RT056 Ug R1520 V.1.0.4
RT056 Ug R1520 V.1.0.4
RT056 Ug R1520 V.1.0.4
User Guide
R1520
Industrial Dual SIM Cellular VPN Router
names mentioned in this document are the property of their respective owners.
Disclaimer
No part of this document may be reproduced in any form without the written permission of the copyright owner.
The contents of this document are subject to change without notice due to continued progress in methodology,
design and manufacturing. Robustel shall have no liability for any error or damage of any kind resulting from the
inappropriate use of this document.
Technical Support
Tel: +86-20-82321505
Fax: +86-20-82321505
Email: support@robustel.com
Web: www.robustel.com
Important Notice
Due to the nature of wireless communications, transmission and reception of data can never be guaranteed. Data
may be delayed, corrupted (i.e., have errors) or be totally lost. Although significant delays or losses of data are rare
when wireless devices such as the router is used in a normal manner with a well-constructed network, the router
should not be used in situations where failure to transmit or receive data could result in damage of any kind to the
user or any other party, including but not limited to personal injury, death, or loss of property. Robustel accepts no
responsibility for damages of any kind resulting from delays or errors in data transmitted or received using the
router, or for failure of the router to transmit or receive such data.
Safety Precautions
General
The router generates radio frequency (RF) power. When using the router, care must be taken on safety issues
related to RF interference as well as regulations of RF equipment.
Do not use your router in aircraft, hospitals, petrol stations or in places where using cellular products is
prohibited.
Be sure that the router will not be interfering with nearby equipment. For example: pacemakers or medical
equipment. The antenna of the router should be away from computers, office equipment, home appliance, etc.
An external antenna must be connected to the router for proper operation. Only uses approved antenna with
the router. Please contact authorized distributor on finding an approved antenna.
Always keep the antenna with minimum safety distance of 20 cm or more from human body. Do not put the
antenna inside metallic box, containers, etc.
RF exposure statements
1. For mobile devices without co-location (the transmitting antenna is installed or located more than 20cm
away from the body of user and nearby person)
FCC RF Radiation Exposure Statement
1. This Transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
2. This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment.
This equipment should be installed and operated with a minimum distance of 20 centimeters between the
radiator and human body.
Note: Some airlines may permit the use of cellular phones while the aircraft is on the ground and the door is open.
Router may be used at this time.
2013/56/EU The European 2013/56/EU Directive is a battery Directive which published in the EU official gazette
on 10 December 2013. The button battery used in this product conforms to the standard of
2013/56/EU directive.
Indicates its warning attribute, that is, some hazardous substances are contained in the product.
The "10" in the middle of the legend refers to the environment-friendly Use Period (EFUP) * of
electronic information product, which is 10 years. It can be used safely during the
environment-friendly Use Period. After the environmental protection period of use, it should enter
the recycling system.
*The term of environmental protection use of electronic information products refers to the term
during which the toxic and hazardous substances or elements contained in electronic information
products will not be leaked or mutated and cause serious pollution to the environment or serious
damage to people and property under normal conditions of use.
The device is restricted to indoor use only when operating in the 5150 to 5350 MHz frequency range.
Document History
Updates between document versions are cumulative. Therefore, the latest document version contains all updates
made to previous versions.
Contents
Chapter 1 Product Overview ............................................................................................................................... 12
1.1 Introduction ....................................................................................................................................................... 12
1.2 Package Contents ...............................................................................................................................................12
1.3 Specifications ..................................................................................................................................................... 15
1.4 Dimensions ........................................................................................................................................................ 16
Chapter 2 Hardware Installation ..........................................................................................................................17
2.1 Definition of Power Interface ............................................................................................................................ 17
2.2 Interface Definition of 2 * 3 3.5mm .................................................................................................................. 17
2.3 Interface Definition of 2 * 4 3.5mm .................................................................................................................. 18
2.4 LED indicator ......................................................................................................................................................19
2.5 USB Interface ..................................................................................................................................................... 20
2.6 Reset Button ...................................................................................................................................................... 21
2.7 Ethernet Ports ....................................................................................................................................................21
2.8 Insert or Remove SIM Card ................................................................................................................................22
2.9 Attach External Antenna (SMA Type) ................................................................................................................ 23
2.10 Mount the Router ............................................................................................................................................ 24
2.11 Connect the Router to a Computer ................................................................................................................. 26
2.12 Power Supply ................................................................................................................................................... 26
2.13 DI/DO Interface ................................................................................................................................................27
2.14 AI Interface .......................................................................................................................................................28
Chapter 3 Initial Configuration ............................................................................................................................ 29
3.1 Configure the PC ................................................................................................................................................ 29
3.2 Factory Default Settings .....................................................................................................................................31
3.3 Log in the Router ............................................................................................................................................... 32
3.4 Control Panel ..................................................................................................................................................... 32
Chapter 4 Router Configuration ...........................................................................................................................35
4.1 Status ................................................................................................................................................................. 35
4.1.1 System Information .................................................................................................................................35
4.1.2 Internet Status ........................................................................................................................................ 36
4.1.3 LAN Status ...............................................................................................................................................36
4.2 Interface .............................................................................................................................................................37
4.2.1 Link Manager .......................................................................................................................................... 37
4.2.2 LAN ..........................................................................................................................................................48
4.2.3 Ethernet .................................................................................................................................................. 52
4.2.4 Cellular .................................................................................................................................................... 53
4.2.5 WiFi ......................................................................................................................................................... 58
4.2.6 USB ..........................................................................................................................................................66
4.2.7 DI/DO ...................................................................................................................................................... 67
4.2.8 AI ............................................................................................................................................................. 71
4.2.9 Serial Port ................................................................................................................................................73
4.3 Network ............................................................................................................................................................. 77
4.3.1 Route .......................................................................................................................................................77
4.3.2 Firewall ....................................................................................................................................................79
4.3.3 IP Passthrough ........................................................................................................................................ 84
1.1 Introduction
The Robustel industrial dual SIM cellular VPN router (R1520) is a rugged cellular router can support 2G, 3G, and 4G
LTE Cat 4 networks. It provides high-speed wireless network bandwidth for devices through wireless connections to
R1520 is a powerful router developed from RobustOS, a Robustel self-developed and Linux-based operating system
which is designed to be used in Robustel devices. The RobustOS includes basic networking features and protocols
providing customers with a very good customized user experience, which is more diverse, convenient, and practical.
Meanwhile, Robustel offers a Software Development Kit (SDK) for partners and customers to allow additional
customization by using C. It also provides rich Apps to meet fragmented IoT market demands.
Before installing your R1520 Router, verify the kit contents as following.
Note: The following pictures are for illustration purposes only, not based on their actual sizes.
1 x Robustel R1520 High-speed intelligent LTE router
1 x 2-pin 3.5 mm male terminal block with lock for power supply
Ethernet cable
1.3 Specifications
Cellular Interface
Number of antennas: 2 (MAIN + AUX)
Connector: SMA-K
SIM: 2 , Mini-SIM or eSIM
Standards: FDD LTE/TDD LTE, backward compatible to 2G/3G
Ethernet Interface
Number of ports: 5 x 10/100 Mbps (It can be configured as 5x LAN or 4 x LAN + 1 x WAN)
ETH0 port: supports 802.3at PD function
Magnet isolation protection: 1.5 KV
WiFi Interface
Number of antennas: 2 (WiFi1 + WiFi2)
Connector: RP-SMA-K
Standards: 802.11b/g/n, 2*2 MIMO, supports AP and Client modes
Frequency bands: 2.4GHz
Security: Open、WPA、WPA2、WEP
Encryption: AES、TKIP、WEP64
Data speed: Maximum rate is 300 Mbps
Serial Interface
Number of ports: 1 x RS232 and 1 x RS485
Connector: 2 *4-pin 3.5 mm female socket
ESD protection: ±8 KV Air
RS232: TxD, RxD, RTS, CTS, SGND
RS485: Data+ (A), Data- (B)
DI/DO
Type: 1 x DI (wet contact) + 1 x DO (wet contact)
Connector: 2*3-pin 3.5 mm female socket
Isolation: 3KVDC
Absolute maximum: + 30 V DC
Maximum input current of DI: 10 mA
Maximum output current of DO: 10 mA
Analog Input
Type: 1 x AI
Connector: 2*3-pin 3.5 mm female socket(Shared with DI / DO)
Others
1 x Reset button (Tact Switch)
1 x 480 Mbps high-speed USB 2.0 interface (host mode), Type A, 5V / 500 mA
LED indicators - 1 x RUN, 1 x Modem, 1 x USR, 1 x WiFi, 1 x RSSI
Physical Characteristics
Ingress protection: IP30
Housing & Weight: Plastic, 250 g
Dimensions: 105mm (length) x 90mm(width) x 46mm(thickness)
Installations: Desktop, wall mounting or DIN rail mounting (Wall mounting and Din rail mounting installation
requires additional installation accessories)
Operating Temperature: -25~+70 °C
Storage Temperature: -40~+85 °C
Relative Humidity: 5~95% RH
1.4 Dimensions
PIN DI DO AI Note
3 -- -- AI Analog input
Note: 1. click Services > Advanced > system > System Settings > Custom LED Indicator type to set the display type of
USR LED.
2. When the LEDs start blinking one by one, the WLAN indicator will not turn on and off.
Function Operation
The USB interface can be used for batch firmware upgrades, but it cannot
send or receive data with slave devices connected to the USB interface. The
Firmware user can insert a USB storage device, such as a U disk or a hard disk, at the
upgrade USB interface. If there is a configuration file or router firmware in the USB
storage device, the router will automatically update the configuration file or
firmware. For details, please refer to "4.2.6 USB".
Function Operation
Reboot Press and hold the RST button for 2 to 7 seconds under the operating status.
Restore to factory Wait for 0~20 seconds after powering up the router, press and hold the RST button with a
default settings pointed bar until all five LEDs start blinking one by one, and release the button to return the
router to factory defaults.
There are five Ethernet ports on R1520, including ETH0 (POE), ETH1, ETH2, ETH3 and ETH4. Each has two LED
indicators. The green one is a link indicator but the yellow one doesn’t mean anything. For details about status, see
the table below.
Note:
1. Use the specific M2M SIM card when the device is working in extreme temperature, because the regular card for
long-time working in harsh environment will be disconnected frequently.
2. Do not touch the metal of the card surface in case information in the card will lose or be destroyed.
3. Do not bend or scratch the card.
4. Keep the card away from electricity and magnetism.
5. Make sure router is powered off before inserting or removing the card.
Attach an external SMA antenna to the router’s antenna connector and twist tightly. Make sure the antenna is within
the correct frequency range provided by the ISP and with 50 Ohm impedance.
Note: Recommended torque for tightening is 0.35 N.m.
First, drill holes on the wall, the distance between the two holes is 60mm, then knock the expansion pipe into the
wall with a rubber hammer, align the screw with the expansion pipe, insert the screw and reserve the corresponding
length, and finally fix the product on the wall.
Note: Recommended torque for mounting is 1.0 N.m, and the maximum allowed is 1.2 N.m.
Use 3 pcs of M3*8 Black cross recessed countersunk head tapping screws to mount the router on the DIN rail, and
then hang the DIN rail on the holder. You need to choose a standard holder.
Note: Recommended torque for mounting is 0.8 N.m, and the maximum allowed is 1.0 N.m.
Use 3 pcs of M3*8 Black cross recessed countersunk head tapping screws to mount the router on the DIN rail, and
then hang the DIN rail on the holder. You need to choose a standard holder.
Note: Recommended torque for mounting is 0.8 N.m, and the maximum allowed is 1.0 N.m.
Connect the Ethernet port (ETH1 ~ ETH4) of the router to a PC with a standard crossover cable.
R1520 supports 1 channel DI and 1 channel DO, the internal schematic diagram is as shown above;
1. DI application
R1520 DI input is internally isolated by opt coupler, internal current-limiting design, within the working level of 0 ~
30V, external input does not need current limiting, DI input logic level range is as follows:
Logic 1 level range: min 3.5 V to max 30 V;
Logic 0 level range: min 0 V to max 1 V;
The application example is as follows:
2. DO application
R1520 DO output is internally isolated by opt ocoupler, OUT is OC gate output, Normal use requires external resistor
pull-up, the pull-up voltage range is 3V ~ 30V (for actual use, please consult Technical Support Engineer for selection
of pull-up resistor);
The application example is as follows:
2.14 AI Interface
R1520 supports one channel AI interface for analog signal voltage and current measurement;
1. 0 ~ 24V voltage measurement, wiring as shown below:
2. 4 ~ 20mA current signal measurement requires an external parallel 1.2kohm resistor, wiring as shown below:
There are two methods to get IP address for the PC. One is to obtain an IP address automatically from “Local Area
Connection”, and another is to configure a static IP address manually within the same subnet of the router. Please
refer to the steps below.
Here take Windows 7 as example, and the configuration for windows system is similar.
1. Click Start > Control Panel, double-click Network and Internet, and then double-click Network Connections.
Before configuring your router, you need to know the following default settings.
Item Description
Username admin
Password admin
ETH0/POE Default WAN mode
ETH1 192.168.0.1/255.255.255.0, LAN mode
ETH2 192.168.0.1/255.255.255.0, LAN mode
ETH3 192.168.0.1/255.255.255.0, LAN mode
ETH4 192.168.0.1/255.255.255.0, LAN mode
DHCP Server Enabled
To log in to the management page and view the configuration status of your router, please follow the steps below.
1. On your PC, open a web browser such as Internet Explorer and Google, etc.
2. From your web browser, type the IP address of the router into the address bar and press enter. The default IP
address of the router is http://192.168.0.1/, though the actual address may vary.
3. In the login page, enter the username and password, choose language and then click LOGIN. The default
username and password are “admin”.
Note: If enter the wrong username or password over 6 times, the login web will be locked for 5 minutes.
After successfully logging into the R1520 router, the home page is as shown in the figure below:
In the home page, the user can save the configuration, restart the router, log out, and so on.
Using the original username and password to log in the router, the page will pop up the following tab.
It is strongly recommended for security purposes that you change the default username and/or password.
Click the to close the popup. To change your username and/or password, see 4.6.6 User Management.
Control Panel
Item Description Button
Save & Apply Click to save the current configuration into router’s flash and apply the
modification on every configuration page, to make the modification
taking effect.
Reboot Click to reboot the router. If the Reboot button is yellow, it means that
some completed configurations will take effect only after reboot.
Logout Click to log the current user out safely. After logging out, it will switch to
login page. Shut down web page directly without logout, the next one can
login web on this browser without a password before timeout.
6. Click .
4.1 Status
This section allows you to view the System Information of your Router.
System Information
Item Description
Device Model Show the model name of your device.
System Uptime Show the current amount of time the router has been connected.
System Time Show the current system time.
RAM Usage Show the free memory and the total memory.
Firmware Version Show the firmware version running on the router.
Hardware Version Show the current hardware version.
Kernel Version Show the current kernel version.
Serial Number Show the serial number of your device, from which you can get information such as the
router's time of delivery.
Internet Status
Item Description
Active Link Show the current active link. WWAN1, WWAN2, WAN or WLAN.
Uptime Show the current amount of time the link has been connected.
IP Address Show the IP address of current link.
Gateway Show the gateway address of the current link.
DNS Show the current primary DNS server and secondary server.
LAN Status
Item Description
IP Address Show the IP address and the Netmask of the router.
MAC Address Show the MAC address of the router.
4.2 Interface
This section allows you to setup the connection of Link Manager. Link manager is a network link backup function that
provides mobile network and Ethernet link backups.
Link Settings allows you to configure the parameters of link connection, including WWAN1, WWAN2, WAN and
WLAN. It is recommended to enable Ping detection to keep the router always online. The Ping detection increases
the reliability and also costs the data traffic.
WWAN1/ WWAN2
The window is displayed as below when enabling the “Automatic APN Selection” option.
The window is displayed as below when disabling the “Automatic APN Selection” option.
WAN
Router will obtain IP automatically from DHCP server if choosing “DHCP” as connection type. The window is
displayed as below.
The window is displayed as below when choosing “Static” as the connection type.
The window is displayed as below when choosing “PPPoE” as the connection type.
Upload Bandwidth Enter the upload bandwidth used for QoS, measured in kbps. 10000
Download Bandwidth Enter the download bandwidth used for QoS, measured in kbps. 10000
Overrided Primary DNS Override primary DNS will override the automatically obtained DNS. Null
Overrided Secondary Override secondary DNS will override the automatically obtained DNS. Null
DNS
Debug Enable Click the toggle button to enable/disable this option. Enable for debugging ON
information output.
Verbose Debug Enable Click the toggle button to enable/disable this option. Enable for verbose OFF
debugging information output.
WLAN
Router will obtain IP automatically from the WLAN AP if choosing “DHCP” as the connection type. The specific
parameter configuration of SSID is shown as below.
The window is displayed as below when choosing “Static” as the connection type.
Status
This page allows you to view the status of link connection and clear the monthly data usage statistics.
Click the right-most button to select the connection status of the current link.
Click the row of the link, and it will show the details information of the current link connection under the row.
WWAN usage data statistics and WAN usage data statistics respectively count the packet flow of the cellular module
and WAN.
Click the button to clear the monthly data traffic usage statistics of SIM1 or SIM2. Data statistics will be
displayed only if enable the Data Allowance function in Interface > Link Manager > Link Settings >
WWAN1/WWAN2/WAN Settings > Data Allowance .
4.2.2 LAN
This section allows you to set the related parameters for LAN port. When ETH0 is configured as WAN, the router has
four LAN ports, ETH1, ETH2, ETH3, and ETH4. The ETH1, ETH2, ETH3 and ETH4 can freely choose from lan0, lan1, lan2
and lan3. When ETH0 is configured as LAN, the router has five LAN ports, ETH0, ETH1, ETH2, ETH3, and ETH4. The
ETH0, ETH1, ETH2, ETH3 and ETH4 can freely choose from lan0, lan1, lan2, lan3 or lan4. Whether it is four LAN ports
or five LAN ports, lan0 must be selected by at least one LAN port. The default settings of ETH1/ETH2/ETH3/ETH4 are
lan0 and their default IP are 192.168.0.1/255.255.255.0.
LAN
You may click to add a new LAN port, or click to delete the current LAN port. Now, click to edit the
configuration of the LAN port.
LAN
Multiple IP
You may click to edit the multiple IP of the LAN port, or click to delete the multiple IP of the LAN port. Now,
click to add a new multiple IP of the LAN port.
IP Settings
Item Description Default
Index Indicate the ordinal of the list. --
Interface Show the editing port, read only. --
IP Address Set the multiple IP address of the LAN port. Null
Netmask Set the multiple Netmask of the LAN port. Null
Status
Click the row of status, the details status information will be display under the row.
4.2.3 Ethernet
This section allows you to set the related parameters for Ethernet. There are five Ethernet ports on R1520 Router,
including ETH0, ETH1, ETH2, ETH3 and ETH4 . ETH0 can be configured as the WAN port for the router to access the
outer network or the LAN port for the lower end devices to connect with the router. ETH1, ETH2, ETH3 and ETH4 can
only be configured as a LAN port for the lower device to connect to the router. The default factory settings of ETH0 is
Wan. ETH1, ETH2, ETH3 and ETH4 are lan0, and the default IP is 192.168.0.1/255.255.255.0.
Click the button on the right-most of eth1 to change the port parameters in the port window that pops up.
Port Settings
Item Description Default
Index Indicate the ordinal of the list. --
Port Show the editing port, read only. --
Port Assignment Choose the Ethernet port’s type, as a WAN port or a LAN port. When setting the lan0
port as a LAN port in Interface > LAN > LAN > Network Settings > General Settings,
you can click the drop-down list to select from “lan0”, “lan1”, “lan2” or“lan3”
Click the status column to view the connection status of all Ethernet ports.
Click the row of status, the details status information will be display under the row. Please refer to the screenshot
below.
4.2.4 Cellular
This section allows you to set the related parameters of Cellular. The R1520 Router has two SIM card slot. When
inserting a single SIM card for the first time, both Sim1 and sim2 slots are available.
The window is displayed as below when choosing “Auto” as the network type.
The window is displayed as below when choosing “Specify” as the band select type.
Cellular
Item Description Default
General Settings
Index Indicate the ordinal of the list. --
SIM Card Set the currently editing SIM card. SIM1
Phone Number Enter the phone number of the SIM card. Null
PIN Code Enter a 4-8 characters PIN code used for unlocking the SIM. Null
Extra AT Cmd Enter the AT commands used for cellular initialization. Null
Telnet Port Specify the Port listening of telnet service, used for AT over Telnet. 0
Cellular Network Settings
Network Type Select from “Auto”, “4G Only”, “4G First”. Auto
Auto: Connect to the best signal network automatically
4G Only: Only the 4G network is connected
4G First: Connect to the 4G Network preferentially
Band Select Type Select from “All” or “Specify”. You may choose certain bands if choosing All
“Specify”.
Advanced Settings
Debug Enable Click the toggle button to enable/disable this option. Enable for debugging ON
information output.
Verbose Debug Click the toggle button to enable/disable this option. Enable for verbose OFF
Enable debugging information output.
This section allows you to view the status of the cellular connection.
Click the row of status, the details status information will be displayed under the row.
Status
Item Description
Index Indicate the ordinal of the list.
Modem Status Show the status of the radio module.
Modem Model Show the model of the radio module.
Current SIM Show the SIM card that your router is using: SIM1 or SIM2.
Phone Number Show the phone number of the current SIM.
Note: This option will be displayed if enter manually in Cellular > Advanced Cellular
Settings > SIM1 > General Settings > Phone Number.
IMSI Show the IMSI number of the current SIM.
ICCID Show the ICCID number of the current SIM.
Registration Show the current network status.
Network Provider Show the name of Network Provider.
Network Type Show the current network service type, e.g. GPRS.
Status
Item Description
Band Show the band of the current network.
Signal Strength Show the signal strength.
RSRP Show the Reference Signal Received Power. (Only valid for 4G network)
RSRQ Show the Reference Signal Received Quality. (Only valid for 4G network)
SINR Show the Signal to Interference plus Noise Ratio. (Only valid for 4G network)
EC/IO Show EC/IO when registering to 3G networks.
Bit Error Rate Show the current bit error rate.
PLMN ID Show the current PLMN ID.
Local Area Code Show the current local area code used for identifying different area.
Community ID Show the current Community ID used for locating the router.
IMEI Show the IMEI (International Mobile Equipment Identity) number of the radio
module.
Firmware Version Show the current firmware version of the radio module.
AT Debug
Item Description Default
Command Enter the AT command that you want to send to cellular module in this Null
text box.
Result Show the AT command responded by cellular module in this text box. Null
Click the button to send AT command. --
4.2.5 WiFi
This section allows you to configure the parameters of WiFi AP and WiFi Clinet. Router supports either WiFi AP mode
or Client mode, and defaults as AP.
WiFi AP
Note: Please remember to click Save & Apply after finish the configuration, so that the configuration can be took
effect.
Click the Access Point column to configure the parameters of WiFi AP. By default, the security mode is set as
“Disabled”.
The window is displayed as below when setting “WPA-Personal” as the security mode.
The window is displayed as below when setting “WPA-Enterprise” as the security mode.
The window is displayed as below when setting “WEP” as the security mode.
Click to add a MAC address to the Access Control List. The maximum count for MAC address is 64.
Note: WiFi is off by default. Follow the steps below to enable it and configure the router as WiFi client.
WiFi Client
And then a “WLAN” column will appear under the Interface list.
Click Interface > Link Manager > Link Settings, and click the edit button of WLAN, then configure its related
parameters.
Click Interface > WLAN to configure the parameters of WiFi Client after setting the mode as Client.
Users can refresh the SSID scan results near the router. Click , and then click scan to refresh the surrounding
SSID
4.2.6 USB
This section allows you to configure the USB parameters. The router's USB interface can be used to upgrade firmware
4.2.7 DI/DO
This section allows you to set the DI/DO parameters. Digital Input and Digital Output are the specific interfaces for
R1520. The DI interface can be used for triggering alarm, while the DO can be used for controlling the slave device so
as to realize real-time monitoring.
DI
Click the right-most button of DI index 1 as below. The window is displayed as below when the default mode is
“ON-OFF”.
General Settings @ DI
Item Description Default
Index Indicate the ordinal of the list. --
Enable Click the toggle button to enable/disable the digital input function. OFF
Mode Select from “ON-OFF” or “Counter”. ON-OFF
ON-OFF: Alarm mode can be triggered at the DI access ON-OFF.
Counter: Event counter mode
Inversion The count is divided into a rising edge count of the level or a falling edge OFF
count. If the current rising edge count, the reverse edge is the falling edge
count.
Threshold Value The threshold value is a unique parameter when the mode is count. Set the 0
threshold value to trigger the DI alarm when the count value reaches the
threshold value.
Alarm On Content Show the content when alarm on. Alarm On
Alarm Off Content Show the content when alarm off. Alarm Off
Note: It defaults as high alarm, while turns to low alarm after enabling the “Inversion” button.
DO
The window is displayed as below when choosing “Pulse” as the alarm on action.
The window is displayed as below when choosing “Pulse” as the alarm off action.
General Settings @ DO
Item Description Default
Index Indicate the ordinal of the list. --
Enable Click the toggle button to enable/disable this DO. OFF
Alarm On Action Digital Output initiates when there is an alarm. Selected from “High”, “Low” or High
“Pulse”.
High: a high electrical level output
Low: a low electrical level output
Pulse: Generates a square wave as specified in the pulse mode parameters when
triggered
Alarm Off Digital Output initiates when alarm removed. Selected from “High”, “Low” or “Pulse”. Low
Action High: a high electrical level output
Low: a low electrical level output
Pulse: Generates a square wave as specified in the pulse mode parameters when
triggered
Initial State Specify the Digital Output status when powered on. Selected from “Last”, “High” or Last
“Low”.
Last: DO’s status will consist with the status of last power off
High: DO interface is in high electrical level
Low: DO interface is in low electrical level
Delay Set the delay time for DO alarm start-up. The first pulse will be generated after a 0
(unit: 100ms) “Delay”. Enter from 0 to 3000 (0=generate pulse without delay).
Hold Time Set the hold time of DO status (Alarm On Action/Alarm Off Action). When the action 0
(unit: s) time reach this specified time, DO will stop the action. Enter from 0 to 3000 seconds.
(0=keep on until the next action)
Low-level Width Set the low-level width. It is available when enabling Pulse as “Alarm On Action/Alarm 1000
General Settings @ DO
Item Description Default
(unit: ms) Off Action”. In Pulse Output mode, the selected digital output channel will generate a
square wave as specified in the pulse mode parameters. The low level widths are
specified here. Enter from 1000 to 3000.
High-level Set the high-level width. It is available when enabling Pulse as “Alarm On 1000
Width Action/Alarm Off Action”. In Pulse Output mode, the selected digital output channel
(unit: ms) will generate a square wave as specified in the pulse mode parameters. The high level
widths are specified here. Enter from 1000 to 3000.
Alarm Source Digital output activation can be activated by this alarm. DI1
Status
This window allows you to view the status of DI/DO interface. It can also clear the counter alarm of DI in here.
Click button to clear DI 1 or DI 2 monthly usage statistics info for counter alarm.
4.2.8 AI
This section is used to set the parameters of analog input (AI). AI is a unique interface of R1520 router. The analog
input is used to collect analog signals within a certain range, and is often used to collect continuously changing values
such as voltage, current, temperature, and pressure of the sensor. The higher the accuracy of the ADC bits used for
analog input, the finer the analog quantization and the more accurate the result.
Click the right-most button of DI index 1 as below. The window is displayed as below when the “input type” is
“voltage”.
AI (Analog Input)
Item Description Default
Index Indicate the ordinal of the list. --
Enable Click the switch button to "ON" to turn on the analog input function. OFF
Select from "Voltage" or "Current".
Input type Voltage: The data collected is voltage Voltage
Current: The data collected is Current
Min Set the minimum voltage threshold. When the voltage collected by the AI interface is
Threshold@Volt less than the minimum voltage threshold, an event notification will be triggered. Unit: 3
age V.
Max Set the maximum voltage threshold. When the voltage collected by the AI interface is
Threshold@Volt greater than the maximum voltage threshold, an event notification will be triggered. 20
age Unit: V.
Min Set the minimum current threshold. When the current collected by the AI interface is
Threshold@Curr less than the minimum current threshold, an event notification will be triggered. Unit: 4
ent mA.
AI (Analog Input)
Item Description Default
Max Set the maximum current threshold. When the current collected by the AI interface is
Threshold@Curr greater than the maximum current threshold, an event notification will be triggered. 16
ent Unit: mA.
Interval Collect the latest data every few seconds. 5
This section allows you to set the serial port parameters. The R1520 router supports two serial ports, COM1 and
COM2. It can also be modified according to requirements and configured as two COM1 or two COM2. The serial data
can be converted into IP data or through IP data into serial data, and then the data can be transmitted through wired
or wireless network, so as to realize the function of transparent data transmission.
In the "Server Settings" column, when "Transparent " is selected as the application mode and "TCP Client" as the
protocol, the window is as follows:
When "Transparent " is selected as the application mode and "TCP Server" as the protocol, the window is as follows:
When "Transparent " is selected as the application mode and "UDP" is used as the protocol, the window is as follows:
When “ModBus RTU Gateway” is selected as the application mode and “TCP Client” as the protocol, the window is as
follows:
When "ModBus RTU Gateway" is selected as the application mode and "TCP Server" as the protocol, the window is
as follows:
When selecting "ModBus RTU Gateway" as the application mode and "UDP" as the protocol, the window is as
follows:
When “ModBus ASCII Gateway” is selected as the application mode and “TCP Client” as the protocol, the window is
as follows:
When selecting "ModBus ASCII Gateway" as the application mode and "TCP Server" as the protocol, the window is as
follows:
When selecting "ModBus ASCII Gateway" as the application mode and "UDP" as the protocol, the window is as
follows:
Serial Port
Item Description Default
Serial Port Application Settings
Index Indicate the ordinal of the list. --
Port Show the current serial’s name, read only. COM1
Enable Click the toggle button to enable/disable this serial port. When the status is OFF, the
OFF
serial port is not available.
Baud Rate Select from “300”, “600”, “1200”, “2400”, “4800”, “9600”, “19200”, “38400”, “57600” 115200
or “115200”.
Data Bits Select from “7” or “8”. 8
Stop Bits Select from “1” or “2”. 1
Parity Select from “None”, “Odd” or “Even”. None
Flow control Select from “None”, “Software” or “Hardware”. None
Data Packing
Packing Timeout Set the packing timeout. The serial port will queue the data in the buffer and send the 50
data to the Cellular WAN/Ethernet WAN when it reaches the Interval Timeout in the
field. The unit is milliseconds.
Note: Data will also be sent as specified by the packet length even when data is not
reaching the interval timeout in the field.
Packing Length Set the packet length. The Packet length setting refers to the maximum amount of 1200
data that is allowed to accumulate in the serial port buffer before sending. When a
packet length between 1 and 3000 bytes is specified, data in the buffer will be sent as
soon it reaches the specified length.
Server Settings
Click the "Status" column to view the current serial port type.
4.3 Network
4.3.1 Route
This section allows you to set the static route. Static routes are routes based on destination addresses. Up to 20 static
routes can be added to the router. Routing Information Protocol, or RIP (Route Information Protocol), is widely used
in small networks with stable rate changes. The OSPF (Open Shortest Path First) protocol is used for decision routing
within a single autonomous system and is suitable for large networks.
Click Network> Routing> Static Route to enter the static routing table, which allows users to manually add, delete, or
modify static routing rules.
Static Route
Static Route
Item Description Default
Index Indicate the ordinal of the list. --
Description Enter a description for this route. Null
Destination Enter the IP address of destination host or destination network. Null
Netmask Enter the Netmask of destination host or destination network. Null
Router Define the router of the destination. Null
Interface Choose the corresponding port of the link that you want to configure. wwan
Status
4.3.2 Firewall
This section allows you to set the firewall and its related parameters, including Filtering, Port Mapping, Custom Rules,
DMZ and Status. Filtering rules allow users to custom accept or discard a specified access source, filtering its IP
address or MAC address.
Click "> firewall > filter" to display as follows:
Filtering
The filtering rules can be used to either accept or block certain users or ports from accessing your router.
Click to add filtering rules. The maximum count is 50. The window is displayed as below when defaulting “All” or
choosing “ICMP” as the protocol. Here take “All” as an example.
The window is displayed as below when choosing “TCP”, “UDP” or “TCP-UDP” as the protocol. Here take “TCP” as an
example.
Filtering
Item Description Default
General Settings
Enable Filtering Click the toggle button to enable/disable the filtering option. ON
Default Filtering Policy Select from “Accept” or “Drop”. Cannot be changed when filtering Accept
rules table is not empty.
Accept: Router will accept all the connecting requests except the
hosts which fit the drop filter list
Drop: Router will drop all the connecting requests except the
hosts which fit the accept filter list
Access Control Settings
Enable Remote SSH Access Click the toggle button to enable/disable this option. When enabled, OFF
the Internet user can access the router remotely via SSH.
Enable Local SSH Access Click the toggle button to enable/disable this option. When enabled, ON
the LAN user can access the router locally via SSH.
Filtering
Item Description Default
Enable Remote Telnet Access Click the toggle button to enable/disable this option. When enabled, OFF
the Internet user can access the router remotely via Telnet.
Enable Local Telnet Access Click the toggle button to enable/disable this option. When enabled, ON
the LAN user can access the router locally via Telnet.
Enable Remote HTTP Access Click the toggle button to enable/disable this option. When enabled, OFF
the Internet user can access the router remotely via HTTP.
Enable Local HTTP Access Click the toggle button to enable/disable this option. When enabled, ON
the LAN user can access the router locally via HTTP.
Enable Remote HTTPS Access Click the toggle button to enable/disable this option. When enabled, ON
the Internet user can access the router remotely via HTTPS.
Enable Remote Ping Respond Click the toggle button to enable/disable this option. When enabled, ON
the router will reply to the Ping requests from other hosts on the
Internet.
Enable DOS Defending Click the toggle button to enable/disable this option. When enabled, ON
the router will defend the DOS. Dos attack is an attempt to make a
machine or network resource unavailable to its intended users.
Enable Console Click the toggle button to enable/disable this option. When enabled, ON
the user can access the router via Console.
Enable the vpn_nat traversal Click the toggle button to enable/disable this option. When enabled, OFF
the router automatically modifies the IP address of the VPN header
received by WAN/WWAN to the IP address of the device under LAN
port and sends it out.
Whitelist Rules
Item Description Default
Index Indicate the ordinal of the list. --
Description Enter a description for this whitelist rule. Null
Source Address Defines if access is allowed from one or a range of IP addresses which Null
are defined by Source IP Address, or every IP addresses.
Filtering Rules
Index Indicate the ordinal of the list. --
Description Enter a description for this filtering rule. Null
Source Address Defines if access is allowed from one or a range of IP addresses which Null
are defined by Source IP Address, or every IP addresses.
Source Port Specify an access originator and enter its source port. Null
Source MAC Enter the MAC address of the defined source IP address. Null
Target Address Defines if access is allowed to one or a range of IP addresses which are Null
defined by Target IP Address, or every IP addresses.
Target Port Enter the target port which the access originator wants to access. Null
Protocol Select from “All”, “TCP”, “UDP”, “ICMP” or “TCP-UDP”. All
Note: It is recommended that you choose “All” if you don’t know
which protocol of your application to use.
Action Select from “Accept” or “Drop”. Drop
Accept: When Default Filtering Policy is drop, router will drop all
Filtering
Item Description Default
the connecting requests except the hosts which fit this accept
filtering list
Drop: When Default Filtering Policy is accept, router will accept all
the connecting requests except the hosts which fit this drop
filtering list
Port Mapping
Port mapping is defined manually in the router, and the data received from some ports in the public network are all
forwarded to a port of an IP in the internal network. Click "network > firewall > port mapping" to display as follows:
Click to add port mapping rules. The maximum rule count is 50.
Custom Rules
Custom rules, that is, rules that you define yourself. Click "Network> Firewall> Custom Rules" to display as follows:
DMZ
The DMZ, also known as the Demilitarized Zone, is being transformed into a large swath of land. It is to solve the
problem that the access user of the external network cannot access the internal network server after installing the
firewall, and set up a buffer between the non-secure system and the secure system. A DMZ host is an Intranet host
that has open access to all ports except the occupied and forwarded ports to the specified address.
Click "> firewall > DMZ" to display the following:
DMZ Settings
Item Description Default
Enable DMZ Click the toggle button to enable/disable DMZ. DMZ host is a host on the OFF
internal network that has all ports exposed, except those ports otherwise
forwarded.
Host IP Address Enter the IP address of the DMZ host on your internal network. Null
Source IP Address Set the address which can talk to the DMZ host. 0.0.0.0 means for any Null
addresses.
Status
This window allows you to view the status of chain input, chain forward and chain output.
4.3.3 IP Passthrough
Click Network > IP Passthrough > IP Passthrough to enable or disable the IP Pass-through option.
If router enables the IP Pass-through, the terminal device (such as PC) will enable the DHCP Client mode and connect
to LAN port of the router; and after the router dial up successfully, the PC will automatically obtain the IP address and
DNS server address which assigned by ISP. To use this function, the main link needs to be set to WWAN, and the
backup link needs to be set to None.
4.4 VPN
4.4.1 IPsec
This section allows you to set the IPsec and the related parameters. Internet Protocol Security (IPsec) is a protocol
suite for secure Internet Protocol (IP) communications that works by authenticating and encrypting each IP packet of
a communication session.
Click VPN > IPsec > general to set IPsec parameters.
General
Tunnel
The window is displayed as below when choosing “PSK” as the authentication type.
The window is displayed as below when choosing “CA” as the authentication type.
The window is displayed as below when choosing “PKCS#12” as the authentication type.
The window is displayed as below when choosing “xAuth PSK” as the authentication type.
The window is displayed as below when choosing “xAuth CA” as the authentication type.
IKE Settings
Item Description Default
IKE Type Select from “IKEv1” and “IKEv2”. IKEv1
Negotiation Mode Select from “Main” and “Aggressive” for the IKE negotiation mode in phase 1. Main
If the IP address of one end of an IPsec tunnel is obtained dynamically, the IKE
negotiation mode must be aggressive. In this case, SAs can be established as
long as the username and password are correct.
Authentication Select from “MD5”, “SHA1”, “SHA2 256” or “SHA2 512” to be used in IKE MD5
Algorithm negotiation.
Encrypt Algorithm Select from “3DES”, “AES128”, “AES192”and “AES256”to be used in IKE 3DES
negotiation.
IKE Settings
Item Description Default
3DES: Use 168-bit 3DES encryption algorithm in CBC mode
AES128: Use 128-bit AES encryption algorithm in CBC mode
AES128: Use 192-bit AES encryption algorithm in CBC mode
AES256: Use 256-bit AES encryption algorithm in CBC mode
IKE DH Group Select from “DHgroup1”,“DHgroup2”, “DHgroup5”, “DHgroup14”, DHgroup2
“DHgroup15”, “DHgroup16”, “DHgroup17” or “DHgroup18” to be used in key
negotiation phase 1.
Authentication Type Select from “PSK”, “CA”, “xAuth PSK” ,”PKCS#12”and “xAuth CA” to be used in PSK
IKE negotiation.
PSK: Pre-shared Key
CA: Certification Authority
xAuth: Extended Authentication to AAA server
PKCS#12: Exchange digital certificate authentication
PSK Secret Enter the pre-shared key. Null
Local ID Type Select from “Default”, “FQDN” and “User FQDN” for IKE negotiation. Default
Default: Uses an IP address as the ID in IKE negotiation
FQDN: Uses an FQDN type as the ID in IKE negotiation. If this option is
selected, type a name without any at sign (@) for the local security
router, e.g., test.robustel.com
User FQDN: Uses a user FQDN type as the ID in IKE negotiation. If this
option is selected, type a name string with a sign “@” for the local
security router, e.g., test@robustel.com
Remote ID Type Select from “Default”, “FQDN” and “User FQDN” for IKE negotiation. Default
Default: Uses an IP address as the ID in IKE negotiation
FQDN: Uses an FQDN type as the ID in IKE negotiation. If this option is
selected, type a name without any at sign (@) for the local security
router, e.g., test.robustel.com
User FQDN: Uses a user FQDN type as the ID in IKE negotiation. If this
option is selected, type a name string with a sign “@” for the local
security router, e.g., test@robustel.com
IKE Lifetime Set the lifetime in IKE negotiation. Before an SA expires, IKE negotiates a new 86400
SA. As soon as the new SA is set up, it takes effect immediately and the old
one will be cleared automatically when it expires.
Private Key Password Enter the private key under the “CA” and “xAuth CA” authentication types. Null
Username Enter the username used for the “xAuth PSK” and “xAuth CA” authentication Null
types.
Password Enter the password used for the “xAuth PSK” and “xAuth CA” authentication Null
types.
If click VPN > IPsec > Tunnel > General Settings, and choose ESP as protocol. The specific parameter configuration is
shown as below.
When the protocol in "Virtual Private Network> IPsec> Tunnel> General Settings" selects "AH", the SA settings are
displayed as follows:
SA Settings
Item Description Default
Encrypt Algorithm Select from “3DES”, “AES128”, “AES192”or “AES256” when you select “ESP” 3DES
in “Protocol”. Higher security means more complex implementation and
lower speed. DES is enough to meet general requirements. Use 3DES when
high confidentiality and security are required.
Authentication Select from “MD5”, “SHA1”, “SHA2 256” or “SHA2 512” to be used in SA MD5
Algorithm negotiation.
PFS Group Select from “PFS(N/A)”, “DHgroup1”,“DHgroup2”, “DHgroup5”, DHgroup2
“DHgroup14”, “DHgroup15”, “DHgroup16”, “DHgroup17” or “DHgroup18”
to be used in SA negotiation.
SA Lifetime Set the IPsec SA lifetime. When negotiating to set up IPsec SAs, IKE uses the 28800
smaller one between the lifetime set locally and the lifetime proposed by
the peer.
DPD Interval Set the interval after which DPD is triggered if no IPsec protected packets is 30
received from the peer. DPD is a Dead peer detection. DPD irregularly
detects dead IKE peers. When the local end sends an IPsec packet, DPD
checks the time the last IPsec packet was received from the peer. If the time
exceeds the DPD interval, it sends a DPD hello to the peer. If the local end
receives no DPD acknowledgment within the DPD packet retransmission
interval, it retransmits the DPD hello. If the local end still receives no DPD
acknowledgment after having made the maximum number of
retransmission attempts, it considers the peer already dead, and clears the
IKE SA and the IPsec SAs based on the IKE SA.
DPD Failures Set the timeout of DPD (Dead Peer Detection) packets. 150
Advanced Settings
Enable Compression Click the toggle button to enable/disable this option. Enable to compress OFF
the inner headers of IP packets.
Enable Forceencaps OFF
SA Settings
Item Description Default
Expert Options Add more PPP configuration options here, format: config-desc;config-desc, Null
e.g. protostack=netkey;plutodebug=none
Status
This section allows you to view the status of the IPsec tunnel.
x509
User can upload the CA certificates for the IPsec tunnel in this section.
x509
Item Description Default
X509 Settings
Tunnel Name Choose a valid tunnel. Select from "Tunnel 1", "Tunnel 2", "Tunnel 3", Tunnel 1
"Tunnel 4", "Tunnel 5",or "Tunnel 6".
Local Certificate Click on “Choose File” to locate the certificate file from local computer, and
--
then import this file into your router.
Remote Certificate Click on “Choose File” to locate the certificate file from remote computer,
--
and then import this file into your router.
Private Key Click on “Choose File” to locate the private key file. --
CA Certificate Click on “Choose File” to locate the correct CA certificate file. --
PKCS#12 Certificate Click on “Choose File” to locate the PKCS # 12 certificate file. --
x509
Item Description Default
X509 Settings
Certificate Files
Index Indicate the ordinal of the list. --
Filename Show the imported certificate’s name. Null
File Size Show the size of the certificate file. Null
Last Modification Show the timestamp of that the last time to modify the certificate file. Null
4.4.2 OpenVPN
This section allows you to set the OpenVPN and the related parameters. OpenVPN is an open-source software
application that implements virtual private network (VPN) techniques for creating secure point-to-point or
site-to-site connections in routed or bridged configurations and remote access facilities. Router supports
point-to-point and point-to-points connections.
Click "VPN > OpenVPN > OpenVPN" to display as follows:
OpenVPN
Click to add OpenVPN tunnel settings. The maximum count is 5. By default, the mode is “P2P”. The window is
displayed as below when choosing “P2P” as the mode.
The window is displayed as below when choosing “None” as the authentication type.
The window is displayed as below when choosing “Preshared” as the authentication type.
The window is displayed as below when choosing “Password” as the authentication type.
The window is displayed as below when choosing “X509CA” as the authentication type.
The window is displayed as below when choosing “X509CA Password” as the authentication type.
“AES-256”.
BF: Use 128-bit BF encryption algorithm in CBC mode
DES: Use 64-bit DES encryption algorithm in CBC mode
DES-EDE3: Use 192-bit 3DES encryption algorithm in CBC mode
AES128: Use 128-bit AES encryption algorithm in CBC mode
AES192: Use 192-bit AES encryption algorithm in CBC mode
AES256: Use 256-bit AES encryption algorithm in CBC mode
Authentication Select from "MD5", "SHA1", "SHA256"or "SHA512". SHAI
Algorithm
Max Clients Set the retention timeout. If the connection continues to timeout during
10
this time, the OpenVPN tunnel will be re-established.
Renegotiation Set the renegotiation interval. If connection failed, OpenVPN will 86400
Interval renegotiate when the renegotiation interval reached.
Click user password management to add a user name and password. The maximum count is 20 as shown below.
Click client administration to add client information, The maximum count is 20 as shown below.
Status
This section allows you to view the status of the OpenVPN tunnel.
x509
Item Description Default
X509 Settings
Tunnel Name Choose a valid tunnel. Select from "Tunnel 1", "Tunnel 2", "Tunnel 3", Tunnel 1
"Tunnel 4", "Tunnel 5" or"Tunnel 6".
Mode The tunnel mode set by the selected tunnel. Client
Root CA Click on “Choose File” to locate the root ca file ,and then import this file into --
your router.
Certificate File Click on “Choose File” to locate the certificate file, and then import this file --
into your router.
Private Key Click on “Choose File” to locate the private key file, and then import this file --
into your router.
TLS-Auth Key Click on “Choose File” to locate the TLS-Auth key file, and then import this --
file into your router.
PKCS#12 Certificate Click on “Choose File” to locate the PCKS#12 certificate file ,and then import --
this file into your router.
Certificate Files
Index Indicate the ordinal of the list. --
Filename Show the imported certificate’s name. Null
File Size Show the size of the certificate file. Null
Last Modification Show the timestamp of that the last time to modify the certificate file. Null
4.4.3 GRE
This section allows you to set the GRE and the related parameters. Generic Routing Encapsulation (GRE) is a
tunneling protocol that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links
over an Internet Protocol network. There are two main uses of GRE protocol: internal protocol encapsulation and
private address encapsulation.
GRE
Status
4.5 Services
4.5.1 Syslog
This section allows you to set the syslog parameters. The system log of the router can be saved in the local, also
supports to be sent to remote log server and specified application debugging. By default, the “Log to Remote” option
is disabled.
The window is displayed as below when enabling the “Log to Remote” option.
Syslog Settings
Item Description Default
Enable Click the toggle button to enable/disable the Syslog settings option. OFF
Syslog Level Select from “Debug”, “Info”, “Notice”, “Warning” or “Error”, which from low to Debug
high. The lower level will output more syslog in detail.
Save Position Select the save position from “RAM”, “NVM” or “Console”. Choose “RAM”, the RAM
data will be cleared after reboot.
Note: It's not recommended that saving syslog to NVM (Non-Volatile Memory)
for a long time.
Log to Remote Click the toggle button to enable/disable this option. Enable to allow router OFF
sending syslog to the remote syslog server. You need to enter the IP and Port of
the syslog server.
Add Identifier Click the toggle button to enable/disable this option. When enabled, you can add OFF
serial number to syslog message which used for loading Syslog to RobustLink.
Remote IP Address Enter the IP address of syslog server when enabling the “Log to Remote” option. Null
Remote Port Enter the port of syslog server when enabling the “Log to Remote” option. 514
4.5.2 Event
This section allows you to set the event parameters. Event feature provides an ability to send alerts by SNMP and
RCMS when certain system events occur.
In the following window you can query various types of events record. Click to query filtered events while
click to clear the event records in the window.
Event Details
Item Description Default
Save Position Select the events’ save position from “RAM” or “NVM”. RAM
RAM: Random-access memory
NVM: Non-Volatile Memory
Filter Message Event will be filtered according to the Filter Message that the user set. Click the Null
button, the filtered event will be displayed in the follow box. Use “&” to
separate more than one filter message, such as message1&message2.
4.5.3 NTP
This section allows you to set the related NTP (Network Time Protocol) parameters, including Time zone, NTP Client
and NTP Server.
NTP
Item Description Default
Timezone Settings
Time Zone Click the drop down list to select the time zone you are in. EG, China: UTC UTC +08:00
+ 08:00.
Expert Setting Specify the time zone with Daylight Saving Time in TZ environment Null
variable format. The Time Zone option will be ignored in this case. Eg,
“~”.
NTP Client Settings
Enable Click the toggle button to enable/disable this option. Enable to ON
synchronize time with the NTP server.
Primary NTP Server Enter primary NTP Server’s IP address or domain name. pool.ntp.org
Secondary NTP Server Enter secondary NTP Server’s IP address or domain name. Null
NTP Update interval Enter the interval (minutes) which NTP client synchronize the time from 0
NTP server. Minutes wait for next update, and 0 means update only
once.
NTP Server Settings
Enable Click the toggle button to enable the NTP server option. Once enabled, the OFF
NTP client can synchronize with the router in time.
This window allows you to view the current time of router and also synchronize the router time. Click button
to synchronize the router time with PC’s.
4.5.4 SMS
This section allows you to set SMS parameters. Router supports SMS management, and user can control and
configure their routers by sending SMS. For more details about SMS control, refer to 5.2.2 SMS Remote Control.
User can test the current SMS service whether it is available in this section.
SMS Testing
Item Description Default
Phone Number Enter the specified phone number which can receive the SMS from router. Null
Message Enter the message that router will send it to the specified phone number. Null
Result The result of the SMS test will be displayed in the result box. Null
Click the button to send the test message. --
4.5.5 Email
Email function supports to send the event notifications to the specified recipient by ways of email.
Email Settings
Item Description Default
Enable Click the toggle button to enable/disable the Email option. OFF
Enable TLS/SSL Click the toggle button to enable/disable the TLS/SSL option. OFF
Enable STARTTLS Click the toggle button to enable/disable the STARTTLS encrypted transmission OFF
method.
Outgoing server Enter the SMTP server IP Address or domain name. Null
Server port Enter the SMTP server port. 25
Timeout Set the max time for sending email to SMTP server. When the server doesn’t 10
receive the email over this time, it will try to resend.
Auth Login Use username and password authentication OFF
Username Enter the username which has been registered from SMTP server. Null
Password Enter the password of the username above. Null
From Enter the source address of the email. Null
Subject Enter the subject of this email. Null
4.5.6 DDNS
This section allows you to set the DDNS parameters. DDNS, the full name of dynamic domain name server, is the
dynamic domain name service. DDNS service allows you to map a dynamic IP address to a fixed domain name
resolution service. Each time a user connects to the network, the client program will transmit the dynamic IP address
of the host to the server program located on the server host. The server program is responsible for providing DNS
service and realizing dynamic domain name resolution, that is, DDNS service allows you to provide dynamic w for the
host An IP assigns a fixed domain name, and other users can access your host directly through this fixed domain
name, rather than through the dynamic Wan IP address. The router's dynamic Wan IP address is assigned directly by
the ISP.
Click Service > DDNS to set the parameters related to DDNS. and its service provider defaults to DynDNS.
DDNS Settings
Item Description Default
Enable Click the toggle button to enable/disable the DDNS option. OFF
Service Select the DDNS service from “DynDNS”, “NO-IP”, “3322” or
Provider “Custom”.
DynDNS
Note: the DDNS service only can be used after registered by
Corresponding service provider.
Hostname Enter the hostname provided by the DDNS server. Null
Username Enter the username provided by the DDNS server. Null
Password Enter the password provided by the DDNS server. Null
URL Enter the URL customized by user. Null
DDNS Status
Item Description
Status Display the current status of the DDNS.
Last Update Time Display the date and time for the DDNS was last updated successfully.
4.5.7 SSH
SSH Settings
This section allows you to configure the GPS parameters. The GPS function of the router can locate and obtain the
location information of the device and report it to the designated server. R1520 does not have an independent GPS
module. The positioning data comes from the cellular module. Whether the GPS function is supported depends on
the cellular module.
GPS
General Settings
Click the Add button in the GPS server window, and its protocol is "TCP client" by default as shown below:
When "TCP server" is selected as the protocol, the window is displayed as follows:
Local port Set the local port of the router as a TCP server. Null
Server address
Set the address of the TCP server Null
@UDP
Server port @UDP Set the port of the remote TCP server. Null
Send GGA
Send GGA information in NMEA format OFF
information
Send VTG
Send VTG information in NMEA format OFF
information
Send RMC
Send RMC information in NMEA format OFF
information
Send GSV
Send GSV information in NMEA format OFF
information
Advanced Settings
Click the "Status" column to view the current GPS status of the gateway;
GPS Status
Item Description
Click the "Map" bar to view the current geographic positioning of the gateway.
Web server, port 443 is the port that the server "listens to" or expects to
receive from a Web client. If you configure the router with other HTTPS Port
number except 443, only adding that port number then you can login router’s
Web Server.
Note: HTTPS is more secure than HTTP. In many cases, clients may be
exchanging confidential information with a server, which needs to be secured in
order to prevent unauthorized access. For this reason, HTTP was developed by
Netscape corporation to allow authorization and secured transactions.
This section allows you to import the certificate file into the router.
Import Certificate
Item Description Default
Import Type Select from “CA” and “Private Key”. CA
CA: a digital certificate issued by CA center
Private Key: a private key file
HTTPS Certificate Click on “Choose File” to locate the certificate file from your computer, and then --
click “Import” to import this file into your router.
4.5.10Advanced
This section allows you to set the Advanced and parameters. Advanced router settings include system settings and
restart.
System Settings
Item Description Default
Device Name Set the device name to distinguish different devices you have installed; valid router
characters are a-z, A-Z, 0-9, @, ., -, #, $, and *.
User LED Type Specify the display type of your USR LED. Select from “None”, “OpenVPN” or None
“IPsec”.
None: Meaningless indication, and the LED is off
SIM:show the sim status.
OpenVPN: USR indicator showing the OpenVPN status
IPsec: USR indicator showing the IPsec status
Note: For more details about USR indicator, see “2.2 LED Indicators”.
Reboot
Item Description Default
Periodic Reboot Set the reboot period of the router. 0 means disable. 0
Daily Reboot Time Set the daily reboot time of the router, you should follow the format as HH: Null
MM, in 24h time frame, otherwise the data will be invalid. Leave it empty means
disable.
Smart roaming settings include common settings, health check, Ping settings and advanced settings.
General settings
RSSI threshold (4G) The signal strength threshold of the 4G network. -87 dBm
Click the toggle button to enable/disable the "RSRP Quality
RSRP Quality Check OFF
Check" function.
The reference signal received power threshold of the 4G
RSRP threshold (4G) -105 dBm
network.
The reference signal received power threshold of the 5G
RSRP threshold (5G) -105 dBm
network.
Click the toggle button to enable/disable the "Network
Network Delay Check ON
Delay Check" function.
RTT timeout threshold Round trip timeout time 3000 ms 3000 ms
Click the toggle button to enable/disable the "Packet Loss
Packet loss rate check ON
Rate Check" function.
Packet loss rate threshold Packet loss rate threshold 70 %
PING setting
Advanced settings
Status
Item Description
Display the current status of "Smart Roaming". Including Scanning,
Connectiing, Connected, Inactive and other statuses, respectively indicating
Status
that it is searching for available networks, connecting to the network, the
network is connected, and the function is not activated.
Shows the current method of selecting the carrier network. Including
Automatic and Manual two methods, respectively refer to the automatic
Operator selection model selection according to the standard specification and the software selection
according to the network quality, and the software will switch between
these two methods in a cycle.
The time elapsed since
Shows the elapsed time since the last search for available networks. "Smart
the last search for
Roaming" restart will refresh this time.
available networks
PLMN list
Item Description
PLMN list
Item Description
the network quality is good, the network is degraded, or the network quality is
poor (including network disconnection or failure to meet the health check
threshold) .
4.6 System
4.6.1 Debug
This section allows you to check and download the syslog details. Click Service > System Log > System Log Settings to
open the system log.
Syslog
Item Description
Syslog Details
Log Level Select from “Debug”, “Info”, “Notice”, “Warn”, “Error” which from low to high. The lower
level will output more syslog in detail.
Filtering Enter the filtering message based on the keywords. Use “&” to separate more than one filter
message, such as “keyword1&keyword2”.
Refresh Select from “Manual Refresh”, “5 Seconds”, “10 Seconds”, “20 Seconds” or “30 Seconds”. You
can select these intervals to refresh the log information displayed in the follow box. If
selecting “manual refresh”, you should click the refresh button to refresh the syslog.
Click the button to clear the syslog.
Click the button to refresh the syslog.
Syslog Files
Syslog Files List Only when logging is turned on in Services > system log > system log settings can log files be
displayed in this list. The log generates a file with the size of 200K, which can display up to six
system log files. Five files named messages0 ~ messages4 are old logs, and the latest system
log file messages will be set at the top.
System Diagnosing Data
Click to generate the syslog diagnosing file.
Click to download system diagnosing file.
4.6.2 Update
This section allows you to upgrade the firmware of your router. Click System > Update > System Update, and click on
“Choose File” to locate the firmware file to be used for the upgrade. Once the latest firmware has been chosen, click
to start the upgrade process. The upgrade process may take several minutes. Do not turn off your Router
during the firmware upgrade process.
Note: To access the latest firmware file, please contact your technical support engineer.
This section allows you to add some required or customized applications to the router. Import and install your
applications to the App Center, and reboot the device according to the system prompts. Each installed application will
be displayed under the “Services” menu, while other applications related to VPN will be displayed under the “VPN”
menu.
Note: After importing the applications to the router, the page display may have a slight delay due to the browser
cache. It is recommended that you clear the browser cache first and log in the router again.
Successfully installed apps will be displayed in the following list, click to uninstall the app.
App Center
Item Description Default
App Install
Install to SD Click the toggle button to enable/disable the ability to install the app to the SD OFF
card card.
File Click on “Choose File” to locate the App file from your computer, and then click --
to import this file into your router.
Note: File format should be xxx.rpk.
Installed Apps
Index Indicate the ordinal of the list. --
Name Show the name of the App. Null
Version Show the version of the App. Null
Status Show the status of the App. Null
Location Show the installation path. Null
Description Show the description for this App. Null
4.6.4 Tools
This section provides users three tools: Ping, Traceroute and Sniffer. The Ping tool is used to detect the network
connectivity of the router.
Ping
Item Description Default
IP address Enter the ping’s destination IP address or destination domain. Null
Number of Requests Specify the number of ping requests. 5
Timeout Specify the timeout of ping request. 1
Local IP Specify the local IP from cellular WAN, Ethernet WAN or Ethernet LAN. Null Null
stands for selecting local IP address from these three automatically.
Click this button to start ping request, and the log will be displayed in the Null
follow box.
Click this button to stop ping request. --
Traceroute
Item Description Default
Trace Address Enter the trace’s destination IP address or destination domain. Null
Trace Hops Specify the max trace hops. Router will stop tracing if the trace hops has met 30
max value no matter the destination has been reached or not.
Trace Timeout Specify the timeout of Traceroute request. 1
Click this button to start Traceroute request, and the log will be displayed in --
the follow box.
Click this button to stop Traceroute request. --
Sniffer
Item Description Default
Interface Choose the interface according to your Ethernet configuration. All
Host Filter the packet that contain the specify IP address. Null
Packets Request Set the packet number that the router can sniffer at a time. 1000
Protocol Select from “All”, “IP”, “TCP”, “UDP” and “ARP”. All
Port Set the port number for TCP or UDP that is used in sniffer. Null
Status Show the current status of sniffer. Null
Click this button to start the sniffer. The grab file will be displayed in the --
window. Click to download the grab file and click to delete the grab file.
Click this button to stop the sniffer. Once you click this button, a new log file --
will be displayed in the following List.
Capture Files Every times of sniffer log will be saved automatically as a new file. You can find Null
the file from this Sniffer Traffic Data List and click to download the log, click
to delete the log file. It can cache a maximum of 5 files.
4.6.5 Profile
This section allows you to import or export the configuration file, and restore the router to factory default setting.
Profile
Item Description Default
Import Configuration File
Reset Other Settings to Click the toggle button as “ON” to return other parameters to default OFF
Default settings.
Ignore Invalid Settings Click the toggle button as “ON” to ignore invalid settings. ON
XML Configuration File Click on to locate the XML configuration file from your --
computer, and then click to import this file into your router.
Export Configuration File
Ignore Disabled Features Click the toggle button as “ON” to ignore the disabled features. OFF
Add Detailed Information Click the toggle button as “ON” to add detailed information. OFF
Encrypt Secret Data Click the toggle button as “ON” to encrypt the secret data. ON
XML Configuration File Click button to generate the XML configuration file, and --
click to export the XML configuration file.
Default Configuration
Save Running Click button to save the current running parameters as default --
Configuration as Default configuration.
Restore to Default --
Click button to restore the factory defaults.
Configuration
Rollback
Item Description Default
Configuration Rollback
Save as a Rollbackable Create a save point manually. Additionally, the system will create a save --
Archive point every day automatically if configuration changes.
Configuration Archive Files
Configuration Archive View the related information about configuration archive files, including --
Files name, size and modification time.
This section allows you to change your username and password, and create or manage user accounts. One router has
only one super user who has the highest authority to modify, add and manage other common users.
Note: Your new password must be more than 5 character and less than 32 characters and may contain numbers,
upper and lowercase letters, and standard symbols.
Click button to add a new common user. The maximum rule count is 5.
4.7 Edge2cloud
4.7.1 Edge2cloud
Edge2Cloud (E2C) is a series of software collections running in the ROS operating system embedded in the Robustel
Smart Gateway device, which can provide various functions of the IoT Gateway at the hardware and software levels
and solve the problem of data interfacing between traditional industrial device and the cloud platform.
There are three types of E2C: Southbound APP, Northbound APP and Broker.
The latest ROS firmware has integrated E2C Broker, users can use the full functionality of Edeg2Cloud by choosing to
install the corresponding Southbound APP and Northbound APP according to their needs.
This section is used to set E2C Broker parameters and view the operational status of E2C Broker. Click "Edge2Cloud >
E2C Broker" to display the following.
General Settings
Verbose Debug Enable Enable or disable more detailed verbose debug OFF
Whether the messages received by Broker are saved to the
Save message to database ON
database.
Database file storage area, optional: RAM, FLASH, SD-Card and
Data Storage FLASH
USB-Storage.
Database Max Size (kB) The maximum size of the database file, in KB. 1024
Whether to support sending and receiving messages through the
Remote Access Enable OFF
web interface.
Item Descriptions
Status
Receive message
The number of MQ messages received by Broker.
count
Item Descriptions
5.1 Cellular
This section shows you how to configure the primary and backup SIM card for Cellular Dial-up. Connect the router
correctly and insert two SIM, then open the configuration page. Under the homepage menu, click Interface > Link
Manager > Link Manager > General Settings, choose “WWAN1” as the primary link, “WWAN2” as the backup link
and “Cold Backup ”as the backup mode then click “Submit”.
Note: In the cold backup mode, when WWAN1 is the primary link, all data will be selected as WWAN1 for
transmission, and WWAN2 will always be offline as the backup link; when WWAN1 is disconnected, the data will be
switched to WWAN2 for transmission
Click the right most of edit button of WWAN1 to set its parameters according to the current ISP.
When finished, click Submit > Save & Apply for the configuration to take effect.
The window is displayed below by clicking Interface > Cellular > Advanced Cellular Settings.
Click the right most of edit button of SIM1 to set its parameters according to your application request.
When finished, click Submit > Save & Apply for the configuration to take effect.
The router supports remote control via SMS. You can use following commands to get the status of the router, and set
all the parameters.
There are three authentication types for SMS control. You can select from “Password”, “Phonenum” or “Both”.
XML command:
<lan>
<network max_entry_num="2">
<id>1</id>
<interface>lan0</interface>
<ip>172.16.24.24</ip>
<netmask>255.255.0.0</netmask>
<mtu>1500</mtu>
SMS cmd:
set lan network 1 interface lan0
set lan network 1 ip 172.16.24.24
set lan network 1 netmask 255.255.0.0
set lan network 1 mtu 1500
3. The semicolon character (‘;’) is used to separate more than one command packed in a single SMS.
4. E.g.
Password mode—admin:admin;status system
In this command, username is “admin”, password is “admin”, The control command is status system, and the
function of the command is to get the system status.
SMS received:
hardware_version = 1.1
firmware_version = 3.1.0
firmware_version_full = "3.1.0 (Rev 3199)"
kernel_version = 4.9.152
device_model = R1520
serial_number = ""
uptime = "0 days, 00:02:55"
admin:admin; set lan network 1 interface lan0;set lan network 1 ip 172.16.24.24;set lan network 1 netmask
255.255.0.0;set lan network 1 mtu 1500
In this command, username is “admin”, password is “admin”, and the commands is to configure
the LAN parameter.
SMS received:
OK
OK
OK
OK
IPSec VPN sample topology (configuration of Ike and SA parameters of server and client must be consistent):
IPsec VPN_Server:
Cisco 2811:
IPsec VPN_Client:
The window is displayed as below by clicking VPN > IPsec > Tunnel.
When finished, click Submit > Save & Apply for the configuration to take effect.
5.2.2 OpenVPN
OpenVPN supports two modes, including Client and P2P. Here takes P2P as an example.
OpenVPN_Server:
Generate relevant OpenVPN certificate on the server side firstly, and refer to the following commands to
configuration the Server:
local 202.96.1.100
mode server
port 1194
proto udp
dev tun
tun-mtu 1500
fragment 1500
ca ca.crt
cert Server01.crt
key Server01.key
dh dh1024.pem
server 10.8.0.0 255.255.255.0
ifconfig-pool-persist ipp.txt
push "route 192.168.3.0 255.255.255.0"
client-config-dir ccd
route 192.168.1.0 255.255.255.0
keepalive 10 120
cipher BF-CBC
comp-lzo
max-clients 100
persist-key
persist-tun
status openvpn-status.log
verB 3
Note: For more configuration details, please contact your technical support engineer.
OpenVPN_Client:
Click VPN > OpenVPN > OpenVPN as below.
When finished, click Submit > Save & Apply for the configuration to take effect.
GRE-1:
The window is displayed as below by clicking VPN > GRE > GRE.
When finished, click Submit > Save & Apply for the configuration to take effect.
GRE-2:
Click button and set the parameters of GRE-2 as below.
When finished, click Submit > Save & Apply for the configuration to take effect.
The Command Line Interface (CLI) is a set of software interfaces that provide another way to configure device
parameters. Users can connect to the router through SSH or telnet to configure CLI commands. After establishing a
Telnet or SSH connection with the router, enter the login account and password (default admin/admin) to enter the
router's configuration mode, as shown below.
Router login:
Router login: admin
Password: admin
#
CLI commands:
# ? (Note: the ‘?’ won’t display on the page.)
! Comments
add Add a list entry of configuration
clear Clear statistics
config Configuration operation
debug Output debug information to the console
del Delete a list entry of configuration
exit Exit from the CLI
help Display an overview of the CLI syntax
ovpn_cert_get Download OpenVPN certificate file via http or ftp
Following is a table about the description of help and the error should be encountered in the configuring program.
Commands /tips Description
? Typing a question mark “?” will show you the help information.
Example:
# config(Tick ‘?’)
config Configuration operation
The best and quickest way to master CLI is firstly to view all features from the webpage and then read all CLI
commands at a time, finally learn to configure it with some reference examples.
ddns DDNS
dido DIDO
email Email
ethernet Ethernet
event Event Management
firewall Firewall
gps GPS
gre GRE
ip_passthrough IP Passthrough
ipsec IPSec
lan Local Area Network
link_manager Link Manager
ntp NTP
openvpn OpenVPN
reboot Automatic Reboot
route Route
serial_port Serial Port
sms SMS
ssh SSH
syslog Syslog
system System
usb USB
user_management User Management
web_server Web Server
wifi WiFi AP
# set link_management
primary_link Primary Link
Backup_link Backup Link
Backup_mode BackSup Mode
emergency_reBoot Emergency ReBoot
link Link Settings
# set link_management primary_link(space+?)
Enum Primary Link (wwan1/wwan2/wan/wlan)
# set link_management primary_link wwan1 //select “wwan1” as primary link
OK //setting succeed
set link_manager link 1
type Type
desc Description
connection_type Connection Type
wwan WWAN Settings
static_addr Static Address Settings
pppoe PPPoE Settings
ping Ping Settings
mtu MTU
dns1_overrided Overrided Primary DNS
dns2_overrided Overrided Secondary DNS
umber = true
mode = server
relay_server = “”
pool_start = 192.168.0.2
pool_end = 192.168.0.100
netmask = 255.255.255.0
gateway = “”
primary_dns = “”
secondary_dns = “”
wins_server = “”
lease_time = 120
expert_options = “”
umbe_enaBle = false
}
}
multi_ip {
id = 1
interface = lan0
ip = 172.16.24.24
netmask = 255.255.0.0
}
#
# set lan
network Network Settings
multi_ip Multiple IP Address Settings
vlan VLAN
# set lan network 1(space+?)
interface Interface
ip IP Address
netmask Netmask
mtu MTU
dhcp DHCP Settings
# set lan network 1 interface lan0
OK
# set lan network 1 ip 172.16.24.24 //set IP address for lan
OK //setting succeed
# set lan network 1 netmask 255.255.0.0
OK
#
…
# config save_and_apply
OK //save and apply current configuration, make you configuration
effect
Band_wcdma_2100 = false
Band_lte_800 = false
Band_lte_850 = false
Band_lte_900 = false
Band_lte_1800 = false
Band_lte_1900 = false
Band_lte_2100 = false
Band_lte_2600 = false
Band_lte_1700 = false
Band_lte_700 = false
Band_tdd_lte_2600 = false
Band_tdd_lte_1900 = false
Band_tdd_lte_2300 = false
Band_tdd_lte_2500 = false
}
# set(space+?)
ai AI
cellular Cellular
ddns DDNS
dido DIDO
email Email
ethernet Ethernet
event Event Management
firewall Firewall
gps GPS
gre GRE
ip_passthrough IP Passthrough
ipsec IPSec
lan Local Area Network
link_manager Link Manager
ntp NTP
openvpn OpenVPN
reboot Automatic Reboot
route Route
serial_port Serial Port
sms SMS
ssh SSH
syslog Syslog
system System
usb USB
user_management User Management
web_server Web Server
wifi WiFi AP
# set cellular(space+?)
sim SIM Settings
# set cellular sim(space+?)
Glossary
Abbr. Description
AC Alternating Current
AI Analog Input
APN Access Point Name of GPRS Service Provider Network
ASCII American Standard Code for Information Interchange
CE Conformité Européene (European Conformity)
CHAP Challenge Handshake Authentication Protocol
CLI Command Line Interface for Batch scripting
CSD Circuit Switched Data
CTS Clear to Send
dB Decibel
dBi Decibel Relative to an Isotropic radiator
DC Direct Current
DCD Data Carrier Detect
DCE Data Communication Equipment (typically modems)
DCS 1800 Digital Cellular System, also referred to as PCN
DI Digital Input
DO Digital Output
DSR Data Set Ready
DTE Data Terminal Equipment
DTMF Dual Tone Multi-frequency
DTR Data Terminal Ready
EDGE Enhanced Data rates for Global Evolution of GSM and IS-136
EMC Electromagnetic Compatibility
EMI Electro-Magnetic Interference
ESD Electrostatic Discharges
ETSI European Telecommunications Standards Institute
FDD LTE Frequency Division Duplexing Long Term Evolution
GND Ground
GPRS General Packet Radio Service
GRE generic route encapsulation
GSM Global System for Mobile Communications
HSPA High Speed Packet Access
ID identification data
IMEI International Mobile Equipment Identification
IP Internet Protocol
IPsec Internet Protocol Security
kBps kbits per second
L2TP Layer 2 Tunneling Protocol
Abbr. Description
LAN local area network
LED Light Emitting Diode
M2M Machine to Machine
MAX Maximum
Min Minimum
MO Mobile Originated
MS Mobile Station
MT Mobile Terminated
OpenVPN Open Virtual Private Network
PAP Password Authentication Protocol
PC Personal Computer
PCN Personal Communications Network, also referred to as DCS 1800
PCS Personal Communication System, also referred to as GSM 1900
PDU Protocol Data Unit
PIN Personal Identity Number
PLCs Program Logic Control System
PPP Point-to-point Protocol
PPTP Point to Point Tunneling Protocol
PSU Power Supply Unit
PUK Personal Unblocking Key
R&TTE Radio and Telecommunication Terminal Equipment
RF Radio Frequency
RTS Request to Send
RTU Remote Terminal Unit
Rx Receive Direction
SDK Software Development Kit
SIM subscriber identification module
SMA antenna Rubber antenna or Magnet antenna
SMS Short Message Service
SNMP Simple Network Management Protocol
TCP/IP Transmission Control Protocol / Internet Protocol
TE Terminal Equipment, also referred to as DTE
Tx Transmit Direction
UART Universal Asynchronous Receiver-transmitter
UMTS Universal Mobile Telecommunications System
USB Universal Serial Bus
USSD Unstructured Supplementary Service Data
VDC Volts Direct Current
VLAN Virtual Local Area Network
VPN Virtual Private Network
VSWR Voltage Stationary Wave Ratio
Abbr. Description
WAN Wide Area Network