Lorawan UG67
Lorawan UG67
Gateway
UG67
User Guide
                   Milesight IoT
Preface
Thanks for choosing Milesight UG67 LoRaWAN® gateway. UG67 delivers tenacious
connection over network with full-featured design such as automated failover/failback,
extended operating temperature, dual SIM cards, hardware watchdog, VPN, Gigabit
Ethernet and beyond.
This guide shows you how to configure and operate the UG67 LoRaWAN® gateway. You
can refer to it for detailed functionality and gateway configuration.
Readers
This guide is mainly intended for the following users:
- Network Planners
- On-site technical support and maintenance personnel
- Network administrators responsible for network configuration and maintenance
Related Documents
Document                      Description
UG67 Quick Start Guide Quick Installation Guide for UG67 LoRaWAN® gateway.
Declaration of Conformity
UG67 is in conformity with the essential requirements and other relevant provisions of the
CE, FCC, and RoHS.
                                                                                          2
                                             For assistance, please contact
                                             Milesight technical support:
                                             Email: iot.support@milesight.com
                                             Tel: 86-592-5085280
                                             Fax: 86-592-5023065
Revision History
Date               Doc Version   Description
Dec. 31, 2020      V1.0          Initial version
                                 1. Support LoRaWAN® Class B
                                 2. Add Node-RED feature
Apr. 30, 2021      V1.1          3. Add Noise-Analyzer feature
                                 4. Add Multicast Groups feature
                                 5. Add application examples
                                 1. Support Yeastar Workplace platform
                                 integration
Aug. 24, 2021      V1.2
                                 2. Delete Package Forward status page
                                 3. Phone & Email webpage update
                                                                                3
                                                             Contents
                                                                                                                                               4
          3.3.2.3 DMZ................................................................................................................ 57
          3.3.2.4 Port Mapping.................................................................................................57
          3.3.2.5 MAC Binding..................................................................................................58
     3.3.3 DHCP..........................................................................................................................59
     3.3.4 DDNS..........................................................................................................................60
     3.3.5 Link Failover..............................................................................................................61
          3.3.5.1 SLA..................................................................................................................61
          3.3.5.2 Track...............................................................................................................62
          3.3.5.3 WAN Failover.................................................................................................63
     3.3.6 VPN............................................................................................................................ 64
          3.3.6.1 DMVPN...........................................................................................................64
          3.3.6.2 IPSec...............................................................................................................65
          3.3.6.3 GRE................................................................................................................. 68
          3.3.6.4 L2TP............................................................................................................... 69
          3.3.6.5 PPTP...............................................................................................................71
          3.3.6.6 OpenVPN Client............................................................................................ 73
          3.3.6.7 OpenVPN Server........................................................................................... 74
          3.3.6.8 Certifications.................................................................................................76
3.4 System.................................................................................................................................. 78
     3.4.1 General Settings.......................................................................................................78
          3.4.1.1 General........................................................................................................... 78
          3.4.1.2 System Time................................................................................................. 79
          3.4.1.3 SMTP.............................................................................................................. 81
          3.4.1.4 Phone............................................................................................................. 81
          3.4.1.5 Email...............................................................................................................82
     3.4.2 User Management................................................................................................... 83
          3.4.2.1 Account.......................................................................................................... 83
          3.4.2.2 User Management........................................................................................83
     3.4.3 SNMP......................................................................................................................... 84
          3.4.3.1 SNMP..............................................................................................................84
          3.4.3.2 MIB View........................................................................................................ 85
          3.4.3.3 VACM..............................................................................................................85
          3.4.3.4 Trap.................................................................................................................86
          3.4.3.5 MIB..................................................................................................................87
     3.4.5 Device Management................................................................................................87
     3.4.6 Events........................................................................................................................ 88
          3.4.6.1 Events.............................................................................................................88
          3.4.6.2 Events Settings............................................................................................. 89
3.5 Maintenance........................................................................................................................ 90
     3.5.1 Tools.......................................................................................................................... 90
          3.5.1.1 Ping.................................................................................................................90
          3.5.1.2 Traceroute..................................................................................................... 90
          3.5.1.3 Qxdmlog.........................................................................................................91
     3.5.2 Schedule....................................................................................................................91
                                                                                                                                          5
        3.5.3 Log..............................................................................................................................92
             3.5.3.1 System Log....................................................................................................92
             3.5.3.2 Log Settings.................................................................................................. 92
        3.5.4 Upgrade..................................................................................................................... 93
        3.5.5 Backup and Restore................................................................................................ 94
        3.5.6 Reboot....................................................................................................................... 95
   3.6 APP........................................................................................................................................ 96
        3.6.1 Python........................................................................................................................96
             3.6.1.1 Python............................................................................................................ 96
             3.6.1.2 App Manager Configuration....................................................................... 97
             3.6.1.3 Python App.................................................................................................... 98
        3.6.2 Node-RED.................................................................................................................. 98
             3.6.2.1 Node-RED.......................................................................................................99
Chapter 4 Application Examples................................................................................................... 100
   4.1 Restore Factory Defaults................................................................................................. 100
        4.1.1 Via Web Interface...................................................................................................100
        4.1.2 Via Hardware.......................................................................................................... 101
   4.2 Firmware Upgrade.............................................................................................................101
   4.3 Ethernet Connection......................................................................................................... 102
   4.4 Cellular Connection...........................................................................................................103
   4.5 Wi-Fi Application Example............................................................................................... 104
        4.5.1 AP Mode..................................................................................................................104
        4.5.2 Client Mode.............................................................................................................106
   4.6 Packet Forwarder Configuration.....................................................................................107
   4.7 Connect UG67 to Milesight IoT Cloud........................................................................... 109
   4.8 Application Configuration................................................................................................ 110
   4.9 Device Configuration........................................................................................................ 113
   4.10 Send Data to Device....................................................................................................... 114
   4.11 Node-RED......................................................................................................................... 116
        4.11.1 Start the Node-RED..............................................................................................116
        4.11.2 Send Data by Email............................................................................................. 117
                                                                                                                                                6
Chapter 1 Product Introduction
1.1 Overview
UG67 is a robust 8-channel outdoor LoRaWAN® gateway. Adopting SX1302 LoRa chip and
high-performance quad-core CPU, UG67 supports connection with more than 2000 nodes.
UG67 has line of sight up to 15 km and can cover about 2km in urbanized environment,
which is ideally suited to smart office, smart building and many other outdoor applications.
UG67 supports not only multiple back-haul backups with Ethernet, Wi-Fi and cellular, but
also has integrated mainstream network servers (such as The Things Industries,
ChirpStack, etc.) and built-in network server and Milesight IoT Cloud for easy deployment.
Figure 1-1
1.2 Advantages
Benefits
-   Built-in industrial CPU and big memory
-   Ethernet, 2.4GHz Wi-Fi and global 2G/3G/LTE options make it easy to get connected
-   Embedded network server and compliant with several third party network servers
-   MQTT, HTTP or HTTPS protocol for data transmission to application server
-   Rugged enclosure, optimized for wall or pole mounting
-   3-year warranty included
                                                                                         7
Easy Maintenance
-      Milesight DeviceHub provides easy setup, mass configuration, and centralized
       management of remote devices
-      The user-friendly web interface design and various upgrading options help
       administrator to manage the device as easy as pie
-      WEB GUI and CLI enable the admin to achieve quick configuration and simple
       management among a large quantity of devices
-      Users can efficiently manage the remote devices on the existing platform through the
       industrial standard SNMP
Capabilities
-      Link remote devices in an environment where communication technologies are
       constantly changing
-      Industrial quad core 64-bit ARM Cortex-A53 processor, high-performance operating up
       to 1.5GHz with low power consumption, and 8GB eMMC available to support more
       applications
-      Support wide operating temperature ranging from -40°C to 70°C/-40°F to 158°F
1.3 Specifications
    Hardware System
    CPU                 Quad-core 1.5GHz, 64-bit ARM Cortex-A53
    Memory              8 GB eMMC Flash, 512 MB DDR4 RAM
    LoRaWAN
                        2 × Internal Antennas +
    Antenna
                        2 × 50 Ω N-Female External Connectors
    Channel             8
    Frequency Band      CN470/IN865/EU868/RU864/US915/AU915/KR920/AS923/AS923-2
    Sensitivity         -140dBm Sensitivity @292bps
    Output Power        27dBm Max
    Protocol            V1.0 Class A/Class B/Class C and V1.0.2 Class A/Class B/Class C
    Ethernet
    Ports               1 × RJ-45 (PoE PD supported)
    Physical Layer      10/100/1000 Base-T (IEEE 802.3)
    Data Rate           10/100/1000 Mbps (auto-sensing)
                                                                                          8
Interface            Auto MDI/MDIX
Mode                 Full or half duplex (auto-sensing)
Wi-Fi Interfaces
Antenna              Fully Integrated and Internal Antenna
Standards            IEEE 802.11 b/g/n
                     802.11b: 18 dBm +/-2.0 dBm (11 Mbps)
                     802.11g: 15 dBm +/-2.0 dBm (6 Mbps)
                     802.11g: 15 dBm +/-2.0 dBm (54 Mbps)
Tx Power             802.11n@2.4 GHz: 14 dBm +/-2.0 dBm (MCS0_HT20)
                     802.11n@2.4 GHz: 14 dBm +/-2.0 dBm (MCS7_HT20)
                     802.11n@2.4 GHz: 13 dBm +/-2.0 dBm (MCS0_HT40)
                     802.11n@2.4 GHz: 13 dBm +/-2.0 dBm (MCS7_HT40)
Cellular Interfaces (Optional)
Antenna              Internal Antenna
SIM Slots            1
GPS
Antenna              Internal Antenna
                     -167dBm@Tracking, -149dBm@Acquisition,
Sensitivity
                     -161dBm@Re-acquisition
Position Accuracy    <2.5m CEP
Software
Network              PPPoE, SNMP v1/v2c/v3, TCP, UDP, DHCP, DDNS, HTTP, HTTPS,
Protocols            DNS, SNTP, Telnet, SSH, MQTT, etc.
VPN Tunnel           DMVPN/IPsec/OpenVPN/PPTP/L2TP/GRE
Firewall             ACL/DMZ/Port Mapping/MAC Binding
Management           Web, CLI, SMS, On-demand dial up
App                  Python SDK, Node-RED
Power Supply and Consumption
                     1. 1 × 802.3 af PoE Input
Power Supply
                     2. 12 VDC with M12 Connector
Consumption         Typical 3.6W, Max 4.8W
Physical Characteristics
Ingress Protection   IP67
Dimensions           250 x 172 x 92 mm
                                                                                 9
Mounting             Wall or Pole Mounting
Others
Reset Button         1 × RST
LED Indicators       1 × SYS, 1 × LoRa, 1 × LTE
Built-in             Watchdog, RTC, Timer
Environmental
Operating            -40°C to +70°C (-40°F to +158°F)
Temperature          Reduced cellular performance above 60°C
Storage
                     -40°C to +85°C (-40°F to +185°F)
Temperature
Ethernet Isolation   1.5 kV RMS
Relative Humidity    0% to 95% (non-condensing) at 25°C/77°F
                                                               10
Chapter 2 Access to Web GUI
This chapter explains how to access to Web GUI of the UG67.
Username: admin
Password: password
     If you enter the username or password incorrectly more than 5 times, the login page
     will be locked for 10 minutes.
4. After logging the web GUI, follow the guide to complete the basic configurations. You
can also skip the instructions. It’s suggested that you change the password for the sake of
security.
                                                                                       11
5. You can view system information and perform configuration of the gateway.
                                                                                  12
3. Open a Web browser on your PC (Chrome is recommended) and type in the IP address
192.168.23.150 to access the web GUI.
4. Enter the username and password, click “Login”.
     If you enter the username or password incorrectly more than 5 times, the login page
     will be locked for 10 minutes.
5. After logging the web GUI, follow the guide to complete the basic configurations. You
can also skip the instructions. It’s suggested that you change the password for the sake of
security.
                                                                                       13
6. After guide complete, you can view system information and perform configuration of
the gateway.
                                                                                 14
Chapter 3 Web Configuration
3.1 Status
3.1.1 Overview
You can view the system information of the gateway on this page.
Figure 3-1-1-1
                                     System Information
Item                          Description
Model                         Show the model name of gateway.
Region                        Show the LoRaWAN® frequency region of gateway.
Serial Number                 Show the serial number of gateway.
Firmware Version              Show the currently firmware version of gateway.
Hardware Version              Show the currently hardware version of gateway.
Local Time                    Show the currently local time of system.
                              Show the information on how long the gateway has been
Uptime
                              running.
CPU Load                      Show the current CPU utilization of the gateway.
RAM (Capacity/Available)      Show the RAM capacity and the available RAM memory.
eMMC (Capacity/Available)     Show the eMMC capacity and the available eMMC memory.
GPS                           Show GPS data of the gateway.
                              Table 3-1-1-1 System Information
                                                                                      15
3.1.2 Cellular
You can view the cellular network status of gateway on this page.
                                       Figure 3-1-2-1
 Modem Information
 Item              Description
 Status            Show corresponding detection status of module and SIM card.
 Model             Show the model name of cellular module.
 Version           Show the version of cellular module.
 Signal Level      Show the cellular signal level.
 Register Status   Show the registration status of SIM card.
 IMEI              Show the IMEI of the module.
 IMSI              Show IMSI of the SIM card.
 ICCID             Show ICCID of the SIM card.
 ISP               Show the network provider which the SIM card registers on.
 Network Type      Show the connected network type, such as LTE, 3G, etc.
 PLMN ID           Show the current PLMN ID, including MCC, MNC, LAC and Cell ID.
 LAC               Show the location area code of the SIM card.
 Cell ID           Show the Cell ID of the SIM card location.
                         Table 3-1-2-1 Modem Information
                                                                                    16
                                Figure 3-1-2-2
Network Status
Item                   Description
Status                 Show the connection status of cellular network.
IP Address             Show the IP address of cellular network.
Netmask                Show the netmask of cellular network.
Gateway                Show the gateway of cellular network.
DNS                    Show the DNS of cellular network.
                       Show information on how long the cellular network has been
Connection Duration
                       connected.
                                Table 3-1-2-2 Network Status
3.1.3 Network
On this page you can check the Ethernet port status of the gateway.
Figure 3-1-3-1
  Network
  Item           Description
  Port           Show the name of the Ethernet port.
                 Show the status of the Ethernet port. "Up" refers to a status that WAN
  Status         is enabled and Ethernet cable is connected. "Down" means Ethernet
                 cable is disconnected or WAN function is disabled.
  Type           Show the dial-up type of the Ethernet port.
  IP Address     Show the IP address of the Ethernet port.
  Netmask        Show the netmask of the Ethernet port.
                                                                                          17
   Gateway        Show the gateway of the Ethernet port.
   DNS            Show the DNS of the Ethernet port.
                  Show the information about how long the Ethernet cable has been
   Duration       connected to the Ethernet port when the port is enabled. Once the port
                  is disabled or Ethernet cable is disconnected, the duration will stop.
                                    Table 3-1-3-1 WAN Status
 3.1.4 WLAN
 You can check Wi-Fi status on this page, including the information of access point and
 client.
Figure 3-1-4-1
WLAN Status
Item                  Description
Wireless Status       Show the wireless status.
MAC Address           Show the MAC address.
Interface Type        Show the interface type, such as "AP" or “Client".
SSID                  Show the SSID.
Channel               Show the wireless channel.
Encryption Type       Show the encryption type.
Status                Show the connection status.
IP Address            Show the IP address of the gateway.
Netmask               Show the wireless MAC address of the gateway.
Gateway               Show the gateway address in wireless network.
Connection Duration   Show information on how long the Wi-Fi network has been connected.
                                    Table 3-1-4-1 WLAN Status
                                                                                           18
                                   Figure 3-1-4-2
 Associated Stations
 Item                    Description
 IP Address              Show the IP address of access point or client.
 MAC Address             Show the MAC address of the access point or client.
                         Show information on how long the Wi-Fi network has been
 Connection Duration
                         connected.
                             Table 3-1-4-2 WLAN Status
3.1.5 VPN
You can check VPN status on this page, including PPTP, L2TP, IPsec, OpenVPN and
DMVPN.
Figure 3-1-5-1
                                                                                   19
                                         Figure 3-1-5-2
Figure 3-1-5-3
VPN Status
Item                      Description
Name                      Show the name of the VPN tunnel.
Status                    Show the status of the VPN tunnel.
Local IP                  Show the local tunnel IP of VPN tunnel.
Remote IP                 Show the remote tunnel IP of VPN tunnel.
                                 Table 3-1-5-1 VPN Status
Figure 3-1-6-1
Host List
Item                       Description
DHCP Leases
IP Address                 Show IP address of DHCP client
MAC Address                Show MAC address of DHCP client
Lease Time Remaining       Show the remaining lease time of DHCP client.
MAC Binding
IP & MAC                   Show the IP address and MAC address set in the Static IP
                                                                                      20
                          list of DHCP service.
                             Table 3-1-6-1 Host List Description
3.2 LoRaWAN
3.2.1.1 General
Figure 3-2-1-1
 General Settings
 Item               Description                                    Default
                                                                   Generated from MAC
 Gateway EUI        Show the identifier of the gateway.            address of the
                                                                   gateway and cannot
                                                                                 21
                                                                       be changed.
                     Fill in the corresponding ID which you’ve used
                     for register gateway on the remote network        The same as
 Gateway ID
                     server, such as TTN. It is usually the same as    gateway EUI.
                     gateway EUI and can be changed.
                     Sync frequency configurations from network
 Frequency-Sync                                                        Disabled
                     server by selecting the corresponding ID.
                     The gateway will forward the data to the
 Multi-Destination   network server address that was created and       Local host
                     enabled in the list.
 Connection          Show the connection status of package
                                                                       ----
 Status              forwarder.
                            Table 3-2-1-1 General Setting Parameters
3.2.1.2 Radios
Figure 3-2-1-2
Figure 3-2-1-3
                                                                                       22
            Choose the LoRaWAN® frequency plan used for the
            upstream and downlink frequencies and datarates. Based on the
Region
            Available channel plans depend on the gateway’s gateway’s model
            model.
                                                                           Based on what is
                                                                           specified in the
Center      Radio 0 : supports transmitting and receiving packet.          LoRaWAN®
Frequency   Radio 1 : only supports receiving packet from nodes.           regional
                                                                           parameters
                                                                           document
                     Table 3-2-1-2 Radio Channels Setting Parameters
Figure 3-2-1-4
Figure 3-2-1-5
                                                                                           23
                    Range: center frequency±0.9.                         supported
                                                                         frequency
                    Enter the bandwidth of this channel.
 Bandwidth/MHz      Recommended value: 125KHz, 250KHz,                   500KHz
                    500KHz
                                                                Based on what is
                    Choose the selectable spreading factor. The
                                                                specified in the
                    channel with large spreading factor
 Spread Factor                                                  LoRaWAN® regional
                    corresponds to a low rate, while the small
                                                                parameters
                    one corresponds to a high rate.
                                                                document
                         Table 3-2-1-4 LoRa Channel Setting Parameters
Figure 3-2-1-6
                                                                                        24
                                       Figure 3-2-1-7
Noise Analyzer
Item             Description                                             Default
Enable           Click to enable noise analyzer feature.                 Disabled
                 Select the frequency sweeping range.
                 General Freq: frequencies based on the LoRaWAN®
Sweep Freq                                                               General Feq
                 regional parameters document
                 Custom: custom the frequency range
                 Enable the noise analyzer continuously or within a
                 period of time.
                 If Custom is selected, the noise analyzer will stop
Sweep Time       automatically after the pre-configured time.            Custom/24h
                 Note: It’s suggested to custom the time since noise
                 analyzer feature will affect the normal data
                 transmission.
                       Table 3-2-1-6 Noise Analyzer Setting Parameters
                                                                                       25
3.2.1.4 Advanced
Figure 3-2-1-8
 Advanced-Beacon Setting
 Item              Description                                      Default
                   Interval of gateway sending beacons for Class B
 Beacon Period     device time synchronization. 0 means the gateway 0
                   will not send beacons.
                                                                    Based on
                                                                    the
 Beacon Freq       The frequency of beacons.
                                                                    supported
                                                                    frequency
                                                                    Based on
 Beacon                                                             the
                   The datarate of beacons.
 Datarate                                                           supported
                                                                    frequency
 Beacon Channel    When selecting Custom, it allows users to custom
                                                                    1
 Number            range from 1 to 8.
 Beacon Freq
                   Frequency interval of beacons.                   200000
 Step
 Beacon
                   The bandwidth of beacons. Unit: Hz               12500 Hz
 Bandwidth
 Beacon TX
                   The TX power of beacons.                         14
 Power
                         Table 3-2-1-7 Advanced-Beacon Parameters
                                                                                26
                                    Figure 3-2-1-9
                                                                                 27
3.2.1.5 Custom
                                   Figure 3-2-1-10
When Custom Configuration mode is enabled, you can write your own packet forwarder
configuration file in the edit box to configure packet forwarder. Click “Save” to save your
custom configuration file content, and click “Apply” to take effect. You can click “Clear” to
erase all content in the edit box. If you don’t know how to write configuration file, please
click “Example” to go to reference page.
3.2.1.6 Traffic
When navigating to the traffic page, any recent traffic received by the gateway will display.
To watch live traffic, click Refresh.
Figure 3-2-1-11
                                                                                         28
 Item                  Description
 Refresh               Click to obtain the latest data.
 Clear                 Click to clear all data.
 Rfch                  Show the channel of this packet.
 Direction             Show the direction of this packet.
 Time                  Show the receiving time of this packet.
 Ticks                 Show the ticks of this packet.
 Frequency             Show the frequency of the channel.
 Datarate              Show the datarate of the channel.
 Coderate              Show the coderate of this packet.
 RSSI                  Show the received signal strength.
 SNR                   Show the signal to noise ratio of this packet.
                         Table 3-2-1-9 Traffic Parameters
3.2.2.1 General
Figure 3-2-2-1
                                                                        29
Item              Description                                          Default
General Setting
Enable            Click to enable Network Server mode.                 Enabled
                  Enabled to connect gateway to Milesight IoT
Cloud Mode                                                    Disabled
                  Cloud or Yeastar Workplace platform.
NetID             Enter the network identifier.                        010203
                  Enter the interval time between when the
                  end-device sends a Join_request_message to
Join Delay        network server and when the end-device prepares 5
                  to open RX1 to receive the Join_accept_message
                  sent from network server.
                  Enter the interval time between when the
                  end-device sends uplink packets and when the
RX1 Delay                                                              1
                  end-device prepares to open RX1 to receive the
                  downlink packet.
                  Enter the amount of time till a successful join
                  expires. The format is hours-minutes-seconds. If
Lease Time        the join-type is OTAA, then the end-devices need 876000-00-00
                  to join the network server again when it exceeds
                  the lease time.
Log level         Choose the log level.                                Info
Channel Plan Setting
                  Choose LoRaWAN® channel plan used for the
                                                                       Depend on the
                  upstream and downlink frequencies and
Channel Plan                                                           gateway’s
                  datarates. Available channel plans depend on the
                                                                       frequency
                  gateway’s model.
                  Enabled frequencies are controlled using channel
                  mask.
                  Leave it blank means using all the default
                  standard usable channels specified in the
                  LoRaWAN® regional parameters document.
                                                                                       30
                                 Table 3-2-2-1 General Parameters
Note: For some regional variants, if allowed by your LoRaWAN® region, you can use
Additional Plan to configure additional channels undefined by the LoRaWAN® Regional
Parameters, like EU868 and KR920, as the following picture shows:
Figure 3-2-2-2
 Additional Channels
 Item                 Description                                       Default
 Frequency/MHz        Enter the frequency of the additional plan.       Null.
                      Enter the max datarate for the end-device.
                      The range is based on what is specified in
 Max Datarate                                                    DR0(SF12,125kHz)
                      the LoRaWAN® regional parameters
                       document.
                      Enter the min datarate for the end-device.
                      The range is based on what is specified in
 Min Datarate                                                    DR3(SF9,125kHz)
                      the    LoRaWAN®     regional   parameters
                      document.
                             Table 3-2-2-2 Additional Plan Parameters
3.2.2.2 Application
An application is a collection of devices with the same purpose/of the same type. All
devices with the same “Payload Codec” and data transmission destination can be added
under the same application.
You can edit the application by clicking or create a new application by clicking .
Figure 3-2-2-3
                                                                                           31
Item            Description
                Enter the name of the application profile.
Name
                E.g Smoker-sensor-app.
                Enter the description of this application.
Description
                E.g a application for smoker sensor.
                Select from: “None”, “Cayenne LPP”, “Custom”.
                None: This mode enables devices not to encode data.
                Cayenne LPP: This mode enables devices to encode data with the
Payload Codec
                Cayenne Low Power Payload (LPP).
                Custom: This mode enables devices to encode data with the decoder
                function and the encoder function which you have entered the code.
Data            Data will be sent to your custom server using the MQTT,HTTP or
Transmission    HTTPS protocol.
                         Table 3-2-2-3 Application Parameters
Figure 3-2-2-4
                                                                                 32
                                    Figure 3-2-2-5
MQTT Settings
Item          Description                                                        Default
General
Broker
              MQTT broker address to receive data.                               --
Address
Broker Port   MQTT broker port to receive data.                                  --
              Client ID is the unique identity of the client to the server.
Client ID     It must be unique when all clients are connected to the same       --
              server, and it is the key to handle message at QoS 1 and 2.
              If the client does not get a response after the connection
Connection
              timeout, the connection will be considered as broken. The          30
Timeout/s
              Range: 1-65535
              After the client is connected with the server, the client will
Keep Alive
              send heartbeat packet to the server regularly to keep alive.       60
Interval/s
              Range: 1-65535
User Credentials
Enable        Enable user credentials.
Username      The username used for connecting to MQTT broker.
Password      The password used for connecting to MQTT broker.
TLS
Enable        Enable the TLS encryption in MQTT communication.
              Select from “Self signed certificates”, “CA signed server certificate”.
              CA signed server certificate:verify with the certificate issued by
Mode          Certificate Authority (CA) that pre-loaded on device.
              Self signed certificates: upload the custom CA certificates, client
              certificates and secret key for verification.
                                                                                           33
Topic
Data Type      Data type sent to MQTT broker.
Topic          Topic name of the data type using for publish.
               QoS 0 – Only Once
               This is the fastest method and requires only 1 message. It is also the
               most unreliable transfer mode.
               QoS 1 – At Least Once
               This level guarantees that the message will be delivered at least once,
QoS
               but may be delivered more than once.
               QoS 2 – Exactly Once
               QoS 2 is the highest level of service in MQTT. This level guarantees that
               each message is received only once by the intended recipients. QoS 2 is
               the safest and slowest quality of service level.
                           Table 3-2-2-4 MQTT Settings Parameters
Figure 3-2-2-6
HTTP/HTTPS Settings
Item             Description
HTTP Header
Header Name      A core set of fields in HTTP header.
Header Value     Value of the HTTP header.
URL
Data Type        Data type sent to HTTP/HTTPS server.
Topic            Topic name of the data type using for publish.
URL              HTTP/HTTPS server URL to receive data.
                       Table 3-2-2-5 HTTP/HTTPS Settings Parameters
                                                                                       34
Related Configuration Example
Application configuration
3.2.2.3 Profiles
A Profile defines the device capabilities and boot parameters that are needed by the Netwo
rk Server for setting the LoRaWAN® radio access service. These information elements shall
 be provided by the end-device manufacturer.
You can edit the device profile by clicking or create a new device profile by clicking
Figure 3-2-2-7
Figure 3-2-2-8
                                                                                             35
               For over-the-air activation, end-devices must follow a join
               procedure prior to participating in
               data exchanges with the network server. An end-device
               has to go through a new join
               procedure every time as it has lost the session context
               information.
Figure 3-2-2-9
                                                                                  36
 Frequency         receive-window.
                   List of factory-preset frequencies. The range is
 Frequency List    based on what is specified in the LoRaWAN® Null
                   regional parameters document.
 PingSlot Period   Period of opening the pingslot.                             Every Second
                                                                               Based on the
 PingSlot
                   Datarate of the node receiving downlinks.                   supported
 DataRate
                                                                               frequency
                                                                               Based on the
 PingSlot Freq     Frequency of the node receiving downlinks.                  supported
                                                                               frequency
                   The time for confirmed downlink transmissions.
                                                                               Class B: 10
 ACK Timeout       This option is only applicable to class B and class
                                                                               Class C: 0
                   C.
                   Table 3-2-2-7 Device Profiles Advanced Setting Parameters
3.2.2.4 Device
A device is the end-device connecting to, and communicating over the LoRaWAN® network.
Figure 3-2-2-10
 Item                        Description
 Add                         Add a device.
 Bulk Import                 Download template and import multiple devices.
 Delete All                  Delete all devices in the list.
 Device Name                 Show the name of the device.
 Device EUI                  Show the EUI of the device.
 Device-Profile              Show the name of the device’s device profile.
 Application                 Show the name of the device’s application.
 Last Seen                   Show the time of last packet received.
                                                                                              37
                                  Figure 3-2-2-11
Device Configuration
Item             Description                                        Default
Device Name      Enter the name of this device.                     Null
Description      Enter the description of this device.              Null
Device EUI       Enter the EUI of this device.                      Null
Device-Profile   Choose the device profile.                         Null
Application      Choose the application profile.                    Null
                 Choose from: "Disable", "Modbus RTU to TCP",
                 "Modbus RTU over TCP". This feature is only
                 applicable to Milesight class C type LoRaWAN®
Modbus RTU
                 controllers.(UC501/UC1152, etc.)
Data                                                                Disable
                 -Modbus RTU to TCP: TCP client can send Modbus
Transmission
                 TCP commands to ask for controller Modbus data.
                 -Modbus RTU over TCP: TCP client can send Modbus
                 RTU commands to ask for controller Modbus data.
                 Enter the LoRaWAN® frame port for transparent
Fport            transmission between Milesight LoRaWAN®            Null
                 controllers and UG67.
                                                                              38
                   Range: 2-84, 86-223.
                   Note: this value must be the same as the Milesight
                   LoRaWAN® controller’s Fport.
                   Enter the TCP port for data transmission between the
 TCP Port          TCP Client and UG67 (as TCP Server).                      Null
                   Range: 1-65535.
                   If disable the frame-counter validation, it will
 Frame-Counter
                   compromise security as it enables people to perform       Enabled
 Validation
                   replay-attacks.
                   Whenever an end-device joins a network via
 Application Key   over-the-air activation, the application key is used for Null
                   derive the Application Session key.
                   The device address identifies the end-device within
 Device Address                                                              Null
                   the current network.
                   The network session key specific for the end-device. It
 Network           is used by the end-device to calculate the MIC or part
                                                                             Null
 Session Key       of the MIC (message integrity code) of all uplink data
                   messages to ensure data integrity.
                   The AppSKey is an application session key specific for
 Application       the end-device. It is used by both the application
                                                                             Null
 Session Key       server and the end-device to encrypt and decrypt the
                   payload field of application-specific data messages.
                   The number of data frames which sent uplink to the
                   network server. It will be incremented by the
                   end-device and received by the end-device.
 Uplink
                   Users can reset the a personalized end-device             Null
 Frame-counter
                   manually, then the frame counters on the end-device
                   and the frame counters on the network server for that
                   end-device will be reset to 0.
                   The number of data frames which received by the
                   end-device downlink from the network server. It will be
                   incremented by the network server.
 Downlink
                   Users can reset the a personalized end-device             Null
 Frame-counter
                   manually, then the frame counters on the end-device
                   and the frame counters on the network server for that
                   end-device will be reset to 0.
                           Table 3-2-2-9 Device Setting Parameters
                                                                                       39
3.2.2.5 Multicast Groups
Milesight gateways support for creating Class B or Class C multicast groups to send
downlink messages to a group of end devices. A multicast group is a virtual ABP device (i.e.
shared session keys), does not support uplink, confirmed downlink nor MAC commands.
Figure 3-2-2-12
 Item                         Description
 Add                          Add a multicast group.
 Group Name                   Show the name of the group.
 Number of Devices            Show the device number of the group.
 Operation                    Edit or delete the multicast group.
                           Table 3-2-2-10 Multicast Group Parameters
Figure 3-2-2-13
                                                                                        40
 Address
 Multicast
               The network session key (Netwks Key) of all devices in
 Network                                                                    Null
               this group.
 Session Key
 Multicast
               The application session key(AppSKey) of all devices in
 Application                                                                Null
               this group.
 Session Key
 Class Type    Class B and Class C are optional.                            Class C
                                                                            Based on the
 Datarate      Datarate of the node receiving downlinks                     supported
                                                                            frequency
                                                                            Based on the
 Frequency     Downlink frequency of all devices in this group.             supported
                                                                            frequency
               The number of data frames which received by the
 Frame-count
               end-device downlink from the network server. It will be      0
 er
               incremented by the network server.
 Ping Slot     Period of opening the pingslot. This is only applied to Every          4
 Periodicity   Class B end devices.                                    second
 Selected
               Show all device names in this group.                         Null
 Devices
 Add Device    Add devices in the pull-down list.                           Null
                        Table 3-2-2-11 Multicast Group Setting Parameters
Figure 3-2-2-14
 Item                        Description
 Gateway ID                  Show the gateway ID.
 Name                        Show the name of the gateway.
 Status                      Show the connection status of the gateway.
 Last Seen                   Show the time of last packet received.
 Operation                   Edit or delete the gateway.
                            Table 3-2-2-12 Gateway Fleet Parameters
                                                                                           41
                                    Figure 3-2-2-15
 Item             Description
 Gateway ID       Enter the unique gateway ID to recognize the gateway.
 Name             Enter the name of this gateway.
                  GPS data of the gateway can be edited here. If gateway sends GPS
 Location
                  data it will replace your customized data.
                          Table 3-2-2-13 Gateway Setting Parameters
3.2.2.7 Packets
Figure 3-2-2-16
                                                                                     42
  Send Data To Device/Multicast Group
  Item           Description                                                  Default
                 Enter the EUI of the device to receive
  Device EUI                                                                  Null
                 the payload.
  Multicast      Select the multicast group to send downlinks. Multicast
                                                                         Null
  Group          groups can be added under Multicast Groups tab.
                 Choose from: “ASCII”, “hex”, “base64”.
  Type                                                                        ASCII
                 Choose the payload type to enter in the payload Input box.
  Payload        Enter the message to be sent to this device.                 Null
                 Enter the LoRaWAN frame port for packet transmission
                                      ®
  Port                                                                        Null
                 between device and Network Server.
                 After enabled, the end device will receive downlink packet
  Confirmed      and should answer “confirmed” to the network server.         Disabled
                 Multicast feature does not support confirmed downlink.
                          Table 3-2-2-14 Send Data to Device Parameters
 Network Server
 Item                   Description
 Device EUI/Group       Show the EUI of the device or multicast group.
 Frequency              Show the used frequency to transmit packets.
 Datarate               Show the used datarate to transmit packets.
 SNR                    Show the signal-noise ratio.
 RSSI                   Show the received signal strength indicator.
 Size                   Show the size of payload.
 Fcnt                   Show the frame counter.
                        Show the type of the packet:
                        JnAcc - Join Accept Packet
                        JnReq - Join Request Packet
                        UpUnc - Uplink Unconfirmed Packet
 Type                   UpCnf - Uplink Confirmed Packet - ACK response from network
                        requested
                        DnUnc - Downlink Unconfirmed Packet
                        DnCnf - Downlink Confirmed Packet- ACK response from
                        end-device requested
 Time                   Show the time of packet was sent or received.
                                Table 3-2-2-15 Packet Parameters
                                                                                        43
                                     Figure 3-2-2-17
Item             Description
Dev
Addr/Multicast   Show the address of the device/multicast group.
Addr
GwEUI            Show the EUI of the gateway.
AppEUI           Show the EUI of the application.
DevEUI/Group
                 Show the EUI of the device/multicast group name.
Name
Class Type       Show the class type of the device or multicast group.
                 True: Device may transmit an explicit (possibly empty)
Immediately      acknowledgement data message immediately after the reception of a
                 data message requiring a confirmation.
Timestamp        Show the timestamp of this packet.
                 Show the type of the packet:
                 JnAcc - Join Accept Packet
                 JnReq - Join Request Packet
                 UpUnc - Uplink Unconfirmed Packet
Type             UpCnf - Uplink Confirmed Packet - ACK response from network
                 requested
                 DnUnc - Downlink Unconfirmed Packet
                 DnCnf - Downlink Confirmed Packet- ACK response from end-device
                 requested
                 True: The end-node has enabled ADR.
Adr
                 False: The end-node has not enabled ADR.
                 In order to validate that the network is receiving the uplink messages,
                 nodes periodically transmit ADRACKReq message. This is 1 bit long.
AdrAcKReq
                 True: Network should respond in ADR_ACK_DELAY time to confirm that
                 it is receiving the uplink messages.
                                                                                      44
                   False: ADR is disabled or Network does not respond in
                   ADR_ACK_DELAY.
                   True: This frame is ACK.
Ack
                   False: This frame is not ACK.
                   Show the frame-counter of this packet.The network server tracks the
Fcnt               uplink frame counter and generates the
                   downlink counter for each end-device.
                   FPort is a multiplexing port field. If the frame payload field is not
                   empty, the port field must be present. If present, a FPort
FPort              16 value of 0 indicates that the FRMPayload contains MAC commands
                   only.When this is the case, the FOptsLen field must be zero. FOptsLen
                   is the length of the FOpts field in bytes.
Modulation         LoRa means the physical layer uses the LoRa modulation.
Bandwidth          Show the bandwidth of this channel.
SpreadFactor       Show the spreadFactor of this channel.
Bitrate            Show the bitrate of this channel.
CodeRate           Show the coderate of this channel.
SNR                Show the SNR of this channel.
RSSI               Show the RSSI of this channel.
Power              Show the transmit power of the device.
Payload (b64)      Show the application payload of this packet.
Payload (hex)      Show the application payload of this packet.
                   Show the MIC of this packet. MIC is a cryptographic message integrity
MIC                code, computed over the fields MHDR, FHDR, FPort and the encrypted
                   FRMPayload.
                           Table 3-2-2-16 Packets Details Parameters
Related Topic
3.3 Network
3.3.1 Interface
3.3.1.1 Port
The Ethernet port can be connected with Ethernet cable to get Internet access. It supports
3 connection types.
- Static IP: configure IP address, netmask and gateway for Ethernet WAN interface.
- DHCP Client: configure Ethernet WAN interface as DHCP Client to obtain IP address
automatically.
- PPPoE: configure Ethernet WAN interface as PPPoE Client.
                                                                                         45
                                           Figure 3-3-1-1
  Port Setting
  Item                Description                                           Default
  Port                The port that is fixed as eth0 port and enabled.      eth 0
  Connection
                      Select from "Static IP", "DHCP Client" and "PPPoE".   Static IP
  Type
  MTU                 Set the maximum transmission unit.                    1500
  Primary DNS
                      Set the primary DNS.                                  8.8.8.8
  Server
  Secondary DNS                                                             114.114.114.1
                      Set the secondary DNS.
  Server                                                                    14
                      Enable or disable NAT function. When enabled, a
  Enable NAT                                                                Enable
                      private IP can be translated to a public IP.
                                    Table 3-3-1-1 Port Parameters
1. Static IP Configuration
If the external network assigns a fixed IP for the Ethernet port, user can select “Static IP”
mode.
                                                                                            46
                                         Figure 3-3-1-2
  Static IP
  Item           Description                                         Default
  IP Address     Set the IP address which can access Internet.       192.168.23.150
  Netmask        Set the Netmask for Ethernet port.                  255.255.255.0
  Gateway        Set the gateway's IP address for Ethernet port.     192.168.23.1
  Multiple IP
                 Set the multiple IP addresses for Ethernet port.    Null
  Address
                               Table 3-3-1-2 Static IP Parameters
2. DHCP Client
If the external network has DHCP server enabled and has assigned IP addresses to the
Ethernet WAN interface, user can select “DHCP client” mode to obtain IP address
automatically.
                                                                                       47
                                        Figure 3-3-1-3
  DHCP Client
  Item                      Description
                            Obtain peer DNS automatically during PPP dialing. DNS is
  Use Peer DNS
                            necessary when user visits domain name.
                             Table 3-3-1-3 DHCP Client Parameters
3. PPPoE
PPPoE refers to a point to point protocol over Ethernet. User has to install a PPPoE client
on the basis of original connection way. With PPPoE, remote access devices can get
control of each user.
Figure 3-3-1-4
 PPPoE
 Item               Description
 Username           Enter the username provided by your Internet Service Provider (ISP).
 Password           Enter the password provided by your Internet Service Provider (ISP).
 Link Detection
                    Set the heartbeat interval for link detection. Range: 1-600.
 Interval (s)
 Max Retries        Set the maximum retry times after it fails to dial up. Range: 0-9.
                    Obtain peer DNS automatically during PPP dialing. DNS is necessary
 Use Peer DNS
                    when user visits domain name.
                                Table 3-3-1-4 PPPOE Parameters
3.3.1.2 WLAN
This section explains how to set the related parameters for Wi-Fi network. UG67 supports
                                                                                           48
                              Figure 3-3-1-5
Figure 3-3-1-6
WLAN Settings
Item            Description
Enable          Enable/disable WLAN.
                                               49
Work Mode           Select gateway's work mode. The options are "Client" or "AP".
                    Fill in the MAC address of the access point. Either SSID or BSSID
BSSID
                    can be filled to joint the network.
SSID                Fill in the SSID of the access point.
Client Mode
Scan                Click "Scan" button to search the nearby access point.
                    Select encryption mode. The options are “No Encryption", “WEP
                    Open System" , “WEP Shared Key", “WPA-PSK", “WPA2-PSK" ,
Encryption Mode
                    “WPA-PSK/WPA2-PSK", “WPA-Enterprise”, “WPA2-Enterprise”and
                    “WPA-Enterprise/WPA2-Enterprise”.
                    Select cipher. The options are “Auto", “AES", “TKIP" and
Cipher
                    “AES/TKIP".
Key                 Fill the pre-shared key of WEP/WPA encryption.
XSupplicant Type    Select from “Peap”, “Leap”, “TLS” and “TTLS”.
User                Fill the user of WPA/WPA2-Enterprise.
Anonymous
                    Fill the anonymous identity of WPA/WPA2-Enterprise.
Identity
Phase2              Fill the phase2 of WPA/WPA2-Enterprise.
Public Server       The public server certificate used for verifying with
Certificate         WPA/WPA2-Enterprise access point.
AP Mode
                    When SSID broadcast is disabled, other wireless devices can't not
SSID Broadcast      find the SSID, and users have to enter the SSID manually to
                    access to the wireless network.
                    When AP isolation is enabled, all users which access to the AP
AP Isolation
                    are isolated without communication with each other.
                    Select Radio type. The options are “802.11b (2.4 GHz)", “802.11g
Radio Type
                    (2.4 GHz)", “802.11n (2.4 GHz)””.
Channel             Select wireless channel. The options are "Auto", "1", "2"......"11".
                    Select encryption mode. The options are “No Encryption", “WEP
Encryption Mode     Open System" , “WEP Shared Key", “WPA-PSK", “WPA2-PSK" and
                    “WPA-PSK/WPA2-PSK".
                    Select cipher. The options are “Auto", “AES", “TKIP" and
Cipher
                    “AES/TKIP".
Key                 Fill the pre-shared key of WPA encryption.
Bandwidth           Select bandwidth. The options are "20MHz" and "40MHz".
                    Set the maximum number of client to access when the gateway
Max Client Number
                    is configured as AP.
IP Setting
Protocol            Set the protocol in wireless network.
IP Address          Set the IP address in wireless network.
Netmask             Set the netmask in wireless network.
Gateway             Set the gateway in wireless network.
                                                                                           50
                                Table 3-3-1-5 WLAN Parameters
Figure 3-3-1-7
 Client Mode-Scan
 SSID                  Show SSID.
 Channel               Show wireless channel.
 Signal                Show wireless signal.
 BSSID                 Show the MAC address of the access point.
 Security              Show the encryption mode.
Related Topic
3.3.1.3 Cellular
This section explains how to set the related parameters for cellular network.
Figure 3-3-1-8
                                                                                51
                                       Figure 3-3-1-9
General Settings
Item               Description                                               Default
                   Check the option to enable the corresponding SIM
Enable                                                                       Enable
                   card.
                   Select from "Auto”, "Auto 3G/4G”, "4G Only" and "3G
                   Only".
                   Auto: connect to the network with the strongest signal
Network Type                                                                 Auto
                   automatically.
                   4G Only: connect to 4G network only.
                   And so on.
                   Enter the Access Point Name for cellular dial-up
APN                                                                          Null
                   connection provided by local ISP.
                   Enter the username for cellular dial-up connection
Username                                                                     Null
                   provided by local ISP.
                   Enter the password for cellular dial-up connection
Password                                                                     Null
                   provided by local ISP.
                   Enter the dial-up center NO. For cellular dial-up
Access Number                                                                Null
                   connection provided by local ISP.
PIN Code           Enter a 4-8 characters PIN code to unlock the SIM.        Null
Authentication     Select from "Auto", "PAP", "CHAP", "MS-CHAP", and
                                                                             Auto
Type               "MS-CHAPv2".
                                                                                        52
Secondary ICMP                                                                   114.114.11
                      Set the secondary ICMP detection server's IP address.
Server                                                                           4.114
ICMP Detection
                      Set max number of retries when ICMP detection fails.       3
Max Retries
ICMP Detection
                      Set timeout of ICMP detection.                             5
Timeout
ICMP Detection
                      Set interval of ICMP detection.                            15
Interval
SMS Mode              Select SMS mode from “TEXT” and “PDU”.                     PDU
                                 Table 3-3-1-7 Cellular Parameters
Figure 3-3-1-10
 Item                   Description
 Connection Mode
 Connection Mode        Select from "Always Online" and "Connect on Demand".
 Redial Interval(s)     Set the time interval between redials. Range: 0-3600.
                        Set the maximum duration of the gateway when current link is
 Max Idle Time(s)
                        under idle status. Range: 10-3600.
                        The gateway will switch from offline mode to cellular network
 Triggered by Call      mode automatically when it receives a call from the specific
                        phone number.
                        Select a call group for call trigger. Go to "System > General
 Call Group
                        Settings > Phone" to set up phone group.
                        The gateway will switch from offline mode to cellular network
 Triggered by SMS       mode automatically when it receives a specific SMS from the
                        specific mobile phone.
                        Select a SMS group for trigger. Go to "System > General
 SMS Group
                        Settings > Phone" to set up SMS group.
 SMS Text               Fill in the SMS content for triggering.
                                 Table 3-3-1-8 Cellular Parameters
Related Topics
Cellular Connection Application Example
Phone Group
                                                                                          53
3.3.1.4 Loopback
Loopback interface is used for replacing gateway's ID as long as it is activated. When the
interface is DOWN, the ID of the gateway has to be selected again which leads to long
convergence time of OSPF. Therefore, Loopback interface is generally recommended as
the ID of the gateway.
Loopback interface is a logic and virtual interface on gateway. Under default conditions,
there's no loopback interface on gateway, but it can be created as required.
Figure 3-3-1-11
 Loopback
 Item            Description                                               Default
 IP Address      Unalterable                                               127.0.0.1
 Netmask         Unalterable                                               255.0.0.0
 Multiple IP     Apart from the IP above, user can configure other IP
                                                                           Null
 Addresses       addresses.
                               Table 3-3-1-9 Loopback Parameters
3.3.2 Firewall
This section describes how to set the firewall parameters, including website block, ACL,
DMZ, Port Mapping and MAC Binding.
The firewall implements corresponding control of data flow at entry direction (from
Internet to local area network) and exit direction (from local area network to Internet)
according to the content features of packets, such as protocol style, source/destination IP
address, etc. It ensures that the gateway operate in a safe environment and host in local
area network.
                                                                                       54
3.3.2.1 Security
Figure 3-3-2-1
 Website Blocking
 URL Address               Enter the HTTP address which you want to block.
                           You can block specific website by entering keyword. The
 Keyword
                           maximum number of character allowed is 64.
                               Table 3-2-2-1 Security Parameters
3.3.2.2 ACL
Access control list, also called ACL, implements permission or prohibition of access for
specified network traffic (such as the source IP address) by configuring a series of
matching rules so as to filter the network interface traffic. When gateway receives packet,
the field will be analyzed according to the ACL rule applied to the current interface. After
the special packet is identified, the permission or prohibition of corresponding packet will
be implemented according to preset strategy.
The data package matching rules defined by ACL can also be used by other functions
requiring flow distinction.
                                                                                        55
                                       Figure 3-3-2-2
Item                    Description
ACL Setting
                        Select from "Accept" and "Deny".
Default Filter Policy   The packets which are not included in the access control list will
                        be processed by the default filter policy.
Access Control List
Type                    Select type from "Extended" and "Standard".
ID                      User-defined ACL number. Range: 1-199.
Action                  Select from "Permit" and "Deny".
Protocol                Select protocol from "ip", "icmp", "tcp", "udp", and "1-255".
Source IP               Source network address (leaving it blank means all).
Source Wildcard
                        Wildcard mask of the source network address.
Mask
Destination IP          Destination network address (0.0.0.0 means all).
Destination Wildcard
                        Wildcard mask of destination address.
Mask
Description             Fill in a description for the groups with the same ID.
ICMP Type               Enter the type of ICMP packet. Range: 0-255.
ICMP Code               Enter the code of ICMP packet. Range: 0-255.
Source Port Type        Select source port type, such as specified port, port range, etc.
Source Port             Set source port number. Range: 1-65535.
Start Source Port       Set start source port number. Range: 1-65535.
End Source Port         Set end source port number. Range: 1-65535.
                                                                                            56
 Destination Port         Select destination port type, such as specified port, port range,
 Type                     etc.
 Destination Port         Set destination port number. Range: 1-65535.
 Start Destination
                          Set start destination port number. Range: 1-65535.
 Port
 End Destination Port     Set end destination port number. Range: 1-65535.
 More Details             Show information of the port.
 Interface List
 Interface                Select network interface for access control.
 In ACL                   Select a rule for incoming traffic from ACL ID.
 Out ACL                  Select a rule for outgoing traffic from ACL ID.
                                 Table 3-3-2-2 ACL Parameters
3.3.2.3 DMZ
DMZ is a host within the internal network that has all ports exposed, except those
forwarded ports in port mapping.
Figure 3-3-2-3
 DMZ
 Item                   Description
 Enable                 Enable or disable DMZ.
 DMZ Host               Enter the IP address of the DMZ host on the internal network.
                        Set the source IP address which can access to DMZ host.
 Source Address
                        "0.0.0.0/0" means any address.
                                 Table 3-3-2-3 DMZ Parameters
                                                                                              57
                                         Figure 3-3-2-4
Port Mapping
Item                   Description
                       Specify the host or network which can access local IP address.
Source IP
                       0.0.0.0/0 means all.
                       Enter the TCP or UDP port from which incoming packets are
Source Port
                       forwarded. Range: 1-65535.
                       Enter the IP address that packets are forwarded to after being
Destination IP
                       received on the incoming interface.
                       Enter the TCP or UDP port that packets are forwarded to after
Destination Port
                       being received on the incoming port(s). Range: 1-65535.
Protocol               Select from "TCP" and "UDP" as your application required.
Description            The description of this rule.
                             Table 3-3-2-4 Port Mapping Parameters
Figure 3-3-2-5
                                                                                        58
IP Address      Set the binding IP address.
                Fill in a description for convenience of recording the meaning of the
Description
                binding rule for each piece of MAC-IP.
                             Table 3-3-2-5 MAC Binding Parameters
3.3.3 DHCP
UG67 can be set as a DHCP server to distribute IP address when Wi-Fi work as AP mode.
Figure 3-3-3-1
 DHCP Server
 Item          Description                                              Default
 Enable        Enable or disable DHCP server.                           Enable
               Only wlan interface is allowed to distribute IP
 Interface                                                              wlan0
               addresses.
 Start         Define the beginning of the pool of IP addresses
                                                                        192.168.1.100
 Address       which will be leased to DHCP clients.
               Define the end of the pool of IP addresses which will
 End Address                                                            192.168.1.199
               be leased to DHCP clients.
               Define the subnet mask of IP address obtained by
 Netmask                                                                255.255.255.0
               DHCP clients from DHCP server.
 Lease Time    Set the lease time on which the client can use the IP
                                                                        1440
 (Min)         address obtained from DHCP server. Range: 1-10080.
 Primary       Set the primary DNS server.                              114.114.114.114
                                                                                        59
 DNS Server
 Secondary
                  Set the secondary DNS server.                             Null
 DNS Server
 Windows          Define the Windows Internet Naming Service obtained
 Name             by DHCP clients from DHCP sever. Generally you can        Null
 Server           leave it blank.
 Static IP
                  Set a static and specific MAC address for the DHCP
 MAC
                  client (it should be different from other MACs so as to   Null
 Address
                  avoid conflict).
                  Set a static and specific IP address for the DHCP
 IP Address                                                                 Null
                  client (it should be outside of the DHCP range).
                              Table 3-3-3-1 DHCP Server Parameters
3.3.4 DDNS
Dynamic DNS (DDNS) is a method that automatically updates a name server in the Domain
Name System, which allows user to alias a dynamic IP address to a static domain name.
DDNS serves as a client tool and needs to coordinate with DDNS server. Before starting
configuration, user shall register on a website of proper domain name provider and apply
for a domain name.
Figure 3-3-4-1
        DDNS
        Item                Description
        Name                Give the DDNS a descriptive name.
        Interface           Set interface bundled with the DDNS.
        Service Type        Select the DDNS service provider.
        Username            Enter the username for DDNS register.
        User ID             Enter User ID of the custom DDNS server.
        Password            Enter the password for DDNS register.
        Server              Enter the name of DDNS server.
        Hostname            Enter the hostname for DDNS.
        Append IP           Append your current IP to the DDNS server update path.
                                 Table 3-3-4-1 DDNS Parameters
                                                                                     60
3.3.5 Link Failover
This section describes how to configure link failover strategies, such as VRRP strategies.
Configuration Steps
1.    Define one or more SLA operations (ICMP probe).
2.    Define one or more track objects to track the status of SLA operation.
3.    Define applications associated with track objects, such as VRRP or static routing.
3.3.5.1 SLA
SLA setting is used for configuring link probe method. The default probe type is ICMP.
Figure 3-3-5-1
SLA
Item                   Description                                        Default
                       SLA index. Up to 10 SLA settings can be added.
ID                                                                        1
                       Range: 1-10.
                       ICMP-ECHO is the default type to detect if the
Type                                                                      icmp-echo
                       link is alive.
                                                                          114.114.114.11
Destination Address The detected IP address.
                                                                          4
Secondary
                    The secondary detected IP address.                    8.8.8.8
Destination Address
Data Size              User-defined data size. Range: 0-1000.             56
Interval (s)           User-defined detection interval. Range: 1-608400. 30
                       User-defined timeout for response to determine
Timeout (ms)                                                              5000
                       ICMP detection failure. Range: 1-300000.
                       Define packet loss count in each SLA probe. SLA
Packet Loss Count      probe fails when the preset packet loss count is 5
                       exceeded.
                       Detection start time; select from "Now" and blank
Start Time             character. Blank character means this SLA         now
                       detection doesn't start.
                                  Table 3-3-5-1 SLA Parameters
                                                                                           61
3.3.5.2 Track
Track setting is designed for achieving linkage among SLA module, Track module and
Application module. Track setting is located between application module and SLA module
with main function of shielding the differences of various SLA modules and providing
unified interfaces for application module.
Linkage between Track Module and SLA module
Once you complete the configuration, the linkage relationship between Track module and
SLA module will be established. SLA module is used for detection of link status, network
performance and notification of Track module. The detection results help track status
change timely.
- For successful detection, the corresponding track item is Positive.
- For failed detection, the corresponding track item is Negative.
Figure 3-3-5-2
                                                                                         62
                          When failure recovery occurs, it will wait according
                          to the time set here before actually changing its
  Positive Delay (s)                                                             1
                          status to Up. Range: 0-180 (0 refers to immediate
                          switching).
                                     Table 3-3-5-2 Track Parameters
Figure 3-3-5-3
WAN Failover
Parameters             Description                                                      Default
Main Interface         Select a link interface as the main link.                        --
Backup Interface       Select a link interface as the backup link.                      --
                       Set how long to wait for the startup tracking detection policy
Startup Delay (s)                                                                       30
                       to take effect. Range: 0-300.
                       When the primary interface switches from failed detection
Up Delay (s)           to successful detection, switching can be delayed based on       0
                       the set time. Range: 0-180 (0 refers to immediate switching)
                       When the primary interface switches from successful
                       detection to failed detection, switching can be delayed
Down Delay (s)                                                                          0
                       based on the set time. Range: 0-180 (0 refers to immediate
                       switching).
Track ID               Track detection, select the defined track ID.                    --
                                Table 3-3-5-3 WAN Failover Parameters
                                                                                             63
3.3.6 VPN
Virtual Private Networks, also called VPNs, are used to securely connect two private
networks together so that devices can connect from one network to the other network via
secure channels.
UG67 supports DMVPN, IPsec, GRE, L2TP, PPTP, OpenVPN, as well as GRE over IPsec and
L2TP over IPsec.
3.3.6.1 DMVPN
A dynamic multi-point virtual private network (DMVPN), combining mGRE and IPsec, is a
secure network that exchanges data between sites without passing traffic through an
organization's headquarter VPN server or gateway.
Figure 3-3-6-1
Figure 3-3-6-2
 DMVPN
 Item                    Description
 Enable                  Enable or disable DMVPN.
 Hub Address             The IP address or domain name of DMVPN Hub.
 Local IP address        DMVPN local tunnel IP address.
                                                                                   64
 GRE Hub IP Address       GRE Hub tunnel IP address.
 GRE Local IP Address     GRE local tunnel IP address.
 GRE Netmask              GRE local tunnel netmask.
 GRE Key                  GRE tunnel key.
 Negotiation Mode         Select from "Main" and "Aggressive".
 Authentication           Select from "DES", "3DES", "AES128", "AES192" and
 Algorithm                "AES256".
 Encryption Algorithm     Select from "MD5" and "SHA1".
                          Select from "MODP768_1", "MODP1024_2" and
 DH Group
                          "MODP1536_5".
 Key                      Enter the preshared key.
 Local ID Type            Select from "Default", "ID", "FQDN", and "User FQDN"
 IKE Life Time (s)        Set the lifetime in IKE negotiation. Range: 60-86400.
                          Select from "DES_MD5", "DES_SHA1", "3DES_MD5",
                          "3DES_SHA1", "AES128_MD5", "AES128_SHA1",
 SA Algorithm
                          "AES192_MD5", "AES192_SHA1", "AES256_MD5" and
                          "AES256_SHA1".
                          Select from "NULL", "MODP768_1", "MODP1024_2" and
 PFS Group
                          "MODP1536-5".
 Life Time (s)            Set the lifetime of IPsec SA. Range: 60-86400.
 DPD Interval Time (s)    Set DPD interval time
 DPD Timeout (s)          Set DPD timeout.
 Cisco Secret             Cisco Nhrp key.
 NHRP Holdtime (s)        The holdtime of Nhrp protocol.
                              Table 3-3-6-1 DMVPN Parameters
3.3.6.2 IPSec
IPsec is especially useful for implementing virtual private networks and for remote user
access through dial-up connection to private networks. A big advantage of IPsec is that
security arrangements can be handled without requiring changes to individual user
computers.
IPsec provides three choices of security service: Authentication Header (AH),
Encapsulating Security Payload (ESP), and Internet Key Exchange (IKE). AH essentially
allows authentication of the senders’ data. ESP supports both authentication of the sender
and data encryption. IKE is used for cipher code exchange. All of them can protect one and
more data flows between hosts, between host and gateway, and between gateways.
                                                                                      65
                                      Figure 3-3-6-3
IPsec
Item                    Description
Enable                  Enable IPsec tunnel. A maximum of 3 tunnels is allowed.
                        Enter the IP address or domain name of remote IPsec
IPsec Gateway Address
                        server.
IPsec Mode              Select from "Tunnel" and "Transport".
IPsec Protocol          Select from "ESP" and "AH".
Local Subnet            Enter the local subnet IP address that IPsec protects.
Local Subnet Netmask    Enter the local netmask that IPsec protects.
Local ID Type           Select from "Default", "ID", "FQDN", and "User FQDN".
Remote Subnet           Enter the remote subnet IP address that IPsec protects.
Remote Subnet Mask      Enter the remote netmask that IPsec protects.
Remote ID type          Select from "Default", "ID", "FQDN", and "User FQDN".
                        Table 3-3-6-2 IPsec Parameters
                                                                                  66
                                     Figure 3-3-6-4
IKE Parameter
Item                   Description
IKE Version            Select from "IKEv1" and "IKEv2".
Negotiation Mode       Select from "Main" and "Aggressive".
Encryption Algorithm   Select from "DES", "3DES", "AES128", "AES192" and "AES256".
Authentication
                       Select from "MD5" and " SHA1"
Algorithm
DH Group               Select from "MODP768_1", "MODP1024_2" and "MODP1536_5".
Local Authentication   Select from "PSK" and "CA".
Local Secrets          Enter the preshared key.
XAUTH                  Enter XAUTH username and password after XAUTH is enabled.
Lifetime (s)           Set the lifetime in IKE negotiation. Range: 60-86400.
SA Parameter
                       Select from "DES_MD5", "DES_SHA1", "3DES_MD5",
SA Algorithm           "3DES_SHA1", "AES128_MD5", "AES128_SHA1", "AES192_MD5",
                       "AES192_SHA1", "AES256_MD5" and "AES256_SHA1".
                       Select from "NULL", "MODP768_1" , "MODP1024_2" and
PFS Group
                       "MODP1536_5".
Lifetime (s)           Set the lifetime of IPsec SA. Range: 60-86400.
                                                                                     67
 DPD Interval Time(s)    Set DPD interval time to detect if the remote side fails.
 DPD Timeout(s)          Set DPD timeout. Range: 10-3600.
 IPsec Advanced
 Enable Compression      The head of IP packet will be compressed after it's enabled.
                         Select from "NONE", "GRE" and "L2TP" to enable VPN over
 VPN Over IPsec Type
                         IPsec function.
                               Table 3-3-6-3 IPsec Parameters
3.3.6.3 GRE
Generic Routing Encapsulation (GRE) is a protocol that encapsulates packets in order to
route other protocols over IP networks. It’s a tunneling technology that provides a channel
through which encapsulated data message can be transmitted and encapsulation and
decapsulation can be realized at both ends.
In the following circumstances the GRE tunnel transmission can be applied:
- GRE tunnel can transmit multicast data packets as if it were a true network interface.
     Single use of IPSec cannot achieve the encryption of multicast.
- A certain protocol adopted cannot be routed.
- A network of different IP addresses shall be required to connect other two similar
     networks.
Figure 3-3-6-5
 GRE
 Item                      Description
 Enable                    Check to enable GRE function.
                                                                                        68
 Remote IP Address         Enter the real remote IP address of GRE tunnel.
 Local IP Address          Set the local IP address.
 Local Virtual IP
                           Set the local tunnel IP address of GRE tunnel.
 Address
 Netmask                   Set the local netmask.
 Peer Virtual IP Address   Enter remote tunnel IP address of GRE tunnel.
 Global Traffic            All the data traffic will be sent out via GRE tunnel when this
 Forwarding                function is enabled.
 Remote Subnet             Enter the remote subnet IP address of GRE tunnel.
 Remote Netmask            Enter the remote netmask of GRE tunnel.
 MTU                       Enter the maximum transmission unit. Range: 64-1500.
 Key                       Set GRE tunnel key.
 Enable NAT                Enable NAT traversal function.
                                Table 3-3-6-4 GRE Parameters
3.3.6.4 L2TP
Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling
Protocol (PPTP) used by an Internet service provider (ISP) to enable the operation of a
virtual private network (VPN) over the Internet.
Figure 3-3-6-6
 L2TP
 Item                      Description
 Enable                    Check to enable L2TP function.
 Remote IP Address         Enter the public IP address or domain name of L2TP server.
 Username                  Enter the username that L2TP server provides.
 Password                  Enter the password that L2TP server provides.
                                                                                            69
                          Select from "Auto", "PAP", "CHAP", "MS-CHAPv1" and
 Authentication
                          "MS-CHAPv2".
 Global Traffic           All of the data traffic will be sent out via L2TP tunnel after
 Forwarding               this function is enabled.
 Remote Subnet            Enter the remote IP address that L2TP protects.
 Remote Subnet Mask       Enter the remote netmask that L2TP protects.
 Key                      Enter the password of L2TP tunnel.
                               Table 3-3-6-5 L2TP Parameters
Figure 3-3-6-7
Advanced Settings
Item                      Description
                          Set tunnel IP address of L2TP client. Client will obtain
Local IP Address          tunnel IP address automatically from the server when it's
                          null.
Peer IP Address           Enter tunnel IP address of L2TP server.
Enable NAT                Enable NAT traversal function.
Enable MPPE               Enable MPPE encryption.
Address/Control
                          For PPP initialization. User can keep the default option.
Compression
Protocol Field
                          For PPP initialization. User can keep the default option.
Compression
                          One of the PPP protocol initialization strings. User can keep
Asyncmap Value
                          the default value. Range: 0-ffffffff.
MRU                       Set the maximum receive unit. Range: 64-1500.
MTU                       Set the maximum transmission unit. Range: 64-1500
Link Detection Interval   Set the link detection interval time to ensure tunnel
                                                                                           70
(s)                        connection. Range: 0-600.
                           Set the maximum times of retry to detect the L2TP
Max Retries
                           connection failure. Range: 0-10.
                           User can enter some other PPP initialization strings in this
Expert Options
                           field and separate the strings with blank space.
                                 Table 3-3-6-6 L2TP Parameters
3.3.6.5 PPTP
Point-to-Point Tunneling Protocol (PPTP) is a protocol that allows corporations to extend
their own corporate network through private "tunnels" over the public Internet. Effectively, a
corporation uses a wide-area network as a single large local area network.
Figure 3-3-6-8
      PPTP
      Item                  Description
      Enable                Enable PPTP client. A maximum of 3 tunnels is allowed.
                            Enter the public IP address or domain name of PPTP
      Remote IP Address
                            server.
      Username              Enter the username that PPTP server provides.
      Password              Enter the password that PPTP server provides.
                            Select from "Auto", "PAP", "CHAP", "MS-CHAPv1", and
      Authentication
                            "MS-CHAPv2".
      Global Traffic        All of the data traffic will be sent out via PPTP tunnel once
      Forwarding            enable this function.
      Remote Subnet         Set the peer subnet of PPTP.
      Remote Subnet
                            Set the netmask of peer PPTP server.
      Mask
                                Table 3-3-6-7 PPTP Parameters
                                                                                            71
                                        Figure 3-3-6-9
                                                                                          72
3.3.6.6 OpenVPN Client
OpenVPN is an open source virtual private network (VPN) product that offers a simplified
security framework, modular network design, and cross-platform portability.
Advantages of OpenVPN include:
- Security provisions that function against both active and passive attacks.
- Compatibility with all major operating systems.
- High speed (1.4 megabytes per second typically).
- Ability to configure multiple servers to handle numerous connections simultaneously.
- All encryption and authentication features of the OpenSSL library.
- Advanced bandwidth management.
- A variety of tunneling options.
- Compatibility with smart cards that support the Windows Crypt application program
   interface (API).
Figure 3-3-6-10
 OpenVPN Client
 Item                     Description
 Enable                   Enable OpenVPN client. A maximum of 3 tunnels is allowed.
                                                                                      73
 Protocol                  Select from "UDP" and "TCP".
 Remote IP Address         Enter remote OpenVPN server's IP address or domain name.
                           Enter the listening port number of remote OpenVPN server.
 Port
                           Range: 1-65535.
 Interface                 Select from "tun" and "tap".
                           Select from "None", "Pre-shared", "Username/Password",
 Authentication
                           "X.509 cert", and "X.509 cert+user".
 Local Tunnel IP           Set local tunnel address.
 Remote Tunnel IP          Enter remote tunnel address.
 Global Traffic            All the data traffic will be sent out via OpenVPN tunnel when
 Forwarding                this function is enabled.
 Enable TLS
                           Check to enable TLS authentication.
 Authentication
 Username                  Enter username provided by OpenVPN server.
 Password                  Enter password provided by OpenVPN server.
 Enable NAT                Enable NAT traversal function.
 Compression               Select LZO to compress data.
 Link Detection Interval   Set link detection interval time to ensure tunnel connection.
 (s)                       Range: 10-1800.
 Link Detection Timeout    Set link detection timeout. OpenVPN will be reestablished
 (s)                       after timeout. Range: 60-3600.
                           Select from "NONE", "BF-CBC", "DE-CBC", "DES-EDE3-CBC",
 Cipher
                           "AES-128-CBC", "AES-192-CBC" and "AES-256-CBC".
 MTU                       Enter the maximum transmission unit. Range: 128-1500.
 Max Frame Size            Set the maximum frame size. Range: 128-1500.
 Verbose Level             Select from "ERROR", "WARING", "NOTICE" and "DEBUG".
                           User can enter some other PPP initialization strings in this
 Expert Options
                           field and separate the strings with blank space.
 Local Route
 Subnet                    Set the local route's IP address.
 Subnet Mask               Set the local route's netmask.
                           Table 3-3-6-9 OpenVPN Client Parameters
                                                                                           74
                             Figure 3-3-6-11
Figure 3-3-6-12
OpenVPN Server
Item               Description
Enable             Enable/disable OpenVPN server.
Protocol           Select from TCP and UDP.
Port               Fill in listening port number. Range: 1-65535.
                   Enter WAN IP address or LAN IP address. Leaving it blank
Listening IP
                   refers to all active WAN IP and LAN IP address.
Interface          Select from " tun" and "tap".
                   Select from "None", "Pre-shared", "Username/Password",
Authentication
                   "X.509 cert" and "X. 509 cert +user".
Local Virtual IP   The local tunnel address of OpenVPN's tunnel.
                                                                              75
 Remote Virtual IP             The remote tunnel address of OpenVPN's tunnel.
 Client Subnet                 Local subnet IP address of OpenVPN client.
 Client Netmask                Local netmask of OpenVPN client.
 Renegotiation Interval(s)     Set interval for renegotiation. Range: 0-86400.
 Max Clients                   Maximum OpenVPN client number. Range: 1-128.
 Enable CRL                    Enable CRL
 Enable Client to Client       Allow access between different OpenVPN clients.
 Enable Dup Client             Allow multiple users to use the same certification.
 Enable NAT                    Check to enable the NAT traversal function.
 Compression                   Select "LZO" to compress data.
                               Set link detection interval time to ensure tunnel connection.
 Link Detection Interval
                               Range: 10-1800.
                               Select from "NONE", "BF-CBC", "DES-CBC", "DES-EDE3-CBC",
 Cipher
                               "AES-128-CBC", "AES-192-CBC" and "AES-256-CBC".
 MTU                           Enter the maximum transmission unit. Range: 64-1500.
 Max Frame Size                Set the maximum frame size. Range: 64-1500.
 Verbose Level                 Select from "ERROR", "WARING", "NOTICE" and "DEBUG".
                               User can enter some other PPP initialization strings in this
 Expert Options
                               field and separate the strings with blank space.
 Local Route
 Subnet                        The real local IP address of OpenVPN client.
 Netmask                       The real local netmask of OpenVPN client.
 Account
 Username & Password           Set username and password for OpenVPN client.
                             Table 3-3-6-10 OpenVPN Server Parameters
3.3.6.8 Certifications
User can import/export certificate and key files for OpenVPN and IPsec on this page.
Figure 3-3-6-13
               OpenVPN Client
               Item              Description
               CA                Import/Export CA certificate file.
                                                                                               76
Public Key          Import/Export public key file.
Private Key         Import/Export private key file.
TA                  Import/Export TA key file.
Preshared Key       Import/Export static key file.
PKCS12              Import/Export PKCS12 certificate file.
          Table 3-3-6-11 OpenVPN Client Certification Parameters
Figure 3-3-6-14
     OpenVPN Server
     Item                  Description
     CA                    Import/Export CA certificate file.
     Public Key            Import/Export public key file.
     Private Key           Import/Export private key file.
     DH                    Import/Export DH key file.
     TA                    Import/Export TA key file.
     CRL                   Import/Export CRL.
     Preshared Key         Import/Export static key file.
               Table 3-3-6-12 OpenVPN Server Parameters
Figure 3-3-6-15
                                                                   77
IPsec
Item                        Description
CA                          Import/Export CA certificate.
Client Key                  Import/Export client key.
Server Key                  Import/Export server key.
Private Key                 Import/Export private key.
CRL                         Import/Export certificate recovery list.
                                 Table 3-3-6-13 IPsec Parameters
3.4 System
This section describes how to configure general settings, such as administration account,
access service, system time, common user management, SNMP, event alarms, etc.
3.4.1 General Settings
3.4.1.1 General
General settings include system info, access service and HTTPS certificates.
Figure 3-4-1-1
 General
 Item             Description                                                Default
 System
 Hostname         User-defined gateway name, needs to start with a letter.   GATEWAY
                                                                                       78
 Web Login
               You need to log in again if it times out. Range: 100-3600.    1800
 Timeout (s)
 Access Service
 Port          Set port number of the services. Range: 1-65535.              --
               Users can log in the device locally via HTTP to access
 HTTP                                                                        80
               and control it through Web after the option is checked.
               Users can log in the device locally and remotely via
 HTTPS         HTTPS to access and control it through Web after              443
               option is checked.
               Users can log in the device locally and remotely via
 TELNET        TELNET to access and control it through Web after             23
               option is checked.
               Users can log in the device locally and remotely via SSH
 SSH                                                                         22
               after the option is checked.
 HTTPS Certificates
               Click "Browse" button, choose certificate file on the PC,
               and then click "Import" button to upload the file into
 Certificate                                                                 --
               gateway. Click "Export" button will export the file to the
               PC. Click "Delete" button will delete the file.
               Click "Browse" button, choose key file on the PC, and
               then click "Import" button to upload the file into gateway.
 Key                                                                         --
               Click "Export" button will export file to the PC.
               Click "Delete" button will delete the file.
                           Table 3-4-1-1 General Setting Parameters
Figure 3-4-1-2
                                                                                    79
                                     Figure 3-4-1-3
Figure 3-4-1-4
System Time
Item                   Description
Current Time           Show the current system time.
Time Zone              Click the drop down list to select the time zone you are in.
                       Click the drop down list to select the time synchronization
Sync Type
                       type.
Sync with Browser      Synchronize time with browser.
Browser Time           Show the current time of browser.
Set up Manually        Manually configure the system time.
                       Synchronize time with NTP server so as to achieve time
Sync with NTP Server   synchronization of all devices equipped with a clock on
                       network.
Sync with NTP Server
NTP Server Address     Set NTP server address (domain name/IP).
                       NTP client on the network can achieve time synchronization
Enable NTP Server
                       with gateway after "Enable NTP Server" option is checked.
                         Table 3-4-1-2 System Time Parameters
                                                                                      80
3.4.1.3 SMTP
SMTP, short for Simple Mail Transfer Protocol, is a TCP/IP protocol used in sending and
receiving e-mail. This section describes how to configure email settings.
Figure 3-4-1-5
 SMTP
 Item                      Description
 SMTP Client Settings
 Enable                    Enable or disable SMTP client function.
 Email Address             Enter the sender's email account.
 Password                  Enter the sender's email password.
 SMTP Server Address       Enter SMTP server's domain name.
 Port                      Enter SMTP server port. Range: 1-65535.
 Enable TLS                Enable or disable TLS encryption.
                                  Table 3-4-1-3 SMTP Setting
Related Topics
Events Setting
3.4.1.4 Phone
Phone settings involve in call/SMS trigger and SMS alarm for events. This is only applied to
gateway with cellular feature.
                                                                                        81
                                         Figure 3-4-1-6
 Phone
 Item               Description
 Phone Number List
 Name               Set phone group name.
                    Enter the telephone number. Digits, "+" and "-" are allowed. You can
 Number
                    divide multiple numbers by “;”.
                                  Table 3-4-1-4 Phone Settings
Related Topic
Connect on Demand
3.4.1.5 Email
Email settings involve email alarm for events.
Figure 3-4-1-7
  Email
  Item                 Description
  Email List
  Name                 Set Email group name.
                       Enter the Email address.     You can divide multiple Email
  Email Address
                       addresses by “;”.
                                  Table 3-4-1-5 Email Settings
                                                                                           82
3.4.2 User Management
3.4.2.1 Account
Here you can change the login username and password of the administrator.
Note: it is strongly recommended that you modify them for the sake of security.
Figure 3-4-2-1
Account
Item                      Description
                          Enter a new username. You can use characters such as a-z,
Username
                          0-9, "_", "-", "$". The first character can't be a digit.
Old Password              Enter the old password.
New Password              Enter a new password.
Confirm New Password      Enter the new password again.
                              Table 3-4-2-1 Account Information
Figure 3-4-2-2
 User Management
 Item                     Description
                          Enter a new username. You can use characters such as a-z,
 Username
                          0-9, "_", "-", "$". The first character can't be a digit.
 Password                 Set password.
                                                                                      83
                         Select user permission from “Read-Only” and “Read-Write”.
                         - Read-Only: users can only view the configuration of
Permission                   gateway in this level.
                         - Read-Write: users can view and set the configuration of
                             gateway in this level.
                             Table 3-4-2-2 User Management
3.4.3 SNMP
SNMP is widely used in network management for network monitoring. SNMP exposes
management data with variables form in managed system. The system is organized in a
management information base (MIB) which describes the system status and configuration.
These variables can be remotely queried by managing applications.
Configuring SNMP in networking, NMS, and a management program of SNMP should be
set up at the Manager.
Configuration steps are listed as below for achieving query from NMS:
1. Enable SNMP setting.
2. Download MIB file and load it into NMS.
3. Configure MIB View.
4. Configure VCAM.
3.4.3.1 SNMP
UG67 supports SNMPv1, SNMPv2c and SNMPv3 version. SNMPv1 and SNMPv2c employ
community name authentication. SNMPv3 employs authentication encryption by username
and password.
Figure 3-4-3-1
 SNMP Settings
 Item                    Description
 Enable                  Enable or disable SNMP function.
                         Set SNMP listened port. Range: 1-65535.
 Port
                         The default port is 161.
                                                                                     84
 SNMP Version              Select SNMP version; support SNMP v1/v2c/v3.
 Location Information      Fill in the location information.
 Contact Information       Fill in the contact information.
                               Table 3-4-3-1 SNMP Parameters
Figure 3-4-3-2
 MIB View
 Item                      Description
 View Name                 Set MIB view's name.
 View Filter               Select from "Included" and "Excluded".
 View OID                  Enter the OID number.
 Included                  You can query all nodes within the specified MIB node.
 Excluded                  You can query all nodes except for the specified MIB node.
                              Table 3-4-3-2 MIB View Parameters
3.4.3.3 VACM
This section describes how to configure VCAM parameters.
Figure 3-4-3-3
                                                                                        85
VACM
Item                Description
SNMP v1 & v2 User List
Community           Set the community name.
Permission          Select from "Read-Only" and "Read-Write".
MIB View            Select an MIB view to set permissions from the MIB view list.
Network             The IP address and bits of the external network accessing the MIB view.
Read-Write          The permission of the specified MIB node is read and write.
Read-Only           The permission of the specified MIB node is read only.
SNMP v3 User List
Group Name          Set the name of SNMPv3 group.
Security Level      Select from "NoAuth/NoPriv", "Auth/NoPriv", and " Auth/Priv".
                    Select an MIB view to set permission as "Read-only" from the MIB view
Read-Only View
                    list.
                    Select an MIB view to set permission as "Read-write" from the MIB view
Read-Write View
                    list.
Inform View         Select an MIB view to set permission as "Inform" from the MIB view list.
                                  Table 3-4-3-3 VACM Parameters
3.4.3.4 Trap
This section explains how to enable network monitoring by SNMP trap.
Figure 3-4-3-4
  SNMP Trap
  Item                      Description
  Enable                    Enable or disable SNMP Trap function.
  SNMP Version              Select SNMP version; support SNMP v1/v2c/v3.
  Server Address            Fill in NMS's IP address or domain name.
                            Fill in UDP port. Port range is 1-65535. The default port is
  Port
                            162.
                            Fill in the group name when using SNMP v1/v2c; fill in
  Name
                            the username when using SNMP v3.
  Auth/Priv Mode            Select from "NoAuth & No Priv", "Auth & NoPriv", and
                                                                                           86
                           "Auth & Priv".
                                Table 3-4-3-4 Trap Parameters
3.4.3.5 MIB
This section describes how to download MIB files.
Figure 3-4-3-5
 MIB
 Item                      Description
 MIB File                  Select the MIB file you need.
 Download                  Click "Download" button to download the MIB file to PC.
                                 Table 3-4-3-5 MIB Download
Figure 3-4-5-1
 DeviceHub
 Item                    Description
                         Show the connection status between the gateway and the
 Status
                         DeviceHub.
 Disconnected            Click this button to disconnect the gateway from the DeviceHub.
                                                                                       87
 Activation Server
                         IP address or domain of the DeviceHub.
 Address
 DeviceHub Server        The URL address for the device to connect to the DeviceHub,
 Address                 e.g. http://220.82.63.79:8080/acs.
                         Select activation method to connect the gateway to the
 Activation Method
                         DeviceHub server, options are "By Authentication ID" and "By ID".
 Authentication Code     Fill in the authentication code generated from the DeviceHub.
 ID
                         Fill in the registered DeviceHub account (email) and password.
 Password
                                        Table 3-4-5-1
3.4.6 Events
Event feature is capable of sending alerts by Email when certain system events occur.
3.4.6.1 Events
You can view alarm messages on this page.
Figure 3-4-6-1
 Events
 Item                  Description
 Mark as Read          Mark the selected event alarm as read.
 Delete                Delete the selected event alarm.
 Mark All as Read      Mark all event alarms as read.
 Delete All Alarms     Delete all event alarms.
                       Show the reading status of the event alarms, such as “Read” and
 Status
                       “Unread”.
 Type                  Show the event type that should be alarmed.
 Time                  Show the alarm time.
                                                                                          88
 Message             Show the alarm content.
                             Table 3-4-6-1 Events Parameters
Figure 3-4-6-2
 Event Settings
 Item               Description
 Enable             Check to enable "Events Settings".
 Cellular Up        Cellular network is connected.
 Cellular Down      Cellular network is disconnected.
 WAN Up             Ethernet cable is connected to WAN port.
 WAN Down           Ethernet cable is disconnected to WAN port.
 VPN Up             VPN is connected.
 VPN Down           VPN is disconnected.
 Power On           The gateway has powered on.
 Power Off          The gateway has powered off.
 Record             The relevant content of event alarm will be recorded on "Event"
                                                                                      89
                       page if this option is checked.
                       The relevant content of event alarm will be sent out via email if
 Email
                       this option is checked.
                       Click and you will be redirected to the page "Email" to configure
 Email Setting
                       the Email group.
                       The relevant content of event alarm will be sent out via SMS if
 SMS
                       this option is checked.
                       Click and you will be redirected to the page of "Phone" to
 SMS Setting
                       configure phone group list.
 Phone Group List      Select phone group to receive SMS alarm.
 Email Group List      Select Email group to receive Email alarm.
                                Table 3-4-6-2 Events Parameters
Related Topics
Email Setting
Phone Setting
3.5 Maintenance
This section describes system maintenance tools and management.
3.5.1 Tools
Troubleshooting tools includes ping and traceroute.
3.5.1.1 Ping
Ping tool is engineered to ping outer network.
Figure 3-5-1-1
                    PING
                    Item    Description
                    Host    Ping outer network from the gateway.
                                Table 3-5-1-1 IP Ping Parameters
3.5.1.2 Traceroute
Traceroute tool is used for troubleshooting network routing failures.
                                                                                           90
                                         Figure 3-5-1-2
                  Traceroute
                  Item     Description
                  Host     Address of the destination host to be detected.
                               Table 3-5-1-2 Traceroute Parameters
3.5.1.3 Qxdmlog
This section allow collecting diagnostic logs via QXDM tool.
Figure 3-5-1-3
3.5.2 Schedule
This section explains how to configure scheduled reboot on the gateway.
Figure 3-5-2-1
Schedule
                                                                             91
 Item                      Description
 Schedule                  Select schedule type.
 Reboot                    Reboot the gateway regularly.
 Frequency                 Select the frequency to execute the schedule.
 Hour & Minute             Select the time to execute the schedule.
                              Table 3-5-2-1 Schedule Parameters
3.5.3 Log
The system log contains a record of informational, error and warning events that indicates
how the system processes. By reviewing the data contained in the log, an administrator or
user troubleshooting the system can identify the cause of a problem or whether the system
processes are loading successfully. Remote log server is feasible, and gateway will upload
all system logs to remote log server such as Syslog Watcher.
Figure 3-5-3-1
 System Log
 Item                      Description
 Download                  Download log file.
 View recent (lines)       View the specified lines of system log.
 Clear Log                 Clear the current system log.
                             Table 3-5-3-1 System Log Parameters
                                                                                      92
                                       Figure 3-5-3-2
 Log Settings
 Item                    Description
 Remote Log Server
                         With “Remote Log Server” enabled, gateway will send all
 Enable
                         system logs to the remote server.
                         Fill in the remote system log server address (IP/domain
 Syslog Server Address
                         name).
 Port                    Fill in the remote system log server port.
 Local Log File
 Storage                 User can store the log file in memory or TF card.
 Size                    Set the size of the log file to be stored.
 Log Severity            The list of severities follows the syslog protocol.
                           Table 3-5-3-2 System Log Parameters
3.5.4 Upgrade
This section describes how to upgrade the gateway firmware via web. Generally you don’t
need to do the firmware upgrade.
Note: any operation on web page is not allowed during firmware upgrade, otherwise the
upgrade will be interrupted, or even the device will break down.
                                                                                   93
                                        Figure 3-5-4-1
 Upgrade
 Item                     Description
 Firmware Version         Show the current firmware version.
 Reset Configuration to   When this option is checked, the gateway will be reset to
 Factory Default          factory defaults after upgrade.
                          Click "Browse" button to select the new firmware file, and
 Upgrade Firmware
                          click "Upgrade" to upgrade firmware.
                             Table 3-5-4-1 Upgrade Parameters
                                                                                       94
                                         Figure 3-5-5-1
3.5.6 Reboot
On this page you can reboot the gateway and return to the login page. We strongly
recommend clicking “Save” button before rebooting the gateway so as to avoid losing the
new configuration.
Figure 3-5-6-1
                                                                                             95
3.6 APP
3.6.1 Python
Python is an object-oriented programming language that has gained popularity because of
its clear syntax and readability.
As an interpreted language, Python has a design philosophy that emphasizes code
readability, notably using whitespace indentation to delimit code blocks rather than curly
brackets or keywords, and a syntax that allows programmers to express concepts in fewer
lines of code than it’s used in other languages such as C++ or Java. The language provides
constructs and intends to enable writing clear programs on both small and large scale.
Users can use Python to quickly generate the prototype of the program, which can be the
final interface of the program, rewrite it with a more appropriate language, and then
encapsulate the extended class library that Python can call.
This section describes how to view the relevant running status such as App-manager, SDK
version, extended storage, etc. Also you can change the App-manager configuration, and
import the Python App package from here.
3.6.1.1 Python
Figure 3-6-1-1
  Python
  Item                     Description
                           Show AppManager's running status, like "Uninstalled",
  AppManager Status
                           "Running" or "Stopped".
  SDK Version              Show the version of the installed SDK.
  SDK Path                 Show the SDK installation path.
  Available Storage        Select available storage to install SDK.
  SDK Upload               Upload and install SDK for Python.
  Uninstall                Uninstall SDK.
                                                                                      96
 View                     View application status managed by AppManager.
                              Table 3-6-1-1 Python Parameters
Figure 3-6-1-2
 AppManager Configuration
 Item               Description
                    After enabling Python AppManager, user can click "View" button on
 Enable             the "Python" webpage to view the application status managed by
                    AppManager.
 App Management
 ID                 Show the ID of the imported App.
 App Command        Show the name of the imported App.
 Logfile Size(MB)   User-defined Logfile size. Range: 1-50.
 Uninstall          Uninstall APP.
 App Status
 App Name           Show the name of the imported App.
 App Version        Show the version of the imported App.
 SDK Version        Show the SDK version which the imported App is based on.
                           Table 3-6-1-2 APP Manager Parameters
                                                                                    97
3.6.1.3 Python App
Figure 3-6-1-3
  Python APP
  Item                     Description
  App Package              Select App package and import.
  App Name                 Select App to import configuration.
  App Configuration        Select configuration file and import.
  Debug File               Export script file.
  Debug Script             Select Python script to be debugged and import.
                               Table 3-6-1-3 APP Parameters
3.6.2 Node-RED
Node-RED is a flow-based development tool for visual programming and wiring together
hardware devices, APIs and online services as part of the Internet of Things. Node-RED
provides a web-browser-based flow editor, which can easily wire together flows using the
wide range of nodes in the palette. Besides basic nodes, Milesight gateways provide
following customized nodes:
 LoRa Input: receive the LoRa data, please ensure the network server mode is enabled
     before using this node
 LoRa Output: send downlinks to LoRaWAN® nodes
 Device Filter: filter out the data of one or more specific LoRaWAN® nodes
 Decoder: decode the Milesight LoRaWAN® end nodes data
                                                                                    98
    GW Info: monitor alarm messages of gateway, please ensure the event detection is
     enabled in “General -> Events -> Events Settings”
    Email Output: send LoRa data or gateway alarms via email
    SMS Input: receive SMS message. This only works when cellular is connected
    SMS Output: send SMS message. This only works when cellular is connected
3.6.2.1 Node-RED
Figure 3-6-2-1
    Node-RED
    Item                   Description
    Enable                 Enable the Node-RED.
    Launch                 Click to launch the web GUI of Node-RED.
                           Show the version of the Node-RED. Node-RED version can
    Node-RED Version
                           be upgraded only when you upgrade the gateway.
    Node Library Version   Show the version of the node library.
    Upgrade Node Library   Upgrade the node library by importing the library package.
                            Table 3-6-2-1 Node-RED Parameters
                                                                                        99
Chapter 4 Application Examples
4.1 Restore Factory Defaults
4.1.1 Via Web Interface
1. Log in web interface, and go to “Maintenance > Backup and Restore”.
2. Click “Reset” button under the “Restore Factory Defaults”.
You will be asked to confirm if you’d like to reset it to factory defaults. Then click “Reset”
button.
Then the gateway will reboot and restore to factory settings immediately.
                                                                                          100
Please wait till SYS light staticly and the login page pops up again, which means the
gateway has already been reset to factory defaults successfully.
Related Topic
Restore Factory Defaults
                                                                                           101
Related Topic
Upgrade
                                                                                    102
4. Log in the web GUI via the newly assigned IP address and go to “Status -> Network” to
check Ethernet port status.
Related Topic
Port Setting
                                                                                             103
7.   Check out if network works properly by browser on PC.
Open your preferred browser on PC, type any available web address into address bar and
see if it is able to visit Internet via the UG67.
Related Topic
Cellular Setting
Cellular Status
Configuration Steps
1. Go to “Network > Interface > WLAN” to configure wireless parameters as below.
                                                                                   104
Click “Save” and “Apply” buttons after all configurations are done.
2. Use a smart phone to connect the access point of gateway. Go to “Status > WLAN”, and
you can check the AP settings and information of the connected client/user.
                                                                                   105
4.5.2 Client Mode
Application Example
Configure UG67 as Wi-Fi client to connect to an access point to have Internet access.
Configuration Steps
1. Go to “Network > Interface > WLAN” and click “Scan” to search for WiFi access point.
2. Select one access point and click “Join Network”, then type the password of the access
point.
Click “Save” and “Apply” buttons after all configurations are done.
3. Go to “Status > WLAN”, and you can check the connection status of the client.
                                                                                          106
Related Topic
WLAN Setting
WLAN Status
2. Click to add a new network server. Fill in the network server information and
                                                                                   107
enable this server.
3. Go to “Packet Forwarder -> Radio” page to configure antenna type, center frequency
and channels. The channels of the gateway and network server need to be the same.
4. Add the gateway on network server page. For more details about the network server
connection please refer to Milesight IoT Support portal.
5. Go to “Traffic” page to view the data communication of UG67.
                                                                                  108
4.7 Connect UG67 to Milesight IoT Cloud
1. Go to “Packet Forwarder->General” page to enable the embedded network server.
2. Go to “Packet Forwarder-> Radio” page to select the antenna type, center frequency and
channels. The channels of the gateway and nodes need to be the same.
3. Go to “Network Server” → “General” page to enable the network server and “Cloud
mode”, then select “Milesight IoT Cloud” mode.
                                                                                     109
4. Log in the Milesight IoT Cloud. Then go to “My Devices” page and click “+New Devices”
to add gateway to Milesight IoT Cloud via SN. Gateway will be added under “Gateways”
menu.
                                                                                    110
1. Go to “Network Server” > “Application”.
Step 2: Enter the destination URL. Different types of data can be sent to different URLs.
Enter the header name and header value if there is user credentials when accessing the
HTTP(s) server.
                                                                                            111
MQTT:
Step 1: select the transmission protocol as MQTT.
If certificate is necessary for verification, please select mode and import CA certificate,
client certificate and client key file for authentication.
Step 4: Enter the topic to receive data and choose the QoS.
                                                                                       112
4.9 Device Configuration
Go to “Device” page and click “Add” to add LoRaWAN® node devices. Please select correct
device profile according to device type.
You can also click “Bulk Import” if you want to add many nodes all at once.
                                                                                   113
Click “Template Download” to download template file and add device information to this
file. Application and device profile should be the same as you created on web page.
2. Fill in the device EUI or select the multicast group which you need to send downlinks.
Then fill in the downlink commands, ports.
3. Click “Send”.
4. Check the packet in the network server list to make sure that the device has received this
message successful. It’s suggested to enable “Confirmed”. Multicast feature does not
support confirmed downlinks.
You can click “Refresh” to refresh the list or set automatic refreshing frequency for the list.
If the device’s class type is Class C, then the device will constantly receive packets.
This packet’s type is DnCnf (Downlink Confirmed Packet) and if the packet’s color is gray,
then it means the packet cannot be transmitted now because at least one message has
been in the queue. If the packet record is white, it means the packet has been delivered
successfully.
                                                                                             114
If the device receives this downlink confirmed packet, then the device will reply “ACK” when
delivering next.
Ack is “true” means that the device has received this packet.
If the device’s class type is Class A, only after the device sends out an uplink packet will the
network server sends out data to the device.
                                                                                            115
Related Topic
Packets
4.11 Node-RED
4.11.1 Start the Node-RED
2. After enabled, click “Launch” to go to the Node-RED web GUI and to log in with the same
                                                                                      116
4.11.2 Send Data by Email
Application Example
Send AM104 device data by Email.
Configuration Steps
1. Add a “LoRa Input” node. Before adding please ensure network server mode is enabled
and LoRaWAN devices have joined the network.
2. If you add many devices and only need one device data, add “Device Filter” node behind
the “LoRa Input” and type the device EUI.
                                                                                     117
4. Add an “Email Output” and type the SMTP client settings, destination email address and
contents. Example content:
The time is {{time}}
Deveui is {{deveui}}
Humidity is {{payload.humidity}}
Note:
1) When you select SMTP Option as “Same as Gateway”, go to “System -> General Settings
-> SMTP” to configure the SMTP clients.
2) Basic format to call LoRaWAN node data is {{property name}}, you can click “Help” page
for more info about the Email or SMS payload format.
3) If you need to check the output content in every node, please add debug node.
5. After completing the configuration, click “Deploy” to save all your configuration.
6. When AM104 sends data to gateway, gateway will transfer the data to email.
                                                                                        118
Related Topic
Node-RED
[END]
119