IAC44 A User Manual: Difference between revisions

From Silbo Networks
No edit summary
 
(17 intermediate revisions by the same user not shown)
Line 21: Line 21:
It will provide the Ip address/url of that device through which the application can be accessed.
It will provide the Ip address/url of that device through which the application can be accessed.


[[File:Connecting_via_LAN_RB44.png|frameless|620x620px]]
[[File:Connecting_via_LAN_RB44.png|1024x1024px]]


== Log In ==
== Log In ==
Line 28: Line 28:
It will show the log in page of the application.
It will show the log in page of the application.


[[File:Log In.png|frameless|620x620px]]
[[File:Log In.png|1024x1024px]]


Give the valid credentials for the username and password to login to the application page.
Give the valid credentials for the username and password to login to the application page.
Line 38: Line 38:
The “Status” landing page shows all the detailed specification of the device like system, memory storage and connection tracking etc.
The “Status” landing page shows all the detailed specification of the device like system, memory storage and connection tracking etc.


[[File:IAC44A Dashboard.png|frameless|620x620px]]
[[File:IAC44A Dashboard.png|1024x1024px]]


The application is divided in to 8 Modules.
The application is divided in to 6 Modules.


* Info
* Info
Line 46: Line 46:
* Maintenance
* Maintenance
* Status
* Status
* Features
* Feature
* Configuration
* Appmanager
* Logout
* Logout


Line 62: Line 60:
* Kernel Log
* Kernel Log


[[File:IA44A Info Section.png|frameless|620x620px]]
[[File:IA44A Info Section.png|975x975px]]


=== 1.1 Overview ===
=== 1.1 Overview ===
In overview module it displays all the specification categorically of a device like System, Memory, storage, Connection tracking, DHCP Lease.
In overview module it displays all the specification categorically of a device like System, Memory, storage, Connection tracking, DHCP Lease.


[[File:IAC44A Dashboard.png|frameless|620x620px]]
[[File:IAC44A Dashboard.png|1024x1024px]]


'''System:'''
'''System:'''
Line 85: Line 83:
|1
|1
|Hostname
|Hostname
|37B11241002
|37A26230007
|This field  displays the router serial number of the device
|This field  displays the router serial number of the device
|-
|-
Line 95: Line 93:
|3
|3
|Firmware Version  and IPK Version
|Firmware Version  and IPK Version
|1.16_1.13_RC3
|1.17_1.15
|This field  displays the firmware version and IPK version
|This field  displays the firmware version and IPK version
|-
|-
Line 105: Line 103:
|5
|5
|Local Time
|Local Time
|Friday, July 19, 2024 at 11:52:23 AM
|Wednesday, January 8, 2025 at 06:15:29  PM
|This field displays the local time
|This field displays the local time
|-
|-
|6
|6
|Uptime
|Uptime
|1h 48m 3s
|0h 27m 58s
|This field  displays the uptime of the device
|This field  displays the uptime of the device
|-
|-
|7
|7
|Load Average
|Load Average
|0.66 0.29 0.17
|0.49 0.36 0.40
|This field  displays the average load
|This field  displays the average load
|}
|}
Line 122: Line 120:
In this section it displays the memory configured specification of the device.
In this section it displays the memory configured specification of the device.


[[File:IAB44C Memory Section.png|frameless|620x620px]]
[[File:IAB44C Memory Section.png|1024x1024px]]


The specifications details are as follows.
The specifications details are as follows.
Line 155: Line 153:
In this section it displays the status of storage as root and temporary usage specification of the device.
In this section it displays the status of storage as root and temporary usage specification of the device.


[[File:IAB44C Storage Section.png|frameless|620x620px]]
[[File:IAB44C Storage Section.png|1024x1024px]]


The specifications details are as follows.
The specifications details are as follows.
Line 178: Line 176:
In this section you can monitor IPv4 WAN status.
In this section you can monitor IPv4 WAN status.


[[File:IPv4 Wan Status.png|frameless|612x612px]]
[[File:IPv4 Wan Status.png|1024x1024px]]


The specifications details are as follows.
The specifications details are as follows.
Line 218: Line 216:
This section displays SIM details only when the SIM card is active.
This section displays SIM details only when the SIM card is active.


[[File:IAB44C Sim Information.png|frameless|620x620px]]
[[File:IAB44C Sim Information.png]]


'''Connection Tracking:'''
'''Connection Tracking:'''
Line 224: Line 222:
In this section it displays the status of connection tracking for the device.
In this section it displays the status of connection tracking for the device.


[[File:Connection Tracking.png|frameless|620x620px]]
[[File:Connection Tracking.png]]


The specifications details are as follows.
The specifications details are as follows.
Line 242: Line 240:
In this section it displays the DHCP lease of the temporary assignment of an IP address to a device on the network.
In this section it displays the DHCP lease of the temporary assignment of an IP address to a device on the network.


[[File:IAB44C DHCP Leases.png|frameless|620x620px]]
[[File:IAB44C DHCP Leases.png]]


The specifications details are below.
The specifications details are below.
Line 273: Line 271:


=== 1.2 System Log ===
=== 1.2 System Log ===
This page provides on screen System logging information. In this page the user gets to view the system logs.[[File:System Log.png|frameless|620x620px]]
This page provides on screen System logging information. In this page the user gets to view the system logs.
 
[[File:IAC44A System logs.png]]


=== 1.3 Kernel Log ===
=== 1.3 Kernel Log ===
Line 280: Line 280:
In this page the user gets to view the Kernel logs.
In this page the user gets to view the Kernel logs.


[[File:Kernel Log.png|frameless|620x620px]]
[[File:IAC44A Kernel Logs.png]]


= 2. Setting =
== 2. Setting ==
In this “Setting” module the user can Configure/update all the required parameters related to Network, SIM Switch, Internet, VPN, Firewall, Loopback Rule, Remote monitoring, Tunnel as per requirement.
In this “Setting” module the user can Configure/update all the required parameters related to Network, SIM Switch, Internet, VPN, Firewall, Loopback Rule, Remote monitoring, Tunnel as per requirement.


Line 288: Line 288:


* Network
* Network
* VLAN
* Sim Switch
* Sim Switch
* Internet
* Multi-WAN
* VPN
* VPN
* Firewall
* Firewall
* Loopback Rule
* Loopback Rule
* VRRP
* Remote Monitoring
* Remote Monitoring
* Tunnel
* Tunnel
[[File:IAC44A Settings.png]]


[[File:Settings.png|frameless|620x620px]]


=== 2.1 Network ===
=== 2.1 Network ===
In this section the user does all the setting related configuration with reference to network like Ethernet Setting, Cellular Setting, Band lock and Operator Lock, Wi-Fi, Guest Wi-Fi, Wireless Schedule, SMS Setting, Loopback IP.
In this section the user does all the setting related configuration with reference to network like Ethernet Setting, Cellular Setting, Band lock and Operator Lock, Wi-Fi, Guest Wi-Fi, Wireless Schedule etc.


[[File:IAB44C Network Settings .png|frameless|620x620px]]
[[File:IAC44A Network.png]]'''Ethernet Setting:'''


'''Ethernet Setting:'''
'''Ethernet Setting:'''
Line 307: Line 309:
In this page it will display all the configured port that is attached with the device.
In this page it will display all the configured port that is attached with the device.


For this device 5 ports are configured. Ethernet mode can be configured as WAN and as LAN as well. Ethernet LAN Connection settings can be configured as DHCP server or Static.
For this device 5 ports are configured.


[[File:IAC44C Ethernet settings.png|frameless|620x620px]]
Ethernet mode can be configured as WAN and as LAN as well.


'''For port 5 settings,'''
Ethernet WAN Connection settings can be configured as DHCP, Static and PPOE.


Port 5 is convertible from WAN to LAN while EWAN2(WAN) stays by default.
[[File:IAC44A Ethernet Settings.png|1723x1723px]]


'''Note:''' After any changes made, save and update the page below.


[[File:Port 5 WAN to LAN configuration.png|frameless|620x620px]]
'''EDIT:'''


'''SW_LAN settings,'''
To add a new Interface, click on ‘Add’.


In this part the user can configure the setting for SW_LAN.
To edit the existing device the user needs to click on the edit option.


'''Note:''' After any changes made, save and update the page below.
Once the changes are done click on the update button to save all the changes.


[[File:SW LAN Settings.png|frameless|620x620px]]
Click on the deleted button to delete the existing device detail.


'''Note: If required, add an interface in Settings-->Multi-WAN-->Failover'''


The specifications details are below.
[[File:IAC44A EWAN Settings.png]]
 
Specification details are given below:  '''Type: WAN'''
{| class="wikitable"
{| class="wikitable"
|SN
|SN
|Field  name
|Field  Name
|Sample  value
|Sample  Value
|Description
|Description
|-
|-
|1
|1
|SW_LAN Ethernet Protocol
|Physical Device
|DHCP  Server
|Ex: eth0.5
|This field displays the Ethernet  mode selection.
|This indicates a network interface on which our network is connected. This setting is by default (Editable).
|-
|-
|2
|2
|SW_LAN DHCP Server IP
|Type
|192.168.10.1
|'''WAN'''/LAN
|This field displays DHCP server IP  configured which can be changed accordingly.
|This designates whether the interface is part  of the WAN or LAN.
 
WAN: Connects the device to the internet.
 
LAN: Connects the device to the internal  network.
|-
| colspan="4" |                                                                     '''Protocol: Static'''
|-
|-
|3
|3
|SW_LAN  DHCP Netmask
|Static IP Address
|255.255.255.0
|Ex: 192.168.1.10
|This field displays DHCP server Netmask address configured.
|The manually assigned IP address for the interface.
|-
|-
|4
|4
|SW_LAN  DHCP Start Address
|Static Netmask
|100
|Ex: 255.255.255.0
|This field displays DHCP server start  address configured.
|Subnet mask corresponding to the IP address.
|-
|-
|5
|5
|SW_LAN DHCP Limit
|Static Gateway
|50
|Ex: 192.168.1.1
|This field displays DHCP server limit.
|The IP address of the gateway (router) that the interface will use to send traffic outside its own subnet.
|-
| colspan="4" |                                                                     '''Protocol: DHCP'''
|-
|-
|6
|6
|DNS  Server
|DHCP Gateway
|1
|Ex: 10.1.1.1
|This filed display number of DNS server  availability.
|The IP address of the DHCP server (often the same as the router or gateway).
|-
| colspan="4" |                                                                     '''Protocol: PPPoE'''
|-
|-
|7
|7
|DNS  Server Address
|Username
|8.8.8.8
|Any Name
|This filed display the DNS server address.
|The username provided by your ISP for PPPoE authentication.
|}
After configuring all the required information, the user should click on the save and then click on the update to update the all the required information.
 
'''Static option for SW_LAN Ethernet Protocol:'''
 
Select the option of static from the drop-down menu for SW_LAN Ethernet Protocol.
 
'''Note:''' After any changes made, save and update the page below.
 
[[File:Static option for SW LAN Ethernet Protocol.png|frameless|620x620px]]
 
The specifications details are below.
{| class="wikitable"
|SN
|Field name
|Sample value
|Description
|-
|-
|1
|8
|SW_LAN Ethernet Protocol
|Password
|Static
|*****
|This field displays the Ethernet  mode selection
|The password provided by your ISP for PPPoE authentication.
|-
|9
|Access Concentrator
|
|Typically, the name of the ISP's PPPoE server.
|-
|-
|2
|10
|SW_LAN static IP
|Service Name
|192.168.5.1
|
|This field displays static server IP configured.
|Sometimes required by ISPs, this field  specifies a particular service offered by the ISP.
|-
|-
|3
|11
|SW_LAN  Netmask
|Gateway
|255.255.255.0
|Ex: 0.0.0.0
|This field displays static server Netmask  address configured
|The IP address used as the default route.
|-
|-
|4
|12
|DNS  Server
|Override MAC Address
|1
|Ex: D0:93:95:B0:CF:7A
|This filed display number of DSN server availability
|The MAC address for this interface is set to a custom value, replacing the default hardware address.
|-
|-
|5
|13
|DSN  Server Address
|Enable Bridge
|8.8.8.8
|1.      CWAN1_0
|This filed display the DSN  server address.
|}
After configuring all the required information, the user should click on the save and then click on the update to update the all the required information.


'''Cellular Setting:'''
2.      SW_LAN


In this page, the user needs to configure the various details with respect to the SIM.
3.      VPN


Select single cellular single sim where the user must configure the APN details of the sim used for the router device. The Configurations can be done based on the SIM usage, with respect to IPV4 or IPV6.
4.      ra0


[[File:IAB44C Network Configuration Dashboard.png|frameless|620x620px]]
|Since this is a WAN interface, it is not  typically bridged with others. Bridges are more common for LAN interfaces to  combine multiple connections.
 
|-
The specifications details are below.
|14
{| class="wikitable"
|Create Firewall Zone
|SN
|Enable/Disable
|Field name
|You can assign this interface to a particular  firewall zone, which determines its access rules (e.g., WAN zone for internet  traffic, LAN zone for internal traffic).
|Sample  value
|Description
|-
|-
|1
| colspan="4" |'''Advanced Settings: Enable/Disable'''
|Cellular Enable
|-
|Checkbox
|15
|Check this box to  enable cellular functionality.
|IPv4 Route Table
|Enable/Disable
|This field is used to specify static routes for IPv4.
|-
|-
|2
|16
|Cellular Operation Mode
|Table No.
|1.) Single Cellular with Dual Sim
|'''254''': Default main routing table.
 
'''100''': Custom  routing table for specific purposes.
|'''Default Table (Main Table)''': Usually, there is a default routing table  (often Table No. 254 or 255) where all the routes are stored by default.


2.) Single Cellular with Single  SIM
'''Custom Table''': You can  specify a different table number if you are managing multiple routing  policies (e.g., VoIP traffic, VPN traffic).
|1.) This mode allows you to use one cellular modem with two SIM cards.
|-
|17
|Gateway Metric
|Ex: 1
|A numeric value used to prioritize gateways when multiple are available.


2.) This mode allows you to use one cellular modem with single SIM card.
Lower metrics indicate higher priority. For example, if two gateways exist, the one with the smaller metric is used.
|-
|-
|3
|18
|Cellular  Modem 1
|Broadcast
|QuectelEC200A
|Ex: 192.168.123.34
|This field displays the modem name.
|Broadcast address for the network, typically calculated based on the IP and subnet mask.
|-
|-
|4
|19
|Choose SIM 1 APN Mode
|Override MTU
|1.) Auto
|Ex: 1500
 
|MTU size controls the maximum packet size that can be sent over the network.
2.)  Manual
|1.) Choose Auto for regular SIM to detect APN name automatically.


2.) Choose manual to enter the APN settings manually in case of  M2M SIM cards.
Default is usually 1500 bytes.
|-
|-
|5
|20
|SIM 1 Access Point Name
|Force Link
|airtelgprs.com
|Enable/Disable
|Enter the APN provided by your cellular service provider in case of M2M sim. For regular sim cards APN name will be displayed automatically.
|Forces the interface to be up even if no  physical link is detected.
|}
 
 
 
'''Type: LAN'''
 
[[File:IAC44A LAN Settings.png]]
 
Specification details are given below:
{| class="wikitable"
|SN
|Field  Name
|Sample  Value
|Description
|-
|1
|Physical Device
|Ex: eth0.1
|This is the network interface identifier.
|-
|2
|Type
|WAN/'''LAN'''
|This designates whether the interface is part of the WAN or LAN.
 
WAN: Connects the device to the internet.
 
LAN: Connects the device to the internal  network.
|-
|3
|Protocol
|Static
|This means that the IP address, netmask, and  other network settings are manually configured rather than being automatically assigned by a DHCP server.
|-
|4
|IP Address
|Ex: 192.168.10.1
|This is the static IP address assigned to the  interface. It acts as the gateway IP address for devices connected to this  LAN.
|-
|-
|6
|5
|SIM 1 PDP Type
|Static Netmask
|IPV4
|Ex: 255.255.255.0
|Choose the PDP  type, which is typically either IPv4 or IPv6 depending on the sim card.
|This is the subnet mask for the network.
|-
|-
|7
|7
|SIM 1 Username
|Override MAC Address
|
|D0:93:95:B0:CF:7B
|Enter the username if required by the APN. Leave blank if not required.
|This allows you to manually enter a different MAC address if needed.
|-
|-
|8
|8
|SIM 1 Password
|Enable DNS
|
|Enable/Disable
|Enter the password if required by the  APN. Leave blank if not required.
|If this option is enabled, the interface will  act as a DNS resolver for the devices on the LAN, using the specified DNS server.
|-
|-
|9
|9
|SIM 1 Authentication Protocol
|DNS Server Address
|None
|Ex: 8.8.8.8
|Choose the  authentication protocol. Options typically include None, PAP, or CHAP.
|This is the IP address of the DNS server that will be used by devices on the LAN to resolve domain names to IP addresses.
 
More than one DNS Address can be added.
|-
|-
|10
|10
|Choose SIM 2 APN Mode
|Enable DHCP Server
|1.) Auto
|Enable/Disable
 
|If enabled, this setting allows the interface to function as a DHCP server, automatically assigning IP addresses to devices  connected to the LAN.
2.) Manual
|1.) Choose Auto for regular SIM to detect APN name automatically.
 
2.) Choose manual to enter the APN settings manually in case of  M2M SIM cards.
|-
|-
|11
|11
|SIM 2 Access Point Name
|DHCP Start Address
|airtelgprs.com
|50
|Enter the APN provided by your cellular service provider in case of M2M sim. For regular  sim cards APN name will be displayed automatically.
|The DHCP server will begin assigning IP addresses starting from 192.168.10.50
|-
|-
|12
|12
|SIM 2 PDP Type
|DHCP Limit
|IPV4
|100
|Choose the  PDP type, which is typically either IPv4 or IPv6 depending on the sim card.
|This specifies the number of IP addresses the  DHCP server can assign. Starting at 192.168.10.50 and with a limit of 100, the server can assign addresses up to 192.168.10.149.
|-
|-
|13
|13
|SIM 2 Username
|Lease Time Duration
|
|Hours-(H)
|Enter the  username if required by the APN. Leave blank if not required.
 
Minutes-(M)
 
Seconds-(S)
|'''Hours-(H)''': This indicates  that the lease time for each IP address assignment is measured in hours.
 
'''Minutes-(M):''' This indicates that the lease time for each IP address assignment is measured in minutes.
 
'''Seconds-(S):''' This  indicates that the lease time for each IP address assignment is measured in seconds.
|-
|-
|14
|14
|SIM 2 Password
|Lease Time
|
|12
|Enter the  password if required by the APN. Leave blank if not required.
|The DHCP lease time is set to 12 hours. After  this period, a device must renew its IP address lease with the DHCP server to continue using the assigned IP address.
|-
|-
|15
|15
|SIM 2 Authentication Protocol
|Enable Bridge
|None
|1.      CWAN1_0
|Choose the authentication protocol. Options typically include None, PAP, or CHAP.
 
2.      SW_LAN
 
3.      VPN
 
4.      ra0
 
|Since this is a WAN interface, it is not typically bridged with others. Bridges are more common for LAN interfaces to  combine multiple connections.
|-
|-
|16
|16
|Primary SIM Switchback Time (In Minutes)
|Enable DHCP Relay
|10
|Enter Relay Server IP
|Enter the  time in minutes after which the system should switch back to the primary SIM if it becomes available.
|Forwards DHCP requests from devices in this subnet to an external DHCP server instead of using the built-in DHCP server.
|}
After configuring all the required information, the user should click on the save and then click on the update to update the all the required information.


'''Band lock and Operator Lock:'''
|-
|17
|Create Firewall Zone
|Enable/Disable
|You can assign this interface to a particular  firewall zone, which determines its access rules (e.g., WAN zone for internet  traffic, LAN zone for internal traffic).
|-
|18
|Internet Over SW_LAN
|Enable/Disable
|Allow all outbound traffic from the LAN to the  internet.
|-
| colspan="4" |'''Advanced Settings: Enable/Disable'''
|-
|19
|IPv4 Route Table
|Enable/Disable
|This field is used to specify static routes for  IPv4.
|-
|20
|Table No.
|'''254''': Default  main routing table.


In this page, the user needs to configure the lock band and operator based on the service provider'''.'''
'''100''': Custom  routing table for specific purposes.
|'''Default Table (Main Table)''': Usually, there is a default routing table  (often Table No. 254 or 255) where all the routes are stored by default.


Bands available in the drop-down list.
'''Custom Table''': You can  specify a different table number if you are managing multiple routing  policies (e.g., VoIP traffic, VPN traffic).
|-
|21
|Gateway Metric
|Ex: 1
|A numeric value used to prioritize gateways  when multiple are available.


[[File:Band lock and Operator Lock.png|frameless|620x620px]]
Lower metrics indicate higher priority. For  example, if two gateways exist, the one with the smaller metric is used.
|-
|22
|Broadcast
|Ex: 192.168.123.34
|Broadcast address for the network, typically  calculated based on the IP and subnet mask.
|-
|23
|Override MTU
|Ex: 1500
|MTU size controls the maximum packet size that  can be sent over the network.


'''2G/3G option:'''
Default is usually 1500 bytes.
|}
Save and Update once configuration changes have been made.


2G/3G: - 3G allows additional features such as mobile internet access, video calls and mobile TV. While the main function of 2G technology is the transmission of information through voice calls.


[[File:Band and Operator Lock settings Dashboard.png|frameless|620x620px]]
'''Relay Server:'''


The user should select the band check box available for 2g/3g from the given list. Bands available for selection under LTE for the bands available in that area.
A relay server typically functions in a network to forward requests (usually DHCP or DNS) from clients to


'''Operator Selection Mode:'''
a designated server when the server is on a different network segment.


The user needs to click on the check box of the “operator select enable” to select the operator.
[[File:IAC44A Relay Server.png]]


Once the check box is clicked there will be a dropdown list of the operator modes from which the user needs to select the mode. The user needs to select the operator mode from the given dropdown list.


[[File:Band and Operator Lock settings 2.png|frameless|620x620px]]


If the user selects the mode “Manual” or “Manual-Automatic” then one more text box will appear where the user must provide the operator code.
'''EDIT:'''


[[File:Band lock and Operator Lock 1.png|frameless|620x620px]]
To edit the existing device the user needs to click on the edit option.


After configuring all the required information, the user should click on the save and then click on the update to update the all the required information.
Once the changes are done click on the save button to save all the changes.


Click on the deleted button to delete the existing device detail.


'''Wi-Fi Setting:'''
[[File:IAC44A Relay Server Edit.png]]


In this, router has the general setting and change country code, channel, radio mode, radio passphrase as per the requirement after clicking on enable Radio button.
Specification details are given below:
{| class="wikitable"
|SN
|Field  Name
|Sample  Value
|Description
|-
|1
|Interface
|1.)    eth0.1


The user needs to select the respective radio mode based on its need.  
2.)    ra0
|1) eth0.1  typically represents a VLAN where the relay will listen for client requests.


[[File:Wifi General Settings .png|frameless|620x620px]]
2) If your  device is broadcasting a Wi-Fi network on the ra0 interface, any DHCP or DNS  relay settings will apply to devices connected via this wireless interface.
|-
|2
|Start IP  Address
|Ex: 192.168.10.100
|This is the  beginning IP address of the range that will be leased out to clients.
|-
|3
|End IP  Address
|Ex: 192.168.10.150
|An IP address  that is in the same subnet as the Start IP Address and allows sufficient  addresses to be leased.
|-
|4
|Netmask
|Ex: 255.255.255.0
|A valid  subnet mask such as 255.255.255.0 (for a /24 network), or 255.255.0.0 (for a  /16 network).
|-
|5
|Lease Time
|For a 24-hour  lease time, set this value to 86400.
|This is the  amount of time that an IP address is assigned to a client before it needs to  request a renewal from the DHCP server.
|}
Save and update.


It has 3 radio modes.


‘Access point’, ‘client only’ and ‘Access point and client’


Refer the below picture.
'''Cellular Setting:'''


[[File:Access point update.png|frameless|620x620px]]
In this page, the user needs to configure the various details with respect to the SIM.


'''Access Point mode:'''
Select single cellular single sim where the user must configure the APN details of the sim used for the router device. The Configurations can be done based on the SIM usage, with respect to IPV4 or IPV6.


In Access Point mode, a configuration in which a router, allows wireless devices to connect to a wired network by creating a Wi-Fi hotspot.
[[File:IAC44A Cellular Settings.png]]


[[File:Access point update.png|frameless|620x620px]]
Specification details are given below:
 
{| class="wikitable"
'''Client point:'''
|SN
 
|Field name
In client mode, the access point connects your wired devices to a wireless network. This mode is suitable when you have a wired device with an Ethernet port and no wireless capability, for example, a smart TV, Media Player, or Game console and you want to connect it to the internet wirelessly, select the Client Mode and give the Radio SSID & client passphrase.
|Sample value
 
[[File:Client point.png|frameless|620x620px]]
 
'''Access point and client point''':
 
Select this option for both type of connection, give both SSID and passphrase.
 
[[File:Access point and client point.png|frameless|620x620px]]
 
After configuring all the required information, the user should click on the save and then click on the update to update the all the required information.
 
 
The specifications details are below.
{| class="wikitable"
|SN
|Field name
|Sample value
|Description
|Description
|-
|-
|1
|1
|Radio 0 Protocol
|Cellular Enable
|IEEE 802.11 b/g/n
|Checkbox
|This section shows the radio protocol which is by default.
|Check this box to enable cellular functionality.
|-
|-
|2
|2
|Country Code
|Cellular  Operation Mode
|INDIA
|1.) Single Cellular with Dual Sim
|Select the country accordingly.
 
2.) Single Cellular with  Single SIM
|1.) This mode allows you to use one cellular modem with two SIM cards.


(INDIA by default)
2.) This mode allows you to use one cellular modem with single SIM card.
|-
|-
|3
|3
|Channel
|Cellular  Modem 1
|Auto
|QuectelEC200A
|In this dropdown the user should select the proper channel to be used. (Auto by default)
|This  field displays the modem name.
|-
|-
|4
|4
|TX Power
|Choose SIM 1 APN Mode
|100
|1.) Auto
|In this text box the user should specify the power.
 
2.)  Manual
|1.) Choose  Auto for regular SIM to detect APN name automatically.
 
2.) Choose manual to enter the APN settings manually in case of  M2M SIM cards.
|-
|-
|5
|5
|Channel Width
|SIM 1 Access Point Name
|20 MHz
|airtelgprs.com
|In this dropdown the user should select the channel width
|Enter the APN provided  by your cellular service provider in case of M2M sim. For regular sim cards  APN name will be displayed automatically.
|-
|-
|6
|6
|Radio Mode
|SIM 1 PDP Type
|1.) Access point
|IPV4
 
|Choose the PDP  type, which is typically either IPv4 or IPv6 depending on the sim card.
2.) Client only
 
3.) Access point and client
|In this drop down the user should select the mode.
 
(Access point by default)
|-
|-
|7
|7
|Radio SSID
|SIM 1 Username
|AP_37A26230014
|
|In this text box the user should specify the SSID number which usually comes with the router.
|Enter the username if required by the APN. Leave blank if not required.
|-
|-
|8
|8
|Radio Authentication
|SIM 1 Password
|WPA2 Personal (PSK)
|
|In this dropdown the user should select the type of authentication.
|Enter the password if required by the APN. Leave blank if not required.
 
(WPA2 Personal (PSK) by default)
|-
|-
|9
|9
|Radio Encryption
|SIM 1 Authentication Protocol
|AES
|None
|In this dropdown the user should select the type of encryption required.
|Choose the  authentication protocol. Options typically include None, PAP, or CHAP.
 
(AES by default)
|-
|-
|10
|10
|Radio Passphrase
|SIM 1 MTU
|*********
|Ex: 1500 (a common MTU size)
|In this text box the user should specify the password. Password will be given with the router which can be changed later.
|'''MTU  (Maximum Transmission Unit)''' defines the largest size of a data packet that can be transmitted over the network.
|-
|-
|11
|11
|Radio DHCP server IP
|Choose SIM 2 APN Mode
|192.168.100.1
|1.) Auto
|In this text box the user should specify the IP address of DHCP server.
 
2.) Manual
|1.) Choose Auto for regular SIM to detect APN name automatically.


(192.168.100.1 will be default  which can be changed accordingly)
2.) Choose manual to enter the APN settings manually in case of  M2M SIM cards.
|-
|-
|12
|12
|Radio DHCP start address
|SIM 2 Access Point Name
|100
|airtelgprs.com
|In this text box the user should specify the start address of the DHCP.
|Enter the APN  provided by your cellular service provider in case of M2M sim. For regular sim cards APN name will be displayed automatically.
 
(100 value is default)
|-
|-
|13
|13
|Radio DHCP limit
|SIM 2 PDP Type
|50
|IPV4
|In this text box the user should specify the limit for the DHCP.
|Choose the  PDP type, which is typically either IPv4 or IPv6 depending on the sim card.
 
|-
(50 value is default)
|14
|SIM 2 Username
|
|Enter the  username if required by the APN. Leave blank if not required.
|-
|15
|SIM 2 Password
|
|Enter the  password if required by the APN. Leave blank if not required.
|-
|16
|SIM 2 Authentication Protocol
|None
|Choose the  authentication protocol. Options typically include None, PAP, or CHAP.
|-
|17
|SIM 2 MTU
|Ex: 1500 (a common MTU size)
|'''MTU  (Maximum Transmission Unit)''' defines the largest size of a data packet  that can be transmitted over the network.
|-
|18
|Primary SIM Switchback Enable
|Enable/Disable
|When enabled,  the device will automatically switch back to the primary SIM (SIM 1) after  switching to SIM 2, under certain conditions (e.g., SIM 1 regains network  availability).
|-
|19
|Primary SIM Switchback Time (In Minutes)
|10
|Enter the  time in minutes after which the system should switch back to the primary SIM  if it becomes available.
|}
|}
Click on save once changes have been made.
After configuring all the required information, the user should click on the save and then click on the update to update the all the required information.  


'''Band lock and Operator Lock:'''


'''Wireless Schedule:'''
In this page, the user needs to configure the lock band and operator based on the service provider'''.'''


Wi-Fi can be automatically withdrawn based on the configuration done in this section.
Bands available in the drop-down list.


The user can schedule the Wi-Fi’s accessibility time during a particular period.
[[File:IAC44A Band lock and operator Lock.png]]


'''Note:''' This section is turned off by default, tick the box to activate it.


[[File:Wireless Schedule.png|frameless|620x620px]]


After configuring all the required information, the user should click on save and then click on update to update all the required information.
'''2G/3G option:'''


The user can select more than one “day of the week” for scheduling the Wi-Fi working hours.
2G/3G: - 3G allows additional features such as mobile internet access, video calls and mobile TV.


[[File:Wifi Schedule.png|frameless|620x620px]]
While the main function of 2G technology is the transmission of information through voice calls.


'''Loop back IP settings:'''
[[File:IAC44A Band Lock.png]]


The loopback IP address, often referred to as “localhost.” it is used to establish network connections within the same device for testing and troubleshooting purpose.
The user should select the band check box available for 2g/3g from the given list. Bands available for selection under LTE for the bands available in that area.


The loopback IP address, commonly represented as 127.0.0.1, is a special address used for testing network connectivity on a local machine.


It allows a device to send network messages to itself without involving external networks, making it useful for troubleshooting and diagnostics.


'''Operator Selection Mode:'''


However, this IP can be changed as per requirement and to do that, Navigating to Setting>>Network configuration>> Loopback IP settings can be changed/updated.
The user needs to click on the check box of the “operator select enable” to select the operator.


[[File:Loopback Update.png|frameless|620x620px]]
Once the check box is clicked there will be a dropdown list of the operator modes from which the user needs to select the mode. The user needs to select the operator mode from the given dropdown list.


After configuring all the required information, the user should click on the save and then click on the update to update the all the required information.
[[File:IAC44A Operator Selection Mode.png]]


If the user selects the mode “Manual” or “Manual-Automatic” then one more text box will appear where the user must provide the operator code.


'''SMS Settings:'''
[[File:IAC44A Operator Code.png]]


User needs to enable SMS option in SMS settings page.
After configuring all the required information, the user should click on the save and then click on the update to update the all the required information.


This option is to validate the mobile numbers using which controlling commands could be sent to the router device.


1 to 5 mobile numbers can be authenticated by choosing from “Select Valid SMS user numbers” and adding the mobile numbers below respectively.


API key is the pass key used in the commands while sending SMS.
'''Wi-Fi Setting:'''


Displayed in the below screen is the default API key which can be edited and changed as per choice. After addition of the mobile number’s user needs to click on save button for changes to take place.
In this, router has the general setting and change country code, channel, radio mode, radio passphrase as per the requirement after clicking on enable Radio button.
 
[[File:SMS Settings V2.png|frameless|620x620px]]
 
1.) Select valid user number max. 5 and add authorized phone number in the tab where you want to find the alert and click on '''‘SMS Response Enable’''', '''‘save’''' and '''‘update’''' button.
 
2.) Now send SMS commands from the configured mobile number.


3.) Once the commands are received from the user phone number the board will send acknowledgement as per the commands.
The user needs to select the respective radio mode based on its need.


4.) After that it will send the router’s status once it has rebooted and is operational again.
[[File:IAC44A WiFi Settings.png]]


It has 3 radio modes:


Mentioned below are a few commands which can be sent from the configured mobile number to the router device. Below two commands are One for rebooting the router device and another to get the uptime.
'''1.) Access Point'''


1) {"device”: ["passkey”, “API key"],"command":"reboot","arguments":"hardware"}
'''2.) Client only''' 


2) {"device”: ["passkey ","API key"],"command”: “uptime"}
'''3.) Access Point and Client'''


[[File:IAC44A Access Point and Client.png|1327x1327px]]


After configuring all the required information, the user should click on save and then click on update to update all the required information.
'''Access Point:'''


=== 2.2 SIM Switch ===
In Access Point mode, a configuration in which a router, allows wireless devices to connect to a wired network by creating a Wi-Fi hotspot.  
In this page the user needs to configure the Sim for the given device.


[[File:SIM Switch.png|frameless|620x620px]]
[[File:IAC44A Access point.png]]


The user needs to select from the drop-down menu on which basis the sim needs to be switched.
'''Client point:'''


[[File:Sim Switch Configuration.png|frameless|620x620px]]
In client mode, the access point connects your wired devices to a wireless network. This mode is suitable when you have a wired device with an Ethernet port and no wireless capability, for example, a smart TV, Media Player, or Game console and you want to connect it to the internet wirelessly, select the Client Mode and give the Radio SSID & client passphrase.


Once the user selects on “'''signal strength'''” then the parameters related to signal strength will pop up and the user needs to configure the parameters based on the requirement.
[[File:IAC44A Client Only.png]]


[[File:SIM Switch Configuration.png|frameless|620x620px]]
'''Access point and client point''':


Select this option for both type of connection, give both SSID and passphrase.


[[File:IAC44A Access Point and Client Point.png]]


'''Threshold RSRP:'''
After configuring all the required information, the user should click on the save and then click on the update to update the all the required information.


This Needs to be set appropriately. Incorrect setting may cause unnecessary SIM switching. (In General, a BAD RSRP value range is -140 to -115 and FAIR RSRP value range is -115 to -105).
{| class="wikitable"
 
|SN
'''Threshold SINR:'''
|Field name
 
|Sample value
This Needs to be set appropriately. Incorrect setting may cause unnecessary SIM switching. (In General, a BAD SNR value range is -20 to 0 and FAIR SNR value range is 0 to 13)
 
Once the user selects on “'''Data Limit'''” then the parameters related to Data Limit will pop up and the user needs to configure the parameters based on the requirement.
 
[[File:Threshold SINR.png|frameless|620x620px]]
{| class="wikitable"
|SN
|Field name
|Sample value
|Description
|Description
|-
|-
|1
|1
|SIM Switch Based on
|Radio 0 Protocol
|Data Limit
|IEEE 802.11 b/g/n
|The user needs to select from the drop-down menu on what basis the sim needs to be switched.
|This section shows the radio protocol which is by default.
 
|-
|-
|2
|2
|SIM 1 Data Usage Limit (In MB)
|Country Code
|1000
|INDIA
|The user needs to set the limit for the data usage for SIM 1.
|Select the country accordingly.
 
(INDIA by default)
|-
|-
|3
|3
|SIM 2 Data Usage Limit (In MB)
|Channel
|1000
|Auto
|The user needs to set the limit for the data usage for SIM 2.
|In this dropdown the user should select the proper channel to be used. (Auto by default)
|-
|-
|4
|4
|Periodicity
|TX Power
|Daily
|100
|The user needs to set the pattern/frequency to switch the sims.
|In this text box the user should specify the power.
|-
|-
|5
|5
|Day Of Month
|Channel Width
|For Ex: 16
|20 MHz
|The user needs to set the day for switching the sim.
|In this dropdown the user should select the channel width
|}
|-
|6
|Radio Mode
|1.) Access point


=== 2.3 Internet ===
2.) Client only
In this page the user needs to configure the internet connection to set the priority from the diverse options. The user should decide what kind of connection it needs to provide to the device like LAN, WAN etc. Once the connections are configured then click on save option and then on update.


[[File:Internet Connection Configurtion.png|frameless|620x620px]]
3.) Access point and client
|In this drop down the user should select the mode.


If the user needs to edit on the existing configuration, then the user should click on the “EDIT” button.
(Access point by default)
|-
|7
|Radio SSID
|AP_37A26230014
|In this text box the user should  specify the SSID number which usually comes with the router.
|-
|8
|Radio Authentication
|WPA2 Personal (PSK)
|In this dropdown the user should select the type of authentication.


[[File:EWAN2 Edit Options.png|frameless|620x620px]]
(WPA2 Personal (PSK) by default)
|-
|9
|Radio Encryption
|AES
|In this dropdown the user should select the type of encryption  required.


The specifications details are below.
(AES by default)
{| class="wikitable"
|SN
|Field name
|Sample  value
|Description
|-
|-
|1
|10
|Name
|Radio Passphrase
|EWAN2
|*********
|This field displays the name of the WAN connection
|In this text box the user should  specify the password. Password will be given with the router which can be  changed later.
|-
|2
|Priority
|1
|In this dropdown  box the user needs to select the priority.
|-
|-
|3
|11
|Select Track IP Numbers
|Radio DHCP server IP
|2
|192.168.100.1
|In this dropdown  the user needs to select the track number for the Ips. This specifies the number of IP addresses that will be used for tracking the status of the  connection.
|In this text box the user should specify the IP address of DHCP  server.
 
(192.168.100.1 will be default which can be changed accordingly)
|-
|-
|4
|12
|TrackIP1
|Radio DHCP start address
|8.8.8.8
|100
|This is the first IP address used for tracking the connection. <code>8.8.8.8</code>  is a public DNS server provided by Google.
|In this text box the user should specify the start address of the DHCP.
 
(100 value is default)
|-
|-
|5
|13
|TrackIP2
|Radio DHCP limit
|8.8.4.4
|50
|This is the second IP address used for tracking the connection. <code>8.8.4.4</code>  is another public DNS server provided by Google.
|In this text box the user should specify the limit for the DHCP.
 
(50 value is default)
|-
|-
|6
|14
|Reliability
|WMM Enable
|1
|Enable/Disable
|This indicates the reliability threshold for considering the connection as up. A value of <code>1</code> typically means that only one successful ping  response is needed to deem the connection reliable.
|Wi-Fi Multimedia (WMM) improves performance for applications that require low latency and consistent throughput.
|-
|-
|7
|15
|Count
|Enable DHCP Relay
|1
|Enable/Disable
|This specifies the number of consecutive pings sent to the track IP addresses.
|'''DHCP Relay''' allows a device to forward DHCP requests from clients to a remote DHCP server located on a different subnet.
|-
|8
|Up
|1
|This indicates the number of successful  pings required to consider the connection as up.
|-
|9
|Down
|1
|This indicates the number of failed pings required to consider the connection as down.
|}
|}
Once the user is done with modification click on the save button to save all the changes and then click on the update button.
Click on save once changes have been made.


=== 2.4 VPN ===
VPN stands for '''Virtual Private Network''', it establishes a connection between the system and a remote server, which is owned by a VPN provider.


Creating a point-to-point tunnel that encrypts the personal data, masks the IP address, and allows to block the required website to blocks via firewalls on the internet.


Navigate to settings >= VPN, general settings and you will see all VPN options you wish to use.
'''Guest Wifi:'''


Refer the below figure.
This option enables a separate Wi-Fi network for guests, isolated from the main network to enhance security and privacy. Guest Wi-Fi allows visitors or temporary users to connect to your network without accessing the main LAN resources.


[[File:VPN Configuration General Settings.png|frameless|620x620px]]
[[File:IAC44A GUest Wifi.png]]


There are 5 types of setting available under VPN configuration.
'''Wireless Schedule:'''


* General Settings
Wi-Fi can be automatically withdrawn based on the configuration done in this section.
* IPSEC
* Open VPN
* Wireguard
* Zerotier


'''General Settings:'''
The user can schedule the Wi-Fi’s accessibility time during a particular period.


In this page the user must choose which type of VPN connection is required for the device. The user must select from IPSEC, Open VPN, Wireguard or Zerotier based on its requirement. If required, the user can select all the options. The user needs to click on the save after selecting the option based on its use.  
'''Note:''' This section is turned off by default, tick the box to activate it.


[[File:VPN General Settings RC44.png|frameless|620x620px]]
[[File:IAC44A Wireless Schedule.png]]After configuring all the required information, the user should click on save and then click on update to update all the required information.


'''IPSEC:'''
The user can select more than one “day of the week” for scheduling the Wi-Fi working hours.


IPSEC VPN is used to create a VPN connection between local and remote networks.
[[File:IAC44A Wi-Fi Schedule settings.png]]


To use IPSEC VPN, the user should check that both local and remote routers support IPSEC VPN feature.
'''SMS Settings:'''


In this page the user can add/edit/delete the IPSEC VPN connection for the device.
User needs to enable SMS option in SMS settings page.


[[File:IAB44C Ipsec VPN Dashboard.png|frameless|620x620px]]
This option is to validate the mobile numbers using which controlling commands could be sent to the router device.


The user needs to click on the update button once the required configuration is completed.
1 to 5 mobile numbers can be authenticated by choosing from “Select Valid SMS user numbers” and


In IPSEC the user needs to click on edit button to edit the configuration of an existing VPN connection.
adding the mobile numbers below respectively.


[[File:IAB44C Ipsec Edit Options.png|frameless|620x620px]]
API key is the pass key used in the commands while sending SMS.
 
Displayed in the below screen is the default API key which can be edited and changed as per choice.
 
After addition of the mobile number’s user needs to click on save button for changes to take place.
 
[[File:IAC44A SMS Settings.png]]  
 
1.) Select valid user number max. 5 and add authorized phone number in the tab where you want to find the alert and click on '''‘SMS Response Enable’''', '''‘save’''' and '''‘update’''' button.
 
2.) Now send SMS commands from the configured mobile number.
 
3.) Once the commands are received from the user phone number the board will send acknowledgement as per the commands.
 
4.) After that it will send the router’s status once it has rebooted and is operational again.


Click on update once done with configurations.
Mentioned below are a few commands which can be sent from the configured mobile number to the router device. Below two commands are One for rebooting the router device and another to get the uptime.
 
1) {"device”: ["passkey”, “API key"],"command":"reboot","arguments":"hardware"}


The tunnel will show established, showing the connection has been made.
2) {"device”: ["passkey ","API key"],"command”: “uptime"}


[[File:VPN Configurtaion IPSEC .png|frameless|620x620px]]
'''Loop back IP settings:'''


The loopback IP address, often referred to as “localhost.” it is used to establish network connections within the same device for testing and troubleshooting purpose.


Detailed specifications are below:
The loopback IP address, commonly represented as 127.0.0.1, is a special address used for testing network connectivity on a local machine.
{| class="wikitable"
 
|SN
It allows a device to send network messages to itself without involving external networks, making it useful for troubleshooting and diagnostics.
|Field name
 
|Sample  value
 
|Description
However, this IP can be changed as per requirement and to do that, Navigating to Setting>>Network configuration>> Loopback IP settings can be changed/updated.
|-
 
|1
[[File:IAC44A Loopbackip Settings.png|1398x1398px]]
|IPSEC
 
|Site to Site VPN
After configuring all the required information, the user should click on the save and then click on the update to update the all the required information.
|In this dropdown the user should select the IPSEC connection type.
 
|-
=== 2.2 VLAN ===
|2
'''VLAN (Virtual Local Area Network)''' is a network within a network that segregates traffic into different logical networks on the same physical hardware. VLANs help in managing traffic more effectively and securely.
|IPSEC Role
 
|Client/Server
It is further divided into 2 sections,
|In this dropdown  box the user needs to select the IPSEC role. The device is acting as a client in the VPN setup (in this example).
 
Port-Based VLAN
 
Tagged Port Configuration
 
'''Port-Based VLAN:'''
 
A VLAN configuration method where network ports are assigned to specific VLANs.
 
[[File:IAC44A Port Based VLAN.png]]
 
'''EDIT:'''
 
To add a new VLAN ID, click on ‘Add Device’.
 
To edit the existing device the user needs to click on the edit option.
 
Once the changes are done click on the save button to save all the changes.
 
Click on the deleted button to delete the existing device detail.
 
[[File:IAC44A VLAN Port based Configuration Settings.png]]
 
Specification details are given below:
{| class="wikitable"
|SN
|Field  Name
|Sample Value
|Description
|-
|-
|3
|1
|Connection Type
|'''VLAN ID'''
|Tunnel
|1
|In this dropdown the user needs to select the connection type. The user should select on the  connection enable check box.
|This is a unique identifier for a VLAN within a  network.
|-
|2
|'''Port 0'''
|Untagged
|When a port is set as untagged for a VLAN, it  means that traffic entering or exiting this port is automatically associated with that VLAN without any VLAN tags being added to the frames.
|-
|3
|'''Port 1'''
|Untagged
|
|-
|-
|4
|4
|Connection mode
|'''Port 2'''
|Route/add/'''start'''/trap
|tagged
|In this drop down list the user should select the mode for the connection. In this example '''start''' is selected which means the VPN connection is initiated automatically.
|When a port is set as tagged for a VLAN, it  means that traffic on this port will include VLAN tags in the Ethernet frames. These tags carry the VLAN ID, allowing switches and other devices to know which VLAN the traffic belongs to.
|-
|-
|5
|5
|Remote Server IP
|'''Port 3'''
|********
|Untagged
|The IP address of the remote VPN server.
|
|-
|-
|6
|6
|Local ID
|'''Port 4'''
|3.3.3.3
|OFF
|The user needs to set the local id. It is the identification for the local VPN client.
|When a port is marked as off for a VLAN, it means that the port is not participating in that VLAN at all. It will neither  send nor receive traffic associated with that VLAN.
|-
|}
|7
Save and update the page.
|No. of local subnets
 
|1
 
|In this dropdown  the user needs to select how many subnets will be connected.
 
|-
'''Tagged Port Configuration:'''
|8
 
|Local Subnet 1
[[File:IAC44A Tagged port Configuration.png]]
|172.16.31.25/32
 
|In this text box  the user needs to put the specific local subnet included in the VPN.
'''EDIT:'''
 
To add a new VLAN ID, click on ‘Add Device’.
 
To edit the existing device the user needs to click on the edit option.
 
Click on the deleted button to delete the existing device detail.
 
[[File:IAC44A VLAN Tag Based Configuration Settings.png]]
 
Specification details are given below:
{| class="wikitable"
|SN
|Field  Name
|Sample  Value
|Description
|-
|-
|9
|Remote id
|1.1.1.1
|In this text box  the user needs to put the id of the remote connection. It is the  identification for the remote VPN server.
|-
|10
|No of remote subnet
|1
|1
|In this dropdown the user needs to select how many subnets it will be connected remotely.
|Type
|802.1Q
|'''IEEE 802.1Q''' is the standard protocol for VLAN tagging in Ethernet networks.
|-
|-
|11
|2
|Remote subnet
|Parent Interface
|10.1.1.0/24
|Port 2
|In this text box  the user needs to put the address of the remote subnet. The specific  remote subnet included in the VPN.
|It is the underlying physical interface like  port 2 that carries the VLAN-tagged traffic.
|-
|}
|12
Save and update the page.
|Key exchange
 
|Ikev1
=== 2.3 SIM Switch ===
|In this dropdown  the user should select the which key exchange version to be selected.
In this page the user needs to configure the Sim for the given device.
 
[[File:IAC44A SIM Switch.png]]
 
The user needs to select from the drop-down menu on which basis the sim needs to be switched.
 
[[File:IAC44A Sim Switch Settings.png]]
 
Once the user selects on “'''signal strength'''” then the parameters related to signal strength will pop up and the user needs to configure the parameters based on the requirement.
 
[[File:IAC44A Sim Switch Configuration.png|1483x1483px]]
 
'''Threshold RSRP:'''
 
This Needs to be set appropriately. Incorrect setting may cause unnecessary SIM switching. (In General, a BAD RSRP value range is -140 to -115 and FAIR RSRP value range is -115 to -105).
 
'''Threshold SINR:'''
 
This Needs to be set appropriately. Incorrect setting may cause unnecessary SIM switching. (In General, a BAD SNR value range is -20 to 0 and FAIR SNR value range is 0 to 13)
 
Once the user selects on “'''Data Limit'''” then the parameters related to Data Limit will pop up and the user needs to configure the parameters based on the requirement.
 
[[File:IAC44A Sim switch based on Data Limit.png|1483x1483px]]
 
Specification details are given below:
 
{| class="wikitable"
|SN
|Field name
|Sample  value
|Description
|-
|-
|13
|1
|Aggressive
|SIM Switch Based on
|Yes/No
|Data Limit
|In this dropdown the user should select either yes or no.
|The user needs to select from the drop-down menu on what basis the sim needs to be switched.
 
|-
|-
|14
|2
|IKE Lifetime (In Seconds)
|SIM 1 Data Usage Limit (In MB)
|86400
|1000
|The lifetime of the IKE phase in seconds  (1 day).
|The user needs to  set the limit for the data usage for SIM 1.
|-
|-
|15
|3
|Lifetime (in seconds)
|SIM 2 Data Usage Limit (In MB)
|28800
|1000
|The lifetime of the IPsec SA (Security  Association) in seconds (8 hours).
|The user needs to  set the limit for the data usage for SIM 2.
|-
|-
|16
|4
|Enable DPD Detection
|Periodicity
|'''1'''
|Daily
|The user needs to  set the pattern/frequency to switch the sims.
|}
After configuring all the required information, the user should click on the save.
 
=== 2.4 Multi-WAN ===
As shown below, this section has 4 categories,
 
'''Status'''


0
'''General settings'''
|Indicates whether Dead Peer Detection is  enabled to detect a lost connection. Enable this option as per server-side  settings.
|-
|17
|Time Interval (In Seconds)
|60
|This option is available only if DPD  Detection is enabled. The time interval is the interval for DPD checks.
|-
|18
|Action
|'''Restart'''/clear/hold/


trap/start
'''Failover'''
|'''Restart''':  Action to take when DPD detects a lost connection (restart the connection).  Select as per server-side setting.
 
|-
'''Load Balancing'''
|19
|Authentication Method
|'''PSK'''
|'''PSK''': Pre-shared  key is used for authentication. Select this option for authentication as per  sever side setting.
|-
|20
|Multiple Secrets
|1/'''0'''
|Indicates whether multiple PSK secrets  are used. Enable only if required.
|-
|21
|PSK Value
|******
|Pre-shared key value (masked for  security).
|}
''*Phase I and Phase II details are given below*''
{| class="wikitable"
| colspan="7" |'''Proposal settings Phase I'''
|-
|22
| colspan="2" |'''Encryption Algorithm'''
| colspan="3" |AES 128


AES 192
[[File:IAC44A Multiwan .png]]


'''AES 256'''
In '''‘Status’''' tab user can see the active network connections on the device as shown above.


3DES
'''General Settings:'''
|'''AES 256''': Encryption algorithm  for Phase I. Select as per server-side configuration. Both server and client  should have same configuration.
|-
|23
| colspan="2" |Authentication Phase I
| colspan="3" |SHA1


MD5
In general settings, select any one option from the drop-down menu which you wish to imply and click on save and update.


SHA 256
[[File:IAC44A Multi-WAN Configuration.png]]Click on save and update.   


SHA 384
'''Failover:'''


'''SHA 512'''
'''NOTE:''' Please verify that the name to be added is in the interface section of the status tab.  
|'''SHA 512''': Authentication  algorithm for Phase I.


Select as per  server-side configuration. Both server and client should have same  configuration.
[[File:IAC44A Failover.png]]'''EDIT:'''
|-
|24
| colspan="2" |DH Group
| colspan="3" |MODP768(group1)


MODP1024(group2)
[[File:IAC44A Priority settings.png]]


MODP1536(group5)
The specifications details are below.
 
{| class="wikitable"
'''MODP2048(group14)'''
|SN
 
|Field name
MODP3072(group15)
|Sample  value
 
|Description
MODP4096(group16)
|-
|'''MODP2048 (group14)''': Diffie-Hellman group for key exchange.
|1
 
|Priority
Select as per server-side configuration. Both server and client should have same configuration.
|Ex: 5
|Setting a priority of 1 means this connection has the highest priority and will be used before any others with a higher priority number.
|-
|-
| colspan="7" |'''Proposal settings Phase II'''
|2
|Select Track IP Numbers
|2
|In this dropdown the user needs to select the  track number for the Ips. This specifies the number of IP addresses  that will be used for tracking the status of the connection.
|-
|-
| colspan="2" |25
|3
| colspan="2" |Hash Algorithm
|TrackIP1
|AES 128
|8.8.8.8
 
|The system  will ping this IPV4 IP address to check if the connection is up and working.  You can even add any whitelisted IP.
AES 192
|-
 
|4
'''AES 256'''
|TrackIP2
|8.8.4.4
|The system  will ping this IPV4 IP address to check if the connection is up and working.  You can even add any whitelisted IP.
|-
|5
|Reliability
|1
|If  reliability is set to 1, it might mean the connection is considered reliable  if it successfully pings at least one of the tracked IP addresses.
|-
|6
|Count
|1
|Setting Count  to 1 means the device will send one ping to each IP address to check for  connectivity.
|-
|7
|Up
|3
|If set to 3,  the connection will be considered "up" only if all three pings are  successful.
|-
|8
|Down
|3
|If set to 3,  the connection will be considered "down" if all three pings fail.
|}
Click on save and update tab.
 


3DES
| colspan="2" |'''AES 256''': Encryption algorithm  for Phase II. Select as per server-side configuration. Both server and client  should have same configuration.
|-
| colspan="2" |26
| colspan="2" |Authentication Phase II
|SHA1


MD5
'''Load Balancing:'''


SHA 256
Load balancing is a network management technique used to distribute traffic across multiple network connections or servers to optimize resource use, maximize throughput, minimize response time, and ensure reliability.


SHA 384
'''Task''': Distributes network traffic evenly across multiple connections (e.g., multiple WAN links) or servers.


'''SHA 512'''
'''Purpose''': This ensures that no single connection or server is overwhelmed with too much traffic, which could lead to congestion and slower performance.
| colspan="2" |'''SHA 512''': Authentication  algorithm for Phase II.


Select as per  server-side configuration. Both server and client should have same  configuration.
[[File:IAC44A Load Balancing.png]]
|-
| colspan="2" |27
| colspan="2" |PFS Group
|MODP768(group1)


MODP1024(group2)
'''EDIT:'''


MODP1536(group5)
[[File:IAC44A Loadbalancing Edit.png]]Specification details are given below:
{| class="wikitable"
|SN
|Field  Name
|Sample  Value
|Description
|-
|1
|Traffic Distribution Ratio
|Ex: 60%
|If you have  two connections and set one to 60% and the other to 40%, traffic will be  distributed accordingly.


'''MODP2048(group14)'''
The ratio must be the same for CWAN1_0 and CWAN1_1.
 
|-
MODP3072(group15)
|2
 
|Select Track IP Numbers
MODP4096(group16)
|2
| colspan="2" |'''MODP2048 (group14)''': Perfect  Forward Secrecy group.
|The system  will track two IP addresses to determine if the network connection is active  and reliable.
 
|-
Select as per server-side configuration. Both server and client should have same configuration.
|3
|}
|TrackIP1
Click on save and then update the page for changes to reflect.
|8.8.8.8
 
|The system  will ping this IPV4 IP address to check if the connection is up and working.  You can even add any whitelisted IP.
'''Open VPN:'''
|-
|4
|TrackIP2
|8.8.4.4
|The system  will ping this IPV4 IP address to check if the connection is up and working.  You can even add any whitelisted IP.
|-
|5
|Reliability
|1
|With a  reliability setting of 1, the connection might be considered reliable if at  least one ping is successful.
|-
|6
|Count
|1
|The system  will send one ping to each tracked IP to check the connection's status.
|-
|7
|Up
|3
|The system  requires 3 successful pings for the connection to be marked as  "up."
|-
|8
|Down
|3
|If 3 pings  fail, the system will mark the connection as "down," and it may switch to an alternate connection if available.
|}
Click on save and update tab.


In the OpenVPN connection, the home network can function as a server, and the remote device can access the server through the router which acts as an OpenVPN Server gateway.


To use the VPN feature, the user should enable OpenVPN Server on the router, and install and run VPN client software on the remote device.


[[File:Open VPN Settings .png|frameless|620x620px]]
=== 2.5 VPN ===
VPN stands for '''Virtual Private Network''', it establishes a connection between the system and a remote server, which is owned by a VPN provider.


The user needs to “upload” the respective certificate from a valid path and then click on the “Update.
Creating a point-to-point tunnel that encrypts the personal data, masks the IP address, and allows to block the required website to blocks via firewalls on the internet.


Once the OpenVPN connection starts the user will get an option to enable/disable the VPN connection as and when required.
Navigate to settings >= VPN, general settings and you will see all VPN options you wish to use.


By clicking on the enable/disable button, the user can start/stop the VPN connection.
[[File:IAC44A VPN.png]]


[[File:Open VPN Dashboard.png|frameless|620x620px]]
There are 7 types of setting available under VPN configuration.


VPN has been established.
* General Settings
* IPSEC
* Open VPN
* Wireguard
* Zerotier
* PPTP
* L2TP


'''WireGuard:'''
'''General Settings:'''


'''WireGuard''' is simple, fast, lean, and modern VPN that utilizes secure and trusted cryptography.
In this page the user must choose which type of VPN connection is required for the device. The user must select from the above VPN based on its requirement. If required, the user can select all the options. The user needs to click on the save after selecting the option based on its use.  


Click on “Edit” to start configurations as needed.
[[File:IAC44A VPN Configuration.png|1363x1363px]]


[[File:Wire Guard RC44.png|frameless|620x620px]]
'''IPSEC:'''


EDIT:
IPSEC VPN is used to create a VPN connection between local and remote networks.


[[File:Wire Guard RC44 Setttings.png|frameless|620x620px]]
To use IPSEC VPN, the user should check that both local and remote routers support IPSEC VPN feature.


Click on the save button after the required configuration.
In this page the user can add/edit/delete the IPSEC VPN connection for the device.''*Refer the image below*''
 
[[File:IAC44A IPsec.png]]
 
The user needs to click on the update button once the required configuration is completed.
 
In IPSEC the user needs to click on edit button to edit the configuration of an existing VPN connection.
 
[[File:IAC44A Ipsec Configuration.png]]
 
Click on update once done with configurations.
 
The tunnel will show established, showing the connection has been made.
 
[[File:IAC44A Ipsec Status.png]]
 
Detailed specifications are below:
{| class="wikitable"
{| class="wikitable"
|SN
|SN
Line 1,166: Line 1,412:
|-
|-
|1
|1
|Wireguard Role
|IPSEC
|Client/Server
|Site to Site VPN
|In this dropdown box the user needs to select  the wireguard role.
|In this dropdown the user should select the IPSEC connection type.
|-
|-
|2
|2
|Listen Port
|IPSEC Role
|51820
|Client/Server
|The UDP port on which the WireGuard client  listens for incoming connections.
|In this dropdown  box the user needs to select the IPSEC role. The device is acting as a  client in the VPN setup (in this example).
|-
|-
|3
|3
|IP Addresses
|Connection Type
|10.0.0.1/24
|Tunnel
|The IP address and subnet mask assigned to the WireGuard client's interface. This address is used within the VPN.
|In this dropdown the user needs to select the connection type. The user should select on the connection enable check box.
|-
|-
|4
|4
|Allowed PeerIPs
|Connection mode
|10.1.1.1
|Route/add/'''start'''/trap
|The IP address of the allowed peer(s) that can connect to this WireGuard client. This might need adjustment based on the actual peer IPs used in the network.
|In this drop down list the user should select the mode for the connection. In this example '''start''' is selected which means the VPN connection is initiated automatically.
|-
|-
|5
|5
|Endpoint HostIP
|Remote Server IP
|10.1.1.1
|********
|The IP address of the WireGuard server (the endpoint to which the client connects).
|The IP address of the remote VPN server.
|-
|-
|6
|6
|Endpoint HostPort
|Local ID
|51820
|3.3.3.3
|The port on the WireGuard server to which the client connects.
|The user needs to set the local id. It is the identification for the local VPN client.
|-
|-
|7
|7
|PeerPublicKey
|No. of local subnets
|*****
|1
|The public key of the peer (the server) the client is connecting to. This key is part of  the public-private key pair used in WireGuard for encryption and  authentication.
|In this dropdown the user needs to select how many subnets will be connected.
|-
|-
|8
|8
|Enable Preshared key
|Local Subnet 1
|Yes/No
|172.16.31.25/32
|This option indicates that a pre-shared key (PSK) is used in addition to the public-private key pair for an extra layer of security.
|In this text box the user needs to put the specific local subnet included in the VPN.
|-
|-
|9
|9
|Preshared key
|Remote id
|*****
|1.1.1.1
|The actual  pre-shared key value shared between the client and the server. This option  appears only if you have enabled preshared key.
|In this text box  the user needs to put the id of the remote connection. It is the identification for the remote VPN server.
|}
'''Zerotier:'''
 
ZeroTier is a tool that lets you create your own private network over the internet.
 
Go to ZeroTier Central and sign up for a free account. In ZeroTier Central, click on "Create a Network". This will generate a unique 16-digit network ID for your new network.
 
Go to settings => VPN, in general settings, enable ZeroTier and save.
 
[[File:Zero Tier Enabling.png|frameless|620x620px]]
 
Copy and paste the unique 16-digit network ID in the edit section.
 
[[File:Zero tier Unique ID.png|frameless|620x620px]]
 
[[File:Zerotier Connection.png|frameless|620x620px]]
 
Click on the save button after the required configuration.
{| class="wikitable"
|SN
|Field name
|Sample  value
|Description
|-
|-
|10
|No of remote subnet
|1
|1
|NetworkID
|In this dropdown  the user needs to select how many subnets it will be connected remotely.
|Ad2769hfkw2345f4
|-
|In this dropdown box the user needs to paste the unique 16-digit network id.
|11
|Remote subnet
|10.1.1.0/24
|In this text box the user needs to put the address of the remote subnet. The specific  remote subnet included in the VPN.
|-
|12
|Key exchange
|Ikev1
|In this dropdown  the user should select the which key exchange version to be selected.
|-
|13
|Aggressive
|Yes/No
|In this dropdown  the user should select either yes or no.
|-
|14
|IKE Lifetime (In Seconds)
|86400
|The lifetime of the IKE phase in seconds  (1 day).
|-
|15
|Lifetime (in seconds)
|28800
|The lifetime of the IPsec SA (Security  Association) in seconds (8 hours).
|-
|-
|2
|16
|Listen Port
|Enable DPD Detection
|9993
|'''1'''
|Default


|}
0
|Indicates whether Dead Peer Detection is  enabled to detect a lost connection. Enable this option as per server-side  settings.
|-
|17
|Time Interval (In Seconds)
|60
|This option is available only if DPD  Detection is enabled. The time interval is the interval for DPD checks.
|-
|18
|Action
|'''Restart'''/clear/hold/


=== 2.5 Firewall ===
trap/start
A firewall is a layer of security between the network and the Internet. Since a router is the main connection from a network to the Internet, the firewall function is merged into this device. Every network should have a firewall to protect its privacy.
|'''Restart''':  Action to take when DPD detects a lost connection (restart the connection).  Select as per server-side setting.
|-
|19
|Authentication Method
|'''PSK'''
|'''PSK''':  Pre-shared key is used for authentication. Select this option for  authentication as per sever side setting.
|-
|20
|Multiple Secrets
|1/'''0'''
|Indicates whether multiple PSK secrets  are used. Enable only if required.
|-
|21
|PSK Value
|******
|Pre-shared key value (masked for  security).
|}
{| class="wikitable"
|'''Proposal settings  Phase I'''
|}
{| class="wikitable"
|22
| colspan="2" |'''Encryption Algorithm'''
| colspan="3" |AES 128


[[File:Firewall General Settings.png|frameless|620x620px]]
AES 192


There are 6 types of setting available under firewall.
'''AES 256'''


* General Settings
3DES
* Port forwards
|'''AES 256''': Encryption algorithm  for Phase I. Select as per server-side configuration. Both server and client  should have same configuration.
* Traffic Rules
|-
* SNAT traffic Rules
|23
* Parental Control
| colspan="2" |Authentication Phase I
* Zone Forwarding
| colspan="3" |SHA1
 
MD5


'''General Settings:'''
SHA 256


General settings are subdivided into 2 parts,
SHA 384


1.) General settings
'''SHA 512'''
|'''SHA 512''': Authentication  algorithm for Phase I.


In general settings, the settings that are made are default settings and can be changed according to user’s preference.
Select as per  server-side configuration. Both server and client should have same  configuration.
|-
|24
| colspan="2" |DH Group
| colspan="3" |MODP768(group1)


[[File:Firewall Configuration 1.png|frameless|620x620px]]
MODP1024(group2)


{| class="wikitable"
MODP1536(group5)
|'''SN'''
 
|'''Field Name'''
'''MODP2048(group14)'''
|'''Sample Value'''
 
|'''Description'''
MODP3072(group15)
|-
 
|1
MODP4096(group16)
|Enable SYN-flood protection
|'''MODP2048 (group14)''':  Diffie-Hellman group for key exchange.
|Enabled
 
|This is enabled by default; setting can be changed if required.
Select as per  server-side configuration. Both server and client should have same configuration.
|-
|-
|2
| colspan="7" |'''Proposal settings Phase II'''
|Disable IPV6
|Disabled
|This is enabled by default; setting can be changed  if required.
|-
|-
|3
| colspan="2" |25
|Drop invalid packets
| colspan="2" |Hash Algorithm
|Disabled
|AES 128
|This is enabled by default; setting can be changed if required.
 
AES 192
 
'''AES 256'''
 
3DES
| colspan="2" |'''AES 256''': Encryption algorithm  for Phase II. Select as per server-side configuration. Both server and client should have same configuration.
|-
|-
|4
| colspan="2" |26
|TCP SYN Cookies
| colspan="2" |Authentication Phase II
|Disabled
|SHA1
|This is enabled by default; setting can be changed  if required.
|-
|5
|Input
|Reject/Accept
|By default, the setting is ‘Reject’ but this needs  to be changed to ‘Accept’ compulsory.
|-
|6
|Output
|Reject/Accept
|By default, the setting is ‘Reject’ but this needs  to be changed to ‘Accept’ compulsory.
|-
|7
|Forward
|Reject/Accept
|By default, the setting is ‘Reject’ but this needs  to be changed to ‘Accept’ compulsory.
|}
2.) Zone settings


In zone settings, there’s an option to add “New Zone”, according to user’s requirement.
MD5


[[File:Firewall Zone Settings.png|frameless|620x620px]]
SHA 256


'''Port Forwards:'''
SHA 384


Port forwarding is a feature in a router or gateway that allows external devices to access services on a private network.
'''SHA 512'''
| colspan="2" |'''SHA 512''': Authentication  algorithm for Phase II.


It maps an external port on the router to an internal IP address and port on the local network, enabling applications such as gaming servers, web servers, or remote desktop connections to be accessed from outside the network.
Select as per  server-side configuration. Both server and client should have same  configuration.
|-
| colspan="2" |27
| colspan="2" |PFS Group
|MODP768(group1)


This helps in directing incoming traffic to the correct device within a local network based on the port number, enhancing connectivity and accessibility.
MODP1024(group2)
[[File:Firewall Enabled.png|frameless|620x620px]]


EDIT:
MODP1536(group5)


[[File:Firewall Configuration 2.png|frameless|620x620px]]
'''MODP2048(group14)'''
 
MODP3072(group15)
 
MODP4096(group16)
| colspan="2" |'''MODP2048 (group14)''': Perfect  Forward Secrecy group.
 
Select as per  server-side configuration. Both server and client should have same  configuration.
|}
Click on save and then update the page for changes to reflect.
 
 
'''Open VPN:'''
 
To use the VPN feature, the user should enable OpenVPN Server on the router and install and run VPN client software on the remote device.
 
[[File:IAC44A Open VPN .png]]
 
 
The user needs to “upload” the respective certificate from a valid path and then click on the “Update.”
 
Only the '''TAP''' connection needs a '''bridge'''. The tun connection does not require a bridge. Here we have established a '''TUN''' connection.
 
By clicking on the enable/disable button, the user can start/stop the VPN connection.
 
[[File:IAC44A Open VPN Status.png|1161x1161px]]
 
VPN TUN has been established.
 
Same way VPN TAP can also be established with the help of bridging.
 
 
 
'''WireGuard:'''
 
'''WireGuard''' is simple, fast, lean, and modern VPN that utilizes secure and trusted cryptography.
 
Click on “Edit” to start configurations as needed.
 
[[File:IAC44A WireGuard.png|1171x1171px]]
 
'''EDIT:'''
 
[[File:IAC44A WireGuard Editing.png]]


Click on the save button after the required configuration.
Click on the save button after the required configuration.
Specifications details are given below:
{| class="wikitable"
{| class="wikitable"
|SN
|SN
Line 1,337: Line 1,658:
|-
|-
|1
|1
|Name
|Wireguard Role
|Example: <code>Web_Server_Forward</code>
|Client/Server
|Field must not be empty. Provide a name for the rule to easily identify it.
|In this dropdown box the user needs to select the wireguard role.
|-
|-
|2
|2
|Protocol
|WireGuard Tunnel Over
|Example: <code>TCP+UDP</code>
|IPV4/IPV6
|Select the protocol for the rule.
|'''IPV4''': Use this if your network and endpoint (WireGuard server) support only IPv4.


Options typically include TCP+UDP, TCP, UDP, ICMP, Custom.
'''IPV6''': Use this if your network and endpoint support IPv6.
|-
|-
|3
|3
|Source zone
|Enable Failover
|Example: <code>SW_LAN</code>
|Enable/Disable
|Select the source zone where the traffic is originating  from. Options typically include EWAN2,SW_LAN,CWAN1,CWAN1_0,CWAN1_1,VPN
|This option allows the VPN connection to  automatically switch to a backup connection if the primary connection fails.
|-
|-
|4
|4
|Source MAC address [optional]
|Enable IPV4
|Example: <code>any</code>
|Enable/Disable
|'''any''': Leave as <code>any</code> if you don't want to specify a MAC address.
|This enables IPv4 traffic to be routed through  the WireGuard tunnel.
|-
|-
|5
|5
|Source IP address[optional]
|Enable IPV6
|Example: Leave blank if not needed.
|Enable/Disable
|Optionally specify an IP address or range.
|Enable this if your network and the destination support IPv6.
|-
|-
|6
|6
|Source port
|Listen Port
|Example: <code>80, 443</code>  (if matching traffic for web server ports)
|51820
|Specify the  source port or port range.
|This is the default port that WireGuard uses to listen for incoming connections.
|-
|-
|7
|7
|Destination zone
|Endpoint Host port
|Example: <code>SW_LAN</code>
|51820
|Select the  destination zone where the traffic is heading to.
|This is the  port on the WireGuard server that the client will connect to.
|-
|-
|8
|8
|Destination IP address
|Peer Public key
|Leave blank if not needed.
|*****
|Optionally specify the destination IP address or range.
|This is the public key of the WireGuard server that the client uses to establish a secure  connection.
|-
|-
|9
|9
|Destination port
|Enable Default Route
|Example: <code>80</code> (if redirecting to a web server port)
|Enable/Disable
|Specify the destination port or port range.
|Enable this if you want all network traffic (not just specific routes) to be routed  through the WireGuard VPN.
|}
|}
'''Traffic Rule:'''
Save and update the page after configuration has been done.
 
'''Zerotier:'''
 
ZeroTier is a tool that lets you create your own private network over the internet.
 
Go to ZeroTier Central and sign up for a free account.
 
In ZeroTier Central, click on "Create a Network". This will generate a unique 16-digit network ID for your new network.
 
Go to settings => VPN, in general settings, enable ZeroTier and save.


"Traffic rules" refer to the policies and regulations that govern the flow of data packets within a network.  
[[File:IAC44A ZeroTier.png]]Copy and paste the unique 16-digit network ID in the edit section.


To allow new traffic, click on “Add and Edit” in “New Traffic Rule”.
[[File:IAC44A ZeroTier 16 digit Network ID.png]]


[[File:Firewall Traffic Rule Dashboard.png|frameless|620x620px]]


EDIT:
Click on the save button after the required configuration.


[[File:Firewall Edit Options .png|frameless|620x620px]]
[[File:IAC44A Zerotier Connection Settings.png]]
{| class="wikitable"
{| class="wikitable"
|SN
|SN
Line 1,401: Line 1,731:
|-
|-
|1
|1
|Name
|NetworkID
|Example: Allow_HTTP_and_HTTPS
|Ad2769hfkw2345f4
|Field must not be empty: Provide a descriptive name for the traffic rule.
|In this dropdown box the user needs to paste the unique 16-digit network id.
|-
|-
|2
|2
|Restrict to Address Family
|Listen Port
|9993
|Default
 
|}
 
 
 
'''PPTP:'''
 
This configuration is for setting up a PPTP (Point-to-Point Tunnelling Protocol) VPN connection.
 
PPTP is a protocol that enables secure data transmission across public networks like the internet, often used to connect to remote networks or access resources securely.


|1.        Options: IPv4, IPv6
[[File:IAC44A PPTP.png]]


Example: IPv4 if dealing with typical internet traffic.
'''EDIT:'''
|Select the address family to generate iptables rules for.
 
|-
[[File:PPTP Connection Settings .png]]
|3
 
|Protocol
Specification details are given below:
|Example: TCP+UDP
{| class="wikitable"
|TCP+UDP: Match incoming traffic using the  given protocol.
|SN
|Field Name
|Sample Value
|Description
|-
|1
|PPTP Role
|Client/Server
|'''Client:''' meaning it will initiate the connection to the remote PPTP server.
 
'''Server:''' means this device will  accept incoming PPTP connections from clients, which can be users or devices  that need remote access to the local network or internet via this server.
|-
| colspan="4" |'''PPTP  Role: CLIENT'''
|-
|2
|Default Route
|Enable/Disable
|Enabling the default route means that  all network traffic will be routed through the VPN tunnel once the connection is established.
|-
|3
|Metric
|Ex: 0
|The metric is a value that defines the  priority of this route among other available routes. Lower metrics indicate  higher priority.
|-
|-
|4
|4
|Match ICMP Type
|Server IP
|Example: any
|Ex: 192.168.10.1
|Match all ICMP types if set to any.  Specific types can be chosen if needed.
|This is the IP address of the PPTP  server the client will connect to.
|-
|-
|5
|5
|Source Zone
|Interface
|Example: LAN
|Any
|Specifies the traffic source zone.
 
EWAN5
|Selecting the correct interface is  essential because it tells the system which network adapter should be used to  establish the VPN connection.
|-
|-
|6
|6
|Enable DDoS  Prevention
|Username
|Example:  ‘Checked’ if you want to enable DDoS prevention measures
|******
|Enable or disable Distributed Denial of Service (DDoS) prevention.
|This field is the login username for the PPTP server.
|-
|-
|7
|7
|Source MAC Address
|Password
|Example: any
|****
|any: Match traffic from any MAC address or  specify a particular MAC address.
|This is the password associated with the username.
|-
| colspan="4" |'''PPTP  Role: SERVER'''
|-
|-
|8
|8
|Source Address
|Local IP
|Example: 192.168.1.0/24
|Ex: 192.168.0.1
|Match incoming traffic from the specified source IP address or range.
|This IP address (192.168.0.1) is the  local IP of the PPTP server on its network. Clients connecting to the VPN  will see this address as their gateway or endpoint within the VPN.
|-
|-
|9
|9
|Source Port
|Remote IP Range
|Example: any if  all source ports should be matched
|Ex: 192.168.0.20-30
|any: Match incoming traffic from the specified source port or port range.
|This range defines the pool of IP  addresses that the server will assign to connected VPN clients. Here, any client connecting to the server will receive an IP address between 192.168.0.20 and 192.168.0.30, which provides up to 11 possible addresses for  simultaneous connections.
|-
|-
|10
|10
|Destination Zone
|Username
|Example: WAN
|Ex: User1
|Specifies the traffic destination zone.
|This is a username that the client will  use to authenticate with the PPTP server. In this case, User1 is designated as an  authorized user.
|-
|-
|11
|11
|Action
|Password
|Example: ACCEPT
|*****
|Options: ACCEPT, DROP, REJECT. Specify the  action to take for matched traffic.
|The password associated with User1 is required to complete the authentication.
|-
|12
|Limit
|Example:  10/minute to limit matches to 10 times per minute.
|Maximum average matching rate; specified  as a number, with an optional /second, /minute, /hour, or /day suffix.
|-
|13
|Extra arguments
|Example: --log-prefix "Blocked: " to add a log prefix to log messages for  this rule.
|Passes additional arguments to iptables.  Use with care as it can significantly alter rule behaviour.
|}
|}
Click on save once configured.
Once Configured, click on save and update.
 


'''SNAT Traffic Rule:'''


For configuring SNAT (Source Network Address Translation) traffic rules, you can control how outbound traffic from your local network is translated to a different IP address as it exits the network.
'''L2TP:'''


To add new source NAT,
L2TP (Layer 2 Tunneling Protocol) is a network protocol used to establish secure tunnels for transferring data between remote devices or networks, often in VPNs, by encapsulating data for encryption and routing.


Click on “ADD” in “New Source NAT:
[[File:IAC44A L2TP Dashboard.png|1185x1185px]]'''EDIT:'''


[[File:SNAT Traffic Rule.png|frameless|620x620px]]
[[File:IAC44A L2TP Connection Settings.png]]
 
Specification details are given below:


'''EDIT:'''


[[File:SNAT Edit Options RC44.png|frameless|620x620px]]


Specification details are below:
{| class="wikitable"
{| class="wikitable"
|SN
|SN
|Field name
|Field Name
|Sample value
|Sample Value
|Description
|Description
|-
|-
|1
|1
|Name
|L2TP Role
|Example: SNAT_WAN_to_LAN
|Client/Server
|'''Field must  not be empty''': Provide a unique and descriptive name for the SNAT rule.
|'''Client''': connecting to  an L2TP server to establish a secure tunnel for communication.
 
'''Server''': the server listens for incoming client  connections.
|-
| colspan="4" |'''L2TP Role: CLIENT'''
|-
|-
|2
|2
|Protocol
|Default Route
|Example: TCP+UDP
|Enable/Disable
|'''TCP+UDP''': Select the protocols that the SNAT rule will apply to.
|If enabled, all outbound traffic will be routed through the L2TP connection.
 
If disabled, only specific traffic  destined for the L2TP network will use the tunnel.
|-
|-
|3
|3
|Source Zone
|Metric
|Example: wan
|Ex: 1
|'''wan''': Specifies the source zone from which the traffic originates.
|The system uses this metric to decide which route to prioritize  if multiple routes exist.
 
L2TP connection with Metric 1 will take precedence over a LAN or WAN route with Metric 10.
|-
|-
|4
|4
|Source IP Address
|Server IP
|Example: any or a specific range like 192.168.1.0/24
|Ex: 192.168.10.1
|'''-- please choose --''': Specify the source IP address or range. Leave empty if the  rule applies to any source IP.
|This is the '''IP address of the L2TP server''' to which the client will connect.
|-
 
|
'''Local Networks''': If connecting within a LAN, the server might have an IP like  192.168.x.x.
|
 
|
'''Remote Connections''': The server IP might be a public address like 203.0.113. x.
|
|-
|-
|5
|5
|Source Port
|Checkup Interval Time (in sec)
|Example: any
|Ex: 30/60 secs
|'''any''': Specify the source port or port range from which the traffic originates.
|Setting 30 seconds ensures the client checks the connection every half-minute. If the tunnel drops, the client can quickly reconnect.
|-
|-
|6
|6
|Destination Zone
|Interface
|Example: lan
|Any
|'''lan''':  Specifies the destination zone to which the traffic is directed.
|Example interfaces might include eth0, usb0, or ra0.
|-
|-
|7
|7
|Destination IP Address
|Username
|Example: any or a specific IP like 192.168.1.100
|Ex: User
|'''-- please  choose --''': Specify the destination IP address or range. Leave empty if  the rule applies to any destination IP.
|The server verifies the username to grant or deny access.
 
Must match credentials configured on the L2TP server.
|-
|-
|8
|8
|Destination port
|Password
|Example: any
|******
|'''any''':  Specify the destination port or port range to which the traffic is directed.
|Should be kept secure and match the configuration on the server.
 
Masked for privacy during configuration.
|-
|-
|9
|9
|SNAT IP Address
|MPPE Encryption
|Example: 203.0.113.5 (an external IP address)
|Enable/Disable
|'''-- please choose --''': Specify the IP address to which the source IP should be  translated.
|'''Enabled''': Encrypts traffic using MPPE, enhancing security (recommended).
 
'''Disabled''': Transmits data unencrypted, reducing overhead but exposing traffic to potential risks.
|-
| colspan="4" |'''L2TP Role: SERVER'''
|-
|-
|10
|10
|SNAT Port
|Local IP
|Example: Leave empty if not needed, or specify a port  like ‘12345’
|Ex: 192.168.0.1
|Optionally,  rewrite matched traffic to a specific source port. Leave empty to only rewrite the IP address.
|This is the '''local IP address of the L2TP server'''. It serves as the gateway for clients connected via the L2TP tunnel.
|-
|-
|11
|11
|Extra Arguments
|Start
|Example: --log-prefix "SNAT_traffic: " (to add a log prefix to log messages for this rule)
|Ex: 192.168.0.20
|Pass  additional arguments to iptables. Use with care as it can significantly alter  rule behaviour.
|Specifies the first IP address that can be assigned to connected  clients.
|}
|-
Click on save once configured.
|12
|Limit
|Ex: 192.168.0.30
|Creates an IP pool for clients (from 192.168.0.20 to  192.168.0.30 in this case).
|-
|13
|Username
|Ex: User1
|Ensures that only authorized users can connect.


'''Parental Control:'''
The server verifies this username against its authentication  database.
|-
|14
|Password
|******
|The server verifies the password along with the username.


For configuring parental control rules, you want to set restrictions based on time, source, and
The password must match the one configured on the server for  successful authentication.
|}
 
=== 2.6 Firewall ===
A firewall is a layer of security between the network and the Internet. Since a router is the main connection from a network to the Internet, the firewall function is merged into this device. Every network should have a firewall to protect its privacy.
 
[[File:IAC44A Firewall .png]]


destination zones, as well as specific devices.
There are 6 types of setting available under firewall.


To add parental control in firewall,
* General Settings
* Port forwards
* Traffic Rules
* SNAT traffic Rules
* Parental Control
* Zone Forwarding


Click on “Add and Edit” in “New parental control:” field.
'''General Settings:'''


[[File:Parental Control.png|frameless|620x620px]]
General settings are subdivided into 2 parts,


'''EDIT:'''
'''1.) General settings'''


[[File:Parental Control Edit Options RC44.png|frameless|620x620px]]
In general settings, the settings that are made are default settings and can be changed according to user’s preference.


Specification details are given below:
[[File:IAC44A Firewall.png]]
{| class="wikitable"
{| class="wikitable"
|SN
|'''SN'''
|Field Name
|'''Field Name'''
|Sample Value
|'''Sample Value'''
|Description
|'''Description'''
|-
|-
|1
|1
|Name
|Enable SYN-flood protection
|Example: Parental_Control_Sunday
|Enabled
|'''Field must  not be empty''': Provide a unique and descriptive name for the parental control rule.
|This is enabled by default; setting can be changed if required.
|-
|-
|2
|2
|Proto
|Disable IPV6
|all
|Disabled
|'''all''': This specifies that the rule will apply to all protocols.
|This is enabled by default; setting can be changed if required.
|-
|-
|3
|3
|Source Zone
|Drop invalid packets
|Example: lan
|Disabled
|'''Field must  not be empty''': Please look at Firewall->Zone Settings to find zone names.
|This is enabled by default; setting can be changed if required.
|-
|-
|4
|4
|Destination Zone
|TCP SYN Cookies
|Example: wan
|Disabled
|'''Field must  not be empty''': Please look at Firewall->Zone Settings to find zone names.
|This is enabled by default; setting can be changed if required.
|-
|-
|5
|5
|Source MAC Address
|Input
|Example: 00:1A:2B:3C:4D:5E
|Reject/Accept
|'''Field''': Enter the MAC address of the device you want to apply the parental control  rule to. This is useful for restricting specific devices.
|By default, the setting is ‘Reject’ but this needs to be changed to ‘Accept’ compulsory.
|-
|-
|6
|6
|Target
|Output
|Example: Reject
|Reject/Accept
|'''Accept''': This specifies the action to take. For parental controls, you might want to  use ‘Reject’ or ‘Drop’ to block traffic.
|By default, the setting is ‘Reject’ but this needs to be changed to ‘Accept’ compulsory.
|-
|-
|7
|7
|Weekdays
|Forward
|Example: Sunday
|Reject/Accept
|'''Sunday''': Specify the days of the week when the rule should be active.
|By default, the setting is ‘Reject’ but this needs to be changed to ‘Accept’ compulsory.
|-
|}
|8
 
|Month Days
 
|Example: All
 
|'''All:''' Specify  the days of the month when the rule should be active.
'''2.) Zone settings'''
|-
 
|9
In zone settings, there’s an option to add “New Zone”, according to user’s requirement.
|Start Time (hh:mm:ss)
 
|Example: 18:00:00 (6:00 PM)
[[File:IAC44A Zone Settings.png]]
|'''Field must  not be empty:''' Specify the start time when the rule should begin to apply.
 
|-
 
|10
'''Port Forwards:'''
|Stop Time (hh:mm:ss)
 
|Example: 22:00:00 (10:00 PM)
Port forwarding is a feature in a router or gateway that allows external devices to access services on a private network.
|'''Field must  not be empty:''' Specify the stop time when the rule should end.
|}
'''Zone Forwarding:'''


Zone forwarding in network configuration allows traffic to be directed from one zone to another.
It maps an external port on the router to an internal IP address and port on the local network, enabling applications such as gaming servers, web servers, or remote desktop connections to be accessed from outside the network.


To ADD new zone,
This helps in directing incoming traffic to the correct device within a local network based on the port number, enhancing connectivity and accessibility.


Click on “Add” in “New Zone Forward:” field.
[[File:IAC44A Port Forwards.png]]


[[File:Zone Forwarding RC44.png|frameless|620x620px]]


'''EDIT:'''
'''EDIT:'''


[[File:Parental Control Zone Configuration.png|frameless|620x620px]]
[[File:IAC44A Port Forwards Editing.png]]Click on the save button after the required configuration.
 
Specification details are below:
{| class="wikitable"
{| class="wikitable"
|SN
|SN
|Field Name
|Field name
|Sample  Value
|Sample  value
|Description
|Description
|-
|-
|1
|1
|Source Zone
|Name
|Example options: lan, wan, etc.
|Example: <code>Web_Server_Forward</code>
|'''--please choose--''': Select the source zone from which the traffic originates.
|Field must not be empty. Provide a name for the rule to easily identify it.
|-
|-
|2
|2
|Destination Zone
|Protocol
|Example options: lan, wan, etc.
|Example: <code>TCP+UDP</code>
|'''--please  choose--''': Select the destination zone to which the traffic is directed.
|Select the protocol  for the rule.
|}


=== 2.6 Loopback Rule ===
Options  typically include TCP+UDP, TCP, UDP, ICMP, Custom.
In this page the user can configure the port where he wants to forward the traffic to. Here the user can add/edit/delete different ports as per the requirement.
 
[[File:Parental Control Zone Loopback Rule.png|frameless|620x620px]]
 
The user should click on ‘add’ and then ‘edit’ to do the required changes in the port and enter the valid information in each section to configure the port for forwarding.
 
'''EDIT:'''
 
[[File:Parental Control Zone Loopback Rule 1.png|frameless|650x650px]]
 
Specification details are given below:
{| class="wikitable"
|SN
|Field  Name
|Sample  Value
|Description
|-
|-
|1
|3
|Name
|Source zone
|Example: loopback
|Example: <code>SW_LAN</code>
|Provide a  descriptive name for the rule.
|Select the source zone where the traffic is originating from. Options typically include EWAN2,SW_LAN,CWAN1,CWAN1_0,CWAN1_1,VPN
|-
|2
|Protocol
|Example: TCP+UDP
|'''TCP+UDP''':  Select the protocols that the rule will apply to.
|-
|3
|Source IP Address [Optional]
|Example: any or a specific IP range like 192.168.1.0/24
|Optionally  specify the source IP address or range. Leave empty if the rule should apply to any source IP.
|-
|-
|4
|4
|Source Port [Optional]
|Source MAC address [optional]
|Example: any
|Example: <code>any</code>
|'''any''': Specify  the source port or port range from which the traffic originates. any allows  traffic from all ports.
|'''any''': Leave as <code>any</code> if you don't want to specify a MAC address.
|-
|-
|5
|5
|Loopback IP Address
|Source IP address[optional]
|Example: 127.0.0.1
|Example: Leave blank if not needed.
|Specify the loopback IP address. Typically, this is 127.0.0.1.
|Optionally specify an IP address or range.
|-
|-
|6
|6
|Port
|Source port
|Example: any
|Example: <code>80, 443</code>  (if matching traffic for web server ports)
|'''any''':  Specify the destination port or port range to which the traffic is directed.  any allows traffic to all ports.
|Specify the source port or port range.
|-
|-
|7
|7
|Action
|Destination zone
|Example: DNAT
|Example: <code>SW_LAN</code>
|This specifies the action to take either DNAT or SNAT.
|Select the destination zone where the traffic is heading to.
|-
|-
|8
|8
|Internal IP Address
|Destination IP address
|Example: 192.168.1.100
|Leave blank if not needed.
|'''Field must not be empty''': Specify the internal IP address to which the traffic should  be redirected.
|Optionally specify the destination IP address or range.
|-
|-
|9
|9
|Internal Port
|Destination port
|Example: any
|Example: <code>80</code>  (if redirecting to a web server port)
|Redirect matched incoming traffic to the given port on the internal host.
|Specify the destination port or port range.
|}
|}  
Once the user is done with the required configurations, should click save button and then click on the update to save the changes.


=== 2.7 Remote Monitoring ===
'''Traffic Rule:'''
In this page the user can select which equipment needs to be monitored remotely.


Once the user selects the type of RMS click on save.
"Traffic rules" refer to the policies and regulations that govern the flow of data packets within a network.  


[[File:Remote Monitoring.png|frameless|620x620px]]
To allow new traffic,


'''NMS:'''
click on “Add and Edit” in “New Traffic Rule”.


IN this page the user should type the server IP or domain name in the URL then click on save.
''*Refer the image below*''


Click on upload and start (Once key is uploaded and this option is clicked, NMS automatically starts, and this router device gets registered with the NMS server provided).
[[File:IAC44A Traffic Rules.png]]


[[File:Remote Management System NMS Configuration.png|frameless|620x620px]]
'''EDIT:'''
 
 
'''TR_069:'''
 
To enable the TR_069 the user needs to click on the enable check box.


[[File:TR 069.png|frameless|620x620px]]
[[File:IAC44A Traffics Rules Edit.png]]


Once the user clicks on the check box of enable it will display all the required filed to configured.
[[File:Remote Monitoring Tr-069.png|frameless|620x620px]]
Specification details are given below:
{| class="wikitable"
{| class="wikitable"
|SN
|SN
|Field Name
|Field name
|Sample Value
|Sample value
|Description
|Description
|-
|-
|1
|1
|Serving  Interval
|Name
|300
|Example:  Allow_HTTP_and_HTTPS
|A value of 300 seconds means the device will check in with the ACS (auto-configuration servers) every 5 minutes.
|Field must not be empty: Provide a descriptive name for the traffic rule.
|-
|-
|2
|2
|Interface
|Restrict to  Address Family
|This can be something like eth0 or wan.
 
|This specifies the network interface used for TR-069 communication.
|1.Options: IPv4, IPv6
 
Example: IPv4 if dealing with typical internet traffic.
|Select the address family to generate iptables rules for.
|-
|-
|3
|3
|Username
|Protocol
|Example: User
|Example: TCP+UDP
|The username used to authenticate with the ACS.
|TCP+UDP: Match incoming traffic using the given protocol.
|-
|-
|4
|4
|Password
|Match ICMP Type
|••••
|Example: any
|The password used to authenticate with the ACS.
|Match all ICMP types if set to any. Specific types can be chosen if needed.
|-
|-
|5
|5
|URL
|Source Zone
|<nowiki>http://example.com</nowiki>
|Example: LAN
|The URL of the ACS. This is where the CPE (customer-premises equipment) will send its requests and where it will receive configurations and updates from.
|Specifies the traffic source zone.
|}
|-
The user should fill all the required fields and click on the save button.
|6
 
|Enable DDoS  Prevention
=== 2.8 Tunnel ===
|Example:  ‘Checked’ if you want to enable DDoS prevention measures
Tunnels are a method of transporting data across a network using protocols which are not supported by that network.
|Enable or disable Distributed Denial of Service (DDoS) prevention.
 
|-
It is further categorised into 3 sections,
|7
|Source MAC  Address
|Example: any
|any: Match traffic from any MAC address or  specify a particular MAC address.
|-
|8
|Source Address
|Example:  192.168.1.0/24
|Match incoming traffic from the specified source IP address or range.
|-
|9
|Source Port
|Example: any if all source ports should be matched
|any: Match incoming traffic from the  specified source port or port range.
|-
|10
|Destination Zone
|Example: WAN
|Specifies the traffic destination zone.
|-
|11
|Action
|Example: ACCEPT
|Options: ACCEPT, DROP, REJECT. Specify the action to take for matched traffic.
|-
|12
|Limit
|Example:  10/minute to limit matches to 10 times per minute.
|Maximum average matching rate; specified  as a number, with an optional /second, /minute, /hour, or /day suffix.
|-
|13
|Extra arguments
|Example:  --log-prefix "Blocked: " to add a log prefix to log messages for  this rule.
|Passes additional arguments to iptables.  Use with care as it can significantly alter rule behaviour.
|}
Click on save once configured.


1.) General Settings
'''SNAT Traffic Rule:'''


2.) GRE Tunnel
For configuring SNAT (Source Network Address Translation) traffic rules, you can control how outbound traffic from your local network is translated to a different IP address as it exits the network.


3.) IPIP Tunnel
To add new source NAT,


[[File:Tunnel Settings.png|frameless|620x620px]]
Click on “ADD” in “New Source NAT:
 
 
'''General Settings:'''
 
In this page the user needs to select under which type of tunnel it needs to send the data.
 
[[File:Tunnel General Settings 1.png|frameless|620x620px]]


Once the user selects the type of tunnel then click on the save button.


'''GRE Tunnel:'''
''*Refer the figure below*''


A GRE (Generic Routing Encapsulation) tunnel configuration involves setting up a virtual point-to-point connection between two endpoints over an IP network.
[[File:IAC44A SNAT Traffic Rules.png]]  
 
Here the user can add/edit/delete the details of the tunnel.
 
[[File:GRE Dashboard.png|frameless|620x620px]]
 
Once the required update is done then click on update to save the changes.


'''EDIT:'''
'''EDIT:'''


[[File:GRE Tunnel.png|frameless|620x620px]]
[[File:IAC44A SNAT Traffic Rules Edit.png]]Specification details are below:
 
Specification details are given below:
{| class="wikitable"
{| class="wikitable"
|SN
|SN
|Field Name
|Field name
|Sample Value
|Sample value
|Description
|Description
|-
|-
|1
|1
|Tunnel  name
|Name
|Example: GRETunnel
|Example: SNAT_WAN_to_LAN
|'''GRETunnel''': The name of the GRE tunnel.
|'''Field must  not be empty''': Provide a unique and descriptive name for the SNAT rule.
|-
|-
|2
|2
|Local  external IP
|Protocol
|Example: 10.1.1.66
|Example: TCP+UDP
|The IP address of the local endpoint  that will initiate the GRE tunnel.
|'''TCP+UDP''':  Select the protocols that the SNAT rule will apply to.
|-
|-
|3
|3
|Remote external  IP
|Source Zone
|Example: 10.1.1.40
|Example: wan
|The IP address of the remote endpoint  that will terminate the GRE tunnel.
|'''wan''':  Specifies the source zone from which the traffic originates.
|-
|-
|4
|4
|Peer  tunnel IP
|Source IP Address
|Example: 10.1.1.4
|Example: any or a specific range like 192.168.1.0/24
|The IP address of the peer's tunnel interface.
|'''-- please  choose --''': Specify the source IP address or range. Leave empty if the  rule applies to any source IP.
|-
|-
|5
|5
|Local  tunnel IP
|Source Port
|Example: 10.1.1.6
|Example: any
|The IP address of the local tunnel  interface.
|'''any''':  Specify the source port or port range from which the traffic originates.
|-
|-
|6
|6
|Local  tunnel net mask
|Destination Zone
|Example: 255.255.255.0
|Example: lan
|The subnet mask of the local tunnel  interface.
|'''lan''':  Specifies the destination zone to which the traffic is directed.
|-
|-
|7
|7
|Remote IP
|Destination IP Address
|Example: 192.168.10.0/24
|Example: any or a specific IP like 192.168.1.100
|The remote network that is reachable through the GRE tunnel.
|'''-- please  choose --''': Specify the destination IP address or range. Leave empty if the rule applies to any destination IP.
|-
|-
|8
|8
|Enable  Tunnel Link
|Destination port
|Check to  enable
|Example: any
|Enable or disable the GRE tunnel link.
|'''any''':  Specify the destination port or port range to which the traffic is directed.
|-
|-
|9
|9
|Interface  type
|SNAT IP Address
|Example: EWAN2
|Example: 203.0.113.5 (an external IP address)
|'''EWAN2''': The type of network interface used for the GRE tunnel.
|'''-- please  choose --''': Specify the IP address to which the source IP should be translated.
|-
|-
|10
|10
|MTU
|SNAT Port
|Example:  1476
|Example: Leave empty if not needed, or specify a port like ‘12345’
|'''1476''': Maximum Transmission Unit size for the GRE tunnel.
|Optionally,  rewrite matched traffic to a specific source port. Leave empty to only rewrite the IP address.
|-
|-
|11
|11
|TTL
|Extra Arguments
|Example: 64
|Example: --log-prefix "SNAT_traffic: " (to add a log prefix to log messages for this rule)
|'''64''': Time To  Live value for the packets within the GRE tunnel.
|Pass additional arguments to iptables. Use with care as it can significantly alter rule behaviour.
|-
|12
|Tunnel  key
|Example: 12345678
|'''12345678''': A unique key used to identify the GRE tunnel.
|-
|13
|Enable keep alive
|Check to enable
|Enable or disable the keep-alive feature to monitor the tunnel's status.
|-
|14
|Keep alive interval
|Example:  10
|'''10''':  Interval in seconds for the keep-alive packets.
|}
|}
Once the required update is done then click on update to save the changes.
Click on save once configured.  


'''IPIP Tunnel:'''
'''Parental Control:'''


An IPIP (IP-in-IP) tunnel is a simple tunnelling protocol used to encapsulate IP packets within IP packets. This is like GRE but without additional features such as keying and type fields.
For configuring parental control rules, you want to set restrictions based on time, source, and


Here the user can add/edit/delete the details of the tunnel.
destination zones, as well as specific devices.


[[File:Ipip config.png|frameless|620x620px]]
To add parental control in firewall,


'''EDIT:'''
Click on “Add and Edit” in “New parental control:” field. 


[[File:IPIP Tunnel.png|frameless|620x620px]]
[[File:IAC44A Parental Control.png]]'''EDIT:'''
 
Once the required update is done then click on update to save the changes.


[[File:IAC44A Parental Control Editing.png]]


Specification details are given below:
Specification details are given below:
{| class="wikitable"
{| class="wikitable"
|SN
|SN
|Field Name
|Field Name
|Sample Value
|Sample Value
|Description
|Description
|-
|-
|1
|1
|Tunnel  name
|Name
|Example: IPIPTunnel
|Example: Parental_Control_Sunday
|'''IPIPTunnel:''' The name of the IPIP tunnel.
|'''Field must  not be empty''': Provide a unique and descriptive name for the parental  control rule.
|-
|-
|2
|2
|Local  external IP
|Proto
|Example:  10.1.1.66
|all
|The IP address of the local endpoint that will initiate the IPIP tunnel.
|'''all''': This specifies that the rule will apply to all protocols.
|-
|-
|3
|3
|Remote  external IP
|Source Zone
|Example: 10.1.1.40
|Example: lan
|The IP address of the remote endpoint that will terminate the IPIP tunnel.
|'''Field must  not be empty''': Please look at Firewall->Zone Settings to find zone names.
|-
|-
|4
|4
|Peer  tunnel IP
|Destination Zone
|Example: 10.1.1.4
|Example: wan
|The IP address of the peer's tunnel interface.
|'''Field must  not be empty''': Please look at Firewall->Zone Settings to find zone names.
|-
|-
|5
|5
|Local  tunnel IP
|Source MAC Address
|Example: 10.1.1.6
|Example: 00:1A:2B:3C:4D:5E
|The IP address of the local tunnel interface.
|'''Field''':  Enter the MAC address of the device you want to apply the parental control rule to. This is useful for restricting specific devices.
|-
|-
|6
|6
|Local  tunnel net mask
|Target
|Example: 255.255.255.0
|Example: Reject
|The subnet mask of the local tunnel interface.
|'''Accept''':  This specifies the action to take. For parental controls, you might want to use ‘Reject’ or ‘Drop’ to block traffic.
|-
|-
|7
|7
|Remote IP
|Weekdays
|Example: 192.168.10.0/24
|Example: Sunday
|The remote network that is reachable through the IPIP tunnel.
|'''Sunday''': Specify the days of the week when the rule should be active.
|-
|-
|8
|8
|Enable  Tunnel Link
|Month Days
|Check to  enable
|Example: All
|Enable or disable the IPIP tunnel link.
|'''All:''' Specify  the days of the month when the rule should be active.
|-
|-
|9
|9
|Interface  type
|Start Time (hh:mm:ss)
|Example: EWAN2
|Example: 18:00:00 (6:00 PM)
|'''EWAN2''': The  type of network interface used for the IPIP tunnel.
|'''Field must  not be empty:''' Specify the start time when the rule should begin to apply.
|-
|-
|10
|10
|MTU
|Stop Time (hh:mm:ss)
|Example: 1476
|Example: 22:00:00 (10:00 PM)
|'''1476''': Maximum Transmission Unit size for the IPIP tunnel.
|'''Field must not be empty:''' Specify the stop time when the rule should end.
|-
|}
|11
Click on save once configured.
|TTL
 
|Example: 64
'''Zone Forwarding:'''
|'''64''': Time To  Live value for the packets within the IPIP tunnel.
|-
|12
|Tunnel  key
|Example:  12345678
|Although typically not used in IPIP,  this field might be included for compatibility with certain configurations.
|-
|13
|Enable  keep alive
|Check to  enable
|Enable or disable the keep-alive  feature to monitor the tunnel's status.
|-
|14
|Keep  alive interval
|Example:  10
|'''10''':  Interval in seconds for the keep-alive packets.
|}


= 3.Maintenance =
Zone forwarding in network configuration allows traffic to be directed from one zone to another.
In this module the user can configure/upgrade/modify the settings related to system, password,


firmware and monitoring.
To ADD new zone,


It includes 6 submodules.
Click on “Add” in “New Zone Forward:” field.


* General
[[File:IAC44A Zone Forwarding.png]]'''EDIT:'''
* Password
* Reboot
* Import and Export config
* Firmware upgrade
* Monitor Application


[[File:Maintenance System.png|frameless|620x620px]]
[[File:IAC44A Zone Forwading Editing.png]]


=== 3.1 General ===
Specification details are below:
Here you can configure the basic aspects of router like its hostname or the timezone.
{| class="wikitable"
|SN
|Field  Name
|Sample  Value
|Description
|-
|1
|Source Zone
|Example options: lan, wan, etc.
|'''--please  choose--''': Select the source zone from which the traffic originates.
|-
|2
|Destination Zone
|Example options: lan, wan, etc.
|'''--please  choose--''': Select the destination zone to which the traffic is directed.
|}
Click on save once configured.


It is further sub-divided into,


1.) General Settings


2.) Logging
=== 2.7 Loopback Rule ===
In this page the user can configure the port where he wants to forward the traffic to. Here the user can add/edit/delete different ports as per the requirement.


3.) Language and Style
[[File:IAC44A Loopback Rule.png]]


The user should click on ‘add’ and then ‘edit’ to do the required changes in the port and enter the valid information in each section to configure the port for forwarding.


'''General Settings:'''
[[File:Maintenance General.png|frameless|619x619px]]


'''EDIT:'''
'''EDIT:'''
[[File:IAC44A Loopback Rule Editing.png]]Specification details are given below:
{| class="wikitable"
{| class="wikitable"
|SN
|SN
|Field Name
|Field Name
|Sample Value
|Sample Value
|Description
|Description
|-
|-
|1
|1
|Local  Time
|Name
|2024/07/30  13:25:47
|Example: loopback
|The current local date and time set on the device.
|Provide a descriptive name for the rule.
|-
|-
|2
|2
|Hostname
|Protocol
|22B25240007
|Example: TCP+UDP
|The hostname of the device, which is  used to identify it on the network.
|'''TCP+UDP''':  Select the protocols that the rule will apply to.
|-
|-
|3
|3
|Timezone
|Source IP Address [Optional]
|Asia/Kolkata
|Example: any or a specific IP range like 192.168.1.0/24
|The timezone setting of the device, which determines the local time.
|Optionally  specify the source IP address or range. Leave empty if the rule should apply  to any source IP.
|-
|4
|Source Port [Optional]
|Example: any
|'''any''':  Specify the source port or port range from which the traffic originates. any  allows traffic from all ports.
|-
|5
|Loopback IP Address
|Example: 1.1.1.1
|Specify the  loopback IP address.
|-
|6
|Port
|Example: 81
|'''any''': Specify  the destination port or port range to which the traffic is directed. any allows traffic to all ports.
|-
|7
|Action
|Example: DNAT
|This  specifies the action to take either DNAT or SNAT.
|-
|8
|Internal IP Address
|Example: 2.2.2.2
|'''Field must  not be empty''': Specify the internal IP address to which the traffic should  be redirected.
|-
|9
|Internal Port
|Example: 81
|Redirect  matched incoming traffic to the given port on the internal host.
|}
|}
Once the user configures the required details then click on the save button to save all the details.
Once the user is done with the required configurations, user should click save button and then click on the update to save the changes.


'''Logging:'''
=== 2.8 VRRP ===
'''VRRP (Virtual Router Redundancy Protocol)''' is used to ensure high availability for IP routing by allowing multiple routers to work together to present the illusion of a single virtual router to the hosts on a network.


Here the user can configure the basic aspects of your device related to system.
In General Settings, click on ‘Enable VRRP’ and save.


The system log configuration provided specifies how the device handles and stores log information, including buffer size, external log server details, and log verbosity levels.
[[File:IAC44A VRRP.png]]
 
In VRRP section,
 
Give a name and ‘Add’ device.
 
Click on ‘Edit’ to make changes.
 
Click on ‘Delete’ if particular instance not required.
 
[[File:IAC44A VRRP Status.png]]'''EDIT:'''


[[File:Maintenance logging.png|frameless|619x619px]]
[[File:IAC44A VRRP Editing.png]]Specification details are given below:


'''EDIT:'''
{| class="wikitable"
{| class="wikitable"
|SN
|SN
|Field Name
|Field Name
|Sample Value
|Sample Value
|Description
|Description
|-
|-
|1
|1
|System log buffer size
|Role
|Example: 32 kiB
|1.      Master
|The size of the memory buffer allocated (0-32) for storing system logs before they are either written to a file or  sent to an external server.
 
2.      Backup
|Choose '''Master'''  for the primary router that should handle the traffic under normal  circumstances.
 
Choose '''Backup''' for a secondary router that will take over if the master fails.
|-
|-
|2
|2
|External system log server
|Virtual ID
|Example: 0.0.0.0
|Ex: 0
|The IP address of an external server where logs can be sent.
|The value can  range from 0 to 255.
 
Ensure all routers in the same VRRP group share the same '''Virtual ID'''.
|-
|-
|3
|3
|External system log server port
|Priority
|Example: 514
|Ex: 100
|The port used to send logs to the  external log server. Port 514 is the default port for syslog.
|For the '''Master''' role, use the highest priority, typically above 100.
 
For the '''Backup'''  role, set a lower priority number, usually below the master's priority.
|-
|-
|4
|4
|Log output level
|Interface
|Example: Debug
|SW_LAN
|Sets the detail level of the system logs.
|This is the  network interface on which VRRP operates.
|-
|-
|5
|5
|Cron Log level
|Source IP
|Example: Debug
|Ex: 192.168.10.1
|The detail level of the logs for cron jobs.
|This is the  IP address used as the source in VRRP advertisements.
|-
|6
|Peer IP
|Ex: 192.168.10.10
|This is the  IP address of the other VRRP peer (usually the backup router). It helps the  routers identify each other.
|-
|7
|Virtual IP  Address
|192.168.10.100/24
|The virtual  IP should be an unused address within the subnet, such as 192.168.10.100/24, ensuring it's consistent across all VRRP routers.
|-
|8
|Enable  Authentication
|Enable/Disable
|Enable this  if you want to secure your VRRP communications.
|-
|9
|Password
|*********
|It ensures  that only routers with the correct password can join the VRRP group.
|}
|}
Once the user configures the required details then click on the save button to save all the details.  
Save and update once changes have been made.


=== 2.9 Remote Monitoring ===
In this page the user can select which equipment needs to be monitored remotely.


Once the user selects the type of RMS click on save.


'''Language and Style:'''
[[File:IAC44A Remote Management System.png]]'''NMS:'''


Here the user can configure the basic aspects of your device related to language.
In this page the user should type the server IP or domain name in the URL then click on save.


Once the user configures the required details then click on the save button to save all the details.
Click on upload and start (Once key is uploaded and this option is clicked, NMS automatically starts, and this router device gets registered with the NMS server provided).


[[File:Maintenance Language and Style.png|frameless|620x620px]]
[[File:IAC44A NMS.png]]


=== 3.2 Password ===
'''TR_069:'''
In this module the user can set the password for the admin credentials.


Specifies the password for the guest account. If the user enters a plaintext password here, it will get replaced with a crypted password on save. The new password will be effective once the user logs out and log in again.
To enable the TR_069 the user needs to click on the enable check box.


[[File:Admin Password Setup.png|frameless|620x620px]]
[[File:IAC44A TR069.png]]


=== 3.3 Reboot ===
In this module the user can reboot the device remotely.


First option is to directly reboot the device without enabling the maintenance reboot tab.
Once the user clicks on the check box of enable it will display all the required filed to configured.
 
Click on “Reboot Now” at the bottom of the screen to start the reboot process.
 
[[File:Reboot Dashboard enable.png|frameless|620x620px]]
 
To start maintenance reboot process first the user needs to fill all the required fields.
 
Need to select the type of reboot for the device whether it needs to be Hardware or Software reboot.
 
[[File:Maintenance Reboot.png|frameless|620x620px]]


[[File:IAC44A Tr069 Edit.png]]


Specification details are given below:
Specification details are given below:
Line 2,131: Line 2,538:
|-
|-
|1
|1
|Enable Maintenance Reboot
|Serving Interval
|Enable/Disable
|300
|Indicates whether the maintenance reboot feature is enabled or not.
|A value of 300 seconds means the device will check in with the ACS (auto-configuration servers) every 5 minutes.
|-
|-
|2
|2
|Type
|Interface
|Maintenance Reboot
|This can be something like eth0 or wan.
|Specifies the type of reboot being scheduled.
|This specifies the network interface used for TR-069 communication.
|-
|-
|3
|3
|Reboot  Type
|Username
|Software/Hardware
|Example: User
|'''Hardware''': A hardware reboot involves restarting the  entire device as if it were powered off and on again.
|The username used to authenticate with the ACS.
 
'''Software''': A software reboot involves restarting the operating system without powering off the hardware.
|-
|-
|4
|4
|Minutes
|Password
|Example:  59
|••••
|The minute at which the reboot should  occur (0-59).
|The password used to authenticate with  the ACS.
|-
|-
|5
|5
|Hours
|URL
|Example: 22 (10 PM)
|<nowiki>http://example.com</nowiki>
|The hour at which the reboot should  occur (0-23, in 24-hour format).
|The URL of the ACS. This is where the CPE (customer-premises equipment) will send its requests and where it will  receive configurations and updates from.
|-
|6
|Day Of  Month
|Example:  All
|Specifies which days of the month the  reboot should occur (1-31). "All" means it will occur every day.
|-
|7
|Month
|Example:  All
|Specifies which months the reboot should occur (1-12). "All" means it will occur every month.
|-
|8
|Day Of  Week
|Example:  All
|Specifies which days of the week the  reboot should occur (0-6, where 0 is Sunday). "All" means it will  occur every day of the week.
|}
|}
Once the user fills all the required given parameters click on the save.


=== 3.4 Import and Export ===
The user should fill all the required fields and click on the save button.
In this section, User can Import & Export Configuration files of the Device.


[[File:Import and Export Options.png|frameless|601x601px]]
=== 2.10 Tunnel ===
Tunnels are a method of transporting data across a network using protocols which are not supported by that network.


Click “Export Config” to export device configuration & settings to a text file,
It is further categorised into 3 sections,


Click “Import Config” to import device configuration & settings from a previously exported text file.
1.) General Settings


[[File:Import window.png|frameless|620x620px]]
2.) GRE Tunnel


The user needs to select on the “choose file”, upload the required file and click on apply.
3.) IPIP Tunnel 


=== 3.5 Firmware Upgrade ===
[[File:Tunnel IAC44A.png]] 
The user can upgrade with the latest software for the existing firmware.  


[[File:Firmware Upgrade .png|frameless|620x620px]]
'''General Settings:'''


Click on the '''flash image''' and chose the path where the sys-upgrade file is kept and then click on flash image, it will upgrade to the latest software once the reboot is done.
In this page the user needs to select under which type of tunnel it needs to send the data.
 
This option will completely reset the device to default settings.


[[File:Flash Image.png|frameless|620x620px]]
[[File:IAC44A Tunnel General Settings.png]]


Click on the '''Retain Config and flash''' and chose the path where the sys-upgrade file is kept and then click on Retain Config and flash, it will upgrade to the latest software once the reboot is done.
Once the user selects the type of tunnel then click on the save button.


This refers to updating the firmware (flashing) of a device while preserving the current configuration settings.


[[File:Flash Image.png|frameless|620x620px]]


Click on the '''Factory Reset''' for the complete retest of the device.
'''GRE Tunnel:'''


=== 3.6 Monitor Application ===
A GRE (Generic Routing Encapsulation) tunnel configuration involves setting up a virtual point-to-point connection between two endpoints over an IP network.
In this section, the monitor application is divided into major 2 configurations which is further sub-divided into 4 editable options,


1.) Modem Monitor Application Configuration:
Here the user can add/edit/delete the details of the tunnel.
 
2.) Router Monitor Application Configuration:


[[File:Monitor Application Dashboard.png|frameless|620x620px]]
[[File:IAC44A GRE Tunnel.png]]


Once the required update is done then click on update to save the changes.


'''Modem Monitor Application Configuration:'''
'''EDIT:'''
 
[[File:Monitor Application.png|frameless|620x620px]]


[[File:IAC44A GRE Tunnel Configuration.png]]
Specification details are given below:
Specification details are given below:
{| class="wikitable"
{| class="wikitable"
|SN
|SN
|Field Name
|Field Name
|Sample Value
|Sample Value
|Description
|Description
|-
|-
|1
|1
|Enable Ping Check Application
|Tunnel  name
|Enable/Disable
|Example:  GRETunnel
|Turns on the functionality to perform ping  checks on specified IP addresses.
|'''GRETunnel''': The name of the GRE tunnel.
|-
|-
|2
|2
|Time Interval for Check (In minutes)
|Local  external IP
|'''Example:''' 10 minutes
|Example: 10.1.1.66
|Frequency at which the ping checks are performed.
|The IP address of the local endpoint that will initiate the GRE tunnel.
|-
|-
|3
|3
|Select No of IP addresses to ping
|Remote external  IP
|'''Example:''' 1
|Example: 10.1.1.40
|Number of IP addresses that will be pinged.
|The IP address of the remote endpoint  that will terminate the GRE tunnel.
|-
|-
|4
|4
|IP Address 1
|Peer  tunnel IP
|'''Example:''' 8.8.8.8
|Example: 10.1.1.4
|The IP address to ping.
|The IP address of the peer's tunnel  interface.
|-
|-
|5
|5
|No. of Retries
|Local  tunnel IP
|'''Example:''' 5
|Example: 10.1.1.6
|Number of times to retry pinging an IP address  if the initial ping fails.
|The IP address of the local tunnel interface.
|-
|-
|6
|6
|Failure Criteria in (%)
|Local  tunnel net mask
|'''Example:''' 80% (If 4 out of 5 pings fail, it’s considered a failure)
|Example:  255.255.255.0
|Percentage of failed pings required to consider the ping check a failure.
|The subnet mask of the local tunnel interface.
|-
|-
|7
|7
|Action On Failure
|Remote IP
|'''Example:''' Restart Modem
|Example: 192.168.10.0/24
|Action to be taken if the ping check fails according to the criteria.
|The remote network that is reachable through the GRE tunnel.
|-
|-
|8
|8
|Enable Second Level Action
|Enable Tunnel Link
|Enable/Disable
|Check to enable
|Option to enable a secondary action if the primary action fails multiple times.
|Enable or disable the GRE tunnel link.
|-
|-
|9
|9
|Second Level Action Threshold
|Interface  type
|'''Example:''' 2
|Example:  EWAN2
|Number of failures required to trigger the secondary action.
|'''EWAN2''': The  type of network interface used for the GRE tunnel.
|-
|-
|10
|10
|Second Level Action
|MTU
|'''Example:''' Restart Board (Reboots  the entire hardware board)
|Example:  1476
|The action to be taken if the second level action threshold is met.
|'''1476''': Maximum  Transmission Unit size for the GRE tunnel.
|}
Save the details once made necessary changes.
 
'''Router Monitor Application Configuration:'''
 
[[File:Router Monitor Application Configuration.png|frameless|620x620px]]
 
Specification details are given below:
{| class="wikitable"
|SN
|Field  Name
|Sample  Value
|Description
|-
|-
|1
|11
|Enable Ping Check Application
|TTL
|Enable/Disable
|Example:  64
|Activates the ping check functionality to monitor router performance.
|'''64''': Time To  Live value for the packets within the GRE tunnel.
|-
|-
|2
|12
|Time Interval for Check (In minutes)
|Tunnel  key
|'''Example:''' 10 minutes
|Example:  12345678
|How  frequently the ping checks are performed.
|'''12345678''': A unique key used to identify the GRE tunnel.
|-
|-
|3
|13
|Select No of IP Addresses to Ping
|Enable  keep alive
|'''Example:''' 1 (Please select the appropriate number based on your requirements)
|Check to enable
|Choose the  number of IP addresses to ping. This typically involves selecting from a list  or entering multiple addresses.
|Enable or disable the keep-alive feature to monitor the tunnel's status.
|-
|-
|4
|14
|No. of Retries
|Keep  alive interval
|'''Example:''' 3
|Example:  10
|Number of retries if a ping fails.
|'''10''':  Interval in seconds for the keep-alive packets.
|-
|}
|5
Once the required update is done then click on update to save the changes.  
|Failure Criteria in (%)
 
|'''Example:''' 80% (If 80% of the pings fail, it’s  deemed a failure)
'''IPIP Tunnel:'''
|Percentage of  failed pings required to consider the ping check as failed.
|-
|6
|Action On Failure
|'''Example:''' Restart IPsec
|The action taken if the ping check fails according to the criteria.
|-
|7
|Enable Second Level Action
|Enable/Disable
|Option to  enable an additional action if the primary action fails.
|-
|8
|Second Level Action Threshold
|'''Example:''' Specify the number of failures, such as 2
|Number of  times the primary action must fail before the secondary action is triggered.
|-
|9
|Second Level Action
|'''Example:''' Restart Board
|The action to  be taken if the second level action threshold is met.
|}
Save the details once made necessary changes.


= 4.Status =
An IPIP (IP-in-IP) tunnel is a simple tunnelling protocol used to encapsulate IP packets within IP packets. This is like GRE but without additional features such as keying and type fields.
In this module the user can view the status of the router device with respect to the network, Wan, modem etc.


It has 4 submodules.
Here the user can add/edit/delete the details of the tunnel.


* Interfaces
[[File:IAC44A IPIP Tunnel.png]]
* Internet
* Modem
* Routes


[[File:Status Dashboard.png|frameless|620x620px]]
'''EDIT:'''


=== 4.1 Interfaces ===
[[File:IAC44A IPIP Tunnel Edit.png]]Once the required update is done then click on update to save the changes.
Each network device (interface) is associated with specific traffic statistics, uptime, and status. Active interfaces are operational, while inactive interfaces are not currently transmitting data.


[[File:Status Interfaces.png|frameless|620x620px]]


Looking on the network status the user can check if the cellular, wifi, ewan, vpn etc is up.
Specification details are given below:
 
{| class="wikitable"
=== 4.2 Internet ===
|SN
In this submodule the user can view the status of the internet connections.
|Field Name
 
|Sample Value
[[File:Internet Status.png|frameless|620x620px]]
|Description
 
|-
  To see the latest status of the internet connection the user needs to click on the refresh button.
|1
 
|Tunnel  name
=== 4.3 Modem ===
|Example:  IPIPTunnel
This modem status page provides comprehensive information about the cellular connection's network operator, technology, mode, and various signal quality metrics.
|'''IPIPTunnel:''' The name of the IPIP tunnel.
 
|-
[[File:Modem Status.png|frameless|602x602px]]
|2
 
|Local external  IP
=== 4.4 Routes ===
|Example: 10.1.1.66
This configuration shows how the router directs traffic between different networks and interfaces, ensuring proper communication within the local network and to external networks via the default gateway.
|The IP address of the local endpoint  that will initiate the IPIP tunnel.
 
|-
'''ARP Table:''' Maps IP addresses to MAC addresses for devices on the network, helping in identifying which device is on which interface.
|3
 
|Remote  external IP
'''IPv4 Routes:''' This shows which network is directly connected on which interface.
|Example: 10.1.1.40
 
|The IP address of the remote endpoint  that will terminate the IPIP tunnel.
Example: Network '''192.168.10.0/24''' is directly connected on interface '''eth0.1.'''
 
'''IPv6 Routes:''' Similar routes as IPv4, but this time listed under IPv6 routing rules.
 
Example: Local networks '''192.168.10.0/24''' and '''192.168.100.0/24''' are managed through '''eth0.1''' and '''ra0''', respectively.
 
[[File:Route Status.png|frameless|620x620px]]
 
= 5. Features =
In this module the user can see all the features that the router device has.
 
This module includes 7 features.
 
* Mac Address Binding
* URL Filtering
* Web Server
* Wi-Fi MacID Filtering
* Routing
* Others
[[File:Features Dashboard v2.png|frameless|620x620px]]
 
=== 5.1 Mac Address Binding ===
MAC address binding is a configuration that binds a specific MAC address to a specific IP address. This ensures that a particular device on the network always receives the same IP address from the DHCP server, which can be useful for network management, security, and ensuring consistent network behaviour.
 
Under this submodule the user can configure/update/edit the IP Address for MAC.
 
You can edit the pre-existing configuration, or you can ‘Add’ in the ‘New MAC ADDRESS’ field.
 
[[File:Mac Addressing Binding.png|frameless|620x620px]]
 
'''EDIT:'''
 
[[File:Mac Address Edit.png|frameless|620x620px]]
 
Specification details are given below:
{| class="wikitable"
|SN
|Field  Name
|Sample  Value
|Description
|-
|-
|1
|4
|Device Name
|Peer  tunnel IP
|Macbinding1
|Example:  10.1.1.4
|A user-defined name for the binding configuration.
|The IP address of the peer's tunnel interface.
|-
|-
|2
|5
|MAC Address
|Local  tunnel IP
|48:9e:bd:da:45:91
|Example: 10.1.1.6
|The unique identifier for the network interface of the device to which the IP address will be bound.
|The IP address of the local tunnel  interface.
|-
|6
|Local  tunnel net mask
|Example: 255.255.255.0
|The subnet mask of the local tunnel  interface.
|-
|7
|Remote IP
|Example: 192.168.10.0/24
|The remote network that is reachable through the IPIP tunnel.
|-
|8
|Enable  Tunnel Link
|Check to enable
|Enable or disable the IPIP tunnel link.
|-
|-
|3
|9
|IP Address
|Interface  type
|192.168.10.55
|Example:  EWAN2
|The IP address that will be consistently assigned to the device with the specified MAC address.
|'''EWAN2''': The  type of network interface used for the IPIP tunnel.
|}
|-
 
|10
 
|MTU
By applying this configuration, the DHCP server will always assign the IP address 192.168.10.55 to the device with the MAC address 48:9e:bd:da:45:91, ensuring consistency and stability in network addressing for that device.
|Example: 1476
 
|'''1476''': Maximum  Transmission Unit size for the IPIP tunnel.
* Once the user modifies the MAC address /IP Address then click on the save button to save the changes done.
|-
* The user can click on the deleted button to delete an existing configured device.
|11
 
|TTL
Post all the changes the user needs to click on the update to reflect all the changes in the application.
|Example:  64
 
|'''64''': Time To  Live value for the packets within the IPIP tunnel.
=== 5.2 URL Filtering ===
|-
In this submodule the user should provide the URL which needs to be blocked for the device. By implementing URL filtering with the specified URL, you can control and restrict access to certain websites, thereby improving network security and managing user access.
|12
 
|Tunnel  key
[[File:URL Filtering.png|frameless|620x620px]]
|Example:  12345678
|Although typically not used in IPIP,  this field might be included for compatibility with certain configurations.
|-
|13
|Enable  keep alive
|Check to  enable
|Enable or disable the keep-alive  feature to monitor the tunnel's status.
|-
|14
|Keep  alive interval
|Example:  10
|'''10''': Interval in seconds for the keep-alive packets.
|}


To add the new URL for blocking, click on the Add New button.
== 3.Maintenance ==
In this module the user can configure/upgrade/modify the settings related to system, password,


Once the user clicks on the Add New button a new pop will appear in that page write the URL and click on the save.
firmware and monitoring.


The user can select the status of that URL while defining the URL.
It includes 6 submodules.


[[File:Url Update.png|frameless|620x620px]]
* General
* Password
* Reboot
* Import and Export config
* Firmware upgrade
* Monitor Application


To edit / delete the existing URL the user needs to click on the edit /deleted button respectively.
[[File:IAC44A Maintenance.png]]


[[File:URL Filtering .png|frameless|620x620px]]
=== 3.1 General ===
Here you can configure the basic aspects of router like its hostname or the timezone.


Click on “save” after the changes are done as per the need.
It is further sub-divided into,


=== 5.3 Web Server ===
1.) General Settings
This configuration will allow your device to serve web traffic securely over HTTPS, keep its system time synchronized, and ensure that all HTTP traffic is redirected to HTTPS for better security.


[[File:Web server.png|frameless|620x620px]]
2.) Logging


'''EDIT:'''
3.) Language and Style


[[File:Webserver Configuration Editing.png|frameless|620x620px]]
'''General Settings:'''


Specification details are given below:
[[File:IAC44A General Settings.png|1024x1024px]]'''EDIT:'''
{| class="wikitable"
{| class="wikitable"
|SN
|SN
|Field Name
|Field Name
|Sample Value
|Sample Value
|Description
|Description
|-
|-
|1
|1
|Enable HTTP
|Local  Time
|'''HTTP Port:''' 80
|2024/07/30  13:25:47
 
|The current local date and time set on  the device.
Enable or disable the HTTP server.
|Port 80 is the default port for HTTP traffic.  It is used to serve web pages over an unencrypted connection.
|-
|-
|2
|2
|Enable HTTPS
|Timezone
|'''HTTPS Port:''' 443
|Asia/Kolkata
|The timezone setting of the device,  which determines the local time.
|}
Once the user configures the required details then click on the save button to save all the details.


Enable or disable the HTTPS server.
'''Logging:'''
|Port 443 is the default port for HTTPS traffic. It is used to serve web pages over an encrypted connection.
 
Here the user can configure the basic aspects of your device related to system.
 
The system log configuration provided specifies how the device handles and stores log information, including buffer size, external log server details, and log verbosity levels.
 
[[File:IAC44A Logging.png]]
 
'''EDIT:'''
{| class="wikitable"
|SN
|Field Name
|Sample Value
|Description
|-
|1
|System log buffer size
|Example: 32 kiB
|The size of the memory buffer allocated  (0-32) for storing system logs before they are either written to a file or sent to an external server.
|-
|2
|External system log server
|Example: 0.0.0.0
|The IP address of an external server  where logs can be sent.
|-
|-
|3
|3
|Redirect HTTPS
|External system log server port
|Option to redirect HTTP traffic to  HTTPS.
|Example: 514
|When enabled, all HTTP requests will be  automatically redirected to the HTTPS port to ensure secure communication.
|The port used to send logs to the external log server. Port 514 is the default port for syslog.
|-
|-
|4
|4
|Enable NTP Sync
|Log output level
|Enable or disable NTP synchronization.
|Example: Debug
|Synchronizes the device’s system clock with an external NTP server to maintain accurate time.
|Sets the detail level of the system  logs.
|-
|-
|5
|5
|NTP Server
|Cron Log level
|0.openwrt.pool.ntp.org
|Example: Debug
|The address of the NTP server used for time synchronization. The openwrt.pool.ntp.org server is a public NTP server pool.
|The detail level of the logs for cron jobs.
|-
|6
|NTP Sync Interval (In Minutes)
|15
|The interval at which the device will sync its  clock with the NTP server, set to every 15 minutes in this case.
|}
|}
Once the user configures the required details then click on the save button to save all the details.


Click on save once changes are made.


=== 5.4 Wi-Fi MacID Filtering ===
Wireless MAC ID Filtering allows you to control which devices can connect to your wireless network based on their MAC (Media Access Control) addresses. This can help enhance security by allowing only specified devices to access the network.


It is further divided into 2 categories,
'''Language and Style:'''


'''WIFI 2.4G AP'''
Here the user can configure the basic aspects of your device related to language.


'''WIFI 2.4G AP Guest'''
Once the user configures the required details then click on the save button to save all the details.


[[File:Wi-Fi MacID Filtering .png|frameless|620x620px]]
[[File:IAC44A Language and Sytle.png]]


=== 3.2 Password ===
In this module the user can set the password for the admin credentials.


'''Note:''' Password must contain at least one uppercase letter, one digit, one special character, and be at least 8 characters long.


Before adding the MacIDs the user needs to select the mode from the dropdown menu.
[[File:IAC44A Password Setup.png]]


In ‘Change Mode’ select one option,
=== 3.3 Reboot ===
In this module the user can reboot the device remotely.


'''Blacklist'''
First option is to directly reboot the device without enabling the maintenance reboot tab.


In blacklist mode, you specify which MAC addresses are not allowed to connect to the wireless network. Devices not on the blacklist will be able to connect.
Click on “Reboot Now” at the bottom of the screen to start the reboot process.


'''Whitelist'''
[[File:IAC44A Reboot.png]]


In whitelist mode, you specify which MAC addresses are allowed to connect to the wireless network. Devices not on the whitelist will be blocked.
To start maintenance reboot process first the user needs to fill all the required fields.
 
To Add the MacID the user needs to click on Add New option.


[[File:WIFI 2.4G AP Guest.png|frameless|620x620px]]
[[File:IAC44A Maintenance Reboot Configuration.png]]


Specification details are given below:
Specification details are given below:
{| class="wikitable"
{| class="wikitable"
|SN
|SN
|Field Name
|Field Name
|Sample Value
|Sample Value
|Description
|Description
|-
|-
|1
|1
|Status
|Enable Maintenance  Reboot
|Enable/Disable
|Enable/Disable
|Enable or disable the MAC ID filtering.
|Indicates whether the maintenance  reboot feature is enabled or not.
|-
|-
|2
|2
|MAC ID
|Type
|Example: e8:6f:38:1a:f2:61
|Maintenance  Reboot
|The MAC address of the device to be whitelisted or blocklisted.
|Specifies the type of reboot being scheduled.
|-
|-
|3
|3
|Network Name
|Reboot  Type
|Example: WIFI 2.4G AP or Wi-Fi 2.4G AP Guest.
|Hardware
|The network to apply the MAC ID filtering.
|'''Hardware''': A hardware reboot involves restarting the entire  device as if it were powered off and on again.
|}
|-
Once the required MAC ID and Network Name is configured the user needs to click on the save button to add the details.
|4
 
|Minutes
The user needs to click on the edit button to do modifications on the pre-existing configuration.
|Example: 59
 
|The minute at which the reboot should  occur (0-59).
Once the required MACID / Network Name is modified the user needs to click on the save button to reflect the changed value in the application.
|-
 
|5
=== 5.5 Routing ===
|Hours
In this submodule the user can configure the parameters related to routing of the device like Target address, Networks address etc. Routing configurations allow network packets to be directed between different subnets and networks.
|Example:  22 (10 PM)
|The hour at which the reboot should  occur (0-23, in 24-hour format).
|-
|6
|Day Of  Month
|Example:  All
|Specifies which days of the month the reboot should occur (1-31). "All" means it will occur every day.
|-
|7
|Month
|Example:  All
|Specifies which months the reboot  should occur (1-12). "All" means it will occur every month.
|-
|8
|Day Of  Week
|Example:  All
|Specifies which days of the week the reboot should occur (0-6, where 0 is Sunday). "All" means it will  occur every day of the week.
|}
 


It is further divided into 2 sections,


'''Static IPV4 Routes'''
Once the user fills all the required given parameters click on the save.


'''Advanced Static IPV4 Routes'''
=== 3.4 Import and Export ===
In this section, User can Import & Export Configuration files of the Device.


'''Static IPV4 Routes:'''
[[File:IAC44A Import and Export Configuration.png]]


Click on ‘Add’ to add a new interface.
Click “Export Config” to export device configuration & settings to a text file,


[[File:Static IPV4 Routes.png|frameless|620x620px]]
Click “Import Config” to import device configuration & settings from a previously exported text file.


[[File:IAC44A Import Config.png]]


The user needs to select on the “choose file”, upload the required file and click on apply.


'''EDIT:'''
=== 3.5 Firmware Upgrade ===
The user can upgrade with the latest software for the existing firmware.


To edit the existing device the user needs to click on the edit option.
[[File:IAC44A Firmware Upgarde.png]]


Once the changes are done click on the save button to save all the changes.
Click on the '''flash image''' and chose the path where the sys-upgrade file is kept and then click on flash image, it will upgrade to the latest software once the reboot is done.


Click on the deleted button to delete the existing device detail.
This option will completely reset the device to default settings.


[[File:Static IPV4 Routes Editing.png|frameless|620x620px]]
[[File:IAC44A Flash Image.png]]Click on the '''Retain Config and flash''' and chose the path where the sys-upgrade file is kept and then click on Retain Config and flash, it will upgrade to the latest software once the reboot is done.
 
This refers to updating the firmware (flashing) of a device while preserving the current configuration settings.
 
[[File:IAC44A Retain Config and Flash.png]]
 
 
Click on the '''Factory Reset''' for the complete retest of the device.
 
[[File:IAC44A Factory Reset.png|1563x1563px]]
 
=== 3.6 Monitor Application ===
In this section, the monitor application is divided into major 2 configurations which is further sub-divided into 4 editable options,
 
1.) Modem Monitor Application Configuration:
 
2.) Router Monitor Application Configuration:
 
[[File:IAC44A Monitor Application.png]]'''Modem Monitor Application Configuration:'''
 
[[File:IAC44A Modem Monitor Application.png]]Specification details are given below:


Specification details are given below:
{| class="wikitable"
{| class="wikitable"
|SN
|SN
Line 2,604: Line 2,995:
|-
|-
|1
|1
|Interface
|Enable Ping Check Application
|Ex: eth0.1
|Enable/Disable
|The network interface to be used for this route. Select the one to use from dropdown.
|Turns on the functionality to perform ping checks on specified IP addresses.
|-
|-
|2
|2
|Target
|Time Interval for Check (In minutes)
|Ex: 192.168.20.0
|'''Example:''' 10 minutes
|The destination subnet to which traffic should be routed.
|Frequency at which the ping checks are performed.
|-
|-
|3
|3
|IPv4 Netmask
|Select No of IP addresses to ping
|255.255.255.0
|'''Example:''' 1
|The subnet mask for the target network.
|Number of IP addresses that will be pinged.
|-
|-
|4
|4
|Metric
|IP Address 1
|0
|'''Example:''' 8.8.8.8
|The priority of the route.
|The IP address to ping.
 
Lower values indicate higher priority.
|-
|-
|5
|5
|IPv4 Gateway
|No. of Retries
|Ex: 192.168.10.1
|'''Example:''' 5
|The gateway IP address to be used for routing traffic to the target subnet.
|Number of times to retry pinging an IP address  if the initial ping fails.
|-
|-
|6
|6
|Route Type
|Failure Criteria in (%)
|Unicast
|'''Example:''' 80% (If 4 out of 5 pings fail, it’s considered  a failure)
|Standard route for individual destination IP addresses.
|Percentage of failed pings required to consider the ping check a failure.
 
|-
Custom changes can be made.
|7
|}
|Action On Failure
Click on save once configuration changes have been made.
|'''Example:''' Restart Modem
 
|Action to be taken if the ping check fails  according to the criteria.
'''Advanced Static IPV4 Routes:'''
|-
 
|8
Click on ‘Add’ to add a new interface.
|Enable Second Level Action
 
|Enable/Disable
[[File:Advanced Static IPV4 Routes.png|frameless|620x620px]]
|Option to enable a secondary action if the  primary action fails multiple times.
 
|-
'''EDIT:'''
|9
|Second Level Action Threshold
|'''Example:''' 2
|Number of failures required to trigger the  secondary action.
|-
|10
|Second Level Action
|'''Example:''' Restart Board (Reboots  the entire hardware board)
|The action to be taken if the second level  action threshold is met.
|}
Save the details once made necessary changes.


To edit the existing device the user needs to click on the edit option.
'''Router Monitor Application Configuration:'''
 
Once the changes are done click on the save button to save all the changes.
 
Click on the deleted button to delete the existing device detail.


[[File:Advanced Static IPV4 Routes Editing.png|frameless|620x620px]]
[[File:IAC44A Router Monitor Application Configuration.png]]Specification details are given below:
 
Specification details are given below:
{| class="wikitable"
{| class="wikitable"
|SN
|SN
Line 2,663: Line 3,056:
|-
|-
|1
|1
|Interface
|Enable Ping Check Application
|Ex: ra0
|Enable/Disable
|The network interface through which the traffic will be routed. Select as per requirement.
|Activates the  ping check functionality to monitor router performance.
|-
|-
|2
|2
|To
|Time Interval for Check (In minutes)
|Ex: 192.168.10.1
|'''Example:''' 10 minutes
|This is the target address to which the traffic  is being directed. In this case, all traffic destined for 192.168.10.1 will  follow this route.
|How  frequently the ping checks are performed.
|-
|-
|3
|3
|IPv4 Netmask
|Select No of IP Addresses to Ping
|255.255.255.192
|'''Example:''' 1 (Please select the appropriate number  based on your requirements)
|This defines the subnet of the destination address.
|Choose the number of IP addresses to ping. This typically involves selecting from a list or entering multiple addresses.
|-
|-
|4
|4
|Table
|No. of Retries
|1.) Local
|'''Example:''' 3
|Number of  retries if a ping fails.
|-
|5
|Failure Criteria in (%)
|'''Example:''' 80% (If 80% of the pings fail, it’s  deemed a failure)
|Percentage of  failed pings required to consider the ping check as failed.
|-
|6
|Action On Failure
|'''Example:''' Restart IPsec
|The action  taken if the ping check fails according to the criteria.
|-
|7
|Enable Second Level Action
|Enable/Disable
|Option to  enable an additional action if the primary action fails.
|-
|8
|Second Level Action Threshold
|'''Example:''' Specify the number of failures, such as 2
|Number of  times the primary action must fail before the secondary action is triggered.
|-
|9
|Second Level Action
|'''Example:''' Restart Board
|The action to  be taken if the second level action threshold is met.
|}
Save the details once made necessary changes.


2.) Main
== 4. Features ==
In this module the user can see all the features that the router device has.


3.) Default
This module includes 10 features.


4.) 220
* Mac Address Binding
* URL Filtering
* Web Server
* Wi-Fi MacID Filtering
* Routing
* DMZ
* Others
* SNMP Agent Configuration
* Connection Diagnostics
* Package Manager


5.) custom
[[File:IAC44A Features.png]]
|1.) This table contains local routes for the  addresses assigned to the local interfaces. It's  typically used for host and broadcast addresses.


2.) The  primary routing table used by the system.
=== 4.1 Mac Address Binding ===
MAC address binding is a configuration that binds a specific MAC address to a specific IP address.


3.) A  fallback table used when no other table is specified.
This ensures that a particular device on the network always receives the same IP address from the DHCP


4.) Often  used for policy-based routing.
server, which can be useful for network management, security, and ensuring consistent network
 
behaviour.
 
Under this submodule the user can configure/update/edit the IP Address for MAC.
 
You can edit the pre-existing configuration, or you can ‘Add’ in the ‘New MAC ADDRESS’ field.
 
[[File:IAC44A MAC Address Binding.png]]


5.) A user-defined  routing table.
|-
|5
|From
|Ex: 192.168.100.1
|This source address restricts the route to  traffic originating from 192.168.100.1. Traffic from other sources won't use  this route.
|-
|6
|Priority
|20
|The priority value determines the preference of  this route. A lower number means higher priority; 20 is relatively high, so  this route will be preferred over routes with higher priority values.
|}
Once all the configurations are done click on the update button to reflect the changes made.


=== 5.6 Others ===
'''EDIT:'''
In this page the user will get to do all the other miscellaneous configuration with respect to the device based on the required parameters. Each utility serves a specific purpose, providing various functionalities for managing and troubleshooting network configurations and statuses.


[[File:Miscellaneous configuration v2.png|frameless|620x620px]]
[[File:IAC44A MAC Address Binding Editing.png]]


Specification details are given below:
Specification details are given below:
Line 2,723: Line 3,148:
|-
|-
|1
|1
|Set Date
|Device Name
|Date and time fields (day, month, year,  hour, minute, second)
|mac1
|Sets the system date and time to the specified values.
|A user-defined name for the binding configuration.
|-
|-
|2
|2
|Get Date
|MAC Address
|System
|48:9e:bd:da:45:91
|Retrieves and displays the current system date and time.
|The unique identifier for the network interface of the device to which the IP address will be bound.
|-
|-
|3
|3
|ipsec status all
|IP Address
|Command ‘Get’
|192.168.10.55
|Displays the status of all IPsec connections.
|The IP address that will be consistently  assigned to the device with the specified MAC address.
|-
|}
|4
 
|Wi-Fi Scan
By applying this configuration, the DHCP server will always assign the IP address 192.168.10.55 to the device with the MAC address 48:9e:bd:da:45:91, ensuring consistency and stability in network addressing for that device.
|Command ‘Get’
 
|Initiates a scan for available Wi-Fi networks.
* Once the user modifies the MAC address /IP Address then click on the save button to save the changes done.
|-
* The user can click on the deleted button to delete an existing configured device.
|5
 
|iPerf3 Client
Post all the changes the user needs to click on the update to reflect all the changes in the application.
|IP address (e.g., 192.168.10.100)
 
|Runs an iPerf3 client to measure network  performance.
=== 4.2 URL Filtering ===
|-
In this submodule the user should provide the URL which needs to be blocked for the device.
|6
 
|iPerf3 Server
By implementing URL filtering with the specified URL, you can control and restrict access to certain
|Command ‘Run’
 
|Runs an iPerf3 server to measure network  performance.
websites, thereby improving network security and managing user access.
|-
 
|7
[[File:IAC44A URL FIltring.png]]
|Ping
 
|IP address or domain (e.g., 8.8.8.8)
To add the new URL for blocking, click on the Add New button.
|Sends ICMP echo requests to the specified address to check connectivity.
 
Once the user clicks on the Add New button a new pop will appear in that page write the URL and click on the save.
 
The user can select the status of that URL while defining the URL.
 
[[File:IAC44A URL FIltring Edit.png]]
 
To edit / delete the existing URL the user needs to click on the edit /deleted button respectively.
 
[[File:IAC44A Url Filter Disable.png]]
 
Click on “save” after the changes are done as per the need.
 
=== 4.3 Web Server ===
This configuration will allow your device to serve web traffic securely over HTTPS, keep its system time synchronized, and ensure that all HTTP traffic is redirected to HTTPS for better security.
 
[[File:IAC44A Webserver Configuration.png]]
 
'''EDIT:'''
 
[[File:IAC44A Webserver Edit.png]]Specification details are given below:
{| class="wikitable"
|SN
|Field  Name
|Sample Value
|Description
|-
|-
|8
|1
|traceroute
|Enable HTTP
|IP address or domain (e.g., 8.8.8.8)
|'''HTTP Port:''' 80
|Traces the route packets take to reach the  specified address.
 
Enable or disable the HTTP server.
|Port 80 is the default port for HTTP traffic.  It is used to serve web pages over an unencrypted connection.
|-
|-
|9
|2
|NTP Sync
|Enable HTTPS
|Command ‘Sync’
|'''HTTPS Port:''' 443
|Synchronizes the system time with the  configured NTP server.
 
Enable or disable the HTTPS server.
|Port 443 is the default port for HTTPS traffic. It is used to serve web pages over an encrypted connection.
|-
|-
|10
|3
|Download Files
|Redirect HTTPS
|File or database identifier
|Option to redirect HTTP traffic to  HTTPS.
|Initiates a download of the specified file or  database.
|When enabled, all HTTP requests will be  automatically redirected to the HTTPS port to ensure secure communication.
|-
|-
|11
|4
|Restart Power
|Session Timeout (In Minutes)
|Command ‘Restart’
|Ex: 5 mins
|Restarts the power of the device.
|This setting controls how long a user session  remains active without interaction before the server automatically logs the user out.
|-
|-
|12
|
|Restart Modem
 
|Command ‘Restart’
 
|Restarts the modem.
5
|RFC1918 Filter
|Enable/Disable
|When enabled, this filter can block traffic from private IP  ranges (e.g., 192.168.x.x, 10.x.x.x) from being routed through the public  internet, enhancing network security.
|-
|-
|13
|6
|Run AT Command
|Enable NTP Sync
|Enter AT command
|Enable or disable NTP synchronization.
|Executes the specified AT command on the modem.
|Synchronizes the device’s system clock with an  external NTP server to maintain accurate time.
|-
|-
|14
|7
|Show Board Configuration
|NTP Server
|Command ‘Show’
|0.openwrt.pool.ntp.org
|Displays the current board configuration.
|The address of the NTP server used for time  synchronization. The openwrt.pool.ntp.org server is a public NTP server pool.
|-
|-
|8
|NTP Sync Interval (In Minutes)
|15
|15
|Show VPN Certificate Name
|The interval at which the device will sync its clock with the NTP server, set to every 15 minutes in this case.
|Command ‘Show’
|}
|Displays the name of the VPN certificate in  use.
Click on save once changes are made.
|-
|16
|Switch SIM to Secondary (Takes >2 mins)
|Command ‘Run’
|Switches the active SIM to the secondary SIM  card.
|-
|17
|Send test SMS
|Phone number (e.g., +911234567890)  message text (e.g., "Hello how are you?")
|Sends a test SMS to the specified phone number.
|-
|18
|ReadlatestSMS
|Command ‘Read’
|Reads the most recent SMS received by the  device.
|-
|19
|Data Usage
|'''From:''' Start  date (YYYY-MM-DD)


'''To:''' End date  (YYYY-MM-DD)
=== 4.4 Wi-Fi MacID Filtering ===
|Displays data usage statistics for the  specified date range.
Wireless MAC ID Filtering allows you to control which devices can connect to your wireless network based on their MAC (Media Access Control) addresses. This can help enhance security by allowing only specified devices to access the network.
|-
|20
|Monthly Data Usage
|'''Month:''' Month (e.g., 07)


'''Year:''' Year  (e.g., 2024)
It is further divided into 2 categories,
|Displays data usage statistics for the specified month and year.
 
'''WIFI 2.4G AP'''
 
'''WIFI 2.4G AP Guest'''
 
[[File:IAC44A Wifi Mac ID Filtering.png]]
 
Before adding the MacIDs the user needs to select the mode from the dropdown menu.
 
In ‘Change Mode’ select one option,
 
'''Blacklist'''
 
In blacklist mode, you specify which MAC addresses are not allowed to connect to the wireless network. Devices not on the blacklist will be able to connect.
 
'''Whitelist'''
 
In whitelist mode, you specify which MAC addresses are allowed to connect to the wireless network. Devices not on the whitelist will be blocked.
 
To Add the MacID the user needs to click on Add New option.
 
[[File:IAC44A Whitelist.png]]
 
Specification details are given below:
{| class="wikitable"
|SN
|Field  Name
|Sample Value
|Description
|-
|-
|21
|1
|Modem Debug Info
|Status
|Command ‘Read’
|Enable/Disable
|Displays debug information for the modem.
|Enable or disable the MAC ID filtering.
|-
|-
|22
|2
|Scan Network operators (Takes >3  mins)
|MAC ID
|Command ‘Scan’
|Example: e8:6f:38:1a:f2:61
|Initiates a scan for available network operators.
|The MAC address of the device to be whitelisted or blocklisted.
|-
|-
|23
|3
|Network operator list (First Perform Scan Network Operators)
|Network Name
|Command ‘Show’
|Example: WIFI 2.4G AP or Wi-Fi 2.4G AP Guest.
|Displays the list of network operators detected  in the previous scan.
|The network to apply the MAC ID filtering.
|-
|}
|24
Once the required MAC ID and Network Name is configured the user needs to click on the save button to add the details.
|ReadLogFiles
 
|Log file identifier
The user needs to click on the edit button to do modifications on the pre-existing configuration.
|Reads and displays the specified log file
 
|-
Once the required MACID / Network Name is modified the user needs to click on the save button to reflect the changed value in the application.
|25
 
|Enable ssh (Admin)
=== 4.5 Routing ===
|Command ‘Run’
In this submodule the user can configure the parameters related to routing of the device like Target address, Networks address etc. Routing configurations allow network packets to be directed between different subnets and networks.
|Enables SSH access for the admin user.
 
It is further divided into 2 sections,
 
'''Static IPV4 Routes'''
 
'''Advanced Static IPV4 Routes'''
 
'''Static IPV4 Routes:'''
 
Click on ‘Add’ to add a new interface.
 
[[File:IAC44A Routing.png]]'''EDIT:'''
 
To edit the existing device the user needs to click on the edit option.
 
Once the changes are done click on the save button to save all the changes.
 
Click on the deleted button to delete the existing device detail.
[[File:IAC44A Routing Edit.png|left]]
 
 
Specification details are given below:
{| class="wikitable"
|SN
|Field  Name
|Sample  Value
|Description
|-
|-
|26
|1
|Disable ssh (Admin)
|Interface
|Command ‘Run’
|Ex: eth0.1
|Disables SSH access for the admin user.
|The network interface to be used for this route.  Select the one to use from dropdown.
|-
|-
|27
|2
|ClearSIM1Data
|Target
|Command ‘Clear’
|Ex: 192.168.20.0
|Clears data usage statistics for SIM1.
|The destination subnet to which traffic should  be routed.
|-
|-
|28
|3
|ClearSIM2Data
|IPv4 Netmask
|Command ‘Clear’
|255.255.255.0
|Clears data usage statistics for SIM2.
|The subnet mask for the target network.
|-
|-
|29
|4
|Create Bridge with SW_LAN
|Metric
|Network interface identifier
|0
|Creates a network bridge with the specified  interface and SW_LAN.
|The priority of the route.
 
Lower values indicate higher priority.
|-
|-
|30
|5
|Show Bridge
|IPv4 Gateway
|Command ‘Show’
|Ex: 192.168.10.1
|Displays information about the current network  bridges.
|The gateway IP address to be used for routing  traffic to the target subnet.
|-
|-
|31
|6
|Delete Bridge
|Route Type
|Command ‘Delete’
|Unicast
|Deletes the specified network bridge.
|Standard route for individual destination IP  addresses.
 
Custom changes can be made.
|}
Click on save once configuration changes have been made.
 
'''Advanced Static IPV4 Routes:'''
 
This is further divided into 2 sections,
 
Routing Tables
 
Routing Rules for IPV4
 
'''Routing Tables:'''
 
Adding a new table in static routing allows you to define specific routes for traffic within a network.
 
Click on ‘Add’ to add a new Table.
 
[[File:IAC44A Advanced Static IPV4 Routes.png]]'''EDIT:'''
 
[[File:IAC44A Routing Table Edit.png]]
Specification details are given below:
{| class="wikitable"
|SN
|Field  Name
|Sample  Value
|Description
|-
|1
|ID of Table
|Ex: 1
|A unique identifier for the routing table.  Multiple tables can be used to define different sets of routing rules,  providing flexibility in how traffic is managed.
|-
|2
|Name of Table
|Ex: Route
|A descriptive name for the routing table,  making it easier to manage and identify different tables.
|-
|3
|Target
|Ex: 192.168.10.0
|Specifies the destination network or IP address  that the route is intended for.
|-
|4
|IPv4 Netmask
|255.255.255.0
|Defines the subnet mask for the target network.
|-
|-
|32
|5
|Output
|Metric
|Any value
|Ex: 0
|Displays output for all the above actions.
|Indicates the priority of the route. A lower  metric value means a higher priority. Routes with lower metrics are preferred  over those with higher metrics.
|-
|6
|IPv4 Gateway
|Ex: 10.1.1.1
|Specifies the next hop or gateway IP address  through which the traffic to the target network should be routed.
|-
|7
|Route Type
|1.) Unicast
 
2.) Custom
|'''Unicast''':  Standard route where packets are sent to a single destination IP address.
 
'''Custom''': Enables  advanced routing configurations or specific protocols that might not be  covered by default.
|}
|}
Once all the configurations are done click on the update button to reflect the changes made.
'''Routing Rules for IPV4:'''
Click on ‘Add’ to add a new interface.
[[File:IAC44A Routing For IPV4.png]]'''EDIT:'''
To edit the existing device the user needs to click on the edit option.
Once the changes are done click on the save button to save all the changes.
Click on the deleted button to delete the existing device detail.
[[File:IAC44A Routing For IPV4 Edit.png]]
Specification details are given below:
{| class="wikitable"
|SN
|Field  Name
|Sample  Value
|Description
|-
|1
|Interface
|Ex: ra0
|Select the specific network interface on the  router through which traffic enters or exits.
|-
|2
|To
|Ex: 192.168.10.1
|The destination IP address or network. In this  case, 192.168.10.1 is the target IP address for routing traffic.
|-
|3
|IPv4 Netmask
|Ex: 255.255.255.192
|Defines the subnet mask, which helps determine  the size of the network.
|-
|4
|Table ID
|Ex: 1
|Identifies which routing table this rule  applies to.
|-
|5
|From
|Ex: 192.168.100.1
|Specifies the source IP address or network from  which the traffic originates. In this case, the traffic is coming from  192.168.100.1.
|-
|6
|Priority
|Ex:20
|Determines the order in which routing rules are  evaluated. Lower numbers have higher priority. If two rules conflict, the one  with the lower priority number will be applied first.
|-
|7
|Outgoing Interface
|1.) fwmark
2.) iif (Incoming Interface)
3.) oif (Outgoing Interface)
4.) lookup
5.) blackhole
6.) prohibited
7.) unreachable
|1.) This  allows you to create rules that apply only to traffic that has been marked in  a specific way by the firewall.
2.) This is  often used to create rules based on the interface through which traffic is received.
3.) This  allows you to control the flow of traffic based on the desired outgoing  interface.
4.) It tells the router to check the specific  routing table ID mentioned to determine how to route the traffic.
5.) This is  used when you want to block traffic without notifying the sender.
6.) Like  blackhole but sends an ICMP unreachable message to the sender, indicating  that the route is prohibited.
7.) Causes  the router to send an ICMP unreachable message to the source IP, notifying  that the destination is unreachable.
|}
=== 4.6 DMZ ===
A '''DMZ (Demilitarized Zone)''' is a subnetwork that provides an extra layer of security for an organization's internal network.
In this case we are configuring several services (HTTP, HTTPS, SSH, FTP, DNS) in a DMZ, and each service requires the correct '''internal port''' (the port used within the network) and '''external port''' (the port used by external clients to access the service) setting
[[File:IAC44A DMZ.png]]
Specification details are given below:
{| class="wikitable"
|SN
|Field  Name
|Sample  Value
|Description
|-
|1
|Enable DMZ
|Enable/Disable
|Enable DMZ to configure it further.
|-
|2
|Host IP Address
|Ex: 192.168.10.1
|This is the internal IP address of the device  or server that will be in the DMZ.
|-
|3
|Protocol
|1.) TCP
2.) UDP
3.) ICMP
4.) All
|'''TCP''': Used  for reliable services like HTTP, HTTPS, FTP, and SSH.
'''UDP''': Often  used for services like DNS that don't require as much reliability.
'''ICMP''': Used  for sending control messages like "ping."
'''All''': Select  this if you're unsure which protocol to allow, but it's less secure.
|-
|4
|Allow HTTP
|Internal Port: 80
External Port: 80
|Enables web traffic over the unsecured '''HTTP'''  protocol.
(Port 80 is the standard port for HTTP traffic  on our internal network).
|-
|5
|Allow HTTPS
|Internal Port: 443
External Port: 443
|Enables secure web traffic over '''HTTPS.''' (Port  443 is the standard port for HTTPS on our internal network).
|-
|6
|Allow SSH
|Internal Port: 52434
External Port: 52434
|This is a custom port we’re using for SSH.
The default is 22.
|-
|7
|Allow FTP
|Internal Port: 21/20
External Port: 21/20
|FTP is used to transfer files between  computers.
(These are the standard ports for FTP traffic.  Port 21 is used for control commands, and port 20 for the data transfer.)
|-
|8
|Allow DNS
|Internal Port: 53
External Port: 53
|Standard DNS port within our internal network.
|}
=== 4.7 Others ===
In this page the user will get to do all the other miscellaneous configuration with respect to the device based on the required parameters. Each utility serves a specific purpose, providing various functionalities for managing and troubleshooting network configurations and statuses.
[[File:IAC44A Others.png]]
Specification details are given below:
{| class="wikitable"
|SN
|Field  Name
|Sample  Value
|Description
|-
|1
|Set Date
|Date and time fields (day, month, year,  hour, minute, second)
|Sets the system date and time to the specified  values.
|-
|2
|Get Date
|System
|Retrieves and displays the current system date  and time.
|-
|3
|ipsec status all
|Command ‘Get’
|Displays the status of all IPsec connections.
|-
|4
|Wi-Fi Scan
|Command ‘Get’
|Initiates a scan for available Wi-Fi networks.
|-
|5
|iPerf3 Client
|IP address (e.g., 192.168.10.100)
|Runs an iPerf3 client to measure network  performance.
|-
|6
|iPerf3 Server
|Command ‘Run’
|Runs an iPerf3 server to measure network  performance.
|-
|7
|Ping
|IP address or domain (e.g., 8.8.8.8)
|Sends ICMP echo requests to the specified  address to check connectivity.
|-
|8
|traceroute
|IP address or domain (e.g., 8.8.8.8)
|Traces the route packets take to reach the  specified address.
|-
|9
|NTP Sync
|Command ‘Sync’
|Synchronizes the system time with the  configured NTP server.
|-
|10
|Download Files
|File or database identifier
|Initiates a download of the specified file or database.
|-
|11
|Restart Power
|Command ‘Restart’
|Restarts the power of the device.
|-
|12
|Restart Modem
|Command ‘Restart’
|Restarts the modem.
|-
|13
|Run AT Command
|Enter AT command
|Executes the specified AT command on the modem.
|-
|14
|Show Board Configuration
|Command ‘Show’
|Displays the current board configuration.
|-
|15
|Show VPN Certificate Name
|Command ‘Show’
|Displays the name of the VPN certificate in  use.
|-
|16
|Switch SIM to Secondary (Takes >2  mins)
|Command ‘Run’
|Switches the active SIM to the secondary SIM  card.
|-
|17
|Send test SMS
|Phone number (e.g., +911234567890)  message text (e.g., "Hello how are you?")
|Sends a test SMS to the specified phone number.
|-
|18
|ReadlatestSMS
|Command ‘Read’
|Reads the most recent SMS received by the  device.
|-
|19
|Data Usage
|'''From:''' Start  date (YYYY-MM-DD)
'''To:''' End date  (YYYY-MM-DD)
|Displays data usage statistics for the  specified date range.
|-
|20
|Monthly Data Usage
|'''Month:''' Month (e.g., 07)
'''Year:''' Year  (e.g., 2024)
|Displays data usage statistics for the  specified month and year.
|-
|21
|Modem Debug Info
|Command ‘Read’
|Displays debug information for the modem.
|-
|22
|Scan Network operators (Takes >3  mins)
|Command ‘Scan’
|Initiates a scan for available network  operators.
|-
|23
|Network operator list (First Perform  Scan Network Operators)
|Command ‘Show’
|Displays the list of network operators detected  in the previous scan.
|-
|24
|ReadLogFiles
|Log file identifier
|Reads and displays the specified log file
|-
|25
|Enable ssh (Admin)
|Command ‘Run’
|Enables SSH access for the admin user.
|-
|26
|Disable ssh (Admin)
|Command ‘Run’
|Disables SSH access for the admin user.
|-
|27
|ClearSIM1Data
|Command ‘Clear’
|Clears data usage statistics for SIM1.
|-
|28
|ClearSIM2Data
|Command ‘Clear’
|Clears data usage statistics for SIM2.
|-
|29
|Create Bridge with SW_LAN
|Network interface identifier
|Creates a network bridge with the specified  interface and SW_LAN.
|-
|30
|Show Bridge
|Command ‘Show’
|Displays information about the current network  bridges.
|-
|31
|Delete Bridge
|Command ‘Delete’
|Deletes the specified network bridge.
|-
|32
|Output
|Any value
|Displays output for all the above actions.
|}
=== 4.8 SNMP Agent Configuration ===
The '''SNMP (Simple Network Management Protocol) Agent Configuration''' is essential for monitoring and managing network devices, such as routers, from a central management system.
[[File:IAC44A SNMP Agent Configuration.png]]
Specification details are given below:
{| class="wikitable"
|SN
|Field  Name
|Sample  Value
|Description
|-
|1
|Enable SNMP  Service
|Enable/Disable
|Enable this  if you want the device to be accessible for SNMP-based monitoring and management.
|-
|2
|IP Family
|IPV4
|Specifies that  SNMP service will operate over IPv4.
|-
|3
|Port
|161
|'''161''' is  the default and should be used unless there is a specific need to use a  different port.
|-
|4
|System OID
|1.3.6.1.4.1.38151
|This unique  identifier represents the device in the SNMP management system.
|-
|5
|Name
|Invendis  Router
|The name used  to identify the device in the SNMP management system.
|-
|6
|Contact
|Invendis@invendis.co
|The email  address of the person responsible for the device, used for administrative  contact.
|-
|7
|Location
|Bangalore
|The physical  location of the device.
|-
|8
|SNMP Version
|Version-1,
Version-2,
Version-3
|'''Version-1''':  Basic and outdated, offering no security.
'''Version-2''':  An improvement over Version-1 with better performance and some security  features.
'''Version-3''':  The most secure, offering authentication and encryption (AuthPriv).
|-
|9
|Security       (for SNMP Version-3)
|NoAuthNoPriv
AuthNoPriv
AuthPriv
|'''No  Authentication, No Privacy'''
'''Authentication,  No Privacy'''
'''Authentication  and Privacy'''
|-
|10
|Username
|Ex: admin
|The username  used for SNMP authentication.
|-
|11
|Authentication  Password
|*******
|This password  is used to authenticate the SNMP user.
|-
|12
|Privacy  Password
|*******
|This password  is used to encrypt SNMP messages.
|-
|13
|Download MIB  File
|Download
|Click this to  download the MIB file associated with the device’s SNMP configuration.
|}
Click on save tab to save changes.
=== 4.9 Connection Diagnostics ===
This can ensure that your connection diagnostics application effectively monitors and reports the status of your network connections, providing valuable data for troubleshooting and performance optimization.
[[File:IAC44A Connection Diagnostics.png]]This Application works in 3 parts,
1.) General settings
2.) Connection status and management
3.) Application Start/Stop
[[File:IAC44A Application Manager Dashboard.png]]
'''General settings:'''
First make configuration changes in this section and save.
[[File:IAC44A Application Manager Dashboard General Settings.png]]
Specification details are given below:
{| class="wikitable"
|SN
|Field  Name
|Sample  Value
|Description
|-
|1
|Enable Connection Diagnostics
|Enable/Disable
|This option  enables or disables the connection diagnostics functionality.
|-
|2
|Check Interval (in seconds)
|'''Value:''' 120
|Specifies how  often (in seconds) the diagnostics checks are performed. In this case, every  120 seconds. (min 60 secs)
|-
|3
|Number of Pings
|'''Value:''' 5
|Determines ping  requests sent during each check.
|-
|4
|Ping Packet Size (in Bytes)
|'''Value:''' 56
|Defines the  size of each ping packet in bytes.
|-
|5
|Send to remote MQTT Broker
|Enable/Disable
|This option  enables the sending of diagnostic data to a remote MQTT broker.
|-
|6
|Publish Data Format
|'''CSV''' / '''JSON'''
|Specifies the  format in which the diagnostic data will be published to the MQTT broker. You  can choose either CSV (Comma-Separated Values) or JSON (JavaScript Object  Notation).
|-
|7
|MQTT Broker url
|'''Value:''' broker.hivemq.com
|The URL of  the MQTT broker where the diagnostic data will be sent.
|-
|8
|TCP port
|'''Value:''' 1883
|The TCP port  used to connect to the MQTT broker. Port 1883 is the default port for MQTT.
|-
|9
|Topic
|'''Value:''' 37A26230014/connectionDiagnostics
|The MQTT  topic under which the diagnostic data will be published. This topic is used  to categorize and identify the data.
|}
'''Connection status and management:'''
To setup a connection,
Click on ‘Add new target’
Enter Target IP (Ex: 8.8.8.8)
Click ‘Add’
Target has been added successfully.
[[File:IAC44A Connection Status and Management.png]]
'''Application Start/Stop:'''
To check whether the target Ip is sending and receiving packets, you need to start the application to see the desired output.
[[File:IAC44A Application Start and Stop.png]]
As shown above, our target Ip is sending packets successfully.
You can Add as many target IP’s you need to monitor.
You can leave the application on for monitoring else ‘Stop’ the application.
=== 4.10 Package Manager ===
A '''Package Manager''' is a tool or interface used to '''manage software packages''' (applications, libraries, tools) on a system.
The package manager interface you are looking at likely allows you to manage the software installed on your device, such as networking tools, firmware, or other applications relevant to your system.
This section has 3 sub-sections,
Installed APP
Available APP
Manual Upgrade
[[File:IAC44A PacKage Manager.png]]
'''Installed APP:'''
When you select Installed APP, you will see all the software that is actively running or installed on the device.
This could include system utilities, network management tools, monitoring software, or any third-party apps that were previously installed.
'''Common Actions''':
* '''View Details''': You can check each application's version, source, and    installation date.
* '''Uninstall''': You can remove applications that are no longer needed.
* '''Check for Updates''': You can see if there are updates available for any    installed application.
'''Available APP''':
When you select '''Available APP''', you will see a list of software that can be installed from the system's repositories or sources.
These applications are not yet installed but are ready for installation if needed.
'''Common Actions''':
* '''Install''': You can install any of the available applications by selecting them.
* '''View Details''': You can review each application's description, version, and    functionality before installing.
* '''Search''': You can search for specific apps by name or category.
'''Manual Upgrade''':
In contrast to automatic updates, '''Manual Upgrade''' lets you take control over which packages or applications you want to upgrade and when.
This can be useful if you need to avoid upgrading certain apps due to compatibility or testing purposes, or if you want to perform updates at a specific time.
'''Common Actions''':
* '''Check for Updates''': The system will check for available updates for installed    apps.
* '''Select Updates''': You can select which packages to update manually.
* '''Upgrade Now''': You can start the upgrade process immediately for selected apps.
== 5.Status ==
In this module the user can view the status of the router device with respect to the network, Wan, modem etc.
It has 4 submodules.
* Interfaces
* Internet
* Modem
* Routes
[[File:IAC44A Status.png]]
=== 5.1 Interfaces ===
Each network device (interface) is associated with specific traffic statistics, uptime, and status. Active interfaces are operational, while inactive interfaces are not currently transmitting data.
[[File:IAC44A Interfaces .png]]
Looking on the network status the user can check if the cellular, wifi, ewan, vpn etc is up.
=== 5.2 Internet ===
In this submodule the user can view the status of the internet connections.
[[File:IAC44A Internet.png]]
To see the latest status of the internet connection the user needs to click on the refresh button.
=== 5.3 Modem ===
This modem status page provides comprehensive information about the cellular connection's network operator, technology, mode, and various signal quality metrics.
[[File:IAC44A Modem .png]]
=== 5.4 Routes ===
This configuration shows how the router directs traffic between different networks and interfaces, ensuring proper communication within the local network and to external networks via the default gateway.
'''ARP Table:''' Maps IP addresses to MAC addresses for devices on the network, helping in identifying which device is on which interface.
'''IPv4 Routes:''' This shows which network is directly connected on which interface.
Example: Network '''192.168.10.0/24''' is directly connected on interface '''eth0.1.'''
'''IPv6 Routes:''' Similar routes as IPv4, but this time listed under IPv6 routing rules.
Example: Local networks '''192.168.10.0/24''' and '''192.168.100.0/24''' are managed through '''eth0.1''' and '''ra0''', respectively.
''*Refer the below image*''
[[File:IAC44A Routes.png]]


= 6.Logout =
= 6.Logout =
The user should click on log out option to logged out from the router application.
The user should click on log out option to logged out from the router application.


[[File:Logout.png|frameless|620x620px]]
[[File:Logout.png]]

Latest revision as of 11:50, 24 January 2025

To log in to SILBO_IAC44-A by connecting the router to your laptop or desktop via LAN or using Wi-Fi, please follow the steps below.


Connecting via LAN:

Connect your laptop's LAN port to one of the router's LAN interfaces. Ensure that you select any LAN interface (there are 4 available) while making sure the WAN interface is not used.

                                                                                                                                     

How to connect with the SILBO_IAC44-A application

Once the LAN connection is established between the device and the laptop or the desktop

Please open the command prompt and ping to get the IP config of that device.

Type the command Ipconfig

How to connect with the SILBO RB44 application

It will provide the Ip address/url of that device through which the application can be accessed.

Log In

Open the web browser and type the IP address in the URL.

It will show the log in page of the application.

Give the valid credentials for the username and password to login to the application page.

Once the user credentials are provided it will direct to the landing page of the application.

       

The “Status” landing page shows all the detailed specification of the device like system, memory storage and connection tracking etc.

The application is divided in to 6 Modules.

  • Info
  • Settings
  • Maintenance
  • Status
  • Feature
  • Logout

1. Info

The “Info” module provides the information about the devices to the user.

It provides all the specification related to the hardware, firmware, Networks and the Connection uptimes.

It has 3 submodules.

  • Overview
  • System Log
  • Kernel Log

1.1 Overview

In overview module it displays all the specification categorically of a device like System, Memory, storage, Connection tracking, DHCP Lease.

System:

In this section it displays the hardware configured specification of the device.


The specifications details are as follows,

SN Field name Sample value Description
1 Hostname 37A26230007 This field displays the router serial number of the device
2 Model Silbo_IAC44-A_GW-EC200A This field displays the model number of the device
3 Firmware Version and IPK Version 1.17_1.15 This field displays the firmware version and IPK version
4 Kernel Version 4.14.180 This field displays the kernel version of the device
5 Local Time Wednesday, January 8, 2025 at 06:15:29 PM This field displays the local time
6 Uptime 0h 27m 58s This field displays the uptime of the device
7 Load Average 0.49 0.36 0.40 This field displays the average load

Memory:

In this section it displays the memory configured specification of the device.

The specifications details are as follows.

SN Field name Sample value Description
1 Total Available 57716 kB / 124188 kB (46%) This field displays the total availability of memory space in the device
2 Free 46424 kB / 124188 kB (37%) This field displays the Free memory space in the device
3 Cached 444 kB / 124188 kB (0%) This field displays the Cached memory space in the device
4 Buffered 11224 kB / 124188 kB (9%) This field displays the Buffered memory space in the device

Storage:

In this section it displays the status of storage as root and temporary usage specification of the device.

The specifications details are as follows.

SN Field name Sample value Description
1 Root Usage 1580 kB / 12800 kB (12%) This field displays the total root usage of the device
2 Temporary Usage 444 kB / 62092 kB (0%) This field displays the total temporary usage of the device

Network:

In this section you can monitor IPv4 WAN status.

The specifications details are as follows.

SN Field Name Sample value Description
1 Type DHCP client A DHCP client is a device or software that requests and receives configuration information from a DHCP server, such as an IP address, gateway, and DNS servers.
2 Connected 1h 49m 8s This indicates the duration for which the device has been connected to the network.
3 Address 10.62.35.111 This is the IP address assigned to the DHCP client by the DHCP server. It uniquely identifies the device on the network.
4 Gateway 10.62.35.144 The gateway (or default gateway) is the IP address of the network device that routes traffic from the local network to other networks.
5 DNS 8.8.8.8, 10.103.81.232 The first DNS server "8.8.8.8" is a public DNS server provided by Google.

The second DNS server "10.103.81.232" is a private DNS server.

Active SIM Information:

This section displays SIM details only when the SIM card is active.

Connection Tracking:

In this section it displays the status of connection tracking for the device.

The specifications details are as follows.

SN Field Value Sample Value Description
1 Active Connections 48/16384 (0%) This field displays the active connection of the device.

DHCP Leases:

In this section it displays the DHCP lease of the temporary assignment of an IP address to a device on the network.

The specifications details are below.

SN Field name Sample value Description
1 Host Name KermaniK-LT This field displays the configured Host Name/Username for that device.
2 IPv4-Address 192.168.10.147 This field displays the IP address of the device.
3 MAC-Address 34:73:5a:bb: ab:7a This field displays the MAC-Address of the device.
4 Lease time remaining 11h 53m 49s This field displays the lease time remaining for the device.

1.2 System Log

This page provides on screen System logging information. In this page the user gets to view the system logs.

1.3 Kernel Log

This page provides on screen Kernel logging information.

In this page the user gets to view the Kernel logs.

2. Setting

In this “Setting” module the user can Configure/update all the required parameters related to Network, SIM Switch, Internet, VPN, Firewall, Loopback Rule, Remote monitoring, Tunnel as per requirement.

IT consist of 8 submodules.

  • Network
  • VLAN
  • Sim Switch
  • Multi-WAN
  • VPN
  • Firewall
  • Loopback Rule
  • VRRP
  • Remote Monitoring
  • Tunnel


2.1 Network

In this section the user does all the setting related configuration with reference to network like Ethernet Setting, Cellular Setting, Band lock and Operator Lock, Wi-Fi, Guest Wi-Fi, Wireless Schedule etc.

Ethernet Setting:

Ethernet Setting:

In this page it will display all the configured port that is attached with the device.

For this device 5 ports are configured.

Ethernet mode can be configured as WAN and as LAN as well.

Ethernet WAN Connection settings can be configured as DHCP, Static and PPOE.


EDIT:

To add a new Interface, click on ‘Add’.

To edit the existing device the user needs to click on the edit option.

Once the changes are done click on the update button to save all the changes.

Click on the deleted button to delete the existing device detail.

Note: If required, add an interface in Settings-->Multi-WAN-->Failover

Specification details are given below:  Type: WAN

SN Field Name Sample Value Description
1 Physical Device Ex: eth0.5 This indicates a network interface on which our network is connected. This setting is by default (Editable).
2 Type WAN/LAN This designates whether the interface is part of the WAN or LAN.

WAN: Connects the device to the internet.

LAN: Connects the device to the internal network.

                                                                    Protocol: Static
3 Static IP Address Ex: 192.168.1.10 The manually assigned IP address for the interface.
4 Static Netmask Ex: 255.255.255.0 Subnet mask corresponding to the IP address.
5 Static Gateway Ex: 192.168.1.1 The IP address of the gateway (router) that the interface will use to send traffic outside its own subnet.
                                                                    Protocol: DHCP
6 DHCP Gateway Ex: 10.1.1.1 The IP address of the DHCP server (often the same as the router or gateway).
                                                                    Protocol: PPPoE
7 Username Any Name The username provided by your ISP for PPPoE authentication.
8 Password ***** The password provided by your ISP for PPPoE authentication.
9 Access Concentrator Typically, the name of the ISP's PPPoE server.
10 Service Name Sometimes required by ISPs, this field specifies a particular service offered by the ISP.
11 Gateway Ex: 0.0.0.0 The IP address used as the default route.
12 Override MAC Address Ex: D0:93:95:B0:CF:7A The MAC address for this interface is set to a custom value, replacing the default hardware address.
13 Enable Bridge 1.     CWAN1_0

2.     SW_LAN

3.     VPN

4.     ra0

Since this is a WAN interface, it is not typically bridged with others. Bridges are more common for LAN interfaces to combine multiple connections.
14 Create Firewall Zone Enable/Disable You can assign this interface to a particular firewall zone, which determines its access rules (e.g., WAN zone for internet traffic, LAN zone for internal traffic).
Advanced Settings: Enable/Disable
15 IPv4 Route Table Enable/Disable This field is used to specify static routes for IPv4.
16 Table No. 254: Default main routing table.

100: Custom routing table for specific purposes.

Default Table (Main Table): Usually, there is a default routing table (often Table No. 254 or 255) where all the routes are stored by default.

Custom Table: You can specify a different table number if you are managing multiple routing policies (e.g., VoIP traffic, VPN traffic).

17 Gateway Metric Ex: 1 A numeric value used to prioritize gateways when multiple are available.

Lower metrics indicate higher priority. For example, if two gateways exist, the one with the smaller metric is used.

18 Broadcast Ex: 192.168.123.34 Broadcast address for the network, typically calculated based on the IP and subnet mask.
19 Override MTU Ex: 1500 MTU size controls the maximum packet size that can be sent over the network.

Default is usually 1500 bytes.

20 Force Link Enable/Disable Forces the interface to be up even if no physical link is detected.


Type: LAN

Specification details are given below:

SN Field Name Sample Value Description
1 Physical Device Ex: eth0.1 This is the network interface identifier.
2 Type WAN/LAN This designates whether the interface is part of the WAN or LAN.

WAN: Connects the device to the internet.

LAN: Connects the device to the internal network.

3 Protocol Static This means that the IP address, netmask, and other network settings are manually configured rather than being automatically assigned by a DHCP server.
4 IP Address Ex: 192.168.10.1 This is the static IP address assigned to the interface. It acts as the gateway IP address for devices connected to this LAN.
5 Static Netmask Ex: 255.255.255.0 This is the subnet mask for the network.
7 Override MAC Address D0:93:95:B0:CF:7B This allows you to manually enter a different MAC address if needed.
8 Enable DNS Enable/Disable If this option is enabled, the interface will act as a DNS resolver for the devices on the LAN, using the specified DNS server.
9 DNS Server Address Ex: 8.8.8.8 This is the IP address of the DNS server that will be used by devices on the LAN to resolve domain names to IP addresses.

More than one DNS Address can be added.

10 Enable DHCP Server Enable/Disable If enabled, this setting allows the interface to function as a DHCP server, automatically assigning IP addresses to devices connected to the LAN.
11 DHCP Start Address 50 The DHCP server will begin assigning IP addresses starting from 192.168.10.50
12 DHCP Limit 100 This specifies the number of IP addresses the DHCP server can assign. Starting at 192.168.10.50 and with a limit of 100, the server can assign addresses up to 192.168.10.149.
13 Lease Time Duration Hours-(H)

Minutes-(M)

Seconds-(S)

Hours-(H): This indicates that the lease time for each IP address assignment is measured in hours.

Minutes-(M): This indicates that the lease time for each IP address assignment is measured in minutes.

Seconds-(S): This indicates that the lease time for each IP address assignment is measured in seconds.

14 Lease Time 12 The DHCP lease time is set to 12 hours. After this period, a device must renew its IP address lease with the DHCP server to continue using the assigned IP address.
15 Enable Bridge 1.     CWAN1_0

2.     SW_LAN

3.     VPN

4.     ra0

Since this is a WAN interface, it is not typically bridged with others. Bridges are more common for LAN interfaces to combine multiple connections.
16 Enable DHCP Relay Enter Relay Server IP Forwards DHCP requests from devices in this subnet to an external DHCP server instead of using the built-in DHCP server.
17 Create Firewall Zone Enable/Disable You can assign this interface to a particular firewall zone, which determines its access rules (e.g., WAN zone for internet traffic, LAN zone for internal traffic).
18 Internet Over SW_LAN Enable/Disable Allow all outbound traffic from the LAN to the internet.
Advanced Settings: Enable/Disable
19 IPv4 Route Table Enable/Disable This field is used to specify static routes for IPv4.
20 Table No. 254: Default main routing table.

100: Custom routing table for specific purposes.

Default Table (Main Table): Usually, there is a default routing table (often Table No. 254 or 255) where all the routes are stored by default.

Custom Table: You can specify a different table number if you are managing multiple routing policies (e.g., VoIP traffic, VPN traffic).

21 Gateway Metric Ex: 1 A numeric value used to prioritize gateways when multiple are available.

Lower metrics indicate higher priority. For example, if two gateways exist, the one with the smaller metric is used.

22 Broadcast Ex: 192.168.123.34 Broadcast address for the network, typically calculated based on the IP and subnet mask.
23 Override MTU Ex: 1500 MTU size controls the maximum packet size that can be sent over the network.

Default is usually 1500 bytes.

Save and Update once configuration changes have been made.


Relay Server:

A relay server typically functions in a network to forward requests (usually DHCP or DNS) from clients to

a designated server when the server is on a different network segment.


EDIT:

To edit the existing device the user needs to click on the edit option.

Once the changes are done click on the save button to save all the changes.

Click on the deleted button to delete the existing device detail.

Specification details are given below:

SN Field Name Sample Value Description
1 Interface 1.)   eth0.1

2.)   ra0

1) eth0.1 typically represents a VLAN where the relay will listen for client requests.

2) If your device is broadcasting a Wi-Fi network on the ra0 interface, any DHCP or DNS relay settings will apply to devices connected via this wireless interface.

2 Start IP Address Ex: 192.168.10.100 This is the beginning IP address of the range that will be leased out to clients.
3 End IP Address Ex: 192.168.10.150 An IP address that is in the same subnet as the Start IP Address and allows sufficient addresses to be leased.
4 Netmask Ex: 255.255.255.0 A valid subnet mask such as 255.255.255.0 (for a /24 network), or 255.255.0.0 (for a /16 network).
5 Lease Time For a 24-hour lease time, set this value to 86400. This is the amount of time that an IP address is assigned to a client before it needs to request a renewal from the DHCP server.

Save and update.


Cellular Setting:

In this page, the user needs to configure the various details with respect to the SIM.

Select single cellular single sim where the user must configure the APN details of the sim used for the router device. The Configurations can be done based on the SIM usage, with respect to IPV4 or IPV6.

Specification details are given below:

SN Field name Sample value Description
1 Cellular Enable Checkbox Check this box to enable cellular functionality.
2 Cellular Operation Mode 1.) Single Cellular with Dual Sim

2.) Single Cellular with Single SIM

1.) This mode allows you to use one cellular modem with two SIM cards.

2.) This mode allows you to use one cellular modem with single SIM card.

3 Cellular Modem 1 QuectelEC200A This field displays the modem name.
4 Choose SIM 1 APN Mode 1.) Auto

2.) Manual

1.) Choose Auto for regular SIM to detect APN name automatically.

2.) Choose manual to enter the APN settings manually in case of M2M SIM cards.

5 SIM 1 Access Point Name airtelgprs.com Enter the APN provided by your cellular service provider in case of M2M sim. For regular sim cards APN name will be displayed automatically.
6 SIM 1 PDP Type IPV4 Choose the PDP type, which is typically either IPv4 or IPv6 depending on the sim card.
7 SIM 1 Username Enter the username if required by the APN. Leave blank if not required.
8 SIM 1 Password Enter the password if required by the APN. Leave blank if not required.
9 SIM 1 Authentication Protocol None Choose the authentication protocol. Options typically include None, PAP, or CHAP.
10 SIM 1 MTU Ex: 1500 (a common MTU size) MTU (Maximum Transmission Unit) defines the largest size of a data packet that can be transmitted over the network.
11 Choose SIM 2 APN Mode 1.) Auto

2.) Manual

1.) Choose Auto for regular SIM to detect APN name automatically.

2.) Choose manual to enter the APN settings manually in case of M2M SIM cards.

12 SIM 2 Access Point Name airtelgprs.com Enter the APN provided by your cellular service provider in case of M2M sim. For regular sim cards APN name will be displayed automatically.
13 SIM 2 PDP Type IPV4 Choose the PDP type, which is typically either IPv4 or IPv6 depending on the sim card.
14 SIM 2 Username Enter the username if required by the APN. Leave blank if not required.
15 SIM 2 Password Enter the password if required by the APN. Leave blank if not required.
16 SIM 2 Authentication Protocol None Choose the authentication protocol. Options typically include None, PAP, or CHAP.
17 SIM 2 MTU Ex: 1500 (a common MTU size) MTU (Maximum Transmission Unit) defines the largest size of a data packet that can be transmitted over the network.
18 Primary SIM Switchback Enable Enable/Disable When enabled, the device will automatically switch back to the primary SIM (SIM 1) after switching to SIM 2, under certain conditions (e.g., SIM 1 regains network availability).
19 Primary SIM Switchback Time (In Minutes) 10 Enter the time in minutes after which the system should switch back to the primary SIM if it becomes available.

After configuring all the required information, the user should click on the save and then click on the update to update the all the required information.

Band lock and Operator Lock:

In this page, the user needs to configure the lock band and operator based on the service provider.

Bands available in the drop-down list.


2G/3G option:

2G/3G: - 3G allows additional features such as mobile internet access, video calls and mobile TV.

While the main function of 2G technology is the transmission of information through voice calls.

The user should select the band check box available for 2g/3g from the given list. Bands available for selection under LTE for the bands available in that area.


Operator Selection Mode:

The user needs to click on the check box of the “operator select enable” to select the operator.

Once the check box is clicked there will be a dropdown list of the operator modes from which the user needs to select the mode. The user needs to select the operator mode from the given dropdown list.

If the user selects the mode “Manual” or “Manual-Automatic” then one more text box will appear where the user must provide the operator code.

After configuring all the required information, the user should click on the save and then click on the update to update the all the required information.


Wi-Fi Setting:

In this, router has the general setting and change country code, channel, radio mode, radio passphrase as per the requirement after clicking on enable Radio button.

The user needs to select the respective radio mode based on its need.

It has 3 radio modes:

1.) Access Point

2.) Client only

3.) Access Point and Client

Access Point:

In Access Point mode, a configuration in which a router, allows wireless devices to connect to a wired network by creating a Wi-Fi hotspot.

Client point:

In client mode, the access point connects your wired devices to a wireless network. This mode is suitable when you have a wired device with an Ethernet port and no wireless capability, for example, a smart TV, Media Player, or Game console and you want to connect it to the internet wirelessly, select the Client Mode and give the Radio SSID & client passphrase.

Access point and client point:

Select this option for both type of connection, give both SSID and passphrase.

After configuring all the required information, the user should click on the save and then click on the update to update the all the required information.

SN Field name Sample value Description
1 Radio 0 Protocol IEEE 802.11 b/g/n This section shows the radio protocol which is by default.
2 Country Code INDIA Select the country accordingly.

(INDIA by default)

3 Channel Auto In this dropdown the user should select the proper channel to be used. (Auto by default)
4 TX Power 100 In this text box the user should specify the power.
5 Channel Width 20 MHz In this dropdown the user should select the channel width
6 Radio Mode 1.) Access point

2.) Client only

3.) Access point and client

In this drop down the user should select the mode.

(Access point by default)

7 Radio SSID AP_37A26230014 In this text box the user should specify the SSID number which usually comes with the router.
8 Radio Authentication WPA2 Personal (PSK) In this dropdown the user should select the type of authentication.

(WPA2 Personal (PSK) by default)

9 Radio Encryption AES In this dropdown the user should select the type of encryption required.

(AES by default)

10 Radio Passphrase ********* In this text box the user should specify the password. Password will be given with the router which can be changed later.
11 Radio DHCP server IP 192.168.100.1 In this text box the user should specify the IP address of DHCP server.

(192.168.100.1 will be default which can be changed accordingly)

12 Radio DHCP start address 100 In this text box the user should specify the start address of the DHCP.

(100 value is default)

13 Radio DHCP limit 50 In this text box the user should specify the limit for the DHCP.

(50 value is default)

14 WMM Enable Enable/Disable Wi-Fi Multimedia (WMM) improves performance for applications that require low latency and consistent throughput.
15 Enable DHCP Relay Enable/Disable DHCP Relay allows a device to forward DHCP requests from clients to a remote DHCP server located on a different subnet.

Click on save once changes have been made.


Guest Wifi:

This option enables a separate Wi-Fi network for guests, isolated from the main network to enhance security and privacy. Guest Wi-Fi allows visitors or temporary users to connect to your network without accessing the main LAN resources.

Wireless Schedule:

Wi-Fi can be automatically withdrawn based on the configuration done in this section.

The user can schedule the Wi-Fi’s accessibility time during a particular period.

Note: This section is turned off by default, tick the box to activate it.

After configuring all the required information, the user should click on save and then click on update to update all the required information.

The user can select more than one “day of the week” for scheduling the Wi-Fi working hours.

SMS Settings:

User needs to enable SMS option in SMS settings page.

This option is to validate the mobile numbers using which controlling commands could be sent to the router device.

1 to 5 mobile numbers can be authenticated by choosing from “Select Valid SMS user numbers” and

adding the mobile numbers below respectively.

API key is the pass key used in the commands while sending SMS.

Displayed in the below screen is the default API key which can be edited and changed as per choice.

After addition of the mobile number’s user needs to click on save button for changes to take place.

1.) Select valid user number max. 5 and add authorized phone number in the tab where you want to find the alert and click on ‘SMS Response Enable’, ‘save’ and ‘update’ button.

2.) Now send SMS commands from the configured mobile number.

3.) Once the commands are received from the user phone number the board will send acknowledgement as per the commands.

4.) After that it will send the router’s status once it has rebooted and is operational again.

Mentioned below are a few commands which can be sent from the configured mobile number to the router device. Below two commands are One for rebooting the router device and another to get the uptime.

1) {"device”: ["passkey”, “API key"],"command":"reboot","arguments":"hardware"}

2) {"device”: ["passkey ","API key"],"command”: “uptime"}

Loop back IP settings:

The loopback IP address, often referred to as “localhost.” it is used to establish network connections within the same device for testing and troubleshooting purpose.

The loopback IP address, commonly represented as 127.0.0.1, is a special address used for testing network connectivity on a local machine.

It allows a device to send network messages to itself without involving external networks, making it useful for troubleshooting and diagnostics.


However, this IP can be changed as per requirement and to do that, Navigating to Setting>>Network configuration>> Loopback IP settings can be changed/updated.

After configuring all the required information, the user should click on the save and then click on the update to update the all the required information.

2.2 VLAN

VLAN (Virtual Local Area Network) is a network within a network that segregates traffic into different logical networks on the same physical hardware. VLANs help in managing traffic more effectively and securely.

It is further divided into 2 sections,

Port-Based VLAN

Tagged Port Configuration

Port-Based VLAN:

A VLAN configuration method where network ports are assigned to specific VLANs.

EDIT:

To add a new VLAN ID, click on ‘Add Device’.

To edit the existing device the user needs to click on the edit option.

Once the changes are done click on the save button to save all the changes.

Click on the deleted button to delete the existing device detail.

Specification details are given below:

SN Field Name Sample Value Description
1 VLAN ID 1 This is a unique identifier for a VLAN within a network.
2 Port 0 Untagged When a port is set as untagged for a VLAN, it means that traffic entering or exiting this port is automatically associated with that VLAN without any VLAN tags being added to the frames.
3 Port 1 Untagged
4 Port 2 tagged When a port is set as tagged for a VLAN, it means that traffic on this port will include VLAN tags in the Ethernet frames. These tags carry the VLAN ID, allowing switches and other devices to know which VLAN the traffic belongs to.
5 Port 3 Untagged
6 Port 4 OFF When a port is marked as off for a VLAN, it means that the port is not participating in that VLAN at all. It will neither send nor receive traffic associated with that VLAN.

Save and update the page.


Tagged Port Configuration:

EDIT:

To add a new VLAN ID, click on ‘Add Device’.

To edit the existing device the user needs to click on the edit option.

Click on the deleted button to delete the existing device detail.

Specification details are given below:

SN Field Name Sample Value Description
1 Type 802.1Q IEEE 802.1Q is the standard protocol for VLAN tagging in Ethernet networks.
2 Parent Interface Port 2 It is the underlying physical interface like port 2 that carries the VLAN-tagged traffic.

Save and update the page.

2.3 SIM Switch

In this page the user needs to configure the Sim for the given device.

The user needs to select from the drop-down menu on which basis the sim needs to be switched.

Once the user selects on “signal strength” then the parameters related to signal strength will pop up and the user needs to configure the parameters based on the requirement.

Threshold RSRP:

This Needs to be set appropriately. Incorrect setting may cause unnecessary SIM switching. (In General, a BAD RSRP value range is -140 to -115 and FAIR RSRP value range is -115 to -105).

Threshold SINR:

This Needs to be set appropriately. Incorrect setting may cause unnecessary SIM switching. (In General, a BAD SNR value range is -20 to 0 and FAIR SNR value range is 0 to 13)

Once the user selects on “Data Limit” then the parameters related to Data Limit will pop up and the user needs to configure the parameters based on the requirement.

Specification details are given below:

SN Field name Sample value Description
1 SIM Switch Based on Data Limit The user needs to select from the drop-down menu on what basis the sim needs to be switched.
2 SIM 1 Data Usage Limit (In MB) 1000 The user needs to set the limit for the data usage for SIM 1.
3 SIM 2 Data Usage Limit (In MB) 1000 The user needs to set the limit for the data usage for SIM 2.
4 Periodicity Daily The user needs to set the pattern/frequency to switch the sims.

After configuring all the required information, the user should click on the save.

2.4 Multi-WAN

As shown below, this section has 4 categories,

Status

General settings

Failover

Load Balancing

In ‘Status’ tab user can see the active network connections on the device as shown above.

General Settings:

In general settings, select any one option from the drop-down menu which you wish to imply and click on save and update.

Click on save and update.

Failover:

NOTE: Please verify that the name to be added is in the interface section of the status tab.

EDIT:

The specifications details are below.

SN Field name Sample value Description
1 Priority Ex: 5 Setting a priority of 1 means this connection has the highest priority and will be used before any others with a higher priority number.
2 Select Track IP Numbers 2 In this dropdown the user needs to select the track number for the Ips. This specifies the number of IP addresses that will be used for tracking the status of the connection.
3 TrackIP1 8.8.8.8 The system will ping this IPV4 IP address to check if the connection is up and working. You can even add any whitelisted IP.
4 TrackIP2 8.8.4.4 The system will ping this IPV4 IP address to check if the connection is up and working. You can even add any whitelisted IP.
5 Reliability 1 If reliability is set to 1, it might mean the connection is considered reliable if it successfully pings at least one of the tracked IP addresses.
6 Count 1 Setting Count to 1 means the device will send one ping to each IP address to check for connectivity.
7 Up 3 If set to 3, the connection will be considered "up" only if all three pings are successful.
8 Down 3 If set to 3, the connection will be considered "down" if all three pings fail.

Click on save and update tab.


Load Balancing:

Load balancing is a network management technique used to distribute traffic across multiple network connections or servers to optimize resource use, maximize throughput, minimize response time, and ensure reliability.

Task: Distributes network traffic evenly across multiple connections (e.g., multiple WAN links) or servers.

Purpose: This ensures that no single connection or server is overwhelmed with too much traffic, which could lead to congestion and slower performance.

EDIT:

Specification details are given below:

SN Field Name Sample Value Description
1 Traffic Distribution Ratio Ex: 60% If you have two connections and set one to 60% and the other to 40%, traffic will be distributed accordingly.

The ratio must be the same for CWAN1_0 and CWAN1_1.

2 Select Track IP Numbers 2 The system will track two IP addresses to determine if the network connection is active and reliable.
3 TrackIP1 8.8.8.8 The system will ping this IPV4 IP address to check if the connection is up and working. You can even add any whitelisted IP.
4 TrackIP2 8.8.4.4 The system will ping this IPV4 IP address to check if the connection is up and working. You can even add any whitelisted IP.
5 Reliability 1 With a reliability setting of 1, the connection might be considered reliable if at least one ping is successful.
6 Count 1 The system will send one ping to each tracked IP to check the connection's status.
7 Up 3 The system requires 3 successful pings for the connection to be marked as "up."
8 Down 3 If 3 pings fail, the system will mark the connection as "down," and it may switch to an alternate connection if available.

Click on save and update tab.


2.5 VPN

VPN stands for Virtual Private Network, it establishes a connection between the system and a remote server, which is owned by a VPN provider.

Creating a point-to-point tunnel that encrypts the personal data, masks the IP address, and allows to block the required website to blocks via firewalls on the internet.

Navigate to settings >= VPN, general settings and you will see all VPN options you wish to use.

There are 7 types of setting available under VPN configuration.

  • General Settings
  • IPSEC
  • Open VPN
  • Wireguard
  • Zerotier
  • PPTP
  • L2TP

General Settings:

In this page the user must choose which type of VPN connection is required for the device. The user must select from the above VPN based on its requirement. If required, the user can select all the options. The user needs to click on the save after selecting the option based on its use.

IPSEC:

IPSEC VPN is used to create a VPN connection between local and remote networks.

To use IPSEC VPN, the user should check that both local and remote routers support IPSEC VPN feature.

In this page the user can add/edit/delete the IPSEC VPN connection for the device.*Refer the image below*

The user needs to click on the update button once the required configuration is completed.

In IPSEC the user needs to click on edit button to edit the configuration of an existing VPN connection.

Click on update once done with configurations.

The tunnel will show established, showing the connection has been made.

Detailed specifications are below:

SN Field name Sample value Description
1 IPSEC Site to Site VPN In this dropdown the user should select the IPSEC connection type.
2 IPSEC Role Client/Server In this dropdown box the user needs to select the IPSEC role. The device is acting as a client in the VPN setup (in this example).
3 Connection Type Tunnel In this dropdown the user needs to select the connection type. The user should select on the connection enable check box.
4 Connection mode Route/add/start/trap In this drop down list the user should select the mode for the connection. In this example start is selected which means the VPN connection is initiated automatically.
5 Remote Server IP ******** The IP address of the remote VPN server.
6 Local ID 3.3.3.3 The user needs to set the local id. It is the identification for the local VPN client.
7 No. of local subnets 1 In this dropdown the user needs to select how many subnets will be connected.
8 Local Subnet 1 172.16.31.25/32 In this text box the user needs to put the specific local subnet included in the VPN.
9 Remote id 1.1.1.1 In this text box the user needs to put the id of the remote connection. It is the identification for the remote VPN server.
10 No of remote subnet 1 In this dropdown the user needs to select how many subnets it will be connected remotely.
11 Remote subnet 10.1.1.0/24 In this text box the user needs to put the address of the remote subnet. The specific remote subnet included in the VPN.
12 Key exchange Ikev1 In this dropdown the user should select the which key exchange version to be selected.
13 Aggressive Yes/No In this dropdown the user should select either yes or no.
14 IKE Lifetime (In Seconds) 86400 The lifetime of the IKE phase in seconds (1 day).
15 Lifetime (in seconds) 28800 The lifetime of the IPsec SA (Security Association) in seconds (8 hours).
16 Enable DPD Detection 1

0

Indicates whether Dead Peer Detection is enabled to detect a lost connection. Enable this option as per server-side settings.
17 Time Interval (In Seconds) 60 This option is available only if DPD Detection is enabled. The time interval is the interval for DPD checks.
18 Action Restart/clear/hold/

trap/start

Restart: Action to take when DPD detects a lost connection (restart the connection). Select as per server-side setting.
19 Authentication Method PSK PSK: Pre-shared key is used for authentication. Select this option for authentication as per sever side setting.
20 Multiple Secrets 1/0 Indicates whether multiple PSK secrets are used. Enable only if required.
21 PSK Value ****** Pre-shared key value (masked for security).
Proposal settings Phase I
22 Encryption Algorithm AES 128

AES 192

AES 256

3DES

AES 256: Encryption algorithm for Phase I. Select as per server-side configuration. Both server and client should have same configuration.
23 Authentication Phase I SHA1

MD5

SHA 256

SHA 384

SHA 512

SHA 512: Authentication algorithm for Phase I.

Select as per server-side configuration. Both server and client should have same configuration.

24 DH Group MODP768(group1)

MODP1024(group2)

MODP1536(group5)

MODP2048(group14)

MODP3072(group15)

MODP4096(group16)

MODP2048 (group14): Diffie-Hellman group for key exchange.

Select as per server-side configuration. Both server and client should have same configuration.

Proposal settings Phase II
25 Hash Algorithm AES 128

AES 192

AES 256

3DES

AES 256: Encryption algorithm for Phase II. Select as per server-side configuration. Both server and client should have same configuration.
26 Authentication Phase II SHA1

MD5

SHA 256

SHA 384

SHA 512

SHA 512: Authentication algorithm for Phase II.

Select as per server-side configuration. Both server and client should have same configuration.

27 PFS Group MODP768(group1)

MODP1024(group2)

MODP1536(group5)

MODP2048(group14)

MODP3072(group15)

MODP4096(group16)

MODP2048 (group14): Perfect Forward Secrecy group.

Select as per server-side configuration. Both server and client should have same configuration.

Click on save and then update the page for changes to reflect.


Open VPN:

To use the VPN feature, the user should enable OpenVPN Server on the router and install and run VPN client software on the remote device.


The user needs to “upload” the respective certificate from a valid path and then click on the “Update.”

Only the TAP connection needs a bridge. The tun connection does not require a bridge. Here we have established a TUN connection.

By clicking on the enable/disable button, the user can start/stop the VPN connection.

VPN TUN has been established.

Same way VPN TAP can also be established with the help of bridging.


WireGuard:

WireGuard is simple, fast, lean, and modern VPN that utilizes secure and trusted cryptography.

Click on “Edit” to start configurations as needed.

EDIT:

Click on the save button after the required configuration.

Specifications details are given below:

SN Field name Sample value Description
1 Wireguard Role Client/Server In this dropdown box the user needs to select the wireguard role.
2 WireGuard Tunnel Over IPV4/IPV6 IPV4: Use this if your network and endpoint (WireGuard server) support only IPv4.

IPV6: Use this if your network and endpoint support IPv6.

3 Enable Failover Enable/Disable This option allows the VPN connection to automatically switch to a backup connection if the primary connection fails.
4 Enable IPV4 Enable/Disable This enables IPv4 traffic to be routed through the WireGuard tunnel.
5 Enable IPV6 Enable/Disable Enable this if your network and the destination support IPv6.
6 Listen Port 51820 This is the default port that WireGuard uses to listen for incoming connections.
7 Endpoint Host port 51820 This is the port on the WireGuard server that the client will connect to.
8 Peer Public key ***** This is the public key of the WireGuard server that the client uses to establish a secure connection.
9 Enable Default Route Enable/Disable Enable this if you want all network traffic (not just specific routes) to be routed through the WireGuard VPN.

Save and update the page after configuration has been done.

Zerotier:

ZeroTier is a tool that lets you create your own private network over the internet.

Go to ZeroTier Central and sign up for a free account.

In ZeroTier Central, click on "Create a Network". This will generate a unique 16-digit network ID for your new network.

Go to settings => VPN, in general settings, enable ZeroTier and save.

Copy and paste the unique 16-digit network ID in the edit section.


Click on the save button after the required configuration.

SN Field name Sample value Description
1 NetworkID Ad2769hfkw2345f4 In this dropdown box the user needs to paste the unique 16-digit network id.
2 Listen Port 9993 Default


PPTP:

This configuration is for setting up a PPTP (Point-to-Point Tunnelling Protocol) VPN connection.

PPTP is a protocol that enables secure data transmission across public networks like the internet, often used to connect to remote networks or access resources securely.

EDIT:

Specification details are given below:

SN Field Name Sample Value Description
1 PPTP Role Client/Server Client: meaning it will initiate the connection to the remote PPTP server.

Server: means this device will accept incoming PPTP connections from clients, which can be users or devices that need remote access to the local network or internet via this server.

PPTP Role: CLIENT
2 Default Route Enable/Disable Enabling the default route means that all network traffic will be routed through the VPN tunnel once the connection is established.
3 Metric Ex: 0 The metric is a value that defines the priority of this route among other available routes. Lower metrics indicate higher priority.
4 Server IP Ex: 192.168.10.1 This is the IP address of the PPTP server the client will connect to.
5 Interface Any

EWAN5

Selecting the correct interface is essential because it tells the system which network adapter should be used to establish the VPN connection.
6 Username ****** This field is the login username for the PPTP server.
7 Password **** This is the password associated with the username.
PPTP Role: SERVER
8 Local IP Ex: 192.168.0.1 This IP address (192.168.0.1) is the local IP of the PPTP server on its network. Clients connecting to the VPN will see this address as their gateway or endpoint within the VPN.
9 Remote IP Range Ex: 192.168.0.20-30 This range defines the pool of IP addresses that the server will assign to connected VPN clients. Here, any client connecting to the server will receive an IP address between 192.168.0.20 and 192.168.0.30, which provides up to 11 possible addresses for simultaneous connections.
10 Username Ex: User1 This is a username that the client will use to authenticate with the PPTP server. In this case, User1 is designated as an authorized user.
11 Password ***** The password associated with User1 is required to complete the authentication.

Once Configured, click on save and update.


L2TP:

L2TP (Layer 2 Tunneling Protocol) is a network protocol used to establish secure tunnels for transferring data between remote devices or networks, often in VPNs, by encapsulating data for encryption and routing.

EDIT:

Specification details are given below:


SN Field Name Sample Value Description
1 L2TP Role Client/Server Client: connecting to an L2TP server to establish a secure tunnel for communication.

Server: the server listens for incoming client connections.

L2TP Role: CLIENT
2 Default Route Enable/Disable If enabled, all outbound traffic will be routed through the L2TP connection.

If disabled, only specific traffic destined for the L2TP network will use the tunnel.

3 Metric Ex: 1 The system uses this metric to decide which route to prioritize if multiple routes exist.

L2TP connection with Metric 1 will take precedence over a LAN or WAN route with Metric 10.

4 Server IP Ex: 192.168.10.1 This is the IP address of the L2TP server to which the client will connect.

Local Networks: If connecting within a LAN, the server might have an IP like 192.168.x.x.

Remote Connections: The server IP might be a public address like 203.0.113. x.

5 Checkup Interval Time (in sec) Ex: 30/60 secs Setting 30 seconds ensures the client checks the connection every half-minute. If the tunnel drops, the client can quickly reconnect.
6 Interface Any Example interfaces might include eth0, usb0, or ra0.
7 Username Ex: User The server verifies the username to grant or deny access.

Must match credentials configured on the L2TP server.

8 Password ****** Should be kept secure and match the configuration on the server.

Masked for privacy during configuration.

9 MPPE Encryption Enable/Disable Enabled: Encrypts traffic using MPPE, enhancing security (recommended).

Disabled: Transmits data unencrypted, reducing overhead but exposing traffic to potential risks.

L2TP Role: SERVER
10 Local IP Ex: 192.168.0.1 This is the local IP address of the L2TP server. It serves as the gateway for clients connected via the L2TP tunnel.
11 Start Ex: 192.168.0.20 Specifies the first IP address that can be assigned to connected clients.
12 Limit Ex: 192.168.0.30 Creates an IP pool for clients (from 192.168.0.20 to 192.168.0.30 in this case).
13 Username Ex: User1 Ensures that only authorized users can connect.

The server verifies this username against its authentication database.

14 Password ****** The server verifies the password along with the username.

The password must match the one configured on the server for successful authentication.

2.6 Firewall

A firewall is a layer of security between the network and the Internet. Since a router is the main connection from a network to the Internet, the firewall function is merged into this device. Every network should have a firewall to protect its privacy.

There are 6 types of setting available under firewall.

  • General Settings
  • Port forwards
  • Traffic Rules
  • SNAT traffic Rules
  • Parental Control
  • Zone Forwarding

General Settings:

General settings are subdivided into 2 parts,

1.) General settings

In general settings, the settings that are made are default settings and can be changed according to user’s preference.

SN Field Name Sample Value Description
1 Enable SYN-flood protection Enabled This is enabled by default; setting can be changed if required.
2 Disable IPV6 Disabled This is enabled by default; setting can be changed if required.
3 Drop invalid packets Disabled This is enabled by default; setting can be changed if required.
4 TCP SYN Cookies Disabled This is enabled by default; setting can be changed if required.
5 Input Reject/Accept By default, the setting is ‘Reject’ but this needs to be changed to ‘Accept’ compulsory.
6 Output Reject/Accept By default, the setting is ‘Reject’ but this needs to be changed to ‘Accept’ compulsory.
7 Forward Reject/Accept By default, the setting is ‘Reject’ but this needs to be changed to ‘Accept’ compulsory.


2.) Zone settings

In zone settings, there’s an option to add “New Zone”, according to user’s requirement.


Port Forwards:

Port forwarding is a feature in a router or gateway that allows external devices to access services on a private network.

It maps an external port on the router to an internal IP address and port on the local network, enabling applications such as gaming servers, web servers, or remote desktop connections to be accessed from outside the network.

This helps in directing incoming traffic to the correct device within a local network based on the port number, enhancing connectivity and accessibility.


EDIT:

Click on the save button after the required configuration.

SN Field name Sample value Description
1 Name Example: Web_Server_Forward Field must not be empty. Provide a name for the rule to easily identify it.
2 Protocol Example: TCP+UDP Select the protocol for the rule.

Options typically include TCP+UDP, TCP, UDP, ICMP, Custom.

3 Source zone Example: SW_LAN Select the source zone where the traffic is originating from. Options typically include EWAN2,SW_LAN,CWAN1,CWAN1_0,CWAN1_1,VPN
4 Source MAC address [optional] Example: any any: Leave as any if you don't want to specify a MAC address.
5 Source IP address[optional] Example: Leave blank if not needed. Optionally specify an IP address or range.
6 Source port Example: 80, 443 (if matching traffic for web server ports) Specify the source port or port range.
7 Destination zone Example: SW_LAN Select the destination zone where the traffic is heading to.
8 Destination IP address Leave blank if not needed. Optionally specify the destination IP address or range.
9 Destination port Example: 80 (if redirecting to a web server port) Specify the destination port or port range.

Traffic Rule:

"Traffic rules" refer to the policies and regulations that govern the flow of data packets within a network.

To allow new traffic,

click on “Add and Edit” in “New Traffic Rule”.

*Refer the image below*

EDIT:

SN Field name Sample value Description
1 Name Example: Allow_HTTP_and_HTTPS Field must not be empty: Provide a descriptive name for the traffic rule.
2 Restrict to Address Family 1.Options: IPv4, IPv6

Example: IPv4 if dealing with typical internet traffic.

Select the address family to generate iptables rules for.
3 Protocol Example: TCP+UDP TCP+UDP: Match incoming traffic using the given protocol.
4 Match ICMP Type Example: any Match all ICMP types if set to any. Specific types can be chosen if needed.
5 Source Zone Example: LAN Specifies the traffic source zone.
6 Enable DDoS Prevention Example: ‘Checked’ if you want to enable DDoS prevention measures Enable or disable Distributed Denial of Service (DDoS) prevention.
7 Source MAC Address Example: any any: Match traffic from any MAC address or specify a particular MAC address.
8 Source Address Example: 192.168.1.0/24 Match incoming traffic from the specified source IP address or range.
9 Source Port Example: any if all source ports should be matched any: Match incoming traffic from the specified source port or port range.
10 Destination Zone Example: WAN Specifies the traffic destination zone.
11 Action Example: ACCEPT Options: ACCEPT, DROP, REJECT. Specify the action to take for matched traffic.
12 Limit Example: 10/minute to limit matches to 10 times per minute. Maximum average matching rate; specified as a number, with an optional /second, /minute, /hour, or /day suffix.
13 Extra arguments Example: --log-prefix "Blocked: " to add a log prefix to log messages for this rule. Passes additional arguments to iptables. Use with care as it can significantly alter rule behaviour.

Click on save once configured.

SNAT Traffic Rule:

For configuring SNAT (Source Network Address Translation) traffic rules, you can control how outbound traffic from your local network is translated to a different IP address as it exits the network.

To add new source NAT,

Click on “ADD” in “New Source NAT:”


*Refer the figure below*

EDIT:

Specification details are below:

SN Field name Sample value Description
1 Name Example: SNAT_WAN_to_LAN Field must not be empty: Provide a unique and descriptive name for the SNAT rule.
2 Protocol Example: TCP+UDP TCP+UDP: Select the protocols that the SNAT rule will apply to.
3 Source Zone Example: wan wan: Specifies the source zone from which the traffic originates.
4 Source IP Address Example: any or a specific range like 192.168.1.0/24 -- please choose --: Specify the source IP address or range. Leave empty if the rule applies to any source IP.
5 Source Port Example: any any: Specify the source port or port range from which the traffic originates.
6 Destination Zone Example: lan lan: Specifies the destination zone to which the traffic is directed.
7 Destination IP Address Example: any or a specific IP like 192.168.1.100 -- please choose --: Specify the destination IP address or range. Leave empty if the rule applies to any destination IP.
8 Destination port Example: any any: Specify the destination port or port range to which the traffic is directed.
9 SNAT IP Address Example: 203.0.113.5 (an external IP address) -- please choose --: Specify the IP address to which the source IP should be translated.
10 SNAT Port Example: Leave empty if not needed, or specify a port like ‘12345’ Optionally, rewrite matched traffic to a specific source port. Leave empty to only rewrite the IP address.
11 Extra Arguments Example: --log-prefix "SNAT_traffic: " (to add a log prefix to log messages for this rule) Pass additional arguments to iptables. Use with care as it can significantly alter rule behaviour.

Click on save once configured.

Parental Control:

For configuring parental control rules, you want to set restrictions based on time, source, and

destination zones, as well as specific devices.

To add parental control in firewall,

Click on “Add and Edit” in “New parental control:” field.

EDIT:

Specification details are given below:

SN Field Name Sample Value Description
1 Name Example: Parental_Control_Sunday Field must not be empty: Provide a unique and descriptive name for the parental control rule.
2 Proto all all: This specifies that the rule will apply to all protocols.
3 Source Zone Example: lan Field must not be empty: Please look at Firewall->Zone Settings to find zone names.
4 Destination Zone Example: wan Field must not be empty: Please look at Firewall->Zone Settings to find zone names.
5 Source MAC Address Example: 00:1A:2B:3C:4D:5E Field: Enter the MAC address of the device you want to apply the parental control rule to. This is useful for restricting specific devices.
6 Target Example: Reject Accept: This specifies the action to take. For parental controls, you might want to use ‘Reject’ or ‘Drop’ to block traffic.
7 Weekdays Example: Sunday Sunday: Specify the days of the week when the rule should be active.
8 Month Days Example: All All: Specify the days of the month when the rule should be active.
9 Start Time (hh:mm:ss) Example: 18:00:00 (6:00 PM) Field must not be empty: Specify the start time when the rule should begin to apply.
10 Stop Time (hh:mm:ss) Example: 22:00:00 (10:00 PM) Field must not be empty: Specify the stop time when the rule should end.

Click on save once configured.

Zone Forwarding:

Zone forwarding in network configuration allows traffic to be directed from one zone to another.

To ADD new zone,

Click on “Add” in “New Zone Forward:” field.

EDIT:

Specification details are below:

SN Field Name Sample Value Description
1 Source Zone Example options: lan, wan, etc. --please choose--: Select the source zone from which the traffic originates.
2 Destination Zone Example options: lan, wan, etc. --please choose--: Select the destination zone to which the traffic is directed.

Click on save once configured.


2.7 Loopback Rule

In this page the user can configure the port where he wants to forward the traffic to. Here the user can add/edit/delete different ports as per the requirement.

The user should click on ‘add’ and then ‘edit’ to do the required changes in the port and enter the valid information in each section to configure the port for forwarding.


EDIT:

Specification details are given below:

SN Field Name Sample Value Description
1 Name Example: loopback Provide a descriptive name for the rule.
2 Protocol Example: TCP+UDP TCP+UDP: Select the protocols that the rule will apply to.
3 Source IP Address [Optional] Example: any or a specific IP range like 192.168.1.0/24 Optionally specify the source IP address or range. Leave empty if the rule should apply to any source IP.
4 Source Port [Optional] Example: any any: Specify the source port or port range from which the traffic originates. any allows traffic from all ports.
5 Loopback IP Address Example: 1.1.1.1 Specify the loopback IP address.
6 Port Example: 81 any: Specify the destination port or port range to which the traffic is directed. any allows traffic to all ports.
7 Action Example: DNAT This specifies the action to take either DNAT or SNAT.
8 Internal IP Address Example: 2.2.2.2 Field must not be empty: Specify the internal IP address to which the traffic should be redirected.
9 Internal Port Example: 81 Redirect matched incoming traffic to the given port on the internal host.

Once the user is done with the required configurations, user should click save button and then click on the update to save the changes.

2.8 VRRP

VRRP (Virtual Router Redundancy Protocol) is used to ensure high availability for IP routing by allowing multiple routers to work together to present the illusion of a single virtual router to the hosts on a network.

In General Settings, click on ‘Enable VRRP’ and save.

In VRRP section,

Give a name and ‘Add’ device.

Click on ‘Edit’ to make changes.

Click on ‘Delete’ if particular instance not required.

EDIT:

Specification details are given below:

SN Field Name Sample Value Description
1 Role 1.      Master

2.      Backup

Choose Master for the primary router that should handle the traffic under normal circumstances.

Choose Backup for a secondary router that will take over if the master fails.

2 Virtual ID Ex: 0 The value can range from 0 to 255.

Ensure all routers in the same VRRP group share the same Virtual ID.

3 Priority Ex: 100 For the Master role, use the highest priority, typically above 100.

For the Backup role, set a lower priority number, usually below the master's priority.

4 Interface SW_LAN This is the network interface on which VRRP operates.
5 Source IP Ex: 192.168.10.1 This is the IP address used as the source in VRRP advertisements.
6 Peer IP Ex: 192.168.10.10 This is the IP address of the other VRRP peer (usually the backup router). It helps the routers identify each other.
7 Virtual IP Address 192.168.10.100/24 The virtual IP should be an unused address within the subnet, such as 192.168.10.100/24, ensuring it's consistent across all VRRP routers.
8 Enable Authentication Enable/Disable Enable this if you want to secure your VRRP communications.
9 Password ********* It ensures that only routers with the correct password can join the VRRP group.

Save and update once changes have been made.

2.9 Remote Monitoring

In this page the user can select which equipment needs to be monitored remotely.

Once the user selects the type of RMS click on save.

NMS:

In this page the user should type the server IP or domain name in the URL then click on save.

Click on upload and start (Once key is uploaded and this option is clicked, NMS automatically starts, and this router device gets registered with the NMS server provided).

TR_069:

To enable the TR_069 the user needs to click on the enable check box.


Once the user clicks on the check box of enable it will display all the required filed to configured.

Specification details are given below:

SN Field Name Sample Value Description
1 Serving Interval 300 A value of 300 seconds means the device will check in with the ACS (auto-configuration servers) every 5 minutes.
2 Interface This can be something like eth0 or wan. This specifies the network interface used for TR-069 communication.
3 Username Example: User The username used to authenticate with the ACS.
4 Password •••• The password used to authenticate with the ACS.
5 URL http://example.com The URL of the ACS. This is where the CPE (customer-premises equipment) will send its requests and where it will receive configurations and updates from.

The user should fill all the required fields and click on the save button.

2.10 Tunnel

Tunnels are a method of transporting data across a network using protocols which are not supported by that network.

It is further categorised into 3 sections,

1.) General Settings

2.) GRE Tunnel

3.) IPIP Tunnel

General Settings:

In this page the user needs to select under which type of tunnel it needs to send the data.

Once the user selects the type of tunnel then click on the save button.


GRE Tunnel:

A GRE (Generic Routing Encapsulation) tunnel configuration involves setting up a virtual point-to-point connection between two endpoints over an IP network.

Here the user can add/edit/delete the details of the tunnel.

Once the required update is done then click on update to save the changes.

EDIT:

Specification details are given below:

SN Field Name Sample Value Description
1 Tunnel name Example: GRETunnel GRETunnel: The name of the GRE tunnel.
2 Local external IP Example: 10.1.1.66 The IP address of the local endpoint that will initiate the GRE tunnel.
3 Remote external IP Example: 10.1.1.40 The IP address of the remote endpoint that will terminate the GRE tunnel.
4 Peer tunnel IP Example: 10.1.1.4 The IP address of the peer's tunnel interface.
5 Local tunnel IP Example: 10.1.1.6 The IP address of the local tunnel interface.
6 Local tunnel net mask Example: 255.255.255.0 The subnet mask of the local tunnel interface.
7 Remote IP Example: 192.168.10.0/24 The remote network that is reachable through the GRE tunnel.
8 Enable Tunnel Link Check to enable Enable or disable the GRE tunnel link.
9 Interface type Example: EWAN2 EWAN2: The type of network interface used for the GRE tunnel.
10 MTU Example: 1476 1476: Maximum Transmission Unit size for the GRE tunnel.
11 TTL Example: 64 64: Time To Live value for the packets within the GRE tunnel.
12 Tunnel key Example: 12345678 12345678: A unique key used to identify the GRE tunnel.
13 Enable keep alive Check to enable Enable or disable the keep-alive feature to monitor the tunnel's status.
14 Keep alive interval Example: 10 10: Interval in seconds for the keep-alive packets.

Once the required update is done then click on update to save the changes.

IPIP Tunnel:

An IPIP (IP-in-IP) tunnel is a simple tunnelling protocol used to encapsulate IP packets within IP packets. This is like GRE but without additional features such as keying and type fields.

Here the user can add/edit/delete the details of the tunnel.

EDIT:

Once the required update is done then click on update to save the changes.


Specification details are given below:

SN Field Name Sample Value Description
1 Tunnel name Example: IPIPTunnel IPIPTunnel: The name of the IPIP tunnel.
2 Local external IP Example: 10.1.1.66 The IP address of the local endpoint that will initiate the IPIP tunnel.
3 Remote external IP Example: 10.1.1.40 The IP address of the remote endpoint that will terminate the IPIP tunnel.
4 Peer tunnel IP Example: 10.1.1.4 The IP address of the peer's tunnel interface.
5 Local tunnel IP Example: 10.1.1.6 The IP address of the local tunnel interface.
6 Local tunnel net mask Example: 255.255.255.0 The subnet mask of the local tunnel interface.
7 Remote IP Example: 192.168.10.0/24 The remote network that is reachable through the IPIP tunnel.
8 Enable Tunnel Link Check to enable Enable or disable the IPIP tunnel link.
9 Interface type Example: EWAN2 EWAN2: The type of network interface used for the IPIP tunnel.
10 MTU Example: 1476 1476: Maximum Transmission Unit size for the IPIP tunnel.
11 TTL Example: 64 64: Time To Live value for the packets within the IPIP tunnel.
12 Tunnel key Example: 12345678 Although typically not used in IPIP, this field might be included for compatibility with certain configurations.
13 Enable keep alive Check to enable Enable or disable the keep-alive feature to monitor the tunnel's status.
14 Keep alive interval Example: 10 10: Interval in seconds for the keep-alive packets.

3.Maintenance

In this module the user can configure/upgrade/modify the settings related to system, password,

firmware and monitoring.

It includes 6 submodules.

  • General
  • Password
  • Reboot
  • Import and Export config
  • Firmware upgrade
  • Monitor Application

3.1 General

Here you can configure the basic aspects of router like its hostname or the timezone.

It is further sub-divided into,

1.) General Settings

2.) Logging

3.) Language and Style

General Settings:

EDIT:

SN Field Name Sample Value Description
1 Local Time 2024/07/30 13:25:47 The current local date and time set on the device.
2 Timezone Asia/Kolkata The timezone setting of the device, which determines the local time.

Once the user configures the required details then click on the save button to save all the details.

Logging:

Here the user can configure the basic aspects of your device related to system.

The system log configuration provided specifies how the device handles and stores log information, including buffer size, external log server details, and log verbosity levels.

EDIT:

SN Field Name Sample Value Description
1 System log buffer size Example: 32 kiB The size of the memory buffer allocated (0-32) for storing system logs before they are either written to a file or sent to an external server.
2 External system log server Example: 0.0.0.0 The IP address of an external server where logs can be sent.
3 External system log server port Example: 514 The port used to send logs to the external log server. Port 514 is the default port for syslog.
4 Log output level Example: Debug Sets the detail level of the system logs.
5 Cron Log level Example: Debug The detail level of the logs for cron jobs.

Once the user configures the required details then click on the save button to save all the details.


Language and Style:

Here the user can configure the basic aspects of your device related to language.

Once the user configures the required details then click on the save button to save all the details.

3.2 Password

In this module the user can set the password for the admin credentials.

Note: Password must contain at least one uppercase letter, one digit, one special character, and be at least 8 characters long.

3.3 Reboot

In this module the user can reboot the device remotely.

First option is to directly reboot the device without enabling the maintenance reboot tab.

Click on “Reboot Now” at the bottom of the screen to start the reboot process.

To start maintenance reboot process first the user needs to fill all the required fields.

Specification details are given below:

SN Field Name Sample Value Description
1 Enable Maintenance Reboot Enable/Disable Indicates whether the maintenance reboot feature is enabled or not.
2 Type Maintenance Reboot Specifies the type of reboot being scheduled.
3 Reboot Type Hardware Hardware: A hardware reboot involves restarting the entire device as if it were powered off and on again.
4 Minutes Example: 59 The minute at which the reboot should occur (0-59).
5 Hours Example: 22 (10 PM) The hour at which the reboot should occur (0-23, in 24-hour format).
6 Day Of Month Example: All Specifies which days of the month the reboot should occur (1-31). "All" means it will occur every day.
7 Month Example: All Specifies which months the reboot should occur (1-12). "All" means it will occur every month.
8 Day Of Week Example: All Specifies which days of the week the reboot should occur (0-6, where 0 is Sunday). "All" means it will occur every day of the week.


Once the user fills all the required given parameters click on the save.

3.4 Import and Export

In this section, User can Import & Export Configuration files of the Device.

Click “Export Config” to export device configuration & settings to a text file,

Click “Import Config” to import device configuration & settings from a previously exported text file.

The user needs to select on the “choose file”, upload the required file and click on apply.

3.5 Firmware Upgrade

The user can upgrade with the latest software for the existing firmware.

Click on the flash image and chose the path where the sys-upgrade file is kept and then click on flash image, it will upgrade to the latest software once the reboot is done.

This option will completely reset the device to default settings.

Click on the Retain Config and flash and chose the path where the sys-upgrade file is kept and then click on Retain Config and flash, it will upgrade to the latest software once the reboot is done.

This refers to updating the firmware (flashing) of a device while preserving the current configuration settings.


Click on the Factory Reset for the complete retest of the device.

3.6 Monitor Application

In this section, the monitor application is divided into major 2 configurations which is further sub-divided into 4 editable options,

1.) Modem Monitor Application Configuration:

2.) Router Monitor Application Configuration:

Modem Monitor Application Configuration:

Specification details are given below:

SN Field Name Sample Value Description
1 Enable Ping Check Application Enable/Disable Turns on the functionality to perform ping checks on specified IP addresses.
2 Time Interval for Check (In minutes) Example: 10 minutes Frequency at which the ping checks are performed.
3 Select No of IP addresses to ping Example: 1 Number of IP addresses that will be pinged.
4 IP Address 1 Example: 8.8.8.8 The IP address to ping.
5 No. of Retries Example: 5 Number of times to retry pinging an IP address if the initial ping fails.
6 Failure Criteria in (%) Example: 80% (If 4 out of 5 pings fail, it’s considered a failure) Percentage of failed pings required to consider the ping check a failure.
7 Action On Failure Example: Restart Modem Action to be taken if the ping check fails according to the criteria.
8 Enable Second Level Action Enable/Disable Option to enable a secondary action if the primary action fails multiple times.
9 Second Level Action Threshold Example: 2 Number of failures required to trigger the secondary action.
10 Second Level Action Example: Restart Board (Reboots the entire hardware board) The action to be taken if the second level action threshold is met.

Save the details once made necessary changes.

Router Monitor Application Configuration:

Specification details are given below:

SN Field Name Sample Value Description
1 Enable Ping Check Application Enable/Disable Activates the ping check functionality to monitor router performance.
2 Time Interval for Check (In minutes) Example: 10 minutes How frequently the ping checks are performed.
3 Select No of IP Addresses to Ping Example: 1 (Please select the appropriate number based on your requirements) Choose the number of IP addresses to ping. This typically involves selecting from a list or entering multiple addresses.
4 No. of Retries Example: 3 Number of retries if a ping fails.
5 Failure Criteria in (%) Example: 80% (If 80% of the pings fail, it’s deemed a failure) Percentage of failed pings required to consider the ping check as failed.
6 Action On Failure Example: Restart IPsec The action taken if the ping check fails according to the criteria.
7 Enable Second Level Action Enable/Disable Option to enable an additional action if the primary action fails.
8 Second Level Action Threshold Example: Specify the number of failures, such as 2 Number of times the primary action must fail before the secondary action is triggered.
9 Second Level Action Example: Restart Board The action to be taken if the second level action threshold is met.

Save the details once made necessary changes.

4. Features

In this module the user can see all the features that the router device has.

This module includes 10 features.

  • Mac Address Binding
  • URL Filtering
  • Web Server
  • Wi-Fi MacID Filtering
  • Routing
  • DMZ
  • Others
  • SNMP Agent Configuration
  • Connection Diagnostics
  • Package Manager

4.1 Mac Address Binding

MAC address binding is a configuration that binds a specific MAC address to a specific IP address.

This ensures that a particular device on the network always receives the same IP address from the DHCP

server, which can be useful for network management, security, and ensuring consistent network

behaviour.

Under this submodule the user can configure/update/edit the IP Address for MAC.

You can edit the pre-existing configuration, or you can ‘Add’ in the ‘New MAC ADDRESS’ field.


EDIT:

Specification details are given below:

SN Field Name Sample Value Description
1 Device Name mac1 A user-defined name for the binding configuration.
2 MAC Address 48:9e:bd:da:45:91 The unique identifier for the network interface of the device to which the IP address will be bound.
3 IP Address 192.168.10.55 The IP address that will be consistently assigned to the device with the specified MAC address.

By applying this configuration, the DHCP server will always assign the IP address 192.168.10.55 to the device with the MAC address 48:9e:bd:da:45:91, ensuring consistency and stability in network addressing for that device.

  • Once the user modifies the MAC address /IP Address then click on the save button to save the changes done.
  • The user can click on the deleted button to delete an existing configured device.

Post all the changes the user needs to click on the update to reflect all the changes in the application.

4.2 URL Filtering

In this submodule the user should provide the URL which needs to be blocked for the device.

By implementing URL filtering with the specified URL, you can control and restrict access to certain

websites, thereby improving network security and managing user access.

To add the new URL for blocking, click on the Add New button.

Once the user clicks on the Add New button a new pop will appear in that page write the URL and click on the save.

The user can select the status of that URL while defining the URL.

To edit / delete the existing URL the user needs to click on the edit /deleted button respectively.

Click on “save” after the changes are done as per the need.

4.3 Web Server

This configuration will allow your device to serve web traffic securely over HTTPS, keep its system time synchronized, and ensure that all HTTP traffic is redirected to HTTPS for better security.

EDIT:

Specification details are given below:

SN Field Name Sample Value Description
1 Enable HTTP HTTP Port: 80

Enable or disable the HTTP server.

Port 80 is the default port for HTTP traffic. It is used to serve web pages over an unencrypted connection.
2 Enable HTTPS HTTPS Port: 443

Enable or disable the HTTPS server.

Port 443 is the default port for HTTPS traffic. It is used to serve web pages over an encrypted connection.
3 Redirect HTTPS Option to redirect HTTP traffic to HTTPS. When enabled, all HTTP requests will be automatically redirected to the HTTPS port to ensure secure communication.
4 Session Timeout (In Minutes) Ex: 5 mins This setting controls how long a user session remains active without interaction before the server automatically logs the user out.


5

RFC1918 Filter Enable/Disable When enabled, this filter can block traffic from private IP ranges (e.g., 192.168.x.x, 10.x.x.x) from being routed through the public internet, enhancing network security.
6 Enable NTP Sync Enable or disable NTP synchronization. Synchronizes the device’s system clock with an external NTP server to maintain accurate time.
7 NTP Server 0.openwrt.pool.ntp.org The address of the NTP server used for time synchronization. The openwrt.pool.ntp.org server is a public NTP server pool.
8 NTP Sync Interval (In Minutes) 15 The interval at which the device will sync its clock with the NTP server, set to every 15 minutes in this case.

Click on save once changes are made.

4.4 Wi-Fi MacID Filtering

Wireless MAC ID Filtering allows you to control which devices can connect to your wireless network based on their MAC (Media Access Control) addresses. This can help enhance security by allowing only specified devices to access the network.

It is further divided into 2 categories,

WIFI 2.4G AP

WIFI 2.4G AP Guest

Before adding the MacIDs the user needs to select the mode from the dropdown menu.

In ‘Change Mode’ select one option,

Blacklist

In blacklist mode, you specify which MAC addresses are not allowed to connect to the wireless network. Devices not on the blacklist will be able to connect.

Whitelist

In whitelist mode, you specify which MAC addresses are allowed to connect to the wireless network. Devices not on the whitelist will be blocked.

To Add the MacID the user needs to click on Add New option.

Specification details are given below:

SN Field Name Sample Value Description
1 Status Enable/Disable Enable or disable the MAC ID filtering.
2 MAC ID Example: e8:6f:38:1a:f2:61 The MAC address of the device to be whitelisted or blocklisted.
3 Network Name Example: WIFI 2.4G AP or Wi-Fi 2.4G AP Guest. The network to apply the MAC ID filtering.

Once the required MAC ID and Network Name is configured the user needs to click on the save button to add the details.

The user needs to click on the edit button to do modifications on the pre-existing configuration.

Once the required MACID / Network Name is modified the user needs to click on the save button to reflect the changed value in the application.

4.5 Routing

In this submodule the user can configure the parameters related to routing of the device like Target address, Networks address etc. Routing configurations allow network packets to be directed between different subnets and networks.

It is further divided into 2 sections,

Static IPV4 Routes

Advanced Static IPV4 Routes

Static IPV4 Routes:

Click on ‘Add’ to add a new interface.

EDIT:

To edit the existing device the user needs to click on the edit option.

Once the changes are done click on the save button to save all the changes.

Click on the deleted button to delete the existing device detail.


Specification details are given below:

SN Field Name Sample Value Description
1 Interface Ex: eth0.1 The network interface to be used for this route. Select the one to use from dropdown.
2 Target Ex: 192.168.20.0 The destination subnet to which traffic should be routed.
3 IPv4 Netmask 255.255.255.0 The subnet mask for the target network.
4 Metric 0 The priority of the route.

Lower values indicate higher priority.

5 IPv4 Gateway Ex: 192.168.10.1 The gateway IP address to be used for routing traffic to the target subnet.
6 Route Type Unicast Standard route for individual destination IP addresses.

Custom changes can be made.

Click on save once configuration changes have been made.

Advanced Static IPV4 Routes:

This is further divided into 2 sections,

Routing Tables

Routing Rules for IPV4

Routing Tables:

Adding a new table in static routing allows you to define specific routes for traffic within a network.

Click on ‘Add’ to add a new Table.

EDIT:

Specification details are given below:

SN Field Name Sample Value Description
1 ID of Table Ex: 1 A unique identifier for the routing table. Multiple tables can be used to define different sets of routing rules, providing flexibility in how traffic is managed.
2 Name of Table Ex: Route A descriptive name for the routing table, making it easier to manage and identify different tables.
3 Target Ex: 192.168.10.0 Specifies the destination network or IP address that the route is intended for.
4 IPv4 Netmask 255.255.255.0 Defines the subnet mask for the target network.
5 Metric Ex: 0 Indicates the priority of the route. A lower metric value means a higher priority. Routes with lower metrics are preferred over those with higher metrics.
6 IPv4 Gateway Ex: 10.1.1.1 Specifies the next hop or gateway IP address through which the traffic to the target network should be routed.
7 Route Type 1.) Unicast

2.) Custom

Unicast: Standard route where packets are sent to a single destination IP address.

Custom: Enables advanced routing configurations or specific protocols that might not be covered by default.

Once all the configurations are done click on the update button to reflect the changes made.


Routing Rules for IPV4:

Click on ‘Add’ to add a new interface.

EDIT:

To edit the existing device the user needs to click on the edit option.

Once the changes are done click on the save button to save all the changes.

Click on the deleted button to delete the existing device detail.

Specification details are given below:

SN Field Name Sample Value Description
1 Interface Ex: ra0 Select the specific network interface on the router through which traffic enters or exits.
2 To Ex: 192.168.10.1 The destination IP address or network. In this case, 192.168.10.1 is the target IP address for routing traffic.
3 IPv4 Netmask Ex: 255.255.255.192 Defines the subnet mask, which helps determine the size of the network.
4 Table ID Ex: 1 Identifies which routing table this rule applies to.
5 From Ex: 192.168.100.1 Specifies the source IP address or network from which the traffic originates. In this case, the traffic is coming from 192.168.100.1.
6 Priority Ex:20 Determines the order in which routing rules are evaluated. Lower numbers have higher priority. If two rules conflict, the one with the lower priority number will be applied first.
7 Outgoing Interface 1.) fwmark

2.) iif (Incoming Interface)

3.) oif (Outgoing Interface)

4.) lookup

5.) blackhole

6.) prohibited

7.) unreachable

1.) This allows you to create rules that apply only to traffic that has been marked in a specific way by the firewall.

2.) This is often used to create rules based on the interface through which traffic is received.

3.) This allows you to control the flow of traffic based on the desired outgoing interface.

4.) It tells the router to check the specific routing table ID mentioned to determine how to route the traffic.

5.) This is used when you want to block traffic without notifying the sender.

6.) Like blackhole but sends an ICMP unreachable message to the sender, indicating that the route is prohibited.

7.) Causes the router to send an ICMP unreachable message to the source IP, notifying that the destination is unreachable.

4.6 DMZ

A DMZ (Demilitarized Zone) is a subnetwork that provides an extra layer of security for an organization's internal network.

In this case we are configuring several services (HTTP, HTTPS, SSH, FTP, DNS) in a DMZ, and each service requires the correct internal port (the port used within the network) and external port (the port used by external clients to access the service) setting

Specification details are given below:

SN Field Name Sample Value Description
1 Enable DMZ Enable/Disable Enable DMZ to configure it further.
2 Host IP Address Ex: 192.168.10.1 This is the internal IP address of the device or server that will be in the DMZ.
3 Protocol 1.) TCP

2.) UDP

3.) ICMP

4.) All

TCP: Used for reliable services like HTTP, HTTPS, FTP, and SSH.

UDP: Often used for services like DNS that don't require as much reliability.

ICMP: Used for sending control messages like "ping."

All: Select this if you're unsure which protocol to allow, but it's less secure.

4 Allow HTTP Internal Port: 80

External Port: 80

Enables web traffic over the unsecured HTTP protocol.

(Port 80 is the standard port for HTTP traffic on our internal network).

5 Allow HTTPS Internal Port: 443

External Port: 443

Enables secure web traffic over HTTPS. (Port 443 is the standard port for HTTPS on our internal network).
6 Allow SSH Internal Port: 52434

External Port: 52434

This is a custom port we’re using for SSH.

The default is 22.

7 Allow FTP Internal Port: 21/20

External Port: 21/20

FTP is used to transfer files between computers.

(These are the standard ports for FTP traffic. Port 21 is used for control commands, and port 20 for the data transfer.)

8 Allow DNS Internal Port: 53

External Port: 53

Standard DNS port within our internal network.

4.7 Others

In this page the user will get to do all the other miscellaneous configuration with respect to the device based on the required parameters. Each utility serves a specific purpose, providing various functionalities for managing and troubleshooting network configurations and statuses.

Specification details are given below:

SN Field Name Sample Value Description
1 Set Date Date and time fields (day, month, year, hour, minute, second) Sets the system date and time to the specified values.
2 Get Date System Retrieves and displays the current system date and time.
3 ipsec status all Command ‘Get’ Displays the status of all IPsec connections.
4 Wi-Fi Scan Command ‘Get’ Initiates a scan for available Wi-Fi networks.
5 iPerf3 Client IP address (e.g., 192.168.10.100) Runs an iPerf3 client to measure network performance.
6 iPerf3 Server Command ‘Run’ Runs an iPerf3 server to measure network performance.
7 Ping IP address or domain (e.g., 8.8.8.8) Sends ICMP echo requests to the specified address to check connectivity.
8 traceroute IP address or domain (e.g., 8.8.8.8) Traces the route packets take to reach the specified address.
9 NTP Sync Command ‘Sync’ Synchronizes the system time with the configured NTP server.
10 Download Files File or database identifier Initiates a download of the specified file or database.
11 Restart Power Command ‘Restart’ Restarts the power of the device.
12 Restart Modem Command ‘Restart’ Restarts the modem.
13 Run AT Command Enter AT command Executes the specified AT command on the modem.
14 Show Board Configuration Command ‘Show’ Displays the current board configuration.
15 Show VPN Certificate Name Command ‘Show’ Displays the name of the VPN certificate in use.
16 Switch SIM to Secondary (Takes >2 mins) Command ‘Run’ Switches the active SIM to the secondary SIM card.
17 Send test SMS Phone number (e.g., +911234567890) message text (e.g., "Hello how are you?") Sends a test SMS to the specified phone number.
18 ReadlatestSMS Command ‘Read’ Reads the most recent SMS received by the device.
19 Data Usage From: Start date (YYYY-MM-DD)

To: End date (YYYY-MM-DD)

Displays data usage statistics for the specified date range.
20 Monthly Data Usage Month: Month (e.g., 07)

Year: Year (e.g., 2024)

Displays data usage statistics for the specified month and year.
21 Modem Debug Info Command ‘Read’ Displays debug information for the modem.
22 Scan Network operators (Takes >3 mins) Command ‘Scan’ Initiates a scan for available network operators.
23 Network operator list (First Perform Scan Network Operators) Command ‘Show’ Displays the list of network operators detected in the previous scan.
24 ReadLogFiles Log file identifier Reads and displays the specified log file
25 Enable ssh (Admin) Command ‘Run’ Enables SSH access for the admin user.
26 Disable ssh (Admin) Command ‘Run’ Disables SSH access for the admin user.
27 ClearSIM1Data Command ‘Clear’ Clears data usage statistics for SIM1.
28 ClearSIM2Data Command ‘Clear’ Clears data usage statistics for SIM2.
29 Create Bridge with SW_LAN Network interface identifier Creates a network bridge with the specified interface and SW_LAN.
30 Show Bridge Command ‘Show’ Displays information about the current network bridges.
31 Delete Bridge Command ‘Delete’ Deletes the specified network bridge.
32 Output Any value Displays output for all the above actions.

4.8 SNMP Agent Configuration

The SNMP (Simple Network Management Protocol) Agent Configuration is essential for monitoring and managing network devices, such as routers, from a central management system.

Specification details are given below:

SN Field Name Sample Value Description
1 Enable SNMP Service Enable/Disable Enable this if you want the device to be accessible for SNMP-based monitoring and management.
2 IP Family IPV4 Specifies that SNMP service will operate over IPv4.
3 Port 161 161 is the default and should be used unless there is a specific need to use a different port.
4 System OID 1.3.6.1.4.1.38151 This unique identifier represents the device in the SNMP management system.
5 Name Invendis Router The name used to identify the device in the SNMP management system.
6 Contact Invendis@invendis.co The email address of the person responsible for the device, used for administrative contact.
7 Location Bangalore The physical location of the device.
8 SNMP Version Version-1,

Version-2,

Version-3

Version-1: Basic and outdated, offering no security.

Version-2: An improvement over Version-1 with better performance and some security features.

Version-3: The most secure, offering authentication and encryption (AuthPriv).

9 Security       (for SNMP Version-3) NoAuthNoPriv

AuthNoPriv

AuthPriv

No Authentication, No Privacy

Authentication, No Privacy

Authentication and Privacy

10 Username Ex: admin The username used for SNMP authentication.
11 Authentication Password ******* This password is used to authenticate the SNMP user.
12 Privacy Password ******* This password is used to encrypt SNMP messages.
13 Download MIB File Download Click this to download the MIB file associated with the device’s SNMP configuration.

Click on save tab to save changes.

4.9 Connection Diagnostics

This can ensure that your connection diagnostics application effectively monitors and reports the status of your network connections, providing valuable data for troubleshooting and performance optimization.

This Application works in 3 parts,

1.) General settings

2.) Connection status and management

3.) Application Start/Stop

General settings:

First make configuration changes in this section and save.

Specification details are given below:

SN Field Name Sample Value Description
1 Enable Connection Diagnostics Enable/Disable This option enables or disables the connection diagnostics functionality.
2 Check Interval (in seconds) Value: 120 Specifies how often (in seconds) the diagnostics checks are performed. In this case, every 120 seconds. (min 60 secs)
3 Number of Pings Value: 5 Determines ping requests sent during each check.
4 Ping Packet Size (in Bytes) Value: 56 Defines the size of each ping packet in bytes.
5 Send to remote MQTT Broker Enable/Disable This option enables the sending of diagnostic data to a remote MQTT broker.
6 Publish Data Format CSV / JSON Specifies the format in which the diagnostic data will be published to the MQTT broker. You can choose either CSV (Comma-Separated Values) or JSON (JavaScript Object Notation).
7 MQTT Broker url Value: broker.hivemq.com The URL of the MQTT broker where the diagnostic data will be sent.
8 TCP port Value: 1883 The TCP port used to connect to the MQTT broker. Port 1883 is the default port for MQTT.
9 Topic Value: 37A26230014/connectionDiagnostics The MQTT topic under which the diagnostic data will be published. This topic is used to categorize and identify the data.


Connection status and management:

To setup a connection,

Click on ‘Add new target’

Enter Target IP (Ex: 8.8.8.8)

Click ‘Add’

Target has been added successfully.

Application Start/Stop:

To check whether the target Ip is sending and receiving packets, you need to start the application to see the desired output.

As shown above, our target Ip is sending packets successfully.

You can Add as many target IP’s you need to monitor.

You can leave the application on for monitoring else ‘Stop’ the application.

4.10 Package Manager

A Package Manager is a tool or interface used to manage software packages (applications, libraries, tools) on a system.

The package manager interface you are looking at likely allows you to manage the software installed on your device, such as networking tools, firmware, or other applications relevant to your system.

This section has 3 sub-sections,

Installed APP

Available APP

Manual Upgrade

Installed APP:

When you select Installed APP, you will see all the software that is actively running or installed on the device.

This could include system utilities, network management tools, monitoring software, or any third-party apps that were previously installed.

Common Actions:

  • View Details: You can check each application's version, source, and installation date.
  • Uninstall: You can remove applications that are no longer needed.
  • Check for Updates: You can see if there are updates available for any installed application.


Available APP:

When you select Available APP, you will see a list of software that can be installed from the system's repositories or sources.

These applications are not yet installed but are ready for installation if needed.


Common Actions:

  • Install: You can install any of the available applications by selecting them.
  • View Details: You can review each application's description, version, and functionality before installing.
  • Search: You can search for specific apps by name or category.



Manual Upgrade:

In contrast to automatic updates, Manual Upgrade lets you take control over which packages or applications you want to upgrade and when.

This can be useful if you need to avoid upgrading certain apps due to compatibility or testing purposes, or if you want to perform updates at a specific time.

Common Actions:

  • Check for Updates: The system will check for available updates for installed apps.
  • Select Updates: You can select which packages to update manually.
  • Upgrade Now: You can start the upgrade process immediately for selected apps.

5.Status

In this module the user can view the status of the router device with respect to the network, Wan, modem etc.

It has 4 submodules.

  • Interfaces
  • Internet
  • Modem
  • Routes

5.1 Interfaces

Each network device (interface) is associated with specific traffic statistics, uptime, and status. Active interfaces are operational, while inactive interfaces are not currently transmitting data.

Looking on the network status the user can check if the cellular, wifi, ewan, vpn etc is up.

5.2 Internet

In this submodule the user can view the status of the internet connections.

To see the latest status of the internet connection the user needs to click on the refresh button.


5.3 Modem

This modem status page provides comprehensive information about the cellular connection's network operator, technology, mode, and various signal quality metrics.

5.4 Routes

This configuration shows how the router directs traffic between different networks and interfaces, ensuring proper communication within the local network and to external networks via the default gateway.

ARP Table: Maps IP addresses to MAC addresses for devices on the network, helping in identifying which device is on which interface.

IPv4 Routes: This shows which network is directly connected on which interface.

Example: Network 192.168.10.0/24 is directly connected on interface eth0.1.

IPv6 Routes: Similar routes as IPv4, but this time listed under IPv6 routing rules.

Example: Local networks 192.168.10.0/24 and 192.168.100.0/24 are managed through eth0.1 and ra0, respectively.

*Refer the below image*

6.Logout

The user should click on log out option to logged out from the router application.