all | frequencies |
|
|
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|---|---|
manual | photos | labels |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 2 |
|
UserManual | Users Manual | 1.21 MiB | September 09 2021 | |||
1 2 |
|
Internal Photos | Internal Photos | 2.10 MiB | September 09 2021 / March 08 2022 | delayed release | ||
1 2 |
|
External Photos | External Photos | 1.16 MiB | September 03 2021 / March 02 2022 | delayed release | ||
1 2 |
|
Labe Location | ID Label/Location Info | 409.69 KiB | September 03 2021 | |||
1 2 |
|
Label | ID Label/Location Info | 452.72 KiB | September 09 2021 | |||
1 2 |
|
ConfidentialityRequest | Cover Letter(s) | 518.42 KiB | September 09 2021 | |||
1 2 |
|
CoverLetter | Cover Letter(s) | 11.95 KiB | September 09 2021 | |||
1 2 |
|
RFExposure | RF Exposure Info | 334.97 KiB | September 09 2021 | |||
1 2 |
|
ShortTermConf | Cover Letter(s) | 519.50 KiB | September 09 2021 | |||
1 2 |
|
Agent Authorization Rev 1.0 | Cover Letter(s) | 12.17 KiB | September 03 2021 | |||
1 2 |
|
Difference Description | Cover Letter(s) | 202.36 KiB | September 03 2021 | |||
1 2 |
|
FCC Short & Long Term Confidentiality Request Rev4 | Cover Letter(s) | 140.20 KiB | September 03 2021 | |||
1 2 |
|
RF exposure report | RF Exposure Info | 338.93 KiB | September 03 2021 | |||
1 2 |
|
Test Repor | Test Report | 5.46 MiB | September 03 2021 | |||
1 2 |
|
Test Report | Test Report | 5.39 MiB | September 03 2021 | |||
1 2 |
|
Test Setup Photos | Test Setup Photos | 413.33 KiB | September 03 2021 |
1 2 | UserManual | Users Manual | 1.21 MiB | September 09 2021 |
InRouter305 Industrial Router
User Manual
Issue: V1.0— August, 2021
Declaration
permission of InHand.
Thank you for choosing our product. Before using the product, read this manual carefully.
The contents of this manual cannot be copied or reproduced in any form without the written
Due to continuous updating, InHand cannot promise that the contents are consistent with the
actual product information, and does not assume any disputes caused by the inconsistency of
technical parameters. The information in this document is subject to change without notice.
InHand reserves the right of final change and interpretation.
© 2020 InHand Networks. All rights reserved.
Conventions
Symbol
Indication
< >
Content in angle brackets “<>” indicates a button name. For example, the <OK> button.
""
>
'''' indicates a window name or menu name. For example, the pop-up window "New
User."
A multi-level menu is separated by the double brackets ">". For example, the
multi-level menu File > New > Folder indicates the menu item [Folder] under the
sub-menu [New], which is under the menu [File].
Cautions Means reader be careful. Improper action may result in loss of data or device damage.
Note
Notes contain detailed descriptions and helpful suggestions.
Add: 3900 Jermantown Rd., Suite 150, Fairfax, VA 22030 USA
Contact Us
E-mail: support@inhandneworks.com
T: +1 (703) 348-2988
URL: www.inhandnetworks.com
UL MARKINGS:
1.UL File:E364742、E509340.
2.Electrical ratings:Input: 9-36 Vdc, 0.1-0.2A. (Optional)
3.Model number:IR305
5.Ambient temperature range:-20 C to +70 C
6. Temperature class:T-5
7.Class I, Division 2, Groups A, B, C and D Hazardous Locations
UL INSTALLATION AND OPERATING INSTRUCTIONS:
1.These devices are open-type devices that are to be installed in an enclosure suitable for
the environment and where the internal compartment is only accessible by the use of tool.
2.“Suitable foruse in class 1, division 2, groups A, B, C and D hazerdous locations, or
nonhazardous locations only.”
3.Warning - explosion hazard - do not disconnect equipment while the circuit is live or
unless the area is known to be free of ignitable concentrations.
4.The unit shall be powered by a UL listed external AC adapter, output rated 9-36 VDC,
MIN-MUM: 0.1-0.2A, marked LPS or CLASS 2
Contents
I. INTRODUCTION................................................................................................................................. 1
1.1 OVERVIEW ................................................................................................................................... 1
1.2 PANEL INTRODUCTION ............................................................................................................. 1
1.3 LED INDICATION &SIGNAL ...................................................................................................... 2
1.4 RESET TO DEFAULT SETTINGS .......................................................................................................... 3
II. INSTALLATION ................................................................................................................................. 4
2.1 PREPARATIPNS ............................................................................................................................ 4
2.2 INSTALLATION ............................................................................................................................ 5
2.2.1 SIM/UIM Card ........................................................................................................................ 5
2.2.2 Antenna ................................................................................................................................... 5
2.2.3 Power Supply .......................................................................................................................... 5
2.3 LOGIN ROUTER ........................................................................................................................... 5
III. WEB CONFIGURATION .................................................................................................................. 7
3. 1 SYSTEM ....................................................................................................................................... 7
3.1.1 Basic Setup .............................................................................................................................. 7
3.1.2 System Time ............................................................................................................................ 7
3.1.3 Admin Access .......................................................................................................................... 8
3.1.4 System Log ........................................................................................................................... 10
3.1.5 Configuration Management ................................................................................................... 10
3.1.6 Schedule ................................................................................................................................ 11
3.1.7 Upgrade ................................................................................................................................. 12
3.1.8 Reboot ................................................................................................................................... 12
3.1.9 Logout ................................................................................................................................... 12
3.2 NETWORK .................................................................................................................................. 12
3.2.1 CELLULAR .......................................................................................................................... 12
3.2.2 WAN ...................................................................................................................................... 14
3.2.3 VLAN .................................................................................................................................... 17
3.2.4 Switch WLAN Mode ............................................................................................................ 18
3.2.5 WLAN Client (AP Mode) ..................................................................................................... 18
3.2.6 WLAN Client (STA Mode) ................................................................................................... 19
3.2.7 Link Backup .......................................................................................................................... 19
3.2.8 VRRP .................................................................................................................................... 20
3.2.9 IP Passthrough ....................................................................................................................... 21
3.2.10 Static Route ......................................................................................................................... 22
3.2.11 OSPF ................................................................................................................................... 22
3.3 SERVICE ...................................................................................................................................... 22
3.3.1 DHCP service ........................................................................................................................ 23
3.3.2 DNS ....................................................................................................................................... 23
3.3.3 DNS Relay ............................................................................................................................ 24
3.3.4 DDNS .................................................................................................................................... 25
3.3.5 Device Manager .................................................................................................................... 26
3.3.6 SNMP .................................................................................................................................... 27
3.3.7 SNMP Trap ............................................................................................................................ 29
3.3.8 I/O ......................................................................................................................................... 30
3.3.9 SMS ....................................................................................................................................... 30
3.3.10 Traffic Manager ................................................................................................................... 31
3.3.11 Alarm Settings ..................................................................................................................... 31
3.3.12 User Experience Plan .......................................................................................................... 32
3.4 FIREWALL .................................................................................................................................. 32
3.4.1 Basic ...................................................................................................................................... 32
3.4.2 Filtering ................................................................................................................................. 33
3.4.3 Content Filtering ................................................................................................................... 34
3.4.4 Port Mapping ......................................................................................................................... 34
3.4.5 Virtual IP Mapping ................................................................................................................ 35
3.4.6 DMZ ...................................................................................................................................... 35
3.4.7 MAC-IP Binding ................................................................................................................... 36
3.4.8 NAT ....................................................................................................................................... 36
3.5 QOS .............................................................................................................................................. 37
3.5.1 IP BW Limit .......................................................................................................................... 37
3.6 VPN .............................................................................................................................................. 37
3.6.1 IPSec Settings........................................................................................................................ 39
3.6.2 IPSec Tunnels ........................................................................................................................ 40
3.6.3 GRE Tunnels ......................................................................................................................... 41
3.6.4 L2TP Client ........................................................................................................................... 43
3.6.5 PPTP Client ........................................................................................................................... 45
3.6.6 OpenVPN .............................................................................................................................. 45
3.6.7 OpenVPN Advanced ............................................................................................................. 47
3.6.8 Certificate Management ........................................................................................................ 47
3.7 TOOLS ......................................................................................................................................... 48
3.7.1 PING ..................................................................................................................................... 49
3.7.2 Traceroute .............................................................................................................................. 49
3.7.3 Link Speed Test ..................................................................................................................... 49
3.7.4 TCPDUMP ............................................................................................................................ 50
3.8 APPLICATION ............................................................................................................................ 50
3.8.1 Smart ATM ............................................................................................................................ 50
3.8.2 Status Report ......................................................................................................................... 51
3.8.3 Smart-EMS ............................................................................................................................ 51
3.9 STATUS ........................................................................................................................................ 52
3.9.1 System ................................................................................................................................... 52
3.9.2 Modem .................................................................................................................................. 52
3.9.3 Traffic Statistics ..................................................................................................................... 52
3.9.4 Alarm ..................................................................................................................................... 53
3.9.5 WLAN ................................................................................................................................... 53
3.9.6 Network Connections ............................................................................................................ 53
3.9.7 Device Manager .................................................................................................................... 54
3.9.8 Route Table ........................................................................................................................... 54
3.9.9 Device List ............................................................................................................................ 54
3.9.10 Log ...................................................................................................................................... 54
3.9.11 Third Party Software Notices .............................................................................................. 55
APPENDIX A FAQ ................................................................................................................................ 56
APPENDIX B INSTRUCTION OF COMMAND LINE ....................................................................... 58
I. INTRODUCTION
1.1 OVERVIEW
The InRouter305 (IR305) is an IoT cellular router that integrates 4G LTE, Wi-Fi, and VPN
technologies to provide an easy, reliable, and secure Internet connectivity. With technologies such
as 4G wireless wide area network and Wi-Fi wireless local area network, it provides uninterrupted
multiple network access capabilities, and with its comprehensive security and wireless services, it
realizes up to 10 thousands equipment networking and provides high-speed data access for
equipment networking.
This product is suitable for the networking of unattended devices and sites. It is embedded with
watchdog and multi-layer link detection mechanisms to ensure reliable and stable communications.
The router can be deployed easily to build large scale networks scaling up to tens of thousands of
devices. Using our InHand Device Manager cloud platform, users can manage their network
The IR305 can be used in a wide range of industrial and commercial IoT applications, providing
efficiently.
an
option of good balance between cost and performance
1.2 PANEL INTRODUCTION
1
1.3 LED INDICATION &SIGNAL
ER305 指示灯
LED 灯状态和定义
PWR
Red off --- Power off
Steady in red --- Power on
Green off --- System error
SYS
Blink in Green --- System upgrading
Wi-Fi
Blink in Green --- Wi-Fi connecting
Steady in Green --- System working
Green off --- Wi-Fi disable
Steady in Green --- Wi-Fi working
Green off --- Network disconnected
NET
Blink in Green --- Network connecting
Steady in Green --- Network connected
2
1.4 Reset to default settings
until the SYS is steady on
2. Loosen the Reset button the SYS will off.
device will reset to default settings.
1. When the device is powered on, press the reset button immediately and keep it for 10 seconds
3. Immediately press and hold the Reset button, SYS will flash, then loosen the Reset button. Then
3
Please be sure there is 3G/4G network coverage and there is no shield on site. 220V AC or
9~36VDC shall be provided on site. First installation shall be done under direction of the engineer
II. INSTALLATION
2.1 PREPARATIPNS
Precautions:
recognized by InHand Networks.
1 PC
OS: Windows XP, Windows 7, Windows 10
CPU: PII 233 higher
Memory: 32M higher
Hard disk: 6.4G higher
Serial port: At least one
Ethernet port: At least one (10M/100M)
IE version: 10.0 higher
Resolution: 640*480 higher
1 or 2 SIM card:
Ensure the card is enabled with data service and its service is not suspended
because of an overdue charge.
Power supply:
220V AC: can be used with DC power of the device
9~36V DC: Ripple voltage < 100 mV
Fixation:
Please place InRouter on flat level and have it installed in an environment with
small vibrational frequency.
The device shall be installed and operated in powered-off status!
4
InRouter305 uses pop-up card holder. Stab the hollow at the left of the card holder and the card
holder will pop up. Then, install the SIM/UIM card and press the card holder back to the card slot.
Slightly rotate the movable part of metal SMA-J interface until it cannot be rotated (at this time,
external thread of antenna cable cannot be seen). Do not forcibly screw the antenna by holding
Upon installation of the antenna, connect the device to 9~36V DC power and see if the Power
LED on the panel of the device is on. If not, please contact technical support of InHand Networks
2.2 INSTALLATION
2.2.1 SIM/UIM Card
2.2.2 Antenna
black rubber lining.
2.2.3 Power Supply
immediately.
2.3 LOGIN ROUTER
Upon installation of hardware, be sure the Ethernet card has been mounted in the supervisory PC
prior to logging in the page of Web settings of the router.
I. Automatic Acquisition of IP Address (Recommended)
Please set the supervisory computer to "automatic acquisition of IP address" and "automatic
acquisition of DNS server address" (default configuration of computer system) to let the device
automatically assign IP address for supervisory computer.
II. Set a Static IP Address
Set the IP address of supervisory PC (such as 192. 168. 2. 2) and LAN interface of device in same
5
network segment (initial IP address of LAN interface of device: 192. 168. 2. 1, subnet mask: 255.
255. 255. 0).
III. Cancel the Proxy Server
If the current supervisory PC uses a proxy server to access the Internet, it is required to cancel the
proxy service. The operating steps are shown below: 1) In the browser window, select
"tools>>Internet options"; 2) select "connection" page and click the button of LAN Settings to
enter "LAN Settings" window interface. Please confirm if the option "Use a Proxy Server for
LAN" is checked; if it is checked, please cancel and click the button <OK>.
IV. Log in/Exit Web Settings Page
Open IE or other browser and enter IP address of InRouter305, such as http://192.168.2.1 in
address bar (default setting of InRouter305). Upon connection, log in from the login interface as
Admin, i.e. enter username and password at the login interface (user name /password default:
adm/123456).
For security, you are suggested to modify the default login password after the first login and
safe keep the password information.
6
III. WEB CONFIGURATION
The device need to be effectively configured before using. This chapter will introduce how to
configure your router via Web.
3. 1 SYSTEM
router can be customized.
3.1.1 Basic Setup
customized.
Here, system and network state and system time of synchronizing device and PC can be checked
and router WEB configuration interface language can be set as well as the name of mainframe of
Here, WEB configuration interface language can be set; name of mainframe of router can be
From the navigation tree, select System >> Basic Setup, then enter the “Basic Setup” page.
Table 3-1-1 Basic Setup Parameters
Basic settings
Function description: Select display language of the router configuration interface and set
personalized name.
Parameters
Description
Default
Language
Configure language of WEB configuration interface
Chinese
Host Name
Set a name for the host or device connected to the router
for viewing.
Router
3.1.2 System Time
To ensure the coordination between this device and other devices, user is required to set the
system time in an accurate way since this function is used to configure and check system time as
well as system time zone. System time is used to configure and view system time and system time
zone. It aims to achieve time synchronization of all devices equipped with a clock on network so
as to provide multiple applications based on synced time.
From the navigation tree, select System >> Time, then enter the “Time” webpage, as shown below.
7
Click <Sync Time> to synchronize the time of the gateway with the system time of the host.
Table 3-1-2 Parameters of System Time
System Time
Function description: Set local time zone and automatic updating time of NTP.
Parameters
Description
Default
Time of Router
Display present time of router
8:00:00 AM, 12/12/2015
PC Time
Timezone
Custom TZ String
Set TZ string of router
Set time zone of router
Display present time of PC
Present time
Auto update Time
Select whether to automatically update
time, you may select when startup or
every 1/2/...hours.
Custom
CST-8
Disable
3.1.3 Admin Access
Admin services include HTTP, HTTPS, TELNET, SSHD and HTTP API.
HTTP (Hypertext Transfer Protocol) is used for transferring web pages on Internet. After enabling
HTTP service on device, users can log on via HTTP and access and control the device using a web
HTTPS (Secure Hypertext Transfer Protocol) is the secure version of hypertext transfer protocol.
As a HTTP protocol which supports SSL protocol, it is more secure.
Telnet protocol provides telnet and virtual terminal functions through a network. Depending on
Server/Client, Telnet Client could send request to Telnet server which provides Telnet services.
The device supports Telnet Client and Telnet Server.
SSH protocol provides security for remote login sessions and other network services. The SSHD
service uses the SSH protocol, which has higher security than Telnet.
User can check router’s status and configure router without login the router remotely by sending
HTTP request with HTTP API. Please ask to technical support for more information about HTTP
8
HTTP
browser.
HTTPS
TELNET
SSHD
HTTP_API
API.
From the navigation tree, select System >> Admin Access, then enter “Admin Access” page.
Table3-1-3 Parameters of Admin Access
Admin Access
Function description:
1. Modify username and password of router.
2. The router may be set by the following 5 ways, i.e. http, https, telnet, SSHD and console.
3. Set login timeout.
Parameters
Default
Description
Username/Password
Username
Set name of user who logs in WEB configuration
Previous password access to WEB configuration
New password access to WEB configuration
Reconfirm the new password
adm
123456
N/A
N/A
Service Port Service port of
80/443/23/22/4444
Amin functions
HTTP/HTTPS/TELNET/SSHD/HTTP_API
Enable - Allow local LAN to administrate the router
with corresponding service (e.g. HTTP)
Disable - Local LAN cannot administrate the router with
corresponding service (e.g. HTTP)
Enable
Enable - Allow remote host to administrate the router
with corresponding service (e.g. HTTP)
Disable - Remote host cannot administrate the router
with corresponding service (e.g. HTTP)
Enable
Old
Password
New
Password
Confirm
New
Password
Local
Access
Remote
Access
Allowed
Access from
WAN
(Optional)
Set allowed access from WAN
The host
controlling service
at this moment can
be set, e.g.
192.168.2.1/30
or
192.168.2.1-192.1
68.2.10
Description
functions
For recording significance of various parameters of
admin
router
(without
configuration)
influencing
N/A
Console Login User (Click <new> button after setting a group of username and
9
Username
Configure console login user, custom
Password
Configure the password, custom
N/A
N/A
password)
Other Parameters
Log
Timeout
Set login timeout (router will automatically disconnect
the configuration interface after login timeout)
500 seconds
3.1.4 System Log
In “Username/Password” section, users can modify username and password rather than
create new username, i.e. only this username can be used in logins.
In “Console Login User” section, we can create multiple usernames, i.e. multiple
usernames can be used by serial port or TELNET console logins.
A remote log server can be set through “System Log Settings,” and all system logs will be
uploaded to the remote log server through the gateway. This makes remote log software, such as
Kiwi Syslog Daemon, a necessity on the host.
Kiwi Syslog Daemon is free log server software for Windows. It can receive, record and display
logs from host (such as gateway, exchange board and Unix host). After downloading and installing
Kiwi Syslog Daemon, it must be configured through the menus “File >> Setup >> Input >> UDP.
From the navigation tree, select System >> System Log, then enter “System Log” page.
Table 3-1-4
Parameters of System Log
System Log
Function description: Configure IP address and port number of remote log server which will
record router log.
Parameters
Description
Log to Remote System
Enable log server
Log server address and
port (UDP)
Set address and port of remote log server
Log to Console
Output device log by serial port
Default
Disable
N/A:
514
Disable
3.1.5 Configuration Management
Here you can back up the configuration parameters, import the desired parameters backup and
10
From the navigation tree, select System >> Config Management, then enter the “Config
reset the router.
Management” page.
Browse
Import
Backup
Restore default
configuration
Disable the
hardware reset
button
Modem drive
program
Table 3-1-5
Parameters of Configuration Management
Function description: Set parameters of configuration management.
Configuration Management
Parameters
Description
Default
Choose the configuration file
Import configuration file to router
Backup configuration file to host
Select to restore default configuration (effective after
rebooting)
Select to disable hardware reset button of the router
Disable
For configuring drive program of module
Network Provider
(ISP)
For configuring APN, username, password and other
parameters of the network providers across the world
N/A
N/A
N/A
N/A
N/A
N/A
Validity and order of imported configurations should be ensured. The good configs will later
be serially executed in order after system reboot. If the configuration files didn’t be arranged
according to effective order, the system won’t enter the desired state.
In order not to affect the operation of the current system, when performing an import
configuration and restore default configuration, users need to restart the device to make the
new configuration to take effect.
3.1.6 Schedule
After this function is enabled, the device will restart as the scheduled time.
From the navigation tree, select System >> Task Schedule, then enter “Task Schedule” page.
11
3.1.7 Upgrade
interrupted.
restart the device.
3.1.8 Reboot
be lost after reboot.
3.1.9 Logout
The upgrading process can be divided into two steps. In the first step, upgrading files will be
written in backup firmware zone, in the second step: files in backup firmware zone will be copied
to main firmware zone, which should be carried out during system restart. During software
upgrading, any operation on web page is not allowed, otherwise software upgrading may be
From the navigation tree, select System >> Upgrade, then enter the “Upgrade” page.
To upgrade the system, firstly, click <Browse> choose the upgrade file, secondly, click <Upgrade>
and then click <OK> to begin upgrade; thirdly, upgrade firmware succeed, and click <Reboot> to
Please save the configurations before reboot, otherwise the configurations that are not saved will
To reboot the system, please click the System>>Reboot, then click <OK>.
To logout, click System >> Logout, and then click <OK>.
3.2 NETWORK
3.2.1 CELLULAR
Insert SIM card and dial to achieve the wireless network connection function of router.
Click the “Network>>Dial Interface” menu in the navigation tree to enter the “Dial Interface”.
Table3-2-1-1 Parameters of Dialup/Cellular
Dialup/Cellular Connection
Function description: Configure parameters of PPP dialup. Generally, users only need to set
basic configuration instead of advanced options.
12
Parameters
Description
Default
Enable
Enable PPP dialup.
Time Schedule
Set time schedule
Shared
(NAT)
connection
Enable—Local device connected to Router
can access to the Internet via Router.
Disable—Local device connected to Router
cannot access to the Internet via Router.
Default Route
Enable default route
Network Provider (ISP)
For selecting network provider providing
service at present
Enable
ALL
Enable
Enable
Custom
APN (inapplicable
CDMA2000 series)
to
Mobile carrier provides relevant parameters
(subject to local carrier)
cmnet/uninet
Dialing Number
Relevant dialing parameters provided be
mobile carriers (subject to local carrier)
Username
Relevant dialing parameters provided be
mobile carriers (subject to local carrier)
Password
Relevant dialing parameters provided be
mobile carriers (subject to local carrier)
Network Type
Auto, 2G Only, 3G Only, 4G Only
Auto
Connection Mode
Optional always online, dial on demand,
manual dialing
Always Online
Redial Interval
Set the redialing time when login fails.
30 s
Show Advanced Options
Initial Commands
Set initial commands
PIN Code
MTU
For setting PIN code
Set max. transmission unit
Authentication method Optional: Auto, PAP, CHAP
Use Peer DNS
Click to receive peer DNS assigned by the
mobile carrier
Link detection interval
Set link detection interval
Debug
Enable debug mode
Debug Modem
Enable debug modem
AT
N/A
1500
Auto
Enable
55 s
Disable
Disable
ICMP Detection Mode
Ignore Traffic/ Monitor Traffic
Ignore Traffic
ICMP Detection Server Set
the
ICMP Detection Server. N/A N/A
13
Mobile,
“*99#”“*99***1#”
(China
China
Unicom)#777(Chin
a Telecom)
(China
China
(China
China
“gprs”
Mobile,
Unicom)
CARD(China
Telecom)
“gprs”
Mobile,
Unicom)
CARD(China
Telecom)
ICMP
Interval
ICMP
Timeout
represents not to enable ICMP detection.
Detection
Set ICMP Detection Interval
Detection
Set ICMP Detection Timeout (the detection
server will reboot if ICMP times out)
ICMP Detection Retries
Set the max. number of retries if ICMP fails
(redial if reaching max. times)
5
Dual SIM Enable
SIM2
Provider (ISP)
Network
Select current carrier
SIM2 Access Number
Please consult local carrier
SIM2 Username
SIM2 Password
SIM2 PIN Code
Please consult local carrier
Please consult local carrier
Set PIN code
SIM2 Authentication
Type
Select from: Auto, PAP, CHAP
Main SIM
Select from: SIM1, SIM2
Max Number of Dial
Number of redial after disconnect
30 s
20 s
Custom
Empty
Empty
Empty
Empty
Empty
Empty
5
CSQ Threshold
Min Connected Time
Set CSQ threshold (the router will switch to
another SIM if signal is below threshold).
Set min connected time (the router will switch
to another SIM if it’s more than min time).
0 (0: disabled)
0 (0: disabled)
able3-2-1-2 Parameters of Dialup/Cellular - Schedule
Administration of dialup/Cellular - Schedule
Function description: Online or offline based on the specified time.
Parameters
Description
Default
Name of Schedule
schedule 1
Sunday ~ Saturday
Click to enable
Set time range 1
Set time range 2
Set time range 3
Set description content
schedule1
9:00-12:00
14::00-18:00
0:00-0:00
N/A
Time Range 1
Time Range 2
Time Range 3
Description
3.2.2 WAN
Click the “Network>>WAN” to set WAN port.
WAN supports three types of wired access including static IP, dynamic address (DHCP) and
ADSL (PPPoE) dialing.
14
DHCP adopts Client/Server communication mode. Client sends configuration request to Server
which feeds back corresponding configuration information, including distributed IP address to the
Client to achieve the dynamic configuration of IP address and other information.
PPPoE is a point-to-point protocol over Ethernet. User has to install a PPPoE Client on the basis
of original connection way. Through PPPoE, remote access devices could achieve the control and
charging of each accessed user.
WAN of the device is disabled by default.
Click the “Network>>WAN” menu in the navigation tree to enter the “WAN" Interface.
Table 3-2-2-1 Static IP Parameters of WAN
WAN - Static IP
Function description: Access to Internet via wired lines with fixed IP.
Parameters
Description
Default
Shared connection (NAT)
Enable
Enable—Local device connected
to
Router can access to the Internet via
Router.
Disable—Local device connected
to
Router cannot access to the Internet via
Router.
Default route
Enable default route
Enable
00:18:05:08:07:3D
by
(provided
InHand Networks),
provided for device
manufacturer
192.168.1.29
255. 255. 255.
0
192. 168. 1. 1
MAC Address
MAC Address of the device
IP Address
Set IP address of WAN
Subnet mask
Set subnet mask of WAN
Gateway
MTU
IP Address
Subnet mask
Description
Set gateway of WAN
Max. transmission unit, default/manual
settings
default (1500)
Multiple IP support (at most 8 additional IP addresses can be set)
Set additional IP address of LAN
Set subnet mask
For recording significance of additional
IP address
N/A
N/A
N/A
Table 3-2-2-2 Dynamic Address (DHCP) Parameters of WAN
WAN - Dynamic Address (DHCP)
Function description: Support DHCP and can automatically get the address allocated by other
15
routers.
Parameters
Description
Default
Shared connection (NAT)
Enable
Enable—Local device connected
to
Router can access to the Internet via
Router.
Disable—Local device connected
to
Router cannot access to the Internet via
Router.
Default route
Enable default route
Enable
00:18:05:08:07:3D
(provided
by
InHand Networks),
provided for device
manufacturer
MAC Address
MAC Address of the device
MTU
Max. transmission unit, default/manual
settings
default (1500)
Table 3-2-2-3 ADSL Dialing (PPPoE) Parameters of WAN
Function description: Set ADSL dialing parameters.
WAN - ADSL Dialing (PPPoE)
Parameters
Description
Default
Shared connection
Enable
Enable—Local device connected
to
Router can access to the Internet via
Router.
Disable—Local device connected
to
Router cannot access to the Internet via
Router.
Default route
Enable default route
Enable
00:18:05:08:07:3D
by
(provided
InHand Networks),
provided for device
manufacturer
MAC Address
MAC Address of the device
MTU
Username
Password
Static IP
Max. transmission unit, default/manual
settings
default (1492)
WAN - ADSL Dialing (PPPoE)
Set name of dialing user
Set dialing password
Click to enable static IP
N/A
N/A
Disable
Connection Mode
Set dialing connection method (always
online, dial on demand, manual dialing)
Always online
16
Parameters of Advanced Options
Service Name
Set service name
Set length of transmit queue. Set length of transmit queue.
Enable IP header
compression
Use Peer DNS
Click to enable IP header compression
Disable
Click to enable use peer DNS
Enable
Link detection interval
Set link detection interval
Link detection Max. Retries
Set link detection max. retries
Enable Debug
Expert Option
Click to enable debug
Set expert options
ICMP Detection Server
Set ICMP detection server
ICMP Detection Interval
Set ICMP Detection Interval
ICMP Detection Timeout
Set ICMP detection timeout
ICMP Detection Retries
Set ICMP detection max. retries
N/A
3
55 s
10
N/A
N/A
30 s
20 s
3
Disable
3.2.3 VLAN
A virtual LAN (VLAN) comprises a group of logical devices and users. These devices and users
are not limited by physical locations, but can be organized base on functions, departments,
applications, and other factors. They communicate with each other as if they are in the same
network segment, which contributes to the name of VLAN.
Click “Network >> VLAN” to configure VLAN in router.
Table 3-2-3 VLAN Parameters
VLAN
Function description: Set VLAN parameters for LAN port.
Parameters
Description
Default
VLAN ID
Set VLAN ID
1
LAN1~LAN4
Primary
IP/Netmask
MAC
Enable
Set which LAN port to be a part of
VLAN
LAN1~LAN4 enabled
Set VLAN’s IP and netmask
192.168.2.1/255.255.255.0
Port mode
Device’s MAC address
Hardware MAC address
Able to configure Trunk mode after
enable
Enable
Speed Duplex
Set speed and duplex of LAN port
Auto Negotiation
Mode
Set LAN mode, Access or Trunk
Access
Native LAN
Traffic will not have VLAN tag if it is
1
17
transferred by native VLAN
3.2.4 Switch WLAN Mode
the router.
3.2.5 WLAN Client (AP Mode)
IR305 supports two types of WLAN mode: AP and STA
Click the “Network>>Switch WLAN Mode” menu in the navigation tree to set WLAN mode of
When working in AP mode, the device WLAN will provide network access point for other
wireless network devices so that they will have normal network communication.
Click the “Network>>WLAN” menu in the navigation tree to enter the “WLAN" interface.
Table 3-2-5 Parameters of WLAN Access Port
WLAN
Function description: Support WiFi function and provide wireless LAN access on site and
identity authentication of wireless user.
Parameters
Description
Default
SSID broadcast After turning on, use can search the WLAN via SSID name Enable
Six type for options: 802. 11g/n, 802. 11g, 802. 11n, 802.
11b, 802. 11b/g , 802. 11b/g/n
802.11b/g/n
Mode
Channel
SSID
Select the channel
SSID name defined by user
Authentication
method
Support open type, shared type, auto selection of WEP,
WPA-PSK, WPA, WPA2-PSK, WPA2, WPA/WPA2,
WPAPSK/WPA2PSK
Encryption
Support NONE, WEP
Wireless
bandwidth
Both 20MHz and 40MHz for selection
Enable WDS
Click to enable WDS
Default Route
Click to enable Route
Bridged SSID
Set bridged SSID
Bridged BSSID Set bridged BSSID
Scan
Click “Scan” to scan the available AP nearby
Auth Mode
Open type, shared type, WPA-PSK, WPA2-PSK
Open type
Encryption
Method
Support NONE, WEP
18
11
inhand
Open type
NONE
20MHz
Disable
Disable
None
None
None
3.2.6 WLAN Client (STA Mode)
When working in STA mode, the router can access the Internet by connecting to access point. The
Router need to reboot after this operation.
Click the “Network>>WLAN Client” menu in the navigation tree to enter the “WLAN” interface.
Select “Client” for the interface type and configure relevant parameters. (At this moment, the
dialing interface in the "Network>>Dialing Interface" should be closed.)
The scanning function of the SSID is enabled only when Client is selected as WLAN interface. In
the “SSID scanning” interface, all available SSID names as well as the connection status of the
device as Client will be displayed.
Table 3-2-6 Parameters of WLAN Client
WLAN Client
Function description: Support Wi-Fi function and access to wireless LAN as client.
Parameters
Description
Default
Support many modes
802.11b/g/n
including
802.11b/g/n
Name of the SSID to be connected
Keep consistent with the access point to be
connected
inhand
Open type
Keep consistent with the access point to be
connected
NONE
Authentication method
Mode
SSID
Encryption
3.2.7 Link Backup
Click the “Network>>Link Backup” in the navigation tree to configuration interface.
Table 3-2-7-1 Parameters of Link Backup
Link Backup
Function description: When the system runs, main link will first be enabled for communication.
However, when the main link is disconnected due to certain reason, the system will
automatically switch to the backup link to ensure normal communication.
Parameters
Description
Default
Enable
Main Link
Click to enable link backup
Optional WAN or dialing interface
ICMP Detection Server
Set ICMP detection server
ICMP Detection Interval
Set ICMP Detection Interval
Disable
WAN
N/A
10 s
19
ICMP Detection Timeout Set ICMP detection timeout
ICMP Detection Retries
Set ICMP detection max. retries
Backup Link
Optional dialup/cellular or WAN
Backup mode
Optional hot or cold backup
Table 3-2-7-2 Parameters of Link Backup - Backup Mode
Function description: Select the way of link backup.
Link Backup - Backup Mode
3 s
3
Dialup/Cellular
Connection
Hot backup
Description
Main link and backup Link keep online at the same time.
line will only be online when
the main
link
is
Backup
disconnected.
Parameters
Hot Backup
Cold Backup
3.2.8 VRRP
VRRP (Virtual Router Redundancy Protocol) adds a set of routers that can undertake gateway
function into a backup group to form a virtual router. The election mechanism of VRRP will
decide which router to undertake the forwarding task and the host in LAN is only required to
configure the default gateway for the virtual router.
VRRP will bring together a set of routers in LAN. It consists of multiple routers and is similar to a
virtual router in respect of function. According to the VLAN interface IP of different network
segments, it can be virtualized into multiple virtual routers. Each virtual router has an ID number
and up to 255 can be virtualized.
VRRP has the following characteristics:
Virtual router has an IP address, known as the Virtual IP address. For the host in
LAN, it is only required to know the IP address of virtual router, and set it as the
address of the next hop of the default route.
Host in the network communicates with the external network through this virtual
router.
A router will be selected from the set of routers based on priority to undertake the
gateway function. Other routers will be used as backup routers to perform the
duties of gateway for the gateway router in case of fault of gateway router, thus to
guarantee uninterrupted communication between the host and external network
20
Monitor interface function of VRRP better expands backup function: the backup function can be
offered when interface of a certain router has fault or other interfaces of the router are unavailable.
When uplink interface is Down or Removed, the router actively reduces its priority so that the
priority of other routers in the backup group is higher and thus the router with highest priority
becomes the gateway for the transmission task.
From navigation tree, select "Network >>VRRP" menu, then enter “VRRP” page.
Table 3-2-8 VRRP Parameters
VRRP
Function description: Configure parameters of VRRP.
Parameters
Description
Default
Enable VRRP-I Click to enable VRRP function
Disable
Group ID
Priority
Select ID of router group (range: 1-255)
1
Select a priority (range: 1-254)
20 (the larger the numerical
value, the higher the priority)
Set an advertisement interval.
Advertisement
Interval
Authentication
method
Virtual IP
Set a virtual IP
Select "None" or Password type
Monitor
VRRP-II
Set monitor
Set as above
3.2.9 IP Passthrough
60 s
N/A
N/A
Disable
None (a password is needed
when
is
selected)
password
type
IP penetration function distributes the address obtained by WAN port to the device at the lower
end of LAN port. When external access to the router downstream devices the router transmits data
to the downstream device. Click "Network >>IP Passthrough" menu, then enter “IP Passthrough”
page.
Table 3-2-9 IP Passthrough Parameters
IP Passthrough
Function description: LAN port device to obtain WAN port address, used for external access to
router downstream devices.
Parameters
Description
Default
21
IP Passthrough
Enable IP Passthrough
Disable
Mode
Select work mode(DHCP Dynamic/DHCP fix MAC) DHCP
FIX MAC
Set fix MAC address
DHCP lease
Set DHCP lease time and reacquired after expiration
120S
Dynamic
00:00:00:
00:00:00
3.2.10 Static Route
Static route needs to be set manually, after which packets will be transferred to appointed routes.
To set static route, click the "Network >> Static Route" menu in the navigation tree, then enter
“Static Route” interface.
Table 3-2-10 Static Route Parameters
Static Route
Function description: Add/delete additional static rote of router. Generally, it's unnecessary
for users to set it.
Description
Default
Set IP address of the destination
Subnet Mask
Set subnet mask of the destination
Set the gateway of the destination
Select LAN/CELLULAR/WAN/WAN(STA)
For recording significance of static route address (not
support Chinese characters)
255.
255.
255. 0
N/A
N/A
N/A
N/A
Parameters
Destination
Address
Gateway
Interface
Description
3.2.11 OSPF
The Open Shortest Path First (OSPF) protocol is a link-status-based internal gateway protocol
mainly used on large-scale networks
3.3 SERVICE
22
3.3.1 DHCP service
DHCP adopts Client/Server communication mode. Client sends configuration request to Server
which feeds back corresponding configuration information, including distributed IP address to the
Client to achieve the dynamic configuration of IP address and other information.
The duty of DHCP Server is to distribute IP address when Workstation logs on and ensure
each workstation is supplied with different IP address. DHCP Server has simplified some
network management tasks requiring manual operations before to the largest extent.
As DHCP Client, the device receives the IP address distributed by DHCP server after logging
in the DHCP server, so the Ethernet interface of the device needs to be configured into an
automatic mode.
“DHCP Service” page.
To enable the DHCP server, find the navigation tree, select Services >> DHCP Service, then enter
Table 3-3-1 Parameters of DHCP Service
DHCP Service
Function description: If the host connected with router chooses to obtain IP address
automatically, then such service must be activated. Static designation of DHCH
allocation could help certain host to obtain specified IP address.
Parameters
Enable DHCP
Description
Enable DHCP service and dynamically allocate
IP address
Default
Enable
IP Pool Starting Address
Set starting IP address of dynamic allocation
192.168. 2.2
IP Pool Ending Address
Set ending IP address of dynamic allocation
192.168.2.100
Lease
DNS
Set lease of IP allocated dynamically
Set DNS Server
Windows Name Server
Set windows name server.
Static designation of DHCH allocation (at most 20 DHCPs designated statically can be set)
Set a statically specified DHCP’s MAC address
(different from other MACs to avoid confliction)
Set a statically specified IP address
Set the hostname.
60 minutes
192.168.2.1
N/A
N/A
192.168.2.2
N/A
MAC Address
IP Address
Host
3.3.2 DNS
DNA (Domain Name System) is a DDB used in TCP/IP application programs, providing switch
23
between domain name and IP address. Through DNS, user could directly use some meaningful
domain name which could be memorized easily and DNS Server in network could resolve the
domain name into correct IP address. The device makes analysis on dynamic domain name via
Manually set the DNS, use DNS via dialing if it is empty. Generally, it needs to set only when
Click the “Service>>Domain Name Service” menu in the navigation tree to enter the “Domain
DNS.
static IP is used on the WAN port.
Name Service” interface.
Table 3-3-2 DNS Parameters
DNS (DNS Settings)
Function description: Configure parameters of DNS.
Parameters
Description
Default
Primary DNS
Secondary DNS
Set Primary DNS
Set Secondary DNS
0. 0. 0. 0
0. 0. 0. 0
3.3.3 DNS Relay
The device, as a DNS Agent, relays DNS request and response message between DNS Client and
DNS Server to carry out domain name resolution in lieu of DNS Client.
From navigation tree, select "Service>>DNS Relay" menu, then enter “DNS Relay” page.
Table 3-3-3 DNS Transfer Parameters
DNS Relay service
Function description: If the host connected with router chooses to obtain DNS address
automatically, then such service must be activated.
Parameters
Description
Default
Enable (DNS will be
when
available
DHCP
is
enabled.)
service
Enable DNS Relay
service
Click to enable DNS service
Designate [IP address <=> domain name] pair (20 IP address <=> domain name pairs can
be designated)
IP Address
Host
Description
Set IP address of designated IP address <=>
domain name
Domain Name
N/A
N/A
For recording significance of IP address <=> N/A
24
domain name
without disabling DHCP.
3.3.4 DDNS
When enabling DHCP, the DHCP relay is also enabled automatically. Relay cannot be disabled
DDNS maps user's dynamic IP address to a fixed DNS service. When the user connects to the
network, the client program will pass the host’s dynamic IP address to the server program on the
service provider’s host through information passing. The server program is responsible for
providing DNS service and realizing dynamic DNS. It means that DDNS captures user's each
change of IP address and matches it with the domain name, so that other Internet users can
communicate through the domain name. What end customers have to remember is the domain
name assigned by the dynamic domain name registrar, regardless of how it is achieved.
DDNS serves as a client tool of DDNS and is required to coordinate with DDNS Server. Before
the application of this function, a domain name shall be applied for and registered on a proper
website such as www. 3322. org.
InRouter305 DDNS service
types
include QDNS (3322)-Dynamic, QDNS(3322)-Static,
DynDNS-Dynamic, DynDNS-Static, DynDNS-Custom and No-IP.com.
To set DDNS, click the "Service >> Dynamic Domain Name" menu in the navigation tree, then
enter “Dynamic Domain Name” interface.
Table 3-3-4-1 Parameters of Dynamic Domain Name
Function description: Set dynamic domain name binding.
Dynamic Domain Name
Parameters
Description
Default
Current Address
Display present IP of router
N/A
Service Type
the domain name
service
Disable
Select
providers
25
Table 3-2-4-2 Main Parameters of Dynamic Domain Name
Enable function of dynamic domain name
Function description: Set dynamic domain name binding. (Explain with the configuration of
QDNS service type)
Parameters
Description
Default
QDNS (3322)-Dynamic
http://www.3322.org/
Disable
http://www.3322.org/
Service Type
URL
Username
Password
Host Name
Wildcard
MX
Backup MX
Force Update
User name assigned in the application
for dynamic domain name
Password assigned in the application for
dynamic domain name
Host name assigned in the application
for dynamic domain name
N/A
N/A
N/A
Enable wildcard character
Set MX
Enable backup MX
Enable force update
Disable
N/A
Disable
Disable
3.3.5 Device Manager
Inhand provides a software platform to manage devices. The device can be managed and operated
via software platform. For instance, the operating status of device can be checked, device software
can be upgraded, device can be restarted, configuration parameters can be sent down to device,
and transmitting control or message query can be realized on device via Device Manager.
Click the "Service>>Device Manager" menu in the navigation tree to enter the "Device Manager"
interface. It only supports three modes, i.e. “Device manager, InConnect Service, Custom”
DM: North American users should select Servicer address-----iot.inhandnetworks.com
Table 3-3-5 Device remote management platform
Device Manager - Only SMS
Function description: Configuration of device manager functions can connect the router to the
platform
Parameters
Description
Default
Disable
Device Manager
Enable
Service Type
Enable platform
Platform work mode:
Device Manager
InConnect Service
Custom
26
Server
Input address of server
Secure Channel
Enable Secure Channel
Ics.inhand.com.cn
Enable
3.3.6 SNMP
Network devices are usually sparsely-located on a network. It is time-consuming for the
administrator to configure and manage these network devices on site. In addition, if these devices
are from different vendors, each of which provides a suite of independent management interfaces
(for example, different command line interfaces), the workload of configuring the devices in
batches is huge. In this situation, traditional manual configuration method has the deficiencies of
high cost and low efficiency. The network administrator can use the Simple Network Management
Protocol (SNMP) to remotely configure and manage the devices and perform real-time monitoring
on them.
To run the SNMP protocol on a network, configure the NMS program on the management side
Figure 3-3-6 SNMP Topology
and SNMP agent on the managed devices.
By using SNMP:
The NMS can collect status information of the managed devices anytime and anywhere
through agents and remotely control these devices.
The agents can promptly report the current status and faults of managed devices to the NMS.
Currently, the SNMP agents support SNMPv1, SNMPv2c and SNMPv3. SNMPv1 and SNMPv2c
use community names for authentication; SNMPv3 uses user names and passwords for
authentication. Click "Service>>SNMP" menu to configure.
27
Table 3-3-6-1 SNMPv1 and SNMPv2c Parameters
Parameters
Enable
Description
Enable/disable the SNMP function.
Default
Disabled
Version
v1
low
simple networking and
Set the version of the SNMP protocol used to
manage the router. The versions of SNMPv1, v2c,
and v3 are available.
SNMPv1 is applicable to small-sized networks
with
security
requirements, or the secure and stable small
networks, such as campus networks and small
enterprise networks.
SNMPv2c is applicable to the medium- and
security
large-sized
requirements, or with good security (for example,
VPNs) but running many services, which may lead
to traffic congestion.
SNMPv3 is applicable to networks of various
sizes, especially the networks that have strict
security requirements and can be managed only by
authorized network administrators. For example,
SNMPv3 can be used if data between the NMS
and managed device is transmitted over a public
network.
networks with
low
Contact Information Fill in the contact information.
Location
Information
Community Management
Community Name
Fill in the location.
Empty
Empty
public and private
User-defined community name.
The community names of SNMPv1 and SNMPv2c
are the passwords used by the NMS to read and
write data on agents. This parameter must be set
the same on both agents and NMS.
Access Limit
MIB View
Access limit includes the MIB objects that can be
read only or read/written by the NMS.
Read-Only
Select the MIB objects that can be monitored and
managed by the NMS. Only the default view is
supported currently.
defaultView
Parameters Description
Default
Table 3-3-6-2 SNMPv3 Parameters
User Group Management
Groupname User-defined user group name. The length is 1 to 32 None
28
characters.
Security
Level
Read-only
View
Read-write
View
Inform
View
Select a security level for the group. The values include
NoAuth/NoPriv, Auth/NoPriv, and Auth/Priv.
NoAuth/NoPriv
Select the SNMP read-only view. Only the default view is
supported currently.
defaultView
Select the SNMP read-write view. Only the default view is
supported currently.
defaultView
Select the SNMP inform view. Only the default view is
supported currently.
defaultView
Usm Management
Username
User-defined user name. The length is 1 to 32 characters.
None
Groupname
The group to which a user is added must have been
configured in the user group management table.
None
Authenticati
on
Select an authentication mode. Three authentication modes
are available: MD5, SHA, and None. If you select None,
authentication is disabled.
Authenticati
on
Password
This parameter is available only when the authentication
mode is not None.
The length is 8 to 32 characters.
None
None
Select the encryption mode. The values are None, AES, and
DES.
None
This parameter is available only when the authentication
mode is not None.
The length is 8 to 32 characters.
None
Encryption
Encryption
Password
3.3.7 SNMP Trap
SNMP trap is a type of entrance. When this entrance is reached, the SNMP managed devices
actively notify the NMS, instead of waiting for the polling of NMS. On an SNMP-enabled
network, the agents on managed devices can report errors to the NMS anytime, without the need
of waiting for the polling of NMS. The errors are reported to the NMS through traps. Click
"Service>>SNMP Trap" menu to configure.
Table 3-3-7 SNMP Trap Configuration Parameters
Parameters
Trap SigLevel
Destination
Address
Description
Default
Set the trap signal threshold. When this threshold is reached, the
agent outputs logs to the NMS.
10
Fill in the IP address of the NMS.
None
29
Security Name
Fill in the community name for SNMPv1 or SNMPv2c, and fill in
the user name for SNMPv3. The length is 1 to 32 characters.
UDP Port
Fill in the UDP port number, ranging from 1 to 65535.
None
162
3.3.8 I/O
Click “Service >> I/O” in the navigation menu to check and configure I/O and relay of the device.
Table 3-3-8 I/O Parameters
I/O
Function description: Configuration I/O mode and relay of the device.
Parameters
Description
I/O mode
Set I/O mode, input or output
Relay configuration
Configure relay status
triggered
Report when relay triggers in some situation
Trigger edge
Set trigger edge of the relay
Relay Default
status
Input
report
3.3.9 SMS
Default
Output
ON
Disable
Falling
edge
SMS permits message-based reboot and manual dialing. Configure Permit to Phone Number and
click <Apply and Save>. After that you can send “reboot” command to restart the device or send
custom connection or disconnection command to redial or disconnect the device.
From navigation tree, select "Service>>SMS" menu, then enter “SMS” page.
Table 3-3-9 SMS Parameters
Short message
Function description: Configuration SMS function to manage the router in the form of SMS.
Parameters
Description
Enable
Click to enable backup DTU function
Status Query
Users define the English query instruction to inquire current
working status of the router.
Reboot
Users define the English query instruction to reboot the router. N/A
Default Policy
Select the manner of access processing.
Phone Number
Fill in accessible mobile number
SMS Access Control
Default
Disable
N/A
Accept
N/A
30
Action
Accept or block
Description
Describe SMS control.
Accept
3.3.10 Traffic Manager
Choose Services >> Traffic Manager to go to the "Traffic Manager" page.
Table 3-3-10 Traffic Manager - Basic Configuration Parameters
Traffic Manager
Function: Monitor and manage the traffic use of the router.
Parameters
Description
Enable
Click to enable the traffic manager function.
Default
Enabled
Alarm Threshold When the traffic volume used within a month reaches the
0
threshold, the router reports an alarm.
Disconnect
Threshold
When the traffic volume used within a month reaches the
threshold, the router tears down the network connection.
0
3.3.11 Alarm Settings
The alarm function allows you to learn router abnormalities in real time so that you can fix the
problems as early as possible. When an abnormality occurs, the router reports an alarm. You can
select system-defined abnormalities and choose an appropriate inform way to obtain the
abnormality information. All alarms are recorded in alarm logs to facilitate troubleshooting.
Based on types, the alarms are classified into system alarms and port alarms.
System alarm: reported when a system or environment error occurs.
Port alarm: reported when a network port error occurs.
In the Alarm Manager interface, you can perform the following operations:
Select your interested alarm types in the "Alarm Input" area.
Set the alarm notification method of the console in the "Alarm Output" area. The default
output method is log recording. After this function is configured, the system sends generated
alarms to the console.
Choose Services >> Alarm Manager to go to the "Alarm Manager" page.
Table 3-3-11 Alarm Manager Parameters
Alarm Manager
Function: Set your interested alarm types.
31
Parameters
System Service Fault
Memory Low
WAN Link-Up/Down
LAN Link-Up/Down
Dialup Up/Down
Traffic Disconnect Alarm
SIM/UIM Card Fault
Description
Click to enable the system service fault
alarming.
Default
Disabled
Click to enable the memory insufficiency
alarming.
Disabled
Click to enable the link up/down alarming
of the WAN port.
Disabled
Click to enable the link up/down alarming
of LAN ports.
Disabled
Click to enable the up/down alarming of the
dialing interface.
Disabled
Click to enable the traffic termination
alarming.
Click to enable the SIM/UIM card fault
alarming.
Disabled
Disabled
Disabled
Traffic Alarm
Click to enable the traffic alarming.
Signal Quality Fault
Click to enable the signal quality alarming. Disabled
Console
Click to enable alarm notification of the
console.
Disabled
3.3.12 User Experience Plan
InHand Networks’ User Experience Program is designed to improve the product user experience
and customer service quality. You can reject this program. Once you join this program, you
understand and agree to the following statements from InHand Networks.
User can disable or enable User Experience Plan in “Services >> User Experience Plan”
3.4 FIREWALL
The firewall function of the router implements corresponding control to data flow at entry
direction (from Internet to local area network) and exit direction (from local area network to
Internet) according to the content features of message (such as: protocol style, source/destination
IP address, etc. ) and ensures safe operation of router and host in local area network.
3.4.1 Basic
From the navigation tree, select Firewall >> Basic Setup, then enter the “Basic Setup” page.
Table 3-4-1 Firewall - Basic Setup Parameters
32
Basic Setup of Firewall
Function description: Set basic firewall rules.
Parameters
Description
Default Filter Policy
Select accept/block
Filter PING detection from Internet Select to filter PING detection
Filter Multicast
Defend DoS Attack
Select to filter multicast function
Select to defend DoS attack
Default
Accept
Disable
Enable
Enable
3.4.2 Filtering
It implements permission or prohibition of access for appointed data flow via configuration of
some matching rules so as to filter the network interface data. After message is received by port of
router, the field is analyzed according to the rule applied on the current port. And after the special
message is identified, the permission or prohibition of corresponding packet is implemented
To enable Access Control from the navigation tree, select Firewall >> Filtering, then enter
according to present strategy.
“Filtering” page.
Table 3-4-2 Filtering Parameters
Access Control of Firewall
Function description: Control the protocol, source/destination address and source/destination
port passing through network packet of the router to provide a safe intranet.
Parameters
Description
Enable
Protocol
Check to enable filtering.
Select all/TCP/UDP/ICMP
Source address Set source address of access control
Source Port
Set source port of access control
Set destination address
Set destination port of access control
Destination
Address
Destination
Port
Action
Log
Select accept/block
Click to enable log and the log about access control will be
recorded in the system.
Description
Convenient for recording parameters of access control
N/A
Default
Enable
ALL
0.0.0.0/0
Not
available
N/A
Not
available
Accept
Disable
33
3.4.3 Content Filtering
Configuration of mapping rules is generally used to disable access to network settings.
From navigation tree, select "Firewall>>Content Filtering" menu, then enter “Content Filtering”
page.
Enable
URL
Action
Log
Table 3-4-3 Content - Filtering Parameters
Filtering
Function description: Set settings of firewall related to filtering and generally set forbidden
URL.
Parameters
Description
Click to enable filtering
Set URL that needs to be filtered
Select accept/block
Click to write log and the log about filtering will be recorded
in the system.
Description
Record the meanings of various parameters of filtering
N/A
Default
Enable
N/A
Accept
Disable
3.4.4 Port Mapping
Port mapping is also called virtual server. Setting of port mapping can enable the host of extranet
to access to specific port of host corresponding to IP address of intranet.
To configure port mapping, go into the navigation tree, select "Firewall >> Port Mapping", then
enter “Port Mapping” page.
Table 3-4-4 Firewall - Port Mapping Parameters
Port Mapping (at most 50 port mappings can be set)
Function description: Configure parameters of port mapping.
Parameters
Description
Enable
Protocol
Source address
Service Port
Check to enable port mapping.
Select TCP/UDP/ICMP
Set source address of port mapping
Set service port number of port mapping
Internal Address
Set external address of port mapping
Internal Port
Set internal address of port mapping
Log
External
(optional)
Description
Click to enable log and the log about port mapping will
be recorded in the system.
address
Set external address/tunnel name of port mapping
N/A
For recording significance of each port mapping rule
N/A
34
Default
Enable
TCP
0.0.0.0/0
8080
N/A
8080
Disable
3.4.5 Virtual IP Mapping
Both router and the IP address of the host of intranet can correspond with one virtual IP. Without
changing IP allocation of intranet, the extranet can access to the host of intranet via virtual IP.
This is always used with VPN.
To configure virtual IP mapping, go into the navigation tree, select "Firewall >> Virtual IP
Mapping", then enter “Virtual IP Mapping” page.
Table 3-4-5 Firewall - Virtual IP Mapping Parameters
Virtual IP Address
Function description: Configure parameters of virtual IP address.
Parameters
Description
IP address of
Set virtual IP address of router
Range of source address
Set range of the external source IP addresses.
Default
N/A
N/A
Enable
N/A
N/A
Disable
Click to enable virtual IP address
Set virtual IP address of virtual IP mapping
Set real IP address of virtual IP mapping
Click to enable log and the log about virtual IP
address will be recorded in the system.
For recording significance of each virtual IP address
rule
N/A
Virtual
router
Enable
Virtual IP
Real IP
Log
Description
3.4.6 DMZ
After mapping all ports, extranet PC can access to all ports of internal device by DMZ settings.
From the navigation tree, select Firewall >> DMZ, then enter the “DMZ” page.
Table 3-4-6 Firewall - DMZ Parameters
DMZ
Function description: Configure DMZ settings.
Parameters
Description
Check to enable the DMZ.
Set address of DMZ Host
Range of Source Address Enter range of source address
Enable DMZ
DMZ Host
Interface
Select interface as DMZ: CELLULAR/WAN/VPN
Interface
Default
Disable
N/A
N/A
N/A
35
3.4.7 MAC-IP Binding
can have an access to outer net.
page.
If the default process in the basic setting of firewall is disabled, only hosts specified in MAC-IP
From the navigation tree, select Firewall >> MAC-IP Binding, then enter the “MAC-IP Binding”
Table 3-4-7 Firewall - MAC-IP Binding Parameters
MAC-IP Binding (at most 20 MAC-IP Bindings can be set)
Function description: Configure MAC-IP parameters.
Parameters
Description
MAC Address
Set the binding MAC address
Set the binding MAC address
IP Address
Description
For recording the significance of each MAC-IP
binding configuration
N/A
Default
00:00:00:00:00:00
192. 168. 2. 2
3.4.8 NAT
NAT is the network address translation function, including source address translation (SNAT) and
destination address translation (DNAT).
Source NAT refers to the communication between the internal network and the external network
when the destination address remains unchanged. Destination NAT refers to the translation of the
destination address of the internal network into the external network without changing the source
address when accessing the internal network.
Table 3-4-8 NAT Parameters
NAT
Function description: Configure parameters of NAT
Parameters
Description
Default
NAT
Type
Protocol
Souce NAT
Enable NAT
Set convert type
Select protocol
Set SNAT
Destination NAT
Set DNAT
Enable
SNAT
TCP
0.0.0.0/0 all
空 all
Destination address
The ip address of destination
0.0.0.0/0 all
Destination port
Convert the port of destination
空 all
36
Convert address
Convert the IP address of destination
0.0.0.0/0all
Convert port
Convert the port of destination
空 all
3.5 QoS
Some applications bring convenience to users, but they also take up a lot of network bandwidth.
To ensure all LAN users can normally get access to network resources, IP traffic control function
can limit the flow of specified host on local network. QoS provides users with dedicated
bandwidth and different service quality for different applications, greatly improving the network
service capabilities. Users can meet various requirements of different applications.
3.5.1 IP BW Limit
networks.
Bandwidth control sets a limit on the upload and download speeds when accessing external
From the navigation tree, select QoS >> Bandwidth Control, then enter the “IP BW Limit” page.
Table 3-5-1
Parameters of IP BW Limit
IP Bandwidth Limit
Function description: Configure parameters of IP bandwidth limit.
Parameters
Description
Enable
Click to enable IP bandwidth limit
Download bandwidth
Set download total bandwidth
Upload bandwidth
Set upload total bandwidth
Control port of flow
Select CELLULAR/WAN
Guaranteed Rate (kbit/s)
Set rate
Host Download Bandwidth
Click to enable
Set IP address
Select priority
Describe IP bandwidth limit
Enable
IP Address
Priority
Description
3.6 VPN
37
Default
Disable
100000kbit/s
100000kbit/s
CELLULAR
Enable
N/A
1000kbit/s
Medium
N/A
VPN is for building a private dedicated network on a public network via the Internet. "Virtuality"
is a logical network.
Two Basic Features of VPN:
Private: the resources of VPN are unavailable to unauthorized VPN users on the internet;
VPN can ensure and protect its internal information from external intrusion.
Virtual: the communication among VPN users is realized via public network which,
meanwhile can be used by unauthorized VPN users so that what VPN users obtained is
only a logistic private network. This public network is regarded as VPN Backbone.
Build a credible and secure link by connecting remote users, company branches, partners to the
network of the headquarters via VPN so as to realize secure transmission of data.
It is shown in the figure below:
Fundamental Principle of VPN
The fundamental principle of VPN indicates to enclose VPN message into tunnel with tunneling
technology and to establish a private data transmission channel utilizing VPN Backbone so as to
realize the transparent message transmission.
Tunneling technology encloses the other protocol message with one protocol. Also, encapsulation
protocol itself can be enclosed or carried by other encapsulation protocols. To the users, tunnel is
logical extension of PSTN/link of ISDN, which is similar to the operation of actual physical link.
38
Enterprise HeadquarterEmbranchmentCooperative PartnerVPNVPNVPNRemote Access3.6.1 IPSec Settings
A majority of data contents are Plaintext Transmission on the Internet, which has many potential
dangers such as password and bank account information stolen and tampered, user identity
imitated, suffering from malicious network attack, etc. After disposal of IPSec on the network, it
can protect data transmission and reduce risk of information disclosure.
IPSec is a group of open network security protocol made by IETF, which can ensure the security
of data transmission between two parties on the Internet via data origin authentication, data
encryption, data integrity and anti-replay function on the IP level. It is able to reduce the risk of
disclosure and guarantee data integrity and confidentiality and well as maintain security of service
transmission of users.
IPSec, including AH, ESP and IKE, can protect one and more date flows between hosts, between
host and gateway, and between gateways. The security protocols of AH and ESP can ensure
security and IKE is used for cipher code exchange.
IPSec can establish bidirectional Security Alliance on the IPSec peer pairs to form a secure and
interworking IPSec tunnel and to realize the secure transmission of data on the Internet.
From navigation tree, select VPN>>IPSec Settings, then enter “IPSec Settings” page.
Table 3-6-1 Parameters of IPSec Settings
IPSec settings
Function description: 1. Select whether to enable NATT, generally this is enabled, unless it is
confirmed that there is no NAT router in the network. In order to keep VPN
tunnel connected, NATT interval should be properly set.
2. Select whether to enable compression and debug mode.
Description
Default
Parameters
Enable NAT-Traversal
(NATT)
Keep alive time interval of
NAT
Click to enable NAT-Traversal
Set alive time interval of NAT
Enable Compression
Click to enable compression
Force NATT
Click to enable force NATT
Dynamic NATT Port
Click to enable dynamic NATT port
Enable
60 s
Enable
Disable
Disable
39
3.6.2 IPSec Tunnels
From navigation tree, select VPN>>IPSec Tunnels, enter "IPSec Tunnels" and click <add>.
Table 3-6-2 Parameters of IPSec Tunnels
IPSec Tunnels
Function description: Configure IPSec tunnels
Parameters
Description
Default
Show Advanced Options
Click to enable advanced options
Disable(open advanced
options after enabling)
Basic parameters
Tunnel Name
User defines tunnel name
IPSec_tunnel_1
Destination Address
Startup Modes
Set destination IP address or domain
name
0. 0. 0. 0
Select Auto Activated/Triggered by
Data/Passive/Manually Activated
Auto Activated
Restart WAN when failed
Click to enable
Negotiation Mode
IPSec Protocol (Advanced
Option)
Select main mode or aggressive
mode
Select ESP/AH
ESP
Enable
Main Mode
IPSec Mode
Option)
Select
mode
(Advanced
tunnel mode/transmission
Tunnel Mode
VPN over IPSec (Advanced
Option)
Select L2TP over IPSec/GRE over
IPSec/None
None
Tunnel Type
Select
Host-Host/Host-Subnet/Subnet-Host/
Subnet-Subnet
Local subnet address
Set local subnet IP address
Local Subnet Mask
Set local subnet mask
Subnet-Subnet
192. 168. 2. 1
255. 255. 255. 0
Peer Subnet Address
Set peer subnet IP address
0. 0. 0. 0
Peer Subnet Mask
Set remote netmask
255. 255. 255. 0
Phase I Parameters
IKE Strategy
IKE Life Cycle
Multiple strategies available
3DES-MD5-DH2
Set IKE life cycle
86400 s
Local ID Type
IP Address
Select IP address/User FQDN/FQDN
Fill in the ID according to the ID type
standard email
(USERFQDN
format)
is
Peer ID Type
Select IP address/User FQDN/FQDN
IP Address
Authentication method
Select shared key/digital certificate
Shared key
Key
Set IPSec VPN key
N/A
XAUTH Parameters (Advanced Option)
40
XAUTH Mode
XATUTH username
XATUTH password
Click to enable XAUTH mode
Disable
User defines XATUTH username
User defines XATUTH password
N/A
N/A
MODECFG
Click to enable MODECFG
Disable
Phase II Parameters
IPSec Strategy
IPSec Life Cycle
Multiple strategies available
3DES-MD5-96
Set IPSec life cycle
3600 s
Perfect Forward Secrecy
(PFS) (Advanced Option)
Select
2/Group 5
disable/Group
1/Group
Disable (this needs to
match the server)
Link Detection Parameters (Advanced Option)
DPD Interval
DPD Timeout
Set time interval.
Set the timeout for dropped packets.
180 s
ICMP Detection Server
Set ICMP detection server
ICMP Detection Local IP
Set ICMP detection local IP
ICMP Detection Interval
Set ICMP Detection Interval
ICMP Detection Timeout
Set ICMP detection timeout
ICMP Detection Retries
Set ICMP detection max. retries
60 s
N/A
N/A
60 s
5 s
10
3.6.3 GRE Tunnels
The security level of three encryption algorithms ranks successively: AES, 3DES, DES. The
implementation mechanism of encryption algorithm with stricter security is complex and slow
arithmetic speed. DES algorithm can satisfy the ordinary safety requirements.
Generic Route Encapsulation (GRE) defines the encapsulation of any other network layer protocol
on a network layer protocol. GRE could be used as the L3TP of VPN to provide a transparent
transmission channel for VPN data. In simple terms, GRE is a tunneling technology which
provides a channel through which encapsulated data message could be transmitted and
encapsulation and decapsulation could be realized at both ends. GRE tunnel application
networking shown as the following figure:
41
Along with the extensive application of IPv4, to have messages from some network layer protocol
transmitted on IPv4 network, those messages could by encapsulated by GRE to solve the
transmission problems between different networks.
In following circumstances GRE tunnel transmission is applied:
GRE tunnel could transmit multicast data packets as if it were a true network interface.
Single use of IPSec cannot achieve the encryption of multicast.
A certain protocol adopted cannot be routed.
A network of different IP address shall be required to connect other two similar networks.
GRE application example: combined with IPSec to protect multicast data
GRE can encapsulate and transmit multicast data in GRE tunnel, but IPSec, currently, could only
carry out encryption protection against unicast data. In case of multicast data requiring to be
transmitted in IPSec tunnel, a GRE tunnel could be established first for GRE encapsulation of
multicast data and then IPSec encryption of encapsulated message so as to achieve the encryption
transmission of multicast data in IPSec tunnel. As shown below:
42
From navigation tree, select VPN>>GRE Tunnels and enter "GRE Tunnels".
Table 3-6-3 Parameters of GRE Tunnels
2 GRE Tunnels
Function description: Configure GRE tunnels
Parameters
Description
Default
X NetworkX NetworkGRE TunnelEnterprise IntranetTelecommutingIP Multicast StreamsEnable
tun0
0. 0. 0. 0
0. 0. 0. 0
0. 0. 0. 0
0. 0. 0. 0
N/A
Disable
Enable
Name
Click to enable GRE
User defines name of GRE tunnel
Local visual IP
Set local virtual IP
Destination Address
Set remote IP address
Peer visual IP
Set peer virtual IP
Peer Subnet Address
Set peer subnet IP address
Peer Subnet Mask
Set remote netmask
255. 255. 255. 0
Key
NAT
Description
Configure the key of GRE tunnel
Click to enable NAT
For recording the significance of each GRE
tunnel configuration
N/A
3.6.4 L2TP Client
L2TP, one of VPDN TPs, has expanded the applications of PPP, known as a very important VPN
technology for remote dial-in user to access the network of enterprise headquarters.
L2TP, through dial-up network (PSTN/ISDN), based on negotiation of PPP, and could establish a
tunnel between enterprise branches and enterprise headquarters so that remote user has access to
the network of enterprise headquarters. PPPoE is applicable in L2TP. Through the connection of
Ethernet and Internet, a L2TP tunnel between remote mobile officers and enterprise headquarters
could be established.
L2TP-Layer 2 Tunnel Protocol encapsulates private data from user network at the head of L2 PPP.
No encryption mechanism is available, thus IPSes is required to ensure safety.
Main Purpose: branches in other places and employees on a business trip could access to the
network of enterprise headquarter through a virtual tunnel by public network remotely.
Typical L2TP network diagram is shown below:
43
From navigation tree, select VPN>>L2TP Client, enter "L2TP Client" and click <add>.
Table 3-6-4 Parameters of L2TP Client
3 L2TP Client
Function description: Configure parameters of L2TP client.
Parameters
Description
Click to enable L2TP client
Enable
Tunnel Name
L2TP Server
Username
Password
Server Name
Startup Modes
User defines tunnel name of L2TP client
L2TP_tunnel_1
Set L2TP Server address
Set server's username
Set server's password
Set server name
Select Auto Activated/Triggered
Data/Passive/Manually
Activated/L2TPOverIPSec
by
Auto Activated
Authentication Method
Select CHAP/PAP
Enable Challenge secrets
Click to enable challenge secrets
CHAP
Disable
Challenge
enabling)
secret
(after
Set challenge secret
Local IP Address
Set local IP address
Remote IP Address
Set remote IP address
Remote Subnet
Set remote subnet address
Remote Netmask
Set remote subnet mask
Link Detection Interval
Set link detection interval
for Link
Set the max. number of retries
Max. Retries
Detection
Enable NAT
MTU
MRU
Click to enable NAT
Set max. transmission unit
Set max. receiving unit
44
Default
Disable
N/A
N/A
N/A
l2tpserver
255.
255. 0
255.
N/A
N/A
N/A
N/A
60 s
5
Disable
1500
1500
RADIUS ServerRADIUS ServerEnterprise BranchDialling UserEnterprise HeadquarterMobile Office Staff (L2TP Dialling Software)L2TP TunnelL2TP TunnelEnable Debug
Expert
recommended)
Option
(not
Enable debug mode.
Disable
Set expert option, not recommended
N/A
3.6.5 PPTP Client
From navigation tree, select VPN>>PPTP Client, enter "PPTP Client" and click <add>.
Table 3-6-5 Parameters of PPTP Client
4 PPTP Client
Authentication method
Select Auto/CHAP/PAP/MS-CHAPv1/MS-CHAPv2
Function description: Configure parameters of PPTP client.
Parameters
Description
Enable
Click to enable PPTP client
Tunnel Name
User defines tunnel name
PPTP Server
Set PPTP Server address
Username
Password
Startup Modes
Set username of PPTP server
Set password of PPTP server
Select Auto Activated/Triggered by
Data/Passive/Manually Activated
Local IP Address
Set local IP address
Remote IP Address
Set remote IP address
Remote Subnet
Set remote subnet address
Remote Netmask
Set remote subnet mask
Link Detection Interval Set link detection interval
Max. Retries for Link
Detection
Set the max. number of retries
Enable NAT
Enable MPPE
Enable MPPC
MTU
MRU
Click to enable NAT
Click to enable MPPE
Click to enable MPPC
Set max. transmission unit
Set max. receiving unit
Enable Debug
Enable debug mode.
Set expert option (not
recommended)
Set expert option, not recommended
3.6.6 OpenVPN
Default
Disable
PPTP_tun
nel_1
Auto
Activated
N/A
N/A
N/A
Auto
N/A
N/A
N/A
255. 255.
255. 0
60 s
5
Disable
Disable
Disable
1500
1500
Disable
N/A
Single point participating in the establishment of VPN is allowed to carry out ID verification by
45
preset private key, third-party certificate or username/password. OpenSSL encryption library and
SSLv3/TLSv1 protocol are massively used.
In OpenVPN, if a user needs to access to a remote virtual address (address family matching virtual
network card), then OS will send the data packet (TUN mode) or data frame (TAP mode) to the
visual network card through routing mechanism. Upon the reception, service program will
receive and process those data and send them out through outer net by SOCKET, owing to which,
the remote service program will receive those data and carry out processing, then send them to the
virtual network card, then application software receive and accomplish a complete unidirectional
transmission, vice versa.
From navigation tree, select "VPN>>OpenVPN", then enter “OpenVPN” page, and click <Add>.
Table 3-6-6 IPSec Configuration Parameters
OpenVPN
Function description: Configure OpenVPN parameters.
Parameters
Description
Default
OpenVPN tunnel name, cannot be changed by
the system
OpenVPN_T_
1
Tunnel Name
Enable
Mode
Protocol
Port
Click to enable
Client/server
UDP/ICMP
Set port
OPENVPN Server
Set OPENVPN Server address
Authentication method
N/A, pre-shared key, username/password,
digital certificate (multiple client), digital
certificate, username+digital certificate
Local IP Address
Set local IP address
Remote IP Address
Set remote IP address
Remote Subnet
Set remote subnet address
Remote Netmask
Set remote subnet mask
Link Detection Interval
Set link detection interval
Link Detection Timeout
Set link detection timeout
Enable NAT
Enable LZO
Click to enable NAT
Click to enable LZO compression
Encryption Algorithms
Blowfish(128)/DES(128)/3DES(192)/AES(12
8)
/AES(192)/AES(256)
Blowfish(128)
MTU
Set max. transmission unit
Max. Fragment Size
Set max. fragment size
46
Enable
Client
UDP
1194
N/A
N/A
N/A
N/A
N/A
255.
255. 0
60 s
305 s
Enable
Enable
1500
N/A
255.
Error/warning/information/debug
Warning
Debug Level
Interface Type
Expert
recommended)
Option
(not
TUN/TAP
Set expert option, not recommended
TUN
N/A
3.6.7 OpenVPN Advanced
From navigation tree, select "VPN>>OpenVPN Advanced" and enter "OpenVPN Advanced"
interface.
Table 3-6-7 Configuration Parameters of OpenVPN Advanced
OpenVPN Advanced
Function description: Configure parameters of OpenVPN Advanced.
Parameters
Enable Client-to-Client
(Server Mode Only)
Description
Default
Click to enable
Disable
Enable
Click to enable client management
Enable
Client Management
Tunnel Name
Set tunnel name
Username/CommonName
Set username/commonname
Password
Set client password
Client IP (4th byte must be
4n+1)
Set client IP address
Local Static Route
Set local static route
Remote Static Route
Set remote static route
3.6.8 Certificate Management
From navigation tree, select VPN >> Certificate Management, then enter “Certificate
Management” page.
Table 3-6-8 Parameters of Certificate Management
Certificate Management
Function description: Configure parameters of certificate management.
Description
Default
Parameters
SCEP
(Simple
Enrollment
Enable
Certificate
Protocol)
Protect Key
Click to enable
Set protect key
Protect Key Confirm
Confirm protect key
47
OpenVPN_T_
1
N/A
N/A
N/A
N/A
N/A
Disable
N/A
N/A
Enable SCEP (Simple Certificate Enrollment Protocol)
Force to Re-enroll
Click to enable force to re-enroll
Disable
The system is "ready to refile an enrollment",
cannot be changed
Ready to refile
an enrollment
Request Status
Server URL
Common Name
FQDN
Unit 1
Unit 2
Domain
Set server URL
Set common name
Set FQDN
Set unit 1
Set unit 2
Set domain
Serial Number
Challenge
Set serial number
Set challenge
Challenge Confirm
Challenge confirm
Protect Key
Set protect key
Protect Key Confirm
Confirm protect key
Unstructured address
Set unstructured address
RSA Key Length
Set RSA key length
Poll Interval
Poll Timeout
Set poll interval
Set poll timeout
Import/Export Certificate
Import CA Certificate
Manually import local CA to the router
Export CA Certificate
Manually export CA to local computer
Manually import CRL to the router
Manually export CRL to local computer
Manually import Public Key Certificate to the
router
Manually export Public Key Certificate to
local computer
Manually import Private Key Certificate to
the router
Manually export Private Key Certificate to
local computer
Manually import PKCS12 to the router
Manually export PKCS12 to local computer
Import CRL
Export CRL
Import Public Key
Certificate
Export Public Key
Certificate
Import Private Key
Certificate
Export Private Key
Certificate
Import PKCS12
Export PKCS12
3.7 TOOLS
Note: When using certificate, please make sure the time of the router is sync with real time.
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
1024
60 s
3600 s
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
48
3.7.1 PING
Detection” page.
To do a ping, enter the navigation tree, select Tools>>Ping Detection, then enter the “Ping
Table 3-7-1
PING Detection Parameters
1 PING Detection
Function description: PING outside network.
Parameters
Description
Default
Host
PING Count
Packet Size
Expert Option
Address of the destination host of PING
detection is required.
Set the PING count
N/A
4
Set the size of PING detection
32 bytes
Advanced parameter of PING
available.
is
N/A
3.7.2 Traceroute
“Traceroute” page.
To perform traceroute, select "Tools>>Traceroute" menu in the navigation tree, then enter the
Table 3-7-2 Traceroute Parameters
Traceroute
Function description: Applied for network routing failures detection.
Parameters
Description
Default
Host
Max. Hops
Timeout
Protocol
Expert Option
Address of the destination host which to
be detected is required.
Set the max. hops for traceroute
Set the timeout of traceroute
ICMP/UDP
Advanced parameter for traceroute is
available.
N/A
20
3 s
UDP
N/A
3.7.3 Link Speed Test
Enter the navigation tree, select “Tools>>Link Speed Test”, then enter the “Link Speed Test” page.
49
3.7.4 TCPDUMP
Enter the navigation tree, select “Tools>>TCPDUMP”, then enter the TCP dump page.
Table 3-7-4 TCPDUMP Parameters
TCPDUMP
Function description: Capture the packet transferring through specific interface
Parameters
Description
Default
Interface
Select the interface to capture the packet ANY
Capture number
Stop TCP dump after capture
number of packets
this
10
Expert Option
Advanced parameter for TCPDUMP
N/A
3.8 APPLICATION
3.8.1 Smart ATM
configuration about ATM platform.
Select Application >> Smart ATM, then enter the “Smart ATM” page. You can set the
Table 3-8-1
Smart Parameters
Smart ATM
Function description: configure parameters for docking intelligent ATM cloud platform
Parameters
Description
Smart ATM
Enable Smart ATM
Default
disable
Configure parameters of server,Click
Edit to show more information
iot.inhand.com.cn
Enable SSL proxy
Enable proxy of SSL
Multi Server
Click add to set multi server
Configure listener protocol type standard
1/3,Visa Standard 3
Standard 1/3
Server
Protocol
TLS Encryption
Enable TLS encryption
Get TID
Matching TID
Incoming TCP Port
Set TCP Port of inbound direction
Outgoing IP/Host
Set IP/Host name of outbound direction N/A
Outgoing TCP Port
Set TCP Port of outbound direction
Outgoing Backup TCP Port
Set Backup TCP Port of outbound
direction
Outgoing TCP Source Port
Set TCP Source port of outbound 0 (All)
diable
N/A
Enable
Disable
N/A
N/A
N/A
50
direction
3.8.2 Status Report
configuration about Status Report.
Select Application >> Status Report, then enter the “Status Report” page. You can set the
Table 3-8-2 Smart Report Parameters
Status Report
Function description: Monitor device status and Report to cloud platform
Parameters
Description
Default
Enable status upload service
Disable
Status info Upload Interval Time of upload interval
60 second
Status Report
Server
Server Port
Username
User Password
Protocol
Log Enable
HTTP API
Show
settiong
Set server name
Set server port
Set user name
Set user password
Monitor protocol type
Enable log
Enable HTTP API
router
report args
Setting status upload message
Router hostname
show router name
Router serial number
Show router serial number
Cellular ip address
Show cellular ip address
Signal strength
Show signal strength
Terminal ID
MNC、MCC、Cell ID、LAC
Uptime
Show terminal ID
Show MNC 、 MCC 、 Cell ID 、 LAC
Uptime
Current firmware version
Show current firmware version
Timestamp
Advice config
Show timestamp
Set advance config
N/A
N/A
test
test
TCP
Close
OPEN
Disable
Disable
Enable
Enable
Enable
Disable
Disable
Disable
Disable
N/A
Select Application >> Smart-EMS, then enter the “Smart-EMS” page. You can set the
3.8.3 Smart-EMS
configuration about Smart-EMS.
51
Table 3-8-3 Smart-EMS Parameters
Smart-EMS
Function description: configure parameters for docking intelligent Smart-EMS cloud platform
Parameters
Description
Default
Server URL
Username
Password
Fill in server address
Fill in user name
Fill in user password
Contact interval
Set time of contacting interval
Send running config
Enable send run configuration
Write startup
Enable write startup
N/A
N/A
N/A
N/A
Disable
Disable
3.9 STATUS
3.9.1 System
3.9.2 Modem
From navigation tree, select Status >> System, then enter the “System” page.
This page displays system statistics, including name, model, serial number, description, current
version, current Bootloader version, router time, PC time, UP time, CPU load and memory
consumption. Technicians may click the <Sync Time> button to synchronize the router with the
system time of the host, as covered in the set-up chapter.
From navigation tree, select Status >> Modem, then enter the “Modem” page.
This page displays the basic information of dialup, including status, signal level, register status,
IMEI (ESN) code, IMSI code, LAC and cell ID.
Click Status >> Modem, then enter the “Modem” page to configure parameters.
3.9.3 Traffic Statistics
Choose Status >> Traffic Statistics to go to the "Traffic Statistics" page to query traffic statistics.
This page displays the traffic statistics on the dialing interface, including the statistics on the
traffic received in the latest month, traffic transmitted in the latest month, traffic received on the
52
last day, traffic transmitted on the last day, traffic received in the last hour, and traffic transmitted
in the last hour.
3.9.4 Alarm
Choose Status >> Alarm to go to the "Alarm" page to view all alarms generated in the system
since power-on. You can clear or confirm the alarms.
The alarms have the following states:
Raise: indicates that the alarm has been generated but not been confirmed.
Confirm: indicates that the alarm cannot be solved currently.
All: indicates all generated alarms.
The alarms are classified into the following levels:
EMERG: The device undergoes a serious error that causes a system reboot.
CRIT: The device undergoes an unrecoverable error.
WARN: The device undergoes an error that affects system functions.
NOTICE: The device undergoes an error that affects system performance.
INFO: A normal event occurs.
3.9.5 WLAN
Choose Status >> WLAN to go to the "WLAN" page to query the WLAN connection status.
This page displays the WLAN connection information, including channel, SSID, BSSID, security,
signal (%), mode, and status.
3.9.6 Network Connections
From navigation tree, select Status >> Network Connections, then enter “Network Connections”
page to see the connections status.
This page shows the basis information of dialup and LAN.
WAN includes MAC address, connection type, IP address, netmask, gateway, DNS, MTU, Status
53
Dialup includes connection type, IP address, netmask, gateway, DNS, MTU, status and connection
LAN includes connection type, MAC address, IP address, netmask, gateway, MTU and DNS.
and etc.
time.
3.9.7 Device Manager
From navigation tree, select Status >> Device Manager, then enter “Device Manager” page to
check the connections status between router and Device Manager.
From navigation tree, select Status >> Route Table, then enter “Route Table” page to see router
This page displays the active route table, including destination, netmask, gateway, metric and
From navigation tree, select Status >> Device List, then enter “Device List” page to inquire the
This page displays the device list, including interface, MAC address, IP address, host and lease
(click MAC address to link to IEEE to inquire validity of the address).
From navigation tree, select Status >> Log, then enter “Log” page.
This page displays the logs, including select to see the number of log lines (20/50/....../all), log
level (information, debug and warning), time, module and content. Clear log, download log file,
download system diagnosis record (refresh rate of this page is 5/10/…... 1min by default)
54
3.9.8 Route Table
status.
interface.
device list.
3.9.9 Device List
3.9.10 Log
3.9.11 Third Party Software Notices
From navigation tree, select Status >> Third Party Software Notices, then enter “Third Party
Software Notices” page to check the third party software used in router system.
55
Appendix A FAQ
1. InRouter is powered on, but can't access Internet through it?
Please first check:
Whether the InRouter is inserted with a SIM card.
Whether the SIM card is enabled with data service, whether the service of the SIM card
is suspended because of an overdue charge.
Whether the dialup parameters, e.g. APN, dialup number, username and password are
correctly configured.
Whether the IP Address of your computer is the same subnet with InRouter and the
gateway address is InRouter LAN address.
2. InRouter is powered on, have a ping to detect InRouter from your PC and find packet loss?
Please check if the network crossover cable is in good condition.
3. Forget the setting after revising IP address and can't configure InRouter?
Method 1: connect InRouter with serial cable, configure it through console port.
Method 2: Within 5 seconds after InRouter is powered on, press and hold the Restore button
until the ERROR LED flashes, then release the button and the ERROR LED
should goes off, press and hold the button again until the ERROR LED blinks 6
times, the InRouter is now restored to factory default settings.
4. After InRouter is powered on, it frequently auto restarts. Why does this happen?
You may configure it now.
First check:
Whether the module works normally.
Whether the InRouter is inserted with a SIM card.
Whether the SIM card is enabled with data service, whether the service of the SIM
card is suspended because of an overdue charge.
Whether the dialup parameters, e.g. APN, dialup number, username and password
are correctly configured.
Whether the signal is normal.
Whether the power supply voltage is normal.
5. Why does upgrading the firmware of my InRouter always fail?
Examination:
segment.
When upgrading locally, check if the local PC and InRouter are in the same network
When upgrading remotely, please first make sure the InRouter can access Internet.
6. After InRouter establishes VPN with the VPN server, your PC under InRouter can connect to
the server, but the center can't connect to your PC under InRouter?
Please make sure the firewall of your computer is disabled.
7. After InRouter establishes VPN with the VPN server, your PC under InRouter can't connect to
56
the server ping?
Please make sure “Shared Connection” on “Network=>WAN” or “Network=>Dialup” is enabled
in the configuration of InRouter.
8. InRouter is powered on, but the Power LED is not on?
Check if the protective tube is burn out.
Check the power supply voltage range and if the positive and negative electrodes are
correctly connected.
9. InRouter is powered on, but the Network LED is not on when connected to PC?
When the PC and InRouter are connected with a network cable, please check whether a
network crossover cable is used.
Check if the network cable is in good condition.
Please set the network card of the PC to 10/100M and full duplex.
10. InRouter is powered on, when connected with PC, the Network LED is normal but can't have a
ping detection to the InRouter?
Check if the IP Address of the PC and InRouter are in the same subnet and the gateway
address is InRouter LAN address.
11. InRouter is powered on, but can't configure through the web interface?
Whether the IP Address of your computer is the same subnet with InRouter and the
gateway address is InRouter LAN address.
Check the firewall settings of the PC used to configure InRouter, whether this function
is shielded by the firewall.
Please check whether your IE has any third-party plugin (e.g. 3721 and IEMate). It is
recommended to configure after unloading the plugin.
12. The InRouter dialup always fails, I can't find out why?
Please restore InRouter to factory default settings and configure the parameters again.
13. How to restore InRouter to factory default settings?
The method to restore InRouter to factory default settings:
1. Press and hold the Restore button, power on InRouter;
2. Release the button until after the STATUS LED flashes and the ERROR LED is on;
3. After the button is released, the ERROR LED will go off, within 30s press and hold
the Restore button again until the ERROR LED flashes;
4. Release the button, the system is now successfully restored to factory default
settings.
57
Appendix B Instruction of Command Line
1 Help Command
Help command can be obtained after entering help or “?” into console, “?” can be entered at
any time during the process of command input to obtain the current command or help from
command parameters, and command or parameters can be automatically complemented in case of
only command or command parameter.
1.1 Help
[Command] Help [<cmd>]
[Function] Get help from command.
<cmd>
command name
[View] All views
[Parameter]
[Example]
Enter:
help
enter:
help show
2 View Switchover Command
2.1 Enable
[Command] Enable [15 [<password>]]
[Function] Switchover to privileged user level.
[View] Ordinary user view.
Get the list of all current available command.
Switchover to super users and the password 123456.
inputting will be given in case of no entering.
[Example]
Enter exit in ordinary user view:
enable 123456
2.2 Disable
[Command] Disable
[Function] Exit the privileged user level.
[View] Super user view, configure view
[Parameter] No
[Example]
58
Display all the parameters of show command and using instructions thereof.
[Parameter]15
User right limit level, only supports right limit 15 (super users) at current.
<password> Password corresponded to privileged user limit level, hint of password
[Function] Exit the current view and return to the last view (exit console in case that it is ordinary
[Function] Exit the current view and return to the last view.
Enter in super user view:
disable
Return to ordinary user view.
2. 3 End and !
[Command] End or !
[View] Configure view.
[Parameter] No
[Example]
Enter in configured view:
end
Return to super user view.
2. 4 Exit
[Command] Exit
user)
[View] All views
[Parameter] No
[Example]
Enter in configured view:
exit
Return to super user view.
enter exit in ordinary user view:
exit
Exit console.
3 Check system state command
3. 1 Show version
[Command] Show version
[Function] Display the type and version of software of router
[View] All views
[Parameter] No
[Example]
Enter:
show version
Display the following information:
Type : display the current factory type of equipment
Serial number : display the current factory serial number of equipment
Description : www.inhand.com.cn
Current version : display the current version of equipment
59
Current version of Bootloader: display the current version of equipment
[Function] Display the information of router system
Display the following information:
Example: 00:00:38 up 0 min, load average: 0.00, 0.00, 0.00
[Function] Display the system time of router
3. 2 Show system
[Command] Show system
[View] All views
[Parameter] No
[Example]
Enter:
show system
3. 3 show clock
[Command] Show clock
[View] All views
[Parameter] No
[Example]
Enter:
show clock
3. 4 Show modem
[Command] Show modem
[View] All views
[Parameter] No
[Example]
Enter:
show modem
Display the following information:
For example Sat Jan 1 00:01:28 UTC 2000
[Function] Display the MODEM state of router
Display the following information:
Modem type
state
manufacturer
Product name
signal level
register state
IMSI number
Network Type
3. 5 Show log
60
[Command] Show log [lines <n>]
[Function] Display the log of router system and display the latest 100 logs in default.
Lines <n> limits the log numbers displayed, wherein, n indicates the latest n logs in
case that it is positive integer and indicates the earliest n logs in case that it is negative
integer and indicates all the logs in case that it is 0.
[View] All views
[Parameter]
[Example]
Enter:
show log
Display the latest 100 log records.
3. 6 Show users
[Command] Show users
[Function] Display the user list of router.
[View] All views
[Parameter] No
[Example]
Displayed user list of system is as follows:
-------------------------------------------------
Enter:
show users
User:
* adm
------
Wherein, user marked with * is super user.
3. 7 Show startup-config
[Command] Show startup-config
[Function] Display the starting device of router.
[View] Super user view and configuration view
[Parameter] No
[Example]
Enter:
show startup-config
Display the starting configuration of system.
3. 8 Show running-config
[Command] Show running-config
[Function] Display the operational configuration of router
[View] Super user view and configuration view
[Parameter] No
[Example]
61
Enter:
show startup-config
Display the operational configuration of system.
4 Check Network Status Command
[Function] Display the information of port state of router
4. 1 Show interface
[Command] Show interface
[View] All views
[Parameter] No
[Example]
Enter:
show interface
Display the state of all ports.
[Function] Display the information of port state of router
4. 2 Show ip
[Command] Show ip
[View] All views
[Parameter] No
[Example]
Enter:
Show ip
[View] All views
[Parameter] No
[Example]
enter:
show route
4. 4 Show arp
[Command] Show arp
[View] All views
[Parameter] No
[Example]
Enter:
show arp
Display system ip status
4. 3 Show route
[Command] Show route
[Function] Display the routing list of router
Display the routing list of system
[Function] Display the ARP list of router
Display the ARP list of system
62
5 Internet Testing Command
Router has provided ping , telnet and traceroute for Internet testing.
[Command] Ping <hostname> [count <n>] [size <n>] [source <ip>]
[Function] Apply ICMP testing for appointed mainframe.
5. 1 Ping
[View] All views
[Parameter]
<hostname> tests the address or domain name of mainframe.
count <n> testing times
size <n> tests the size of data package (byte)
source <ip> IP address of appointed testing
[Example]
Enter:
ping www.g.cn
5. 2 Telnet
[View] All views
[Parameter]
Test www. g. cn and display the testing results
[Command] Telnet <hostname> [<port>] [source <ip>]
[Function] Telnet logs in the appointed mainframe
[Example]
Enter:
telnet 192.168.2.2
telnet logs in 192. 168. 2. 2
5. 3 Traceroute
[View] All views
[Parameter]
[Example]
Enter:
traceroute www.g.cn
[Command] Traceroute <hostname> [maxhops <n>] [timeout <n>]
[Function] Test the acting routing of appointed mainframe.
<hostname> tests the address or domain name of mainframe.
maxhops <n> tests the maximum routing jumps
timeout <n> timeout of each jumping testing (sec)
Apply the routing of www. g. cn and display the testing results.
63
<hostname> in need of the address or domain name of mainframe logged in.
<port>telnet port
source <ip> appoints the IP address of telnet logged in.
6 Configuration Command
management.
In super user view, router can use configure command to switch it over configure view for
Some setting command can support no and default, wherein, no indicates the setting of
canceling some parameter and default indicates the recovery of default setting of some parameter.
6. 1 Configure
[Function] Switchover to configuration view and input the equipment at the terminal end.
[Command] Configure terminal
[View] Super user view
[Parameter] No
[Example]
Enter in super user view:
configure terminal
Switchover to configuration view.
6. 2 Hostname
[Command] Hostname [<hostname>]
default hostname
[Function] Display or set the mainframe name of router.
[View] Configure view.
[Parameter]
[Example]
<hostname> new mainframe name
Enter in configured view:
hostname
Display the mainframe name of router.
Enter in configured view:
hostname MyRouter
Set the mainframe name of router MyRouter.
Enter in configured view:
defaulthostname
6. 3 Clock timezone
[Command] Clock timezone <timezone><n>
default clock timezone
[Function] Set the time zone information of the router.
[View] Configure view.
[Parameter]
Recover the mainframe name of router to the factory setting.
<timezone> timezone name, 3 capitalized English letters
<n> time zone deviation value, -12~+12
64
The time zone of IG601is east eighth area and the name is CST (China's standard time).
Recover the timezone of router to the factory setting.
[Function] Set the customer end of Internet time server
<hostname> address or domain name of mainframe of time server
Set the address of Internet time server pool. ntp. org.
Disable the router to get system time via network.
Recover the network time server of router to the factory setting.
[Example]
Enter in configured view:
clock timezone CST -8
Enter in configured view:
default clock timezone
6. 4 Ntp server
[Command]
ntp server <hostname>
no ntp server
default ntp server
[View] Configure view.
[Parameter]
[Example]
Enter in configured view:
ntp server pool.ntp.org
Enter in configured view:
no ntp server
Enter in configured view:
default ntp server
6.5 Config export
[Command] Config export
[Function] Export config
[View] Configure view.
[Parameter] No
[Example]
6.6 Config import
[Command] Config import
[Function] Import config
[View] Configure view.
[Parameter] No
Enter in configured view:
config export
The current config. is exported.
65
[Example]
Enter in configured view:
config import
The config. is imported.
7 System Management Command
7. 1 Reboot
[Command] Reboot
[Function] System restarts.
[View] Super user view and configuration view
[Parameter] No
[Example]
Enter in super user view:
reboot
System restarts.
7. 2 Enable username
[Command] Enable password [<name>]
[Function] Modify the username of super user.
[View] Configure view.
[Parameter]
[Example]
<name> new super user username
Enter in configured view:
enable username admin
The username of super user is changed to admin.
7.3 Enable password
[Command] Enable password [<password>]
[Function] Modify the password of super user.
[View] Configure view.
[Parameter]
[Example]
<password> new super user password
Enter in configured view:
enable password
Enter password according to the hint.
7.4 Username
[Command] Username <name> [password [<password>]]
no username <name>
default username
[Function] Set user name, password
66
[View] Configure view.
[Parameter] No
[Example]
Enter in configured view:
username abc password 123
Enter in configured view:
no username abc
Enter in configured view:
default username
Delete all the ordinary users.
Add an ordinary user, the name is abc and the password is 123.
Delete the ordinary user with the name of abc.
67
Antenna Type:Suction cup Antenna
Max. Antenna Gain: 3dBi for WiFi
Max. Antenna Gain: 2.5dBi for WCDMA/LTE
68
69
1 2 | Internal Photos | Internal Photos | 2.10 MiB | September 09 2021 / March 08 2022 | delayed release |
1 2 | External Photos | External Photos | 1.16 MiB | September 03 2021 / March 02 2022 | delayed release |
1 2 | Labe Location | ID Label/Location Info | 409.69 KiB | September 03 2021 |
Input: 9-36V = 0.6-0.15A FCC ID: aawnRsns Model: IR305-FQ39 AEA P/N: WLAN S/N: RP6111210000052 :
MAC: 00:18:05:00:12:34-35 aad IMEI: 357030020271819 IP: 192.168.2.1 User/Password: adm/123456 This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference
(2) this device must accept any interference received, including interference that may cause undesired operation. Made In China Date: 04.2013 Manufacturer:Beijing Inhand Networks Technology Co., Ltd.
1 2 | Label | ID Label/Location Info | 452.72 KiB | September 09 2021 |
Input: 9-36V = 0.6-0.15A or Model: |R305-FF38 P/N: WLAN S/N: RP6111210000052 :
MAC: 00:18:05:00:12:34-35 aad IMEI: 357030020271819 IP: 192.168.2.1 User/Password: adm/123456 This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference
(2) this device must accept any interference received, including interference that may cause undesired operation. Made In China Date: 04.2013 Manufacturer:Beijing Inhand Networks Technology Co., Ltd.
1 2 | ConfidentialityRequest | Cover Letter(s) | 518.42 KiB | September 09 2021 |
Confidentiality Request Letter
For Certification Service in the USA
Federal Communication Commission
Equipment Authorization Division, Application Processing Branch
7435 Oakland Mills Road
Columbia, MD 21048
To whom it may concern
Pursuant to Paragraphs §0.457 and 0.459 of the Commission’s Rules (47 C.F.R.) and Section
§552(b)(4) of the Freedom of Information Act, we request confidentiality for the
documentation of the following products:
FCC ID
2AANYIR305
Model name
IR305-FF38, IR315-FF38, IR325-FF38, IR365-
FF38, IR395-FF38
For the products listed above, we request permanent confidentiality for all applicable
exhibits as there are:
the Operational Description
The above listed exhibits contain trade secrets and proprietary information that could be of
benefit to our competitors.
If you have any questions, please feel free to contact us at the address shown below.
Sincerely,
09/09/2021
Signature
Date
Printed Name of Signee: Jichi Gu
Company: Beijing InHand Networks Technology Co., Ltd.
Address: Room 501, floor 5, building 3, yard 18, ziyue road, chaoyang district, Beijing
Phone: +8615281366255
Email: gujc@inhand.com.cn
Fax:
1 2 | CoverLetter | Cover Letter(s) | 11.95 KiB | September 09 2021 |
Beijing Inhand Networks Technology Co., Ltd. September 9, 2021 Federal Communications Commission Equipment Authorization Division 7435 Oakland Mills Road Columbia, MD 21046 USA Attn: OET Dept. Ref: FCC Class II Permissive change for FCC ID: 2AANYIR305 Applicant: Beijing Inhand Networks Technology Co., Ltd. Dear Examiner, This is to request a Class II Permissive change for FCC ID: 2AANYIR305 originally granted on 09/03/2021 (date). The change under this application is to Due to market demand 1. Replace the original WCDMA/LTE module model EP06A (Contain FCC ID:
XMR201807EP06A) with a new WCDMA/LTE module model NL668-AM
(Contain FCC ID: ZMONL668AM00). 2. The original model name of the product is IR305-FQ39, IR315-FQ39; IR325-
FQ39, IR365-FQ39, IR395-FQ39 changed to R305-FF38, IR315-FF38, IR325-FF38, IR365-FF38, IR395-FF38 I attest that the certified device will not be capable of ad-hoc mode operation outside of the grant conditions. Sincerely, Name: Jichi Gu Date: 2021/09/09 Title: Certification Engineer Signature of applicant IR305-FF38_FCC Class II PC request letter Rev1.1.docx
1 2 | ShortTermConf | Cover Letter(s) | 519.50 KiB | September 09 2021 |
Short Term Confidentiality Request Letter
For Certification Service in the USA
Federal Communication Commission
Equipment Authorization Division, Application Processing Branch
7435 Oakland Mills Road
Columbia, MD 21048
To whom it may concern
Pursuant to Paragraphs §0.457 and 0.459 of the Commission’s Rules (47 C.F.R.) and in
accordance with the FCC Public notice dated June 15, 2004 (DA 04-1705), we request short
term confidentiality prior to marketing the device for the documentation of the following
products:
FCC ID
2AANYIR305
Model name
IR305-FF38, IR315-FF38, IR325-FF38, IR365-
FF38, IR395-FF38
For the products listed above, we request short term confidentiality for all applicable
exhibits as there are:
Internal photos
The above listed exhibits contain business sensitive information which we wish to keep
confidential until the actual marketing of our device, that is planned for:
Short term confidentiality release date: < 180 after issue of grant>
If you have any questions, please feel free to contact us at the address shown below.
Sincerely,
09/08/2021
Signature
Date
Printed Name of Signee: Jichi Gu
Company: Beijing InHand Networks Technology Co., Ltd.
Address: Room 501, floor 5, building 3, yard 18, ziyue road, chaoyang district, Beijing
Phone: +8615281366255
Email: gujc@inhand.com.cn
Fax:
1 2 | Agent Authorization Rev 1.0 | Cover Letter(s) | 12.17 KiB | September 03 2021 |
Beijing InHand Networks Technology Co., Ltd. Agent Authorization Company: Beijing InHand Networks Technology Co., Ltd. Address: Room 501, floor 5, building 3, yard 18, ziyue road, chaoyang district, Beijing Product Name: Industrial Cellular Router Model Number(s): IR305-FQ39, IR315-FQ39, IR325-FQ39, IR365-FQ39,IR395-FQ39 Product Description: WCDMA, LTE,2.4G WiFi Cellular Router We authorize MiCOM Labs Inc., 575 Boulder Court, Pleasanton, California 94566, USA, to act on our behalf on all matters concerning the certification of above named equipment. We declare that MiCOM Labs Inc. is allowed to forward all information related to the approval and certification of equipment to the regulatory agencies as required and to discuss any issues concerning the approval application. Any and all acts carried out by MiCOM Labs on our behalf shall have the same effect as acts of our own. Signature:
Name:
Jichi Gu Title:
Certification Engineer Date: 2021/08/23 Company: Beijing InHand Networks Technology Co., Ltd.
1 2 | Difference Description | Cover Letter(s) | 202.36 KiB | September 03 2021 |
Declaration letter Beijing InHand Networks Technology Co., Ltd. Dear Sir, For our business issue and marketing requirement, we would like to list different models numbers on the FCC/IC certificates and reports, as following:
Test Model No.: IR305-FQ39 Series Models NO:
IR315-FQ39, IR325-FQ39, IR365-FQ39, IR395-FQ39 The five models are the same in these:appearance,PCB layout and basic software function; The only difference is that the products are used in different markets. Thank you!
Signature:
Printed name/title:Jichi Gu/ EMC engineer Address: Room 501, floor 5, building 3, yard 18, ziyue road, chaoyang district, Beijing
1 2 | FCC Short & Long Term Confidentiality Request Rev4 | Cover Letter(s) | 140.20 KiB | September 03 2021 |
Beijing InHand Networks Technology Co., Ltd.
Office of Engineering Technology
Federal Communications Commission
7435 Oakland Mills Road
Columbia, MD 21046
USA
Date: 2021/08/23
Subject; Request for Confidentiality
FCC ID: 2AANYIR305
To Whom It May Concern,
Pursuant to the provisions of the Commission’s rules Title 47 Sections §0.457 and §0.459, we
are requesting the Commission to withhold the following attachment(s) as confidential
documents from public disclosure indefinitely.
These documents contain detailed system and equipment descriptions and are considered as
proprietary information in operation of the equipment. The public disclosure of these documents
might be harmful to our company and would give competitors an unfair advantage in the market.
Schematic Diagram
Block Diagram
Operational Description
BOM List
Tune-up Procedure
External Photos
Test Setup Photos
Internal Photos
User Manual
In additional to above mentioned documents, in order to comply with the marketing regulations
in Title 47 CFR §2.803 and the importation rules in Title 47 CFR §2.1204, while ensuring that
business sensitive information remains confidential until the actual marketing of newly
authorized devices, we request Short Term Confidentiality of the following attachment(s);
OR
For 45 days, pursuant to Public Notice DA 04-1705.
For 180 days pursuant to KDB 726920 D01.
It is our understanding that all measurement test reports, FCC ID label format and
correspondence during the certification review process cannot be granted as confidential
documents and this information will be available for public review once the grant of equipment
authorization is issued.
Sincerely,
Signature:
Name: Jichi Gu
Title: Certification Engineer
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2021-09-09 | 2412 ~ 2462 | DTS - Digital Transmission System | Class II Permissive Change |
2 | 2021-09-03 | 2412 ~ 2462 | DTS - Digital Transmission System | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 2 | Effective |
2021-09-09
|
||||
1 2 |
2021-09-03
|
|||||
1 2 | Applicant's complete, legal business name |
Beijing InHand Networks Technology Co., Ltd.
|
||||
1 2 | FCC Registration Number (FRN) |
0022847826
|
||||
1 2 | Physical Address |
Room 501, floor 5, building 3, yard 18, ziyue road chaoyang district, Beijing,China
|
||||
1 2 |
Room 501, floor 5, building 3, yard 18, ziyue road
|
|||||
1 2 |
Beijing, N/A
|
|||||
1 2 |
China
|
|||||
app s | TCB Information | |||||
1 2 | TCB Application Email Address |
o******@kl-certification.de
|
||||
1 2 |
c******@micomlabs.com
|
|||||
1 2 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 2 | Grantee Code |
2AANY
|
||||
1 2 | Equipment Product Code |
IR305
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 2 | Name |
J****** G****
|
||||
1 2 | Title |
Certification Engineer
|
||||
1 2 | Telephone Number |
15281********
|
||||
1 2 | Fax Number |
010-8********
|
||||
1 2 |
g******@inhand.com.cn
|
|||||
app s | Technical Contact | |||||
1 2 | Firm Name |
Hunan Ecloud Testing Technology Co., Ltd.
|
||||
1 2 |
Beijing InHand Networks Technology Co., Ltd.
|
|||||
1 2 | Name |
T**** Y******
|
||||
1 2 | Physical Address |
Building A1, Changsha E Center
|
||||
1 2 |
Liuyang
|
|||||
1 2 |
China
|
|||||
1 2 | Telephone Number |
+8617********
|
||||
1 2 |
t******@hn-ecloud.com
|
|||||
1 2 |
g******@inhand.com.cn
|
|||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 2 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 2 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 2 | If so, specify the short-term confidentiality release date (MM/DD/YYYY format) | 03/08/2022 | ||||
1 2 | 03/02/2022 | |||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 2 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 2 | Equipment Class | DTS - Digital Transmission System | ||||
1 2 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | WCDMA, LTE,2.4G WiFi Cellular Router | ||||
1 2 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 2 | Modular Equipment Type | Does not apply | ||||
1 2 | Purpose / Application is for | Class II Permissive Change | ||||
1 2 | Original Equipment | |||||
1 2 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 2 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 2 | Grant Comments | Output power listed is maximum combined conducted power. This device contains 20 and 40 MHz signal bandwidth. Device is a 2x2 MIMO as is described in the filing. The antennas used with this transmitter must be installed to provide a minimum separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter, except in accordance with FCC multi- transmitter product procedures. End-users must be provided with operating procedures for satisfying RF exposure compliance. Class II Permissive Change. | ||||
1 2 | Output power listed is maximum combined conducted power. This device contains 20 and 40 MHz signal bandwidth. Device is a 2x2 MIMO as is described in the filing. The antennas used with this transmitter must be installed to provide a minimum separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter, except in accordance with FCC multi- transmitter product procedures. End-users must be provided with operating procedures for satisfying RF exposure compliance. | |||||
1 2 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 2 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 2 | Firm Name |
Hunan Ecloud Testing Technology Co., Ltd.
|
||||
1 2 | Name |
B******** W********
|
||||
1 2 | Telephone Number |
+86 1********
|
||||
1 2 |
b******@hn-ecloud.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | MO | 2412.00000000 | 2462.00000000 | 0.0755000 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
2 | 1 | 15C | MO | 2412.00000000 | 2462.00000000 | 0.0755000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC