Code” and “By Account name”. Fill in the authentication code generated from the DeviceHub. Fill in the registered DeviceHub account (email) and password.
Table 3-3-6-1

3.3.6.2 Milesight VPN
You can connect the device to the Milesight VPN on this page so as to manage the router and connected devices centrally and remotely. For more details please refer to MilesightVPN User Guide.

94

Figure 3-3-6-2

Milesight VPN

Item

Description

Milesight VPN Settings

Server

Enter the IP address or domain name of Milesight VPN.

Port

Enter the HTTPS port number.

Authorization code Enter the authorization code which generated by Milesight VPN.

Device Name

Enter the name of the device.

Milesight VPN Status

Status

Show the connection information about whether the router is connected to the Milesight VPN.

Local IP

Show the virtual IP of the router.

Remote IP

Show the virtual IP of the Milesight VPN.

Duration

Show the information on how long the router has been connected to the Milesight VPN.

Table 3-3-6-2

95

3.3.7 Events Event feature is capable of sending alerts by Email when certain system events occur. 3.3.7.1 Events You can view alarm messages on this page.

Events Item Mark as Read Delete Mark All as Read Delete All Alarms
Status
Type Time Message

Figure 3-3-7-1
Description Mark the selected event alarm as read. Delete the selected event alarm. Mark all event alarms as read. Delete all event alarms. Show the reading status of the event alarms, such as “Read” and “Unread”. Show the event type that should be alarmed. Show the alarm time. Show the alarm content.
Table 3-3-7-1 Events Parameters

3.3.7.2 Events Settings
In this section, you can decide what events to record and whether you want to receive email and SMS notifications when any change occurs.

96

Figure 3-3-7-2

Event Settings Item Enable Phone Group List Email Group List
Record
Email

Figure 3-3-7-3
Description Check to enable “Events Settings”. Select phone group to receive SMS alarm. Select email group to receive alarm. The relevant content of event alarm will be recorded on “Event” page if this option is checked. The relevant content of event alarm will be sent out via email if this option is checked.

97

Email Setting
SMS
SMS Setting
VPN Up VPN Down WAN Up WAN Down Link Switch Weak Signal Cellular Up Cellular Down Cellular Data Stats Clear Cellular Data Traffic is running out Cellular Data Traffic Over Flow WLAN Up(AP) WLAN Down(AP) WLAN Up(Client) WLAN Down(Client)
Related Topics Email Setting Events Application Example

Click and you will be redirected to the page “Email” to configure email group list. The relevant content of event alarm will be sent out via SMS if this option is checked. Click and you will be redirected to the page of “Phone” to configure phone group list. VPN is connected. VPN is disconnected. Ethernet cable is connected to WAN port. Ethernet cable is disconnected to WAN port. Switch to use other interface for Internet access. The signal level of cellular is low. Cellular network is connected. Cellular network is disconnected.
Zero out the data usage of the main SIM card.
The main SIM card is reaching the data usage limit.
The main SIM card has exceeded the data usage plan.
The WLAN(AP) is enabled. The WLAN(AP) has stopped working. The WLAN(Client) is enabled. The WLAN(Client) has stopped working.
Table 4-3-7-2 Events Parameters

3.4 Industrial Interface
UR32 router is capable of connecting with terminals through industrial interfaces so as to realize wireless communication between terminals and remote data center. There are two types of the router’s industrial interface: serial port (RS232 and RS485) and I/O (digital input and digital output). RS232 adopts full-duplex communication. It’s generally used for communication within 20m. RS485 adopts half-duplex communication to achieve transmission of serial communication data with distance up to 120m. Digital input of I/O interface is a logical variable or switch variable with only two values of 0 and 1. “0” refers to low level and “1” refers to high level .

98

3.4.1 I/O
3.4.1.1 DI This section explains how to configure monitoring condition on digital input, and take certain actions once the condition is reached.

Figure 3-4-1-1

DI Item Enable Mode Duration (ms) Condition
Low->High
High->Low
Counter
Action
SMS Phone Group SMS Content Email Email Group Email Content DO Cellular UP

Description Enable or disable DI. Options are “High Level”, “Low Level”, and “Counter”. Set the duration of high/low level in digital input. Range: 1-10000. Select from “Low->High”, and “High-> Low”. The counter value will increase by 1 if digital input’s status changes from low level to high level. The counter value will increase by 1 if digital input’s status changes from high level to low level. The system will take actions accordingly when the counter value reach the preset one, and then reset the counter value to 0. Range: 1-100. Select the corresponding actions that the system will take when digital input mode meets the preset condition or duration. Check to enable SMS alarm. Set phone group to receive SMS alarm. Set the content of SMS alarm. Check to enable Email alarm. Set phone group to receive email alarm. Set the content of email alarm. Control output status of DO. Trigger the router to switch from offline mode to cellular network mode.

Table 3-4-1-1 DI Parameters

Related Topics

DO Setting

99

Email Setting Connect on Demand
3.4.1.2 DO This section describes how to configure digital output mode.

DO Item Enable Mode
Duration (10ms)
Initial Status Duration of High Level (
10ms) Duration of Low Level (*10ms) The Number of Pulse
Phone Group
Related Topics DI Setting

Figure 3-4-1-2
Description Enable or disable DO. Select from “High Level”, “Low Level”, “Pulse” and “Custom” . Set duration of high/low level on digital output. Range: 1-10000. Select high level or low level as the initial status of the pulse.
Set the duration of pulse’s high level. Range: 1-10000.
Set the duration of pulse’s low level. Range: 1-10000.
Set the quantity of pulse. Range: 1-100. Select phone group which will be used for I/O configuration. User can click the Phone Group and set phone number.
Table 3-4-1-2 DO Settings

3.4.2 Serial Port
This section explains how to configure serial port parameters to achieve communication with serial terminals, and configure work mode to achieve communication with the remote data center, so as to achieve two-way communication between serial terminals and remote data center.

100

Serial Settings Item Enable Serial Type Baud Rate
Data Bits
Stop Bits
Parity Software Flow Control Serial Mode
DTU Mode
GPS
Modbus Master
Modbus Slave

Figure 3-4-2-1

Description Enable or disable serial port function. RS232 or RS485. Range is 300-230400. Same with the baud rate of the connected terminal device. Options are “8” and “7”. Same with the data bits of the connected terminal device. Options are “1” and “2”. Same with the stop bits of the connected terminal device. Options are “None”, “Odd” and “Even”. Same with the parity of the connected terminal device.

Default Disable -9600
8
1
None

Enable or disable software flow control.

Disable

Select work mode of the serial port. Options are “DTU Mode” , “Modbus Master”, “Modbus Slave” and “GPS”. In DTU mode, the serial port can establish communication with the remote server/client. In GPS mode, go to “Industrial > GPS > GPS Serial Forwarding” to select corresponding Serial Type, then GPS data will be forwarded to this serial port. In Modbus Master mode, go to “Industrial > Modbus Master” to configure basic parameters and channels. In Modbus Slave mode, go to “Industrial > Modbus Slave” to configure basic parameters.
Table 3-4-2-1 Serial Parameters

Disable —

101

DTU Mode Item
DTU Protocol
TCP/UDP Server Listening port Keepalive Interval Keepalive Retry Times Packet Size Serial Frame Interval

Figure 3-4-2-2
Description Select from “None”, “Transparent”, “Modbus”, “UDP server” and “TCP server”. – Transparent: the routed is used as TCP client/UDP and transmits
data transparently. – TCP server: the router is used as TCP server and transmits data
transparently. – UDP server: the router is used as UDP server and transmits data
transparently. – Modbus: the router will be used as TCP server with modbus
gateway function, which can achieve conversion between Modbus RTU and Modbus TCP.
Set the router listening port. Range: 1-65535. After TCP connection is established, client will send heartbeat packet regularly by TCP to keep alive. The interval range is 1-3600 in seconds. When TCP heartbeat times out, router will resend heartbeat. After it reaches the preset retry times, TCP connection will be reestablished. The retry times range is 1-16. Set the size of the serial data frame. Packet will be sent out when preset frame size is reached. The size range is 1-1024. The unit is byte. The interval that the router sends out real serial data stored in the buffer area to public network. The range is 10-65535, in

Default

502 75 9 1024 100

102

milliseconds. Note: data will be sent out to public network when real serial data size reaches the preset packet size, even though it’s within the serial frame interval.

Table 3-4-2-2 DTU Parameters

Item

Description

Default

Transparent

Protocol

Select “TCP” or “UDP” protocol.

TCP

After TCP client is connected with TCP server, the client will send

Keepalive Interval

heartbeat packet by TCP regularly to keep alive. The interval range 75

(s)

is 1-3600, in seconds.

Keepalive Retry Times

When TCP heartbeat times out, the router will resend heartbeat. After it reaches the preset retry times, router will reconnect to TCP 9 server. The range is 1-16.

Packet Size
Serial Frame Interval
Reconnect Interval

Set the size of the serial data frame. Packet will be sent out when preset frame size is reached. The range is 1-1024. The unit is byte. The interval that the router sends out real serial data stored in the buffer area to public network. The range is 10-65535, in milliseconds. Note: data will be sent out to public network when real serial data size reaches the preset packet size, even though it’s within the serial frame interval. After connection failure, router will reconnect to the server at the preset interval, in seconds. The range is 10-60.

1024 100 10

Specific Protocol By Specific Protocol, the router will be able to connect to the

TCP2COM software.

Heartbeat Interval

By Specific Protocol, the router will send heartbeat packet to the

server regularly to keep alive. The interval range is 1-3600, in

30

seconds.

ID

Define unique ID of each router. No longer than 63 characters without space character.

Register String Define register string for connection with the server.

Null

Server Address Fill in the TCP or UDP server address (IP/domain name).

Null

Server Port

Fill in the TCP or UDP server port. Range: 1-65535.

Null

Status

Show the connection status between the router and the server.

Modbus

Local Port Maximum TCP Clients

Set the router listening port. Range: 1-65535.

502

Specify the maximum number of TCP clients allowed to connect th 32
e router which act as a TCP server.

Connection Timeout

If the TCP server does not receive any data from the slave device w ithin the connection timeout period, the TCP connection will be bro 60 ken.

Reading Interval Set the interval for reading remote channels. When a read cycle end 100

103

Response Timeout
Maximum Retries

s, the new read cycle begins until this interval expires. If it is set to 0, the device will restart the new read cycle after all channels have been read. Set the maximum response time that the router waits for the respo nse to the command. If the device does not get a response after th e maximum response time, it’s determined that the command has ti med out. Set the maximum retry times after it fails to read.

3000 3

Table 3-4-2-3 DTU Parameters

Related Configuration Example

DTU Application Example

3.4.3 Modbus Slave This section describes how to achieve I/O status via Modbus TCP, Modbus RTU and Modbus RTU over TCP.
3.4.3.1 Modbus TCP You can define the address of the DI and DO ports so as to poll DI’s status and control DO’s status via Modbus TCP protocol.

Modbus TCP Item Enable Port DI Address DO Address

Figure 3-4-3-1
Description Enable/disable Modbus TCP. Set the router listening port. Range: 1-65535. Define the address of DI, range: 0-255. Define the address of DO, range: 0, 2-255.
Table 3-4-3-1 Modbus TCP Parameters

Default Disable 502 0 0

104

3.4.3.2 Modbus RTU
You can define the address of the DI and DO ports so as to poll DI’s status and control DO’s status via Modbus RTU protocol.

Modbus RTU Item Enable Serial Port
Slave ID
DI Address DO Address

Figure 3-4-3-2
Description Enable/disable Modbus RTU. Select the corresponding serial port. Set slave ID is used for distinguishing different devices on the same link. Define the address of DI, range: 0-255. Define the address of DO, range: 0, 2-255.
Table 3-4-3-2 Modbus RTU Parameters

Default Disable serial
1
0 0

3.4.3.3 Modbus RTU Over TCP
You can define the address of the DI and DO ports so as to poll DI’s status and control DO’s status via Modbus RTU over TCP.

105

Figure 3-4-3-3

Modbus RTU Over TCP

Item

Description

Default

Enable Slave ID

Enable/disable Modbus RTU over TCP function. Set slave ID is used for distinguishing different devices on the same link.

Disable 1

Device ID
Reconnection Interval

Set device ID. The server will get the device ID to the server for identifying identity so that the server can -manage multiple devices. The reconnection interval when the device and the server fails to establish connection or disconnected. 10

DI Address

Define the address of DI, range: 0-255.

0

DO Address

Define the address of DO, range: 0, 2-255.

0

Server List

IP

Enter the IP address of the server.

Port Status

Enter the port of the server.Range: 0-65535. Show the connection status between the router and the server.

Table 3-4-3-3 Modbus RTU Over TCP Parameters

3.4.4 Modbus Master UR32 router can be set as Modbus Master to poll the remote Modbus Slave and send alarm according to the response.
3.4.4.1 Modbus Master You can configure Modbus Master’s parameters on this page.

106

Figure 3-4-4-1

Modbus Master

Item

Description

Enable
Read Interval/s

Enable/disable Modbus master. Set the interval for reading remote channels. When the read cycle ends, the commands which haven’t been sent out will be discard, and the new read cycle begins. If it is set to 0, the device will restart the new read cycle after all channels have been read. Range: 0-600.

Max. Retries Set the maximum retry times after it fails to read, range: 0-5.

Max. Response Time/ms

Set the maximum response time that the router waits for the response to the command. If the device does not get a response after the maximum response time, it’s determined that the command has timed out. Range: 10-1000.

Execution Interval/ms Channel Name

The execution interval between each command. Range: 10-1000.
Select a readable channel form the channel list.

Table 3-4-4-1

Default —
0
3 500
50 —

3.4.4.2 Channel
You can add the channels and configure alarm setting on this page, so as to connect the router to the remote Modbus Slave to poll the address on this page and receive alarms from the router in different conditions.

Figure 3-4-4-2

Channel Setting

Item

Description

Name

Set the name to identify the remote channel. It cannot be blank.

Slave ID

Set Modbus slave ID.

Address

The starting address for reading.

Number

The address number for reading.

Type

Read command, options are “Coil”, “Discrete”, “Holding Register (INT16)”, “Input Register (INT16)”, “Holding Register (INT32)” and “Holding Register (Float)”.

107

Link IP address Port Sign
Decimal Place

Select TCP for transportation. Fill in the IP address of the remote Modbus device. Fill in the port of the remote Modbus device. To identify whether this channel is signed. Default: Unsigned. Used to indicate a dot in the read into the position of the channel. For example: read the channel value is 1234, and a Decimal Place is equal to 2, the

Read User Manual Online (PDF format)

Loading......

Download This Manual (PDF format)

Download this manual  >>

Related Manuals