all | frequencies |
|
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|---|
manual | photos | label |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 2 |
|
User Manual | Users Manual | 2.13 MiB | September 30 2022 / March 29 2023 | delayed release | ||
1 2 |
|
Internal Photos | Internal Photos | 1.69 MiB | September 30 2022 / March 29 2023 | delayed release | ||
1 2 |
|
External Photos | External Photos | 1.57 MiB | September 30 2022 / March 29 2023 | delayed release | ||
1 2 | ID Label/Location Info | September 30 2022 | ||||||
1 2 |
|
2.4G WIFI TEST REPORT | Test Report | 5.46 MiB | September 30 2022 | |||
1 2 | Cover Letter(s) | September 30 2022 | ||||||
1 2 | Test Report | September 30 2022 | ||||||
1 2 | Block Diagram | Block Diagram | September 30 2022 | confidential | ||||
1 2 | Cover Letter(s) | September 30 2022 | ||||||
1 2 | RF Exposure Info | September 30 2022 | ||||||
1 2 | Operation description | Operational Description | September 30 2022 | confidential | ||||
1 2 | SCH | Schematics | September 30 2022 | confidential | ||||
1 2 |
|
Test Photos | Test Setup Photos | 2.96 MiB | September 30 2022 / March 29 2023 | delayed release | ||
1 2 |
|
20220823L6019E-2 FCC ID WIFI 5.2&5.8 report 1 | Test Report | 4.35 MiB | September 30 2022 | |||
1 2 |
|
20220823L6019E-2 FCC ID WIFI 5.2&5.8 report 2 | Test Report | 2.16 MiB | September 30 2022 | |||
1 2 |
|
FCCSoftwareConfigurationControlDeclaration | Cover Letter(s) | 98.36 KiB | September 30 2022 | |||
1 2 | FCCSoftwareConfigurationControlDeclaration | SDR Software/Security Inf | September 30 2022 | confidential |
1 2 | User Manual | Users Manual | 2.13 MiB | September 30 2022 / March 29 2023 | delayed release |
Bumble Industrial Wifi6 Router User Manual Bumble Industrial WIFI6 Router catalog Chapter 1 login ............................................................................................................................................... 5 1.1 Prepare before logging in ................................................................................................................. 5 1.2 Login configuration page ...................................................................................................................7 Chapter 2 Network Setting ............................................................................................................................. 8 2.1 Change the login page address .......................................................................................................8 2.2 WAN Setting ..................................................................................................................................... 9 2.2.1 DHCP address ........................................................................................................................9 2.2.2 PPPoE ....................................................................................................................................9 2.2.3 Static address ........................................................................................................................ 9 2.2.4 As lan (convert WAN port to LAN port) ........................................................................ 10 2.3 DHCP Setting ................................................................................................................................. 10 2.4 WIFI Access Point ......................................................................................................................... 11 2.5 WIFI Client(Bridge) .......................................................................................................................13 2.6 WIFI repeater ..................................................................................................................................15 2.6.1 Change the local IP address .............................................................................................. 15 2.6.2 Connect to the main wireless AP ...................................................................................... 16 2.6.3 Disable DHCP ......................................................................................................................17 2.7 Time Reboot ...................................................................................................................................17 2.8 Watchcat ......................................................................................................................................... 17 2.9 Diagnosis .........................................................................................................................................20 Chapter 3 Firewall and Application .............................................................................................................. 21 2 / 51 2 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net Bumble Industrial WIFI6 Router 3.1 Firewall on and off .........................................................................................................................21 3.2 DMZ ................................................................................................................................................ 21 3.3 Prot Forwards ................................................................................................................................. 22 3.4 Black/White List ............................................................................................................................. 24 3.4.1 White List ............................................................................................................................. 24 3.4.2 Black List ............................................................................................................................. 26 3.5 Frp Client ....................................................................................................................................... 27 3.5.1 Connect to Frps ...................................................................................................................27 3.5.2 Add TCP proxy protocol ..................................................................................................... 31 3.5.3 Add STCP Proxy Rules ...................................................................................................... 33 3.5.4 Add UDP Proxy Rules ........................................................................................................ 38 3.5.5 Add HTTP Proxy Rules ...................................................................................................... 40 Chapter 4 VPN Service ................................................................................................................................42 4.1 PPTP VPN ...................................................................................................................................... 42 4.2 L2TP VPN ...................................................................................................................................... 42 4.3 GRE VPN ....................................................................................................................................... 43 4.4 OpenVPN ........................................................................................................................................ 45 Chapter 5 System .........................................................................................................................................46 5.1 Date Time ....................................................................................................................................... 46 5.2 Language Setting ............................................................................................................................47 5.3 Modify Password .............................................................................................................................47 5.4 Update Firmware ............................................................................................................................ 48 3 / 51 3 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net Bumble Industrial WIFI6 Router 5.5 Factory Reset ................................................................................................................................. 48 5.6 Reboot ............................................................................................................................................ 49 5.7 page log out .................................................................................................................................. 50 Appendix .................................................................................................................... 4 / 51 4 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net Bumble Industrial WIFI6 Router Chapter 1 login 1.1 Prepare before logging in After completing the hardware installation, you will need to ensure that the management computer has an Ethernet card installed before logging into the router's web setup page. Please set the management PC to "Obtain an IP address automatically" and "Obtain DNS server address automatically" (the default configuration the computer system), and the device will automatically assign an IP address to the management PC. of the the device is:
the management PC (for example: 192.168.2.59) and the IP address of device's LAN port 192.168.2.1, and the subnet mask is 255.255.255.0) The method is as follows. in the same network segment(The initial the IP address of the LAN port of IP address of Set Take win10 as an example, the operation is as follows:
Step 1: Right-click the network logo in the lower right corner of and choose to Open Network & Internet settings. the desktop (as shown in the figure), Step 2: First click on "Ethernet", then click on "Network and Sharing Center". 5 / 51 5 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net Bumble Industrial WIFI6 Router Step 3: Click Enternet with the mouse, click Properties in the pop-up box (Ethernet status), select Internet Protocol version 4 (TCP/IPv4) in the pop-up box (Ethernet properties), and click Properties Step 4: There are three setting methods method 1 method 2 method 3 method 1: It can be used to configure the device and access the external network. It is recommended to use it (Note: If there are multiple routes with different network segments in the current environment, the IP obtained by the computer may not be able to connect to the device. In this case, method 2 can be used);
method 2: It can be used to configure the device and access the external network. The IP address is set to the device IP (the device defaults to 192.168.2.1) and the same network segment IP: 192.168.2.X
(X is any number between 2 and 254, such as 192.168.2.2) , the default gateway is set to device IP: 192.168.2.1, DNS can be set to 8.8.8.8 and other general DNS;
method 1: Only connect the device for configuration use, the computer cannot access the external network through the device network, and the IP address is set as in method 2;
6 / 51 6 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net Step 5: Click OK with the mouse, and then click Close to save the changes in Steps 3 and 4;
Bumble Industrial WIFI6 Router 1.2 Login configuration page Open IE or other browsers, enter 192.168.2.1 in the address bar, after the connection is established, is, enter the password in in the pop-up login interface, log in as the system administrator (admin), that the login interface (the default password is set to admin). The default login password is admin. If the configuration interface to avoid being modified by others, he can modify the login password, click "System" - "Modify Password" in turn, in the password to be modified, and then "SAVE & APPLY", please refer to Chapter 5.3 for details. then fill the user needs to protect 7 / 51 7 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router Chapter 2 Network Setting 2.1 Change the login page address The default address of the router is 192.168.2.1. You can modify the static IP address in the navigation bar "Network Setting" - "LAN Setting". After modification, the new IP address will be used to log in to the page. A.IP Address: Modify the ip address of B.Netmask: It is generally 255.255.255.0, which can be modified as needed. the device (default is 192.168.2.1). C.IPv4 gatewayDNS serverOverride MTU: No special cases do not need to be set. D.After the configuration is complete, click "SAVE & APPLY" to make it take effect. After it takes effect, you need to use a new IP address to access the configuration page of the device. 8 / 51 8 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router 2.2 WAN Setting 2.2.1 DHCP address Navigation bar "Network Setting" - "WAN Setting", the default protocol of WAN port is dynamic address
(ie DHCP client), the upper-level device needs to be able to assign ip to the wan port,Without special cases, the value of MTU does not need to be changed (default: 1500). 2.2.2 PPPoE If the wan port needs to dial up to access the Internet, you need to select PPPoE, fill in the user name and password according to the actual situation, no special circumstances, the value of MTU does not need to be changed (default value: 1500). 2.2.3 Static address You can also choose to manually set the same IP address as the upper-level network segment, subnet mask, and gateway to fill in the IP address of the upper-level device. DNS can be the same as the gateway.Generally, there are common DNS such as 8.8.8.8. There is no special case, and the value of MTU does not need to be changed (default value:
1500). the wan port. You need to set the IP address for 9 / 51 9 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router 2.2.4 As lan (convert WAN port to LAN port) If you want to convert the WAN port lan", click "SAVE & APPLY", you can convert please be careful not the WAN port and LAN port special circumstances, the value of MTU does not need to be changed (default value: 1500). into a LAN port, change the protocol of "WAN Setting" to "As the wan port to a lan port(In the case of associated LAN, to the switch or the same computer), no to connect 2.3 DHCP Setting DHCP adopts the client/server communication mode, the client submits a configuration application to the server, and the server returns the corresponding configuration information such as the IP address assigned to the client, so as to realize the dynamic configuration of the IP address and other information. DHCP client configuration (enabled by default), select "Network Setting" - "DHCP Settings", "SAVE
& APPLY". A.Ignore interface: Checking this will B.Start: The starting address of the allocated dhcp server, such as 100, means that the allocation starts the DHCP server. turn off from 192.168.2.100. C. Limit: Maximum number of leased addresses. 10 / 51 10 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router D.Leasetime: Expiry time of leased addresses. 2.4 WIFI Access Point WIFI AP supports WIFI name:
SLK-Router_2G-XXXX, SLK-Router_5G-XXXX (to avoid the same name of wifi between different devices, the "XXXX" part will be different), password : slk100200(Password needs to be 8 characters or more). Navigation bar "Network Setting" - "WIFI Access Point", you can change the basic configuration of WIFI. dual-band 2.4G+5.8G, WIFI default, wifi enabled by is 11 / 51 11 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router Navigation bar "Network Setting" - "WIFI Access Point" - "Advanced Configuration", under normal circumstances do not need to modify. Hide ESSID: If checked, this WiFi will not be searched on mobile phones, computers and other devices. this device to a different channel Channel: If you know the channel of other wifi nearby, you can set to improve wifi speed and signal. Width: WiFi speed HT80 (5.8G exclusive) > HT40 > HT20, WiFi stability HT20 > HT40 > HT80
(5.8G exclusive), affected by distance and partitions (such as walls), use large bandwidth at close range,use a small bandwidth for long distances. Transmit Power: The higher the power, the better the wifi performance. 12 / 51 12 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router 2.5 WIFI Client(Bridge) The WIFI Client is not enabled by default, you need to check to enable it in the navigation bar "Network Setting" - "WIFI Client". Then select the client wifi in the SSID list, change the security option according to whether interface: 2.4G Client, 5.8G Client, search the corresponding WIFI list, select WIFI there is a password, None (no password),Encryption(Encryption mixed mode Mixed WPA/WPA2-PSK), WDS is not checked by default. 13 / 51 13 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router After successfully connecting to WIFI, the WIFI status will be displayed. Note: The wireless interface 2.4G client search requires WIFI wireless AP WiFi-2.4G is in the activated state, the wireless interface 5.8G client search requires WIFI wireless AP WiFi-5.8G is in the activated state,Otherwise, the search result will not be displayed (after saving the page configuration of WIFI wireless 14 / 51 14 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router AP and WIFI wireless client, WiFi-5.8G starts slowly, please wait WIFI wireless client advanced settings protocol selection:
for a while). A.DHCP address (default): The WiFi client automatically obtains the IP address assigned by the superior route. B.Static address: The WiFi client uses the user-configured IP address, subnet mask, gateway, and DNS. C.Bridge Lan: Use the LAN port configuration IP address, subnet mask, gateway, DNS, Lan port configuration reference WIFI wireless client advanced settings static address (relay mode select this item). 2.6 WIFI repeater This section describes how to extend the wireless signal length by means of relays. In this configuration mode, the computer terminal connected to the SLK-R680 is in the same IP address segment as the main wireless network. 2.6.1 Change the local IP address It is necessary to modify the local IP address of SLK-R680 to be in the same network segment as the main wireless AP. For example, the IP address of the main wireless AP to be connected is 192.168.100.1, then modify the IP address of SLK-R680 to 192.168.100.100. It should be noted that the LAN port gateway is empty by default. After using the relay mode setting, if you need to connect through the WAN port in the future, you need to delete the gateway information in the LAN settings to avoid the situation of being unable to access the Internet. to the Internet 15 / 51 15 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router 2.6.2 Connect to the main wireless AP In the navigation bar "Network Setting" - "WIFI Client", check to enable the WIFI wireless client, and the main wireless AP to be the SSID as shown in in the password, select Bridge Lan from Protocol, and click SAVE & APPLY. configure the connection to the main wireless AP. For example, the SSID of connected here is WIFI6-2G, and the password is slk100200,Search and select the figure below, fill It should be noted that in this mode, the main wireless AP no longer assigns an IP address to this SLK-R680. Therefore, the obtained IP address will not be updated in "Status", and you can confirm whether through the icon color and MAC address. The picture below is successful. the connection is successful 16 / 51 16 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router 2.6.3 Disable DHCP Disable the DHCP server function of the SLK-R680. In this way, the SLK-R680 no longer assigns IP addresses to the connected devices, and all devices connected to the local area network are assigned IP addresses by the main wireless to realize communication on the same network segment. 2.7 Time Reboot Navigation bar "Network Setting" - "Time Reboot", users can check to enable and set the time to restart every day, pay attention to check whether the device time is correct, modify the correct time: "System"
- "Date Time", see chapter 5.1 for details . 2.8 Watchcat In the navigation bar "Network Setting" - "Watchcat", the network self-check function is disabled by 17 / 51 17 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router default, and the network self-check allows setting periodic restarts or restarts when the network is abnormal. If you need to activate this function, click Add, enter the configuration and click "SAVE & APPLY". A.Forced reboot delay: When rebooting the system the watchcat will zero value here, will to enable, use 0 to disable trigger a delayed hard reboot if the soft reboot trigger a soft reboot, Entering a non fails. Enter a number of seconds B.Period: In periodic mode, it defines the reboot period. In internet mode, it defines the longest period of is seconds, you can use the suffix internet access before a reboot is engaged.Default unit time without
'm'
for minutes, 'h'
for hours or C.Ping host: Host address to ping 1.Reboot on internet connection lost
'd'
for days 2.Periodic reboot 18 / 51 18 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router After adding and configuring, click "SAVE & APPLY" to take effect. To delete the configuration, just click the "DELETE" button in the upper right corner, and then "SAVE & APPLY". 19 / 51 19 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router 2.9 Diagnosis Through network diagnosis, you can determine whether the router and the connected device can communicate with each other, whether the device can access the Internet, and whether the device is successfully connected it according to your own needs. to the VPN. It can also be used to test other aspects, and you can test Navigation bar "Network Setting" - "Diagnosis". Baidu, seriallink, 8.8.8.8: It is generally used to test whether the device can access the Internet. If it can ping, it means the device can access the Internet. If it cannot ping, it means that the device cannot access the Internet. Custom input box: generally used to test whether the connected device can be pinged. 20 / 51 20 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router Chapter 3 Firewall and Application 3.1 Firewall on and off The firewall is enabled by default. When doing DMZ and Port Forwards, you need to disable the firewall. Steps to disable the firewall, go to the navigation bar "Routing Setting" - "Firewall", select disable the firewall, and then click "SAVE & APPLY". 3.2 DMZ The DMZ function can map the WAN port address to a certain host on the LAN side; all packets to to achieve bidirectional communication. the WAN address will be forwarded to the specified LAN side host In fact, it is to completely expose a host in the intranet to the Internet and open all ports, which is equivalent to using the public IP directly. to all port mapping. It is equivalent First, you need to disable the firewall, click "Routing Setting" - "DMZ" in the navigation bar, click the ports to the connected device, and forward all the IP address assigned by the lan port the connected device,It can be accessed directly through the IP address of the wan port. Enable: Tick Enable. Internal IP address: The ip address of through dhcp. the local device or the ip assigned to the connected device DMZ actually forwards all ports of the device. After the configuration is complete, click "SAVE & APPLY"
to make it take effect. 21 / 51 21 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net Enable, set of SLK-R680-WIFI Industrial WIFI6 Router Check the IP of the wan port. If you can't access it, the possible reason is that the firewall of the connected device is opened, the connected device. and you need to turn off the wan port, you can directly access the connected device through the IP of the firewall of You can access the connected device directly through the IP of the wan port.(Note: The computer needs to be in the same local area network as the IP of the wan port before it can be accessed) 3.3 Prot Forwards Compared with the DMZ, port forwarding is a more refined control, which can forward the data packets to a certain host on the LAN side, and can realize the transfer of different ports to a certain port sent to different hosts. First you need to disable the firewall. Navigation bar "Routing Setting" - "Port Forwards" setting menu, enter the "Port Forwards" interface to configure. this rule, which can be a meaningful name. A.Name: Specify the name of B.Protocol: Specifies the protocol C.Internal D.Internall port: The port E.External port: Add this external port through the wan port D.After configuration, click the "ADD" button to add a forwarding rule. Click the "SAVE & APPLY"
to be forwarded, which can be TCP, UDP, or TCP/UDP. the IP address that needs to be forwarded to the external network. to be forwarded by the connected device or ip to access the connected device. IP address: Select the machine. button to make the rule take effect. 22 / 51 22 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router After the addition is successful, a port forwarding rule will be added. Click "SAVE & APPLY" to make the rule take effect. Multiple rules can be added. View the wan port ip, and access the internal port of the connected device or the local device through the wan port ip and external port number. 23 / 51 23 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router Access the internal port of the connected device through 192.168.20.132:500.(Note: The computer needs to be in the same local area network as the IP of the wan port before it can be accessed) 3.4 Black/White List 3.4.1 White List Restrict all non-whitelisted hosts from accessing the external network through the local device. For example, all devices cannot access the Internet, and only a certain computer can be allowed, then this computer can be added to the whitelist. A.Name: Customize the name. B.Protocol: All protocols are selected by default, choose according to your needs. C.Match ICMP type: All D.Local IP address: The IP address of the device added to the whitelist, the IP address change caused types are selected by default, choose according to your needs. by man-made or other reasons, will change the device that can access the Internet. E.Local MAC address: The MAC address of the device IP address is changed. if the device added to the whitelist will not be invalid even F.Destination IP address: If not selected, it means all networks. You can also enter an IP address, such as the public network server IP. G.Action: Whitelist mode select ACCEPT. 24 / 51 24 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router After clicking Add, a rule will be automatically refreshed in the page list, click "SAVE & APPLY". After adding the whitelist, you can only access the public network address of the server, but cannot the same time, other computers can neither access the public network address nor access the Internet. At the Internet. If the target address is empty, it means that to disable the blacklist and whitelist the devices in the whitelist can access all networks, but functions, you just need to uncheck other devices cannot. If you want the SAVE & APPLY option. 25 / 51 25 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router 3.4.2 Black List Restrict the host in the blacklist from accessing the external network through the local device. For example, if a computer is prohibited from accessing the Internet, the computer can be added to the blacklist. A.Name: Customize the name. B.Protocol: All protocols are selected by default, choose according to your needs. C.Match ICMP type: All D.Local IP address: The IP address of the device added to the blacklist, the IP address change caused types are selected by default, choose according to your needs. by man-made or other reasons, will change the device that refuses to access the Internet. E.Local MAC address:The MAC address of the device IP address is changed. if the device added to the blacklist will not be invalid even F.Destination IP address:If not selected, it means all networks. You can also enter an IP address, such as the public network server IP. G.Action: Blacklist mode select REJECT. After clicking Add, a rule will be automatically refreshed in the page list, click "SAVE & APPLY". 26 / 51 26 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router After adding the blacklist, you cannot access the public address of the server, only the Internet, and other devices are not restricted. If the destination address is empty, it means that the devices in the blacklist cannot access all external networks. If you want to disable the blacklist and whitelist function, just uncheck the enabled option, "SAVE
& APPLY". 3.5 Frp Client Frp is to provide http or https services in multiple external network environments by using machines behind the intranet or firewall. For http, https services support domain name-based virtual hosts, and support custom domain name binding, so that multiple domain names share one port 80; Use the machine behind the intranet or firewall to provide tcp and udp services to the external network environment, such as accessing the host in the company's intranet environment through ssh at home. The main functions of frp: the external network accesses the internal network machine through ssh;
forwarded by the internal network machine through frp through the the external network accesses the port public network address plus the port number; custom binding domain name accesses the internal network web service. The premise of configuring intranet penetration is to ensure that the router can access the Internet. If the router cannot access the Internet, the intranet penetration cannot be performed. Navigation bar "Device Management" - "Diagnosis"; and disable the firewall, navigation bar "Routing Setting" - "Firewall". If you can ping 8.8.8.8, it means that the device can access the Internet. For details, see Chapter 2.9. Disable the firewall. After choosing to disable the firewall, click "SAVE & APPLY". 3.5.1 Connect to Frps Preparation before configuration:
(1)One public network server.
(2)One router (a router that supports frp, that is, 1 intranet server). 27 / 51 27 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router
(3)One domain name is bound to the public network server. The frp client configuration is as follows:
(1)The client needs to add the configuration of the server first to connect to the server, the navigation bar "DDNS/FRP" - "Frp Client", select "Servers",There is an empty server by default, you can directly click to modify it, or you can directly delete it and add one yourself.
(2)After clicking "ADD" or "EDIT", a page for editing the frps server will pop up, configure it according to the settings of the server, and click "SAVE & APPLY" after the configuration is complete. A.Alias: To customize the name of a server, you can define a meaningful name. B.Server addr: The address of C.Server port: The port set by the server. D.Token: The password set by the server. the server (usually the public IP address). E.TCP muxView and view are consistent with the server side. If the server side TCP mux is true, you need to choose here, if not, you don't need to choose. F.Click "SAVE & APPLY" after the setting is complete. 28 / 51 28 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router 29 / 51 29 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router
(3)After the addition is successful, there will be an additional the server. start frp server, click "SAVE & APPLY" to
(4)Next, go to the "Settings" page of "Frp Client", start the frpc client, and configure as shown below. After the configuration is complete, click "SAVE & APPLY". After the configuration is complete, "Running"
will appear on the "Common Settings" page,prove that the frp client has been started. A.Enable: Tick Enabled. B.Server: The server alias you just customized. C.Run daemon as user: Generally choose the default, you can modify it according to your needs. D:Enable logging: Tick as required. E:After the configuration is complete, click "SAVE & APPLY". Displaying that the service is running indicates that the frp client has been successfully started.
(5)Next, go to the "Rules" page of "Frp Client", click "ADD", there is a rule by default, if you don't need this rule, you can delete this rule, keep it if you need it, and add a new rule directly. 30 / 51 30 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router
(6)After adding, an "Edit Proxy Rule" page will pop up, there will be different protocol types, and the functions implemented by different protocol types are different. 3.5.2 Add TCP proxy protocol The TCP protocol supports ssh connection, and also supports forwarding the page port (usually port 80)Through the public network, the remote port can access the page of the local device. On the "Edit Proxy Rule" page, configure according to the requirements as shown in the figure below. After the configuration is completed, click "SAVE & APPLY", and you will return to the "Proxy Rules" page, and there will be an additional rule on the page,click "SAVE & APPLY" again to make the rule take effect. Finally, you can access the local port opened by the local device through the public network ip: port number
(format: 106.107.108.109:5555, where 106.107.108.109 is the public network address). You can add multiple the remote ports are the same as tcp rules, just make sure that take the previous ones, the latest ones will overwrite the previous ones, and the previous rules will not effect. the remote ports are not the same. If A.Disabled: If checked, it means to disable this rule. B.Proxy Name: Customize a proxy name. The proxy name cannot be repeated, otherwise it will not take effect due to name conflict. the TCP protocol. in the ip of C.Type: Select IP: Fill D:Local for the public network). the connected device. (The ip address of the local machine or the ip allocated by the lan port of the local machine the device that needs to be accessed through 31 / 51 31 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router by and do not E.Local port: The selected device needs to be forwarded to the port of F.Remote port: Add this remote port to the public network address to access the local port opened the corresponding local device. This port number should not be the same as other rules, use the occupied port, otherwise this rule will not G.Use encryption, Use compression: Check these two as needed. Multiple rules can be added, as long as the remote port numbers do not conflict. After the configuration is complete, click "SAVE & APPLY". the public network. take effect. After generating a new rule, you need to click "SAVE & APPLY" to make the rule take effect. Access the local port of the local device through the public network ip and port number, and 106.107.108.109:5555 to access 192.168.2.1 (default port 80). 32 / 51 32 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router Multiple tcp rules can be added. It is necessary to ensure that the remote port number and proxy alias it repeated with those previously set. If they are repeated, the rule may not take effect even if are not exists. 3.5.3 Add STCP Proxy Rules
(1)STCP needs to configure the client and the access terminal, of which 192.168.2.111 (the device connected to the lan port) is used as the client, and the PC is used as the access terminal. The access terminal can access the client by binding the local IP and port. A.Disabled: Checking here will disable this rule. B.Proxy Name: Customize a proxy name, which cannot be the same as other rules, otherwise it will not take effect due to conflict. the STCP protocol. IP: The IP address assigned by the local device or C.Type: Select D.Local E.Local port: The device needs to open a port F.SK: Set a password, the access terminal needs to enter the SK set here when accessing the device. G.Use encryption,Use compression: Configure as needed. H.Role,Server name,Bind addr,Bind port:These four as clients do not need to be set. to the connected device. to the public network. the lan port 33 / 51 33 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router After generating a new rule, you need to click "SAVE & APPLY" to make the rule take effect. If the router as the access end, it needs to be a the PC wants to access the connected device of client of frp, and it is also the stcp protocol, but it needs to set the visitor role and bind the local address and port. The frp file for Windows can be downloaded from the company's official website. After downloading, open the frpc.ini configuration file for configuration. 34 / 51 34 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router Use the shortcut key "win+R" to quickly open the cmd command window. First enter "E:" to enter the disk where frpc.exe is located, then use "cd+file path" to enter the folder where frpc.exe is located, and use the command "frpc.exe -c frpc.ini" to run the client. 35 / 51 35 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router
(2)If there are two routers, and one router needs to remotely access the other router or the connected device of the other router, one is the stcp access terminal, and the other is the stcp client. The configuration is as follows:
Configure the client (first A.Disabled: Checking here will disable this rule. B.Proxy Name: Customize a proxy name, which cannot be the same as other rules, otherwise it will router,IP:192.1682.1) not take effect due to conflict. the STCP protocol. IP: The IP address assigned by the local device or C.Type: Select D.Local E.Local port: The device needs to open a port F.SK: Set a password, the access terminal needs to enter the SK set here when accessing the device. G.Use encryption,Use compression: Configure as needed. H.Role,Server name,Bind addr,Bind port:These four as clients do not need to be set. to the connected device. to the public network. the lan port 36 / 51 36 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router After generating a new rule, you need to click "SAVE & APPLY" to make the rule take effect. Configuring the Access Side (Second Router,IP:192.168.2.2) A.You need to connect to the frp server B.Disabled: If checked here, this rule will be disabled. C.Proxy Name: Customize a proxy name, which cannot be the same as other rules, otherwise it will first. For details, please refer to chapter 2.5.1 not take effect due to conflict. the STCP protocol. D.Type: Select E.Local F.SK:Set a password, the access terminal needs to enter the SK set here when accessing the device. IP,Local port: These two access terminals can be left blank. Use encryption,Use compression: Configure as needed. in the visitor. G.Role: The access terminal needs to fill H.Server name: The stcp proxy name set by the first I.Bind addr,Bind port: The client can be accessed by binding the address and port. The address and router client. port are the local machine or the connected device of the local machine. 37 / 51 37 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router After generating a new rule, you need to click "SAVE & APPLY" to make the rule take effect. 3.5.4 Add UDP Proxy Rules The UDP protocol is used to transmit a large amount of data. The port of the connected device needs is opened to the public network, to support data transmission can be performed through the public network and the remote port number. Multiple udp protocol that supports the udp protocol rules can be configured. the udp protocol. If the port 38 / 51 38 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router A.Disabled: Checking here means to disable this rule. B.Proxy Name: Customize a proxy name. The proxy name cannot be repeated, otherwise the rule will take effect due to conflict. not C. Type: Select IP: Fill D.Local the UDP protocol. in the ip of connected device (the ip address of network). the machine or the ip assigned by the lan port of the machine for the the device that needs to be accessed through the public E.Local port: The device needs to be forwarded to the port of the public network, which must be the port using the UDP protocol. F.Remote port: Add this remote port by the corresponding local device. This port number should not be the same as other do not use the occupied port, otherwise this rule will not take effect. to the public network address to access the local port opened rules, and G.Use encryption, Use compression: Check these two as needed. H.Multiple rules can be added, the remote port and proxy name should not conflict, and click "SAVE
& APPLY" after the configuration is complete. After generating a new rule, you need to click "SAVE & APPLY" to make the rule take effect. Through the UDP protocol, use the public network address and remote port number to access the device forwarded to the public network (111.111.111.111:6007 accesses 192.168.2.233:4001). 39 / 51 39 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router 3.5.5 Add HTTP Proxy Rules For http and https services, domain name-based virtual hosts are supported, and custom domain name binding is supported, so that multiple domain names can share a port 80 and access intranet web pages through the custom domain name. Multiple http rules can be configured, which can be accessed directly through a custom domain name. After the configuration is complete, you can access the corresponding web page through the custom domain name plus the http penetration port (ie vhost_http_port) provided by the server. A.Disabled: Checking here means to disable this rule. B.Proxy Name: Customize an agent name. The agent name cannot be repeated, otherwise the rule will not take effect due to conflict. C.Type: Select IP: Fill D.Local the HTTP protocol. in the ip of the machine for the connected device (the ip address of the device that needs to be accessed through the public network). the public network, and this port must E.Local port: The device needs to be forwarded to the port of the machine or the ip assigned by the lan port of be the port number of the internal page. F.Use encryption,Use compression,HTTP user,HTTP password: These four are selected as needed. G.Subdomain: Write it H.Custom domains: xxx. The domain name bound to the public network, xxx is defined by itself, but if you don't have it. if you have it, or leave it out the latter must be the domain name bound to the public network. 40 / 51 40 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router After generating a new rule, you need to click "SAVE & APPLY" to make the rule take effect. The browser can log in to openwrt.frp.****.***:5080 to enter the client routing management page. is a custom part, and you need to add a record on the domain name application the frpc server;
Among them, openwrt website to resolve the subdomain name;frp.****.*** is the value of subdomain_host of port 5080 is the intranet penetration port provided by the server, and the value of vhost_http_port;
You can configure multiple http rules in this way, and the custom domain name does not need to be the same. 41 / 51 41 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router Chapter 4 VPN Service 4.1 PPTP VPN Navigation bar "VPN Service" - "PPTP VPN", select Enable, fill in the server address, fill in the user name and password according to the server settings, click "SAVE & APPLY". A.Enable: To use PPTP VPN, you need to check it, and you can just uncheck it when you don't use it. B.Server Address: The server C.Username,Password: Fill IP address, usually the public IP. in the username and password set by the server. After the connection is successful, the address assigned by the server will appear in the status bar. If pptp is not used, uncheck it and click "SAVE & APPLY". 4.2 L2TP VPN Navigation bar "VPN Service" - "L2TP VPN", select Enable, fill in the user name and password according to the server settings, click "SAVE & APPLY". A.Enable: To use L2TP VPN, you need to check it, and you can just uncheck it when you don't use it. 42 / 51 42 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router B.Server Address: The server C.Username,Password: Enter IP address, usually the public IP. the username and password set by the server. After the connection is successful, the address assigned by the server will appear in the status bar. If l2tp is not used, uncheck it and click "SAVE & APPLY". 4.3 GRE VPN Navigation bar "VPN Service" - "GRE VPN", select Enable, select gretap or gre according to the protocol IPv4 address and remote IPv4 of the opposite end (keep the protocol at both ends the same). The local address are filled in according to the local wan port (public network) address and the peer wan port (public network) address, and the local tunnel address and the peer tunnel address are in the same network segment. 43 / 51 43 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router Refresh status information after "SAVE & APPLY". Then add routing table rules, you can successfully access the peer Lan port device. 44 / 51 44 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router 4.4 OpenVPN Navigation bar "Virtual Private Network" - "OpenVPN", click "SAVE & APPLY" after all configurations are consistent with the server, the three certificates are provided by the server. The advanced settings page is modified according to the server. If relink is checked, it means that openvpn can automatically reconnect. If you need to automatically reconnect, you can check it. If you dont need it, leave it unchecked. After all configurations are completed, click SAVE & APPLY. 45 / 51 45 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router After the connection is successful, the status bar will refresh the address. If openvpn is not used, uncheck it and click "SAVE & APPLY". Chapter 5 System 5.1 Date Time Time synchronization is enabled by default. If necessary, you can change the NTP server to synchronize the time of the server. Navigation bar "System" - "Date Time", click "SAVE & APPLY" after setting. 46 / 51 46 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router 5.2 Language Setting Change the language displayed on the page according to your own needs, you can choose English in the navigation bar "System" - "Language Setting", or change the language in or Chinese, change it the login interface. 5.3 Modify Password The default password for login is admin. If the user needs to protect the configuration interface to avoid being modified by others, he can modify the login password, click "System" - "Modify Password" in turn, then fill in the password to be modified, and then SAVE & APPLY, as follows. 47 / 51 47 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router 5.4 Update Firmware Navigation bar "System" - "Update Firmware", select the file and click "UPDATE", the MD5 check code page will appear after uploading, click "PROCEED" to upgrade, the upgrade will take a certain time,it takes about 1~2 minutes, after the upgrade is complete, log in again through "192.168.2.1". When upgrading the firmware, you need to uncheck the "Keep settings" option. 5.5 Factory Reset Factory reset settings, and you want
- "Factory Reset", click "Execute reset", you can restore the device to the factory default. is generally when the device fails to enter the device page, or there are many function it,you can restore the factory default settings, the navigation bar "System"
to reset 48 / 51 48 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router 5.6 Reboot Immediately restart, the device can be restarted through the page, the navigation bar "System" - "Reboot", click "Execute restart" to restart the device. 49 / 51 49 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router 5.7 page log out Click "Logout" to exit to the login interface. to part 15 of FCC Statement:
Note: This equipment has been tested and found to comply with the limits for a Class B digital the FCC Rules. These limits are designed to provide reasonable device, pursuant installation. This equipment generates, uses protection against harmful interference in a residential installed and used in accordance with the and can radiate radio frequency energy and, if not instructions, may cause harmful guarantee that harmful equipment off and on, the user is encouraged to try to correct of television reception, which can be determined by turning the interference to radio communications. However, there is no interference will not occur in a particular installation. If the interference by one or more this equipment does cause the following measures:
interference to radio or Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. to the following two This device complies with part 15 of interference, and (2) this device must accept conditions:(1) This device may not cause harmful any interference received, including interference that may cause undesired operation. For indoor use only in bands 5150-5250MHz. the FCC Rules. Operation is subject Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. This equipment complies with FCC radiation exposure limits set environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. forth for an uncontrolled 50 / 51 50 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net SLK-R680-WIFI Industrial WIFI6 Router Thank you for your support of SERIALLINK products. If you have any questions, please email: info@seriallink.net or www.seriallink.net 51 / 51 51 / 51 WEBwww.seriallink.net e-Mailinfo@seriallink.net
1 2 | Internal Photos | Internal Photos | 1.69 MiB | September 30 2022 / March 29 2023 | delayed release |
1 2 | External Photos | External Photos | 1.57 MiB | September 30 2022 / March 29 2023 | delayed release |
1 2 | Test Photos | Test Setup Photos | 2.96 MiB | September 30 2022 / March 29 2023 | delayed release |
1 2 | FCCSoftwareConfigurationControlDeclaration | Cover Letter(s) | 98.36 KiB | September 30 2022 |
Meshmerize GmbH FCC Software Configuration Control Declaration Date: September 27, 2022 Federal Communications Commission 7435 Oakland Mills Road Columbia, MD 21046 USA Attn: OET Dept. Industrial grade WIFI6 router / Bumble:
Regarding FCC Country Code Selection guidelines identified in KDB 594280. All applications for equipment authorization for transmitters that can have radio parameters, or other technical parameters, reported to the Commission set by software must have an attestation indicating that no third party will have software, or configuration control, to program the device out of compliance of the technical rules under which it has been certified. We declare that no third party will have software, or configuration control, to program the device out of compliance of the technical rules under which it has been certified. Name:Simon Wunderlich Date: Sep. 27, 2022 Title: General Manager Signature of applicant FCC Software Configuration Control Declaration Rev1.1
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2022-09-30 | 2412 ~ 2462 | DTS - Digital Transmission System | Original Equipment |
2 | 5745 ~ 5825 | NII - Unlicensed National Information Infrastructure TX |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 2 | Effective |
2022-09-30
|
||||
1 2 | Applicant's complete, legal business name |
Meshmerize GmbH
|
||||
1 2 | FCC Registration Number (FRN) |
0032767337
|
||||
1 2 | Physical Address |
August-Bebel-Strasse 23
|
||||
1 2 |
Dresden, N/A
|
|||||
1 2 |
Germany
|
|||||
app s | TCB Information | |||||
1 2 | TCB Application Email Address |
c******@micomlabs.com
|
||||
1 2 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 2 | Grantee Code |
2A8CP
|
||||
1 2 | Equipment Product Code |
BUMBLE
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 2 | Name |
S****** W******
|
||||
1 2 | Telephone Number |
+49 3********
|
||||
1 2 | Fax Number |
+49 3********
|
||||
1 2 |
s******@meshmerize.net
|
|||||
app s | Technical Contact | |||||
1 2 | Firm Name |
Meshmerize GmbH
|
||||
1 2 | Physical Address |
Germany
|
||||
1 2 |
s******@meshmerize.net
|
|||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 2 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 2 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 2 | If so, specify the short-term confidentiality release date (MM/DD/YYYY format) | 03/29/2023 | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 2 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 2 | Equipment Class | DTS - Digital Transmission System | ||||
1 2 | NII - Unlicensed National Information Infrastructure TX | |||||
1 2 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | Industrial grade WIFI6 router | ||||
1 2 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 2 | Modular Equipment Type | Does not apply | ||||
1 2 | Purpose / Application is for | Original Equipment | ||||
1 2 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | Yes | ||||
1 2 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 2 | Grant Comments | Output power listed is maximum combined conducted power. This device contains 20 and 40 MHz signal bandwidth. Device is a 2x2 MIMO as is described in the filing. The antennas used with this transmitter must be installed to provide a minimum separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter, except in accordance with FCC multi- transmitter product procedures. End-users must be provided with operating procedures for satisfying RF exposure compliance. | ||||
1 2 | Output power listed is maximum combined conducted power. This device contains 20, 40 and 80 MHz signal bandwidth. Device is a 2x2 MIMO as is described in the filing. The antennas used with this transmitter must be installed to provide a minimum separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter, except in accordance with FCC multi- transmitter product procedures. End-users must be provided with operating procedures for satisfying RF exposure compliance. | |||||
1 2 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 2 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 2 | Firm Name |
Shenzhen ZKT Technology Co., Ltd.
|
||||
1 2 | Name |
L**** X****
|
||||
1 2 | Telephone Number |
0086-********
|
||||
1 2 |
z******@zkt-lab.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | CC MO | 2412.00000000 | 2462.00000000 | 0.0773000 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
2 | 1 | 15E | CC MO | 5180 | 5240 | 0.0578 | |||||||||||||||||||||||||||||||||||
2 | 2 | 15E | CC MO | 5745 | 5825 | 0.0247 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC