Home
USER MANUAL
Contents
1. ATV l wut U l N T Ma PNPN PN PNPN r lavatatata Watatatlalalalalala p aafaa aT er A NAA 4 n 90 0 00000000000 000 000000 000000 01 0111 C 0000001 0 1 0000001 000000 00001 000000 10 V 1 4f fa Ve la l NONONO g 9 Vinis E Dis iv vi UUU UUUUUUU T l 111 00000001 0000001 10000001 0000C m s 1 0100001 0101 10101010000000001 0 000 0 0 00001 1010 VM MUUU 10 JVUUUUU Tee 000000 00000001 000001 000 00000001 0 1 0000001 000 aa Legal notice Copyright 2012 TELTONIKA Ltd All rights reserved Reproduction transfer distribution or storage of part or all of the contents in this document in any form without the prior written permission of TELTONIKA Ltd is prohibited The manufacturer reserves the right to modify the product and manual for the purpose of technical improvement without prior notice Other product and company names mentioned herein may be trademarks or trade names of their respective owners Attention Before using the device we strongly recommend reading this user manual first Do not rip open the device Do not touch the device if the device block is broken All wireless devices for data transferring may be susceptible to interference which could affect performance The device is not water resistant Keep it dry Device is powered by low voltage 9V DC power adaptor UUU UUUUUUUT OU 4 111 00000001 0000001 10000001 0000C aa e a 1 01000000101 10101010000000001 0 000 0 0
2. v 10 OUUU 3100100101001010 01 0100K 0000071 000 00000001 0 1 0000001 OUO R Z Common configuration Enable PING Reboot M Reboot routerifno M echo received Interval between 30 FINGSs min 2 Minimum 5 minutes Retry count 45 Server to PING 127 0 0 1 3 6 0 192 158 1 1 or www host com if ONS server configured correctly 2 _ es Enable PING Reboot This check box will enable or disable PING PING Reboot is disabled by default reboot feature Reboot router if no This check box will disable router rebooting This check box must be unselected if echo received after the defined number of unsuccessful you want to use PING Reboot feature retries as Keep Alive function 3 Interval between PINGs Time interval in minutes between two PINGS Minimum time interval is 5 minutes Retry count Number of times try sending PING to server Minimum retry number is 1 Second after time interval if echo receive was retry will be done after defined time unsuccessful interval Server to PING Server IP address or host name which will If you use server host name instead of receive PING from router the IP address you must configure DNS server first Important notes e Always check if your defined server responds to echo commands before using PING Reboot function Otherwise router keeps rebooting after unsuccessful PING echo receive You can test PING send at Network gt Diagnostics NTP Hostname Network Time
3. DNS Domain Name Resolver A server that translates names such as www google t to their respective IPs In order for your computer or router to communicate with some external server it needs to know it s IP its name www something com just won t do There are special servers set in place that perform this specific task of resolving names into IPs called Domain Name servers If you have no DNS specified you can still browse the web provided that you know the IP of the website you are trying to reach 53
4. 65 0 MBit s The physical maximum possible throughput that the routers radio can handle Keep in mind that this value is cumulative The bitrate will be shared between the router and other possible devices that connect to the local AP 7 Country code AP Wireless ull signal quality 100 Soll Teltonika demo Mode Master Channel b 2 44 GHZ BSsiD UU DC 4 2 20 50 26 Encryption WPA PSK CCMP Bit rate 1 0 MBit s Country LT Signal Quality 100 The quality between routers radio and some other device that is connecting to the router Will show 0 if no devices are trying to connect or are currently T maintaining a connection Teltonika_demo The SSID that is being broadcast Other devices will see this and will be able anand aaee a 6 2 44 GHz The channel which is used to broadcast the SSID and to establish new connections to devices Cl Encryption WPA2 PSK The type of encryption that the router will use to authenticate establish and CCMP maintain a connection Bit rate 1 0 MBit s The bitrate will be shared between all devices that connect to the routers wireless network Country code SID 00 0C 43 30 50 38 MAC address of your wireless radio N 8 Additional note MBit s indicates the bits not bytes To get the throughput in bytes divide the bit value by 8 for e g 54MBits s would be 6 75MB s Mega Bytes per second Associated Stations Outputs a list of all devices and their MAC addresses that are main
5. _Exclusive to other Modes with DHCP LAN LAN IFv4 address 192 166 1 161 Metmask 255 255 255 0 Connected Oh bm 145 Field Name __ Sample Value IPv4 address 192 168 1 161 Address that the router uses on the LAN network 255 255 255 0 Indicates the networks netmask Oh 6m 14s How long LAN has been successfully maintained Wireless Wireless can work in two modes AP or Client AP is when the wireless radio is used to create an Access Point that other devices can connect to Client is when the radio is used to connect to an Access Point via WAN Client Wireless di Soll teltonika rnd division ap Mode Client Channel 6 2 44 GHz BSSID LCB 23A 35 02 F C BO Encryption WEA PSK CCMP Bit rate 65 0 MBS Country LT SS Field Name Sample Value Explanation SSID teltonika_rnd_division_ap The SSID that the AP to which the routers is connected to uses 17 010m ene1010m010 0 0 000k meme 111 00000001 0000001 10000001 00000 ee A101 01000000101 10101010000000001 0 000 0 0 00001 1010 7 wsyud0 00000 5000000 00000001 000001 000 00000001 0 1 0000001 000 some local AP 3 Channel 6 2 44 GHz The channel that the AP to which the routers is connected to uses Your wireless radio is forced to work in this channel in order to maintain the connection BSSID C8 3A 53 02 FC BO The MAC address of the access points radio 5 WPA2 PSK CCMP The AP to which the router is connected to dictates the type of encryption
6. 3 2 key 4 E Enter the keys that will be used as passphrase for connecting computers and then specify which key will be preferred above the remaining It s sufficient to enter one key and then specify it as the preferred one Length is important as well 10 or 26 characters in length in hex mode OR 5 or 13 in ASCII mode A hex key may only contain numbers 0 through 9 and letters a through f WPA Encryption WPA PSK l Cipher auto l Key 66666666 e First select an encryption method TKIP CCMP TKIP amp CCMP auto Note Some authentication methods won t support TKIP and TKIP amp CCMP encryption After you ve selected your encryption method you should enter your passphrase which must be at least 8 characters long 34 000 00000001 O 1 wa n 111 00000001 0000001 10000001 01001010 Pan W840 1071 01000000101 10101010000000001 0 000 0 0 00001 1010 10 00000 TO 19000000 00000001 000001 000 00000001 0 1 0000001 000 MAC Filter Interface Configuration General Setup Wireless Security MAC F ilter MAC Address Filter Allow listed only A MAC List ral Filter you can define a rule for what to do with the MAC list you ve defined You can either allow only the listed MACs or allow ALL but forbid only the listed ones Client Client mode is nearly identical to AP except for the fact that most for the options are dictated by the wireless access point that the router is connecting to Changing
7. Here is quick rundown of how the page looks and what each field means Operation Mode Operation Mode Interface oa vired Ged VV INIA Ged Vit First and foremost a mode of connection has to be defined Available selections type Description o An Ethernet cable connected to the WAN port of the router The router will be able to connect to a local wireless access point and reach the internet through it WiMAX The router will connect to your local WiMAX network for internet access 25 IU T OOU 0 0 0010 0 Oh mem as a 111 00000001 0000001 10000001 00000 c B00 401 01000000101 10101010000000001 0 000 0 0 00001 1010 1 soy U10 COCCI 19000000 00000001 000001 000 00000001 0 1 0000001 000 i a Common configuration Common configuration allows you to configure your TCP IP settings for the wan network Common Configuration seneral Setup Protocol DHCF client BA Really switch Switch protocol protocol You can switch between the Static and DHCP protocol by selecting the protocol that you want to use and then pressing Switch Protocol General This area is dedicated for protocol specific options Static Common Configuration seneral Setup Advanced settings Protacal static address l IPvd address 192 166 99 1b2 IPv4 netmask 9 255 255 255 0 A P4 gateway 192 160 939 254 IPv4 broadcast Use custom ONS 0 0 0 0 es 6 6 6 R Z This is the configuration setup for when you select the static pr
8. WAN When check box is not selected users can access the router only from LAN Note The router has 2 users admin for webUI and root for SSH When loging in via SSH use root Web Access control Fieldname Explanation HTTP Web server port specify a port number for routers web management via HTTP protocol Default port is 80 2 Remote HTTP access if check box is selected users can access the router via the HTTP WEB Interface from the outside WAN When check box is not selected users can access the router only from LAN 3 HTTPS server port specify a port number for routers web management via HTTPS protocol Default port is 443 Remote HTTPS access if check box is selected users can access the router via the HTTPS WEB Interface from the outside WAN When check box is not selected users can access the router only from LAN Backup and Firmware Router firmware backup upgrade and settings reset to their factory defaults Backup and reset configuration Backup archive download current router settings file to personal computer Reset to defaults reset router settings to their defaut values Restore configuration Restore backup upload and restore router settings file from personal computer Firmware upgrade Keep settings when check box is selected router will keep saved user configuration settings after firmware upgrade When check box is not selected all router settings will be restored
9. 1 m 11 00000001 0000001 10000001 00000 pn 9940 101 01000000101 10101010000000001 0 000 0 0 00001 1010 1 uu oJI TN J000000 00000001 000001 000 00000001 0 1 0000001 000 tb amount of failed or passed health checks has to be reached before the state changes completely This delay is instituted so as to mitigate spikes in connection availability but it also extends the time before the backup link can be brought up or down _ Field Name Sample value CC 1 Health Monitor Interval Dsb 5 10 20 30 60 120 Seconds The interval at which health checks are performed 2 Health Monitor ICMP HOST Dsb DNS WAN GW Custom Where to PING for a health check As there is no definitive way to determine when the connection to internet is down for good you ll have to define a host whose availability that of the internet as a whole Health Monitor ICMP Timeout 3 4 5 10 Seconds How long to wait for an ICMP request to come back Set a higher value if your connection has high latency or high jitter latency spikes connection to be declared DOWN for good connection to be declared UP DNS Servers Auto Custom Define custom DNS servers Has meaning when you select DNS as your Health Monitor ICMP HOST 7 Backup ICMP host IPv4 address This is where the address of an ICMP host that will be used to check the health of your WiMAX backup link goes This has to be a ping able host How do I set up a backup link First we must pick a
10. 39454BG Network Connection This connection uses the following items o Client for Microsoft Networks JB QoS Packet Scheduler B File and Printer Sharing for Microsoft Networks GCT WiMax Protocol Driver C Internet Protocol Version 6 TCP IP v6 lntermet Protocol Version 4 TCP IP y4 Link Layer Topology Discovery Mapper 170 Driver Link Layer Topology Discovery Responder Description Transmission Control Protocol Internet Protocol The default wide area network protocol that provides communication across diverse interconnected networks 6 By default the router is going to have DHCP enabled which means that if you select Obtain an IP address automatically and Obtain DNS server address automatically the router should lease you an IP and you should be ready to login 11 7 01010500000003 U 4 111 00000001 0000001 10000001 0000C a SS 1 0100001 0101 10101010000000001 0 000 0 0 00001 1010 vevi yuu 10 JUUUUU TRee 6000000 00000001 000001 000 00000001 0 1 0000001 000 Internet Protocol Version 4 7TCP TPy4i Properties General Alternate Configuration You can get IP settings assigned automatically iF your network supports this capability Otherwise you need to ask your network administrator For the appropriate IP settings Obtain an IP address automatically Use the Following IP address IP address Subnet mask Default gateway 6 Use the Following DNS server
11. Protocol NTP and time zone configuration settings is needed to periodically update router local time Common configuration 41 101 000 00000001 0 1 SS 11 e 0 01010 0 0 0000001 10000001 010101010 Rann p AAAA 1 01000000101 10101010000000001 0 000 0 0 00001 1010 aamuun 0000TA 19000000 00000001 000001 000 00000001 0 1 0000001 000 System Properties Local Time Wed Aug 8 08 32 11 2012 Syne with browser Hostname Teltonika Timezone LTC Time Synchronization Enable builtin WTP M NTP server candidates U europe pool ntp org R Z 3 europe 0001 ntp org Sync with browser button will synchronize local router time with computer browser time Field name Description Notes 1 Local Time Localtime of router fm 2 Hostname Hostname of router fm 3 Timezone Time zone of your country S Enable builtin NTP This check box willturnon When check box is selected you must enter one or more automatic time working NTP servers Otherwise time sync feature will not synchronizing with defined work NTP servers 5 NTP server candidates NTP server hostname You can add as many servers as you need by clicking add button at the end of server hostname field Dynamic DNS Dynamic DNS DDNS is a domain name service allowing to link dynamic IP addresses to static hostname To start using this feature firstly you should register to DDNS service provider You are provided with add delete b
12. a sorting measure If a packet about to be routed fits two rules mee neonewittnenghermeticbappieds o raS Additional note on Target amp Netmask You can define a rule that applies to a single IP like this Target some IP Netmask 255 255 255 255 Furthermore you can define a rule that applies to a segment of IPs like this Target some IP that STARTS the segment Netmask Netmask that defines how large the segment is E g 192 168 55 161 255 255 255 255 Only applies to 192 168 55 161 192 168 55 0 255 255 255 0 Applies to IPs in range 192 168 55 0 39 001 VOU QUUUUUUUT U 1 va 11 00000001 0000001 10000001 00000 n wit 0 101 01000000101 10101010000000001 0 000 0 0 00001 1010 1 10 OOUUUUU TS 6000000 00000001 000001 000 00000001 0 1 0000001 000 YS 192 168 55 255 192 168 55 240 255 255 255 240 Applies 192 168 55 240 192 168 55 255 192 168 55 161 255 255 255 0 192 168 55 0 192 168 55 255 192 168 0 0 255 255 0 0 192 168 0 0 192 168 255 255 Diagnostics Contains Network Utilities used for testing network Network Utilities Fing Traceroute Nslookup Ping the utility used to test the reachability of a host on an Internet IP network and to measure the round trip time for messages sent from the originating host to a destination server Enter server IP address or hostname and click Ping Server echo response will be shown after few seconds if server is accessible Traceroute diagnostic tool f
13. addresses Preferred DNS server Alternate DNS server Validate settings Upon exit If you choose to configure manually here s what you do First select an IP address Due to the stock settings that your router has arrived in you can only enter an IP in the form of 192 168 1 XXX where XXX is a number in the range of 2 254 192 168 1 2 192 168 1 254 192 168 1 155 and so on are valid 192 168 1 0 192 168 1 1 192 168 1 255 192 168 1 699 and so on are not Next we enter the subnet mask this has to be 255 255 255 0 Then we enter the default gateway this has to be 192 168 1 1 Finally we enter primary and secondary DNS server IPs One will suffice though it is good to have a secondary one as well as it will act as a backup if the first should fail The DNS can be your routers IP 192 168 1 1 but it can also be some external DNS server like the one Google provides 8 8 8 8 12 UU UUUUUUU l 11 00000001 0000001 10000001 0000C g s Q401 01000000101 10101010000000001 0 000 0 0 00001 1010 wM QuUU10 D00000 TORN 0000000 00000001 000001 000 00000001 0 1 0000001 00 a Internet Protocol Version 4 TCP IP 4 Properties General You can get IF settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator For the appropriate IP settings gt obtain an IP address automatically Use the Following IP address IP address 192 168 1
14. also be granted additional control over the WiMAX module WIMAX Here you can disable IMA S connection or reboot the modem WIMAX Management Reboot WIMANY Reboot modem Turn onfott yi lA Turn off a Field Name Explanation Reboot WiMAX modem Pressing this button will reboot the WiMAX module Turn on off WiMAX Pressing this button will either turn on or off the connection to any available WiMAX network These buttons differ from any other in a way that they make alterations to the WiMAX module directly instead of the router How do I setup Wifi WAN First we must switch the mode to Wifi Do so by selecting Wifi from the list and wait for the page to quickly reload Now you have a selection of protocols available for you Depending on whether the Access Point that you intend to connect to runs a DHCP server or not you will have to choose DHCP or Static AP runs a DHCP server DHCP Does not run Static When you ve configured your protocol settings press Save and wait until the settings are applied Next goto the Network gt Wireless page and wait until it loads For the first time an automatic Site Survey will be initiated You should now see a list of available local Access Points Choose one and click Join Network Should you be asked enter the secret Encryption Key and click Submit 29 OOU UUUUUUU T U 1 a 111 00000001 0000001 10000001 0000C _ a met 101 01000000101 10101010000000001 O 0
15. e Dimensions H x W x D 100mm x 85mm x 36mm e Weight 210 260g e Power Supply 100 240 VAC gt 9 VDC wall adapter e Input voltage range 9 12 V e Power Consumption lt 7W e Antenna connectors 2 x RP SMA for WiMAX 1 x RP SMA for WiFi e Indicators 4 x Ethernet LEDs 1 x Power LED 1 x WiMAX LED e Operating Temperature OC to 50C e Storage temperature 20C to 0C e Operating Humidity 10 to 90 Non condensing e Storage humidity 5 to 95 Non condensing 101050101010100 01 OU 4 bE 00000001 0000001 100000071 00101010 p i 1 0100001 0101 10101010000000001 0 000 0 0 00001 1010 semen YUU 10 JUUUUT gus 6000000 00000001 000001 000 00000001 0 1 0000001 mele i Setting up your router Installation After you unpack the box follow the steps documented below in order to properly connect the device For better Wi Fi performance put the device in clearly visible spot as obstacles such as walls and door hinder the signal 1 First assemble your router by attaching the necessary antennas If you have bought the RUT5XXU and a WiMAX dongle plug the dongle into the USB Port which is located on the back panel 2 To power up your router please use the power adapter included in the box IMPORTANT Using a different power adapter can damage and void the warranty for this product 3 Ifyou have a wired broadband connection you will also have to connect it to the WAN port of the router Front Panel LAN LEDs s MMM UU
16. make the rule inactive The rule will not be deleted but it also will not be loaded into the firewall Sort Up Down When a packet arrives it gets checked for a matching rule If there are several rules that match the rule the first one is applied i e the order of the rule list impacts how your firewall operates therefore you are given the ability to sort your list as you wish Custom Rules Here you have the ultimate freedom in defining your rules you can enter them straight into the iptables program Just type them out into the text field ant it will get executed as a linux shell script If you are unsure of how to use iptables check the internet out for manuals examples and explanations Static Routes Static routes provide a way of entering custom entries in the internal routing table of the router Routes Routes specify over which interface and gateway a certain host or network can be reached Static IPv4 Routes Interface Target IPv4 Netmask IPv4 Gateway Metric Host lP or Network if target is a network lan x 192 168 55 0 255 255 255 0 192 168 55 145 Delete Add Save Field name Value Explanation The zone where the Target resides IPv4 address The source of the traffic 3 IPv4 Netmask IPv4 mask Mask that is applied to the Target to determine to what actual IP N nni ae 4 IPv4 Gateway IPv4 address To where the router should send all the traffic that applies to the rule 5 Metric integer Used as
17. to factory defaults after firmware upgrade Image router firmware upgrade file 51 QUU UUUUUUUT OU 4 aa 111 00000001 0000001 10000001 0000C 1 01000000101 10101010000000001 0 000 0 0 00001 1010 uuau COUTO 19000000 00000001 000001 000 00000001 0 1 0000001 000 Firmware upgrade Verify Firmware upgrade Verify The flash image was uploaded Below is the checksum and file size listed compare them with the original file to ensure data integrity Click Proceed below to start the flash procedure Checksum 446e4c7Sbf7ess 642aabb5b 6le37 94 Size 4 50 MB 69 MIB available s Configuration files will be kept Compare firmware file checksum to ensure data integrity If checksum is correct click Proceed button below Wait until upgrade process completes Important notes e Leaving Keep settings check box unselected before upgrade process will change IP address of router to default value 192 168 1 1 and you may need to configure router again please read chapter Logging in at page 9 Warning Do not ever remove router power supply and do not press reset button during upgrade process This will totally damage your router and it won t be accessible If you have any problems related to firmware upgrade you should always consult with local dealer Reboot Reboot router by pressing button Reboot Logout Log out from router management WEB interface Glossary WAN Wide Area Net
18. 0 0 0 00001 1010 l r SOOT TOR 10000000 00000001 000001 000 00000001 0 1 0000001 000 Network Protocol Source Destination Transfer Fd TCF 192 166 0 156 37 706 192 168 99 30 3389 613 44 KB 8338 Fkts Pd UDP 192 166 0 19 137 192 168 0 255 137 7 24 KB 4 Pkts Pg UDP 192 1656 0 19 135 192 168 0 255 138 5 20 KE 44 Pkts IFP hee 182 1660 16 52547 173 134 78 129 90 3 50 KB 11 Pkts IPv 4 HE 192 166 0 156 36821 199 127 194 BU 9 1 97 KB 7 Pkts IFP UDP 194 168 1967 255 255 259 299 60 1 13 KB 2 Fkts IFP TOF 192 166 0 156 42797 209 86 1 16 1 36 BU 930 00 6 6 Pkts IPv 4 Ter 192 168 0 30 5566 9 192 168 0 161 50 703 00 B 3 Pkts IFP UDP 0 0 0 0 68 255 255 255 255 67 600 00 B 2 Pkts Pig UDP 122 ee OS by 255 255 29 sla SIS 604 00 B 2 Pkts FP UDP 192 166 0 156 54245 0 0 0 0 55 142 00 B 2 Pkts IP UDP 192 168 0 156 41391 0 0 0 8 53 66 00 B 1 Fkts On the same page you can also analyse a detailed list of all active connections that the router maintains Each entry consist of a type of network IPV4 protocol TCP UDP ICMP the source address an IPv4 address the source port the destination address an IPv4 address the destination port and how much traffic has gone through that particular connection it s size in Bytes and the amount of packets Network Wan WAN configuration is arguably the crux of the routers configuration as it determines how the router will connect to the internet
19. 00 0 0 00001 1010 vy yvuU010 O00000 FR 00010000R 00000001 000001 000 00000001 0 1 0000001 melele Now you should be transported to the Wireless Station page Click Save and wait until all the settings are applied The configuration is complete and you should now be able to access the internet LAN This page is used to configure the LAN network where all your devices and computers that you connect to the router will reside LAN Qn this page you can configure your LAN settings Common Configuration General setup Advanced Settings Protacal static address l IPv4 address 192 160 0161 Dud netmask 255 2655 455 0 BA IPvd gateway IMA broadcast Use custom ONS al servers IP Aliases fs section contains no valves yet Add The common configuration and IP aliasing sections are identical to the ones found in WAN so for an explanation on how they work please follow through there DHCP Server The DHCP server is the router side service that can automatically configure the TCP IP settings of any device that requests such a service If you connect a device that has been configured to obtain IP address automatically the DHCP server will lease an address and the device will be able to fully communicate with the router 30 IU 1 UUU UUUUUUUT OV 4 11 00000001 0000001 10000001 00000 p ss 640 401 01000000101 10101010000000001 0 000 0 0 00001 1010 1 sue sUUU10 COUT 1900000 00000001 000001 000 00000001 0 1 0000001
20. 00 00000001 0 1 0000001 001 This tri graph illustrates average system load over the course of 3 minutes each new measurement is taken every 3 seconds The graph consists out of three colour coded graphs each one corresponding to the average system load over 1 red 5 orange and 15 yellow most recent minutes Although not graphed the page also displays peak loads over 1 5 and 15 minutes Traffic Bridge Realtime Traffic Bridge LAMHAN LAN WAM aired Wy AGS WIE 203 09 KBitls 25 39 EBytels 135 39 EBitls 16 92 KBytels 67 7 EBits 8 46 EBytels 3 minute window 3 second interwal Inbound 45 42 KBItS Average 77 59 CBS Peak 164 54 BIS 5 68 KBytes 9 7 KBytes 25 07 KBytes Outbound 20 29 Kits Average 19 27 KHS Peak 2746 16 HI 7 54 KBytes 2 41 KBytes 30 77 KBytes Cumulative graph which encompasses wired Ethernet LAN and the wireless network LAN WAN Realtime Traffic Bridge LAN h LAM WARM aired MNT AGS WiFi 307 93 KB 38 49 KBytes 205 29 EBitls 25 66 EBytels 102 64 EBitls 12 85 EByte s C3 minute window 3 second interwal Inbound 39 23 Kits Average 42 47 BIS Peak 373 25 KBits 4 9 KBytes 5 31 KBytes 46 66 KBytes Outbound 29 75 Bits Average 20 62 BIS Peak 59 33 KBit s 3 2 KBytes 2 58 KBytes 7 12 KByte s 21 U UVUUUUY 11 00000001 0000001 10000001 00001 17 01000000101 10101010000000001 0 000 0 0 00001 1010 vei wuUU10 OUUTE 0000101001010100 0 0K 000
21. 000 DHCP Server General Setup Advanced Settings Disable E Stat 100 Limit 150 Leasetine 12h XZ Expiry time ofleased addresses minimum is 2 Minutes 2m __ Field Name Sample value Checked unchecked Check to DISABLE the DHCP server 2 Start 100 The starting address of the range that the DHCP server can use to give out to devices E g if your LAN IP is 192 168 2 1 and your subnet mask is 255 255 255 0 that means that in your network a valid IP address has to be in the range of 192 168 2 1 192 168 2 254 192 168 2 0 and 192 168 2 255 are special unavailable addresses If the Start value is set to 100 then the DHCP server will only be able to lease out addresses starting from 192 168 2 100 3 Limit How many addresses the DHCP server gets to lease out Continuing on the above example if the start address is 192 168 2 100 then the end address ee will be 192 168 2 254 100 150 1 254 Advanced settings How long can a leased IP be considered valid An IP address after the specified amount of time will expire and the device that leased it out will have to request for a new one You can also define some advanced options that specify how the DHCP server will operate on your LAN network DHCP Server General Setup Advanced Settings Dynamit DHCP Force C B Force DHCP on this network even if another server is detected IPv4 netmask DHCP Options E E Define additional DHF options for example 6 192 16
22. 00001 1010 10 QUUU UTs 0000100100001000 0K 000001 000 00000001 0 1 0000001 UOU Table of Contents Lee NO TTT 2 ITI a T E A E E E A E E A E 2 SAFETY INFORMA TION eer erea E 5 Ives Mga cere t csc cee ect yeite dace eene deuce ianateceueadontoearetcncceedsstecaentcnuuencacenmeeneesseetaatebaccseuacaesnet teen escuouacteetoe oceuseeerencor sens 6 SOC CMC aU ONS e sonar eeuseevacataceaucdssacnetent sacar cbavacgnecentnuuatons i dabsoteweusancacatacsauedesacnetentaacarorarecanecet R 6 LAN NONE tesserae cece E siaessr ec des Sem uesaatta sate at cee oe acem eas antan cate cisamece sees daca estacssaaeeek 6 WiMAX RUT523 RUT525 RUT535 RUT538 RUT523U RUT525U RUT535U RUT5S38U eee 6 Electrical Mechanical amp Environmental sssscnsceceseysces nay cue wesess dec cosedmeseconecan nese deessuseadosnaseasounisyssenaisesuawause nie noseseneeersians 7 SOE VOU VOUS saci tecnecori nc sem stews sinus E sens aeguaeae E E E E 8 BS allao acters caecset es E E E E E 8 PORE PAC r E E E 8 Ba T TT 9 PONS I ce nc acs nu sapien E cere beveew ea heaceeunieycbeaghuycevibeencb E genie tees 9 ODE AIO ee 14 PCT NOPE Die sa 15 OE YS ett pe A dines cntsien does yates E ves E 15 OS Treanna eT 15 Network Ien rete ss 16 eT 20 RESUME eneel 20 NONO TTT 25 MM AU TTT 25 LR 30 OUST 32 BO Na sceeec abe necec va E ane iaancconess eo amia nat ssauaee vavess ce aiatunr Gee ueeeeazeanaceauaverscaeiaeastaaeessateonseaneeoneae 35 EI 37 6 1 0 56 0 Le i T ee ee ee ee or ee ee 39
23. 0071 000 00000001 0 1 0000001 00 Graphs the total traffic that passes through both WAN and LAN network interfaces LAN Realtime Traffic Bridge LAM WAMN LAN WAM Wired MAR WiFi 23 4 EBitis 11 17 Kbytes 59 6 Kpu 7 45 KBytes 29 8 KR 3 72 KByte s C3 minute window 3 second interwal Inbound 66 96 KBit s Average 52 67 KBits Peak 108 36 KBits 6 62 KBytes 6 58 KBytes 13 54 KBytes Outbound 21 21 KBPS Average 16 25 Kits Peak 57 41 KBPS 2 65 KBytes 2 28 KByte s 7 18 KBytes Indicates how much traffic has been passed through your Ethernet LAN network WAN x Realtime Traffic Bridge LAMHAN LAM WAN Aired IMAR WiFi 4 94 MPs 632 29 EDytels 329 MBitls 421 53 EBytels 1 65 MBitls 210 76 KBytes C3 minute window 3 second interwal Inbound 19 26 BIS fverage 21 24 KBits Peak 5 99 MBits 41 KBytess 2 65 KBytes THB 42 KBytes Outbound KBIt S Average 1 42 Kits Peak 474 28 CHIUS U KBytes 0 18 KBytes 59 29 KBytes Graphs the amount of traffic which passed through the current active WAN connection 22 001 0000001 100000 1010000000001 0 000 0 0 00001 101 O 001 000001 000 00000001 0 1 0000001 Wi Fi Realtime Traffic Bridge LAMHAN LAM WAR ire cd Wii MAGS WIFI 106 08 EBitls 13 26 EByte s 70 72 KRK 8 84 KBytels 35 36 E Bits 4 42 KBytes C3 minute window 3 second internals Inbound 0 Kits Average 0 Kits Peak 0 BIS U KBytes U KBytes U KBytes Outboun
24. 100 Subnet mask 255 255 255 0 Default gateway 197 168 1 1 Obtain DNS server address automatically Use the Following DNS server addresses Preferred DNS server 192 168 1 Alternate DNS server 5 E validate settings upon exit Right click on the Wireless network icon and select Connect Disconnect A list should pop up with all available wireless networks Select Teltonika and click connect A Wireless Network Connection Connect Disconnect Diagnose Bridge Connections Create Shortcut Rename Then we launch our favourite browser and enter the routers IP into the address field 192 168 11 Press enter If there are no problems you should be greeted with a login screen such as this 13 a 9101010 IU 1 00000001 0000001 10000001 00001 101 010001 01 10101010000000001 0 000 0 0 00001 101 soon YUU 10 QUUUUE 0000000 00000001 000001 000 00000001 0 1 0000001 00 Authorization Required Please enter your username and password Username admin Password Login Reset Teltonika solutions way teltonika It Enter the default password which is adminO1 into the Password field and then either click Login with your mouse or press the Enter key You have now successfully logged into the router and should see the Status page System information System Router Mame Teltonika Router Model Teltonika RUTSAx Firmware version RUTSAX T 00 00
25. 168 2 0 Subnet mask 24 Number 0 32 Phase 1 and Phase 2 must be configured accordingly to the IPSec server configuration Remote Network Secure Group Set the remote network Secure Policy Database information Tunnel keep alive Enable keep alive E Ping IP address Ping period seconds _ Fieldname Explanation 1 Tunnel keep alive Allows sending ICMP echo request ping utility to the remote tunnel network This function may be used to automatically start the IPSec tunnel Ping IP address Enter IP address to which ICMP echo requests will be sent Ping period seconds Set sent ICMP request period in seconds GRE Tunnel GRE Generic Routing Encapsulation RFC2784 is a solution for tunneling RFC1812 private address space traffic over an intermediate TCP IP network such as the Internet GRE tunneling does not use encryption it simply encapsulates data and sends it over the WAN 47 QUU UUUUUUUT U 4 111 00000001 0000001 10000001 0000C 1 01000000101 10101010000000001 0 000 0 0 00001 1010 ssn sUU10 COUTTS 19900000 00000001 000001 000 00000001 0 1 0000001 000 WAN IP AAAA WAN IP B E B B V c 192 1 68 0 2 LAN 192 168 1 2 In the example network diagram two distant networks LAN1 and LAN2 are connected To create GRE tunnel the user must know the following parameters 1 Source and destination IP addresses 2 Tunnel local IP address 3 Distant network IP address and Subnet mask Enable GRE T
26. 246 Kernel Version 3 2 15 Local Time Wed Aug B 13 10 47 2012 Uptime Th 36m 51s Load Average 0 16 0 11 0 15 Memory Total Available 10476 kB 30012 kB 34 Free H 1672 KBs 30012 KB 5 Cached 6456 kB 30012 KB 71 Buffered 2348 KB 30012 kB 7 From here on out you can configure almost any aspect of your router Operation Modes The RUT5XX RUT5XXU router supports various operation modes It can be connected to the internet WAN via WiMAX standard Ethernet cable or via a wireless network If you connect to the internet via an Ethernet cable of Wi Fi you may also backup your connection with WiMAX for added stability On every case except when you connect to the internet via Wi Fi you can distribute your internet via an Ethernet cable 3 ports and or a wireless network When you connect via Wi Fi you cannot have Wi Fi in your LAN LAN WiMAX Backup link wont AN O Ow Ethernet 4 Oo a own o S In later sections it will be explained bit by bit how to configure your router to work in a desired mode 14 QUU UUUUUUUT OU 4 aa 111 00000001 0000001 10000001 0000C pn 1 01000000101 10101010000000001 0 000 0 0 00001 1010 1 YUU 10 JUUUUU TURE 6000000 00000001 000001 000 00000001 0 1 0000001 000 Function explanations The following sections contain a detailed explanation of every page tab and sub tab of the configuration interface in the order that they appear on the router Status The status section con
27. 8 2 1 192 168 2 2 which advertises different ONS servers to clients Field Name Sample Value Explanation 1 Dynamic DHCP Checked Unchecked Dynamically allocate client addresses if set to 0 only clients present in the ethers files are served same network segment think it s serving a larger or a smaller network than it actually is 31 QUU UUUUUUUT OU 1 n 111 00000001 0000001 10000001 00000 nM a01 01000000101 10101010000000001 0 000 0 0 00001 1010 10 QUUU UU 00000010R OOO0O0001 0000071 000 00000001 0 000010 0k OUO DHCP Options 6 192 168 2 1 192 168 2 2 Additional options to be added for this DHCP server For example with 26 1470 26 1470 or option mtu 1470 you can assign an MTU per DHCP option mtu 1470 Your client must accept MTU by DHCP for this to work Wireless On this page you can configure your wireless settings Depending on whether your WAN mode is set to Wifi or not the page will display either the options for configuring an Access Point or options for configuring a connection to some local access point Access Point Wireless Access Point Here you can configure your wireless settings like radio frequency mode encrtion etc Device Configuration meneral Setup Advanced Settings Wireless networkis Disable enabled E Donttorgetto save before toggling the wireless radio on and off Channel 11 2 462 GHz Le Interface Configuration General Setup wireless Security WAC Fil
28. DENO I e E EE T EEE E nGanescesanasaceuboesenaunses it useeouteanenassnbeaceieonacueeabseos 40 Kele e ENEA A E E E A A EA A A ee eee ee A E oe E 40 PING TO 40 ITSP caiteobnasetentpesinsebeecuemregasiaesseasuaeatsasanenbaecudoseaasiadassestaueeaadnten bee sede seeassatabsudinaunanediasnbessudtesessaaasaseemencnemire oon suqeeseesiaeasees 41 RUT Iet BI THT 42 UU UVUUUUUU 1 00000001 0000001 10000001 0000C 1 01000000101 10101010000000001 0 000 0 0 00001 1010 muua YVO OUUUUU TRS 0000000 00000001 000001 000 00000001 0 1 0000001 mele SS LT 49 COME EU ONNI T 49 AOMA s 12 Te TT 50 Vol gall acid esd 61 1M sese 50 Backup and Ss 51 REDOT eao a E E deeeeee cone 1920 00s seu senaspencdee euseecssagsvesanataenaspanudetesseacsgasseessesaarene 52 Ee eT 52 OSS A cess ipo ns sven ss ce rosea tars owe eee depute vn gs ses eee ee 52 001 UUU QUUUUUUT 0 1 a 111 00000001 0000001 10000001 00000 m0 101 01000000101 10101010000000001 0 000 0 0 00001 1010 1 10 000000 TO 19000000 00000001 000001 000 00000001 0 1 0000001 000 c one x SAFETY INFORMATION In this document you will be introduced on how to use a RUT5XX RUT5XXU router safely We suggest you to adhere to the following recommendations in order to avoid personal injuries and or property damage You have to be familiar with the safety requirements before using the device To avoid burning and voltage caused traumas of the personnel working with the device please follow these safet
29. Enabled E OMZ hostiP address By enabling DMZ for a specific internal host for e g your computer you will expose that host and its services to the routers WAN network i e internet Port Forwarding Here you can define your own port forwarding rules Firewall Port Forwarding Port forwarding allows remote computers on the Internet to connect to a specific computer or service within the private LAN Port Forwarding Name Protocol Source Via Destination Enable Sort localvYebsite TCP From any host in wan To any router D at port Forward to IP 792 768 HG9 756 port 80 in Edit Delete 12545 lan New port forward Mame Protocal External port Internal IF address Internal port localvWebsite TCP UDP e 12345 192 168 99 156 980 Add You can use port forwarding to set up servers and services on local LAN machines The above picture shows how you can set up a rule that would allow a website that is being hosted on 192 168 99 156 to be reached from the outside by entering http routersExternallp 12345 Fieldname Sample value Explanation localWebsite Name of the rule Used purely to make it easier to manage rules TCP UDP TCP UDP Other Type of protocol of incoming packet 3 External Port 1 65535 From what port on the WAN network will the traffic be forwarded Internal IP address IPv4 address of some The IP address of the internal machine that hosts some service computer on your LAN that we want to access fr
30. MMM 1 Bae T M NM MM I UUU d UUU VOL 0101010 1 l g JU l r PETE N C J 90000111 00000001 0000001 1000C IMAX antenna connectors Wi Fi antenna connector Reset button WiMAX LED Wi Fi antenna connector Reset button WiMAX LED USB Port After you re complete with the setting up as described in the section above you are ready to start logging into your router and start configuring it This example shows how to connect on Windows 7 On windows Vista click Start gt Control Panel gt Network and Sharing Centre gt Manage network Connections gt Go to step 4 On Windows XP Click Start gt Settings gt Network Connections gt see step 4 gt You wont s see Internet protocol version 4 TCP IPv4 instead you ll have to select TCP IP Settings and click options gt Go to step 6 91910101019 00000001 0000001 10000001 0000 a 101 01000000101 10101010000000001 0 000 0 0 00001 1011 nunu VUV OUUUU TOR 10000000 00000001 000001 000 00000001 0 1 0000001 00 We first must set up our network card so that it could properly communicate with the router 1 Press the start button R Sg shipping Tool sticky Motes EE Paint qi XPS Viewer fee Windows Fax and scan L Remote Desktop Connection Calculator Mus Cor Con l Control Panel 19 Find and fix networking and connection problems KE Set up a connection or network KE set up a virtual private network YPN connection EE View n
31. Use DNS servers advertised by peer E lf unchecked the advertised ONS server addresses are ignored Use gateway metric Client ID to send when requesting DMC Y Vendor Class to Send wher requesting DHCP Override MAC address Override MTU IP Aliases IP aliases are a way of defining or reaching a subnet that works in the same space as the regular network IP Aliases SUBNETSS General setup Advanced Settings IPvl Address 192 166 55 161 IPv4 Netmask 255 255 255 0 l IPvt Gateway 1942 160 55 153 Delete Add As you can see the configuration is very similar to the static protocol only in the example a 55 th subnet is defined Now if some device has an IP in the 55 subnet 192 168 55 xxx and the subnets gateway metric is higher and the device is trying to reach the internet it will reroute it s traffic not to the gateway that is defined in common configurations but through the one that is specified in IP aliases 28 IU T UUU QUOUUUUUT meme iii 11 00000001 0000001 10000001 00000 a _ Riad 1 01000000101 10101010000000001 O 000 0 0 00001 1010 1 10 OQOUUUU e 6000000 00000001 000001 000 00000001 O 1 0000001 000 IP Aliases SUBNETS5S General setup Advanced Settings IPwi Broadcast DNS Server Delete Add You may also optionally define a broadcast address and a custom DNS server WiMAX If you have selected WiMAX to be your primary means of connecting to the internet you will
32. cked router will not perform NAT Masquerade on this interface Override MAC address Override M TU Use gateway metric Field name sampe value Explanation Bring up on boot Specifies whether the interface will be configured and brought up when the router boots up Disabling will render your WAN connection non functional Disable NAT On Off Toggle NAT on and off 3 Override MAC address 00 0C 43 30 50 38 Override MAC address of the WAN interface If your ISP gives you a static IP address it might also bind it to your computers MAC address i e that IP will only work with your computer In this field you can enter your computers MAC address and fool the gateway in thinking that it is communicating with your computer Maximum transmission unit specifies the largest possible size of a data packet 5 neeem e atar tne meirar traten anand With this field you can alter the metric of that entry 27 UUU QVUVUUUUT aa 11 00000001 0000001 10000001 OO0O0C P anm 7 01000000101 10101010000000001 0 000 0 0 00001 1010 d MUUU TU OUOU TON 0000000 00000001 000001 000 00000001 0 1 0000001 000 z Ants Common Configuration General Setup Advanced Settings Bring Up on boot Disable MAT YZ If checked router will not perform NAT Masquerade on this interface Use broadcast flag B Required for certain ISPs e g Charter with DOCSIS 3 Use default gateway B If unchecked no default route is configured Sse DD S
33. d 136 92 KB tS Average 26 77 KBits Peak 128 59 KBits 237 KBytes 3 35 KBytes 16 07 KBytes Shows the amount of traffic that has been sent and received through the wireless radio Wireless Realtime Wireless wl an minute window 3 second interval Signal 49 dBm SNR 206 dBm Average 45 dBm SNR 206 dBm Peak 45 dBm SNR 210 dBm Noise 255 dBm Average 255 dBm Peak 255 dBm This graph illustrates how signal strength and the amount of noise change over time 23 VU YUUUUUUUT U IU 11 00000001 0000001 10000001 000000 _ peel 101 01000000101 10101010000000001 0 000 0 0 00001 1010 10 VM U MU 10 0UUUOG Reus 0000000000101010 0K IK 000001 000 00000001 0 1 00000071 0000 ds Dis 42 WIBitls 16 M Bis a minute window 3 second interval Phy Rate 59 MBitrs Average 59 MBit s Peak 59 MBit s This graph illustrates how the physical rate of wireless changes over time Connections Active Connections 3 minute window 3 second interval UDP 4 Average 3 Peak 5 TCP 4 Average 3 Peak b Other U Average U Peak 2 This graph shows a concise history of the amount of connections that the router maintained Blue graph indicates UDP connections green TCP and red other types ICMP etc Other values indicate each respective graphs average and peak connection amounts over 3 minutes 24 ee 1 0100001 OOU UUUUUUU T U 1 111 00000001 0000001 10000001 0000C 0101 10101010000000001 0 00
34. e Dynamic DNS e LAN access control over Internet connection e Virtual server e Auto wireless channel selection e OpenVPN e Dynamic DNS e Backup WAN e SMS and Ping reboot WiMAX RUT523 RUT525 RUT535 RUT538 RUT523U RUT525U RUT535U RUT538U e Standard Compliant IEEE 802 16e 2005 e Air Interface S OFDMA e Frequency Band 2 3 2 4GHz RUT523 2 5 2 7GHz RUT525 e 3 3 3 6GHz RUT535 or 3 3 3 8GHz RUT538 e Channel Bandwidth 3 MHz 3 5 MHz 5 MHz 6 MHz 7 MHz 8 75 MHz and 10 MHz e Modulation Adaptive QPSK 16QAM 64QAM e MIMO MRC Matrix A MRC Matrix B e Beamforming All I O Beamforming Items e RF Output Power 2x25 dBm 2 3 2 7GHz 2x23dBm 3 3 3 8GHz RX Sensitivity e QPSK1 2 99 5 2 5 GHz 10 MHz BW e 16QAM1 2 94 29 2 5 GHz 10 MHz BW e QPSK1 2 99 3 5 GHz 10 MHz BW e 16QAM1 2 93 8 3 5 GHz 10 MHz BW e Antenna Gain 5 dBi 2 5 GHz 3 5 GHz RUT5xxU 2 dBi e Antenna Type External dipole RUT5xxU internal e Handover Hard Optimized Handover e QoS Mechanism UGS Real Time VR Non Real Time VR Best Effort ERT VR 6 UU UUUUUUU T l 11 00000001 0000001 10000001 0000C ee ba i 101 01000000101 10101010000000001 0 000 0 0 00001 1010 ws UU 10 CUUUOO TSR DOGQOO00 00000001 000001 000 00000001 0 1 0000001 00 e Authentication EAP TLS EAP TTLS MSCHAPv2 e Encryption 3 CCM Mode 128 bit AES e Error Handling HARQ UL and DL up to Category 7 Electrical Mechanical amp Environmental
35. e ce In imme WAH Mired M b I TE Backup WAN Status More on this see the main backup WAN section of this manual 19 00000001 0000001 10000001 00000 e Aaaa 1 01000000101 10101010000000001 0 000 0 0 00001 1010 a Md L VUUU 10 UUU UU 210000000 00000001 000001 000 00000001 0 1 0000001 001 Routes Routes The following rules are currently active on this system ARP IPv4 Address MAC Address Interface 192 168 0350 POF Tbe 0c RN E br lan 192 1ER 99 254 00 00 00 00 00 00 eth Active IPvd Routes Network Target IPvd Gateway Metric wan 0 0 0 0 0 192 158 99 254 U lan 192 160 0 0 244 0 0 0 0 U wan 192 160 99 Of24 0 0 0 0 U Teltonika solutions wey teltonika It ARP Shows the routers active ARP table An ARP table contains recently cached MAC addresses of every immediate device that was communicating with the router Active IPv4 Routes Shows the routers routing table The routing table indicates where a TCP IP packet with a specific IP address should be directed to Realtime Graphs Real time graphs show how various statistical data changes over time Load Realtime Load a minute window 3 second interval 1 Minute Load 1 59 Average 1 59 Peak 1 66 5 Minute Load 0 95 Average 0 98 Peak 0 98 15 Minute Load 1 59 Average 0 93 Peak 0 93 20 UU UUUUUUU i 1 00000001 0000001 10000001 00000 l 4 01000000101 10101010000000001 0 000 0 0 00001 1010 lt M YUUU10 UU 10000000 00000001 000001 0
36. e to farthest network member in meters 2 network member in meters EE Threshold The smallest packet size that can be fragmented and transmitted by multiple frames In areas were interference is a problem setting a lower fragment threshold might help reduce the probability of unsuccessful packet transfers thus increasing speed 5 RTS CTS Threshold 2346 Request to send threshold It can help resolve problems arising when several access points are in the same area contending Interface General Interface Configuration General Setup Wireless Security MAC Filter ESSID Telttonika_demo Hide ESSID E ESSID Your wireless networks identification string This is the name of your Wi Fi network When other Wi Fi capable computers or devices scan the area for Wi Fi networks they will see your network with this name Hide ESSID Will render your SSID hidden from other devices that try to scan the area 33 UUU VUVUUUUT aa S 111 00000001 0000001 10000001 0000C ee an 11 01000000101 10101010000000001 0 000 0 0 00001 1010 sews wuUU10 OOUUTU TM 1000000 00000001 000001 000 00000001 0 1 0000001 000 Security Interface Configuration seneral Setup Wireless Security MAC Filter Encryption WWPRAZ PSK l Cipher auto BA key 66666666 La Encryption There are many modes of encryption though two distinctive classes have to pointed out WEP Encryption EF Open system A Used Key Slot Kev 1 e Key 1 ei Key T z Key
37. et s examine some sample output 2 43 2 96 3 41 The first number 2 43 means that in the past minute there have been on average 2 43 processes running or waiting for a resource The second number show that in the past 10 minutes on average there have been 2 96 processes 15 IU 1 UUU UUUUUUUT OV 4 111 00000001 0000001 10000001 01001010 me A a es 8540 401 01000000101 10101010000000001 0 000 0 0 00001 1010 1 ness UU COGUO TON J090000 00000001 000001 000 00000001 0 1 0000001 000 running or waiting for a resource The last number indicates the same on the last 15 minutes Memory __ Field Name Sample Value Total Available 14416 29964 Shows how much memory is available to maintain routers functionality 2 Free 1476 29964 The amount of memory that is completely free Should this rapidly decrease or get close to O it would indicate that the router is running out of memory which could cause crashes and unexpected reboots accessed data SPa nnn a ne Btemrart ered before mown another location Network Information This page is much like the status page previously described though dedicated to data associated with networking WiMAX Statistics for the WiMAX module and the connection WIMAX d Uptime 0 07 14 atate Connected Singal Strength 83 dBm Signal Quality 10 3 dB MAC address UOT E 4 27 90 00 726 BS MAC address OOO0 2C 01 05 468 Uplink Modulation Gpsk cte 1 2 Downlink Modulatio
38. etwork connections a Manage network passwords Add a wireless device to the network RE Connect to a network Identify and repair network problems Files 9 Ay neddint Ci wireshark dictionary usr Cisco 57 dictionary r UserMianual_DPH40L_ en G UserManual DPH411 en os a See more results network connection 10 VVUUUUUYU 1 00000001 0000001 10000001 0000 _ 1 01000000101 10101010000000001 0 000 0 0 00001 1010 vyv I vuvu10 000000 0000000 00000001 000001 000 00000001 0 1 0000001 OU Control Panel i10 ue View network status and tasks Lk o o ee View network connections Lk g Z View network computers af Network and sharing Center View devices and printers View network connections Lk g KK Manage wireless networks 4 Then right click on your wireless device that you use to connect to other access points It is the one with the name Wireless Network Connection and has signal bars on its icon baka GU ug K Control Panel Network and Internet Network Connections Organize Disable this network device Diagnose this connection L Wireless Network Connection Disabled il Intel R PRO Wireless 39 Enable Status Diagnose Create Shortcut Delete Rename Properties 5 Select Internet Protocol Version 4 TCP IPv4 and then click Properties iy Wireless Network Connection Properties x Connect using a Intel PRO Wireless
39. face Configuration ESSID Teltonika_demo Hide ESSID E Encryption vWPA2 PSK ial Cipher auto Key 66666666 kel The final step allows you to configure your wireless settings in order to set up a rudimentary Access Point When you re done with the configuration wizard press Finish Administration Administration properties Administration password Field name Explanation Enter your new administration password Re enter your new administration password Important notes e The only way to gain access to the web management if you forget the administrator password is to reset the device factory default settings Default administrator login Settings are User Name admin Password admin01 Logging System logs are divided into following groups e Info e Notice 50 IU T UOU UUUUUUUT U 1 111 00000001 0000001 10000001 01001010 E poon 2A400101 01000000101 10101010000000001 0 000 0 0 00001 1010 1 aesa UU O OOGUN 0000000 00000001 000001 000 00000001 0 1 0000001 000 e Warning e Error e Critical e Alert e Emergency You can watch logs by choosing the group from dropdown list and clicking button show SSH Access control iS Field Name Explanation SSH Access SSH can be enabled or disabled by choosing Enable or Disable from dropdown list Specify port for SSH access Default port is 22 3 Remote SSH access If check box is selected users can access the router via SSH from the outside
40. main link Wired or Wi Fi and ensure that the link is working Configure your WAN settings to use that link and see whether you have internet access If the main link is working we can continue configuring our Backup Link Now go to Backup WAN page and configure the settings to your liking Click Save and wait until the settings are applied Now in the Status gt Network Information page there should be a status indication for the backup WAN If everything is working correctly you should see this Backup WAN Status WAN Wired IM USE Backup VON MIMARA READY The above picture shows the status for Backup WAN configured on a wired main link You can now simulate a downed link by simply unplugging your Ethernet WAN cable When you ve done so you should see this And if you plug the cable back in you should again see this Backup WAN Status 36 IU T OUOU UUOUUUUU T 0 1 ann 111 00000001 0000001 10000001 010101010 mie 401 01000000101 10101010000000001 0 000 0 0 00001 1010 lt 10 000000 TO 19000000 00000001 000001 000 00000001 0 1 0000001 000 Backup WAN Status WAH Wired I USE Backup Vik If you witness the above sequence your backup link is working Firewall In this section we will look over the various firewall features that come with rut500 General Settings The routers firewall is a standard linux iptables package which uses routing chains and policies to facilitate control over inbound and outbou
41. n qpsk cte 1 2 Version Linux none 2 6 25 uc0 sqn 52 Mon Feb 6 16 41 31 EET 2012 armydteb 64k v1 54 State Shows the state of the connection o o O MAC address The MAC address of the WiMAX module and effectively your routers on the WiMAX network Modulation Type of modulation used when receiving information Modulation WiMAX module version WAN Statistics on the routers WAN connection 16 IU 1 UUU UUUUUUUT OV 4 111 00000001 0000001 10000001 01001010 a M STET 101 01000000101 10101010000000001 0 000 0 0 00001 1010 1 yr UUI 10 OQOUUUU F Se 9000000 00000001 000001 000 00000001 0 1 0000001 O00 WAN interface WMA Type DC IPvl address 02 140 177 32 Field Name Sample Value Explanation 1 Interface WiMAX Specifies through what medium the router is connecting to the internet This can either be Wired WiMAX or Wi Fi Type DHCP Specifies the type of connection This can either be static or DHOP N i 82 140 177 32 The IP address that the routers uses to connect the internet 255 255 255 240 Indicates the networks netmask 5 Gateway 10 12 104 97 Indicates the default gateway an address where traffic destined for the internet is routed to DNS 8 8 8 8 Domain name server s Expires 1h 57m 25s The amount of time before the routers DHCP lease expires Oh 2m 2s How long the connection has been successfully maintained _These fields show up on other connection modes
42. nd traffic General Settings Enable SYN flood protection Drop invalid packets E Input accept Output accept Forward reject A Sample value Explanation 1 Enable SYN flood Checked Unchecked When checked the router becomes more resistant against SYN protection flood attacks Drop Invalid packets Checked Unchecked A Drop action is performed on a packet that is determined to be invalid DEFAULT action that is to be performed for packets that pass through the Input chain N Output DEFAULT action that is to be performed for packets that pass through the Output chain 5 Forward Reject Drop Accept DEFAULT action that is to be performed for packets that pass through the Forward chain DEFAULT When a packet goes through a firewall chain it is matched against all the rules for that specific chain If no rule matches said packet an according Action either Drop or Reject or Accept is performed Accept Packet gets to continue down the next chain Drop Packet is stopped and deleted Reject Packet is stopped deleted and differently from Drop an ICMP packet containing a message of rejection is sent to the source of the dropped packet 37 IU T UOU 0 0 010 010 0h meme 11 00000001 0000001 10000001 00000 m wie 101 01000000101 10101010000000001 0 000 0 0 00001 1010 1 10 OUUUUU 8 one eee eleleleleleley 0000071 000 010100100 0K mem 00010100K melee E DMZ DMZ configuration
43. om the outside Internal port 1 65535 To what port on the internal machine would the rule redirect the traffic Additional note Notice how the external port is 12345 and not 80 It is perfectly fine to define the external port as 80 but then the routers configuration interface would not reachable unless you change the web access port from remote management When you click edit you can fine tune a rule to near perfection if you should desire that Traffic Rules The traffic rule page contains a more generalised rule definition With it you can block or open ports alter how traffic is forwarded between LAN and WAN and many more things 38 JUU T UUU UUUUUUUT U 7 UU 1111 00000001 0000001 10000001 00000 RRR 401 01000000101 10101010000000001 0 000 0 0 00001 1010 1 Mau TO 900000 00000001 000001 000 00000001 0 1 0000001 000 Field Name Sample Value Explanation ame Used to make rule management easier amily Only IPv4 is currently supported Protocol TCP UDP Other Protocol of the packet that is being matched against traffic rules ES ource IPv4 address The source of the packet Destination IPv4 address The destination of the packet Action Drop Accept Reject Action to be taken on the packet if it matches the rule You can also define chain additional additional options like limiting packet volume and defining to which chain the rules rule belongs 7 Enable Checked Unchecked Self explanatory Uncheck to
44. or displaying the route path and measuring transit delays of packets across an Internet IP network Enter server IP address or hostname and click Traceroute Log containing route information will be shown after few seconds Nslookup network administration command line tool for querying the Domain Name System DNS to obtain domain name or IP address mapping or for any other specific DNS record Enter server hostname and click Nslookup Log containing specified server DNS lookup information will be shown after few seconds Full manual with all available Nslookup commands and parameters can be found in Linux manual page nslookup 1 Important notes e Note that DNS server must be configured correctly if you use server hostname instead of server IP address in address field Services PING Reboot PING Reboot function will periodically send PING command to server and waits for echo receive If no echo is received router will try again sending PING command defined number times after defined time interval If no echo is received after the defined number of unsuccessful retries router will reboot It is possible to turn of the router rebooting after defined unsuccessful retries Therefore this feature can be used as Keep Alive function when router PINGs the host unlimited number of times 40 IU T OUOU UUOUUUUU T 0 1 111 00000001 0000001 10000001 01001010 _ E 94 01000000101 10101010000000001 0 000 0 0 00001 1010
45. otocol Filedname Sample Explanation o A mask used to define how large the WAN network is Address where the router will send all the outgoing traffic N niani RES Nonkunessyeulnowehatyouaredong blank unless you know what you are doing 5 custom DNS servers 8 8 8 8 8 8 6 6 Usually the gateway has some predefined DNS servers As such the router when it needs to resolve a hostname www google com www cnn com etc to an IP address it will forward all the DNS requests to the gateway By entering custom DNS servers the router will take care of host name resolution You can enter multiple DNS servers to provide redundancy in case the one of the server fails 26 OOU QVUVUUVLU1I U 1 111 00000001 0000001 10000001 00000 01 01000000101 10101010000000001 0 000 0 0 00001 1010 10 QUUUUU ee 6000000 00000001 000001 000 00000001 O 1 0000001 000 DHCP Common Configuration General Setup Advanced settings Protocal DHCP client l Hostname to send when requesting DHCP When you select the DHCP protocol you can use it as is because most networks will not require any additional advanced configuration Advanced These are the advanced settings for each of the protocols if you are unsure of how to alter these attributes it is highly recommended to leave them to a trained professional Static Common Configuration General Setup Advanced Settings Bring up on boot Disable NAT O If che
46. raffic or low CPU resources Authentication Sets authentication mode used to secure data sessions Two possibilities you have here Static means that OpenVPN client and server will use the same secret key which must be uploaded to the router using Static pre shared key option Tls authentication mode uses X 509 type certificates Depending on your selected OpenVPN mode client or server you have to upload these certificates to the router For client Certificate Authority CA Client certificate Client key For server Certificate Authority CA Server certificate Server key and Diffie Hellman DH certificate used to key exchange through unsafe data networks All mention certificates can be generated using OpenVPN or OpenSSL utilities on any type host machine Certificate generation and theory is out of scope of this user manual address before generating service exception Keep alive Defines two time intervals one is used to periodically send ICMP request to OpenVPN server and another one defines a time window which is used to restart OpenVPN service if no ICPM request is received during the window time slice 7 10 Local tunnel IP address of virtual local network interface applicable only for point to point connections endpoint Remote tunnel IP address of virtual remote network interface endpoint Remote IP address of remote virtual network network IP address Remote Subnet mask of
47. remote virtual network network IP netmask LA LA LA Pa A After setting any of these parameters press Save button Some of selected parameters will be shown in the configuration list table You should also be aware of the fact that router will launch separate OpenVPN service for every configuration entry if it is defined as active of course so the router has ability to act as server and client at the same time IPsec The IPsec protocol client enables the router to establish a secure connection to an IPsec peer via the Internet IPsec is supported in two modes transport and tunnel Transport mode creates secure point to point channel between two hosts Tunnel mode can be used to build a secure connection between two remote LANs serving as a VPN solution IPsec system maintains two databases Security Policy Database SPD which defines whether to apply IPsec to a packet or not and specify which how IPsec SA is applied and Security Association Database SAD which contain Key of each IPsec SA 45 IU T OOU 0 0 0010 0 Oh mem __ 111 00000001 0000001 10000001 00000 c e B00 401 01000000101 10101010000000001 0 000 0 0 00001 1010 1 compass OOUUU TO 19000000 00000001 000001 000 00000001 0 1 0000001 000 The establishment of the Security Association IPsec SA between two peers is needed for IPsec communication It can be done by using manual or automated configuration Note router starts establishing tunnel when da
48. sword into both Password and Confirmation fields and press Next Note At this point you can also Skip the wizard Step 2 LAN step LAN Here wwe will configure the basic settings of a typical LAN configuration The wizard will cower 2 basic configurations static IP address LAN and DHCP client Common Configuration Protocol Static address P Pw address 192 168 0 161 Fv netmask 255 255 255 0 mal lFwe gateway Fw broadcast Use custom ONS ca Se fire Z DHCP Server Disable E Start 100 Limit 150 Leasetime 2h B Expiry time of leased addresses minimum is 2 Minutes C 2m 49 IU T OUOU UUOUUUUU T meme iii 111 00000001 0000001 10000001 0000C _ l ddd 01000000101 10101010000000001 O 000 0 0 00001 1010 mw U 10 OVUUUU T8 6000000 00000001 000001 000 00000001 0 1 0000001 000 Next you are given the chance to configure your LAN and DHCP server options For a detailed explanation see LAN under Network Step 3 Wifi Step Wireless Mow let s configure your wireless radio Note it you are currently connecting via wireless and you change parameters like SSID encryption etc your connection will be dropped and you will have to reconnect with a new set of parametes Device Configuration Wireless network is Disable enabled B Important note Do not disable ifthe only way to reach the router is your wireless network Channel 6 2 437 GHz Mode 802 41q e Country Code LT Lithuania ise Inter
49. ta from router to remote site over tunnel is sent For automatic tunnel establishment used tunnel keep alive feature Automatic IPSec Key exchange Description Enable IPsec IPSec key exchange Auto Key IKE mode Mode aggressive Enable NAT traversal E Enable initial contact E My identifier type address B My identifier we Preshare Key 123456709 Length 6 321 Remote YPN endpoint 61 61 51 81 IP address Fieldname Explanation N Enable initial contact Enable this to send an INITIAL CONTACT message 5 Peers identifier type Choose fqdn or user fqdn accordingly to your IPSec server configuration Mod Select Main or Aggressive mode accordingly to your IPSec server configuration 7 My identifier Set the device identifier for IPSec tunnel Preshare key specify the authentication secret string Secret s length depends on selected algorithm eg 128 bit long secret is 16 characters in length 128 bits 8 bits one character 16 Remote VPN Endport set remote IPSec server IP address 46 1 O00 UUOUUUUUT 0 1 111 00000001 0000001 10000001 00000 24101 01000000101 10101010000000001 0 000 0 0 00001 1010 10 TTT vasas i 0000000 00000001 000001 000 00000001 0 1 0000001 000 Phase 1 Encryption 2065 l Hash shal Dh group modp1024 Phase 2 PFS group modp1024 Encryption Jdes E E R Authentication himac_ shat Remote network secure group IP address 192
50. tailed configuration appears as shown in the picture below OpenVPN instance client Demo Main settings Enable TurnTap Tunftunnel A Type of used device Protocol Udp A Pot 1194 TCRAUDP port for both local and remote Lo P Use fast LZO compression Authentication Tis l Remote host IP address Resolve Retry infinite No Bind E Do not bind to local address and port Keep alive Helper directive to simplify the expression of ping and ping restart Client E Certificate authority Po Brose Client certificate fo i Browse Client key fo Bross You can set custom settings here according to your VPN needs Below is summary of parameters available to set 44 001 000 00000001 0 1 1111 00000001 0000001 10000001 00000 R p A4101 01000000101 10101010000000001 0 000 0 0 00001 1010 1 syy010 D00000 TO J000000 00000001 000001 000 00000001 0 1 0000001 000 Field Name Explanation Enabled Switches configuration on and off This must be selected to make configuration active _ all Selects virtual VPN interface type TUN is most often used in typical P level VPN connections however TAP is required to some Ethernet bridging configurations defines TCP or UDP port number make sure that this port allowed by firewall 5 LZO This setting enables LZO compression With LZO compression your VPN connection will generate less network traffic however this means higher router CPU loads Use it carefully with high rate t
51. tain a connection with your router right now This can either be the information of the Access Point that the router is connecting to in Client Mode OR a list of all devices that are connecting to the router in Access Point mode 18 _ UUU QVUVUUUUT i 111 00000001 0000001 10000001 0000C p n agad H 01000000101 10101010000000001 0 000 0 0 00001 1010 hM 10 C0000 TO 090000 00000001 000001 000 00000001 0 1 0000001 000 Associated Stations MAC Address Network Signal RX Rate THX Rate BC TR FO FE AC 45 Waster Teltonika_demo_ap 48 dBm 2 2 Mbits MoS 7 20h02 43 3 hibits MCS 4 20 hM 2 O03 ED Caaf 44 Master Teltonika_demo_ap T0 dBm 52 0 Mbits MCS 5 2OMHz 6 5 Mbits MOS 0 2ONMHz DHCP Leases If you have enabled a DHCP server this field will show how many devices have received an IP address and what those IP addresses are DHCP Leases Hostname IPv4 Address MAC Address Leasetime remaining android _b8594credt14b08 1927 168 1 101 bob FOfe aci45 11h 59m 40s The picture above shows a DHCP lease for an Android phone that is currently connecting to the routers Access Point Backup WAN When enabled this field will indicate the health of your primary connection IN USE Indicates that the connection is being used for main traffic READY Indicates that the connection is ready to take over network traffic if the other link should fail NOT READY Indicates that the connection is down Backup WAN Status HE E panded g
52. tains various information like current IP addresses of various network interfaces the state of the routers memory firmware version DHCP leases associated wireless stations graphs indicating load traffic etc and much more System Information The System Information tab contains data that pertains to the routers operating system CSTEL TONIKA Status WNetwork Services System Logout system information System Router Mame Teltonika Router Model Teltonika RUTSOO Firmware Version RITS T_O0 00 436 Kernel Version 3 2 15 Local Time Fri Jun 29 11 49 22 2012 Uptime Oh m 34s Load Average 0 23 0 25 0 40 Memory Total Available 144416 kB 25964 kB 48 Free 1476 kB 29964 kB 4 Cached OS65 kE 29964 kB S24 Buffered S072 kB 29964 kB 10 Teltonika solutions www teltonika lt Field Name Sample value Explanation Teltonika Name of the router hostname of the routers system Router Model Teltonika RUT500 Routers model Firmware Version RUTS5XX_T_00 00 436 Shows the version of the firmware that is currently loaded in the router Newer versions might become available as new features are added Use this field to decide whether you need a firmware upgrade or not 3 2 15 The version of the Linux kernel that is currently running on the router 2012 because the router synchronizes it s time with an NTP server Reboots will reset this timer to O Load Average 0 98 0 57 0 30 Indicates how busy the router is L
53. ter ESSID Teltonika Hide ESSID Here you can see the Overview of the wireless configuration It is divided into two main sections device and interface One is dedicated to configuring hardware parameters other software Device General Device Configuration General Setup Advanced Settings Wireless networkis Disable enabled EB Donttorgetto save before toggling the wireless radio on and off Channel 11 2 462 GHz es Here you can toggle the availability of the wireless radio and the physical channel frequency Important note As seen in the picture you should always Save before toggling the radio on and off 32 OOU QVUVUUVLU1I U 1 111 00000001 0000001 10000001 00000 i j 01 01000000101 10101010000000001 0 000 0 0 00001 1010 a 10 00 Urara 0000000 00000001 000001 000 00000001 0 1 0000001 000 Advanced Device Configuration General Setup Advanced Settings Mode 802 11g n HT mode 20MHz Country Code 00 World E Use ISQWEC 3166 alpha country codes Distance Optimization jJ Distance to farthest network member in meters Fragmentation Threshold RT amp CTS Threshold Here you can configure more advanced parameters Field name Sample value Explanation ol uone S OMO athena eode _ parameter meet your couse CO country code parameters to meet your countries wireless regulations Distance Optimization 100 Distance to farthest network member in meters 2 to Distanc
54. them can result in an interrupted connection to an AP In addition to standard options you can also click the Scan button to rescan the surrounding area and attempt to connect to a new wireless access point Backup WAN Backup WAN is function that allows you to back up your wired OR wireless connection in case they go down At the current moment you can only backup wired Wifi with WiMAX Backup Link Here you can setup your backup link If your conventional WAN connection such as wired Ethernet or wifi fails the backup link will enable and take over to keep the router connected Enable Timing amp other parameters Timing amp other parameters will indicate how and when it will be determined that your conventional connection has gone down Health Monitor 5 SEC Interval Health MonitorlcMP ONS Serverts iss Hostis Health Monitor EMP 1 sec mma Timeout Attempts Before Ls WAN Failover Attempts Before WAN Recovery DNS Serwers Auto el Backup ICMP host A remote host that willbe used to test wether your backup link is alive ICMP host 8 6 4 4 The majority of the options consist of timing and other important parameters that help determine the health of your primary connection Regular health checks are constantly performed in the form of ICMP packets PINGs on the your primary connection When the connections state starts to change READY gt NOT READY and vice versa a necessary 35 001 UOU UUUUUUUT 0
55. to qualified personnel in order to repair this product We recommend forwarding it to a repair centre or the manufacturer There are no exchangeable parts inside the device Om UUU UUUUUUUT U 1 an 11 00000001 0000001 10000001 00000 ae 101 01000000101 10101010000000001 0 000 0 0 00001 1010 v ET T TT O00000 TOR 10000000 00000001 000001 000 00000001 0 1 0000001 000 wa Introduction Thank you for purchasing a RUTSXX RUT5XXU WiMAX router RUT5XX is a series of compact mobile routers with high speed wireless and Ethernet connections This router is ideal for people who d like to share their internet on the go as it is not restricted by a cumbersome cable connection Unrestricted but not forgotten the router still supports internet distribution via a broadband cable simply plug it in to the wan port set the router to a correct mode and you are ready to browse Specifications LAN and Wi Fi e Wireless AP Router 4 Port Switch and Firewall in one device e High performance 320 MHz CPU with 256 Mbits SDRAM e EEE 802 11b g n IEEE 802 3 IEEE 802 3u standards 64 128 bit WEP WPA WPA2 WPA amp WPA2 encryption methods e 3xLAN 10 100Mbps Ethernet ports e 1xWAN 10 100Mbps Ethernet port e Supports Auto MDI MDIX e Remote local Web management e 1x 5dBi wireless antenna e SSID stealth mode and access control based over MAC address e System log to record the status of the Router e Auto negotiation manual mode for IEEE 802 11b g n
56. unnel E We E value 0 255 PMTUD E Remote tunnel network address Remote CIDR B CIDR netmask value 0 32 Remote IF address MTL 1500 E MTU value 0 1500 Field name Explanation Enable GRE Tunnel Check the box to enable the GRE Tunnel function Z TL Specify the fixed time to live TTL value on tunneled packets 0 255 The 0 is a special value meaning that packets inherit the TTL value 3 PMTUD Check the box to enable the Path Maximum Transmission Unit Discovery PMTUD status on this tunnel Remote tunnel network Specify remote LAN Subnet address address 5 Remote CIDR Specify remote LAN Subnet CIDR value 6 Remote IP address Specify remote WAN IP address 7 TU Specify the maximum transmission unit MTU of a communications protocol of a layer in bytes 48 UUU UUUUUUU T l 1 00000001 0000001 10000001 0000C m a ie 1 01000000101 10101010000000001 O 000 0 0 00001 1010 vy 1 YUUU 10 QUUUUU TUS 0000001000000100 000001 000 00000001 0 1 0000001 OUO Systems Configuration Wizard The configuration wizard provides a simple way of quickly configuring the device in order to bring it up to basic functionality The wizard is comprised out of 4 steps and they are as follows Step 1 Password change Step Password First let s change your router password from the default one Password Confirmation First the wizard prompts you to change the default password Simply enter the same pas
57. uttons to manage and use different DDNS configurations at the same time 42 IUT UUU 0100100101 0h U wa T 11 00000001 0000001 10000001 010101010 Pann Riada 101 01000000101 10101010000000001 0 000 0 0 00001 1010 1 10 OOUUUT see 001000701001010 01 000K 000001 000 QO000001 0 1 0000001 DU Dynamic DNS Dynamic DNS allows that your router can be reached with a fixed hostname while having a dynamically changing IP address DEMO Enable Status MIA Service dvndns arq Hostname mypersonaldoamain dyadns org Username MmyUsername Ti Password 666686666 IF renew interval 10 imini Force IP renew min T2 Delete Add Field name Explanation Enables current DDNS configuration 2 status o O 3 Service Your dynamic DNS service provider selected from the list 1 dydns org 2 3322 org 3 NO ip com 4 easydns com 5 zoneedit com In case your DDNS provider is not present from the ones provided please feel free to use custom and add hostname of the update URL ia Hostname Domain name which will be linked with dynamic IP address Name of the user account 6 Password Password of the user account 7 IP renew Time interval in minutes to check if the IP address of the device have changed interval 8 Force IP renew Time interval in minutes to force IP address renew OpenVPN VPN Virtual Private Network is a method for secure data transfer through unsafe public network This section e
58. work is a telecommunication network that covers a broad area i e any network that links across metropolitan regional or national boundaries Here we use the term WAN to mean the external network that the router uses to reach the internet LAN A local area network LAN is a computer network that interconnects computers in a limited area such as a home school computer laboratory or office building DHCP The Dynamic Host Configuration Protocol DHCP is a network configuration protocol for hosts on Internet Protocol IP networks Computers that are connected to IP networks must be configured before they can communicate with other hosts The most essential information needed is an IP address and a default route and routing prefix DHCP eliminates the manual task by a network administrator It also provides a central database of devices that are connected to the network and eliminates duplicate resource assignments ETHERNET CABLE Refers to the CAT5 UTP cable with an RJ 45 connector In other words the most common internet cable ever 52 _ UU VUUUUUUT 1 00000001 0000001 10000001 0000C Q101 01000000101 10101010000000001 0 000 0 0 00001 1010 aagi 10 000000 5000000 00000001 000001 000 00000001 0 1 0000001 001 AP Access point An access point is any device that provides wireless connectivity for wireless clients In this case when you enable Wi Fi on your router your router becomes an access point
59. xplains how to configure OpenVPN which is implementation of VPN supported by the RUT500 router 43 VOU VUUUUVUU7 OU 4 111 00000001 0000001 10000001 00000 1 01000000101 10101010000000001 0 000 0 0 00001 1010 0000000 00000001 000001 000 00000001 0 1 0000001 000 aa 10 COUOT TOR OpenVPN OpenVPN instances Below is a list of configured OpenVPN instances and their current state Tunnel Name Tun Tap Protocol Port Status This section contains no values yet Role Client New configuration name Add New A picture above demonstrates default OpenVPN configurations list which is empty so you have to define a new configuration to establish any sort of OpenVPN connection To create it enter desired configuration name in New configuration name field select device role from Role drop down list For example to create a OpenVPN client with configuration name Demo select client role name it Demo and press Add New button as shown in the following picture Role Client l Mew configuration name Demo Add New A new configuration entry has appeared in the list and it is populated with default OpenVPN client settings Tunnel Name Tun Tap Protocol Port Status client_Demo 1194 Disabled Edit Delete You could select a server in previous step to create server default configuration To see at specific configuration settings press edit button located in newly created configuration entry A new page with de
60. y requirements The device is intended for supply from a Limited Power Source LPS that power consumption should not exceed 15VA and current rating of overcurrent protective device should not exceed 2A The highest transient overvoltage in the output secondary circuit of used PSU shall not exceed 71V peak The device can be used with the Personal Computer first safety class or Notebook second safety class Associated equipment PSU power supply unit LPS and personal computer PC shall comply with the requirements of standard EN 60950 1 Do not mount or service the device during a thunderstorm To avoid mechanical damages to the device it is recommended to transport it packed in a damage proof pack Protection in primary circuits of associated PC and PSU LPS against short circuits and earth faults of associated PC shall be provided as part of the building installation gt gt epe To avoid mechanical damages to the device it is recommended to transport it packed in a damage proof pack While using the device it should be placed so that its indicating LEDs would be visible as they inform in which working mode the device is and if it has any working problems Protection against overcurrent short circuiting and earth faults should be provided as a part of the building installation Signal level of the device depends on the environment in which it is working In case the device starts working insufficiently please refer
Download Pdf Manuals
Related Search
Related Contents
Data Sheet - Embedded Systems Solutions Kolcraft G03S 9/08 User's Manual PDFファイル - 医薬品医療機器総合機構 Faber Egyzia Angolo User's Manual Samsung Galaxy Young 2 Duos manual de utilizador Copyright © All rights reserved.
Failed to retrieve file