jane

User Manual

Leax Arkivator Telecom USA Inc. FT205L 2AVFN-FT205L 2AVFNFT205L ft205l

User Guide for Leax Arkivator Telecom USA Inc models including: FT205L Series Ethernet Devices, FT205L Series, Ethernet Devices, Devices

PDF Viewing Options

Not Your Device? Search For Manuals or Datasheets below:


File Info : application/pdf, 32 Pages, 2.22MB

Document DEVICE REPORTGetApplicationAttachment.html?id=7314632
Silian technology Internet of Things
User Manual
FT205L

Catalogue
Introduction ........................................................................................................................................4 1.1 Overview ....................................................................................................................... 4 1.2 Features ........................................................................................................................ 5
Quick start guide .............................................................................................................................. 6 2.1 Product Display ............................................................................................................. 7 2.4 LED indicators ............................................................................................................... 7 2.5 Accessories ....................................................................................................................8
Preparation ...................................................................................................................................... 9
3.1 Out of the box ...............................................................................................................9 3.2 Installation and wiring .................................................................................................. 9 3.2.1 SIM card installation .......................................................................................................... 9 3.2.2 Antenna installation ..................................................................................................... 10 3.3 Log in the Web UI of router ................................................................................... 10 3.3.1 Computer network configuration ....................................................................................10 3.3.2 Login to device .................................................................................................................11 Network Configuration ...................................................................................................................13 4.1 Network Configuration ............................................................................................... 13 4.1.1 Ethernet WWAN Configuration ....................................................................................... 13 4.1.2 WAN ................................................................................................................................. 15 4.1.3 Break the line and restart ................................................................................................ 16 4.1.4 Break line detection .........................................................................................................17 4.1.2 LAN Configuration ............................................................................................................17 4.1.3 DHCP Server .............................................................................................................18 1DHCP Server Configuration ...................................................................................18 2DHCP List of clients ................................................................................................ 18 3DHCP Address Bind ................................................................................................ 19 4.1.4 DTU .......................................................................................................................... 19 1DTU server ................................................................................................................19 2 DTU Client .............................................................................................................. 20 4.1.5 Network detection tool ........................................................................................... 21 4.2 VPN ......................................................................................................................................22 4.2.1 PPTP settings ....................................................................................................................22 PPTP Server ................................................................................................................... 22 4.2.2 L2TP ..................................................................................................................................24 4.2.3 IPSEC ................................................................................................................................ 25 1Connect Status and Control ...................................................................................25 2New IPSEC security policy .................................................................................... 26 3Add the IKE security policies ................................................................................. 26 4.2.4 GRE ...........................................................................................................................27 4.3 Firewall settings .................................................................................................................. 28 4.3.1 Port mapping ........................................................................................................... 28

4.3.2 DMZ settings ............................................................................................................ 29 4.4 System Settings ................................................................................................................... 30
4.4.1 Management Settings ............................................................................................. 30 1Password setting ..................................................................................................... 30 2Language settings ................................................................................................... 30 4.4.2 Configuration management ............................................................................................ 31 4.4.3 Firmware .......................................................................................................................31 4.4.4 Reboot ..............................................................................................................................31 5 FCC Warnning: ........................................................................................................... 32

Introduction
1.1 Overview
FT205L series routing provides one RS232 or RS485 serial port, four 100 million Ethernet LAN, one 100 million Ethernet WAN port to connect serial devices, Ethernet devices enabling transparent data transmission and routing functions. The product has the advantages of rapid deployment and easy management, advanced software features and a fully industrial hardware design platform, enabling enterprises to quickly build large-scale industrial equipment networks with minimal investment, providing multi-service services including data, voice and video. Especially suitable for large-scale machine networking, such as self-help selling machine, bank ATM, multimedia advertising equipment, industrial automation equipment, intelligent medical equipment, robots, field machinery, oil and gas exploration equipment, digital production equipment and other machine networking and information construction, its excellent hardware performance, easy to deploy and perfect remote management function .
432

1.2 Features
Industrial-grade application design
 Adopt the industrial communication module  With a high-performance 32-bit communication processor  Support low power mode, including sleep mode, timing up and down mode and timing
switch mode (special version only)  With metal case, protection class IP30. The metal shell and the system are safely
isolated, especially suitable for industrial control field applications  Design of wide voltage input: 9~36V
Stable and reliable
 Double watchdog design to ensure the stability of the system  Adopt a complete anti-drop mechanism to ensure that the data terminal is always
online.  The Ethernet interface is built-in 1.5KV electromagnetic isolation protection  The RS232 / RS485 interface has a built-in 1.5KV ESD protection  The SIM / UIM interface has a built-in 1.5KV ESD protection  Power-interface built-in reverse voltage protection and overvoltage protection  Lightning protection of antenna interface (optional)
Standard easy to use
 Standard RS232 / RS485, Ethernet interfaces are provided, connecting directly to serial port devices, Ethernet devices devices
 Provide standard limited WAN port (supporting standard PPPOE protocol) to connect to ADSL devices directly
 Intelligent data terminal, power on can enter the data transmission state  Provide powerful central management software to facilitate equipment management
(optional)  Easy to use, flexible, a variety of working mode selection  Convenient system configuration and maintenance interface (including local, remote
WEB and platform management)
532

powerful
 Various WAN connection modes are supported, including static IP, DHCP, L 2 TP, PPTP, PPP OE, 3G / HSPA / 4G.
 Support for mobile network and wired WAN dual-link intelligent switching backup function (optional)
 Support for VPN client (PPTP / L 2 TP / IPSEC / GRE)  Support for remote management, SYSLOG / SNMP / TELNET / HTTP and other
functions  Support for local and remote online upgrades, and import and export profiles  support NTP  Support for the APN / VPDN  Support multi-channel DHCP Server and DHCP Client, DHCP bundled MAC address,
DDNS, firewall, NAT, DMZ host traffic statistics and other functions  Support for TCP / IP, UDP, FTP (optional), HTTP and other network protocols  Support for SNMP V1.V2.V3
Quick start guide
632

2.1 Product Display

2.4 LED indicators

name System lamp (SYS)
Power lamp (PWR) Network Lamp (LINK)

state twinkle Often bright Often bright Often bright extinct Often bright

twinkle

description It indicates that the power supply is normal and it is starting
Note that the system is running abnormally
System operation
The equipment is in normal power supply
The equipment has abnormal power supply Indicates that the router has successfully dialed up to the network Indicates that the router is currently connecting to a dial-up connection

732

2.5 Accessories

Accessories name FT205L 4G antenna Power adapter Quick start guide Industrial guide rail buckle

quantity 1 1 1 1 1

remarks

832

Preparation
3.1 Out of the box
After the whole package of equipment arrives at the site, it is necessary to open the box and check whether the accessories are complete according to the product accessories list. Please keep the packing materials well after opening the box, for later use.
3.2 Installation and wiring
3.2.1 SIM card installation
During the normal installation process, the product needs to install SIM in the SIM card slot in the SIM slot on the right side of the front panel. Step 1 Gently press the yellow button on the SIM holder with a sharp object to pop the holder:
Step 2 insert the SIM metal face up and into the holder with the missing end facing the outside. Then push the card holder into the card slot:

3.2.2 Antenna installation
Rotate the antenna into the antenna connector accordingly. The external antenna should be installed vertically always on a site with a good signal.
3.3 Log in the Web UI of router
This product has built-in WEB interface, management and debugging tools. Users should configure relevant parameters before using the router, and they can flexibly change the relevant parameters, software upgrade and conduct simple tests.
3.3.1 Computer network configuration
1 Ensure the Wireless network connection is Enabled. Go to Start -- Control Panel -- Network and Internet --NetworkandSharing Center. Click on the Change adapter settings in the left panel, then right-click on Wireless Network Adapter, andselectEnable.
2  Check if IP and DNS are obtained automatically. Right-click on Wireless Network Adapter and select Properties. ThenselectInternet Protocol Version 4 and click Properties.

3.3.2 Login to device
1Open a Web browser on your PC (Chrome is recommended), type in the IP address 192.168.10.1, and press Enter onyour keyboard. 2When the first login, please enter the default user name: admin, password: iradm
1After you login the WebUI, you can view system information and perform configuration on the router.

Network Configuration
4.1 Network Configuration
This section explains how to connect FT205L to network via WAN connection or cellular.
4.1.1 Ethernet WWAN Configuration
1The default system is 4G wireless Internet access mode, insert 4G service card, the router will automatically identify the main card (SIM1) for dial-up Internet access.
2If you need to realize the dual card switching function, please install the two 4G charge cards in SIM1 and SIM2 respectively. After you configure the main card and standby card, check "Auto cut card" and save it.

3If you are using a 4G private network card, please fill in the corresponding parameters through the relevant APN information provided by the operator and save it.

4.1.2 WAN
Wired connection WAN includes: DHCP client, static IP, PPPOE: PPPOE parameter configuration, as shown in the figure below:
Configure according to the example of the above figure, input the correct broadband dial account and password, and click "Save". Static address parameter configuration, as shown below:

Configure according to the example above, and click "Save". DHCP client parameter configuration, as shown below:
Configure according to the example above, and click "Save".
4.1.3 Break the line and restart

After the disconnection restart function is enabled, the system will automatically perform PING operation on the IP address in the settings. The detection time is the cumulative packet loss time; the detection interval is how long for the PING function once; the IP address is the target address of the system for the PING function. If the PING pass IP address fails during the detection time period, the system will automatically restart the operation.
4.1.4 Break line detection
After the disconnection detection function is enabled, the system will automatically operate the PING on the IP address in the settings. The detection time is the cumulative packet loss time; the detection interval is how long for the PING function once; the IP address is the target address of the system for the PING function. If the PING IP address is failed during the detection time limit, the system will automatically re-dial the operation.
4.1.2 LAN Configuration
Local area network (Local Area Network, LAN) is a group of computers connected by multiple computers in a certain area. Routers can assign IP addresses to devices within the LAN, enabling them to communicate with each other and access the Internet.

4.1.3 DHCP Server
DHCP (Dynamic Host Configuration Protocol, Dynamic Host Configuration Protocol) is a LAN network protocol using UDP protocol and has two main uses: automatically assigning IP addresses to the internal network or network service providers, and to users or internal network administrators as a means of central management of all computers.
1DHCP Server Configuration
Used to set the DHCP server open or close, and DHCP gateway, starting address, lease duration, etc., generally open by default.
2DHCP List of clients
Displays the device currently using the assigned address.

3DHCP Address Bind
Specify the IP address according on its MAC address.
4.1.4 DTU
The DTU setting is closed by default, and it is divided into two modes: server and client.
1DTU server
Description of the Server Mode settings:

DTU type: Server mode Agreement: Support for TCP, UDP. Port: The port number used by the server. Baud rate: Baud rate of the serial port, supported by: 9600,19200,38400,57600,115200. Data bit: Serial port data bit setting, supported by: 8,7,6,5. Stop bit: serial port stop bit setting, support: 1,2. Check bit: serial port check bit setting, support: None, Odd, Event, Mark, Space. Flow control: serial port flow control options, support: None, RTS / CTS, XON / XOFF.
2 DTU Client
Description of the client-side mode setting
Agreement: Support for TCP, UDP. IP address: the IP address or domain name of the server. Port: The port number used by the server. Baud rate: Baud rate of the serial port, supported by: 9600,19200,38400,57600,115200. Data bit: Serial port data bit setting, supported by: 8,7,6,5. Stop bit: serial port stop bit setting, support: 1,2. Check bit: serial port check bit setting, support: None, Odd, Event, Mark, Space. Flow control: serial port flow control options, support: None, RTS / CTS, XON / XOFF.

Heartbeat interval: The heartbeat packet sends the heartbeat content to the server according to the time set by the heartbeat interval. Registration package: The DTU is sent once when it is connected to the server. Heartbeat packet: When there is no data sent by the serial port, the data will be sent to the server regularly to keep the link smooth.
4.1.5 Network detection tool
Cooperate with the tester to monitor the line status of the whole network in real time, and take corresponding measures.

4.2 VPN
VPN is for building a private dedicated network on a public network via the Internet. 'Virtuality" is a logical network.
4.2.1 PPTP settings
PPTP (Point to Point Tunneling Protocol), namely, the point-to-point tunneling protocol. This protocol is a new enhanced security protocol developed on the basis of PPP protocol, supporting multi-protocol virtual private network (VPN), which can be enhanced by password authentication protocol (PAP), scalable authentication protocol (EAP) and other methods. It enables remote users to securely access enterprise networks by dialing into the ISP, through direct connection to Internet or other networks. PPTP Server Build the PPTP server
As shown above: Open the PPTP server button and configure the PPTP virtual IP address field:

User name: the name of the new user Password: Password for the new user Remote subnet: the local gateway IP of the PPTP client Subnet mask: Subnet mask of the PPTP client IP address: Virtual IP address assigned to the changed user
PPTP Client
In the figure below, click-new PPTP client in PPTP client to add a new PPTP connection.
Click to see the following setting options:

Name: The name of this client connection that can be customized. Server address: Fill in the address of the PPTP server here, which can be the domain name or the IP address. Username: User name to login PPTP Server Password: Password to log into PPTP Server. Remote Subnet: The network of the remote PPTP server Remote Net Mask: Subnet mask of remote PPTP server MPPE Encryption: Enable or disable Microsoft Point-to-Point Encryption MTU : Maximum Transmission Unit
4.2.2 L2TP
The L 2 TP is an industry-standard Internet tunnel protocol, functioning roughly similar to the PPTP protocol, such as enabling the same encryption of network data streams. However, there are differences, such as PPTP requires IP network; L 2 TP requires packet point-to-point connection; PPTP uses single tunnel; L 2 TP uses multiple tunnel; L 2 TP provides Baotou compression and tunnel verification, while PPTP does not support.
Create a new L 2 TP client connection
In the figure below, click in the L 2 TP client-a new L 2 TP client to add a new L 2 TP connection.
Click to see the following setting options:

Name: The name of this client connection that can be customized. Server address: Fill in the address of the L2TP server here, which can be the domain name or the IP address. Username: User name to login L2TP Server Password: Password to log into L2TP Server. Local end IP: The network of the remote L2TP server Remote Net Mask: Subnet mask of remote L2TP server MTU : Maximum Transmission Unit
4.2.3 IPSEC
The IPsec protocol works on the third layer of the OSI model, making it suitable to protect TCP or UDP-based protocols when used alone (such as the socket sublayer (SSL) cannot protect the UDP layer). This means that the IPsec protocol must deal with reliability and fragmentation issues compared to the transport layer or higher level, which also increases its complexity and processing overhead. In contrast, SSL / TLS relies on a higher level TCP (layer 4 of OSI) to manage reliability and sharding.
1Connect Status and Control
Existing IPSEC connection status information is displayed here.In the figure below, click on the-new IPSEC connection in the IPSEC list to add a new IPSEC connection.
Click to see the following setting options:

Name: IKE policy name, use plain English or English numbers. Mode: Optional main mode, savage mode. IPSEC networking type: support network to network mode. Working mode: Optionally not enabled, active connection, automatic discovery, waiting for the connection. Local ID: IPSEC ID may not be set or set to pure English custom name. Local subnet: the local subnet address. Distal address: the IP address or domain name of the opposite-end IPSEC. Distal ID: the IPSEC ID name of the opposite end. Distal subnet: the opposite-end subnet address. IKE version: optional version IKEv 1 or IKEv 2. The IKE security policy: The IKE security policy needs to be added to the IKE security policy first. The IPSEC security policy: The IPSEC security policy needs to be added to the IPSEC security policy first. Tunnel Certification: Optional Mode IKE-PSK, IKE-XAUTH-PSK, NEVER. PSK: the PSK key for the IPSEC connection. DPD mode: optional none, clean, hold, restar. Note: Comments about this link.
2New IPSEC security policy
In the figure below, click on the new IPSEC security policy in the IPSEC Security Policy to add a new IPSEC security policy.
Click to see the following setting options:
Name: IKE policy name, use plain English or English numbers. Agreement: Optional AH, ESP. AH validation algorithm: optional MD5, SHA 1.
3Add the IKE security policies
In the figure below, click on the-new IKE security policy in the IKE security policy to add a new IKE security policy.

Click to see the following setting options:
Name: IKE policy name, use plain English or English numbers. Encryption algorithm: optional DES, 3 DES, AES128, AES192, AES256. Validation algorithm: select SHA 1, MD5. DH group: select DH 1, DH 2, DH 5, DH 14, DH 15, DH 16, DH 17, DH 18. IKE survival cycle: a minimum value of 1 hour.
4.2.4 GRE
GRE (Generic Routing Encapsulation), the general routing encapsulation protocol, is the encapsulation of some network layer protocols (such as IP and IPX), enabling these encapsulated datagram to be transmitted in another network layer protocol (such as IP). GRE is the third layer tunnel protocol of VPN (Virtual Private Network), where a technology called Tunnel (tunnel) is used between the protocol layers. Existing GRE connection status information is displayed here. In the figure below, click on the-new GRE connection in the GRE to add a new GRE tunnel connection.
Click to see the following setting options:

Name: GRE tunnel name Tunnel address: the IP address of the GRE tunnel. Distal address: the IP address of the distal GRE connection. Distal subnet / mask: the subnet and mask of the distal GRE. Password: the connection password for the GRE tunnel The MTU value: the MTU value of the GRE tunnel. TTL: the TTL cycle of the GRE tunnel.
4.3 Firewall settings 4.3.1 Port mapping
As shown in the figure: there are three routers: A, B (IR 1 equipment) and C, and U is the user end. A and U are in the same LAN, the IP address of A is 192.168.1.1, and the IP address of U is 192.168.1.56. B and C are in another LAN, IP addresses are 192.168.10.1,192.168.10.5. The WAN port of router B is connected to the LAN port of

router A, and the WAN address is 192.168.1.55. The virtual server is defined as: user U accessing router B through A across the network, and router B automatically transfers the service request to the server (router) C. Here, the connection mode and setting of B are very important. The connection mode is required as follows: 1. B Connect to the external network with the WAN port. 2, B, connect C with the LAN port. Setting mode: Enter the setting interface of router B-firewall-commodity mapping, and the setting parameters are as follows:
Among them, the external port can be filled in at will, and the internal port should be consistent with the corresponding service port of the server (router) C (port 80 is the WEB configuration interface port of the router C). Fill in according to the above content, and save it. Now, we connect to router A through the client U, and input: http: / / 192.168.10.100:9900 in the address bar, then the browser directly enters the Settings interface of router C.
4.3.2 DMZ settings
DMZ is short for the English word "demilitarized zone", and the Chinese name is "isolation zone", also called "demilitarized zone". It is a buffer between the non-secure system and the security system to solve the problem that the external network access users cannot access the internal network server after installing the firewall. The buffer is located in a small network area between the enterprise internal network and the external network. In this small network area, you can place some necessary public server facilities, such as enterprise Web server, FTP server, and forum. On the other hand, through such a DMZ region, the internal network is more effectively protected. Because this kind of network deployment, compared to the general firewall scheme, for the attacker from the external network and another level.

4.4 System Settings 4.4.1 Management Settings
Used to manage the router interface language and password security.
1Password setting
Manage the router login password, save and restart the effective.
2Language settings
Language  Set up the Router page shows the type of language, including simplified Chinese and English.

4.4.2 Configuration management
You can save the current configuration information locally, or import previous backup files locally.
4.4.3 Firmware
Firmware Upgrade  New firmware versions are posted at www..com and can be downloaded. If the Router is not experiencing difficulties, then there is no need to download amore recent firmware version, unless that version has a new feature that you want to use.
4.4.4 Reboot
This item can set the timing restart of the device.

You can schedule regular reboots for the router: Regularly after xxx Minutes.
5 FCC Warnning:
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: · Reorient or relocate the receiving antenna. · Increase the separation between the equipment and receiver. · Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. · Consult the dealer or an experienced radio/TV technician for help.
Caution: Any changes or modifications to this device not explicitly approved by manufacturer could void your authority to operate this equipment.
This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator and your body.



References

Related FCC IDs:

Search Any Device: