<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.silbonetworks.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Wikisysop</id>
	<title>Silbo Networks - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.silbonetworks.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Wikisysop"/>
	<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php/Special:Contributions/Wikisysop"/>
	<updated>2026-04-04T00:29:03Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.41.1</generator>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=SILBO_Cellular_Router_%E2%80%93_NMS_User_Manual&amp;diff=2861</id>
		<title>SILBO Cellular Router – NMS User Manual</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=SILBO_Cellular_Router_%E2%80%93_NMS_User_Manual&amp;diff=2861"/>
		<updated>2025-07-31T04:34:30Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== 1.  Accessing NMS Webpage ==&lt;br /&gt;
&lt;br /&gt;
=== 1.1 Login page ===&lt;br /&gt;
Log in to the router by typing the proper “URL” in your browser with its username and password and the page is shown as Figure-1.1.&lt;br /&gt;
[[File:NMS_Login_page.png|Figure-1.1: Login Page|none|thumb|608x608px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 1.2 Home page ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once you key in the Username and Password, by default landing with the Home page, and the page is shown as Figure-1.2a &amp;amp; 1.2b.&lt;br /&gt;
&lt;br /&gt;
* Here, in the Home Page you can see all the information related to “Monitoring Status”, “Configuration Status”, “Device Models”, “Firmware Version” and “Network Administration”.&lt;br /&gt;
&lt;br /&gt;
* On the Top-Right corner, you have “Notifications” and “Admin” to change the Password / Logout&lt;br /&gt;
* On the Left-side, you have Network configurations, Users &amp;amp; Organizations, Geographical Information, Public Key Infrastructure, Network Monitoring, Firmware Management. [[File:NMS_Home_Page.png|thumb|608x608px|&#039;&#039;&#039;Figure-1.2a: Home Page&#039;&#039;&#039;|none]][[File:NMS_Home_Page_1.png|thumb|608x608px|&#039;&#039;&#039;Figure-1.2b: Home Page&#039;&#039;&#039;|none]]On the Left-side, you have Network configurations, Users &amp;amp; Organizations, Geographical Information, Public Key Infrastructure, Network Monitoring, Firmware Management.  &lt;br /&gt;
&lt;br /&gt;
= 2. Devices =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here all the Device related Network Configurations can be updated which are applicable for a specific Site device only.&lt;br /&gt;
&lt;br /&gt;
* Select option &#039;&#039;&#039;Devices&#039;&#039;&#039; on the left-side to navigate to Devices information.&lt;br /&gt;
&lt;br /&gt;
* You have an option to “Filter” on the Top, by default all the Filter options are “All”.&lt;br /&gt;
* Once the NMS is enabled in a device, you can see that Device / Site details as shown in Figure-2. [[File:Device_Details_Page.png|thumb|608x608px|&#039;&#039;&#039;Figure-2: Devices Details&#039;&#039;&#039;|none]]&lt;br /&gt;
&lt;br /&gt;
=== 2.1 Overview ===&lt;br /&gt;
&lt;br /&gt;
*Click on the device name to navigate to that device details as shown in Figure-2.1a.[[File:Device_Details_Page_Overview.png|none|thumb|608x608px|&#039;&#039;&#039;Figure-2.1a: Devices Details&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
* By default, the page will be shown with the Overview details for that device as shown in Figure-2.1b &amp;amp; 2.1c.&lt;br /&gt;
&lt;br /&gt;
* Generally, it’s not required to modify the configuration. If you want to modify any configuration in this page, update the details and click on “&#039;&#039;&#039;Save and continue editing&#039;&#039;&#039;” or “&#039;&#039;&#039;Save”&#039;&#039;&#039; button. [[File:Device Overview 3.png|none|thumb|608x608px|&#039;&#039;&#039;Figure-2.1b: Device Overview&#039;&#039;&#039;]][[File:Device Overview 4.png|alt=Figure-2.1c: Device Overview|none|thumb|608x608px|&#039;&#039;&#039;Figure-2.1c: Device Overview&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
=== 2.2 Status ===&lt;br /&gt;
&lt;br /&gt;
* Click on the “&#039;&#039;&#039;Status&#039;&#039;&#039;” Tab and the page as shown in Figure-2.2.&lt;br /&gt;
&lt;br /&gt;
* In this Status page, you can see the “SIM STATUS” of both SIM1 &amp;amp; SIM2, “CPU”, “RAM STATUS”, “STORAGE”, “INTERFACE STATUS” of Ethernets / Wi-Fi / Tunnel / SIM separately, “DHCP LEASES”, “NEIGHBORS” by scrolling up/down.[[File:Device Overview 5.png|alt=Figure-2.2: Device Status|none|thumb|608x608px|&#039;&#039;&#039;Figure-2.2: Device Status&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
=== 2.3 Charts ===&lt;br /&gt;
&lt;br /&gt;
* Click on the “&#039;&#039;&#039;Charts&#039;&#039;&#039;” Tab and the page as shown in Figure-2.3.&lt;br /&gt;
* You can choose the period of “1 day / 3 days / 1 week / 1 month / 1 year” for generating the Charts.&lt;br /&gt;
* Also, the Charts can be exported to .csv format by clicking on “&#039;&#039;&#039;export data&#039;&#039;&#039;” button.&lt;br /&gt;
* In this Charts page, you can see the Charts of “Up Time”, “Signal Strength”, “N/W Access Technology”, “Packet Loss”, “Traffic” of Ethernets / Wi-Fi / Tunnel / SIM separately, “Memory Usage”, “CPU Load”, “Disk Usage” by scrolling up/down.[[File:NMS Device Charts.png|alt=Figure-2.3: Device Charts|none|thumb|608x608px|&#039;&#039;&#039;Figure-2.3: Device Charts&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
=== 2.4 Configuration ===&lt;br /&gt;
&lt;br /&gt;
* Click on the “&#039;&#039;&#039;Configuration&#039;&#039;&#039;” Tab and the page as shown in Figure-2.4a.[[File:NMS Device Configuration.png|alt=Figure-2.4a: Device Configuration|none|thumb|608x608px|&#039;&#039;&#039;Figure-2.4a: Device Configuration&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
* Generally, it’s not required to modify the configurations for device specific. &lt;br /&gt;
&lt;br /&gt;
* By default, in the “Templates” section the “Invendis_Equipment” and “Invendis_Mqtt” is not enabled. If required to enable, click on the checkbox to enable it. But this configuration changes will be applicable for this device only.&lt;br /&gt;
* Once the checkbox is ticked , the related details will show under “Configuration Variables” section and if multiple checkboxes are ticked  at a time, then it shows one after the other as shown in the Figure-2.4b.&lt;br /&gt;
* Click on “&#039;&#039;&#039;Save and continue editing&#039;&#039;&#039;” or “&#039;&#039;&#039;Save”&#039;&#039;&#039; button once the details are updated. [[File:NMS Device Configuration Configiration Variable.png|alt=Figure-2.4b: Device Configuration|none|thumb|608x608px|&#039;&#039;&#039;Figure-2.4b: Device Configuration&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
=== 2.5 Map ===&lt;br /&gt;
&lt;br /&gt;
* Click on the “&#039;&#039;&#039;Map&#039;&#039;&#039;” Tab and the page as shown in Figure-2.5.&lt;br /&gt;
* Choose the Type from drop-down and enter the Site location name and Address details to update the location.&lt;br /&gt;
* Click on “&#039;&#039;&#039;Save and continue editing&#039;&#039;&#039;” or “&#039;&#039;&#039;Save”&#039;&#039;&#039; button once the details are updated.[[File:Device Map.png|alt=Figure-2.5: Device Map|none|thumb|608x608px|&#039;&#039;&#039;Figure-2.5: Device Map&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
=== 2.6 Credentials ===&lt;br /&gt;
&lt;br /&gt;
* Click on the “&#039;&#039;&#039;Credentials&#039;&#039;&#039;” Tab and the page as shown in Figure-2.6.[[File:NMS Device Credentials .png|alt=Figure-2.6: Device Credentials|none|thumb|608x608px|&#039;&#039;&#039;Figure-2.6: Device Credentials&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
=== 2.7 Firmware ===&lt;br /&gt;
&lt;br /&gt;
* Click on the “&#039;&#039;&#039;Firmware&#039;&#039;&#039;” Tab as shown in Figure-2.7a.[[File:NMS Device Firmware.png|alt=Figure-2.7a: Device Firmware|none|thumb|608x608px|&#039;&#039;&#039;Figure-2.7a: Device Firmware&#039;&#039;&#039;]]&lt;br /&gt;
* Click on the “+Add Another Firmware” and choose the proper image to upload as shown in Figure-2.7b.[[File:NMS Device Firmware 2.png|alt=Figure-2.7b: Device Firmware Image|none|thumb|608x608px|&#039;&#039;&#039;Figure-2.7b: Device Firmware Image&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
=== 2.8 Checks ===&lt;br /&gt;
&lt;br /&gt;
* Click on the “&#039;&#039;&#039;Checks&#039;&#039;&#039;” Tab as shown in Figure-2.8.&lt;br /&gt;
&lt;br /&gt;
* In this page, you can see the “Ping” and “Configuration Applied” Checks.[[File:NMS Device Checks.png|alt=Figure-2.8: Device Checks|none|thumb|608x608px|&#039;&#039;&#039;Figure-2.8: Device Checks&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
=== 2.9 Alert Settings ===&lt;br /&gt;
&lt;br /&gt;
* Click on the “&#039;&#039;&#039;Alert Settings&#039;&#039;&#039;” Tab as shown in Figure-2.9.&lt;br /&gt;
* By default, all the Alert Settings are Enabled for “Configuration Applied”, “Memory Usage”, “Disk Usage”, “Ping”, “CPU Usage”.&lt;br /&gt;
* You can modify the threshold values for generating Alerts.&lt;br /&gt;
* Click on “&#039;&#039;&#039;Save and continue editing&#039;&#039;&#039;” or “&#039;&#039;&#039;Save”&#039;&#039;&#039; button once the details are updated.[[File:NMS Device Alert Settings.png|alt=Figure-2.9: Device Alert Settings|none|thumb|608x608px|&#039;&#039;&#039;Figure-2.9: Device Alert Settings&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
=== 2.10 Silence Notifications ===&lt;br /&gt;
&lt;br /&gt;
* Click on the “&#039;&#039;&#039;Silence Notifications&#039;&#039;&#039;” button and choose the option for how long notifications should be disabled either 1 Day / 1 Week / 1 Month / Permanently as shown in Figure-2.10.[[File:NMS Silence Notifications.png|alt=Figure-2.10: Silence Notifications|none|thumb|608x608px|&#039;&#039;&#039;Figure-2.10: Silence Notifications&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
=== 2.11 Send Command ===&lt;br /&gt;
&lt;br /&gt;
* Click on the “&#039;&#039;&#039;Send Command&#039;&#039;&#039;” button and choose the option “Custom” / “Reboot” / “Change Password” to execute those commands as shown in Figure-2.11.[[File:NMS Send Command .png|alt=Figure-2.11: Send Command|none|thumb|608x608px|&#039;&#039;&#039;Figure-2.11: Send Command&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
= 3. Configurations =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here the Network Configurations can be updated which are applicable for all Site devices.&lt;br /&gt;
&lt;br /&gt;
=== 3.1 Templates ===&lt;br /&gt;
&lt;br /&gt;
* Navigate to &#039;&#039;&#039;Configurations&#039;&#039;&#039; and Select option &#039;&#039;&#039;Templates&#039;&#039;&#039; on the left-hand side.&lt;br /&gt;
* The Templates page looks as shown in Figure-3.1.&lt;br /&gt;
* By default, the “Invendis_ClientVPN” and “SSH Keys” Templates are enabled while setting up the NMS Server.[[File:NMS Templates.png|alt=Figure-3.1: Templates|none|thumb|608x608px|&#039;&#039;&#039;Figure-3.1: Templates&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
==== 3.1.1  Creating New Template ====&lt;br /&gt;
&lt;br /&gt;
* Click on the “+ADD TEMPLATE” button on the right-hand side as shown in Figure-3.1.1.&lt;br /&gt;
* Click the checkbox þ to Enable and by scrolling down update the “configuration variables” details.&lt;br /&gt;
* Click on “&#039;&#039;&#039;Save and continue editing&#039;&#039;&#039;” or “&#039;&#039;&#039;Save”&#039;&#039;&#039; button once the details are updated.&lt;br /&gt;
&lt;br /&gt;
[[File:NMS Add Template.png|alt=Figure-3.1.1: Add Template|none|thumb|608x608px|&#039;&#039;&#039;Figure-3.1.1: Add Template&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 3.1.2 Editing Existing Template ===&lt;br /&gt;
&lt;br /&gt;
* Click on the Name to edit the configurations as shown in Figure-3.1.2a.[[File:NMS Edit Template.png|alt=Figure-3.1.2a: Edit Template|none|thumb|608x608px|&#039;&#039;&#039;Figure-3.1.2a: Edit Template&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
* Click on the “Invendis_Equipment” / “Invendis_Mqtt” Name to edit the configurations.&lt;br /&gt;
* Click the checkbox þ to Enable and by scrolling down update the “configuration variables” details as shown in Figure-3.1.2b &amp;amp; 3.1.2c.&lt;br /&gt;
* Click on “&#039;&#039;&#039;Save and continue editing&#039;&#039;&#039;” or “&#039;&#039;&#039;Save”&#039;&#039;&#039; button once the details are updated.[[File:NMS Enable Template.png|alt=Figure-3.1.2b: Enable Template|none|thumb|608x608px|&#039;&#039;&#039;Figure-3.1.2b: Enable Template&#039;&#039;&#039;]][[File:NMS Template configurations..png|alt=Figure-3.1.2c: Template configurations.|none|thumb|608x608px|&#039;&#039;&#039;Figure-3.1.2c: Template configurations.&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
= 4.Users &amp;amp; Organizations =&lt;br /&gt;
Here the Users &amp;amp; Organizations can be updated which are applicable for all the Users and Organizations.&lt;br /&gt;
&lt;br /&gt;
=== 4.1 Users ===&lt;br /&gt;
&lt;br /&gt;
* Navigate to &#039;&#039;&#039;Users &amp;amp; Organizations&#039;&#039;&#039; and Select option &#039;&#039;&#039;Users&#039;&#039;&#039; on the left-hand side.&lt;br /&gt;
* The Users page looks as shown in the below screenshot.&lt;br /&gt;
* By default, the “admin” Username is enabled while setting up the NMS Server.[[File:NMS User Details.png|alt=Figure-4.1: User Details|none|thumb|608x608px|&#039;&#039;&#039;Figure-4.1: User Details&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
==== 4.1.1 Creating New User ====&lt;br /&gt;
&lt;br /&gt;
* Click on the “+ADD USER” button on the right-hand side.&lt;br /&gt;
* Enter the configuration details such as Username, Email, Password and Personal Info if you needed.&lt;br /&gt;
* Then you need to give permissions as a “Staff” or “Superuser” or both it depends on your User by selecting those checkboxes þ. In Groups select Operator or Administrator or both based on permissions granted to each of their groups as shown in Figure-4.1.1a.&lt;br /&gt;
* After selecting Groups, select Organization in drop-down menu that this New User belongs to which Organization as shown in Figure-4.1.1b.&lt;br /&gt;
* Click on “&#039;&#039;&#039;Save and continue editing&#039;&#039;&#039;” or “&#039;&#039;&#039;Save”&#039;&#039;&#039; button.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note:&#039;&#039;&#039; “Superuser” permission is not recommended other than “Admin” user.&lt;br /&gt;
[[File:NMS Add User Permissions.png|alt=Figure-4.1.1a: Add User Permissions|none|thumb|608x608px|&#039;&#039;&#039;Figure-4.1.1a: Add User Permissions&#039;&#039;&#039;]]&lt;br /&gt;
[[File:NMS Add User Organization.png|alt=Figure-4.1.1b: Add User Organization|none|thumb|608x608px|&#039;&#039;&#039;Figure-4.1.1b: Add User Organization&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
==== 4.1.2 Editing Existing User ====&lt;br /&gt;
&lt;br /&gt;
* Generally, it’s not required to modify the configurations. If required, click on the “admin” Name to edit the configurations.&lt;br /&gt;
* Update the configuration details as shown in Figure-4.1.2.&lt;br /&gt;
* Click on “&#039;&#039;&#039;Save and continue editing&#039;&#039;&#039;” or “&#039;&#039;&#039;Save”&#039;&#039;&#039; button.[[File:NMS Edith User Details.png|alt=Figure-4.1.2: Edit User Details|none|thumb|608x608px|&#039;&#039;&#039;Figure-4.1.2: Edit User Details&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
=== 4.2 Organizations ===&lt;br /&gt;
&lt;br /&gt;
* Navigate to &#039;&#039;&#039;Users &amp;amp; Organizations&#039;&#039;&#039; and Select option &#039;&#039;&#039;Organizations&#039;&#039;&#039; on the left-hand side.&lt;br /&gt;
* The Organizations page looks as shown in Figure-4.2.[[File:NMS Organizations.png|alt=Figure-4.2: Organizations|none|thumb|608x608px|&#039;&#039;&#039;Figure-4.2: Organizations&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
=== 4.2.1 Creating New Organization ===&lt;br /&gt;
&lt;br /&gt;
* Click on the “+ADD ORGANIZATION” button on the right-hand side.&lt;br /&gt;
* Enter the configuration details such as New_CustomerName, Email_ID and leave the rest of the things as it is and make a note of Shared secret key generated for New Organization as shown in Figure-4.2.1a &amp;amp; 4.2.1b.&lt;br /&gt;
* Click on “&#039;&#039;&#039;Save and continue editing&#039;&#039;&#039;” or “&#039;&#039;&#039;Save”&#039;&#039;&#039; button.[[File:NMS Add Organization.png|alt=Figure-4.2.1a: Add Organization|none|thumb|608x608px|&#039;&#039;&#039;Figure-4.2.1a: Add Organization&#039;&#039;&#039;]][[File:NMS Note Organization Secret Key.png|alt=Figure-4.2.1b: Note Organization Secret Key|none|thumb|608x608px|&#039;&#039;&#039;Figure-4.2.1b: Note Organization Secret Key&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
==== 4.2.2 Edit Existing Organization ====&lt;br /&gt;
&lt;br /&gt;
* Click on the “Name” Name to edit the configurations.&lt;br /&gt;
* Update the configuration details as shown in Figure-4.2.2.&lt;br /&gt;
* Click on “&#039;&#039;&#039;Save and continue editing&#039;&#039;&#039;” or “&#039;&#039;&#039;Save”&#039;&#039;&#039; button.[[File:NMS Edit Organization.png|alt=Figure-4.2.2: Edit Organization|none|thumb|608x608px|&#039;&#039;&#039;Figure-4.2.2: Edit Organization&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
=== 4.3 Organization Owners ===&lt;br /&gt;
&lt;br /&gt;
* Navigate to &#039;&#039;&#039;Users &amp;amp; Organizations&#039;&#039;&#039; and Select option &#039;&#039;&#039;Organization Owners&#039;&#039;&#039; on the left-hand side.&lt;br /&gt;
* The Organization Owners page looks as shown in Figure-4.3.[[File:NMS Organization Owners.png|alt=Figure-4.3: Organization Owners|none|thumb|608x608px|&#039;&#039;&#039;Figure-4.3: Organization Owners&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
==== 4.3.1 Creating New Organization Owner ====&lt;br /&gt;
&lt;br /&gt;
* Click on the “+ADD ORGANIZATION OWNER” button on the right-hand side.&lt;br /&gt;
* Enter the configuration details such as New_Organization_UserName, Organization as shown in Figure-4.3.1.&lt;br /&gt;
* Click on “&#039;&#039;&#039;Save and continue editing&#039;&#039;&#039;” or “&#039;&#039;&#039;Save”&#039;&#039;&#039; button.[[File:NMS Add Organization Owner.png|alt=Figure-4.3.1: Add Organization Owner|none|thumb|608x608px|&#039;&#039;&#039;Figure-4.3.1: Add Organization Owner&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
==== 4.3.2 Edit Existing Organization Owner ====&lt;br /&gt;
&lt;br /&gt;
* Click on the “GET USER” Name to edit the configurations.&lt;br /&gt;
* Update the configuration details as shown in Figure-4.3.2.&lt;br /&gt;
* Click on “&#039;&#039;&#039;Save and continue editing&#039;&#039;&#039;” or “&#039;&#039;&#039;Save”&#039;&#039;&#039; button.[[File:NMS Edit Organization Owner.png|alt=Figure-4.3.2: Edit Organization Owner|none|thumb|608x608px|&#039;&#039;&#039;Figure-4.3.2: Edit Organization Owner&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
=== 4.4 Groups and Permissions ===&lt;br /&gt;
&lt;br /&gt;
* Navigate to &#039;&#039;&#039;Users &amp;amp; Organizations&#039;&#039;&#039; and Select option &#039;&#039;&#039;Groups &amp;amp; Permissions&#039;&#039;&#039; on the left-hand side.&lt;br /&gt;
* The Groups &amp;amp; Permissions page looks as shown in Figure-4.4.[[File:NMS Groups &amp;amp; Permissions.png|alt=Figure-4.4: Groups &amp;amp; Permissions|none|thumb|608x608px|&#039;&#039;&#039;Figure-4.4: Groups &amp;amp; Permissions&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
==== 4.4.1 Creating New Group ====&lt;br /&gt;
&lt;br /&gt;
* Click on the “+ADD GROUP” button on the right-hand side.&lt;br /&gt;
* Enter the configuration details such as Name and choose the available permissions you need for this Group as shown in Figure-4.4.1.&lt;br /&gt;
* Click on “&#039;&#039;&#039;Save and continue editing&#039;&#039;&#039;” or “&#039;&#039;&#039;Save”&#039;&#039;&#039; button.[[File:NMS Add Group.png|alt=Figure-4.4.1: Add Group|none|thumb|608x608px|&#039;&#039;&#039;Figure-4.4.1: Add Group&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
==== 4.4.2 Edit Existing Group ====&lt;br /&gt;
&lt;br /&gt;
* Click on the “Group” Name to edit the configurations.&lt;br /&gt;
* Update the configuration details as shown in Figure-4.4.2.&lt;br /&gt;
* Click on “&#039;&#039;&#039;Save and continue editing&#039;&#039;&#039;” or “&#039;&#039;&#039;Save”&#039;&#039;&#039; button.[[File:NMS Edit Existing Group.png|alt=Figure-4.4.2: Edit Group|none|thumb|608x608px|&#039;&#039;&#039;Figure-4.4.2: Edit Group&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
= 5. Geographic Info =&lt;br /&gt;
Here the Geographical Information can be updated which are applicable for all Site devices.&lt;br /&gt;
&lt;br /&gt;
=== 5.1 Locations ===&lt;br /&gt;
&lt;br /&gt;
* Navigate to &#039;&#039;&#039;Geographic Info&#039;&#039;&#039; and Select option &#039;&#039;&#039;Locations&#039;&#039;&#039; on the left-hand side.&lt;br /&gt;
* The Locations page looks as shown in Figure-5.1.[[File:NMS Locations.png|alt=Figure-5.1: Locations|none|thumb|608x608px|&#039;&#039;&#039;Figure-5.1: Locations&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
==== 5.1.1 Adding New Location ====&lt;br /&gt;
&lt;br /&gt;
* Click on the “+ADD LOCATION” button on the right-hand side.&lt;br /&gt;
* Enter the configuration details such as Organization, Name, Type, Address as shown in Figure-5.1.1.&lt;br /&gt;
* Click on “&#039;&#039;&#039;Save and continue editing&#039;&#039;&#039;” or “&#039;&#039;&#039;Save”&#039;&#039;&#039; button.[[File:NMS Add Location.png|alt=Figure-5.1.1: Add Location|none|thumb|608x608px|&#039;&#039;&#039;Figure-5.1.1: Add Location&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
==== 5.1.2 Edit Existing Location ====&lt;br /&gt;
&lt;br /&gt;
* Click on the “Name” to edit the configurations.&lt;br /&gt;
* Update the configuration details as shown in Figure-5.1.2.&lt;br /&gt;
* Click on “&#039;&#039;&#039;Save and continue editing&#039;&#039;&#039;” or “&#039;&#039;&#039;Save”&#039;&#039;&#039; button.[[File:NMS Edit Location Details.png|alt=Figure-5.1.2: Edit Location Details|none|thumb|608x608px|&#039;&#039;&#039;Figure-5.1.2: Edit Location Details&#039;&#039;&#039;]]&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=Main_Page&amp;diff=2860</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=Main_Page&amp;diff=2860"/>
		<updated>2025-05-22T10:29:58Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;strong&amp;gt;Welcome to the SILBO Networks Wiki!&amp;lt;/strong&amp;gt; Here you will find all technical information resources related to SILBO-Networks products.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;main-table w-100&amp;quot; style=&amp;quot;height:auto; width:100%;&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
| style=&amp;quot;height:5%; width:auto; text-align:left; vertical-align:center; margin: 0 auto;&amp;quot; |&lt;br /&gt;
{|style=&amp;quot;width:60%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!Routers&lt;br /&gt;
!Gateways&lt;br /&gt;
!Protocol Convertors&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RB44]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44-3]]&#039;&#039;&#039;&lt;br /&gt;
|[[PC312|&#039;&#039;&#039;PC312-P&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RC44-P]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44-5]]&#039;&#039;&#039;&lt;br /&gt;
|[[PC312|&#039;&#039;&#039;PC312-M&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RC44-M]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44B-5R]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-B]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RD44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RD44-3]]&#039;&#039;&#039;&lt;br /&gt;
|[[IAB44 B|&#039;&#039;&#039;IAB44-B&#039;&#039;&#039;]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RS5X]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAB44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RV54]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAC44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RV00]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAC44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
----&lt;br /&gt;
{| class=&amp;quot;main-table w-100&amp;quot; style=&amp;quot;height:auto; width:100%;&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
| style=&amp;quot;height:5%; width:18%; text-align:left; vertical-align: center; font-weight:400; margin: 0 auto;&amp;quot; |&lt;br /&gt;
{|style=&amp;quot;width: 100%&amp;quot;&lt;br /&gt;
![[Configuration Manuals]]&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
![[Packages]]&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=Main_Page&amp;diff=2859</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=Main_Page&amp;diff=2859"/>
		<updated>2025-05-22T10:29:42Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;strong&amp;gt;Welcome to the SILBO Networks Wiki!&amp;lt;/strong&amp;gt; Here you will find all technical information resources related to SILBO-Networks products.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;main-table w-100&amp;quot; style=&amp;quot;height:auto; width:100%;&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
| style=&amp;quot;height:5%; width:auto; text-align:left; vertical-align:center; margin: 0 auto;&amp;quot; |&lt;br /&gt;
{|style=&amp;quot;width:50%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!Routers&lt;br /&gt;
!Gateways&lt;br /&gt;
!Protocol Convertors&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RB44]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44-3]]&#039;&#039;&#039;&lt;br /&gt;
|[[PC312|&#039;&#039;&#039;PC312-P&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RC44-P]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44-5]]&#039;&#039;&#039;&lt;br /&gt;
|[[PC312|&#039;&#039;&#039;PC312-M&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RC44-M]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44B-5R]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-B]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RD44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RD44-3]]&#039;&#039;&#039;&lt;br /&gt;
|[[IAB44 B|&#039;&#039;&#039;IAB44-B&#039;&#039;&#039;]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RS5X]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAB44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RV54]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAC44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RV00]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAC44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
----&lt;br /&gt;
{| class=&amp;quot;main-table w-100&amp;quot; style=&amp;quot;height:auto; width:100%;&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
| style=&amp;quot;height:5%; width:18%; text-align:left; vertical-align: center; font-weight:400; margin: 0 auto;&amp;quot; |&lt;br /&gt;
{|style=&amp;quot;width: 100%&amp;quot;&lt;br /&gt;
![[Configuration Manuals]]&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
![[Packages]]&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=Main_Page&amp;diff=2858</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=Main_Page&amp;diff=2858"/>
		<updated>2025-05-22T10:28:25Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;strong&amp;gt;Welcome to the SILBO Networks Wiki!&amp;lt;/strong&amp;gt; Here you will find all technical information resources related to SILBO-Networks products.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;main-table w-100&amp;quot; style=&amp;quot;height:auto; width:100%;&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
| style=&amp;quot;height:5%; width:5%; text-align:left; vertical-align:center; margin: 10% 10%;&amp;quot; |&lt;br /&gt;
{|style=&amp;quot;width:40%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!Routers&lt;br /&gt;
!Gateways&lt;br /&gt;
!Protocol Convertors&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RB44]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44-3]]&#039;&#039;&#039;&lt;br /&gt;
|[[PC312|&#039;&#039;&#039;PC312-P&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RC44-P]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44-5]]&#039;&#039;&#039;&lt;br /&gt;
|[[PC312|&#039;&#039;&#039;PC312-M&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RC44-M]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44B-5R]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-B]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RD44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RD44-3]]&#039;&#039;&#039;&lt;br /&gt;
|[[IAB44 B|&#039;&#039;&#039;IAB44-B&#039;&#039;&#039;]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RS5X]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAB44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RV54]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAC44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RV00]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAC44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
----&lt;br /&gt;
{| class=&amp;quot;main-table w-100&amp;quot; style=&amp;quot;height:auto; width:100%;&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
| style=&amp;quot;height:5%; width:18%; text-align:left; vertical-align: center; font-weight:400; margin: 0 auto;&amp;quot; |&lt;br /&gt;
{|style=&amp;quot;width: 100%&amp;quot;&lt;br /&gt;
![[Configuration Manuals]]&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
![[Packages]]&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=Main_Page&amp;diff=2857</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=Main_Page&amp;diff=2857"/>
		<updated>2025-05-22T10:28:05Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;strong&amp;gt;Welcome to the SILBO Networks Wiki!&amp;lt;/strong&amp;gt; Here you will find all technical information resources related to SILBO-Networks products.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;main-table w-100&amp;quot; style=&amp;quot;height:auto; width:100%;&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
| style=&amp;quot;height:5%; width:5%; text-align:left; vertical-align:center; margin: 10% auto;&amp;quot; |&lt;br /&gt;
{|style=&amp;quot;width:40%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!Routers&lt;br /&gt;
!Gateways&lt;br /&gt;
!Protocol Convertors&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RB44]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44-3]]&#039;&#039;&#039;&lt;br /&gt;
|[[PC312|&#039;&#039;&#039;PC312-P&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RC44-P]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44-5]]&#039;&#039;&#039;&lt;br /&gt;
|[[PC312|&#039;&#039;&#039;PC312-M&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RC44-M]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44B-5R]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-B]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RD44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RD44-3]]&#039;&#039;&#039;&lt;br /&gt;
|[[IAB44 B|&#039;&#039;&#039;IAB44-B&#039;&#039;&#039;]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RS5X]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAB44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RV54]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAC44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RV00]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAC44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
----&lt;br /&gt;
{| class=&amp;quot;main-table w-100&amp;quot; style=&amp;quot;height:auto; width:100%;&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
| style=&amp;quot;height:5%; width:18%; text-align:left; vertical-align: center; font-weight:400; margin: 0 auto;&amp;quot; |&lt;br /&gt;
{|style=&amp;quot;width: 100%&amp;quot;&lt;br /&gt;
![[Configuration Manuals]]&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
![[Packages]]&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=Main_Page&amp;diff=2856</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=Main_Page&amp;diff=2856"/>
		<updated>2025-05-22T10:27:10Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;strong&amp;gt;Welcome to the SILBO Networks Wiki!&amp;lt;/strong&amp;gt; Here you will find all technical information resources related to SILBO-Networks products.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;main-table w-100&amp;quot; style=&amp;quot;height:auto; width:100%;&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
| style=&amp;quot;height:5%; width:5%; text-align:left; vertical-align:center; margin: 0 auto;&amp;quot; |&lt;br /&gt;
{|style=&amp;quot;width:40%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!Routers&lt;br /&gt;
!Gateways&lt;br /&gt;
!Protocol Convertors&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RB44]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44-3]]&#039;&#039;&#039;&lt;br /&gt;
|[[PC312|&#039;&#039;&#039;PC312-P&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RC44-P]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44-5]]&#039;&#039;&#039;&lt;br /&gt;
|[[PC312|&#039;&#039;&#039;PC312-M&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RC44-M]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44B-5R]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-B]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RD44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RD44-3]]&#039;&#039;&#039;&lt;br /&gt;
|[[IAB44 B|&#039;&#039;&#039;IAB44-B&#039;&#039;&#039;]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RS5X]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAB44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RV54]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAC44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RV00]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAC44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
----&lt;br /&gt;
{| class=&amp;quot;main-table w-100&amp;quot; style=&amp;quot;height:auto; width:100%;&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
| style=&amp;quot;height:5%; width:18%; text-align:left; vertical-align: center; font-weight:400; margin: 0 auto;&amp;quot; |&lt;br /&gt;
{|style=&amp;quot;width: 100%&amp;quot;&lt;br /&gt;
![[Configuration Manuals]]&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
![[Packages]]&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=Main_Page&amp;diff=2855</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=Main_Page&amp;diff=2855"/>
		<updated>2025-05-22T10:26:21Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;strong&amp;gt;Welcome to the SILBO Networks Wiki!&amp;lt;/strong&amp;gt; Here you will find all technical information resources related to SILBO-Networks products.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;main-table w-100&amp;quot; style=&amp;quot;height:auto; width:90%;&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
| style=&amp;quot;height:5%; width:5%; text-align:left; vertical-align:center; margin: 0 auto;&amp;quot; |&lt;br /&gt;
{|style=&amp;quot;width:40%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!Routers&lt;br /&gt;
!Gateways&lt;br /&gt;
!Protocol Convertors&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RB44]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44-3]]&#039;&#039;&#039;&lt;br /&gt;
|[[PC312|&#039;&#039;&#039;PC312-P&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RC44-P]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44-5]]&#039;&#039;&#039;&lt;br /&gt;
|[[PC312|&#039;&#039;&#039;PC312-M&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RC44-M]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44B-5R]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-B]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RD44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RD44-3]]&#039;&#039;&#039;&lt;br /&gt;
|[[IAB44 B|&#039;&#039;&#039;IAB44-B&#039;&#039;&#039;]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RS5X]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAB44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RV54]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAC44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RV00]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAC44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
----&lt;br /&gt;
{| class=&amp;quot;main-table w-100&amp;quot; style=&amp;quot;height:auto; width:100%;&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
| style=&amp;quot;height:5%; width:18%; text-align:left; vertical-align: center; font-weight:400; margin: 0 auto;&amp;quot; |&lt;br /&gt;
{|style=&amp;quot;width: 100%&amp;quot;&lt;br /&gt;
![[Configuration Manuals]]&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
![[Packages]]&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=Main_Page&amp;diff=2854</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=Main_Page&amp;diff=2854"/>
		<updated>2025-05-22T10:25:52Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;strong&amp;gt;Welcome to the SILBO Networks Wiki!&amp;lt;/strong&amp;gt; Here you will find all technical information resources related to SILBO-Networks products.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;main-table w-100&amp;quot; style=&amp;quot;height:auto; width:90%;&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
| style=&amp;quot;height:5%; width:auto; text-align:left; vertical-align:center; margin: 0 auto;&amp;quot; |&lt;br /&gt;
{|style=&amp;quot;width:40%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!Routers&lt;br /&gt;
!Gateways&lt;br /&gt;
!Protocol Convertors&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RB44]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44-3]]&#039;&#039;&#039;&lt;br /&gt;
|[[PC312|&#039;&#039;&#039;PC312-P&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RC44-P]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44-5]]&#039;&#039;&#039;&lt;br /&gt;
|[[PC312|&#039;&#039;&#039;PC312-M&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RC44-M]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44B-5R]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-B]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RD44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RD44-3]]&#039;&#039;&#039;&lt;br /&gt;
|[[IAB44 B|&#039;&#039;&#039;IAB44-B&#039;&#039;&#039;]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RS5X]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAB44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RV54]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAC44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RV00]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAC44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
----&lt;br /&gt;
{| class=&amp;quot;main-table w-100&amp;quot; style=&amp;quot;height:auto; width:100%;&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
| style=&amp;quot;height:5%; width:18%; text-align:left; vertical-align: center; font-weight:400; margin: 0 auto;&amp;quot; |&lt;br /&gt;
{|style=&amp;quot;width: 100%&amp;quot;&lt;br /&gt;
![[Configuration Manuals]]&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
![[Packages]]&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=Main_Page&amp;diff=2853</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=Main_Page&amp;diff=2853"/>
		<updated>2025-04-30T12:36:41Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;strong&amp;gt;Welcome to the SILBO Networks Wiki!&amp;lt;/strong&amp;gt; Here you will find all technical information resources related to SILBO-Networks products.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;main-table w-100&amp;quot; style=&amp;quot;height:auto; width:90%;&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
| style=&amp;quot;height:5%; width:auto; text-align:center; vertical-align:center; margin: 0 auto;&amp;quot; |&lt;br /&gt;
{|style=&amp;quot;width:40%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!Routers&lt;br /&gt;
!Gateways&lt;br /&gt;
!Protocol Convertors&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RB44]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44-3]]&#039;&#039;&#039;&lt;br /&gt;
|[[PC312|&#039;&#039;&#039;PC312-P&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RC44-P]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44-5]]&#039;&#039;&#039;&lt;br /&gt;
|[[PC312|&#039;&#039;&#039;PC312-M&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RC44-M]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44B-5R]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-B]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RD44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RD44-3]]&#039;&#039;&#039;&lt;br /&gt;
|[[IAB44 B|&#039;&#039;&#039;IAB44-B&#039;&#039;&#039;]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RS5X]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAB44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RV54]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAC44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RV00]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAC44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
----&lt;br /&gt;
{| class=&amp;quot;main-table w-100&amp;quot; style=&amp;quot;height:auto; width:100%;&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
| style=&amp;quot;height:5%; width:18%; text-align:left; vertical-align: center; font-weight:400; margin: 0 auto;&amp;quot; |&lt;br /&gt;
{|style=&amp;quot;width: 100%&amp;quot;&lt;br /&gt;
![[Configuration Manuals]]&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
![[Packages]]&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=TCP_Slave_Package&amp;diff=2852</id>
		<title>TCP Slave Package</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=TCP_Slave_Package&amp;diff=2852"/>
		<updated>2025-04-30T12:31:40Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://silbonetworks.com/wp-content/uploads/Firmware/Packages/ModbusTCPSlave_1.01_mipsel_24kc.ipk ModbusTCPSlave_1.01_mipsel_24kc.ipk]&lt;br /&gt;
&lt;br /&gt;
This TCP Slave Package is compatible for below listed devices only&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;; style=&amp;quot;height:auto; width:auto;&amp;quot; text-align=left&lt;br /&gt;
|&#039;&#039;&#039;IA44-A&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;IA44-B&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;IA44-C&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;IAC44-C&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;IAB44-B&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;IAB44-C&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;GRD44B-5R&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
#&lt;br /&gt;
&#039;&#039;&#039;Checksum : c5f51683afab42c1b829bc96e0427000&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;size : 75474&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=TCP_Slave_Package&amp;diff=2851</id>
		<title>TCP Slave Package</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=TCP_Slave_Package&amp;diff=2851"/>
		<updated>2025-04-30T12:29:36Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://silbonetworks.com/wp-content/uploads/Firmware/Packages/ModbusTCPSlave_1.01_mipsel_24kc.ipk ModbusTCPSlave_1.01_mipsel_24kc.ipk]&lt;br /&gt;
&lt;br /&gt;
This TCP Slave Package is compatible for below listed devices only&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;; style=&amp;quot;height:auto; width:auto;&amp;quot; text-align=left&lt;br /&gt;
!IA44-A&lt;br /&gt;
!IA44-B&lt;br /&gt;
!IA44-C&lt;br /&gt;
!IAC44-C&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;IAB44-B&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;IAB44-C&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;GRD44B-5R&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
#&lt;br /&gt;
&#039;&#039;&#039;Checksum : c5f51683afab42c1b829bc96e0427000&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;size : 75474&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=TCP_Slave_Package&amp;diff=2850</id>
		<title>TCP Slave Package</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=TCP_Slave_Package&amp;diff=2850"/>
		<updated>2025-04-30T12:23:34Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://silbonetworks.com/wp-content/uploads/Firmware/Packages/ModbusTCPSlave_1.01_mipsel_24kc.ipk ModbusTCPSlave_1.01_mipsel_24kc.ipk]&lt;br /&gt;
&lt;br /&gt;
This TCP Slave Package is compatible for below listed devices only&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; text align:left;&lt;br /&gt;
!IA44-A&lt;br /&gt;
!IA44-B&lt;br /&gt;
!IA44-C&lt;br /&gt;
!IAC44-C&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;IAB44-B&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;IAB44-C&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;GRD44B-5R&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
#&lt;br /&gt;
&#039;&#039;&#039;Checksum : c5f51683afab42c1b829bc96e0427000&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;size : 75474&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=TCP_Slave_Package&amp;diff=2849</id>
		<title>TCP Slave Package</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=TCP_Slave_Package&amp;diff=2849"/>
		<updated>2025-04-30T12:22:29Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://silbonetworks.com/wp-content/uploads/Firmware/Packages/ModbusTCPSlave_1.01_mipsel_24kc.ipk ModbusTCPSlave_1.01_mipsel_24kc.ipk]&lt;br /&gt;
&lt;br /&gt;
This TCP Slave Package is compatible for below listed devices only&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; text align:left;&lt;br /&gt;
|+&lt;br /&gt;
!IA44-A&lt;br /&gt;
!IA44-B&lt;br /&gt;
!IA44-C&lt;br /&gt;
!IAC44-C&lt;br /&gt;
|-&lt;br /&gt;
|IAB44-B&lt;br /&gt;
|IAB44-C&lt;br /&gt;
|GRD44B-5R&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
#&lt;br /&gt;
&#039;&#039;&#039;Checksum : c5f51683afab42c1b829bc96e0427000&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;size : 75474&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=TCP_Slave_Package&amp;diff=2848</id>
		<title>TCP Slave Package</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=TCP_Slave_Package&amp;diff=2848"/>
		<updated>2025-04-30T12:19:41Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://silbonetworks.com/wp-content/uploads/Firmware/Packages/ModbusTCPSlave_1.01_mipsel_24kc.ipk ModbusTCPSlave_1.01_mipsel_24kc.ipk]&lt;br /&gt;
&lt;br /&gt;
This TCP Slave Package is compatible for below listed devices only&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!IA44-A&lt;br /&gt;
!IA44-B&lt;br /&gt;
!IA44-C&lt;br /&gt;
!IAC44-C&lt;br /&gt;
|-&lt;br /&gt;
|IAB44-B&lt;br /&gt;
|IAB44-C&lt;br /&gt;
|GRD44B-5R&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
#&lt;br /&gt;
&#039;&#039;&#039;Checksum : c5f51683afab42c1b829bc96e0427000&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;size : 75474&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=Main_Page&amp;diff=2847</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=Main_Page&amp;diff=2847"/>
		<updated>2025-04-30T12:14:14Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;strong&amp;gt;Welcome to the SILBO Networks Wiki!&amp;lt;/strong&amp;gt; Here you will find all technical information resources related to SILBO-Networks products.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;main-table w-100&amp;quot; style=&amp;quot;height:auto; width:90%;&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
| style=&amp;quot;height:5%; width:auto; text-align:center; vertical-align:center; margin: 0 auto;&amp;quot; |&lt;br /&gt;
{|style=&amp;quot;width:40%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!Routers&lt;br /&gt;
!Gateways&lt;br /&gt;
!Protocol Convertors&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RB44]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44-3]]&#039;&#039;&#039;&lt;br /&gt;
|[[PC312|&#039;&#039;&#039;PC312-P&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RC44-P]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44-5]]&#039;&#039;&#039;&lt;br /&gt;
|[[PC312|&#039;&#039;&#039;PC312-M&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RC44-M]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44B-5R]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-B]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RD44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RD44-3]]&#039;&#039;&#039;&lt;br /&gt;
|[[IAB44 B|&#039;&#039;&#039;IAB44-B&#039;&#039;&#039;]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RS5X]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAB44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RV54]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAC44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RV00]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAC44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
----&lt;br /&gt;
{| class=&amp;quot;main-table w-100&amp;quot; style=&amp;quot;height:auto; width:100%;&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
| style=&amp;quot;height:5%; width:18%; text-align:left; vertical-align: center; font-weight:400; margin: 0 auto;&amp;quot; |&lt;br /&gt;
{|style=&amp;quot;width: 100%&amp;quot;&lt;br /&gt;
!&#039;&#039;&#039;[[Configuration Manuals]]&#039;&#039;&#039;&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
![[Packages]]&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=Packages&amp;diff=2846</id>
		<title>Packages</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=Packages&amp;diff=2846"/>
		<updated>2025-04-30T12:13:25Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: Created page with &amp;quot;TCP Slave Package&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[TCP Slave Package]]&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=TCP_Slave_Package&amp;diff=2845</id>
		<title>TCP Slave Package</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=TCP_Slave_Package&amp;diff=2845"/>
		<updated>2025-04-30T12:12:47Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://silbonetworks.com/wp-content/uploads/Firmware/Packages/ModbusTCPSlave_1.01_mipsel_24kc.ipk ModbusTCPSlave_1.01_mipsel_24kc.ipk]&lt;br /&gt;
&lt;br /&gt;
This TCP Slave Package is compatible for below listed devices only&lt;br /&gt;
&lt;br /&gt;
# IA44-A&lt;br /&gt;
# IA44-B&lt;br /&gt;
# IA44-C&lt;br /&gt;
# IAC44-C&lt;br /&gt;
# IAB44-B&lt;br /&gt;
# IAB44-C&lt;br /&gt;
# GRD44B-5R&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=TCP_Slave_Package&amp;diff=2844</id>
		<title>TCP Slave Package</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=TCP_Slave_Package&amp;diff=2844"/>
		<updated>2025-04-30T12:09:57Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: Created page with &amp;quot;[https://silbonetworks.com/wp-content/uploads/Firmware/Packages/ModbusTCPSlave_1.01_mipsel_24kc.ipk ModbusTCPSlave_1.01_mipsel_24kc.ipk]&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://silbonetworks.com/wp-content/uploads/Firmware/Packages/ModbusTCPSlave_1.01_mipsel_24kc.ipk ModbusTCPSlave_1.01_mipsel_24kc.ipk]&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=Main_Page&amp;diff=2843</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=Main_Page&amp;diff=2843"/>
		<updated>2025-04-30T12:02:53Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;strong&amp;gt;Welcome to the SILBO Networks Wiki!&amp;lt;/strong&amp;gt; Here you will find all technical information resources related to SILBO-Networks products.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;main-table w-100&amp;quot; style=&amp;quot;height:auto; width:90%;&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
| style=&amp;quot;height:5%; width:auto; text-align:center; vertical-align:center; margin: 0 auto;&amp;quot; |&lt;br /&gt;
{|style=&amp;quot;width:40%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!Routers&lt;br /&gt;
!Gateways&lt;br /&gt;
!Protocol Convertors&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RB44]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44-3]]&#039;&#039;&#039;&lt;br /&gt;
|[[PC312|&#039;&#039;&#039;PC312-P&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RC44-P]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44-5]]&#039;&#039;&#039;&lt;br /&gt;
|[[PC312|&#039;&#039;&#039;PC312-M&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RC44-M]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[GRD44B-5R]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-B]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RD44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IA44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RD44-3]]&#039;&#039;&#039;&lt;br /&gt;
|[[IAB44 B|&#039;&#039;&#039;IAB44-B&#039;&#039;&#039;]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RS5X]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAB44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RV54]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAC44-A]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[RV00]]&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;[[IAC44-C]]&#039;&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
----&lt;br /&gt;
{| class=&amp;quot;main-table w-100&amp;quot; style=&amp;quot;height:auto; width:100%;&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
| style=&amp;quot;height:5%; width:18%; text-align:left; vertical-align: center; font-weight:400; margin: 0 auto;&amp;quot; |&lt;br /&gt;
{|style=&amp;quot;width: 100%&amp;quot;&lt;br /&gt;
!&#039;&#039;&#039;[[Configuration Manuals]]&#039;&#039;&#039;&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
!Packages&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=RS5X_User_Manual&amp;diff=2842</id>
		<title>RS5X User Manual</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=RS5X_User_Manual&amp;diff=2842"/>
		<updated>2025-04-28T12:10:07Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Connecting with the device to the System (Laptop/Desktop)&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
To log in to SILBO_RS5X by connecting the router to your laptop or desktop via LAN or using Wi-Fi, please follow the steps below. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Connecting via LAN:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Connect your laptop&#039;s LAN port to one of the router&#039;s LAN interfaces. Ensure that you select any LAN interface (there are 2 available) while making sure the WAN interface is not used. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to connect with the SILBO_RS5X application&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Once the LAN connection is established between the device and the laptop or the desktop &lt;br /&gt;
&lt;br /&gt;
Please open the command prompt and ping to get the IP config of that device. &lt;br /&gt;
&lt;br /&gt;
Type the command &#039;&#039;&#039;Ipconfig&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:How_to_connect_with_the_SILBO_RB44_application.png|alt=How to connect with the SILBO RB44 application|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
It will provide the Ip address/url of that device through which the application can be accessed.&lt;br /&gt;
&lt;br /&gt;
[[File:Connecting_via_LAN_RB44.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
== Log In ==&lt;br /&gt;
Open the web browser and type the IP address in the URL.&lt;br /&gt;
&lt;br /&gt;
It will show the log in page of the application.&lt;br /&gt;
&lt;br /&gt;
[[File:Log_In.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Give the valid credentials for the username and password to login to the application page.&lt;br /&gt;
&lt;br /&gt;
Once the user credentials are provided it will direct to the landing page of the application.&lt;br /&gt;
&lt;br /&gt;
       &lt;br /&gt;
&lt;br /&gt;
The “Status” landing page shows all the detailed specification of the device like system, memory storage and connection tracking etc.&lt;br /&gt;
&lt;br /&gt;
[[File:RS5X Dashboard.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
The application is divided in to 8 Modules.&lt;br /&gt;
&lt;br /&gt;
* Info&lt;br /&gt;
* Settings&lt;br /&gt;
* Maintenance&lt;br /&gt;
* Status&lt;br /&gt;
* Features&lt;br /&gt;
* Logout&lt;br /&gt;
&lt;br /&gt;
== 1. Info ==&lt;br /&gt;
The “Info” module provides the information about the devices to the user.&lt;br /&gt;
&lt;br /&gt;
It provides all the specification related to the hardware, firmware, Networks and the Connection uptimes.&lt;br /&gt;
&lt;br /&gt;
It has 3 submodules.&lt;br /&gt;
&lt;br /&gt;
* Overview&lt;br /&gt;
* System Log&lt;br /&gt;
* Kernel Log&lt;br /&gt;
&lt;br /&gt;
[[File:RS5X Info Section.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
=== 1.1 Overview ===&lt;br /&gt;
In overview module it displays all the specification categorically of a device like System, Memory, storage, Connection tracking, DHCP Lease.&lt;br /&gt;
&lt;br /&gt;
[[File:RS5X Dashboard.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;System:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this section it displays the hardware configured specification of the device.&lt;br /&gt;
&lt;br /&gt;
[[File:RS5X System Section .png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The specifications details are as follows,&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Hostname&lt;br /&gt;
|Silbo-RS&lt;br /&gt;
|This field  displays the router serial number of the device&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Model&lt;br /&gt;
|silbo-RS5X&lt;br /&gt;
|This field  displays the model number of the device&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Firmware Version  and IPK Version&lt;br /&gt;
|1.07_1.07-RC7&lt;br /&gt;
|This field  displays the firmware version and IPK version&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Kernel Version&lt;br /&gt;
|5.4.215&lt;br /&gt;
|This field  displays the kernel version of the device&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Local Time&lt;br /&gt;
|Monday, August 19, 2024 at 11:17:10 AM&lt;br /&gt;
|This field  displays the local time&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Uptime&lt;br /&gt;
|2d 12h 54m 23s&lt;br /&gt;
|This field  displays the uptime of the device&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Load Average&lt;br /&gt;
|0.36 0.37 0.33&lt;br /&gt;
|This field  displays the average load&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Memory:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this section it displays the memory configured specification of the device.&lt;br /&gt;
&lt;br /&gt;
[[File:IA44A_Memory.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are as follows.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Total Available&lt;br /&gt;
|68676 kB / 124208 kB (55%)&lt;br /&gt;
|This field  displays the  total availability of memory space in the device&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Free&lt;br /&gt;
|59344 kB / 124208 kB (47%)&lt;br /&gt;
|This field displays the  Free memory space in the device&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Cached&lt;br /&gt;
|312 kB / 124208 kB (0%)&lt;br /&gt;
|This field displays the  Cached memory space in the device&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Buffered&lt;br /&gt;
|9332 kB / 124208 kB (7%)&lt;br /&gt;
|This field displays the  Buffered memory space in the device&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Storage:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this section it displays the status of storage as root and temporary usage specification of the device.&lt;br /&gt;
&lt;br /&gt;
[[File:Storage_Section.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are as follows.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Root Usage&lt;br /&gt;
|796 kB / 15488 kB (5%)&lt;br /&gt;
|This field  displays the  total root usage of the device&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Temporary Usage&lt;br /&gt;
|312 kB / 62104 kB (0%)&lt;br /&gt;
|This field displays the total temporary usage  of the device&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Network:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this section you can check as to whether you are connected to IPV4 or IPV6 Network.&lt;br /&gt;
&lt;br /&gt;
Since this a 5G Module, both 4G and 5G Network can be latched.&lt;br /&gt;
&lt;br /&gt;
IPV4 = 4G Network&lt;br /&gt;
&lt;br /&gt;
IPV6 = 5G Network&lt;br /&gt;
&lt;br /&gt;
[[File:IPV4 4G Network.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
[[File:IPV6 5G Network.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Connection Tracking:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this section it displays the status of connection tracking for the device.&lt;br /&gt;
&lt;br /&gt;
[[File:Connection_Tracking.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are as follows.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Value&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Active  Connections&lt;br /&gt;
|48/16384  (0%)&lt;br /&gt;
|This field displays the active  connection of the device.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;DHCP Leases:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this section it displays the DHCP lease of the temporary assignment of an IP address to a device on the network.&lt;br /&gt;
&lt;br /&gt;
[[File:IAB44C_DHCP_Leases.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are below.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Host Name&lt;br /&gt;
|KermaniK-LT&lt;br /&gt;
|This field displays the configured Host Name/Username for that  device.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|IPv4-Address&lt;br /&gt;
|192.168.10.147&lt;br /&gt;
|This field displays the IP address of the device.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|MAC-Address&lt;br /&gt;
|34:73:5a:bb: ab:7a&lt;br /&gt;
|This field displays the MAC-Address of the device.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Lease time remaining&lt;br /&gt;
|11h 53m 49s&lt;br /&gt;
|This field displays the lease time remaining for the device.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== 1.2 System Log ===&lt;br /&gt;
This page provides on screen System logging information. In this page the user gets to view the system logs.[[File:System_Log.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
=== 1.3 Kernel Log ===&lt;br /&gt;
This page provides on screen Kernel logging information.&lt;br /&gt;
&lt;br /&gt;
In this page the user gets to view the Kernel logs.&lt;br /&gt;
&lt;br /&gt;
[[File:RS5X Kernel Log.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
== 2. Status ==&lt;br /&gt;
In this module the user can view the status of the router device with respect to the network, Wan, modem etc.&lt;br /&gt;
&lt;br /&gt;
It has 4 submodules.&lt;br /&gt;
&lt;br /&gt;
* Interfaces&lt;br /&gt;
* Internet&lt;br /&gt;
* Modem&lt;br /&gt;
* Routes&lt;br /&gt;
&lt;br /&gt;
[[File:RS5X Status Dashboard.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
=== 2.1 Interfaces ===&lt;br /&gt;
Each network device (interface) is associated with specific traffic statistics, uptime, and status. Active interfaces are operational, while inactive interfaces are not currently transmitting data.&lt;br /&gt;
&lt;br /&gt;
[[File:Status_Interfaces.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Looking on the network status the user can check if the cellular, Wi-Fi, Ewan, VPN etc is up.&lt;br /&gt;
&lt;br /&gt;
=== 2.2 Internet ===&lt;br /&gt;
In this submodule the user can view the status of the internet connections.&lt;br /&gt;
&lt;br /&gt;
[[File:Internet_Status.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
  To see the latest status of the internet connection the user needs to click on the refresh button.&lt;br /&gt;
&lt;br /&gt;
=== 2.3 Modem ===&lt;br /&gt;
This modem status page provides comprehensive information about the cellular connection&#039;s network operator, technology, mode, and various signal quality metrics.&lt;br /&gt;
&lt;br /&gt;
[[File:RS5X Modem .png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
=== 2.4 Routes ===&lt;br /&gt;
This configuration shows how the router directs traffic between different networks and interfaces, ensuring proper communication within the local network and to external networks via the default gateway.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ARP Table:&#039;&#039;&#039; Maps IP addresses to MAC addresses for devices on the network, helping in identifying which device is on which interface.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPv4 Routes:&#039;&#039;&#039; This shows which network is directly connected on which interface.&lt;br /&gt;
&lt;br /&gt;
Example: Network &#039;&#039;&#039;192.168.10.0/24&#039;&#039;&#039; is directly connected on interface &#039;&#039;&#039;eth0.1.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPv6 Routes:&#039;&#039;&#039; Similar routes as IPv4, but this time listed under IPv6 routing rules.&lt;br /&gt;
&lt;br /&gt;
Example: Local networks &#039;&#039;&#039;192.168.10.0/24&#039;&#039;&#039; and &#039;&#039;&#039;192.168.100.0/24&#039;&#039;&#039; are managed through &#039;&#039;&#039;eth0.1&#039;&#039;&#039; and &#039;&#039;&#039;ra0&#039;&#039;&#039;, respectively.&lt;br /&gt;
&lt;br /&gt;
[[File:Rs5X routes.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
== 3. Settings ==&lt;br /&gt;
In this “Setting” module the user can Configure/update all the required parameters related to Network, Internet, VPN, Firewall, Traffic Shaping, Loopback Rule, Remote monitoring, Tunnel as per requirement.&lt;br /&gt;
&lt;br /&gt;
IT consist of 8 submodules.&lt;br /&gt;
&lt;br /&gt;
* Network&lt;br /&gt;
* Internet&lt;br /&gt;
* VPN&lt;br /&gt;
* Firewall&lt;br /&gt;
* Traffic Shaping&lt;br /&gt;
* Loopback Rule&lt;br /&gt;
* Remote Monitoring&lt;br /&gt;
* Tunnel&lt;br /&gt;
&lt;br /&gt;
[[File:RS5x settings.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
=== 3.1 Network ===&lt;br /&gt;
In this section the user does all the setting related configuration with reference to network like Ethernet Settings, Cellular Settings, Band lock and Operator Lock, Wi-Fi Settings, Guest Wi-Fi etc.&lt;br /&gt;
&lt;br /&gt;
[[File:Rs5x network.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ethernet Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this page it will display all the configured port that is attached with the device. For this device 3 ports are configured. Ethernet mode can be configured as WAN and as LAN as well. Ethernet LAN Connection settings can be configured as DHCP server or Static.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:3 port Ethernet settings.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;For port 3 setting,&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Kindly select the option &#039;&#039;&#039;LAN3&#039;&#039;&#039; for &#039;&#039;&#039;Port 3 mode LAN/WAN&#039;&#039;&#039;. Based on the option selected the field will also change. The user needs to configure all the required field and click on save.&lt;br /&gt;
&lt;br /&gt;
[[File:For port 3 setting.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Port 3 mode LAN/WAN&lt;br /&gt;
|LAN3&lt;br /&gt;
|This field displays the port mode selection&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Port 3 Ethernet Protocol  [LAN Eth0.1]&lt;br /&gt;
|DHCP Server&lt;br /&gt;
&lt;br /&gt;
Static&lt;br /&gt;
|This field  displays the  Ethernet mode selection&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Port 3 DHCP Server IP&lt;br /&gt;
&lt;br /&gt;
Port 3 Static IP&lt;br /&gt;
|192.168.4.1&lt;br /&gt;
&lt;br /&gt;
5.6.7.8&lt;br /&gt;
|This field displays DHCP server and static IP configured.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Port 3 DHCP and Static  Netmask&lt;br /&gt;
|255.255.255.0&lt;br /&gt;
|This field displays DHCP server and static Netmask address configured&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Port 3 DHCP Start Address&lt;br /&gt;
|100&lt;br /&gt;
|This field displays DHCP server start address configured&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Port 3 DHCP Limit&lt;br /&gt;
|50&lt;br /&gt;
|This field displays DHCP server limit&lt;br /&gt;
|}&lt;br /&gt;
Kindly select the option &#039;&#039;&#039;EWAN3&#039;&#039;&#039; for &#039;&#039;&#039;Port 3 mode LAN/WAN&#039;&#039;&#039;. Based on the option selected the field will also change. The user needs to configure all the required field and click on the save to save the required fields.&lt;br /&gt;
&lt;br /&gt;
[[File:3 port Ewan Settings.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are below.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Port 3 mode WAN&lt;br /&gt;
|EWAN3&lt;br /&gt;
|This  field displays the port mode selection&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|Ethernet Protocol Port 3  WAN&lt;br /&gt;
|1.) DHCP client&lt;br /&gt;
&lt;br /&gt;
2.) Static&lt;br /&gt;
&lt;br /&gt;
3.) PPPoE&lt;br /&gt;
&lt;br /&gt;
4.) PPTP&lt;br /&gt;
&lt;br /&gt;
5.) L2TP&lt;br /&gt;
|1.) Automatically obtains IP  address and network configuration from a DHCP server.&lt;br /&gt;
&lt;br /&gt;
2.) Manually set a fixed IP  address and network configuration.&lt;br /&gt;
&lt;br /&gt;
3.) Point-to-Point Protocol  over Ethernet, used for connecting to DSL services.&lt;br /&gt;
&lt;br /&gt;
4.) Point-to-Point Tunnelling  Protocol, used for establishing VPN connections.&lt;br /&gt;
&lt;br /&gt;
5.) Layer 2 Tunnelling  Protocol, another VPN protocol option.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Gateway&lt;br /&gt;
|192.168.1.1&lt;br /&gt;
|This field displays gateway address  configured&lt;br /&gt;
|}&lt;br /&gt;
Click on the save once all the configuration is done and click on the update button to update all the information.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SW_LAN settings,&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this part the user can configure the setting for SW_LAN &lt;br /&gt;
&lt;br /&gt;
[[File:SW LAN settings RC44.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are below.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|SW_LAN  Ethernet Protocol&lt;br /&gt;
|DHCP Server&lt;br /&gt;
|This field displays the Ethernet mode selection&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|SW_LAN  DHCP Server IP&lt;br /&gt;
|192.168.10.1&lt;br /&gt;
|This field displays DHCP server IP  configured.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|SW_LAN DHCP Netmask&lt;br /&gt;
|255.255.255.0&lt;br /&gt;
|This field displays DHCP server  Netmask address configured&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|SW_LAN DHCP Start Address&lt;br /&gt;
|100&lt;br /&gt;
|This field displays DHCP server  start address configured&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|SW_LAN DHCP Limit&lt;br /&gt;
|50&lt;br /&gt;
|This field displays DHCP server  limit&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|DNS Server&lt;br /&gt;
|1&lt;br /&gt;
|This filed display number of DSN  server availability&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|DNS Server Address&lt;br /&gt;
|8.8.8.8&lt;br /&gt;
|This  filed display the DSN server address.&lt;br /&gt;
|}&lt;br /&gt;
After configuring all the required information, click on save.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Static option for SW_LAN Ethernet Protocol:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:Rs5x static ethernet protocol.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|SW_LAN  Ethernet Protocol&lt;br /&gt;
|Static&lt;br /&gt;
|This field displays the Ethernet mode selection&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|SW_LAN  static IP&lt;br /&gt;
|192.168.5.1&lt;br /&gt;
|This field displays static server IP  configured.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|SW_LAN Netmask&lt;br /&gt;
|255.255.255.0&lt;br /&gt;
|This field displays static server  Netmask address configured&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|DNS Server&lt;br /&gt;
|1&lt;br /&gt;
|This filed display number of DSN  server availability&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|DNS Server Address&lt;br /&gt;
|8.8.8.8&lt;br /&gt;
|This  filed display the DNS server address.&lt;br /&gt;
|}&lt;br /&gt;
After configuring all the required information, click on save.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cellular Setting:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this page, the user needs to configure the various details with respect to the SIM.&lt;br /&gt;
&lt;br /&gt;
select single cellular single sim where the user must configure the APN details of the sim used for the router device. The Configurations can be done based on the SIM usage, with respect to IPV4 or IPV6.&lt;br /&gt;
&lt;br /&gt;
[[File:Cellular settings V5.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Cellular Enable&lt;br /&gt;
|Checkbox&lt;br /&gt;
|Check this box to enable cellular functionality.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Cellular  Operation Mode&lt;br /&gt;
|1.) Single Cellular with Dual Sim&lt;br /&gt;
&lt;br /&gt;
2.) Single Cellular with  Single SIM&lt;br /&gt;
|1.) This mode  allows you to use one cellular modem with two SIM cards.&lt;br /&gt;
&lt;br /&gt;
2.) This mode  allows you to use one cellular modem with single SIM card.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Cellular  Modem 1&lt;br /&gt;
|QuectelRM500U&lt;br /&gt;
|This field displays the modem name.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Choose SIM 1 APN Mode&lt;br /&gt;
|1.) Auto&lt;br /&gt;
&lt;br /&gt;
2.)  Manual&lt;br /&gt;
|1.) Choose  Auto for regular SIM to detect APN name automatically.&lt;br /&gt;
&lt;br /&gt;
2.) Choose manual to enter the APN settings  manually in case of M2M SIM cards.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|SIM 1 Access Point Name&lt;br /&gt;
|jionet&lt;br /&gt;
|Enter the APN provided by your cellular service provider in case of  M2M sim. For regular sim cards APN name will be displayed automatically.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|SIM 1 PDP Type&lt;br /&gt;
|IPV6&lt;br /&gt;
|Choose the PDP type, which is typically either IPv4 (4G) or IPv6  (5G) depending on the sim card.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Enable 464xlat for Sim1&lt;br /&gt;
|Enable/  Disable&lt;br /&gt;
|In case of 5G jio sim cards, this option needs to be enabled.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|SIM 1 Username&lt;br /&gt;
|&lt;br /&gt;
|Enter the username if required by the APN. Leave blank if not  required.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|SIM 1 Password&lt;br /&gt;
|&lt;br /&gt;
|Enter the  password if required by the APN. Leave blank if not required.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|SIM 1 Authentication Protocol&lt;br /&gt;
|None&lt;br /&gt;
|Choose the  authentication protocol. Options typically include None, PAP, CHAP, PAP/CHAP.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Choose SIM 2 APN Mode&lt;br /&gt;
|1.) Auto&lt;br /&gt;
&lt;br /&gt;
2.) Manual&lt;br /&gt;
|1.) Choose  Auto for regular SIM to detect APN name automatically.&lt;br /&gt;
&lt;br /&gt;
2.) Choose manual to enter the APN settings manually in case of  M2M SIM cards.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|SIM 2 Access Point Name&lt;br /&gt;
|www&lt;br /&gt;
|Enter the APN  provided by your cellular service provider in case of M2M sim. For regular  sim cards APN name will be displayed automatically.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|SIM 2 PDP Type&lt;br /&gt;
|IPV4&lt;br /&gt;
|Choose the  PDP type, which is typically either IPv4 (4G) or IPv6 (5G) depending on the  sim card.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|SIM 2 Username&lt;br /&gt;
|&lt;br /&gt;
|Enter the  username if required by the APN. Leave blank if not required.&lt;br /&gt;
|-&lt;br /&gt;
|15&lt;br /&gt;
|SIM 2 Password&lt;br /&gt;
|&lt;br /&gt;
|Enter the  password if required by the APN. Leave blank if not required.&lt;br /&gt;
|-&lt;br /&gt;
|16&lt;br /&gt;
|Enable 464xlat for Sim2&lt;br /&gt;
|Enable/ Disable&lt;br /&gt;
|In case of 5G  jio sim cards, this option needs to be enabled.&lt;br /&gt;
|-&lt;br /&gt;
|17&lt;br /&gt;
|SIM 2 Authentication Protocol&lt;br /&gt;
|None&lt;br /&gt;
|Choose the  authentication protocol. Options typically include None, PAP, or CHAP.&lt;br /&gt;
|-&lt;br /&gt;
|18&lt;br /&gt;
|Primary SIM Switchback Time&lt;br /&gt;
|10 min&lt;br /&gt;
|The system  should switch back to the primary SIM if it becomes available.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Band lock and Operator Lock:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this page, the user needs to configure the lock band and operator based on the service provider&#039;&#039;&#039;.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Bands available in the drop-down list&lt;br /&gt;
&lt;br /&gt;
[[File:Band and operator lock for 5G Router.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Module&lt;br /&gt;
|QuectelRM500U&lt;br /&gt;
|The Quectel  RM500U is a 5G module that supports both LTE and NR5G networks.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Mode Selection&lt;br /&gt;
|1.) Automatic&lt;br /&gt;
&lt;br /&gt;
2.) LTE only&lt;br /&gt;
&lt;br /&gt;
3.) NR5G only&lt;br /&gt;
&lt;br /&gt;
4.) NR5G and LTE&lt;br /&gt;
|1.) The modem  will automatically select the most appropriate network mode based on  availability and signal strength. It will switch between LTE and NR5G as  needed.&lt;br /&gt;
&lt;br /&gt;
2.) The modem  will be locked to LTE (4G) networks only. It will not attempt to connect to  NR5G networks, even if they are available.&lt;br /&gt;
&lt;br /&gt;
3.) The modem  will be locked to NR5G (5G) networks only.&lt;br /&gt;
&lt;br /&gt;
4.) This mode  typically allows for dual connectivity, where the modem can simultaneously  use both LTE and NR5G for better performance.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|LTE Band Selection&lt;br /&gt;
|Ex: LTE B1&lt;br /&gt;
|If custom  band selection is enabled, users would typically be able to choose specific  LTE bands that the modem will use.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|NR5G Band Selection&lt;br /&gt;
|Ex: 5G B1&lt;br /&gt;
|The modem  will automatically connect to the best available 5G band based on signal  strength and network conditions.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Operator Selection Mode:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The user needs to click on the check box of the “operator select enable” to select the operator.&lt;br /&gt;
&lt;br /&gt;
Once the check box is clicked there will be a dropdown list of the operator modes from which the user needs to select the mode. The user needs to select the operator mode from the given dropdown list.&lt;br /&gt;
&lt;br /&gt;
[[File:Operator Selection Mode.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
If the user selects the mode “Manual” or “Manual-Automatic” then one more text box will appear where the user must provide the operator code.&lt;br /&gt;
&lt;br /&gt;
[[File:Band lock and Operator Lock 1.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
After configuring all the required information, click on save. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Wi-Fi Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Since this is a 5G Module device, there are 2 Wi-Fi settings available,&lt;br /&gt;
&lt;br /&gt;
1.) 2.4Ghz WIFI Settings&lt;br /&gt;
&lt;br /&gt;
 2.) 5Ghz WIFI Settings &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2.4Ghz WIFI Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
It has 3 radio modes as shown,&lt;br /&gt;
&lt;br /&gt;
‘Access point’, ‘client only’ and ‘Access point and client’.&lt;br /&gt;
&lt;br /&gt;
[[File:2.4Ghz WIFI Settings for 5G router.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Access Point mode:&#039;&#039;&#039; In Access Point mode, a configuration in which a router, allows wireless devices to connect to a wired network by creating a Wi-Fi hotspot.&lt;br /&gt;
&lt;br /&gt;
[[File:Access Point mode for 5G router.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Client point:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In client mode, the access point connects your wired devices to a wireless network. This mode is suitable when you have a wired device with an Ethernet port and no wireless capability, for example, a smart TV, Media Player, or Game console and you want to connect it to the internet wirelessly, select the Client Mode and give the Radio SSID &amp;amp; client passphrase.&lt;br /&gt;
&lt;br /&gt;
[[File:Client Point for 5G router.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Access point and Client&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
Select this option for both type of connection, give both SSID and passphrase.&lt;br /&gt;
&lt;br /&gt;
[[File:2.4 GHz Wifi settings for 5G Router .png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
After configuring all the required information, click on save.&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Radio Mode&lt;br /&gt;
|1.) Access point&lt;br /&gt;
&lt;br /&gt;
2.) Client only&lt;br /&gt;
&lt;br /&gt;
3.)  Access point and Client&lt;br /&gt;
|The user must select  any radio mode based on the requirement as shown above.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|WirelessMode&lt;br /&gt;
|1.) B/G Mixed&lt;br /&gt;
&lt;br /&gt;
2.) B Only&lt;br /&gt;
&lt;br /&gt;
3.) G Only&lt;br /&gt;
&lt;br /&gt;
4.) B/G/N Mode&lt;br /&gt;
&lt;br /&gt;
5.) N_in_2G mode” --, HE Wireless  Mode&lt;br /&gt;
|1.) This mode allows  the access point to support both 802.11b(&#039;&#039;&#039;2.4 GHz with a max data rate of  11 Mbps&#039;&#039;&#039;.) and 802.11g(&#039;&#039;&#039;2.4 GHz with a high max data rate of 54 Mbps&#039;&#039;&#039;)  devices.&lt;br /&gt;
&lt;br /&gt;
2.) The access point will only support 802.11b devices.&lt;br /&gt;
&lt;br /&gt;
3.) The access point will only support 802.11g devices.&lt;br /&gt;
&lt;br /&gt;
4.) This mode allows the access point  to support 802.11b, 802.11g, and 802.11n(&#039;&#039;&#039;operates at both 2.4 GHz and 5  GHz&#039;&#039;&#039;) devices.&lt;br /&gt;
&lt;br /&gt;
5.) The access point will only support  802.11n devices operating in the 2.4 GHz band.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Country Code&lt;br /&gt;
|INDIA&lt;br /&gt;
|The region is set to India.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|CountryRegion&lt;br /&gt;
|Ex: 0 (Ch1-11)&lt;br /&gt;
|Select channels as per requirement.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Channel&lt;br /&gt;
|Ex: Auto&lt;br /&gt;
|Select Channel depending on  CountryRegion&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Channel BandWidth&lt;br /&gt;
|Ex: 20 MHz&lt;br /&gt;
|The bandwidth is set to 20 MHz,  which is common for 2.4 GHz networks.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|TX Power&lt;br /&gt;
|100&lt;br /&gt;
|Transmit power is set to maximum  (100%), ensuring the strongest possible signal.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Radio SSID&lt;br /&gt;
|Silbo_RS5X_AP_2.4Ghz&lt;br /&gt;
|Devices searching for available  networks will see this name.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Radio Passphrase&lt;br /&gt;
|••••••••&lt;br /&gt;
|This is the password for connecting  to the Wi-Fi network.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Radio Encryption&lt;br /&gt;
|AES&lt;br /&gt;
|The access point uses AES (Advanced  Encryption Standard) for securing wireless communications.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Radio DHCP server IP&lt;br /&gt;
|192.168.100.1&lt;br /&gt;
|This will be the default gateway IP  for devices connecting to the network (can be changed).&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Radio DHCP start address&lt;br /&gt;
|100&lt;br /&gt;
|The DHCP server will assign IP  addresses starting from 192.168.100.100 (will differ if any changes).&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Radio DHCP limit&lt;br /&gt;
|50&lt;br /&gt;
|The DHCP server can assign up to 50  IP addresses.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|Client SSID&lt;br /&gt;
|Any device SSID&lt;br /&gt;
|The SSID (Service Set Identifier) is  the name of the Wi-Fi network you want the device to connect to.&lt;br /&gt;
|-&lt;br /&gt;
|15&lt;br /&gt;
|Client Radio Passphrase&lt;br /&gt;
|••••••••&lt;br /&gt;
|This is the password required to  connect to the Wi-Fi network.&lt;br /&gt;
|-&lt;br /&gt;
|16&lt;br /&gt;
|Client Radio Authentication&lt;br /&gt;
|&lt;br /&gt;
|This setting defines the type of  authentication used by the Wi-Fi network. Leave it blank if not in use.&lt;br /&gt;
|-&lt;br /&gt;
|17&lt;br /&gt;
|Client Radio Encryption&lt;br /&gt;
|Ex: AES&lt;br /&gt;
|This determines the type of  encryption used to secure data transmitted over the Wi-Fi network.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;5Ghz WIFI Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:5Ghz WIFI Settings for 5G Router.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|WirelessMode&lt;br /&gt;
|mixed&lt;br /&gt;
|This mode allows the access point to support  multiple Wi-Fi standards, typically including 802.11a(&#039;&#039;&#039;Operates on the 5  GHz band&#039;&#039;&#039;), 802.11n&#039;&#039;&#039;(supports both 2.4 GHz and 5 GHz&#039;&#039;&#039;), and 802.11ac  (&#039;&#039;&#039;Designed specifically for the 5 GHz band&#039;&#039;&#039;).&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Country Code&lt;br /&gt;
|INDIA&lt;br /&gt;
|Setting this to &amp;quot;INDIA&amp;quot; ensures  compliance with local regulations regarding the 5 GHz Wi-Fi spectrum.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Channel&lt;br /&gt;
|auto&lt;br /&gt;
|The access point automatically selects the best  available channel based on current Wi-Fi traffic and interference.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Channel BandWidth&lt;br /&gt;
|80 MHz&lt;br /&gt;
|&#039;&#039;&#039;20 MHz&#039;&#039;&#039;: The  default width for most networks, offering the best compatibility.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;40 MHz&#039;&#039;&#039;:  Provides more bandwidth, suitable for less congested environments.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;80 MHz&#039;&#039;&#039;: Offers  the highest throughput but may suffer from interference in crowded  environments.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|TX Power&lt;br /&gt;
|100&lt;br /&gt;
|The transmit power is set to 100%, which is the  maximum power output allowed by the device.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Radio SSID&lt;br /&gt;
|Silbo_RS5X_AP_5Ghz&lt;br /&gt;
|This is the name that users will see when  searching for available Wi-Fi networks.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Radio Passphrase&lt;br /&gt;
|••••••••&lt;br /&gt;
|This is the password required to connect to the  Wi-Fi network.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Radio Mode&lt;br /&gt;
|Access Point&lt;br /&gt;
|The device is set to operate as an access  point, providing wireless connectivity to devices within its range.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Radio Encryption&lt;br /&gt;
|1. NONE&lt;br /&gt;
&lt;br /&gt;
2. WPA Personal (PSK)&lt;br /&gt;
&lt;br /&gt;
3. WPA Personal (PSK) + AES&lt;br /&gt;
&lt;br /&gt;
4. WPA Personal (PSK) + CCMP&lt;br /&gt;
&lt;br /&gt;
5. WPA Personal (PSK) + TKIP + CCMP&lt;br /&gt;
&lt;br /&gt;
6. WPA Personal (PSK) + TKIP + AES&lt;br /&gt;
|1.) This option disables encryption on the  Wi-Fi network.&lt;br /&gt;
&lt;br /&gt;
2.) This is a  basic security option commonly used in home and small office networks.&lt;br /&gt;
&lt;br /&gt;
3.) This is  the most recommended option for most networks. It provides strong security by  combining the WPA Personal protocol with AES encryption.&lt;br /&gt;
&lt;br /&gt;
4.) This  option is technically equivalent to WPA Personal (PSK) + AES, as CCMP is the  mode in which AES operates under WPA2.&lt;br /&gt;
&lt;br /&gt;
5.) This is a  backward-compatible option that can be used in networks where some older  devices only support TKIP, while newer devices can take advantage of the more  secure AES (CCMP).&lt;br /&gt;
&lt;br /&gt;
6.) Like the  TKIP + CCMP option, this is intended for environments with mixed device  capabilities.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Radio DHCP Server IP&lt;br /&gt;
|192.168.200.1&lt;br /&gt;
|This IP address will act as the default gateway  for devices connecting to the Wi-Fi network.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Radio DHCP Start Address&lt;br /&gt;
|1&lt;br /&gt;
|The starting IP address in the DHCP range. The  first device that connects will receive 192.168.200.1.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Radio DHCP Limit&lt;br /&gt;
|50&lt;br /&gt;
|The maximum number of IP addresses that the  DHCP server can assign. In this case, it can assign up to 50 devices.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Guest WIFI 2.4Ghz/5Ghz:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
As shown below, this section has 2 modes,&lt;br /&gt;
&lt;br /&gt;
Enable 2.4Ghz Guest Wifi, Enable 5Ghz Guest Wifi&lt;br /&gt;
&lt;br /&gt;
[[File:Guest WIFI 2.4Ghz-5Ghz.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Enable 2.4Ghz Guest Wifi:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:Enable 2.4Ghz Guest Wifi of 5G.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable 2.4Ghz Guest Wifi&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Enable this option if you want to set up a  2.4Ghz Guest Wifi.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|SSID&lt;br /&gt;
|Add SSID of a device&lt;br /&gt;
|The SSID field must not be empty. You need to  enter a name for the Guest Wi-Fi network.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Passphrase&lt;br /&gt;
|Ex: GuestAccess2024&lt;br /&gt;
|The passphrase is the password required to  connect to the Guest Wi-Fi network.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Radio DHCP Server IP&lt;br /&gt;
|Ex: 192.168.13.30&lt;br /&gt;
|The DHCP Server IP field must not be empty. You  must assign a valid IP address within the subnet range you intend to use for  the Guest Wi-Fi network.&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Enable 5Ghz Guest Wifi:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:Enable 5Ghz Guest Wifi of 5G router.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable 5Ghz Guest Wifi&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Enable this option if you want to set up a 5Ghz  Guest Wifi.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|SSID&lt;br /&gt;
|Ex: Guest_WiFi_5GHz&lt;br /&gt;
|The SSID field must not be empty. You need to  enter a name for the Guest Wi-Fi network.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Passphrase&lt;br /&gt;
|Ex: Guest5GAccess2024&lt;br /&gt;
|The passphrase is the password required to  connect to the Guest Wi-Fi network.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Radio DHCP Server IP&lt;br /&gt;
|Ex: 192.168.11.20&lt;br /&gt;
|The DHCP Server IP field must not be empty. You  must assign a valid IP address within the subnet range you intend to use for  the Guest Wi-Fi network.&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Wireless Schedule:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi can be automatically withdrawn based on the configuration done in this section.&lt;br /&gt;
&lt;br /&gt;
The user can schedule the Wi-Fi’s accessibility time during a particular period.&lt;br /&gt;
&lt;br /&gt;
[[File:Wifi Schedule.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
The user can select more than one “day of the week” for scheduling the Wi-Fi working hours as shown above.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
After configuring all the required information, click on save.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SMS Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
User needs to enable SMS option in SMS settings page.&lt;br /&gt;
&lt;br /&gt;
This option is to validate the mobile numbers using which controlling commands could be sent to the router device.&lt;br /&gt;
&lt;br /&gt;
1 to 5 mobile numbers can be authenticated by choosing from “Select Valid SMS user numbers” and adding the mobile numbers below respectively.&lt;br /&gt;
&lt;br /&gt;
API key is the pass key used in the commands while sending SMS.&lt;br /&gt;
&lt;br /&gt;
Displayed in the below screen is the default API key which can be edited and changed as per choice.&lt;br /&gt;
&lt;br /&gt;
[[File:SMS Settings for 5G router.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
1.) Select valid user number max. 5 and add authorized phone number in the tab where you want to find the alert and click on &#039;&#039;&#039;‘SMS Response Enable’&#039;&#039;&#039;, &#039;&#039;&#039;‘save’&#039;&#039;&#039; and &#039;&#039;&#039;‘update’&#039;&#039;&#039; button.&lt;br /&gt;
&lt;br /&gt;
2.) Now send SMS commands from the configured mobile number.&lt;br /&gt;
&lt;br /&gt;
3.) Once the commands are received from the user phone number the board will send acknowledgement as per the commands.&lt;br /&gt;
&lt;br /&gt;
4.) After that it will send the router’s status once it has rebooted and is operational again.&lt;br /&gt;
&lt;br /&gt;
Mentioned below are a few commands which can be sent from the configured mobile number to the router device. Below two commands are One for rebooting the router device and another to get the uptime.&lt;br /&gt;
&lt;br /&gt;
1) {&amp;quot;device&amp;quot;:[&amp;quot;passkey&amp;quot;,&amp;quot;API key&amp;quot;],&amp;quot;command&amp;quot;:&amp;quot;reboot&amp;quot;,&amp;quot;arguments&amp;quot;:&amp;quot;hardware&amp;quot;}&lt;br /&gt;
&lt;br /&gt;
2) {&amp;quot;device&amp;quot;:[&amp;quot;passkey &amp;quot;,&amp;quot;API key&amp;quot;],&amp;quot;command&amp;quot;:&amp;quot;uptime&amp;quot;}&lt;br /&gt;
&lt;br /&gt;
After configuring all the required information, click on save.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Loop back IP settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The loopback IP address, often referred to as “localhost.” It is used to establish network connections within the same device for testing and troubleshooting purpose.&lt;br /&gt;
&lt;br /&gt;
[[File:Loop back IP settings for 5G Router.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
The loopback IP address, commonly represented as 127.0.0.1, is a special address used for testing network connectivity on a local machine.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It allows a device to send network messages to itself without involving external networks, making it useful for troubleshooting and diagnostics.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
However, this IP can be changed as per requirement and to do that, Navigating to Setting&amp;gt;&amp;gt;Network configuration&amp;gt;&amp;gt; Loopback IP settings can be changed/updated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
After configuring all the required information, click on save.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Flow Offloading:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:Flow Offloading.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable Flow Offloading&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
&lt;br /&gt;
(Disable by default)&lt;br /&gt;
|&#039;&#039;&#039;Hardware Flow Offloading&#039;&#039;&#039;: If supported by your device, enabling flow  offloading can significantly increase throughput by reducing the CPU load.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Software Flow Offloading&#039;&#039;&#039;: Even without specialized hardware,  software-based flow offloading can help optimize network traffic processing.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|SMP IRQ Affinity&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
&lt;br /&gt;
(Disable by default)&lt;br /&gt;
|&#039;&#039;&#039;SMP IRQ Affinity&#039;&#039;&#039;: When enabled, this setting can bind specific  IRQs to specific CPU cores, which can optimize the handling of interrupts and  improve overall system performance.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
After configuring all the required information, click on save.&lt;br /&gt;
&lt;br /&gt;
=== 3.2 Internet ===&lt;br /&gt;
As shown below, this section has 3 categories,&lt;br /&gt;
&lt;br /&gt;
General settings&lt;br /&gt;
&lt;br /&gt;
Failover&lt;br /&gt;
&lt;br /&gt;
Load Balancing&lt;br /&gt;
&lt;br /&gt;
[[File:Internet configuration for 5G Router.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In general settings, select any one option from the drop-down menu which you wish to imply and click on save.&lt;br /&gt;
&lt;br /&gt;
Failover&lt;br /&gt;
&lt;br /&gt;
Load Balancing&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Failover:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:Failover Settings.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:Editing Failover Settings .png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The specifications details are below.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Priority&lt;br /&gt;
|Ex: 1&lt;br /&gt;
|Setting a priority of 1 means this connection  has the highest priority and will be used before any others with a higher  priority number.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Select Track IP Numbers&lt;br /&gt;
|2&lt;br /&gt;
|In this dropdown the user needs to select the  track number for the Ips. This specifies the number of IP addresses  that will be used for tracking the status of the connection.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|TrackIP1&lt;br /&gt;
|2001:4860:4860::8888&lt;br /&gt;
|&#039;&#039;&#039;TrackIP1&#039;&#039;&#039;:  2001:4860:4860::8888 is an IPv6 address that corresponds to one of Google’s  public DNS servers.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|TrackIP2&lt;br /&gt;
|2001:4860:4860::8844&lt;br /&gt;
|&#039;&#039;&#039;TrackIP2&#039;&#039;&#039;:  2001:4860:4860::8844 is another Google public DNS server.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Reliability&lt;br /&gt;
|1&lt;br /&gt;
|If  reliability is set to 1, it might mean the connection is considered reliable  if it successfully pings at least one of the tracked IP addresses.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Count&lt;br /&gt;
|3&lt;br /&gt;
|Setting Count  to 3 means the device will send three pings to each IP address to check for  connectivity.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Up&lt;br /&gt;
|3&lt;br /&gt;
|If set to 3,  the connection will be considered &amp;quot;up&amp;quot; only if all three pings are  successful.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Down&lt;br /&gt;
|3&lt;br /&gt;
|If set to 3,  the connection will be considered &amp;quot;down&amp;quot; if all three pings fail.&lt;br /&gt;
|}&lt;br /&gt;
Once the user is done with modification click on the save tab to save all the changes and then click on the update button.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Load Balancing:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Load balancing is a network management technique used to distribute traffic across multiple network connections or servers to optimize resource use, maximize throughput, minimize response time, and ensure reliability.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tasks of Load Balancing:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Traffic Distribution&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Task&#039;&#039;&#039;: Distributes network traffic evenly across multiple connections (e.g., multiple WAN links) or servers.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Purpose&#039;&#039;&#039;: This ensures that no single connection or server is overwhelmed with too much traffic, which could lead to congestion and slower performance.&lt;br /&gt;
&lt;br /&gt;
[[File:Load Balancing Dashboard.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:Load Balancing Editing.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Traffic Distribution Ratio&lt;br /&gt;
|Ex: 60%&lt;br /&gt;
|If you have  two connections and set one to 60% and the other to 40%, traffic will be  distributed accordingly.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Select Track IP Numbers&lt;br /&gt;
|2&lt;br /&gt;
|The system  will track two IP addresses to determine if the network connection is active  and reliable.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|TrackIP1&lt;br /&gt;
|8.8.8.8&lt;br /&gt;
|The system  will ping this IPV4 IP address to check if the connection is up and working.  You can even add any whitelisted IP.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|TrackIP2&lt;br /&gt;
|8.8.4.4&lt;br /&gt;
|The system  will ping this IPV4 IP address to check if the connection is up and working.  You can even add any whitelisted IP.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Reliability&lt;br /&gt;
|1&lt;br /&gt;
|With a  reliability setting of 1, the connection might be considered reliable if at  least one ping is successful.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Count&lt;br /&gt;
|1&lt;br /&gt;
|The system  will send one ping to each tracked IP to check the connection&#039;s status.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Up&lt;br /&gt;
|3&lt;br /&gt;
|The system  requires 3 successful pings for the connection to be marked as  &amp;quot;up.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Down&lt;br /&gt;
|3&lt;br /&gt;
|If 3 pings  fail, the system will mark the connection as &amp;quot;down,&amp;quot; and it may  switch to an alternate connection if available.&lt;br /&gt;
|}&lt;br /&gt;
Once the user is done with modification click on the save tab to save all the changes and then click on the update button.&lt;br /&gt;
&lt;br /&gt;
=== 3.3 VPN ===&lt;br /&gt;
VPN stands for &#039;&#039;&#039;Virtual Private Network&#039;&#039;&#039;, it establishes a connection between the system and a remote server, which is owned by a VPN provider.&lt;br /&gt;
&lt;br /&gt;
Creating a point-to-point tunnel that encrypts the personal data, masks the IP address, and allows to block the required website to blocks via firewalls on the internet.&lt;br /&gt;
&lt;br /&gt;
Navigate to settings &amp;gt;= VPN, general settings and you will see all VPN options you wish to use.&lt;br /&gt;
&lt;br /&gt;
Refer the below figure.&lt;br /&gt;
&lt;br /&gt;
[[File:VPN Configuration General Settings.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
There are 5 types of setting available under VPN configuration.&lt;br /&gt;
&lt;br /&gt;
* General Settings&lt;br /&gt;
* IPSEC&lt;br /&gt;
* Open VPN&lt;br /&gt;
* Wireguard&lt;br /&gt;
* Zerotier &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this page the user must choose which type of VPN connection is required for the device. The user must select from IPSEC, Open VPN, Wireguard or Zerotier based on its requirement. If required, the user can select all the options. Click on save after selecting the option based on its requirement.&lt;br /&gt;
&lt;br /&gt;
[[File:VPN General Settings RC44.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPSEC:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
IPSEC VPN is used to create a VPN connection between local and remote networks.&lt;br /&gt;
&lt;br /&gt;
To use IPSEC VPN, the user should check that both local and remote routers support IPSEC VPN feature.&lt;br /&gt;
&lt;br /&gt;
In this page the user can add/edit/delete the IPSEC VPN connection for the device.&lt;br /&gt;
&lt;br /&gt;
[[File:IPSec Config.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
The user needs to click on the update button once the required configuration is completed.&lt;br /&gt;
&lt;br /&gt;
In IPSEC the user needs to click on edit button to edit the configuration of an existing VPN connection.&lt;br /&gt;
&lt;br /&gt;
[[File:IAB44C Ipsec Edit Options.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Click on update once done with configurations.&lt;br /&gt;
&lt;br /&gt;
The tunnel will show established, showing the connection has been made.&lt;br /&gt;
&lt;br /&gt;
[[File:VPN Configurtaion IPSEC .png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Detailed specifications are below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|IPSEC&lt;br /&gt;
|Site to Site VPN&lt;br /&gt;
|In this dropdown the user should select  the IPSEC connection type.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|IPSEC Role&lt;br /&gt;
|Client/Server&lt;br /&gt;
|In this dropdown box the user needs to select  the IPSEC role. The device is acting as a client in the VPN setup (in  this example).&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Connection Type&lt;br /&gt;
|Tunnel&lt;br /&gt;
|In this dropdown the user needs to select the  connection type. The user should select on the connection enable check box.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Connection mode&lt;br /&gt;
|Route/add/&#039;&#039;&#039;start&#039;&#039;&#039;/trap&lt;br /&gt;
|In this drop down list the user should select  the mode for the connection. In this example &#039;&#039;&#039;start&#039;&#039;&#039; is selected which  means the VPN connection is initiated automatically.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Remote Server IP&lt;br /&gt;
|********&lt;br /&gt;
|The IP  address of the remote VPN server.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Local ID&lt;br /&gt;
|3.3.3.3&lt;br /&gt;
|The user needs to set the local id. It is the  identification for the local VPN client.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|No. of local subnets&lt;br /&gt;
|1&lt;br /&gt;
|In this dropdown the user needs to select how  many subnets will be connected.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Local Subnet 1&lt;br /&gt;
|172.16.31.25/32&lt;br /&gt;
|In this text box the user needs to put the  specific local subnet included in the VPN.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Remote id&lt;br /&gt;
|1.1.1.1&lt;br /&gt;
|In this text box the user needs to put the id  of the remote connection. It is the identification for the remote VPN  server.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|No of remote subnet&lt;br /&gt;
|1&lt;br /&gt;
|In this dropdown the user needs to select how  many subnets it will be connected remotely.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Remote subnet&lt;br /&gt;
|10.1.1.0/24&lt;br /&gt;
|In this text box the user needs to put the  address of the remote subnet. The specific remote subnet included in  the VPN.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Key exchange&lt;br /&gt;
|Ikev1&lt;br /&gt;
|In this dropdown the user should select the  which key exchange version to be selected.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Aggressive&lt;br /&gt;
|Yes/No&lt;br /&gt;
|In this dropdown the user should select either  yes or no.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|IKE Lifetime (In Seconds)&lt;br /&gt;
|86400&lt;br /&gt;
|The lifetime  of the IKE phase in seconds (1 day).&lt;br /&gt;
|-&lt;br /&gt;
|15&lt;br /&gt;
|Lifetime (in seconds)&lt;br /&gt;
|28800&lt;br /&gt;
|The lifetime  of the IPsec SA (Security Association) in seconds (8 hours).&lt;br /&gt;
|-&lt;br /&gt;
|16&lt;br /&gt;
|Enable DPD Detection&lt;br /&gt;
|&#039;&#039;&#039;1&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
0&lt;br /&gt;
|Indicates  whether Dead Peer Detection is enabled to detect a lost connection. Enable  this option as per server-side settings.&lt;br /&gt;
|-&lt;br /&gt;
|17&lt;br /&gt;
|Time Interval (In Seconds)&lt;br /&gt;
|60&lt;br /&gt;
|This option  is available only if DPD Detection is enabled. The time interval is the  interval for DPD checks.&lt;br /&gt;
|-&lt;br /&gt;
|18&lt;br /&gt;
|Action&lt;br /&gt;
|&#039;&#039;&#039;Restart&#039;&#039;&#039;/clear/hold/&lt;br /&gt;
&lt;br /&gt;
trap/start&lt;br /&gt;
|&#039;&#039;&#039;Restart&#039;&#039;&#039;: Action to take when  DPD detects a lost connection (restart the connection). Select as per  server-side setting.&lt;br /&gt;
|-&lt;br /&gt;
|19&lt;br /&gt;
|Authentication Method&lt;br /&gt;
|&#039;&#039;&#039;PSK&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;PSK&#039;&#039;&#039;: Pre-shared key is used  for authentication. Select this option for authentication as per sever side  setting.&lt;br /&gt;
|-&lt;br /&gt;
|20&lt;br /&gt;
|Multiple Secrets&lt;br /&gt;
|1/&#039;&#039;&#039;0&#039;&#039;&#039;&lt;br /&gt;
|Indicates  whether multiple PSK secrets are used. Enable only if required.&lt;br /&gt;
|-&lt;br /&gt;
|21&lt;br /&gt;
|PSK Value&lt;br /&gt;
|******&lt;br /&gt;
|Pre-shared  key value (masked for security).&lt;br /&gt;
|}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|&#039;&#039;&#039;Proposal settings  Phase I&#039;&#039;&#039;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|22&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |&#039;&#039;&#039;Encryption Algorithm&#039;&#039;&#039;&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; |AES 128&lt;br /&gt;
&lt;br /&gt;
AES 192&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;AES 256&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
3DES&lt;br /&gt;
|&#039;&#039;&#039;AES    256&#039;&#039;&#039;: Encryption algorithm for Phase I. Select as per    server-side configuration. Both server and client should have same    configuration.&lt;br /&gt;
|-&lt;br /&gt;
|23&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |Authentication Phase I&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; |SHA1&lt;br /&gt;
&lt;br /&gt;
MD5&lt;br /&gt;
&lt;br /&gt;
SHA 256&lt;br /&gt;
&lt;br /&gt;
SHA 384&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SHA 512&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;SHA 512&#039;&#039;&#039;:    Authentication algorithm for Phase I.&lt;br /&gt;
&lt;br /&gt;
Select as per server-side configuration. Both    server and client should have same configuration.&lt;br /&gt;
|-&lt;br /&gt;
|24&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |DH Group&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; |MODP768(group1)&lt;br /&gt;
&lt;br /&gt;
MODP1024(group2)&lt;br /&gt;
&lt;br /&gt;
MODP1536(group5)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;MODP2048(group14)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
MODP3072(group15)&lt;br /&gt;
&lt;br /&gt;
MODP4096(group16)&lt;br /&gt;
|&#039;&#039;&#039;MODP2048(group14):&#039;&#039;&#039; Diffie-Hellman group for    key exchange.&lt;br /&gt;
&lt;br /&gt;
Select as per server-side configuration. Both    server and client should have same configuration.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;7&amp;quot; |&#039;&#039;&#039;Proposal settings    Phase II&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |25&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |Hash Algorithm&lt;br /&gt;
|AES 128&lt;br /&gt;
&lt;br /&gt;
AES 192&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;AES 256&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
3DES&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |&#039;&#039;&#039;AES    256&#039;&#039;&#039;: Encryption algorithm for Phase II. Select as per    server-side configuration. Both server and client should have same    configuration.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |26&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |Authentication    Phase II&lt;br /&gt;
|SHA1&lt;br /&gt;
&lt;br /&gt;
MD5&lt;br /&gt;
&lt;br /&gt;
SHA 256&lt;br /&gt;
&lt;br /&gt;
SHA 384&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SHA 512&#039;&#039;&#039;&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |&#039;&#039;&#039;SHA 512&#039;&#039;&#039;:    Authentication algorithm for Phase II.&lt;br /&gt;
&lt;br /&gt;
Select as per server-side configuration. Both    server and client should have same configuration.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |27&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |PFS Group&lt;br /&gt;
|MODP768(group1)&lt;br /&gt;
&lt;br /&gt;
MODP1024(group2)&lt;br /&gt;
&lt;br /&gt;
MODP1536(group5)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;MODP2048(group14)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
MODP3072(group15)&lt;br /&gt;
&lt;br /&gt;
MODP4096(group16)&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |&#039;&#039;&#039;MODP2048(group14):&#039;&#039;&#039; Perfect Forward Secrecy    group.&lt;br /&gt;
&lt;br /&gt;
Select as per server-side configuration. Both    server and client should have same configuration.&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Open VPN:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To use the VPN feature, the user should enable OpenVPN Server on the router, and install and run VPN client software on the remote device.&lt;br /&gt;
&lt;br /&gt;
[[File:Open VPN Certificate.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
The user needs to “upload” the respective certificate from a valid path and then click on the “Update.”&lt;br /&gt;
&lt;br /&gt;
Once the OpenVPN connection starts the user will get an option to enable/disable the VPN connection as and when required. Here we have established a TUN connection.&lt;br /&gt;
&lt;br /&gt;
By clicking on the enable/disable button, the user can start/stop the VPN connection.&lt;br /&gt;
&lt;br /&gt;
[[File:Open VPN Dashboard V2.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
VPN TUN has been established. Same way VPN TAP can also be established.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WireGuard:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WireGuard&#039;&#039;&#039; is simple, fast, lean, and modern VPN that utilizes secure and trusted cryptography.&lt;br /&gt;
&lt;br /&gt;
Click on “Edit” to start configurations as needed.&lt;br /&gt;
&lt;br /&gt;
[[File:Wire Guard RC44.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:RS5X Wireguard config.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Wireguard Role&lt;br /&gt;
|Client/Server&lt;br /&gt;
|In this dropdown box the user needs to select  the wireguard role.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Listen Port&lt;br /&gt;
|51820&lt;br /&gt;
|The UDP port on which the WireGuard client  listens for incoming connections.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|IP Addresses&lt;br /&gt;
|10.0.0.1/24&lt;br /&gt;
|The IP  address and subnet mask assigned to the WireGuard client&#039;s interface. This  address is used within the VPN.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Allowed IPs&lt;br /&gt;
|10.1.1.1&lt;br /&gt;
|The IP  address of the allowed peer(s) that can connect to this WireGuard client.  This might need adjustment based on the actual peer IPs used in the network.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Endpoint HostIP&lt;br /&gt;
|10.1.1.1&lt;br /&gt;
|The IP  address of the WireGuard server (the endpoint to which the client connects).&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Preshared key&lt;br /&gt;
|*****&lt;br /&gt;
|The actual  pre-shared key value shared between the client and the server. This option  appears only if you have enabled preshared key.&lt;br /&gt;
|}&lt;br /&gt;
Save and update the page after configuration has been done. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Zerotier:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
ZeroTier is a tool that lets you create your own private network over the internet.&lt;br /&gt;
&lt;br /&gt;
Go to ZeroTier Central and sign up for a free account. In ZeroTier Central, click on &amp;quot;Create a Network&amp;quot;. This will generate a unique 16-digit network ID for your new network.&lt;br /&gt;
&lt;br /&gt;
Go to settings =&amp;gt; VPN, in general settings, enable ZeroTier and save.&lt;br /&gt;
&lt;br /&gt;
[[File:Zerotier Settings RC44.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Copy and paste the unique 16-digit network ID in the edit section.&lt;br /&gt;
&lt;br /&gt;
[[File:Zero tier Unique ID.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
[[File:Zerotier Dashboard.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Click on the save button after the required configuration.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|NetworkID&lt;br /&gt;
|Ad2769hfkw2345f4&lt;br /&gt;
|In this dropdown box the user needs to paste  the unique 16-digit network id.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Listen Port&lt;br /&gt;
|9993&lt;br /&gt;
|Default&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== 3.4 Firewall ===&lt;br /&gt;
A firewall is a layer of security between the network and the Internet.&lt;br /&gt;
&lt;br /&gt;
Since a router is the main connection from a network to the Internet, the firewall function is merged into this device.&lt;br /&gt;
&lt;br /&gt;
Every network should have a firewall to protect its privacy.&lt;br /&gt;
&lt;br /&gt;
To configure a Firewall, navigate to settings &amp;lt;= firewall,&lt;br /&gt;
&lt;br /&gt;
[[File:RS5X Firewall.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
There are 6 types of setting available under firewall.&lt;br /&gt;
&lt;br /&gt;
* General Settings&lt;br /&gt;
* Port forwards&lt;br /&gt;
* Traffic Rules&lt;br /&gt;
* SNAT traffic Rules&lt;br /&gt;
* Parental Control&lt;br /&gt;
* Zone Forwarding &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
General settings are subdivided into 2 parts,&lt;br /&gt;
&lt;br /&gt;
1.) General settings&lt;br /&gt;
&lt;br /&gt;
In general settings, the settings that are made are default settings and can be changed according to user’s preference.&lt;br /&gt;
&lt;br /&gt;
[[File:RS5X General firewall settings.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Specification details are below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable SYN-flood  protection&lt;br /&gt;
|Enabled&lt;br /&gt;
|This is  enabled by default; setting can be changed if required.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Disable IPV6&lt;br /&gt;
|Disabled&lt;br /&gt;
|This is  enabled by default; setting can be changed if required.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Drop invalid packets&lt;br /&gt;
|Disabled&lt;br /&gt;
|This is  enabled by default; setting can be changed if required.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|TCP SYN Cookies&lt;br /&gt;
|Disabled&lt;br /&gt;
|This is  enabled by default; setting can be changed if required.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Input&lt;br /&gt;
|Reject/Accept&lt;br /&gt;
|By  default, the setting is ‘Reject’ but this needs to be changed to ‘Accept’  compulsory.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Output&lt;br /&gt;
|Reject/Accept&lt;br /&gt;
|By  default, the setting is ‘Reject’ but this needs to be changed to ‘Accept’  compulsory.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Forward&lt;br /&gt;
|Reject/Accept&lt;br /&gt;
|By default,  the setting is ‘Reject’ but this needs to be changed to ‘Accept’ compulsory.&lt;br /&gt;
|}&lt;br /&gt;
2.) Zone settings&lt;br /&gt;
&lt;br /&gt;
In zone settings, there’s an option to add “New Zone”, according to user’s requirement.&lt;br /&gt;
&lt;br /&gt;
[[File:Firewall Zone Settings.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Port Forwards:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Port forwarding is a feature in a router or gateway that allows external devices to access services on a private network.&lt;br /&gt;
&lt;br /&gt;
It maps an external port on the router to an internal IP address and port on the local network, enabling applications such as gaming servers, web servers, or remote desktop connections to be accessed from outside the network.&lt;br /&gt;
&lt;br /&gt;
This helps in directing incoming traffic to the correct device within a local network based on the port number, enhancing connectivity and accessibility.&lt;br /&gt;
&lt;br /&gt;
[[File:Firewall Port Forward.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:Firewall Configuration 2.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Click on the save button after the required configuration.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Name&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;Web_Server_Forward&amp;lt;/code&amp;gt;&lt;br /&gt;
|Field must  not be empty. Provide a name for the rule to easily identify it.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Protocol&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;TCP+UDP&amp;lt;/code&amp;gt;&lt;br /&gt;
|Select the  protocol for the rule.&lt;br /&gt;
&lt;br /&gt;
Options  typically include TCP+UDP, TCP, UDP, ICMP, Custom.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Source zone&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;SW_LAN&amp;lt;/code&amp;gt;&lt;br /&gt;
|Select the  source zone where the traffic is originating from. Options typically include EWAN2,SW_LAN,CWAN1,CWAN1_0,CWAN1_1,VPN&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Source MAC address [optional]&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;any&amp;lt;/code&amp;gt;&lt;br /&gt;
|&#039;&#039;&#039;any&#039;&#039;&#039;: Leave as &amp;lt;code&amp;gt;any&amp;lt;/code&amp;gt; if you don&#039;t want to specify a MAC address.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Source IP address[optional]&lt;br /&gt;
|Example: Leave blank if not needed.&lt;br /&gt;
|Optionally  specify an IP address or range.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Source port&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;80, 443&amp;lt;/code&amp;gt;  (if matching traffic for web server ports)&lt;br /&gt;
|Specify the  source port or port range.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Destination zone&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;SW_LAN&amp;lt;/code&amp;gt;&lt;br /&gt;
|Select the  destination zone where the traffic is heading to.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Destination IP address&lt;br /&gt;
|Leave blank if not needed.&lt;br /&gt;
|Optionally specify  the destination IP address or range.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Destination port&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;80&amp;lt;/code&amp;gt;  (if redirecting to a web server port)&lt;br /&gt;
|Specify the  destination port or port range.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Traffic Rule:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Traffic rules&amp;quot; refer to the policies and regulations that govern the flow of data packets within a network.&lt;br /&gt;
&lt;br /&gt;
To allow new traffic, click on “Add and Edit” in “New Traffic Rule”.&lt;br /&gt;
&lt;br /&gt;
[[File:RS5X Traffic Rules.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:RS5X Traffic rules edit.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Specification details are below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Name&lt;br /&gt;
|Example: Allow_HTTP_and_HTTPS&lt;br /&gt;
|Field must  not be empty: Provide a descriptive name for the traffic rule.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Restrict to Address Family&lt;br /&gt;
&lt;br /&gt;
|1.      Options:  IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
2.      Example:  IPv4 if dealing with typical internet traffic.&lt;br /&gt;
|Select the  address family to generate iptables rules for.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Protocol&lt;br /&gt;
|Example: TCP+UDP&lt;br /&gt;
|TCP+UDP:  Match incoming traffic using the given protocol.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Match ICMP Type&lt;br /&gt;
|Example: any&lt;br /&gt;
|Match all  ICMP types if set to any. Specific types can be chosen if needed.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Source Zone&lt;br /&gt;
|Example: LAN&lt;br /&gt;
|Specifies the  traffic source zone.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Enable DDoS Prevention&lt;br /&gt;
|Example: ‘Checked’ if you want to enable DDoS prevention  measures&lt;br /&gt;
|Enable or  disable Distributed Denial of Service (DDoS) prevention.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Limit&lt;br /&gt;
|Example: 10/minute to limit matches to 10 times per  minute.&lt;br /&gt;
|Maximum  average matching rate; specified as a number, with an optional /second,  /minute, /hour, or /day suffix.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Limit Burst&lt;br /&gt;
|&lt;br /&gt;
|Defines how  many packets or connections can exceed the rate limit before the limiting  mechanism kicks in.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Source MAC Address&lt;br /&gt;
|Example: any&lt;br /&gt;
|any: Match  traffic from any MAC address or specify a particular MAC address.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Source Address&lt;br /&gt;
|Example: 192.168.1.0/24&lt;br /&gt;
|Match  incoming traffic from the specified source IP address or range.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Source Port&lt;br /&gt;
|Example: any if all source ports should be matched&lt;br /&gt;
|any: Match  incoming traffic from the specified source port or port range.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Destination Zone&lt;br /&gt;
|Example: WAN&lt;br /&gt;
|Specifies the  traffic destination zone.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Destination address&lt;br /&gt;
|&#039;&#039;&#039;Options&#039;&#039;&#039;: Any, or a specific IP address/subnet.&lt;br /&gt;
|The IP  address or range to which the incoming traffic is directed.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|Destination port&lt;br /&gt;
|&#039;&#039;&#039;Options&#039;&#039;&#039;: Any, or a specific port/port range.&lt;br /&gt;
|Used to allow  or block traffic to specific services, like permitting only HTTP (port 80)  traffic.&lt;br /&gt;
|-&lt;br /&gt;
|15&lt;br /&gt;
|Action&lt;br /&gt;
|Example: ACCEPT&lt;br /&gt;
|Options:  ACCEPT, DROP, REJECT. Specify the action to take for matched traffic.&lt;br /&gt;
|-&lt;br /&gt;
|16&lt;br /&gt;
|Extra arguments&lt;br /&gt;
|Example: --log-prefix &amp;quot;Blocked: &amp;quot; to add a log  prefix to log messages for this rule.&lt;br /&gt;
|Passes  additional arguments to iptables. Use with care as it can significantly alter  rule behaviour.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Click on save once configured. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SNAT Traffic Rule:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
For configuring SNAT (Source Network Address Translation) traffic rules, you can control how outbound traffic from your local network is translated to a different IP address as it exits the network.&lt;br /&gt;
&lt;br /&gt;
To add new source NAT,&lt;br /&gt;
&lt;br /&gt;
Click on “ADD” in “New Source NAT:”&lt;br /&gt;
&lt;br /&gt;
[[File:SNAT Traffic Rule.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:SNAT Traffic Rule Edit.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Name&lt;br /&gt;
|Example: SNAT_WAN_to_LAN&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty&#039;&#039;&#039;: Provide a unique and descriptive name for the SNAT rule.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Protocol&lt;br /&gt;
|Example: TCP+UDP&lt;br /&gt;
|&#039;&#039;&#039;TCP+UDP&#039;&#039;&#039;:  Select the protocols that the SNAT rule will apply to.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Source Zone&lt;br /&gt;
|Example: wan&lt;br /&gt;
|&#039;&#039;&#039;wan&#039;&#039;&#039;:  Specifies the source zone from which the traffic originates.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Source IP Address&lt;br /&gt;
|Example: any or a specific range like 192.168.1.0/24&lt;br /&gt;
|&#039;&#039;&#039;-- please  choose --&#039;&#039;&#039;: Specify the source IP address or range. Leave empty if the  rule applies to any source IP.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Source Port&lt;br /&gt;
|Example: any&lt;br /&gt;
|&#039;&#039;&#039;any&#039;&#039;&#039;:  Specify the source port or port range from which the traffic originates.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Destination Zone&lt;br /&gt;
|Example: lan&lt;br /&gt;
|&#039;&#039;&#039;lan&#039;&#039;&#039;:  Specifies the destination zone to which the traffic is directed.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Destination IP Address&lt;br /&gt;
|Example: any or a specific IP like 192.168.1.100&lt;br /&gt;
|&#039;&#039;&#039;-- please  choose --&#039;&#039;&#039;: Specify the destination IP address or range. Leave empty if  the rule applies to any destination IP.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Destination port&lt;br /&gt;
|Example: any&lt;br /&gt;
|&#039;&#039;&#039;any&#039;&#039;&#039;:  Specify the destination port or port range to which the traffic is directed.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|SNAT IP Address&lt;br /&gt;
|Example: 203.0.113.5 (an external IP address)&lt;br /&gt;
|&#039;&#039;&#039;-- please  choose --&#039;&#039;&#039;: Specify the IP address to which the source IP should be  translated.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|SNAT Port&lt;br /&gt;
|Example: Leave empty if not needed, or specify a port  like ‘12345’&lt;br /&gt;
|Optionally,  rewrite matched traffic to a specific source port. Leave empty to only  rewrite the IP address.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Extra Arguments&lt;br /&gt;
|Example: --log-prefix &amp;quot;SNAT_traffic: &amp;quot; (to add  a log prefix to log messages for this rule)&lt;br /&gt;
|Pass  additional arguments to iptables. Use with care as it can significantly alter  rule behaviour.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once configured. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Parental Control:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
For configuring parental control rules, you want to set restrictions based on time, source, and destination zones, as well as specific devices.&lt;br /&gt;
&lt;br /&gt;
To add parental control in firewall,&lt;br /&gt;
&lt;br /&gt;
Click on “Add and Edit” in “New parental control:” field.&lt;br /&gt;
&lt;br /&gt;
[[File:Parental Control.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:Parental Control Edit Options RC44.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Name&lt;br /&gt;
|Example:  Parental_Control_Sunday&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty&#039;&#039;&#039;: Provide a unique and descriptive name for the parental  control rule.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Proto&lt;br /&gt;
|all&lt;br /&gt;
|&#039;&#039;&#039;all&#039;&#039;&#039;:  This specifies that the rule will apply to all protocols.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Source Zone&lt;br /&gt;
|Example: lan&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty&#039;&#039;&#039;: Please look at Firewall-&amp;gt;Zone Settings to find zone  names.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Destination  Zone&lt;br /&gt;
|Example: wan&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty&#039;&#039;&#039;: Please look at Firewall-&amp;gt;Zone Settings to find zone  names.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Source MAC  Address&lt;br /&gt;
|Example:  00:1A:2B:3C:4D:5E&lt;br /&gt;
|&#039;&#039;&#039;Field&#039;&#039;&#039;:  Enter the MAC address of the device you want to apply the parental control  rule to. This is useful for restricting specific devices.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Target&lt;br /&gt;
|Example:  Reject&lt;br /&gt;
|&#039;&#039;&#039;Accept&#039;&#039;&#039;:  This specifies the action to take. For parental controls, you might want to  use ‘Reject’ or ‘Drop’ to block traffic.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Weekdays&lt;br /&gt;
|Example:  Sunday&lt;br /&gt;
|&#039;&#039;&#039;Sunday&#039;&#039;&#039;:  Specify the days of the week when the rule should be active.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Month Days&lt;br /&gt;
|Example: All&lt;br /&gt;
|&#039;&#039;&#039;All:&#039;&#039;&#039; Specify  the days of the month when the rule should be active.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Start Time (hh:mm:ss)&lt;br /&gt;
|Example:  18:00:00 (6:00 PM)&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty:&#039;&#039;&#039; Specify the start time when the rule should begin to apply.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Stop Time  (hh:mm:ss)&lt;br /&gt;
|Example:  22:00:00 (10:00 PM)&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty:&#039;&#039;&#039; Specify the stop time when the rule should end.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once configured. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Zone Forwarding:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Zone forwarding in network configuration allows traffic to be directed from one zone to another.&lt;br /&gt;
&lt;br /&gt;
To ADD new zone,&lt;br /&gt;
&lt;br /&gt;
Click on “Add” in “New Zone Forward:” field.&lt;br /&gt;
&lt;br /&gt;
[[File:Zone Forwarding RC44.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:Zone Forwarding Edit Options.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Source Zone&lt;br /&gt;
|Example options: CWAN (1,2,3), EWAN (1,2,3), VPN &amp;amp;  custom.&lt;br /&gt;
|&#039;&#039;&#039;--please  choose--&#039;&#039;&#039;: Select the source zone from which the traffic originates.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Destination Zone&lt;br /&gt;
|Example options: SW_LAN, EWAN3 &amp;amp; custom.&lt;br /&gt;
|&#039;&#039;&#039;--please  choose--&#039;&#039;&#039;: Select the destination zone to which the traffic is directed.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once configured.&lt;br /&gt;
&lt;br /&gt;
=== 3.5 Traffic Shaping ===&lt;br /&gt;
Traffic shaping also known as SQM (Smart Queue Management).&lt;br /&gt;
&lt;br /&gt;
The combination of the correct interface, queueing discipline, setup script, and accurate&lt;br /&gt;
&lt;br /&gt;
upload/download speed value allows SQM to effectively reduce latency, manage congestion, and&lt;br /&gt;
&lt;br /&gt;
improve overall network performance.&lt;br /&gt;
&lt;br /&gt;
[[File:Traffic Shaping.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:Traffic Shaping Edit Options.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Interface&lt;br /&gt;
|&#039;&#039;&#039;Options&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
eth0.1&lt;br /&gt;
&lt;br /&gt;
eth0.5&lt;br /&gt;
&lt;br /&gt;
ra0 (WiFi 2.4  GHz)&lt;br /&gt;
&lt;br /&gt;
wlan0 (WiFi 5  GHz)&lt;br /&gt;
&lt;br /&gt;
eth1&lt;br /&gt;
|You choose  the interface corresponding to the connection you want to manage, whether  it&#039;s a wired connection (eth0.x, eth1) or a wireless one (ra0, wlan0).&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Queueing  Discipline&lt;br /&gt;
|&#039;&#039;&#039;Options&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
Cake&lt;br /&gt;
&lt;br /&gt;
fq_code&lt;br /&gt;
|You select  the appropriate qdisc based on your needs; Cake is often preferred for its  advanced features and ease of configuration.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Queue Setup  Script&lt;br /&gt;
|&#039;&#039;&#039;Options&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
piece_of_cake.qos&lt;br /&gt;
&lt;br /&gt;
layer_Cake.qos&lt;br /&gt;
|Choose the  script that best suits your network environment; layer_Cake.qos provides more  features, while piece_of_cake.qos is easier to use.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Upload Speed  (kbps)&lt;br /&gt;
|10000 kbps&lt;br /&gt;
|This field  specifies the maximum upload speed in kilobits per second that your  connection can handle.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Download  Speed (kbps)&lt;br /&gt;
|85000 kbps&lt;br /&gt;
|This field  specifies the maximum download speed in kilobits per second that your  connection can handle.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once configured.&lt;br /&gt;
&lt;br /&gt;
=== 3.6 Loopback Rule ===&lt;br /&gt;
In this page the user can configure the port where he wants to forward the traffic to. Here the user can add/edit/delete different ports as per the requirement.&lt;br /&gt;
&lt;br /&gt;
[[File:Loopback Rule.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
The user should click on ‘add’ and then ‘edit’ to do the required changes in the port and enter the valid information in each section to configure the port for forwarding.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:Loopback Rule edit.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Name&lt;br /&gt;
|Example: loopback&lt;br /&gt;
|Provide a  descriptive name for the rule.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Protocol&lt;br /&gt;
|Example: TCP+UDP&lt;br /&gt;
|&#039;&#039;&#039;TCP+UDP&#039;&#039;&#039;:  Select the protocols that the rule will apply to.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Source IP Address [Optional]&lt;br /&gt;
|Example: any or a specific IP range like 192.168.1.0/24&lt;br /&gt;
|Optionally  specify the source IP address or range. Leave empty if the rule should apply  to any source IP.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Source Port [Optional]&lt;br /&gt;
|Example: any&lt;br /&gt;
|&#039;&#039;&#039;any&#039;&#039;&#039;:  Specify the source port or port range from which the traffic originates. any  allows traffic from all ports.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Destination IP Address&lt;br /&gt;
|Example: 172.16.31.25&lt;br /&gt;
|Only match  incoming traffic with this Destination IP or range. Typically, this is  127.0.0.1.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Destination Port&lt;br /&gt;
|Example: 81&lt;br /&gt;
|Only match  incoming traffic originating with the given destination port or port range on  the client host.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Action&lt;br /&gt;
|Example: DNAT&lt;br /&gt;
|This  specifies the action to take either DNAT or SNAT.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Internal IP Address&lt;br /&gt;
|Example: 192.168.1.100&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty&#039;&#039;&#039;: Specify the internal IP address to which the traffic should  be redirected.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Internal Port&lt;br /&gt;
|Example: 81&lt;br /&gt;
|Redirect  matched incoming traffic to the given port on the internal host.&lt;br /&gt;
|}&lt;br /&gt;
Once the user is done with the required configurations, user should click save button and then click on update to save the changes.&lt;br /&gt;
&lt;br /&gt;
=== 3.7 Remote Monitoring ===&lt;br /&gt;
In this page the user can select which equipment needs to be monitored remotely.&lt;br /&gt;
&lt;br /&gt;
Once the user selects the type of RMS click on save.&lt;br /&gt;
&lt;br /&gt;
[[File:Remote Monitoring.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NMS:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this page the user should type the server IP or domain name in the URL then click on save.&lt;br /&gt;
&lt;br /&gt;
Click on upload and start (Once key is uploaded and this option is clicked, NMS automatically starts, and this router device gets registered with the NMS server provided).&lt;br /&gt;
&lt;br /&gt;
[[File:Remote Management System NMS Configuration.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TR_069:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To enable the TR_069 the user needs to click on the enable check box.&lt;br /&gt;
&lt;br /&gt;
[[File:TR 069.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Once the user clicks on the check box of enable it will display all the required filed to configured.&lt;br /&gt;
&lt;br /&gt;
[[File:Remote Monitoring Tr-069.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable TR-069&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|When  enabled, the device can be remotely managed and configured by a service provider  using a TR-069 server.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Periodic Enable&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|It ensures  that the device regularly checks in with the management server for updates,  configuration changes, or status reports.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Accept Server Request&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|By  accepting server requests, the device can be managed in real-time, allowing  the server to push updates, configurations, or commands to the device.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Serving  Interval&lt;br /&gt;
|300&lt;br /&gt;
|A value of 300 seconds means the device  will check in with the ACS (auto-configuration servers) every 5 minutes.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Interface&lt;br /&gt;
|This can  be something like eth0 or wan.&lt;br /&gt;
|This specifies the network interface  used for TR-069 communication.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Username&lt;br /&gt;
|Example: User&lt;br /&gt;
|The username used to authenticate with  the ACS.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Password&lt;br /&gt;
|••••&lt;br /&gt;
|The password used to authenticate with  the ACS.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|URL&lt;br /&gt;
|&amp;lt;nowiki&amp;gt;https://167.71.232.131&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|The URL of the ACS. This is where the  CPE (customer-premises equipment) will send its requests and where it will  receive configurations and updates from.&lt;br /&gt;
|}&lt;br /&gt;
The user should fill all the required fields and click on the save button.&lt;br /&gt;
&lt;br /&gt;
=== 3.8 Tunnel ===&lt;br /&gt;
Tunnels are a method of transporting data across a network using protocols which are not supported by that network.&lt;br /&gt;
&lt;br /&gt;
It is further categorised into 2 sections,&lt;br /&gt;
&lt;br /&gt;
1.) General Settings&lt;br /&gt;
&lt;br /&gt;
2.) GRE Tunnel&lt;br /&gt;
&lt;br /&gt;
[[File:Tunnel Configuration General Settings.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this page the user needs to enable GRE tunnel to send the data.&lt;br /&gt;
&lt;br /&gt;
[[File:Tunnel Configuration General Settings Enablling.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Once the user enables GRE tunnel then click the save button.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;GRE Tunnel:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
A GRE (Generic Routing Encapsulation) tunnel configuration involves setting up a virtual point-to-point connection between two endpoints over an IP network.&lt;br /&gt;
&lt;br /&gt;
Here the user can add/edit/delete the details of the tunnel.&lt;br /&gt;
&lt;br /&gt;
[[File:5G Router GRE Configuration.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:GRE Tunnel.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Tunnel  name&lt;br /&gt;
|Example:  GRETunnel&lt;br /&gt;
|&#039;&#039;&#039;GRETunnel&#039;&#039;&#039;: The name of the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Local  external IP&lt;br /&gt;
|Example:  10.1.1.66&lt;br /&gt;
|The IP address of the local endpoint  that will initiate the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Remote  external IP&lt;br /&gt;
|Example:  10.1.1.40&lt;br /&gt;
|The IP address of the remote endpoint  that will terminate the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Peer  tunnel IP&lt;br /&gt;
|Example:  10.1.1.4&lt;br /&gt;
|The IP address of the peer&#039;s tunnel  interface.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Local  tunnel IP&lt;br /&gt;
|Example:  10.1.1.6&lt;br /&gt;
|The IP address of the local tunnel  interface.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Local  tunnel net mask&lt;br /&gt;
|Example:  255.255.255.0&lt;br /&gt;
|The subnet mask of the local tunnel  interface.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Remote IP&lt;br /&gt;
|Example:  192.168.10.0/24&lt;br /&gt;
|The remote network that is reachable  through the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Enable  Tunnel Link&lt;br /&gt;
|Check to  enable&lt;br /&gt;
|Enable or disable the GRE tunnel link.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Interface  type&lt;br /&gt;
|Example:  EWAN2&lt;br /&gt;
|&#039;&#039;&#039;EWAN2&#039;&#039;&#039;: The  type of network interface used for the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|MTU&lt;br /&gt;
|Example:  1476&lt;br /&gt;
|&#039;&#039;&#039;1476&#039;&#039;&#039;: Maximum  Transmission Unit size for the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|TTL&lt;br /&gt;
|Example:  64&lt;br /&gt;
|&#039;&#039;&#039;64&#039;&#039;&#039;: Time To  Live value for the packets within the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Tunnel  key&lt;br /&gt;
|Example:  12345678&lt;br /&gt;
|&#039;&#039;&#039;12345678&#039;&#039;&#039;: A unique key used to identify the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Enable  keep alive&lt;br /&gt;
|Check to  enable&lt;br /&gt;
|Enable or disable the keep-alive  feature to monitor the tunnel&#039;s status.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|Keep  alive interval&lt;br /&gt;
|Example:  10&lt;br /&gt;
|&#039;&#039;&#039;10&#039;&#039;&#039;:  Interval in seconds for the keep-alive packets.&lt;br /&gt;
|}&lt;br /&gt;
Once the required update is done then click on update to save the changes.&lt;br /&gt;
&lt;br /&gt;
== 4. Features ==&lt;br /&gt;
In this module the user can see all the features that the router has.&lt;br /&gt;
&lt;br /&gt;
This module includes the below features.&lt;br /&gt;
&lt;br /&gt;
* Mac Address Binding&lt;br /&gt;
* URL Filtering&lt;br /&gt;
* Web Server&lt;br /&gt;
* Others&lt;br /&gt;
&lt;br /&gt;
[[File:RS5X Features .png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
=== 4.1 Mac Address Binding ===&lt;br /&gt;
MAC address binding is a configuration that binds a specific MAC address to a specific IP address. This ensures that a particular device on the network always receives the same IP address from the DHCP server, which can be useful for network management, security, and ensuring consistent network behaviour.&lt;br /&gt;
&lt;br /&gt;
[[File:Mac Address Edit.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Device Name&lt;br /&gt;
|Ex: Macbinding1&lt;br /&gt;
|A user-defined name for the binding  configuration.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|MAC Address&lt;br /&gt;
|Ex: 48:9e:bd:da:45:91&lt;br /&gt;
|The unique identifier for the network interface  of the device to which the IP address will be bound.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|IP Address&lt;br /&gt;
|Ex: 192.168.10.55&lt;br /&gt;
|The IP address that will be consistently  assigned to the device with the specified MAC address.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By applying this configuration, the DHCP server will always assign the IP address 192.168.10.55 to the device with the MAC address 48:9e:bd:da:45:91, ensuring consistency and stability in network addressing for that device.&lt;br /&gt;
&lt;br /&gt;
* Once the user modifies the MAC address /IP Address then click on the save button to save the changes done.&lt;br /&gt;
* The user can click on the deleted button to delete an existing configured device.&lt;br /&gt;
* Post all the changes the user needs to click on the update to reflect all the changes in the application.&lt;br /&gt;
&lt;br /&gt;
Click on save tab once changes have been made.&lt;br /&gt;
&lt;br /&gt;
=== 4.2 URL Filtering ===&lt;br /&gt;
In this submodule the user should provide the URL which needs to be blocked for the device. By implementing URL filtering with the specified URL, you can control and restrict access to certain websites, thereby improving network security and managing user access.&lt;br /&gt;
&lt;br /&gt;
[[File:URL Filtering.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
To add the new URL for blocking, click on the Add New button.&lt;br /&gt;
&lt;br /&gt;
Once the user clicks on the Add New button a new pop will appear in that page write the URL and click on the save.&lt;br /&gt;
&lt;br /&gt;
The user can select the status of that URL while defining the URL.&lt;br /&gt;
&lt;br /&gt;
[[File:Url Update.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
To edit / delete the existing URL the user needs to click on the edit /deleted button respectively.&lt;br /&gt;
&lt;br /&gt;
[[File:URL Filtering .png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Click on “save” after the changes are done as per the need.&lt;br /&gt;
&lt;br /&gt;
=== 4.3 Web Server ===&lt;br /&gt;
This configuration will allow your device to serve web traffic securely over HTTPS, keep its system time synchronized, and ensure that all HTTP traffic is redirected to HTTPS for better security.&lt;br /&gt;
&lt;br /&gt;
[[File:Webserver Configuration Editing.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable HTTP&lt;br /&gt;
|&#039;&#039;&#039;HTTP Port:&#039;&#039;&#039; 80&lt;br /&gt;
&lt;br /&gt;
Enable or disable the HTTP server.&lt;br /&gt;
|Port 80 is the default port for HTTP traffic.  It is used to serve web pages over an unencrypted connection.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Enable HTTPS&lt;br /&gt;
|&#039;&#039;&#039;HTTPS Port:&#039;&#039;&#039; 443&lt;br /&gt;
&lt;br /&gt;
Enable or disable the HTTPS server.&lt;br /&gt;
|Port 443 is the default port for HTTPS traffic.  It is used to serve web pages over an encrypted connection.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Redirect HTTPS&lt;br /&gt;
|Option to redirect HTTP traffic to  HTTPS.&lt;br /&gt;
|When enabled, all HTTP requests will be  automatically redirected to the HTTPS port to ensure secure communication.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|RFC1918 Filter&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|When enabled, this filter can block traffic  from private IP ranges (e.g., 192.168.x.x, 10.x.x.x) from being routed  through the public internet, enhancing network security.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Enable NTP Sync&lt;br /&gt;
|Enable or disable NTP synchronization.&lt;br /&gt;
|Synchronizes the device’s system clock with an  external NTP server to maintain accurate time.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|NTP Server&lt;br /&gt;
|0.openwrt.pool.ntp.org&lt;br /&gt;
|The address of the NTP server used for time  synchronization. The openwrt.pool.ntp.org server is a public NTP server pool.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|NTP Sync Interval (In Minutes)&lt;br /&gt;
|15&lt;br /&gt;
|The interval at which the device will sync its  clock with the NTP server, set to every 15 minutes in this case.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== 4.4 Others ===&lt;br /&gt;
In this page the user will get to do all the other miscellaneous configuration with respect to the device based on the required parameters. Each utility serves a specific purpose, providing various functionalities for managing and troubleshooting network configurations and statuses.&lt;br /&gt;
&lt;br /&gt;
[[File:RS5X misc.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Set Date&lt;br /&gt;
|Date and time fields (day, month, year,  hour, minute, second)&lt;br /&gt;
|Sets the system date and time to the specified  values.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Get Date&lt;br /&gt;
|System&lt;br /&gt;
|Retrieves and displays the current system date  and time.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|IP Rule Show&lt;br /&gt;
|Command ‘Get’&lt;br /&gt;
|Displays the current IP rules configured on the  device.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Advanced Static Routes&lt;br /&gt;
|Command ‘Run’&lt;br /&gt;
|Used to manually define routing paths for  network traffic.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|ipsec status all&lt;br /&gt;
|Command ‘Get’&lt;br /&gt;
|Displays the status of all IPsec connections.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|iPerf3 Client&lt;br /&gt;
|IP address (e.g., 192.168.10.100)&lt;br /&gt;
|Runs an iPerf3 client to measure network  performance.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|iPerf3 Server&lt;br /&gt;
|Command ‘Run’&lt;br /&gt;
|Runs an iPerf3 server to measure network  performance.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Ping&lt;br /&gt;
|IP address or domain (e.g., 8.8.8.8)&lt;br /&gt;
|Sends ICMP echo requests to the specified  address to check connectivity.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|traceroute&lt;br /&gt;
|IP address or domain (e.g., 8.8.8.8)&lt;br /&gt;
|Traces the route packets take to reach the  specified address.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|ReadSIMInfo&lt;br /&gt;
|SIM1&lt;br /&gt;
&lt;br /&gt;
SIM2&lt;br /&gt;
|Reads and displays information about the SIM  card installed in the device.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|NTP Sync&lt;br /&gt;
|Command ‘Sync’&lt;br /&gt;
|Synchronizes the system time with the  configured NTP server.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|ReadLogFiles&lt;br /&gt;
|Log file identifier&lt;br /&gt;
|Reads and displays the specified log file&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Download Files&lt;br /&gt;
|File or database identifier&lt;br /&gt;
|Initiates a download of the specified file or  database.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|Restart Power&lt;br /&gt;
|Command ‘Restart’&lt;br /&gt;
|Restarts the power of the device.&lt;br /&gt;
|-&lt;br /&gt;
|15&lt;br /&gt;
|Restart Modem1&lt;br /&gt;
|Command ‘Restart’&lt;br /&gt;
|Restarts the modem.&lt;br /&gt;
|-&lt;br /&gt;
|16&lt;br /&gt;
|Run AT Command&lt;br /&gt;
|Enter AT command&lt;br /&gt;
|Executes the specified AT command on the modem.&lt;br /&gt;
|-&lt;br /&gt;
|17&lt;br /&gt;
|Scan Network operators for modem1  (Takes &amp;gt;3 mins)&lt;br /&gt;
|Command ‘Scan’&lt;br /&gt;
|Initiates a scan for available network  operators.&lt;br /&gt;
|-&lt;br /&gt;
|18&lt;br /&gt;
|Network operator list for modem1 (First  Perform Scan Network Operators)&lt;br /&gt;
|Command ‘Show’&lt;br /&gt;
|Displays the list of network operators detected  in the previous scan.&lt;br /&gt;
|-&lt;br /&gt;
|19&lt;br /&gt;
|Show Board Configuration&lt;br /&gt;
|Command ‘Show’&lt;br /&gt;
|Displays the current board configuration.&lt;br /&gt;
|-&lt;br /&gt;
|20&lt;br /&gt;
|Switch SIM to Secondary (Takes &amp;gt;2  mins)&lt;br /&gt;
|Command ‘Run’&lt;br /&gt;
|Switches the active SIM to the secondary SIM  card.&lt;br /&gt;
|-&lt;br /&gt;
|21&lt;br /&gt;
|Send test SMS&lt;br /&gt;
|Phone number (e.g., +911234567890)  message text (e.g., &amp;quot;Hello how are you?&amp;quot;)&lt;br /&gt;
|Sends a test SMS to the specified phone number.&lt;br /&gt;
|-&lt;br /&gt;
|22&lt;br /&gt;
|ReadlatestSMS&lt;br /&gt;
|Command ‘Read’&lt;br /&gt;
|Reads the most recent SMS received by the  device.&lt;br /&gt;
|-&lt;br /&gt;
|23&lt;br /&gt;
|Enable ssh (Admin)&lt;br /&gt;
|Command ‘Run’&lt;br /&gt;
|Enables SSH access for the admin user.&lt;br /&gt;
|-&lt;br /&gt;
|24&lt;br /&gt;
|Disable ssh (Admin)&lt;br /&gt;
|Command ‘Run’&lt;br /&gt;
|Disables SSH access for the admin user.&lt;br /&gt;
|-&lt;br /&gt;
|25&lt;br /&gt;
|Output&lt;br /&gt;
|Any value&lt;br /&gt;
|Displays output for all the above actions.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== 5.Maintenance ==&lt;br /&gt;
In this module the user can configure/upgrade/modify the settings related to system, password, firmware and monitoring.&lt;br /&gt;
&lt;br /&gt;
It includes below 6 submodules.&lt;br /&gt;
&lt;br /&gt;
* General&lt;br /&gt;
&lt;br /&gt;
* Password&lt;br /&gt;
* Reboot&lt;br /&gt;
* Import and Export config&lt;br /&gt;
* Firmware upgrade&lt;br /&gt;
* Monitor Application&lt;br /&gt;
&lt;br /&gt;
[[File:Maintenance System.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
=== 5.1 General ===&lt;br /&gt;
Here you can configure the basic aspects of router like its hostname or the time zone.&lt;br /&gt;
&lt;br /&gt;
It is further sub-divided into,&lt;br /&gt;
&lt;br /&gt;
1.) General Settings&lt;br /&gt;
&lt;br /&gt;
2.) Logging&lt;br /&gt;
&lt;br /&gt;
3.) Language and Style&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The System Properties section allows you to manage the general settings of your network device, including time settings, logging, hostname, and language preferences. &lt;br /&gt;
&lt;br /&gt;
[[File:Maintenance General settings 5G router.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Local  Time&lt;br /&gt;
|2024/08/23  09:44:47&lt;br /&gt;
|The current local date and time set on  the device.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Hostname&lt;br /&gt;
|Silbo-RS&lt;br /&gt;
|The hostname of the device, which is  used to identify it on the network.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Time zone&lt;br /&gt;
|Asia/Kolkata&lt;br /&gt;
|The time zone setting of the device,  which determines the local time.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Time Synchronization:&#039;&#039;&#039;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable  NTP Client&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|When enabled, the device periodically  syncs its clock with an external NTP server, ensuring the local time remains  accurate.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Enable  NTP Server&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|When enabled, the device acts as an NTP  server, allowing other devices on the network to sync their time with it.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|NTP  Server Candidates&lt;br /&gt;
|0.openwrt.pool.ntp.org&lt;br /&gt;
&lt;br /&gt;
1.openwrt.pool.ntp.org&lt;br /&gt;
&lt;br /&gt;
2.openwrt.pool.ntp.org&lt;br /&gt;
&lt;br /&gt;
3.openwrt.pool.ntp.org&lt;br /&gt;
|Provides multiple server options to  ensure redundancy and reliability in time synchronization. If one server is  unavailable, the device can try another in the list.&lt;br /&gt;
&lt;br /&gt;
You can add or remove any.&lt;br /&gt;
|}&lt;br /&gt;
Once the user configures the required details then click on save tab.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Logging:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Here the user can configure the basic aspects of your device related to system.&lt;br /&gt;
&lt;br /&gt;
The system log configuration provided specifies how the device handles and stores log information, including buffer size, external log server details, and log detail levels.&lt;br /&gt;
&lt;br /&gt;
[[File:Maintenance logging 5G router.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|System  log buffer size&lt;br /&gt;
|Example:  32 kiB&lt;br /&gt;
|The size of the memory buffer allocated  (0-32) for storing system logs before they are either written to a file or  sent to an external server.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|External  system log server&lt;br /&gt;
|Example:  0.0.0.0&lt;br /&gt;
|The IP address of an external server  where logs can be sent.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|External  system log server port&lt;br /&gt;
|Example:  514&lt;br /&gt;
|The port used to send logs to the  external log server. Port 514 is the default port for syslog.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Log  output level&lt;br /&gt;
|1.) Debug&lt;br /&gt;
&lt;br /&gt;
2.) Info&lt;br /&gt;
&lt;br /&gt;
3.) Notice&lt;br /&gt;
&lt;br /&gt;
4.) Warning&lt;br /&gt;
&lt;br /&gt;
5.) Error&lt;br /&gt;
&lt;br /&gt;
6.) Critical&lt;br /&gt;
&lt;br /&gt;
7.) Alert&lt;br /&gt;
&lt;br /&gt;
8.) Emergency&lt;br /&gt;
|&#039;&#039;&#039;Debug&#039;&#039;&#039;: Logs  all messages, including detailed debugging information. This is the most  verbose setting and can be useful for troubleshooting specific issues.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Info&#039;&#039;&#039;: Logs  informational messages, which may include normal operational messages.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Notice&#039;&#039;&#039;: Logs normal but significant conditions that  aren&#039;t errors.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Warning&#039;&#039;&#039;: Logs warning conditions that indicate  potential issues.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Error&#039;&#039;&#039;: Logs  error conditions that indicate problems.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Critical&#039;&#039;&#039;: Logs critical conditions that require  immediate attention.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alert&#039;&#039;&#039;: Logs  alert conditions that require urgent attention.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Emergency&#039;&#039;&#039;: Logs only the most severe conditions that  indicate the system is unusable.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Cron Log  level&lt;br /&gt;
|1.) Debug&lt;br /&gt;
&lt;br /&gt;
2.) Normal&lt;br /&gt;
&lt;br /&gt;
3.) Warning&lt;br /&gt;
|&#039;&#039;&#039;Debug&#039;&#039;&#039;: Use for  detailed troubleshooting.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Normal&#039;&#039;&#039;: Use for typical monitoring.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Warning&#039;&#039;&#039;: Use to track only issues and errors.&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Time Synchronization:&#039;&#039;&#039;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable  NTP Client&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|When enabled, the device periodically  syncs its clock with an external NTP server, ensuring the local time remains  accurate.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Enable  NTP Server&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|When enabled, the device acts as an NTP  server, allowing other devices on the network to sync their time with it.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|NTP  Server Candidates&lt;br /&gt;
|0.openwrt.pool.ntp.org&lt;br /&gt;
&lt;br /&gt;
1.openwrt.pool.ntp.org&lt;br /&gt;
&lt;br /&gt;
2.openwrt.pool.ntp.org&lt;br /&gt;
&lt;br /&gt;
3.openwrt.pool.ntp.org&lt;br /&gt;
|Provides multiple server options to  ensure redundancy and reliability in time synchronization. If one server is  unavailable, the device can try another in the list.&lt;br /&gt;
&lt;br /&gt;
You can add or remove any.&lt;br /&gt;
|}&lt;br /&gt;
Once the user configures the required details then click on save tab.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Language and Style:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Here the user can configure the basic aspects of your device related to language.&lt;br /&gt;
&lt;br /&gt;
[[File:Maintenance Language and style 5G router.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Time Synchronization:&#039;&#039;&#039;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable  NTP Client&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|When enabled, the device periodically  syncs its clock with an external NTP server, ensuring the local time remains  accurate.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Enable  NTP Server&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|When enabled, the device acts as an NTP  server, allowing other devices on the network to sync their time with it.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|NTP  Server Candidates&lt;br /&gt;
|0.openwrt.pool.ntp.org&lt;br /&gt;
&lt;br /&gt;
1.openwrt.pool.ntp.org&lt;br /&gt;
&lt;br /&gt;
2.openwrt.pool.ntp.org&lt;br /&gt;
&lt;br /&gt;
3.openwrt.pool.ntp.org&lt;br /&gt;
|Provides multiple server options to  ensure redundancy and reliability in time synchronization. If one server is  unavailable, the device can try another in the list.&lt;br /&gt;
&lt;br /&gt;
You can add or remove any.&lt;br /&gt;
|}&lt;br /&gt;
Once the user configures the required details then click on save tab.&lt;br /&gt;
&lt;br /&gt;
=== 5.2 Password ===&lt;br /&gt;
In this module the user can set the password for the admin credentials.&lt;br /&gt;
&lt;br /&gt;
Specifies the password for the guest account.&lt;br /&gt;
&lt;br /&gt;
If the user enters a plaintext password here, it will get replaced with a crypted password on save.&lt;br /&gt;
&lt;br /&gt;
The new password will be effective once the user logs out and log in again.&lt;br /&gt;
&lt;br /&gt;
[[File:Admin Password Setup.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Save the page once you have changed the password.&lt;br /&gt;
&lt;br /&gt;
=== 5.3 Reboot ===&lt;br /&gt;
In this module the user can reboot the device remotely.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
First option is to directly reboot the device without enabling the maintenance reboot tab.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Click on “Reboot Now” at the bottom of the screen to start the reboot process.&lt;br /&gt;
&lt;br /&gt;
[[File:Reboot Dashboard enable.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
To start maintenance reboot process first the user needs to fill all the required fields.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Need to select the type of reboot for the device whether it needs to be Hardware or Software reboot.&lt;br /&gt;
&lt;br /&gt;
[[File:Reboot Dashboard.png|frameless|602x602px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable  Maintenance Reboot&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Indicates whether the maintenance  reboot feature is enabled or not.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Type&lt;br /&gt;
|Maintenance  Reboot&lt;br /&gt;
|Specifies the type of reboot being  scheduled.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Reboot  Type&lt;br /&gt;
|Software/Hardware&lt;br /&gt;
|&#039;&#039;&#039;Hardware&#039;&#039;&#039;: A hardware reboot involves restarting the  entire device as if it were powered off and on again.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Software&#039;&#039;&#039;: A software reboot involves restarting the  operating system without powering off the hardware.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Minutes&lt;br /&gt;
|Example:  59&lt;br /&gt;
|The minute at which the reboot should  occur (0-59).&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Hours&lt;br /&gt;
|Example:  22 (10 PM)&lt;br /&gt;
|The hour at which the reboot should  occur (0-23, in 24-hour format).&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Day Of  Month&lt;br /&gt;
|Example:  All&lt;br /&gt;
|Specifies which days of the month the  reboot should occur (1-31). &amp;quot;All&amp;quot; means it will occur every day.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Month&lt;br /&gt;
|Example:  All&lt;br /&gt;
|Specifies which months the reboot  should occur (1-12). &amp;quot;All&amp;quot; means it will occur every month.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Day Of  Week&lt;br /&gt;
|Example:  All&lt;br /&gt;
|Specifies which days of the week the  reboot should occur (0-6, where 0 is Sunday). &amp;quot;All&amp;quot; means it will  occur every day of the week.&lt;br /&gt;
|}&lt;br /&gt;
Once the user fills all the required given parameters click on the save.&lt;br /&gt;
&lt;br /&gt;
=== 5.4 Import and Export ===&lt;br /&gt;
In this section, User can Import &amp;amp; Export Configuration files of the Device.&lt;br /&gt;
&lt;br /&gt;
[[File:Import and Export.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Click “Export Config” to export device configuration &amp;amp; settings to a text file,&lt;br /&gt;
&lt;br /&gt;
Click “Import Config” to import device configuration &amp;amp; settings from a previously exported text file.&lt;br /&gt;
&lt;br /&gt;
[[File:Import window.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The user needs to select on the “choose file”, upload the required file and click on apply.&lt;br /&gt;
&lt;br /&gt;
=== 5.5 Firmware Upgrade ===&lt;br /&gt;
The user can upgrade with the latest software for the existing firmware.&lt;br /&gt;
&lt;br /&gt;
[[File:Firmware Upgrade .png|frameless|620x620px]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Click on the &#039;&#039;&#039;flash image&#039;&#039;&#039; and chose the path where the sys-upgrade file is kept and then click on flash image, it will upgrade to the latest software once the reboot is done.&lt;br /&gt;
&lt;br /&gt;
This option will completely reset the device to default settings.&lt;br /&gt;
&lt;br /&gt;
[[File:Flash Image.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Click on the &#039;&#039;&#039;Retain Config and flash&#039;&#039;&#039; and chose the path where the sys-upgrade file is kept and then click on Retain Config and flash, it will upgrade to the latest software once the reboot is done.&lt;br /&gt;
&lt;br /&gt;
This refers to updating the firmware (flashing) of a device while preserving the current configuration settings.&lt;br /&gt;
&lt;br /&gt;
[[File:Retain Config and flash .png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Click on the &#039;&#039;&#039;Factory Reset&#039;&#039;&#039; for the complete reset of the device.&lt;br /&gt;
&lt;br /&gt;
[[File:Factory Reset.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
=== 5.6 Monitor Application ===&lt;br /&gt;
In this section, the monitor application is divided into major 2 configurations which is further sub-divided into 4 editable options,&lt;br /&gt;
&lt;br /&gt;
1.) Modem 1 Local Monitor Application:&lt;br /&gt;
&lt;br /&gt;
2.) Modem 1 Remote Monitor Application:&lt;br /&gt;
&lt;br /&gt;
[[File:Monitor Application Dashboard.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Modem 1 Local Monitor Application:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:Modem 1 Local Monitor Application-.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable Router Local Ping Check  Application&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Turns on the functionality to perform ping  checks on specified IP addresses.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Time Interval for Check (In minutes)&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 10 minutes&lt;br /&gt;
|Frequency at which the ping checks are  performed.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Select No of IP addresses to ping&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 1&lt;br /&gt;
|Number of IP addresses that will be pinged.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|IP Address 1&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 8.8.8.8&lt;br /&gt;
|The IP address to ping.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|No. of Retries&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 5&lt;br /&gt;
|Number of times to retry pinging an IP address  if the initial ping fails.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Failure Criteria in (%)&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 80% (If 4 out of 5 pings fail, it’s considered  a failure)&lt;br /&gt;
|Percentage of failed pings required to consider  the ping check a failure.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Action On Failure&lt;br /&gt;
|&#039;&#039;&#039;Options:&#039;&#039;&#039; Restart IPsec, Restart Board, Restart  Modem&lt;br /&gt;
|Action to be taken if the ping check fails  according to the criteria.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Enable Second Level Action&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Option to enable a secondary action if the  primary action fails multiple times.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Second Level Action Threshold&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 2&lt;br /&gt;
|Number of failures required to trigger the  secondary action.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Second Level Action&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; Restart Board (Reboots  the entire hardware board)&lt;br /&gt;
|The action to be taken if the second level  action threshold is met.&lt;br /&gt;
|}&lt;br /&gt;
Save the details once made necessary changes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Modem 1 Remote Monitor Application:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:Modem 1 Remote Monitor Application.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable Router Remote Ping Check Application&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Activates the  ping check functionality to monitor router performance.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Time Interval for Check (In minutes)&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 10 minutes&lt;br /&gt;
|How  frequently the ping checks are performed.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Select No of IP Addresses to Ping&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 1 (Please select the appropriate number  based on your requirements)&lt;br /&gt;
|Choose the  number of IP addresses to ping. This typically involves selecting from a list  or entering multiple addresses.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|No. of Retries&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 3&lt;br /&gt;
|Number of  retries if a ping fails.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Failure Criteria in (%)&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 80% (If 80% of the pings fail, it’s  deemed a failure)&lt;br /&gt;
|Percentage of  failed pings required to consider the ping check as failed.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Action On Failure&lt;br /&gt;
|&#039;&#039;&#039;Options:&#039;&#039;&#039; Restart IPsec, Restart Board, Restart  Modem&lt;br /&gt;
|The action  taken if the ping check fails according to the criteria.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Enable Second Level Action&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Option to  enable an additional action if the primary action fails.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Second Level Action Threshold&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; Specify the number of failures, such as 4&lt;br /&gt;
|Number of  times the primary action must fail before the secondary action is triggered.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Second Level Action&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; Restart Board&lt;br /&gt;
|The action to  be taken if the second level action threshold is met.&lt;br /&gt;
|}&lt;br /&gt;
Save the details once made necessary changes.&lt;br /&gt;
&lt;br /&gt;
== 6. Routing ==&lt;br /&gt;
Routing refers to the process of determining the path that data packets take from their source to their destination across networks.&lt;br /&gt;
&lt;br /&gt;
This section is divided into 5 sections,&lt;br /&gt;
&lt;br /&gt;
* Static Routing&lt;br /&gt;
* BGP (Border Gateway Protocol)&lt;br /&gt;
* OSPF (Open Shortest Path First)&lt;br /&gt;
* Dynamic Custom File&lt;br /&gt;
* Routing Debug&lt;br /&gt;
&lt;br /&gt;
[[File:Routing.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
=== 6.1 Static Routing ===&lt;br /&gt;
In this submodule the user can configure the parameters related to routing of the device like Target address, Networks address etc. Routing configurations allow network packets to be directed between different subnets and networks.&lt;br /&gt;
&lt;br /&gt;
It is further divided into 2 sections,&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Static IPV4 Routes&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Advanced Static IPV4 Routes&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Static IPV4 Routes:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Click on ‘Add’ to add a new interface.&lt;br /&gt;
&lt;br /&gt;
[[File:RS5X Static IPV4 Routes.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To edit the existing device the user needs to click on the edit option.&lt;br /&gt;
&lt;br /&gt;
Once the changes are done click on the save button to save all the changes.&lt;br /&gt;
&lt;br /&gt;
Click on the deleted button to delete the existing device detail.&lt;br /&gt;
&lt;br /&gt;
[[File:Static IPV4 Routes Editing.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Interface&lt;br /&gt;
|Ex: eth0.1&lt;br /&gt;
|The network interface to be used for this route.  Select the one to use from dropdown.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Target&lt;br /&gt;
|Ex: 192.168.20.0&lt;br /&gt;
|The destination subnet to which traffic should  be routed.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|IPv4 Netmask&lt;br /&gt;
|255.255.255.0&lt;br /&gt;
|The subnet mask for the target network.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Metric&lt;br /&gt;
|0&lt;br /&gt;
|The priority of the route.&lt;br /&gt;
&lt;br /&gt;
Lower values indicate higher priority.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|IPv4 Gateway&lt;br /&gt;
|Ex: 192.168.10.1&lt;br /&gt;
|The gateway IP address to be used for routing  traffic to the target subnet.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Route Type&lt;br /&gt;
|Unicast&lt;br /&gt;
|Standard route for individual destination IP  addresses.&lt;br /&gt;
&lt;br /&gt;
Custom changes can be made.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once configuration changes have been made.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Advanced Static IPV4 Routes:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This is further divided into 2 sections,&lt;br /&gt;
&lt;br /&gt;
Routing Tables&lt;br /&gt;
&lt;br /&gt;
Routing Rules for IPV4 &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Routing Tables:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Adding a new table in static routing allows you to define specific routes for traffic within a network.&lt;br /&gt;
&lt;br /&gt;
Click on ‘Add’ to add a new Table.&lt;br /&gt;
&lt;br /&gt;
[[File:Routing Tables.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:Editing Route Tables.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|ID of Table&lt;br /&gt;
|Ex: 1&lt;br /&gt;
|A unique identifier for the routing table.  Multiple tables can be used to define different sets of routing rules,  providing flexibility in how traffic is managed.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Name of Table&lt;br /&gt;
|Ex: Route&lt;br /&gt;
|A descriptive name for the routing table,  making it easier to manage and identify different tables.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Target&lt;br /&gt;
|Ex: 192.168.10.0&lt;br /&gt;
|Specifies the destination network or IP address  that the route is intended for.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|IPv4 Netmask&lt;br /&gt;
|255.255.255.0&lt;br /&gt;
|Defines the subnet mask for the target network.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Metric&lt;br /&gt;
|Ex: 0&lt;br /&gt;
|Indicates the priority of the route. A lower  metric value means a higher priority. Routes with lower metrics are preferred  over those with higher metrics.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|IPv4 Gateway&lt;br /&gt;
|Ex: 10.1.1.1&lt;br /&gt;
|Specifies the next hop or gateway IP address  through which the traffic to the target network should be routed.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Route Type&lt;br /&gt;
|1.) Unicast&lt;br /&gt;
&lt;br /&gt;
2.) Custom&lt;br /&gt;
|&#039;&#039;&#039;Unicast&#039;&#039;&#039;:  Standard route where packets are sent to a single destination IP address.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Custom&#039;&#039;&#039;: Enables  advanced routing configurations or specific protocols that might not be  covered by default.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Routing Rules for IPV4:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Click on ‘Add’ to add a new interface.&lt;br /&gt;
&lt;br /&gt;
[[File:Routing Rules for IPV4.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To edit the existing device the user needs to click on the edit option.&lt;br /&gt;
&lt;br /&gt;
Once the changes are done click on the save button to save all the changes.&lt;br /&gt;
&lt;br /&gt;
Click on the deleted button to delete the existing device detail.&lt;br /&gt;
&lt;br /&gt;
[[File:Routing Rules for IPV4 Editing.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Interface&lt;br /&gt;
|Ex: ra0&lt;br /&gt;
|Select the specific network interface on the  router through which traffic enters or exits.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|To&lt;br /&gt;
|Ex: 192.168.10.1&lt;br /&gt;
|The destination IP address or network. In this  case, 192.168.10.1 is the target IP address for routing traffic.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|IPv4 Netmask&lt;br /&gt;
|Ex: 255.255.255.192&lt;br /&gt;
|Defines the subnet mask, which helps determine  the size of the network.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Table ID&lt;br /&gt;
|Ex: 1&lt;br /&gt;
|Identifies which routing table this rule  applies to.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|From&lt;br /&gt;
|Ex: 192.168.100.1&lt;br /&gt;
|Specifies the source IP address or network from  which the traffic originates. In this case, the traffic is coming from  192.168.100.1.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Priority&lt;br /&gt;
|Ex:20&lt;br /&gt;
|Determines the order in which routing rules are  evaluated. Lower numbers have higher priority. If two rules conflict, the one  with the lower priority number will be applied first.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Outgoing Interface&lt;br /&gt;
|1.) fwmark&lt;br /&gt;
&lt;br /&gt;
2.) iif (Incoming Interface)&lt;br /&gt;
&lt;br /&gt;
3.) oif (Outgoing Interface)&lt;br /&gt;
&lt;br /&gt;
4.) lookup&lt;br /&gt;
&lt;br /&gt;
5.) blackhole&lt;br /&gt;
&lt;br /&gt;
6.) prohibited&lt;br /&gt;
&lt;br /&gt;
7.) unreachable&lt;br /&gt;
|1.) This  allows you to create rules that apply only to traffic that has been marked in  a specific way by the firewall.&lt;br /&gt;
&lt;br /&gt;
2.) This is  often used to create rules based on the interface through which traffic is  received.&lt;br /&gt;
&lt;br /&gt;
3.) This  allows you to control the flow of traffic based on the desired outgoing  interface.&lt;br /&gt;
&lt;br /&gt;
4.) It tells the router to check the specific  routing table ID mentioned to determine how to route the traffic.&lt;br /&gt;
&lt;br /&gt;
5.) This is  used when you want to block traffic without notifying the sender.&lt;br /&gt;
&lt;br /&gt;
6.) Like  blackhole but sends an ICMP unreachable message to the sender, indicating  that the route is prohibited.&lt;br /&gt;
&lt;br /&gt;
7.) Causes  the router to send an ICMP unreachable message to the source IP, notifying  that the destination is unreachable.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== 6.2 BGP ===&lt;br /&gt;
BGP is crucial for the operation of the internet, allowing routers to exchange information and find the best paths for data to travel across multiple networks globally.&lt;br /&gt;
&lt;br /&gt;
This section is divided into 5 sub sections,&lt;br /&gt;
&lt;br /&gt;
* Status&lt;br /&gt;
* General settings&lt;br /&gt;
* Instance&lt;br /&gt;
* Peers&lt;br /&gt;
* Peer Group&lt;br /&gt;
&lt;br /&gt;
[[File:BGP Dashboard.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The ‘&#039;&#039;&#039;Status&#039;&#039;&#039;’ section will show the status of the connections made.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:BGP General Settings.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable BGP&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|This setting  is used to turn on BGP functionality on the router. Once enabled, the router  can participate in BGP routing, exchange routing information with other BGP  peers.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Enable vty&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|vty refers to  the Virtual Terminal lines on a router, which allow remote users to connect  to the router using protocols like Telnet or SSH.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Password&lt;br /&gt;
|*****&lt;br /&gt;
|The password  is set to secure access to the router&#039;s vty lines.&lt;br /&gt;
|}&lt;br /&gt;
Click on save and update once changes have been made.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Instance:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In configuring BGP on a router, the &amp;quot;BGP Instance&amp;quot; section is critical as it defines the unique settings for BGP operations on that particular router.&lt;br /&gt;
&lt;br /&gt;
[[File:Instance.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|AS&lt;br /&gt;
|Ex: 12&lt;br /&gt;
|BGP uses AS  numbers to maintain separation between different networks and to prevent  routing loops.&lt;br /&gt;
&lt;br /&gt;
This field  must not be empty because it is essential for BGP to function correctly.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Router ID&lt;br /&gt;
|Ex: 192.168.10.12&lt;br /&gt;
|The Router ID  is a unique identifier for the BGP instance within an AS. It helps  distinguish between multiple routers within the same AS.&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Network Import Check&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|This option  enables or disables checking if a route exists in the local routing table  before it is advertised to BGP peers.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Advertise Networks&lt;br /&gt;
|Ex: 192.168.10.0/24&lt;br /&gt;
|This field is  used to specify which networks should be advertised to BGP peers.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Redistribute Options&lt;br /&gt;
|1.) None&lt;br /&gt;
&lt;br /&gt;
2.) Kernel Added Routes&lt;br /&gt;
&lt;br /&gt;
3.) Connected Routes&lt;br /&gt;
&lt;br /&gt;
4.) OSPF Routes&lt;br /&gt;
&lt;br /&gt;
5.) NHRP Routes&lt;br /&gt;
&lt;br /&gt;
6.) Static Routes&lt;br /&gt;
|&#039;&#039;&#039;None&#039;&#039;&#039;:  No routes are redistributed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Kernel  Added Routes&#039;&#039;&#039;: Routes that are added by the kernel are redistributed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Connected  Routes&#039;&#039;&#039;: Directly connected routes are redistributed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;OSPF  Routes&#039;&#039;&#039;: Routes learned through OSPF are redistributed into BGP.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NHRP  Routes:&#039;&#039;&#039; Routes discovered through NHRP will be advertised to BGP peers.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Static  Routes:&#039;&#039;&#039; Any static routes defined by an administrator will be advertised  to BGP peers.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Deterministic MED&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|This option,  when enabled, ensures that the router uses a deterministic method to select  the best path when there are multiple routes with the same AS path length but  different MED values.&lt;br /&gt;
|}&lt;br /&gt;
Click on save and update once changes have been made.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Peers:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
These are other routers with which your router establishes a BGP session to exchange routing information. Peers can be within the same organization or with external networks.&lt;br /&gt;
&lt;br /&gt;
[[File:BGP Peers.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To edit the existing device the user needs to click on the edit option.&lt;br /&gt;
&lt;br /&gt;
Once the changes are done click on the save button to save all the changes.&lt;br /&gt;
&lt;br /&gt;
Click on the deleted button to delete the existing device detail.&lt;br /&gt;
&lt;br /&gt;
[[File:BGP Peers Edit .png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Name&lt;br /&gt;
|Ex: Route&lt;br /&gt;
|This is an  identifier that helps you distinguish between different peers or  configurations.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|AS&lt;br /&gt;
|Ex: 12&lt;br /&gt;
|BGP uses AS  numbers to differentiate between different networks.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|IP Address&lt;br /&gt;
|Ex: 10.1.1.0&lt;br /&gt;
|Specifies the  IP address of the BGP peer.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Update Source&lt;br /&gt;
|Ex: loopback&lt;br /&gt;
|Name of the  Loopback Interface&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|EBGP MultiHop&lt;br /&gt;
|Ex: 5&lt;br /&gt;
|The TTL (Time  to Live) value that allows BGP to establish a session with a peer multiple  hops away. The value 5 means the BGP peer is up to 5 hops away.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Password&lt;br /&gt;
|*****&lt;br /&gt;
|Both peers  must have the same password configured to establish a secure BGP session.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Weight&lt;br /&gt;
|Ex: 100&lt;br /&gt;
|A higher  weight is preferred, and 100 is a common value for prioritizing routes from  this peer.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Default Originate&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|This setting  would be enabled if you want your router to advertise a default route  (0.0.0.0/0) to the BGP peer, indicating that your router can be used as a  default gateway.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Next Hop Self&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|This option  would be enabled if you want your router to advertise its own IP address as  the next hop for routes sent to the BGP peer.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Inbound Soft Reconfiguration&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|When enabled,  this allows for BGP policy changes without resetting the session.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Hold Time&lt;br /&gt;
|Ex: 180 (seconds)&lt;br /&gt;
|The maximum  time the router will wait before considering the peer is unreachable.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Keepalive Time&lt;br /&gt;
|Ex: 60 (seconds)&lt;br /&gt;
|It is  typically set to one-third of the Hold Time to ensure the peer is still  responsive.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Connect Retry Time&lt;br /&gt;
|Ex:120 (seconds)&lt;br /&gt;
|The time the  router waits before retrying a connection to the BGP peer if the session  fails.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Peer Groups:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Peer groups allow you to group several peers together and apply the same routing policies to them, simplifying the management of BGP configurations.&lt;br /&gt;
&lt;br /&gt;
[[File:Peer Group.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To edit the existing device the user needs to click on the edit option.&lt;br /&gt;
&lt;br /&gt;
Once the changes are done click on the save button to save all the changes.&lt;br /&gt;
&lt;br /&gt;
Click on the deleted button to delete the existing device detail.&lt;br /&gt;
&lt;br /&gt;
[[File:Edit Peers Group.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Name&lt;br /&gt;
|Ex: Route&lt;br /&gt;
|This is an  identifier that helps you distinguish between different peers or  configurations.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|AS&lt;br /&gt;
|Ex: 12&lt;br /&gt;
|BGP uses AS numbers  to differentiate between different networks.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Neighbor Address&lt;br /&gt;
|192.168.1.2&lt;br /&gt;
|This is the  IP address of the BGP neighbor (peer) you&#039;re establishing a session with.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Password&lt;br /&gt;
|****&lt;br /&gt;
|Both peers  must have the same password configured to establish a secure session.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Weight&lt;br /&gt;
|Ex: 100&lt;br /&gt;
|A higher  weight is preferred. 100 is a common value used to prioritize routes from  this peer.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Inbound Soft Reconfiguration&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|When enabled,  this allows for BGP policy changes without resetting the session.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Hold Time&lt;br /&gt;
|Ex: 180 (seconds)&lt;br /&gt;
|The maximum  time the router will wait before considering the peer is unreachable.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Keepalive Time&lt;br /&gt;
|Ex: 60 (seconds)&lt;br /&gt;
|It is  typically set to one-third of the Hold Time to ensure the peer is still  responsive.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Connect Retry Time&lt;br /&gt;
|Ex:120 (seconds)&lt;br /&gt;
|The time the  router waits before retrying a connection to the BGP peer if the session  fails.&lt;br /&gt;
|}&lt;br /&gt;
Click on save and update once changes have been made.&lt;br /&gt;
&lt;br /&gt;
=== 6.3 OSPF ===&lt;br /&gt;
OSPF (Open Shortest Path First) is a &#039;&#039;&#039;link-state&#039;&#039;&#039; protocol, which means it builds a complete map (or topology) of the network and uses that map to calculate the shortest path to each destination.&lt;br /&gt;
&lt;br /&gt;
This section is divided into 5 sub sections,&lt;br /&gt;
&lt;br /&gt;
* Status&lt;br /&gt;
* General settings&lt;br /&gt;
* Instance&lt;br /&gt;
* Network and Area&lt;br /&gt;
* Interface&lt;br /&gt;
&lt;br /&gt;
[[File:OSPF Dashboard.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
The ‘&#039;&#039;&#039;Status&#039;&#039;&#039;’ section will show the status of the connections made. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:OSPF General Settings.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable OSPF&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|When you  enable OSPF, the router starts participating in OSPF processes, such as  exchanging routing information with other OSPF-enabled routers and  calculating the shortest path to each network.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Enable vty&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|vty refers to  the Virtual Terminal lines on a router, which allow remote users to connect  to the router using protocols like Telnet or SSH.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Password&lt;br /&gt;
|*****&lt;br /&gt;
|The password  is set to secure access to the router&#039;s vty lines.&lt;br /&gt;
|}&lt;br /&gt;
Click on save and update once changes have been made.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Instance:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This setup enables a well-structured and efficient OSPF deployment, ensuring that the right routes are advertised while keeping the OSPF process streamlined by controlling where OSPF traffic is generated.&lt;br /&gt;
&lt;br /&gt;
[[File:OSPF Instance.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Router ID&lt;br /&gt;
|Ex: 192.168.10.12&lt;br /&gt;
|The Router ID  identifies the OSPF router uniquely in the network.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Passive Interfaces&lt;br /&gt;
|1.) None&lt;br /&gt;
&lt;br /&gt;
2.) Loopback&lt;br /&gt;
&lt;br /&gt;
3.) Eth 0.5&lt;br /&gt;
&lt;br /&gt;
4.) custom&lt;br /&gt;
|&#039;&#039;&#039;None&#039;&#039;&#039;:  No interface is set as passive.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;loopback&#039;&#039;&#039;:  Marks the loopback interface as passive.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;eth 0.5&#039;&#039;&#039;:  Marks the eth0.5 interface as passive.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;custom&#039;&#039;&#039;:  Allows you to specify a custom interface name.&lt;br /&gt;
&lt;br /&gt;
Passive  interfaces are used when you want to advertise a network in OSPF but do not  want to establish OSPF neighbour relationships on that interface, reducing  unnecessary OSPF traffic.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Redistribute Options&lt;br /&gt;
|1.) None&lt;br /&gt;
&lt;br /&gt;
2.) Kernel Added Routes&lt;br /&gt;
&lt;br /&gt;
3.) Connected Routes&lt;br /&gt;
&lt;br /&gt;
4.) NHRP Routes&lt;br /&gt;
&lt;br /&gt;
5.) Static Routes&lt;br /&gt;
&lt;br /&gt;
6.) BGP&lt;br /&gt;
|&#039;&#039;&#039;None&#039;&#039;&#039;:  No routes are redistributed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Kernel  Added Routes&#039;&#039;&#039;: Routes that are added by the kernel are redistributed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Connected  Routes&#039;&#039;&#039;: Directly connected routes are redistributed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NHRP  Routes:&#039;&#039;&#039; Routes discovered through NHRP will be advertised to BGP peers.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Static  Routes:&#039;&#039;&#039; Any static routes defined by an administrator will be advertised  to BGP peers.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;BGP:&#039;&#039;&#039; Redistributes  routes from Border Gateway Protocol (BGP) into OSPF.&lt;br /&gt;
|}&lt;br /&gt;
Click on save and update once changes have been made.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Network and Area:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:OSPF Network and Area.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To edit the existing device the user needs to click on the edit option.&lt;br /&gt;
&lt;br /&gt;
Once the changes are done click on the save button to save all the changes.&lt;br /&gt;
&lt;br /&gt;
Click on the deleted button to delete the existing device detail.&lt;br /&gt;
&lt;br /&gt;
[[File:OSPF Network and Area Editing.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Name&lt;br /&gt;
|Ex: Network&lt;br /&gt;
|A descriptive name that helps identify the  connection&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Network&lt;br /&gt;
|Ex: 192.168.25.0/24&lt;br /&gt;
|This network will be advertised by OSPF to  other OSPF routers in the same area.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Area&lt;br /&gt;
|Ex: 0.0.0.0&lt;br /&gt;
|OSPF areas help segment large networks to  reduce routing overhead. Area 0.0.0.0 is the backbone area, and all other  areas typically connect through this area.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Interface:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The interface determines the physical or logical port through which the connection will be routed.&lt;br /&gt;
&lt;br /&gt;
[[File:OSPF Interface.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To edit the existing device the user needs to click on the edit option.&lt;br /&gt;
&lt;br /&gt;
Once the changes are done click on the save button to save all the changes.&lt;br /&gt;
&lt;br /&gt;
Click on the deleted button to delete the existing device detail.&lt;br /&gt;
&lt;br /&gt;
[[File:OSPF Interface Editing.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Name&lt;br /&gt;
|Ex: Route&lt;br /&gt;
|This name  helps distinguish between different connections within the router&#039;s  configuration.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Interface&lt;br /&gt;
|1.) Loopback&lt;br /&gt;
&lt;br /&gt;
2.) Eth0.5&lt;br /&gt;
&lt;br /&gt;
3.) Custom&lt;br /&gt;
|&#039;&#039;&#039;Loopback&#039;&#039;&#039;:  Typically used for internal routing within the router, often for the router&#039;s  own identification (127.0.0.1).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Eth0.5&#039;&#039;&#039;:  Refers to a physical or virtual Ethernet interface on the router&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Custom&#039;&#039;&#039;:  Allows you to specify a different or specialized interface, depending on your  network setup.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Priority&lt;br /&gt;
|Ex: 10, 20&lt;br /&gt;
|A lower  priority number (e.g., 10) means this route will be preferred over others  with a higher number (e.g., 20) when routing decisions are made.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Cost&lt;br /&gt;
|Ex: 10&lt;br /&gt;
|The cost can  be based on bandwidth, where faster links have lower costs.&lt;br /&gt;
&lt;br /&gt;
For example,  10 might be assigned to a high-speed interface, while 100 might be assigned  to a slower one.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Hello  Interval&lt;br /&gt;
|Ex: 10secs&lt;br /&gt;
|Adjusting the  Hello Interval can impact OSPF neighbour formation and stability.&lt;br /&gt;
&lt;br /&gt;
Default is  usually 10 seconds for broadcast and point-to-point networks.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Dead Interval&lt;br /&gt;
|Ex: 40secs&lt;br /&gt;
|This interval  determines how long OSPF waits before considering a neighbour lost.&lt;br /&gt;
&lt;br /&gt;
Default is  usually 40 seconds (four times the Hello Interval).&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Retransmit  Interval&lt;br /&gt;
|Ex: 5secs&lt;br /&gt;
|It should be  set according to the network&#039;s performance and reliability.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Network Type&lt;br /&gt;
|1.) Broadcast&lt;br /&gt;
&lt;br /&gt;
2.)  Non-broadcast&lt;br /&gt;
&lt;br /&gt;
3.)  Point-to-point&lt;br /&gt;
&lt;br /&gt;
4.) Point-to-multipoint&lt;br /&gt;
|&#039;&#039;&#039;Broadcast&#039;&#039;&#039;:  For Ethernet or other broadcast-capable networks where a DR/BDR is elected.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Non-broadcast&#039;&#039;&#039;:  For networks that don&#039;t support broadcasting, like Frame Relay, where  neighbours must be manually configured.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Point-to-point&#039;&#039;&#039;:  For direct connections between two routers with no need for a DR/BDR.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Point-to-multipoint&#039;&#039;&#039;:  For networks with multiple connections that don’t require a DR/BDR.&lt;br /&gt;
&lt;br /&gt;
The choice of  network type should match the physical and logical topology of the network.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Authentication&lt;br /&gt;
|1.) None&lt;br /&gt;
&lt;br /&gt;
2.) General  key&lt;br /&gt;
&lt;br /&gt;
3.) MD5&lt;br /&gt;
|&#039;&#039;&#039;None:&#039;&#039;&#039; No  authentication is used.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General  key:&#039;&#039;&#039; Uses a simple password (plaintext).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;MD5:&#039;&#039;&#039; Uses  MD5 hash-based authentication, which is more secure.&lt;br /&gt;
|}&lt;br /&gt;
Save and update the page once configured.&lt;br /&gt;
&lt;br /&gt;
=== 6.4 Dynamic Routing Custom File Upload ===&lt;br /&gt;
Dynamic Routing Custom File Upload allows you to select and upload a custom configuration file for dynamic routing settings (e.g., OSPF, BGP).&lt;br /&gt;
&lt;br /&gt;
Enable “Upload Custom File”&lt;br /&gt;
&lt;br /&gt;
Upload Custom File:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Purpose&#039;&#039;&#039;: Finalizes the selection and prepares the file for uploading to the router.&lt;br /&gt;
* &#039;&#039;&#039;Expected Action&#039;&#039;&#039;: Click &amp;quot;Upload&amp;quot; after selecting your file.&lt;br /&gt;
* &#039;&#039;&#039;Explanation&#039;&#039;&#039;: This action uploads the file to the router, making it available for the router to use or store in its configuration directory.&lt;br /&gt;
&lt;br /&gt;
[[File:Dynamic Routing Custom File Upload.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
[[File:Dynamic Routing Custom File Uploading.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Once you upload and apply the configuration, the router will update its routing tables or other related settings based on the contents of the custom file.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
If you&#039;re managing a complex network and need to implement specific dynamic routing protocols or settings not available through the standard router interface, you can upload a custom file with the exact configurations required.&lt;br /&gt;
&lt;br /&gt;
Save and update the page once configured.&lt;br /&gt;
&lt;br /&gt;
=== 6.5 Routing Debug ===&lt;br /&gt;
The &amp;quot;Routing Debug&amp;quot; section provides various utilities and commands to diagnose and monitor routing protocols like BGP (Border Gateway Protocol) and OSPF (Open Shortest Path First).&lt;br /&gt;
&lt;br /&gt;
[[File:Routing Debug.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Show BGP  Summary&lt;br /&gt;
|Command ‘RUN’&lt;br /&gt;
|Displays a  summary of the BGP sessions, including the status of each BGP neighbour.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Show BGP  Running Config&lt;br /&gt;
|Command ‘RUN’&lt;br /&gt;
|Displays the  current running configuration for BGP.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Show IP BGP&lt;br /&gt;
|Command ‘RUN’&lt;br /&gt;
|Shows the  current BGP routing table.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Refresh BGP  Table&lt;br /&gt;
|Command ‘RUN’&lt;br /&gt;
|Refreshes the  BGP routing table, which can be useful after making changes to BGP  configuration.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Show BGP  Neighbors&lt;br /&gt;
|Ex: 10.1.1.120&lt;br /&gt;
|Displays  detailed information about the BGP neighbor with the specified IP address.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Show Received  Routes&lt;br /&gt;
|Ex: 10.1.1.120&lt;br /&gt;
|Shows the  routes received from the specified BGP neighbor.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Run Custom  BGP Command&lt;br /&gt;
|Ex:  show ip bgp summary&lt;br /&gt;
|Allows you to  run any custom BGP command to gather specific information.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Show OSPF  Neighbors&lt;br /&gt;
|router-id&lt;br /&gt;
|Displays the  list of OSPF neighbors and their statuses.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Show OSPF  Route&lt;br /&gt;
|Command ‘RUN’&lt;br /&gt;
|Displays the  OSPF routing table, showing routes learned through OSPF.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Show OSPF  Database&lt;br /&gt;
|Command ‘RUN’&lt;br /&gt;
|Shows the  OSPF link-state database, which contains all the LSA (Link-State  Advertisements) information.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Show IP Route&lt;br /&gt;
|Command ‘RUN’&lt;br /&gt;
|A list of all  routes in the routing table, including destination networks, next hops, and  metrics.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Show IP Rule&lt;br /&gt;
|Command ‘RUN’&lt;br /&gt;
|Shows IP  rules that determine routing decisions based on specific criteria.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Show IP Route  Table&lt;br /&gt;
|Enter a  specific command&lt;br /&gt;
|Displays the  content of a specific routing table.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|Show IP Route  Get&lt;br /&gt;
|Ex: 10.1.1.10  (destination IP address)&lt;br /&gt;
|Information  on the route to the destination, including the next hop and outgoing  interface.&lt;br /&gt;
|-&lt;br /&gt;
|15&lt;br /&gt;
|Flush IP  Routes Cache&lt;br /&gt;
|Command ‘RUN’&lt;br /&gt;
|Clears the IP  route cache, forcing the router to rebuild the cache with fresh data.&lt;br /&gt;
|-&lt;br /&gt;
|16&lt;br /&gt;
|Output&lt;br /&gt;
|Results&lt;br /&gt;
|The results  of the executed commands and utilities are displayed.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= 7.Logout =&lt;br /&gt;
Click on log out option to exit the application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Logout.png|frameless|620x620px]]&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=RB44_Firmware&amp;diff=2841</id>
		<title>RB44 Firmware</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=RB44_Firmware&amp;diff=2841"/>
		<updated>2025-04-28T12:07:34Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains the firmware changelogs and upgrades of RB44 device.&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RB44/openwrt-ramips-mt76x8-Silbo_RB44-squashfs-sysupgrade%20%281.17_1.17%29.bin RB44 1.17_1.17] ===&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RB44/openwrt-ramips-mt76x8-Silbo_RB44-squashfs-sysupgrade%20%281.17_1.16%29.bin RB44 1.17_1.16] ===&lt;br /&gt;
New Features &amp;amp; Improvements:&lt;br /&gt;
&lt;br /&gt;
* WPA3 security option added to Wi-Fi AP settings.&lt;br /&gt;
* UART console print statements modified for security hardening.&lt;br /&gt;
* VLAN capability added in Network settings.&lt;br /&gt;
* Introduced Load balancing feature between multiple WAN options.&lt;br /&gt;
* Connection diagnostic feature added.&lt;br /&gt;
* DMZ implemented.&lt;br /&gt;
* VRRP added.&lt;br /&gt;
* Package manager feature introduced. &lt;br /&gt;
* Health Monitoring &amp;amp; Reboot reason is also introduced.&lt;br /&gt;
* Known bug fixes in L2TP, IPsec, PPTP&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RB44/openwrt-ramips-mt76x8-Silbo_RB44-squashfs-sysupgrade%20%281.16_1.13_RC5%29.bin RB44 1.16_1.13_RC5] ===&lt;br /&gt;
New Features &amp;amp; Improvements:&lt;br /&gt;
* Bug Fixed related to model name displaying issue in the info page.&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RB44/openwrt-ramips-mt76x8-Silbo_RB44-squashfs-sysupgrade%20%281.16_1.13_RC4%29.bin RB44 1.16_1.13_RC4] ===&lt;br /&gt;
New Features &amp;amp; Improvements:&lt;br /&gt;
* Add_Macaddr.sh ,firstboot script,rebootscript.sh,test_script.sh,rpc-diagnosticutilities,  is updated with wifi enable or disable logic&lt;br /&gt;
* Recycle_WAN1_PWR_Script.sh is modified to remove extra logs.&lt;br /&gt;
* qnetdevctl.sh is modified to remove logging.&lt;br /&gt;
* configuration.vpnconfig1.js,openvpn.sh script is modified to create a bridge of tap and SW_LAN.&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RB44/openwrt-ramips-mt76x8-Silbo_RB44-squashfs-sysupgrade%20%281.16_1.13_RC2%29.bin RB44 1.16_1.13_RC2] ===&lt;br /&gt;
New Features &amp;amp; Improvements:&lt;br /&gt;
&lt;br /&gt;
* AddInterface.sh script is modified to add more logs in logfile.&lt;br /&gt;
* simswitch script is modified to update APN/PDP before sim switch logic.&lt;br /&gt;
* SystemRestart.sh script is modified to update APN/PDP of sim1.&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RB44/openwrt-ramips-mt76x8-Silbo_RB44-squashfs-sysupgrade%20%281.16_.1.13%29.bin RB44 1.16_.1.13] ===&lt;br /&gt;
New Features &amp;amp; Improvements:&lt;br /&gt;
&lt;br /&gt;
* IPSEC version is updated to 5.9.2 and logic for lan passthrough is updated.&lt;br /&gt;
* The multiple OpenVPN feature is updated.&lt;br /&gt;
* Wiregurad and Zerotier feature is integrated.&lt;br /&gt;
* Routerlocalpingtestapp.sh is updated to use the usb0/wwan0 interface in the ping command and also use 464-wan6c1_xlat/464-wan6c2_xlat  in the ping command when ipv6 with clat is enabled.&lt;br /&gt;
* SMSEventhandler.sh is updated to send sms with/without apikey,validsmsreceivernumber,serial number.&lt;br /&gt;
* Auto APN feature is updated in settings&amp;gt;&amp;gt;network web page.&lt;br /&gt;
* OpenVPN version is updated from 2.4.7 to 2.5.4&lt;br /&gt;
* Display of Active sim QCCID on the overview page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RB44/openwrt-ramips-mt76x8-Silbo_RB44-squashfs-sysupgrade.bin RB44 1.15 _1.12_RC3] ===&lt;br /&gt;
New Features &amp;amp; Improvements:&lt;br /&gt;
&lt;br /&gt;
* uboot code updated to use the reset button for the flash image.&lt;br /&gt;
&lt;br /&gt;
* Minor bug fix related to MAC address.&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=RC44_Firmware&amp;diff=2840</id>
		<title>RC44 Firmware</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=RC44_Firmware&amp;diff=2840"/>
		<updated>2025-04-17T08:40:51Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: /* RC44 1.17_1.16 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains the firmware changelogs and upgrades of RC44 device.&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RC44/openwrt-ramips-mt76x8-Silbo_RC44-squashfs-sysupgrade%281.17_1.16%29.bin RC44 1.17_1.16] ===&lt;br /&gt;
New Features &amp;amp; Improvements:&lt;br /&gt;
&lt;br /&gt;
* WPA3 security option added to Wi-Fi AP settings.&lt;br /&gt;
* UART console print statements modified for security hardening.&lt;br /&gt;
* VLAN capability added in Network settings.&lt;br /&gt;
* Introduced Load balancing feature between multiple WAN options.&lt;br /&gt;
* Connection diagnostic feature added.&lt;br /&gt;
* DMZ implemented.&lt;br /&gt;
* VRRP added.&lt;br /&gt;
* Package manager feature introduced.&lt;br /&gt;
* Health Monitoring &amp;amp; Reboot reason is also introduced.&lt;br /&gt;
* Known bug fixes in L2TP, IPsec, PPTP&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RC44/openwrt-ramips-mt76x8-Silbo_RC44-squashfs-sysupgrade%20%281.17_1.15%29.bin RC44 1.17_1.15] ===&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RC44/openwrt-ramips-mt76x8-Silbo_RC44-squashfs-sysupgrade%20%281.17_1.14%29.bin RC44 1.17_1.14] ===&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RC44/openwrt-ramips-mt76x8-Silbo_RC44-squashfs-sysupgrade%20%281.16_1.13%29.bin RC44 1.16_1.13] ===&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RC44/openwrt-ramips-mt76x8-Silbo_RC44-squashfs-sysupgrade%281.15_1.12_RC4%29.bin RC44 1.15_1.12_RC4] ===&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=RC44_Firmware&amp;diff=2839</id>
		<title>RC44 Firmware</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=RC44_Firmware&amp;diff=2839"/>
		<updated>2025-04-17T08:38:19Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: /* RC44 1.17_1.16 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains the firmware changelogs and upgrades of RC44 device.&lt;br /&gt;
&lt;br /&gt;
=== [http://silbonetworks.com/wp-content/uploads/Firmware/RC44/openwrt-ramips-mt76x8-Silbo_RC44-squashfs-sysupgrade%281.17_1.16%29.bin RC44 1.17_1.16] ===&lt;br /&gt;
New Features &amp;amp; Improvements:&lt;br /&gt;
&lt;br /&gt;
* WPA3 security option added to Wi-Fi AP settings.&lt;br /&gt;
* UART console print statements modified for security hardening.&lt;br /&gt;
* VLAN capability added in Network settings.&lt;br /&gt;
* Introduced Load balancing feature between multiple WAN options.&lt;br /&gt;
* Connection diagnostic feature added.&lt;br /&gt;
* DMZ implemented.&lt;br /&gt;
* VRRP added.&lt;br /&gt;
* Package manager feature introduced.&lt;br /&gt;
* Health Monitoring &amp;amp; Reboot reason is also introduced.&lt;br /&gt;
* Known bug fixes in L2TP, IPsec, PPTP&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RC44/openwrt-ramips-mt76x8-Silbo_RC44-squashfs-sysupgrade%20%281.17_1.15%29.bin RC44 1.17_1.15] ===&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RC44/openwrt-ramips-mt76x8-Silbo_RC44-squashfs-sysupgrade%20%281.17_1.14%29.bin RC44 1.17_1.14] ===&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RC44/openwrt-ramips-mt76x8-Silbo_RC44-squashfs-sysupgrade%20%281.16_1.13%29.bin RC44 1.16_1.13] ===&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RC44/openwrt-ramips-mt76x8-Silbo_RC44-squashfs-sysupgrade%281.15_1.12_RC4%29.bin RC44 1.15_1.12_RC4] ===&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=Configuration_Manuals&amp;diff=2838</id>
		<title>Configuration Manuals</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=Configuration_Manuals&amp;diff=2838"/>
		<updated>2025-04-16T06:57:35Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width: 100%&amp;quot;&lt;br /&gt;
|[[Band and Operator lock Configuration|&#039;&#039;&#039;Band and Operator lock Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Import/Export Configuration]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|[[IPSec Configuration|&#039;&#039;&#039;IPSec Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|[[IPsec VPN between SILBO and Fortigate firewall|&#039;&#039;&#039;IPsec VPN between SILBO and Fortigate firewall&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[JIO IPV6 SIM CARD CONFIGURATION]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Maintenance Reboot]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Open VPN]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Modbus TCP to MQTT using Hive MQTT]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|[[ZeroTier Download and Configuration|&#039;&#039;&#039;ZeroTier Download and Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[SILBO Cellular Router – NMS User Manual]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Import Backup from One SILBO Gateway/router to another SILBO Gateway/Router]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|[[OpenVPN Client to Client Connection|&#039;&#039;&#039;OpenVPN Client to Client Connection&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Zerotier VPN Configuration]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[OpenVPN server for windows-based system|OpenVPN server for windows]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[OpenVPN server for windows OS with use of Network Bridge adaptor]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|[[OpenVPN (tun) Configuration|&#039;&#039;&#039;OpenVPN (tun) Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Wire Guard VPN|&#039;&#039;&#039;Wire Guard VPN&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|[[SIM APN Mode Configuration|&#039;&#039;&#039;SIM APN Mode Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Wiregaurd VPN with Linux Server]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Wi-Fi access and client mode]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[IPSec SOPHOS and SILBO]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[SOP for IPSEC VPN]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Firmware upgrade procedure]]&#039;&#039;&#039;&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=Configuration_Manuals&amp;diff=2837</id>
		<title>Configuration Manuals</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=Configuration_Manuals&amp;diff=2837"/>
		<updated>2025-04-16T06:56:35Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width: 100%&amp;quot;&lt;br /&gt;
|[[Band and Operator lock Configuration|&#039;&#039;&#039;Band and Operator lock Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Import/Export Configuration]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|[[IPSec Configuration|&#039;&#039;&#039;IPSec Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|[[IPsec VPN between SILBO and Fortigate firewall|&#039;&#039;&#039;IPsec VPN between SILBO and Fortigate firewall&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[JIO IPV6 SIM CARD CONFIGURATION]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Maintenance Reboot]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Open VPN]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Modbus TCP to MQTT using Hive MQTT]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|[[ZeroTier Download and Configuration|&#039;&#039;&#039;ZeroTier Download and Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[SILBO Cellular Router – NMS User Manual]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Import Backup from One SILBO Gateway/router to another SILBO Gateway/Router]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|[[OpenVPN Client to Client Connection|&#039;&#039;&#039;OpenVPN Client to Client Connection&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Zerotier VPN Configuration]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[OpenVPN server for windows-based system|OpenVPN server for windows]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[OpenVPN server for windows OS with use of Network Bridge adaptor]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|[[OpenVPN (tun) Configuration|&#039;&#039;&#039;OpenVPN (tun) Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Wire Guard VPN|&#039;&#039;&#039;Wire Guard VPN&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|[[SIM APN Mode Configuration|&#039;&#039;&#039;SIM APN Mode Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Wiregaurd VPN with Linux Server]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Wi-Fi access and client mode]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[IPSec SOPHOS and SILBO]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[SOP for IPSEC VPN]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Firmware upgrade procedure]]&#039;&#039;&#039;&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=Configuration_Manuals&amp;diff=2836</id>
		<title>Configuration Manuals</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=Configuration_Manuals&amp;diff=2836"/>
		<updated>2025-04-16T06:56:06Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;width: 100%&amp;quot;&lt;br /&gt;
|[[Band and Operator lock Configuration|&#039;&#039;&#039;Band and Operator lock Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Import/Export Configuration]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|[[IPSec Configuration|&#039;&#039;&#039;IPSec Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|[[IPsec VPN between SILBO and Fortigate firewall|&#039;&#039;&#039;IPsec VPN between SILBO and Fortigate firewall&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[JIO IPV6 SIM CARD CONFIGURATION]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Maintenance Reboot]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Open VPN]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Modbus TCP to MQTT using Hive MQTT]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|[[ZeroTier Download and Configuration|&#039;&#039;&#039;ZeroTier Download and Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[SILBO Cellular Router – NMS User Manual]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Import Backup from One SILBO Gateway/router to another SILBO Gateway/Router]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|[[OpenVPN Client to Client Connection|&#039;&#039;&#039;OpenVPN Client to Client Connection&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Zerotier VPN Configuration]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[OpenVPN server for windows-based system|OpenVPN server for windows]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[OpenVPN server for windows OS with use of Network Bridge adaptor]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|[[OpenVPN (tun) Configuration|&#039;&#039;&#039;OpenVPN (tun) Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Wire Guard VPN|&#039;&#039;&#039;Wire Guard VPN&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|[[SIM APN Mode Configuration|&#039;&#039;&#039;SIM APN Mode Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Wiregaurd VPN with Linux Server]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Wi-Fi access and client mode]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[IPSec SOPHOS and SILBO]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[SOP for IPSEC VPN]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Firmware upgrade procedure]]&#039;&#039;&#039;&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=Configuration_Manuals&amp;diff=2835</id>
		<title>Configuration Manuals</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=Configuration_Manuals&amp;diff=2835"/>
		<updated>2025-04-16T06:53:42Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width: 100%&amp;quot;&lt;br /&gt;
|[[Band and Operator lock Configuration|&#039;&#039;&#039;Band and Operator lock Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Import/Export Configuration]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|[[IPSec Configuration|&#039;&#039;&#039;IPSec Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|[[IPsec VPN between SILBO and Fortigate firewall|&#039;&#039;&#039;IPsec VPN between SILBO and Fortigate firewall&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[JIO IPV6 SIM CARD CONFIGURATION]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Maintenance Reboot]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Open VPN]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Modbus TCP to MQTT using Hive MQTT]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|[[ZeroTier Download and Configuration|&#039;&#039;&#039;ZeroTier Download and Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[SILBO Cellular Router – NMS User Manual]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Import Backup from One SILBO Gateway/router to another SILBO Gateway/Router]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|[[OpenVPN Client to Client Connection|&#039;&#039;&#039;OpenVPN Client to Client Connection&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Zerotier VPN Configuration]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[OpenVPN server for windows-based system|OpenVPN server for windows]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[OpenVPN server for windows OS with use of Network Bridge adaptor]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|[[OpenVPN (tun) Configuration|&#039;&#039;&#039;OpenVPN (tun) Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Wire Guard VPN|&#039;&#039;&#039;Wire Guard VPN&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|[[SIM APN Mode Configuration|&#039;&#039;&#039;SIM APN Mode Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Wiregaurd VPN with Linux Server]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Wi-Fi access and client mode]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[IPSec SOPHOS and SILBO]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[SOP for IPSEC VPN]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Firmware upgrade procedure]]&#039;&#039;&#039;&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=Configuration_Manuals&amp;diff=2834</id>
		<title>Configuration Manuals</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=Configuration_Manuals&amp;diff=2834"/>
		<updated>2025-04-16T06:52:57Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;sortable&amp;quot; style=&amp;quot;width: 100%&amp;quot;&lt;br /&gt;
|[[Band and Operator lock Configuration|&#039;&#039;&#039;Band and Operator lock Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Import/Export Configuration]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|[[IPSec Configuration|&#039;&#039;&#039;IPSec Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|[[IPsec VPN between SILBO and Fortigate firewall|&#039;&#039;&#039;IPsec VPN between SILBO and Fortigate firewall&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[JIO IPV6 SIM CARD CONFIGURATION]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Maintenance Reboot]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Open VPN]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Modbus TCP to MQTT using Hive MQTT]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|[[ZeroTier Download and Configuration|&#039;&#039;&#039;ZeroTier Download and Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[SILBO Cellular Router – NMS User Manual]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Import Backup from One SILBO Gateway/router to another SILBO Gateway/Router]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|[[OpenVPN Client to Client Connection|&#039;&#039;&#039;OpenVPN Client to Client Connection&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Zerotier VPN Configuration]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[OpenVPN server for windows-based system|OpenVPN server for windows]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[OpenVPN server for windows OS with use of Network Bridge adaptor]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|[[OpenVPN (tun) Configuration|&#039;&#039;&#039;OpenVPN (tun) Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Wire Guard VPN|&#039;&#039;&#039;Wire Guard VPN&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|[[SIM APN Mode Configuration|&#039;&#039;&#039;SIM APN Mode Configuration&#039;&#039;&#039;]]&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Wiregaurd VPN with Linux Server]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Wi-Fi access and client mode]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[IPSec SOPHOS and SILBO]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[SOP for IPSEC VPN]]&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;[[Firmware upgrade procedure]]&#039;&#039;&#039;&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=RB44_Firmware&amp;diff=2833</id>
		<title>RB44 Firmware</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=RB44_Firmware&amp;diff=2833"/>
		<updated>2025-04-11T09:37:56Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: /* RB44 1.17_1.17 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains the firmware changelogs and upgrades of RB44 device.&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RB44/openwrt-ramips-mt76x8-Silbo_RB44-squashfs-sysupgrade%20%281.17_1.17%29.bin RB44 1.17_1.17] ===&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RB44/openwrt-ramips-mt76x8-Silbo_RB44-squashfs-sysupgrade%20%281.17_1.16%29.bin RB44 1.17_1.16] ===&lt;br /&gt;
New Features &amp;amp; Improvements:&lt;br /&gt;
&lt;br /&gt;
* WPA3 security option added to Wi-Fi AP settings.&lt;br /&gt;
* UART console print statements modified for security hardening.&lt;br /&gt;
* VLAN capability added in Network settings.&lt;br /&gt;
* Introduced Load balancing feature between multiple WAN options.&lt;br /&gt;
* Connection diagnostic feature added.&lt;br /&gt;
* DMZ implemented.&lt;br /&gt;
* VRRP added.&lt;br /&gt;
* Package manager feature introduced. &lt;br /&gt;
* Health Monitoring &amp;amp; Reboot reason is also introduced.&lt;br /&gt;
* Known bug fixes in L2TP, IPsec, PPTP&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RB44/openwrt-ramips-mt76x8-Silbo_RB44-squashfs-sysupgrade%20%281.16_1.13_RC5%29.bin RB44 1.16_1.13_RC5] ===&lt;br /&gt;
New Features &amp;amp; Improvements:&lt;br /&gt;
* Bug Fixed related to model name displaying issue in the info page.&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RB44/openwrt-ramips-mt76x8-Silbo_RB44-squashfs-sysupgrade%20%281.16_1.13_RC4%29.bin RB44 1.16_1.13_RC4] ===&lt;br /&gt;
New Features &amp;amp; Improvements:&lt;br /&gt;
* Add_Macaddr.sh ,firstboot script,rebootscript.sh,test_script.sh,rpc-diagnosticutilities,  is updated with wifi enable or disable logic&lt;br /&gt;
* Recycle_WAN1_PWR_Script.sh is modified to remove extra logs.&lt;br /&gt;
* qnetdevctl.sh is modified to remove logging.&lt;br /&gt;
* configuration.vpnconfig1.js,openvpn.sh script is modified to create a bridge of tap and SW_LAN.&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RB44/openwrt-ramips-mt76x8-Silbo_RB44-squashfs-sysupgrade%20%281.16_1.13_RC2%29.bin RB44 1.16_1.13_RC2] ===&lt;br /&gt;
New Features &amp;amp; Improvements:&lt;br /&gt;
&lt;br /&gt;
* AddInterface.sh script is modified to add more logs in logfile.&lt;br /&gt;
* simswitch script is modified to update APN/PDP before sim switch logic.&lt;br /&gt;
* SystemRestart.sh script is modified to update APN/PDP of sim1.&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RB44/openwrt-ramips-mt76x8-Silbo_RB44-squashfs-sysupgrade%20%281.16_.1.13%29.bin RB44 1.16_.1.13] ===&lt;br /&gt;
New Features &amp;amp; Improvements:&lt;br /&gt;
&lt;br /&gt;
* IPSEC version is updated to 5.9.2 and logic for lan passthrough is updated.&lt;br /&gt;
* The multiple OpenVPN feature is updated.&lt;br /&gt;
* Wiregurad and Zerotier feature is integrated.&lt;br /&gt;
* Routerlocalpingtestapp.sh is updated to use the usb0/wwan0 interface in the ping command and also use 464-wan6c1_xlat/464-wan6c2_xlat  in the ping command when ipv6 with clat is enabled.&lt;br /&gt;
* SMSEventhandler.sh is updated to send sms with/without apikey,validsmsreceivernumber,serial number.&lt;br /&gt;
* Auto APN feature is updated in settings&amp;gt;&amp;gt;network web page.&lt;br /&gt;
* OpenVPN version is updated from 2.4.7 to 2.5.4&lt;br /&gt;
* Display of Active sim QCCID on the overview page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;[https://silbonetworks.com/wp-content/uploads/Firmware/RB44/openwrt-ramips-mt76x8-Silbo_RB44-squashfs-sysupgrade.bin RB44 1.15 _1.12_RC3]&#039;&#039;&#039; ===&lt;br /&gt;
New Features &amp;amp; Improvements:&lt;br /&gt;
&lt;br /&gt;
* uboot code updated to use the reset button for the flash image.&lt;br /&gt;
&lt;br /&gt;
* Minor bug fix related to MAC address.&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=RB44_Firmware&amp;diff=2832</id>
		<title>RB44 Firmware</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=RB44_Firmware&amp;diff=2832"/>
		<updated>2025-04-11T05:41:48Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains the firmware changelogs and upgrades of RB44 device.&lt;br /&gt;
&lt;br /&gt;
=== [http://silbonetworks.com/wp-content/uploads/Firmware/RB44/openwrt-ramips-mt76x8-Silbo_RB44-squashfs-sysupgrade%20%281.17_1.17%29.bin RB44 1.17_1.17] ===&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RB44/openwrt-ramips-mt76x8-Silbo_RB44-squashfs-sysupgrade%20%281.17_1.16%29.bin RB44 1.17_1.16] ===&lt;br /&gt;
New Features &amp;amp; Improvements:&lt;br /&gt;
&lt;br /&gt;
* WPA3 security option added to Wi-Fi AP settings.&lt;br /&gt;
* UART console print statements modified for security hardening.&lt;br /&gt;
* VLAN capability added in Network settings.&lt;br /&gt;
* Introduced Load balancing feature between multiple WAN options.&lt;br /&gt;
* Connection diagnostic feature added.&lt;br /&gt;
* DMZ implemented.&lt;br /&gt;
* VRRP added.&lt;br /&gt;
* Package manager feature introduced. &lt;br /&gt;
* Health Monitoring &amp;amp; Reboot reason is also introduced.&lt;br /&gt;
* Known bug fixes in L2TP, IPsec, PPTP&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RB44/openwrt-ramips-mt76x8-Silbo_RB44-squashfs-sysupgrade%20%281.16_1.13_RC5%29.bin RB44 1.16_1.13_RC5] ===&lt;br /&gt;
New Features &amp;amp; Improvements:&lt;br /&gt;
* Bug Fixed related to model name displaying issue in the info page.&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RB44/openwrt-ramips-mt76x8-Silbo_RB44-squashfs-sysupgrade%20%281.16_1.13_RC4%29.bin RB44 1.16_1.13_RC4] ===&lt;br /&gt;
New Features &amp;amp; Improvements:&lt;br /&gt;
* Add_Macaddr.sh ,firstboot script,rebootscript.sh,test_script.sh,rpc-diagnosticutilities,  is updated with wifi enable or disable logic&lt;br /&gt;
* Recycle_WAN1_PWR_Script.sh is modified to remove extra logs.&lt;br /&gt;
* qnetdevctl.sh is modified to remove logging.&lt;br /&gt;
* configuration.vpnconfig1.js,openvpn.sh script is modified to create a bridge of tap and SW_LAN.&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RB44/openwrt-ramips-mt76x8-Silbo_RB44-squashfs-sysupgrade%20%281.16_1.13_RC2%29.bin RB44 1.16_1.13_RC2] ===&lt;br /&gt;
New Features &amp;amp; Improvements:&lt;br /&gt;
&lt;br /&gt;
* AddInterface.sh script is modified to add more logs in logfile.&lt;br /&gt;
* simswitch script is modified to update APN/PDP before sim switch logic.&lt;br /&gt;
* SystemRestart.sh script is modified to update APN/PDP of sim1.&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RB44/openwrt-ramips-mt76x8-Silbo_RB44-squashfs-sysupgrade%20%281.16_.1.13%29.bin RB44 1.16_.1.13] ===&lt;br /&gt;
New Features &amp;amp; Improvements:&lt;br /&gt;
&lt;br /&gt;
* IPSEC version is updated to 5.9.2 and logic for lan passthrough is updated.&lt;br /&gt;
* The multiple OpenVPN feature is updated.&lt;br /&gt;
* Wiregurad and Zerotier feature is integrated.&lt;br /&gt;
* Routerlocalpingtestapp.sh is updated to use the usb0/wwan0 interface in the ping command and also use 464-wan6c1_xlat/464-wan6c2_xlat  in the ping command when ipv6 with clat is enabled.&lt;br /&gt;
* SMSEventhandler.sh is updated to send sms with/without apikey,validsmsreceivernumber,serial number.&lt;br /&gt;
* Auto APN feature is updated in settings&amp;gt;&amp;gt;network web page.&lt;br /&gt;
* OpenVPN version is updated from 2.4.7 to 2.5.4&lt;br /&gt;
* Display of Active sim QCCID on the overview page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;[https://silbonetworks.com/wp-content/uploads/Firmware/RB44/openwrt-ramips-mt76x8-Silbo_RB44-squashfs-sysupgrade.bin RB44 1.15 _1.12_RC3]&#039;&#039;&#039; ===&lt;br /&gt;
New Features &amp;amp; Improvements:&lt;br /&gt;
&lt;br /&gt;
* uboot code updated to use the reset button for the flash image.&lt;br /&gt;
&lt;br /&gt;
* Minor bug fix related to MAC address.&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=RD44-A_Frimware&amp;diff=2831</id>
		<title>RD44-A Frimware</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=RD44-A_Frimware&amp;diff=2831"/>
		<updated>2025-04-11T05:36:42Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains the firmware changelogs and upgrades of RD44-A device.&lt;br /&gt;
&lt;br /&gt;
=== [http://silbonetworks.com/wp-content/uploads/Firmware/RD44-A/openwrt-ramips-mt76x8-Silbo_RD44-A-squashfs-sysupgrade%20%281.17_17%20RC2%29.bin RD44-A 1.17_1.17_RC2] ===&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RD44-A/openwrt-ramips-mt76x8-Silbo_RD44-A-squashfs-sysupgrade%20%281.16_1.13_RC4%29.bin RD44-A 1.16_1.13_RC4] ===&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RD44-A/openwrt-ramips-mt76x8-Silbo_RD44-A-squashfs-sysupgrade%20%281.16_1.13_RC3%29.bin RD44-A 1.16_1.13_RC3] ===&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RD44-A/openwrt-ramips-mt76x8-Silbo_RD44-A-squashfs-sysupgrade%20%281.16_1.13_RC2%29.bin RD44-A 1.16_1.13_RC2] ===&lt;br /&gt;
&lt;br /&gt;
=== [https://silbonetworks.com/wp-content/uploads/Firmware/RD44-A/openwrt-ramips-mt76x8-Silbo_RD44-A-squashfs-sysupgrade%20%281.16_1.13_RC1%29.bin RD44-A 1.16_1.13_RC1] ===&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=Import/Export_Configuration&amp;diff=2830</id>
		<title>Import/Export Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=Import/Export_Configuration&amp;diff=2830"/>
		<updated>2025-01-24T12:04:05Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Login to GUI of device ==&lt;br /&gt;
Connect router to Laptop or Desktop using a LAN connection or connect over Wi-Fi.&lt;br /&gt;
&lt;br /&gt;
Make sure the laptop/desktop LAN/Wi-Fi interface is in DHCP mode.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How to make LAN/Wi-Fi network interface in DHCP mode into Windows Operating system?&lt;br /&gt;
&lt;br /&gt;
To configure a LAN or Wi-Fi network interface in DHCP mode on a Windows operating system, follow these steps:&lt;br /&gt;
&lt;br /&gt;
Press Windows + R, type ncpa.cpl, and press Enter to open the Network Connections window.&lt;br /&gt;
&lt;br /&gt;
And locate the correct LAN/Wi-Fi interface which need to be configured as DHCP client or go to below path in the system.&lt;br /&gt;
&lt;br /&gt;
Control Panel\Network and Internet\Network and Sharing Center&lt;br /&gt;
&lt;br /&gt;
[[File:Login_to_GUI_of_device.png|1024x1024px]]In the above image select the interface Ethernet or Wi-Fi and change the IP Version 4 (TCP/IPv4) and set in DHCP as shown in below image.&lt;br /&gt;
&lt;br /&gt;
[[File:DHCP_Setting.png|1024x1024px]]Note: Make sure the router’s DHCP server is not disabled if it is disabled then windows system should be configured with static IP “use the following IP address” option in above image.&lt;br /&gt;
&lt;br /&gt;
Use default IP of router to access GUI.&lt;br /&gt;
&lt;br /&gt;
For LAN it is 192.168.10.1 and for Wi-Fi it is 192.168.100.1 can be used to acces router in using any browser.&lt;br /&gt;
&lt;br /&gt;
Note: For filed routers if the IP address is changed then the new IP belongs to interface should be used.&lt;br /&gt;
&lt;br /&gt;
[[File:Login_to_device.png|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
Default credentials to login are username/password : admin/admin but if the credentials are changed then use the correct credentials.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A_Dashboard.png|1024x1024px]]Once logged in to GUI the above screen can be seen where actual information of the device will be present.&lt;br /&gt;
&lt;br /&gt;
Note: All the SILBO routers/gateway with model number RBxx, IAxx-x,RCxx, RDxx, GRDxx, RFxx,IExx etc GUI is same so the proces remains same.&lt;br /&gt;
&lt;br /&gt;
== Import Export Configuration ==&lt;br /&gt;
Navigate to Maintenance&amp;gt; Import/Export Config,&lt;br /&gt;
&lt;br /&gt;
This allows administrators to back up or restore device configurations related to router section.&lt;br /&gt;
&lt;br /&gt;
[[File:Import and Export Config 1.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Export Config&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Definition:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Exporting configuration means saving the current device&#039;s settings and configurations into a text file. This exported file acts as a backup or a reference for future use.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Cases&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
* If the device experiences failure or settings are accidentally changed, the backup file can be used to restore configurations.&lt;br /&gt;
* Apply the same settings to multiple devices of the same model.&lt;br /&gt;
* Keep track of configuration changes over time.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2. Import Config&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Definition:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Importing configuration means loading a previously saved configuration file back into the device, effectively restoring its settings.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Cases:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Restoring configurations after a factory reset.&lt;br /&gt;
* Quickly setting up multiple devices with identical configurations.&lt;br /&gt;
* Troubleshooting or reverting to a previous state.&lt;br /&gt;
&lt;br /&gt;
= Import / Export Gateway Configuration =&lt;br /&gt;
Navigate to Appmanager&amp;gt; Import/Export Application Configuration,&lt;br /&gt;
&lt;br /&gt;
This allows administrators to back up or restore device configurations related to gateway section.&lt;br /&gt;
&lt;br /&gt;
[[File:Import and Export Config 2.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Export Config&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Definition:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Exporting configuration creates a &#039;&#039;&#039;backup of the current device settings&#039;&#039;&#039; and saves it as a text file on a local machine. This file serves as a reference or can be reused for restoring or replicating the configuration.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Cases&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
* Maintain a copy of the settings for disaster recovery.&lt;br /&gt;
* Use the file to replicate the configuration on other identical gateways.&lt;br /&gt;
* Share the configuration file with technical support for analysis.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2. Import Config&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Definition:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Importing configuration loads a previously exported file to restore the device&#039;s settings. This is particularly useful after a factory reset or when configuring multiple devices with the same setup.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Common Issues&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Version mismatch&#039;&#039;&#039;: Ensure the file corresponds to the correct     firmware or hardware version.&lt;br /&gt;
* &#039;&#039;&#039;Incomplete configurations&#039;&#039;&#039;: Avoid editing the configuration file unless     you know the exact format and structure.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Cases&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
* Restoring settings after a reset or failure.&lt;br /&gt;
* Applying consistent configurations across multiple gateways.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3. Reset Config&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Definition:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Resetting the configuration restores the device to its factory default settings, erasing all current configurations.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Cases&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
* Fix issues caused by misconfigurations.&lt;br /&gt;
* Prepare the gateway for deployment in a new environment.&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=File:Import_and_Export_Config_2.png&amp;diff=2829</id>
		<title>File:Import and Export Config 2.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=File:Import_and_Export_Config_2.png&amp;diff=2829"/>
		<updated>2025-01-24T12:02:38Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Import and Export Config 2&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=File:Import_and_Export_Config_1.png&amp;diff=2828</id>
		<title>File:Import and Export Config 1.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=File:Import_and_Export_Config_1.png&amp;diff=2828"/>
		<updated>2025-01-24T12:01:35Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Import and Export Config 1&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=Maintenance_Reboot&amp;diff=2827</id>
		<title>Maintenance Reboot</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=Maintenance_Reboot&amp;diff=2827"/>
		<updated>2025-01-24T11:56:47Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; &lt;br /&gt;
== Login to GUI of device ==&lt;br /&gt;
Connect router to Laptop or Desktop using a LAN connection or connect over Wi-Fi.&lt;br /&gt;
&lt;br /&gt;
Make sure the laptop/desktop LAN/Wi-Fi interface is in DHCP mode.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How to make LAN/Wi-Fi network interface in DHCP mode into Windows Operating system?&lt;br /&gt;
&lt;br /&gt;
To configure a LAN or Wi-Fi network interface in DHCP mode on a Windows operating system, follow these steps:&lt;br /&gt;
&lt;br /&gt;
Press Windows + R, type ncpa.cpl, and press Enter to open the Network Connections window.&lt;br /&gt;
&lt;br /&gt;
And locate the correct LAN/Wi-Fi interface which need to be configured as DHCP client or go to below path in the system.&lt;br /&gt;
&lt;br /&gt;
Control Panel\Network and Internet\Network and Sharing Center&lt;br /&gt;
&lt;br /&gt;
[[File:Login_to_GUI_of_device.png|1024x1024px]]In the above image select the interface Ethernet or Wi-Fi and change the IP Version 4 (TCP/IPv4) and set in DHCP as shown in below image.&lt;br /&gt;
&lt;br /&gt;
[[File:DHCP_Setting.png|1024x1024px]]Note: Make sure the router’s DHCP server is not disabled if it is disabled then windows system should be configured with static IP “use the following IP address” option in above image.&lt;br /&gt;
&lt;br /&gt;
Use default IP of router to access GUI.&lt;br /&gt;
&lt;br /&gt;
For LAN it is 192.168.10.1 and for Wi-Fi it is 192.168.100.1 can be used to acces router in using any browser.&lt;br /&gt;
&lt;br /&gt;
Note: For filed routers if the IP address is changed then the new IP belongs to interface should be used.&lt;br /&gt;
&lt;br /&gt;
[[File:Login_to_device.png|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
Default credentials to login are username/password : admin/admin but if the credentials are changed then use the correct credentials.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A_Dashboard.png|1024x1024px]]Once logged in to GUI the above screen can be seen where actual information of the device will be present.&lt;br /&gt;
&lt;br /&gt;
Note: All the SILBO routers/gateway with model number RBxx, IAxx-x,RCxx, RDxx, GRDxx, RFxx,IExx etc GUI is same so the proces remains same.&lt;br /&gt;
&lt;br /&gt;
== Maintenance Reboot ==&lt;br /&gt;
You can configure schedule reboot here.&lt;br /&gt;
&lt;br /&gt;
Navigate to Maintenance &amp;gt; Reboot,&lt;br /&gt;
&lt;br /&gt;
First option is to directly reboot the device without enabling the maintenance reboot tab. &lt;br /&gt;
&lt;br /&gt;
Click on “Reboot Now” at the bottom of the screen to start the reboot process. &lt;br /&gt;
&lt;br /&gt;
[[File:Maintenance Reboot 1.png]]&lt;br /&gt;
&lt;br /&gt;
To start maintenance reboot process first the user needs to fill all the required fields as shown below. &lt;br /&gt;
[[File:Maintenance Reboot 2.png]]&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN &lt;br /&gt;
|Field Name &lt;br /&gt;
|Sample  Value &lt;br /&gt;
|Description &lt;br /&gt;
|-&lt;br /&gt;
|1 &lt;br /&gt;
|Enable  Maintenance Reboot &lt;br /&gt;
|Enable/Disable &lt;br /&gt;
|Indicates  whether the maintenance reboot feature is enabled or not. &lt;br /&gt;
|-&lt;br /&gt;
|2 &lt;br /&gt;
|Type &lt;br /&gt;
|Maintenance  Reboot &lt;br /&gt;
|Specifies  the type of reboot being scheduled. &lt;br /&gt;
|-&lt;br /&gt;
|3 &lt;br /&gt;
|Reboot  Type &lt;br /&gt;
|Hardware &lt;br /&gt;
|&#039;&#039;&#039;Hardware&#039;&#039;&#039;: A hardware reboot involves restarting the  entire device as if it were powered off and on again. &lt;br /&gt;
|-&lt;br /&gt;
|4 &lt;br /&gt;
|Minutes &lt;br /&gt;
|Example:  59 &lt;br /&gt;
|The  minute at which the reboot should occur (0-59). &lt;br /&gt;
|-&lt;br /&gt;
|5 &lt;br /&gt;
|Hours &lt;br /&gt;
|Example:  22 (10 PM) &lt;br /&gt;
|The  hour at which the reboot should occur (0-23, in 24-hour format). &lt;br /&gt;
|-&lt;br /&gt;
|6 &lt;br /&gt;
|Day Of  Month &lt;br /&gt;
|Example:  All &lt;br /&gt;
|Specifies  which days of the month the reboot should occur (1-31). &amp;quot;All&amp;quot; means  it will occur every day. &lt;br /&gt;
|-&lt;br /&gt;
|7 &lt;br /&gt;
|Month &lt;br /&gt;
|Example:  All &lt;br /&gt;
|Specifies  which months the reboot should occur (1-12). &amp;quot;All&amp;quot; means it will  occur every month. &lt;br /&gt;
|-&lt;br /&gt;
|8 &lt;br /&gt;
|Day Of  Week &lt;br /&gt;
|Example:  All &lt;br /&gt;
|Specifies  which days of the week the reboot should occur (0-6, where 0 is Sunday).  &amp;quot;All&amp;quot; means it will occur every day of the week. &lt;br /&gt;
|}&lt;br /&gt;
According to the above shown configuration, the reboot is scheduled daily at 22:59 hours i.e. 11:59pm.&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=File:Maintenance_Reboot_2.png&amp;diff=2826</id>
		<title>File:Maintenance Reboot 2.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=File:Maintenance_Reboot_2.png&amp;diff=2826"/>
		<updated>2025-01-24T11:56:29Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Maintenance Reboot 2&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=File:Maintenance_Reboot_1.png&amp;diff=2825</id>
		<title>File:Maintenance Reboot 1.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=File:Maintenance_Reboot_1.png&amp;diff=2825"/>
		<updated>2025-01-24T11:55:44Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Maintenance Reboot&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=IAC44_A_User_Manual&amp;diff=2824</id>
		<title>IAC44 A User Manual</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=IAC44_A_User_Manual&amp;diff=2824"/>
		<updated>2025-01-24T11:50:27Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: /* 3.Maintenance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;To log in to SILBO_IAC44-A by connecting the router to your laptop or desktop via LAN or using Wi-Fi, please follow the steps below. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Connecting via LAN:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Connect your laptop&#039;s LAN port to one of the router&#039;s LAN interfaces. Ensure that you select any LAN interface (there are 4 available) while making sure the WAN interface is not used. &lt;br /&gt;
&lt;br /&gt;
                                                                                                                                      &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to connect with the SILBO_IAC44-A&#039;&#039;&#039; &#039;&#039;&#039;application&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Once the LAN connection is established between the device and the laptop or the desktop&lt;br /&gt;
&lt;br /&gt;
Please open the command prompt and ping to get the IP config of that device.&lt;br /&gt;
&lt;br /&gt;
Type the command &#039;&#039;&#039;Ipconfig&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:How_to_connect_with_the_SILBO_RB44_application.png|alt=How to connect with the SILBO RB44 application|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
It will provide the Ip address/url of that device through which the application can be accessed.&lt;br /&gt;
&lt;br /&gt;
[[File:Connecting_via_LAN_RB44.png|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
== Log In ==&lt;br /&gt;
Open the web browser and type the IP address in the URL.&lt;br /&gt;
&lt;br /&gt;
It will show the log in page of the application.&lt;br /&gt;
&lt;br /&gt;
[[File:Log In.png|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
Give the valid credentials for the username and password to login to the application page.&lt;br /&gt;
&lt;br /&gt;
Once the user credentials are provided it will direct to the landing page of the application.&lt;br /&gt;
&lt;br /&gt;
       &lt;br /&gt;
&lt;br /&gt;
The “Status” landing page shows all the detailed specification of the device like system, memory storage and connection tracking etc.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Dashboard.png|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
The application is divided in to 6 Modules.&lt;br /&gt;
&lt;br /&gt;
* Info&lt;br /&gt;
* Settings&lt;br /&gt;
* Maintenance&lt;br /&gt;
* Status&lt;br /&gt;
* Feature&lt;br /&gt;
* Logout&lt;br /&gt;
&lt;br /&gt;
== 1. Info ==&lt;br /&gt;
The “Info” module provides the information about the devices to the user.&lt;br /&gt;
&lt;br /&gt;
It provides all the specification related to the hardware, firmware, Networks and the Connection uptimes.&lt;br /&gt;
&lt;br /&gt;
It has 3 submodules.&lt;br /&gt;
&lt;br /&gt;
* Overview&lt;br /&gt;
* System Log&lt;br /&gt;
* Kernel Log&lt;br /&gt;
&lt;br /&gt;
[[File:IA44A Info Section.png|975x975px]]&lt;br /&gt;
&lt;br /&gt;
=== 1.1 Overview ===&lt;br /&gt;
In overview module it displays all the specification categorically of a device like System, Memory, storage, Connection tracking, DHCP Lease.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Dashboard.png|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;System:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this section it displays the hardware configured specification of the device.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A System Section.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are as follows,&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Hostname&lt;br /&gt;
|37A26230007&lt;br /&gt;
|This field  displays the router serial number of the device&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Model&lt;br /&gt;
|Silbo_IAC44-A_GW-EC200A&lt;br /&gt;
|This field  displays the model number of the device&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Firmware Version  and IPK Version&lt;br /&gt;
|1.17_1.15&lt;br /&gt;
|This field  displays the firmware version and IPK version&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Kernel Version&lt;br /&gt;
|4.14.180&lt;br /&gt;
|This field  displays the kernel version of the device&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Local Time&lt;br /&gt;
|Wednesday, January 8, 2025 at 06:15:29  PM&lt;br /&gt;
|This field  displays the local time&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Uptime&lt;br /&gt;
|0h 27m 58s&lt;br /&gt;
|This field  displays the uptime of the device&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Load Average&lt;br /&gt;
|0.49 0.36 0.40&lt;br /&gt;
|This field  displays the average load&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Memory:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this section it displays the memory configured specification of the device.&lt;br /&gt;
&lt;br /&gt;
[[File:IAB44C Memory Section.png|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are as follows.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Total Available&lt;br /&gt;
|57716 kB / 124188 kB (46%)&lt;br /&gt;
|This field displays the total availability of memory space in  the device&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Free&lt;br /&gt;
|46424 kB / 124188 kB (37%)&lt;br /&gt;
|This field displays the Free memory space in the  device&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Cached&lt;br /&gt;
|444 kB / 124188 kB (0%)&lt;br /&gt;
|This field displays the Cached memory space in the  device&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Buffered&lt;br /&gt;
|11224 kB / 124188 kB (9%)&lt;br /&gt;
|This field displays the Buffered memory space in the  device&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Storage:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this section it displays the status of storage as root and temporary usage specification of the device.&lt;br /&gt;
&lt;br /&gt;
[[File:IAB44C Storage Section.png|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are as follows.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Root  Usage&lt;br /&gt;
|1580 kB / 12800 kB (12%)&lt;br /&gt;
|This field  displays the total root usage of the device&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Temporary Usage&lt;br /&gt;
|444 kB / 62092 kB (0%)&lt;br /&gt;
|This field displays the total temporary  usage of the device&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Network:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this section you can monitor IPv4 WAN status.&lt;br /&gt;
&lt;br /&gt;
[[File:IPv4 Wan Status.png|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are as follows.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Type&lt;br /&gt;
|DHCP  client&lt;br /&gt;
|A &#039;&#039;&#039;DHCP client&#039;&#039;&#039; is a device or  software that requests and receives configuration information from a DHCP  server, such as an IP address, gateway, and DNS servers.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Connected&lt;br /&gt;
|1h 49m 8s&lt;br /&gt;
|This indicates the duration for which the device has been connected  to the network.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Address&lt;br /&gt;
|10.62.35.111&lt;br /&gt;
|This is the &#039;&#039;&#039;IP address&#039;&#039;&#039;  assigned to the DHCP client by the DHCP server. It uniquely identifies the  device on the network.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Gateway&lt;br /&gt;
|10.62.35.144&lt;br /&gt;
|The &#039;&#039;&#039;gateway&#039;&#039;&#039; (or  default gateway) is the IP address of the network device that routes traffic  from the local network to other networks.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|DNS&lt;br /&gt;
|8.8.8.8,  10.103.81.232&lt;br /&gt;
|The first DNS server &amp;quot;8.8.8.8&amp;quot; is a public DNS server  provided by Google.&lt;br /&gt;
&lt;br /&gt;
The second DNS server &amp;quot;10.103.81.232&amp;quot; is a private DNS  server.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Active SIM Information:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This section displays SIM details only when the SIM card is active.&lt;br /&gt;
&lt;br /&gt;
[[File:IAB44C Sim Information.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Connection Tracking:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this section it displays the status of connection tracking for the device.&lt;br /&gt;
&lt;br /&gt;
[[File:Connection Tracking.png]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are as follows.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Value&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Active  Connections&lt;br /&gt;
|48/16384  (0%)&lt;br /&gt;
|This field displays the active  connection of the device.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;DHCP Leases:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this section it displays the DHCP lease of the temporary assignment of an IP address to a device on the network.&lt;br /&gt;
&lt;br /&gt;
[[File:IAB44C DHCP Leases.png]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are below.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Host Name&lt;br /&gt;
|KermaniK-LT&lt;br /&gt;
|This field displays the configured Host Name/Username for that  device.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|IPv4-Address&lt;br /&gt;
|192.168.10.147&lt;br /&gt;
|This field displays the IP address of the device.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|MAC-Address&lt;br /&gt;
|34:73:5a:bb: ab:7a&lt;br /&gt;
|This field displays the MAC-Address of the device.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Lease time remaining&lt;br /&gt;
|11h 53m 49s&lt;br /&gt;
|This field displays the lease time remaining for the device.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== 1.2 System Log ===&lt;br /&gt;
This page provides on screen System logging information. In this page the user gets to view the system logs.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A System logs.png]]&lt;br /&gt;
&lt;br /&gt;
=== 1.3 Kernel Log ===&lt;br /&gt;
This page provides on screen Kernel logging information.&lt;br /&gt;
&lt;br /&gt;
In this page the user gets to view the Kernel logs.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Kernel Logs.png]]&lt;br /&gt;
&lt;br /&gt;
== 2. Setting ==&lt;br /&gt;
In this “Setting” module the user can Configure/update all the required parameters related to Network, SIM Switch, Internet, VPN, Firewall, Loopback Rule, Remote monitoring, Tunnel as per requirement.&lt;br /&gt;
&lt;br /&gt;
IT consist of 8 submodules.&lt;br /&gt;
&lt;br /&gt;
* Network&lt;br /&gt;
* VLAN&lt;br /&gt;
* Sim Switch&lt;br /&gt;
* Multi-WAN&lt;br /&gt;
* VPN&lt;br /&gt;
* Firewall&lt;br /&gt;
* Loopback Rule&lt;br /&gt;
* VRRP&lt;br /&gt;
* Remote Monitoring&lt;br /&gt;
* Tunnel&lt;br /&gt;
[[File:IAC44A Settings.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2.1 Network ===&lt;br /&gt;
In this section the user does all the setting related configuration with reference to network like Ethernet Setting, Cellular Setting, Band lock and Operator Lock, Wi-Fi, Guest Wi-Fi, Wireless Schedule etc.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Network.png]]&#039;&#039;&#039;Ethernet Setting:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ethernet Setting:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this page it will display all the configured port that is attached with the device.&lt;br /&gt;
&lt;br /&gt;
For this device 5 ports are configured.&lt;br /&gt;
&lt;br /&gt;
Ethernet mode can be configured as WAN and as LAN as well.&lt;br /&gt;
&lt;br /&gt;
Ethernet WAN Connection settings can be configured as DHCP, Static and PPOE.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Ethernet Settings.png|1723x1723px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To add a new Interface, click on ‘Add’.&lt;br /&gt;
&lt;br /&gt;
To edit the existing device the user needs to click on the edit option.&lt;br /&gt;
&lt;br /&gt;
Once the changes are done click on the update button to save all the changes.&lt;br /&gt;
&lt;br /&gt;
Click on the deleted button to delete the existing device detail.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note: If required, add an interface in Settings--&amp;gt;Multi-WAN--&amp;gt;Failover&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A EWAN Settings.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:  &#039;&#039;&#039;Type: WAN&#039;&#039;&#039;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Physical Device&lt;br /&gt;
|Ex: eth0.5&lt;br /&gt;
|This indicates a network interface on which our  network is connected. This setting is by default (Editable).&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Type&lt;br /&gt;
|&#039;&#039;&#039;WAN&#039;&#039;&#039;/LAN&lt;br /&gt;
|This designates whether the interface is part  of the WAN or LAN.&lt;br /&gt;
&lt;br /&gt;
WAN: Connects the device to the internet.&lt;br /&gt;
&lt;br /&gt;
LAN: Connects the device to the internal  network.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |                                                                      &#039;&#039;&#039;Protocol: Static&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Static IP Address&lt;br /&gt;
|Ex: 192.168.1.10&lt;br /&gt;
|The manually assigned IP address for the  interface.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Static Netmask&lt;br /&gt;
|Ex: 255.255.255.0&lt;br /&gt;
|Subnet mask corresponding to the IP address.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Static Gateway&lt;br /&gt;
|Ex: 192.168.1.1&lt;br /&gt;
|The IP address of the gateway (router) that the  interface will use to send traffic outside its own subnet.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |                                                                      &#039;&#039;&#039;Protocol: DHCP&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|DHCP Gateway&lt;br /&gt;
|Ex: 10.1.1.1&lt;br /&gt;
|The IP address of the DHCP server (often the  same as the router or gateway).&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |                                                                      &#039;&#039;&#039;Protocol: PPPoE&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Username&lt;br /&gt;
|Any Name&lt;br /&gt;
|The username provided by your ISP for PPPoE  authentication.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Password&lt;br /&gt;
|*****&lt;br /&gt;
|The password provided by your ISP for PPPoE  authentication.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Access Concentrator&lt;br /&gt;
|&lt;br /&gt;
|Typically, the name of the ISP&#039;s PPPoE server.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Service Name&lt;br /&gt;
|&lt;br /&gt;
|Sometimes required by ISPs, this field  specifies a particular service offered by the ISP.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Gateway&lt;br /&gt;
|Ex: 0.0.0.0&lt;br /&gt;
|The IP address used as the default route.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Override MAC Address&lt;br /&gt;
|Ex: D0:93:95:B0:CF:7A&lt;br /&gt;
|The MAC address for this interface is set to a  custom value, replacing the default hardware address.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Enable Bridge&lt;br /&gt;
|1.       CWAN1_0&lt;br /&gt;
&lt;br /&gt;
2.       SW_LAN&lt;br /&gt;
&lt;br /&gt;
3.       VPN&lt;br /&gt;
&lt;br /&gt;
4.       ra0 &lt;br /&gt;
&lt;br /&gt;
|Since this is a WAN interface, it is not  typically bridged with others. Bridges are more common for LAN interfaces to  combine multiple connections.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|Create Firewall Zone&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|You can assign this interface to a particular  firewall zone, which determines its access rules (e.g., WAN zone for internet  traffic, LAN zone for internal traffic).&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |&#039;&#039;&#039;Advanced Settings: Enable/Disable&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|15&lt;br /&gt;
|IPv4 Route Table&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|This field is used to specify static routes for  IPv4.&lt;br /&gt;
|-&lt;br /&gt;
|16&lt;br /&gt;
|Table No.&lt;br /&gt;
|&#039;&#039;&#039;254&#039;&#039;&#039;: Default  main routing table.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;100&#039;&#039;&#039;: Custom  routing table for specific purposes.&lt;br /&gt;
|&#039;&#039;&#039;Default Table (Main Table)&#039;&#039;&#039;: Usually, there is a default routing table  (often Table No. 254 or 255) where all the routes are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Custom Table&#039;&#039;&#039;: You can  specify a different table number if you are managing multiple routing  policies (e.g., VoIP traffic, VPN traffic).&lt;br /&gt;
|-&lt;br /&gt;
|17&lt;br /&gt;
|Gateway Metric&lt;br /&gt;
|Ex: 1&lt;br /&gt;
|A numeric value used to prioritize gateways  when multiple are available.&lt;br /&gt;
&lt;br /&gt;
Lower metrics indicate higher priority. For  example, if two gateways exist, the one with the smaller metric is used.&lt;br /&gt;
|-&lt;br /&gt;
|18&lt;br /&gt;
|Broadcast&lt;br /&gt;
|Ex: 192.168.123.34&lt;br /&gt;
|Broadcast address for the network, typically  calculated based on the IP and subnet mask.&lt;br /&gt;
|-&lt;br /&gt;
|19&lt;br /&gt;
|Override MTU&lt;br /&gt;
|Ex: 1500&lt;br /&gt;
|MTU size controls the maximum packet size that  can be sent over the network.&lt;br /&gt;
&lt;br /&gt;
Default is usually 1500 bytes.&lt;br /&gt;
|-&lt;br /&gt;
|20&lt;br /&gt;
|Force Link&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Forces the interface to be up even if no  physical link is detected.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Type: LAN&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A LAN Settings.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Physical Device&lt;br /&gt;
|Ex: eth0.1&lt;br /&gt;
|This is the network interface identifier.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Type&lt;br /&gt;
|WAN/&#039;&#039;&#039;LAN&#039;&#039;&#039;&lt;br /&gt;
|This designates whether the interface is part  of the WAN or LAN.&lt;br /&gt;
&lt;br /&gt;
WAN: Connects the device to the internet.&lt;br /&gt;
&lt;br /&gt;
LAN: Connects the device to the internal  network.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Protocol&lt;br /&gt;
|Static&lt;br /&gt;
|This means that the IP address, netmask, and  other network settings are manually configured rather than being  automatically assigned by a DHCP server.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|IP Address&lt;br /&gt;
|Ex: 192.168.10.1&lt;br /&gt;
|This is the static IP address assigned to the  interface. It acts as the gateway IP address for devices connected to this  LAN.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Static Netmask&lt;br /&gt;
|Ex: 255.255.255.0&lt;br /&gt;
|This is the subnet mask for the network.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Override MAC Address&lt;br /&gt;
|D0:93:95:B0:CF:7B&lt;br /&gt;
|This allows you to manually enter a different  MAC address if needed.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Enable DNS&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|If this option is enabled, the interface will  act as a DNS resolver for the devices on the LAN, using the specified DNS  server.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|DNS Server Address&lt;br /&gt;
|Ex: 8.8.8.8&lt;br /&gt;
|This is the IP address of the DNS server that  will be used by devices on the LAN to resolve domain names to IP addresses.&lt;br /&gt;
&lt;br /&gt;
More than one DNS Address can be added.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Enable DHCP Server&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|If enabled, this setting allows the interface  to function as a DHCP server, automatically assigning IP addresses to devices  connected to the LAN.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|DHCP Start Address&lt;br /&gt;
|50&lt;br /&gt;
|The DHCP server will begin assigning IP  addresses starting from 192.168.10.50&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|DHCP Limit&lt;br /&gt;
|100&lt;br /&gt;
|This specifies the number of IP addresses the  DHCP server can assign. Starting at 192.168.10.50 and with a limit of 100,  the server can assign addresses up to 192.168.10.149.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Lease Time Duration&lt;br /&gt;
|Hours-(H)&lt;br /&gt;
&lt;br /&gt;
Minutes-(M)&lt;br /&gt;
&lt;br /&gt;
Seconds-(S)&lt;br /&gt;
|&#039;&#039;&#039;Hours-(H)&#039;&#039;&#039;: This indicates  that the lease time for each IP address assignment is measured in hours.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Minutes-(M):&#039;&#039;&#039; This  indicates that the lease time for each IP address assignment is measured in minutes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Seconds-(S):&#039;&#039;&#039; This  indicates that the lease time for each IP address assignment is measured in seconds.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|Lease Time&lt;br /&gt;
|12&lt;br /&gt;
|The DHCP lease time is set to 12 hours. After  this period, a device must renew its IP address lease with the DHCP server to  continue using the assigned IP address.&lt;br /&gt;
|-&lt;br /&gt;
|15&lt;br /&gt;
|Enable Bridge&lt;br /&gt;
|1.       CWAN1_0&lt;br /&gt;
&lt;br /&gt;
2.       SW_LAN&lt;br /&gt;
&lt;br /&gt;
3.       VPN&lt;br /&gt;
&lt;br /&gt;
4.       ra0 &lt;br /&gt;
&lt;br /&gt;
|Since this is a WAN interface, it is not  typically bridged with others. Bridges are more common for LAN interfaces to  combine multiple connections.&lt;br /&gt;
|-&lt;br /&gt;
|16&lt;br /&gt;
|Enable DHCP Relay&lt;br /&gt;
|Enter Relay Server IP&lt;br /&gt;
|Forwards DHCP requests from devices in this  subnet to an external DHCP server instead of using the built-in DHCP server.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|17&lt;br /&gt;
|Create Firewall Zone&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|You can assign this interface to a particular  firewall zone, which determines its access rules (e.g., WAN zone for internet  traffic, LAN zone for internal traffic).&lt;br /&gt;
|-&lt;br /&gt;
|18&lt;br /&gt;
|Internet Over SW_LAN&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Allow all outbound traffic from the LAN to the  internet.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |&#039;&#039;&#039;Advanced Settings: Enable/Disable&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|19&lt;br /&gt;
|IPv4 Route Table&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|This field is used to specify static routes for  IPv4.&lt;br /&gt;
|-&lt;br /&gt;
|20&lt;br /&gt;
|Table No.&lt;br /&gt;
|&#039;&#039;&#039;254&#039;&#039;&#039;: Default  main routing table.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;100&#039;&#039;&#039;: Custom  routing table for specific purposes.&lt;br /&gt;
|&#039;&#039;&#039;Default Table (Main Table)&#039;&#039;&#039;: Usually, there is a default routing table  (often Table No. 254 or 255) where all the routes are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Custom Table&#039;&#039;&#039;: You can  specify a different table number if you are managing multiple routing  policies (e.g., VoIP traffic, VPN traffic).&lt;br /&gt;
|-&lt;br /&gt;
|21&lt;br /&gt;
|Gateway Metric&lt;br /&gt;
|Ex: 1&lt;br /&gt;
|A numeric value used to prioritize gateways  when multiple are available.&lt;br /&gt;
&lt;br /&gt;
Lower metrics indicate higher priority. For  example, if two gateways exist, the one with the smaller metric is used.&lt;br /&gt;
|-&lt;br /&gt;
|22&lt;br /&gt;
|Broadcast&lt;br /&gt;
|Ex: 192.168.123.34&lt;br /&gt;
|Broadcast address for the network, typically  calculated based on the IP and subnet mask.&lt;br /&gt;
|-&lt;br /&gt;
|23&lt;br /&gt;
|Override MTU&lt;br /&gt;
|Ex: 1500&lt;br /&gt;
|MTU size controls the maximum packet size that  can be sent over the network.&lt;br /&gt;
&lt;br /&gt;
Default is usually 1500 bytes.&lt;br /&gt;
|}&lt;br /&gt;
Save and Update once configuration changes have been made.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Relay Server:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A relay server typically functions in a network to forward requests (usually DHCP or DNS) from clients to&lt;br /&gt;
&lt;br /&gt;
a designated server when the server is on a different network segment.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Relay Server.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To edit the existing device the user needs to click on the edit option.&lt;br /&gt;
&lt;br /&gt;
Once the changes are done click on the save button to save all the changes.&lt;br /&gt;
&lt;br /&gt;
Click on the deleted button to delete the existing device detail.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Relay Server Edit.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Interface&lt;br /&gt;
|1.)     eth0.1&lt;br /&gt;
&lt;br /&gt;
2.)     ra0&lt;br /&gt;
|1) eth0.1  typically represents a VLAN where the relay will listen for client requests.&lt;br /&gt;
&lt;br /&gt;
2) If your  device is broadcasting a Wi-Fi network on the ra0 interface, any DHCP or DNS  relay settings will apply to devices connected via this wireless interface.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Start IP  Address&lt;br /&gt;
|Ex: 192.168.10.100&lt;br /&gt;
|This is the  beginning IP address of the range that will be leased out to clients.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|End IP  Address&lt;br /&gt;
|Ex: 192.168.10.150&lt;br /&gt;
|An IP address  that is in the same subnet as the Start IP Address and allows sufficient  addresses to be leased.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Netmask&lt;br /&gt;
|Ex: 255.255.255.0&lt;br /&gt;
|A valid  subnet mask such as 255.255.255.0 (for a /24 network), or 255.255.0.0 (for a  /16 network).&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Lease Time&lt;br /&gt;
|For a 24-hour  lease time, set this value to 86400.&lt;br /&gt;
|This is the  amount of time that an IP address is assigned to a client before it needs to  request a renewal from the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
Save and update.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cellular Setting:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this page, the user needs to configure the various details with respect to the SIM.&lt;br /&gt;
&lt;br /&gt;
Select single cellular single sim where the user must configure the APN details of the sim used for the router device. The Configurations can be done based on the SIM usage, with respect to IPV4 or IPV6.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Cellular Settings.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Cellular Enable&lt;br /&gt;
|Checkbox&lt;br /&gt;
|Check this box to  enable cellular functionality.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Cellular  Operation Mode&lt;br /&gt;
|1.) Single Cellular with Dual Sim&lt;br /&gt;
&lt;br /&gt;
2.) Single Cellular with  Single SIM&lt;br /&gt;
|1.) This mode  allows you to use one cellular modem with two SIM cards.&lt;br /&gt;
&lt;br /&gt;
2.) This mode allows you to  use one cellular modem with single SIM card.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Cellular  Modem 1&lt;br /&gt;
|QuectelEC200A&lt;br /&gt;
|This  field displays the modem name.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Choose SIM 1 APN Mode&lt;br /&gt;
|1.) Auto&lt;br /&gt;
&lt;br /&gt;
2.)  Manual&lt;br /&gt;
|1.) Choose  Auto for regular SIM to detect APN name automatically.&lt;br /&gt;
&lt;br /&gt;
2.) Choose manual to enter the APN settings manually in case of  M2M SIM cards.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|SIM 1 Access Point Name&lt;br /&gt;
|airtelgprs.com&lt;br /&gt;
|Enter the APN provided  by your cellular service provider in case of M2M sim. For regular sim cards  APN name will be displayed automatically.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|SIM 1 PDP Type&lt;br /&gt;
|IPV4&lt;br /&gt;
|Choose the PDP  type, which is typically either IPv4 or IPv6 depending on the sim card.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|SIM 1 Username&lt;br /&gt;
|&lt;br /&gt;
|Enter the username if required by the APN.  Leave blank if not required.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|SIM 1 Password&lt;br /&gt;
|&lt;br /&gt;
|Enter the password if required by the  APN. Leave blank if not required.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|SIM 1 Authentication Protocol&lt;br /&gt;
|None&lt;br /&gt;
|Choose the  authentication protocol. Options typically include None, PAP, or CHAP.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|SIM 1 MTU&lt;br /&gt;
|Ex: 1500 (a common MTU size)&lt;br /&gt;
|&#039;&#039;&#039;MTU  (Maximum Transmission Unit)&#039;&#039;&#039; defines the largest size of a data packet  that can be transmitted over the network.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Choose SIM 2 APN Mode&lt;br /&gt;
|1.) Auto&lt;br /&gt;
&lt;br /&gt;
2.) Manual&lt;br /&gt;
|1.) Choose  Auto for regular SIM to detect APN name automatically.&lt;br /&gt;
&lt;br /&gt;
2.) Choose manual to enter the APN settings manually in case of  M2M SIM cards.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|SIM 2 Access Point Name&lt;br /&gt;
|airtelgprs.com&lt;br /&gt;
|Enter the APN  provided by your cellular service provider in case of M2M sim. For regular  sim cards APN name will be displayed automatically.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|SIM 2 PDP Type&lt;br /&gt;
|IPV4&lt;br /&gt;
|Choose the  PDP type, which is typically either IPv4 or IPv6 depending on the sim card.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|SIM 2 Username&lt;br /&gt;
|&lt;br /&gt;
|Enter the  username if required by the APN. Leave blank if not required.&lt;br /&gt;
|-&lt;br /&gt;
|15&lt;br /&gt;
|SIM 2 Password&lt;br /&gt;
|&lt;br /&gt;
|Enter the  password if required by the APN. Leave blank if not required.&lt;br /&gt;
|-&lt;br /&gt;
|16&lt;br /&gt;
|SIM 2 Authentication Protocol&lt;br /&gt;
|None&lt;br /&gt;
|Choose the  authentication protocol. Options typically include None, PAP, or CHAP.&lt;br /&gt;
|-&lt;br /&gt;
|17&lt;br /&gt;
|SIM 2 MTU&lt;br /&gt;
|Ex: 1500 (a common MTU size)&lt;br /&gt;
|&#039;&#039;&#039;MTU  (Maximum Transmission Unit)&#039;&#039;&#039; defines the largest size of a data packet  that can be transmitted over the network.&lt;br /&gt;
|-&lt;br /&gt;
|18&lt;br /&gt;
|Primary SIM Switchback Enable&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|When enabled,  the device will automatically switch back to the primary SIM (SIM 1) after  switching to SIM 2, under certain conditions (e.g., SIM 1 regains network  availability).&lt;br /&gt;
|-&lt;br /&gt;
|19&lt;br /&gt;
|Primary SIM Switchback Time (In Minutes)&lt;br /&gt;
|10&lt;br /&gt;
|Enter the  time in minutes after which the system should switch back to the primary SIM  if it becomes available.&lt;br /&gt;
|}&lt;br /&gt;
After configuring all the required information, the user should click on the save and then click on the update to update the all the required information. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Band lock and Operator Lock:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this page, the user needs to configure the lock band and operator based on the service provider&#039;&#039;&#039;.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Bands available in the drop-down list.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Band lock and operator Lock.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2G/3G option:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
2G/3G: - 3G allows additional features such as mobile internet access, video calls and mobile TV.&lt;br /&gt;
&lt;br /&gt;
While the main function of 2G technology is the transmission of information through voice calls.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Band Lock.png]]&lt;br /&gt;
&lt;br /&gt;
The user should select the band check box available for 2g/3g from the given list. Bands available for selection under LTE for the bands available in that area.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operator Selection Mode:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The user needs to click on the check box of the “operator select enable” to select the operator.&lt;br /&gt;
&lt;br /&gt;
Once the check box is clicked there will be a dropdown list of the operator modes from which the user needs to select the mode. The user needs to select the operator mode from the given dropdown list.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Operator Selection Mode.png]]&lt;br /&gt;
&lt;br /&gt;
If the user selects the mode “Manual” or “Manual-Automatic” then one more text box will appear where the user must provide the operator code. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Operator Code.png]] &lt;br /&gt;
&lt;br /&gt;
After configuring all the required information, the user should click on the save and then click on the update to update the all the required information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Wi-Fi Setting:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this, router has the general setting and change country code, channel, radio mode, radio passphrase as per the requirement after clicking on enable Radio button.&lt;br /&gt;
&lt;br /&gt;
The user needs to select the respective radio mode based on its need.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A WiFi Settings.png]]&lt;br /&gt;
&lt;br /&gt;
It has 3 radio modes:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.) Access Point&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2.) Client only&#039;&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3.) Access Point and Client&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Access Point and Client.png|1327x1327px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Access Point:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In Access Point mode, a configuration in which a router, allows wireless devices to connect to a wired network by creating a Wi-Fi hotspot. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Access point.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Client point:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
In client mode, the access point connects your wired devices to a wireless network. This mode is suitable when you have a wired device with an Ethernet port and no wireless capability, for example, a smart TV, Media Player, or Game console and you want to connect it to the internet wirelessly, select the Client Mode and give the Radio SSID &amp;amp; client passphrase.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Client Only.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Access point and client point&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
Select this option for both type of connection, give both SSID and passphrase.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Access Point and Client Point.png]]&lt;br /&gt;
&lt;br /&gt;
After configuring all the required information, the user should click on the save and then click on the update to update the all the required information.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Radio 0 Protocol&lt;br /&gt;
|IEEE 802.11 b/g/n&lt;br /&gt;
|This section shows the radio protocol  which is by default.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Country Code&lt;br /&gt;
|INDIA&lt;br /&gt;
|Select  the country accordingly.&lt;br /&gt;
&lt;br /&gt;
(INDIA by default)&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Channel&lt;br /&gt;
|Auto&lt;br /&gt;
|In this dropdown the user should  select the proper channel to be used. (Auto by default)&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|TX Power&lt;br /&gt;
|100&lt;br /&gt;
|In this text box the user should  specify the power.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Channel Width&lt;br /&gt;
|20 MHz&lt;br /&gt;
|In this dropdown the user should  select the channel width&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Radio Mode&lt;br /&gt;
|1.) Access point&lt;br /&gt;
&lt;br /&gt;
2.) Client only&lt;br /&gt;
&lt;br /&gt;
3.) Access point and client&lt;br /&gt;
|In this drop down the user should select the mode.&lt;br /&gt;
&lt;br /&gt;
(Access point by default)&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Radio SSID&lt;br /&gt;
|AP_37A26230014&lt;br /&gt;
|In this text box the user should  specify the SSID number which usually comes with the router.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Radio Authentication&lt;br /&gt;
|WPA2 Personal (PSK)&lt;br /&gt;
|In this dropdown the user should select the type of authentication.&lt;br /&gt;
&lt;br /&gt;
(WPA2 Personal (PSK) by default)&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Radio Encryption&lt;br /&gt;
|AES&lt;br /&gt;
|In this dropdown the user should select the type of encryption  required.&lt;br /&gt;
&lt;br /&gt;
(AES by default)&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Radio Passphrase&lt;br /&gt;
|*********&lt;br /&gt;
|In this text box the user should  specify the password. Password will be given with the router which can be  changed later.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Radio DHCP server IP&lt;br /&gt;
|192.168.100.1&lt;br /&gt;
|In this text box the user should specify the IP address of DHCP  server.&lt;br /&gt;
&lt;br /&gt;
(192.168.100.1  will be default which can be changed accordingly)&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Radio DHCP start address&lt;br /&gt;
|100&lt;br /&gt;
|In this text box the user should specify the start address of the  DHCP.&lt;br /&gt;
&lt;br /&gt;
(100 value is default)&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Radio DHCP limit&lt;br /&gt;
|50&lt;br /&gt;
|In this text box the user should specify the limit for the DHCP.&lt;br /&gt;
&lt;br /&gt;
(50 value is default)&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|WMM Enable&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Wi-Fi Multimedia (WMM) improves performance for  applications that require low latency and consistent throughput.&lt;br /&gt;
|-&lt;br /&gt;
|15&lt;br /&gt;
|Enable DHCP Relay&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|&#039;&#039;&#039;DHCP Relay&#039;&#039;&#039;  allows a device to forward DHCP requests from clients to a remote DHCP server  located on a different subnet.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once changes have been made.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Guest Wifi:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This option enables a separate Wi-Fi network for guests, isolated from the main network to enhance security and privacy. Guest Wi-Fi allows visitors or temporary users to connect to your network without accessing the main LAN resources.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A GUest Wifi.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Wireless Schedule:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi can be automatically withdrawn based on the configuration done in this section.&lt;br /&gt;
&lt;br /&gt;
The user can schedule the Wi-Fi’s accessibility time during a particular period.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note:&#039;&#039;&#039; This section is turned off by default, tick the box to activate it.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Wireless Schedule.png]]After configuring all the required information, the user should click on save and then click on update to update all the required information.&lt;br /&gt;
&lt;br /&gt;
The user can select more than one “day of the week” for scheduling the Wi-Fi working hours.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Wi-Fi Schedule settings.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SMS Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
User needs to enable SMS option in SMS settings page.&lt;br /&gt;
&lt;br /&gt;
This option is to validate the mobile numbers using which controlling commands could be sent to the router device.&lt;br /&gt;
&lt;br /&gt;
1 to 5 mobile numbers can be authenticated by choosing from “Select Valid SMS user numbers” and&lt;br /&gt;
&lt;br /&gt;
adding the mobile numbers below respectively.&lt;br /&gt;
&lt;br /&gt;
API key is the pass key used in the commands while sending SMS.&lt;br /&gt;
&lt;br /&gt;
Displayed in the below screen is the default API key which can be edited and changed as per choice.&lt;br /&gt;
&lt;br /&gt;
After addition of the mobile number’s user needs to click on save button for changes to take place. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A SMS Settings.png]] &lt;br /&gt;
&lt;br /&gt;
1.) Select valid user number max. 5 and add authorized phone number in the tab where you want to find the alert and click on &#039;&#039;&#039;‘SMS Response Enable’&#039;&#039;&#039;, &#039;&#039;&#039;‘save’&#039;&#039;&#039; and &#039;&#039;&#039;‘update’&#039;&#039;&#039; button.&lt;br /&gt;
&lt;br /&gt;
2.) Now send SMS commands from the configured mobile number.&lt;br /&gt;
&lt;br /&gt;
3.) Once the commands are received from the user phone number the board will send acknowledgement as per the commands.&lt;br /&gt;
&lt;br /&gt;
4.) After that it will send the router’s status once it has rebooted and is operational again.&lt;br /&gt;
&lt;br /&gt;
Mentioned below are a few commands which can be sent from the configured mobile number to the router device. Below two commands are One for rebooting the router device and another to get the uptime.&lt;br /&gt;
&lt;br /&gt;
1) {&amp;quot;device”: [&amp;quot;passkey”, “API key&amp;quot;],&amp;quot;command&amp;quot;:&amp;quot;reboot&amp;quot;,&amp;quot;arguments&amp;quot;:&amp;quot;hardware&amp;quot;}&lt;br /&gt;
&lt;br /&gt;
2) {&amp;quot;device”: [&amp;quot;passkey &amp;quot;,&amp;quot;API key&amp;quot;],&amp;quot;command”: “uptime&amp;quot;}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Loop back IP settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The loopback IP address, often referred to as “localhost.” it is used to establish network connections within the same device for testing and troubleshooting purpose.&lt;br /&gt;
&lt;br /&gt;
The loopback IP address, commonly represented as 127.0.0.1, is a special address used for testing network connectivity on a local machine.&lt;br /&gt;
&lt;br /&gt;
It allows a device to send network messages to itself without involving external networks, making it useful for troubleshooting and diagnostics.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
However, this IP can be changed as per requirement and to do that, Navigating to Setting&amp;gt;&amp;gt;Network configuration&amp;gt;&amp;gt; Loopback IP settings can be changed/updated.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Loopbackip Settings.png|1398x1398px]]&lt;br /&gt;
&lt;br /&gt;
After configuring all the required information, the user should click on the save and then click on the update to update the all the required information.&lt;br /&gt;
&lt;br /&gt;
=== 2.2 VLAN ===&lt;br /&gt;
&#039;&#039;&#039;VLAN (Virtual Local Area Network)&#039;&#039;&#039; is a network within a network that segregates traffic into different logical networks on the same physical hardware. VLANs help in managing traffic more effectively and securely.&lt;br /&gt;
&lt;br /&gt;
It is further divided into 2 sections,&lt;br /&gt;
&lt;br /&gt;
Port-Based VLAN&lt;br /&gt;
&lt;br /&gt;
Tagged Port Configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Port-Based VLAN:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A VLAN configuration method where network ports are assigned to specific VLANs.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Port Based VLAN.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To add a new VLAN ID, click on ‘Add Device’.&lt;br /&gt;
&lt;br /&gt;
To edit the existing device the user needs to click on the edit option.&lt;br /&gt;
&lt;br /&gt;
Once the changes are done click on the save button to save all the changes.&lt;br /&gt;
&lt;br /&gt;
Click on the deleted button to delete the existing device detail.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A VLAN Port based Configuration Settings.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|&#039;&#039;&#039;VLAN ID&#039;&#039;&#039;&lt;br /&gt;
|1&lt;br /&gt;
|This is a unique identifier for a VLAN within a  network.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|&#039;&#039;&#039;Port 0&#039;&#039;&#039;&lt;br /&gt;
|Untagged&lt;br /&gt;
|When a port is set as untagged for a VLAN, it  means that traffic entering or exiting this port is automatically associated  with that VLAN without any VLAN tags being added to the frames.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|&#039;&#039;&#039;Port 1&#039;&#039;&#039;&lt;br /&gt;
|Untagged&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|&#039;&#039;&#039;Port 2&#039;&#039;&#039;&lt;br /&gt;
|tagged&lt;br /&gt;
|When a port is set as tagged for a VLAN, it  means that traffic on this port will include VLAN tags in the Ethernet  frames. These tags carry the VLAN ID, allowing switches and other devices to  know which VLAN the traffic belongs to.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|&#039;&#039;&#039;Port 3&#039;&#039;&#039;&lt;br /&gt;
|Untagged&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|&#039;&#039;&#039;Port 4&#039;&#039;&#039;&lt;br /&gt;
|OFF&lt;br /&gt;
|When a port is marked as off for a VLAN, it  means that the port is not participating in that VLAN at all. It will neither  send nor receive traffic associated with that VLAN.&lt;br /&gt;
|}&lt;br /&gt;
Save and update the page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tagged Port Configuration:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Tagged port Configuration.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To add a new VLAN ID, click on ‘Add Device’.&lt;br /&gt;
&lt;br /&gt;
To edit the existing device the user needs to click on the edit option.&lt;br /&gt;
&lt;br /&gt;
Click on the deleted button to delete the existing device detail.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A VLAN Tag Based Configuration Settings.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Type&lt;br /&gt;
|802.1Q&lt;br /&gt;
|&#039;&#039;&#039;IEEE 802.1Q&#039;&#039;&#039; is the  standard protocol for VLAN tagging in Ethernet networks.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Parent Interface&lt;br /&gt;
|Port 2&lt;br /&gt;
|It is the underlying physical interface like  port 2 that carries the VLAN-tagged traffic.&lt;br /&gt;
|}&lt;br /&gt;
Save and update the page.&lt;br /&gt;
&lt;br /&gt;
=== 2.3 SIM Switch ===&lt;br /&gt;
In this page the user needs to configure the Sim for the given device.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A SIM Switch.png]]&lt;br /&gt;
&lt;br /&gt;
The user needs to select from the drop-down menu on which basis the sim needs to be switched.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Sim Switch Settings.png]]&lt;br /&gt;
&lt;br /&gt;
Once the user selects on “&#039;&#039;&#039;signal strength&#039;&#039;&#039;” then the parameters related to signal strength will pop up and the user needs to configure the parameters based on the requirement.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Sim Switch Configuration.png|1483x1483px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Threshold RSRP:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This Needs to be set appropriately. Incorrect setting may cause unnecessary SIM switching. (In General, a BAD RSRP value range is -140 to -115 and FAIR RSRP value range is -115 to -105).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Threshold SINR:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This Needs to be set appropriately. Incorrect setting may cause unnecessary SIM switching. (In General, a BAD SNR value range is -20 to 0 and FAIR SNR value range is 0 to 13)&lt;br /&gt;
&lt;br /&gt;
Once the user selects on “&#039;&#039;&#039;Data Limit&#039;&#039;&#039;” then the parameters related to Data Limit will pop up and the user needs to configure the parameters based on the requirement.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Sim switch based on Data Limit.png|1483x1483px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|SIM Switch Based on&lt;br /&gt;
|Data Limit&lt;br /&gt;
|The user needs to select from the drop-down  menu on what basis the sim needs to be switched.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|SIM 1 Data Usage Limit (In MB)&lt;br /&gt;
|1000&lt;br /&gt;
|The user needs to  set the limit for the data usage for SIM 1.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|SIM 2 Data Usage Limit (In MB)&lt;br /&gt;
|1000&lt;br /&gt;
|The user needs to  set the limit for the data usage for SIM 2.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Periodicity&lt;br /&gt;
|Daily&lt;br /&gt;
|The user needs to  set the pattern/frequency to switch the sims.&lt;br /&gt;
|}&lt;br /&gt;
After configuring all the required information, the user should click on the save.&lt;br /&gt;
&lt;br /&gt;
=== 2.4 Multi-WAN ===&lt;br /&gt;
As shown below, this section has 4 categories,&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Status&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General settings&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Failover&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Load Balancing&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Multiwan .png]]&lt;br /&gt;
&lt;br /&gt;
In &#039;&#039;&#039;‘Status’&#039;&#039;&#039; tab user can see the active network connections on the device as shown above.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In general settings, select any one option from the drop-down menu which you wish to imply and click on save and update.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Multi-WAN Configuration.png]]Click on save and update.    &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Failover:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE:&#039;&#039;&#039; Please verify that the name to be added is in the interface section of the status tab. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Failover.png]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Priority settings.png]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are below.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Priority&lt;br /&gt;
|Ex: 5&lt;br /&gt;
|Setting a priority of 1 means this connection  has the highest priority and will be used before any others with a higher  priority number.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Select Track IP Numbers&lt;br /&gt;
|2&lt;br /&gt;
|In this dropdown the user needs to select the  track number for the Ips. This specifies the number of IP addresses  that will be used for tracking the status of the connection.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|TrackIP1&lt;br /&gt;
|8.8.8.8&lt;br /&gt;
|The system  will ping this IPV4 IP address to check if the connection is up and working.  You can even add any whitelisted IP.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|TrackIP2&lt;br /&gt;
|8.8.4.4&lt;br /&gt;
|The system  will ping this IPV4 IP address to check if the connection is up and working.  You can even add any whitelisted IP.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Reliability&lt;br /&gt;
|1&lt;br /&gt;
|If  reliability is set to 1, it might mean the connection is considered reliable  if it successfully pings at least one of the tracked IP addresses.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Count&lt;br /&gt;
|1&lt;br /&gt;
|Setting Count  to 1 means the device will send one ping to each IP address to check for  connectivity.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Up&lt;br /&gt;
|3&lt;br /&gt;
|If set to 3,  the connection will be considered &amp;quot;up&amp;quot; only if all three pings are  successful.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Down&lt;br /&gt;
|3&lt;br /&gt;
|If set to 3,  the connection will be considered &amp;quot;down&amp;quot; if all three pings fail.&lt;br /&gt;
|}&lt;br /&gt;
Click on save and update tab.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Load Balancing:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Load balancing is a network management technique used to distribute traffic across multiple network connections or servers to optimize resource use, maximize throughput, minimize response time, and ensure reliability.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Task&#039;&#039;&#039;: Distributes network traffic evenly across multiple connections (e.g., multiple WAN links) or servers.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Purpose&#039;&#039;&#039;: This ensures that no single connection or server is overwhelmed with too much traffic, which could lead to congestion and slower performance.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Load Balancing.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Loadbalancing Edit.png]]Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Traffic Distribution Ratio&lt;br /&gt;
|Ex: 60%&lt;br /&gt;
|If you have  two connections and set one to 60% and the other to 40%, traffic will be  distributed accordingly.&lt;br /&gt;
&lt;br /&gt;
The ratio must be the same for CWAN1_0 and CWAN1_1.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Select Track IP Numbers&lt;br /&gt;
|2&lt;br /&gt;
|The system  will track two IP addresses to determine if the network connection is active  and reliable.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|TrackIP1&lt;br /&gt;
|8.8.8.8&lt;br /&gt;
|The system  will ping this IPV4 IP address to check if the connection is up and working.  You can even add any whitelisted IP.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|TrackIP2&lt;br /&gt;
|8.8.4.4&lt;br /&gt;
|The system  will ping this IPV4 IP address to check if the connection is up and working.  You can even add any whitelisted IP.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Reliability&lt;br /&gt;
|1&lt;br /&gt;
|With a  reliability setting of 1, the connection might be considered reliable if at  least one ping is successful.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Count&lt;br /&gt;
|1&lt;br /&gt;
|The system  will send one ping to each tracked IP to check the connection&#039;s status.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Up&lt;br /&gt;
|3&lt;br /&gt;
|The system  requires 3 successful pings for the connection to be marked as  &amp;quot;up.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Down&lt;br /&gt;
|3&lt;br /&gt;
|If 3 pings  fail, the system will mark the connection as &amp;quot;down,&amp;quot; and it may  switch to an alternate connection if available.&lt;br /&gt;
|}&lt;br /&gt;
Click on save and update tab.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2.5 VPN ===&lt;br /&gt;
VPN stands for &#039;&#039;&#039;Virtual Private Network&#039;&#039;&#039;, it establishes a connection between the system and a remote server, which is owned by a VPN provider.&lt;br /&gt;
&lt;br /&gt;
Creating a point-to-point tunnel that encrypts the personal data, masks the IP address, and allows to block the required website to blocks via firewalls on the internet.&lt;br /&gt;
&lt;br /&gt;
Navigate to settings &amp;gt;= VPN, general settings and you will see all VPN options you wish to use.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A VPN.png]]&lt;br /&gt;
&lt;br /&gt;
There are 7 types of setting available under VPN configuration.&lt;br /&gt;
&lt;br /&gt;
* General Settings&lt;br /&gt;
* IPSEC&lt;br /&gt;
* Open VPN&lt;br /&gt;
* Wireguard&lt;br /&gt;
* Zerotier&lt;br /&gt;
* PPTP&lt;br /&gt;
* L2TP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this page the user must choose which type of VPN connection is required for the device. The user must select from the above VPN based on its requirement. If required, the user can select all the options. The user needs to click on the save after selecting the option based on its use. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A VPN Configuration.png|1363x1363px]] &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPSEC:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
IPSEC VPN is used to create a VPN connection between local and remote networks.&lt;br /&gt;
&lt;br /&gt;
To use IPSEC VPN, the user should check that both local and remote routers support IPSEC VPN feature.&lt;br /&gt;
&lt;br /&gt;
In this page the user can add/edit/delete the IPSEC VPN connection for the device.&#039;&#039;*Refer the image below*&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A IPsec.png]]&lt;br /&gt;
&lt;br /&gt;
The user needs to click on the update button once the required configuration is completed.&lt;br /&gt;
&lt;br /&gt;
In IPSEC the user needs to click on edit button to edit the configuration of an existing VPN connection.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Ipsec Configuration.png]]&lt;br /&gt;
&lt;br /&gt;
Click on update once done with configurations.&lt;br /&gt;
&lt;br /&gt;
The tunnel will show established, showing the connection has been made.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Ipsec Status.png]]&lt;br /&gt;
&lt;br /&gt;
Detailed specifications are below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|IPSEC&lt;br /&gt;
|Site to Site VPN&lt;br /&gt;
|In this dropdown the user should select the  IPSEC connection type.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|IPSEC Role&lt;br /&gt;
|Client/Server&lt;br /&gt;
|In this dropdown  box the user needs to select the IPSEC role. The device is acting as a  client in the VPN setup (in this example).&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Connection Type&lt;br /&gt;
|Tunnel&lt;br /&gt;
|In this dropdown  the user needs to select the connection type. The user should select on the  connection enable check box.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Connection mode&lt;br /&gt;
|Route/add/&#039;&#039;&#039;start&#039;&#039;&#039;/trap&lt;br /&gt;
|In this drop down  list the user should select the mode for the connection. In this example &#039;&#039;&#039;start&#039;&#039;&#039;  is selected which means the VPN connection is initiated automatically.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Remote Server IP&lt;br /&gt;
|********&lt;br /&gt;
|The IP address of the remote VPN server.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Local ID&lt;br /&gt;
|3.3.3.3&lt;br /&gt;
|The user needs to  set the local id. It is the identification for the local VPN client.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|No. of local subnets&lt;br /&gt;
|1&lt;br /&gt;
|In this dropdown  the user needs to select how many subnets will be connected.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Local Subnet 1&lt;br /&gt;
|172.16.31.25/32&lt;br /&gt;
|In this text box  the user needs to put the specific local subnet included in the VPN.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Remote id&lt;br /&gt;
|1.1.1.1&lt;br /&gt;
|In this text box  the user needs to put the id of the remote connection. It is the  identification for the remote VPN server.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|No of remote subnet&lt;br /&gt;
|1&lt;br /&gt;
|In this dropdown  the user needs to select how many subnets it will be connected remotely.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Remote subnet&lt;br /&gt;
|10.1.1.0/24&lt;br /&gt;
|In this text box  the user needs to put the address of the remote subnet. The specific  remote subnet included in the VPN.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Key exchange&lt;br /&gt;
|Ikev1&lt;br /&gt;
|In this dropdown  the user should select the which key exchange version to be selected.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Aggressive&lt;br /&gt;
|Yes/No&lt;br /&gt;
|In this dropdown  the user should select either yes or no.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|IKE Lifetime (In Seconds)&lt;br /&gt;
|86400&lt;br /&gt;
|The lifetime of the IKE phase in seconds  (1 day).&lt;br /&gt;
|-&lt;br /&gt;
|15&lt;br /&gt;
|Lifetime (in seconds)&lt;br /&gt;
|28800&lt;br /&gt;
|The lifetime of the IPsec SA (Security  Association) in seconds (8 hours).&lt;br /&gt;
|-&lt;br /&gt;
|16&lt;br /&gt;
|Enable DPD Detection&lt;br /&gt;
|&#039;&#039;&#039;1&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
0&lt;br /&gt;
|Indicates whether Dead Peer Detection is  enabled to detect a lost connection. Enable this option as per server-side  settings.&lt;br /&gt;
|-&lt;br /&gt;
|17&lt;br /&gt;
|Time Interval (In Seconds)&lt;br /&gt;
|60&lt;br /&gt;
|This option is available only if DPD  Detection is enabled. The time interval is the interval for DPD checks.&lt;br /&gt;
|-&lt;br /&gt;
|18&lt;br /&gt;
|Action&lt;br /&gt;
|&#039;&#039;&#039;Restart&#039;&#039;&#039;/clear/hold/&lt;br /&gt;
&lt;br /&gt;
trap/start&lt;br /&gt;
|&#039;&#039;&#039;Restart&#039;&#039;&#039;:  Action to take when DPD detects a lost connection (restart the connection).  Select as per server-side setting.&lt;br /&gt;
|-&lt;br /&gt;
|19&lt;br /&gt;
|Authentication Method&lt;br /&gt;
|&#039;&#039;&#039;PSK&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;PSK&#039;&#039;&#039;:  Pre-shared key is used for authentication. Select this option for  authentication as per sever side setting.&lt;br /&gt;
|-&lt;br /&gt;
|20&lt;br /&gt;
|Multiple Secrets&lt;br /&gt;
|1/&#039;&#039;&#039;0&#039;&#039;&#039;&lt;br /&gt;
|Indicates whether multiple PSK secrets  are used. Enable only if required.&lt;br /&gt;
|-&lt;br /&gt;
|21&lt;br /&gt;
|PSK Value&lt;br /&gt;
|******&lt;br /&gt;
|Pre-shared key value (masked for  security).&lt;br /&gt;
|}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|&#039;&#039;&#039;Proposal settings  Phase I&#039;&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|22&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |&#039;&#039;&#039;Encryption Algorithm&#039;&#039;&#039;&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; |AES 128&lt;br /&gt;
&lt;br /&gt;
AES 192&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;AES 256&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
3DES&lt;br /&gt;
|&#039;&#039;&#039;AES 256&#039;&#039;&#039;: Encryption algorithm  for Phase I. Select as per server-side configuration. Both server and client  should have same configuration.&lt;br /&gt;
|-&lt;br /&gt;
|23&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |Authentication Phase I&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; |SHA1&lt;br /&gt;
&lt;br /&gt;
MD5&lt;br /&gt;
&lt;br /&gt;
SHA 256&lt;br /&gt;
&lt;br /&gt;
SHA 384&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SHA 512&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;SHA 512&#039;&#039;&#039;: Authentication  algorithm for Phase I.&lt;br /&gt;
&lt;br /&gt;
Select as per  server-side configuration. Both server and client should have same  configuration.&lt;br /&gt;
|-&lt;br /&gt;
|24&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |DH Group&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; |MODP768(group1)&lt;br /&gt;
&lt;br /&gt;
MODP1024(group2)&lt;br /&gt;
&lt;br /&gt;
MODP1536(group5)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;MODP2048(group14)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
MODP3072(group15)&lt;br /&gt;
&lt;br /&gt;
MODP4096(group16)&lt;br /&gt;
|&#039;&#039;&#039;MODP2048 (group14)&#039;&#039;&#039;:  Diffie-Hellman group for key exchange.&lt;br /&gt;
&lt;br /&gt;
Select as per  server-side configuration. Both server and client should have same  configuration.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;7&amp;quot; |&#039;&#039;&#039;Proposal settings Phase II&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |25&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |Hash Algorithm&lt;br /&gt;
|AES 128&lt;br /&gt;
&lt;br /&gt;
AES 192&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;AES 256&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
3DES&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |&#039;&#039;&#039;AES 256&#039;&#039;&#039;: Encryption algorithm  for Phase II. Select as per server-side configuration. Both server and client  should have same configuration.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |26&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |Authentication Phase II&lt;br /&gt;
|SHA1&lt;br /&gt;
&lt;br /&gt;
MD5&lt;br /&gt;
&lt;br /&gt;
SHA 256&lt;br /&gt;
&lt;br /&gt;
SHA 384&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SHA 512&#039;&#039;&#039;&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |&#039;&#039;&#039;SHA 512&#039;&#039;&#039;: Authentication  algorithm for Phase II.&lt;br /&gt;
&lt;br /&gt;
Select as per  server-side configuration. Both server and client should have same  configuration.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |27&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |PFS Group&lt;br /&gt;
|MODP768(group1)&lt;br /&gt;
&lt;br /&gt;
MODP1024(group2)&lt;br /&gt;
&lt;br /&gt;
MODP1536(group5)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;MODP2048(group14)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
MODP3072(group15)&lt;br /&gt;
&lt;br /&gt;
MODP4096(group16)&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |&#039;&#039;&#039;MODP2048 (group14)&#039;&#039;&#039;: Perfect  Forward Secrecy group.&lt;br /&gt;
&lt;br /&gt;
Select as per  server-side configuration. Both server and client should have same  configuration.&lt;br /&gt;
|}&lt;br /&gt;
Click on save and then update the page for changes to reflect.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Open VPN:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To use the VPN feature, the user should enable OpenVPN Server on the router and install and run VPN client software on the remote device.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Open VPN .png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The user needs to “upload” the respective certificate from a valid path and then click on the “Update.”&lt;br /&gt;
&lt;br /&gt;
Only the &#039;&#039;&#039;TAP&#039;&#039;&#039; connection needs a &#039;&#039;&#039;bridge&#039;&#039;&#039;. The tun connection does not require a bridge. Here we have established a &#039;&#039;&#039;TUN&#039;&#039;&#039; connection.&lt;br /&gt;
&lt;br /&gt;
By clicking on the enable/disable button, the user can start/stop the VPN connection.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Open VPN Status.png|1161x1161px]]&lt;br /&gt;
&lt;br /&gt;
VPN TUN has been established.&lt;br /&gt;
&lt;br /&gt;
Same way VPN TAP can also be established with the help of bridging.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WireGuard:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WireGuard&#039;&#039;&#039; is simple, fast, lean, and modern VPN that utilizes secure and trusted cryptography.&lt;br /&gt;
&lt;br /&gt;
Click on “Edit” to start configurations as needed.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A WireGuard.png|1171x1171px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A WireGuard Editing.png]]&lt;br /&gt;
&lt;br /&gt;
Click on the save button after the required configuration.&lt;br /&gt;
&lt;br /&gt;
Specifications details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Wireguard Role&lt;br /&gt;
|Client/Server&lt;br /&gt;
|In this dropdown box the user needs to select  the wireguard role.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|WireGuard Tunnel Over&lt;br /&gt;
|IPV4/IPV6&lt;br /&gt;
|&#039;&#039;&#039;IPV4&#039;&#039;&#039;: Use  this if your network and endpoint (WireGuard server) support only IPv4.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPV6&#039;&#039;&#039;: Use  this if your network and endpoint support IPv6.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Enable Failover&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|This option allows the VPN connection to  automatically switch to a backup connection if the primary connection fails.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Enable IPV4&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|This enables IPv4 traffic to be routed through  the WireGuard tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Enable IPV6&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Enable this if your network and the destination  support IPv6.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Listen Port&lt;br /&gt;
|51820&lt;br /&gt;
|This is the default port that WireGuard uses  to listen for incoming connections.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Endpoint Host port&lt;br /&gt;
|51820&lt;br /&gt;
|This is the  port on the WireGuard server that the client will connect to.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Peer Public key&lt;br /&gt;
|*****&lt;br /&gt;
|This is the  public key of the WireGuard server that the client uses to establish a secure  connection.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Enable Default Route&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Enable this  if you want all network traffic (not just specific routes) to be routed  through the WireGuard VPN.&lt;br /&gt;
|}&lt;br /&gt;
Save and update the page after configuration has been done.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Zerotier:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
ZeroTier is a tool that lets you create your own private network over the internet.&lt;br /&gt;
&lt;br /&gt;
Go to ZeroTier Central and sign up for a free account. &lt;br /&gt;
&lt;br /&gt;
In ZeroTier Central, click on &amp;quot;Create a Network&amp;quot;. This will generate a unique 16-digit network ID for your new network.&lt;br /&gt;
&lt;br /&gt;
Go to settings =&amp;gt; VPN, in general settings, enable ZeroTier and save.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A ZeroTier.png]]Copy and paste the unique 16-digit network ID in the edit section.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A ZeroTier 16 digit Network ID.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Click on the save button after the required configuration.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Zerotier Connection Settings.png]]&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|NetworkID&lt;br /&gt;
|Ad2769hfkw2345f4&lt;br /&gt;
|In this dropdown  box the user needs to paste the unique 16-digit network id.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Listen Port&lt;br /&gt;
|9993&lt;br /&gt;
|Default&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;PPTP:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This configuration is for setting up a PPTP (Point-to-Point Tunnelling Protocol) VPN connection.&lt;br /&gt;
&lt;br /&gt;
PPTP is a protocol that enables secure data transmission across public networks like the internet, often used to connect to remote networks or access resources securely. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A PPTP.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:PPTP Connection Settings .png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|PPTP Role&lt;br /&gt;
|Client/Server&lt;br /&gt;
|&#039;&#039;&#039;Client:&#039;&#039;&#039; meaning  it will initiate the connection to the remote PPTP server.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Server:&#039;&#039;&#039; means this device will  accept incoming PPTP connections from clients, which can be users or devices  that need remote access to the local network or internet via this server.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |&#039;&#039;&#039;PPTP  Role: CLIENT&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Default Route&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Enabling the default route means that  all network traffic will be routed through the VPN tunnel once the connection  is established.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Metric&lt;br /&gt;
|Ex: 0&lt;br /&gt;
|The metric is a value that defines the  priority of this route among other available routes. Lower metrics indicate  higher priority.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Server IP&lt;br /&gt;
|Ex: 192.168.10.1&lt;br /&gt;
|This is the IP address of the PPTP  server the client will connect to.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Interface&lt;br /&gt;
|Any&lt;br /&gt;
&lt;br /&gt;
EWAN5&lt;br /&gt;
|Selecting the correct interface is  essential because it tells the system which network adapter should be used to  establish the VPN connection.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Username&lt;br /&gt;
|******&lt;br /&gt;
|This field is the login username for  the PPTP server.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Password&lt;br /&gt;
|****&lt;br /&gt;
|This is the password associated with  the username.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |&#039;&#039;&#039;PPTP  Role: SERVER&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Local IP&lt;br /&gt;
|Ex: 192.168.0.1&lt;br /&gt;
|This IP address (192.168.0.1) is the  local IP of the PPTP server on its network. Clients connecting to the VPN  will see this address as their gateway or endpoint within the VPN.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Remote IP Range&lt;br /&gt;
|Ex: 192.168.0.20-30&lt;br /&gt;
|This range defines the pool of IP  addresses that the server will assign to connected VPN clients. Here, any  client connecting to the server will receive an IP address between  192.168.0.20 and 192.168.0.30, which provides up to 11 possible addresses for  simultaneous connections.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Username&lt;br /&gt;
|Ex: User1&lt;br /&gt;
|This is a username that the client will  use to authenticate with the PPTP server. In this case, User1 is designated as an  authorized user.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Password&lt;br /&gt;
|*****&lt;br /&gt;
|The password associated with User1 is  required to complete the authentication.&lt;br /&gt;
|}&lt;br /&gt;
Once Configured, click on save and update.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;L2TP:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
L2TP (Layer 2 Tunneling Protocol) is a network protocol used to establish secure tunnels for transferring data between remote devices or networks, often in VPNs, by encapsulating data for encryption and routing.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A L2TP Dashboard.png|1185x1185px]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A L2TP Connection Settings.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|L2TP Role&lt;br /&gt;
|Client/Server&lt;br /&gt;
|&#039;&#039;&#039;Client&#039;&#039;&#039;: connecting to  an L2TP server to establish a secure tunnel for communication.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Server&#039;&#039;&#039;: the server listens for incoming client  connections.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |&#039;&#039;&#039;L2TP Role: CLIENT&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Default Route&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|If enabled, all outbound  traffic will be routed through the L2TP connection.&lt;br /&gt;
&lt;br /&gt;
If disabled, only specific traffic  destined for the L2TP network will use the tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Metric&lt;br /&gt;
|Ex: 1&lt;br /&gt;
|The system uses this metric to decide which route to prioritize  if multiple routes exist.&lt;br /&gt;
&lt;br /&gt;
L2TP connection with Metric 1 will take precedence over a LAN or  WAN route with Metric 10.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Server IP&lt;br /&gt;
|Ex: 192.168.10.1&lt;br /&gt;
|This is the &#039;&#039;&#039;IP address of the L2TP server&#039;&#039;&#039; to which the  client will connect.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Local Networks&#039;&#039;&#039;: If connecting within a LAN, the server might have an IP like  192.168.x.x.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Remote Connections&#039;&#039;&#039;: The server IP might be a public address like 203.0.113. x.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Checkup Interval Time (in sec)&lt;br /&gt;
|Ex: 30/60 secs&lt;br /&gt;
|Setting 30 seconds ensures the client checks the connection  every half-minute. If the tunnel drops, the client can quickly reconnect.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Interface&lt;br /&gt;
|Any&lt;br /&gt;
|Example interfaces might include eth0, usb0, or ra0.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Username&lt;br /&gt;
|Ex: User&lt;br /&gt;
|The server verifies the username to grant or deny access.&lt;br /&gt;
&lt;br /&gt;
Must match credentials configured on the L2TP server.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Password&lt;br /&gt;
|******&lt;br /&gt;
|Should be kept secure and match the configuration on the server.&lt;br /&gt;
&lt;br /&gt;
Masked for privacy during configuration.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|MPPE Encryption&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|&#039;&#039;&#039;Enabled&#039;&#039;&#039;: Encrypts traffic using MPPE, enhancing security (recommended).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Disabled&#039;&#039;&#039;: Transmits data unencrypted, reducing overhead but exposing  traffic to potential risks.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |&#039;&#039;&#039;L2TP Role: SERVER&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Local IP&lt;br /&gt;
|Ex: 192.168.0.1&lt;br /&gt;
|This is the &#039;&#039;&#039;local IP address of the L2TP server&#039;&#039;&#039;. It  serves as the gateway for clients connected via the L2TP tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Start&lt;br /&gt;
|Ex: 192.168.0.20&lt;br /&gt;
|Specifies the first IP address that can be assigned to connected  clients.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Limit&lt;br /&gt;
|Ex: 192.168.0.30&lt;br /&gt;
|Creates an IP pool for clients (from 192.168.0.20 to  192.168.0.30 in this case).&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Username&lt;br /&gt;
|Ex: User1&lt;br /&gt;
|Ensures that only authorized users can connect.&lt;br /&gt;
&lt;br /&gt;
The server verifies this username against its authentication  database.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|Password&lt;br /&gt;
|******&lt;br /&gt;
|The server verifies the password along with the username.&lt;br /&gt;
&lt;br /&gt;
The password must match the one configured on the server for  successful authentication.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== 2.6 Firewall ===&lt;br /&gt;
A firewall is a layer of security between the network and the Internet. Since a router is the main connection from a network to the Internet, the firewall function is merged into this device. Every network should have a firewall to protect its privacy. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Firewall .png]] &lt;br /&gt;
&lt;br /&gt;
There are 6 types of setting available under firewall.&lt;br /&gt;
&lt;br /&gt;
* General Settings&lt;br /&gt;
* Port forwards&lt;br /&gt;
* Traffic Rules&lt;br /&gt;
* SNAT traffic Rules&lt;br /&gt;
* Parental Control&lt;br /&gt;
* Zone Forwarding&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
General settings are subdivided into 2 parts,&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.) General settings&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In general settings, the settings that are made are default settings and can be changed according to user’s preference.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Firewall.png]]&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|&#039;&#039;&#039;SN&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;Field Name&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;Sample Value&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable SYN-flood protection&lt;br /&gt;
|Enabled&lt;br /&gt;
|This is enabled by default; setting can be changed  if required.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Disable IPV6&lt;br /&gt;
|Disabled&lt;br /&gt;
|This is enabled by default; setting can be changed  if required.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Drop invalid packets&lt;br /&gt;
|Disabled&lt;br /&gt;
|This is enabled by default; setting can be changed  if required.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|TCP SYN Cookies&lt;br /&gt;
|Disabled&lt;br /&gt;
|This is enabled by default; setting can be changed  if required.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Input&lt;br /&gt;
|Reject/Accept&lt;br /&gt;
|By default, the setting is ‘Reject’ but this needs  to be changed to ‘Accept’ compulsory.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Output&lt;br /&gt;
|Reject/Accept&lt;br /&gt;
|By default, the setting is ‘Reject’ but this needs  to be changed to ‘Accept’ compulsory.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Forward&lt;br /&gt;
|Reject/Accept&lt;br /&gt;
|By default, the setting is ‘Reject’ but this needs  to be changed to ‘Accept’ compulsory.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2.) Zone settings&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In zone settings, there’s an option to add “New Zone”, according to user’s requirement.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Zone Settings.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Port Forwards:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Port forwarding is a feature in a router or gateway that allows external devices to access services on a private network.&lt;br /&gt;
&lt;br /&gt;
It maps an external port on the router to an internal IP address and port on the local network, enabling applications such as gaming servers, web servers, or remote desktop connections to be accessed from outside the network.&lt;br /&gt;
&lt;br /&gt;
This helps in directing incoming traffic to the correct device within a local network based on the port number, enhancing connectivity and accessibility.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Port Forwards.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Port Forwards Editing.png]]Click on the save button after the required configuration.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Name&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;Web_Server_Forward&amp;lt;/code&amp;gt;&lt;br /&gt;
|Field must  not be empty. Provide a name for the rule to easily identify it.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Protocol&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;TCP+UDP&amp;lt;/code&amp;gt;&lt;br /&gt;
|Select the protocol  for the rule.&lt;br /&gt;
&lt;br /&gt;
Options  typically include TCP+UDP, TCP, UDP, ICMP, Custom.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Source zone&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;SW_LAN&amp;lt;/code&amp;gt;&lt;br /&gt;
|Select the source zone where the traffic is originating  from. Options typically include EWAN2,SW_LAN,CWAN1,CWAN1_0,CWAN1_1,VPN&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Source MAC address [optional]&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;any&amp;lt;/code&amp;gt;&lt;br /&gt;
|&#039;&#039;&#039;any&#039;&#039;&#039;: Leave as &amp;lt;code&amp;gt;any&amp;lt;/code&amp;gt; if you don&#039;t want to specify a MAC address.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Source IP address[optional]&lt;br /&gt;
|Example: Leave blank if not needed.&lt;br /&gt;
|Optionally  specify an IP address or range.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Source port&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;80, 443&amp;lt;/code&amp;gt;  (if matching traffic for web server ports)&lt;br /&gt;
|Specify the  source port or port range.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Destination zone&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;SW_LAN&amp;lt;/code&amp;gt;&lt;br /&gt;
|Select the  destination zone where the traffic is heading to.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Destination IP address&lt;br /&gt;
|Leave blank if not needed.&lt;br /&gt;
|Optionally specify  the destination IP address or range.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Destination port&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;80&amp;lt;/code&amp;gt;  (if redirecting to a web server port)&lt;br /&gt;
|Specify the  destination port or port range.&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Traffic Rule:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Traffic rules&amp;quot; refer to the policies and regulations that govern the flow of data packets within a network. &lt;br /&gt;
&lt;br /&gt;
To allow new traffic,&lt;br /&gt;
&lt;br /&gt;
click on “Add and Edit” in “New Traffic Rule”.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;*Refer the image below*&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Traffic Rules.png]] &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Traffics Rules Edit.png]]&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Name&lt;br /&gt;
|Example:  Allow_HTTP_and_HTTPS&lt;br /&gt;
|Field must not be empty: Provide a  descriptive name for the traffic rule.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Restrict to  Address Family &lt;br /&gt;
&lt;br /&gt;
|1.Options: IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
Example: IPv4 if  dealing with typical internet traffic.&lt;br /&gt;
|Select the address family to generate  iptables rules for.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Protocol&lt;br /&gt;
|Example: TCP+UDP&lt;br /&gt;
|TCP+UDP: Match incoming traffic using the  given protocol.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Match ICMP Type&lt;br /&gt;
|Example: any&lt;br /&gt;
|Match all ICMP types if set to any.  Specific types can be chosen if needed.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Source Zone&lt;br /&gt;
|Example: LAN&lt;br /&gt;
|Specifies the traffic source zone.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Enable DDoS  Prevention&lt;br /&gt;
|Example:  ‘Checked’ if you want to enable DDoS prevention measures&lt;br /&gt;
|Enable or disable Distributed Denial of  Service (DDoS) prevention.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Source MAC  Address&lt;br /&gt;
|Example: any&lt;br /&gt;
|any: Match traffic from any MAC address or  specify a particular MAC address.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Source Address&lt;br /&gt;
|Example:  192.168.1.0/24&lt;br /&gt;
|Match incoming traffic from the specified  source IP address or range.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Source Port&lt;br /&gt;
|Example: any if  all source ports should be matched&lt;br /&gt;
|any: Match incoming traffic from the  specified source port or port range.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Destination Zone&lt;br /&gt;
|Example: WAN&lt;br /&gt;
|Specifies the traffic destination zone.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Action&lt;br /&gt;
|Example: ACCEPT&lt;br /&gt;
|Options: ACCEPT, DROP, REJECT. Specify the  action to take for matched traffic.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Limit&lt;br /&gt;
|Example:  10/minute to limit matches to 10 times per minute.&lt;br /&gt;
|Maximum average matching rate; specified  as a number, with an optional /second, /minute, /hour, or /day suffix.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Extra arguments&lt;br /&gt;
|Example:  --log-prefix &amp;quot;Blocked: &amp;quot; to add a log prefix to log messages for  this rule.&lt;br /&gt;
|Passes additional arguments to iptables.  Use with care as it can significantly alter rule behaviour.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once configured. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SNAT Traffic Rule:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
For configuring SNAT (Source Network Address Translation) traffic rules, you can control how outbound traffic from your local network is translated to a different IP address as it exits the network.&lt;br /&gt;
&lt;br /&gt;
To add new source NAT,&lt;br /&gt;
&lt;br /&gt;
Click on “ADD” in “New Source NAT:”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;*Refer the figure below*&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A SNAT Traffic Rules.png]] &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A SNAT Traffic Rules Edit.png]]Specification details are below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Name&lt;br /&gt;
|Example: SNAT_WAN_to_LAN&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty&#039;&#039;&#039;: Provide a unique and descriptive name for the SNAT rule.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Protocol&lt;br /&gt;
|Example: TCP+UDP&lt;br /&gt;
|&#039;&#039;&#039;TCP+UDP&#039;&#039;&#039;:  Select the protocols that the SNAT rule will apply to.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Source Zone&lt;br /&gt;
|Example: wan&lt;br /&gt;
|&#039;&#039;&#039;wan&#039;&#039;&#039;:  Specifies the source zone from which the traffic originates.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Source IP Address&lt;br /&gt;
|Example: any or a specific range like 192.168.1.0/24&lt;br /&gt;
|&#039;&#039;&#039;-- please  choose --&#039;&#039;&#039;: Specify the source IP address or range. Leave empty if the  rule applies to any source IP.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Source Port&lt;br /&gt;
|Example: any&lt;br /&gt;
|&#039;&#039;&#039;any&#039;&#039;&#039;:  Specify the source port or port range from which the traffic originates.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Destination Zone&lt;br /&gt;
|Example: lan&lt;br /&gt;
|&#039;&#039;&#039;lan&#039;&#039;&#039;:  Specifies the destination zone to which the traffic is directed.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Destination IP Address&lt;br /&gt;
|Example: any or a specific IP like 192.168.1.100&lt;br /&gt;
|&#039;&#039;&#039;-- please  choose --&#039;&#039;&#039;: Specify the destination IP address or range. Leave empty if  the rule applies to any destination IP.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Destination port&lt;br /&gt;
|Example: any&lt;br /&gt;
|&#039;&#039;&#039;any&#039;&#039;&#039;:  Specify the destination port or port range to which the traffic is directed.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|SNAT IP Address&lt;br /&gt;
|Example: 203.0.113.5 (an external IP address)&lt;br /&gt;
|&#039;&#039;&#039;-- please  choose --&#039;&#039;&#039;: Specify the IP address to which the source IP should be  translated.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|SNAT Port&lt;br /&gt;
|Example: Leave empty if not needed, or specify a port  like ‘12345’&lt;br /&gt;
|Optionally,  rewrite matched traffic to a specific source port. Leave empty to only  rewrite the IP address.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Extra Arguments&lt;br /&gt;
|Example: --log-prefix &amp;quot;SNAT_traffic: &amp;quot; (to add  a log prefix to log messages for this rule)&lt;br /&gt;
|Pass  additional arguments to iptables. Use with care as it can significantly alter  rule behaviour.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once configured. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Parental Control:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
For configuring parental control rules, you want to set restrictions based on time, source, and&lt;br /&gt;
&lt;br /&gt;
destination zones, as well as specific devices.&lt;br /&gt;
&lt;br /&gt;
To add parental control in firewall,&lt;br /&gt;
&lt;br /&gt;
Click on “Add and Edit” in “New parental control:” field.   &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Parental Control.png]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Parental Control Editing.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Name&lt;br /&gt;
|Example: Parental_Control_Sunday&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty&#039;&#039;&#039;: Provide a unique and descriptive name for the parental  control rule.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Proto&lt;br /&gt;
|all&lt;br /&gt;
|&#039;&#039;&#039;all&#039;&#039;&#039;:  This specifies that the rule will apply to all protocols.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Source Zone&lt;br /&gt;
|Example: lan&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty&#039;&#039;&#039;: Please look at Firewall-&amp;gt;Zone Settings to find zone  names.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Destination Zone&lt;br /&gt;
|Example: wan&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty&#039;&#039;&#039;: Please look at Firewall-&amp;gt;Zone Settings to find zone  names.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Source MAC Address&lt;br /&gt;
|Example: 00:1A:2B:3C:4D:5E&lt;br /&gt;
|&#039;&#039;&#039;Field&#039;&#039;&#039;:  Enter the MAC address of the device you want to apply the parental control  rule to. This is useful for restricting specific devices.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Target&lt;br /&gt;
|Example: Reject&lt;br /&gt;
|&#039;&#039;&#039;Accept&#039;&#039;&#039;:  This specifies the action to take. For parental controls, you might want to  use ‘Reject’ or ‘Drop’ to block traffic.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Weekdays&lt;br /&gt;
|Example: Sunday&lt;br /&gt;
|&#039;&#039;&#039;Sunday&#039;&#039;&#039;:  Specify the days of the week when the rule should be active.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Month Days&lt;br /&gt;
|Example: All&lt;br /&gt;
|&#039;&#039;&#039;All:&#039;&#039;&#039; Specify  the days of the month when the rule should be active.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Start Time (hh:mm:ss)&lt;br /&gt;
|Example: 18:00:00 (6:00 PM)&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty:&#039;&#039;&#039; Specify the start time when the rule should begin to apply.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Stop Time (hh:mm:ss)&lt;br /&gt;
|Example: 22:00:00 (10:00 PM)&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty:&#039;&#039;&#039; Specify the stop time when the rule should end.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once configured.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Zone Forwarding:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Zone forwarding in network configuration allows traffic to be directed from one zone to another.&lt;br /&gt;
&lt;br /&gt;
To ADD new zone,&lt;br /&gt;
&lt;br /&gt;
Click on “Add” in “New Zone Forward:” field.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Zone Forwarding.png]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Zone Forwading Editing.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Source Zone&lt;br /&gt;
|Example options: lan, wan, etc.&lt;br /&gt;
|&#039;&#039;&#039;--please  choose--&#039;&#039;&#039;: Select the source zone from which the traffic originates.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Destination Zone&lt;br /&gt;
|Example options: lan, wan, etc.&lt;br /&gt;
|&#039;&#039;&#039;--please  choose--&#039;&#039;&#039;: Select the destination zone to which the traffic is directed.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once configured.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2.7 Loopback Rule ===&lt;br /&gt;
In this page the user can configure the port where he wants to forward the traffic to. Here the user can add/edit/delete different ports as per the requirement.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Loopback Rule.png]]&lt;br /&gt;
&lt;br /&gt;
The user should click on ‘add’ and then ‘edit’ to do the required changes in the port and enter the valid information in each section to configure the port for forwarding.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Loopback Rule Editing.png]]Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Name&lt;br /&gt;
|Example: loopback&lt;br /&gt;
|Provide a  descriptive name for the rule.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Protocol&lt;br /&gt;
|Example: TCP+UDP&lt;br /&gt;
|&#039;&#039;&#039;TCP+UDP&#039;&#039;&#039;:  Select the protocols that the rule will apply to.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Source IP Address [Optional]&lt;br /&gt;
|Example: any or a specific IP range like 192.168.1.0/24&lt;br /&gt;
|Optionally  specify the source IP address or range. Leave empty if the rule should apply  to any source IP.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Source Port [Optional]&lt;br /&gt;
|Example: any&lt;br /&gt;
|&#039;&#039;&#039;any&#039;&#039;&#039;:  Specify the source port or port range from which the traffic originates. any  allows traffic from all ports.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Loopback IP Address&lt;br /&gt;
|Example: 1.1.1.1&lt;br /&gt;
|Specify the  loopback IP address.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Port&lt;br /&gt;
|Example: 81&lt;br /&gt;
|&#039;&#039;&#039;any&#039;&#039;&#039;: Specify  the destination port or port range to which the traffic is directed. any  allows traffic to all ports.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Action&lt;br /&gt;
|Example: DNAT&lt;br /&gt;
|This  specifies the action to take either DNAT or SNAT.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Internal IP Address&lt;br /&gt;
|Example: 2.2.2.2&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty&#039;&#039;&#039;: Specify the internal IP address to which the traffic should  be redirected.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Internal Port&lt;br /&gt;
|Example: 81&lt;br /&gt;
|Redirect  matched incoming traffic to the given port on the internal host.&lt;br /&gt;
|}&lt;br /&gt;
Once the user is done with the required configurations, user should click save button and then click on the update to save the changes.&lt;br /&gt;
&lt;br /&gt;
=== 2.8 VRRP ===&lt;br /&gt;
&#039;&#039;&#039;VRRP (Virtual Router Redundancy Protocol)&#039;&#039;&#039; is used to ensure high availability for IP routing by allowing multiple routers to work together to present the illusion of a single virtual router to the hosts on a network.&lt;br /&gt;
&lt;br /&gt;
In General Settings, click on ‘Enable VRRP’ and save.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A VRRP.png]]&lt;br /&gt;
&lt;br /&gt;
In VRRP section,&lt;br /&gt;
&lt;br /&gt;
Give a name and ‘Add’ device.&lt;br /&gt;
&lt;br /&gt;
Click on ‘Edit’ to make changes.&lt;br /&gt;
&lt;br /&gt;
Click on ‘Delete’ if particular instance not required.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A VRRP Status.png]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A VRRP Editing.png]]Specification details are given below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Role&lt;br /&gt;
|1.      Master&lt;br /&gt;
&lt;br /&gt;
2.      Backup&lt;br /&gt;
|Choose &#039;&#039;&#039;Master&#039;&#039;&#039;  for the primary router that should handle the traffic under normal  circumstances.&lt;br /&gt;
&lt;br /&gt;
Choose &#039;&#039;&#039;Backup&#039;&#039;&#039;  for a secondary router that will take over if the master fails.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Virtual ID&lt;br /&gt;
|Ex: 0&lt;br /&gt;
|The value can  range from 0 to 255.&lt;br /&gt;
&lt;br /&gt;
Ensure all  routers in the same VRRP group share the same &#039;&#039;&#039;Virtual ID&#039;&#039;&#039;.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Priority&lt;br /&gt;
|Ex: 100&lt;br /&gt;
|For the &#039;&#039;&#039;Master&#039;&#039;&#039;  role, use the highest priority, typically above 100.&lt;br /&gt;
&lt;br /&gt;
For the &#039;&#039;&#039;Backup&#039;&#039;&#039;  role, set a lower priority number, usually below the master&#039;s priority.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Interface&lt;br /&gt;
|SW_LAN&lt;br /&gt;
|This is the  network interface on which VRRP operates.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Source IP&lt;br /&gt;
|Ex: 192.168.10.1&lt;br /&gt;
|This is the  IP address used as the source in VRRP advertisements.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Peer IP&lt;br /&gt;
|Ex: 192.168.10.10&lt;br /&gt;
|This is the  IP address of the other VRRP peer (usually the backup router). It helps the  routers identify each other.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Virtual IP  Address&lt;br /&gt;
|192.168.10.100/24&lt;br /&gt;
|The virtual  IP should be an unused address within the subnet, such as 192.168.10.100/24,  ensuring it&#039;s consistent across all VRRP routers.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Enable  Authentication&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Enable this  if you want to secure your VRRP communications.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Password&lt;br /&gt;
|*********&lt;br /&gt;
|It ensures  that only routers with the correct password can join the VRRP group.&lt;br /&gt;
|}&lt;br /&gt;
Save and update once changes have been made.&lt;br /&gt;
&lt;br /&gt;
=== 2.9 Remote Monitoring ===&lt;br /&gt;
In this page the user can select which equipment needs to be monitored remotely.&lt;br /&gt;
&lt;br /&gt;
Once the user selects the type of RMS click on save.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Remote Management System.png]]&#039;&#039;&#039;NMS:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this page the user should type the server IP or domain name in the URL then click on save.&lt;br /&gt;
&lt;br /&gt;
Click on upload and start (Once key is uploaded and this option is clicked, NMS automatically starts, and this router device gets registered with the NMS server provided).&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A NMS.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TR_069:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To enable the TR_069 the user needs to click on the enable check box.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A TR069.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once the user clicks on the check box of enable it will display all the required filed to configured.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Tr069 Edit.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Serving  Interval&lt;br /&gt;
|300&lt;br /&gt;
|A value of 300 seconds means the device  will check in with the ACS (auto-configuration servers) every 5 minutes.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Interface&lt;br /&gt;
|This can  be something like eth0 or wan.&lt;br /&gt;
|This specifies the network interface  used for TR-069 communication.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Username&lt;br /&gt;
|Example: User&lt;br /&gt;
|The username used to authenticate with  the ACS.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Password&lt;br /&gt;
|••••&lt;br /&gt;
|The password used to authenticate with  the ACS.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|URL&lt;br /&gt;
|&amp;lt;nowiki&amp;gt;http://example.com&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|The URL of the ACS. This is where the CPE  (customer-premises equipment) will send its requests and where it will  receive configurations and updates from.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The user should fill all the required fields and click on the save button.&lt;br /&gt;
&lt;br /&gt;
=== 2.10 Tunnel ===&lt;br /&gt;
Tunnels are a method of transporting data across a network using protocols which are not supported by that network.&lt;br /&gt;
&lt;br /&gt;
It is further categorised into 3 sections,&lt;br /&gt;
&lt;br /&gt;
1.) General Settings&lt;br /&gt;
&lt;br /&gt;
2.) GRE Tunnel&lt;br /&gt;
&lt;br /&gt;
3.) IPIP Tunnel  &lt;br /&gt;
&lt;br /&gt;
[[File:Tunnel IAC44A.png]]  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this page the user needs to select under which type of tunnel it needs to send the data.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Tunnel General Settings.png]]&lt;br /&gt;
&lt;br /&gt;
Once the user selects the type of tunnel then click on the save button.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;GRE Tunnel:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A GRE (Generic Routing Encapsulation) tunnel configuration involves setting up a virtual point-to-point connection between two endpoints over an IP network.&lt;br /&gt;
&lt;br /&gt;
Here the user can add/edit/delete the details of the tunnel.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A GRE Tunnel.png]]&lt;br /&gt;
&lt;br /&gt;
Once the required update is done then click on update to save the changes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A GRE Tunnel Configuration.png]]&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Tunnel  name&lt;br /&gt;
|Example:  GRETunnel&lt;br /&gt;
|&#039;&#039;&#039;GRETunnel&#039;&#039;&#039;: The name of the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Local  external IP&lt;br /&gt;
|Example:  10.1.1.66&lt;br /&gt;
|The IP address of the local endpoint  that will initiate the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Remote external  IP&lt;br /&gt;
|Example:  10.1.1.40&lt;br /&gt;
|The IP address of the remote endpoint  that will terminate the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Peer  tunnel IP&lt;br /&gt;
|Example:  10.1.1.4&lt;br /&gt;
|The IP address of the peer&#039;s tunnel  interface.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Local  tunnel IP&lt;br /&gt;
|Example:  10.1.1.6&lt;br /&gt;
|The IP address of the local tunnel  interface.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Local  tunnel net mask&lt;br /&gt;
|Example:  255.255.255.0&lt;br /&gt;
|The subnet mask of the local tunnel  interface.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Remote IP&lt;br /&gt;
|Example:  192.168.10.0/24&lt;br /&gt;
|The remote network that is reachable  through the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Enable  Tunnel Link&lt;br /&gt;
|Check to enable&lt;br /&gt;
|Enable or disable the GRE tunnel link.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Interface  type&lt;br /&gt;
|Example:  EWAN2&lt;br /&gt;
|&#039;&#039;&#039;EWAN2&#039;&#039;&#039;: The  type of network interface used for the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|MTU&lt;br /&gt;
|Example:  1476&lt;br /&gt;
|&#039;&#039;&#039;1476&#039;&#039;&#039;: Maximum  Transmission Unit size for the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|TTL&lt;br /&gt;
|Example:  64&lt;br /&gt;
|&#039;&#039;&#039;64&#039;&#039;&#039;: Time To  Live value for the packets within the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Tunnel  key&lt;br /&gt;
|Example:  12345678&lt;br /&gt;
|&#039;&#039;&#039;12345678&#039;&#039;&#039;: A unique key used to identify the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Enable  keep alive&lt;br /&gt;
|Check to  enable&lt;br /&gt;
|Enable or disable the keep-alive  feature to monitor the tunnel&#039;s status.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|Keep  alive interval&lt;br /&gt;
|Example:  10&lt;br /&gt;
|&#039;&#039;&#039;10&#039;&#039;&#039;:  Interval in seconds for the keep-alive packets.&lt;br /&gt;
|}&lt;br /&gt;
Once the required update is done then click on update to save the changes. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPIP Tunnel:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
An IPIP (IP-in-IP) tunnel is a simple tunnelling protocol used to encapsulate IP packets within IP packets. This is like GRE but without additional features such as keying and type fields.&lt;br /&gt;
&lt;br /&gt;
Here the user can add/edit/delete the details of the tunnel.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A IPIP Tunnel.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A IPIP Tunnel Edit.png]]Once the required update is done then click on update to save the changes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Tunnel  name&lt;br /&gt;
|Example:  IPIPTunnel&lt;br /&gt;
|&#039;&#039;&#039;IPIPTunnel:&#039;&#039;&#039; The name of the IPIP tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Local external  IP&lt;br /&gt;
|Example:  10.1.1.66&lt;br /&gt;
|The IP address of the local endpoint  that will initiate the IPIP tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Remote  external IP&lt;br /&gt;
|Example:  10.1.1.40&lt;br /&gt;
|The IP address of the remote endpoint  that will terminate the IPIP tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Peer  tunnel IP&lt;br /&gt;
|Example:  10.1.1.4&lt;br /&gt;
|The IP address of the peer&#039;s tunnel  interface.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Local  tunnel IP&lt;br /&gt;
|Example:  10.1.1.6&lt;br /&gt;
|The IP address of the local tunnel  interface.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Local  tunnel net mask&lt;br /&gt;
|Example:  255.255.255.0&lt;br /&gt;
|The subnet mask of the local tunnel  interface.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Remote IP&lt;br /&gt;
|Example: 192.168.10.0/24&lt;br /&gt;
|The remote network that is reachable  through the IPIP tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Enable  Tunnel Link&lt;br /&gt;
|Check to  enable&lt;br /&gt;
|Enable or disable the IPIP tunnel link.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Interface  type&lt;br /&gt;
|Example:  EWAN2&lt;br /&gt;
|&#039;&#039;&#039;EWAN2&#039;&#039;&#039;: The  type of network interface used for the IPIP tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|MTU&lt;br /&gt;
|Example:  1476&lt;br /&gt;
|&#039;&#039;&#039;1476&#039;&#039;&#039;: Maximum  Transmission Unit size for the IPIP tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|TTL&lt;br /&gt;
|Example:  64&lt;br /&gt;
|&#039;&#039;&#039;64&#039;&#039;&#039;: Time To  Live value for the packets within the IPIP tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Tunnel  key&lt;br /&gt;
|Example:  12345678&lt;br /&gt;
|Although typically not used in IPIP,  this field might be included for compatibility with certain configurations.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Enable  keep alive&lt;br /&gt;
|Check to  enable&lt;br /&gt;
|Enable or disable the keep-alive  feature to monitor the tunnel&#039;s status.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|Keep  alive interval&lt;br /&gt;
|Example:  10&lt;br /&gt;
|&#039;&#039;&#039;10&#039;&#039;&#039;:  Interval in seconds for the keep-alive packets.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== 3.Maintenance ==&lt;br /&gt;
In this module the user can configure/upgrade/modify the settings related to system, password,&lt;br /&gt;
&lt;br /&gt;
firmware and monitoring.&lt;br /&gt;
&lt;br /&gt;
It includes 6 submodules.&lt;br /&gt;
&lt;br /&gt;
* General&lt;br /&gt;
* Password&lt;br /&gt;
* Reboot&lt;br /&gt;
* Import and Export config&lt;br /&gt;
* Firmware upgrade&lt;br /&gt;
* Monitor Application&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Maintenance.png]]&lt;br /&gt;
&lt;br /&gt;
=== 3.1 General ===&lt;br /&gt;
Here you can configure the basic aspects of router like its hostname or the timezone.&lt;br /&gt;
&lt;br /&gt;
It is further sub-divided into,&lt;br /&gt;
&lt;br /&gt;
1.) General Settings&lt;br /&gt;
&lt;br /&gt;
2.) Logging&lt;br /&gt;
&lt;br /&gt;
3.) Language and Style &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A General Settings.png|1024x1024px]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Local  Time&lt;br /&gt;
|2024/07/30  13:25:47&lt;br /&gt;
|The current local date and time set on  the device.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Timezone&lt;br /&gt;
|Asia/Kolkata&lt;br /&gt;
|The timezone setting of the device,  which determines the local time.&lt;br /&gt;
|}&lt;br /&gt;
Once the user configures the required details then click on the save button to save all the details.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Logging:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Here the user can configure the basic aspects of your device related to system.&lt;br /&gt;
&lt;br /&gt;
The system log configuration provided specifies how the device handles and stores log information, including buffer size, external log server details, and log verbosity levels.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Logging.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|System log buffer size&lt;br /&gt;
|Example: 32 kiB&lt;br /&gt;
|The size of the memory buffer allocated  (0-32) for storing system logs before they are either written to a file or  sent to an external server.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|External system log server&lt;br /&gt;
|Example: 0.0.0.0&lt;br /&gt;
|The IP address of an external server  where logs can be sent.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|External system log server port&lt;br /&gt;
|Example: 514&lt;br /&gt;
|The port used to send logs to the  external log server. Port 514 is the default port for syslog.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Log output level&lt;br /&gt;
|Example: Debug&lt;br /&gt;
|Sets the detail level of the system  logs.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Cron Log level&lt;br /&gt;
|Example: Debug&lt;br /&gt;
|The detail level of the logs for cron  jobs.&lt;br /&gt;
|}&lt;br /&gt;
Once the user configures the required details then click on the save button to save all the details.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Language and Style:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Here the user can configure the basic aspects of your device related to language.&lt;br /&gt;
&lt;br /&gt;
Once the user configures the required details then click on the save button to save all the details.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Language and Sytle.png]]&lt;br /&gt;
&lt;br /&gt;
=== 3.2 Password ===&lt;br /&gt;
In this module the user can set the password for the admin credentials.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note:&#039;&#039;&#039; Password must contain at least one uppercase letter, one digit, one special character, and be at least 8 characters long.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Password Setup.png]]&lt;br /&gt;
&lt;br /&gt;
=== 3.3 Reboot ===&lt;br /&gt;
In this module the user can reboot the device remotely.&lt;br /&gt;
&lt;br /&gt;
First option is to directly reboot the device without enabling the maintenance reboot tab.&lt;br /&gt;
&lt;br /&gt;
Click on “Reboot Now” at the bottom of the screen to start the reboot process.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Reboot.png]]&lt;br /&gt;
&lt;br /&gt;
To start maintenance reboot process first the user needs to fill all the required fields.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Maintenance Reboot Configuration.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable Maintenance  Reboot&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Indicates whether the maintenance  reboot feature is enabled or not.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Type&lt;br /&gt;
|Maintenance  Reboot&lt;br /&gt;
|Specifies the type of reboot being  scheduled.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Reboot  Type&lt;br /&gt;
|Hardware&lt;br /&gt;
|&#039;&#039;&#039;Hardware&#039;&#039;&#039;: A hardware reboot involves restarting the entire  device as if it were powered off and on again.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Minutes&lt;br /&gt;
|Example:  59&lt;br /&gt;
|The minute at which the reboot should  occur (0-59).&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Hours&lt;br /&gt;
|Example:  22 (10 PM)&lt;br /&gt;
|The hour at which the reboot should  occur (0-23, in 24-hour format).&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Day Of  Month&lt;br /&gt;
|Example:  All&lt;br /&gt;
|Specifies which days of the month the  reboot should occur (1-31). &amp;quot;All&amp;quot; means it will occur every day.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Month&lt;br /&gt;
|Example:  All&lt;br /&gt;
|Specifies which months the reboot  should occur (1-12). &amp;quot;All&amp;quot; means it will occur every month.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Day Of  Week&lt;br /&gt;
|Example:  All&lt;br /&gt;
|Specifies which days of the week the  reboot should occur (0-6, where 0 is Sunday). &amp;quot;All&amp;quot; means it will  occur every day of the week.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once the user fills all the required given parameters click on the save.&lt;br /&gt;
&lt;br /&gt;
=== 3.4 Import and Export ===&lt;br /&gt;
In this section, User can Import &amp;amp; Export Configuration files of the Device.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Import and Export Configuration.png]]&lt;br /&gt;
&lt;br /&gt;
Click “Export Config” to export device configuration &amp;amp; settings to a text file,&lt;br /&gt;
&lt;br /&gt;
Click “Import Config” to import device configuration &amp;amp; settings from a previously exported text file.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Import Config.png]]&lt;br /&gt;
&lt;br /&gt;
The user needs to select on the “choose file”, upload the required file and click on apply.&lt;br /&gt;
&lt;br /&gt;
=== 3.5 Firmware Upgrade ===&lt;br /&gt;
The user can upgrade with the latest software for the existing firmware.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Firmware Upgarde.png]]&lt;br /&gt;
&lt;br /&gt;
Click on the &#039;&#039;&#039;flash image&#039;&#039;&#039; and chose the path where the sys-upgrade file is kept and then click on flash image, it will upgrade to the latest software once the reboot is done.&lt;br /&gt;
&lt;br /&gt;
This option will completely reset the device to default settings.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Flash Image.png]]Click on the &#039;&#039;&#039;Retain Config and flash&#039;&#039;&#039; and chose the path where the sys-upgrade file is kept and then click on Retain Config and flash, it will upgrade to the latest software once the reboot is done.&lt;br /&gt;
&lt;br /&gt;
This refers to updating the firmware (flashing) of a device while preserving the current configuration settings.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Retain Config and Flash.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Click on the &#039;&#039;&#039;Factory Reset&#039;&#039;&#039; for the complete retest of the device.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Factory Reset.png|1563x1563px]]&lt;br /&gt;
&lt;br /&gt;
=== 3.6 Monitor Application ===&lt;br /&gt;
In this section, the monitor application is divided into major 2 configurations which is further sub-divided into 4 editable options,&lt;br /&gt;
&lt;br /&gt;
1.) Modem Monitor Application Configuration:&lt;br /&gt;
&lt;br /&gt;
2.) Router Monitor Application Configuration:&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Monitor Application.png]]&#039;&#039;&#039;Modem Monitor Application Configuration:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Modem Monitor Application.png]]Specification details are given below: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable Ping Check Application&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Turns on the functionality to perform ping  checks on specified IP addresses.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Time Interval for Check (In minutes)&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 10 minutes&lt;br /&gt;
|Frequency at which the ping checks are  performed.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Select No of IP addresses to ping&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 1&lt;br /&gt;
|Number of IP addresses that will be pinged.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|IP Address 1&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 8.8.8.8&lt;br /&gt;
|The IP address to ping.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|No. of Retries&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 5&lt;br /&gt;
|Number of times to retry pinging an IP address  if the initial ping fails.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Failure Criteria in (%)&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 80% (If 4 out of 5 pings fail, it’s considered  a failure)&lt;br /&gt;
|Percentage of failed pings required to consider  the ping check a failure.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Action On Failure&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; Restart Modem&lt;br /&gt;
|Action to be taken if the ping check fails  according to the criteria.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Enable Second Level Action&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Option to enable a secondary action if the  primary action fails multiple times.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Second Level Action Threshold&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 2&lt;br /&gt;
|Number of failures required to trigger the  secondary action.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Second Level Action&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; Restart Board (Reboots  the entire hardware board)&lt;br /&gt;
|The action to be taken if the second level  action threshold is met.&lt;br /&gt;
|}&lt;br /&gt;
Save the details once made necessary changes. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Router Monitor Application Configuration:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Router Monitor Application Configuration.png]]Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable Ping Check Application&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Activates the  ping check functionality to monitor router performance.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Time Interval for Check (In minutes)&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 10 minutes&lt;br /&gt;
|How  frequently the ping checks are performed.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Select No of IP Addresses to Ping&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 1 (Please select the appropriate number  based on your requirements)&lt;br /&gt;
|Choose the  number of IP addresses to ping. This typically involves selecting from a list  or entering multiple addresses.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|No. of Retries&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 3&lt;br /&gt;
|Number of  retries if a ping fails.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Failure Criteria in (%)&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 80% (If 80% of the pings fail, it’s  deemed a failure)&lt;br /&gt;
|Percentage of  failed pings required to consider the ping check as failed.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Action On Failure&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; Restart IPsec&lt;br /&gt;
|The action  taken if the ping check fails according to the criteria.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Enable Second Level Action&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Option to  enable an additional action if the primary action fails.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Second Level Action Threshold&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; Specify the number of failures, such as 2&lt;br /&gt;
|Number of  times the primary action must fail before the secondary action is triggered.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Second Level Action&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; Restart Board&lt;br /&gt;
|The action to  be taken if the second level action threshold is met.&lt;br /&gt;
|}&lt;br /&gt;
Save the details once made necessary changes.&lt;br /&gt;
&lt;br /&gt;
== 4. Features ==&lt;br /&gt;
In this module the user can see all the features that the router device has.&lt;br /&gt;
&lt;br /&gt;
This module includes 10 features.&lt;br /&gt;
&lt;br /&gt;
* Mac Address Binding&lt;br /&gt;
* URL Filtering&lt;br /&gt;
* Web Server&lt;br /&gt;
* Wi-Fi MacID Filtering&lt;br /&gt;
* Routing&lt;br /&gt;
* DMZ&lt;br /&gt;
* Others&lt;br /&gt;
* SNMP Agent Configuration&lt;br /&gt;
* Connection Diagnostics&lt;br /&gt;
* Package Manager&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Features.png]]&lt;br /&gt;
&lt;br /&gt;
=== 4.1 Mac Address Binding ===&lt;br /&gt;
MAC address binding is a configuration that binds a specific MAC address to a specific IP address.&lt;br /&gt;
&lt;br /&gt;
This ensures that a particular device on the network always receives the same IP address from the DHCP&lt;br /&gt;
&lt;br /&gt;
server, which can be useful for network management, security, and ensuring consistent network&lt;br /&gt;
&lt;br /&gt;
behaviour.&lt;br /&gt;
&lt;br /&gt;
Under this submodule the user can configure/update/edit the IP Address for MAC.&lt;br /&gt;
&lt;br /&gt;
You can edit the pre-existing configuration, or you can ‘Add’ in the ‘New MAC ADDRESS’ field. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A MAC Address Binding.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A MAC Address Binding Editing.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Device Name&lt;br /&gt;
|mac1&lt;br /&gt;
|A user-defined name for the binding  configuration.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|MAC Address&lt;br /&gt;
|48:9e:bd:da:45:91&lt;br /&gt;
|The unique identifier for the network interface  of the device to which the IP address will be bound.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|IP Address&lt;br /&gt;
|192.168.10.55&lt;br /&gt;
|The IP address that will be consistently  assigned to the device with the specified MAC address.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
By applying this configuration, the DHCP server will always assign the IP address 192.168.10.55 to the device with the MAC address 48:9e:bd:da:45:91, ensuring consistency and stability in network addressing for that device.&lt;br /&gt;
&lt;br /&gt;
* Once the user modifies the MAC address /IP Address then click on the save button to save the changes done.&lt;br /&gt;
* The user can click on the deleted button to delete an existing configured device.&lt;br /&gt;
&lt;br /&gt;
Post all the changes the user needs to click on the update to reflect all the changes in the application.&lt;br /&gt;
&lt;br /&gt;
=== 4.2 URL Filtering ===&lt;br /&gt;
In this submodule the user should provide the URL which needs to be blocked for the device.&lt;br /&gt;
&lt;br /&gt;
By implementing URL filtering with the specified URL, you can control and restrict access to certain&lt;br /&gt;
&lt;br /&gt;
websites, thereby improving network security and managing user access.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A URL FIltring.png]]&lt;br /&gt;
&lt;br /&gt;
To add the new URL for blocking, click on the Add New button.&lt;br /&gt;
&lt;br /&gt;
Once the user clicks on the Add New button a new pop will appear in that page write the URL and click on the save.&lt;br /&gt;
&lt;br /&gt;
The user can select the status of that URL while defining the URL.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A URL FIltring Edit.png]]&lt;br /&gt;
&lt;br /&gt;
To edit / delete the existing URL the user needs to click on the edit /deleted button respectively.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Url Filter Disable.png]]&lt;br /&gt;
&lt;br /&gt;
Click on “save” after the changes are done as per the need.&lt;br /&gt;
&lt;br /&gt;
=== 4.3 Web Server ===&lt;br /&gt;
This configuration will allow your device to serve web traffic securely over HTTPS, keep its system time synchronized, and ensure that all HTTP traffic is redirected to HTTPS for better security.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Webserver Configuration.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Webserver Edit.png]]Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable HTTP&lt;br /&gt;
|&#039;&#039;&#039;HTTP Port:&#039;&#039;&#039; 80&lt;br /&gt;
&lt;br /&gt;
Enable or disable the HTTP server.&lt;br /&gt;
|Port 80 is the default port for HTTP traffic.  It is used to serve web pages over an unencrypted connection.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Enable HTTPS&lt;br /&gt;
|&#039;&#039;&#039;HTTPS Port:&#039;&#039;&#039; 443&lt;br /&gt;
&lt;br /&gt;
Enable or disable the HTTPS server.&lt;br /&gt;
|Port 443 is the default port for HTTPS traffic.  It is used to serve web pages over an encrypted connection.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Redirect HTTPS&lt;br /&gt;
|Option to redirect HTTP traffic to  HTTPS.&lt;br /&gt;
|When enabled, all HTTP requests will be  automatically redirected to the HTTPS port to ensure secure communication.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Session Timeout (In Minutes)&lt;br /&gt;
|Ex: 5 mins&lt;br /&gt;
|This setting controls how long a user session  remains active without interaction before the server automatically logs the  user out.&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5&lt;br /&gt;
|RFC1918 Filter&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|When enabled, this filter can block traffic from private IP  ranges (e.g., 192.168.x.x, 10.x.x.x) from being routed through the public  internet, enhancing network security.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Enable NTP Sync&lt;br /&gt;
|Enable or disable NTP synchronization.&lt;br /&gt;
|Synchronizes the device’s system clock with an  external NTP server to maintain accurate time.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|NTP Server&lt;br /&gt;
|0.openwrt.pool.ntp.org&lt;br /&gt;
|The address of the NTP server used for time  synchronization. The openwrt.pool.ntp.org server is a public NTP server pool.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|NTP Sync Interval (In Minutes)&lt;br /&gt;
|15&lt;br /&gt;
|The interval at which the device will sync its  clock with the NTP server, set to every 15 minutes in this case.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once changes are made.&lt;br /&gt;
&lt;br /&gt;
=== 4.4 Wi-Fi MacID Filtering ===&lt;br /&gt;
Wireless MAC ID Filtering allows you to control which devices can connect to your wireless network based on their MAC (Media Access Control) addresses. This can help enhance security by allowing only specified devices to access the network.&lt;br /&gt;
&lt;br /&gt;
It is further divided into 2 categories,&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WIFI 2.4G AP&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WIFI 2.4G AP Guest&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Wifi Mac ID Filtering.png]]&lt;br /&gt;
&lt;br /&gt;
Before adding the MacIDs the user needs to select the mode from the dropdown menu.&lt;br /&gt;
&lt;br /&gt;
In ‘Change Mode’ select one option,&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Blacklist&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In blacklist mode, you specify which MAC addresses are not allowed to connect to the wireless network. Devices not on the blacklist will be able to connect.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Whitelist&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In whitelist mode, you specify which MAC addresses are allowed to connect to the wireless network. Devices not on the whitelist will be blocked.&lt;br /&gt;
&lt;br /&gt;
To Add the MacID the user needs to click on Add New option.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Whitelist.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Status&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Enable or disable the MAC ID filtering.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|MAC ID&lt;br /&gt;
|Example: e8:6f:38:1a:f2:61&lt;br /&gt;
|The MAC address of the device to be whitelisted  or blocklisted.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Network Name&lt;br /&gt;
|Example: WIFI 2.4G AP or Wi-Fi 2.4G AP  Guest.&lt;br /&gt;
|The network to apply the MAC ID filtering.&lt;br /&gt;
|}&lt;br /&gt;
Once the required MAC ID and Network Name is configured the user needs to click on the save button to add the details.&lt;br /&gt;
&lt;br /&gt;
The user needs to click on the edit button to do modifications on the pre-existing configuration.&lt;br /&gt;
&lt;br /&gt;
Once the required MACID / Network Name is modified the user needs to click on the save button to reflect the changed value in the application.&lt;br /&gt;
&lt;br /&gt;
=== 4.5 Routing ===&lt;br /&gt;
In this submodule the user can configure the parameters related to routing of the device like Target address, Networks address etc. Routing configurations allow network packets to be directed between different subnets and networks.&lt;br /&gt;
&lt;br /&gt;
It is further divided into 2 sections,&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Static IPV4 Routes&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Advanced Static IPV4 Routes&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Static IPV4 Routes:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Click on ‘Add’ to add a new interface.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Routing.png]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To edit the existing device the user needs to click on the edit option.&lt;br /&gt;
&lt;br /&gt;
Once the changes are done click on the save button to save all the changes.&lt;br /&gt;
&lt;br /&gt;
Click on the deleted button to delete the existing device detail.&lt;br /&gt;
[[File:IAC44A Routing Edit.png|left]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Interface&lt;br /&gt;
|Ex: eth0.1&lt;br /&gt;
|The network interface to be used for this route.  Select the one to use from dropdown.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Target&lt;br /&gt;
|Ex: 192.168.20.0&lt;br /&gt;
|The destination subnet to which traffic should  be routed.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|IPv4 Netmask&lt;br /&gt;
|255.255.255.0&lt;br /&gt;
|The subnet mask for the target network.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Metric&lt;br /&gt;
|0&lt;br /&gt;
|The priority of the route.&lt;br /&gt;
&lt;br /&gt;
Lower values indicate higher priority.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|IPv4 Gateway&lt;br /&gt;
|Ex: 192.168.10.1&lt;br /&gt;
|The gateway IP address to be used for routing  traffic to the target subnet.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Route Type&lt;br /&gt;
|Unicast&lt;br /&gt;
|Standard route for individual destination IP  addresses.&lt;br /&gt;
&lt;br /&gt;
Custom changes can be made.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once configuration changes have been made. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Advanced Static IPV4 Routes:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This is further divided into 2 sections,&lt;br /&gt;
&lt;br /&gt;
Routing Tables&lt;br /&gt;
&lt;br /&gt;
Routing Rules for IPV4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Routing Tables:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Adding a new table in static routing allows you to define specific routes for traffic within a network.&lt;br /&gt;
&lt;br /&gt;
Click on ‘Add’ to add a new Table. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Advanced Static IPV4 Routes.png]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Routing Table Edit.png]]&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|ID of Table&lt;br /&gt;
|Ex: 1&lt;br /&gt;
|A unique identifier for the routing table.  Multiple tables can be used to define different sets of routing rules,  providing flexibility in how traffic is managed.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Name of Table&lt;br /&gt;
|Ex: Route&lt;br /&gt;
|A descriptive name for the routing table,  making it easier to manage and identify different tables.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Target&lt;br /&gt;
|Ex: 192.168.10.0&lt;br /&gt;
|Specifies the destination network or IP address  that the route is intended for.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|IPv4 Netmask&lt;br /&gt;
|255.255.255.0&lt;br /&gt;
|Defines the subnet mask for the target network.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Metric&lt;br /&gt;
|Ex: 0&lt;br /&gt;
|Indicates the priority of the route. A lower  metric value means a higher priority. Routes with lower metrics are preferred  over those with higher metrics.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|IPv4 Gateway&lt;br /&gt;
|Ex: 10.1.1.1&lt;br /&gt;
|Specifies the next hop or gateway IP address  through which the traffic to the target network should be routed.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Route Type&lt;br /&gt;
|1.) Unicast&lt;br /&gt;
&lt;br /&gt;
2.) Custom&lt;br /&gt;
|&#039;&#039;&#039;Unicast&#039;&#039;&#039;:  Standard route where packets are sent to a single destination IP address.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Custom&#039;&#039;&#039;: Enables  advanced routing configurations or specific protocols that might not be  covered by default.&lt;br /&gt;
|}&lt;br /&gt;
Once all the configurations are done click on the update button to reflect the changes made.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Routing Rules for IPV4:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Click on ‘Add’ to add a new interface.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Routing For IPV4.png]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To edit the existing device the user needs to click on the edit option.&lt;br /&gt;
&lt;br /&gt;
Once the changes are done click on the save button to save all the changes.&lt;br /&gt;
&lt;br /&gt;
Click on the deleted button to delete the existing device detail.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Routing For IPV4 Edit.png]]&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Interface&lt;br /&gt;
|Ex: ra0&lt;br /&gt;
|Select the specific network interface on the  router through which traffic enters or exits.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|To&lt;br /&gt;
|Ex: 192.168.10.1&lt;br /&gt;
|The destination IP address or network. In this  case, 192.168.10.1 is the target IP address for routing traffic.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|IPv4 Netmask&lt;br /&gt;
|Ex: 255.255.255.192&lt;br /&gt;
|Defines the subnet mask, which helps determine  the size of the network.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Table ID&lt;br /&gt;
|Ex: 1&lt;br /&gt;
|Identifies which routing table this rule  applies to.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|From&lt;br /&gt;
|Ex: 192.168.100.1&lt;br /&gt;
|Specifies the source IP address or network from  which the traffic originates. In this case, the traffic is coming from  192.168.100.1.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Priority&lt;br /&gt;
|Ex:20&lt;br /&gt;
|Determines the order in which routing rules are  evaluated. Lower numbers have higher priority. If two rules conflict, the one  with the lower priority number will be applied first.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Outgoing Interface&lt;br /&gt;
|1.) fwmark&lt;br /&gt;
&lt;br /&gt;
2.) iif (Incoming Interface)&lt;br /&gt;
&lt;br /&gt;
3.) oif (Outgoing Interface)&lt;br /&gt;
&lt;br /&gt;
4.) lookup&lt;br /&gt;
&lt;br /&gt;
5.) blackhole&lt;br /&gt;
&lt;br /&gt;
6.) prohibited&lt;br /&gt;
&lt;br /&gt;
7.) unreachable&lt;br /&gt;
|1.) This  allows you to create rules that apply only to traffic that has been marked in  a specific way by the firewall.&lt;br /&gt;
&lt;br /&gt;
2.) This is  often used to create rules based on the interface through which traffic is received.&lt;br /&gt;
&lt;br /&gt;
3.) This  allows you to control the flow of traffic based on the desired outgoing  interface.&lt;br /&gt;
&lt;br /&gt;
4.) It tells the router to check the specific  routing table ID mentioned to determine how to route the traffic.&lt;br /&gt;
&lt;br /&gt;
5.) This is  used when you want to block traffic without notifying the sender.&lt;br /&gt;
&lt;br /&gt;
6.) Like  blackhole but sends an ICMP unreachable message to the sender, indicating  that the route is prohibited.&lt;br /&gt;
&lt;br /&gt;
7.) Causes  the router to send an ICMP unreachable message to the source IP, notifying  that the destination is unreachable.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== 4.6 DMZ ===&lt;br /&gt;
A &#039;&#039;&#039;DMZ (Demilitarized Zone)&#039;&#039;&#039; is a subnetwork that provides an extra layer of security for an organization&#039;s internal network.&lt;br /&gt;
&lt;br /&gt;
In this case we are configuring several services (HTTP, HTTPS, SSH, FTP, DNS) in a DMZ, and each service requires the correct &#039;&#039;&#039;internal port&#039;&#039;&#039; (the port used within the network) and &#039;&#039;&#039;external port&#039;&#039;&#039; (the port used by external clients to access the service) setting&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A DMZ.png]]&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable DMZ&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Enable DMZ to configure it further.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Host IP Address&lt;br /&gt;
|Ex: 192.168.10.1&lt;br /&gt;
|This is the internal IP address of the device  or server that will be in the DMZ.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Protocol&lt;br /&gt;
|1.) TCP&lt;br /&gt;
&lt;br /&gt;
2.) UDP&lt;br /&gt;
&lt;br /&gt;
3.) ICMP&lt;br /&gt;
&lt;br /&gt;
4.) All&lt;br /&gt;
|&#039;&#039;&#039;TCP&#039;&#039;&#039;: Used  for reliable services like HTTP, HTTPS, FTP, and SSH.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;UDP&#039;&#039;&#039;: Often  used for services like DNS that don&#039;t require as much reliability.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ICMP&#039;&#039;&#039;: Used  for sending control messages like &amp;quot;ping.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;All&#039;&#039;&#039;: Select  this if you&#039;re unsure which protocol to allow, but it&#039;s less secure.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Allow HTTP&lt;br /&gt;
|Internal Port: 80&lt;br /&gt;
&lt;br /&gt;
External Port: 80&lt;br /&gt;
|Enables web traffic over the unsecured &#039;&#039;&#039;HTTP&#039;&#039;&#039;  protocol.&lt;br /&gt;
&lt;br /&gt;
(Port 80 is the standard port for HTTP traffic  on our internal network).&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Allow HTTPS&lt;br /&gt;
|Internal Port: 443&lt;br /&gt;
&lt;br /&gt;
External Port: 443&lt;br /&gt;
|Enables secure web traffic over &#039;&#039;&#039;HTTPS.&#039;&#039;&#039; (Port  443 is the standard port for HTTPS on our internal network).&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Allow SSH&lt;br /&gt;
|Internal Port: 52434&lt;br /&gt;
&lt;br /&gt;
External Port: 52434&lt;br /&gt;
|This is a custom port we’re using for SSH.&lt;br /&gt;
&lt;br /&gt;
The default is 22.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Allow FTP&lt;br /&gt;
|Internal Port: 21/20&lt;br /&gt;
&lt;br /&gt;
External Port: 21/20&lt;br /&gt;
|FTP is used to transfer files between  computers.&lt;br /&gt;
&lt;br /&gt;
(These are the standard ports for FTP traffic.  Port 21 is used for control commands, and port 20 for the data transfer.)&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Allow DNS&lt;br /&gt;
|Internal Port: 53&lt;br /&gt;
&lt;br /&gt;
External Port: 53&lt;br /&gt;
|Standard DNS port within our internal network.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== 4.7 Others ===&lt;br /&gt;
In this page the user will get to do all the other miscellaneous configuration with respect to the device based on the required parameters. Each utility serves a specific purpose, providing various functionalities for managing and troubleshooting network configurations and statuses.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Others.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Set Date&lt;br /&gt;
|Date and time fields (day, month, year,  hour, minute, second)&lt;br /&gt;
|Sets the system date and time to the specified  values.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Get Date&lt;br /&gt;
|System&lt;br /&gt;
|Retrieves and displays the current system date  and time.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|ipsec status all&lt;br /&gt;
|Command ‘Get’&lt;br /&gt;
|Displays the status of all IPsec connections.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Wi-Fi Scan&lt;br /&gt;
|Command ‘Get’&lt;br /&gt;
|Initiates a scan for available Wi-Fi networks.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|iPerf3 Client&lt;br /&gt;
|IP address (e.g., 192.168.10.100)&lt;br /&gt;
|Runs an iPerf3 client to measure network  performance.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|iPerf3 Server&lt;br /&gt;
|Command ‘Run’&lt;br /&gt;
|Runs an iPerf3 server to measure network  performance.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Ping&lt;br /&gt;
|IP address or domain (e.g., 8.8.8.8)&lt;br /&gt;
|Sends ICMP echo requests to the specified  address to check connectivity.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|traceroute&lt;br /&gt;
|IP address or domain (e.g., 8.8.8.8)&lt;br /&gt;
|Traces the route packets take to reach the  specified address.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|NTP Sync&lt;br /&gt;
|Command ‘Sync’&lt;br /&gt;
|Synchronizes the system time with the  configured NTP server.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Download Files&lt;br /&gt;
|File or database identifier&lt;br /&gt;
|Initiates a download of the specified file or database.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Restart Power&lt;br /&gt;
|Command ‘Restart’&lt;br /&gt;
|Restarts the power of the device.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Restart Modem&lt;br /&gt;
|Command ‘Restart’&lt;br /&gt;
|Restarts the modem.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Run AT Command&lt;br /&gt;
|Enter AT command&lt;br /&gt;
|Executes the specified AT command on the modem.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|Show Board Configuration&lt;br /&gt;
|Command ‘Show’&lt;br /&gt;
|Displays the current board configuration.&lt;br /&gt;
|-&lt;br /&gt;
|15&lt;br /&gt;
|Show VPN Certificate Name&lt;br /&gt;
|Command ‘Show’&lt;br /&gt;
|Displays the name of the VPN certificate in  use.&lt;br /&gt;
|-&lt;br /&gt;
|16&lt;br /&gt;
|Switch SIM to Secondary (Takes &amp;gt;2  mins)&lt;br /&gt;
|Command ‘Run’&lt;br /&gt;
|Switches the active SIM to the secondary SIM  card.&lt;br /&gt;
|-&lt;br /&gt;
|17&lt;br /&gt;
|Send test SMS&lt;br /&gt;
|Phone number (e.g., +911234567890)  message text (e.g., &amp;quot;Hello how are you?&amp;quot;)&lt;br /&gt;
|Sends a test SMS to the specified phone number.&lt;br /&gt;
|-&lt;br /&gt;
|18&lt;br /&gt;
|ReadlatestSMS&lt;br /&gt;
|Command ‘Read’&lt;br /&gt;
|Reads the most recent SMS received by the  device.&lt;br /&gt;
|-&lt;br /&gt;
|19&lt;br /&gt;
|Data Usage&lt;br /&gt;
|&#039;&#039;&#039;From:&#039;&#039;&#039; Start  date (YYYY-MM-DD)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;To:&#039;&#039;&#039; End date  (YYYY-MM-DD)&lt;br /&gt;
|Displays data usage statistics for the  specified date range.&lt;br /&gt;
|-&lt;br /&gt;
|20&lt;br /&gt;
|Monthly Data Usage&lt;br /&gt;
|&#039;&#039;&#039;Month:&#039;&#039;&#039; Month (e.g., 07)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Year:&#039;&#039;&#039; Year  (e.g., 2024)&lt;br /&gt;
|Displays data usage statistics for the  specified month and year.&lt;br /&gt;
|-&lt;br /&gt;
|21&lt;br /&gt;
|Modem Debug Info&lt;br /&gt;
|Command ‘Read’&lt;br /&gt;
|Displays debug information for the modem.&lt;br /&gt;
|-&lt;br /&gt;
|22&lt;br /&gt;
|Scan Network operators (Takes &amp;gt;3  mins)&lt;br /&gt;
|Command ‘Scan’&lt;br /&gt;
|Initiates a scan for available network  operators.&lt;br /&gt;
|-&lt;br /&gt;
|23&lt;br /&gt;
|Network operator list (First Perform  Scan Network Operators)&lt;br /&gt;
|Command ‘Show’&lt;br /&gt;
|Displays the list of network operators detected  in the previous scan.&lt;br /&gt;
|-&lt;br /&gt;
|24&lt;br /&gt;
|ReadLogFiles&lt;br /&gt;
|Log file identifier&lt;br /&gt;
|Reads and displays the specified log file&lt;br /&gt;
|-&lt;br /&gt;
|25&lt;br /&gt;
|Enable ssh (Admin)&lt;br /&gt;
|Command ‘Run’&lt;br /&gt;
|Enables SSH access for the admin user.&lt;br /&gt;
|-&lt;br /&gt;
|26&lt;br /&gt;
|Disable ssh (Admin)&lt;br /&gt;
|Command ‘Run’&lt;br /&gt;
|Disables SSH access for the admin user.&lt;br /&gt;
|-&lt;br /&gt;
|27&lt;br /&gt;
|ClearSIM1Data&lt;br /&gt;
|Command ‘Clear’&lt;br /&gt;
|Clears data usage statistics for SIM1.&lt;br /&gt;
|-&lt;br /&gt;
|28&lt;br /&gt;
|ClearSIM2Data&lt;br /&gt;
|Command ‘Clear’&lt;br /&gt;
|Clears data usage statistics for SIM2.&lt;br /&gt;
|-&lt;br /&gt;
|29&lt;br /&gt;
|Create Bridge with SW_LAN&lt;br /&gt;
|Network interface identifier&lt;br /&gt;
|Creates a network bridge with the specified  interface and SW_LAN.&lt;br /&gt;
|-&lt;br /&gt;
|30&lt;br /&gt;
|Show Bridge&lt;br /&gt;
|Command ‘Show’&lt;br /&gt;
|Displays information about the current network  bridges.&lt;br /&gt;
|-&lt;br /&gt;
|31&lt;br /&gt;
|Delete Bridge&lt;br /&gt;
|Command ‘Delete’&lt;br /&gt;
|Deletes the specified network bridge.&lt;br /&gt;
|-&lt;br /&gt;
|32&lt;br /&gt;
|Output&lt;br /&gt;
|Any value&lt;br /&gt;
|Displays output for all the above actions.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== 4.8 SNMP Agent Configuration ===&lt;br /&gt;
The &#039;&#039;&#039;SNMP (Simple Network Management Protocol) Agent Configuration&#039;&#039;&#039; is essential for monitoring and managing network devices, such as routers, from a central management system.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A SNMP Agent Configuration.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable SNMP  Service&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Enable this  if you want the device to be accessible for SNMP-based monitoring and management.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|IP Family&lt;br /&gt;
|IPV4&lt;br /&gt;
|Specifies that  SNMP service will operate over IPv4.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Port&lt;br /&gt;
|161&lt;br /&gt;
|&#039;&#039;&#039;161&#039;&#039;&#039; is  the default and should be used unless there is a specific need to use a  different port.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|System OID&lt;br /&gt;
|1.3.6.1.4.1.38151&lt;br /&gt;
|This unique  identifier represents the device in the SNMP management system.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Name&lt;br /&gt;
|Invendis  Router&lt;br /&gt;
|The name used  to identify the device in the SNMP management system.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Contact&lt;br /&gt;
|Invendis@invendis.co&lt;br /&gt;
|The email  address of the person responsible for the device, used for administrative  contact.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Location&lt;br /&gt;
|Bangalore&lt;br /&gt;
|The physical  location of the device.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|SNMP Version&lt;br /&gt;
|Version-1,&lt;br /&gt;
&lt;br /&gt;
Version-2,&lt;br /&gt;
&lt;br /&gt;
Version-3&lt;br /&gt;
|&#039;&#039;&#039;Version-1&#039;&#039;&#039;:  Basic and outdated, offering no security.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Version-2&#039;&#039;&#039;:  An improvement over Version-1 with better performance and some security  features.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Version-3&#039;&#039;&#039;:  The most secure, offering authentication and encryption (AuthPriv).&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Security       (for SNMP Version-3)&lt;br /&gt;
|NoAuthNoPriv&lt;br /&gt;
&lt;br /&gt;
AuthNoPriv&lt;br /&gt;
&lt;br /&gt;
AuthPriv&lt;br /&gt;
|&#039;&#039;&#039;No  Authentication, No Privacy&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Authentication,  No Privacy&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Authentication  and Privacy&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Username&lt;br /&gt;
|Ex: admin&lt;br /&gt;
|The username  used for SNMP authentication.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Authentication  Password &lt;br /&gt;
|*******&lt;br /&gt;
|This password  is used to authenticate the SNMP user.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Privacy  Password&lt;br /&gt;
|*******&lt;br /&gt;
|This password  is used to encrypt SNMP messages.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Download MIB  File&lt;br /&gt;
|Download&lt;br /&gt;
|Click this to  download the MIB file associated with the device’s SNMP configuration.&lt;br /&gt;
|}&lt;br /&gt;
Click on save tab to save changes.&lt;br /&gt;
&lt;br /&gt;
=== 4.9 Connection Diagnostics ===&lt;br /&gt;
This can ensure that your connection diagnostics application effectively monitors and reports the status of your network connections, providing valuable data for troubleshooting and performance optimization.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Connection Diagnostics.png]]This Application works in 3 parts,&lt;br /&gt;
&lt;br /&gt;
1.) General settings&lt;br /&gt;
&lt;br /&gt;
2.) Connection status and management&lt;br /&gt;
&lt;br /&gt;
3.) Application Start/Stop&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Application Manager Dashboard.png]]&lt;br /&gt;
&#039;&#039;&#039;General settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
First make configuration changes in this section and save.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Application Manager Dashboard General Settings.png]]&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable Connection Diagnostics&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|This option  enables or disables the connection diagnostics functionality.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Check Interval (in seconds)&lt;br /&gt;
|&#039;&#039;&#039;Value:&#039;&#039;&#039; 120&lt;br /&gt;
|Specifies how  often (in seconds) the diagnostics checks are performed. In this case, every  120 seconds. (min 60 secs)&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Number of Pings&lt;br /&gt;
|&#039;&#039;&#039;Value:&#039;&#039;&#039; 5&lt;br /&gt;
|Determines ping  requests sent during each check.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Ping Packet Size (in Bytes)&lt;br /&gt;
|&#039;&#039;&#039;Value:&#039;&#039;&#039; 56&lt;br /&gt;
|Defines the  size of each ping packet in bytes.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Send to remote MQTT Broker&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|This option  enables the sending of diagnostic data to a remote MQTT broker.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Publish Data Format&lt;br /&gt;
|&#039;&#039;&#039;CSV&#039;&#039;&#039; / &#039;&#039;&#039;JSON&#039;&#039;&#039;&lt;br /&gt;
|Specifies the  format in which the diagnostic data will be published to the MQTT broker. You  can choose either CSV (Comma-Separated Values) or JSON (JavaScript Object  Notation).&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|MQTT Broker url&lt;br /&gt;
|&#039;&#039;&#039;Value:&#039;&#039;&#039; broker.hivemq.com&lt;br /&gt;
|The URL of  the MQTT broker where the diagnostic data will be sent.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|TCP port&lt;br /&gt;
|&#039;&#039;&#039;Value:&#039;&#039;&#039; 1883&lt;br /&gt;
|The TCP port  used to connect to the MQTT broker. Port 1883 is the default port for MQTT.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Topic&lt;br /&gt;
|&#039;&#039;&#039;Value:&#039;&#039;&#039; 37A26230014/connectionDiagnostics&lt;br /&gt;
|The MQTT  topic under which the diagnostic data will be published. This topic is used  to categorize and identify the data.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Connection status and management:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To setup a connection,&lt;br /&gt;
&lt;br /&gt;
Click on ‘Add new target’&lt;br /&gt;
&lt;br /&gt;
Enter Target IP (Ex: 8.8.8.8)&lt;br /&gt;
&lt;br /&gt;
Click ‘Add’&lt;br /&gt;
&lt;br /&gt;
Target has been added successfully. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Connection Status and Management.png]] &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Application Start/Stop:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To check whether the target Ip is sending and receiving packets, you need to start the application to see the desired output.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Application Start and Stop.png]]&lt;br /&gt;
&lt;br /&gt;
As shown above, our target Ip is sending packets successfully.&lt;br /&gt;
&lt;br /&gt;
You can Add as many target IP’s you need to monitor.&lt;br /&gt;
&lt;br /&gt;
You can leave the application on for monitoring else ‘Stop’ the application.&lt;br /&gt;
&lt;br /&gt;
=== 4.10 Package Manager ===&lt;br /&gt;
A &#039;&#039;&#039;Package Manager&#039;&#039;&#039; is a tool or interface used to &#039;&#039;&#039;manage software packages&#039;&#039;&#039; (applications, libraries, tools) on a system.&lt;br /&gt;
&lt;br /&gt;
The package manager interface you are looking at likely allows you to manage the software installed on your device, such as networking tools, firmware, or other applications relevant to your system.&lt;br /&gt;
&lt;br /&gt;
This section has 3 sub-sections,&lt;br /&gt;
&lt;br /&gt;
Installed APP&lt;br /&gt;
&lt;br /&gt;
Available APP&lt;br /&gt;
&lt;br /&gt;
Manual Upgrade&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A PacKage Manager.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Installed APP:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
When you select Installed APP, you will see all the software that is actively running or installed on the device.&lt;br /&gt;
&lt;br /&gt;
This could include system utilities, network management tools, monitoring software, or any third-party apps that were previously installed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Common Actions&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;View Details&#039;&#039;&#039;: You can check each application&#039;s version, source, and     installation date.&lt;br /&gt;
* &#039;&#039;&#039;Uninstall&#039;&#039;&#039;: You can remove applications that are no longer needed.&lt;br /&gt;
* &#039;&#039;&#039;Check for Updates&#039;&#039;&#039;: You can see if there are updates available for any     installed application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Available APP&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
When you select &#039;&#039;&#039;Available APP&#039;&#039;&#039;, you will see a list of software that can be installed from the system&#039;s repositories or sources.&lt;br /&gt;
&lt;br /&gt;
These applications are not yet installed but are ready for installation if needed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Common Actions&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Install&#039;&#039;&#039;: You can install any of the available applications by selecting them.&lt;br /&gt;
* &#039;&#039;&#039;View Details&#039;&#039;&#039;: You can review each application&#039;s description, version, and     functionality before installing.&lt;br /&gt;
* &#039;&#039;&#039;Search&#039;&#039;&#039;: You can search for specific apps by name or category.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Manual Upgrade&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
In contrast to automatic updates, &#039;&#039;&#039;Manual Upgrade&#039;&#039;&#039; lets you take control over which packages or applications you want to upgrade and when.&lt;br /&gt;
&lt;br /&gt;
This can be useful if you need to avoid upgrading certain apps due to compatibility or testing purposes, or if you want to perform updates at a specific time.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Common Actions&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Check for Updates&#039;&#039;&#039;: The system will check for available updates for installed     apps.&lt;br /&gt;
* &#039;&#039;&#039;Select Updates&#039;&#039;&#039;: You can select which packages to update manually.&lt;br /&gt;
* &#039;&#039;&#039;Upgrade Now&#039;&#039;&#039;: You can start the upgrade process immediately for selected apps.&lt;br /&gt;
&lt;br /&gt;
== 5.Status ==&lt;br /&gt;
In this module the user can view the status of the router device with respect to the network, Wan, modem etc.&lt;br /&gt;
&lt;br /&gt;
It has 4 submodules.&lt;br /&gt;
&lt;br /&gt;
* Interfaces&lt;br /&gt;
* Internet&lt;br /&gt;
* Modem&lt;br /&gt;
* Routes&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Status.png]]&lt;br /&gt;
&lt;br /&gt;
=== 5.1 Interfaces ===&lt;br /&gt;
Each network device (interface) is associated with specific traffic statistics, uptime, and status. Active interfaces are operational, while inactive interfaces are not currently transmitting data.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Interfaces .png]]&lt;br /&gt;
&lt;br /&gt;
Looking on the network status the user can check if the cellular, wifi, ewan, vpn etc is up.&lt;br /&gt;
&lt;br /&gt;
=== 5.2 Internet ===&lt;br /&gt;
In this submodule the user can view the status of the internet connections.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Internet.png]]&lt;br /&gt;
&lt;br /&gt;
To see the latest status of the internet connection the user needs to click on the refresh button.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 5.3 Modem ===&lt;br /&gt;
This modem status page provides comprehensive information about the cellular connection&#039;s network operator, technology, mode, and various signal quality metrics. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Modem .png]]&lt;br /&gt;
&lt;br /&gt;
=== 5.4 Routes ===&lt;br /&gt;
This configuration shows how the router directs traffic between different networks and interfaces, ensuring proper communication within the local network and to external networks via the default gateway.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ARP Table:&#039;&#039;&#039; Maps IP addresses to MAC addresses for devices on the network, helping in identifying which device is on which interface.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPv4 Routes:&#039;&#039;&#039; This shows which network is directly connected on which interface.&lt;br /&gt;
&lt;br /&gt;
Example: Network &#039;&#039;&#039;192.168.10.0/24&#039;&#039;&#039; is directly connected on interface &#039;&#039;&#039;eth0.1.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPv6 Routes:&#039;&#039;&#039; Similar routes as IPv4, but this time listed under IPv6 routing rules.&lt;br /&gt;
&lt;br /&gt;
Example: Local networks &#039;&#039;&#039;192.168.10.0/24&#039;&#039;&#039; and &#039;&#039;&#039;192.168.100.0/24&#039;&#039;&#039; are managed through &#039;&#039;&#039;eth0.1&#039;&#039;&#039; and &#039;&#039;&#039;ra0&#039;&#039;&#039;, respectively. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;*Refer the below image*&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Routes.png]] &lt;br /&gt;
&lt;br /&gt;
= 6.Logout =&lt;br /&gt;
The user should click on log out option to logged out from the router application.&lt;br /&gt;
&lt;br /&gt;
[[File:Logout.png]]&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=IAC44_A_User_Manual&amp;diff=2823</id>
		<title>IAC44 A User Manual</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=IAC44_A_User_Manual&amp;diff=2823"/>
		<updated>2025-01-24T11:45:51Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;To log in to SILBO_IAC44-A by connecting the router to your laptop or desktop via LAN or using Wi-Fi, please follow the steps below. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Connecting via LAN:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Connect your laptop&#039;s LAN port to one of the router&#039;s LAN interfaces. Ensure that you select any LAN interface (there are 4 available) while making sure the WAN interface is not used. &lt;br /&gt;
&lt;br /&gt;
                                                                                                                                      &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to connect with the SILBO_IAC44-A&#039;&#039;&#039; &#039;&#039;&#039;application&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Once the LAN connection is established between the device and the laptop or the desktop&lt;br /&gt;
&lt;br /&gt;
Please open the command prompt and ping to get the IP config of that device.&lt;br /&gt;
&lt;br /&gt;
Type the command &#039;&#039;&#039;Ipconfig&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:How_to_connect_with_the_SILBO_RB44_application.png|alt=How to connect with the SILBO RB44 application|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
It will provide the Ip address/url of that device through which the application can be accessed.&lt;br /&gt;
&lt;br /&gt;
[[File:Connecting_via_LAN_RB44.png|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
== Log In ==&lt;br /&gt;
Open the web browser and type the IP address in the URL.&lt;br /&gt;
&lt;br /&gt;
It will show the log in page of the application.&lt;br /&gt;
&lt;br /&gt;
[[File:Log In.png|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
Give the valid credentials for the username and password to login to the application page.&lt;br /&gt;
&lt;br /&gt;
Once the user credentials are provided it will direct to the landing page of the application.&lt;br /&gt;
&lt;br /&gt;
       &lt;br /&gt;
&lt;br /&gt;
The “Status” landing page shows all the detailed specification of the device like system, memory storage and connection tracking etc.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Dashboard.png|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
The application is divided in to 6 Modules.&lt;br /&gt;
&lt;br /&gt;
* Info&lt;br /&gt;
* Settings&lt;br /&gt;
* Maintenance&lt;br /&gt;
* Status&lt;br /&gt;
* Feature&lt;br /&gt;
* Logout&lt;br /&gt;
&lt;br /&gt;
== 1. Info ==&lt;br /&gt;
The “Info” module provides the information about the devices to the user.&lt;br /&gt;
&lt;br /&gt;
It provides all the specification related to the hardware, firmware, Networks and the Connection uptimes.&lt;br /&gt;
&lt;br /&gt;
It has 3 submodules.&lt;br /&gt;
&lt;br /&gt;
* Overview&lt;br /&gt;
* System Log&lt;br /&gt;
* Kernel Log&lt;br /&gt;
&lt;br /&gt;
[[File:IA44A Info Section.png|975x975px]]&lt;br /&gt;
&lt;br /&gt;
=== 1.1 Overview ===&lt;br /&gt;
In overview module it displays all the specification categorically of a device like System, Memory, storage, Connection tracking, DHCP Lease.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Dashboard.png|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;System:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this section it displays the hardware configured specification of the device.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A System Section.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are as follows,&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Hostname&lt;br /&gt;
|37A26230007&lt;br /&gt;
|This field  displays the router serial number of the device&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Model&lt;br /&gt;
|Silbo_IAC44-A_GW-EC200A&lt;br /&gt;
|This field  displays the model number of the device&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Firmware Version  and IPK Version&lt;br /&gt;
|1.17_1.15&lt;br /&gt;
|This field  displays the firmware version and IPK version&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Kernel Version&lt;br /&gt;
|4.14.180&lt;br /&gt;
|This field  displays the kernel version of the device&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Local Time&lt;br /&gt;
|Wednesday, January 8, 2025 at 06:15:29  PM&lt;br /&gt;
|This field  displays the local time&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Uptime&lt;br /&gt;
|0h 27m 58s&lt;br /&gt;
|This field  displays the uptime of the device&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Load Average&lt;br /&gt;
|0.49 0.36 0.40&lt;br /&gt;
|This field  displays the average load&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Memory:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this section it displays the memory configured specification of the device.&lt;br /&gt;
&lt;br /&gt;
[[File:IAB44C Memory Section.png|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are as follows.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Total Available&lt;br /&gt;
|57716 kB / 124188 kB (46%)&lt;br /&gt;
|This field displays the total availability of memory space in  the device&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Free&lt;br /&gt;
|46424 kB / 124188 kB (37%)&lt;br /&gt;
|This field displays the Free memory space in the  device&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Cached&lt;br /&gt;
|444 kB / 124188 kB (0%)&lt;br /&gt;
|This field displays the Cached memory space in the  device&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Buffered&lt;br /&gt;
|11224 kB / 124188 kB (9%)&lt;br /&gt;
|This field displays the Buffered memory space in the  device&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Storage:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this section it displays the status of storage as root and temporary usage specification of the device.&lt;br /&gt;
&lt;br /&gt;
[[File:IAB44C Storage Section.png|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are as follows.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Root  Usage&lt;br /&gt;
|1580 kB / 12800 kB (12%)&lt;br /&gt;
|This field  displays the total root usage of the device&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Temporary Usage&lt;br /&gt;
|444 kB / 62092 kB (0%)&lt;br /&gt;
|This field displays the total temporary  usage of the device&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Network:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this section you can monitor IPv4 WAN status.&lt;br /&gt;
&lt;br /&gt;
[[File:IPv4 Wan Status.png|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are as follows.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Type&lt;br /&gt;
|DHCP  client&lt;br /&gt;
|A &#039;&#039;&#039;DHCP client&#039;&#039;&#039; is a device or  software that requests and receives configuration information from a DHCP  server, such as an IP address, gateway, and DNS servers.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Connected&lt;br /&gt;
|1h 49m 8s&lt;br /&gt;
|This indicates the duration for which the device has been connected  to the network.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Address&lt;br /&gt;
|10.62.35.111&lt;br /&gt;
|This is the &#039;&#039;&#039;IP address&#039;&#039;&#039;  assigned to the DHCP client by the DHCP server. It uniquely identifies the  device on the network.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Gateway&lt;br /&gt;
|10.62.35.144&lt;br /&gt;
|The &#039;&#039;&#039;gateway&#039;&#039;&#039; (or  default gateway) is the IP address of the network device that routes traffic  from the local network to other networks.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|DNS&lt;br /&gt;
|8.8.8.8,  10.103.81.232&lt;br /&gt;
|The first DNS server &amp;quot;8.8.8.8&amp;quot; is a public DNS server  provided by Google.&lt;br /&gt;
&lt;br /&gt;
The second DNS server &amp;quot;10.103.81.232&amp;quot; is a private DNS  server.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Active SIM Information:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This section displays SIM details only when the SIM card is active.&lt;br /&gt;
&lt;br /&gt;
[[File:IAB44C Sim Information.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Connection Tracking:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this section it displays the status of connection tracking for the device.&lt;br /&gt;
&lt;br /&gt;
[[File:Connection Tracking.png]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are as follows.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Value&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Active  Connections&lt;br /&gt;
|48/16384  (0%)&lt;br /&gt;
|This field displays the active  connection of the device.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;DHCP Leases:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this section it displays the DHCP lease of the temporary assignment of an IP address to a device on the network.&lt;br /&gt;
&lt;br /&gt;
[[File:IAB44C DHCP Leases.png]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are below.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Host Name&lt;br /&gt;
|KermaniK-LT&lt;br /&gt;
|This field displays the configured Host Name/Username for that  device.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|IPv4-Address&lt;br /&gt;
|192.168.10.147&lt;br /&gt;
|This field displays the IP address of the device.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|MAC-Address&lt;br /&gt;
|34:73:5a:bb: ab:7a&lt;br /&gt;
|This field displays the MAC-Address of the device.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Lease time remaining&lt;br /&gt;
|11h 53m 49s&lt;br /&gt;
|This field displays the lease time remaining for the device.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== 1.2 System Log ===&lt;br /&gt;
This page provides on screen System logging information. In this page the user gets to view the system logs.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A System logs.png]]&lt;br /&gt;
&lt;br /&gt;
=== 1.3 Kernel Log ===&lt;br /&gt;
This page provides on screen Kernel logging information.&lt;br /&gt;
&lt;br /&gt;
In this page the user gets to view the Kernel logs.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Kernel Logs.png]]&lt;br /&gt;
&lt;br /&gt;
= 2. Setting =&lt;br /&gt;
In this “Setting” module the user can Configure/update all the required parameters related to Network, SIM Switch, Internet, VPN, Firewall, Loopback Rule, Remote monitoring, Tunnel as per requirement.&lt;br /&gt;
&lt;br /&gt;
IT consist of 8 submodules.&lt;br /&gt;
&lt;br /&gt;
* Network&lt;br /&gt;
* VLAN&lt;br /&gt;
* Sim Switch&lt;br /&gt;
* Multi-WAN&lt;br /&gt;
* VPN&lt;br /&gt;
* Firewall&lt;br /&gt;
* Loopback Rule&lt;br /&gt;
* VRRP&lt;br /&gt;
* Remote Monitoring&lt;br /&gt;
* Tunnel&lt;br /&gt;
[[File:IAC44A Settings.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2.1 Network ===&lt;br /&gt;
In this section the user does all the setting related configuration with reference to network like Ethernet Setting, Cellular Setting, Band lock and Operator Lock, Wi-Fi, Guest Wi-Fi, Wireless Schedule etc.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Network.png]]&#039;&#039;&#039;Ethernet Setting:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ethernet Setting:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this page it will display all the configured port that is attached with the device.&lt;br /&gt;
&lt;br /&gt;
For this device 5 ports are configured.&lt;br /&gt;
&lt;br /&gt;
Ethernet mode can be configured as WAN and as LAN as well.&lt;br /&gt;
&lt;br /&gt;
Ethernet WAN Connection settings can be configured as DHCP, Static and PPOE.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Ethernet Settings.png|1723x1723px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To add a new Interface, click on ‘Add’.&lt;br /&gt;
&lt;br /&gt;
To edit the existing device the user needs to click on the edit option.&lt;br /&gt;
&lt;br /&gt;
Once the changes are done click on the update button to save all the changes.&lt;br /&gt;
&lt;br /&gt;
Click on the deleted button to delete the existing device detail.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note: If required, add an interface in Settings--&amp;gt;Multi-WAN--&amp;gt;Failover&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A EWAN Settings.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:  &#039;&#039;&#039;Type: WAN&#039;&#039;&#039;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Physical Device&lt;br /&gt;
|Ex: eth0.5&lt;br /&gt;
|This indicates a network interface on which our  network is connected. This setting is by default (Editable).&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Type&lt;br /&gt;
|&#039;&#039;&#039;WAN&#039;&#039;&#039;/LAN&lt;br /&gt;
|This designates whether the interface is part  of the WAN or LAN.&lt;br /&gt;
&lt;br /&gt;
WAN: Connects the device to the internet.&lt;br /&gt;
&lt;br /&gt;
LAN: Connects the device to the internal  network.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |                                                                      &#039;&#039;&#039;Protocol: Static&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Static IP Address&lt;br /&gt;
|Ex: 192.168.1.10&lt;br /&gt;
|The manually assigned IP address for the  interface.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Static Netmask&lt;br /&gt;
|Ex: 255.255.255.0&lt;br /&gt;
|Subnet mask corresponding to the IP address.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Static Gateway&lt;br /&gt;
|Ex: 192.168.1.1&lt;br /&gt;
|The IP address of the gateway (router) that the  interface will use to send traffic outside its own subnet.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |                                                                      &#039;&#039;&#039;Protocol: DHCP&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|DHCP Gateway&lt;br /&gt;
|Ex: 10.1.1.1&lt;br /&gt;
|The IP address of the DHCP server (often the  same as the router or gateway).&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |                                                                      &#039;&#039;&#039;Protocol: PPPoE&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Username&lt;br /&gt;
|Any Name&lt;br /&gt;
|The username provided by your ISP for PPPoE  authentication.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Password&lt;br /&gt;
|*****&lt;br /&gt;
|The password provided by your ISP for PPPoE  authentication.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Access Concentrator&lt;br /&gt;
|&lt;br /&gt;
|Typically, the name of the ISP&#039;s PPPoE server.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Service Name&lt;br /&gt;
|&lt;br /&gt;
|Sometimes required by ISPs, this field  specifies a particular service offered by the ISP.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Gateway&lt;br /&gt;
|Ex: 0.0.0.0&lt;br /&gt;
|The IP address used as the default route.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Override MAC Address&lt;br /&gt;
|Ex: D0:93:95:B0:CF:7A&lt;br /&gt;
|The MAC address for this interface is set to a  custom value, replacing the default hardware address.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Enable Bridge&lt;br /&gt;
|1.       CWAN1_0&lt;br /&gt;
&lt;br /&gt;
2.       SW_LAN&lt;br /&gt;
&lt;br /&gt;
3.       VPN&lt;br /&gt;
&lt;br /&gt;
4.       ra0 &lt;br /&gt;
&lt;br /&gt;
|Since this is a WAN interface, it is not  typically bridged with others. Bridges are more common for LAN interfaces to  combine multiple connections.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|Create Firewall Zone&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|You can assign this interface to a particular  firewall zone, which determines its access rules (e.g., WAN zone for internet  traffic, LAN zone for internal traffic).&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |&#039;&#039;&#039;Advanced Settings: Enable/Disable&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|15&lt;br /&gt;
|IPv4 Route Table&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|This field is used to specify static routes for  IPv4.&lt;br /&gt;
|-&lt;br /&gt;
|16&lt;br /&gt;
|Table No.&lt;br /&gt;
|&#039;&#039;&#039;254&#039;&#039;&#039;: Default  main routing table.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;100&#039;&#039;&#039;: Custom  routing table for specific purposes.&lt;br /&gt;
|&#039;&#039;&#039;Default Table (Main Table)&#039;&#039;&#039;: Usually, there is a default routing table  (often Table No. 254 or 255) where all the routes are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Custom Table&#039;&#039;&#039;: You can  specify a different table number if you are managing multiple routing  policies (e.g., VoIP traffic, VPN traffic).&lt;br /&gt;
|-&lt;br /&gt;
|17&lt;br /&gt;
|Gateway Metric&lt;br /&gt;
|Ex: 1&lt;br /&gt;
|A numeric value used to prioritize gateways  when multiple are available.&lt;br /&gt;
&lt;br /&gt;
Lower metrics indicate higher priority. For  example, if two gateways exist, the one with the smaller metric is used.&lt;br /&gt;
|-&lt;br /&gt;
|18&lt;br /&gt;
|Broadcast&lt;br /&gt;
|Ex: 192.168.123.34&lt;br /&gt;
|Broadcast address for the network, typically  calculated based on the IP and subnet mask.&lt;br /&gt;
|-&lt;br /&gt;
|19&lt;br /&gt;
|Override MTU&lt;br /&gt;
|Ex: 1500&lt;br /&gt;
|MTU size controls the maximum packet size that  can be sent over the network.&lt;br /&gt;
&lt;br /&gt;
Default is usually 1500 bytes.&lt;br /&gt;
|-&lt;br /&gt;
|20&lt;br /&gt;
|Force Link&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Forces the interface to be up even if no  physical link is detected.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Type: LAN&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A LAN Settings.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Physical Device&lt;br /&gt;
|Ex: eth0.1&lt;br /&gt;
|This is the network interface identifier.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Type&lt;br /&gt;
|WAN/&#039;&#039;&#039;LAN&#039;&#039;&#039;&lt;br /&gt;
|This designates whether the interface is part  of the WAN or LAN.&lt;br /&gt;
&lt;br /&gt;
WAN: Connects the device to the internet.&lt;br /&gt;
&lt;br /&gt;
LAN: Connects the device to the internal  network.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Protocol&lt;br /&gt;
|Static&lt;br /&gt;
|This means that the IP address, netmask, and  other network settings are manually configured rather than being  automatically assigned by a DHCP server.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|IP Address&lt;br /&gt;
|Ex: 192.168.10.1&lt;br /&gt;
|This is the static IP address assigned to the  interface. It acts as the gateway IP address for devices connected to this  LAN.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Static Netmask&lt;br /&gt;
|Ex: 255.255.255.0&lt;br /&gt;
|This is the subnet mask for the network.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Override MAC Address&lt;br /&gt;
|D0:93:95:B0:CF:7B&lt;br /&gt;
|This allows you to manually enter a different  MAC address if needed.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Enable DNS&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|If this option is enabled, the interface will  act as a DNS resolver for the devices on the LAN, using the specified DNS  server.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|DNS Server Address&lt;br /&gt;
|Ex: 8.8.8.8&lt;br /&gt;
|This is the IP address of the DNS server that  will be used by devices on the LAN to resolve domain names to IP addresses.&lt;br /&gt;
&lt;br /&gt;
More than one DNS Address can be added.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Enable DHCP Server&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|If enabled, this setting allows the interface  to function as a DHCP server, automatically assigning IP addresses to devices  connected to the LAN.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|DHCP Start Address&lt;br /&gt;
|50&lt;br /&gt;
|The DHCP server will begin assigning IP  addresses starting from 192.168.10.50&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|DHCP Limit&lt;br /&gt;
|100&lt;br /&gt;
|This specifies the number of IP addresses the  DHCP server can assign. Starting at 192.168.10.50 and with a limit of 100,  the server can assign addresses up to 192.168.10.149.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Lease Time Duration&lt;br /&gt;
|Hours-(H)&lt;br /&gt;
&lt;br /&gt;
Minutes-(M)&lt;br /&gt;
&lt;br /&gt;
Seconds-(S)&lt;br /&gt;
|&#039;&#039;&#039;Hours-(H)&#039;&#039;&#039;: This indicates  that the lease time for each IP address assignment is measured in hours.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Minutes-(M):&#039;&#039;&#039; This  indicates that the lease time for each IP address assignment is measured in minutes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Seconds-(S):&#039;&#039;&#039; This  indicates that the lease time for each IP address assignment is measured in seconds.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|Lease Time&lt;br /&gt;
|12&lt;br /&gt;
|The DHCP lease time is set to 12 hours. After  this period, a device must renew its IP address lease with the DHCP server to  continue using the assigned IP address.&lt;br /&gt;
|-&lt;br /&gt;
|15&lt;br /&gt;
|Enable Bridge&lt;br /&gt;
|1.       CWAN1_0&lt;br /&gt;
&lt;br /&gt;
2.       SW_LAN&lt;br /&gt;
&lt;br /&gt;
3.       VPN&lt;br /&gt;
&lt;br /&gt;
4.       ra0 &lt;br /&gt;
&lt;br /&gt;
|Since this is a WAN interface, it is not  typically bridged with others. Bridges are more common for LAN interfaces to  combine multiple connections.&lt;br /&gt;
|-&lt;br /&gt;
|16&lt;br /&gt;
|Enable DHCP Relay&lt;br /&gt;
|Enter Relay Server IP&lt;br /&gt;
|Forwards DHCP requests from devices in this  subnet to an external DHCP server instead of using the built-in DHCP server.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|17&lt;br /&gt;
|Create Firewall Zone&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|You can assign this interface to a particular  firewall zone, which determines its access rules (e.g., WAN zone for internet  traffic, LAN zone for internal traffic).&lt;br /&gt;
|-&lt;br /&gt;
|18&lt;br /&gt;
|Internet Over SW_LAN&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Allow all outbound traffic from the LAN to the  internet.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |&#039;&#039;&#039;Advanced Settings: Enable/Disable&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|19&lt;br /&gt;
|IPv4 Route Table&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|This field is used to specify static routes for  IPv4.&lt;br /&gt;
|-&lt;br /&gt;
|20&lt;br /&gt;
|Table No.&lt;br /&gt;
|&#039;&#039;&#039;254&#039;&#039;&#039;: Default  main routing table.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;100&#039;&#039;&#039;: Custom  routing table for specific purposes.&lt;br /&gt;
|&#039;&#039;&#039;Default Table (Main Table)&#039;&#039;&#039;: Usually, there is a default routing table  (often Table No. 254 or 255) where all the routes are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Custom Table&#039;&#039;&#039;: You can  specify a different table number if you are managing multiple routing  policies (e.g., VoIP traffic, VPN traffic).&lt;br /&gt;
|-&lt;br /&gt;
|21&lt;br /&gt;
|Gateway Metric&lt;br /&gt;
|Ex: 1&lt;br /&gt;
|A numeric value used to prioritize gateways  when multiple are available.&lt;br /&gt;
&lt;br /&gt;
Lower metrics indicate higher priority. For  example, if two gateways exist, the one with the smaller metric is used.&lt;br /&gt;
|-&lt;br /&gt;
|22&lt;br /&gt;
|Broadcast&lt;br /&gt;
|Ex: 192.168.123.34&lt;br /&gt;
|Broadcast address for the network, typically  calculated based on the IP and subnet mask.&lt;br /&gt;
|-&lt;br /&gt;
|23&lt;br /&gt;
|Override MTU&lt;br /&gt;
|Ex: 1500&lt;br /&gt;
|MTU size controls the maximum packet size that  can be sent over the network.&lt;br /&gt;
&lt;br /&gt;
Default is usually 1500 bytes.&lt;br /&gt;
|}&lt;br /&gt;
Save and Update once configuration changes have been made.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Relay Server:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A relay server typically functions in a network to forward requests (usually DHCP or DNS) from clients to&lt;br /&gt;
&lt;br /&gt;
a designated server when the server is on a different network segment.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Relay Server.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To edit the existing device the user needs to click on the edit option.&lt;br /&gt;
&lt;br /&gt;
Once the changes are done click on the save button to save all the changes.&lt;br /&gt;
&lt;br /&gt;
Click on the deleted button to delete the existing device detail.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Relay Server Edit.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Interface&lt;br /&gt;
|1.)     eth0.1&lt;br /&gt;
&lt;br /&gt;
2.)     ra0&lt;br /&gt;
|1) eth0.1  typically represents a VLAN where the relay will listen for client requests.&lt;br /&gt;
&lt;br /&gt;
2) If your  device is broadcasting a Wi-Fi network on the ra0 interface, any DHCP or DNS  relay settings will apply to devices connected via this wireless interface.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Start IP  Address&lt;br /&gt;
|Ex: 192.168.10.100&lt;br /&gt;
|This is the  beginning IP address of the range that will be leased out to clients.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|End IP  Address&lt;br /&gt;
|Ex: 192.168.10.150&lt;br /&gt;
|An IP address  that is in the same subnet as the Start IP Address and allows sufficient  addresses to be leased.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Netmask&lt;br /&gt;
|Ex: 255.255.255.0&lt;br /&gt;
|A valid  subnet mask such as 255.255.255.0 (for a /24 network), or 255.255.0.0 (for a  /16 network).&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Lease Time&lt;br /&gt;
|For a 24-hour  lease time, set this value to 86400.&lt;br /&gt;
|This is the  amount of time that an IP address is assigned to a client before it needs to  request a renewal from the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
Save and update.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cellular Setting:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this page, the user needs to configure the various details with respect to the SIM.&lt;br /&gt;
&lt;br /&gt;
Select single cellular single sim where the user must configure the APN details of the sim used for the router device. The Configurations can be done based on the SIM usage, with respect to IPV4 or IPV6.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Cellular Settings.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Cellular Enable&lt;br /&gt;
|Checkbox&lt;br /&gt;
|Check this box to  enable cellular functionality.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Cellular  Operation Mode&lt;br /&gt;
|1.) Single Cellular with Dual Sim&lt;br /&gt;
&lt;br /&gt;
2.) Single Cellular with  Single SIM&lt;br /&gt;
|1.) This mode  allows you to use one cellular modem with two SIM cards.&lt;br /&gt;
&lt;br /&gt;
2.) This mode allows you to  use one cellular modem with single SIM card.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Cellular  Modem 1&lt;br /&gt;
|QuectelEC200A&lt;br /&gt;
|This  field displays the modem name.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Choose SIM 1 APN Mode&lt;br /&gt;
|1.) Auto&lt;br /&gt;
&lt;br /&gt;
2.)  Manual&lt;br /&gt;
|1.) Choose  Auto for regular SIM to detect APN name automatically.&lt;br /&gt;
&lt;br /&gt;
2.) Choose manual to enter the APN settings manually in case of  M2M SIM cards.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|SIM 1 Access Point Name&lt;br /&gt;
|airtelgprs.com&lt;br /&gt;
|Enter the APN provided  by your cellular service provider in case of M2M sim. For regular sim cards  APN name will be displayed automatically.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|SIM 1 PDP Type&lt;br /&gt;
|IPV4&lt;br /&gt;
|Choose the PDP  type, which is typically either IPv4 or IPv6 depending on the sim card.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|SIM 1 Username&lt;br /&gt;
|&lt;br /&gt;
|Enter the username if required by the APN.  Leave blank if not required.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|SIM 1 Password&lt;br /&gt;
|&lt;br /&gt;
|Enter the password if required by the  APN. Leave blank if not required.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|SIM 1 Authentication Protocol&lt;br /&gt;
|None&lt;br /&gt;
|Choose the  authentication protocol. Options typically include None, PAP, or CHAP.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|SIM 1 MTU&lt;br /&gt;
|Ex: 1500 (a common MTU size)&lt;br /&gt;
|&#039;&#039;&#039;MTU  (Maximum Transmission Unit)&#039;&#039;&#039; defines the largest size of a data packet  that can be transmitted over the network.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Choose SIM 2 APN Mode&lt;br /&gt;
|1.) Auto&lt;br /&gt;
&lt;br /&gt;
2.) Manual&lt;br /&gt;
|1.) Choose  Auto for regular SIM to detect APN name automatically.&lt;br /&gt;
&lt;br /&gt;
2.) Choose manual to enter the APN settings manually in case of  M2M SIM cards.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|SIM 2 Access Point Name&lt;br /&gt;
|airtelgprs.com&lt;br /&gt;
|Enter the APN  provided by your cellular service provider in case of M2M sim. For regular  sim cards APN name will be displayed automatically.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|SIM 2 PDP Type&lt;br /&gt;
|IPV4&lt;br /&gt;
|Choose the  PDP type, which is typically either IPv4 or IPv6 depending on the sim card.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|SIM 2 Username&lt;br /&gt;
|&lt;br /&gt;
|Enter the  username if required by the APN. Leave blank if not required.&lt;br /&gt;
|-&lt;br /&gt;
|15&lt;br /&gt;
|SIM 2 Password&lt;br /&gt;
|&lt;br /&gt;
|Enter the  password if required by the APN. Leave blank if not required.&lt;br /&gt;
|-&lt;br /&gt;
|16&lt;br /&gt;
|SIM 2 Authentication Protocol&lt;br /&gt;
|None&lt;br /&gt;
|Choose the  authentication protocol. Options typically include None, PAP, or CHAP.&lt;br /&gt;
|-&lt;br /&gt;
|17&lt;br /&gt;
|SIM 2 MTU&lt;br /&gt;
|Ex: 1500 (a common MTU size)&lt;br /&gt;
|&#039;&#039;&#039;MTU  (Maximum Transmission Unit)&#039;&#039;&#039; defines the largest size of a data packet  that can be transmitted over the network.&lt;br /&gt;
|-&lt;br /&gt;
|18&lt;br /&gt;
|Primary SIM Switchback Enable&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|When enabled,  the device will automatically switch back to the primary SIM (SIM 1) after  switching to SIM 2, under certain conditions (e.g., SIM 1 regains network  availability).&lt;br /&gt;
|-&lt;br /&gt;
|19&lt;br /&gt;
|Primary SIM Switchback Time (In Minutes)&lt;br /&gt;
|10&lt;br /&gt;
|Enter the  time in minutes after which the system should switch back to the primary SIM  if it becomes available.&lt;br /&gt;
|}&lt;br /&gt;
After configuring all the required information, the user should click on the save and then click on the update to update the all the required information. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Band lock and Operator Lock:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this page, the user needs to configure the lock band and operator based on the service provider&#039;&#039;&#039;.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Bands available in the drop-down list.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Band lock and operator Lock.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2G/3G option:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
2G/3G: - 3G allows additional features such as mobile internet access, video calls and mobile TV.&lt;br /&gt;
&lt;br /&gt;
While the main function of 2G technology is the transmission of information through voice calls.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Band Lock.png]]&lt;br /&gt;
&lt;br /&gt;
The user should select the band check box available for 2g/3g from the given list. Bands available for selection under LTE for the bands available in that area.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operator Selection Mode:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The user needs to click on the check box of the “operator select enable” to select the operator.&lt;br /&gt;
&lt;br /&gt;
Once the check box is clicked there will be a dropdown list of the operator modes from which the user needs to select the mode. The user needs to select the operator mode from the given dropdown list.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Operator Selection Mode.png]]&lt;br /&gt;
&lt;br /&gt;
If the user selects the mode “Manual” or “Manual-Automatic” then one more text box will appear where the user must provide the operator code. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Operator Code.png]] &lt;br /&gt;
&lt;br /&gt;
After configuring all the required information, the user should click on the save and then click on the update to update the all the required information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Wi-Fi Setting:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this, router has the general setting and change country code, channel, radio mode, radio passphrase as per the requirement after clicking on enable Radio button.&lt;br /&gt;
&lt;br /&gt;
The user needs to select the respective radio mode based on its need.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A WiFi Settings.png]]&lt;br /&gt;
&lt;br /&gt;
It has 3 radio modes:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.) Access Point&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2.) Client only&#039;&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3.) Access Point and Client&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Access Point and Client.png|1327x1327px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Access Point:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In Access Point mode, a configuration in which a router, allows wireless devices to connect to a wired network by creating a Wi-Fi hotspot. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Access point.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Client point:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
In client mode, the access point connects your wired devices to a wireless network. This mode is suitable when you have a wired device with an Ethernet port and no wireless capability, for example, a smart TV, Media Player, or Game console and you want to connect it to the internet wirelessly, select the Client Mode and give the Radio SSID &amp;amp; client passphrase.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Client Only.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Access point and client point&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
Select this option for both type of connection, give both SSID and passphrase.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Access Point and Client Point.png]]&lt;br /&gt;
&lt;br /&gt;
After configuring all the required information, the user should click on the save and then click on the update to update the all the required information.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Radio 0 Protocol&lt;br /&gt;
|IEEE 802.11 b/g/n&lt;br /&gt;
|This section shows the radio protocol  which is by default.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Country Code&lt;br /&gt;
|INDIA&lt;br /&gt;
|Select  the country accordingly.&lt;br /&gt;
&lt;br /&gt;
(INDIA by default)&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Channel&lt;br /&gt;
|Auto&lt;br /&gt;
|In this dropdown the user should  select the proper channel to be used. (Auto by default)&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|TX Power&lt;br /&gt;
|100&lt;br /&gt;
|In this text box the user should  specify the power.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Channel Width&lt;br /&gt;
|20 MHz&lt;br /&gt;
|In this dropdown the user should  select the channel width&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Radio Mode&lt;br /&gt;
|1.) Access point&lt;br /&gt;
&lt;br /&gt;
2.) Client only&lt;br /&gt;
&lt;br /&gt;
3.) Access point and client&lt;br /&gt;
|In this drop down the user should select the mode.&lt;br /&gt;
&lt;br /&gt;
(Access point by default)&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Radio SSID&lt;br /&gt;
|AP_37A26230014&lt;br /&gt;
|In this text box the user should  specify the SSID number which usually comes with the router.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Radio Authentication&lt;br /&gt;
|WPA2 Personal (PSK)&lt;br /&gt;
|In this dropdown the user should select the type of authentication.&lt;br /&gt;
&lt;br /&gt;
(WPA2 Personal (PSK) by default)&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Radio Encryption&lt;br /&gt;
|AES&lt;br /&gt;
|In this dropdown the user should select the type of encryption  required.&lt;br /&gt;
&lt;br /&gt;
(AES by default)&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Radio Passphrase&lt;br /&gt;
|*********&lt;br /&gt;
|In this text box the user should  specify the password. Password will be given with the router which can be  changed later.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Radio DHCP server IP&lt;br /&gt;
|192.168.100.1&lt;br /&gt;
|In this text box the user should specify the IP address of DHCP  server.&lt;br /&gt;
&lt;br /&gt;
(192.168.100.1  will be default which can be changed accordingly)&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Radio DHCP start address&lt;br /&gt;
|100&lt;br /&gt;
|In this text box the user should specify the start address of the  DHCP.&lt;br /&gt;
&lt;br /&gt;
(100 value is default)&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Radio DHCP limit&lt;br /&gt;
|50&lt;br /&gt;
|In this text box the user should specify the limit for the DHCP.&lt;br /&gt;
&lt;br /&gt;
(50 value is default)&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|WMM Enable&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Wi-Fi Multimedia (WMM) improves performance for  applications that require low latency and consistent throughput.&lt;br /&gt;
|-&lt;br /&gt;
|15&lt;br /&gt;
|Enable DHCP Relay&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|&#039;&#039;&#039;DHCP Relay&#039;&#039;&#039;  allows a device to forward DHCP requests from clients to a remote DHCP server  located on a different subnet.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once changes have been made.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Guest Wifi:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This option enables a separate Wi-Fi network for guests, isolated from the main network to enhance security and privacy. Guest Wi-Fi allows visitors or temporary users to connect to your network without accessing the main LAN resources.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A GUest Wifi.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Wireless Schedule:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi can be automatically withdrawn based on the configuration done in this section.&lt;br /&gt;
&lt;br /&gt;
The user can schedule the Wi-Fi’s accessibility time during a particular period.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note:&#039;&#039;&#039; This section is turned off by default, tick the box to activate it.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Wireless Schedule.png]]After configuring all the required information, the user should click on save and then click on update to update all the required information.&lt;br /&gt;
&lt;br /&gt;
The user can select more than one “day of the week” for scheduling the Wi-Fi working hours.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Wi-Fi Schedule settings.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SMS Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
User needs to enable SMS option in SMS settings page.&lt;br /&gt;
&lt;br /&gt;
This option is to validate the mobile numbers using which controlling commands could be sent to the router device.&lt;br /&gt;
&lt;br /&gt;
1 to 5 mobile numbers can be authenticated by choosing from “Select Valid SMS user numbers” and&lt;br /&gt;
&lt;br /&gt;
adding the mobile numbers below respectively.&lt;br /&gt;
&lt;br /&gt;
API key is the pass key used in the commands while sending SMS.&lt;br /&gt;
&lt;br /&gt;
Displayed in the below screen is the default API key which can be edited and changed as per choice.&lt;br /&gt;
&lt;br /&gt;
After addition of the mobile number’s user needs to click on save button for changes to take place. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A SMS Settings.png]] &lt;br /&gt;
&lt;br /&gt;
1.) Select valid user number max. 5 and add authorized phone number in the tab where you want to find the alert and click on &#039;&#039;&#039;‘SMS Response Enable’&#039;&#039;&#039;, &#039;&#039;&#039;‘save’&#039;&#039;&#039; and &#039;&#039;&#039;‘update’&#039;&#039;&#039; button.&lt;br /&gt;
&lt;br /&gt;
2.) Now send SMS commands from the configured mobile number.&lt;br /&gt;
&lt;br /&gt;
3.) Once the commands are received from the user phone number the board will send acknowledgement as per the commands.&lt;br /&gt;
&lt;br /&gt;
4.) After that it will send the router’s status once it has rebooted and is operational again.&lt;br /&gt;
&lt;br /&gt;
Mentioned below are a few commands which can be sent from the configured mobile number to the router device. Below two commands are One for rebooting the router device and another to get the uptime.&lt;br /&gt;
&lt;br /&gt;
1) {&amp;quot;device”: [&amp;quot;passkey”, “API key&amp;quot;],&amp;quot;command&amp;quot;:&amp;quot;reboot&amp;quot;,&amp;quot;arguments&amp;quot;:&amp;quot;hardware&amp;quot;}&lt;br /&gt;
&lt;br /&gt;
2) {&amp;quot;device”: [&amp;quot;passkey &amp;quot;,&amp;quot;API key&amp;quot;],&amp;quot;command”: “uptime&amp;quot;}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Loop back IP settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The loopback IP address, often referred to as “localhost.” it is used to establish network connections within the same device for testing and troubleshooting purpose.&lt;br /&gt;
&lt;br /&gt;
The loopback IP address, commonly represented as 127.0.0.1, is a special address used for testing network connectivity on a local machine.&lt;br /&gt;
&lt;br /&gt;
It allows a device to send network messages to itself without involving external networks, making it useful for troubleshooting and diagnostics.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
However, this IP can be changed as per requirement and to do that, Navigating to Setting&amp;gt;&amp;gt;Network configuration&amp;gt;&amp;gt; Loopback IP settings can be changed/updated.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Loopbackip Settings.png|1398x1398px]]&lt;br /&gt;
&lt;br /&gt;
After configuring all the required information, the user should click on the save and then click on the update to update the all the required information.&lt;br /&gt;
&lt;br /&gt;
=== 2.2 VLAN ===&lt;br /&gt;
&#039;&#039;&#039;VLAN (Virtual Local Area Network)&#039;&#039;&#039; is a network within a network that segregates traffic into different logical networks on the same physical hardware. VLANs help in managing traffic more effectively and securely.&lt;br /&gt;
&lt;br /&gt;
It is further divided into 2 sections,&lt;br /&gt;
&lt;br /&gt;
Port-Based VLAN&lt;br /&gt;
&lt;br /&gt;
Tagged Port Configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Port-Based VLAN:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A VLAN configuration method where network ports are assigned to specific VLANs.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Port Based VLAN.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To add a new VLAN ID, click on ‘Add Device’.&lt;br /&gt;
&lt;br /&gt;
To edit the existing device the user needs to click on the edit option.&lt;br /&gt;
&lt;br /&gt;
Once the changes are done click on the save button to save all the changes.&lt;br /&gt;
&lt;br /&gt;
Click on the deleted button to delete the existing device detail.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A VLAN Port based Configuration Settings.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|&#039;&#039;&#039;VLAN ID&#039;&#039;&#039;&lt;br /&gt;
|1&lt;br /&gt;
|This is a unique identifier for a VLAN within a  network.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|&#039;&#039;&#039;Port 0&#039;&#039;&#039;&lt;br /&gt;
|Untagged&lt;br /&gt;
|When a port is set as untagged for a VLAN, it  means that traffic entering or exiting this port is automatically associated  with that VLAN without any VLAN tags being added to the frames.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|&#039;&#039;&#039;Port 1&#039;&#039;&#039;&lt;br /&gt;
|Untagged&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|&#039;&#039;&#039;Port 2&#039;&#039;&#039;&lt;br /&gt;
|tagged&lt;br /&gt;
|When a port is set as tagged for a VLAN, it  means that traffic on this port will include VLAN tags in the Ethernet  frames. These tags carry the VLAN ID, allowing switches and other devices to  know which VLAN the traffic belongs to.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|&#039;&#039;&#039;Port 3&#039;&#039;&#039;&lt;br /&gt;
|Untagged&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|&#039;&#039;&#039;Port 4&#039;&#039;&#039;&lt;br /&gt;
|OFF&lt;br /&gt;
|When a port is marked as off for a VLAN, it  means that the port is not participating in that VLAN at all. It will neither  send nor receive traffic associated with that VLAN.&lt;br /&gt;
|}&lt;br /&gt;
Save and update the page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tagged Port Configuration:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Tagged port Configuration.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To add a new VLAN ID, click on ‘Add Device’.&lt;br /&gt;
&lt;br /&gt;
To edit the existing device the user needs to click on the edit option.&lt;br /&gt;
&lt;br /&gt;
Click on the deleted button to delete the existing device detail.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A VLAN Tag Based Configuration Settings.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Type&lt;br /&gt;
|802.1Q&lt;br /&gt;
|&#039;&#039;&#039;IEEE 802.1Q&#039;&#039;&#039; is the  standard protocol for VLAN tagging in Ethernet networks.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Parent Interface&lt;br /&gt;
|Port 2&lt;br /&gt;
|It is the underlying physical interface like  port 2 that carries the VLAN-tagged traffic.&lt;br /&gt;
|}&lt;br /&gt;
Save and update the page.&lt;br /&gt;
&lt;br /&gt;
=== 2.3 SIM Switch ===&lt;br /&gt;
In this page the user needs to configure the Sim for the given device.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A SIM Switch.png]]&lt;br /&gt;
&lt;br /&gt;
The user needs to select from the drop-down menu on which basis the sim needs to be switched.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Sim Switch Settings.png]]&lt;br /&gt;
&lt;br /&gt;
Once the user selects on “&#039;&#039;&#039;signal strength&#039;&#039;&#039;” then the parameters related to signal strength will pop up and the user needs to configure the parameters based on the requirement.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Sim Switch Configuration.png|1483x1483px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Threshold RSRP:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This Needs to be set appropriately. Incorrect setting may cause unnecessary SIM switching. (In General, a BAD RSRP value range is -140 to -115 and FAIR RSRP value range is -115 to -105).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Threshold SINR:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This Needs to be set appropriately. Incorrect setting may cause unnecessary SIM switching. (In General, a BAD SNR value range is -20 to 0 and FAIR SNR value range is 0 to 13)&lt;br /&gt;
&lt;br /&gt;
Once the user selects on “&#039;&#039;&#039;Data Limit&#039;&#039;&#039;” then the parameters related to Data Limit will pop up and the user needs to configure the parameters based on the requirement.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Sim switch based on Data Limit.png|1483x1483px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|SIM Switch Based on&lt;br /&gt;
|Data Limit&lt;br /&gt;
|The user needs to select from the drop-down  menu on what basis the sim needs to be switched.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|SIM 1 Data Usage Limit (In MB)&lt;br /&gt;
|1000&lt;br /&gt;
|The user needs to  set the limit for the data usage for SIM 1.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|SIM 2 Data Usage Limit (In MB)&lt;br /&gt;
|1000&lt;br /&gt;
|The user needs to  set the limit for the data usage for SIM 2.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Periodicity&lt;br /&gt;
|Daily&lt;br /&gt;
|The user needs to  set the pattern/frequency to switch the sims.&lt;br /&gt;
|}&lt;br /&gt;
After configuring all the required information, the user should click on the save.&lt;br /&gt;
&lt;br /&gt;
=== 2.4 Multi-WAN ===&lt;br /&gt;
As shown below, this section has 4 categories,&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Status&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General settings&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Failover&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Load Balancing&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Multiwan .png]]&lt;br /&gt;
&lt;br /&gt;
In &#039;&#039;&#039;‘Status’&#039;&#039;&#039; tab user can see the active network connections on the device as shown above.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In general settings, select any one option from the drop-down menu which you wish to imply and click on save and update.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Multi-WAN Configuration.png]]Click on save and update.    &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Failover:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE:&#039;&#039;&#039; Please verify that the name to be added is in the interface section of the status tab. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Failover.png]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Priority settings.png]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are below.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Priority&lt;br /&gt;
|Ex: 5&lt;br /&gt;
|Setting a priority of 1 means this connection  has the highest priority and will be used before any others with a higher  priority number.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Select Track IP Numbers&lt;br /&gt;
|2&lt;br /&gt;
|In this dropdown the user needs to select the  track number for the Ips. This specifies the number of IP addresses  that will be used for tracking the status of the connection.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|TrackIP1&lt;br /&gt;
|8.8.8.8&lt;br /&gt;
|The system  will ping this IPV4 IP address to check if the connection is up and working.  You can even add any whitelisted IP.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|TrackIP2&lt;br /&gt;
|8.8.4.4&lt;br /&gt;
|The system  will ping this IPV4 IP address to check if the connection is up and working.  You can even add any whitelisted IP.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Reliability&lt;br /&gt;
|1&lt;br /&gt;
|If  reliability is set to 1, it might mean the connection is considered reliable  if it successfully pings at least one of the tracked IP addresses.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Count&lt;br /&gt;
|1&lt;br /&gt;
|Setting Count  to 1 means the device will send one ping to each IP address to check for  connectivity.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Up&lt;br /&gt;
|3&lt;br /&gt;
|If set to 3,  the connection will be considered &amp;quot;up&amp;quot; only if all three pings are  successful.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Down&lt;br /&gt;
|3&lt;br /&gt;
|If set to 3,  the connection will be considered &amp;quot;down&amp;quot; if all three pings fail.&lt;br /&gt;
|}&lt;br /&gt;
Click on save and update tab.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Load Balancing:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Load balancing is a network management technique used to distribute traffic across multiple network connections or servers to optimize resource use, maximize throughput, minimize response time, and ensure reliability.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Task&#039;&#039;&#039;: Distributes network traffic evenly across multiple connections (e.g., multiple WAN links) or servers.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Purpose&#039;&#039;&#039;: This ensures that no single connection or server is overwhelmed with too much traffic, which could lead to congestion and slower performance.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Load Balancing.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Loadbalancing Edit.png]]Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Traffic Distribution Ratio&lt;br /&gt;
|Ex: 60%&lt;br /&gt;
|If you have  two connections and set one to 60% and the other to 40%, traffic will be  distributed accordingly.&lt;br /&gt;
&lt;br /&gt;
The ratio must be the same for CWAN1_0 and CWAN1_1.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Select Track IP Numbers&lt;br /&gt;
|2&lt;br /&gt;
|The system  will track two IP addresses to determine if the network connection is active  and reliable.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|TrackIP1&lt;br /&gt;
|8.8.8.8&lt;br /&gt;
|The system  will ping this IPV4 IP address to check if the connection is up and working.  You can even add any whitelisted IP.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|TrackIP2&lt;br /&gt;
|8.8.4.4&lt;br /&gt;
|The system  will ping this IPV4 IP address to check if the connection is up and working.  You can even add any whitelisted IP.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Reliability&lt;br /&gt;
|1&lt;br /&gt;
|With a  reliability setting of 1, the connection might be considered reliable if at  least one ping is successful.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Count&lt;br /&gt;
|1&lt;br /&gt;
|The system  will send one ping to each tracked IP to check the connection&#039;s status.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Up&lt;br /&gt;
|3&lt;br /&gt;
|The system  requires 3 successful pings for the connection to be marked as  &amp;quot;up.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Down&lt;br /&gt;
|3&lt;br /&gt;
|If 3 pings  fail, the system will mark the connection as &amp;quot;down,&amp;quot; and it may  switch to an alternate connection if available.&lt;br /&gt;
|}&lt;br /&gt;
Click on save and update tab.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2.5 VPN ===&lt;br /&gt;
VPN stands for &#039;&#039;&#039;Virtual Private Network&#039;&#039;&#039;, it establishes a connection between the system and a remote server, which is owned by a VPN provider.&lt;br /&gt;
&lt;br /&gt;
Creating a point-to-point tunnel that encrypts the personal data, masks the IP address, and allows to block the required website to blocks via firewalls on the internet.&lt;br /&gt;
&lt;br /&gt;
Navigate to settings &amp;gt;= VPN, general settings and you will see all VPN options you wish to use.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A VPN.png]]&lt;br /&gt;
&lt;br /&gt;
There are 7 types of setting available under VPN configuration.&lt;br /&gt;
&lt;br /&gt;
* General Settings&lt;br /&gt;
* IPSEC&lt;br /&gt;
* Open VPN&lt;br /&gt;
* Wireguard&lt;br /&gt;
* Zerotier&lt;br /&gt;
* PPTP&lt;br /&gt;
* L2TP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this page the user must choose which type of VPN connection is required for the device. The user must select from the above VPN based on its requirement. If required, the user can select all the options. The user needs to click on the save after selecting the option based on its use. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A VPN Configuration.png|1363x1363px]] &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPSEC:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
IPSEC VPN is used to create a VPN connection between local and remote networks.&lt;br /&gt;
&lt;br /&gt;
To use IPSEC VPN, the user should check that both local and remote routers support IPSEC VPN feature.&lt;br /&gt;
&lt;br /&gt;
In this page the user can add/edit/delete the IPSEC VPN connection for the device.&#039;&#039;*Refer the image below*&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A IPsec.png]]&lt;br /&gt;
&lt;br /&gt;
The user needs to click on the update button once the required configuration is completed.&lt;br /&gt;
&lt;br /&gt;
In IPSEC the user needs to click on edit button to edit the configuration of an existing VPN connection.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Ipsec Configuration.png]]&lt;br /&gt;
&lt;br /&gt;
Click on update once done with configurations.&lt;br /&gt;
&lt;br /&gt;
The tunnel will show established, showing the connection has been made.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Ipsec Status.png]]&lt;br /&gt;
&lt;br /&gt;
Detailed specifications are below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|IPSEC&lt;br /&gt;
|Site to Site VPN&lt;br /&gt;
|In this dropdown the user should select the  IPSEC connection type.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|IPSEC Role&lt;br /&gt;
|Client/Server&lt;br /&gt;
|In this dropdown  box the user needs to select the IPSEC role. The device is acting as a  client in the VPN setup (in this example).&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Connection Type&lt;br /&gt;
|Tunnel&lt;br /&gt;
|In this dropdown  the user needs to select the connection type. The user should select on the  connection enable check box.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Connection mode&lt;br /&gt;
|Route/add/&#039;&#039;&#039;start&#039;&#039;&#039;/trap&lt;br /&gt;
|In this drop down  list the user should select the mode for the connection. In this example &#039;&#039;&#039;start&#039;&#039;&#039;  is selected which means the VPN connection is initiated automatically.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Remote Server IP&lt;br /&gt;
|********&lt;br /&gt;
|The IP address of the remote VPN server.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Local ID&lt;br /&gt;
|3.3.3.3&lt;br /&gt;
|The user needs to  set the local id. It is the identification for the local VPN client.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|No. of local subnets&lt;br /&gt;
|1&lt;br /&gt;
|In this dropdown  the user needs to select how many subnets will be connected.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Local Subnet 1&lt;br /&gt;
|172.16.31.25/32&lt;br /&gt;
|In this text box  the user needs to put the specific local subnet included in the VPN.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Remote id&lt;br /&gt;
|1.1.1.1&lt;br /&gt;
|In this text box  the user needs to put the id of the remote connection. It is the  identification for the remote VPN server.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|No of remote subnet&lt;br /&gt;
|1&lt;br /&gt;
|In this dropdown  the user needs to select how many subnets it will be connected remotely.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Remote subnet&lt;br /&gt;
|10.1.1.0/24&lt;br /&gt;
|In this text box  the user needs to put the address of the remote subnet. The specific  remote subnet included in the VPN.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Key exchange&lt;br /&gt;
|Ikev1&lt;br /&gt;
|In this dropdown  the user should select the which key exchange version to be selected.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Aggressive&lt;br /&gt;
|Yes/No&lt;br /&gt;
|In this dropdown  the user should select either yes or no.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|IKE Lifetime (In Seconds)&lt;br /&gt;
|86400&lt;br /&gt;
|The lifetime of the IKE phase in seconds  (1 day).&lt;br /&gt;
|-&lt;br /&gt;
|15&lt;br /&gt;
|Lifetime (in seconds)&lt;br /&gt;
|28800&lt;br /&gt;
|The lifetime of the IPsec SA (Security  Association) in seconds (8 hours).&lt;br /&gt;
|-&lt;br /&gt;
|16&lt;br /&gt;
|Enable DPD Detection&lt;br /&gt;
|&#039;&#039;&#039;1&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
0&lt;br /&gt;
|Indicates whether Dead Peer Detection is  enabled to detect a lost connection. Enable this option as per server-side  settings.&lt;br /&gt;
|-&lt;br /&gt;
|17&lt;br /&gt;
|Time Interval (In Seconds)&lt;br /&gt;
|60&lt;br /&gt;
|This option is available only if DPD  Detection is enabled. The time interval is the interval for DPD checks.&lt;br /&gt;
|-&lt;br /&gt;
|18&lt;br /&gt;
|Action&lt;br /&gt;
|&#039;&#039;&#039;Restart&#039;&#039;&#039;/clear/hold/&lt;br /&gt;
&lt;br /&gt;
trap/start&lt;br /&gt;
|&#039;&#039;&#039;Restart&#039;&#039;&#039;:  Action to take when DPD detects a lost connection (restart the connection).  Select as per server-side setting.&lt;br /&gt;
|-&lt;br /&gt;
|19&lt;br /&gt;
|Authentication Method&lt;br /&gt;
|&#039;&#039;&#039;PSK&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;PSK&#039;&#039;&#039;:  Pre-shared key is used for authentication. Select this option for  authentication as per sever side setting.&lt;br /&gt;
|-&lt;br /&gt;
|20&lt;br /&gt;
|Multiple Secrets&lt;br /&gt;
|1/&#039;&#039;&#039;0&#039;&#039;&#039;&lt;br /&gt;
|Indicates whether multiple PSK secrets  are used. Enable only if required.&lt;br /&gt;
|-&lt;br /&gt;
|21&lt;br /&gt;
|PSK Value&lt;br /&gt;
|******&lt;br /&gt;
|Pre-shared key value (masked for  security).&lt;br /&gt;
|}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|&#039;&#039;&#039;Proposal settings  Phase I&#039;&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|22&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |&#039;&#039;&#039;Encryption Algorithm&#039;&#039;&#039;&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; |AES 128&lt;br /&gt;
&lt;br /&gt;
AES 192&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;AES 256&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
3DES&lt;br /&gt;
|&#039;&#039;&#039;AES 256&#039;&#039;&#039;: Encryption algorithm  for Phase I. Select as per server-side configuration. Both server and client  should have same configuration.&lt;br /&gt;
|-&lt;br /&gt;
|23&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |Authentication Phase I&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; |SHA1&lt;br /&gt;
&lt;br /&gt;
MD5&lt;br /&gt;
&lt;br /&gt;
SHA 256&lt;br /&gt;
&lt;br /&gt;
SHA 384&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SHA 512&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;SHA 512&#039;&#039;&#039;: Authentication  algorithm for Phase I.&lt;br /&gt;
&lt;br /&gt;
Select as per  server-side configuration. Both server and client should have same  configuration.&lt;br /&gt;
|-&lt;br /&gt;
|24&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |DH Group&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; |MODP768(group1)&lt;br /&gt;
&lt;br /&gt;
MODP1024(group2)&lt;br /&gt;
&lt;br /&gt;
MODP1536(group5)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;MODP2048(group14)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
MODP3072(group15)&lt;br /&gt;
&lt;br /&gt;
MODP4096(group16)&lt;br /&gt;
|&#039;&#039;&#039;MODP2048 (group14)&#039;&#039;&#039;:  Diffie-Hellman group for key exchange.&lt;br /&gt;
&lt;br /&gt;
Select as per  server-side configuration. Both server and client should have same  configuration.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;7&amp;quot; |&#039;&#039;&#039;Proposal settings Phase II&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |25&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |Hash Algorithm&lt;br /&gt;
|AES 128&lt;br /&gt;
&lt;br /&gt;
AES 192&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;AES 256&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
3DES&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |&#039;&#039;&#039;AES 256&#039;&#039;&#039;: Encryption algorithm  for Phase II. Select as per server-side configuration. Both server and client  should have same configuration.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |26&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |Authentication Phase II&lt;br /&gt;
|SHA1&lt;br /&gt;
&lt;br /&gt;
MD5&lt;br /&gt;
&lt;br /&gt;
SHA 256&lt;br /&gt;
&lt;br /&gt;
SHA 384&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SHA 512&#039;&#039;&#039;&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |&#039;&#039;&#039;SHA 512&#039;&#039;&#039;: Authentication  algorithm for Phase II.&lt;br /&gt;
&lt;br /&gt;
Select as per  server-side configuration. Both server and client should have same  configuration.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |27&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |PFS Group&lt;br /&gt;
|MODP768(group1)&lt;br /&gt;
&lt;br /&gt;
MODP1024(group2)&lt;br /&gt;
&lt;br /&gt;
MODP1536(group5)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;MODP2048(group14)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
MODP3072(group15)&lt;br /&gt;
&lt;br /&gt;
MODP4096(group16)&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |&#039;&#039;&#039;MODP2048 (group14)&#039;&#039;&#039;: Perfect  Forward Secrecy group.&lt;br /&gt;
&lt;br /&gt;
Select as per  server-side configuration. Both server and client should have same  configuration.&lt;br /&gt;
|}&lt;br /&gt;
Click on save and then update the page for changes to reflect.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Open VPN:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To use the VPN feature, the user should enable OpenVPN Server on the router and install and run VPN client software on the remote device.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Open VPN .png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The user needs to “upload” the respective certificate from a valid path and then click on the “Update.”&lt;br /&gt;
&lt;br /&gt;
Only the &#039;&#039;&#039;TAP&#039;&#039;&#039; connection needs a &#039;&#039;&#039;bridge&#039;&#039;&#039;. The tun connection does not require a bridge. Here we have established a &#039;&#039;&#039;TUN&#039;&#039;&#039; connection.&lt;br /&gt;
&lt;br /&gt;
By clicking on the enable/disable button, the user can start/stop the VPN connection.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Open VPN Status.png|1161x1161px]]&lt;br /&gt;
&lt;br /&gt;
VPN TUN has been established.&lt;br /&gt;
&lt;br /&gt;
Same way VPN TAP can also be established with the help of bridging.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WireGuard:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WireGuard&#039;&#039;&#039; is simple, fast, lean, and modern VPN that utilizes secure and trusted cryptography.&lt;br /&gt;
&lt;br /&gt;
Click on “Edit” to start configurations as needed.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A WireGuard.png|1171x1171px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A WireGuard Editing.png]]&lt;br /&gt;
&lt;br /&gt;
Click on the save button after the required configuration.&lt;br /&gt;
&lt;br /&gt;
Specifications details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Wireguard Role&lt;br /&gt;
|Client/Server&lt;br /&gt;
|In this dropdown box the user needs to select  the wireguard role.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|WireGuard Tunnel Over&lt;br /&gt;
|IPV4/IPV6&lt;br /&gt;
|&#039;&#039;&#039;IPV4&#039;&#039;&#039;: Use  this if your network and endpoint (WireGuard server) support only IPv4.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPV6&#039;&#039;&#039;: Use  this if your network and endpoint support IPv6.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Enable Failover&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|This option allows the VPN connection to  automatically switch to a backup connection if the primary connection fails.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Enable IPV4&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|This enables IPv4 traffic to be routed through  the WireGuard tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Enable IPV6&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Enable this if your network and the destination  support IPv6.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Listen Port&lt;br /&gt;
|51820&lt;br /&gt;
|This is the default port that WireGuard uses  to listen for incoming connections.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Endpoint Host port&lt;br /&gt;
|51820&lt;br /&gt;
|This is the  port on the WireGuard server that the client will connect to.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Peer Public key&lt;br /&gt;
|*****&lt;br /&gt;
|This is the  public key of the WireGuard server that the client uses to establish a secure  connection.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Enable Default Route&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Enable this  if you want all network traffic (not just specific routes) to be routed  through the WireGuard VPN.&lt;br /&gt;
|}&lt;br /&gt;
Save and update the page after configuration has been done.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Zerotier:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
ZeroTier is a tool that lets you create your own private network over the internet.&lt;br /&gt;
&lt;br /&gt;
Go to ZeroTier Central and sign up for a free account. &lt;br /&gt;
&lt;br /&gt;
In ZeroTier Central, click on &amp;quot;Create a Network&amp;quot;. This will generate a unique 16-digit network ID for your new network.&lt;br /&gt;
&lt;br /&gt;
Go to settings =&amp;gt; VPN, in general settings, enable ZeroTier and save.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A ZeroTier.png]]Copy and paste the unique 16-digit network ID in the edit section.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A ZeroTier 16 digit Network ID.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Click on the save button after the required configuration.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Zerotier Connection Settings.png]]&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|NetworkID&lt;br /&gt;
|Ad2769hfkw2345f4&lt;br /&gt;
|In this dropdown  box the user needs to paste the unique 16-digit network id.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Listen Port&lt;br /&gt;
|9993&lt;br /&gt;
|Default&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;PPTP:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This configuration is for setting up a PPTP (Point-to-Point Tunnelling Protocol) VPN connection.&lt;br /&gt;
&lt;br /&gt;
PPTP is a protocol that enables secure data transmission across public networks like the internet, often used to connect to remote networks or access resources securely. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A PPTP.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:PPTP Connection Settings .png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|PPTP Role&lt;br /&gt;
|Client/Server&lt;br /&gt;
|&#039;&#039;&#039;Client:&#039;&#039;&#039; meaning  it will initiate the connection to the remote PPTP server.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Server:&#039;&#039;&#039; means this device will  accept incoming PPTP connections from clients, which can be users or devices  that need remote access to the local network or internet via this server.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |&#039;&#039;&#039;PPTP  Role: CLIENT&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Default Route&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Enabling the default route means that  all network traffic will be routed through the VPN tunnel once the connection  is established.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Metric&lt;br /&gt;
|Ex: 0&lt;br /&gt;
|The metric is a value that defines the  priority of this route among other available routes. Lower metrics indicate  higher priority.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Server IP&lt;br /&gt;
|Ex: 192.168.10.1&lt;br /&gt;
|This is the IP address of the PPTP  server the client will connect to.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Interface&lt;br /&gt;
|Any&lt;br /&gt;
&lt;br /&gt;
EWAN5&lt;br /&gt;
|Selecting the correct interface is  essential because it tells the system which network adapter should be used to  establish the VPN connection.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Username&lt;br /&gt;
|******&lt;br /&gt;
|This field is the login username for  the PPTP server.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Password&lt;br /&gt;
|****&lt;br /&gt;
|This is the password associated with  the username.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |&#039;&#039;&#039;PPTP  Role: SERVER&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Local IP&lt;br /&gt;
|Ex: 192.168.0.1&lt;br /&gt;
|This IP address (192.168.0.1) is the  local IP of the PPTP server on its network. Clients connecting to the VPN  will see this address as their gateway or endpoint within the VPN.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Remote IP Range&lt;br /&gt;
|Ex: 192.168.0.20-30&lt;br /&gt;
|This range defines the pool of IP  addresses that the server will assign to connected VPN clients. Here, any  client connecting to the server will receive an IP address between  192.168.0.20 and 192.168.0.30, which provides up to 11 possible addresses for  simultaneous connections.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Username&lt;br /&gt;
|Ex: User1&lt;br /&gt;
|This is a username that the client will  use to authenticate with the PPTP server. In this case, User1 is designated as an  authorized user.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Password&lt;br /&gt;
|*****&lt;br /&gt;
|The password associated with User1 is  required to complete the authentication.&lt;br /&gt;
|}&lt;br /&gt;
Once Configured, click on save and update.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;L2TP:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
L2TP (Layer 2 Tunneling Protocol) is a network protocol used to establish secure tunnels for transferring data between remote devices or networks, often in VPNs, by encapsulating data for encryption and routing.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A L2TP Dashboard.png|1185x1185px]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A L2TP Connection Settings.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|L2TP Role&lt;br /&gt;
|Client/Server&lt;br /&gt;
|&#039;&#039;&#039;Client&#039;&#039;&#039;: connecting to  an L2TP server to establish a secure tunnel for communication.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Server&#039;&#039;&#039;: the server listens for incoming client  connections.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |&#039;&#039;&#039;L2TP Role: CLIENT&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Default Route&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|If enabled, all outbound  traffic will be routed through the L2TP connection.&lt;br /&gt;
&lt;br /&gt;
If disabled, only specific traffic  destined for the L2TP network will use the tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Metric&lt;br /&gt;
|Ex: 1&lt;br /&gt;
|The system uses this metric to decide which route to prioritize  if multiple routes exist.&lt;br /&gt;
&lt;br /&gt;
L2TP connection with Metric 1 will take precedence over a LAN or  WAN route with Metric 10.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Server IP&lt;br /&gt;
|Ex: 192.168.10.1&lt;br /&gt;
|This is the &#039;&#039;&#039;IP address of the L2TP server&#039;&#039;&#039; to which the  client will connect.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Local Networks&#039;&#039;&#039;: If connecting within a LAN, the server might have an IP like  192.168.x.x.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Remote Connections&#039;&#039;&#039;: The server IP might be a public address like 203.0.113. x.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Checkup Interval Time (in sec)&lt;br /&gt;
|Ex: 30/60 secs&lt;br /&gt;
|Setting 30 seconds ensures the client checks the connection  every half-minute. If the tunnel drops, the client can quickly reconnect.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Interface&lt;br /&gt;
|Any&lt;br /&gt;
|Example interfaces might include eth0, usb0, or ra0.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Username&lt;br /&gt;
|Ex: User&lt;br /&gt;
|The server verifies the username to grant or deny access.&lt;br /&gt;
&lt;br /&gt;
Must match credentials configured on the L2TP server.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Password&lt;br /&gt;
|******&lt;br /&gt;
|Should be kept secure and match the configuration on the server.&lt;br /&gt;
&lt;br /&gt;
Masked for privacy during configuration.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|MPPE Encryption&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|&#039;&#039;&#039;Enabled&#039;&#039;&#039;: Encrypts traffic using MPPE, enhancing security (recommended).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Disabled&#039;&#039;&#039;: Transmits data unencrypted, reducing overhead but exposing  traffic to potential risks.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |&#039;&#039;&#039;L2TP Role: SERVER&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Local IP&lt;br /&gt;
|Ex: 192.168.0.1&lt;br /&gt;
|This is the &#039;&#039;&#039;local IP address of the L2TP server&#039;&#039;&#039;. It  serves as the gateway for clients connected via the L2TP tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Start&lt;br /&gt;
|Ex: 192.168.0.20&lt;br /&gt;
|Specifies the first IP address that can be assigned to connected  clients.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Limit&lt;br /&gt;
|Ex: 192.168.0.30&lt;br /&gt;
|Creates an IP pool for clients (from 192.168.0.20 to  192.168.0.30 in this case).&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Username&lt;br /&gt;
|Ex: User1&lt;br /&gt;
|Ensures that only authorized users can connect.&lt;br /&gt;
&lt;br /&gt;
The server verifies this username against its authentication  database.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|Password&lt;br /&gt;
|******&lt;br /&gt;
|The server verifies the password along with the username.&lt;br /&gt;
&lt;br /&gt;
The password must match the one configured on the server for  successful authentication.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== 2.6 Firewall ===&lt;br /&gt;
A firewall is a layer of security between the network and the Internet. Since a router is the main connection from a network to the Internet, the firewall function is merged into this device. Every network should have a firewall to protect its privacy. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Firewall .png]] &lt;br /&gt;
&lt;br /&gt;
There are 6 types of setting available under firewall.&lt;br /&gt;
&lt;br /&gt;
* General Settings&lt;br /&gt;
* Port forwards&lt;br /&gt;
* Traffic Rules&lt;br /&gt;
* SNAT traffic Rules&lt;br /&gt;
* Parental Control&lt;br /&gt;
* Zone Forwarding&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
General settings are subdivided into 2 parts,&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.) General settings&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In general settings, the settings that are made are default settings and can be changed according to user’s preference.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Firewall.png]]&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|&#039;&#039;&#039;SN&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;Field Name&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;Sample Value&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable SYN-flood protection&lt;br /&gt;
|Enabled&lt;br /&gt;
|This is enabled by default; setting can be changed  if required.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Disable IPV6&lt;br /&gt;
|Disabled&lt;br /&gt;
|This is enabled by default; setting can be changed  if required.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Drop invalid packets&lt;br /&gt;
|Disabled&lt;br /&gt;
|This is enabled by default; setting can be changed  if required.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|TCP SYN Cookies&lt;br /&gt;
|Disabled&lt;br /&gt;
|This is enabled by default; setting can be changed  if required.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Input&lt;br /&gt;
|Reject/Accept&lt;br /&gt;
|By default, the setting is ‘Reject’ but this needs  to be changed to ‘Accept’ compulsory.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Output&lt;br /&gt;
|Reject/Accept&lt;br /&gt;
|By default, the setting is ‘Reject’ but this needs  to be changed to ‘Accept’ compulsory.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Forward&lt;br /&gt;
|Reject/Accept&lt;br /&gt;
|By default, the setting is ‘Reject’ but this needs  to be changed to ‘Accept’ compulsory.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2.) Zone settings&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In zone settings, there’s an option to add “New Zone”, according to user’s requirement.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Zone Settings.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Port Forwards:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Port forwarding is a feature in a router or gateway that allows external devices to access services on a private network.&lt;br /&gt;
&lt;br /&gt;
It maps an external port on the router to an internal IP address and port on the local network, enabling applications such as gaming servers, web servers, or remote desktop connections to be accessed from outside the network.&lt;br /&gt;
&lt;br /&gt;
This helps in directing incoming traffic to the correct device within a local network based on the port number, enhancing connectivity and accessibility.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Port Forwards.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Port Forwards Editing.png]]Click on the save button after the required configuration.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Name&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;Web_Server_Forward&amp;lt;/code&amp;gt;&lt;br /&gt;
|Field must  not be empty. Provide a name for the rule to easily identify it.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Protocol&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;TCP+UDP&amp;lt;/code&amp;gt;&lt;br /&gt;
|Select the protocol  for the rule.&lt;br /&gt;
&lt;br /&gt;
Options  typically include TCP+UDP, TCP, UDP, ICMP, Custom.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Source zone&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;SW_LAN&amp;lt;/code&amp;gt;&lt;br /&gt;
|Select the source zone where the traffic is originating  from. Options typically include EWAN2,SW_LAN,CWAN1,CWAN1_0,CWAN1_1,VPN&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Source MAC address [optional]&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;any&amp;lt;/code&amp;gt;&lt;br /&gt;
|&#039;&#039;&#039;any&#039;&#039;&#039;: Leave as &amp;lt;code&amp;gt;any&amp;lt;/code&amp;gt; if you don&#039;t want to specify a MAC address.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Source IP address[optional]&lt;br /&gt;
|Example: Leave blank if not needed.&lt;br /&gt;
|Optionally  specify an IP address or range.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Source port&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;80, 443&amp;lt;/code&amp;gt;  (if matching traffic for web server ports)&lt;br /&gt;
|Specify the  source port or port range.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Destination zone&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;SW_LAN&amp;lt;/code&amp;gt;&lt;br /&gt;
|Select the  destination zone where the traffic is heading to.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Destination IP address&lt;br /&gt;
|Leave blank if not needed.&lt;br /&gt;
|Optionally specify  the destination IP address or range.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Destination port&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;80&amp;lt;/code&amp;gt;  (if redirecting to a web server port)&lt;br /&gt;
|Specify the  destination port or port range.&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Traffic Rule:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Traffic rules&amp;quot; refer to the policies and regulations that govern the flow of data packets within a network. &lt;br /&gt;
&lt;br /&gt;
To allow new traffic,&lt;br /&gt;
&lt;br /&gt;
click on “Add and Edit” in “New Traffic Rule”.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;*Refer the image below*&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Traffic Rules.png]] &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Traffics Rules Edit.png]]&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Name&lt;br /&gt;
|Example:  Allow_HTTP_and_HTTPS&lt;br /&gt;
|Field must not be empty: Provide a  descriptive name for the traffic rule.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Restrict to  Address Family &lt;br /&gt;
&lt;br /&gt;
|1.Options: IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
Example: IPv4 if  dealing with typical internet traffic.&lt;br /&gt;
|Select the address family to generate  iptables rules for.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Protocol&lt;br /&gt;
|Example: TCP+UDP&lt;br /&gt;
|TCP+UDP: Match incoming traffic using the  given protocol.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Match ICMP Type&lt;br /&gt;
|Example: any&lt;br /&gt;
|Match all ICMP types if set to any.  Specific types can be chosen if needed.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Source Zone&lt;br /&gt;
|Example: LAN&lt;br /&gt;
|Specifies the traffic source zone.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Enable DDoS  Prevention&lt;br /&gt;
|Example:  ‘Checked’ if you want to enable DDoS prevention measures&lt;br /&gt;
|Enable or disable Distributed Denial of  Service (DDoS) prevention.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Source MAC  Address&lt;br /&gt;
|Example: any&lt;br /&gt;
|any: Match traffic from any MAC address or  specify a particular MAC address.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Source Address&lt;br /&gt;
|Example:  192.168.1.0/24&lt;br /&gt;
|Match incoming traffic from the specified  source IP address or range.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Source Port&lt;br /&gt;
|Example: any if  all source ports should be matched&lt;br /&gt;
|any: Match incoming traffic from the  specified source port or port range.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Destination Zone&lt;br /&gt;
|Example: WAN&lt;br /&gt;
|Specifies the traffic destination zone.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Action&lt;br /&gt;
|Example: ACCEPT&lt;br /&gt;
|Options: ACCEPT, DROP, REJECT. Specify the  action to take for matched traffic.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Limit&lt;br /&gt;
|Example:  10/minute to limit matches to 10 times per minute.&lt;br /&gt;
|Maximum average matching rate; specified  as a number, with an optional /second, /minute, /hour, or /day suffix.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Extra arguments&lt;br /&gt;
|Example:  --log-prefix &amp;quot;Blocked: &amp;quot; to add a log prefix to log messages for  this rule.&lt;br /&gt;
|Passes additional arguments to iptables.  Use with care as it can significantly alter rule behaviour.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once configured. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SNAT Traffic Rule:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
For configuring SNAT (Source Network Address Translation) traffic rules, you can control how outbound traffic from your local network is translated to a different IP address as it exits the network.&lt;br /&gt;
&lt;br /&gt;
To add new source NAT,&lt;br /&gt;
&lt;br /&gt;
Click on “ADD” in “New Source NAT:”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;*Refer the figure below*&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A SNAT Traffic Rules.png]] &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A SNAT Traffic Rules Edit.png]]Specification details are below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Name&lt;br /&gt;
|Example: SNAT_WAN_to_LAN&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty&#039;&#039;&#039;: Provide a unique and descriptive name for the SNAT rule.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Protocol&lt;br /&gt;
|Example: TCP+UDP&lt;br /&gt;
|&#039;&#039;&#039;TCP+UDP&#039;&#039;&#039;:  Select the protocols that the SNAT rule will apply to.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Source Zone&lt;br /&gt;
|Example: wan&lt;br /&gt;
|&#039;&#039;&#039;wan&#039;&#039;&#039;:  Specifies the source zone from which the traffic originates.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Source IP Address&lt;br /&gt;
|Example: any or a specific range like 192.168.1.0/24&lt;br /&gt;
|&#039;&#039;&#039;-- please  choose --&#039;&#039;&#039;: Specify the source IP address or range. Leave empty if the  rule applies to any source IP.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Source Port&lt;br /&gt;
|Example: any&lt;br /&gt;
|&#039;&#039;&#039;any&#039;&#039;&#039;:  Specify the source port or port range from which the traffic originates.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Destination Zone&lt;br /&gt;
|Example: lan&lt;br /&gt;
|&#039;&#039;&#039;lan&#039;&#039;&#039;:  Specifies the destination zone to which the traffic is directed.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Destination IP Address&lt;br /&gt;
|Example: any or a specific IP like 192.168.1.100&lt;br /&gt;
|&#039;&#039;&#039;-- please  choose --&#039;&#039;&#039;: Specify the destination IP address or range. Leave empty if  the rule applies to any destination IP.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Destination port&lt;br /&gt;
|Example: any&lt;br /&gt;
|&#039;&#039;&#039;any&#039;&#039;&#039;:  Specify the destination port or port range to which the traffic is directed.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|SNAT IP Address&lt;br /&gt;
|Example: 203.0.113.5 (an external IP address)&lt;br /&gt;
|&#039;&#039;&#039;-- please  choose --&#039;&#039;&#039;: Specify the IP address to which the source IP should be  translated.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|SNAT Port&lt;br /&gt;
|Example: Leave empty if not needed, or specify a port  like ‘12345’&lt;br /&gt;
|Optionally,  rewrite matched traffic to a specific source port. Leave empty to only  rewrite the IP address.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Extra Arguments&lt;br /&gt;
|Example: --log-prefix &amp;quot;SNAT_traffic: &amp;quot; (to add  a log prefix to log messages for this rule)&lt;br /&gt;
|Pass  additional arguments to iptables. Use with care as it can significantly alter  rule behaviour.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once configured. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Parental Control:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
For configuring parental control rules, you want to set restrictions based on time, source, and&lt;br /&gt;
&lt;br /&gt;
destination zones, as well as specific devices.&lt;br /&gt;
&lt;br /&gt;
To add parental control in firewall,&lt;br /&gt;
&lt;br /&gt;
Click on “Add and Edit” in “New parental control:” field.   &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Parental Control.png]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Parental Control Editing.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Name&lt;br /&gt;
|Example: Parental_Control_Sunday&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty&#039;&#039;&#039;: Provide a unique and descriptive name for the parental  control rule.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Proto&lt;br /&gt;
|all&lt;br /&gt;
|&#039;&#039;&#039;all&#039;&#039;&#039;:  This specifies that the rule will apply to all protocols.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Source Zone&lt;br /&gt;
|Example: lan&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty&#039;&#039;&#039;: Please look at Firewall-&amp;gt;Zone Settings to find zone  names.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Destination Zone&lt;br /&gt;
|Example: wan&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty&#039;&#039;&#039;: Please look at Firewall-&amp;gt;Zone Settings to find zone  names.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Source MAC Address&lt;br /&gt;
|Example: 00:1A:2B:3C:4D:5E&lt;br /&gt;
|&#039;&#039;&#039;Field&#039;&#039;&#039;:  Enter the MAC address of the device you want to apply the parental control  rule to. This is useful for restricting specific devices.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Target&lt;br /&gt;
|Example: Reject&lt;br /&gt;
|&#039;&#039;&#039;Accept&#039;&#039;&#039;:  This specifies the action to take. For parental controls, you might want to  use ‘Reject’ or ‘Drop’ to block traffic.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Weekdays&lt;br /&gt;
|Example: Sunday&lt;br /&gt;
|&#039;&#039;&#039;Sunday&#039;&#039;&#039;:  Specify the days of the week when the rule should be active.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Month Days&lt;br /&gt;
|Example: All&lt;br /&gt;
|&#039;&#039;&#039;All:&#039;&#039;&#039; Specify  the days of the month when the rule should be active.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Start Time (hh:mm:ss)&lt;br /&gt;
|Example: 18:00:00 (6:00 PM)&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty:&#039;&#039;&#039; Specify the start time when the rule should begin to apply.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Stop Time (hh:mm:ss)&lt;br /&gt;
|Example: 22:00:00 (10:00 PM)&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty:&#039;&#039;&#039; Specify the stop time when the rule should end.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once configured.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Zone Forwarding:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Zone forwarding in network configuration allows traffic to be directed from one zone to another.&lt;br /&gt;
&lt;br /&gt;
To ADD new zone,&lt;br /&gt;
&lt;br /&gt;
Click on “Add” in “New Zone Forward:” field.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Zone Forwarding.png]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Zone Forwading Editing.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Source Zone&lt;br /&gt;
|Example options: lan, wan, etc.&lt;br /&gt;
|&#039;&#039;&#039;--please  choose--&#039;&#039;&#039;: Select the source zone from which the traffic originates.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Destination Zone&lt;br /&gt;
|Example options: lan, wan, etc.&lt;br /&gt;
|&#039;&#039;&#039;--please  choose--&#039;&#039;&#039;: Select the destination zone to which the traffic is directed.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once configured.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2.7 Loopback Rule ===&lt;br /&gt;
In this page the user can configure the port where he wants to forward the traffic to. Here the user can add/edit/delete different ports as per the requirement.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Loopback Rule.png]]&lt;br /&gt;
&lt;br /&gt;
The user should click on ‘add’ and then ‘edit’ to do the required changes in the port and enter the valid information in each section to configure the port for forwarding.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Loopback Rule Editing.png]]Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Name&lt;br /&gt;
|Example: loopback&lt;br /&gt;
|Provide a  descriptive name for the rule.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Protocol&lt;br /&gt;
|Example: TCP+UDP&lt;br /&gt;
|&#039;&#039;&#039;TCP+UDP&#039;&#039;&#039;:  Select the protocols that the rule will apply to.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Source IP Address [Optional]&lt;br /&gt;
|Example: any or a specific IP range like 192.168.1.0/24&lt;br /&gt;
|Optionally  specify the source IP address or range. Leave empty if the rule should apply  to any source IP.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Source Port [Optional]&lt;br /&gt;
|Example: any&lt;br /&gt;
|&#039;&#039;&#039;any&#039;&#039;&#039;:  Specify the source port or port range from which the traffic originates. any  allows traffic from all ports.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Loopback IP Address&lt;br /&gt;
|Example: 1.1.1.1&lt;br /&gt;
|Specify the  loopback IP address.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Port&lt;br /&gt;
|Example: 81&lt;br /&gt;
|&#039;&#039;&#039;any&#039;&#039;&#039;: Specify  the destination port or port range to which the traffic is directed. any  allows traffic to all ports.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Action&lt;br /&gt;
|Example: DNAT&lt;br /&gt;
|This  specifies the action to take either DNAT or SNAT.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Internal IP Address&lt;br /&gt;
|Example: 2.2.2.2&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty&#039;&#039;&#039;: Specify the internal IP address to which the traffic should  be redirected.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Internal Port&lt;br /&gt;
|Example: 81&lt;br /&gt;
|Redirect  matched incoming traffic to the given port on the internal host.&lt;br /&gt;
|}&lt;br /&gt;
Once the user is done with the required configurations, user should click save button and then click on the update to save the changes.&lt;br /&gt;
&lt;br /&gt;
=== 2.8 VRRP ===&lt;br /&gt;
&#039;&#039;&#039;VRRP (Virtual Router Redundancy Protocol)&#039;&#039;&#039; is used to ensure high availability for IP routing by allowing multiple routers to work together to present the illusion of a single virtual router to the hosts on a network.&lt;br /&gt;
&lt;br /&gt;
In General Settings, click on ‘Enable VRRP’ and save.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A VRRP.png]]&lt;br /&gt;
&lt;br /&gt;
In VRRP section,&lt;br /&gt;
&lt;br /&gt;
Give a name and ‘Add’ device.&lt;br /&gt;
&lt;br /&gt;
Click on ‘Edit’ to make changes.&lt;br /&gt;
&lt;br /&gt;
Click on ‘Delete’ if particular instance not required.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A VRRP Status.png]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A VRRP Editing.png]]Specification details are given below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Role&lt;br /&gt;
|1.      Master&lt;br /&gt;
&lt;br /&gt;
2.      Backup&lt;br /&gt;
|Choose &#039;&#039;&#039;Master&#039;&#039;&#039;  for the primary router that should handle the traffic under normal  circumstances.&lt;br /&gt;
&lt;br /&gt;
Choose &#039;&#039;&#039;Backup&#039;&#039;&#039;  for a secondary router that will take over if the master fails.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Virtual ID&lt;br /&gt;
|Ex: 0&lt;br /&gt;
|The value can  range from 0 to 255.&lt;br /&gt;
&lt;br /&gt;
Ensure all  routers in the same VRRP group share the same &#039;&#039;&#039;Virtual ID&#039;&#039;&#039;.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Priority&lt;br /&gt;
|Ex: 100&lt;br /&gt;
|For the &#039;&#039;&#039;Master&#039;&#039;&#039;  role, use the highest priority, typically above 100.&lt;br /&gt;
&lt;br /&gt;
For the &#039;&#039;&#039;Backup&#039;&#039;&#039;  role, set a lower priority number, usually below the master&#039;s priority.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Interface&lt;br /&gt;
|SW_LAN&lt;br /&gt;
|This is the  network interface on which VRRP operates.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Source IP&lt;br /&gt;
|Ex: 192.168.10.1&lt;br /&gt;
|This is the  IP address used as the source in VRRP advertisements.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Peer IP&lt;br /&gt;
|Ex: 192.168.10.10&lt;br /&gt;
|This is the  IP address of the other VRRP peer (usually the backup router). It helps the  routers identify each other.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Virtual IP  Address&lt;br /&gt;
|192.168.10.100/24&lt;br /&gt;
|The virtual  IP should be an unused address within the subnet, such as 192.168.10.100/24,  ensuring it&#039;s consistent across all VRRP routers.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Enable  Authentication&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Enable this  if you want to secure your VRRP communications.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Password&lt;br /&gt;
|*********&lt;br /&gt;
|It ensures  that only routers with the correct password can join the VRRP group.&lt;br /&gt;
|}&lt;br /&gt;
Save and update once changes have been made.&lt;br /&gt;
&lt;br /&gt;
=== 2.9 Remote Monitoring ===&lt;br /&gt;
In this page the user can select which equipment needs to be monitored remotely.&lt;br /&gt;
&lt;br /&gt;
Once the user selects the type of RMS click on save.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Remote Management System.png]]&#039;&#039;&#039;NMS:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this page the user should type the server IP or domain name in the URL then click on save.&lt;br /&gt;
&lt;br /&gt;
Click on upload and start (Once key is uploaded and this option is clicked, NMS automatically starts, and this router device gets registered with the NMS server provided).&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A NMS.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TR_069:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To enable the TR_069 the user needs to click on the enable check box.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A TR069.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once the user clicks on the check box of enable it will display all the required filed to configured.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Tr069 Edit.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Serving  Interval&lt;br /&gt;
|300&lt;br /&gt;
|A value of 300 seconds means the device  will check in with the ACS (auto-configuration servers) every 5 minutes.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Interface&lt;br /&gt;
|This can  be something like eth0 or wan.&lt;br /&gt;
|This specifies the network interface  used for TR-069 communication.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Username&lt;br /&gt;
|Example: User&lt;br /&gt;
|The username used to authenticate with  the ACS.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Password&lt;br /&gt;
|••••&lt;br /&gt;
|The password used to authenticate with  the ACS.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|URL&lt;br /&gt;
|&amp;lt;nowiki&amp;gt;http://example.com&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|The URL of the ACS. This is where the CPE  (customer-premises equipment) will send its requests and where it will  receive configurations and updates from.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The user should fill all the required fields and click on the save button.&lt;br /&gt;
&lt;br /&gt;
=== 2.10 Tunnel ===&lt;br /&gt;
Tunnels are a method of transporting data across a network using protocols which are not supported by that network.&lt;br /&gt;
&lt;br /&gt;
It is further categorised into 3 sections,&lt;br /&gt;
&lt;br /&gt;
1.) General Settings&lt;br /&gt;
&lt;br /&gt;
2.) GRE Tunnel&lt;br /&gt;
&lt;br /&gt;
3.) IPIP Tunnel  &lt;br /&gt;
&lt;br /&gt;
[[File:Tunnel IAC44A.png]]  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this page the user needs to select under which type of tunnel it needs to send the data.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Tunnel General Settings.png]]&lt;br /&gt;
&lt;br /&gt;
Once the user selects the type of tunnel then click on the save button.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;GRE Tunnel:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A GRE (Generic Routing Encapsulation) tunnel configuration involves setting up a virtual point-to-point connection between two endpoints over an IP network.&lt;br /&gt;
&lt;br /&gt;
Here the user can add/edit/delete the details of the tunnel.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A GRE Tunnel.png]]&lt;br /&gt;
&lt;br /&gt;
Once the required update is done then click on update to save the changes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A GRE Tunnel Configuration.png]]&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Tunnel  name&lt;br /&gt;
|Example:  GRETunnel&lt;br /&gt;
|&#039;&#039;&#039;GRETunnel&#039;&#039;&#039;: The name of the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Local  external IP&lt;br /&gt;
|Example:  10.1.1.66&lt;br /&gt;
|The IP address of the local endpoint  that will initiate the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Remote external  IP&lt;br /&gt;
|Example:  10.1.1.40&lt;br /&gt;
|The IP address of the remote endpoint  that will terminate the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Peer  tunnel IP&lt;br /&gt;
|Example:  10.1.1.4&lt;br /&gt;
|The IP address of the peer&#039;s tunnel  interface.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Local  tunnel IP&lt;br /&gt;
|Example:  10.1.1.6&lt;br /&gt;
|The IP address of the local tunnel  interface.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Local  tunnel net mask&lt;br /&gt;
|Example:  255.255.255.0&lt;br /&gt;
|The subnet mask of the local tunnel  interface.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Remote IP&lt;br /&gt;
|Example:  192.168.10.0/24&lt;br /&gt;
|The remote network that is reachable  through the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Enable  Tunnel Link&lt;br /&gt;
|Check to enable&lt;br /&gt;
|Enable or disable the GRE tunnel link.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Interface  type&lt;br /&gt;
|Example:  EWAN2&lt;br /&gt;
|&#039;&#039;&#039;EWAN2&#039;&#039;&#039;: The  type of network interface used for the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|MTU&lt;br /&gt;
|Example:  1476&lt;br /&gt;
|&#039;&#039;&#039;1476&#039;&#039;&#039;: Maximum  Transmission Unit size for the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|TTL&lt;br /&gt;
|Example:  64&lt;br /&gt;
|&#039;&#039;&#039;64&#039;&#039;&#039;: Time To  Live value for the packets within the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Tunnel  key&lt;br /&gt;
|Example:  12345678&lt;br /&gt;
|&#039;&#039;&#039;12345678&#039;&#039;&#039;: A unique key used to identify the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Enable  keep alive&lt;br /&gt;
|Check to  enable&lt;br /&gt;
|Enable or disable the keep-alive  feature to monitor the tunnel&#039;s status.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|Keep  alive interval&lt;br /&gt;
|Example:  10&lt;br /&gt;
|&#039;&#039;&#039;10&#039;&#039;&#039;:  Interval in seconds for the keep-alive packets.&lt;br /&gt;
|}&lt;br /&gt;
Once the required update is done then click on update to save the changes. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPIP Tunnel:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
An IPIP (IP-in-IP) tunnel is a simple tunnelling protocol used to encapsulate IP packets within IP packets. This is like GRE but without additional features such as keying and type fields.&lt;br /&gt;
&lt;br /&gt;
Here the user can add/edit/delete the details of the tunnel.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A IPIP Tunnel.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A IPIP Tunnel Edit.png]]Once the required update is done then click on update to save the changes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Tunnel  name&lt;br /&gt;
|Example:  IPIPTunnel&lt;br /&gt;
|&#039;&#039;&#039;IPIPTunnel:&#039;&#039;&#039; The name of the IPIP tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Local external  IP&lt;br /&gt;
|Example:  10.1.1.66&lt;br /&gt;
|The IP address of the local endpoint  that will initiate the IPIP tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Remote  external IP&lt;br /&gt;
|Example:  10.1.1.40&lt;br /&gt;
|The IP address of the remote endpoint  that will terminate the IPIP tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Peer  tunnel IP&lt;br /&gt;
|Example:  10.1.1.4&lt;br /&gt;
|The IP address of the peer&#039;s tunnel  interface.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Local  tunnel IP&lt;br /&gt;
|Example:  10.1.1.6&lt;br /&gt;
|The IP address of the local tunnel  interface.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Local  tunnel net mask&lt;br /&gt;
|Example:  255.255.255.0&lt;br /&gt;
|The subnet mask of the local tunnel  interface.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Remote IP&lt;br /&gt;
|Example: 192.168.10.0/24&lt;br /&gt;
|The remote network that is reachable  through the IPIP tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Enable  Tunnel Link&lt;br /&gt;
|Check to  enable&lt;br /&gt;
|Enable or disable the IPIP tunnel link.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Interface  type&lt;br /&gt;
|Example:  EWAN2&lt;br /&gt;
|&#039;&#039;&#039;EWAN2&#039;&#039;&#039;: The  type of network interface used for the IPIP tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|MTU&lt;br /&gt;
|Example:  1476&lt;br /&gt;
|&#039;&#039;&#039;1476&#039;&#039;&#039;: Maximum  Transmission Unit size for the IPIP tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|TTL&lt;br /&gt;
|Example:  64&lt;br /&gt;
|&#039;&#039;&#039;64&#039;&#039;&#039;: Time To  Live value for the packets within the IPIP tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Tunnel  key&lt;br /&gt;
|Example:  12345678&lt;br /&gt;
|Although typically not used in IPIP,  this field might be included for compatibility with certain configurations.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Enable  keep alive&lt;br /&gt;
|Check to  enable&lt;br /&gt;
|Enable or disable the keep-alive  feature to monitor the tunnel&#039;s status.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|Keep  alive interval&lt;br /&gt;
|Example:  10&lt;br /&gt;
|&#039;&#039;&#039;10&#039;&#039;&#039;:  Interval in seconds for the keep-alive packets.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== 3.Maintenance ==&lt;br /&gt;
In this module the user can configure/upgrade/modify the settings related to system, password,&lt;br /&gt;
&lt;br /&gt;
firmware and monitoring.&lt;br /&gt;
&lt;br /&gt;
It includes 6 submodules.&lt;br /&gt;
&lt;br /&gt;
* General&lt;br /&gt;
* Password&lt;br /&gt;
* Reboot&lt;br /&gt;
* Import and Export config&lt;br /&gt;
* Firmware upgrade&lt;br /&gt;
* Monitor Application&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Maintenance.png]]&lt;br /&gt;
&lt;br /&gt;
=== 3.1 General ===&lt;br /&gt;
Here you can configure the basic aspects of router like its hostname or the timezone.&lt;br /&gt;
&lt;br /&gt;
It is further sub-divided into,&lt;br /&gt;
&lt;br /&gt;
1.) General Settings&lt;br /&gt;
&lt;br /&gt;
2.) Logging&lt;br /&gt;
&lt;br /&gt;
3.) Language and Style &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A General Settings.png|1024x1024px]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Local  Time&lt;br /&gt;
|2024/07/30  13:25:47&lt;br /&gt;
|The current local date and time set on  the device.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Timezone&lt;br /&gt;
|Asia/Kolkata&lt;br /&gt;
|The timezone setting of the device,  which determines the local time.&lt;br /&gt;
|}&lt;br /&gt;
Once the user configures the required details then click on the save button to save all the details.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Logging:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Here the user can configure the basic aspects of your device related to system.&lt;br /&gt;
&lt;br /&gt;
The system log configuration provided specifies how the device handles and stores log information, including buffer size, external log server details, and log verbosity levels.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Logging.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|System log buffer size&lt;br /&gt;
|Example: 32 kiB&lt;br /&gt;
|The size of the memory buffer allocated  (0-32) for storing system logs before they are either written to a file or  sent to an external server.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|External system log server&lt;br /&gt;
|Example: 0.0.0.0&lt;br /&gt;
|The IP address of an external server  where logs can be sent.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|External system log server port&lt;br /&gt;
|Example: 514&lt;br /&gt;
|The port used to send logs to the  external log server. Port 514 is the default port for syslog.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Log output level&lt;br /&gt;
|Example: Debug&lt;br /&gt;
|Sets the detail level of the system  logs.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Cron Log level&lt;br /&gt;
|Example: Debug&lt;br /&gt;
|The detail level of the logs for cron  jobs.&lt;br /&gt;
|}&lt;br /&gt;
Once the user configures the required details then click on the save button to save all the details.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Language and Style:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Here the user can configure the basic aspects of your device related to language.&lt;br /&gt;
&lt;br /&gt;
Once the user configures the required details then click on the save button to save all the details.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Language and Sytle.png]]&lt;br /&gt;
&lt;br /&gt;
=== 3.2 Password ===&lt;br /&gt;
In this module the user can set the password for the admin credentials.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note:&#039;&#039;&#039; Password must contain at least one uppercase letter, one digit, one special character, and be at least 8 characters long.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Password Setup.png]]&lt;br /&gt;
&lt;br /&gt;
=== 3.3 Reboot ===&lt;br /&gt;
In this module the user can reboot the device remotely.&lt;br /&gt;
&lt;br /&gt;
First option is to directly reboot the device without enabling the maintenance reboot tab.&lt;br /&gt;
&lt;br /&gt;
Click on “Reboot Now” at the bottom of the screen to start the reboot process.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Reboot.png]]&lt;br /&gt;
&lt;br /&gt;
To start maintenance reboot process first the user needs to fill all the required fields.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Maintenance Reboot Configuration.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable Maintenance  Reboot&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Indicates whether the maintenance  reboot feature is enabled or not.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Type&lt;br /&gt;
|Maintenance  Reboot&lt;br /&gt;
|Specifies the type of reboot being  scheduled.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Reboot  Type&lt;br /&gt;
|Hardware&lt;br /&gt;
|&#039;&#039;&#039;Hardware&#039;&#039;&#039;: A hardware reboot involves restarting the entire  device as if it were powered off and on again.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Minutes&lt;br /&gt;
|Example:  59&lt;br /&gt;
|The minute at which the reboot should  occur (0-59).&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Hours&lt;br /&gt;
|Example:  22 (10 PM)&lt;br /&gt;
|The hour at which the reboot should  occur (0-23, in 24-hour format).&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Day Of  Month&lt;br /&gt;
|Example:  All&lt;br /&gt;
|Specifies which days of the month the  reboot should occur (1-31). &amp;quot;All&amp;quot; means it will occur every day.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Month&lt;br /&gt;
|Example:  All&lt;br /&gt;
|Specifies which months the reboot  should occur (1-12). &amp;quot;All&amp;quot; means it will occur every month.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Day Of  Week&lt;br /&gt;
|Example:  All&lt;br /&gt;
|Specifies which days of the week the  reboot should occur (0-6, where 0 is Sunday). &amp;quot;All&amp;quot; means it will  occur every day of the week.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once the user fills all the required given parameters click on the save.&lt;br /&gt;
&lt;br /&gt;
=== 3.4 Import and Export ===&lt;br /&gt;
In this section, User can Import &amp;amp; Export Configuration files of the Device.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Import and Export Configuration.png]]&lt;br /&gt;
&lt;br /&gt;
Click “Export Config” to export device configuration &amp;amp; settings to a text file,&lt;br /&gt;
&lt;br /&gt;
Click “Import Config” to import device configuration &amp;amp; settings from a previously exported text file.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Import Config.png]]&lt;br /&gt;
&lt;br /&gt;
The user needs to select on the “choose file”, upload the required file and click on apply.&lt;br /&gt;
&lt;br /&gt;
=== 3.5 Firmware Upgrade ===&lt;br /&gt;
The user can upgrade with the latest software for the existing firmware.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Firmware Upgarde.png]]&lt;br /&gt;
&lt;br /&gt;
Click on the &#039;&#039;&#039;flash image&#039;&#039;&#039; and chose the path where the sys-upgrade file is kept and then click on flash image, it will upgrade to the latest software once the reboot is done.&lt;br /&gt;
&lt;br /&gt;
This option will completely reset the device to default settings.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Flash Image.png]]Click on the &#039;&#039;&#039;Retain Config and flash&#039;&#039;&#039; and chose the path where the sys-upgrade file is kept and then click on Retain Config and flash, it will upgrade to the latest software once the reboot is done.&lt;br /&gt;
&lt;br /&gt;
This refers to updating the firmware (flashing) of a device while preserving the current configuration settings.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Retain Config and Flash.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Click on the &#039;&#039;&#039;Factory Reset&#039;&#039;&#039; for the complete retest of the device.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Factory Reset.png|1563x1563px]]&lt;br /&gt;
&lt;br /&gt;
=== 3.6 Monitor Application ===&lt;br /&gt;
In this section, the monitor application is divided into major 2 configurations which is further sub-divided into 4 editable options,&lt;br /&gt;
&lt;br /&gt;
1.) Modem Monitor Application Configuration:&lt;br /&gt;
&lt;br /&gt;
2.) Router Monitor Application Configuration:&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Monitor Application.png]]&#039;&#039;&#039;Modem Monitor Application Configuration:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Modem Monitor Application.png]]Specification details are given below: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable Ping Check Application&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Turns on the functionality to perform ping  checks on specified IP addresses.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Time Interval for Check (In minutes)&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 10 minutes&lt;br /&gt;
|Frequency at which the ping checks are  performed.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Select No of IP addresses to ping&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 1&lt;br /&gt;
|Number of IP addresses that will be pinged.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|IP Address 1&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 8.8.8.8&lt;br /&gt;
|The IP address to ping.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|No. of Retries&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 5&lt;br /&gt;
|Number of times to retry pinging an IP address  if the initial ping fails.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Failure Criteria in (%)&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 80% (If 4 out of 5 pings fail, it’s considered  a failure)&lt;br /&gt;
|Percentage of failed pings required to consider  the ping check a failure.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Action On Failure&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; Restart Modem&lt;br /&gt;
|Action to be taken if the ping check fails  according to the criteria.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Enable Second Level Action&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Option to enable a secondary action if the  primary action fails multiple times.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Second Level Action Threshold&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 2&lt;br /&gt;
|Number of failures required to trigger the  secondary action.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Second Level Action&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; Restart Board (Reboots  the entire hardware board)&lt;br /&gt;
|The action to be taken if the second level  action threshold is met.&lt;br /&gt;
|}&lt;br /&gt;
Save the details once made necessary changes. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Router Monitor Application Configuration:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Router Monitor Application Configuration.png]]Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable Ping Check Application&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Activates the  ping check functionality to monitor router performance.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Time Interval for Check (In minutes)&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 10 minutes&lt;br /&gt;
|How  frequently the ping checks are performed.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Select No of IP Addresses to Ping&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 1 (Please select the appropriate number  based on your requirements)&lt;br /&gt;
|Choose the  number of IP addresses to ping. This typically involves selecting from a list  or entering multiple addresses.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|No. of Retries&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 3&lt;br /&gt;
|Number of  retries if a ping fails.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Failure Criteria in (%)&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 80% (If 80% of the pings fail, it’s  deemed a failure)&lt;br /&gt;
|Percentage of  failed pings required to consider the ping check as failed.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Action On Failure&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; Restart IPsec&lt;br /&gt;
|The action  taken if the ping check fails according to the criteria.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Enable Second Level Action&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Option to  enable an additional action if the primary action fails.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Second Level Action Threshold&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; Specify the number of failures, such as 2&lt;br /&gt;
|Number of  times the primary action must fail before the secondary action is triggered.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Second Level Action&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; Restart Board&lt;br /&gt;
|The action to  be taken if the second level action threshold is met.&lt;br /&gt;
|}&lt;br /&gt;
Save the details once made necessary changes.&lt;br /&gt;
&lt;br /&gt;
== 4. Features ==&lt;br /&gt;
In this module the user can see all the features that the router device has.&lt;br /&gt;
&lt;br /&gt;
This module includes 10 features.&lt;br /&gt;
&lt;br /&gt;
* Mac Address Binding&lt;br /&gt;
* URL Filtering&lt;br /&gt;
* Web Server&lt;br /&gt;
* Wi-Fi MacID Filtering&lt;br /&gt;
* Routing&lt;br /&gt;
* DMZ&lt;br /&gt;
* Others&lt;br /&gt;
* SNMP Agent Configuration&lt;br /&gt;
* Connection Diagnostics&lt;br /&gt;
* Package Manager&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Features.png]]&lt;br /&gt;
&lt;br /&gt;
=== 4.1 Mac Address Binding ===&lt;br /&gt;
MAC address binding is a configuration that binds a specific MAC address to a specific IP address.&lt;br /&gt;
&lt;br /&gt;
This ensures that a particular device on the network always receives the same IP address from the DHCP&lt;br /&gt;
&lt;br /&gt;
server, which can be useful for network management, security, and ensuring consistent network&lt;br /&gt;
&lt;br /&gt;
behaviour.&lt;br /&gt;
&lt;br /&gt;
Under this submodule the user can configure/update/edit the IP Address for MAC.&lt;br /&gt;
&lt;br /&gt;
You can edit the pre-existing configuration, or you can ‘Add’ in the ‘New MAC ADDRESS’ field. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A MAC Address Binding.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A MAC Address Binding Editing.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Device Name&lt;br /&gt;
|mac1&lt;br /&gt;
|A user-defined name for the binding  configuration.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|MAC Address&lt;br /&gt;
|48:9e:bd:da:45:91&lt;br /&gt;
|The unique identifier for the network interface  of the device to which the IP address will be bound.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|IP Address&lt;br /&gt;
|192.168.10.55&lt;br /&gt;
|The IP address that will be consistently  assigned to the device with the specified MAC address.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
By applying this configuration, the DHCP server will always assign the IP address 192.168.10.55 to the device with the MAC address 48:9e:bd:da:45:91, ensuring consistency and stability in network addressing for that device.&lt;br /&gt;
&lt;br /&gt;
* Once the user modifies the MAC address /IP Address then click on the save button to save the changes done.&lt;br /&gt;
* The user can click on the deleted button to delete an existing configured device.&lt;br /&gt;
&lt;br /&gt;
Post all the changes the user needs to click on the update to reflect all the changes in the application.&lt;br /&gt;
&lt;br /&gt;
=== 4.2 URL Filtering ===&lt;br /&gt;
In this submodule the user should provide the URL which needs to be blocked for the device.&lt;br /&gt;
&lt;br /&gt;
By implementing URL filtering with the specified URL, you can control and restrict access to certain&lt;br /&gt;
&lt;br /&gt;
websites, thereby improving network security and managing user access.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A URL FIltring.png]]&lt;br /&gt;
&lt;br /&gt;
To add the new URL for blocking, click on the Add New button.&lt;br /&gt;
&lt;br /&gt;
Once the user clicks on the Add New button a new pop will appear in that page write the URL and click on the save.&lt;br /&gt;
&lt;br /&gt;
The user can select the status of that URL while defining the URL.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A URL FIltring Edit.png]]&lt;br /&gt;
&lt;br /&gt;
To edit / delete the existing URL the user needs to click on the edit /deleted button respectively.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Url Filter Disable.png]]&lt;br /&gt;
&lt;br /&gt;
Click on “save” after the changes are done as per the need.&lt;br /&gt;
&lt;br /&gt;
=== 4.3 Web Server ===&lt;br /&gt;
This configuration will allow your device to serve web traffic securely over HTTPS, keep its system time synchronized, and ensure that all HTTP traffic is redirected to HTTPS for better security.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Webserver Configuration.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Webserver Edit.png]]Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable HTTP&lt;br /&gt;
|&#039;&#039;&#039;HTTP Port:&#039;&#039;&#039; 80&lt;br /&gt;
&lt;br /&gt;
Enable or disable the HTTP server.&lt;br /&gt;
|Port 80 is the default port for HTTP traffic.  It is used to serve web pages over an unencrypted connection.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Enable HTTPS&lt;br /&gt;
|&#039;&#039;&#039;HTTPS Port:&#039;&#039;&#039; 443&lt;br /&gt;
&lt;br /&gt;
Enable or disable the HTTPS server.&lt;br /&gt;
|Port 443 is the default port for HTTPS traffic.  It is used to serve web pages over an encrypted connection.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Redirect HTTPS&lt;br /&gt;
|Option to redirect HTTP traffic to  HTTPS.&lt;br /&gt;
|When enabled, all HTTP requests will be  automatically redirected to the HTTPS port to ensure secure communication.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Session Timeout (In Minutes)&lt;br /&gt;
|Ex: 5 mins&lt;br /&gt;
|This setting controls how long a user session  remains active without interaction before the server automatically logs the  user out.&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5&lt;br /&gt;
|RFC1918 Filter&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|When enabled, this filter can block traffic from private IP  ranges (e.g., 192.168.x.x, 10.x.x.x) from being routed through the public  internet, enhancing network security.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Enable NTP Sync&lt;br /&gt;
|Enable or disable NTP synchronization.&lt;br /&gt;
|Synchronizes the device’s system clock with an  external NTP server to maintain accurate time.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|NTP Server&lt;br /&gt;
|0.openwrt.pool.ntp.org&lt;br /&gt;
|The address of the NTP server used for time  synchronization. The openwrt.pool.ntp.org server is a public NTP server pool.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|NTP Sync Interval (In Minutes)&lt;br /&gt;
|15&lt;br /&gt;
|The interval at which the device will sync its  clock with the NTP server, set to every 15 minutes in this case.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once changes are made.&lt;br /&gt;
&lt;br /&gt;
=== 4.4 Wi-Fi MacID Filtering ===&lt;br /&gt;
Wireless MAC ID Filtering allows you to control which devices can connect to your wireless network based on their MAC (Media Access Control) addresses. This can help enhance security by allowing only specified devices to access the network.&lt;br /&gt;
&lt;br /&gt;
It is further divided into 2 categories,&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WIFI 2.4G AP&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WIFI 2.4G AP Guest&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Wifi Mac ID Filtering.png]]&lt;br /&gt;
&lt;br /&gt;
Before adding the MacIDs the user needs to select the mode from the dropdown menu.&lt;br /&gt;
&lt;br /&gt;
In ‘Change Mode’ select one option,&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Blacklist&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In blacklist mode, you specify which MAC addresses are not allowed to connect to the wireless network. Devices not on the blacklist will be able to connect.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Whitelist&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In whitelist mode, you specify which MAC addresses are allowed to connect to the wireless network. Devices not on the whitelist will be blocked.&lt;br /&gt;
&lt;br /&gt;
To Add the MacID the user needs to click on Add New option.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Whitelist.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Status&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Enable or disable the MAC ID filtering.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|MAC ID&lt;br /&gt;
|Example: e8:6f:38:1a:f2:61&lt;br /&gt;
|The MAC address of the device to be whitelisted  or blocklisted.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Network Name&lt;br /&gt;
|Example: WIFI 2.4G AP or Wi-Fi 2.4G AP  Guest.&lt;br /&gt;
|The network to apply the MAC ID filtering.&lt;br /&gt;
|}&lt;br /&gt;
Once the required MAC ID and Network Name is configured the user needs to click on the save button to add the details.&lt;br /&gt;
&lt;br /&gt;
The user needs to click on the edit button to do modifications on the pre-existing configuration.&lt;br /&gt;
&lt;br /&gt;
Once the required MACID / Network Name is modified the user needs to click on the save button to reflect the changed value in the application.&lt;br /&gt;
&lt;br /&gt;
=== 4.5 Routing ===&lt;br /&gt;
In this submodule the user can configure the parameters related to routing of the device like Target address, Networks address etc. Routing configurations allow network packets to be directed between different subnets and networks.&lt;br /&gt;
&lt;br /&gt;
It is further divided into 2 sections,&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Static IPV4 Routes&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Advanced Static IPV4 Routes&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Static IPV4 Routes:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Click on ‘Add’ to add a new interface.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Routing.png]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To edit the existing device the user needs to click on the edit option.&lt;br /&gt;
&lt;br /&gt;
Once the changes are done click on the save button to save all the changes.&lt;br /&gt;
&lt;br /&gt;
Click on the deleted button to delete the existing device detail.&lt;br /&gt;
[[File:IAC44A Routing Edit.png|left]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Interface&lt;br /&gt;
|Ex: eth0.1&lt;br /&gt;
|The network interface to be used for this route.  Select the one to use from dropdown.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Target&lt;br /&gt;
|Ex: 192.168.20.0&lt;br /&gt;
|The destination subnet to which traffic should  be routed.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|IPv4 Netmask&lt;br /&gt;
|255.255.255.0&lt;br /&gt;
|The subnet mask for the target network.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Metric&lt;br /&gt;
|0&lt;br /&gt;
|The priority of the route.&lt;br /&gt;
&lt;br /&gt;
Lower values indicate higher priority.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|IPv4 Gateway&lt;br /&gt;
|Ex: 192.168.10.1&lt;br /&gt;
|The gateway IP address to be used for routing  traffic to the target subnet.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Route Type&lt;br /&gt;
|Unicast&lt;br /&gt;
|Standard route for individual destination IP  addresses.&lt;br /&gt;
&lt;br /&gt;
Custom changes can be made.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once configuration changes have been made. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Advanced Static IPV4 Routes:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This is further divided into 2 sections,&lt;br /&gt;
&lt;br /&gt;
Routing Tables&lt;br /&gt;
&lt;br /&gt;
Routing Rules for IPV4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Routing Tables:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Adding a new table in static routing allows you to define specific routes for traffic within a network.&lt;br /&gt;
&lt;br /&gt;
Click on ‘Add’ to add a new Table. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Advanced Static IPV4 Routes.png]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Routing Table Edit.png]]&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|ID of Table&lt;br /&gt;
|Ex: 1&lt;br /&gt;
|A unique identifier for the routing table.  Multiple tables can be used to define different sets of routing rules,  providing flexibility in how traffic is managed.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Name of Table&lt;br /&gt;
|Ex: Route&lt;br /&gt;
|A descriptive name for the routing table,  making it easier to manage and identify different tables.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Target&lt;br /&gt;
|Ex: 192.168.10.0&lt;br /&gt;
|Specifies the destination network or IP address  that the route is intended for.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|IPv4 Netmask&lt;br /&gt;
|255.255.255.0&lt;br /&gt;
|Defines the subnet mask for the target network.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Metric&lt;br /&gt;
|Ex: 0&lt;br /&gt;
|Indicates the priority of the route. A lower  metric value means a higher priority. Routes with lower metrics are preferred  over those with higher metrics.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|IPv4 Gateway&lt;br /&gt;
|Ex: 10.1.1.1&lt;br /&gt;
|Specifies the next hop or gateway IP address  through which the traffic to the target network should be routed.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Route Type&lt;br /&gt;
|1.) Unicast&lt;br /&gt;
&lt;br /&gt;
2.) Custom&lt;br /&gt;
|&#039;&#039;&#039;Unicast&#039;&#039;&#039;:  Standard route where packets are sent to a single destination IP address.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Custom&#039;&#039;&#039;: Enables  advanced routing configurations or specific protocols that might not be  covered by default.&lt;br /&gt;
|}&lt;br /&gt;
Once all the configurations are done click on the update button to reflect the changes made.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Routing Rules for IPV4:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Click on ‘Add’ to add a new interface.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Routing For IPV4.png]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To edit the existing device the user needs to click on the edit option.&lt;br /&gt;
&lt;br /&gt;
Once the changes are done click on the save button to save all the changes.&lt;br /&gt;
&lt;br /&gt;
Click on the deleted button to delete the existing device detail.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Routing For IPV4 Edit.png]]&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Interface&lt;br /&gt;
|Ex: ra0&lt;br /&gt;
|Select the specific network interface on the  router through which traffic enters or exits.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|To&lt;br /&gt;
|Ex: 192.168.10.1&lt;br /&gt;
|The destination IP address or network. In this  case, 192.168.10.1 is the target IP address for routing traffic.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|IPv4 Netmask&lt;br /&gt;
|Ex: 255.255.255.192&lt;br /&gt;
|Defines the subnet mask, which helps determine  the size of the network.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Table ID&lt;br /&gt;
|Ex: 1&lt;br /&gt;
|Identifies which routing table this rule  applies to.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|From&lt;br /&gt;
|Ex: 192.168.100.1&lt;br /&gt;
|Specifies the source IP address or network from  which the traffic originates. In this case, the traffic is coming from  192.168.100.1.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Priority&lt;br /&gt;
|Ex:20&lt;br /&gt;
|Determines the order in which routing rules are  evaluated. Lower numbers have higher priority. If two rules conflict, the one  with the lower priority number will be applied first.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Outgoing Interface&lt;br /&gt;
|1.) fwmark&lt;br /&gt;
&lt;br /&gt;
2.) iif (Incoming Interface)&lt;br /&gt;
&lt;br /&gt;
3.) oif (Outgoing Interface)&lt;br /&gt;
&lt;br /&gt;
4.) lookup&lt;br /&gt;
&lt;br /&gt;
5.) blackhole&lt;br /&gt;
&lt;br /&gt;
6.) prohibited&lt;br /&gt;
&lt;br /&gt;
7.) unreachable&lt;br /&gt;
|1.) This  allows you to create rules that apply only to traffic that has been marked in  a specific way by the firewall.&lt;br /&gt;
&lt;br /&gt;
2.) This is  often used to create rules based on the interface through which traffic is received.&lt;br /&gt;
&lt;br /&gt;
3.) This  allows you to control the flow of traffic based on the desired outgoing  interface.&lt;br /&gt;
&lt;br /&gt;
4.) It tells the router to check the specific  routing table ID mentioned to determine how to route the traffic.&lt;br /&gt;
&lt;br /&gt;
5.) This is  used when you want to block traffic without notifying the sender.&lt;br /&gt;
&lt;br /&gt;
6.) Like  blackhole but sends an ICMP unreachable message to the sender, indicating  that the route is prohibited.&lt;br /&gt;
&lt;br /&gt;
7.) Causes  the router to send an ICMP unreachable message to the source IP, notifying  that the destination is unreachable.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== 4.6 DMZ ===&lt;br /&gt;
A &#039;&#039;&#039;DMZ (Demilitarized Zone)&#039;&#039;&#039; is a subnetwork that provides an extra layer of security for an organization&#039;s internal network.&lt;br /&gt;
&lt;br /&gt;
In this case we are configuring several services (HTTP, HTTPS, SSH, FTP, DNS) in a DMZ, and each service requires the correct &#039;&#039;&#039;internal port&#039;&#039;&#039; (the port used within the network) and &#039;&#039;&#039;external port&#039;&#039;&#039; (the port used by external clients to access the service) setting&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A DMZ.png]]&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable DMZ&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Enable DMZ to configure it further.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Host IP Address&lt;br /&gt;
|Ex: 192.168.10.1&lt;br /&gt;
|This is the internal IP address of the device  or server that will be in the DMZ.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Protocol&lt;br /&gt;
|1.) TCP&lt;br /&gt;
&lt;br /&gt;
2.) UDP&lt;br /&gt;
&lt;br /&gt;
3.) ICMP&lt;br /&gt;
&lt;br /&gt;
4.) All&lt;br /&gt;
|&#039;&#039;&#039;TCP&#039;&#039;&#039;: Used  for reliable services like HTTP, HTTPS, FTP, and SSH.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;UDP&#039;&#039;&#039;: Often  used for services like DNS that don&#039;t require as much reliability.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ICMP&#039;&#039;&#039;: Used  for sending control messages like &amp;quot;ping.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;All&#039;&#039;&#039;: Select  this if you&#039;re unsure which protocol to allow, but it&#039;s less secure.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Allow HTTP&lt;br /&gt;
|Internal Port: 80&lt;br /&gt;
&lt;br /&gt;
External Port: 80&lt;br /&gt;
|Enables web traffic over the unsecured &#039;&#039;&#039;HTTP&#039;&#039;&#039;  protocol.&lt;br /&gt;
&lt;br /&gt;
(Port 80 is the standard port for HTTP traffic  on our internal network).&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Allow HTTPS&lt;br /&gt;
|Internal Port: 443&lt;br /&gt;
&lt;br /&gt;
External Port: 443&lt;br /&gt;
|Enables secure web traffic over &#039;&#039;&#039;HTTPS.&#039;&#039;&#039; (Port  443 is the standard port for HTTPS on our internal network).&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Allow SSH&lt;br /&gt;
|Internal Port: 52434&lt;br /&gt;
&lt;br /&gt;
External Port: 52434&lt;br /&gt;
|This is a custom port we’re using for SSH.&lt;br /&gt;
&lt;br /&gt;
The default is 22.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Allow FTP&lt;br /&gt;
|Internal Port: 21/20&lt;br /&gt;
&lt;br /&gt;
External Port: 21/20&lt;br /&gt;
|FTP is used to transfer files between  computers.&lt;br /&gt;
&lt;br /&gt;
(These are the standard ports for FTP traffic.  Port 21 is used for control commands, and port 20 for the data transfer.)&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Allow DNS&lt;br /&gt;
|Internal Port: 53&lt;br /&gt;
&lt;br /&gt;
External Port: 53&lt;br /&gt;
|Standard DNS port within our internal network.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== 4.7 Others ===&lt;br /&gt;
In this page the user will get to do all the other miscellaneous configuration with respect to the device based on the required parameters. Each utility serves a specific purpose, providing various functionalities for managing and troubleshooting network configurations and statuses.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Others.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Set Date&lt;br /&gt;
|Date and time fields (day, month, year,  hour, minute, second)&lt;br /&gt;
|Sets the system date and time to the specified  values.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Get Date&lt;br /&gt;
|System&lt;br /&gt;
|Retrieves and displays the current system date  and time.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|ipsec status all&lt;br /&gt;
|Command ‘Get’&lt;br /&gt;
|Displays the status of all IPsec connections.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Wi-Fi Scan&lt;br /&gt;
|Command ‘Get’&lt;br /&gt;
|Initiates a scan for available Wi-Fi networks.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|iPerf3 Client&lt;br /&gt;
|IP address (e.g., 192.168.10.100)&lt;br /&gt;
|Runs an iPerf3 client to measure network  performance.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|iPerf3 Server&lt;br /&gt;
|Command ‘Run’&lt;br /&gt;
|Runs an iPerf3 server to measure network  performance.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Ping&lt;br /&gt;
|IP address or domain (e.g., 8.8.8.8)&lt;br /&gt;
|Sends ICMP echo requests to the specified  address to check connectivity.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|traceroute&lt;br /&gt;
|IP address or domain (e.g., 8.8.8.8)&lt;br /&gt;
|Traces the route packets take to reach the  specified address.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|NTP Sync&lt;br /&gt;
|Command ‘Sync’&lt;br /&gt;
|Synchronizes the system time with the  configured NTP server.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Download Files&lt;br /&gt;
|File or database identifier&lt;br /&gt;
|Initiates a download of the specified file or database.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Restart Power&lt;br /&gt;
|Command ‘Restart’&lt;br /&gt;
|Restarts the power of the device.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Restart Modem&lt;br /&gt;
|Command ‘Restart’&lt;br /&gt;
|Restarts the modem.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Run AT Command&lt;br /&gt;
|Enter AT command&lt;br /&gt;
|Executes the specified AT command on the modem.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|Show Board Configuration&lt;br /&gt;
|Command ‘Show’&lt;br /&gt;
|Displays the current board configuration.&lt;br /&gt;
|-&lt;br /&gt;
|15&lt;br /&gt;
|Show VPN Certificate Name&lt;br /&gt;
|Command ‘Show’&lt;br /&gt;
|Displays the name of the VPN certificate in  use.&lt;br /&gt;
|-&lt;br /&gt;
|16&lt;br /&gt;
|Switch SIM to Secondary (Takes &amp;gt;2  mins)&lt;br /&gt;
|Command ‘Run’&lt;br /&gt;
|Switches the active SIM to the secondary SIM  card.&lt;br /&gt;
|-&lt;br /&gt;
|17&lt;br /&gt;
|Send test SMS&lt;br /&gt;
|Phone number (e.g., +911234567890)  message text (e.g., &amp;quot;Hello how are you?&amp;quot;)&lt;br /&gt;
|Sends a test SMS to the specified phone number.&lt;br /&gt;
|-&lt;br /&gt;
|18&lt;br /&gt;
|ReadlatestSMS&lt;br /&gt;
|Command ‘Read’&lt;br /&gt;
|Reads the most recent SMS received by the  device.&lt;br /&gt;
|-&lt;br /&gt;
|19&lt;br /&gt;
|Data Usage&lt;br /&gt;
|&#039;&#039;&#039;From:&#039;&#039;&#039; Start  date (YYYY-MM-DD)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;To:&#039;&#039;&#039; End date  (YYYY-MM-DD)&lt;br /&gt;
|Displays data usage statistics for the  specified date range.&lt;br /&gt;
|-&lt;br /&gt;
|20&lt;br /&gt;
|Monthly Data Usage&lt;br /&gt;
|&#039;&#039;&#039;Month:&#039;&#039;&#039; Month (e.g., 07)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Year:&#039;&#039;&#039; Year  (e.g., 2024)&lt;br /&gt;
|Displays data usage statistics for the  specified month and year.&lt;br /&gt;
|-&lt;br /&gt;
|21&lt;br /&gt;
|Modem Debug Info&lt;br /&gt;
|Command ‘Read’&lt;br /&gt;
|Displays debug information for the modem.&lt;br /&gt;
|-&lt;br /&gt;
|22&lt;br /&gt;
|Scan Network operators (Takes &amp;gt;3  mins)&lt;br /&gt;
|Command ‘Scan’&lt;br /&gt;
|Initiates a scan for available network  operators.&lt;br /&gt;
|-&lt;br /&gt;
|23&lt;br /&gt;
|Network operator list (First Perform  Scan Network Operators)&lt;br /&gt;
|Command ‘Show’&lt;br /&gt;
|Displays the list of network operators detected  in the previous scan.&lt;br /&gt;
|-&lt;br /&gt;
|24&lt;br /&gt;
|ReadLogFiles&lt;br /&gt;
|Log file identifier&lt;br /&gt;
|Reads and displays the specified log file&lt;br /&gt;
|-&lt;br /&gt;
|25&lt;br /&gt;
|Enable ssh (Admin)&lt;br /&gt;
|Command ‘Run’&lt;br /&gt;
|Enables SSH access for the admin user.&lt;br /&gt;
|-&lt;br /&gt;
|26&lt;br /&gt;
|Disable ssh (Admin)&lt;br /&gt;
|Command ‘Run’&lt;br /&gt;
|Disables SSH access for the admin user.&lt;br /&gt;
|-&lt;br /&gt;
|27&lt;br /&gt;
|ClearSIM1Data&lt;br /&gt;
|Command ‘Clear’&lt;br /&gt;
|Clears data usage statistics for SIM1.&lt;br /&gt;
|-&lt;br /&gt;
|28&lt;br /&gt;
|ClearSIM2Data&lt;br /&gt;
|Command ‘Clear’&lt;br /&gt;
|Clears data usage statistics for SIM2.&lt;br /&gt;
|-&lt;br /&gt;
|29&lt;br /&gt;
|Create Bridge with SW_LAN&lt;br /&gt;
|Network interface identifier&lt;br /&gt;
|Creates a network bridge with the specified  interface and SW_LAN.&lt;br /&gt;
|-&lt;br /&gt;
|30&lt;br /&gt;
|Show Bridge&lt;br /&gt;
|Command ‘Show’&lt;br /&gt;
|Displays information about the current network  bridges.&lt;br /&gt;
|-&lt;br /&gt;
|31&lt;br /&gt;
|Delete Bridge&lt;br /&gt;
|Command ‘Delete’&lt;br /&gt;
|Deletes the specified network bridge.&lt;br /&gt;
|-&lt;br /&gt;
|32&lt;br /&gt;
|Output&lt;br /&gt;
|Any value&lt;br /&gt;
|Displays output for all the above actions.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== 4.8 SNMP Agent Configuration ===&lt;br /&gt;
The &#039;&#039;&#039;SNMP (Simple Network Management Protocol) Agent Configuration&#039;&#039;&#039; is essential for monitoring and managing network devices, such as routers, from a central management system.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A SNMP Agent Configuration.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable SNMP  Service&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Enable this  if you want the device to be accessible for SNMP-based monitoring and management.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|IP Family&lt;br /&gt;
|IPV4&lt;br /&gt;
|Specifies that  SNMP service will operate over IPv4.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Port&lt;br /&gt;
|161&lt;br /&gt;
|&#039;&#039;&#039;161&#039;&#039;&#039; is  the default and should be used unless there is a specific need to use a  different port.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|System OID&lt;br /&gt;
|1.3.6.1.4.1.38151&lt;br /&gt;
|This unique  identifier represents the device in the SNMP management system.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Name&lt;br /&gt;
|Invendis  Router&lt;br /&gt;
|The name used  to identify the device in the SNMP management system.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Contact&lt;br /&gt;
|Invendis@invendis.co&lt;br /&gt;
|The email  address of the person responsible for the device, used for administrative  contact.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Location&lt;br /&gt;
|Bangalore&lt;br /&gt;
|The physical  location of the device.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|SNMP Version&lt;br /&gt;
|Version-1,&lt;br /&gt;
&lt;br /&gt;
Version-2,&lt;br /&gt;
&lt;br /&gt;
Version-3&lt;br /&gt;
|&#039;&#039;&#039;Version-1&#039;&#039;&#039;:  Basic and outdated, offering no security.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Version-2&#039;&#039;&#039;:  An improvement over Version-1 with better performance and some security  features.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Version-3&#039;&#039;&#039;:  The most secure, offering authentication and encryption (AuthPriv).&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Security       (for SNMP Version-3)&lt;br /&gt;
|NoAuthNoPriv&lt;br /&gt;
&lt;br /&gt;
AuthNoPriv&lt;br /&gt;
&lt;br /&gt;
AuthPriv&lt;br /&gt;
|&#039;&#039;&#039;No  Authentication, No Privacy&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Authentication,  No Privacy&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Authentication  and Privacy&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Username&lt;br /&gt;
|Ex: admin&lt;br /&gt;
|The username  used for SNMP authentication.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Authentication  Password &lt;br /&gt;
|*******&lt;br /&gt;
|This password  is used to authenticate the SNMP user.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Privacy  Password&lt;br /&gt;
|*******&lt;br /&gt;
|This password  is used to encrypt SNMP messages.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Download MIB  File&lt;br /&gt;
|Download&lt;br /&gt;
|Click this to  download the MIB file associated with the device’s SNMP configuration.&lt;br /&gt;
|}&lt;br /&gt;
Click on save tab to save changes.&lt;br /&gt;
&lt;br /&gt;
=== 4.9 Connection Diagnostics ===&lt;br /&gt;
This can ensure that your connection diagnostics application effectively monitors and reports the status of your network connections, providing valuable data for troubleshooting and performance optimization.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Connection Diagnostics.png]]This Application works in 3 parts,&lt;br /&gt;
&lt;br /&gt;
1.) General settings&lt;br /&gt;
&lt;br /&gt;
2.) Connection status and management&lt;br /&gt;
&lt;br /&gt;
3.) Application Start/Stop&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Application Manager Dashboard.png]]&lt;br /&gt;
&#039;&#039;&#039;General settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
First make configuration changes in this section and save.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Application Manager Dashboard General Settings.png]]&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable Connection Diagnostics&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|This option  enables or disables the connection diagnostics functionality.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Check Interval (in seconds)&lt;br /&gt;
|&#039;&#039;&#039;Value:&#039;&#039;&#039; 120&lt;br /&gt;
|Specifies how  often (in seconds) the diagnostics checks are performed. In this case, every  120 seconds. (min 60 secs)&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Number of Pings&lt;br /&gt;
|&#039;&#039;&#039;Value:&#039;&#039;&#039; 5&lt;br /&gt;
|Determines ping  requests sent during each check.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Ping Packet Size (in Bytes)&lt;br /&gt;
|&#039;&#039;&#039;Value:&#039;&#039;&#039; 56&lt;br /&gt;
|Defines the  size of each ping packet in bytes.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Send to remote MQTT Broker&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|This option  enables the sending of diagnostic data to a remote MQTT broker.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Publish Data Format&lt;br /&gt;
|&#039;&#039;&#039;CSV&#039;&#039;&#039; / &#039;&#039;&#039;JSON&#039;&#039;&#039;&lt;br /&gt;
|Specifies the  format in which the diagnostic data will be published to the MQTT broker. You  can choose either CSV (Comma-Separated Values) or JSON (JavaScript Object  Notation).&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|MQTT Broker url&lt;br /&gt;
|&#039;&#039;&#039;Value:&#039;&#039;&#039; broker.hivemq.com&lt;br /&gt;
|The URL of  the MQTT broker where the diagnostic data will be sent.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|TCP port&lt;br /&gt;
|&#039;&#039;&#039;Value:&#039;&#039;&#039; 1883&lt;br /&gt;
|The TCP port  used to connect to the MQTT broker. Port 1883 is the default port for MQTT.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Topic&lt;br /&gt;
|&#039;&#039;&#039;Value:&#039;&#039;&#039; 37A26230014/connectionDiagnostics&lt;br /&gt;
|The MQTT  topic under which the diagnostic data will be published. This topic is used  to categorize and identify the data.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Connection status and management:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To setup a connection,&lt;br /&gt;
&lt;br /&gt;
Click on ‘Add new target’&lt;br /&gt;
&lt;br /&gt;
Enter Target IP (Ex: 8.8.8.8)&lt;br /&gt;
&lt;br /&gt;
Click ‘Add’&lt;br /&gt;
&lt;br /&gt;
Target has been added successfully. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Connection Status and Management.png]] &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Application Start/Stop:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To check whether the target Ip is sending and receiving packets, you need to start the application to see the desired output.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Application Start and Stop.png]]&lt;br /&gt;
&lt;br /&gt;
As shown above, our target Ip is sending packets successfully.&lt;br /&gt;
&lt;br /&gt;
You can Add as many target IP’s you need to monitor.&lt;br /&gt;
&lt;br /&gt;
You can leave the application on for monitoring else ‘Stop’ the application.&lt;br /&gt;
&lt;br /&gt;
=== 4.10 Package Manager ===&lt;br /&gt;
A &#039;&#039;&#039;Package Manager&#039;&#039;&#039; is a tool or interface used to &#039;&#039;&#039;manage software packages&#039;&#039;&#039; (applications, libraries, tools) on a system.&lt;br /&gt;
&lt;br /&gt;
The package manager interface you are looking at likely allows you to manage the software installed on your device, such as networking tools, firmware, or other applications relevant to your system.&lt;br /&gt;
&lt;br /&gt;
This section has 3 sub-sections,&lt;br /&gt;
&lt;br /&gt;
Installed APP&lt;br /&gt;
&lt;br /&gt;
Available APP&lt;br /&gt;
&lt;br /&gt;
Manual Upgrade&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A PacKage Manager.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Installed APP:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
When you select Installed APP, you will see all the software that is actively running or installed on the device.&lt;br /&gt;
&lt;br /&gt;
This could include system utilities, network management tools, monitoring software, or any third-party apps that were previously installed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Common Actions&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;View Details&#039;&#039;&#039;: You can check each application&#039;s version, source, and     installation date.&lt;br /&gt;
* &#039;&#039;&#039;Uninstall&#039;&#039;&#039;: You can remove applications that are no longer needed.&lt;br /&gt;
* &#039;&#039;&#039;Check for Updates&#039;&#039;&#039;: You can see if there are updates available for any     installed application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Available APP&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
When you select &#039;&#039;&#039;Available APP&#039;&#039;&#039;, you will see a list of software that can be installed from the system&#039;s repositories or sources.&lt;br /&gt;
&lt;br /&gt;
These applications are not yet installed but are ready for installation if needed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Common Actions&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Install&#039;&#039;&#039;: You can install any of the available applications by selecting them.&lt;br /&gt;
* &#039;&#039;&#039;View Details&#039;&#039;&#039;: You can review each application&#039;s description, version, and     functionality before installing.&lt;br /&gt;
* &#039;&#039;&#039;Search&#039;&#039;&#039;: You can search for specific apps by name or category.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Manual Upgrade&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
In contrast to automatic updates, &#039;&#039;&#039;Manual Upgrade&#039;&#039;&#039; lets you take control over which packages or applications you want to upgrade and when.&lt;br /&gt;
&lt;br /&gt;
This can be useful if you need to avoid upgrading certain apps due to compatibility or testing purposes, or if you want to perform updates at a specific time.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Common Actions&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Check for Updates&#039;&#039;&#039;: The system will check for available updates for installed     apps.&lt;br /&gt;
* &#039;&#039;&#039;Select Updates&#039;&#039;&#039;: You can select which packages to update manually.&lt;br /&gt;
* &#039;&#039;&#039;Upgrade Now&#039;&#039;&#039;: You can start the upgrade process immediately for selected apps.&lt;br /&gt;
&lt;br /&gt;
== 5.Status ==&lt;br /&gt;
In this module the user can view the status of the router device with respect to the network, Wan, modem etc.&lt;br /&gt;
&lt;br /&gt;
It has 4 submodules.&lt;br /&gt;
&lt;br /&gt;
* Interfaces&lt;br /&gt;
* Internet&lt;br /&gt;
* Modem&lt;br /&gt;
* Routes&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Status.png]]&lt;br /&gt;
&lt;br /&gt;
=== 5.1 Interfaces ===&lt;br /&gt;
Each network device (interface) is associated with specific traffic statistics, uptime, and status. Active interfaces are operational, while inactive interfaces are not currently transmitting data.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Interfaces .png]]&lt;br /&gt;
&lt;br /&gt;
Looking on the network status the user can check if the cellular, wifi, ewan, vpn etc is up.&lt;br /&gt;
&lt;br /&gt;
=== 5.2 Internet ===&lt;br /&gt;
In this submodule the user can view the status of the internet connections.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Internet.png]]&lt;br /&gt;
&lt;br /&gt;
To see the latest status of the internet connection the user needs to click on the refresh button.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 5.3 Modem ===&lt;br /&gt;
This modem status page provides comprehensive information about the cellular connection&#039;s network operator, technology, mode, and various signal quality metrics. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Modem .png]]&lt;br /&gt;
&lt;br /&gt;
=== 5.4 Routes ===&lt;br /&gt;
This configuration shows how the router directs traffic between different networks and interfaces, ensuring proper communication within the local network and to external networks via the default gateway.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ARP Table:&#039;&#039;&#039; Maps IP addresses to MAC addresses for devices on the network, helping in identifying which device is on which interface.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPv4 Routes:&#039;&#039;&#039; This shows which network is directly connected on which interface.&lt;br /&gt;
&lt;br /&gt;
Example: Network &#039;&#039;&#039;192.168.10.0/24&#039;&#039;&#039; is directly connected on interface &#039;&#039;&#039;eth0.1.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPv6 Routes:&#039;&#039;&#039; Similar routes as IPv4, but this time listed under IPv6 routing rules.&lt;br /&gt;
&lt;br /&gt;
Example: Local networks &#039;&#039;&#039;192.168.10.0/24&#039;&#039;&#039; and &#039;&#039;&#039;192.168.100.0/24&#039;&#039;&#039; are managed through &#039;&#039;&#039;eth0.1&#039;&#039;&#039; and &#039;&#039;&#039;ra0&#039;&#039;&#039;, respectively. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;*Refer the below image*&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Routes.png]] &lt;br /&gt;
&lt;br /&gt;
= 6.Logout =&lt;br /&gt;
The user should click on log out option to logged out from the router application.&lt;br /&gt;
&lt;br /&gt;
[[File:Logout.png]]&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=File:IAC44A_Routes.png&amp;diff=2822</id>
		<title>File:IAC44A Routes.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=File:IAC44A_Routes.png&amp;diff=2822"/>
		<updated>2025-01-24T11:45:25Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;IAC44A Routes&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=File:IAC44A_Modem_.png&amp;diff=2821</id>
		<title>File:IAC44A Modem .png</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=File:IAC44A_Modem_.png&amp;diff=2821"/>
		<updated>2025-01-24T11:44:34Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;IAC44A Modem&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=IAC44_A_User_Manual&amp;diff=2820</id>
		<title>IAC44 A User Manual</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=IAC44_A_User_Manual&amp;diff=2820"/>
		<updated>2025-01-24T11:24:02Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;To log in to SILBO_IAC44-A by connecting the router to your laptop or desktop via LAN or using Wi-Fi, please follow the steps below. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Connecting via LAN:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Connect your laptop&#039;s LAN port to one of the router&#039;s LAN interfaces. Ensure that you select any LAN interface (there are 4 available) while making sure the WAN interface is not used. &lt;br /&gt;
&lt;br /&gt;
                                                                                                                                      &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to connect with the SILBO_IAC44-A&#039;&#039;&#039; &#039;&#039;&#039;application&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Once the LAN connection is established between the device and the laptop or the desktop&lt;br /&gt;
&lt;br /&gt;
Please open the command prompt and ping to get the IP config of that device.&lt;br /&gt;
&lt;br /&gt;
Type the command &#039;&#039;&#039;Ipconfig&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:How_to_connect_with_the_SILBO_RB44_application.png|alt=How to connect with the SILBO RB44 application|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
It will provide the Ip address/url of that device through which the application can be accessed.&lt;br /&gt;
&lt;br /&gt;
[[File:Connecting_via_LAN_RB44.png|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
== Log In ==&lt;br /&gt;
Open the web browser and type the IP address in the URL.&lt;br /&gt;
&lt;br /&gt;
It will show the log in page of the application.&lt;br /&gt;
&lt;br /&gt;
[[File:Log In.png|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
Give the valid credentials for the username and password to login to the application page.&lt;br /&gt;
&lt;br /&gt;
Once the user credentials are provided it will direct to the landing page of the application.&lt;br /&gt;
&lt;br /&gt;
       &lt;br /&gt;
&lt;br /&gt;
The “Status” landing page shows all the detailed specification of the device like system, memory storage and connection tracking etc.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Dashboard.png|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
The application is divided in to 6 Modules.&lt;br /&gt;
&lt;br /&gt;
* Info&lt;br /&gt;
* Settings&lt;br /&gt;
* Maintenance&lt;br /&gt;
* Status&lt;br /&gt;
* Feature&lt;br /&gt;
* Logout&lt;br /&gt;
&lt;br /&gt;
== 1. Info ==&lt;br /&gt;
The “Info” module provides the information about the devices to the user.&lt;br /&gt;
&lt;br /&gt;
It provides all the specification related to the hardware, firmware, Networks and the Connection uptimes.&lt;br /&gt;
&lt;br /&gt;
It has 3 submodules.&lt;br /&gt;
&lt;br /&gt;
* Overview&lt;br /&gt;
* System Log&lt;br /&gt;
* Kernel Log&lt;br /&gt;
&lt;br /&gt;
[[File:IA44A Info Section.png|975x975px]]&lt;br /&gt;
&lt;br /&gt;
=== 1.1 Overview ===&lt;br /&gt;
In overview module it displays all the specification categorically of a device like System, Memory, storage, Connection tracking, DHCP Lease.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Dashboard.png|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;System:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this section it displays the hardware configured specification of the device.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A System Section.png|frameless|620x620px]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are as follows,&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Hostname&lt;br /&gt;
|37A26230007&lt;br /&gt;
|This field  displays the router serial number of the device&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Model&lt;br /&gt;
|Silbo_IAC44-A_GW-EC200A&lt;br /&gt;
|This field  displays the model number of the device&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Firmware Version  and IPK Version&lt;br /&gt;
|1.17_1.15&lt;br /&gt;
|This field  displays the firmware version and IPK version&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Kernel Version&lt;br /&gt;
|4.14.180&lt;br /&gt;
|This field  displays the kernel version of the device&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Local Time&lt;br /&gt;
|Wednesday, January 8, 2025 at 06:15:29  PM&lt;br /&gt;
|This field  displays the local time&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Uptime&lt;br /&gt;
|0h 27m 58s&lt;br /&gt;
|This field  displays the uptime of the device&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Load Average&lt;br /&gt;
|0.49 0.36 0.40&lt;br /&gt;
|This field  displays the average load&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Memory:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this section it displays the memory configured specification of the device.&lt;br /&gt;
&lt;br /&gt;
[[File:IAB44C Memory Section.png|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are as follows.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Total Available&lt;br /&gt;
|57716 kB / 124188 kB (46%)&lt;br /&gt;
|This field displays the total availability of memory space in  the device&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Free&lt;br /&gt;
|46424 kB / 124188 kB (37%)&lt;br /&gt;
|This field displays the Free memory space in the  device&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Cached&lt;br /&gt;
|444 kB / 124188 kB (0%)&lt;br /&gt;
|This field displays the Cached memory space in the  device&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Buffered&lt;br /&gt;
|11224 kB / 124188 kB (9%)&lt;br /&gt;
|This field displays the Buffered memory space in the  device&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Storage:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this section it displays the status of storage as root and temporary usage specification of the device.&lt;br /&gt;
&lt;br /&gt;
[[File:IAB44C Storage Section.png|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are as follows.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Root  Usage&lt;br /&gt;
|1580 kB / 12800 kB (12%)&lt;br /&gt;
|This field  displays the total root usage of the device&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Temporary Usage&lt;br /&gt;
|444 kB / 62092 kB (0%)&lt;br /&gt;
|This field displays the total temporary  usage of the device&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Network:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this section you can monitor IPv4 WAN status.&lt;br /&gt;
&lt;br /&gt;
[[File:IPv4 Wan Status.png|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are as follows.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Type&lt;br /&gt;
|DHCP  client&lt;br /&gt;
|A &#039;&#039;&#039;DHCP client&#039;&#039;&#039; is a device or  software that requests and receives configuration information from a DHCP  server, such as an IP address, gateway, and DNS servers.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Connected&lt;br /&gt;
|1h 49m 8s&lt;br /&gt;
|This indicates the duration for which the device has been connected  to the network.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Address&lt;br /&gt;
|10.62.35.111&lt;br /&gt;
|This is the &#039;&#039;&#039;IP address&#039;&#039;&#039;  assigned to the DHCP client by the DHCP server. It uniquely identifies the  device on the network.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Gateway&lt;br /&gt;
|10.62.35.144&lt;br /&gt;
|The &#039;&#039;&#039;gateway&#039;&#039;&#039; (or  default gateway) is the IP address of the network device that routes traffic  from the local network to other networks.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|DNS&lt;br /&gt;
|8.8.8.8,  10.103.81.232&lt;br /&gt;
|The first DNS server &amp;quot;8.8.8.8&amp;quot; is a public DNS server  provided by Google.&lt;br /&gt;
&lt;br /&gt;
The second DNS server &amp;quot;10.103.81.232&amp;quot; is a private DNS  server.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Active SIM Information:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This section displays SIM details only when the SIM card is active.&lt;br /&gt;
&lt;br /&gt;
[[File:IAB44C Sim Information.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Connection Tracking:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this section it displays the status of connection tracking for the device.&lt;br /&gt;
&lt;br /&gt;
[[File:Connection Tracking.png]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are as follows.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Value&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Active  Connections&lt;br /&gt;
|48/16384  (0%)&lt;br /&gt;
|This field displays the active  connection of the device.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;DHCP Leases:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this section it displays the DHCP lease of the temporary assignment of an IP address to a device on the network.&lt;br /&gt;
&lt;br /&gt;
[[File:IAB44C DHCP Leases.png]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are below.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Host Name&lt;br /&gt;
|KermaniK-LT&lt;br /&gt;
|This field displays the configured Host Name/Username for that  device.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|IPv4-Address&lt;br /&gt;
|192.168.10.147&lt;br /&gt;
|This field displays the IP address of the device.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|MAC-Address&lt;br /&gt;
|34:73:5a:bb: ab:7a&lt;br /&gt;
|This field displays the MAC-Address of the device.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Lease time remaining&lt;br /&gt;
|11h 53m 49s&lt;br /&gt;
|This field displays the lease time remaining for the device.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== 1.2 System Log ===&lt;br /&gt;
This page provides on screen System logging information. In this page the user gets to view the system logs.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A System logs.png]]&lt;br /&gt;
&lt;br /&gt;
=== 1.3 Kernel Log ===&lt;br /&gt;
This page provides on screen Kernel logging information.&lt;br /&gt;
&lt;br /&gt;
In this page the user gets to view the Kernel logs.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Kernel Logs.png]]&lt;br /&gt;
&lt;br /&gt;
= 2. Setting =&lt;br /&gt;
In this “Setting” module the user can Configure/update all the required parameters related to Network, SIM Switch, Internet, VPN, Firewall, Loopback Rule, Remote monitoring, Tunnel as per requirement.&lt;br /&gt;
&lt;br /&gt;
IT consist of 8 submodules.&lt;br /&gt;
&lt;br /&gt;
* Network&lt;br /&gt;
* VLAN&lt;br /&gt;
* Sim Switch&lt;br /&gt;
* Multi-WAN&lt;br /&gt;
* VPN&lt;br /&gt;
* Firewall&lt;br /&gt;
* Loopback Rule&lt;br /&gt;
* VRRP&lt;br /&gt;
* Remote Monitoring&lt;br /&gt;
* Tunnel&lt;br /&gt;
[[File:IAC44A Settings.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2.1 Network ===&lt;br /&gt;
In this section the user does all the setting related configuration with reference to network like Ethernet Setting, Cellular Setting, Band lock and Operator Lock, Wi-Fi, Guest Wi-Fi, Wireless Schedule etc.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Network.png]]&#039;&#039;&#039;Ethernet Setting:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ethernet Setting:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this page it will display all the configured port that is attached with the device.&lt;br /&gt;
&lt;br /&gt;
For this device 5 ports are configured.&lt;br /&gt;
&lt;br /&gt;
Ethernet mode can be configured as WAN and as LAN as well.&lt;br /&gt;
&lt;br /&gt;
Ethernet WAN Connection settings can be configured as DHCP, Static and PPOE.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Ethernet Settings.png|1723x1723px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To add a new Interface, click on ‘Add’.&lt;br /&gt;
&lt;br /&gt;
To edit the existing device the user needs to click on the edit option.&lt;br /&gt;
&lt;br /&gt;
Once the changes are done click on the update button to save all the changes.&lt;br /&gt;
&lt;br /&gt;
Click on the deleted button to delete the existing device detail.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note: If required, add an interface in Settings--&amp;gt;Multi-WAN--&amp;gt;Failover&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A EWAN Settings.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:  &#039;&#039;&#039;Type: WAN&#039;&#039;&#039;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Physical Device&lt;br /&gt;
|Ex: eth0.5&lt;br /&gt;
|This indicates a network interface on which our  network is connected. This setting is by default (Editable).&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Type&lt;br /&gt;
|&#039;&#039;&#039;WAN&#039;&#039;&#039;/LAN&lt;br /&gt;
|This designates whether the interface is part  of the WAN or LAN.&lt;br /&gt;
&lt;br /&gt;
WAN: Connects the device to the internet.&lt;br /&gt;
&lt;br /&gt;
LAN: Connects the device to the internal  network.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |                                                                      &#039;&#039;&#039;Protocol: Static&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Static IP Address&lt;br /&gt;
|Ex: 192.168.1.10&lt;br /&gt;
|The manually assigned IP address for the  interface.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Static Netmask&lt;br /&gt;
|Ex: 255.255.255.0&lt;br /&gt;
|Subnet mask corresponding to the IP address.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Static Gateway&lt;br /&gt;
|Ex: 192.168.1.1&lt;br /&gt;
|The IP address of the gateway (router) that the  interface will use to send traffic outside its own subnet.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |                                                                      &#039;&#039;&#039;Protocol: DHCP&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|DHCP Gateway&lt;br /&gt;
|Ex: 10.1.1.1&lt;br /&gt;
|The IP address of the DHCP server (often the  same as the router or gateway).&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |                                                                      &#039;&#039;&#039;Protocol: PPPoE&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Username&lt;br /&gt;
|Any Name&lt;br /&gt;
|The username provided by your ISP for PPPoE  authentication.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Password&lt;br /&gt;
|*****&lt;br /&gt;
|The password provided by your ISP for PPPoE  authentication.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Access Concentrator&lt;br /&gt;
|&lt;br /&gt;
|Typically, the name of the ISP&#039;s PPPoE server.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Service Name&lt;br /&gt;
|&lt;br /&gt;
|Sometimes required by ISPs, this field  specifies a particular service offered by the ISP.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Gateway&lt;br /&gt;
|Ex: 0.0.0.0&lt;br /&gt;
|The IP address used as the default route.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Override MAC Address&lt;br /&gt;
|Ex: D0:93:95:B0:CF:7A&lt;br /&gt;
|The MAC address for this interface is set to a  custom value, replacing the default hardware address.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Enable Bridge&lt;br /&gt;
|1.       CWAN1_0&lt;br /&gt;
&lt;br /&gt;
2.       SW_LAN&lt;br /&gt;
&lt;br /&gt;
3.       VPN&lt;br /&gt;
&lt;br /&gt;
4.       ra0 &lt;br /&gt;
&lt;br /&gt;
|Since this is a WAN interface, it is not  typically bridged with others. Bridges are more common for LAN interfaces to  combine multiple connections.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|Create Firewall Zone&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|You can assign this interface to a particular  firewall zone, which determines its access rules (e.g., WAN zone for internet  traffic, LAN zone for internal traffic).&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |&#039;&#039;&#039;Advanced Settings: Enable/Disable&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|15&lt;br /&gt;
|IPv4 Route Table&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|This field is used to specify static routes for  IPv4.&lt;br /&gt;
|-&lt;br /&gt;
|16&lt;br /&gt;
|Table No.&lt;br /&gt;
|&#039;&#039;&#039;254&#039;&#039;&#039;: Default  main routing table.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;100&#039;&#039;&#039;: Custom  routing table for specific purposes.&lt;br /&gt;
|&#039;&#039;&#039;Default Table (Main Table)&#039;&#039;&#039;: Usually, there is a default routing table  (often Table No. 254 or 255) where all the routes are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Custom Table&#039;&#039;&#039;: You can  specify a different table number if you are managing multiple routing  policies (e.g., VoIP traffic, VPN traffic).&lt;br /&gt;
|-&lt;br /&gt;
|17&lt;br /&gt;
|Gateway Metric&lt;br /&gt;
|Ex: 1&lt;br /&gt;
|A numeric value used to prioritize gateways  when multiple are available.&lt;br /&gt;
&lt;br /&gt;
Lower metrics indicate higher priority. For  example, if two gateways exist, the one with the smaller metric is used.&lt;br /&gt;
|-&lt;br /&gt;
|18&lt;br /&gt;
|Broadcast&lt;br /&gt;
|Ex: 192.168.123.34&lt;br /&gt;
|Broadcast address for the network, typically  calculated based on the IP and subnet mask.&lt;br /&gt;
|-&lt;br /&gt;
|19&lt;br /&gt;
|Override MTU&lt;br /&gt;
|Ex: 1500&lt;br /&gt;
|MTU size controls the maximum packet size that  can be sent over the network.&lt;br /&gt;
&lt;br /&gt;
Default is usually 1500 bytes.&lt;br /&gt;
|-&lt;br /&gt;
|20&lt;br /&gt;
|Force Link&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Forces the interface to be up even if no  physical link is detected.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Type: LAN&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A LAN Settings.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Physical Device&lt;br /&gt;
|Ex: eth0.1&lt;br /&gt;
|This is the network interface identifier.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Type&lt;br /&gt;
|WAN/&#039;&#039;&#039;LAN&#039;&#039;&#039;&lt;br /&gt;
|This designates whether the interface is part  of the WAN or LAN.&lt;br /&gt;
&lt;br /&gt;
WAN: Connects the device to the internet.&lt;br /&gt;
&lt;br /&gt;
LAN: Connects the device to the internal  network.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Protocol&lt;br /&gt;
|Static&lt;br /&gt;
|This means that the IP address, netmask, and  other network settings are manually configured rather than being  automatically assigned by a DHCP server.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|IP Address&lt;br /&gt;
|Ex: 192.168.10.1&lt;br /&gt;
|This is the static IP address assigned to the  interface. It acts as the gateway IP address for devices connected to this  LAN.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Static Netmask&lt;br /&gt;
|Ex: 255.255.255.0&lt;br /&gt;
|This is the subnet mask for the network.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Override MAC Address&lt;br /&gt;
|D0:93:95:B0:CF:7B&lt;br /&gt;
|This allows you to manually enter a different  MAC address if needed.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Enable DNS&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|If this option is enabled, the interface will  act as a DNS resolver for the devices on the LAN, using the specified DNS  server.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|DNS Server Address&lt;br /&gt;
|Ex: 8.8.8.8&lt;br /&gt;
|This is the IP address of the DNS server that  will be used by devices on the LAN to resolve domain names to IP addresses.&lt;br /&gt;
&lt;br /&gt;
More than one DNS Address can be added.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Enable DHCP Server&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|If enabled, this setting allows the interface  to function as a DHCP server, automatically assigning IP addresses to devices  connected to the LAN.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|DHCP Start Address&lt;br /&gt;
|50&lt;br /&gt;
|The DHCP server will begin assigning IP  addresses starting from 192.168.10.50&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|DHCP Limit&lt;br /&gt;
|100&lt;br /&gt;
|This specifies the number of IP addresses the  DHCP server can assign. Starting at 192.168.10.50 and with a limit of 100,  the server can assign addresses up to 192.168.10.149.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Lease Time Duration&lt;br /&gt;
|Hours-(H)&lt;br /&gt;
&lt;br /&gt;
Minutes-(M)&lt;br /&gt;
&lt;br /&gt;
Seconds-(S)&lt;br /&gt;
|&#039;&#039;&#039;Hours-(H)&#039;&#039;&#039;: This indicates  that the lease time for each IP address assignment is measured in hours.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Minutes-(M):&#039;&#039;&#039; This  indicates that the lease time for each IP address assignment is measured in minutes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Seconds-(S):&#039;&#039;&#039; This  indicates that the lease time for each IP address assignment is measured in seconds.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|Lease Time&lt;br /&gt;
|12&lt;br /&gt;
|The DHCP lease time is set to 12 hours. After  this period, a device must renew its IP address lease with the DHCP server to  continue using the assigned IP address.&lt;br /&gt;
|-&lt;br /&gt;
|15&lt;br /&gt;
|Enable Bridge&lt;br /&gt;
|1.       CWAN1_0&lt;br /&gt;
&lt;br /&gt;
2.       SW_LAN&lt;br /&gt;
&lt;br /&gt;
3.       VPN&lt;br /&gt;
&lt;br /&gt;
4.       ra0 &lt;br /&gt;
&lt;br /&gt;
|Since this is a WAN interface, it is not  typically bridged with others. Bridges are more common for LAN interfaces to  combine multiple connections.&lt;br /&gt;
|-&lt;br /&gt;
|16&lt;br /&gt;
|Enable DHCP Relay&lt;br /&gt;
|Enter Relay Server IP&lt;br /&gt;
|Forwards DHCP requests from devices in this  subnet to an external DHCP server instead of using the built-in DHCP server.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|17&lt;br /&gt;
|Create Firewall Zone&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|You can assign this interface to a particular  firewall zone, which determines its access rules (e.g., WAN zone for internet  traffic, LAN zone for internal traffic).&lt;br /&gt;
|-&lt;br /&gt;
|18&lt;br /&gt;
|Internet Over SW_LAN&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Allow all outbound traffic from the LAN to the  internet.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |&#039;&#039;&#039;Advanced Settings: Enable/Disable&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|19&lt;br /&gt;
|IPv4 Route Table&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|This field is used to specify static routes for  IPv4.&lt;br /&gt;
|-&lt;br /&gt;
|20&lt;br /&gt;
|Table No.&lt;br /&gt;
|&#039;&#039;&#039;254&#039;&#039;&#039;: Default  main routing table.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;100&#039;&#039;&#039;: Custom  routing table for specific purposes.&lt;br /&gt;
|&#039;&#039;&#039;Default Table (Main Table)&#039;&#039;&#039;: Usually, there is a default routing table  (often Table No. 254 or 255) where all the routes are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Custom Table&#039;&#039;&#039;: You can  specify a different table number if you are managing multiple routing  policies (e.g., VoIP traffic, VPN traffic).&lt;br /&gt;
|-&lt;br /&gt;
|21&lt;br /&gt;
|Gateway Metric&lt;br /&gt;
|Ex: 1&lt;br /&gt;
|A numeric value used to prioritize gateways  when multiple are available.&lt;br /&gt;
&lt;br /&gt;
Lower metrics indicate higher priority. For  example, if two gateways exist, the one with the smaller metric is used.&lt;br /&gt;
|-&lt;br /&gt;
|22&lt;br /&gt;
|Broadcast&lt;br /&gt;
|Ex: 192.168.123.34&lt;br /&gt;
|Broadcast address for the network, typically  calculated based on the IP and subnet mask.&lt;br /&gt;
|-&lt;br /&gt;
|23&lt;br /&gt;
|Override MTU&lt;br /&gt;
|Ex: 1500&lt;br /&gt;
|MTU size controls the maximum packet size that  can be sent over the network.&lt;br /&gt;
&lt;br /&gt;
Default is usually 1500 bytes.&lt;br /&gt;
|}&lt;br /&gt;
Save and Update once configuration changes have been made.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Relay Server:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A relay server typically functions in a network to forward requests (usually DHCP or DNS) from clients to&lt;br /&gt;
&lt;br /&gt;
a designated server when the server is on a different network segment.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Relay Server.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To edit the existing device the user needs to click on the edit option.&lt;br /&gt;
&lt;br /&gt;
Once the changes are done click on the save button to save all the changes.&lt;br /&gt;
&lt;br /&gt;
Click on the deleted button to delete the existing device detail.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Relay Server Edit.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Interface&lt;br /&gt;
|1.)     eth0.1&lt;br /&gt;
&lt;br /&gt;
2.)     ra0&lt;br /&gt;
|1) eth0.1  typically represents a VLAN where the relay will listen for client requests.&lt;br /&gt;
&lt;br /&gt;
2) If your  device is broadcasting a Wi-Fi network on the ra0 interface, any DHCP or DNS  relay settings will apply to devices connected via this wireless interface.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Start IP  Address&lt;br /&gt;
|Ex: 192.168.10.100&lt;br /&gt;
|This is the  beginning IP address of the range that will be leased out to clients.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|End IP  Address&lt;br /&gt;
|Ex: 192.168.10.150&lt;br /&gt;
|An IP address  that is in the same subnet as the Start IP Address and allows sufficient  addresses to be leased.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Netmask&lt;br /&gt;
|Ex: 255.255.255.0&lt;br /&gt;
|A valid  subnet mask such as 255.255.255.0 (for a /24 network), or 255.255.0.0 (for a  /16 network).&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Lease Time&lt;br /&gt;
|For a 24-hour  lease time, set this value to 86400.&lt;br /&gt;
|This is the  amount of time that an IP address is assigned to a client before it needs to  request a renewal from the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
Save and update.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cellular Setting:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this page, the user needs to configure the various details with respect to the SIM.&lt;br /&gt;
&lt;br /&gt;
Select single cellular single sim where the user must configure the APN details of the sim used for the router device. The Configurations can be done based on the SIM usage, with respect to IPV4 or IPV6.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Cellular Settings.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Cellular Enable&lt;br /&gt;
|Checkbox&lt;br /&gt;
|Check this box to  enable cellular functionality.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Cellular  Operation Mode&lt;br /&gt;
|1.) Single Cellular with Dual Sim&lt;br /&gt;
&lt;br /&gt;
2.) Single Cellular with  Single SIM&lt;br /&gt;
|1.) This mode  allows you to use one cellular modem with two SIM cards.&lt;br /&gt;
&lt;br /&gt;
2.) This mode allows you to  use one cellular modem with single SIM card.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Cellular  Modem 1&lt;br /&gt;
|QuectelEC200A&lt;br /&gt;
|This  field displays the modem name.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Choose SIM 1 APN Mode&lt;br /&gt;
|1.) Auto&lt;br /&gt;
&lt;br /&gt;
2.)  Manual&lt;br /&gt;
|1.) Choose  Auto for regular SIM to detect APN name automatically.&lt;br /&gt;
&lt;br /&gt;
2.) Choose manual to enter the APN settings manually in case of  M2M SIM cards.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|SIM 1 Access Point Name&lt;br /&gt;
|airtelgprs.com&lt;br /&gt;
|Enter the APN provided  by your cellular service provider in case of M2M sim. For regular sim cards  APN name will be displayed automatically.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|SIM 1 PDP Type&lt;br /&gt;
|IPV4&lt;br /&gt;
|Choose the PDP  type, which is typically either IPv4 or IPv6 depending on the sim card.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|SIM 1 Username&lt;br /&gt;
|&lt;br /&gt;
|Enter the username if required by the APN.  Leave blank if not required.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|SIM 1 Password&lt;br /&gt;
|&lt;br /&gt;
|Enter the password if required by the  APN. Leave blank if not required.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|SIM 1 Authentication Protocol&lt;br /&gt;
|None&lt;br /&gt;
|Choose the  authentication protocol. Options typically include None, PAP, or CHAP.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|SIM 1 MTU&lt;br /&gt;
|Ex: 1500 (a common MTU size)&lt;br /&gt;
|&#039;&#039;&#039;MTU  (Maximum Transmission Unit)&#039;&#039;&#039; defines the largest size of a data packet  that can be transmitted over the network.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Choose SIM 2 APN Mode&lt;br /&gt;
|1.) Auto&lt;br /&gt;
&lt;br /&gt;
2.) Manual&lt;br /&gt;
|1.) Choose  Auto for regular SIM to detect APN name automatically.&lt;br /&gt;
&lt;br /&gt;
2.) Choose manual to enter the APN settings manually in case of  M2M SIM cards.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|SIM 2 Access Point Name&lt;br /&gt;
|airtelgprs.com&lt;br /&gt;
|Enter the APN  provided by your cellular service provider in case of M2M sim. For regular  sim cards APN name will be displayed automatically.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|SIM 2 PDP Type&lt;br /&gt;
|IPV4&lt;br /&gt;
|Choose the  PDP type, which is typically either IPv4 or IPv6 depending on the sim card.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|SIM 2 Username&lt;br /&gt;
|&lt;br /&gt;
|Enter the  username if required by the APN. Leave blank if not required.&lt;br /&gt;
|-&lt;br /&gt;
|15&lt;br /&gt;
|SIM 2 Password&lt;br /&gt;
|&lt;br /&gt;
|Enter the  password if required by the APN. Leave blank if not required.&lt;br /&gt;
|-&lt;br /&gt;
|16&lt;br /&gt;
|SIM 2 Authentication Protocol&lt;br /&gt;
|None&lt;br /&gt;
|Choose the  authentication protocol. Options typically include None, PAP, or CHAP.&lt;br /&gt;
|-&lt;br /&gt;
|17&lt;br /&gt;
|SIM 2 MTU&lt;br /&gt;
|Ex: 1500 (a common MTU size)&lt;br /&gt;
|&#039;&#039;&#039;MTU  (Maximum Transmission Unit)&#039;&#039;&#039; defines the largest size of a data packet  that can be transmitted over the network.&lt;br /&gt;
|-&lt;br /&gt;
|18&lt;br /&gt;
|Primary SIM Switchback Enable&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|When enabled,  the device will automatically switch back to the primary SIM (SIM 1) after  switching to SIM 2, under certain conditions (e.g., SIM 1 regains network  availability).&lt;br /&gt;
|-&lt;br /&gt;
|19&lt;br /&gt;
|Primary SIM Switchback Time (In Minutes)&lt;br /&gt;
|10&lt;br /&gt;
|Enter the  time in minutes after which the system should switch back to the primary SIM  if it becomes available.&lt;br /&gt;
|}&lt;br /&gt;
After configuring all the required information, the user should click on the save and then click on the update to update the all the required information. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Band lock and Operator Lock:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this page, the user needs to configure the lock band and operator based on the service provider&#039;&#039;&#039;.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Bands available in the drop-down list.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Band lock and operator Lock.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2G/3G option:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
2G/3G: - 3G allows additional features such as mobile internet access, video calls and mobile TV.&lt;br /&gt;
&lt;br /&gt;
While the main function of 2G technology is the transmission of information through voice calls.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Band Lock.png]]&lt;br /&gt;
&lt;br /&gt;
The user should select the band check box available for 2g/3g from the given list. Bands available for selection under LTE for the bands available in that area.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operator Selection Mode:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The user needs to click on the check box of the “operator select enable” to select the operator.&lt;br /&gt;
&lt;br /&gt;
Once the check box is clicked there will be a dropdown list of the operator modes from which the user needs to select the mode. The user needs to select the operator mode from the given dropdown list.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Operator Selection Mode.png]]&lt;br /&gt;
&lt;br /&gt;
If the user selects the mode “Manual” or “Manual-Automatic” then one more text box will appear where the user must provide the operator code. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Operator Code.png]] &lt;br /&gt;
&lt;br /&gt;
After configuring all the required information, the user should click on the save and then click on the update to update the all the required information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Wi-Fi Setting:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this, router has the general setting and change country code, channel, radio mode, radio passphrase as per the requirement after clicking on enable Radio button.&lt;br /&gt;
&lt;br /&gt;
The user needs to select the respective radio mode based on its need.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A WiFi Settings.png]]&lt;br /&gt;
&lt;br /&gt;
It has 3 radio modes:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.) Access Point&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2.) Client only&#039;&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3.) Access Point and Client&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Access Point and Client.png|1327x1327px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Access Point:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In Access Point mode, a configuration in which a router, allows wireless devices to connect to a wired network by creating a Wi-Fi hotspot. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Access point.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Client point:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
In client mode, the access point connects your wired devices to a wireless network. This mode is suitable when you have a wired device with an Ethernet port and no wireless capability, for example, a smart TV, Media Player, or Game console and you want to connect it to the internet wirelessly, select the Client Mode and give the Radio SSID &amp;amp; client passphrase.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Client Only.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Access point and client point&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
Select this option for both type of connection, give both SSID and passphrase.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Access Point and Client Point.png]]&lt;br /&gt;
&lt;br /&gt;
After configuring all the required information, the user should click on the save and then click on the update to update the all the required information.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Radio 0 Protocol&lt;br /&gt;
|IEEE 802.11 b/g/n&lt;br /&gt;
|This section shows the radio protocol  which is by default.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Country Code&lt;br /&gt;
|INDIA&lt;br /&gt;
|Select  the country accordingly.&lt;br /&gt;
&lt;br /&gt;
(INDIA by default)&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Channel&lt;br /&gt;
|Auto&lt;br /&gt;
|In this dropdown the user should  select the proper channel to be used. (Auto by default)&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|TX Power&lt;br /&gt;
|100&lt;br /&gt;
|In this text box the user should  specify the power.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Channel Width&lt;br /&gt;
|20 MHz&lt;br /&gt;
|In this dropdown the user should  select the channel width&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Radio Mode&lt;br /&gt;
|1.) Access point&lt;br /&gt;
&lt;br /&gt;
2.) Client only&lt;br /&gt;
&lt;br /&gt;
3.) Access point and client&lt;br /&gt;
|In this drop down the user should select the mode.&lt;br /&gt;
&lt;br /&gt;
(Access point by default)&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Radio SSID&lt;br /&gt;
|AP_37A26230014&lt;br /&gt;
|In this text box the user should  specify the SSID number which usually comes with the router.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Radio Authentication&lt;br /&gt;
|WPA2 Personal (PSK)&lt;br /&gt;
|In this dropdown the user should select the type of authentication.&lt;br /&gt;
&lt;br /&gt;
(WPA2 Personal (PSK) by default)&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Radio Encryption&lt;br /&gt;
|AES&lt;br /&gt;
|In this dropdown the user should select the type of encryption  required.&lt;br /&gt;
&lt;br /&gt;
(AES by default)&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Radio Passphrase&lt;br /&gt;
|*********&lt;br /&gt;
|In this text box the user should  specify the password. Password will be given with the router which can be  changed later.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Radio DHCP server IP&lt;br /&gt;
|192.168.100.1&lt;br /&gt;
|In this text box the user should specify the IP address of DHCP  server.&lt;br /&gt;
&lt;br /&gt;
(192.168.100.1  will be default which can be changed accordingly)&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Radio DHCP start address&lt;br /&gt;
|100&lt;br /&gt;
|In this text box the user should specify the start address of the  DHCP.&lt;br /&gt;
&lt;br /&gt;
(100 value is default)&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Radio DHCP limit&lt;br /&gt;
|50&lt;br /&gt;
|In this text box the user should specify the limit for the DHCP.&lt;br /&gt;
&lt;br /&gt;
(50 value is default)&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|WMM Enable&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Wi-Fi Multimedia (WMM) improves performance for  applications that require low latency and consistent throughput.&lt;br /&gt;
|-&lt;br /&gt;
|15&lt;br /&gt;
|Enable DHCP Relay&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|&#039;&#039;&#039;DHCP Relay&#039;&#039;&#039;  allows a device to forward DHCP requests from clients to a remote DHCP server  located on a different subnet.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once changes have been made.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Guest Wifi:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This option enables a separate Wi-Fi network for guests, isolated from the main network to enhance security and privacy. Guest Wi-Fi allows visitors or temporary users to connect to your network without accessing the main LAN resources.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A GUest Wifi.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Wireless Schedule:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi can be automatically withdrawn based on the configuration done in this section.&lt;br /&gt;
&lt;br /&gt;
The user can schedule the Wi-Fi’s accessibility time during a particular period.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note:&#039;&#039;&#039; This section is turned off by default, tick the box to activate it.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Wireless Schedule.png]]After configuring all the required information, the user should click on save and then click on update to update all the required information.&lt;br /&gt;
&lt;br /&gt;
The user can select more than one “day of the week” for scheduling the Wi-Fi working hours.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Wi-Fi Schedule settings.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SMS Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
User needs to enable SMS option in SMS settings page.&lt;br /&gt;
&lt;br /&gt;
This option is to validate the mobile numbers using which controlling commands could be sent to the router device.&lt;br /&gt;
&lt;br /&gt;
1 to 5 mobile numbers can be authenticated by choosing from “Select Valid SMS user numbers” and&lt;br /&gt;
&lt;br /&gt;
adding the mobile numbers below respectively.&lt;br /&gt;
&lt;br /&gt;
API key is the pass key used in the commands while sending SMS.&lt;br /&gt;
&lt;br /&gt;
Displayed in the below screen is the default API key which can be edited and changed as per choice.&lt;br /&gt;
&lt;br /&gt;
After addition of the mobile number’s user needs to click on save button for changes to take place. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A SMS Settings.png]] &lt;br /&gt;
&lt;br /&gt;
1.) Select valid user number max. 5 and add authorized phone number in the tab where you want to find the alert and click on &#039;&#039;&#039;‘SMS Response Enable’&#039;&#039;&#039;, &#039;&#039;&#039;‘save’&#039;&#039;&#039; and &#039;&#039;&#039;‘update’&#039;&#039;&#039; button.&lt;br /&gt;
&lt;br /&gt;
2.) Now send SMS commands from the configured mobile number.&lt;br /&gt;
&lt;br /&gt;
3.) Once the commands are received from the user phone number the board will send acknowledgement as per the commands.&lt;br /&gt;
&lt;br /&gt;
4.) After that it will send the router’s status once it has rebooted and is operational again.&lt;br /&gt;
&lt;br /&gt;
Mentioned below are a few commands which can be sent from the configured mobile number to the router device. Below two commands are One for rebooting the router device and another to get the uptime.&lt;br /&gt;
&lt;br /&gt;
1) {&amp;quot;device”: [&amp;quot;passkey”, “API key&amp;quot;],&amp;quot;command&amp;quot;:&amp;quot;reboot&amp;quot;,&amp;quot;arguments&amp;quot;:&amp;quot;hardware&amp;quot;}&lt;br /&gt;
&lt;br /&gt;
2) {&amp;quot;device”: [&amp;quot;passkey &amp;quot;,&amp;quot;API key&amp;quot;],&amp;quot;command”: “uptime&amp;quot;}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Loop back IP settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The loopback IP address, often referred to as “localhost.” it is used to establish network connections within the same device for testing and troubleshooting purpose.&lt;br /&gt;
&lt;br /&gt;
The loopback IP address, commonly represented as 127.0.0.1, is a special address used for testing network connectivity on a local machine.&lt;br /&gt;
&lt;br /&gt;
It allows a device to send network messages to itself without involving external networks, making it useful for troubleshooting and diagnostics.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
However, this IP can be changed as per requirement and to do that, Navigating to Setting&amp;gt;&amp;gt;Network configuration&amp;gt;&amp;gt; Loopback IP settings can be changed/updated.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Loopbackip Settings.png|1398x1398px]]&lt;br /&gt;
&lt;br /&gt;
After configuring all the required information, the user should click on the save and then click on the update to update the all the required information.&lt;br /&gt;
&lt;br /&gt;
=== 2.2 VLAN ===&lt;br /&gt;
&#039;&#039;&#039;VLAN (Virtual Local Area Network)&#039;&#039;&#039; is a network within a network that segregates traffic into different logical networks on the same physical hardware. VLANs help in managing traffic more effectively and securely.&lt;br /&gt;
&lt;br /&gt;
It is further divided into 2 sections,&lt;br /&gt;
&lt;br /&gt;
Port-Based VLAN&lt;br /&gt;
&lt;br /&gt;
Tagged Port Configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Port-Based VLAN:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A VLAN configuration method where network ports are assigned to specific VLANs.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Port Based VLAN.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To add a new VLAN ID, click on ‘Add Device’.&lt;br /&gt;
&lt;br /&gt;
To edit the existing device the user needs to click on the edit option.&lt;br /&gt;
&lt;br /&gt;
Once the changes are done click on the save button to save all the changes.&lt;br /&gt;
&lt;br /&gt;
Click on the deleted button to delete the existing device detail.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A VLAN Port based Configuration Settings.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|&#039;&#039;&#039;VLAN ID&#039;&#039;&#039;&lt;br /&gt;
|1&lt;br /&gt;
|This is a unique identifier for a VLAN within a  network.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|&#039;&#039;&#039;Port 0&#039;&#039;&#039;&lt;br /&gt;
|Untagged&lt;br /&gt;
|When a port is set as untagged for a VLAN, it  means that traffic entering or exiting this port is automatically associated  with that VLAN without any VLAN tags being added to the frames.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|&#039;&#039;&#039;Port 1&#039;&#039;&#039;&lt;br /&gt;
|Untagged&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|&#039;&#039;&#039;Port 2&#039;&#039;&#039;&lt;br /&gt;
|tagged&lt;br /&gt;
|When a port is set as tagged for a VLAN, it  means that traffic on this port will include VLAN tags in the Ethernet  frames. These tags carry the VLAN ID, allowing switches and other devices to  know which VLAN the traffic belongs to.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|&#039;&#039;&#039;Port 3&#039;&#039;&#039;&lt;br /&gt;
|Untagged&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|&#039;&#039;&#039;Port 4&#039;&#039;&#039;&lt;br /&gt;
|OFF&lt;br /&gt;
|When a port is marked as off for a VLAN, it  means that the port is not participating in that VLAN at all. It will neither  send nor receive traffic associated with that VLAN.&lt;br /&gt;
|}&lt;br /&gt;
Save and update the page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tagged Port Configuration:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Tagged port Configuration.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To add a new VLAN ID, click on ‘Add Device’.&lt;br /&gt;
&lt;br /&gt;
To edit the existing device the user needs to click on the edit option.&lt;br /&gt;
&lt;br /&gt;
Click on the deleted button to delete the existing device detail.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A VLAN Tag Based Configuration Settings.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Type&lt;br /&gt;
|802.1Q&lt;br /&gt;
|&#039;&#039;&#039;IEEE 802.1Q&#039;&#039;&#039; is the  standard protocol for VLAN tagging in Ethernet networks.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Parent Interface&lt;br /&gt;
|Port 2&lt;br /&gt;
|It is the underlying physical interface like  port 2 that carries the VLAN-tagged traffic.&lt;br /&gt;
|}&lt;br /&gt;
Save and update the page.&lt;br /&gt;
&lt;br /&gt;
=== 2.3 SIM Switch ===&lt;br /&gt;
In this page the user needs to configure the Sim for the given device.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A SIM Switch.png]]&lt;br /&gt;
&lt;br /&gt;
The user needs to select from the drop-down menu on which basis the sim needs to be switched.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Sim Switch Settings.png]]&lt;br /&gt;
&lt;br /&gt;
Once the user selects on “&#039;&#039;&#039;signal strength&#039;&#039;&#039;” then the parameters related to signal strength will pop up and the user needs to configure the parameters based on the requirement.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Sim Switch Configuration.png|1483x1483px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Threshold RSRP:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This Needs to be set appropriately. Incorrect setting may cause unnecessary SIM switching. (In General, a BAD RSRP value range is -140 to -115 and FAIR RSRP value range is -115 to -105).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Threshold SINR:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This Needs to be set appropriately. Incorrect setting may cause unnecessary SIM switching. (In General, a BAD SNR value range is -20 to 0 and FAIR SNR value range is 0 to 13)&lt;br /&gt;
&lt;br /&gt;
Once the user selects on “&#039;&#039;&#039;Data Limit&#039;&#039;&#039;” then the parameters related to Data Limit will pop up and the user needs to configure the parameters based on the requirement.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Sim switch based on Data Limit.png|1483x1483px]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|SIM Switch Based on&lt;br /&gt;
|Data Limit&lt;br /&gt;
|The user needs to select from the drop-down  menu on what basis the sim needs to be switched.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|SIM 1 Data Usage Limit (In MB)&lt;br /&gt;
|1000&lt;br /&gt;
|The user needs to  set the limit for the data usage for SIM 1.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|SIM 2 Data Usage Limit (In MB)&lt;br /&gt;
|1000&lt;br /&gt;
|The user needs to  set the limit for the data usage for SIM 2.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Periodicity&lt;br /&gt;
|Daily&lt;br /&gt;
|The user needs to  set the pattern/frequency to switch the sims.&lt;br /&gt;
|}&lt;br /&gt;
After configuring all the required information, the user should click on the save.&lt;br /&gt;
&lt;br /&gt;
=== 2.4 Multi-WAN ===&lt;br /&gt;
As shown below, this section has 4 categories,&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Status&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General settings&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Failover&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Load Balancing&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Multiwan .png]]&lt;br /&gt;
&lt;br /&gt;
In &#039;&#039;&#039;‘Status’&#039;&#039;&#039; tab user can see the active network connections on the device as shown above.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In general settings, select any one option from the drop-down menu which you wish to imply and click on save and update.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Multi-WAN Configuration.png]]Click on save and update.    &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Failover:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE:&#039;&#039;&#039; Please verify that the name to be added is in the interface section of the status tab. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Failover.png]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Priority settings.png]]&lt;br /&gt;
&lt;br /&gt;
The specifications details are below.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Priority&lt;br /&gt;
|Ex: 5&lt;br /&gt;
|Setting a priority of 1 means this connection  has the highest priority and will be used before any others with a higher  priority number.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Select Track IP Numbers&lt;br /&gt;
|2&lt;br /&gt;
|In this dropdown the user needs to select the  track number for the Ips. This specifies the number of IP addresses  that will be used for tracking the status of the connection.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|TrackIP1&lt;br /&gt;
|8.8.8.8&lt;br /&gt;
|The system  will ping this IPV4 IP address to check if the connection is up and working.  You can even add any whitelisted IP.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|TrackIP2&lt;br /&gt;
|8.8.4.4&lt;br /&gt;
|The system  will ping this IPV4 IP address to check if the connection is up and working.  You can even add any whitelisted IP.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Reliability&lt;br /&gt;
|1&lt;br /&gt;
|If  reliability is set to 1, it might mean the connection is considered reliable  if it successfully pings at least one of the tracked IP addresses.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Count&lt;br /&gt;
|1&lt;br /&gt;
|Setting Count  to 1 means the device will send one ping to each IP address to check for  connectivity.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Up&lt;br /&gt;
|3&lt;br /&gt;
|If set to 3,  the connection will be considered &amp;quot;up&amp;quot; only if all three pings are  successful.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Down&lt;br /&gt;
|3&lt;br /&gt;
|If set to 3,  the connection will be considered &amp;quot;down&amp;quot; if all three pings fail.&lt;br /&gt;
|}&lt;br /&gt;
Click on save and update tab.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Load Balancing:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Load balancing is a network management technique used to distribute traffic across multiple network connections or servers to optimize resource use, maximize throughput, minimize response time, and ensure reliability.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Task&#039;&#039;&#039;: Distributes network traffic evenly across multiple connections (e.g., multiple WAN links) or servers.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Purpose&#039;&#039;&#039;: This ensures that no single connection or server is overwhelmed with too much traffic, which could lead to congestion and slower performance.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Load Balancing.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Loadbalancing Edit.png]]Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Traffic Distribution Ratio&lt;br /&gt;
|Ex: 60%&lt;br /&gt;
|If you have  two connections and set one to 60% and the other to 40%, traffic will be  distributed accordingly.&lt;br /&gt;
&lt;br /&gt;
The ratio must be the same for CWAN1_0 and CWAN1_1.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Select Track IP Numbers&lt;br /&gt;
|2&lt;br /&gt;
|The system  will track two IP addresses to determine if the network connection is active  and reliable.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|TrackIP1&lt;br /&gt;
|8.8.8.8&lt;br /&gt;
|The system  will ping this IPV4 IP address to check if the connection is up and working.  You can even add any whitelisted IP.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|TrackIP2&lt;br /&gt;
|8.8.4.4&lt;br /&gt;
|The system  will ping this IPV4 IP address to check if the connection is up and working.  You can even add any whitelisted IP.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Reliability&lt;br /&gt;
|1&lt;br /&gt;
|With a  reliability setting of 1, the connection might be considered reliable if at  least one ping is successful.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Count&lt;br /&gt;
|1&lt;br /&gt;
|The system  will send one ping to each tracked IP to check the connection&#039;s status.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Up&lt;br /&gt;
|3&lt;br /&gt;
|The system  requires 3 successful pings for the connection to be marked as  &amp;quot;up.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Down&lt;br /&gt;
|3&lt;br /&gt;
|If 3 pings  fail, the system will mark the connection as &amp;quot;down,&amp;quot; and it may  switch to an alternate connection if available.&lt;br /&gt;
|}&lt;br /&gt;
Click on save and update tab.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2.5 VPN ===&lt;br /&gt;
VPN stands for &#039;&#039;&#039;Virtual Private Network&#039;&#039;&#039;, it establishes a connection between the system and a remote server, which is owned by a VPN provider.&lt;br /&gt;
&lt;br /&gt;
Creating a point-to-point tunnel that encrypts the personal data, masks the IP address, and allows to block the required website to blocks via firewalls on the internet.&lt;br /&gt;
&lt;br /&gt;
Navigate to settings &amp;gt;= VPN, general settings and you will see all VPN options you wish to use.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A VPN.png]]&lt;br /&gt;
&lt;br /&gt;
There are 7 types of setting available under VPN configuration.&lt;br /&gt;
&lt;br /&gt;
* General Settings&lt;br /&gt;
* IPSEC&lt;br /&gt;
* Open VPN&lt;br /&gt;
* Wireguard&lt;br /&gt;
* Zerotier&lt;br /&gt;
* PPTP&lt;br /&gt;
* L2TP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this page the user must choose which type of VPN connection is required for the device. The user must select from the above VPN based on its requirement. If required, the user can select all the options. The user needs to click on the save after selecting the option based on its use. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A VPN Configuration.png|1363x1363px]] &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPSEC:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
IPSEC VPN is used to create a VPN connection between local and remote networks.&lt;br /&gt;
&lt;br /&gt;
To use IPSEC VPN, the user should check that both local and remote routers support IPSEC VPN feature.&lt;br /&gt;
&lt;br /&gt;
In this page the user can add/edit/delete the IPSEC VPN connection for the device.&#039;&#039;*Refer the image below*&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A IPsec.png]]&lt;br /&gt;
&lt;br /&gt;
The user needs to click on the update button once the required configuration is completed.&lt;br /&gt;
&lt;br /&gt;
In IPSEC the user needs to click on edit button to edit the configuration of an existing VPN connection.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Ipsec Configuration.png]]&lt;br /&gt;
&lt;br /&gt;
Click on update once done with configurations.&lt;br /&gt;
&lt;br /&gt;
The tunnel will show established, showing the connection has been made.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Ipsec Status.png]]&lt;br /&gt;
&lt;br /&gt;
Detailed specifications are below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|IPSEC&lt;br /&gt;
|Site to Site VPN&lt;br /&gt;
|In this dropdown the user should select the  IPSEC connection type.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|IPSEC Role&lt;br /&gt;
|Client/Server&lt;br /&gt;
|In this dropdown  box the user needs to select the IPSEC role. The device is acting as a  client in the VPN setup (in this example).&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Connection Type&lt;br /&gt;
|Tunnel&lt;br /&gt;
|In this dropdown  the user needs to select the connection type. The user should select on the  connection enable check box.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Connection mode&lt;br /&gt;
|Route/add/&#039;&#039;&#039;start&#039;&#039;&#039;/trap&lt;br /&gt;
|In this drop down  list the user should select the mode for the connection. In this example &#039;&#039;&#039;start&#039;&#039;&#039;  is selected which means the VPN connection is initiated automatically.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Remote Server IP&lt;br /&gt;
|********&lt;br /&gt;
|The IP address of the remote VPN server.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Local ID&lt;br /&gt;
|3.3.3.3&lt;br /&gt;
|The user needs to  set the local id. It is the identification for the local VPN client.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|No. of local subnets&lt;br /&gt;
|1&lt;br /&gt;
|In this dropdown  the user needs to select how many subnets will be connected.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Local Subnet 1&lt;br /&gt;
|172.16.31.25/32&lt;br /&gt;
|In this text box  the user needs to put the specific local subnet included in the VPN.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Remote id&lt;br /&gt;
|1.1.1.1&lt;br /&gt;
|In this text box  the user needs to put the id of the remote connection. It is the  identification for the remote VPN server.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|No of remote subnet&lt;br /&gt;
|1&lt;br /&gt;
|In this dropdown  the user needs to select how many subnets it will be connected remotely.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Remote subnet&lt;br /&gt;
|10.1.1.0/24&lt;br /&gt;
|In this text box  the user needs to put the address of the remote subnet. The specific  remote subnet included in the VPN.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Key exchange&lt;br /&gt;
|Ikev1&lt;br /&gt;
|In this dropdown  the user should select the which key exchange version to be selected.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Aggressive&lt;br /&gt;
|Yes/No&lt;br /&gt;
|In this dropdown  the user should select either yes or no.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|IKE Lifetime (In Seconds)&lt;br /&gt;
|86400&lt;br /&gt;
|The lifetime of the IKE phase in seconds  (1 day).&lt;br /&gt;
|-&lt;br /&gt;
|15&lt;br /&gt;
|Lifetime (in seconds)&lt;br /&gt;
|28800&lt;br /&gt;
|The lifetime of the IPsec SA (Security  Association) in seconds (8 hours).&lt;br /&gt;
|-&lt;br /&gt;
|16&lt;br /&gt;
|Enable DPD Detection&lt;br /&gt;
|&#039;&#039;&#039;1&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
0&lt;br /&gt;
|Indicates whether Dead Peer Detection is  enabled to detect a lost connection. Enable this option as per server-side  settings.&lt;br /&gt;
|-&lt;br /&gt;
|17&lt;br /&gt;
|Time Interval (In Seconds)&lt;br /&gt;
|60&lt;br /&gt;
|This option is available only if DPD  Detection is enabled. The time interval is the interval for DPD checks.&lt;br /&gt;
|-&lt;br /&gt;
|18&lt;br /&gt;
|Action&lt;br /&gt;
|&#039;&#039;&#039;Restart&#039;&#039;&#039;/clear/hold/&lt;br /&gt;
&lt;br /&gt;
trap/start&lt;br /&gt;
|&#039;&#039;&#039;Restart&#039;&#039;&#039;:  Action to take when DPD detects a lost connection (restart the connection).  Select as per server-side setting.&lt;br /&gt;
|-&lt;br /&gt;
|19&lt;br /&gt;
|Authentication Method&lt;br /&gt;
|&#039;&#039;&#039;PSK&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;PSK&#039;&#039;&#039;:  Pre-shared key is used for authentication. Select this option for  authentication as per sever side setting.&lt;br /&gt;
|-&lt;br /&gt;
|20&lt;br /&gt;
|Multiple Secrets&lt;br /&gt;
|1/&#039;&#039;&#039;0&#039;&#039;&#039;&lt;br /&gt;
|Indicates whether multiple PSK secrets  are used. Enable only if required.&lt;br /&gt;
|-&lt;br /&gt;
|21&lt;br /&gt;
|PSK Value&lt;br /&gt;
|******&lt;br /&gt;
|Pre-shared key value (masked for  security).&lt;br /&gt;
|}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|&#039;&#039;&#039;Proposal settings  Phase I&#039;&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|22&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |&#039;&#039;&#039;Encryption Algorithm&#039;&#039;&#039;&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; |AES 128&lt;br /&gt;
&lt;br /&gt;
AES 192&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;AES 256&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
3DES&lt;br /&gt;
|&#039;&#039;&#039;AES 256&#039;&#039;&#039;: Encryption algorithm  for Phase I. Select as per server-side configuration. Both server and client  should have same configuration.&lt;br /&gt;
|-&lt;br /&gt;
|23&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |Authentication Phase I&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; |SHA1&lt;br /&gt;
&lt;br /&gt;
MD5&lt;br /&gt;
&lt;br /&gt;
SHA 256&lt;br /&gt;
&lt;br /&gt;
SHA 384&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SHA 512&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;SHA 512&#039;&#039;&#039;: Authentication  algorithm for Phase I.&lt;br /&gt;
&lt;br /&gt;
Select as per  server-side configuration. Both server and client should have same  configuration.&lt;br /&gt;
|-&lt;br /&gt;
|24&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |DH Group&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; |MODP768(group1)&lt;br /&gt;
&lt;br /&gt;
MODP1024(group2)&lt;br /&gt;
&lt;br /&gt;
MODP1536(group5)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;MODP2048(group14)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
MODP3072(group15)&lt;br /&gt;
&lt;br /&gt;
MODP4096(group16)&lt;br /&gt;
|&#039;&#039;&#039;MODP2048 (group14)&#039;&#039;&#039;:  Diffie-Hellman group for key exchange.&lt;br /&gt;
&lt;br /&gt;
Select as per  server-side configuration. Both server and client should have same  configuration.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;7&amp;quot; |&#039;&#039;&#039;Proposal settings Phase II&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |25&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |Hash Algorithm&lt;br /&gt;
|AES 128&lt;br /&gt;
&lt;br /&gt;
AES 192&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;AES 256&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
3DES&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |&#039;&#039;&#039;AES 256&#039;&#039;&#039;: Encryption algorithm  for Phase II. Select as per server-side configuration. Both server and client  should have same configuration.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |26&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |Authentication Phase II&lt;br /&gt;
|SHA1&lt;br /&gt;
&lt;br /&gt;
MD5&lt;br /&gt;
&lt;br /&gt;
SHA 256&lt;br /&gt;
&lt;br /&gt;
SHA 384&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SHA 512&#039;&#039;&#039;&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |&#039;&#039;&#039;SHA 512&#039;&#039;&#039;: Authentication  algorithm for Phase II.&lt;br /&gt;
&lt;br /&gt;
Select as per  server-side configuration. Both server and client should have same  configuration.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |27&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |PFS Group&lt;br /&gt;
|MODP768(group1)&lt;br /&gt;
&lt;br /&gt;
MODP1024(group2)&lt;br /&gt;
&lt;br /&gt;
MODP1536(group5)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;MODP2048(group14)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
MODP3072(group15)&lt;br /&gt;
&lt;br /&gt;
MODP4096(group16)&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; |&#039;&#039;&#039;MODP2048 (group14)&#039;&#039;&#039;: Perfect  Forward Secrecy group.&lt;br /&gt;
&lt;br /&gt;
Select as per  server-side configuration. Both server and client should have same  configuration.&lt;br /&gt;
|}&lt;br /&gt;
Click on save and then update the page for changes to reflect.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Open VPN:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To use the VPN feature, the user should enable OpenVPN Server on the router and install and run VPN client software on the remote device.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Open VPN .png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The user needs to “upload” the respective certificate from a valid path and then click on the “Update.”&lt;br /&gt;
&lt;br /&gt;
Only the &#039;&#039;&#039;TAP&#039;&#039;&#039; connection needs a &#039;&#039;&#039;bridge&#039;&#039;&#039;. The tun connection does not require a bridge. Here we have established a &#039;&#039;&#039;TUN&#039;&#039;&#039; connection.&lt;br /&gt;
&lt;br /&gt;
By clicking on the enable/disable button, the user can start/stop the VPN connection.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Open VPN Status.png|1161x1161px]]&lt;br /&gt;
&lt;br /&gt;
VPN TUN has been established.&lt;br /&gt;
&lt;br /&gt;
Same way VPN TAP can also be established with the help of bridging.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WireGuard:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WireGuard&#039;&#039;&#039; is simple, fast, lean, and modern VPN that utilizes secure and trusted cryptography.&lt;br /&gt;
&lt;br /&gt;
Click on “Edit” to start configurations as needed.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A WireGuard.png|1171x1171px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A WireGuard Editing.png]]&lt;br /&gt;
&lt;br /&gt;
Click on the save button after the required configuration.&lt;br /&gt;
&lt;br /&gt;
Specifications details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Wireguard Role&lt;br /&gt;
|Client/Server&lt;br /&gt;
|In this dropdown box the user needs to select  the wireguard role.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|WireGuard Tunnel Over&lt;br /&gt;
|IPV4/IPV6&lt;br /&gt;
|&#039;&#039;&#039;IPV4&#039;&#039;&#039;: Use  this if your network and endpoint (WireGuard server) support only IPv4.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPV6&#039;&#039;&#039;: Use  this if your network and endpoint support IPv6.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Enable Failover&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|This option allows the VPN connection to  automatically switch to a backup connection if the primary connection fails.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Enable IPV4&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|This enables IPv4 traffic to be routed through  the WireGuard tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Enable IPV6&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Enable this if your network and the destination  support IPv6.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Listen Port&lt;br /&gt;
|51820&lt;br /&gt;
|This is the default port that WireGuard uses  to listen for incoming connections.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Endpoint Host port&lt;br /&gt;
|51820&lt;br /&gt;
|This is the  port on the WireGuard server that the client will connect to.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Peer Public key&lt;br /&gt;
|*****&lt;br /&gt;
|This is the  public key of the WireGuard server that the client uses to establish a secure  connection.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Enable Default Route&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Enable this  if you want all network traffic (not just specific routes) to be routed  through the WireGuard VPN.&lt;br /&gt;
|}&lt;br /&gt;
Save and update the page after configuration has been done.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Zerotier:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
ZeroTier is a tool that lets you create your own private network over the internet.&lt;br /&gt;
&lt;br /&gt;
Go to ZeroTier Central and sign up for a free account. &lt;br /&gt;
&lt;br /&gt;
In ZeroTier Central, click on &amp;quot;Create a Network&amp;quot;. This will generate a unique 16-digit network ID for your new network.&lt;br /&gt;
&lt;br /&gt;
Go to settings =&amp;gt; VPN, in general settings, enable ZeroTier and save.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A ZeroTier.png]]Copy and paste the unique 16-digit network ID in the edit section.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A ZeroTier 16 digit Network ID.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Click on the save button after the required configuration.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Zerotier Connection Settings.png]]&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|NetworkID&lt;br /&gt;
|Ad2769hfkw2345f4&lt;br /&gt;
|In this dropdown  box the user needs to paste the unique 16-digit network id.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Listen Port&lt;br /&gt;
|9993&lt;br /&gt;
|Default&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;PPTP:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This configuration is for setting up a PPTP (Point-to-Point Tunnelling Protocol) VPN connection.&lt;br /&gt;
&lt;br /&gt;
PPTP is a protocol that enables secure data transmission across public networks like the internet, often used to connect to remote networks or access resources securely. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A PPTP.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:PPTP Connection Settings .png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|PPTP Role&lt;br /&gt;
|Client/Server&lt;br /&gt;
|&#039;&#039;&#039;Client:&#039;&#039;&#039; meaning  it will initiate the connection to the remote PPTP server.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Server:&#039;&#039;&#039; means this device will  accept incoming PPTP connections from clients, which can be users or devices  that need remote access to the local network or internet via this server.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |&#039;&#039;&#039;PPTP  Role: CLIENT&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Default Route&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Enabling the default route means that  all network traffic will be routed through the VPN tunnel once the connection  is established.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Metric&lt;br /&gt;
|Ex: 0&lt;br /&gt;
|The metric is a value that defines the  priority of this route among other available routes. Lower metrics indicate  higher priority.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Server IP&lt;br /&gt;
|Ex: 192.168.10.1&lt;br /&gt;
|This is the IP address of the PPTP  server the client will connect to.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Interface&lt;br /&gt;
|Any&lt;br /&gt;
&lt;br /&gt;
EWAN5&lt;br /&gt;
|Selecting the correct interface is  essential because it tells the system which network adapter should be used to  establish the VPN connection.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Username&lt;br /&gt;
|******&lt;br /&gt;
|This field is the login username for  the PPTP server.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Password&lt;br /&gt;
|****&lt;br /&gt;
|This is the password associated with  the username.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |&#039;&#039;&#039;PPTP  Role: SERVER&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Local IP&lt;br /&gt;
|Ex: 192.168.0.1&lt;br /&gt;
|This IP address (192.168.0.1) is the  local IP of the PPTP server on its network. Clients connecting to the VPN  will see this address as their gateway or endpoint within the VPN.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Remote IP Range&lt;br /&gt;
|Ex: 192.168.0.20-30&lt;br /&gt;
|This range defines the pool of IP  addresses that the server will assign to connected VPN clients. Here, any  client connecting to the server will receive an IP address between  192.168.0.20 and 192.168.0.30, which provides up to 11 possible addresses for  simultaneous connections.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Username&lt;br /&gt;
|Ex: User1&lt;br /&gt;
|This is a username that the client will  use to authenticate with the PPTP server. In this case, User1 is designated as an  authorized user.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Password&lt;br /&gt;
|*****&lt;br /&gt;
|The password associated with User1 is  required to complete the authentication.&lt;br /&gt;
|}&lt;br /&gt;
Once Configured, click on save and update.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;L2TP:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
L2TP (Layer 2 Tunneling Protocol) is a network protocol used to establish secure tunnels for transferring data between remote devices or networks, often in VPNs, by encapsulating data for encryption and routing.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A L2TP Dashboard.png|1185x1185px]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A L2TP Connection Settings.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|L2TP Role&lt;br /&gt;
|Client/Server&lt;br /&gt;
|&#039;&#039;&#039;Client&#039;&#039;&#039;: connecting to  an L2TP server to establish a secure tunnel for communication.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Server&#039;&#039;&#039;: the server listens for incoming client  connections.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |&#039;&#039;&#039;L2TP Role: CLIENT&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Default Route&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|If enabled, all outbound  traffic will be routed through the L2TP connection.&lt;br /&gt;
&lt;br /&gt;
If disabled, only specific traffic  destined for the L2TP network will use the tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Metric&lt;br /&gt;
|Ex: 1&lt;br /&gt;
|The system uses this metric to decide which route to prioritize  if multiple routes exist.&lt;br /&gt;
&lt;br /&gt;
L2TP connection with Metric 1 will take precedence over a LAN or  WAN route with Metric 10.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Server IP&lt;br /&gt;
|Ex: 192.168.10.1&lt;br /&gt;
|This is the &#039;&#039;&#039;IP address of the L2TP server&#039;&#039;&#039; to which the  client will connect.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Local Networks&#039;&#039;&#039;: If connecting within a LAN, the server might have an IP like  192.168.x.x.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Remote Connections&#039;&#039;&#039;: The server IP might be a public address like 203.0.113. x.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Checkup Interval Time (in sec)&lt;br /&gt;
|Ex: 30/60 secs&lt;br /&gt;
|Setting 30 seconds ensures the client checks the connection  every half-minute. If the tunnel drops, the client can quickly reconnect.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Interface&lt;br /&gt;
|Any&lt;br /&gt;
|Example interfaces might include eth0, usb0, or ra0.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Username&lt;br /&gt;
|Ex: User&lt;br /&gt;
|The server verifies the username to grant or deny access.&lt;br /&gt;
&lt;br /&gt;
Must match credentials configured on the L2TP server.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Password&lt;br /&gt;
|******&lt;br /&gt;
|Should be kept secure and match the configuration on the server.&lt;br /&gt;
&lt;br /&gt;
Masked for privacy during configuration.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|MPPE Encryption&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|&#039;&#039;&#039;Enabled&#039;&#039;&#039;: Encrypts traffic using MPPE, enhancing security (recommended).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Disabled&#039;&#039;&#039;: Transmits data unencrypted, reducing overhead but exposing  traffic to potential risks.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |&#039;&#039;&#039;L2TP Role: SERVER&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Local IP&lt;br /&gt;
|Ex: 192.168.0.1&lt;br /&gt;
|This is the &#039;&#039;&#039;local IP address of the L2TP server&#039;&#039;&#039;. It  serves as the gateway for clients connected via the L2TP tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Start&lt;br /&gt;
|Ex: 192.168.0.20&lt;br /&gt;
|Specifies the first IP address that can be assigned to connected  clients.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Limit&lt;br /&gt;
|Ex: 192.168.0.30&lt;br /&gt;
|Creates an IP pool for clients (from 192.168.0.20 to  192.168.0.30 in this case).&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Username&lt;br /&gt;
|Ex: User1&lt;br /&gt;
|Ensures that only authorized users can connect.&lt;br /&gt;
&lt;br /&gt;
The server verifies this username against its authentication  database.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|Password&lt;br /&gt;
|******&lt;br /&gt;
|The server verifies the password along with the username.&lt;br /&gt;
&lt;br /&gt;
The password must match the one configured on the server for  successful authentication.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== 2.6 Firewall ===&lt;br /&gt;
A firewall is a layer of security between the network and the Internet. Since a router is the main connection from a network to the Internet, the firewall function is merged into this device. Every network should have a firewall to protect its privacy. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Firewall .png]] &lt;br /&gt;
&lt;br /&gt;
There are 6 types of setting available under firewall.&lt;br /&gt;
&lt;br /&gt;
* General Settings&lt;br /&gt;
* Port forwards&lt;br /&gt;
* Traffic Rules&lt;br /&gt;
* SNAT traffic Rules&lt;br /&gt;
* Parental Control&lt;br /&gt;
* Zone Forwarding&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
General settings are subdivided into 2 parts,&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.) General settings&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In general settings, the settings that are made are default settings and can be changed according to user’s preference.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Firewall.png]]&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|&#039;&#039;&#039;SN&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;Field Name&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;Sample Value&#039;&#039;&#039;&lt;br /&gt;
|&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable SYN-flood protection&lt;br /&gt;
|Enabled&lt;br /&gt;
|This is enabled by default; setting can be changed  if required.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Disable IPV6&lt;br /&gt;
|Disabled&lt;br /&gt;
|This is enabled by default; setting can be changed  if required.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Drop invalid packets&lt;br /&gt;
|Disabled&lt;br /&gt;
|This is enabled by default; setting can be changed  if required.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|TCP SYN Cookies&lt;br /&gt;
|Disabled&lt;br /&gt;
|This is enabled by default; setting can be changed  if required.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Input&lt;br /&gt;
|Reject/Accept&lt;br /&gt;
|By default, the setting is ‘Reject’ but this needs  to be changed to ‘Accept’ compulsory.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Output&lt;br /&gt;
|Reject/Accept&lt;br /&gt;
|By default, the setting is ‘Reject’ but this needs  to be changed to ‘Accept’ compulsory.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Forward&lt;br /&gt;
|Reject/Accept&lt;br /&gt;
|By default, the setting is ‘Reject’ but this needs  to be changed to ‘Accept’ compulsory.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2.) Zone settings&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In zone settings, there’s an option to add “New Zone”, according to user’s requirement.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Zone Settings.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Port Forwards:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Port forwarding is a feature in a router or gateway that allows external devices to access services on a private network.&lt;br /&gt;
&lt;br /&gt;
It maps an external port on the router to an internal IP address and port on the local network, enabling applications such as gaming servers, web servers, or remote desktop connections to be accessed from outside the network.&lt;br /&gt;
&lt;br /&gt;
This helps in directing incoming traffic to the correct device within a local network based on the port number, enhancing connectivity and accessibility.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Port Forwards.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Port Forwards Editing.png]]Click on the save button after the required configuration.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Name&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;Web_Server_Forward&amp;lt;/code&amp;gt;&lt;br /&gt;
|Field must  not be empty. Provide a name for the rule to easily identify it.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Protocol&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;TCP+UDP&amp;lt;/code&amp;gt;&lt;br /&gt;
|Select the protocol  for the rule.&lt;br /&gt;
&lt;br /&gt;
Options  typically include TCP+UDP, TCP, UDP, ICMP, Custom.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Source zone&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;SW_LAN&amp;lt;/code&amp;gt;&lt;br /&gt;
|Select the source zone where the traffic is originating  from. Options typically include EWAN2,SW_LAN,CWAN1,CWAN1_0,CWAN1_1,VPN&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Source MAC address [optional]&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;any&amp;lt;/code&amp;gt;&lt;br /&gt;
|&#039;&#039;&#039;any&#039;&#039;&#039;: Leave as &amp;lt;code&amp;gt;any&amp;lt;/code&amp;gt; if you don&#039;t want to specify a MAC address.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Source IP address[optional]&lt;br /&gt;
|Example: Leave blank if not needed.&lt;br /&gt;
|Optionally  specify an IP address or range.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Source port&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;80, 443&amp;lt;/code&amp;gt;  (if matching traffic for web server ports)&lt;br /&gt;
|Specify the  source port or port range.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Destination zone&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;SW_LAN&amp;lt;/code&amp;gt;&lt;br /&gt;
|Select the  destination zone where the traffic is heading to.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Destination IP address&lt;br /&gt;
|Leave blank if not needed.&lt;br /&gt;
|Optionally specify  the destination IP address or range.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Destination port&lt;br /&gt;
|Example: &amp;lt;code&amp;gt;80&amp;lt;/code&amp;gt;  (if redirecting to a web server port)&lt;br /&gt;
|Specify the  destination port or port range.&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Traffic Rule:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Traffic rules&amp;quot; refer to the policies and regulations that govern the flow of data packets within a network. &lt;br /&gt;
&lt;br /&gt;
To allow new traffic,&lt;br /&gt;
&lt;br /&gt;
click on “Add and Edit” in “New Traffic Rule”.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;*Refer the image below*&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Traffic Rules.png]] &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Traffics Rules Edit.png]]&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Name&lt;br /&gt;
|Example:  Allow_HTTP_and_HTTPS&lt;br /&gt;
|Field must not be empty: Provide a  descriptive name for the traffic rule.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Restrict to  Address Family &lt;br /&gt;
&lt;br /&gt;
|1.Options: IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
Example: IPv4 if  dealing with typical internet traffic.&lt;br /&gt;
|Select the address family to generate  iptables rules for.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Protocol&lt;br /&gt;
|Example: TCP+UDP&lt;br /&gt;
|TCP+UDP: Match incoming traffic using the  given protocol.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Match ICMP Type&lt;br /&gt;
|Example: any&lt;br /&gt;
|Match all ICMP types if set to any.  Specific types can be chosen if needed.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Source Zone&lt;br /&gt;
|Example: LAN&lt;br /&gt;
|Specifies the traffic source zone.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Enable DDoS  Prevention&lt;br /&gt;
|Example:  ‘Checked’ if you want to enable DDoS prevention measures&lt;br /&gt;
|Enable or disable Distributed Denial of  Service (DDoS) prevention.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Source MAC  Address&lt;br /&gt;
|Example: any&lt;br /&gt;
|any: Match traffic from any MAC address or  specify a particular MAC address.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Source Address&lt;br /&gt;
|Example:  192.168.1.0/24&lt;br /&gt;
|Match incoming traffic from the specified  source IP address or range.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Source Port&lt;br /&gt;
|Example: any if  all source ports should be matched&lt;br /&gt;
|any: Match incoming traffic from the  specified source port or port range.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Destination Zone&lt;br /&gt;
|Example: WAN&lt;br /&gt;
|Specifies the traffic destination zone.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Action&lt;br /&gt;
|Example: ACCEPT&lt;br /&gt;
|Options: ACCEPT, DROP, REJECT. Specify the  action to take for matched traffic.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Limit&lt;br /&gt;
|Example:  10/minute to limit matches to 10 times per minute.&lt;br /&gt;
|Maximum average matching rate; specified  as a number, with an optional /second, /minute, /hour, or /day suffix.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Extra arguments&lt;br /&gt;
|Example:  --log-prefix &amp;quot;Blocked: &amp;quot; to add a log prefix to log messages for  this rule.&lt;br /&gt;
|Passes additional arguments to iptables.  Use with care as it can significantly alter rule behaviour.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once configured. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SNAT Traffic Rule:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
For configuring SNAT (Source Network Address Translation) traffic rules, you can control how outbound traffic from your local network is translated to a different IP address as it exits the network.&lt;br /&gt;
&lt;br /&gt;
To add new source NAT,&lt;br /&gt;
&lt;br /&gt;
Click on “ADD” in “New Source NAT:”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;*Refer the figure below*&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A SNAT Traffic Rules.png]] &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A SNAT Traffic Rules Edit.png]]Specification details are below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  name&lt;br /&gt;
|Sample  value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Name&lt;br /&gt;
|Example: SNAT_WAN_to_LAN&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty&#039;&#039;&#039;: Provide a unique and descriptive name for the SNAT rule.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Protocol&lt;br /&gt;
|Example: TCP+UDP&lt;br /&gt;
|&#039;&#039;&#039;TCP+UDP&#039;&#039;&#039;:  Select the protocols that the SNAT rule will apply to.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Source Zone&lt;br /&gt;
|Example: wan&lt;br /&gt;
|&#039;&#039;&#039;wan&#039;&#039;&#039;:  Specifies the source zone from which the traffic originates.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Source IP Address&lt;br /&gt;
|Example: any or a specific range like 192.168.1.0/24&lt;br /&gt;
|&#039;&#039;&#039;-- please  choose --&#039;&#039;&#039;: Specify the source IP address or range. Leave empty if the  rule applies to any source IP.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Source Port&lt;br /&gt;
|Example: any&lt;br /&gt;
|&#039;&#039;&#039;any&#039;&#039;&#039;:  Specify the source port or port range from which the traffic originates.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Destination Zone&lt;br /&gt;
|Example: lan&lt;br /&gt;
|&#039;&#039;&#039;lan&#039;&#039;&#039;:  Specifies the destination zone to which the traffic is directed.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Destination IP Address&lt;br /&gt;
|Example: any or a specific IP like 192.168.1.100&lt;br /&gt;
|&#039;&#039;&#039;-- please  choose --&#039;&#039;&#039;: Specify the destination IP address or range. Leave empty if  the rule applies to any destination IP.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Destination port&lt;br /&gt;
|Example: any&lt;br /&gt;
|&#039;&#039;&#039;any&#039;&#039;&#039;:  Specify the destination port or port range to which the traffic is directed.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|SNAT IP Address&lt;br /&gt;
|Example: 203.0.113.5 (an external IP address)&lt;br /&gt;
|&#039;&#039;&#039;-- please  choose --&#039;&#039;&#039;: Specify the IP address to which the source IP should be  translated.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|SNAT Port&lt;br /&gt;
|Example: Leave empty if not needed, or specify a port  like ‘12345’&lt;br /&gt;
|Optionally,  rewrite matched traffic to a specific source port. Leave empty to only  rewrite the IP address.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Extra Arguments&lt;br /&gt;
|Example: --log-prefix &amp;quot;SNAT_traffic: &amp;quot; (to add  a log prefix to log messages for this rule)&lt;br /&gt;
|Pass  additional arguments to iptables. Use with care as it can significantly alter  rule behaviour.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once configured. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Parental Control:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
For configuring parental control rules, you want to set restrictions based on time, source, and&lt;br /&gt;
&lt;br /&gt;
destination zones, as well as specific devices.&lt;br /&gt;
&lt;br /&gt;
To add parental control in firewall,&lt;br /&gt;
&lt;br /&gt;
Click on “Add and Edit” in “New parental control:” field.   &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Parental Control.png]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Parental Control Editing.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Name&lt;br /&gt;
|Example: Parental_Control_Sunday&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty&#039;&#039;&#039;: Provide a unique and descriptive name for the parental  control rule.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Proto&lt;br /&gt;
|all&lt;br /&gt;
|&#039;&#039;&#039;all&#039;&#039;&#039;:  This specifies that the rule will apply to all protocols.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Source Zone&lt;br /&gt;
|Example: lan&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty&#039;&#039;&#039;: Please look at Firewall-&amp;gt;Zone Settings to find zone  names.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Destination Zone&lt;br /&gt;
|Example: wan&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty&#039;&#039;&#039;: Please look at Firewall-&amp;gt;Zone Settings to find zone  names.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Source MAC Address&lt;br /&gt;
|Example: 00:1A:2B:3C:4D:5E&lt;br /&gt;
|&#039;&#039;&#039;Field&#039;&#039;&#039;:  Enter the MAC address of the device you want to apply the parental control  rule to. This is useful for restricting specific devices.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Target&lt;br /&gt;
|Example: Reject&lt;br /&gt;
|&#039;&#039;&#039;Accept&#039;&#039;&#039;:  This specifies the action to take. For parental controls, you might want to  use ‘Reject’ or ‘Drop’ to block traffic.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Weekdays&lt;br /&gt;
|Example: Sunday&lt;br /&gt;
|&#039;&#039;&#039;Sunday&#039;&#039;&#039;:  Specify the days of the week when the rule should be active.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Month Days&lt;br /&gt;
|Example: All&lt;br /&gt;
|&#039;&#039;&#039;All:&#039;&#039;&#039; Specify  the days of the month when the rule should be active.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Start Time (hh:mm:ss)&lt;br /&gt;
|Example: 18:00:00 (6:00 PM)&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty:&#039;&#039;&#039; Specify the start time when the rule should begin to apply.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Stop Time (hh:mm:ss)&lt;br /&gt;
|Example: 22:00:00 (10:00 PM)&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty:&#039;&#039;&#039; Specify the stop time when the rule should end.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once configured.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Zone Forwarding:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Zone forwarding in network configuration allows traffic to be directed from one zone to another.&lt;br /&gt;
&lt;br /&gt;
To ADD new zone,&lt;br /&gt;
&lt;br /&gt;
Click on “Add” in “New Zone Forward:” field.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Zone Forwarding.png]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Zone Forwading Editing.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Source Zone&lt;br /&gt;
|Example options: lan, wan, etc.&lt;br /&gt;
|&#039;&#039;&#039;--please  choose--&#039;&#039;&#039;: Select the source zone from which the traffic originates.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Destination Zone&lt;br /&gt;
|Example options: lan, wan, etc.&lt;br /&gt;
|&#039;&#039;&#039;--please  choose--&#039;&#039;&#039;: Select the destination zone to which the traffic is directed.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once configured.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2.7 Loopback Rule ===&lt;br /&gt;
In this page the user can configure the port where he wants to forward the traffic to. Here the user can add/edit/delete different ports as per the requirement.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Loopback Rule.png]]&lt;br /&gt;
&lt;br /&gt;
The user should click on ‘add’ and then ‘edit’ to do the required changes in the port and enter the valid information in each section to configure the port for forwarding.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Loopback Rule Editing.png]]Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Name&lt;br /&gt;
|Example: loopback&lt;br /&gt;
|Provide a  descriptive name for the rule.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Protocol&lt;br /&gt;
|Example: TCP+UDP&lt;br /&gt;
|&#039;&#039;&#039;TCP+UDP&#039;&#039;&#039;:  Select the protocols that the rule will apply to.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Source IP Address [Optional]&lt;br /&gt;
|Example: any or a specific IP range like 192.168.1.0/24&lt;br /&gt;
|Optionally  specify the source IP address or range. Leave empty if the rule should apply  to any source IP.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Source Port [Optional]&lt;br /&gt;
|Example: any&lt;br /&gt;
|&#039;&#039;&#039;any&#039;&#039;&#039;:  Specify the source port or port range from which the traffic originates. any  allows traffic from all ports.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Loopback IP Address&lt;br /&gt;
|Example: 1.1.1.1&lt;br /&gt;
|Specify the  loopback IP address.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Port&lt;br /&gt;
|Example: 81&lt;br /&gt;
|&#039;&#039;&#039;any&#039;&#039;&#039;: Specify  the destination port or port range to which the traffic is directed. any  allows traffic to all ports.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Action&lt;br /&gt;
|Example: DNAT&lt;br /&gt;
|This  specifies the action to take either DNAT or SNAT.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Internal IP Address&lt;br /&gt;
|Example: 2.2.2.2&lt;br /&gt;
|&#039;&#039;&#039;Field must  not be empty&#039;&#039;&#039;: Specify the internal IP address to which the traffic should  be redirected.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Internal Port&lt;br /&gt;
|Example: 81&lt;br /&gt;
|Redirect  matched incoming traffic to the given port on the internal host.&lt;br /&gt;
|}&lt;br /&gt;
Once the user is done with the required configurations, user should click save button and then click on the update to save the changes.&lt;br /&gt;
&lt;br /&gt;
=== 2.8 VRRP ===&lt;br /&gt;
&#039;&#039;&#039;VRRP (Virtual Router Redundancy Protocol)&#039;&#039;&#039; is used to ensure high availability for IP routing by allowing multiple routers to work together to present the illusion of a single virtual router to the hosts on a network.&lt;br /&gt;
&lt;br /&gt;
In General Settings, click on ‘Enable VRRP’ and save.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A VRRP.png]]&lt;br /&gt;
&lt;br /&gt;
In VRRP section,&lt;br /&gt;
&lt;br /&gt;
Give a name and ‘Add’ device.&lt;br /&gt;
&lt;br /&gt;
Click on ‘Edit’ to make changes.&lt;br /&gt;
&lt;br /&gt;
Click on ‘Delete’ if particular instance not required.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A VRRP Status.png]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A VRRP Editing.png]]Specification details are given below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Role&lt;br /&gt;
|1.      Master&lt;br /&gt;
&lt;br /&gt;
2.      Backup&lt;br /&gt;
|Choose &#039;&#039;&#039;Master&#039;&#039;&#039;  for the primary router that should handle the traffic under normal  circumstances.&lt;br /&gt;
&lt;br /&gt;
Choose &#039;&#039;&#039;Backup&#039;&#039;&#039;  for a secondary router that will take over if the master fails.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Virtual ID&lt;br /&gt;
|Ex: 0&lt;br /&gt;
|The value can  range from 0 to 255.&lt;br /&gt;
&lt;br /&gt;
Ensure all  routers in the same VRRP group share the same &#039;&#039;&#039;Virtual ID&#039;&#039;&#039;.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Priority&lt;br /&gt;
|Ex: 100&lt;br /&gt;
|For the &#039;&#039;&#039;Master&#039;&#039;&#039;  role, use the highest priority, typically above 100.&lt;br /&gt;
&lt;br /&gt;
For the &#039;&#039;&#039;Backup&#039;&#039;&#039;  role, set a lower priority number, usually below the master&#039;s priority.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Interface&lt;br /&gt;
|SW_LAN&lt;br /&gt;
|This is the  network interface on which VRRP operates.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Source IP&lt;br /&gt;
|Ex: 192.168.10.1&lt;br /&gt;
|This is the  IP address used as the source in VRRP advertisements.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Peer IP&lt;br /&gt;
|Ex: 192.168.10.10&lt;br /&gt;
|This is the  IP address of the other VRRP peer (usually the backup router). It helps the  routers identify each other.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Virtual IP  Address&lt;br /&gt;
|192.168.10.100/24&lt;br /&gt;
|The virtual  IP should be an unused address within the subnet, such as 192.168.10.100/24,  ensuring it&#039;s consistent across all VRRP routers.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Enable  Authentication&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Enable this  if you want to secure your VRRP communications.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Password&lt;br /&gt;
|*********&lt;br /&gt;
|It ensures  that only routers with the correct password can join the VRRP group.&lt;br /&gt;
|}&lt;br /&gt;
Save and update once changes have been made.&lt;br /&gt;
&lt;br /&gt;
=== 2.9 Remote Monitoring ===&lt;br /&gt;
In this page the user can select which equipment needs to be monitored remotely.&lt;br /&gt;
&lt;br /&gt;
Once the user selects the type of RMS click on save.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Remote Management System.png]]&#039;&#039;&#039;NMS:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this page the user should type the server IP or domain name in the URL then click on save.&lt;br /&gt;
&lt;br /&gt;
Click on upload and start (Once key is uploaded and this option is clicked, NMS automatically starts, and this router device gets registered with the NMS server provided).&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A NMS.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TR_069:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To enable the TR_069 the user needs to click on the enable check box.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A TR069.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once the user clicks on the check box of enable it will display all the required filed to configured.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Tr069 Edit.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Serving  Interval&lt;br /&gt;
|300&lt;br /&gt;
|A value of 300 seconds means the device  will check in with the ACS (auto-configuration servers) every 5 minutes.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Interface&lt;br /&gt;
|This can  be something like eth0 or wan.&lt;br /&gt;
|This specifies the network interface  used for TR-069 communication.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Username&lt;br /&gt;
|Example: User&lt;br /&gt;
|The username used to authenticate with  the ACS.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Password&lt;br /&gt;
|••••&lt;br /&gt;
|The password used to authenticate with  the ACS.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|URL&lt;br /&gt;
|&amp;lt;nowiki&amp;gt;http://example.com&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|The URL of the ACS. This is where the CPE  (customer-premises equipment) will send its requests and where it will  receive configurations and updates from.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The user should fill all the required fields and click on the save button.&lt;br /&gt;
&lt;br /&gt;
=== 2.10 Tunnel ===&lt;br /&gt;
Tunnels are a method of transporting data across a network using protocols which are not supported by that network.&lt;br /&gt;
&lt;br /&gt;
It is further categorised into 3 sections,&lt;br /&gt;
&lt;br /&gt;
1.) General Settings&lt;br /&gt;
&lt;br /&gt;
2.) GRE Tunnel&lt;br /&gt;
&lt;br /&gt;
3.) IPIP Tunnel  &lt;br /&gt;
&lt;br /&gt;
[[File:Tunnel IAC44A.png]]  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this page the user needs to select under which type of tunnel it needs to send the data.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Tunnel General Settings.png]]&lt;br /&gt;
&lt;br /&gt;
Once the user selects the type of tunnel then click on the save button.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;GRE Tunnel:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A GRE (Generic Routing Encapsulation) tunnel configuration involves setting up a virtual point-to-point connection between two endpoints over an IP network.&lt;br /&gt;
&lt;br /&gt;
Here the user can add/edit/delete the details of the tunnel.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A GRE Tunnel.png]]&lt;br /&gt;
&lt;br /&gt;
Once the required update is done then click on update to save the changes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A GRE Tunnel Configuration.png]]&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Tunnel  name&lt;br /&gt;
|Example:  GRETunnel&lt;br /&gt;
|&#039;&#039;&#039;GRETunnel&#039;&#039;&#039;: The name of the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Local  external IP&lt;br /&gt;
|Example:  10.1.1.66&lt;br /&gt;
|The IP address of the local endpoint  that will initiate the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Remote external  IP&lt;br /&gt;
|Example:  10.1.1.40&lt;br /&gt;
|The IP address of the remote endpoint  that will terminate the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Peer  tunnel IP&lt;br /&gt;
|Example:  10.1.1.4&lt;br /&gt;
|The IP address of the peer&#039;s tunnel  interface.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Local  tunnel IP&lt;br /&gt;
|Example:  10.1.1.6&lt;br /&gt;
|The IP address of the local tunnel  interface.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Local  tunnel net mask&lt;br /&gt;
|Example:  255.255.255.0&lt;br /&gt;
|The subnet mask of the local tunnel  interface.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Remote IP&lt;br /&gt;
|Example:  192.168.10.0/24&lt;br /&gt;
|The remote network that is reachable  through the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Enable  Tunnel Link&lt;br /&gt;
|Check to enable&lt;br /&gt;
|Enable or disable the GRE tunnel link.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Interface  type&lt;br /&gt;
|Example:  EWAN2&lt;br /&gt;
|&#039;&#039;&#039;EWAN2&#039;&#039;&#039;: The  type of network interface used for the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|MTU&lt;br /&gt;
|Example:  1476&lt;br /&gt;
|&#039;&#039;&#039;1476&#039;&#039;&#039;: Maximum  Transmission Unit size for the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|TTL&lt;br /&gt;
|Example:  64&lt;br /&gt;
|&#039;&#039;&#039;64&#039;&#039;&#039;: Time To  Live value for the packets within the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Tunnel  key&lt;br /&gt;
|Example:  12345678&lt;br /&gt;
|&#039;&#039;&#039;12345678&#039;&#039;&#039;: A unique key used to identify the GRE tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Enable  keep alive&lt;br /&gt;
|Check to  enable&lt;br /&gt;
|Enable or disable the keep-alive  feature to monitor the tunnel&#039;s status.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|Keep  alive interval&lt;br /&gt;
|Example:  10&lt;br /&gt;
|&#039;&#039;&#039;10&#039;&#039;&#039;:  Interval in seconds for the keep-alive packets.&lt;br /&gt;
|}&lt;br /&gt;
Once the required update is done then click on update to save the changes. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPIP Tunnel:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
An IPIP (IP-in-IP) tunnel is a simple tunnelling protocol used to encapsulate IP packets within IP packets. This is like GRE but without additional features such as keying and type fields.&lt;br /&gt;
&lt;br /&gt;
Here the user can add/edit/delete the details of the tunnel.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A IPIP Tunnel.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A IPIP Tunnel Edit.png]]Once the required update is done then click on update to save the changes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Tunnel  name&lt;br /&gt;
|Example:  IPIPTunnel&lt;br /&gt;
|&#039;&#039;&#039;IPIPTunnel:&#039;&#039;&#039; The name of the IPIP tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Local external  IP&lt;br /&gt;
|Example:  10.1.1.66&lt;br /&gt;
|The IP address of the local endpoint  that will initiate the IPIP tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Remote  external IP&lt;br /&gt;
|Example:  10.1.1.40&lt;br /&gt;
|The IP address of the remote endpoint  that will terminate the IPIP tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Peer  tunnel IP&lt;br /&gt;
|Example:  10.1.1.4&lt;br /&gt;
|The IP address of the peer&#039;s tunnel  interface.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Local  tunnel IP&lt;br /&gt;
|Example:  10.1.1.6&lt;br /&gt;
|The IP address of the local tunnel  interface.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Local  tunnel net mask&lt;br /&gt;
|Example:  255.255.255.0&lt;br /&gt;
|The subnet mask of the local tunnel  interface.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Remote IP&lt;br /&gt;
|Example: 192.168.10.0/24&lt;br /&gt;
|The remote network that is reachable  through the IPIP tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Enable  Tunnel Link&lt;br /&gt;
|Check to  enable&lt;br /&gt;
|Enable or disable the IPIP tunnel link.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Interface  type&lt;br /&gt;
|Example:  EWAN2&lt;br /&gt;
|&#039;&#039;&#039;EWAN2&#039;&#039;&#039;: The  type of network interface used for the IPIP tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|MTU&lt;br /&gt;
|Example:  1476&lt;br /&gt;
|&#039;&#039;&#039;1476&#039;&#039;&#039;: Maximum  Transmission Unit size for the IPIP tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|TTL&lt;br /&gt;
|Example:  64&lt;br /&gt;
|&#039;&#039;&#039;64&#039;&#039;&#039;: Time To  Live value for the packets within the IPIP tunnel.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Tunnel  key&lt;br /&gt;
|Example:  12345678&lt;br /&gt;
|Although typically not used in IPIP,  this field might be included for compatibility with certain configurations.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Enable  keep alive&lt;br /&gt;
|Check to  enable&lt;br /&gt;
|Enable or disable the keep-alive  feature to monitor the tunnel&#039;s status.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|Keep  alive interval&lt;br /&gt;
|Example:  10&lt;br /&gt;
|&#039;&#039;&#039;10&#039;&#039;&#039;:  Interval in seconds for the keep-alive packets.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== 3.Maintenance ==&lt;br /&gt;
In this module the user can configure/upgrade/modify the settings related to system, password,&lt;br /&gt;
&lt;br /&gt;
firmware and monitoring.&lt;br /&gt;
&lt;br /&gt;
It includes 6 submodules.&lt;br /&gt;
&lt;br /&gt;
* General&lt;br /&gt;
* Password&lt;br /&gt;
* Reboot&lt;br /&gt;
* Import and Export config&lt;br /&gt;
* Firmware upgrade&lt;br /&gt;
* Monitor Application&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Maintenance.png]]&lt;br /&gt;
&lt;br /&gt;
=== 3.1 General ===&lt;br /&gt;
Here you can configure the basic aspects of router like its hostname or the timezone.&lt;br /&gt;
&lt;br /&gt;
It is further sub-divided into,&lt;br /&gt;
&lt;br /&gt;
1.) General Settings&lt;br /&gt;
&lt;br /&gt;
2.) Logging&lt;br /&gt;
&lt;br /&gt;
3.) Language and Style &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;General Settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A General Settings.png|1024x1024px]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Local  Time&lt;br /&gt;
|2024/07/30  13:25:47&lt;br /&gt;
|The current local date and time set on  the device.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Timezone&lt;br /&gt;
|Asia/Kolkata&lt;br /&gt;
|The timezone setting of the device,  which determines the local time.&lt;br /&gt;
|}&lt;br /&gt;
Once the user configures the required details then click on the save button to save all the details.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Logging:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Here the user can configure the basic aspects of your device related to system.&lt;br /&gt;
&lt;br /&gt;
The system log configuration provided specifies how the device handles and stores log information, including buffer size, external log server details, and log verbosity levels.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Logging.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|System log buffer size&lt;br /&gt;
|Example: 32 kiB&lt;br /&gt;
|The size of the memory buffer allocated  (0-32) for storing system logs before they are either written to a file or  sent to an external server.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|External system log server&lt;br /&gt;
|Example: 0.0.0.0&lt;br /&gt;
|The IP address of an external server  where logs can be sent.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|External system log server port&lt;br /&gt;
|Example: 514&lt;br /&gt;
|The port used to send logs to the  external log server. Port 514 is the default port for syslog.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Log output level&lt;br /&gt;
|Example: Debug&lt;br /&gt;
|Sets the detail level of the system  logs.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Cron Log level&lt;br /&gt;
|Example: Debug&lt;br /&gt;
|The detail level of the logs for cron  jobs.&lt;br /&gt;
|}&lt;br /&gt;
Once the user configures the required details then click on the save button to save all the details.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Language and Style:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Here the user can configure the basic aspects of your device related to language.&lt;br /&gt;
&lt;br /&gt;
Once the user configures the required details then click on the save button to save all the details.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Language and Sytle.png]]&lt;br /&gt;
&lt;br /&gt;
=== 3.2 Password ===&lt;br /&gt;
In this module the user can set the password for the admin credentials.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note:&#039;&#039;&#039; Password must contain at least one uppercase letter, one digit, one special character, and be at least 8 characters long.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Password Setup.png]]&lt;br /&gt;
&lt;br /&gt;
=== 3.3 Reboot ===&lt;br /&gt;
In this module the user can reboot the device remotely.&lt;br /&gt;
&lt;br /&gt;
First option is to directly reboot the device without enabling the maintenance reboot tab.&lt;br /&gt;
&lt;br /&gt;
Click on “Reboot Now” at the bottom of the screen to start the reboot process.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Reboot.png]]&lt;br /&gt;
&lt;br /&gt;
To start maintenance reboot process first the user needs to fill all the required fields.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Maintenance Reboot Configuration.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field Name&lt;br /&gt;
|Sample Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable Maintenance  Reboot&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Indicates whether the maintenance  reboot feature is enabled or not.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Type&lt;br /&gt;
|Maintenance  Reboot&lt;br /&gt;
|Specifies the type of reboot being  scheduled.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Reboot  Type&lt;br /&gt;
|Hardware&lt;br /&gt;
|&#039;&#039;&#039;Hardware&#039;&#039;&#039;: A hardware reboot involves restarting the entire  device as if it were powered off and on again.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Minutes&lt;br /&gt;
|Example:  59&lt;br /&gt;
|The minute at which the reboot should  occur (0-59).&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Hours&lt;br /&gt;
|Example:  22 (10 PM)&lt;br /&gt;
|The hour at which the reboot should  occur (0-23, in 24-hour format).&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Day Of  Month&lt;br /&gt;
|Example:  All&lt;br /&gt;
|Specifies which days of the month the  reboot should occur (1-31). &amp;quot;All&amp;quot; means it will occur every day.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Month&lt;br /&gt;
|Example:  All&lt;br /&gt;
|Specifies which months the reboot  should occur (1-12). &amp;quot;All&amp;quot; means it will occur every month.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Day Of  Week&lt;br /&gt;
|Example:  All&lt;br /&gt;
|Specifies which days of the week the  reboot should occur (0-6, where 0 is Sunday). &amp;quot;All&amp;quot; means it will  occur every day of the week.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once the user fills all the required given parameters click on the save.&lt;br /&gt;
&lt;br /&gt;
=== 3.4 Import and Export ===&lt;br /&gt;
In this section, User can Import &amp;amp; Export Configuration files of the Device.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Import and Export Configuration.png]]&lt;br /&gt;
&lt;br /&gt;
Click “Export Config” to export device configuration &amp;amp; settings to a text file,&lt;br /&gt;
&lt;br /&gt;
Click “Import Config” to import device configuration &amp;amp; settings from a previously exported text file.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Import Config.png]]&lt;br /&gt;
&lt;br /&gt;
The user needs to select on the “choose file”, upload the required file and click on apply.&lt;br /&gt;
&lt;br /&gt;
=== 3.5 Firmware Upgrade ===&lt;br /&gt;
The user can upgrade with the latest software for the existing firmware.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Firmware Upgarde.png]]&lt;br /&gt;
&lt;br /&gt;
Click on the &#039;&#039;&#039;flash image&#039;&#039;&#039; and chose the path where the sys-upgrade file is kept and then click on flash image, it will upgrade to the latest software once the reboot is done.&lt;br /&gt;
&lt;br /&gt;
This option will completely reset the device to default settings.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Flash Image.png]]Click on the &#039;&#039;&#039;Retain Config and flash&#039;&#039;&#039; and chose the path where the sys-upgrade file is kept and then click on Retain Config and flash, it will upgrade to the latest software once the reboot is done.&lt;br /&gt;
&lt;br /&gt;
This refers to updating the firmware (flashing) of a device while preserving the current configuration settings.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Retain Config and Flash.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Click on the &#039;&#039;&#039;Factory Reset&#039;&#039;&#039; for the complete retest of the device.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Factory Reset.png|1563x1563px]]&lt;br /&gt;
&lt;br /&gt;
=== 3.6 Monitor Application ===&lt;br /&gt;
In this section, the monitor application is divided into major 2 configurations which is further sub-divided into 4 editable options,&lt;br /&gt;
&lt;br /&gt;
1.) Modem Monitor Application Configuration:&lt;br /&gt;
&lt;br /&gt;
2.) Router Monitor Application Configuration:&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Monitor Application.png]]&#039;&#039;&#039;Modem Monitor Application Configuration:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Modem Monitor Application.png]]Specification details are given below: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable Ping Check Application&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Turns on the functionality to perform ping  checks on specified IP addresses.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Time Interval for Check (In minutes)&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 10 minutes&lt;br /&gt;
|Frequency at which the ping checks are  performed.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Select No of IP addresses to ping&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 1&lt;br /&gt;
|Number of IP addresses that will be pinged.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|IP Address 1&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 8.8.8.8&lt;br /&gt;
|The IP address to ping.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|No. of Retries&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 5&lt;br /&gt;
|Number of times to retry pinging an IP address  if the initial ping fails.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Failure Criteria in (%)&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 80% (If 4 out of 5 pings fail, it’s considered  a failure)&lt;br /&gt;
|Percentage of failed pings required to consider  the ping check a failure.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Action On Failure&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; Restart Modem&lt;br /&gt;
|Action to be taken if the ping check fails  according to the criteria.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Enable Second Level Action&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Option to enable a secondary action if the  primary action fails multiple times.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Second Level Action Threshold&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 2&lt;br /&gt;
|Number of failures required to trigger the  secondary action.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Second Level Action&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; Restart Board (Reboots  the entire hardware board)&lt;br /&gt;
|The action to be taken if the second level  action threshold is met.&lt;br /&gt;
|}&lt;br /&gt;
Save the details once made necessary changes. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Router Monitor Application Configuration:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Router Monitor Application Configuration.png]]Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable Ping Check Application&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Activates the  ping check functionality to monitor router performance.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Time Interval for Check (In minutes)&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 10 minutes&lt;br /&gt;
|How  frequently the ping checks are performed.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Select No of IP Addresses to Ping&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 1 (Please select the appropriate number  based on your requirements)&lt;br /&gt;
|Choose the  number of IP addresses to ping. This typically involves selecting from a list  or entering multiple addresses.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|No. of Retries&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 3&lt;br /&gt;
|Number of  retries if a ping fails.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Failure Criteria in (%)&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; 80% (If 80% of the pings fail, it’s  deemed a failure)&lt;br /&gt;
|Percentage of  failed pings required to consider the ping check as failed.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Action On Failure&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; Restart IPsec&lt;br /&gt;
|The action  taken if the ping check fails according to the criteria.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Enable Second Level Action&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Option to  enable an additional action if the primary action fails.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Second Level Action Threshold&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; Specify the number of failures, such as 2&lt;br /&gt;
|Number of  times the primary action must fail before the secondary action is triggered.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Second Level Action&lt;br /&gt;
|&#039;&#039;&#039;Example:&#039;&#039;&#039; Restart Board&lt;br /&gt;
|The action to  be taken if the second level action threshold is met.&lt;br /&gt;
|}&lt;br /&gt;
Save the details once made necessary changes.&lt;br /&gt;
&lt;br /&gt;
== 4. Features ==&lt;br /&gt;
In this module the user can see all the features that the router device has.&lt;br /&gt;
&lt;br /&gt;
This module includes 10 features.&lt;br /&gt;
&lt;br /&gt;
* Mac Address Binding&lt;br /&gt;
* URL Filtering&lt;br /&gt;
* Web Server&lt;br /&gt;
* Wi-Fi MacID Filtering&lt;br /&gt;
* Routing&lt;br /&gt;
* DMZ&lt;br /&gt;
* Others&lt;br /&gt;
* SNMP Agent Configuration&lt;br /&gt;
* Connection Diagnostics&lt;br /&gt;
* Package Manager&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Features.png]]&lt;br /&gt;
&lt;br /&gt;
=== 4.1 Mac Address Binding ===&lt;br /&gt;
MAC address binding is a configuration that binds a specific MAC address to a specific IP address.&lt;br /&gt;
&lt;br /&gt;
This ensures that a particular device on the network always receives the same IP address from the DHCP&lt;br /&gt;
&lt;br /&gt;
server, which can be useful for network management, security, and ensuring consistent network&lt;br /&gt;
&lt;br /&gt;
behaviour.&lt;br /&gt;
&lt;br /&gt;
Under this submodule the user can configure/update/edit the IP Address for MAC.&lt;br /&gt;
&lt;br /&gt;
You can edit the pre-existing configuration, or you can ‘Add’ in the ‘New MAC ADDRESS’ field. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A MAC Address Binding.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A MAC Address Binding Editing.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Device Name&lt;br /&gt;
|mac1&lt;br /&gt;
|A user-defined name for the binding  configuration.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|MAC Address&lt;br /&gt;
|48:9e:bd:da:45:91&lt;br /&gt;
|The unique identifier for the network interface  of the device to which the IP address will be bound.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|IP Address&lt;br /&gt;
|192.168.10.55&lt;br /&gt;
|The IP address that will be consistently  assigned to the device with the specified MAC address.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
By applying this configuration, the DHCP server will always assign the IP address 192.168.10.55 to the device with the MAC address 48:9e:bd:da:45:91, ensuring consistency and stability in network addressing for that device.&lt;br /&gt;
&lt;br /&gt;
* Once the user modifies the MAC address /IP Address then click on the save button to save the changes done.&lt;br /&gt;
* The user can click on the deleted button to delete an existing configured device.&lt;br /&gt;
&lt;br /&gt;
Post all the changes the user needs to click on the update to reflect all the changes in the application.&lt;br /&gt;
&lt;br /&gt;
=== 4.2 URL Filtering ===&lt;br /&gt;
In this submodule the user should provide the URL which needs to be blocked for the device.&lt;br /&gt;
&lt;br /&gt;
By implementing URL filtering with the specified URL, you can control and restrict access to certain&lt;br /&gt;
&lt;br /&gt;
websites, thereby improving network security and managing user access.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A URL FIltring.png]]&lt;br /&gt;
&lt;br /&gt;
To add the new URL for blocking, click on the Add New button.&lt;br /&gt;
&lt;br /&gt;
Once the user clicks on the Add New button a new pop will appear in that page write the URL and click on the save.&lt;br /&gt;
&lt;br /&gt;
The user can select the status of that URL while defining the URL.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A URL FIltring Edit.png]]&lt;br /&gt;
&lt;br /&gt;
To edit / delete the existing URL the user needs to click on the edit /deleted button respectively.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Url Filter Disable.png]]&lt;br /&gt;
&lt;br /&gt;
Click on “save” after the changes are done as per the need.&lt;br /&gt;
&lt;br /&gt;
=== 4.3 Web Server ===&lt;br /&gt;
This configuration will allow your device to serve web traffic securely over HTTPS, keep its system time synchronized, and ensure that all HTTP traffic is redirected to HTTPS for better security.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Webserver Configuration.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Webserver Edit.png]]Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable HTTP&lt;br /&gt;
|&#039;&#039;&#039;HTTP Port:&#039;&#039;&#039; 80&lt;br /&gt;
&lt;br /&gt;
Enable or disable the HTTP server.&lt;br /&gt;
|Port 80 is the default port for HTTP traffic.  It is used to serve web pages over an unencrypted connection.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Enable HTTPS&lt;br /&gt;
|&#039;&#039;&#039;HTTPS Port:&#039;&#039;&#039; 443&lt;br /&gt;
&lt;br /&gt;
Enable or disable the HTTPS server.&lt;br /&gt;
|Port 443 is the default port for HTTPS traffic.  It is used to serve web pages over an encrypted connection.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Redirect HTTPS&lt;br /&gt;
|Option to redirect HTTP traffic to  HTTPS.&lt;br /&gt;
|When enabled, all HTTP requests will be  automatically redirected to the HTTPS port to ensure secure communication.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Session Timeout (In Minutes)&lt;br /&gt;
|Ex: 5 mins&lt;br /&gt;
|This setting controls how long a user session  remains active without interaction before the server automatically logs the  user out.&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5&lt;br /&gt;
|RFC1918 Filter&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|When enabled, this filter can block traffic from private IP  ranges (e.g., 192.168.x.x, 10.x.x.x) from being routed through the public  internet, enhancing network security.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Enable NTP Sync&lt;br /&gt;
|Enable or disable NTP synchronization.&lt;br /&gt;
|Synchronizes the device’s system clock with an  external NTP server to maintain accurate time.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|NTP Server&lt;br /&gt;
|0.openwrt.pool.ntp.org&lt;br /&gt;
|The address of the NTP server used for time  synchronization. The openwrt.pool.ntp.org server is a public NTP server pool.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|NTP Sync Interval (In Minutes)&lt;br /&gt;
|15&lt;br /&gt;
|The interval at which the device will sync its  clock with the NTP server, set to every 15 minutes in this case.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once changes are made.&lt;br /&gt;
&lt;br /&gt;
=== 4.4 Wi-Fi MacID Filtering ===&lt;br /&gt;
Wireless MAC ID Filtering allows you to control which devices can connect to your wireless network based on their MAC (Media Access Control) addresses. This can help enhance security by allowing only specified devices to access the network.&lt;br /&gt;
&lt;br /&gt;
It is further divided into 2 categories,&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WIFI 2.4G AP&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WIFI 2.4G AP Guest&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Wifi Mac ID Filtering.png]]&lt;br /&gt;
&lt;br /&gt;
Before adding the MacIDs the user needs to select the mode from the dropdown menu.&lt;br /&gt;
&lt;br /&gt;
In ‘Change Mode’ select one option,&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Blacklist&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In blacklist mode, you specify which MAC addresses are not allowed to connect to the wireless network. Devices not on the blacklist will be able to connect.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Whitelist&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In whitelist mode, you specify which MAC addresses are allowed to connect to the wireless network. Devices not on the whitelist will be blocked.&lt;br /&gt;
&lt;br /&gt;
To Add the MacID the user needs to click on Add New option.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Whitelist.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Status&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Enable or disable the MAC ID filtering.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|MAC ID&lt;br /&gt;
|Example: e8:6f:38:1a:f2:61&lt;br /&gt;
|The MAC address of the device to be whitelisted  or blocklisted.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Network Name&lt;br /&gt;
|Example: WIFI 2.4G AP or Wi-Fi 2.4G AP  Guest.&lt;br /&gt;
|The network to apply the MAC ID filtering.&lt;br /&gt;
|}&lt;br /&gt;
Once the required MAC ID and Network Name is configured the user needs to click on the save button to add the details.&lt;br /&gt;
&lt;br /&gt;
The user needs to click on the edit button to do modifications on the pre-existing configuration.&lt;br /&gt;
&lt;br /&gt;
Once the required MACID / Network Name is modified the user needs to click on the save button to reflect the changed value in the application.&lt;br /&gt;
&lt;br /&gt;
=== 4.5 Routing ===&lt;br /&gt;
In this submodule the user can configure the parameters related to routing of the device like Target address, Networks address etc. Routing configurations allow network packets to be directed between different subnets and networks.&lt;br /&gt;
&lt;br /&gt;
It is further divided into 2 sections,&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Static IPV4 Routes&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Advanced Static IPV4 Routes&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Static IPV4 Routes:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Click on ‘Add’ to add a new interface.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Routing.png]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To edit the existing device the user needs to click on the edit option.&lt;br /&gt;
&lt;br /&gt;
Once the changes are done click on the save button to save all the changes.&lt;br /&gt;
&lt;br /&gt;
Click on the deleted button to delete the existing device detail.&lt;br /&gt;
[[File:IAC44A Routing Edit.png|left]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Interface&lt;br /&gt;
|Ex: eth0.1&lt;br /&gt;
|The network interface to be used for this route.  Select the one to use from dropdown.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Target&lt;br /&gt;
|Ex: 192.168.20.0&lt;br /&gt;
|The destination subnet to which traffic should  be routed.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|IPv4 Netmask&lt;br /&gt;
|255.255.255.0&lt;br /&gt;
|The subnet mask for the target network.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Metric&lt;br /&gt;
|0&lt;br /&gt;
|The priority of the route.&lt;br /&gt;
&lt;br /&gt;
Lower values indicate higher priority.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|IPv4 Gateway&lt;br /&gt;
|Ex: 192.168.10.1&lt;br /&gt;
|The gateway IP address to be used for routing  traffic to the target subnet.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Route Type&lt;br /&gt;
|Unicast&lt;br /&gt;
|Standard route for individual destination IP  addresses.&lt;br /&gt;
&lt;br /&gt;
Custom changes can be made.&lt;br /&gt;
|}&lt;br /&gt;
Click on save once configuration changes have been made. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Advanced Static IPV4 Routes:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This is further divided into 2 sections,&lt;br /&gt;
&lt;br /&gt;
Routing Tables&lt;br /&gt;
&lt;br /&gt;
Routing Rules for IPV4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Routing Tables:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Adding a new table in static routing allows you to define specific routes for traffic within a network.&lt;br /&gt;
&lt;br /&gt;
Click on ‘Add’ to add a new Table. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Advanced Static IPV4 Routes.png]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Routing Table Edit.png]]&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|ID of Table&lt;br /&gt;
|Ex: 1&lt;br /&gt;
|A unique identifier for the routing table.  Multiple tables can be used to define different sets of routing rules,  providing flexibility in how traffic is managed.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Name of Table&lt;br /&gt;
|Ex: Route&lt;br /&gt;
|A descriptive name for the routing table,  making it easier to manage and identify different tables.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Target&lt;br /&gt;
|Ex: 192.168.10.0&lt;br /&gt;
|Specifies the destination network or IP address  that the route is intended for.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|IPv4 Netmask&lt;br /&gt;
|255.255.255.0&lt;br /&gt;
|Defines the subnet mask for the target network.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Metric&lt;br /&gt;
|Ex: 0&lt;br /&gt;
|Indicates the priority of the route. A lower  metric value means a higher priority. Routes with lower metrics are preferred  over those with higher metrics.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|IPv4 Gateway&lt;br /&gt;
|Ex: 10.1.1.1&lt;br /&gt;
|Specifies the next hop or gateway IP address  through which the traffic to the target network should be routed.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Route Type&lt;br /&gt;
|1.) Unicast&lt;br /&gt;
&lt;br /&gt;
2.) Custom&lt;br /&gt;
|&#039;&#039;&#039;Unicast&#039;&#039;&#039;:  Standard route where packets are sent to a single destination IP address.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Custom&#039;&#039;&#039;: Enables  advanced routing configurations or specific protocols that might not be  covered by default.&lt;br /&gt;
|}&lt;br /&gt;
Once all the configurations are done click on the update button to reflect the changes made.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Routing Rules for IPV4:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Click on ‘Add’ to add a new interface.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Routing For IPV4.png]]&#039;&#039;&#039;EDIT:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To edit the existing device the user needs to click on the edit option.&lt;br /&gt;
&lt;br /&gt;
Once the changes are done click on the save button to save all the changes.&lt;br /&gt;
&lt;br /&gt;
Click on the deleted button to delete the existing device detail.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Routing For IPV4 Edit.png]]&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Interface&lt;br /&gt;
|Ex: ra0&lt;br /&gt;
|Select the specific network interface on the  router through which traffic enters or exits.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|To&lt;br /&gt;
|Ex: 192.168.10.1&lt;br /&gt;
|The destination IP address or network. In this  case, 192.168.10.1 is the target IP address for routing traffic.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|IPv4 Netmask&lt;br /&gt;
|Ex: 255.255.255.192&lt;br /&gt;
|Defines the subnet mask, which helps determine  the size of the network.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Table ID&lt;br /&gt;
|Ex: 1&lt;br /&gt;
|Identifies which routing table this rule  applies to.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|From&lt;br /&gt;
|Ex: 192.168.100.1&lt;br /&gt;
|Specifies the source IP address or network from  which the traffic originates. In this case, the traffic is coming from  192.168.100.1.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Priority&lt;br /&gt;
|Ex:20&lt;br /&gt;
|Determines the order in which routing rules are  evaluated. Lower numbers have higher priority. If two rules conflict, the one  with the lower priority number will be applied first.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Outgoing Interface&lt;br /&gt;
|1.) fwmark&lt;br /&gt;
&lt;br /&gt;
2.) iif (Incoming Interface)&lt;br /&gt;
&lt;br /&gt;
3.) oif (Outgoing Interface)&lt;br /&gt;
&lt;br /&gt;
4.) lookup&lt;br /&gt;
&lt;br /&gt;
5.) blackhole&lt;br /&gt;
&lt;br /&gt;
6.) prohibited&lt;br /&gt;
&lt;br /&gt;
7.) unreachable&lt;br /&gt;
|1.) This  allows you to create rules that apply only to traffic that has been marked in  a specific way by the firewall.&lt;br /&gt;
&lt;br /&gt;
2.) This is  often used to create rules based on the interface through which traffic is received.&lt;br /&gt;
&lt;br /&gt;
3.) This  allows you to control the flow of traffic based on the desired outgoing  interface.&lt;br /&gt;
&lt;br /&gt;
4.) It tells the router to check the specific  routing table ID mentioned to determine how to route the traffic.&lt;br /&gt;
&lt;br /&gt;
5.) This is  used when you want to block traffic without notifying the sender.&lt;br /&gt;
&lt;br /&gt;
6.) Like  blackhole but sends an ICMP unreachable message to the sender, indicating  that the route is prohibited.&lt;br /&gt;
&lt;br /&gt;
7.) Causes  the router to send an ICMP unreachable message to the source IP, notifying  that the destination is unreachable.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== 4.6 DMZ ===&lt;br /&gt;
A &#039;&#039;&#039;DMZ (Demilitarized Zone)&#039;&#039;&#039; is a subnetwork that provides an extra layer of security for an organization&#039;s internal network.&lt;br /&gt;
&lt;br /&gt;
In this case we are configuring several services (HTTP, HTTPS, SSH, FTP, DNS) in a DMZ, and each service requires the correct &#039;&#039;&#039;internal port&#039;&#039;&#039; (the port used within the network) and &#039;&#039;&#039;external port&#039;&#039;&#039; (the port used by external clients to access the service) setting&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A DMZ.png]]&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable DMZ&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Enable DMZ to configure it further.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Host IP Address&lt;br /&gt;
|Ex: 192.168.10.1&lt;br /&gt;
|This is the internal IP address of the device  or server that will be in the DMZ.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Protocol&lt;br /&gt;
|1.) TCP&lt;br /&gt;
&lt;br /&gt;
2.) UDP&lt;br /&gt;
&lt;br /&gt;
3.) ICMP&lt;br /&gt;
&lt;br /&gt;
4.) All&lt;br /&gt;
|&#039;&#039;&#039;TCP&#039;&#039;&#039;: Used  for reliable services like HTTP, HTTPS, FTP, and SSH.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;UDP&#039;&#039;&#039;: Often  used for services like DNS that don&#039;t require as much reliability.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ICMP&#039;&#039;&#039;: Used  for sending control messages like &amp;quot;ping.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;All&#039;&#039;&#039;: Select  this if you&#039;re unsure which protocol to allow, but it&#039;s less secure.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Allow HTTP&lt;br /&gt;
|Internal Port: 80&lt;br /&gt;
&lt;br /&gt;
External Port: 80&lt;br /&gt;
|Enables web traffic over the unsecured &#039;&#039;&#039;HTTP&#039;&#039;&#039;  protocol.&lt;br /&gt;
&lt;br /&gt;
(Port 80 is the standard port for HTTP traffic  on our internal network).&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Allow HTTPS&lt;br /&gt;
|Internal Port: 443&lt;br /&gt;
&lt;br /&gt;
External Port: 443&lt;br /&gt;
|Enables secure web traffic over &#039;&#039;&#039;HTTPS.&#039;&#039;&#039; (Port  443 is the standard port for HTTPS on our internal network).&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Allow SSH&lt;br /&gt;
|Internal Port: 52434&lt;br /&gt;
&lt;br /&gt;
External Port: 52434&lt;br /&gt;
|This is a custom port we’re using for SSH.&lt;br /&gt;
&lt;br /&gt;
The default is 22.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Allow FTP&lt;br /&gt;
|Internal Port: 21/20&lt;br /&gt;
&lt;br /&gt;
External Port: 21/20&lt;br /&gt;
|FTP is used to transfer files between  computers.&lt;br /&gt;
&lt;br /&gt;
(These are the standard ports for FTP traffic.  Port 21 is used for control commands, and port 20 for the data transfer.)&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|Allow DNS&lt;br /&gt;
|Internal Port: 53&lt;br /&gt;
&lt;br /&gt;
External Port: 53&lt;br /&gt;
|Standard DNS port within our internal network.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== 4.7 Others ===&lt;br /&gt;
In this page the user will get to do all the other miscellaneous configuration with respect to the device based on the required parameters. Each utility serves a specific purpose, providing various functionalities for managing and troubleshooting network configurations and statuses.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Others.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Set Date&lt;br /&gt;
|Date and time fields (day, month, year,  hour, minute, second)&lt;br /&gt;
|Sets the system date and time to the specified  values.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Get Date&lt;br /&gt;
|System&lt;br /&gt;
|Retrieves and displays the current system date  and time.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|ipsec status all&lt;br /&gt;
|Command ‘Get’&lt;br /&gt;
|Displays the status of all IPsec connections.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Wi-Fi Scan&lt;br /&gt;
|Command ‘Get’&lt;br /&gt;
|Initiates a scan for available Wi-Fi networks.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|iPerf3 Client&lt;br /&gt;
|IP address (e.g., 192.168.10.100)&lt;br /&gt;
|Runs an iPerf3 client to measure network  performance.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|iPerf3 Server&lt;br /&gt;
|Command ‘Run’&lt;br /&gt;
|Runs an iPerf3 server to measure network  performance.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Ping&lt;br /&gt;
|IP address or domain (e.g., 8.8.8.8)&lt;br /&gt;
|Sends ICMP echo requests to the specified  address to check connectivity.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|traceroute&lt;br /&gt;
|IP address or domain (e.g., 8.8.8.8)&lt;br /&gt;
|Traces the route packets take to reach the  specified address.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|NTP Sync&lt;br /&gt;
|Command ‘Sync’&lt;br /&gt;
|Synchronizes the system time with the  configured NTP server.&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Download Files&lt;br /&gt;
|File or database identifier&lt;br /&gt;
|Initiates a download of the specified file or database.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Restart Power&lt;br /&gt;
|Command ‘Restart’&lt;br /&gt;
|Restarts the power of the device.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Restart Modem&lt;br /&gt;
|Command ‘Restart’&lt;br /&gt;
|Restarts the modem.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Run AT Command&lt;br /&gt;
|Enter AT command&lt;br /&gt;
|Executes the specified AT command on the modem.&lt;br /&gt;
|-&lt;br /&gt;
|14&lt;br /&gt;
|Show Board Configuration&lt;br /&gt;
|Command ‘Show’&lt;br /&gt;
|Displays the current board configuration.&lt;br /&gt;
|-&lt;br /&gt;
|15&lt;br /&gt;
|Show VPN Certificate Name&lt;br /&gt;
|Command ‘Show’&lt;br /&gt;
|Displays the name of the VPN certificate in  use.&lt;br /&gt;
|-&lt;br /&gt;
|16&lt;br /&gt;
|Switch SIM to Secondary (Takes &amp;gt;2  mins)&lt;br /&gt;
|Command ‘Run’&lt;br /&gt;
|Switches the active SIM to the secondary SIM  card.&lt;br /&gt;
|-&lt;br /&gt;
|17&lt;br /&gt;
|Send test SMS&lt;br /&gt;
|Phone number (e.g., +911234567890)  message text (e.g., &amp;quot;Hello how are you?&amp;quot;)&lt;br /&gt;
|Sends a test SMS to the specified phone number.&lt;br /&gt;
|-&lt;br /&gt;
|18&lt;br /&gt;
|ReadlatestSMS&lt;br /&gt;
|Command ‘Read’&lt;br /&gt;
|Reads the most recent SMS received by the  device.&lt;br /&gt;
|-&lt;br /&gt;
|19&lt;br /&gt;
|Data Usage&lt;br /&gt;
|&#039;&#039;&#039;From:&#039;&#039;&#039; Start  date (YYYY-MM-DD)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;To:&#039;&#039;&#039; End date  (YYYY-MM-DD)&lt;br /&gt;
|Displays data usage statistics for the  specified date range.&lt;br /&gt;
|-&lt;br /&gt;
|20&lt;br /&gt;
|Monthly Data Usage&lt;br /&gt;
|&#039;&#039;&#039;Month:&#039;&#039;&#039; Month (e.g., 07)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Year:&#039;&#039;&#039; Year  (e.g., 2024)&lt;br /&gt;
|Displays data usage statistics for the  specified month and year.&lt;br /&gt;
|-&lt;br /&gt;
|21&lt;br /&gt;
|Modem Debug Info&lt;br /&gt;
|Command ‘Read’&lt;br /&gt;
|Displays debug information for the modem.&lt;br /&gt;
|-&lt;br /&gt;
|22&lt;br /&gt;
|Scan Network operators (Takes &amp;gt;3  mins)&lt;br /&gt;
|Command ‘Scan’&lt;br /&gt;
|Initiates a scan for available network  operators.&lt;br /&gt;
|-&lt;br /&gt;
|23&lt;br /&gt;
|Network operator list (First Perform  Scan Network Operators)&lt;br /&gt;
|Command ‘Show’&lt;br /&gt;
|Displays the list of network operators detected  in the previous scan.&lt;br /&gt;
|-&lt;br /&gt;
|24&lt;br /&gt;
|ReadLogFiles&lt;br /&gt;
|Log file identifier&lt;br /&gt;
|Reads and displays the specified log file&lt;br /&gt;
|-&lt;br /&gt;
|25&lt;br /&gt;
|Enable ssh (Admin)&lt;br /&gt;
|Command ‘Run’&lt;br /&gt;
|Enables SSH access for the admin user.&lt;br /&gt;
|-&lt;br /&gt;
|26&lt;br /&gt;
|Disable ssh (Admin)&lt;br /&gt;
|Command ‘Run’&lt;br /&gt;
|Disables SSH access for the admin user.&lt;br /&gt;
|-&lt;br /&gt;
|27&lt;br /&gt;
|ClearSIM1Data&lt;br /&gt;
|Command ‘Clear’&lt;br /&gt;
|Clears data usage statistics for SIM1.&lt;br /&gt;
|-&lt;br /&gt;
|28&lt;br /&gt;
|ClearSIM2Data&lt;br /&gt;
|Command ‘Clear’&lt;br /&gt;
|Clears data usage statistics for SIM2.&lt;br /&gt;
|-&lt;br /&gt;
|29&lt;br /&gt;
|Create Bridge with SW_LAN&lt;br /&gt;
|Network interface identifier&lt;br /&gt;
|Creates a network bridge with the specified  interface and SW_LAN.&lt;br /&gt;
|-&lt;br /&gt;
|30&lt;br /&gt;
|Show Bridge&lt;br /&gt;
|Command ‘Show’&lt;br /&gt;
|Displays information about the current network  bridges.&lt;br /&gt;
|-&lt;br /&gt;
|31&lt;br /&gt;
|Delete Bridge&lt;br /&gt;
|Command ‘Delete’&lt;br /&gt;
|Deletes the specified network bridge.&lt;br /&gt;
|-&lt;br /&gt;
|32&lt;br /&gt;
|Output&lt;br /&gt;
|Any value&lt;br /&gt;
|Displays output for all the above actions.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== 4.8 SNMP Agent Configuration ===&lt;br /&gt;
The &#039;&#039;&#039;SNMP (Simple Network Management Protocol) Agent Configuration&#039;&#039;&#039; is essential for monitoring and managing network devices, such as routers, from a central management system.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A SNMP Agent Configuration.png]]&lt;br /&gt;
&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable SNMP  Service&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|Enable this  if you want the device to be accessible for SNMP-based monitoring and management.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|IP Family&lt;br /&gt;
|IPV4&lt;br /&gt;
|Specifies that  SNMP service will operate over IPv4.&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Port&lt;br /&gt;
|161&lt;br /&gt;
|&#039;&#039;&#039;161&#039;&#039;&#039; is  the default and should be used unless there is a specific need to use a  different port.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|System OID&lt;br /&gt;
|1.3.6.1.4.1.38151&lt;br /&gt;
|This unique  identifier represents the device in the SNMP management system.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Name&lt;br /&gt;
|Invendis  Router&lt;br /&gt;
|The name used  to identify the device in the SNMP management system.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Contact&lt;br /&gt;
|Invendis@invendis.co&lt;br /&gt;
|The email  address of the person responsible for the device, used for administrative  contact.&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|Location&lt;br /&gt;
|Bangalore&lt;br /&gt;
|The physical  location of the device.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|SNMP Version&lt;br /&gt;
|Version-1,&lt;br /&gt;
&lt;br /&gt;
Version-2,&lt;br /&gt;
&lt;br /&gt;
Version-3&lt;br /&gt;
|&#039;&#039;&#039;Version-1&#039;&#039;&#039;:  Basic and outdated, offering no security.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Version-2&#039;&#039;&#039;:  An improvement over Version-1 with better performance and some security  features.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Version-3&#039;&#039;&#039;:  The most secure, offering authentication and encryption (AuthPriv).&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Security       (for SNMP Version-3)&lt;br /&gt;
|NoAuthNoPriv&lt;br /&gt;
&lt;br /&gt;
AuthNoPriv&lt;br /&gt;
&lt;br /&gt;
AuthPriv&lt;br /&gt;
|&#039;&#039;&#039;No  Authentication, No Privacy&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Authentication,  No Privacy&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Authentication  and Privacy&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|10&lt;br /&gt;
|Username&lt;br /&gt;
|Ex: admin&lt;br /&gt;
|The username  used for SNMP authentication.&lt;br /&gt;
|-&lt;br /&gt;
|11&lt;br /&gt;
|Authentication  Password &lt;br /&gt;
|*******&lt;br /&gt;
|This password  is used to authenticate the SNMP user.&lt;br /&gt;
|-&lt;br /&gt;
|12&lt;br /&gt;
|Privacy  Password&lt;br /&gt;
|*******&lt;br /&gt;
|This password  is used to encrypt SNMP messages.&lt;br /&gt;
|-&lt;br /&gt;
|13&lt;br /&gt;
|Download MIB  File&lt;br /&gt;
|Download&lt;br /&gt;
|Click this to  download the MIB file associated with the device’s SNMP configuration.&lt;br /&gt;
|}&lt;br /&gt;
Click on save tab to save changes.&lt;br /&gt;
&lt;br /&gt;
=== 4.9 Connection Diagnostics ===&lt;br /&gt;
This can ensure that your connection diagnostics application effectively monitors and reports the status of your network connections, providing valuable data for troubleshooting and performance optimization.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Connection Diagnostics.png]]This Application works in 3 parts,&lt;br /&gt;
&lt;br /&gt;
1.) General settings&lt;br /&gt;
&lt;br /&gt;
2.) Connection status and management&lt;br /&gt;
&lt;br /&gt;
3.) Application Start/Stop&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Application Manager Dashboard.png]]&lt;br /&gt;
&#039;&#039;&#039;General settings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
First make configuration changes in this section and save.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Application Manager Dashboard General Settings.png]]&lt;br /&gt;
Specification details are given below:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|SN&lt;br /&gt;
|Field  Name&lt;br /&gt;
|Sample  Value&lt;br /&gt;
|Description&lt;br /&gt;
|-&lt;br /&gt;
|1&lt;br /&gt;
|Enable Connection Diagnostics&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|This option  enables or disables the connection diagnostics functionality.&lt;br /&gt;
|-&lt;br /&gt;
|2&lt;br /&gt;
|Check Interval (in seconds)&lt;br /&gt;
|&#039;&#039;&#039;Value:&#039;&#039;&#039; 120&lt;br /&gt;
|Specifies how  often (in seconds) the diagnostics checks are performed. In this case, every  120 seconds. (min 60 secs)&lt;br /&gt;
|-&lt;br /&gt;
|3&lt;br /&gt;
|Number of Pings&lt;br /&gt;
|&#039;&#039;&#039;Value:&#039;&#039;&#039; 5&lt;br /&gt;
|Determines ping  requests sent during each check.&lt;br /&gt;
|-&lt;br /&gt;
|4&lt;br /&gt;
|Ping Packet Size (in Bytes)&lt;br /&gt;
|&#039;&#039;&#039;Value:&#039;&#039;&#039; 56&lt;br /&gt;
|Defines the  size of each ping packet in bytes.&lt;br /&gt;
|-&lt;br /&gt;
|5&lt;br /&gt;
|Send to remote MQTT Broker&lt;br /&gt;
|Enable/Disable&lt;br /&gt;
|This option  enables the sending of diagnostic data to a remote MQTT broker.&lt;br /&gt;
|-&lt;br /&gt;
|6&lt;br /&gt;
|Publish Data Format&lt;br /&gt;
|&#039;&#039;&#039;CSV&#039;&#039;&#039; / &#039;&#039;&#039;JSON&#039;&#039;&#039;&lt;br /&gt;
|Specifies the  format in which the diagnostic data will be published to the MQTT broker. You  can choose either CSV (Comma-Separated Values) or JSON (JavaScript Object  Notation).&lt;br /&gt;
|-&lt;br /&gt;
|7&lt;br /&gt;
|MQTT Broker url&lt;br /&gt;
|&#039;&#039;&#039;Value:&#039;&#039;&#039; broker.hivemq.com&lt;br /&gt;
|The URL of  the MQTT broker where the diagnostic data will be sent.&lt;br /&gt;
|-&lt;br /&gt;
|8&lt;br /&gt;
|TCP port&lt;br /&gt;
|&#039;&#039;&#039;Value:&#039;&#039;&#039; 1883&lt;br /&gt;
|The TCP port  used to connect to the MQTT broker. Port 1883 is the default port for MQTT.&lt;br /&gt;
|-&lt;br /&gt;
|9&lt;br /&gt;
|Topic&lt;br /&gt;
|&#039;&#039;&#039;Value:&#039;&#039;&#039; 37A26230014/connectionDiagnostics&lt;br /&gt;
|The MQTT  topic under which the diagnostic data will be published. This topic is used  to categorize and identify the data.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Connection status and management:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To setup a connection,&lt;br /&gt;
&lt;br /&gt;
Click on ‘Add new target’&lt;br /&gt;
&lt;br /&gt;
Enter Target IP (Ex: 8.8.8.8)&lt;br /&gt;
&lt;br /&gt;
Click ‘Add’&lt;br /&gt;
&lt;br /&gt;
Target has been added successfully. &lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Connection Status and Management.png]] &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Application Start/Stop:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To check whether the target Ip is sending and receiving packets, you need to start the application to see the desired output.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Application Start and Stop.png]]&lt;br /&gt;
&lt;br /&gt;
As shown above, our target Ip is sending packets successfully.&lt;br /&gt;
&lt;br /&gt;
You can Add as many target IP’s you need to monitor.&lt;br /&gt;
&lt;br /&gt;
You can leave the application on for monitoring else ‘Stop’ the application.&lt;br /&gt;
&lt;br /&gt;
=== 4.10 Package Manager ===&lt;br /&gt;
A &#039;&#039;&#039;Package Manager&#039;&#039;&#039; is a tool or interface used to &#039;&#039;&#039;manage software packages&#039;&#039;&#039; (applications, libraries, tools) on a system.&lt;br /&gt;
&lt;br /&gt;
The package manager interface you are looking at likely allows you to manage the software installed on your device, such as networking tools, firmware, or other applications relevant to your system.&lt;br /&gt;
&lt;br /&gt;
This section has 3 sub-sections,&lt;br /&gt;
&lt;br /&gt;
Installed APP&lt;br /&gt;
&lt;br /&gt;
Available APP&lt;br /&gt;
&lt;br /&gt;
Manual Upgrade&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A PacKage Manager.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Installed APP:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
When you select Installed APP, you will see all the software that is actively running or installed on the device.&lt;br /&gt;
&lt;br /&gt;
This could include system utilities, network management tools, monitoring software, or any third-party apps that were previously installed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Common Actions&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;View Details&#039;&#039;&#039;: You can check each application&#039;s version, source, and     installation date.&lt;br /&gt;
* &#039;&#039;&#039;Uninstall&#039;&#039;&#039;: You can remove applications that are no longer needed.&lt;br /&gt;
* &#039;&#039;&#039;Check for Updates&#039;&#039;&#039;: You can see if there are updates available for any     installed application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Available APP&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
When you select &#039;&#039;&#039;Available APP&#039;&#039;&#039;, you will see a list of software that can be installed from the system&#039;s repositories or sources.&lt;br /&gt;
&lt;br /&gt;
These applications are not yet installed but are ready for installation if needed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Common Actions&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Install&#039;&#039;&#039;: You can install any of the available applications by selecting them.&lt;br /&gt;
* &#039;&#039;&#039;View Details&#039;&#039;&#039;: You can review each application&#039;s description, version, and     functionality before installing.&lt;br /&gt;
* &#039;&#039;&#039;Search&#039;&#039;&#039;: You can search for specific apps by name or category.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Manual Upgrade&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
In contrast to automatic updates, &#039;&#039;&#039;Manual Upgrade&#039;&#039;&#039; lets you take control over which packages or applications you want to upgrade and when.&lt;br /&gt;
&lt;br /&gt;
This can be useful if you need to avoid upgrading certain apps due to compatibility or testing purposes, or if you want to perform updates at a specific time.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Common Actions&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Check for Updates&#039;&#039;&#039;: The system will check for available updates for installed     apps.&lt;br /&gt;
* &#039;&#039;&#039;Select Updates&#039;&#039;&#039;: You can select which packages to update manually.&lt;br /&gt;
* &#039;&#039;&#039;Upgrade Now&#039;&#039;&#039;: You can start the upgrade process immediately for selected apps.&lt;br /&gt;
&lt;br /&gt;
== 5.Status ==&lt;br /&gt;
In this module the user can view the status of the router device with respect to the network, Wan, modem etc.&lt;br /&gt;
&lt;br /&gt;
It has 4 submodules.&lt;br /&gt;
&lt;br /&gt;
* Interfaces&lt;br /&gt;
* Internet&lt;br /&gt;
* Modem&lt;br /&gt;
* Routes&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Status.png]]&lt;br /&gt;
&lt;br /&gt;
=== 5.1 Interfaces ===&lt;br /&gt;
Each network device (interface) is associated with specific traffic statistics, uptime, and status. Active interfaces are operational, while inactive interfaces are not currently transmitting data.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Interfaces .png]]&lt;br /&gt;
&lt;br /&gt;
Looking on the network status the user can check if the cellular, wifi, ewan, vpn etc is up.&lt;br /&gt;
&lt;br /&gt;
=== 5.2 Internet ===&lt;br /&gt;
In this submodule the user can view the status of the internet connections.&lt;br /&gt;
&lt;br /&gt;
[[File:IAC44A Internet.png]]&lt;br /&gt;
&lt;br /&gt;
To see the latest status of the internet connection the user needs to click on the refresh button.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5.3 Modem&lt;br /&gt;
&lt;br /&gt;
This modem status page provides comprehensive information about the cellular connection&#039;s network operator, technology, mode, and various signal quality metrics. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 5.4 Routes ==&lt;br /&gt;
This configuration shows how the router directs traffic between different networks and interfaces, ensuring proper communication within the local network and to external networks via the default gateway.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ARP Table:&#039;&#039;&#039; Maps IP addresses to MAC addresses for devices on the network, helping in identifying which device is on which interface.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPv4 Routes:&#039;&#039;&#039; This shows which network is directly connected on which interface.&lt;br /&gt;
&lt;br /&gt;
Example: Network &#039;&#039;&#039;192.168.10.0/24&#039;&#039;&#039; is directly connected on interface &#039;&#039;&#039;eth0.1.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPv6 Routes:&#039;&#039;&#039; Similar routes as IPv4, but this time listed under IPv6 routing rules.&lt;br /&gt;
&lt;br /&gt;
Example: Local networks &#039;&#039;&#039;192.168.10.0/24&#039;&#039;&#039; and &#039;&#039;&#039;192.168.100.0/24&#039;&#039;&#039; are managed through &#039;&#039;&#039;eth0.1&#039;&#039;&#039; and &#039;&#039;&#039;ra0&#039;&#039;&#039;, respectively. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;*Refer the below image*&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
= 6.Logout =&lt;br /&gt;
The user should click on log out option to logged out from the router application.&lt;br /&gt;
&lt;br /&gt;
[[File:Logout.png|frameless|620x620px]]&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=File:IAC44A_Internet.png&amp;diff=2819</id>
		<title>File:IAC44A Internet.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=File:IAC44A_Internet.png&amp;diff=2819"/>
		<updated>2025-01-24T11:23:46Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;IAC44A  Internet&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=File:IAC44A_Interfaces_.png&amp;diff=2818</id>
		<title>File:IAC44A Interfaces .png</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=File:IAC44A_Interfaces_.png&amp;diff=2818"/>
		<updated>2025-01-24T11:17:44Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;IAC44A Interfaces&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=File:IAC44A_Status.png&amp;diff=2817</id>
		<title>File:IAC44A Status.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=File:IAC44A_Status.png&amp;diff=2817"/>
		<updated>2025-01-24T11:13:19Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;IAC44A Status&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=File:IAC44A_PacKage_Manager.png&amp;diff=2816</id>
		<title>File:IAC44A PacKage Manager.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=File:IAC44A_PacKage_Manager.png&amp;diff=2816"/>
		<updated>2025-01-24T11:11:19Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;IAC44A PacKage Manager&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=File:IAC44A_Application_Start_and_Stop.png&amp;diff=2815</id>
		<title>File:IAC44A Application Start and Stop.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=File:IAC44A_Application_Start_and_Stop.png&amp;diff=2815"/>
		<updated>2025-01-24T11:09:37Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;IAC44A Application Start and Stop&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=File:IAC44A_Connection_Status_and_Management.png&amp;diff=2814</id>
		<title>File:IAC44A Connection Status and Management.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=File:IAC44A_Connection_Status_and_Management.png&amp;diff=2814"/>
		<updated>2025-01-24T11:08:31Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;IAC44A Connection Status and Management&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=File:IAC44A_Application_Manager_Dashboard_General_Settings.png&amp;diff=2813</id>
		<title>File:IAC44A Application Manager Dashboard General Settings.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=File:IAC44A_Application_Manager_Dashboard_General_Settings.png&amp;diff=2813"/>
		<updated>2025-01-24T11:07:31Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;IAC44A Application Manager Dashboard General Settings&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=File:IAC44A_Application_Manager_Dashboard.png&amp;diff=2812</id>
		<title>File:IAC44A Application Manager Dashboard.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=File:IAC44A_Application_Manager_Dashboard.png&amp;diff=2812"/>
		<updated>2025-01-24T11:06:36Z</updated>

		<summary type="html">&lt;p&gt;Wikisysop: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;IAC44A Application Manager Dashboard&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
</feed>