Cy Box GW1 Configuration Manual V2029110
Cy Box GW1 Configuration Manual V2029110
WIRELESS GATEWAY
CONFIGURATION MANUAL
Version: 1.0 for firmware V20.29.1 | Date: 14.04.2021
CYBOX GW
Contents
1 IMPORTANT INFORMATION 1
1.1 Revision 1
1.2 Disclaimer 1
1.2.1 Copyright 1
1.2.2 GPL Statement for CyBox Software 1
1.2.2.1 Disclaimer of Warrenty 2
1.2.2.2 Limitation of Liability 2
1.2.3 Regulatory Limits for Changes in Country and Transmit Power Settings 2
1.3 Known Issues 2
2 ABOUT THIS DOCUMENT 3
2.1 Information about Formatting 3
3 ABOUT THE CyBox GW 3
4 HOW TO ACCESS THE CyBox GW 4
4.1 IP Addresses of the CyBox GW 4
4.2 Getting to the Web Interface 5
5 QUICK START GUIDE 6
5.1 Change Password 6
5.2 Change LAN IP address (Quick Guide) 6
5.2.1 Disabling IPv6 7
5.3 Example: Local Access Point 8
5.3.1 System Settings 8
5.3.2 Prepare WLAN Radio Interface 8
5.3.3 Connect radio0 to the Network 9
5.3.4 Connecting to WAN 10
5.4 Example: Connecting three VLANs to a server 10
5.4.1 Create the Management VLAN 11
5.4.2 Add two unmanaged VLANs 11
5.4.3 Configure and Enable the radio(s) 12
5.4.4 Attach the “Clients” VLAN to radio0 12
5.4.5 Attach the “Staff” VLAN to radio0 13
5.4.6 Check Configuration 13
5.4.7 Disable Unneeded Default Address 14
5.5 Example: Client Isolation within the Access Point 14
5.5.1 Isolate the Radio Clients 14
i
CYBOX GW
ii
CYBOX GW
6.1.6 OpenVPN 44
6.1.6.1 Configuration file generation on Windows 44
6.1.6.2 VPN interface setup – 3 methods 44
6.1.6.2.1 Copy Ready-to-use configuration with SCP 44
6.1.6.2.2 Upload configuration, certs, key-files with web interface 45
6.1.6.2.3 Manual configuration with web interface 46
6.1.6.3 VPN host configuration (on console) 46
6.1.7 QoS 48
6.2 GPS 48
6.2.1 GPS activation 48
6.2.2 GPS status 49
6.2.3 SNMP for GPS 50
6.3 System 51
6.3.1 Configuration Backups 51
6.3.2 Firmware Upgrade 51
6.3.3 Reboot 52
6.3.4 Reset Button 52
6.3.5 Emergency Mode 52
7 SNMP 54
7.1 SNMP Protocol Support 54
7.2 SNMP V3 Protocol Support 54
7.2.1 SNMP V3 Protocol Examples 55
7.3 SNMP Basic Functions 56
7.4 SNMP Read and Write Authorizations 56
7.5 SNMP Commands 57
7.6 SNMP Read (snmpwalk and snmpget) 58
7.6.1 Reading System Information 58
7.6.2 Reading SNMP Object Information 58
7.6.2.1 Readout current Network Device Order 59
7.6.2.2 Readout SSID / WIFI Interface Order 59
7.6.2.3 Readout Network Device to SSID Assignment 60
7.7 SNMP Write (snmpset) 61
7.7.1 Direct command 61
7.7.1.1 Reboot 61
7.7.2 Edit configuration using Object Identifier (OID) 61
7.7.2.1 Set a new IP address 61
iii
CYBOX GW
iv
CYBOX GW
1 IMPORTANT INFORMATION
1.1 Revision
Internal version: ff6db28
1.2 Disclaimer
1.2.1 Copyright
© 2018-2021 ELTEC Elektronik AG. The information, data, and figures in this document including respective
references have been verified and found to be legitimate. In particular in the event of error they may, therefore,
be changed at any time without prior notice. The complete risk inherent in the utilization of this document or in
the results of its utilization shall be with the user; to this end, ELTEC Elektronik AG shall not accept any liability.
Regardless of the applicability of respective copyrights, no portion of this document shall be copied, forwarded
or stored in a data reception system or entered into such systems without the express prior written consent of
ELTEC Elektronik AG, regardless of how such acts are performed and what system is used (electronic, mechanic,
photocopying, recording, etc.). All product and company names are registered trademarks of the respective
companies.
Our General Business, Delivery, Offer, and Payment Terms and Conditions shall otherwise apply.
You should have received a copy of the GNU General Public License
along with this program. If not, see
<https://www.gnu.org/licenses/>.
FOSS and sources are not included in the binary distribution in the products and in the product documentation
due to space limitations.
Use this link to request FOSS and sources, please send in your request by mail (handling fees for sources may
apply):
1
CYBOX GW
ELTEC Elektronik AG
Galileo-Galilei-Str. 11
55129 Mainz
Germany
1.2.2.1 Disclaimer of Warrenty
There is no warranty for the program, to the extent permitted by applicable law. except when otherwise stated in
writing the copyright holders and/or other parties provide the program “as is” without warranty of any kind,
either expressed or implied, including, but not limited to, the implied warranties of merchantability and fitness
for a particular purpose. The entire risk as to the quality and performance of the program is with you. Should the
program prove defective, you assume the cost of all necessary servicing, repair or correction.
1.2.2.2 Limitation of Liability
In no event unless required by applicable law or agreed to in writhing will any copyright holder, or any other
party who modifies and/or conveys the program as permitted above, be liable to you for damages, including any
general, special, incidental or consequential damages arising out of the use or inability to use the program
(including but not limited to loss of data or data being rendered inaccurate or losses sustained by you or third
parties or a failure of the program to operate with any other programs), even if such holder or other party has
been advised of the possibility of such damages.
You should have received the following text in an “About” box (see Tab “System”) together with the product.
Here it is replicated for reference:
This software product contains software covered by the GNU GPL license.
A list of all modules and their licenses (“FOSS” list) is available on
request, as is the source code of all GPL-covered modules. For details
and GPL text, see the Software Configuration Manual, available on
<https://www.eltec.com>. In case of problems use the
mail (street) address below.
ELTEC Elektronik AG
Galileo-Galilei-Str. 11
55129 Mainz
Germany
1.2.3 Regulatory Limits for Changes in Country and Transmit Power Settings
Make sure that only persons with proper knowledge also in regulatory matters have access to the access point’s
configuration settings. They must be aware of the consequences of an improper setting of country and transmit
power (there may be additional settings). To do so, the standard configuration password must be changed
before the access point is deployed. This new password must be given to knowledgeable and responsible
persons only.
One example of a regulation affecting country selection is that in Germany, as of October 2016, the frequencies in
the range 5150 MHz - 5350 MHz must be used in closed rooms and similar environments only. For more
information please see www.bundesnetzagentur.de.
2
CYBOX GW
Not covered is a complete list of all functions and of all configuration elements in detail.
Information about mechanical and electrical installation of the access points is available in a separate
product-specific installation manual which can be downloaded from the Download Center at www.eltec.com.
3
CYBOX GW
• 192.168.100.1 (LAN)
• An address obtained using DHCP (if possible LAN_DHCP)
• An address derived from the serial number (LAN_ALIAS)
• An address derived from the MAC of the first Ethernet port (LAN_MAC)
The LAN_ALIAS address is derived from the serial number (which is printed on the type plate) as follows
(Example Serial Number: EL303289):
In a similar manner, the LAN_MAC address is derived from the MAC address of the first Ethernet interface, which
is printed on the type plate (example MAC 00:00:5B:04:AE:03):
You can delete unneeded network interfaces by clicking on the red “Delete” button in the web interface.
4
CYBOX GW
• To apply and also save your configuration, click on the button Save & Apply on the bottom-right corner
of most pages. Not clicking on this button will discard your modifications.
• Saved configurations will be kept after a reboot.
• If IP addresses are changed, the Access Point must be addressed under the new URL in the browser.
5
CYBOX GW
• CyBox GW is running
• CyBox GW has been reset to factory defaults, the IP address is 192.168.100.1
• Default Root-User password: ‘root’
• Operator workstation and CyBox GW are connected via Ethernet
• Workstation browser is logged-in to the CyBox GW web interface
• Operator is additionally logged in to CyBox GW via SSH (if available, a serial console terminal would be
preferable).
In the following examples [square brackets] are used to indicate actions not requiring operator interaction
because they happen automatically or have already been done (mentioning them here might be useful for
checking configuration is on the right way).
Change Password
6
CYBOX GW
7
CYBOX GW
8
CYBOX GW
• Select Network → Wireless: this shows the wireless controllers radio0 and radio1 with some software
buttons
• Select tab radio0: Unknown “OpenWrt” or click the Edit button of radio0
• In box Device Configuration:
• In drop-down menu Country Code, select the country of the current location
At this point, the radio interface should become visible to possible WLAN clients and vice versa. Probably clients
need to be prompted to scan for available wireless networks. Then, those clients will become visible in tab
Network, tab WiFi, box Associated Stations.
9
CYBOX GW
• If needed, modify more things in tab General Setup and tab Advanced Settings
Now the CyBox GW connects the Ethernet and all WLAN clients in the local domain 192.186.100.0 and provides a
local DHCP service, but there is not yet an uplink to a gateway.
This terminates the local domain 192.186.100.0. Now connect the CyBox GW via Ethernet to the gateway domain,
restart the CyBox GW (use hardware reset switch) and reconnect the WLAN clients.
• one for management access via wired Ethernet, using a static IP address
• an unmanaged WLAN access for “clients”, no encryption
• another unmanaged WLAN access for “staff” members, encrypted, optional hidden SSID
The access point is connected via Ethernet to a server (or a host computer, called CCU in the illustration below)
providing DHCP, DNS, and gateway services. Starting from factory defaults, apply system settings as described in
section 7.2.1 (if needed).
10
CYBOX GW
11
CYBOX GW
• Submit
• [page VLAN101 opens]
• Click button Save & Apply
• Select tab Network –> tab WiFi –> tab radio0 (or click button Edit for radio0)
• In box Device Configuration:
The following 3 lines fix a problem with this LuCI page (The drop-down menu for the country code is not updated
correctly)
• Select HT mode
• Select Channel
• Select Transmit Power
• Select tab Network –> tab WiFi –> tab radio0 (or click button Edit for radio0)
• In box Interface Configuration:
12
CYBOX GW
Alternatively, if the “Staff” shall use the other radio and that radio has been configured and enabled (see 7.3.3),
then (instead of Add) select tab Network tab WiFi tab radio1 (or click button Edit for radio1)
Oder alternativ (anstelle von wlan0-1), wenn beide Funkmodule verwendet werden:
13
CYBOX GW
• Select tab Network –> tab WiFi –> tab radio0 (or click button Edit for radio0)
• In box Interface configuration
This affects the mentioned port only. To protect more ports against WLAN access, use button Add.
Note that all interfaces listed in the lan field are allowed to access the respective socket.
14
CYBOX GW
• Reset: clicking on this button reverts the unsaved input fields of the current page to the values as they
were before you modified them.
• Save: This button copies the modified input fields of the current page to an intermediate memory. It
collects changes without applying them to the CyBox GW. This is important because some changes - if
applied stand-alone - could break the IP connection between host and the CyBox GW.
When clicking this button, a change count notification appears at the upper left, indicating the number of
to-be-changed lines in the configuration data (The actual text in that message is kind of misleading: it
claims to state the number of “unsaved changes” but actually means the number of saved but not yet
applied new configuration lines.)
It should be noted, that saved data are not longer subject to the Reset button. Rather, saved changes - if not
applied - are kept until you click the Save & Apply button, or the Revert button (see below), or CyBox
GW reboots. The configuration is not yet complete as long as the change count is non-zero.
• Revert: Clicking on the change count message pops up an extra window showing the data exactly as they
would be entered into the related configuration files. This window provides a button named Revert.
Clicking it invalidates the saved changes and clears the change count to zero.
• Save & Apply: this button performs the Save operation (see above), modifies the configuration data
according to the saved changes, and clears the change count. Please note that Revert and Reset cannot
undo those changes after a Save & Apply operation! Also, depending on the specific parameters changed,
networking interfaces are re-initialized with the new data. In consequence, the host-side browser might
require to connect a new IP address to access the CyBox GW.
• Submit: Some pages provide a single Submit button instead of the above. Essentially, Submit performs an
immediate Save operation. Thus, the change count in the upper left corner of the screen will increment. The
Save operation also takes place when clicking special buttons like Add new interface or Setup DHCP Server.
Again, the change count will change. In these cases, Save & Apply is needed to complete the operation.
• Buttons named Enable or Disable cause immediate execution.
6.1 Network
6.1.1 Interfaces
6.1.1.1 DHCP Server per Interface
A DHCP server can run on the device to assign IPv4 addresses to WLAN clients. It is enabled by unchecking Disable
DHCP for this interface. However, DHCP often is managed by a dedicated DHCP server on the backbone and not
directly on the access point. In that case, the DHCP server on the access point must be disabled.
6.1.1.2 Bridges
Physical network interfaces may be bridged to form a “software Ethernet switch”. For example, by bridging the
LAN 1 interface with a wireless interface, WLAN clients can communicate with LAN clients like they were
connected by a switch.
To set up a bridge, use the tab Network → Interfaces → LAN → section Common Configuration → Physical Settings.
Check Bridge interfaces and include all Interfaces that should belong to the new bridge interface.
The example Bridge Interface Setup shows a bridge containing “Ethernet Adapter: eth0” and “wlan0” (Wireless
Network: Master “System-radio0”).
15
CYBOX GW
Note: Physical interfaces, as eth0 or wlan0, belonging to a network interface, such as LAN, cannot be in any other
network interface.
6.1.1.3 VLAN
To enable VLAN (virtual LAN, mostly used for logical subnets built on real LANs) tagging, a new custom interface
must be set up for the LAN. The VLAN interfaces are named e.g. “eth0.12”. In this example “12” is the VLAN tag to
be used.
16
CYBOX GW
Use eth0.X as custom interface and disable eth0 as shown in the dialog above.
WARNING: After saving and applying the changes, the network output on *eth0* is tagged with your VLAN
tag and the AP will not be accessible through normal network anymore. You need to enable VLAN tagging
on the host interface, or connect to a switch that is able to handle this VLAN tag to be able to access the AP.
6.1.1.4 LTE
This chapter shows how to connect the CyBox GW to a mobile LTE network.
Some CyBox GW models are equipped with WLAN modules and can therefore be turned into a WLAN hotspot.
Other models have LTE modems and no WLAN functionality; these can be used to connect an Ethernet-based
backbone to the Internet.
6.1.1.4.1 Configuring LTE
The CyBox GW provides 4 SIM slots per LTE modem. Only one slot per modem can be active at any time. The slots
can be selected via an SNMP command or using the web interface.
Note: Switching between SIM slots takes about 30 seconds, Slot 1 being preselected at power up. If you plan to
use only one SIM card for a given LTE modem, it is advisable to use Slot 1 to avoid slot switching delay during the
boot phase.
Before installing SIM cards, remove the SIM farm cover plate from back panel. Install the SIM cards according to
the figure SIM slots on the CyBox GW. The Module 1, 2, 3 and 4 correspond to the modems MODEM_S1,
MODEM_S2, MODEM_S3 and MODEM_S4, respectively. If your CyBox GW might feature less than 4 modems, it
might still offer 16 SIM slots, some of which are ignored. Finally, mount the cover again.
17
CYBOX GW
The LTE configuration requires the following parameters which can be requested from the LTE provider:
On the page Network → Interfaces, click the Edit button for the modem to be configured (e.g. Modem_S1).
On the appearing page the active slot is chosen and the LTE parameters are configured (see next Figure):
• Choose the SIM slot to be used (SIM card slot). Only one SIM slot can be active at a time and here is
where it is selected.
• Select Bring up on boot to activate the modem.
• In the section SIM Card Configuration, enter the configuration for each SIM card. Do so by first
selecting a tab (e.g. SIM Slot 1) and then enter the corresponding configuration. Note that these tabs do
no influence which SIM is actually active. For each SIM card:
18
CYBOX GW
• Enter The PIN of the SIM card. Take care to enter the PIN on the correct tab, as a wrong configured PIN
may lead to SIM card locking.
• Enter the APN, Username and Password as supplied by the LTE provider.
Complete the configuration by pressing the Save & Apply button. The modem needs to be (re)started in order to
re-detect the SIM card. You can do so on the Network → Interfaces page by clicking Restart for the
modem. After a short while, the info box for the modem shows an IPv4 address, and any Error message in the box
disappears:
After the LTE connection was established, a “ping” test can verify that a connection to the internet is actually
available. Go to Network → Diagnostics and press Ping. Instead of pinging the default host
“openwrt-project.org” you might as well use another one. The figure below shows a successful run of the test.
Please refer to chapter 7.8.3 SNMP Support for LTE to learn about the LTE related SNMP commands.
Now switch to the ‘Network Interface Overview’ and delete unused LAN interfaces like LAN_DHCP, LAN_MAC and
LAN_ALIAS. LAN_MAC and LAN_ALIAS are using IPs in the 10.x.y.z network, which are often also used by internet
service providers and may disturb routing. The LAN_DHCP should also be deleted because it may get a DHCP
19
CYBOX GW
setup with a gateway which is not part of this MWAN configuration. You may setup a new IP for the LAN interface
using a private address pool (192.168.x.y).
6.1.1.4.2 LTE Troubleshooting
6.1.1.5 5G
5G is the “fifth generation” of the mobile communication standard which is developed by the global initiative
3GPP.
Many applications with specific demands for very low response time and faster connection requirements can be
realised for the first time by using of 5G mobile broadband standard.
Some of specified mobile bands (e.g. 3.6 GHz) are already ready to use, especially in the cities. Other bands are
still experimental. They will provide download/upload rates up to 100 times faster than LTE. All this by having
very low latency!
5G is the next big step in the evolution of mobile communication technology!
In order to setup a 5G connection the same steps like for using of LTE have to be done (see chapter 6.1.1.4 LTE ).
Important
A must precondition to establish a 5G connection is a use of a modem with 5G capabilities as well as a
SIM card with a 5G support.
6.1.2 WLAN
Wireless radios are disabled by default to avoid erroneous WLAN operation. Use Network → Wireless → Edit
to enter the configuration menu. Details about WLAN configuration can be found in the next section. After
configuration, enable the interfaces with Enable.
20
CYBOX GW
The example shows a CyBox GW with two radios installed. Depending on the hardware, other configurations may
be shown.
After enabling the radio, you can configure physical settings. Clicking Network → Wireless → Edit redirects
you to the ‘Device Configuration’ menu.
6.1.2.1 Channel, Wireless mode, HT mode, Power settings
Advanced Settings allows to select the appropriate country in the pull-down menu. After a country change, press
the Save & Apply button, refresh the browser page, and reboot.
Disclaimer: The wireless configuration must observe the local regulation. The upper limit of the transmission
power has to be set correctly (“Transmit power”). This does not account for an antenna gain. If, for example, the
regulation imposes a maximal power of 15 dBm and the gain of the antenna is 5 dBm, you must set the transmit
power to a value at or below 10 dBm.
In General Setup you can configure wireless mode, HT mode and channel. Wireless mode can be forced to any
802.11 standard supported by the radio. The channel selection is adapted to the wireless mode chosen. The
channel configuration can be set to auto but this slows down WLAN activation and requires a reboot to work
properly. Therefore, it is recommended to select a defined channel.
21
CYBOX GW
After the device has been enabled, the radio status should be checked if the selected channel / mode
combination is working.
6.1.2.2 Radio Band Configuration for Models with Antenna Combiner
If the system is equipped with an antenna combiner, (e.g. having two radio modules (WLE-900) but only three
antennas) the frequency bands 2.4 GHz and 5 GHz cannot be freely configured for each wireless module. The first
radio module radio0 must use band 2.4 GHz and the second radio radio1 the 5 GHz band. An incorrect wireless
band configuration in the software is possible. However, this means that no output power arrives at the antenna
ports.
6.1.2.3 JJPlus Radio Card Band Configuration
If system is equipped with a JJPlus Wave-2 radio module, the frequency band 2.4 GHz and 5 Ghz cannot be
switched on the fly (runtime) in the wireless configuration menu. After a Factory Reset the radio modules are
configured for 5 GHz as default band. To switch to the 2.4 GHz band a Custom Command=>Switch RadioX Band
must be executed and after that a system reboot must be triggered. The 2.4 GHz mode then, will be permanently
stored in the configuration backup archive. Executing the custom command button again will toggle from 2.4
GHz to 5 GHz and vice versa. The selected mode is always stored in the configuration backup archive. Note that a
band toggle will always disable the selected radioX. After reboot the selected radioX must be activated again and
the channel/bandwidth must be configured.
22
CYBOX GW
• WPA2-PSK: “personal mode”, using a password for access. Note that the cipher “TKIP” is
considered insecure, and CCMP should be used instead.
• WPA2-EAP: “enterprise mode”, using a RADIUS server for client authentication.
• WPA-PSK: WPA in “personal mode”, using a password for access. Note that the cipher “TKIP” is
considered insecure, and CCMP should be used instead.
• WPA-EAP: “enterprise mode”, using a RADIUS server for client authentication.
• No Encryption (open):
23
CYBOX GW
In addition, some of these modes can be combined (“mixed mode”). For an access point, this allows to support
multiple modes, supporting newer encryption standards while still supported older clients. When configuring the
CyBox GW as client with a “mixed mode”, it will try both modes when connecting to an access point (normally,
only the configured mode is used). The following modes can be combined:
24
CYBOX GW
Note
The Hotspot 2.0 tab is only present if
Hotspot 2.0 separates the hotspot operator from the service providers. The hotspot operator maintains the
access point offering Hotspot 2.0 services while the service providers are responsible for authentication and
authorization of WLAN clients. It is possible to configure multiple service providers on a single access point.
Each hotspot operator has one or more domain names, which can be configured in the Domain Names setting.
Service providers are identified by one of the following:
• Consortium IDs: Numeric values assigned by the IEEE. Each ID names a consortium of multiple service
providers.
• NAI Realms: The domain names of the service providers. Optionally, the authentication scheme can be
appended to each name. The WLAN clients can fetch this information prior before they connect.
• 3GPP Cell Identifiers: Each cell ID consists of the MCC and MNC of a service provider. A mobile
device can seamlessly roam between mobile networks and WLAN by identifying its mobile network provider
on a Hotspot 2.0 access point.
25
CYBOX GW
In order to use Multi-AP client isolation, all APs must use the same Server and use the same interface name.
(Network traffic can be restricted with a configuration for ‘ebtables’ on FORWARD rules, managed by the ‘client
isolation’ functionality).
For Client isolation over APs, check Network → Client Isolation → Enable, then enter parameters for your
configuration.
The screenshot below shows a configuration where the server address is set in the parameters of the LAN
interface (under ‘Network’ → ‘Interfaces’). When the interface is set up as a bridge, the corresponding Bridge name
is always ‘br-<original_interface_name>’
26
CYBOX GW
Important
A must precondition to use this service is to have at least one available radio device running AP
(AccessPoint) mode. Please make sure, such configuration is done and running before activating this
service. Otherwise no scanning results can be obtained.
Since service is activated (enabled), scanning is done continiously in the background. All channels of selected
radio device(s) are scanned one after another. Scan results are stored to a temporarily FIFO queue and can be
obtained anytime.
The scanning service is configurable over UCI resp. LUCI. A separate page (Services -> AP Scanner) can be used to
configure radio devices which are used for scanning. Also the interval between scanning cycles and the maximum
queue length can be configured.
Important
System load and network traffic caused by SNMP calls can be minimized by using of SSID filter
parameters. As long SSID filter is enabled, only entries matching the predefined filter will be stored to a
result queue.
27
CYBOX GW
Scanning results can be obtained by a SNMP request. Request configuration can also be done by using of UI page
(Services->SNMPD Edit).
28
CYBOX GW
Important
As soon queue has reached the configured maximum length, every time there is a new entry added to
queue the “oldest” one will be dropped!
How to avoid data lost?
Current queue status (entries) can be also discovered on the UI page (Status->AP Scanner).
29
CYBOX GW
Important
A must precondition to use this service is to have at least one available radio device running AP
(AccessPoint) mode. Please make sure, such configuration is done and running before activating this
service. Otherwise no sniffed results can be obtained.
Since the service is activated (enabled), sniffing is done continiously in the background. A special monitor device
is created for selected radio interface(s). Data received by radio interface (AP) also goes throw the monitor
device. Probe Requests sent by clients around the monitor device are used for definitely client identification.
Sniffed personal data (MAC and SSID) have to be protected according to the requirements of personal data
protection regulations (DSGVO). Encryption algorith uses additional String (Pepper), configured by user, to
achieve better anonymization results. Also there is a mechanism to encrypt personal data up to multiple times
(hash_count). Results are stored to a temporarily FIFO queue and can be obtained anytime.
The sniffing service is configurable over UCI resp. LUCI. A separate page (Services -> WLAN Sniffer) can be used to
configure radio devices which are used for sniffing. Also the maximum queue length, additional string and hash
cycle count values can be configured.
Results can be obtained by a SNMP request. Request configuration can also be done by using of UI page
(Services->SNMPD Edit).
30
CYBOX GW
STRING: "radio1;
c78236b5fb56b9023249e23e94dae7092aaa16f792aa168b21c064713b9883fe;
n/a;
-29dBm;
2020-05-07 09:25:20"
Important
As soon queue has reached the configured maximum length, every time there is a new entry added to
queue the “oldest” one will be dropped!
How to avoid data lost?
Current queue status (entries) can be also discovered on the UI page (Status -> WLAN Sniffer).
31
CYBOX GW
Important
The rogue AP detection algorithm relies on the 8 THE FLYING CONTROLLER MECHANISM . The detection
algorithm is only active on devices running in controller mode. As the controller mode selection is done
automatically between devices running in the same network (LAN), all potentially candidates for Rogue
AP detection have to be configured identically.
Multiple devices can take part on rogue access point detection. Every device running the AP scanning service and
Flying Controller services and connected to the common wired network can be used as a part of the detection
network. All scanned data from detection participants are requested by the controller device via SNMP calls and
used for rogue AP detection.
Important
The rogue AP detection algorithm relies on the 6.1.2.10 Access Point Scanning Service (Wireless
Monitoring) running on all participating devices.
As long as an SSID filter is enabled, only entries matching the predefined filter will be used during for detection.
Known authorized devices can be whitelisted by using of whitelist parameter. Participants of the common
network (i.e. the workers of the flying controller mechanism) are whitelisted automatically.
Important
System load and network traffic caused by SNMP calls can be minimized by using of SSID filter
parameters. This also can be done for AP Scanner Service.
Participants connected to the wired network (all workers and the controller itself) are automatically whitelisted
by service and not recognized as rogue devices. All other scanned APs with the same SSID will be declared as
rogue and reported to a specified host. These notifications can be enabled with parameter “Enable SNMP Traps”.
IP address of the SNMP trap receiver can be configured with the parameter “Target address.”
32
CYBOX GW
SNMP notifications are defined within the ELTEC MIB and have following format:
ELTEC-CYAP-MIB::rogueAPdetected
ELTEC-CYAP-MIB::rogueDataSSID
ELTEC-CYAP-MIB::rogueDataBSSID
ELTEC-CYAP-MIB::rogueDataChannel
ELTEC-CYAP-MIB::rogueDataSignal
ELTEC-CYAP-MIB::rogueDataLastseen
ELTEC-CYAP-MIB::rogueDataSBSSID
Important
Since MWAN3 and LinkAggregation are concurrent routing features, only one of them can be active at the
same time. Please refer to chapter OpenMPTCProuter versus MWAN3.
The multi-WAN manager (MWAN3) can be used to control which network connection is to be used for traffic. This
section uses LTE uplink connections as example, but other connections - like WLAN or Ethernet - can also be
used.
It provides the following features:
33
CYBOX GW
• Monitoring of WAN connectivity using repeated ping tests (ping | arping | httping).
• Routing of outbound traffic to another WAN interface if the first WAN interface loses connectivity, based on
metric. The connection with the lowest metric is preferred, other connections are only used if the preferred
one fails. Interfaces sharing the same metric value form a “group”.
• Outbound WAN traffic load balancing over multiple WAN interfaces based on a numeric weight assignment.
All connections sharing the same metric (“within the same group”) are used simultaneously, distributing
traffic over them. Connections with higher weights gets more traffic assigned.
• Different policies can be defined for different traffic types. For example, OpenVPN traffic could be routed
through the first connection (using the other connections only if it fails), while routing all other traffic
through the remaining connections (using load-balancing among them).
Load-balancing requires no remote station on the ground, it is handled entirely by the CyBox GW. As such, it is no
link aggregation. It distributes traffic by streams, not by packets, i.e. a single stream cannot benefit from multiple
LTE connections. For example, a single download stream can only use one LTE connection. However, multiple
streams (e.g. generated by many WLAN users onboard a train) can be distributed over multiple WAN connections,
increasing the overall bandwidth.
The figure Example traffic flow in MWAN shows an example configuration and visualizes the traffic flows in
various situations:
• When all interfaces are up, all traffic is routed through the interface with the lowest metric, which is LTE 1
(metric=0).
• If LTE 1 fails, all traffic is still routed through the operable interfaces with the lowest metric (=1). But now,
this is LTE 2 and LTE 3, which share the same metric. The traffic is distributed (load-balanced) over these
interfaces.
• If LTE 1 and 2 fail, the traffic is routed over LTE 3, because this is now the operable interface with the lowest
metric. There is no load-balancing any more, because only one interface is used.
• It LTE 1-3 fail, LTE 4 is used. Technically it is the operable interface with the lowest metric.
Note that the load balancing between LTE 2 and LTE 3 routes more traffic through LTE 3 than through LTE 2. This
is because of the different weights. The interface with the higher weight gets more traffic. When there is now load
balancing, the weight values have no effect.
34
CYBOX GW
6.1.3.1 Capabilities
The MWAN3 package provides the following capabilities:
• provides outbound WAN traffic load balancing over multiple WAN interfaces based on a numeric weight
assignment
• monitors WAN connections using repeated ping tests (ping | arping | httping) and automatically routes
outbound traffic to another WAN interface if the first WAN interface loses connectivity
• provides specific outbound traffic rules to customize which outbound connections should use which WAN
interface
As the interface is down, all traffic has stopped and standard gateway switches to modem1.
35
CYBOX GW
MWAN test
36
CYBOX GW
37
CYBOX GW
The tracking parameters can handle target host IPs, ping interval and timeout.
38
CYBOX GW
Tracking parameters
39
CYBOX GW
MWAN members
40
CYBOX GW
41
CYBOX GW
42
CYBOX GW
6.1.5 Firewall
Be sure you understand zone-based firewalls before changing the firewall configurations.
The CyBox GW has a built-in stateful firewall mapping interfaces into Zones that are used to describe default
rules for a given interface, forwarding rules between interfaces, and extra rules that are not covered by the first
two.
The first rule that matches is executed, often leading to another rule-chain until a packet hits either ACCEPT or
DROP/REJECT. Such an outcome is final, therefore the default rules take effect last, and the most specific rule
takes effect first. Zones are also used to configure masquerading also known as NAT
(network-address-translation) as well as port forwarding rules, which are more generally known as redirects.
43
CYBOX GW
Zones must always be mapped onto one or more Interfaces, which ultimately map onto physical devices;
therefore zones cannot be used to specify networks (subnets), and the generated iptables rules operate on
interfaces exclusively. The difference is that interfaces can be used to reach destinations not part of their own
subnet, when their subnet contains another gateway. Usually however, forwarding is done between LAN and
WAN interfaces, with the router serving as ‘edge’ gateway to the Internet. The default configuration of the
Firewall provides for such a common setup.
6.1.6 OpenVPN
Starting with firmware version 3.2 the Open Source VPN solution is included. The firmware before version 4.0
does not support a web frontend for OpenVPN configuration.
The OpenVPN program has many parameters to setup a connection. This chapter describes a basic Client
OpenVPN tunnel configuration. In the next example the VPN tunnel connection is made through an already
running LTE interface providing the Internet gateway.
6.1.6.1 Configuration file generation on Windows
OpenVPN for Windows can use an OpenVPN-GUI, which allows managing OpenVPN connections from a system
tray applet. It can be used to generate a complete client configuration (zip file) including the .ovpn configuration
file.
6.1.6.2 VPN interface setup – 3 methods
The VPN connection setup can be achieved by the three following methods.
6.1.6.2.1 Copy Ready-to-use configuration with SCP
This is the easiest way to configure a VPN connection. It is assumed that the server side has a configured network
environment. The server administrator should create a valid client configuration package, including certificates,
client keys and preferably a myclient.ovpn config file. The VPN connection is built on this configuration file
(myclient.ovpn). This example uses four files that have to be static stored on the CyBox GW to allow the openvpn
44
CYBOX GW
program to build up a connection without user interaction. If the ‘auth-user-pass’ option is given to openvpn
without a parameter, the connection setup is interrupted and will ask for a username and password. To make
this run automatically a two-line file with username (in first line) and password (in second line) has to be
provided. All four files, the ‘auth_user_pass’, the ‘pfelt1-udp-vpnuser_fg.p12’ , the user key file
‘pfelt1-udp-vpnuser_fg-tls.key’ and the ‘myclient.ovpn’ config file have to copied from host system via ‘scp’
command to permanent storage located in ‘/etc/openvpn/’ directory. Ensure that all files in ‘/etc/openvpn’ have
file permission 600 (cd /etc/openvpn; chmod 600 *).
The ‘myclient.ovpn’ configuration is:
dev tun
persist-tun
persist-key
cipher AES-256-CBC
auth SHA1
tls-client
client
resolv-retry infinite
remote 166.93.10.174 1194 udp
lport 0
verify-x509-name "VPN Server Cert" name
auth-user-pass auth\_user\_pass
pkcs12 pfelt1-udp-vpnuser\_fg.p12
tls-auth pfelt1-udp-vpnuser\_fg-tls.key 1
ns-cert-type server
comp-lzo
Edit your config.ovpn file and make sure that all certificates, key-files, user-name-pass files have the correct path
including your config name, here ‘my_vpn’.
The prepared ‘myclient.ovpn’ configuration looks like and is ready for upload:
(uploaded to /etc/luci-uploads/cbid.openvpn.my_vpn. myclient.ovpn)
45
CYBOX GW
dev tun
persist-tun
persist-key
cipher AES-256-CBC
auth SHA1
tls-client
client
resolv-retry infinite
remote 166.93.10.174 1194 udp
lport 0
verify-x509-name "VPN Server Cert" name
auth-user-pass
/etc/luci-uploads/cbid.openvpn.my\_vpn.auth\_user\_pass
pkcs12
/etc/luci-uploads/cbid.openvpn.my\_vpn.pfelt1-udp-vpnuser\_fg.p12
tls-auth
/etc/luci-uploads/cbid.openvpn.my\_vpn.pfelt1-udp-vpnuser\_fg-tls.key
1
ns-cert-type server
comp-lzo
Allow OpenVPN tunnel utilization: (not needed when bridging using tap)
46
CYBOX GW
/etc/init.d/openvpn start
47
CYBOX GW
enabled
6.1.7 QoS
In the following example, a networking interface LAN or WLAN is prepared to use the Quality of Service function
(QoS). The CyBox GW implements a QoS function with scripts to configure traffic control (‘tc’ command), which
reduces throughput at a selected interface. To see the effect, a performance test can be started with the built-in
‘iperf’ program to measure the throughput.
• In box Interfaces enter an existing interface name e.g. ‘lan’ an click button Add
Do an ‘iperf’ performance test. The throughput should be about 10 Mbits/s. If a WLAN interface is bridged with the
LAN port, the traffic control can even work on a single part of the bridge. To reduce the wireless traffic only, a new
interface label must be added to Network → Interfaces menu e.g. WLAN. Then the new interface label has to
be used in the QoS menu.
6.2 GPS
Some CyBox family members are equipped with an additional GNSS hardware module. The GPS antenna is
routed to the front panel. Once an appropriate antenna is attached, the GPS signal is received and can be
processed, if a version V3.03 or newer is installed. The GPS hardware supplies NMEA 0183 protocol on the second
serial port, which is converted into a human-readable form.
48
CYBOX GW
GPS Activation
49
CYBOX GW
50
CYBOX GW
6.3 System
6.3.1 Configuration Backups
Configuration is managed in the tab System → Backup/Flash Firmware.
b. Export configuration
c. Import configuration
Before restoring a configuration archive, make sure that the factory settings have been restored in order to avoid
any conflict between your old and new configuration. The configuration file must be named according to the
pattern backup-*.tar.gz and can then be uploaded in the Restore backup field.
51
CYBOX GW
Firmware Updates are provided as binary images with the extension .itb and will be uploaded from the host
computer. Keep settings should always be cleared to ensure not to mixup old and new config switches. The
uploaded image has a MD5 checksum that must be confirmed in the following dialog.
WARNING: Do NOT POWER OFF the access point while upgrading/restoring firmware to flash. Remember
that if ``Keep settings`` checkbox is cleared, the device will revert to its network default address after
restart.
6.3.3 Reboot
The device can be rebooted on the System → Reboot tab.
After booting, a factory reset can be triggered by pressing the reset button with a pin for more than 5 seconds.
The Fail LED will blink in green and after a few seconds the device will reboot with the default configuration.
A reboot can be triggered by pressing the reset button with a pin for less than 2 seconds.
52
CYBOX GW
In case of a damaged standard image (OpenWrt/Linux in third flash) U-Boot detects a MD5 checksum error and
tries to start the emergency system image from second flash. While booting no user configuration settings are
applied. The CyBox GW comes up with network default address 192.168.100.1 (user=root, password=root) and
Wifi disabled. The Fail LED blinks orange (red and green on) and the web interface background is orange, as
Figure indicates. All configuration settings are volatile. This system should only be used to Upgrade/Restore a
working firmware image to second flash via Backup / Flash Firmware menu.
Emergency mode can also be entered by holding the reset button pressed for 5 seconds at the beginning of the
boot phase.
Note: Normally, the blue background indicates the standard mode and the orange background indicates
emergency mode. But many web browsers keep the colours in cache, which means that the wrong colour can be
displayed. To ensure that the correct one is shown, open a new window in private or incognito mode before
consulting the web interface.
53
CYBOX GW
7 SNMP
7.1 SNMP Protocol Support
Firmware implementations before 2020 only have protocol support for version v1 and v2c. Since 2020 the SNMP
protocol v3 is also included in every CyBox firmware. The v1, v2c protocol variants are present with factory
default setup. In factory default setup only read access is permitted.
The new User Account can be created as read-only, or with read-write permission. The authentication
protocol is either MD5 or SHA (preferred). If a authentication protocol is selected the authentication passphrase
must also be given. For data paket encryption select DES or AES (preferred) and also apply a passphrase. For
demonstration use the same settings as in figure below to copy and paste them in examples.
54
CYBOX GW
The default protocols v1 and v2c should be disabled, when using SNMP-V3 protocol.
After all new settings are entered press the Save & Apply. Then the SNMPD service will restarted
automatically.
Returns:
Returns:
iso.3.6.1.4.1.2021.8.1.2.103.1.1 = INTEGER: 1
iso.3.6.1.4.1.2021.8.1.2.103.2.1 = STRING: "firmware_version"
iso.3.6.1.4.1.2021.8.1.2.103.3.1 = STRING: "/usr/bin/eltec_version"
55
CYBOX GW
iso.3.6.1.4.1.2021.8.1.2.103.100.1 = INTEGER: 0
iso.3.6.1.4.1.2021.8.1.2.103.101.1 = STRING: "20.14"
iso.3.6.1.4.1.2021.8.1.2.103.102.1 = INTEGER: 0
iso.3.6.1.4.1.2021.8.1.2.103.103.1 = ""
Write access with snmpset: Set a new system hostname and reload system settings
Use the following sequence to set the new hostname:
56
CYBOX GW
This address can be changed by means of an UCI command. Assuming to be logged-in on a CyBox GW via SSH as
administrative user, the following command would allow re-specifying the IP address of the “private” group:
Where <ccu> refers to the IP address (or hostname) of the remote host which is allowed to perform SNMP write
operations. The keyword “default” instead of a specific address allows any hosts to access the SNMP demon.
Similarly, the address of the “public” group can be changed:
Note: Generally local UCI commands on the CyBox GW should be used for handling the configuration of the SNMP
demon. Run ’uci show snmpd’ to view the current settings.
Alternatively, the public and private sources can be modified with the web interface in the field ‘com2sec security’
of the tab ‘Services’ → ‘SNMPD’.
• snmpget
• snmpset
• snmpstatus
• snmptest
• snmptrap
• snmpwalk
A special case arises when snmpset writes to non-MIB extensions. In this case, there is an asymmetry between
snmpget and snmpset with respect to OIDs. Reading (snmpget) requires the complete numeric identifier
including the server-specific extension. Writing (snmpset) accepts only the “extEntry” trunk
“iso.3.6.1.4.1.2021.8.1”, while the server-specific name of the object must be passed as first argument.
The assignment of names and OID numbers can be found by executing snmpwalk.
57
CYBOX GW
boardname 1.3.6.1.4.1.2021.8.1.2.100
serial_number 1.3.6.1.4.1.2021.8.1.2.101
uboot_version 1.3.6.1.4.1.2021.8.1.2.102
firmware_version 1.3.6.1.4.1.2021.8.1.2.103
config_version 1.3.6.1.4.1.2021.8.1.2.104
uptime 1.3.6.1.4.1.2021.8.1.2.105
loadavg 1.3.6.1.4.1.2021.8.1.2.106
temperature 1.3.6.1.4.1.2021.8.1.2.107
uci_get 1.3.6.1.4.1.2021.8.1.2.108
custom1 1.3.6.1.4.1.2021.8.1.2.109
custom2 1.3.6.1.4.1.2021.8.1.2.110
custom3 1.3.6.1.4.1.2021.8.1.2.111
mpstat 1.3.6.1.4.1.2021.8.1.2.112
The command
will deliver
iso.3.6.1.4.1.2021.8.1.2.100.1.1 = INTEGER: 1
iso.3.6.1.4.1.2021.8.1.2.100.2.1 = STRING: "boardname"
iso.3.6.1.4.1.2021.8.1.2.100.3.1 = STRING: "/bin/cat /tmp/sysinfo/eeprom/BOARDNAME"
iso.3.6.1.4.1.2021.8.1.2.100.100.1 = INTEGER: 0
iso.3.6.1.4.1.2021.8.1.2.100.101.1 = STRING: "CYAP.-V-W8IRQWWEUPX"
iso.3.6.1.4.1.2021.8.1.2.100.102.1 = INTEGER: 0
iso.3.6.1.4.1.2021.8.1.2.100.103.1 = ""
MIB name:
iso.3.6.1.4.1.2021.8.1.2.100.100.1 = INTEGER: 0
58
CYBOX GW
Note: A normal CyBox GW configuration consists of six wireless interfaces, but there are up to twenty interfaces
possible, so snmpwalk will result in up to 80 percent of undefined (Empty UCI entry) values.
The following objects are available to determine the actual network/wireless ordering.
7.6.2.1 Readout current Network Device Order
The command
delivers
iso.3.6.1.4.1.2021.8.1.2.150.1.1 = INTEGER: 1
iso.3.6.1.4.1.2021.8.1.2.150.2.1 = STRING: "network_order"
iso.3.6.1.4.1.2021.8.1.2.150.3.1 = STRING: "/etc/snmp/get_cyboxap network_order"
iso.3.6.1.4.1.2021.8.1.2.150.100.1 = INTEGER: 0
iso.3.6.1.4.1.2021.8.1.2.150.101.1 = STRING: "loopback=lo" **<--- network0**
iso.3.6.1.4.1.2021.8.1.2.150.101.2 = STRING: "lan=eth0" **<--- network1**
iso.3.6.1.4.1.2021.8.1.2.150.101.3 = STRING: "vlan007=eth0.7" **<--- network2**
iso.3.6.1.4.1.2021.8.1.2.150.101.4 = STRING: "vlan123=eth0.123" **<--- network3**
iso.3.6.1.4.1.2021.8.1.2.150.101.5 = STRING: "vlan500=eth0.500" **<--- network4**
iso.3.6.1.4.1.2021.8.1.2.150.101.6 = STRING: "cfg_net=eth0.999" **<--- network5**
iso.3.6.1.4.1.2021.8.1.2.150.102.1 = INTEGER: 0
iso.3.6.1.4.1.2021.8.1.2.150.103.1 = ""
Example:
IP address of LAN interface ‘cfg_net’ will be (network5 starts at 550):
network5.ipaddr 1.3.6.1.4.1.2021.8.1.2.552
The command
delivers
59
CYBOX GW
iso.3.6.1.4.1.2021.8.1.2.151.102.1 = INTEGER: 0
iso.3.6.1.4.1.2021.8.1.2.151.103.1 = ""
Note 1: This assignment may change every time a specific SSID is disabled or enabled and the wireless interface is
restarted. The corresponding Linux WLAN device for a SSID is needed to readout current assoclist, bitrates and
signal quality values.
Note 2: The order/assignment functions 150, 151 and 152 should not be polled in an application, since they
require some CPU resources. The network status should only be readout once after system start and every time
operator causes a change in the network layout.
Example:
Readout assoclist, bitrate and signal quality from wlan0-2 (CyAP0_00486889_00486886_vlan123)
assoclist_wlan0-2 1.3.6.1.4.1.2021.8.1.2.202
bitrate_wlan0-2 1.3.6.1.4.1.2021.8.1.2.242
signal_wlan0-2 1.3.6.1.4.1.2021.8.1.2.282
The command
The command
The command
60
CYBOX GW
iso.3.6.1.4.1.2021.8.1.2.282.101.1 = STRING: "Link Quality: 70/70 Signal: -33 dBm Noise: -95 dBm "
61
CYBOX GW
delivers
Single user:
Multiple user:
7.7.3 Edit configuration parameters, create new fields and delete items
If a ‘config.section.option’ is known, the ‘uci set’ command call can be used to read and modify any existing
configuration item. If a snmpset command with a string “uci <command> config-item=new-value” is executed, it
marks the config-item. The next snmpget call with ‘1.3.6.1.4.1.2021.8.1.2.108’ (uci_get) remembers the last
config-item and returns the curre nt value (read-back function). If the snmpset was executed without the string
62
CYBOX GW
part “=new-value” only the config-item marker is set. This can be used to readout an item (no OID) without
modifying it.
Note: Remember to commit changes in order to save then with the command ‘uci commit’.
7.7.3.1 Set new Hostname
Hostname is configured in ‘/etc/config/system’ (no OID).
The commands
will deliver
iso.3.6.1.4.1.2021.8.1.2.108.1.1 = INTEGER: 1
iso.3.6.1.4.1.2021.8.1.2.108.100.1 = INTEGER: 0
iso.3.6.1.4.1.2021.8.1.2.108.101.1 = STRING:
"system.@system[0].hostname=CyBoxAP"
iso.3.6.1.4.1.2021.8.1.2.108.102.1 = INTEGER: 0
iso.3.6.1.4.1.2021.8.1.2.108.103.1 = ""
delivers
iso.3.6.1.4.1.2021.8.1.2.108.1.1 = INTEGER: 1
63
CYBOX GW
iso.3.6.1.4.1.2021.8.1.2.108.100.1 = INTEGER: 0
iso.3.6.1.4.1.2021.8.1.2.108.101.1 = STRING:
"system.@system[0].config_description=Version 1.1 Beta ABC"
iso.3.6.1.4.1.2021.8.1.2.108.102.1 = INTEGER: 0
iso.3.6.1.4.1.2021.8.1.2.108.103.1 = ""
Commit this change from UCI temporary storage to permanent overlay file system.
delivers
iso.3.6.1.4.1.2021.8.1.2.108.1.1 = INTEGER: 1
iso.3.6.1.4.1.2021.8.1.2.108.100.1 = INTEGER: 0
iso.3.6.1.4.1.2021.8.1.2.108.101.2 = STRING:
"system.@system[0].config_description="
iso.3.6.1.4.1.2021.8.1.2.108.102.1 = INTEGER: 0
iso.3.6.1.4.1.2021.8.1.2.108.103.1 = ""
Commit this change from UCI temporary storage to permanent overlay file system.
64
CYBOX GW
delivers
iso.3.6.1.4.1.2021.8.1.2.155.1.1 = INTEGER: 1
iso.3.6.1.4.1.2021.8.1.2.155.100.1 = INTEGER: 0
iso.3.6.1.4.1.2021.8.1.2.155.101.7 = Hex-STRING: 4E 3A 20 34 39 C2
B0 35 37 27 33 36 2E 33 38 34
22
iso.3.6.1.4.1.2021.8.1.2.155.101.8 = Hex-STRING: 45 3A 20 38 C2 B0
31 35 27 33 30 2E 36 36 36 22
iso.3.6.1.4.1.2021.8.1.2.155.101.11 = ""
iso.3.6.1.4.1.2021.8.1.2.155.102.1 = INTEGER: 0
iso.3.6.1.4.1.2021.8.1.2.155.103.1 = ""
The values “Latitude DMS” and “Longitude DMS” are returned as Hex strings because they contain quote and
double quotes.
This converted NMEA 0183 data struct is supplied with default configuration (after factory reset). The
configuration can be adapted to supply the raw NMEA 0183 protocol. Following steps are necessary to switch
over to raw protocol.
Open a remote root console with ‘ssh’ access and apply following commands.
root@CyBoxAP:/# reboot
After reboot the GPS subsystem is configured to supply raw NMEA 0183 data. Note that this data is not shown in
web interface, but can be readout via SNMP (different OID than converted GPS info).
65
CYBOX GW
The command
will return
iso.3.6.1.4.1.2021.8.1.2.156.1.1 = INTEGER: 1
iso.3.6.1.4.1.2021.8.1.2.156.100.1 = INTEGER: 0
iso.3.6.1.4.1.2021.8.1.2.156.101.1 = STRING:
"$GPRMC,094908.000,A,4957.5942,N,00815.4955,E,0.2,194.2,050717,,,A\*6E"
iso.3.6.1.4.1.2021.8.1.2.156.101.2 = STRING:
"$GPGGA,094908.000,4957.5942,N,00815.4955,E,1,07,1.3,149.90,M,47.9,M,,\*6E"
iso.3.6.1.4.1.2021.8.1.2.156.101.3 = STRING:
"$GNGSA,A,3,24,25,32,29,31,02,,,,,,,2.2,1.3,1.8\*2C"
iso.3.6.1.4.1.2021.8.1.2.156.101.4 = STRING:
"$GNGSA,A,3,77,,,,,,,,,,,,2.2,1.3,1.8\*27"
iso.3.6.1.4.1.2021.8.1.2.156.101.5 = STRING:
"$GPGSV,3,1,10,02,39,076,17,06,13,033,,12,40,086,13,14,30,267,\*7F"
iso.3.6.1.4.1.2021.8.1.2.156.101.6 = STRING:
"$GPGSV,3,2,10,24,12,151,34,25,79,051,21,26,02,280,,29,61,213,25\*77"
iso.3.6.1.4.1.2021.8.1.2.156.101.7 = STRING:
"$GPGSV,3,3,10,31,40,305,25,32,22,244,32,,,,,,,,\*7D"
iso.3.6.1.4.1.2021.8.1.2.156.101.8 = STRING:
"$GLGSV,2,1,07,81,19,201,,70,11,350,,77,42,124,33,79,34,317,\*6F"
iso.3.6.1.4.1.2021.8.1.2.156.101.9 = STRING:
"$GLGSV,2,2,07,69,08,297,,88,69,171,,87,52,044,,,,,\*59"
iso.3.6.1.4.1.2021.8.1.2.156.102.1 = INTEGER: 0
iso.3.6.1.4.1.2021.8.1.2.156.103.1 = ""
gps_module0_info 1.3.6.1.4.1.2021.8.1.2.157
gps_module0_raw 1.3.6.1.4.1.2021.8.1.2.158
gps_module1_info 1.3.6.1.4.1.2021.8.1.2.159
gps_module1_raw 1.3.6.1.4.1.2021.8.1.2.160
66
CYBOX GW
returns
iso.3.6.1.4.1.2021.8.1.2.3000.1.1 = INTEGER: 1
iso.3.6.1.4.1.2021.8.1.2.3000.100.1 = INTEGER: 0
iso.3.6.1.4.1.2021.8.1.2.3000.101.1 = STRING:
"network.LTE=interface"
iso.3.6.1.4.1.2021.8.1.2.3000.101.2 = STRING:
"network.LTE.proto='qmi'"
iso.3.6.1.4.1.2021.8.1.2.3000.101.3 = STRING:
"network.LTE.ifname='wwan1'"
iso.3.6.1.4.1.2021.8.1.2.3000.101.4 = STRING:
"network.LTE.simslot='1'"
iso.3.6.1.4.1.2021.8.1.2.3000.101.5 = STRING:
"network.LTE.pincode1='4173'"
iso.3.6.1.4.1.2021.8.1.2.3000.102.1 = INTEGER: 0
iso.3.6.1.4.1.2021.8.1.2.3000.103.1 = ""
returns
iso.3.6.1.4.1.2021.8.1.2.3010.1.1 = INTEGER: 1
67
CYBOX GW
modem0_signal"
iso.3.6.1.4.1.2021.8.1.2.3010.100.1 = INTEGER: 0
iso.3.6.1.4.1.2021.8.1.2.3010.102.1 = INTEGER: 0
iso.3.6.1.4.1.2021.8.1.2.3010.103.1 = ""
returns
iso.3.6.1.4.1.2021.8.1.2.3015.1.1 = INTEGER: 1
iso.3.6.1.4.1.2021.8.1.2.3015.100.1 = INTEGER: 0
iso.3.6.1.4.1.2021.8.1.2.3015.101.1 = STRING:
"{\"up\":true,\"pending\":false,\"available\":true,\"autostart\":true,\"dynamic\":true,
\"uptime\":437,\"l3_device\":\"wwan1\",\"proto\":\"dhcp\",\"device\":\"wwan1\",
\"updated\":[\"addresses\",\"routes\",\"data\"],\"metric\":0,\"dns_metric\":0,
\"delegation\":true,\"ipv4-address\":[{\"address\":\"10.118.124.205\",\"mask\":30}],
\"ipv6-address\":[],\"ipv6-prefix\":[],\"ipv6-prefix-assignment\":[],
\"route\":[{\"target\":\"10.118.124.206\",\"mask\":32,\"nexthop\":\"0.0.0.0\",
\"source\":\"10.118.124.205\\/32\"},{\"target\":\"0.0.0.0\",\"mask\":0,
\"nexthop\":\"10.118.124.206\",\"source\":\"10.118.124.205\\/32\"}],
\"dns-server\":[\"62.109.121.17\",\"62.109.121.18\"],\"dns-search\":[],
\"inactive\":{\"ipv4-address\":[],\"ipv6-address\":[],\"route\":[],\"dns-server\":[],
\"dns-search\":[]},\"data\":{\"leasetime\":7200}}"
iso.3.6.1.4.1.2021.8.1.2.3015.102.1 = INTEGER: 0
68
CYBOX GW
iso.3.6.1.4.1.2021.8.1.2.3015.103.1 = ""
69
CYBOX GW
Ensure that an Ethernet cable is connected between your PC and the access point. The following instruction
assumes that the default settings are used.
• If you are using a UNIX/Linux PC then run the command ‘ssh [email protected]’.
• If you are using a Windows PC, PuTTY should be configured as follows:
b. Serial cable
Ensure that a serial cable is connected between your PC and the access point (a specific CyBox adapter plugged
in the USB port is required).
• On a UNIX PC, install the program picocom, and run command picocom -b 115200 /dev/ttyUSB0 (‘ttyUSB0’
must be modified depending on your PC).
• If you are using a Windows PC, PuTTY should be configured as follows:
70
CYBOX GW
Once the connection is established, a login should be requested on serial console window.
If this is not the case, press Enter on the keyboard and/or disconnect and reconnect the USB serial adapter on the
CyBox side. To edit files on target system the build-in text editor nano can be used.
to:
/etc/init.d/network restart
71
CYBOX GW
The current configuration can be saved in the CyBox folder ‘/tmp/’ with the command sysupgrade -b
/tmp/backup<mybackupname>.tar.gz. It can then be exported to a PC with SCP (or the program
WinSCP for Windows).
c. Import configuration
Restore the factory settings and then import your archived configuration to ‘/tmp/’ with SCP (or WinSCP),
the configuration can be installed with the command sysupgrade -r
/tmp/backup-<mybackupname>.tar.gz ; reboot
10 SYSTEM MAINTENANCE
10.1 Remote Firmware Upgrade
The standard_boot flash partition, which contains the standard firmware binary image (.itb image), can be
updated remotely. The new firmware image must be copied to the target system with scp command. Afterwards
ssh calls will execute local target programs to install the new firmware.
While OpenWrt operating system is running, the standard_boot partition can be written at any time.
If firmware update does not require a configuration change, the current system configuration can be kept. Please
contact support or sales department if a configuration reset is needed for your update purpose from an older
version to a newer one.
The Appendix: Script for Remote Firmware Update provides a Bash script rsysupgrade.sh to demonstrate the
remote update process from a Linux Host console.
2. Flash new firmware to the standard_boot flash partition (mtd2) and reboot the target system
72
CYBOX GW
The following commands may be executed from a Linux console or with similar Windows Putty utils.
4. Optionally, export your new custom configuration to /mnt/custom/. Note that the target system will
perform a extra reboot cycle, to activate your new configuration setup. If no configuration is exported, the
default configuration of the new firmware will automatically be applied.
73
CYBOX GW
a. Export configuration
Archived configurations can be exported from the command line to an empty USB stick by copying the
configuration to ‘/mnt/sda1’.
b. Import configuration
To import an archived configuration to the access point, wait until booting is completed, then connect a USB
stick with a configuration file on it named like ‘backup-<mycustomname>.tar.gz’ No other file or folder must be
present on the stick. Once plugged in, the configuration will be automatically read in and two reboots will
successively happen in order to apply your settings. The USB stick can safely be removed at the beginning of a
boot phase (when all LEDs are turned off), or when the boot sequence is completed.
A USB hotplug script is triggered if the USB stick is plugged in after booting. It reads the root directory of the stick
and checks for a list of known file types:
Files on upgrade USB stick:
Every install is executed only once for each file on the USB stick; updates already installed are not tried again.
Check ‘System Log’ in web interface or logread on console for upgrade messages.
For a firmware upgrade with *.zip archive the USB stick should only provide one archive file in USB root directory:
Example:
cyap-upgrade-V20.36.3.zip
This upgrade archive file must contain the new V20.36.3-cyap2-lzma.itb firmware image and an executable install
script named install.sh. The install script executes commands to flash the new firmware into the desired
partition. The upgrade archive may also include a new configuration backup archive, suitable for the new
firmware version. After firmware upgrade, the new configuration may also applied with commands from the
install script.
Example for an install.sh script:
74
CYBOX GW
#!/bin/sh
sysupgrade -t V20.36.3-cyap2-lzma.itb
sysupgrade -r backup-cyap2-20.36.3.tar.gz
exit 0
75
CYBOX GW
PREAMBLE
The GNU General Public License is a free, copyleft license for software
and other kinds of works.
The licenses for most software and other practical works are designed to
take away your freedom to share and change the works. By contrast, the
GNU General Public License is intended to guarantee your freedom to
share and change all versions of a program--to make sure it remains free
software for all its users. We, the Free Software Foundation, use the
GNU General Public License for most of our software; it applies also to
any other work released this way by its authors. You can apply it to
your programs, too.
To protect your rights, we need to prevent others from denying you these
rights or asking you to surrender the rights. Therefore, you have
certain responsibilities if you distribute copies of the software, or if
you modify it: responsibilities to respect the freedom of others.
Developers that use the GNU GPL protect your rights with two steps: (1)
assert copyright on the software, and (2) offer you this License giving
you legal permission to copy, distribute and/or modify it.
For the developers' and authors' protection, the GPL clearly explains
that there is no warranty for this free software. For both users' and
authors' sake, the GPL requires that modified versions be marked as changed,
so that their problems will not be attributed erroneously to
authors of previous versions.
76
CYBOX GW
0. Definitions.
To “modify” a work means to copy from or adapt all or part of the work
in a fashion requiring copyright permission, other than the making of an
exact copy. The resulting work is called a “modified version” of the
earlier work or a work “based on” the earlier work.
1. Source Code.
The “source code” for a work means the preferred form of the work for
making modifications to it. “Object code” means any non-source form of a
work.
77
CYBOX GW
The “Corresponding Source” for a work in object code form means all the
source code needed to generate, install, and (for an executable work)
run the object code and to modify the work, including scripts to control
those activities. However, it does not include the work's System
Libraries, or general-purpose tools or generally available free programs
which are used unmodified in performing those activities but which are
not part of the work. For example, Corresponding Source includes
interface definition files associated with source files for the work,
and the source code for shared libraries and dynamically linked
subprograms that the work is specifically designed to require, such as
by intimate data communication or control flow between those subprograms
and other parts of the work.
The Corresponding Source need not include anything that users can
regenerate automatically from other parts of the Corresponding Source.
The Corresponding Source for a work in source code form is that same
work.
2. Basic Permissions.
All rights granted under this License are granted for the term of
copyright on the Program, and are irrevocable provided the stated
conditions are met. This License explicitly affirms your unlimited
permission to run the unmodified Program. The output from running a
covered work is covered by this License only if the output, given its
content, constitutes a covered work. This License acknowledges your
rights of fair use or other equivalent, as provided by copyright law.
You may make, run and propagate covered works that you do not convey,
without conditions so long as your license otherwise remains in force.
You may convey covered works to others for the sole purpose of having
them make modifications exclusively for you, or provide you with
facilities for running those works, provided that you comply with the
terms of this License in conveying all material for which you do not
control copyright. Those thus making or running the covered works for
you must do so exclusively on your behalf, under your direction and
control, on terms that prohibit them from making any copies of your
copyrighted material outside their relationship with you.
When you convey a covered work, you waive any legal power to forbid
circumvention of technological measures to the extent such circumvention
is effected by exercising rights under this License with respect to the
covered work, and you disclaim any intention to limit operation or
modification of the work as a means of enforcing, against the work's
users, your or third parties' legal rights to forbid circumvention of
technological measures.
78
CYBOX GW
You may convey verbatim copies of the Program's source code as you
receive it, in any medium, provided that you conspicuously and
appropriately publish on each copy an appropriate copyright notice; keep
intact all notices stating that this License and any non-permissive
terms added in accord with section 7 apply to the code; keep intact all
notices of the absence of any warranty; and give all recipients a copy
of this License along with the Program.
You may charge any price or no price for each copy that you convey, and
you may offer support or warranty protection for a fee.
a) The work must carry prominent notices stating that you modified it,
and giving a relevant date. b) The work must carry prominent notices
stating that it is released under this License and any conditions added
under section 7. This requirement modifies the requirement in section 4
to “keep intact all notices”. c) You must license the entire work, as a
whole, under this License to anyone who comes into possession of a copy.
This License will therefore apply, along with any applicable section 7
additional terms, to the whole of the work, and all its parts,
regardless of how they are packaged. This License gives no permission to
license the work in any other way, but it does not invalidate such
permission if you have separately received it. d) If the work has
interactive user interfaces, each must display Appropriate Legal
Notices; however, if the Program has interactive interfaces that do not
display Appropriate Legal Notices, your work need not make them do so.
You may convey a covered work in object code form under the terms of
sections 4 and 5, provided that you also convey the machine-readable
Corresponding Source under the terms of this License, in one of these
ways:
79
CYBOX GW
received the object code with such an offer, in accord with subsection
6b. d) Convey the object code by offering access from a designated place
(gratis or for a charge), and offer equivalent access to the
Corresponding Source in the same way through the same place at no
further charge. You need not require recipients to copy the
Corresponding Source along with the object code. If the place to copy
the object code is a network server, the Corresponding Source may be on
a different server (operated by you or a third party) that supports
equivalent copying facilities, provided you maintain clear directions
next to the object code saying where to find the Corresponding Source.
Regardless of what server hosts the Corresponding Source, you remain
obligated to ensure that it is available for as long as needed to
satisfy these requirements. e) Convey the object code using peer-to-peer
transmission, provided you inform other peers where the object code and
Corresponding Source of the work are being offered to the general public
at no charge under subsection 6d.
If you convey an object code work under this section in, or with, or
specifically for use in, a User Product, and the conveying occurs as
part of a transaction in which the right of possession and use of the
User Product is transferred to the recipient in perpetuity or for a
fixed term (regardless of how the transaction is characterized), the
Corresponding Source conveyed under this section must be accompanied by
the Installation Information. But this requirement does not apply if
neither you nor any third party retains the ability to install modified
object code on the User Product (for example, the work has been
installed in ROM).
80
CYBOX GW
reading or copying.
7. Additional Terms.
When you convey a copy of a covered work, you may at your option remove
any additional permissions from that copy, or from any part of it.
(Additional permissions may be written to require their own removal in
certain cases when you modify the work.) You may place additional
permissions on material, added by you to a covered work, for which you
have or can give appropriate copyright permission.
If you add terms to a covered work in accord with this section, you must
place, in the relevant source files, a statement of the additional terms
that apply to those files, or a notice indicating where to find the
applicable terms.
8. Termination.
81
CYBOX GW
However, if you cease all violation of this License, then your license
from a particular copyright holder is reinstated (a) provisionally,
unless and until the copyright holder explicitly and finally terminates
your license, and (b) permanently, if the copyright holder fails to
notify you of the violation by some reasonable means prior to 60 days
after the cessation.
Termination of your rights under this section does not terminate the
licenses of parties who have received copies or rights from you under
this License. If your rights have been terminated and not permanently
reinstated, you do not qualify to receive new licenses for the same
material under section 10.
You are not required to accept this License in order to receive or run a
copy of the Program. Ancillary propagation of a covered work occurring
solely as a consequence of using peer-to-peer transmission to receive a
copy likewise does not require acceptance. However, nothing other than
this License grants you permission to propagate or modify any covered
work. These actions infringe copyright if you do not accept this
License. Therefore, by modifying or propagating a covered work, you
indicate your acceptance of this License to do so.
You may not impose any further restrictions on the exercise of the
rights granted or affirmed under this License. For example, you may not
impose a license fee, royalty, or other charge for exercise of rights
granted under this License, and you may not initiate litigation
(including a cross-claim or counterclaim in a lawsuit) alleging that any
patent claim is infringed by making, using, selling, offering for sale,
or importing the Program or any portion of it.
11. Patents.
82
CYBOX GW
83
CYBOX GW
all. For example, if you agree to terms that obligate you to collect a
royalty for further conveying from those to whom you convey the Program,
the only way you could satisfy both those terms and this License would
be to refrain entirely from conveying the Program.
The Free Software Foundation may publish revised and/or new versions of
the GNU General Public License from time to time. Such new versions will
be similar in spirit to the present version, but may differ in detail to
address new problems or concerns.
If the Program specifies that a proxy can decide which future versions
of the GNU General Public License can be used, that proxy's public
statement of acceptance of a version permanently authorizes you to
choose that version for the Program.
84
CYBOX GW
<one line to give the program's name and a brief idea of what it does.>
Copyright (C) <year> <name of author>
You should have received a copy of the GNU General Public License along
with this program. If not, see <https://www.gnu.org/licenses/>.
Also add information on how to contact you by electronic and paper mail.
<program> Copyright (C) <year> <name of author> This program comes with
ABSOLUTELY NO WARRANTY; for details type \`show w'. This is free
software, and you are welcome to redistribute it under certain
conditions; type \`show c' for details.
The hypothetical commands \`show w' and \`show c' should show the
appropriate parts of the General Public License. Of course, your
program's commands might be different; for a GUI interface, you would
use an “about box”.
You should also get your employer (if you work as a programmer) or
school, if any, to sign a “copyright disclaimer” for the program, if
necessary. For more information on this, and how to apply and follow the
GNU GPL, see <https://www.gnu.org/licenses/>.
The GNU General Public License does not permit incorporating your
program into proprietary programs. If your program is a subroutine
library, you may consider it more useful to permit linking proprietary
applications with the library. If this is what you want to do, use the
GNU Lesser General Public License instead of this License. But first,
please read <https://www.gnu.org/licenses/why-not-lgpl.html>.
85
CYBOX GW
# SNMPSET commands:
# radio0_up
# radio0_down
# radio1_up
# radio1_down
# modem0_up
# modem1_up
# modem2_up
# modem3_up
# modem4_up
# modem0_down
# modem1_down
# modem2_down
# modem3_down
# modem4_down
# modem0_simslot <value>
# modem1_simslot <value>
# modem2_simslot <value>
# modem3_simslot <value>
# modem4_simslot <value>
# network<index>.<entry> <value>
# radio<index>.<entry> <value>
86
CYBOX GW
# wireless<index>.<entry> <value>
# reboot
# SNMPGET/SNMPWALK objects:
boardname 1.3.6.1.4.1.2021.8.1.2.100
serial_number 1.3.6.1.4.1.2021.8.1.2.101
uboot_version 1.3.6.1.4.1.2021.8.1.2.102
firmware_version 1.3.6.1.4.1.2021.8.1.2.103
config_version 1.3.6.1.4.1.2021.8.1.2.104
uptime 1.3.6.1.4.1.2021.8.1.2.105
loadavg 1.3.6.1.4.1.2021.8.1.2.106
temperature 1.3.6.1.4.1.2021.8.1.2.107
uci_get 1.3.6.1.4.1.2021.8.1.2.108
87
CYBOX GW
custom1 1.3.6.1.4.1.2021.8.1.2.109
custom2 1.3.6.1.4.1.2021.8.1.2.110
custom3 1.3.6.1.4.1.2021.8.1.2.111
mpstat 1.3.6.1.4.1.2021.8.1.2.112
network_order 1.3.6.1.4.1.2021.8.1.2.150
----listing not printed here, see console command on top of this page
for live listing. The editor.----
88
CYBOX GW
89