USER MANUAL 1
Legal notice Copyright © 2014 TELTONIKA Ltd. All rights reserved. Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the prior written permission of TELTONIKA Ltd is prohibited. The manufacturer reserves the right to modify the product and manual for the purpose of technical improvement without prior notice. Other product and company names mentioned herein may be trademarks or trade names of their respective owners.
Table of Contents Legal notice.............................................................................................................................................................. 2 Attention.................................................................................................................................................................. 2 SAFETY INFORMATION ................................................................................................................................
5.7.1 All ..................................................................................................................................................... 30 5.7.2 Authentication ................................................................................................................................. 30 5.7.3 Reboot.............................................................................................................................................. 31 5.7.4 Safemode ...............
7.4.2 7.5 TRAP Settings ................................................................................................................................... 64 VPN .......................................................................................................................................................... 65 7.5.1 OpenVPN .......................................................................................................................................... 65 7.5.2 IPSec .................
8.8 9 Reboot...................................................................................................................................................... 92 Functionality not listed in menu .................................................................................................................. 93 9.1 10 SMS by HTTP POST/GET ........................................................................................................................... 93 9.1.
SAFETY INFORMATION In this document you will be introduced on how to use a RUT950 router safely. We suggest you to adhere to the following recommendations in order to avoid personal injuries and or property damage. You have to be familiar with the safety requirements before using the device! To avoid burning and voltage caused traumas, of the personnel working with the device, please follow these safety requirements.
Device connection 8
1 Introduction Thank you for purchasing a RUT950 LTE router! RUT950 is part of the RUT9xx series of compact mobile routers with high speed wireless and Ethernet connections. This router is ideal for people who‘d like to share their internet on the go, as it is not restricted by a cumbersome cable connection. Unrestricted, but not forgotten: the router still supports internet distribution via a broadband cable, simply plug it in to the wan port, set the router to a correct mode and you are ready to browse.
1.1.6 Hardware High performance 560 MHz CPU with 128 Mbytes of DDR2 memory 5.5/2.5mm DC power socket Reset/restore to default button 2 x SMA for LTE , 2 x RP-SMA for Wi-Fi antenna connectors 4 x Ethernet LEDs, 1 x Power LED 1 x bi-color connection status LED, 5 x connection strength LEDs 1.1.
1.1.
2 Setting up your router 2.1 Installation After you unpack the box, follow the steps, documented below, in order to properly connect the device. For better Wi-Fi performance, put the device in clearly visible spot, as obstacles such as walls and door hinder the signal. 1. First assemble your router by attaching the necessary antennas and inserting the SIM card. 2. To power up your router, please use the power adapter included in the box.
2.2 Logging in After you’re complete with the setting up as described in the section above, you are ready to start logging into your router and start configuring it. This example shows how to connect on Windows 7. On windows Vista: click Start -> Control Panel -> Network and Sharing Centre -> Manage network Connections -> (Go to step 4). On Windows XP: Click Start -> Settings -> Network Connections -> (see step 4).
5. Select Internet Protocol Version 4 (TCP/IPv4) and then click 6. By default the router is going to have DHCP enabled, which Properties means that if you select “Obtain an IP address automatically” and “Obtain DNS server address automatically”, the router should lease you an IP and you should be ready to login. 7. If you choose to configure manually here’s what you do: First select an IP address. Due to the stock settings that your router has arrived in you can only enter an IP in the form of 192.168.
Right click on the Wireless network icon and select Connect / Disconnect. A list should pop up with all available wireless networks. Select “Teltonika” and click connect. Then we launch our favorite browser and enter the routers IP into the address field: Press enter. If there are no problems you should be greeted with a login screen such as this: Enter the default password, which is “admin01” into the “Password” field and then either click Login with your mouse or press the Enter key.
3 Operation Modes The RUT9xx series router supports various operation modes. It can be connected to the internet (WAN) via mobile, standard Ethernet cable or via a wireless network. If you connect to the internet via an Ethernet cable of Wi-Fi, you may also backup your connection with mobile for added stability. On every case except when you connect to the internet via Wi-Fi, you can distribute your internet via an Ethernet cable (3 ports) and/or a wireless network.
Though the device can be powered over Ethernet port it is not compliant with IEEE 802.3af-2003 standard. Powering RUT9xx from IEEE 802.3af-2003 power supply will damage the device as it is not rated for input voltages of PoE standard. 4.1 Powering the device from higher voltage If you decide not to use our standard 9 VDC wall adapters and want to power the device from higher voltage (15 – 30 VDC) please make sure that you choose power supply of high quality.
5 Status The status section contains various information, like current IP addresses of various network interfaces; the state of the routers memory; firmware version; DHCP leases; associated wireless stations; graphs indicating load, traffic, etc.; and much more. 5.1 System Information The System Information tab contains data that pertains to the routers operating system. System explanation: Field Name Sample value 1. Router Name Teltonika 2. Host name Teltonika 3. 4.
Memory explanation: Field Name Sample Value 1. Free 94532 kB / 126452 kB (74%) 2. Cached 3. Buffered 10828 kB / 126452 kB (8%) 4308 kB / 126452 kB (3%) Explanation The amount of memory that is completely free. Should this rapidly decrease or get close to 0, it would indicate that the router is running out of memory, which could cause crashes and unexpected reboots. The size of the area of memory that is dedicated to storing frequently accessed data.
5.2.1.2 WAN Displays information about WAN connection. WAN information: Field Name 1. Interface 2. 3. 4. 5. 6. 7. Sample Value Wired Explanation Specifies through what medium the router is connecting to the internet. This can either be Wired, Mobile or Wi-Fi. Type DHCP Specifies the type of connection. This can either be static or DHCP. IP address 192.168.99.199 The IP address that the routers uses to connect the internet. Netmask* 255.255.255.0 Indicates the networks netmask Gateway* 192.168.99.
5.2.1.3 LAN LAN information: Field Name 1. IP address 2. Netmask 3. Connected Sample Value 192.168.1.1 255.255.255.0 1h 6m 14s Explanation Address that the router uses on the LAN network. Indicates the networks netmask. How long LAN has been successfully maintained. DHCP Leases If you have enabled a DHCP server this field will show how many devices have received an IP address and what those IP addresses are. 1. 2. Field Name Hostname IP address 3. MAC address 4.
5.2.1.4 Wireless Wireless can work in two modes, Access Point (AP) or Station (STA). AP is when the wireless radio is used to create an Access Point that other devices can connect to. STA is when the radio is used to connect to an Access Point via WAN. 5.2.1.4.1 Station Client mode information Field Name Sample Value 1. SSID RUT9XX 2. Mode Station (STA) 3. Channel 2 (2.42 GHz) 4. BSSID 5. Encryption 00:1E:42:00:00:03 WPA2 PSK (CCMP) 6. Bit rate 39.0 MBit/s 7.
5.2.1.4.2 Access Point Wireless AP information Field Name Sample Value 1. SSID Teltonika_Router_Test 2. Mode Access Point (AP) 3. Channel 11 (2.46 GHz) 4. 5. BSSID Encryption 00:1E:42:00:00:02 No Encryption 6. Bit rate 1.0 MBit/s 7. Signal Quality 91% 8. Country 00(World) Explanation The SSID that is being broadcast. Other devices will see this and will be able to use to connect to your wireless network. Connection mode – Master indicates that you router is an access point.
5.2.1.5 Associated Stations Outputs a list of all devices and their MAC addresses that are maintain a connection with your router right now. This can either be the information of the Access Point that the router is connecting to in STA mode or a list of all devices that are connecting to the router in AP mode: 1. 2. Field Name MAC Address Network 3. Signal Sample Value 00:21:C5:15:05:34 Access point (AP) “Teltonika_Router_Test” -46dBm 4. 5. RX Rate TX Rate 1.0Mbit/s, MCS 0, 20MHz 1.
5.2.1.7 OpenVPN Server 1. 2. 3. 4. 5. Field Name Status Type IP Mask Time Sample Value Enabled Client N/A N/A 4h 23m 15s Explanation OpenVPN status A type of OpenVPN instance that has been created Remote virtual network's IP address Remote virtual network's subnet mask For how long the connection has been established 5.2.1.8 Client information 1. 2. 3. 4.
5.3 Device information The page displays factory information that was written into the device during manufacturing process 1. 2. 3. 4. 5. 6. 7. 8.
5.5 Routes The page displays ARP table active IP routes of the device 5.5.1 ARP Shows the routers active ARP table. An ARP table contains recently cached MAC addresses of every immediate device that was communicating with the router. 1. Field Name IP Address Sample Value 192.168.99.110 2. MAC Address 00:1E:42:12:DC:54 3. IP Address 192.168.99.
5.5.2 Active IP-Routes Shows the routers routing table. The routing table indicates where a TCP/IP packet, with a specific IP address, should be directed to. 1. 2. Field Name Network Target Sample Value lan 192.168.1.0/24 3. 4. IP Gateway Metric 0.0.0.
5.6.1 Traffic 1. Field Name Load Explanation This tri-graph illustrates average system load over the course of ~3 minutes; each new measurement is taken every 3 seconds. The graph consists out of three color coded graphs, each one corresponding to the average system load over 1 (red), 5 (orange) and 15 (yellow) most recent minutes. Although not graphed, the page also displays peak loads over 1, 5 and 15 minutes. 2.
5.7 Events Log Event log displays such actions as: login, reboot, firmware flashing and reset. 5.7.1 All 5.7.
5.7.3 Reboot 5.7.
6 Network 6.1 Mobile 6.1.1 General 6.1.1.1 Mobile configuration Here you can configure the mobile specific settings which are used when connecting to your local 3G/LTE network. 1. Field Name Mobile connection Sample value Use PPPD mode/Use NDIS mode/Use bridge mode 2. APN “APN” 3. PIN number 4. “1234” or any number that falls between 0000 and 9999 *99***1# Dialing number Authentication CHAP, PAP or none method 5. Explanation PPPD mode uses dialling number to establish data connection.
6. Username “username” Your username and password that you would use to connect to your carriers network. These field become available when you select an authentication method (i.e. authentication method is not “none”). These fields are always enabled on the alternate model. 7. Password “password” Shows the current system time. Might differ from your computer, because the router synchronizes it's time with an NTP server. Format [year-month-day, hours: minutes: seconds]. 8.
6.1.2 1. 2. 3. 4. 5. SIM Management Field name Primary SIM card Enable automatic switching On weak signal Possible values SIM 1 / SIM 2 Enable/Disable Signal strenght (dBm) On data limit -80 Period Start day/Start hour 7. Data limit (MB) 8. On roaming 9. On data connection fail 10. Use same rules for secondary SIM 11. Switch back to primary SIM card after timeout 12. Initial timeout Enable/Disable Enable/Disable Month/Week/Day 6.
(min) 13. Subsequent timeout (min) 14. Subsequent timeout (min) 6.1.3 20 20 should occur A subsequent timeout value in minutes after which a SIM card's switchback should occur. This value is increased every time an unsuccessful switch-back is made: new_timeout = old_timeout + subsequent_timeout A subsequent timeout value in minutes after which a SIM card's switchback should occur.
6.1.4.1 Data Connection Limit Configuration 1. 2. 3. 4. Field Name Enable data connection limit Data limit (MB) Period Start day/ Start hour Sample value Enable/Disable Explanation Disables mobile data when a limit for current period is reached 200 Disable mobile data after limit value in MB is reached Month/Week/Day Period for which mobile data limiting should apply A starting time for mobile data limiting period 6.1.4.2 SMS Warning Configuration 1. 2. 4. 3.
6.2 WAN 6.2.1 1. 2. 3. Operation Mode Type Wired Wi-Fi Mobile 6.2.2 Explanation An Ethernet cable connected to the WAN port of the router. The router will be able to connect to a local wireless access point and reach the internet through it. The router will connect to your local mobile network for Mobile access. Common configuration Common configuration allows you to configure your TCP/IP settings for the wan network.
6.2.2.1 General Setup 6.2.2.1.1 Static: This is the configuration setup for when you select the static protocol. 1. 2. 3. 4. Filed name IPv4 address IPv4 netmask IPv4 gateway IPv4 broadcast Sample 192.168.99.162 255.255.255.0 192.168.99.254 192.168.99.255 5. custom DNS servers 8.8.8.8 8.8.6.
When you select the DHCP protocol you can use it as is, because most networks will not require any additional advanced configuration. 6.2.2.1.3 PPPoE This protocol is mainly used by DSL providers: This is the configuration setup for when you select PPPoE protocol. 1. Filed name PAP/CHAP username Sample test 2. 3. 4. PAP/CHAP password Access Concentrator Service Name your_password isp isp Explanation Your username and password that you would use to connect to your carriers network.
1. 2 Field name Disable NAT Override MAC address Sample value On/Off 86:48:71:B7:E9:E4 3. Override MTU 1500 4. Use gateway metric 0 Explanation Toggle NAT on and off. Override MAC address of the WAN interface. If your ISP gives you a static IP address it might also bind it to your computers MAC address (i.e. that IP will only work with your computer). In this field you can enter your computers MAC address and fool the gateway in thinking that it is communicating with your computer.
6.2.2.2.3 PPPoE Field name Disable NAT Sample value Enable/Disable Enable/Disable 0 Enable/Disable 6. Use default gateway Use gateway metric Use DNS servers advertised by peer LCP echo failure threshold LCP echo interval 7. Inactivity timeout 0 1. 2 3. 4. 5.
As you can see, the configuration is very similar to the static protocol; only in the example a 99th subnet is defined. Now if some device has an IP in the 99 subnet (192.168.99.xxx) and the subnets gateway metric is “higher” and the device is trying to reach the internet it will reroute it’s traffic not to the gateway that is defined in common configurations but through the one that is specified in IP aliases. You may also optionally define a broadcast address and a custom DNS server. 6.
6.3.1.2 Advanced settings 1. 2 Field name Enable LAN interface Use custom DNS servers Sample value Enable/Disable 8.8.8.8 3. Override MTU 1500 4. Use gateway metric 0 6.3.
6.3.2.2 Advanced settings You can also define some advanced options that specify how the DHCP server will operate on your LAN network. 1. Field Name Sample Value Dynamic DHCP Checked/Unchecked 2. Force 3. IP netmask 4. DHCP-Options Checked/Unchecked Explanation Dynamically allocate client addresses, if set to 0 only clients present in the ethers files are served Forces DHCP serving even if another DHCP server is detected on the same network segment.
Here you can toggle the availability of the wireless radio and the physical channel frequency. Important note: As seen in the picture you should always Save before toggling the radio on and off. ESSID – Your wireless networks identification string. This is the name of your Wi-Fi network. When other Wi-Fi capable computers or devices scan the area for Wi-Fi networks they will see your network with this name. Hide ESSID – Will render your SSID hidden from other devices that try to scan the area. 6.4.1.
6.4.1.2 Interface 6.4.1.2.1 Security Encryption – There are many modes of encryption, a distinctive class is pointed out below. First select an encryption method: TKIP, CCMP, TKIP&CCMP and auto. Note: Some authentication methods won’t support TKIP (and TKIP&CCMP) encryption. After you’ve selected your encryption method, you should enter your passphrase, which must be at least 8 characters long. 6.4.1.2.2 MAC-Filter Filter – you can define a rule for what to do with the MAC list you’ve defined.
6.4.1.3 Client RUT9xx can work as a Wi-Fi client (check 6.5 Chapter of this manual). Client mode is nearly identical to AP, except for the fact that most for the options are dictated by the wireless access point that the router is connecting to. Changing them can result in an interrupted connection to an AP. In addition to standard options you can also click the Scan button to rescan the surrounding area and attempt to connect to a new wireless access point. 6.
3. Health monitor ICMP host(s) Disable/DNS/WAN GW/Custom 4. Health monitor ICMP timeout 1/3/4/5/10 Seconds 5. Attempts before WAN failover 1/3/5/10/15/20 6. Attempts before WAN recovery ICMP host 1/3/5/10/15/20 7. Where to Ping for a health check. As there is no definitive way to determine when the connection to internet is down for good, you’ll have to define a host whose availability that of the internet as a whole. How long to wait for an ICMP request to come back.
6.6 Firewall In this section we will look over the various firewall features that come with RUT950. 6.6.1 General Settings The routers firewall is a standard Linux iptables package, which uses routing chains and policies to facilitate control over inbound and outbound traffic. Explanation When checked the router becomes more resistant against SYN-flood attacks. 2. Drop Invalid packets Checked/Unchecked A “Drop” action is performed on a packet that is determined to be invalid 3.
6.6.2 DMZ By enabling DMZ for a specific internal host (for e.g.: your computer), you will expose that host and its services to the routers WAN network (i.e. - internet). 6.6.3 Port Forwarding Here you can define your own port forwarding rules. You can use port forwarding to set up servers and services on local LAN machines. The above picture shows how you can set up a rule that would allow a website that is being hosted on 192.168.1.
When you click edit you can fine tune a rule to near perfection, if you should desire that. 1. Field Name Name Sample value “localWebsite” 2. Protocol 3. 4. 5. 7. Source zone Source MAC address Source IP address Source port TCP/UDP/TCP+ UDP/ICMP/Custom LAN/VPN/WAN Any any any 8. External IP address any Explanation Name of the rule. Used purely to make it easier to manage rules.
9. External port 12345 10. Internal zone 11. Internal IP address 12. Internal port LAN/VPN/WAN 192.168.1.109 80 13. Enable NAT loopback Enable/Disable 14. Extra arguments 6.6.
3. Field Name Name Restrict to address family Protocol 4. 5. 6. 7. 8. Match ICMP type Source zone Source MAC address Source address Source port 1. 2. Sample value “Allow-DHCP-Relay” IPv4-only Explanation Used to make rule management easier Match traffic from selected address family only TCP/UDP/Any/ICMP/Custom Protocol of the packet that is being matched against traffic rules.
9. Destination zone 10. Destination address Device/Any zone/LAN/VPN/WAN any 11. Destination port 67 12. Action Drop/Accept/Reject + chain + additional rules port or port range on the client host only Match forwarded traffic to the given destination zone only Match forwarded traffic to the given destination IP address or IP range only Match forwarded traffic to the given destination port or port range only Action to be taken on the packet if it matches the rule.
6.6.4.3 Source NAT 1. 2. Field Name Name Protocol 3. 4. Source Destination 5. SNAT 6. Enable Sample value Explanation Forward_rule_new Used to make rule management easier TCP/UDP/Any/ICMP/Custom Protocol of the packet that is being matched against traffic rules.
1. 2. Field Name Name Protocol 3. 4. 5. 6. Source zone Source MAC address Source address Source port 7. Destination zone 8. Destination address Sample value Explanation “Allow-DHCP-Relay” Used to make rule management easier TCP/UDP/Any/ICMP/Custom Protocol of the packet that is being matched against traffic rules.
9. Destination port 10. SNAT IP address 11. SNAT port 12. Extra arguments 6.6.5 any “10.101.1.10” “22” Match forwarded traffic to the given destination port or port range only Rewrite matched traffic to the given IP address Rewrite matched traffic to the given source port. May be left empty to only rewrite the IP address' Passes additional arguments to iptables.
6.7 Static Routes Static routes provide a way of entering custom entries in the internal routing table of the router. Field name Interface Target Netmask Explanation 1. The zone where the ‘Target’ resides 2. The source of the traffic. 3. Mask that is applied to the Target to determine to what actual IP addresses the routing rule applies 4. Gateway IP address To where the router should send all the traffic that applies to the rule 5. Metric integer Used as a sorting measure.
7 Services 7.1 VRRP 7.1.1 LAN/WAN Settings 1. 2. Field name Enable IP address Sample Enable/Disable 192.168.1.253 3. Virtual ID 1 4. Priority 100 7.1.
1. 2. 3. 4. 5. Field name Enable Ping IP address Ping interval Ping timeout (sec) Ping packet size Sample Enable/Disable 8.8.4.4 10 1 50 6.
7.2.2 Proxy based URL content blocker 1. Field name Enable Sample Enable/Disable 2. Mode Whitelist/Blacklist 3. Proxy port 8118 Explanation Enable proxy server based URL content blocking. Works with HTTP protocol only Whitelist - allow every part of URL on the list and block everything else.
7.3 NTP NTP configuration lets you setup and synchronize routers time. Field name Current System time Time zone Enable NTP Update interval Description Notes 1. Local time of router. --2. Time zone of your country. --3. Enables the functionality --4. How often router updates --systems time 5. Count of time Total amount of times that If left blank - the count will be infinite synchronizations router will do the synchronization 6.
7.4 SNMP SNMP settings window allows you to remotely monitor and send GSM event information to the server. 7.4.1 SNMP Settings 1. Field name Enable SNMP service 2. Enable remote access 3. 4. Port Community 5. Community name 6. Location 7. Contact 8. Name Variables/OID 1. 2. 3. 4. 5. 6. 7. 8. 9. OID 1.3.6.1.4.1.99999.1.1.1 1.3.6.1.4.1.99999.1.1.2 1.3.6.1.4.1.99999.1.1.3 1.3.6.1.4.1.99999.1.1.4 1.3.6.1.4.1.99999.1.1.5 1.3.6.1.4.1.99999.1.1.6 1.3.6.1.4.1.99999.1.1.7 1.3.6.1.4.1.99999.1.1.8 1.3.6.1.4.
10. 11. 12. 13. 14. 15. 16. 1.3.6.1.4.1.99999.1.1.10 1.3.6.1.4.1.99999.1.1.11 1.3.6.1.4.1.99999.1.1.12 1.3.6.1.4.1.99999.1.1.13 1.3.6.1.4.1.99999.1.1.14 1.3.6.1.4.1.99999.1.1.15 1.3.6.1.4.1.99999.1.1.16 7.4.2 Signal level Operator currently in use Operator number (MCC+MNC) Data session connection state Data session connection type Signal strength trap Connection type trap TRAP Settings 1. Field name SNMP Trap Sample Enable/Disable 2. Host/IP 192.168.99.155 3. 4.
7.5 VPN 7.5.1 OpenVPN VPN (Virtual Private Network) is a method for secure data transfer through unsafe public network. This section explains how to configure OpenVPN, which is implementation of VPN supported by the RUT950 router. A picture below demonstrates default OpenVPN configurations list, which is empty, so you have to define a new configuration to establish any sort of OpenVPN connection.
You can set custom settings here according to your VPN needs. Below is summary of parameters available to set: 1. 2. Field name Enabled TUN/TAP 3. 4. 5. Protocol Port LZO 6. Authentication Explanation Switches configuration on and off. This must be selected to make configuration active. Selects virtual VPN interface type. TUN is most often used in typical IP-level VPN connections, however, TAP is required to some Ethernet bridging configurations. Defines a transport protocol used by connection.
7. 8. Remote host IP address Resolve Retry 9. Keep alive 10. IP address of OpenVPN server (applicable only for client configuration). Sets time in seconds to try resolving server hostname periodically in case of first resolve failure before generating service exception. Defines two time intervals: one is used to periodically send ICMP request to OpenVPN server, and another one defines a time window, which is used to restart OpenVPN service, if no ICPM request is received during the window time slice.
1. 2. 3. 4. Field name Enable IPSec IPSec key exchange mode Enable NAT traversal Enable initial contact Explanation Check box to enable IPSec. Automatic Key exchange. Enable this function if client-to-client applications will be used. Enable this to send an INITIAL-CONTACT message. 5. 6. Peers identifier type Mode 7. My identifier 8. Preshare key Choose “fqdn” or “user fqdn” accordingly to your IPSec server configuration.
Phase 1 and Phase 2 must be configured accordingly to the IPSec server configuration, thus algorithms, authentication and lifetimes of each phase must be identical. Remote Network Secure Group – Set the remote network (Secure Policy Database) information. It must be LAN network of remote IPSec host. 1. Field name Tunnel keep alive 2. 3. Ping IP address Ping period (seconds) Explanation Allows sending ICMP echo request (Ping utility) to the remote tunnel network.
7.5.3 GRE Tunnel GRE (Generic Routing Encapsulation RFC2784) is a solution for tunneling RFC1812 private address-space traffic over an intermediate TCP/IP network such as the Internet. GRE tunneling does not use encryption it simply encapsulates data and sends it over the WAN. In the example network diagram two distant networks LAN1 and LAN2 are connected. To create GRE tunnel the user must know the following parameters: 1. Source and destination IP addresses. 2. Tunnel local IP address 3.
1. 2. Field name Enable GRE Tunnel TTL 3. PMTUD 4. 5. 6. Remote tunnel network address Remote CIDR Local tunnel IP 7. 8. 9. Local tunnel CIRD Remote IP address MTU 7.5.4 PPTP 7.5.5 L2TP Explanation Check the box to enable the GRE Tunnel function. Specify the fixed time-to-live (TTL) value on tunneled packets [0-255]. The 0 is a special value meaning that packets inherit the TTL value. Check the box to enable the Path Maximum Transmission Unit Discovery (PMTUD) status on this tunnel.
7.5.6 Dynamic DNS Dynamic DNS (DDNS) is a domain name service allowing to link dynamic IP addresses to static hostname. To start using this feature firstly you should register to DDNS service provider (example list is given in description). You are provided with add/delete buttons to manage and use different DDNS configurations at the same time! You can configure many different DDNS Hostnames in the main DDNS Configuration section. To edit your selected configuration, hit Edit.
1. 2. 3. Field name Enable Status Service Value 1. dydns.org 2. 3322.org 3. no-ip.com 4. easydns.com 5. zoneedit.com Explanation Enables current DDNS configuration. Timestamp of the last IP check or update. Your dynamic DNS service provider selected from the list. In case your DDNS provider is not present from the ones provided, please feel free to use "custom" and add hostname of the update URL. 4. 5. 6. 7. Hostname Username Password IP Source RUT9xx.noip.
7.6 SMS Utilities RUT950 has extensive amount of various SMS Utilities. These are subdivided into 4 sections: general SMS Utilities, Send SMS, SMS Management and Remote Configuration. 7.6.1 SMS Utilities You can choose your SMS Keyword (text to be sent) and authorized phone number in the main menu. You can edit each created rule by hitting Edit button.
1. Field name Enable SMS Reboot Explanation This check box will enable and disable SMS reboot function. 2. SMS text 3. Sender phone number 4. Get status 5. Enable SMS Status 6. SMS text 7. Sender phone number 8. Get Information SMS text which will reboot router. Phone number of person who can reboot router via SMS message Check this to receive connection status via SMS after a reboot. This check box will enable and disable SMS status function. SMS text which will send routers status.
Mobile Settings via SMS parameters: 1. 2. 3. Parameter apn= dialnumber= auth_mode= 4. service= 5. 6. username= password= Value(s) i.e. internet.gprs i.e. *99***1# none pap chap auto 3gpreferred 3gonly 2gpreferred 2gonly user user Explanation Sets APN. i.e: apn=internet.gprs Sets dial number Sets authentication mode You can add as many phone numbers as you need. Dropdown list with additional rows will show up if you click on “add” icon at the end of phone number row.
7.6.2 Call Utilities Allows users to Call the router in order to perform one of the actions: Reboot, Get Status, turn WiFi ON/OFF, turn Mobile data ON/OFF. Only thing that is needed is to call routers SIM card number from allowed phone (user) and RUT950 will perform all actions that are assigned for this particular number. 7.6.3 User Groups Gives possibility to group phone numbers for SMS management purposes. You can then later use these groups in all related SMS functionalities.
7.6.5.1 Receive configuration This section controls how should configuation initiation party should identify itself. In this scenario RUT950 itself is being configured. 1. Field name Authorization method 2.
7.7.1 1. 2. 3. 4. 5. 6. 7. 8. 9. General settings Field name Enabled AP IP Authentication mode Radius server #1 Explanation Check this flag to enable hotspot functionality on the router. Access Point IP address. This will be the address of the router on the hotspot network. The router will automatically create a network according to its own IP and the CIDR number that you specify after the slash. E.g. “192.168.2.254/24” means that the router will create a network with the IP address 192.168.182.
network of the client Authentication mode 10. 11. 12. 13. 14. Hotspot name Secret Key Protocol 7.7.2 Without radius Doesn’t require any RADIUS configuration. Allows simple user connection based on username/password. The name of your hotspot. Will appear on the login screen. The secret key used for authenticating with the RADIUS server. Either HTTP or HTTPs Logging 1. Field name Enable logging and upload 2. 3. 4. 5.
1. Field name Mode 2. Weekdays 3. Interval 4. Hours, Minutes Explanation The mode of the schedule. Use “Fixed” if you want the uploading to be done on a specific time of the day. Use “Interval” If you want the uploading to be done at fixed interval. This field specifies on what weekdays the uploading should be done. The entry format is numbers from 1 to 7 separated by only commas. E.g. If you want to upload the logs on Monday, Wednesday and Saturday you should enter “1,3,6”.
7.7.3 1. 2. 3. 4. Landing Page Field name Page title Logo image Link title Link address Explanation Will be seen as landing page title Logo seen on landing page. You can add an additional link, example yoursite.com Example http://www.yoursite.co 7.8 Auto Reboot 7.8.1 Ping Reboot Ping Reboot function will periodically send Ping command to server and waits for echo receive. If no echo is received router will try again sending Ping command defined number times, after defined time interval.
2. Reboot router if no echo received Explanation This check box will enable or disable Ping reboot feature. This check box will disable router rebooting after the defined number of unsuccessful retries. 3. Interval between Pings Time interval in minutes between two Pings. 4. 5. Ping timeout (sec) ICMP packet size Time after which consider that Ping has failed. This box allows to modify sent packet size 6.
7.8.2 1. 2. 3. Periodic Reboot Field name Enable Days Hours, Minutes Explanation This check box will enable or disable Periodic reboot feature. This check box will enable router rebooting at the defined days. Uploading will be done on that specific time of the day 8 System 8.1 Configuration Wizard The configuration wizard provides a simple way of quickly configuring the device in order to bring it up to basic functionality.
Step 2 (Mobile Configuration) Next we have to enter your mobile configuration. On a detailed instruction on how this should be done see the Mobile section under Network Step 3 (LAN) Next, you are given the chance to configure your LAN and DHCP server options. For a detailed explanation see LAN under Network.
Step 4 (Wi-Fi) The final step allows you to configure your wireless settings in order to set up a rudimentary Access Point. When you’re done with the configuration wizard, press Finish.
8.2 Configuration profiles Router can have virtually unlimited number or configuration profiles, which you can later apply either via WebUI or via SMS. When you add New Profile, you save current full configuration of the router. Note: profile names cannot exceed 10 symbols. 8.3 Administration 8.3.
1. 2. 3. 4. 5. 6. 7. Field name Router name Host name Password Confirmation Language Show mobile info at login page Restore to default Important notes: Explanation Enter your new router name. Enter your new host name Enter your new administration password. Changing this password will change SSH password as well. Re-enter your new administration password. Website will be translated into selected language. Show operator and signal strength at login page.
6. information System Log 7. Kernel Log 8. Troubleshoot 8.3.3 Provides on-screen System logging information. It does not, however, substitute troubleshooting file that can be downloaded from System -> Backup and Firmware menu. Provides on-screen Kernel logging information. It does not, however, substitute troubleshooting file that can be downloaded from System -> Backup and Firmware menu. Downloadable archive, that contains full router configuration and all System log files. Backup Explanation 1.
1. 2. 3. 4. 5. 6. Field name Explanation Enable SSH access Check box to enable SSH access functionality. Remote SSH access If check box is selected – user can access the router via SSH from outside (WAN). Port Port to listen for SSH access. Enable HTTP access Check box to enable HTTP access functionality. Enable remote SSH If check box is selected users can access the router via the HTTP WEB Interface from the access outside (WAN).
8.3.6 1. 2. MAC Clone Field name WAN MAC address Wireless MAC address Explanation Enter new WAN MAC address. Enter new Wireless MAC address. 8.4 User scripts Advanced users can insert their own commands to execute at the end of the boot process. 8.5 Safe mode Router contains two firmware images in its internal flash memory. One is master firmware which is the default firmware on is constantly used by the user. Another is safe mode firmware which plays the role of the backup to the master firmware.
8.6 Firmware Keep settings – when check box is selected router will keep saved user configuration settings after firmware upgrade. When check box is not selected all router settings will be restored to factory defaults after firmware upgrade. When upgrading firmware, you can choose settings that you wish to keep after the upgrade. This function is useful when firmware is being upgraded via Internet (remotely) and you must not lose connection to the router afterwards.
9 Functionality not listed in menu 9.1 SMS by HTTP POST/GET It is possible to read and send SMS by using valid HTTP POST/GET syntax. Use web browser or any other compatible software to submit HTTP POST/GET string to router. Router must be connected to GSM network when using “SMS send” feature. 9.1.
10 Device Recovery The following section describes available option for recovery of malfunctioning device. Usually device can become unreachable due to power failure during firmware upgrade or if core files were wrongly modified in the file system. Teltonika’s router does offer several ways to recover from these situations 10.1 Reset button Reset button is located on the back panel of the device. Reset button has several functions: Reboot the device.
Manually. Bootloader’s webserver can be requested by holding reset button for 3 seconds while powering the device on. Flashing all 4 Ethernet LEDs indicate that bootloader’s webserver has started. Bootloader’s WebUI can be accessed by typing this address in the web browser: http://192.168.1.1/index.
BOOTP – Bootstrap Protocol – an internet protocol that enables a diskless workstation to discover its own IP address, the IP address of a BOOTP server on the network, and a file to be loaded into memory to boot the machine. This enables the workstation to boot without requiring a hard or floppy disk drive. TCP – Transmission Control Protocol – one of the main protocols in TCP/IP networks.