jane
User Manual
Leax Arkivator Telecom USA Inc. FT205L 2AVFN-FT205L 2AVFNFT205L ft205l
User Guide for Leax Arkivator Telecom USA Inc models including: FT205L Series Ethernet Devices, FT205L Series, Ethernet Devices, Devices
Not Your Device? Search For Manuals or Datasheets below:
File Info : application/pdf, 32 Pages, 2.22MB
Document DEVICE REPORTGetApplicationAttachment.html?id=7314632Silian technology Internet of Things User Manual FT205L Catalogue Introduction ........................................................................................................................................4 1.1 Overview ....................................................................................................................... 4 1.2 Features ........................................................................................................................ 5 Quick start guide .............................................................................................................................. 6 2.1 Product Display ............................................................................................................. 7 2.4 LED indicators ............................................................................................................... 7 2.5 Accessories ....................................................................................................................8 Preparation ...................................................................................................................................... 9 3.1 Out of the box ...............................................................................................................9 3.2 Installation and wiring .................................................................................................. 9 3.2.1 SIM card installation .......................................................................................................... 9 3.2.2 Antenna installation ..................................................................................................... 10 3.3 Log in the Web UI of router ................................................................................... 10 3.3.1 Computer network configuration ....................................................................................10 3.3.2 Login to device .................................................................................................................11 Network Configuration ...................................................................................................................13 4.1 Network Configuration ............................................................................................... 13 4.1.1 Ethernet WWAN Configuration ....................................................................................... 13 4.1.2 WAN ................................................................................................................................. 15 4.1.3 Break the line and restart ................................................................................................ 16 4.1.4 Break line detection .........................................................................................................17 4.1.2 LAN Configuration ............................................................................................................17 4.1.3 DHCP Server .............................................................................................................18 1DHCP Server Configuration ...................................................................................18 2DHCP List of clients ................................................................................................ 18 3DHCP Address Bind ................................................................................................ 19 4.1.4 DTU .......................................................................................................................... 19 1DTU server ................................................................................................................19 2 DTU Client .............................................................................................................. 20 4.1.5 Network detection tool ........................................................................................... 21 4.2 VPN ......................................................................................................................................22 4.2.1 PPTP settings ....................................................................................................................22 PPTP Server ................................................................................................................... 22 4.2.2 L2TP ..................................................................................................................................24 4.2.3 IPSEC ................................................................................................................................ 25 1Connect Status and Control ...................................................................................25 2New IPSEC security policy .................................................................................... 26 3Add the IKE security policies ................................................................................. 26 4.2.4 GRE ...........................................................................................................................27 4.3 Firewall settings .................................................................................................................. 28 4.3.1 Port mapping ........................................................................................................... 28 4.3.2 DMZ settings ............................................................................................................ 29 4.4 System Settings ................................................................................................................... 30 4.4.1 Management Settings ............................................................................................. 30 1Password setting ..................................................................................................... 30 2Language settings ................................................................................................... 30 4.4.2 Configuration management ............................................................................................ 31 4.4.3 Firmware .......................................................................................................................31 4.4.4 Reboot ..............................................................................................................................31 5 FCC Warnning: ........................................................................................................... 32 Introduction 1.1 Overview FT205L series routing provides one RS232 or RS485 serial port, four 100 million Ethernet LAN, one 100 million Ethernet WAN port to connect serial devices, Ethernet devices enabling transparent data transmission and routing functions. The product has the advantages of rapid deployment and easy management, advanced software features and a fully industrial hardware design platform, enabling enterprises to quickly build large-scale industrial equipment networks with minimal investment, providing multi-service services including data, voice and video. Especially suitable for large-scale machine networking, such as self-help selling machine, bank ATM, multimedia advertising equipment, industrial automation equipment, intelligent medical equipment, robots, field machinery, oil and gas exploration equipment, digital production equipment and other machine networking and information construction, its excellent hardware performance, easy to deploy and perfect remote management function . 432 1.2 Features Industrial-grade application design Adopt the industrial communication module With a high-performance 32-bit communication processor Support low power mode, including sleep mode, timing up and down mode and timing switch mode (special version only) With metal case, protection class IP30. The metal shell and the system are safely isolated, especially suitable for industrial control field applications Design of wide voltage input: 9~36V Stable and reliable Double watchdog design to ensure the stability of the system Adopt a complete anti-drop mechanism to ensure that the data terminal is always online. The Ethernet interface is built-in 1.5KV electromagnetic isolation protection The RS232 / RS485 interface has a built-in 1.5KV ESD protection The SIM / UIM interface has a built-in 1.5KV ESD protection Power-interface built-in reverse voltage protection and overvoltage protection Lightning protection of antenna interface (optional) Standard easy to use Standard RS232 / RS485, Ethernet interfaces are provided, connecting directly to serial port devices, Ethernet devices devices Provide standard limited WAN port (supporting standard PPPOE protocol) to connect to ADSL devices directly Intelligent data terminal, power on can enter the data transmission state Provide powerful central management software to facilitate equipment management (optional) Easy to use, flexible, a variety of working mode selection Convenient system configuration and maintenance interface (including local, remote WEB and platform management) 532 powerful Various WAN connection modes are supported, including static IP, DHCP, L 2 TP, PPTP, PPP OE, 3G / HSPA / 4G. Support for mobile network and wired WAN dual-link intelligent switching backup function (optional) Support for VPN client (PPTP / L 2 TP / IPSEC / GRE) Support for remote management, SYSLOG / SNMP / TELNET / HTTP and other functions Support for local and remote online upgrades, and import and export profiles support NTP Support for the APN / VPDN Support multi-channel DHCP Server and DHCP Client, DHCP bundled MAC address, DDNS, firewall, NAT, DMZ host traffic statistics and other functions Support for TCP / IP, UDP, FTP (optional), HTTP and other network protocols Support for SNMP V1.V2.V3 Quick start guide 632 2.1 Product Display 2.4 LED indicators name System lamp (SYS) Power lamp (PWR) Network Lamp (LINK) state twinkle Often bright Often bright Often bright extinct Often bright twinkle description It indicates that the power supply is normal and it is starting Note that the system is running abnormally System operation The equipment is in normal power supply The equipment has abnormal power supply Indicates that the router has successfully dialed up to the network Indicates that the router is currently connecting to a dial-up connection 732 2.5 Accessories Accessories name FT205L 4G antenna Power adapter Quick start guide Industrial guide rail buckle quantity 1 1 1 1 1 remarks 832 Preparation 3.1 Out of the box After the whole package of equipment arrives at the site, it is necessary to open the box and check whether the accessories are complete according to the product accessories list. Please keep the packing materials well after opening the box, for later use. 3.2 Installation and wiring 3.2.1 SIM card installation During the normal installation process, the product needs to install SIM in the SIM card slot in the SIM slot on the right side of the front panel. Step 1 Gently press the yellow button on the SIM holder with a sharp object to pop the holder: Step 2 insert the SIM metal face up and into the holder with the missing end facing the outside. Then push the card holder into the card slot: 3.2.2 Antenna installation Rotate the antenna into the antenna connector accordingly. The external antenna should be installed vertically always on a site with a good signal. 3.3 Log in the Web UI of router This product has built-in WEB interface, management and debugging tools. Users should configure relevant parameters before using the router, and they can flexibly change the relevant parameters, software upgrade and conduct simple tests. 3.3.1 Computer network configuration 1 Ensure the Wireless network connection is Enabled. Go to Start -- Control Panel -- Network and Internet --NetworkandSharing Center. Click on the Change adapter settings in the left panel, then right-click on Wireless Network Adapter, andselectEnable. 2 Check if IP and DNS are obtained automatically. Right-click on Wireless Network Adapter and select Properties. ThenselectInternet Protocol Version 4 and click Properties. 3.3.2 Login to device 1Open a Web browser on your PC (Chrome is recommended), type in the IP address 192.168.10.1, and press Enter onyour keyboard. 2When the first login, please enter the default user name: admin, password: iradm 1After you login the WebUI, you can view system information and perform configuration on the router. Network Configuration 4.1 Network Configuration This section explains how to connect FT205L to network via WAN connection or cellular. 4.1.1 Ethernet WWAN Configuration 1The default system is 4G wireless Internet access mode, insert 4G service card, the router will automatically identify the main card (SIM1) for dial-up Internet access. 2If you need to realize the dual card switching function, please install the two 4G charge cards in SIM1 and SIM2 respectively. After you configure the main card and standby card, check "Auto cut card" and save it. 3If you are using a 4G private network card, please fill in the corresponding parameters through the relevant APN information provided by the operator and save it. 4.1.2 WAN Wired connection WAN includes: DHCP client, static IP, PPPOE: PPPOE parameter configuration, as shown in the figure below: Configure according to the example of the above figure, input the correct broadband dial account and password, and click "Save". Static address parameter configuration, as shown below: Configure according to the example above, and click "Save". DHCP client parameter configuration, as shown below: Configure according to the example above, and click "Save". 4.1.3 Break the line and restart After the disconnection restart function is enabled, the system will automatically perform PING operation on the IP address in the settings. The detection time is the cumulative packet loss time; the detection interval is how long for the PING function once; the IP address is the target address of the system for the PING function. If the PING pass IP address fails during the detection time period, the system will automatically restart the operation. 4.1.4 Break line detection After the disconnection detection function is enabled, the system will automatically operate the PING on the IP address in the settings. The detection time is the cumulative packet loss time; the detection interval is how long for the PING function once; the IP address is the target address of the system for the PING function. If the PING IP address is failed during the detection time limit, the system will automatically re-dial the operation. 4.1.2 LAN Configuration Local area network (Local Area Network, LAN) is a group of computers connected by multiple computers in a certain area. Routers can assign IP addresses to devices within the LAN, enabling them to communicate with each other and access the Internet. 4.1.3 DHCP Server DHCP (Dynamic Host Configuration Protocol, Dynamic Host Configuration Protocol) is a LAN network protocol using UDP protocol and has two main uses: automatically assigning IP addresses to the internal network or network service providers, and to users or internal network administrators as a means of central management of all computers. 1DHCP Server Configuration Used to set the DHCP server open or close, and DHCP gateway, starting address, lease duration, etc., generally open by default. 2DHCP List of clients Displays the device currently using the assigned address. 3DHCP Address Bind Specify the IP address according on its MAC address. 4.1.4 DTU The DTU setting is closed by default, and it is divided into two modes: server and client. 1DTU server Description of the Server Mode settings: DTU type: Server mode Agreement: Support for TCP, UDP. Port: The port number used by the server. Baud rate: Baud rate of the serial port, supported by: 9600,19200,38400,57600,115200. Data bit: Serial port data bit setting, supported by: 8,7,6,5. Stop bit: serial port stop bit setting, support: 1,2. Check bit: serial port check bit setting, support: None, Odd, Event, Mark, Space. Flow control: serial port flow control options, support: None, RTS / CTS, XON / XOFF. 2 DTU Client Description of the client-side mode setting Agreement: Support for TCP, UDP. IP address: the IP address or domain name of the server. Port: The port number used by the server. Baud rate: Baud rate of the serial port, supported by: 9600,19200,38400,57600,115200. Data bit: Serial port data bit setting, supported by: 8,7,6,5. Stop bit: serial port stop bit setting, support: 1,2. Check bit: serial port check bit setting, support: None, Odd, Event, Mark, Space. Flow control: serial port flow control options, support: None, RTS / CTS, XON / XOFF. Heartbeat interval: The heartbeat packet sends the heartbeat content to the server according to the time set by the heartbeat interval. Registration package: The DTU is sent once when it is connected to the server. Heartbeat packet: When there is no data sent by the serial port, the data will be sent to the server regularly to keep the link smooth. 4.1.5 Network detection tool Cooperate with the tester to monitor the line status of the whole network in real time, and take corresponding measures. 4.2 VPN VPN is for building a private dedicated network on a public network via the Internet. 'Virtuality" is a logical network. 4.2.1 PPTP settings PPTP (Point to Point Tunneling Protocol), namely, the point-to-point tunneling protocol. This protocol is a new enhanced security protocol developed on the basis of PPP protocol, supporting multi-protocol virtual private network (VPN), which can be enhanced by password authentication protocol (PAP), scalable authentication protocol (EAP) and other methods. It enables remote users to securely access enterprise networks by dialing into the ISP, through direct connection to Internet or other networks. PPTP Server Build the PPTP server As shown above: Open the PPTP server button and configure the PPTP virtual IP address field: User name: the name of the new user Password: Password for the new user Remote subnet: the local gateway IP of the PPTP client Subnet mask: Subnet mask of the PPTP client IP address: Virtual IP address assigned to the changed user PPTP Client In the figure below, click-new PPTP client in PPTP client to add a new PPTP connection. Click to see the following setting options: Name: The name of this client connection that can be customized. Server address: Fill in the address of the PPTP server here, which can be the domain name or the IP address. Username: User name to login PPTP Server Password: Password to log into PPTP Server. Remote Subnet: The network of the remote PPTP server Remote Net Mask: Subnet mask of remote PPTP server MPPE Encryption: Enable or disable Microsoft Point-to-Point Encryption MTU : Maximum Transmission Unit 4.2.2 L2TP The L 2 TP is an industry-standard Internet tunnel protocol, functioning roughly similar to the PPTP protocol, such as enabling the same encryption of network data streams. However, there are differences, such as PPTP requires IP network; L 2 TP requires packet point-to-point connection; PPTP uses single tunnel; L 2 TP uses multiple tunnel; L 2 TP provides Baotou compression and tunnel verification, while PPTP does not support. Create a new L 2 TP client connection In the figure below, click in the L 2 TP client-a new L 2 TP client to add a new L 2 TP connection. Click to see the following setting options: Name: The name of this client connection that can be customized. Server address: Fill in the address of the L2TP server here, which can be the domain name or the IP address. Username: User name to login L2TP Server Password: Password to log into L2TP Server. Local end IP: The network of the remote L2TP server Remote Net Mask: Subnet mask of remote L2TP server MTU : Maximum Transmission Unit 4.2.3 IPSEC The IPsec protocol works on the third layer of the OSI model, making it suitable to protect TCP or UDP-based protocols when used alone (such as the socket sublayer (SSL) cannot protect the UDP layer). This means that the IPsec protocol must deal with reliability and fragmentation issues compared to the transport layer or higher level, which also increases its complexity and processing overhead. In contrast, SSL / TLS relies on a higher level TCP (layer 4 of OSI) to manage reliability and sharding. 1Connect Status and Control Existing IPSEC connection status information is displayed here.In the figure below, click on the-new IPSEC connection in the IPSEC list to add a new IPSEC connection. Click to see the following setting options: Name: IKE policy name, use plain English or English numbers. Mode: Optional main mode, savage mode. IPSEC networking type: support network to network mode. Working mode: Optionally not enabled, active connection, automatic discovery, waiting for the connection. Local ID: IPSEC ID may not be set or set to pure English custom name. Local subnet: the local subnet address. Distal address: the IP address or domain name of the opposite-end IPSEC. Distal ID: the IPSEC ID name of the opposite end. Distal subnet: the opposite-end subnet address. IKE version: optional version IKEv 1 or IKEv 2. The IKE security policy: The IKE security policy needs to be added to the IKE security policy first. The IPSEC security policy: The IPSEC security policy needs to be added to the IPSEC security policy first. Tunnel Certification: Optional Mode IKE-PSK, IKE-XAUTH-PSK, NEVER. PSK: the PSK key for the IPSEC connection. DPD mode: optional none, clean, hold, restar. Note: Comments about this link. 2New IPSEC security policy In the figure below, click on the new IPSEC security policy in the IPSEC Security Policy to add a new IPSEC security policy. Click to see the following setting options: Name: IKE policy name, use plain English or English numbers. Agreement: Optional AH, ESP. AH validation algorithm: optional MD5, SHA 1. 3Add the IKE security policies In the figure below, click on the-new IKE security policy in the IKE security policy to add a new IKE security policy. Click to see the following setting options: Name: IKE policy name, use plain English or English numbers. Encryption algorithm: optional DES, 3 DES, AES128, AES192, AES256. Validation algorithm: select SHA 1, MD5. DH group: select DH 1, DH 2, DH 5, DH 14, DH 15, DH 16, DH 17, DH 18. IKE survival cycle: a minimum value of 1 hour. 4.2.4 GRE GRE (Generic Routing Encapsulation), the general routing encapsulation protocol, is the encapsulation of some network layer protocols (such as IP and IPX), enabling these encapsulated datagram to be transmitted in another network layer protocol (such as IP). GRE is the third layer tunnel protocol of VPN (Virtual Private Network), where a technology called Tunnel (tunnel) is used between the protocol layers. Existing GRE connection status information is displayed here. In the figure below, click on the-new GRE connection in the GRE to add a new GRE tunnel connection. Click to see the following setting options: Name: GRE tunnel name Tunnel address: the IP address of the GRE tunnel. Distal address: the IP address of the distal GRE connection. Distal subnet / mask: the subnet and mask of the distal GRE. Password: the connection password for the GRE tunnel The MTU value: the MTU value of the GRE tunnel. TTL: the TTL cycle of the GRE tunnel. 4.3 Firewall settings 4.3.1 Port mapping As shown in the figure: there are three routers: A, B (IR 1 equipment) and C, and U is the user end. A and U are in the same LAN, the IP address of A is 192.168.1.1, and the IP address of U is 192.168.1.56. B and C are in another LAN, IP addresses are 192.168.10.1,192.168.10.5. The WAN port of router B is connected to the LAN port of router A, and the WAN address is 192.168.1.55. The virtual server is defined as: user U accessing router B through A across the network, and router B automatically transfers the service request to the server (router) C. Here, the connection mode and setting of B are very important. The connection mode is required as follows: 1. B Connect to the external network with the WAN port. 2, B, connect C with the LAN port. Setting mode: Enter the setting interface of router B-firewall-commodity mapping, and the setting parameters are as follows: Among them, the external port can be filled in at will, and the internal port should be consistent with the corresponding service port of the server (router) C (port 80 is the WEB configuration interface port of the router C). Fill in according to the above content, and save it. Now, we connect to router A through the client U, and input: http: / / 192.168.10.100:9900 in the address bar, then the browser directly enters the Settings interface of router C. 4.3.2 DMZ settings DMZ is short for the English word "demilitarized zone", and the Chinese name is "isolation zone", also called "demilitarized zone". It is a buffer between the non-secure system and the security system to solve the problem that the external network access users cannot access the internal network server after installing the firewall. The buffer is located in a small network area between the enterprise internal network and the external network. In this small network area, you can place some necessary public server facilities, such as enterprise Web server, FTP server, and forum. On the other hand, through such a DMZ region, the internal network is more effectively protected. Because this kind of network deployment, compared to the general firewall scheme, for the attacker from the external network and another level. 4.4 System Settings 4.4.1 Management Settings Used to manage the router interface language and password security. 1Password setting Manage the router login password, save and restart the effective. 2Language settings Language Set up the Router page shows the type of language, including simplified Chinese and English. 4.4.2 Configuration management You can save the current configuration information locally, or import previous backup files locally. 4.4.3 Firmware Firmware Upgrade New firmware versions are posted at www..com and can be downloaded. If the Router is not experiencing difficulties, then there is no need to download amore recent firmware version, unless that version has a new feature that you want to use. 4.4.4 Reboot This item can set the timing restart of the device. You can schedule regular reboots for the router: Regularly after xxx Minutes. 5 FCC Warnning: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: · Reorient or relocate the receiving antenna. · Increase the separation between the equipment and receiver. · Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. · Consult the dealer or an experienced radio/TV technician for help. Caution: Any changes or modifications to this device not explicitly approved by manufacturer could void your authority to operate this equipment. This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator and your body.
References
Related FCC IDs:
- 2AVFN-FT205L - Leax Arkivator Telecom USA Inc. Industrial 4G Router [-FT205L] WPS 文字