90002540
90002540
User Guide
Firmware version 24.9
Revision history—90002540
What's coming
When accessing the device locally through the Web UI or CLI, you will be
able to see more metrics in Settings > Status, such as connection status
and network details. Though not much else changes in this release, the
work behind the scenes is foundational. Coming soon, data streams in
Digi Remote Manager will be replaced with a comprehensive view about
the status of your devices. What you see in the local Web UI or CLI is
what you will see in Digi Remote Manager.
Tip For more information about this release, see the blog post called,
"Announcing the Latest Digi Software Solutions for DAL OS 24.9
Firmware" on digi.com.
Additional changes
n Added documentation for the Containers feature.
Changes for AnywhereUSB 2 port feature
n Updated the AnywhereUSB Manager Windows OS install process
n Updated Use all Hub IPv4 addresses for IPv4 IP addresses only.
n Added documentation for Configure the Include IPv6 Addrs in
Autofind option.
n Updated the uninstall process from the Windows Control Panel.
n Updated Create a debug log file with the USB Debug Logging
Wizard.
Tip For more information about this release, see the blog post called,
"Announcing the Latest Digi Software Solutions for DAL OS 24.3
Firmware" on digi.com.
Additional changes
n Added a step for device registration.
n Added information about the altpin feature. See Serial connector
pinout.
G February Added information about CORE module installation. See Create a cellular
2024 connection using the CORE module.
Disclaimers
Information in this document is subject to change without notice and does not represent a
commitment on the part of Digi International. Digi provides this document “as is,” without warranty of
any kind, expressed or implied, including, but not limited to, the implied warranties of fitness or
merchantability for a particular purpose. Digi may make improvements and/or changes in this manual
or in the product(s) and/or the program(s) described in this manual at any time.
Warranty
To view product warranty information, go to the following website:
www.digi.com/howtobuy/terms
Feedback
To provide feedback on this document, email your comments to
techcomm@digi.com
Include the document title and part number (Digi Connect EZ 16/32 User Guide, 90002540 A) in the
subject line of your email.
What's coming 3
Hardware
Connect EZ 16/32 component list 31
Included equipment for Connect EZ 16/32 31
Additional required equipment 32
Optional additional equipment 32
Optional additional cellular equipment 32
Front panel and LEDs 33
Back panel 35
Change the password on the Connect EZ 36
Create a cellular connection using the CORE module 36
Prerequisites 36
Connect to site network using an Ethernet LAN 37
Connect equipment to the Connect EZ serial port 38
Connect equipment to a serial port 38
Serial connector pinout 38
Mount the Connect EZ 16/32 on a rack 39
Power the Connect EZ 16/32 39
Power loss and Connect EZ 16/32 configuration 40
Install an additional power supply unit 40
Use the RESET button to reset your device to the factory defaults 40
Discover the IP address using the Digi Navigator 41
Discover the device's IP address: Additional methods 41
Firmware configuration
Review Connect EZ 16/32 default settings 47
Local WebUI 47
Digi Remote Manager 47
Default interface configuration 47
Other default configuration settings 48
Change the default password for the admin user 48
Configuration methods 49
Using Digi Remote Manager 50
Access Digi Remote Manager 50
Using the local web interface 51
Review the dashboard 51
Log out of the web interface 52
Use the local REST API to configure the Connect EZ 16/32 device 52
Use the GET method to return device configuration information 52
Use the POST method to modify device configuration parameters and list arrays 54
Use the DELETE method to remove items from a list array 55
Access the terminal screen from the web UI 56
Using the command line 58
Access the command line interface 58
Log in to the command line interface 58
Exit the command line interface 59
Interfaces
Wide Area Networks (WANs) 61
Wide Area Networks (WANs) and Wireless Wide Area Networks (WWANs) 62
Configure WAN/WWAN priority and default route metrics 62
WAN/WWAN failover 65
Configure SureLink active recovery to detect WAN/WWAN failures 66
Configure the device to reboot when a failure is detected 82
Disable SureLink 95
Example: Use a ping test for WAN failover from Ethernet to cellular 104
Using Ethernet devices in a WAN 106
Using cellular modems in a Wireless WAN (WWAN) 106
Configure a Wide Area Network (WAN) 131
Configure a Wireless Wide Area Network (WWAN) 139
Show WAN and WWAN status and statistics 150
Delete a WAN or WWAN 152
Default outbound WAN/WWAN ports 153
Local Area Networks (LANs) 154
About Local Area Networks (LANs) 155
Configure a Local Area Network (LAN) 155
Configure the ETH1 port as a LAN or in a bridge 162
Change the default LAN subnet 169
Show LAN status and statistics 170
Delete a LAN 172
DHCP servers 173
Default services listening on LAN ports 190
Serial port
Default serial port configuration 211
Serial mode options 211
View serial port information 211
Default serial port configuration 211
Baud rate options 212
Configure Login mode for a serial port 212
Configure Remote Access mode for a serial port 217
Configure Application mode for a serial port 234
Configure PPP dial-in mode for a serial port 237
Configure UDP serial mode for a serial port 244
Configure Modem emulator mode for a serial port 257
Configure Modbus mode for a serial port 260
Copy a serial port configuration 264
Configure RealPort mode using the Digi Navigator 266
Installation and configuration process 267
Digi Navigator features 267
Install the Digi Navigator 267
Configure RealPort on a Digi device from the Digi Navigator 268
Digi Navigator device discovery process 270
Services used to discover a device when connected to a network 270
Digi Navigator application features 275
Advanced RealPort configuration without using the Digi Navigator 278
Windows Operating System 279
Linux Operating System 279
Download the RealPort driver 279
Configure RealPort on your laptop 279
Configure the serial port for RealPort mode 281
Configure the RealPort service 286
Disconnect a user from a serial port 288
Show serial port status and statistics 290
Serial Status page 290
Review the serial port message log 292
Routing
IP routing 295
Services
Allow remote access for web administration and SSH 510
Configure the web administration service 513
Configure SSH access 522
Use SSH with key authentication 529
Generating SSH key pairs 529
Configure telnet access 532
Configure DNS 537
Show DNS server 542
Simple Network Management Protocol (SNMP) 544
SNMP Security 544
Configure Simple Network Management Protocol (SNMP) 544
Download MIBs 549
Location information 551
Configure the device to use a user-defined static location 552
Configure the device to accept location messages from external sources 554
Forward location information to a remote host 558
Configure geofencing 565
Show location information 577
Modbus gateway 578
Configure the Modbus gateway 579
Modbus hardening 592
Show Modbus gateway status and statistics 594
System time synchronization 597
Configure the system time synchronization 597
Manually set the system date and time 601
Network Time Protocol 602
Configure the device as an NTP server 602
Show status and statistics of the NTP server 607
Configure a multicast route 608
Ethernet network bonding 611
Enable service discovery (mDNS) 615
Use the iPerf service 619
Example performance test using iPerf3 622
Configure the ping responder service 623
Example performance test using iPerf3 626
Configure AnywhereUSB services 627
Applications
Develop Python applications 634
Set up the Connect EZ 16/32 for Python development 635
Create and test a Python application 635
Python modules 639
Set up the Connect EZ 16/32 to automatically run your applications 670
Configure scripts to run automatically 670
User authentication
Connect EZ 16/32 user authentication 690
User authentication methods 690
Add a new authentication method 692
Delete an authentication method 694
Rearrange the position of authentication methods 695
Authentication groups 697
Change the access rights for a predefined group 699
Add an authentication group 701
Delete an authentication group 705
Local users 707
Change a local user's password 708
Configure a local user 710
Delete a local user 718
Terminal Access Controller Access-Control System Plus (TACACS+) 721
TACACS+ user configuration 722
TACACS+ server failover and fallback to local authentication 723
Configure your Connect EZ 16/32 device to use a TACACS+ server 723
Remote Authentication Dial-In User Service (RADIUS) 728
RADIUS user configuration 729
RADIUS server failover and fallback to local configuration 729
Configure your Connect EZ 16/32 device to use a RADIUS server 730
LDAP 733
LDAP user configuration 735
LDAP server failover and fallback to local configuration 736
Configure your Connect EZ 16/32 device to use an LDAP server 736
Configure serial authentication 741
Disable shell access 743
Set the idle timeout for Connect EZ 16/32 users 745
Example user configuration 747
Example 1: Administrator user with local authentication 747
Example 2: RADIUS, TACACS+, and local authentication for one user 749
Firewall
Firewall configuration 757
Create a custom firewall zone 757
Configure the firewall zone for a network interface 759
Delete a custom firewall zone 760
Port forwarding rules 762
Configure port forwarding 762
Delete a port forwarding rule 767
Packet filtering 769
Configure packet filtering 769
Containers
Use Digi Remote Manager to deploy and run containers 797
Use an automation to start the container 800
Upload a new LXCcontainer 801
Configure a container 802
Starting and stopping the container 807
Starting the container 807
Stopping the container 808
View the status of containers 808
Show status of all containers 809
Show status of a specific container 809
Schedule a script to run in the container 810
Create a custom container 812
Create the custom container file 812
Test the custom container file 813
Containers
Use Digi Remote Manager to deploy and run containers 816
Use an automation to start the container 819
Upload a new LXCcontainer 820
Configure a container 821
Starting and stopping the container 826
Starting the container 826
Stopping the container 827
View the status of containers 827
Show status of all containers 828
Show status of a specific container 828
Schedule a script to run in the container 829
Create a custom container 831
Create the custom container file 831
Test the custom container file 832
System administration
Review device status 835
Configure system information 836
Update system firmware 838
Manage firmware updates using Digi Remote Manager 838
Certificate management for firmware images 839
Downgrading 839
Dual boot behavior 843
Monitoring
intelliFlow 883
Enable intelliFlow 884
Configure service types 886
Configure domain name groups 888
Use intelliFlow to display average CPU and RAM usage 891
Use intelliFlow to display top data usage information 892
Use intelliFlow to display data usage by host over time 894
Configure NetFlow Probe 895
Central management
Digi Remote Manager support 901
Certificate-based enhanced security 901
Configure your device for Digi Remote Manager support 901
Collect device health data and set the sample interval 908
Event log upload to Digi Remote Manager 911
Reach Digi Remote Manager on a private network 913
Pinhole method 913
Proxy server method 913
VPN Tunnel method 913
Log into Digi Remote Manager 913
Use Digi Remote Manager to view and manage your device 915
Add a device to Remote Manager 915
Add a device to Remote Manager using information from the label 915
Add a device to Remote Manager using your Remote Manager login credentials 916
Configure multiple Connect EZ 16/32 devices by using Digi Remote Manager configurations 917
File system
The Connect EZ 16/32 local file system 921
Display directory contents 921
Create a directory 922
Display file contents 923
Copy a file or directory 923
Move or rename a file or directory 924
Delete a file or directory 925
Upload and download files 926
Upload and download files by using the WebUI 926
Upload and download files by using the Secure Copy command 927
Upload and download files using SFTP 928
Diagnostics
Perform a speedtest 931
Generate a support report 931
Support report overview 932
View system and event logs 936
View System Logs 936
View Event Logs 938
Configure syslog servers 941
Configure options for the event and system logs 943
Configure an email notification for a system event 948
Configure an SNMP trap for a system event 948
Analyze network traffic 950
Configure packet capture for the network analyzer 951
Example filters for capturing data traffic 960
Capture packets from the command line 961
Stop capturing packets 962
Show captured traffic data 963
Save captured data traffic to a file 964
Download captured data to your PC 965
Clear captured data 966
Use the ping command to troubleshoot network connections 968
Ping to check internet connection 968
Stop ping commands 968
Use the traceroute command to diagnose IP routing problems 968
Safety warnings
English 1147
Bulgarian--български 1147
Croatian--Hrvatski 1147
French--Français 1147
Greek--Ελληνικά 1147
Hungarian--Magyar 1147
Italian--Italiano 1148
Latvian--Latvietis 1148
Lithuanian--Lietuvis 1148
Polish--Polskie 1148
Portuguese--Português 1148
Slovak--Slovák 1148
Slovenian--Esloveno 1148
Spanish--Español 1149
Applicable hardware
This user guide contains information for these Connect EZ 16/32 models. Hardware features are
shown in the table below.
Core
module
and
2
AnywhereUSB antenna
Name SKU MEI Serial ports USB ports ports
Connect EZ 16 EZ16-A100 16 2 X
Connect EZ 16 MEI EZ16-C100 X 16 2 X
Connect EZ 32 EZ32-A100 32 2 X
Connect EZ 32 MEI EZ32-C100 X 32 2 X
Step 1: Open the box and remove components needed for the
initial install
You will need:
Equipment Description
Connect EZ
16
OR
Connect EZ
32
Note This image is of Connect EZ 32. The Connect EZ 16 has a blank panel covering
the top row of serial ports.
Equipment Description
Ethernet Ethernet cable/RJ45 straight-through.
cable
Note One Ethernet cable is included in the box, but you will need two Ethernet
cables to complete the initial set up.
Loopback RJ45M serial loopback plug is included for use with testing.
plug
Welcome The password used to log into the web UI for the device is printed on the back of the
card card.
For information about all of the Connect EZ 16/32 components, see Connect EZ 16/32 component list.
In addition to the components in the box, you will need to supply the following:
Equipment Description
Power cord A national mains power cord. Depending on the device variant ordered, a power
cord may be supplied. At least one power cord is required to power the device. If
your device is dual-powered, a second power cord is recommended.
For ACpower supplies: Use an appropriate power cable meeting national standards
to connect to a standard outlet.
n EU/International: VDE Mark, conforming to IEC60083, IEC60227, or IEC
60320, with C13 to the appropriate national mains connector rated for 16A at
250V.
n USA/Canada: URor UL Mark, conforming to UL 62, UL 817, or CSA-C22.2, with
C13 to 5-15P, or NEMA locking connector rated for 10A at 125V.
2. Connect the power cord to at least one power supply on the device.
3. Plug the other end of the power cord to a main power supply.
4. If your device is dual-powered, repeat the process for the second power supply.
Note If your device is single-powered, you can purchase and install an additional power supply unit.
See Install an additional power supply unit.
1. Connect one end of the second Ethernet cable to the ETH 2 port on your device and the other
end to your computer or local network.
Navigator was installed can launch the Digi Navigator. This is the default.
7. Click Finish to complete the installation process. When installation is complete, the Digi
Navigator is launched.
8. The Digi Navigator discovers the Connect EZ 16/32 devices that are powered on and
connected to your network. When the process is complete, a list of the devices on your
network appears.
9. If more than one device is displayed in the list, you can verify the device you are working on by
looking at the unique serial number for the device on the back of the device's Welcome card.
c. Select the COM port that should be configured for RealPort. The first available port
displays by default.
d. Click Submit. A series of progress messages displays.
e. When the configuration is complete, a message displays.
5. On the main menu, click System > Administration > Firmware Update.
6. For Version:, select the most recent version of the device firmware.
7. Click Update Firmware.
Note Before you begin, make sure a terminal emulator is installed on your laptop.
1. Insert the loopback plug into one of the serial ports on the Connect EZ 16/32.
Optional actions
The actions below are optional set-up items.
Action Description
Power supply If desired, you can order an additional power supply unit and install it. This
unit enables you to have two power supplies for one device.
n EZPS-AC: Connect EZ 16/32 power supply kit, port-side intake. The thumb
screws used to connect the items to the Connect EZ are red.
See Install an additional power supply unit.
Cellular If you want to use a cellular connection to the Connect EZ 16/32, you can
connection connect the Digi CORE module and cellular antennas to the Connect EZ
hardware.
See Create a cellular connection using the CORE module.
Mount the You can mount the device on a rack.
device See Mount the Connect EZ 16/32 on a rack.
Connect to Digi Connect to Digi Remote Manger to remotely manage a large number of devices.
Remote See Central management.
Manager
AnywhereUSB Your Connect EZ 16/32 includes two USB ports, which act as an AnywhereUSB 2
ports Plus Hub. The USB ports can only be used in conjunction with the
AnywhereUSB Manager, which must be installed separately.
See AnywhereUSB 2 Plus USB ports on a Connect EZ 16/32.
Equipment Description
Connect EZ
16
Connect EZ
32
Note This image is of Connect EZ 32. The Connect EZ 16 has a blank panel covering
the top row of serial ports.
Equipment Description
Loopback RJ45M serial loopback cable is included for use with testing.
cable
Device label A label sticker that includes information about the device is attached to the
sticker Welcome card. You should retain this label sticker and card with your hardware
records. For more information about the label, see Device label sticker sample.
Note This label includes the unique default password for the device. This unique
password will be needed if the device is factory reset and you want to access the
web UI on the device.
Equipment Description
Power cord A national mains power cord. Depending on the device variant ordered, a power
cord may be supplied. At least one is required to power the device. If your device is
dual-powered, a second power cord is recommended.
For ACpower supplies: Use an appropriate power cable meeting national standards
to connect to a standard outlet.
n EU/International: VDE Mark, conforming to IEC60083, IEC60227, or IEC
60320, with C13 to the appropriate national mains connector rated for 16A at
250V.
n USA/Canada: URor UL Mark, conforming to UL 62, UL 817, or CSA-C22.2, with
C13 to 5-15P, or NEMA locking connector rated for 10A at 125V.
For information about connecting the power supply, see Power the Connect EZ
16/32.
Equipment Description
Power Each Connect EZ 16/32 has one power supply installed by default. You can order a
supply unit dual-powered device with two power supplies installed by default, or you can
purchase a second power supply unit and install it.
n EZPS-AC: Connect EZ 16/32 power supply unit, port-side intake. The thumb
screws used to connect the items to the Connect EZ are red.
See Install an additional power supply unit.
Equipment Description
CORE module
SIM card An activated SIM card provided by your cellular network operator. You can insert
up to two SIM cards in the CORE module. See Create a cellular connection using
the CORE module.
The CORE module supports the standard mini-SIM cards (2FF).
LTE Antenna Up to two LTE antennas can be attached. See Create a cellular connection using
(2) the CORE module.
3 USB 3.0 1 The two USB ports act as an AnywhereUSB 2 Plus Hub. The USB ports can
USB 3.0 2 only be used in conjunction with the AnywhereUSB Manager, which
must be installed separately.
You can use the Manager connect to and monitor the devices connected
to the USB ports. You can configure the AnywhereUSB service and
Manager from the Connect EZ 16/32 web UI.
See AnywhereUSB 2 Plus USB ports on a Connect EZ 16/32.
4 SFP+ 1 Connect an SFP+ transceiver module for fiber connection, such as Finisar
SFP+ 2 Network FTLX8574D3BCL SFP+.
Note This is available on all models except for the Connect EZ 8 model
(EZ08-A100).
Note Connect EZ 16/32 can support both a copper port and and an SFP+
port at the same time. If an SFP+ port is enabled, the SFP+ port LED will
illuminate if an SPF+ transceiver is installed, regardless of whether the
optical/fiber cable is connected end-to-end.
5 ETH 1 Use the ETH 1 port to connect the device to your local network using an
Ethernet cable. See Connect to site network using an Ethernet LAN.
The ETH 1 LED shows the status of the connection.
n Yellow (right): There is activity on the port.
n Green (left): The port is in use.
5 ETH 2 Use the ETH 2 port to connect to a second Ethernet port. This is useful
for redundancy or if you have more than one network.
The ETH 2 LED shows the status of the connection.
n Yellow (right): There is activity on the port.
n Green (left): The port is in use.
6 Serial Use the serial ports to connect to devices and equipment to the Connect
ports 1-16 EZ 16/32. See Connect equipment to the Connect EZ serial port.
OR The serial port LED shows the status of the connection.
1-32
n Yellow (right): The port is in use. The LED may be solid or blink,
7 Fan1 LED The LED shows the status of Fan1 that is included with PSU1, which is on
the right side of the back of the device.
Solid green: The fan is running within normal range of use.
Solid red: The fan slows down or the device is overheating.
7 Fan2 LED The LED shows the status of Fan2 that is included with PSU2, which is on
the lft side of the back of the device.
n Solid green: The fan is running within normal range of use.
n Solid red: The fan slows down or the device is overheating.
7 Sys. Fan The LED shows the status of Sys. Fan, which is the fan on the back of the
LED device that is not associated with a PSU (power supply unit).
n Solid green: The fan is running within normal range of use.
n Solid red: The fan slows down or the device is overheating.
8 PSU1 LED The LED shows the status of power supply and fan unit on the left. This
power supply and fan unit is factory-installed.
n Solid blue: The device is powered on.
n Solid red: The device is not powered or the supply has failed.
8 PSU2 LED The LED shows the status of power supply and fan unit on the right. This
8 User LED LED used for the Find Me feature. When this feature is activated, the LED
blinks orange and then green.
Back panel
2 WWAN1 Attach cellular antennas if the CORE module is used to complete a cellular
WWAN2 connection. The antenna mounts are covered with a black button that can be
removed.
See Create a cellular connection using the CORE module.
4 Reset Press the Reset button to reset the device to the factory default settings. See
Use the RESET button to reset your device to the factory defaults.
1. Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
2. On the menu, click System > Device Configuration. The Configuration window appears.
For more detailed information about this process, see Change the default password for the admin
user.
Note As an alternative, you can also use an Ethernet LAN connection. See Connect to site network
using an Ethernet LAN.
Prerequisites
n Activated SIM card from your cellular network provider.
n Digi CORE module. This is purchased separately.
To connect the hardware and connect to the cellular network:
1. Make sure that your device is powered down before removing or installing the module.
CORE modules are not hot-swappable.
2. Insert your activated SIM card into the CORE module. The notched end of SIM card should be
inserted first, with the gold metal contacts facing down. You will hear a click once the SIM is
completely inserted.
Note If one SIM card is being used, insert the SIM card into the SIM 1 slot.
Note If you do not have a DHCP server on your network, you can connect locally over 192.168.210.1.
See Using the local web interface.
Note Before you begin, make sure a terminal emulator is installed on your laptop and you have a
serial cable.
1. Connect one end of a serial cable to a serial port on the Connect EZ 16/32.
1 RI TxD- TxD-
2 1 DSR(DCD*) RxD- RxD-
*When Altpin is enabled
1. Place the device on the rack and line up the oval holes on the pre-attached ear with your rack.
2. Using the screws recommended by your rack installation guide, attach the device to the rack.
Carefully tighten the screws so that the device is firmly attached to your mounting rack.
2. Connect the power cord to at least one power supply. The power supply on the right is
available by default.
3. Plug the other end of the power cord to a main power supply.
4. If your device is dual-powered, repeat the process for the second power supply.
3. Orient the power supply unit so that the exhaust is on the left and the power point is on the
right.
4. Insert the unit into the slot on the left side of the device.
5. Turn the red thumb screws to securely attach the unit to the device case.
Note While the settings are reset, the device's firmware version remains the same.
1. Make sure that the Connect EZ has been powered on for at least 30 seconds.
2. Locate the RESET button on the back of the device.
3. Using a pinhole tool, press and hold the RESET button. The RESET button has the following
modes:
n Configuration reset:
l Press and release the RESET button for 10 seconds.
l The device reboots automatically and resets to factory defaults. This does not
remove any automatically generated certificates and keys.
n Full device reset:
l After the device reboots from the first button press, immediately press and release
the RESET button for 10 seconds again.
l The device reboots again and resets to factory defaults, as well as also removing
generated certificates and keys.
1. To ensure that your computer and device are connected to each other and your local network,
make the following connections:
n Connect the device to your computer with an Ethernet cable.
n Connect the device to your local network with an Ethernet cable.
n Connect your computer to your local network with an Ethernet cable.
2. Download and install the Digi Navigator.
3. Launch the Digi Navigator.
4. The tool discovers the Connect EZ 16/32 devices that are powered on and connected to your
network. When the process is complete, a list of the devices appears.
n Connected to a network: By default, the HTTPS service is enabled and used to find an
IP address for the Connect EZ 16/32. Other services can be enabled if needed from the
Filters section. See Services used to discover a device when connected to a network.
n Connected directly to a device or on a network with no DHCP server: In either of
these situations, a Setup IP address is assigned to the device. You can specify the filters
used to assign an IP address. See Use the autodiscovery protocol to discover a device
and Assign a generic IP address to the device.
5. Expand a device to display the IP address.
Prerequisites
n An Ethernet cable must be connected to the device and your network.
n A power supply must be connected to the device and the device powered on.
n Determine the IP address that you want to assign to the device.
To configure your laptop and assign an IP address:
3. Click Properties. The Internet Protocol Version 4 (TCP/IPv4) Properties dialog appears.
4. Select Use the following IP address.
Note IMPORTANT: Make note of the current IP address entries for IP address, Subnet mask,
and Default gateway. You will need this information to complete the final step of the process.
6. Click OK.
7. Open a browser window.
8. Enter the default gateway IP address: 192.168.210.1
9. Log into the device using the default user name and password. The default user name is admin
and the default password is the unique password printed on the label packaged with your
device. For more detailed instructions, see Connect to the local Web UI on the Connect EZ.
10. Update the IP address for the device.
11. On your PC, revert the IP address information to the original entries.
a. Return to the Internet Protocol Version 4 (TCP/IPv4) Properties dialog.
b. Enter the original IP address entries for IP address, Subnet mask, and Default gateway.
c. Click OK.
Note You can also use the Digi Navigator to access the web UI and configure the device. See Access
the web UI from the Digi Navigator.
1. Make sure that an Ethernet cable is connected to the Connect EZ 16/32's ETH 1 port and to a
laptop or PC.
2. Open a browser and enter the IP address for the device.
3. Log into the device using the default user name and password. The default user name is admin
and the default password is the unique password printed on the label packaged with your
device.
4. After logging in, the local web admin dashboard is displayed.
The dashboard shows the current state of the device.
Dashboard
area Description
Network Summarizes network statistics: the total number of bytes sent and received over all
activity configured bridges and Ethernet devices.
Digi Remote Displays the device connection status for Digi Remote Manager, the amount of time
Manager the connection has been up, and the Digi Remote Manager device ID.
See Using Digi Remote Manager.
Device Displays the Connect EZ 16/32 device's status, statistics, and identifying information.
Network Displays the status of the network interfaces configured on the device.
Interfaces
Item Description
1 QR code Scan the QR code to display a semicolon separated list of:
ProductName;DeviceID;Password;SerialNumber;SKUPartNumber
SKUPartRevision
Item Description
2 Label part Label part number and revision level.
number
3 Product name Product name, such as Connect EZ Mini, Connect EZ 2, or Connect EZ 8.
4 Device part Device part number (SKU number) and revision. For example, EZ02-C000 A
number (SKU)
and revision
5 Password The unique default password for the device. This unique default password
will be needed if the device is factory reset and you want to access the web
UI on the device.
Local WebUI
1. Log into the Connect EZ 16/32 WebUI as a user with Admin access.
2. On the menu, click System > Device Configuration.
Preconfigured
Interface type interfaces Devices Default configuration
Wide Area Networks (WANs) n Modem n WWAN1 n Firewall zone: External
cellular n WAN priority: Metric=3
modem n SIM failover after 5
attempts
Ethernet Network n ETH1 n Ethernet: n Firewall zone: Edge
ETH1 n DHCP client enabled
n ETH2 n Ethernet: n Firewall zone: Edge
ETH2 n DHCP client enabled
n Loopback n Ethernet: n Firewall zone:
Loopback Loopback
n IP address: 127.0.0.1/8
n Setup IP n Ethernet: n Firewall zone: Setup
ETH1 n IP address
192.168.210.1/24
n Setup Link- n Ethernet: n Firewall zone: Setup
local IP ETH1 n IP address
169.254.100.100/16
Feature Configuration
Central n Digi Remote Manager enabled as the central management service.
management
Security policies n Packet filtering allows all outbound traffic.
n SSH and web administration:
l Enabled for local administration
l Firewall zone: Set up
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
4. Enter a new password for the admin user.The password must be at least eight characters long
and must contain at least one uppercase letter, one lowercase letter, one number, and one
special character.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Set a new password for the admin user. The password must be at least eight characters long
and must contain at least one uppercase letter, one lowercase letter, one number, and one
special character.
(config)> save
Configuration saved.
>
Configuration methods
There are two primary methods for configuring your Connect EZ 16/32 device:
n Web interface.
The web interface can be accessed in two ways:
l Central management using the Digi Remote Manager, a cloud-based device management
and data enablement platform that allows you to connect any device to any application,
anywhere. With the Remote Manager, you can configure your Connect EZ 16/32 device and
use the configuration as a basis for a Remote Manager configuration which can be applied
to other similar devices. See Central management for more information about using the
Remote Manager to manage and configure your Connect EZ 16/32 device.
l The local web interface. See Using the local web interface for more information about
using the local web interface to manage and configure your Connect EZ 16/32 device.
Note Changes made to the device's configuration by using the local web interface will not
be automatically reflected in Digi Remote Manager. You must manually refresh Remote
Manager for the changes to be displayed.
Web-based instructions in this guide are applicable to both the Remote Manager and the local
web interface.
n Command line.
A robust command line allows you to perform all configuration and management tasks from
within a command shell. Both the Remote Manager and the local web interface also have the
option to open a terminal emulator for executing commands on your Connect EZ 16/32 device.
See Using the command line for more information about using the command line to manage
and configure your Connect EZ 16/32 device.
In this guide, task topics show how to perform tasks:
Web
Shows how to perform a task by using the local web interface.
Command line
Shows how to perform a task by using the command line interface.
1. If you have not already done so, go to https://myaccount.digi.com/ to sign up for a Digi
Remote Manager account.
2. Check your email for Digi Remote Manager login instructions.
3. Go to remotemanager.digi.com.
4. Enter your user name and password. The Digi Remote Manager Dashboard appears.
1. Use an Ethernet cable to connect the Connect EZ 16/32's ETH2 port to a laptop or PC.
2. Open a browser and go to 192.168.2.1.
3. Log into the device using a configured user name and password.
The default user name is admin and the default password is the unique password printed on
the label packaged with your device.
Use the local REST API to configure the Connect EZ 16/32 device
Your Connect EZ 16/32 device includes a REST API that can be used to return information about the
device's configuration and to make modifications to the configuration. You can view the REST API
specification from your web browser by opening the URL:
https://ip-address/cgi-bin/config.cgi
For example:
https://192.168.210.1/cgi-bin/config.cgi
where:
n ip-address is the IP address of the Connect EZ 16/32 device.
n path is the path location in the configuration for the information being returned.
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access
selection menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
(config)> ?
auth Authentication
cloud Central management
firewall Firewall
monitoring Monitoring
network Network
serial Serial
service Services
system System
vpn VPN
(config)>
The allowed values for path are listed in the first (left) column.
4. To determine further allowed path location values by using the ? (question mark) with
the path name:
(config> service ?
Services
Additional Configuration
-------------------------------------------------------------------
------------
dns DNS
iperf IPerf
location Location
mdns Service Discovery (mDNS)
modbus_gateway Modbus Gateway
multicast Multicast
ntp NTP
ping Ping responder
snmp SNMP
ssh SSH
telnet Telnet
web_admin Web administration
(config)> service
You can also use the GET method to return the configuration parameters associated with an item:
where:
n path is the path to the configuration parameter, in dot notation (for example,
ssh.service.enable).
n new_value is the new value for the parameter.
For example, to disable the ssh service using curl:
where path is the path to the list item, including the list number, in dot notation (for example,
service.ssh.acl.zone.4).
For example, to remove the external firewall zone to the ssh service:
1. Use the GET method to determine the SSH service's list number for the external zone:
"result": {
"type": "array",
"path": "service.ssh.acl.zone"
, "collapsed": {
"0": "internal"
,
"1": "edge"
,
"2": "ipsec"
,
"3": "setup"
,
"4": "external"
}
}
}
$
2. Use the DELETE method to remove the external zone (list item 4).
Note You can also access the terminal screen from a port listed in the Serial Status page.
Connecting to port5:
Settings: 9600, 8, 1, none, none
Type '~b.' to disconnect from port
Type '~b?' to list commands
Command Description
~b. Disconnect from the port.
Command Description
~bB Send a BREAK sequence.
~bc Clear the history buffer.
~br Send a DTRreset sequence.
~b? Display a list of commands.
Command line
1. Connect to the Connect EZ 16/32 device by using a serial connection, SSH or telnet, or the
Terminal in the WebUI or the Console in the Digi Remote Manager. See Access the command
line interface for more information.
n For serial connections, the default configuration is:
l 115200 baud rate
l 8 data bits
l no parity
l 1 stop bit
l no flow control
n For SSH and telnet connections, the Setup IP address of the device is 192.168.2.1 on
the .
2. At the login prompt, enter the username and password of a user with Admin access:
login: admin
Password: **********
The default username is admin. The default unique password for your device is printed on the
device label.
3. Depending on the device configuration, you may be presented with another menu, for
example:
a: Admin CLI
q: Quit
Connecting now...
Press Tab to autocomplete commands
Press '?' for a list of commands and details
Type 'help' for details on navigating the CLI
Type 'exit' to disconnect from the Admin CLI
>
See Command line interface for detailed instructions on using the command line interface.
Command line
1. At the command prompt, type exit.
> exit
2. Depending on the device configuration, you may be presented with another menu, for
example:
a: Admin CLI
q: Quit
You can modify configuration settings for the existing WAN and WWANs, and you can create new WANs
and WWANs.
This section contains the following topics:
Wide Area Networks (WANs) and Wireless Wide Area Networks (WWANs) 62
Configure WAN/WWAN priority and default route metrics 62
WAN/WWAN failover 65
Configure SureLink active recovery to detect WAN/WWAN failures 66
Configure the device to reboot when a failure is detected 82
Disable SureLink 95
Example: Use a ping test for WAN failover from Ethernet to cellular 104
Using Ethernet devices in a WAN 106
Using cellular modems in a Wireless WAN (WWAN) 106
Configure a Wide Area Network (WAN) 131
Configure a Wireless Wide Area Network (WWAN) 139
Show WAN and WWAN status and statistics 150
Delete a WAN or WWAN 152
Default outbound WAN/WWAN ports 153
Example: Configure cellular connection as the primary WAN, and the Ethernet
connection as backup
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
(config)> save
Configuration saved.
>
WAN/WWAN failover
If a connection to a WAN interface is lost for any reason, the Connect EZ 16/32 device will immediately
fail over to the next WAN or WWAN interface, based on WAN priority. See Configure WAN/WWAN
priority and default route metrics for more information about WAN priority.
Note If your device is operating on a private APN or on wired network with firewall restrictions,
ensure that the DNS servers on your private network allow DNS lookups for
https://remotemanager.digi.com; otherwise, the SureLink DNS query test will fail and the
Connect EZ 16/32 device will determine that the interface is down.
By default, these tests will be performed every 15 minutes, with a response timeout of 15 seconds. If
the tests fail three consecutive times, the device will reset the network interface to attempt to recover
the connection.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
By default, SureLink is enabled for the preconfigured WAN (ETH1) and WWAN (Modem). The
default configuration tests the DNS servers configured for the interface.
When SureLink is configured for Wireless WANs, SureLink tests are only run if the cellular
modem is connected and has an IP address. Use the SIM failover options to configure the
Connect EZ 16/32 device to automatically recover the modem in the event that it cannot
obtain an IP address. See Configure a Wireless Wide Area Network (WWAN) for details about
SIM failover.
6. (Optional) Change the Test interval between connectivity tests.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}.
For example, to set Interval to ten minutes, enter 10m or 600s.
The default is 15 minutes.
7. (Optional) If more than one test target is configured, for Success condition, select either:
n One test passes: Only one test needs to pass for Surelink to consider an interface to be
up.
n All test pass: All tests need to pass for SureLink to consider the interface to be up.
8. (Optional) For Pass threshold, type or select the number of times that the test must pass after
failure, before the interface is determined to be working and is reinstated.
9. (Optional) For Response timeout, type the amount of time that the device should wait for a
response to a test failure before considering it to have failed.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}.
For example, to set Response timeout to ten minutes, enter 10m or 600s.
The default is 15 seconds.
10. Click to expand Tests.
By default, Test DNS servers configured for this interface is automatically configured and
enabled. This test communication with DNS servers that are either provided by DHCP, or
statically configured for this interface.
a. Click .
New tests are enabled by default. To disable, click to toggle off Enable.
b. Type a Label for the test.
c. Click to toggle on IPv6 if the test should apply to both IPv6 rather than IPv4.
d. Select the Test type.
Available test types:
n Ping test: Uses ICMP to determine connectivity.
If Ping test is selected, complete the following:
l Ping target: The type of target for the ping, one of:
o Hostname or IP address of an external server.
o Ping host: hostname or IP address of the server.
o The Interface gateway. If Interface gateway is selected, an initial
traceroute is sent to the hostname or IP address configured in the SureLink
advanced settings, and then the first hop in that route is used for the ping
test.
o The Interface address.
o The Interface DNS server.
l Ping payload size: The number of bytes to send as part of the ping payload.
n DNS test: Performs a DNS query to the named DNS server.
If DNS test is selected, complete the following:
l DNS server: The IP address of the DNS server.
n HTTP test: Uses HTTP(s) GET requests to determine connectivity to the configured
web server.
If HTTP test is selected, complete the following:
l Web server: The URL of the web server.
n Test DNS servers configured for this interface: Tests communication with DNS
servers that are either provided by DHCP, or statically configured for this interface.
n Test the interface status: Tests the current status of the interface. The test fails if
the interface is down. Failing this test infers that all other tests fail.
b. Click .
New recovery actions are enabled by default. To disable, click to toggle off Enable.
c. Type a Label for the recovery action.
d. For Recovery type, select Reboot device.
e. For Recovery type, select the type of recovery action. If multiple recovery actions are
configured, they are performed in the order that they are listed.
n Change default gateway: Increases the interface's metric to change the default
gateway.
If Change default gateway is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l Increase metric to change active default gateway: Increase the interface's
metric by this amount. This should be set to a number large enough to change
the routing table to use another default gateway. The default is 100.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
n Restart interface.
If Restart interface is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
n Reset modem: This recovery action is available for WWAN interfaces only.
If Reset modem is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
n Switch to alternate SIM: Switches to an alternate SIM. This recovery action is
available for WWAN interfaces only.
If Switch to alternate SIM is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
n Reboot device.
If Reboot device is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
n Execute custom Recovery commands.
If Recovery commands is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l The Commands to run to recovery connectivity.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
n Powercycle the modem. This recovery action is available for WWAN interfaces
only.
If Powercycle the modem is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
f. Repeat for each additional recovery action.
12. (Optional) Configure advanced SureLink parameters:
a. Click to expand Advanced settings.
b. For Delayed Start, type the amount of time to wait while the device is starting before
SureLink testing begins. This setting is bypassed when the interface is determined to be
up.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}.
For example, to set Delayed start to ten minutes, enter 10m or 600s.
The default is 300 seconds.
c. For Backoff interval, type the time to add to the test interval when restarting the list of
actions. This option is capped at 15 minutes.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}.
For example, to set Backoff interval to ten minutes, enter 10m or 600s.
The default is 300 seconds.
d. Test interface gateway by pinging is used by the Interface gateway Ping test as the
endpoint for traceroute to use to determine the interface gateway. The default is 8.8.8.8,
and should only be changed if this IP address is not accessible due to networking issues.
13. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
4. Enable SureLink.
By default, SureLink is enabled for the preconfigured WAN (eth1) and WWAN (modemwwan2).
The default configuration tests the DNS servers configured for the interface.
When SureLink is configured for Wireless WANs, SureLink tests are only run if the cellular
modem is connected and has an IP address. Use the SIM failover options to configure the
Connect EZ 16/32 device to automatically recover the modem in the event that it cannot
obtain an IP address. See Configure a Wireless Wide Area Network (WWAN) for details about
SIM failover.
5. By default, the Test DNS servers configured for this interface test is automatically
configured and enabled. This tests communication with DNS servers that are either provided
by DHCP, or statically configured for this interface.
To add additional tests:
a. Add a test:
d. if the test should apply to both IPv6 rather than IPv4, enable IPv6:
n http: Uses HTTP(s) GET requests to determine connectivity to the configured web
server.
If http is set, set the URL of the web server.
n dns_configured: Tests communication with DNS servers that are either provided
by DHCP, or statically configured for this interface.
n interface_up: Tests the current status of the interface. The test fails if the interface
is down. Failing this test infers that all other tests fail.
If interface_up is set, complete the following:
l Set the amount of time that the interface is down before the test can be
considered to have failed.
where value is any number of weeks, days, hours, minutes, or seconds, and
takes the format number{w|d|h|m|s}.
For example, to set interface_down_time to ten minutes, enter either 10m or
600s:
l Set the amount of time to wait for the interface to connect for the first time
before the test is considered to have failed.
where value is any number of weeks, days, hours, minutes, or seconds, and
takes the format number{w|d|h|m|s}.
For example, to set interface_timeout to ten minutes, enter either 10m or
600s:
n tcp_connection: Tests that the interface can reach a destination port on the
configured host.
If tcp_connection is selected, complete the following:
l Set the hostname or IP address of the host to create a TCP connection to:
o up: The test will pass only if the referenced interface is up and passing its
own SureLink tests (if applicable).
o down: The test will pass only if the referenced interface is down or failing its
own SureLink tests (if applicable).
f. Repeat for each additional test.
6. Add recovery actions:
a. Type ... to return to the root of the configuration:
e. Set the type of recovery action. If multiple recovery actions are configured, they are
performed in the order that they are listed. The command varies depending on whether
the interface is a WAN or WWAN:
n WAN interfaces:
n WWAN interfaces:
The default is 3.
l Set the amount that the interface's metric should be increased. This should be
set to a number large enough to change the routing table to use another
default gateway.
n restart_interface.
If restart_interface is selected, complete the following:
l Set the number of failures for this recovery action to perform, before moving to
the next recovery action:
The default is 3.
l Set the time to wait before the next test is run. If set to the default value of 0s,
the test interval is used.
The default is 3.
l Set the time to wait before the next test is run. If set to the default value of 0s,
the test interval is used.
The default is 3.
l Set the time to wait before the next test is run. If set to the default value of 0s,
the test interval is used.
The default is 3.
l Set the time to wait before the next test is run. If set to the default value of 0s,
the test interval is used.
n reboot_device.
If reboot_device is selected, complete the following:
l Set the number of failures for this recovery action to perform, before moving to
the next recovery action:
The default is 3.
l Set the time to wait before the next test is run. If set to the default value of 0s,
the test interval is used.
The default is 3.
l Set the commands to run to attempt to recovery connectivity.
l Set the time to wait before the next test is run. If set to the default value of 0s,
the test interval is used.
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set interval to ten minutes, enter either 10m or 600s:
The default is 1.
e. Set the amount of time that the device should wait for a response to a test failure before
considering it to have failed:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set timeout to ten minutes, enter either 10m or 600s:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set delayed_start to ten minutes, enter either 10m or 600s:
g. Set the time to add to the test interval when restarting the list of actions. This option is
capped at 15 minutes.
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set backoff_interval to ten minutes, enter either 10m or 600s:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
By default, SureLink is enabled for the preconfigured WAN (ETH1) and WWAN (Modem). The
default configuration tests the DNS servers configured for the interface.
When SureLink is configured for Wireless WANs, SureLink tests are only run if the cellular
modem is connected and has an IP address. Use the SIM failover options to configure the
Connect EZ 16/32 device to automatically recover the modem in the event that it cannot
obtain an IP address. See Configure a Wireless Wide Area Network (WWAN) for details about
SIM failover.
6. (Optional) Change the Test interval between connectivity tests.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}.
For example, to set Interval to ten minutes, enter 10m or 600s.
The default is 15 minutes.
7. (Optional) If more than one test target is configured, for Success condition, select either:
n One test passes: Only one test needs to pass for Surelink to consider an interface to be
up.
n All test pass: All tests need to pass for SureLink to consider the interface to be up.
8. (Optional) For Pass threshold, type or select the number of times that the test must pass after
failure, before the interface is determined to be working and is reinstated.
9. (Optional) For Response timeout, type the amount of time that the device should wait for a
response to a test failure before considering it to have failed.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}.
For example, to set Response timeout to ten minutes, enter 10m or 600s.
The default is 15 seconds.
10. Click to expand Tests.
By default, Test DNS servers configured for this interface is automatically configured and
enabled. This test communication with DNS servers that are either provided by DHCP, or
statically configured for this interface.
a. Click .
New tests are enabled by default. To disable, click to toggle off Enable.
b. Type a Label for the test.
c. Click to toggle on IPv6 if the test should apply to both IPv6 rather than IPv4.
d. Select the Test type.
Available test types:
n Ping test: Uses ICMP to determine connectivity.
If Ping test is selected, complete the following:
l Ping target: The type of target for the ping, one of:
o Hostname or IP address of an external server.
o Ping host: hostname or IP address of the server.
o The Interface gateway. If Interface gateway is selected, an initial
traceroute is sent to the hostname or IP address configured in the SureLink
advanced settings, and then the first hop in that route is used for the ping
test.
o The Interface address.
o The Interface DNS server.
l Ping payload size: The number of bytes to send as part of the ping payload.
n DNS test: Performs a DNS query to the named DNS server.
If DNS test is selected, complete the following:
l DNS server: The IP address of the DNS server.
n HTTP test: Uses HTTP(s) GET requests to determine connectivity to the configured
web server.
If HTTP test is selected, complete the following:
l Web server: The URL of the web server.
n Test DNS servers configured for this interface: Tests communication with DNS
servers that are either provided by DHCP, or statically configured for this interface.
n Test the interface status: Tests the current status of the interface. The test fails if
the interface is down. Failing this test infers that all other tests fail.
If Test the interface status is selected, complete the following:
l Down time: The amount of time that the interface is down before the test can
be considered to have failed.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and
take the format number{w|d|h|m|s}.
For example, to set Down time to ten minutes, enter 10m or 600s.
l Initial connection time: The amount of time to wait for the interface to
connect for the first time before the test is considered to have failed.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and
take the format number{w|d|h|m|s}.
For example, to set Initial connection time to ten minutes, enter 10m or 600s.
n Custom test: Tests the interface with custom commands.
If Custom test is selected, complete the following:
l The Commands to run to test.
n TCP connection test: Tests that the interface can reach a destination port on the
configured host.
If TCP connection test is selected, complete the following:
l TCP connect host: The hostname or IP address of the host to create a
TCP connection to.
l TCP connect port: The TCP port to create a TCP connection to.
n Test another interface's status: Tests the status of another interface.
If Test another interface's status is selected, complete the following:
l Test interface: The interface to test.
l IP version: The type of IP connection, one of:
o Any: Either the IPv4 or IPv6 connection must be up.
o Both: Both the IPv4 or IPv6 connection must be up.
o IPv4: The IPv4 connection must be up.
o IPv6: The IPv6 connection must be up.
l Expected status: The status required for the test to past.
o Up: The test will pass only if the referenced interface is up and passing its
own SureLink tests (if applicable).
o Down: The test will pass only if the referenced interface is down or failing its
own SureLink tests (if applicable).
e. Repeat for each additional test.
11. Add recovery actions:
a. Click to expand Recovery actions.
By default, there are two preconfigured recovery actions:
n Update routing: Uses the Change default gateway action, which increases the
interface's metric by 100 to change the default gateway.
n Restart interface.
b. Click .
New recovery actions are enabled by default. To disable, click to toggle off Enable.
c. Type a Label for the recovery action.
d. For Recovery type, select Reboot device.
e. For Recovery type, select the type of recovery action. If multiple recovery actions are
configured, they are performed in the order that they are listed.
n Change default gateway: Increases the interface's metric to change the default
gateway.
If Change default gateway is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l Increase metric to change active default gateway: Increase the interface's
metric by this amount. This should be set to a number large enough to change
the routing table to use another default gateway. The default is 100.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
n Restart interface.
If Restart interface is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
n Reset modem: This recovery action is available for WWAN interfaces only.
If Reset modem is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
n Switch to alternate SIM: Switches to an alternate SIM. This recovery action is
available for WWAN interfaces only.
If Switch to alternate SIM is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
n Reboot device.
If Reboot device is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
> config
(config)>
4. Enable SureLink.
By default, SureLink is enabled for the preconfigured WAN (eth1) and WWAN (modemwwan2).
The default configuration tests the DNS servers configured for the interface.
When SureLink is configured for Wireless WANs, SureLink tests are only run if the cellular
modem is connected and has an IP address. Use the SIM failover options to configure the
Connect EZ 16/32 device to automatically recover the modem in the event that it cannot
obtain an IP address. See Configure a Wireless Wide Area Network (WWAN) for details about
SIM failover.
5. By default, the Test DNS servers configured for this interface test is automatically
configured and enabled. This tests communication with DNS servers that are either provided
by DHCP, or statically configured for this interface.
To add additional tests:
a. Add a test:
d. if the test should apply to both IPv6 rather than IPv4, enable IPv6:
n http: Uses HTTP(s) GET requests to determine connectivity to the configured web
server.
If http is set, set the URL of the web server.
n dns_configured: Tests communication with DNS servers that are either provided
by DHCP, or statically configured for this interface.
n interface_up: Tests the current status of the interface. The test fails if the interface
is down. Failing this test infers that all other tests fail.
If interface_up is set, complete the following:
l Set the amount of time that the interface is down before the test can be
considered to have failed.
where value is any number of weeks, days, hours, minutes, or seconds, and
takes the format number{w|d|h|m|s}.
For example, to set interface_down_time to ten minutes, enter either 10m or
600s:
l Set the amount of time to wait for the interface to connect for the first time
before the test is considered to have failed.
where value is any number of weeks, days, hours, minutes, or seconds, and
takes the format number{w|d|h|m|s}.
For example, to set interface_timeout to ten minutes, enter either 10m or
600s:
n tcp_connection: Tests that the interface can reach a destination port on the
configured host.
If tcp_connection is selected, complete the following:
l Set the hostname or IP address of the host to create a TCP connection to:
n Set the number of failures for this recovery action to perform, before moving to the
next recovery action:
The default is 3.
n Set the time to wait before the next test is run. If set to the default value of 0s, the
test interval is used.
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set interval to ten minutes, enter either 10m or 600s:
The default is 1.
e. Set the amount of time that the device should wait for a response to a test failure before
considering it to have failed:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set timeout to ten minutes, enter either 10m or 600s:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set delayed_start to ten minutes, enter either 10m or 600s:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set backoff_interval to ten minutes, enter either 10m or 600s:
Disable SureLink
If your device uses a private APN with no Internet access or has a restricted WAN connection that
doesn't allow DNS resolution, you can disable SureLink connectivity tests. You can also reconfigure
SureLink to disable the DNS test and use one or more other tests.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Change to the WAN or WWAN's node in the configuration schema. For example, to disable
SureLink for the Modem interface:
4. Disable SureLink:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
n HTTP test: Uses HTTP(s) GET requests to determine connectivity to the configured web
server.
If HTTP test is selected, complete the following:
l Web server: The URL of the web server.
n Test DNS servers configured for this interface: Tests communication with DNS
servers that are either provided by DHCP, or statically configured for this interface.
n Test the interface status: Tests the current status of the interface. The test fails if the
interface is down. Failing this test infers that all other tests fail.
If Test the interface status is selected, complete the following:
l Down time: The amount of time that the interface is down before the test can be
considered to have failed.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and
take the format number{w|d|h|m|s}.
For example, to set Down time to ten minutes, enter 10m or 600s.
l Initial connection time: The amount of time to wait for the interface to connect for
the first time before the test is considered to have failed.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and
take the format number{w|d|h|m|s}.
For example, to set Initial connection time to ten minutes, enter 10m or 600s.
n Custom test: Tests the interface with custom commands.
If Custom test is selected, complete the following:
l The Commands to run to test.
n TCP connection test: Tests that the interface can reach a destination port on the
configured host.
If TCP connection test is selected, complete the following:
l TCP connect host: The hostname or IP address of the host to create a
TCP connection to.
l TCP connect port: The TCP port to create a TCP connection to.
n Test another interface's status: Tests the status of another interface.
If Test another interface's status is selected, complete the following:
l Test interface: The interface to test.
l IP version: The type of IP connection, one of:
o Any: Either the IPv4 or IPv6 connection must be up.
o Both: Both the IPv4 or IPv6 connection must be up.
o IPv4: The IPv4 connection must be up.
o IPv6: The IPv6 connection must be up.
l Expected status: The status required for the test to past.
o Up: The test will pass only if the referenced interface is up and passing its own
SureLink tests (if applicable).
o Down: The test will pass only if the referenced interface is down or failing its own
SureLink tests (if applicable).
13. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Change to WAN or WWAN's node in the configuration schema. For example, to disable the
default DNS test for an interface named my_wan:
c. if the test should apply to both IPv6 rather than IPv4, enable IPv6:
n http: Uses HTTP(s) GET requests to determine connectivity to the configured web
server.
If http is set, set the URL of the web server.
n dns_configured: Tests communication with DNS servers that are either provided
by DHCP, or statically configured for this interface.
n interface_up: Tests the current status of the interface. The test fails if the interface
is down. Failing this test infers that all other tests fail.
If interface_up is set, complete the following:
l Set the amount of time that the interface is down before the test can be
considered to have failed.
where value is any number of weeks, days, hours, minutes, or seconds, and
takes the format number{w|d|h|m|s}.
For example, to set interface_down_time to ten minutes, enter either 10m or
600s:
l Set the amount of time to wait for the interface to connect for the first time
before the test is considered to have failed.
where value is any number of weeks, days, hours, minutes, or seconds, and
takes the format number{w|d|h|m|s}.
For example, to set interface_timeout to ten minutes, enter either 10m or
600s:
n tcp_connection: Tests that the interface can reach a destination port on the
configured host.
If tcp_connection is selected, complete the following:
l Set the hostname or IP address of the host to create a TCP connection to:
Example: Use a ping test for WAN failover from Ethernet to cellular
In this example configuration, the ETH1 interface serves as the primary WAN, while the cellular
Modem interface serves as the backup WAN.
In this example configuration, SureLink is used over for the ETH1 interface to send a probe packet of
size 256 bytes to the IP host 43.66.93.111 every 10 seconds. If there are three consecutive failed
responses, the default Update Routing recovery action will increase the metric for the ETH1 interface
by 100, which will cause the Connect EZ 16/32 device to start using the Modem interface as the
default route. It continues to regularly test the connection to ETH1, and when tests on ETH1 succeed,
the device falls back to that interface.
To achieve this WAN failover from the ETH1 to the Modem interface, the WAN failover configuration is:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
4. Repeat the above step for Modem to enable SureLink on that interface.
5. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
c. Add a test:
(config network interface eth1 ipv4 surelink tests 1)> test ping
(config network interface eth1 ipv4 surelink tests 1)>
(config network interface eth1 ipv4 surelink tests 1)> ping_size 256
(config network interface eth1 ipv4 surelink tests 1)>
1. Repeat the above step for the cellular Modem (modem) interface to enable SureLink on that
interface. Note that this will cause the interface to send a ping every 10 seconds, which will
incur data costs.
4. Save the configuration and apply the change.
(config)> save
Configuration saved.
>
using SIM1, it automatically fails over to SIM2. Connect EZ 16/32 devices automatically use the correct
cellular module firmware for each carrier when switching SIMs.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Note For 4G bands, specify the frequency bands you want to include or exclude. By default, all
bands are used. To only use certain bands, separate each band in the list with a space (for
example, B1 B3 B5). To exclude certain bands, separate each band in the list with a space and
precede each band with an exclamation point (for example, !B1 !B5).
CAUTION! Make sure to confirm with your service provider that the bands you want
to include or exclude are accurate. Connection issues may occur if a service provider
changed any of the frequency bands they use for their network and you have set
limitations on the bands to which the Connect EZ 16/32 can connect.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
n none: Does not consider either SIM slot to be the preferred slot.
n 1: Configures the first SIM slot as the preferred SIM slot.
n 2. Configures the second SIM slot as the preferred SIM slot.
In the event of a failover to a non-preferred SIM, or if manual SIM switching is used to switch to
a non-preferred SIM, the modem will attempt to reconnect to the SIM in the preferred SIM slot.
The default is none.
6. To set the preferred SIM slot check schedule:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the format
number{w|d|h|m|s}.
For example, to set query_interval to ten minutes, enter either 10m or 600s:
9. Carrier switching allows the modem to automatically match the carrier for the active SIM.
Carrier switching is enabled by default. To disable:
10. Set the type of cellular technology that this modem should use to access the cellular network:
Available options for value vary depending on the modem type. To determine available
options:
Access technology: The cellular network technology that the modem may
use.
Format:
2G
3G
4G
4GM
4GT
all
Default value: all
Current value: all
(config)>
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
3. Click Network > Interfaces > Modem > APN list > APN.
4. For APN, type the Access Point Name (APN) to be used when connecting to the cellular carrier.
5. (Optional) IP version:
For IP version, select one of the following:
n Automatic: Requests both IPv4 and IPv6 address.
n IPv4: Requests only an IPv4 address.
n IPv6: Requests only an IPv6 address.
The default is Automatic.
6. (Optional)For PDP context index, type the number for the index of the SIM card that the APN
is programmed into or type 0 to have the index set automatically.
7. (Optional) For Authentication method, select one of the following:
n None: No authentication is required.
n Automatic: The device will attempt to connect using CHAP first, and then PAP.
n CHAP: Uses the Challenge Handshake Authentication Profile (CHAP) to authenticate.
n PAP: Uses the Password Authentication Profile (PAP) to authenticate.
If Automatic, CHAP, or PAP is selected, enter the Username and Password required to
authenticate.
The default is None.
8. Lightweight M2M support is enabled by default. Disable if you are using an AT&T SIM that
does not support AT&T lightweight M2M.
9. (Optional) For APN selection, select whether you want to configure the device to use the
preconfigured APNs, custom APNs, or both.
10. To add additional APNs, for Add APN, click and repeat the preceding instructions.
11. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
> config
(config)>
where value is the index number of the SIM that the APN is programmed into. 0 means the
index will be automatically set.
7. (Optional) Set the authentication method:
If auto, chap, or pap is selected, enter the Username and Password required to authenticate:
9. (Optional) To configure the device to use either the preconfigured APNs, custom APNs, or both:
(config)> save
Configuration saved.
>
Note Dual-APN connections with the Telit LE910-NAv2 module when using a Verizon SIM are not
supported. Using an AT&T SIM with the Telit LE910-NAv2 module is supported. The Telit LE910-NAv2
module is used in the 1002-CM04 CORE modem.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
d. Configure whether you want the device to use the preconfigured APNs, custom APNs, or
both. For more information, see Cellular modem APNs.
5. Create the routing policies. For example, to route all traffic from LAN1 through the public APN,
and LAN2 through the private APN:
a. Add a new routing policy:
b. Set the label that will be used to identify this route policy:
(config network route policy 0)> label "Route through public apn"
(config network route policy 0)>
h. Set the label that will be used to identify this route policy:
(config network route policy 1)> label "Route through private apn"
(config network route policy 1)>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Note You can use the modem scan command at the Admin CLI to scan for available carriers
and determine their PLMN ID. See Scan for available cellular carriers for details.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
n manual—The device will only connect to the carrier identified in the Network PLMN ID.
If the carrier is not available, no cellular connection will be established.
n manual_automatic—The device will attempt to connect to the carrier identified in the
Network PLMN ID. If the carrier is not available, the device will fall back to using
automatic carrier selection.
4. If carrier section mode is set to manual or manual_automatic, set the network PLMN ID:
Note You can use the modem scan command at the Admin CLI to scan for available carriers
and determine their PLMN ID. See Scan for available cellular carriers for details.
(config)> save
Configuration saved.
>
Note For devices using Unitac modems (such as devices with the 1002-CM45 core module), carrier
scanning will not work if the modem has an active cellular connection.
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. From the main menu, click Status > Modems.
2. croll to the Connection Status section and click SCAN.
3. (Optional) Change the Timeout for the carrier scan. The default is 300 seconds.
4. When the Carrier Scan window opens, the results of the most recent previous scan are
displayed. If there is no previous scan available, or to refresh the list, click SCAN.
5. The current carrier is highlighted in green. To switch to a different carrier:
a. Highlight the appropriate carrier and click SELECT.
The Carrier selection dialog opens.
Note If Manual is selected, your modem must support the Network technology or
the modem will lose cellular connectivity. If you are using a cellular connection to
perform this procedure, you may lose your connection and the device will no longer
be accessible.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the Admin CLI prompt, type:
>
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the menu, click Status.
2. Under Connections, click Modems.
The modem status window is displayed
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Use the show modem command:
n To view a status summary for the modem:
>
n To view detailed status and statistics, use the show modem name name command:
Status
------
State : connected
Signal Strength : Good (-85 dBm)
Bars : 2/5
Access Mode : 4G
Network Technology (CNTI): LTE
Band : B2
Temperature : 34C
wwan1 Interface
---------------
APN : 1234
IPv4 surelink : passing
IPv4 address : 189.232.229.47
IPv4 gateway : 189.232.229.1
IPv4 MTU : 1500
IPv4 DNS server(s) : 245.144.162.207, 245.144.162.208
TX bytes : 127941
RX bytes : 61026
Uptime : 10 hrs, 56 mins (39360s)
SIM
---
SIM Slot : 1
SIM Status : ready
IMSI : 61582122197895
ICCID : 26587628655003992180
SIM Provider : AT&T
4G
--
RSRQ : Good (-11.0 dB)
RSRP : Good (-93.0 dBm)
RSSI : Excellent (-64.0 dBm)
SNR : Good (6.4 dB)
>
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the Admin CLI prompt, use the modem puk unlock command to set a new PIN for the SIM
card:
For example, to unlock a SIM card in the modem named modem with PUK code 12345678,
and set the new SIM PIN to 1234:
Note If the SIM remains in a locked state after using the unlock command, contact your cellular
carrier.
AT command access
To run AT commands from the Connect EZ 16/32 command line:
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the Admin CLI prompt, type modem at-interactive and press Enter. Type n if you do not
want exclusive access. This allows you to send AT commands to the device while still allowing
the device to connect, disconnect, and/or reconnect to the cellular network.
3. At the Admin CLI prompt, use the modem at-interactive command to begin an interactive AT
command session:
4. Type n if you do not want exclusive access. This allows you to send AT commands to the
device while still allowing the device to connect, disconnect, and/or reconnect to the cellular
network.
The following is an example interactive AT command:
To quit enter '~.' ('~~.' if using an ssh client) and press ENTER
Connected
ati
Manufacturer: Sierra Wireless, Incorporated
Model: MC7455
Revision: SWI9X30C_02.24.03.00 r6978 CARMD-EV-FRMWR2 2017/03/02 13:36:45
MEID: 35907206045169
IMEI: 359072060451693
IMEI SV: 9
FSN: LQ650551070110
+GCAP: +CGSM
OK
Note If the interface name is more than eight characters, the name will be truncated in the
underlying network interface to the first six characters followed by three digits, incrementing
from 000. This affects any custom scripts or firewall rules that may be trying to adjust the
interface or routing table entries.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
n To edit an existing WAN named my_wan, change to the my_wan node in the
configuration schema:
Current value:
See Configure WAN/WWAN priority and default route metrics for further information
about metrics.
ii. Set the relative weight for default routes associated with this interface. For multiple
active interfaces with the same metric, the weight is used to load balance traffic to
the interfaces.
iii. Set the management priority. This determines which interface will have priority for
central management activity. The interface with the highest number will be used.
vi. Enable DHCP Hostname to instruct the Connect EZ 16/32 device to include the
device's system name with DHCP requests as the Client FQDN option. The DHCP
server can then be configured to register the device's hostname and IP address with
an associated DNS server.
n See RFC4702 for further information about DHCP server support for the Client
FQDN option.
n See Configure system information for information about setting the Connect
EZ 16/32 device's system name.
7. (Optional) Configure IPv6 settings:
a. Enable IPv6 support:
c. Generally, the default settings for IPv6 support are sufficient. You can view the default IPv6
settings by using the question mark (?):
IPv6
Additional Configuration
---------------------------------------------------------------------
----------
connection_monitor Active recovery
d. Modify any of the remaining default settings as appropriate. For example, to change the
metric:
If the minimum length is not available, then a longer prefix will be used.
See Configure WAN/WWAN priority and default route metrics for further information about
metrics.
8. (Optional) To configure 802.1x port based network access control:
Note The Connect EZ 16/32 can function as an 802.1x authenticator; it does not function as an
802.1x supplicant.
l The IPv6 management priority of the WAN. The active interface with the highest
management priority will have its address reported as the preferred contact address for
central management and direct device access.
l The IPv6 Maximum Transmission Unit (MTU) of the WAN.
l When to use DNS: always, never, or only when this interface is the primary default route.
l SureLink active recovery configuration. See Configure SureLink active recovery to detect
WAN/WWAN failures for further information.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
a. For Network PLMN ID, type the PLMN ID for the cellular network.
b. For Network technology, select the technology that should be used. The default is All
technologies, which means that the best available technology will be used.
Note If Manual is configured for Carrier selection mode and a specific network
technology is selected for the Network technology, your modem must support the
selected technology or no cellular connection will be established. If you are using a cellular
connection to perform this procedure, you may lose your connection and the device will
no longer be accessible.
12. SIM failover is enabled by default, which means that the modem will automatically fail over
from the active SIM to the next available SIM when the active SIM fails to connect. If enabled:
a. For Connection attempts before SIM failover, type the number of times that the device
should attempt to connect to the active SIM before failing over to the next available SIM.
b. For SIM failover alternative, configure how SIM failover will function if automatic SIM
switching is unavailable:
n None: The device will perform no alternative action if automatic SIM switching is
unavailable.
n Reset modem: The device will reset the modem if automatic SIM switching is
unavailable.
n Reboot device: The device will reboot if automatic SIM switching is unavailable.
13. For APN Selection, select whether you want to configure the Connect EZ 16/32 to use the
preconfigured APNs, custom APNs, or both. See Cellular modem APNs for information and
instructions for setting an APN.
14. (Optional) To configure the IP address of a custom gateway or a custom netmask:
a. Click Custom gateway to expand.
b. Click Enable.
c. For Gateway/Netmask, enter the IP address and netmask of the custom gateway. To
override only the gateway netmask, but not the gateway IP address, use all zeros for the IP
address. For example, 0.0.0.0./32 will use the network-provided gateway, but with a /32
netmask.
15. Optional IPv4 configuration items:
a. Click IPv4 to expand.
b. IPv4 support is Enabled by default. Click to disable.
c. Set the Type.
n Static IP address - Digi device obtains the static IP address from the cellular network.
n DHCP address - Digi device obtains IP address through a DHCP server on the cellular
network.
a. Set the Metric.
See Configure WAN/WWAN priority and default route metrics for further information about
metrics.
b. For Weight, type the relative weight for default routes associated with this interface. For
multiple active interfaces with the same metric, Weight is used to load balance traffic to
the interfaces.
c. Set the Management priority. This determines which interface will have priority for
central management activity. The interface with the highest number will be used.
d. Set the MTU.
e. For Use DNS:
n Always: DNS will always be used for this WWAN; when multiple interfaces have the
same DNS server, the interface with the lowest metric will be used for DNS
requests.
n When primary default route: Only use the DNS servers provided for this WWAN
when the WWAN is the primary route.
n Never: Never use DNS servers for this WWAN.
The default setting is When primary default route.
16. Optional IPv6 configuration items:
a. Click IPv6 to expand.
b. IPv6 support is Enabled by default. Click to disable.
c. Set the Type.
n Static IP address - Digi device obtains the static IP address from the cellular network.
n DHCP address - Digi device obtains IP address through a DHCP server on the cellular
network.
a. Set the Metric.
See Configure WAN/WWAN priority and default route metrics for further information about
metrics.
b. For Weight, type the relative weight for default routes associated with this interface. For
multiple active interfaces with the same metric, Weight is used to load balance traffic to
the interfaces.
c. Set the Management priority. This determines which interface will have priority for
central management activity. The interface with the highest number will be used.
d. Set the MTU.
e. For Use DNS:
n Always: DNS will always be used for this WWAN; when multiple interfaces have the
same DNS server, the interface with the lowest metric will be used for DNS
requests.
n When primary default route: Only use the DNS servers provided for this WWAN
when the WWAN is the primary route.
n Never: Never use DNS servers for this WWAN.
The default setting is When primary default route.
1. See Configure SureLink active recovery to detect WAN/WWAN failures for information about
configuring SureLink.
17. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
n To edit an existing WWAN named my_wwan, change to the my_wwan node in the
configuration schema:
6. Set the SIM matching criteria to determine when this WWAN should be used:
n iccid
Set the unique SIM card ICCID that must be in active for this WWAN to be used:
n imsi
Set the International Mobile Subscriber Identity (IMSI) that must be in active for this
WWAN to be used:
n plmn_id
Set the PLMN id that must be in active for this WWAN to be used:
n sim_slot
Set which SIM slot must be in active for this WWAN to be used:
7. Set the PIN for the SIM. Leave blank if no PIN is required.
8. Set the phone number for the SIM, for SMS connections:
Normally, this should be left blank. It is only necessary to complete this field if the SIM does
not have a phone number or if the phone number is incorrect.
9. Roaming is enabled by default. To disable:
Note If manual is configured for the carrier selection mode and a specific network
technology is selected for the cellular network technology, your modem must support the
selected technology or no cellular connection will be established. If you are using a cellular
connection to perform this procedure, you may lose your connection and the device will
no longer be accessible.
11. SIM failover is enabled by default, which means that the modem will automatically fail over
from the active SIM to the next available SIM when the active SIM fails to connect. To disable:
If enabled:
a. Set the number of times that the device should attempt to connect to the active SIM
before failing over to the next available SIM:
To override only the gateway netmask, but not the gateway IP address, use all zeros for
the IP address. For example, 0.0.0.0./32 will use the network-provided gateway, but with a
/32 netmask.
14. Optional IPv4 configuration items:
a. IPv4 support is enabled by default. To disable:
b. Set the type, which determines how the modem in the device obtains an IP address from
the cellular network.
See Configure WAN/WWAN priority and default route metrics for further information about
metrics.
d. Set the relative weight for default routes associated with this interface. For multiple active
interfaces with the same metric, the weight is used to load balance traffic to the interfaces.
e. Set the management priority. This determines which interface will have priority for central
management activity. The interface with the highest number will be used.
b. Set the type, which determines how the modem in the device obtains an IP address from
the cellular network.
See Configure WAN/WWAN priority and default route metrics for further information about
metrics.
d. Set the relative weight for default routes associated with this interface. For multiple active
interfaces with the same metric, the weight is used to load balance traffic to the interfaces.
e. Set the management priority. This determines which interface will have priority for central
management activity. The interface with the highest number will be used.
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. From the menu, click Status.
2. Under Networking, click Interfaces.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
>
3. Additional information can be displayed by using the show network verbose command:
>
4. Enter show network interface name at the Admin CLI prompt to display additional
information about a specific WAN. For example, to display information about ETH1, enter show
network interface eth1:
IPv4 Status : up
IPv4 Type : dhcp
IPv6 Status : up
IPv6 Type : dhcpv6
IPv6 Address(es) : fe00:2404::240:f4ff:fe80:120/64
IPv6 Gateway : ff80::234:f3ff:ff0e:4320
IPv6 MTU : 1500
IPv6 Metric : 1
IPv6 Weight : 10
IPv6 DNS Server(s) : fd00:244::1, fe80::234:f3f4:fe0e:4320
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Use the del command to delete the WAN or WWAN. For example, to delete a WWAN named
my_wwan:
(config)> save
Configuration saved.
>
Port
Description TCP/UDP number
Digi Remote Manager connection to edp12.devicecloud.com. TCP 3199
NTP date/time sync to time.devicecloud.com. UDP 123
DNS resolution using WAN-provided DNS servers. UDP 53
HTTPS for modem firmware downloads from TCP 443
firmware.devicecloud.com.
Note If the interface name is more than eight characters, the name will be truncated in the
underlying network interface to the first six characters followed by three digits, incrementing
from 000. This affects any custom scripts or firewall rules that may be trying to adjust the
interface or routing table entries.
l The IPv6 management priority of the LAN. The active interface with the highest
management priority will have its address reported as the preferred contact address for
central management and direct device access.
l The IPv6 Maximum Transmission Unit (MTU) of the LAN.
l When to use DNS: always, never, or only when this interface is the primary default route.
l The IPv6 prefix length and ID.
l IPv6 DHCP server configuration. See DHCP servers for more information.
n MACaddress denylist and allowlist.
To create a new LAN or edit an existing LAN:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
n To edit an existing LAN named my_lan, change to the my_lan node in the configuration
schema:
Current value:
n The LAN is configured by default to use a static IP address for its IPv4 configuration. To
configure the LAN to be a DHCP client, rather than using a static IP addres:
These instructions assume that the LAN will use a static IP address for its IPv4
configuration.
a. Set the IPv4 address and subnet of the LAN interface. Use the format IPv4_
address/netmask, for example, 192.168.2.1/24.
ii. Set the relative weight for default routes associated with this interface. For multiple
active interfaces with the same metric, the weight is used to load balance traffic to
the interfaces.
iii. Set the management priority. This determines which interface will have priority for
central management activity. The interface with the highest number will be used.
See DHCP servers for information about configuring the DHCP server.
7. (Optional) Configure IPv6 settings:
a. Enable IPv6 support:
c. Generally, the default settings for IPv6 support are sufficient. You can view the default IPv6
settings by using the question mark (?):
IPv6
Additional Configuration
---------------------------------------------------------------------
----------
connection_monitor Active recovery
dhcpv6_server DHCPv6 server
DHCPv6 server: The DHCPv6 server settings for this network interface.
d. Modify any of the remaining default settings as appropriate. For example, to change the
minimum length of the prefix:
If the minimum length is not available, then a longer prefix will be used.
See Configure WAN/WWAN priority and default route metrics for further information about
metrics.
8. (Optional) To configure 802.1x port based network access control:
Note The Connect EZ 16/32 can function as an 802.1x authenticator; it does not function as an
802.1x supplicant.
Incoming packets will be dropped from any devices whose MACaddresses is included in the
MACaddress denylist.
a. Add a MAC address to the denylist:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
b. Set the address IPv4 address and netmask, using the format IPv4_address/netmask, for
example:
d. Disable SureLink:
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
where bridge_name is the name of the new bridge. For example, to create a bridge named
LAN_bridge:
where interface_name is the name of the new interface. For example, to create a interface
named LAN_bridge_interface:
e. Set the IPv4 address and netmask for the interface, using the format IPv4_
address/netmask, for example, 192.168.3.1/24:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
(config)> save
Configuration saved.
>
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. From the menu, click Status.
2. Under Networking, click Interfaces.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Enter the show network command at the Admin CLI prompt:
>
3. Additional information can be displayed by using the show network verbose command:
>
4. Enter show network interface name at the Admin CLI prompt to display additional
information about a specific LAN. For example, to display information about ETH2, enter show
network interface eth2:
IPv4 Status : up
IPv4 Type : static
IPv4 Address(es) : 192.168.2.1/24
IPv4 Gateway :
IPv4 MTU : 1500
IPv4 Metric : 5
IPv4 Weight : 10
IPv4 DNS Server(s) :
IPv6 Status : up
IPv6 Type : prefix
IPv6 Address(es) : fd00:2704::1/48
IPv6 Gateway :
IPv6 MTU : 1500
IPv6 Metric : 5
IPv6 Weight : 10
IPv6 DNS Server(s) :
>
Delete a LAN
Follow this procedure to delete any LANs that have been added to the system. You cannot delete the
preconfigured LAN, LAN1.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Use the del command to delete the LAN. For example, to delete a LAN named my_lan:
(config)> save
Configuration saved.
>
DHCP servers
You can enable DHCP on your Connect EZ 16/32 device to assign IP addresses to clients, using either:
n The DHCP server for the device's local network, which assigns IP addresses to clients on the
device's local network. Addresses are assigned from a specified pool of IP addresses. For a
local network, the device uses the DHCP server that has the IP address pool in the same
IP subnet as the local network.
When a host receives an IP configuration, the configuration is valid for a particular amount of
time, known as the lease time. After this lease time expires, the configuration must be
renewed. The host renews the lease time automatically.
n A DHCP relay server, which forwards DHCP requests from clients to a DHCP server that is
running on a separate device.
Note These instructions assume you are configuring the device to use its local DHCP server. For
instructions about configuring the device to use a DHCP relay server, see Configure DHCP relay.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
For example, to set Lease time to ten minutes, enter 10m or 600s.
The default is 12 hours.
n By default, DHCP leases are persistent across reboots. You can disable persistent leases:
a. Click Network > Advanced.
b. Click to toggle off DHCP persistent leases.
8. (Optional) For Lease range start and Lease range end, type the lowest and highest IP address
that the DHCP server will assign to a client. This value represents the low order byte of the
address (the final triplet in an IPv4 address, for example, 192.168.2.xxx). The remainder of the
IP address will be based on the LAN's static IP address as defined in the Address field.
Allowed values are between 1 and 254, and the default is 100 for Lease range start and 250
for Lease range end.
n Sequential DHCP address allocation:
By default, DHCP addresses are assigned psuedo-randomly, using a hash of the client's
MACaddress to determine the IP address that gets assigned. You can configure the
device to use sequential IP addresses instead:
a. Click Network > Advanced.
b. Click to enable Sequential DHCP address allocation.
Because sequential mode does not use a hash based on the client's MAC address, when
DHCP lease expires, the client is not likely to get the same IP address assigned to it.
Therefore, sentential DHCP address allocation generally should not be used.
9. Optional DHCP server settings:
a. Click to expand Advanced settings.
b. For Gateway, select either:
n None: No gateway is broadcast by the DHCP server. Client destinations must be
resolvable without a gateway.
n Automatic: Broadcasts the Connect EZ 16/32 device's gateway.
n Custom: Allows you to identify the IP address of a Custom gateway to be
broadcast.
The default is Automatic.
c. For MTU,
n None: An MTU of length 0 is broadcast. This is not recommended.
n Automatic: No MTU is broadcast and clients will determine their own MTU.
n Custom: Allows you to identify a Custom MTU to be broadcast.
The default is Automatic.
d. For Domain name suffix, type the domain name that should be appended to host names.
e. For Primary and Secondary DNS, Primary and Secondary NTP server, and Primary and
Secondary WINS server, select either:
n None: No server is broadcast.
n Automatic: Broadcasts the Connect EZ 16/32 device's server.
n Custom: Allows you to identify the IP address of the server.
f. Enable BOOTP dynamic allocation to automatically assign an IP address to a device on
the server.
CAUTION! The IP address assigned to the device is leased forever and becomes
permanently unavailable for other hosts to use.
g. For Bootfile name, type the relative path and file name of the bootfile on the TFTP server.
h. For TFTP server name, type the IP address or host name of the TFTP server.
i. Enable
10. See Configure DHCP options for information about Custom DHCP options.
11. See Map static IP addresses to hosts for information about Static leases.
12. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Enable the DHCP server for an existing LAN. For example, to enable the DHCP server for a LAN
named my_lan:
See Configure a Local Area Network (LAN) for information about creating a LAN.
4. (Optional) Set the amount of time that a DHCP lease is valid:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the format
number{w|d|h|m|s}.
For example, to set network interface my_lan ipv4 dhcp_server lease_time to ten minutes,
enter either 10m or 600s:
n By default, DHCP leases are persistent across reboots. You can disable persistent leases:
5. (Optional) Set the lowest IP address that the DHCP server will assign to a client. This value
represents the low order byte of the address (the final triplet in an IPv4 address, for example,
192.168.2.xxx). The remainder of the IP address will be based on the LAN's static IP address as
Allowed values are between 1 and 254, and the default is 100.
6. (Optional) Set the highest IP address that the DHCP server will assign to a client:
Allowed values are between 1 and 254, and the default is 250.
7. Sequential DHCP address allocation
By default, DHCP addresses are assigned psuedo-randomly, using a hash of the client's MAC
address to determine the IP address that gets assigned. You can configure the device to use
sequential IP addresses instead:
Because sequential mode does not use a hash based on the client's MAC address, when DHCP
lease expires, the client is not likely to get the same IP address assigned to it. Therefore,
sentential DHCP address allocation generally should not be used.
8. Optional DHCP server settings:
a. Click to expand Advanced settings.
b. Determine how the DHCP server should broadcast the gateway server:
e. Set the IP address or host name of the primary and secondary DNS, the primary and
secondary NTP server, and the primary and secondary WINS servers:
g. Set the relative path and file name of the bootfile on the TFTP server:
CAUTION! The IP address assigned to the device is leased forever and becomes
permanently unavailable for other hosts to use.
9. See Configure DHCP options for information about custom DHCP options.
10. See Map static IP addresses to hosts for information about static leases.
11. Save the configuration and apply the change.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Note The IP address here should be outside of the DHCP server's configured lease range. See
Configure a DHCP server for further information about the lease range.
9. (Optional) For Hostname, type a label for the static lease. This does not have to be the
device's actual hostname.
10. Repeat for each additional DHCP static lease.
11. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Add a static lease to the DHCP server configuration for an existing LAN. For example, to add
static lease to a LAN named my_lan:
See Configure a Local Area Network (LAN) for information about creating a LAN.
4. Set the MACaddress of the device associated with this static lease, using the colon-separated
format:
Note The IP address here should be outside of the DHCP server's configured lease range. See
Configure a DHCP server for further information about the lease range.
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the main menu, click Status
2. Under Networking, click DHCP Leases.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Show the static lease configuration. For example, to show the static leases for a lan named
my_lan:
(config)> cancel
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Show the static lease configuration. For example, to show the static leases for a lan named
my_lan:
4. Use the del index_number command to delete a static lease. For example, to delete the static
lease for the device listed in the above output with a mac address of BF:C3:46:24:0E:D9 (index
number 0):
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
> config
(config)>
3. Add a custom DHCP option to the DHCP server configuration for an existing LAN. For example,
to add static lease to a LAN named my_lan:
See Configure a Local Area Network (LAN) for information about creating a LAN.
4. Custom options are enabled by default. To disable:
8. (Optional) To force the DHCP option to always be sent to the client, even if the client does not
ask for it:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Add a DHCP relay server to an existing LAN. For example, to add a server to a LAN named my_
lan:
See Configure a Local Area Network (LAN) for information about creating a LAN.
4. Set the IP address of the DHCP relay server:
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the main menu, click Status
2. Under Networking, click DHCP Leases.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Enter the show dhcp-lease command at the Admn CLI prompt:
>
3. Additional information can be returned by using the show dhcp-lease verbose command:
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
Current value:
b. Set the relative weight for default routes associated with this interface. For multiple active
interfaces with the same metric, the weight is used to load balance traffic to the interfaces.
c. Set the management priority. This determines which interface will have priority for central
management activity. The interface with the highest number will be used.
b. Generally, the default settings for IPv6 support are sufficient. You can view the default IPv6
settings by using the question mark (?):
IPv6
Note The Connect EZ 16/32 can function as an 802.1x authenticator; it does not function as an
802.1x supplicant.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
Bridging
Bridging is a mechanism to create a single network consisting of multiple devices, such as Ethernet
devices and wireless access points. You can also use bridging to create a Vitural LAN switchport
bridge. See Create a VLAN using switchport mode for more information about switchport bridging for
VLANs.
This section contains the following topics:
Configure a bridge
Required configuration items
n A name for the bridge.
Bridges are enabled by default.
n Devices to be included in the bridge.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
c. For Forwarding delay, enter the number of seconds that the device will spend in each of
the listening and learning states before the bridge begins forwarding data. The default is 2
seconds.
8. (Optional) Enable Rapid Spanning Tree Protocol (RSTP) for faster response to topology
changes on the network.
a. Click RSTP to enable.
b. For Hello Time, enter the number of seconds between bridge protocol units (BPDUs) sent
on a port. The default is 2 seconds.
c. For Max Age, enter the maximum number of seconds before a bridge port saves its BDPU
configuration. The default is 20 seconds.
d. For Priority, enter the system priority. The default priority number is 8.
e. (Optional) For Custom mstpd options, enter the extra configuration options to pass to
mspd daemon.
9. Add devices to the bridge:
a. Click to expand Devices.
b. For Add device, click .
c. Select the Device.
d. Repeat to add additional devices.
Note The MACaddress of the bridge is taken from the first available device in the list.
10. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
Note The MACaddress of the bridge is taken from the first available device in the list.
b. Set the number of seconds that the device will spend in each of the listening and learning
states before the bridge begins forwarding data:
(config)> save
Configuration saved.
>
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the Admin CLI prompt, type:
>
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the Admin CLI prompt, type :
>
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Use the show surelink interface name name command to show the Surelink status of a specific
interface, for example:
>
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the Admin CLI prompt, type :
>
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Use the show surelink ipsec tunnel name command to show the Surelink status of a specific
tunnel, for example:
>
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the Admin CLI prompt, type :
>
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Use the show surelink openvpn client name command to show the Surelink status of a specific
OpenVPN client, for example:
>
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
n Data bits: 8
n Parity: None
n Stop bits: 1
n Flow control: None
n Escape sequence: None
n History size: 0
n Exclusive access: disabled
n Idle timeout: 0 m
Note You can also configure the serial port by using Device Configuration > Serial. Changes
made by using either Device Configuration or Serial Configuration will be reflected in both.
d. From the Type of data to log list box, specify the type of data that should be saved.
n Received
n Transmitted
n Both
n Both with arrows. This is the default.
e. If you want to log the time at which date was received or transmitted, click the
Timestamps toggle to Enable.
f. If you want to log the data as hexadecimal values, click the Hexadecimal toggle to
Enable.
Note You can review the message log in the Serial Port Log page. See Review the serial
port message log.
10. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
5. Enable Altpin to use the Altpin feature. Altpin is disabled by default. If you enable Altpin in
EIA-232 mode, the DCD and DSRsignals are swapped. This allows use of DCD with 8-wire
cables. Altpin has no impact on 422 or 485 mode. For more information, see Serial connector
pinout.
l For rts_pre_delay, enter the amount of time RTS is asserted before starting data
transmission. The time is measured in milliseconds. The default is 0ms:
l For rts_post_delay, enter the amount of time RTS is deasserted before completing
data transmission. The time is measured in milliseconds. The default is 0ms:
n rs-422
l Enable Termination if you want to enable electrical termination on this serial port.
n rs-485
l Enable termination if you want to enable electrical termination on this serial port:
l Enable full_duplex if you want to enable full duplex communication on this serial
port:
(config)>path-paramlabel label
(config)>
8. Set the baud rate used by the device to which you want to connect:
10. Set the type of parity used by the device to which you want to connect:
12. Set the type of flow control used by the device to which you want to connect:
c. Set the maximum allowed log size for the serial port log when starting the log:
where value is the size of the log file in bytes. The default is 65536.
d. Specify the data type:
n both
n arrows. This is the default.
e. Log the time at which date was received or transmitted:
(config)> save
Configuration saved.
>
Web
1. Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
2. On the menu, click System. Under Configuration, click Serial Configuration.
Note You can also configure the serial port by using Device Configuration > Serial. Changes
made by using either Device Configuration or Serial Configuration will be reflected in both.
c. Parity: For Parity, select the type of parity used by the device to which you want to
connect. The default is None.
d. Stop bits: For Stop bits, select the number of stop bits used by the device to which you
want to connect. The default is 1.
e. Flow control: For Flow control, select the type of flow control used by the device to
which you want to connect. The default is None.
9. Click to expand Data Framing.
a. Click Enable to enable the data framing feature.
b. For Maximum Frame Count, enter the maximum size of the packet. The default is 1024.
c. For Idle Time, enter the length of time the device should wait before sending the packet.
d. For End Pattern, enter the end pattern. The packet is sent when this pattern is received
from the serial port.
e. Click Strip End Pattern if you want to remove the end pattern from the packet before it is
sent.
10. Expand Service Settings.
All service settings are disabled by default. Click available options to toggle them to enabled,
and set the IP ports as appropriate.
Note If the Telnet service is enabled for the serial port, note that the Telnet Login option,
when enabled, prompts the user to enter Telnet login credentials when accessing the serial
port via Telnet. The Telnet Login option is enabled by default. To disable this option, navigate
to System > Device Configuration > Authentication > Serial and disable Telnet Login.
For each type of service, you can also configure the access control.
To do this, you need to go to Device Configuration:
a. On the menu, click System. Under Configuration, click Device Configuration.
For example, to set the Access Control List for the SSH connection for serial port 1, click to
expand Serial > Port 1 > SSH connection > Access Control List:
iii. For Interface, select the appropriate interface from the dropdown.
iv. Click again to allow access through additional interfaces.
n To limit access based on firewall zones:
i. Click Zones. By default, there are three firewall zones already configured:
Internal, Edge, and IPsec.
ii. For Add Zone, click .
iii. For Zone, select the appropriate firewall zone from the dropdown.
See Firewall configuration for information about firewall zones.
iv. Click again to allow access through additional firewall zones.
11. Expand Autoconnect Settings. The autoconnect feature is used to initiate a connection to a
remote server to directly access the serial port.
a. Click Enable to enable the autoconnect feature.
b. For Connection Trigger, select the option that describes the type of event that should
trigger the connection.
If you select the Data received matches a string option, additional fields display.
a. In the Data Match String field, enter the received data string that should trigger the
connection. The syntax is: backslash escaped string
b. The Flush String option determines whether the match string data sent from the
remote server is discarded.
n Enable: Discard the match string data. This is the default.
n Disable: Do not discard the match string data.
c. For Outbound Connection Type, select the option that describes the method used to
initiate the connection.
d. For Destination, enter the host name or IP address of the remote server. When using SSH,
this should be prefixed with the user name and followed by @, for example,
admin@192.168.1.1.
e. For IP port, enter the TCP port of the remote server (1-65535).
f. Click Enable TCP keep-alive to enable TCP keepalive on the connection.
g. Click Enable TCP nodelay to enable TCP nodelay on the connection.
h. For Socket ID string, type text to be transmitted to the remote server when the socket
connects.
12. Expand Session Settings.
a. Enable Exclusive access to limit access to the serial port to a single active session. This
option is disabled by default. When it is disabled, multiple users can connect using Telnet,
TCP, and SSH.
b. For Escape sequence, type the characters used to start an escape sequence. If no
characters are defined, the escape sequence is disabled. The default is ~b.
c. For History size, type or select the number of bytes of output from the serial port that are
written to buffer. These bytes are redisplayed when a user connects to the serial port. The
default is 4000 bytes.
d. For Idle timeout, type the amount of time to wait before disconnecting due to user
inactivity.
13. Expand Monitor Settings.
a. Enable CTS to monitor CTS (Clear to Send) changes on this port.
b. Enable DCD to monitor DCD (Data Carrier Detect) changes on this port.
14. Expand Logging Settings to configure logging for this serial port.
a. To enable logging, click to toggle on Enable.
b. In the Log file name field, enter a descriptive name for the log file.
c. For Log file size, type the size of the log file. When the log file reaches the size limit, the
current file is saved and a new file is created. The default is 65536 bytes.
d. From the Type of data to log list box, specify the type of data that should be saved.
n Received
n Transmitted
n Both
n Both with arrows. This is the default.
e. If you want to log the time at which date was received or transmitted, click the
Timestamps toggle to Enable.
f. If you want to log the data as hexadecimal values, click the Hexadecimal toggle to
Enable.
Note You can review the message log in the Serial Port Log page. See Review the serial
port message log.
15. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
Command line examples in this section will use port1 for the serial port. However, any port
number can be used.
5. Enable Altpin to use the Altpin feature. Altpin is disabled by default. If you enable Altpin in
EIA-232 mode, the DCD and DSRsignals are swapped. This allows use of DCD with 8-wire
cables. Altpin has no impact on 422 or 485 mode. For more information, see Serial connector
pinout.
l For rts_pre_delay, enter the amount of time RTS is asserted before starting data
transmission. The time is measured in milliseconds. The default is 0ms:
l For rts_post_delay, enter the amount of time RTS is deasserted before completing
data transmission. The time is measured in milliseconds. The default is 0ms:
n rs-422
l Enable Termination if you want to enable electrical termination on this serial port.
n rs-485
l Enable termination if you want to enable electrical termination on this serial port:
l Enable full_duplex if you want to enable full duplex communication on this serial
port:
7. (Optional) Set a label that will be used when referring to this port.
8. Set the baud rate used by the device to which you want to connect:
10. Set the type of parity used by the device to which you want to connect:
12. Set the type of flow control used by the device to which you want to connect:
If no characters are defined, the escape sequence is disabled. The default is ~b.
b. Limit access to the serial port to a single active session:
c. Set the number of bytes of output from the serial port that are written to buffer. These
bytes are redisplayed when a user connects to the serial port.
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set idle_timeout to ten minutes, enter either 10m or 600s:
b. (Optional) Enable monitoring of DCD (Data Carrier Detect) changes on this port:
ii. flush_string is enabled by default, which will discard the matched string from
data sent to the server. To disable:
When using SSH, this should be prefixed with the user name and followed by @, for
example:
h. Set the text to be transmitted to the remote server when the socket connects:
where value is in milliseconds (ms) or seconds (s). The maximum value is 60s.
d. Set the end pattern. The packet is sent when this pattern is received from the serial port:
e. Set the strip end pattern if you want to remove the end pattern from the packet before it is
sent:
where int is any integer between 1 and 65535. The default is 3001.
iii. Enable TCP keep-alive messages:
(config)> add serial port1 service ssh acl address end value
(config)>
(config)> add serial port1 service ssh acl address6 end value
(config)>
(config)> add serial port1 service ssh acl zone end value
(config)>
Where value is a firewall zone defined on your device, or the any keyword.
Additional Configuration
-------------------------------------------------
------------------------------
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
(config)>
where int is any integer between 1 and 65535. The default is 4001.
iii. Enable TCP keep-alive messages:
(config)> add serial port1 service tcp acl address end value
(config)>
(config)> add serial port1 service tcp acl address6 end value
(config)>
(config)> add serial port1 service tcp acl zone end value
(config)>
Where value is a firewall zone defined on your device, or the any keyword.
Additional Configuration
-------------------------------------------------
------------------------------
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
(config)>
where int is any integer between 1 and 65535. The default is 3001.
(config)> add serial port1 service telnet acl zone end value
(config)>
Where value is a firewall zone defined on your device, or the any keyword.
Additional Configuration
-------------------------------------------------
------------------------------
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
(config)>
c. Set the maximum allowed log size for the serial port log when starting the log:
where value is the size of the log file in bytes. The default is 65536.
(config)> save
Configuration saved.
>
Note You can also configure the serial port by using Device Configuration > Serial. Changes
made by using either Device Configuration or Serial Configuration will be reflected in both.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
5. Enable Altpin to use the Altpin feature. Altpin is disabled by default. If you enable Altpin in
EIA-232 mode, the DCD and DSRsignals are swapped. This allows use of DCD with 8-wire
cables. Altpin has no impact on 422 or 485 mode. For more information, see Serial connector
pinout.
l For rts_pre_delay, enter the amount of time RTS is asserted before starting data
transmission. The time is measured in milliseconds. The default is 0ms:
l For rts_post_delay, enter the amount of time RTS is deasserted before completing
data transmission. The time is measured in milliseconds. The default is 0ms:
n rs-422
l Enable Termination if you want to enable electrical termination on this serial port.
n rs-485
l Enable termination if you want to enable electrical termination on this serial port:
l Enable full_duplex if you want to enable full duplex communication on this serial
port:
(config)>path-paramlabel label
(config)>
(config)> save
Configuration saved.
>
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
5. (Optional) For Label, enter a label that will be used when referring to this port.
6. For Baud rate, select the baud rate used by the device to which you want to connect. The
default is 9600.
n Max baud rate: 230400
n Minimum: 50
For a complete list, see Baud rate options.
7. For Flow control, select the type of flow control used by the device to which you want to
connect. The default is None.
8. Enable Altpin to use the Altpin feature. Altpin is disabled by default. If you enable Altpin in
EIA-232 mode, the DCD and DSRsignals are swapped. This allows use of DCD with 8-wire
cables. Altpin has no impact on 422 or 485 mode. For more information, see Serial connector
pinout.
9. For Idle timeout, type the amount of time that the active session can be idle before the
session is disconnected.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}.
For example, to set Idle timeout to ten minutes, enter 10m or 600s.
10. Click to expand PPP dial-in.
11. For Local IP address, type the IP address assigned to this interface.
12. For Remote IP address, type the IP address assigned to the remote peer.
13. For Metric, set the priority of routes associated with this interface. If there are multiple active
routes that match a destination, then the route with the lowest metric will be used.
14. For Default route, toggle to control whether a default route gets added for the PPP interface.
This feature is disabled by default.
15. For Zone, select the firewall zone for this interface. This can be used by packet filtering rules
and access control lists to restrict network traffic on this interface.
16. For Authentication method, select the method used to authenticate the remote peer. Allowed
values are:
n None: No authentication is required.
n Automatic: Attempt to authenticate using CHAP first, and then PAP.
18. (Optional) Configure a script that will be run to prepare the link before PPP negotiations are
started:
a. Click to expand Connect script.
b. Click Enable to enable the use of a connection script.
c. For Connect script filename, type the name of the script. Scripts are located in the
/etc/config/serial directory. An example script, windows_dun.sh is provided.
Example windows_dun.sh file:
#!/bin/sh
;;
esac
done
19. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
5. (Optional) Set a label that will be used when referring to this port.
6. Set the baud rate used by the device to which you want to connect:
8. Set the amount of time that the active session can be idle before the session is disconnected:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the format
number{w|d|h|m|s}.
For example, to set idle_timeout to ten minutes, enter either 10m or 600s:
9. Enable Altpin to use the Altpin feature. Altpin is disabled by default. If you enable Altpin in
EIA-232 mode, the DCD and DSRsignals are swapped. This allows use of DCD with 8-wire
cables. Altpin has no impact on 422 or 485 mode. For more information, see Serial connector
pinout.
12. The default route is added for the PPP interface is disabled by default. To enable:
13. Set the authentication method used to authenticate the remote peer:
14. Set the priority of routes associated with this interface. If there are multiple active routes that
match a destination, then the route with the lowest metric will be used.
Zone: The firewall zone assigned to this interface. This can be used
by packet
filtering rules and access control lists to restrict network traffic
on this
interface.
Format:
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
Default value: internal
Current value: internal
(config)>
16. (Optional) Configure the serial port to use a custom PPP configuration file:
a. Enable the use of a custom PPP configuration file:
b. Enable override to override the default PPP configuration and only use the custom
configuration file:
If override is not enabled, the custom PPP configuration file is used in addition to the
default configuration.
c. Paste or type the configuration data in the format of a pppd options file:
where data are one or more pppd command line options. Because the options are passed
directly to the pppd command line, they should all be entered on a single line. For
example:
17. (Optional) Configure a script that will be run to prepare the link before PPP negotiations are
started:
a. Enable the use of a connection script.
#!/bin/sh
ATDT123)
echo "CONNECT" # instruct the peer to start PPP
exit 0 # start up the local PPP session
;;
AT*)
echo "OK" # passively accept any other AT command
;;
esac
done
(config)> save
Configuration saved.
>
Web
1. Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
2. On the menu, click System. Under Configuration, click Serial Configuration.
Note You can also configure the serial port by using Device Configuration > Serial. Changes
made by using either Device Configuration or Serial Configuration will be reflected in both.
3. Click to expand the port that you want to configure for UDP serial mode.
a. For Baud rate, select the baud rate used by the device to which you want to connect.
n Default baud rate: 9600
n Max baud rate: 230400
n Minimum: 50
For a complete list, see Baud rate options.
b. For Data bits, select the number of data bits used by the device to which you want to
connect.
c. For Parity, select the type of parity used by the device to which you want to connect.
d. For Stop bits, select the number of stop bits used by the device to which you want to
connect.
e. For Flow control, select the type of flow control used by the device to which you want to
connect.
9. Expand Data Framing Settings.
a. For Local port, enter the UDP port. The default is 4001 or serial port 1, 4002 for serial port
2, etc.
b. (Optional) For Socket String ID, enter a string that should be added at the beginning of
each packet.
c. For Destinations, you can configure the remote sites to which you want to send data. If
you do not specify any destinations, the Connect EZ 16/32 sends new data from the last IP
address and port from which data was received. To add a destination:
i. Click Add Destination. A destination row is added.
ii. (Optional) For Description, enter a description of the destination.
iii. For Hostname, enter the host name or IP address of the remote site to which data
should be sent.
iv. For Port, enter the port number of the remote site to which data should be sent.
You can also configure access control for the serial port.
To do this, you need to go to Device Configuration:
a. On the menu, click System. Under Configuration, click Device Configuration.
Note You can review the message log in the Serial Port Log page. See Review the serial
port message log.
12. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
> config
(config)>
5. Enable Altpin to use the Altpin feature. Altpin is disabled by default. If you enable Altpin in
EIA-232 mode, the DCD and DSRsignals are swapped. This allows use of DCD with 8-wire
cables. Altpin has no impact on 422 or 485 mode. For more information, see Serial connector
pinout.
l For rts_pre_delay, enter the amount of time RTS is asserted before starting data
transmission. The time is measured in milliseconds. The default is 0ms:
l For rts_post_delay, enter the amount of time RTS is deasserted before completing
data transmission. The time is measured in milliseconds. The default is 0ms:
n rs-422
l Enable Termination if you want to enable electrical termination on this serial port.
n rs-485
l Enable termination if you want to enable electrical termination on this serial port:
l Enable full_duplex if you want to enable full duplex communication on this serial
port:
8. Set the baud rate used by the device to which you want to connect:
10. Set the type of parity used by the device to which you want to connect:
12. Set the type of flow control used by the device to which you want to connect:
n none
n rts/cts
n xon/xoff
The default is none.
13. (Optional) Configure data framing:
a. Enable data framing:
where value is in milliseconds (ms) or seconds (s). The maximum value is 60s.
d. Set the end pattern. The packet is sent when this pattern is received from the serial port:
e. Set the strip end pattern if you want to remove the end pattern from the packet before it is
sent:
16. Configure the remote sites to which you want to send data. If you do not specify any
destinations, the Connect EZ 16/32 send new data to the last hostname and port from which
data was received. To add a destination:
i. Add a destination:
iii. Set the host name or IP address of the remote site to which data should be sent:
iv. Set the port number of the remote site to which data should be sent:
Where value is a firewall zone defined on your device, or the any keyword.
Additional Configuration
----------------------------------------------------
---------------------------
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
(config)>
Where value is a firewall zone defined on your device, or the any keyword.
Additional Configuration
--------------------------------------------------------
-----------------------
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
(config)>
c. Set the maximum allowed log size for the serial port log when starting the log:
where value is the size of the log file in bytes. The default is 65536.
d. Specify the data type:
(config)> save
Configuration saved.
>
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
11. Enable Altpin to use the Altpin feature. Altpin is disabled by default. If you enable Altpin in
EIA-232 mode, the DCD and DSRsignals are swapped. This allows use of DCD with 8-wire
cables. Altpin has no impact on 422 or 485 mode. For more information, see Serial connector
pinout.
12. For Idle timeout, type the amount of time that the active session can be idle before the
session is disconnected.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}.
For example, to set Idle timeout to ten minutes, enter 10m or 600s.
13. For Escape character, type the character to use in the escape sequence. Enter this character
three times, followed by the escape delay and then an AT command to switch from data mode
to command mode. The default is the plus sign (+).
14. For Escape delay, type the delay between the escape sequence and an AT command to switch
from data mode to command mode. The default is 1s.
15. For Auto-answer rings, type the number of rings to wait before auto-answering. Enter 0 (zero)
to disable auto-answering.
16. Command echo is enabled by default. Commands sent to the port are echoed back to the
user. Select to disable this feature.
17. For Result codes, select the type of result code that are displayed as responses to commands.
Options are:
n None: No result codes are displayed.
n Numeric: Numeric result codes are displayed.
n Verbose: Result codes are displayed in English, for example: OK, ERROR, CONNECT. This
is the default.
18. (Optional) Click to expand Phonebook and create dial strings that can be used to connect to
remote servers.
a. Click to add a phone book entry.
b. For Label, type a descriptive name for the phone book entry.
c. (Required) For Dialstring, type the string to dial to connect to the remote server.
d. (Required) For Connection destination, type the hostname or IP address of the remote
server.
e. (Required) For Connection port, type the TCP port of the remote server. Minimum is 1 and
maximum is 65535.
19. Expand TCP connection to configure TCP connection for this serial port.
a. To enable a TCP connection, click to toggle on Enable.
b. For Port, type the TCP port for this service. The default is 4001.
c. Expand Access control list to create a list of IP addresses, interfaces, and firewall zones
from which this service may be accessed.
n To limit access to specified IPv4 addresses and networks:
i. Click IPv4 Addresses.
ii. For Add Address, click .
iii. For Address, enter the IPv4 address or network that can access the device's
service-type. Allowed values are:
f. If you want to log the data as hexadecimal values, click the Hexadecimal toggle to
Enable.
Note You can review the message log in the Serial Port Log page. See Review the serial
port message log.
21. Click Apply to save the configuration and apply the change.
Note You can also configure the serial port by using Device Configuration > Serial. Changes
made by using either Device Configuration or Serial Configuration will be reflected in both.
l For RTS Pre-delay, enter the amount of time RTS is asserted before starting data
transmission. The time is measured in milliseconds. The default is 0ms.
l For RTS Post-delay, enter the amount of time RTS is deasserted before completing
data transmission. The time is measured in milliseconds. The default is 0ms.
n RS-422
l Enable Termination if you want to enable electrical termination on this serial port.
n RS-485
l Enable Termination if you want to enable electrical termination on this serial port.
l Enable Full Duplex if you want to enable full duplex communication on this serial
port.
The default is RS-232.
8. Expand Serial Settings.
The entries in the following fields must match the information for the power controller. Refer
to your power controller manual for the correct entries.
a. Baud rate: For Baud rate, select the baud rate used by the device to which you want to
connect. The default is 9600.
n Max baud rate: 230400
n Minimum: 50
For a complete list, see Baud rate options.
b. Data bits: For Data bits, select the number of data bits used by the device to which you
want to connect. The default is 8.
c. Parity: For Parity, select the type of parity used by the device to which you want to
connect. The default is None.
d. Stop bits: For Stop bits, select the number of stop bits used by the device to which you
want to connect. The default is 1.
e. Flow control: For Flow control, select the type of flow control used by the device to
which you want to connect. The default is None.
9. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
5. Enable Altpin to use the Altpin feature. Altpin is disabled by default. If you enable Altpin in
EIA-232 mode, the DCD and DSRsignals are swapped. This allows use of DCD with 8-wire
cables. Altpin has no impact on 422 or 485 mode. For more information, see Serial connector
pinout.
l For rts_pre_delay, enter the amount of time RTS is asserted before starting data
transmission. The time is measured in milliseconds. The default is 0ms:
l For rts_post_delay, enter the amount of time RTS is deasserted before completing
data transmission. The time is measured in milliseconds. The default is 0ms:
n rs-422
l Enable Termination if you want to enable electrical termination on this serial port.
n rs-485
l Enable termination if you want to enable electrical termination on this serial port:
l Enable full_duplex if you want to enable full duplex communication on this serial
port:
7. (Optional) Set a label that will be used when referring to this port.
(config)>path-paramlabel label
(config)>
8. Set the baud rate used by the device to which you want to connect:
10. Set the type of parity used by the device to which you want to connect:
12. Set the type of flow control used by the device to which you want to connect:
(config)> save
Configuration saved.
>
Web
1. Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
2. On the menu, click System. Under Configuration, click Serial Configuration.
6. Select the items you want to copy and specify the serial ports to which the configuration
should be applied.
Field Description
Copy Port X Enter the serial port numbers to which the configuration should be
configuration to applied. You can enter a single number or a group, such as: 2-5, 10, 13-
these ports 15.
If you used the drag-and-drop method, the serial port number on
which you dropped the configuration is entered in this field by default.
You can change the entry if needed.
Copy these The setting sections available for the selected serial port mode are
settings selected by default. You can click the box next to an item name to
select or deselect it.
If you select a setting section that is not available for the serial mode
types, the settings are copied, but have no effect on the current serial
port mode.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type a to access the Admin CLI.
2. At the command line, type system serial copy plus the parameters for the features you want
to include. More than parameter can be specified so you can copy more settings.
where:
n SOURCE: The serial port that you want to copy from. (Required)
n DESTINATION: A list of the serial ports to which you want to copy the configuration.
Example: 1-4,8-10, or type all. (Required)
Syntax:
n all: Copy all serial port settings.
n autoconnect: Copy the autoconnect settings.
n autodetect: Copy the autodetect settings.
n base: Copy enable, mode, sharing, and signal settings.
n data_match: Copy the data matching settings.
n framing: Copy the data framing settings.
n hangup: Copy the hangup or signal loss settings.
n label: Copy the label settings.
n logging: Copy the logging settings.
n modem: Copy the modem emulator settings.
n monitor: Copy the signal change monitoring settings.
n ppp_dialin: Copy the PPP dial-in settings.
n serial: Copy the baud rate, data bits, parity, stop bits, and flow control settings.
n service: Copy SSH, TCP, and Telnet service settings.
n session: Copy escape, history, exclusive, and idle timeout settings.
n udp: Copy UDP serial settings.
3. (Optional) Set sequential IP port numbers for a service on a list of ports.
Where:
n DESTINATION: Enter a list of serial ports to set IP port numbers. Example: 1-4,8-10, or
type all. (Required)
n SERVICE: The service type to set IP port numbers. (Required)
Where SERVICE is one of: ssh, tcp, telnet, or udp
n BASE: Set service IP port numbers to base port + serial port number. (Required).
4. Type exit to exit the Admin CLI.
Depending on your device configuration, you may be presented with an Access selection
menu. Type q to disconnect from the device.
Operating system
The Digi Navigator can only be installed on a computer with a Windows OS. If you are using Linux,
you can manually install and configure RealPort without Digi Navigator. For the Linux installation
process, refer to the Get started: Install RealPort for LINUXin the RealPort Installation User's Guide.
Note Microsoft Visual C++ is required for RealPort and is installed by default during the Digi Navigator
install process.
Note The Digi Navigator application can also be downloaded from your device's product
support page.
2. Scroll down to the Product Resources tab, and in the Drivers & Patches section, click Digi
Navigator.
3. From the list box, select the appropriate Microsoft Windows option from the list of driver
options.
4. Click the download link to download the Digi Navigator application.
5. When the download is complete, click on the downloaded .exe file. The Digi Navigator Setup
wizard displays.
6. Select which user(s) should be able to launch the Digi Navigator from this computer after it
has been installed:
n Anyone who uses this computer (all users): Any user who logs into this computer can
launch the Digi Navigator.
n Only for me. Only the user who was logged in to this computer when the Digi
Navigator was installed can launch the Digi Navigator. This is the default.
Note You can also manually configure the device for RealPort by logging into the device's web UI. See
Advanced RealPort configuration without using the Digi Navigator.
Optional activities
n Verify the RealPort configuration: If desired, you can verify the RealPort configuration. See
Configure the serial port for RealPort mode and Configure the RealPort service.
n Review the COM ports that are configured for RealPort: After RealPort configuration is
complete, you can open the Windows Properties dialog for the COM ports on your computer
that are configured for RealPort from within the Digi Navigator.
1. Launch the Digi Navigator if it is not currently open. A list of devices that have RealPort
enabled and configured displays in the RealPort Devices section at the bottom of the
application screen.
2. Click Open Device Manager to open the Windows Properties dialog and display the
COM ports on your computer that are configured for RealPort. For more information,
see Manage the RealPort configured Digi device list.
Device supports Digi Navigator discovery, but a DHCP server is not on the network
If the device is directly connected to a computer or connected to a network with no DHCP server,
there are two options available to connect to the device:
n 192.168.210.1: A set up address that is available in the OS. See Assign a generic IP address to
the device.
n 169.254.100.100: An auto-IP address available in the OS. See Use the autodiscovery protocol
to discover a device.
Note If you use either of these IP addresses to connect to the device for initial config, you should then
set a unique IP address for the device that is appropriate for the network on which it will be deployed.
1. Make sure Digi Navigator is installed and the Connect EZ 16/32 is powered and connected to
your local network or computer with an Ethernet cable.
2. Launch the Digi Navigator.
3. Click Filters from the green toolbar to expand the toolbar and display the filter options.
4. In the Services Filters section, click the enable button to enable the services that you want to
use to find an IP address.
5. Click Filters at the bottom of the expanded toolbar to minimize the toolbar and hide the
filters.
1. Make sure Digi Navigator is installed and the Connect EZ 16/32 is powered and connected to
your local network or computer with an Ethernet cable.
2. Launch the Digi Navigator.
3. Click Filters from the green toolbar to expand the toolbar and display the filter options.
4. In the Setup IP Filters section, click the enable button for the 169.254.100.100 option.
5. Click Filters at the bottom of the expanded toolbar to minimize the toolbar and hide the
filters.
6. Log into the device and set a unique IP address for the device that is appropriate for the
network on which it will be deployed. See Define a static IP address.
1. Make sure Digi Navigator is installed and the Connect EZ 16/32 is powered and connected to
your local network or computer with an Ethernet cable.
2. Launch the Digi Navigator.
3. Click Filters from the green toolbar to expand the toolbar and display the filter options.
4. In the Setup IP Filters section, click the enable button for the 192.168.210.1 option.
5. Click Filters at the bottom of the expanded toolbar to minimize the toolbar and hide the
filters.
Step 2: Assign the IP address to your computer
You must also manually assign this IP address to your computer to ensure a connection. Both your
computer and device must be connected to a private network that does not have a DHCP server.
1. Use an Ethernet cable to connect the device and your computer. Both your computer and
device must be connected to your private network.
2. On your PC, navigate to the Ethernet network settings dialog.
3. Click the Internet Protocol Version 4 (TCP/IPv4) parameter.
4. Click Properties. The Internet Protocol Version 4 (TCP/IPv4) Properties dialog appears.
5. Select Use the following IP address.
Note IMPORTANT: Make note of the current IP address entries for IP address, Subnet mask,
and Default gateway. You will need this information to complete the final step of the process.
7. Click OK.
8. Open a browser window.
9. Enter the default gateway IP address to access the device: 192.168.210.1. The device's login
screen displays.
10. Log into the device using the default user name and password. The default user name is admin
and the default password is printed on the bottom label of the device and on the loose label
included in the package. If the defaults to not work, they may have been changed. Confirm this
information with your system administrator.
11. Update the IP address for the device.
12. On your PC, revert the IP address information to the original entries.
a. Return to the Internet Protocol Version 4 (TCP/IPv4) Properties dialog.
b. Enter the original IP address entries for IP address, Subnet mask, and Default gateway.
c. Click OK.
1. Make sure Digi Navigator is installed and the Connect EZ 16/32 is powered and connected to
your local network or computer with an Ethernet cable.
2. Launch the Digi Navigator.
3. Expand the Specify a device section.
4. In the IP Address field, enter the IP address or host name for the device.
Item Description
1 Filters Click Filters to display the types of filters that can be applied to Digi
devices, services, and IP types.
n Device Filters: A list of the Digi device types displays. All types
are disabled by default, and when all are disabled, all types are
displayed. To filter the devices by a certain type, click the bar to
display only the selected types. See Filter devices for display in
the Digi Navigator.
n Services Filters: A list of the services that can be used to
discover Digi devices. The HTTPS option is selected by default.
Click the enable button to enable the services that you want to
use. See Services used to discover a device when connected to a
network.
Item Description
n Setup IP Filters: These specific IP addresses can be used to
discover a Digi device that is directly connected to a computer or
connected to a network with no DHCP server.
l 192.168.210.1: A set up address that is available in the OS.
See Assign a generic IP address to the device.
l 169.254.100.100: An auto-IP address available in the OS. See
Use the autodiscovery protocol to discover a device.
2 Digi Remote Click Digi Remote Manager to launch Digi Remote Manager. See
Manager Access Digi Remote Manager from the Digi Navigator.
3 Specify a Expand the Specify a device section to enter the IP address of a Digi
device device. See Specify the IP address to discover a Digi device.
4 List of A list of the Digi devices discovered by the Digi Navigator displays.
discovered Expand a device to view additional information. See Digi Navigator
devices device discovery process.
5 Open Click Open to access the web UI for the Digi device. See Access the web
UI from the Digi Navigator.
6 Configure Click Configure device for Realport to configure the Digi device to use
device for RealPort. See Configure RealPort on a Digi device from the Digi
Realport Navigator.
7 Configure Click Configure this PC for RealPort to configure your computer to use
this PC for RealPort. See Configure RealPort on a Digi device from the Digi
RealPort Navigator.
8 RealPort Click RealPort Devices at the bottom of the screen to display a list of
Devices Digi devices that are configured to use RealPort. See Configure RealPort
on a Digi device from the Digi Navigator.
9 Refresh Click Refresh to update the list of the Digi devices that have RealPort
enabled and configured.
10 Open Device Click Open Device Manager to open the Windows Properties dialog on
Manager your computer to access the configured COM ports. The number of
COM ports configured for RealPort matches the number of serial ports
on the device.
n Refresh: Click Refresh to update the list of Connect EZ 16/32 devices that have RealPort
enabled and configured.
n Open Device Manager: Click Open Device Manager to open the Windows Properties dialog
on your computer to access the configured COM ports. The number of COM ports configured
for RealPort matches the number of serial ports on the device.
1. Make sure Digi Navigator is installed and the Connect EZ 16/32 is powered and connected to
your local network or computer with an Ethernet cable.
2. Launch the Digi Navigator.
3. From the list of devices shown in the Digi Navigator, expand the device you want to access.
4. Click Open next to the IP address you want to use. The login screen for the web UI launches.
a. Enter the user name and password for the Connect EZ 16/32 in the Username and
Password fields.
b. Click Login.
1. Make sure Digi Navigator is installed and the Connect EZ 16/32 is powered and connected to
your local network or computer with an Ethernet cable.
2. Launch the Digi Navigator.
3. Click Filters from the green toolbar to expand the toolbar and display the filter options.
4. In the Device Filters section, a list of the Digi device types display. All types are disabled by
default, and when all are disabled, all types are displayed.
5. To filter the types that are displayed, click the enable slider for the types you want to display.
Only the enabled types will display, and all other types remain disabled and do not display.
6. Click Filters at the bottom of the expanded toolbar to minimize the toolbar and hide the
filters.
1. Navigate to https://hub.digi.com/support/products/realport/.
2. Scroll down to the Product Resources tab, and in the Drivers & Patches section, click
RealPort Driver.
3. From the list box, select the appropriate Microsoft Windows option from the list of driver
options. The associated RealPort for Windows option displays.
4. Click the download link.
5. When the download is complete, navigate to your download folder. The application is in a .zip
file.
6. You can leave the .zip file in the download folder, or copy the .zip file and paste it to a location
that you can easily access.
Note If this is the first time that you have run the RealPort wizard, Realport is installed on your
laptop. If it is not the first time or if RealPort is already installed, it is not installed again.
1. Follow the standard Windows process to access the Device Manager from your computer's
operating system.
2. Select Multi-port Serial Adapters.
3. Right-click on your device. Click the Properties menu option. The Properties dialog appears.
4. Click the Advanced tab.
5. Click Properties. The Advanced Properties dialog appears
6. Click the Security tab.
7. Select the Encrypt Network Traffic check box to enable encrypted network traffic. When you
select this option, the TCP Port for Encrypted Traffic field becomes available.
8. The TCP Port for Encrypted Traffic field has a default value of 1027. The entry must match
the device's TCP port setting.
9. (Optional) If you want to use authentication, configure the feature.
a. From the the Authentication Method list box, select the Shared Secret - SHA256 option.
b. Enter the authentication password in the Shared Secret field.
10. Click Apply.
11. Click OK to close the Advanced Properties dialog.
12. Click OK to close the Properties window.
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the menu, click System. Under Configuration, click Serial Configuration.
Note You can also configure the serial port by using Device Configuration > Serial. Changes
made by using either Device Configuration or Serial Configuration will be reflected in both.
n RS-422
l Enable Termination if you want to enable electrical termination on this serial port.
n RS-485
l Enable Termination if you want to enable electrical termination on this serial port.
l Enable Full Duplex if you want to enable full duplex communication on this serial
port.
The default is RS-232.
8. Expand Logging Settings to configure logging for this serial port.
a. To enable logging, click to toggle on Enable.
b. In the Log file name field, enter a descriptive name for the log file.
c. For Log file size, type the size of the log file. When the log file reaches the size limit, the
current file is saved and a new file is created. The default is 65536 bytes.
d. From the Type of data to log list box, specify the type of data that should be saved.
n Received
n Transmitted
n Both
n Both with arrows. This is the default.
e. If you want to log the time at which date was received or transmitted, click the
Timestamps toggle to Enable.
f. If you want to log the data as hexadecimal values, click the Hexadecimal toggle to
Enable.
Note You can review the message log in the Serial Port Log page. See Review the serial
port message log.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
l For rts_pre_delay, enter the amount of time RTS is asserted before starting data
transmission. The time is measured in milliseconds. The default is 0ms:
l For rts_post_delay, enter the amount of time RTS is deasserted before completing
data transmission. The time is measured in milliseconds. The default is 0ms:
n rs-422
l Enable Termination if you want to enable electrical termination on this serial port.
n rs-485
l Enable termination if you want to enable electrical termination on this serial port:
l Enable full_duplex if you want to enable full duplex communication on this serial
port:
8. (Optional) Set a label that will be used when referring to this port.
c. Set the maximum allowed log size for the serial port log when starting the log:
where value is the size of the log file in bytes. The default is 65536.
d. Specify the data type:
(config)> save
Configuration saved.
>
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
where value is the port you want to use for the RealPort service. The default is 1027.
5. Set the select the minimum TLS version that the RealPort service will accept:
8. Exclusive mode is disabled by default. This mode ensures that any connection from an
IP address is closed when opening a new connection from the same IP address. To enable:
9. Use RealPort keepalive to send RealPort keepalive packets. This is enabled by default. To
disable:
10. TCP port keepalive to send TCP keepalive packets is disabled by default. To enable:
11. Device initiated connections allow users to remotely connect to serial devices as if they had a
native COM/TTYport on their PC. This is disabled by default. To enable:
(config)> save
Configuration saved.
>
n Connected: The length of time that the user has been connected to the port. The time
is measured in seconds.
n Idle: The length of time that connection has been idle. The time is measured in
seconds.
6. Determine the user(s) that you want to disconnect.
n If only one user is listed, that user will be selected for the disconnect by default.
n If more than one user is connected to the port, by default the check box for each user is
selected. Click on a check box to deselect a user. Click All to deselect or select all of of
the users.
7. Click Disconnect. The single user or set of selected users are disconnected from the serial port.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. (Optional) Review the users currently connected to the port.
Where port is the port number you want to review, such as "port2"; a string, such as "console";
or the name of a user-configured serial port, such as USB.
3. (Optional) Review information about the disconnect command.
Where port is the port number you want to review, such as "port2"; a string, such as "console";
or the name of a user-configured serial port, such as USB.
Enter one or both of the following:
n remoteip STRING: The remote IP address to disconnect.
n user: The user name of the user that you want to disconnect.
5. Disconnect all users from a port.
Where port: is the port number you want to review, such as "port2"; a string, such as "console";
or the name of a user-configured serial port, such as USB.
6. Type exit to exit the Admin CLI.Depending on your device configuration, you may be presented
with an Access selection menu. Type quit to disconnect from the device.
Item Description
Click the (configuration) icon in the upper right corner of the page to access the
configuration Serial Configuration page. See Serial port for more information.
icon
Search ports Use the Search ports field to limit the list of ports displayed on the page.
Ports per Select the number of Ports per page that you want to display. Click the
page appropriate number or click ALL to display all ports. You can also click Next or
Back to display the next or previous set of ports.
Note The number ports you can display is determined by the number of ports
available on the device.
Item Description
Status Displays the connection status.
n CONNECTED: A telnet, terminal, SSH, or TCP session is active.
n DISABLED: The port is not enabled.
n NO SIGNAL: CTS or DCD is not active on the port.
Port A list of the ports on the device.
The port number and name displays as a link when the port is configured for
remote access. You can click the port number or name to connect to the port in
the terminal page.
Item Description
TX/RX Bytes Displays the total number of bytes that have been transmitted and received.
Signals Indicates the types of communication that the device is ready to send.
DCD: Carrier Detected
CTS: Clear to Send
DTR: Data Terminal Ready
RTS: Ready to Dend
Web
1. Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
2. On the main menu, click Status
3. Under Connections, click Serial. The Serial Status page displays.
4. If a green Log button is displayed, the serial port mode selected for the port supports serial
port logging, and logging is enabled. Click the Log button to open the Serial Port Log page for
that port. The Serial port log window displays.
Note If the Log button is gray, the serial port mode selected for the port supports serial port
logging, but logging is not enabled. If there is no Log button, the serial port mode selected for
the port does not support serial port logging.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
If a relative path is provided, /etc/config/serial will be used as the root directory for the path
and file. (Required)
The log file is saved to the /opt/serial directory. Because this is being save to the device's
memory, you should use serial logging for diagnostic purposes, rather than having it
permanently enabled.
4. To clear and restart the log:
IP routing 295
Show the routing table 312
Dynamic DNS 313
Virtual Router Redundancy Protocol (VRRP) 318
IP routing
The Connect EZ 16/32 device uses IP routes to decide where to send a packet it receives for a remote
network. The process for deciding on a route to send the packet is as follows:
1. The device examines the destination IP address in the IP packet, and looks through the IP
routing table to find a match for it.
2. If it finds a route for the destination, it forwards the IP packet to the configured IP gateway or
interface.
3. If it cannot find a route for the destination, it uses a default route.
4. If there are two or more routes to a destination, the device uses the route with the longest
mask.
5. If there are two or more routes to a destination with the same mask, the device uses the route
with the lowest metric.
This section contains the following topics:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
New static route configurations are enabled by default. To disable, toggle off Enable.
5. (Optional) For Label, type a label that will be used to identify this route.
6. For Destination, type the IP address or network of the destination of this route.
For example, to route traffic to the 192.168.47.0 network that uses a subnet mask of
255.255.255.0, type 192.168.47.0/24. The any keyword can also be used to route packets to
any destination with this static route.
7. For Interface, select the interface on the Connect EZ 16/32 device that will be used with this
static route.
8. (Optional) For Gateway, type the IPv4 address of the gateway used to reach the destination.
Set to blank if the destination can be accessed without a gateway.
9. (Optional) For Metric, type the metric for the route. When multiple routes are available to
reach the same destination, the route with the lowest metric is used.
10. (Optional) For MTU, type the Maximum Transmission Units (MTU) of network packets using this
route.
11. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
4. (Optional) set a label that will be used to identify this route. For example:
5. Set the IP address or network of the destination of this route. For example:
For example, to route traffic to the 192.168.47.0 network that uses a subnet mask of
255.255.255.0:
The any keyword can also be used to route packets to any destination with this static route.
6. Set the interface on the Connect EZ 16/32 device that will be used with this static route:
a. Use the ? to determine available interfaces:
b. Set the interface. For example:
7. (Optional) Set the IPv4 address of the gateway used to reach the destination. Set to blank if the
destination can be accessed without a gateway.
8. (Optional) Set the metric for the route. When multiple routes are available to reach the same
destination, the route with the lowest metric is used.
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
> config
(config)>
(config)> save
Configuration saved.
>
Policy-based routing
Normally, a routing device determines how to route a network packet based on its destination
address. However, you can use policy-based routing to forward the packet based on other criteria,
such as the source of the packet. For example, you can configure the Connect EZ 16/32 device so that
high-priority traffic is routed through the cellular connection, while all other traffic is routed through
an Ethernet (WAN) connection.
Policy-based routing for the Connect EZ 16/32 device uses the following criteria to determine how to
route traffic:
n Firewall zone (for example, internal/outbound traffic, external/inbound traffic, or IPSec tunnel
traffic).
n Network interface (for example, the cellular connection, the WAN, or the LAN).
n IPv4 address.
n IPv6 address.
n MACaddress.
n Domain.
n Protocol type (TCP, UDP, ICMP, or all).
The order of the policies is important. Routing policies are processed sequentially; as a result, if a
packet matches an earlier policy, it will be routed using that policy’s rules. It will not be processed by
any subsequent rules.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
4. (Optional) Set the label that will be used to identify this route policy:
5. Set the interface on the Connect EZ 16/32 device that will be used with this route policy:
a. Use the ? to determine available interfaces:
b. Set the interface. For example:
6. (Optional) Enable exclusive to configure the policy to drop packets that match the policy
when the gateway interface is disconnected, rather than forwarded through other interfaces:
where value is the port number, or the keyword any to match any port as the
source port.
b. Set the destination port:
where value is the port number, or the keyword any to match any port as the
destination port.
where value is the port number, or the keyword any to match any port as the
source port.
b. Set the destination port:
where value is the port number, or the keyword any to match any port as the
destination port.
n icmp: The ICMP protocol is matched. Identify the ICMP type:
where value is the ICMP type and optional code, or set to any to match for any ICMP
type.
9. Set the source address type:
n address: Matches the source IPv4 address to the specified IP address or network. Set
the address that will be matched:
where value uses the format IPv4_address[/netmask], or any to match any IPv4
address.
n address6: Matches the source IPv6 address to the specified IP address or network. Set
the address that will be matched:
where value uses the format IPv6_address[/prefix_length], or any to match any IPv6
address.
n mac: Matches the source MACaddress to the specified MACaddress. Set the MAC
address to be matched:
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
n address: Matches the destination IPv4 address to the specified IP address or network.
Set the address that will be matched:
where value uses the format IPv4_address[/netmask], or any to match any IPv4
address.
n address6: Matches the destination IPv6 address to the specified IP address or network.
Set the address that will be matched:
where value uses the format IPv6_address[/prefix_length], or any to match any IPv6
address.
n mac: Matches the destination MACaddress to the specified MACaddress. Set the MAC
address to be matched:
(config)> save
Configuration saved.
>
Routing services
Your Connect EZ 16/32 includes support for dynamic routing services and protocols. The following
routing services are supported:
Service or
protocol Information
BGP The Border Gateway Protocol (BGP) service supports BGP-4 (RFC1771).
IS-IS The IPv4 and IPv6 Intermediate System to Intermediate System (IS-IS) service
(RFC1142).
NHRP Next Hop Resolution Protocol (NHRP) (RFC2332). Does not support NHRP
authentication.
OSPFv2 The IPv4 Open Shortest Path First (OSPF) service supports OSPFv2 (RFC2328).
OSPFv3 The IPv6 Open Shortest Path First (OSPF) service supports OSPFv3 (RFC2740).
RIP The IPv4 Routing Information Protocol (RIP) service supports RIPv2 (RFC2453)
and RIPv1 (RFC1058).
RIPng The IPv6 Routing Information Protocol (RIP) service supports RIPng (RFC2080).
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
The default firewall zone setting, Dynamic routes, is specifically designed to work with routing
services and should be left as the default.
5. Configure the routing services that will be used:
a. Click to expand a routing service.
b. Enable the routing service.
c. Complete the configuration of the routing service.
6. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
Additional Configuration
---------------------------------------------------------------------
----------
bgp BGP
isis IS-IS
nhrp NHRP
ospfv2 OSPFv2
ospfv3 OSPFv3
rip RIP
ripng RIPng
(config)>
b. Enable a routing service that will be used. For example, to enable the RIP service:
c. Complete the configuration of the routing service. For example, use the ? to view the
available parameters for the RIP service:
Additional Configuration
---------------------------------------------------------------------
----------
interface Interfaces
neighbour Neighbours
redis Route redistribution
timer Timers
(config)>
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the Admin CLI prompt, type show route:
You can limit the display to only IPv4 entries by using show route ipv4, or to IPv6 entries by
using show route ipv6. You can also display more information by adding the verbose option
to the show route and show route ip_type commands.
Dynamic DNS
WARNING! The Dynamic Domain Name System uses unencrypted HTTP communication.
Please ensure you are utilizing a VPN to secure your communications.
The Domain Name System (DNS) uses name servers to provide a mapping between computer-
readable IP addresses and human-readable hostnames. This allows users to access websites and
personal networks with easy-to-remember URLs. Unfortunately, IP addresses change frequently,
invalidating these mappings when they do. Dynamic DNS has become the standard method of
addressing this problem, allowing devices to update name servers with their new IP addresses.
By providing the Connect EZ 16/32 device with the domain name and credentials obtained from a
dynamic DNS provider, the router can automatically update the remote nameserver whenever your
WAN or public IP address changes.
Your Connect EZ 16/32 device supports a number of Dynamic DNS providers as well as the ability to
provide a custom provider that is not included on the list of providers.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
New Dynamic DNS configurations are enabled by default. To disable, toggle off Enable.
5. For Interface, select the interface that has its IP address registered with the Dynamic DNS
provider.
6. For Service, select the Dynamic DNS provider, or select custom to enter a custom URL for the
Dynamic DNS provider.
7. If custom is selected for Service, type the Custom URL that should be used to update the IP
address with the Dynamic DNS provider.
8. Type the Domain name that is linked to the interface's IP address.
9. Type the Username and Password used to authenticate with the Dynamic DNS provider.
10. (Optional) For Check Interval, type the amount of time to wait to check if the interface's IP
address needs to be updated.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}.
For example, to set Check interval to ten minutes, enter 10m or 600s.
11. (Optional) For Forced update interval, type the amount of time to wait to force an update of
the interface's IP address.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}.
For example, to set Forced update interval to ten minutes, enter 10m or 600s.
The setting for Forced update interval must be larger than the setting for Check Interval.
12. (Optional) For Retry interval, type the amount of time to wait for an IP address update to
succeed before retrying the update.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}.
For example, to set Retry interval to ten minutes, enter 10m or 600s.
13. (Optional) For Retry count, type the number of times to retry a failed IP address update.
14. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Add a new Dynamic DNS instance. For example, to add an instance named new_ddns_
instance:
6. If custom is configured for service, set the custom URL that should be used to update the IP
address with the Dynamic DNS provider:
10. (Optional) Set the amount of time to wait to check if the interface's IP address needs to be
updated:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the format
number{w|d|h|m|s}.
For example, to set check_interval to ten minutes, enter either 10m or 600s:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the format
number{w|d|h|m|s}.
For example, to set force_interval to ten minutes, enter either 10m or 600s:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the format
number{w|d|h|m|s}.
For example, to set retry_interval to ten minutes, enter either 10m or 600s:
(config)> save
Configuration saved.
>
VRRP+
VRRP+ is an extension to the VRRP standard that uses network probing to monitor connections
through VRRP-enabled devices and can dynamically change the priority of the devices, including
changing devices from master to backup, and from backup to master, even if the device has not
failed. For example, if a host becomes unreachable on the far end of a network link, then the physical
default gateway can be changed by adjusting the VRRP priority of the Connect EZ device connected to
the failing link. This provides failover capabilities based on the status of connections behind the
router, in addition to the basic VRRP device failover. For Connect EZ 16/32 devices, SureLink is used to
probe network connections.
VRRP+ can be configured to probe a specified IP address by either sending an ICMP echo request
(ping) or attempting to open a TCP socket to the IP address.
Configure VRRP
This section describes how to configure VRRP on a Connect EZ 16/32 device.
See Configure VRRP+ for information about configuring VRRP+, an extension to VRRP that uses
network probing to monitor connections through VRRP-enabled devices and dynamically change the
VRRP priorty of devices based on the status of their network connectivity.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
5. Click Enable.
6. For Interface, select the interface on which this VRRP instance should run.
7. For Router ID field, type the ID of the virtual router instance. The Router ID must be the same
on all VRRP devices that participate in the same VRRP device pool. Allowed values are from 1
and 255, and it is configured to 50 by default.
8. For Priority, type the priority for this router in the group. The router with the highest priority
will be used as the master router. If the master router fails, then the IP address of the virtual
router is mapped to the backup device with the next highest priority. If this device's actual IP
address is being used as the virtual IP address of the VRRP pool, then the priority of this device
should be set to 255 . Allowed values are from 1 and 255, and it is configured to 100 by
default.
9. (Optional) For Password, type a password that will be used to authenticate this VRRP router
with VRRP peers. If the password length exceeds 8 characters, it will be truncated to 8
characters.
10. Configure the virtual IP addresses associated with this VRRP instance:
a. Click to expand Virtual IP addresses.
b. Click to add a virtual IP address.
c. For Virtual IP, type the IPv4 or IPv6 address for a virtual IP of this VRRP instance.
d. (Optional) Repeat to add additional virtual IPs.
11. See Configure VRRP+ for information about configuring VRRP+.
12. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
7. Set the priority for this router in the group. The router with the highest priority will be used as
the master router. If the master router fails, then the IP address of the virtual router is mapped
to the backup device with the next highest priority. If this device's actual IP address is being
used as the virtual IP address of the VRRP pool, then the priority of this device should be set to
255 . Allowed values are from 1 and 255, and it is configured to 100 by default.
8. (Optional) Set a password that will be used to authenticate this VRRP router with VRRP peers. If
the password length exceeds 8 characters, it will be truncated to 8 characters.
9. Add a virtual IP address associated with this VRRP instance. This can be an IPv4 or IPv6
address.
Additional virtual IP addresses can be added by repeating this step with different values for ip_
address.
10. Save the configuration and apply the change.
Configure VRRP+
VRRP+ is an extension to the VRRP standard that uses SureLink network probing to monitor
connections through VRRP-enabled devices and adjust devices' VRRP priority based on the status of
the SureLink tests.
This section describes how to configure VRRP+ on a Connect EZ 16/32 device.
Note SureLink is enabled by default on all WAN interfaces, and should not be disabled on
the WAN interfaces that are being monitored by VRRP+.
If multiple WAN interfaces are being monitored on the same device, the VRRP priority will
be adjusted only if all WAN interfaces fail SureLink tests.
l The amount that the VRRP priority will be modified when SureLink determines that the
VRRP interface is not functioning correctly.
l Configure the VRRP interface's DHCP server to use a custom gateway that corresponds to
one of the VRRP virtual IP addresses.
n Backup devices only:
l Enable and configure SureLink on the VRRP interface.
l Set the IP gateway to the IP address of the VRRP interface on the master device.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
6. Click Enable.
7. Add interfaces to monitor:
a. Click to expand Monitor interfaces.
b. Click to add an interface for monitoring.
c. For Interface, select the local interface to monitor. Generally, this will be a cellular or WAN
interface.
d. (Optional) Click again to add additional interfaces.
8. (Optional) For backup devices, click to enable Monitor VRRP+ master.
This parameter allows a backup VRRP device to monitor the master device, and increase its
priority when the master device is failing SureLink tests. This can allow a device functioning as
a backup device to promote itself to master.
9. For Priority modifier, type or select the amount that the device's priority should be decreased
due to SureLink connectivity failure, and increased when SureLink succeeds again.
Along with the priority settings for devices in this VRRP pool, the amount entered here should
be large enough to automatically demote a master device when SureLink connectivity fails. For
example, if the VRRP master device has a priority of 100 and the backup device has a priority
of 80, then the Priority modifier should be set to an amount greater than 20 so that if
SureLink fails on the master, it will lower its priority to below 80, and the backup device will
assume the master role.
10. Configure the VRRP interface. The VRRP interface is defined in the Interface parameter of the
VRRP configuration, and generally should be a LAN interface:
d. Configure the VRRP interface's DHCP server to use a custom gateway that corresponds to
one of the VRRP virtual IP addresses:
i. Click to expand DHCP Server > Advanced settings.
ii. For Gateway, select Custom.
iii. For Custom gateway, enter the IP address of one of the virtual IPs used by this VRRP
instance.
e. For backup devices, enable and configure SureLink on the VRRP interface. Generally, this
should be a LAN interface; VRRP+ will then monitor the LAN using SureLink to determine if
the interface has network connectivity and promote a backup to master if SureLink fails.
i. Click to expand IPv4 > SureLink.
ii. Click Enable.
iii. For Interval, type a the amount of time to wait between connectivity tests. To
guarantee seamless internet access for VRRP+ purposes, SureLink tests should occur
11. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Create a new VRRP instance, or edit an existing one. See Configure VRRP for information about
creating a new VRRP instance.
4. Enable VRRP+:
6. Set the amount that the device's priority should be decreased or increased due to SureLink
connectivity failure or success:
(config)>
iii. Set the custom gateway to one of the VRRP virtual IP addresses. For example:
b. For backup devices, set the default gateway to the IP address of the VRRP interface on the
master device. For example:
c. For backup devices, enable and configure SureLink on the VRRP interface.
i. Determine the VRRP interface. Generally, this should be a LAN interface; VRRP+ will
then monitor the LAN using SureLink to determine if the interface has network
connectivity and promote a backup to master if SureLink fails.
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set interval to ten minutes, enter 5s:
(config network interface eth2 ipv4 surelink target 0)> test value
(config network interface eth2 ipv4 surelink target 0)>
n dns: Tests connectivity by sending a DNS query to the specified DNS server.
l Specify the DNS server. Allowed value is the IP address of the DNS server.
where value is any number of weeks, days, hours, minutes, or seconds, and
takes the format number{w|d|h|m|s}.
For example, to set interface_down_time to ten minutes, enter either
10m or 600s:
where value is any number of weeks, days, hours, minutes, or seconds, and
takes the format number{w|d|h|m|s}.
(config)> save
Configuration saved.
>
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
4. For Add VRRP instance, type a name for the VRRP instance and click .
5. Click Enable.
6. For Interface, select Interface: ETH2.
7. For Router ID, leave at the default setting of 50.
8. For Priority, leave at the default setting of 100.
9. Click to expand Virtual IP addresses.
10. Click to add a virtual IP address.
Task 3: Configure the IP address for the VRRP interface, ETH2, on device one
1. Click Network > Interfaces > ETH2 > IPv4
2. For Address, type 192.168.3.1/24.
Command line
> config
(config)>
3. Set the amount that the device's priority should be decreased or increased due to SureLink
connectivity failure or success to 30:
(config network vrrp VRRP_test )> network vrrp VRRP_test vrrp_plus weight
30
(config network vrrp VRRP_test )>
Task 3: Configure the IP address for the VRRP interface, ETH2, on device one
1. Type ... to return to the root of the config prompt:
(config)> save
Configuration saved.
>
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
5. Click Enable.
6. For Interface, select Interface: ETH2.
7. For Router ID, leave at the default setting of 50.
8. For Priority, type 80.
9. Click to expand Virtual IP addresses.
10. Click to add a virtual IP address.
Task 3: Configure the IP address for the VRRP interface, ETH2, on device two
1. Click Network > Interfaces > ETH2 > IPv4
2. For Address, type 192.168.3.2/24.
3. For Default gateway, type the IP address of the VRRP interface on the master device,
configured above in Task 3, step 2 (192.168.3.1).
Command line
> config
(config)>
4. Set the amount that the device's priority should be decreased or increased due to SureLink
connectivity failure or success to 30:
(config network vrrp VRRP_test )> network vrrp VRRP_test vrrp_plus weight
30
(config network vrrp VRRP_test )>
Task 3: Configure the IP address for the VRRP interface, ETH2, on device two
1. Type ... to return to the root of the config prompt:
3. Set the default gateway to the IP address of the VRRP interface on the master device,
configured above in Task 3, step 2 (192.168.3.1).
(config network interface eth2 ipv4 surelink target 0)> test ping
(config network interface eth2 ipv4 surelink target 0)>
2. Set the start and end addresses of the DHCP pool to use to assign DHCP addresses to clients:
a. Set the start address to 200:
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
3. To display additional information about a specific VRRP instance, at the Admin CLI prompt,
type show vrrp name name:
IPv4
----
Virtual IP address(es) : 10.10.10.1, 100.100.100.1
Current State : Master
Current Priority : 100
Last Transition : Tue Jan 1 00:00:39 2019
Became Master : 1
Released Master : 0
Adverts Sent : 71
Adverts Received : 4
Priority Zero Sent : 0
Priority zero Received : 0
>
IPsec 342
OpenVPN 407
Generic Routing Encapsulation (GRE) 448
Dynamic Multipoint VPN (DMVPN) 469
L2TP 476
L2TPv3 Ethernet 488
MACsec 494
NEMO 496
WireGuard VPN 502
IPsec
IPsec is a suite of protocols for creating a secure communication link—an IPsec tunnel—between a
host and a remote IP network or between two IP networks across a public network such as the
Internet.
IPsec mode
The Connect EZ 16/32 supports IPsec mode. You can set this mode to run using either the Tunnel or
Transport options.
Tunnel
The entire IP packet is encrypted and/or authenticated and then encapsulated as the payload in a
new IP packet.
Transport
Only the payload of the IP packet is encrypted and/or authenticated. The IP header is left
untouched. This mode has limitations when using an authentication header, because the IP
addresses in the IP header cannot be translated (for example, with Network Address Translation
(NAT), as it would invalidate the authentication hash value.
Phase 1
In phase 1, IKE creates a secure authenticated communication channel between the device and the
peer (the remote device which is at the other end of the IPsec tunnel) using the configured pre-shared
key and the Diffie-Hellman key exchange. This creates the IKE SAs that are used to encrypt further IKE
communications.
For IKEv1, there are two modes for the phase 1 negotiation: Main mode and Aggressive mode. IKEv2
does not use these modes.
Main mode
Main mode is the default mode. It is slower than aggressive mode, but more secure, in that all
sensitive information sent between the device and its peer is encrypted.
Aggressive mode
Aggressive mode is faster than main mode, but is not as secure as main mode, because the device
and its peer exchange their IDs and hash information in clear text instead of being encrypted.
Aggressive mode is usually used when one or both of the devices have a dynamic external IP
address.
Phase 2
In phase 2, IKE negotiates the SAs for IPsec. This creates two unidirectional SAs, one for each
direction. Once the phase 2 negotiation is complete, the IPsec tunnel should be fully functional.
Authentication
Client authenticaton
XAUTH (extended authentication) pre-shared key authentication mode provides additional security by
using client authentication credentials in addition to the standard pre-shared key. The Connect EZ
16/32 device can be configured to authenticate with the remote peer as an XAUTH client.
RSASignatures
With RSA signatures authentication, the Connect EZ 16/32 device uses a private RSA key to
authenticate with a remote peer that is using a corresponding public key.
Certificate-based Authentication
X.509 certificate-based authentication makes use of private keys on both the server and client which
are secured and never shared. Both the server and client have a certificate which is generated with
their respective private key and signed by a Certificate Authority (CA).
The Connect EZ 16/32 implementation of IPsec can be configured to use X.509 certificate-based
authentication using the private keys and certificates, along with a root CA certificate from the signing
authority and, if available, a Certificate Revocation List (CRL).
Note If the tunnel name is more than eight characters, the name will be truncated in the
underlying network interface to the first six characters followed by three digits,
incrementing from 000. This affects any custom scripts or firewall rules that may be trying
to adjust the tunnel’s interface or routing table entries.
n Depending on your network and firewall configuration, you may need to add a packet filtering
rule to allow incoming IPsec traffic.
n Tunnel and key renegotiating
l The lifetime of the IPsec tunnel before it is renegotiated.
l The amount of time before the IKE phase 1 lifetime expires.
l The amount of time before the IKE phase 2 lifetime expires
l The lifetime margin, a randomizing amount of time before the IPsec tunnel is renegotiated.
Note if the remote networks for an IPsec tunnel overlap with the networks for a WAN internet
connection (wired, cellular, or otherwise), you must configure a static route to direct the traffic either
through the IPsec tunnel, or through the WAN (outside of the IPsec tunnel). See Configure a static
route for information about configuring a static route.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Note Depending on your network configuration, you may need to add a packet filtering rule to
allow incoming traffic. For example, for the IPsec zone:
a. Click to expand Firewall > Packet filtering.
b. For Add packet filter, click .
c. For Label, type Allow incoming IPsec traffic.
d. For Source zone, select IPsec.
Leave all other fields at their default settings.
10. For Metric, enter or select the priority of routes associated with this IPsec tunnel. When more
than one active route matches a destination, the route with the lowest metric is used.
The metric can also be used in tandem with SureLink to configure IPsec failover behavior. See
Configure IPsec failover for more information.
11. For Mode, select Tunnel mode. Transport mode is not currently supported.
iii. For Certificate, paste the local X.509 certificate in PEM format.
iv. For Peer verification, select either:
l Peer certificate: For Peer certificate, paste the peer's X.509 certificate in
PEM format.
l Certificate Authority: For Certificate Authority chain, paste the
Certificate Authority (CA) certificates. These must include all peer
certificates in the chain up to the root CA certificate, in PEM format.
16. (Optional) For Management Priority, set the management priority for this IPsec tunnel. A
tunnel that is up and has the highest priority will be used for central management and direct
device access.
17. (Optional) To configure the device to connect to its remote peer as an XAUTH client:
a. Click to expand XAUTH client.
b. Click Enable.
c. Type the Username and Password that the device will use to authenticate as an
XAUTH client with the peer.
18. (Optional) Click Enable MODECFG client to receive configuration information, such as the
private IP address, from the remote peer.
19. Click to expand Local endpoint.
a. For Type, select either:
n Default route: Uses the same network interface as the default route.
n Interface: Select the Interface to be used as the local endpoint.
b. Click to expand ID.
i. Select the ID type:
n Auto: The ID will be automatically determined from the value of the tunnels
endpoints.
n Raw: Enter an ID and have it passed unmodified to the underlying IPsec stack.
For Raw ID value, type the ID that will be passed.
n Any: Any ID will be accepted.
n IPv4: The ID will be interpreted as an IP address and sent as an ID_IPV4_ADDR
IKE identity.
For IPv4 ID value, type an IPv4 formatted ID. This can be a fully-qualified
domain name or an IPv4 address.
n IPv6: The ID will be interpreted as an IP address and sent as an ID_IPV6_ADDR
IKE identity.
For IPv6 ID value, type an IPv6 formatted ID. This can be a fully-qualified
domain name or an IPv6 address.
n FQDN: The ID will be interpreted as FQDN (Fully Qualified Domain Name) and
sent as an ID_FQDN IKE identity.
For FQDN ID value, type the ID as an FQDN.
n KeyID: The ID will be interpreted as a Key ID and sent as an ID_KEY_ID IKE
identity.
For KEYID ID value, type the key ID.
n MAC address: The device's primary MAC address will be used as the ID and
sent as a ID_KEY_ID IKE identity.
n Serial number: The device's serial number will be used as the ID and sent as a
ID_KEY_ID IKE identity.
21. Click to expand Policies.
Policies define the network traffic that will be encapsulated by this tunnel.
a. Click to create a new policy.
g. For Remote network, enter the IP address and optional netmask of the remote network.
h. For Protocol, select one of the following:
n Any: Matches any protocol.
n TCP: Matches TCP protocol only.
n UDP: Matches UDP protocol only.
n ICMP: Matches ICMP requests only.
n Other protocol: Matches an unlisted protocol.
If Other protocol is selected, type the number of the protocol.
i. For Port, type the port matching criteria.
Allowed values are a port number, a range of port numbers, or any.
22. Click to expand IKE.
a. For IKE version, select either IKEv1 or IKEv2. This setting must match the peer's IKE
version.
b. Initiate connection instructs the device to initiate the key exchange, rather than waiting
for an incoming request. This must be disabled if Remote endpoint > Hostname is set to
any.
c. For Mode, select either Main mode or Aggressive mode.
d. For IKE fragmentation, select one of the following:
n If supported by the peer: Send oversized IKE messages in fragments, if the peer
supports receiving them.
n Always: Always send IKEv1 messages in fragments. For IKEv2, this option is
equivalent to If supported by the peer.
n Never: Do not send oversized IKE messages in fragments.
n Accept: Do not send oversized IKE messages in fragments, but announce support
for fragmentation to the peer.
The default is Always.
e. For Enable padding, click to disable the padding of IKE packets. This should normally not
be disabled except for compatibility purposes.
f. For Phase 1 lifetime, enter the amount of time that the IKE security association expires
after a successful negotiation and must be re-authenticated.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}.
For example, to set Phase 1 lifetime to ten minutes, enter 10m or 600s.
g. For Phase 2 lifetime, enter the amount of time that the IKE security association expires
after a successful negotiation and must be rekeyed.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}.
For example, to set Phase 2 lifetime to ten minutes, enter 10m or 600s.
h. For Lifetime margin, enter a randomizing amount of time before the IPsec tunnel is
renegotiated.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}.
For example, to set Lifetime margin to ten minutes, enter 10m or 600s.
i. Click to expand Phase 1 Proposals.
i. Click to create a new phase 1 proposal.
ii. For Cipher, select the type of encryption.
iii. For Hash, select the type of hash to use to verify communication integrity.
iv. For Diffie-Hellman group, select the type of Diffie-Hellman group to use for key
exchange.
v. You can add additional Phase 1 proposals by clicking next to Add Phase 1
Proposal.
j. Click to expand Phase 2 Proposals.
i. Click to create a new phase 2 proposal.
ii. For Cipher, select the type of encryption.
iii. For Hash, select the type of hash to use to verify communication integrity.
iv. For Diffie-Hellman group, select the type of Diffie-Hellman group to use for key
exchange.
v. You can add additional Phase 2 proposals by clicking next to Add Phase 2
Proposal.
23. (Optional) Click to expand Dead peer detection. Dead peer detection is enabled by default.
Dead peer detection uses periodic IKE transmissions to the remote endpoint to detect whether
tunnel communications have failed, allowing the tunnel to be automatically restarted when
failure occurs.
a. To enable or disable dead peer detection, click Enable.
b. For Delay, type the number of seconds between transmissions of dead peer packets. Dead
peer packets are only sent when the tunnel is idle.
c. For Timeout, type the number of seconds to wait for a response from a dead peer packet
before assuming the tunnel has failed.
24. (Optional) Click to expand NAT to create a list of destination networks that require source NAT.
a. Click next to Add NAT destination.
b. For Destination network, type the IPv4 address and optional netmask of a destination
network that requires source NAT. You can also use any, meaning that any destination
network connected to the tunnel will use source NAT.
25. See Configure SureLink active recovery for IPsec for information about IPsec Active recovery.
26. (Optional) Click Advanced to set various IPsec-related time out, keep alive, and related values.
27. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Add an IPsec tunnel. For example, to add an IPsec tunnel named ipsec_example:
4. (Optional) Set the tunnel to use UDP encapsulation even when it does not detect that NAT is
being used:
5. Set the firewall zone for the IPsec tunnel. Generally this should be left at the default of ipsec.
Zone: The firewall zone assigned to this IPsec tunnel. This can be used
by packet filtering rules
and access control lists to restrict network traffic on this tunnel.
Format:
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
Default value: ipsec
Current value: ipsec
Note Depending on your network configuration, you may need to add a packet filtering rule to
allow incoming traffic. For example, for the IPsec zone:
a. Type ... to move to the root of the configuration:
6. Set the metric for the IPsec tunnel. When more than one active route matches a destination,
the route with the lowest metric is used. The metric can also be used in tandem with SureLink
to configure IPsec failover behavior. See Configure IPsec failover for more information.
b. Set the remote pre-shared key. This must be the same as the local key on the
remote host.:
n rsasig: Uses a private RSA key to authenticate with the remote peer.
a. For the private_key parameter, paste the device's private RSA key in PEM format:
b. Set the private key passphrase that is used to decrypt the private key. Leave blank
if the private key is not encrypted.
c. For the peer_public_key parameter, paste the peer's public RSA key in PEM
format:
n x509: Uses private key and X.509 certificates to authenticate with the remote peer.
a. For the private_key parameter, paste the device's private RSA key in PEM format:
b. Set the private key passphrase that is used to decrypt the private key. Leave blank
if the private key is not encrypted.
c. For the cert parameter, paste the local X.509 certificate in PEM format:
11. (Optional) Configure the device to connect to its remote peer as an XAUTH client:
a. Enable XAUTH client functionality:
n fqdn: The ID will be interpreted as FQDN (Fully Qualified Domain Name) and sent as
an ID_FQDN IKE identity.
n keyid: The ID will be interpreted as a Key ID and sent as an ID_KEY_ID IKE identity.
Set the key ID:
n mac_address: The device's MAC address will be used for the Key ID and sent as an
ID_KEY_ID IKE identity.
n serial_number: The ID device's serial number will be used for the Key ID and sent
as an ID_KEY_ID IKE identity.
14. Configure the remote endpoint:
a. Add a remote hostname:
(config vpn ipsec tunnel ipsec_example)> add remote hostname end value
(config vpn ipsec tunnel ipsec_example)>
where value is the hostname or IPv4 address of the IPsec peer. If your device is not
configured to initiate the IPsec connection (see ike initiate), you can also use the keyword
any, which means that the hostname is dynamic or unknown.
Repeat for additional hostnames.
b. Set the hostname selection type:
n fqdn: The ID will be interpreted as FQDN (Fully Qualified Domain Name) and sent as
an ID_FQDN IKE identity.
n keyid: The ID will be interpreted as a Key ID and sent as an ID_KEY_ID IKE identity.
Set the key ID:
n mac_address: The device's MAC address will be used for the Key ID and sent as an
ID_KEY_ID IKE identity.
n serial_number: The ID device's serial number will be used for the Key ID and sent
as an ID_KEY_ID IKE identity.
15. Configure IKE settings:
a. Set the IKE version:
where value is either ikev1 or ikev2. This setting must match the peer's IKE version.
b. Determine whether the device should initiate the key exchange, rather than waiting for an
incoming request. By default, the device will initiate the key exchange. This must be
disabled if remote hostname is set to any. To disable:
f. Set the amount of time that the IKE security association expires after a successful
negotiation and must be re-authenticated:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set phase1_lifetime to ten minutes, enter either 10m or 600s:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set phase2_lifetime to ten minutes, enter either 10m or 600s:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set lifetime_margin to ten minutes, enter either 10m or 600s:
ecp224
...
(config vpn ipsec tunnel ipsec_example ike phase1_proposal 0)>
Repeat the above steps to set the type of encryption, hash, and Diffie-Hellman
group for the additional proposal.
iii. Repeat to add more phase 1 proposals.
j. Configure the types of encryption, hash, and Diffie-Hellman group to use during phase 2:
i. Move back two levels in the schema:
n aes128gcm64
n aes128gcm96
n aes192
n aes192gcm128
n aes192gcm64
n aes192gcm96
n aes256
n aes256gcm128
n aes256gcm64
n aes256gcm96
n null
The default is 3des.
iv. Set the type of hash to use during phase 2 to verify communication integrity:
Repeat the above steps to set the type of encryption, hash, and Diffie-Hellman
group for the additional proposal.
iii. Repeat to add more phase 2 proposals.
16. (Optional) Configure dead peer detection:
Dead peer detection is enabled by default. Dead peer detection uses periodic IKE transmissions
to the remote endpoint to detect whether tunnel communications have failed, allowing the
tunnel to be automatically restarted when failure occurs.
a. Change to the root of the configuration schema:
c. Set the number of seconds between transmissions of dead peer packets. Dead peer
packets are only sent when the tunnel is idle. The default is 60.
d. Set the number of seconds to wait for a response from a dead peer packet before
assuming the tunnel has failed. The default is 90.
17. (Optional) Create a list of destination networks that require source NAT:
a. Add a destination network:
b. Set the IPv4 address and optional netmask of a destination network that requires source
NAT. You can also use any, meaning that any destination network connected to the tunnel
will use source NAT.
18. Configure policies that define the network traffic that will be encapsulated by this tunnel:
a. Change to the root of the configuration schema:
b. Add a policy:
(config vpn ipsec tunnel ipsec_example policy 0)> local type value
(config vpn ipsec tunnel ipsec_example policy 0)>
where value is the IPv4 address and optional netmask. The keyword any can also
be used.
n request: Requests a network from the remote peer.
n dynamic: Uses the address of the local endpoint.
d. Set the port matching criteria for the local traffic selector:
(config vpn ipsec tunnel ipsec_example policy 0)> local port value
(config vpn ipsec tunnel ipsec_example policy 0)>
where value is the port number, a range of port numbers, or the keyword any.
e. Set the protocol matching criteria for the local traffic selector:
(config vpn ipsec tunnel ipsec_example policy 0)> local protocol value
(config vpn ipsec tunnel ipsec_example policy 0)>
(config vpn ipsec tunnel ipsec_example policy 0)> remote network value
(config vpn ipsec tunnel ipsec_example policy 0)>
g. Set the port matching criteria for the remote traffic selector:
(config vpn ipsec tunnel ipsec_example policy 0)> remote port value
(config vpn ipsec tunnel ipsec_example policy 0)>
where value is the port number, a range of port numbers, or the keyword any.
h. Set the protocol matching criteria for the remote traffic selector:
Additional Configuration
---------------------------------------------------------------------
----------
connection_retry_timeout Connection retry timeout
connection_try_interval Connection try interval
ike_timeout IKE timeout
(config)>
(config)> save
Configuration saved.
>
1. SureLink will shut down the tunnel and renegotiate its IPsec connection.
2. While the tunnel with the lower metric is down, traffic addressed to the remote endpoint will
be routed through the tunnel with the higher metric.
For example:
n Tunnel_1:
l Metric: 10
l Local endpoint > Interface: ETH2
l Remote endpoint > Hostname: 192.168.10.1
l SureLink configuration:
o Restart Interface enabled
o Test target:
o Test type: Ping test
o Ping host: 192.168.10.2
n Tunnel_2:
l Metric: 20
l Local endpoint > Interface: ETH2
l Remote endpoint > Hostname: 192.168.10.1
In this configuration:
1. Tunnel_1 will normally be used for traffic destined for the 192.168.10.1 endpoint.
2. If pings to 192.168.10.2 fail, SureLink will shut down the tunnel and renegotiate its IPsec
connection.
3. While Tunnel_1 is down, Tunnel_2 will be used for traffic destined for the 192.168.10.1
endpoint.
Web
1. Configure the primary IPsec tunnel. See Configure an IPsec tunnel for instructions.
n During configuration of the IPsec tunnel, set the metric to a low value (for example, 10).
n Configure SureLink for the primary IPsec tunnel and enable Restart interface. See
Configure SureLink active recovery for IPsec for instructions.
2. Create a backup IPsec tunnel. Configure this tunnel to use the same local and remote
endpoints as the primary tunnel. See Configure an IPsec tunnel for instructions.
n During configuration of the IPsec tunnel, set the metric to a value that is higher than the
metric of the primary tunnel (for example, 20).
Command line
1. Configure the primary IPsec tunnel. See Configure an IPsec tunnel for instructions.
n During configuration of the IPsec tunnel, set the metric to a low value (for example, 10):
n Configure SureLink for the primary IPsec tunnel and enable Restart interface. See
Configure SureLink active recovery for IPsec for instructions.
2. Create a backup IPsec tunnel. Configure this tunnel to use the same local and remote
endpoints as the primary tunnel. See Configure an IPsec tunnel for instructions.
n During configuration of the IPsec tunnel, set the metric to a value that is higher than the
metric of the primary tunnel (for example, 20):
Web
1. Configure the primary IPsec tunnel. See Configure an IPsec tunnel for instructions.
2. Create a backup IPsec tunnel. See Configure an IPsec tunnel for instructions.
3. During configuration of the backup IPsec tunnel, identify the primary IPsec tunnel in the
Preferred tunnel parameter:
Command line
1. Configure the primary IPsec tunnel. See Configure an IPsec tunnel for instructions.
2. Create a backup IPsec tunnel. See Configure an IPsec tunnel for instructions.
3. During configuration of the backup IPsec tunnel, identify the primary IPsec tunnel:
a. Use the ? to view a list of available tunnels:
Preferred tunnel: This tunnel will not start until the preferred
tunnel has failed. It will continue
to operate until the preferred tunnel returns to full operation
status.
Format:
primary_ipsec_tunnel
backup_ipsec_tunnel
Optional: yes
Current value:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
6. Enable SureLink.
7. (Optional) Change the Test interval between connectivity tests.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}.
For example, to set Interval to ten minutes, enter 10m or 600s.
The default is 15 minutes.
8. (Optional) If more than one test target is configured, for Success condition, select either:
n One test passes: Only one test needs to pass for Surelink to consider an interface to be
up.
n All test pass: All tests need to pass for SureLink to consider the interface to be up.
9. (Optional) For Pass threshold, type or select the number of times that the test must pass after
failure, before the interface is determined to be working and is reinstated.
10. (Optional) For Response timeout, type the amount of time that the device should wait for a
response to a test failure before considering it to have failed.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}.
For example, to set Response timeout to ten minutes, enter 10m or 600s.
The default is 15 seconds.
11. Click to expand Tests.
By default, Test DNS servers configured for this interface is automatically configured and
enabled. This test communication with DNS servers that are either provided by DHCP, or
statically configured for this interface.
a. Click .
New tests are enabled by default. To disable, click to toggle off Enable.
b. Type a Label for the test.
c. Click to toggle on IPv6 if the test should apply to both IPv6 rather than IPv4.
d. Select the Test type.
Available test types:
n Ping test: Uses ICMP to determine connectivity.
If Ping test is selected, complete the following:
l Ping target: The type of target for the ping, one of:
o Hostname or IP address of an external server.
o Ping host: hostname or IP address of the server.
o The Interface gateway. If Interface gateway is selected, an initial
traceroute is sent to the hostname or IP address configured in the SureLink
advanced settings, and then the first hop in that route is used for the ping
test.
o The Interface address.
o The Interface DNS server.
l Ping payload size: The number of bytes to send as part of the ping payload.
n DNS test: Performs a DNS query to the named DNS server.
If DNS test is selected, complete the following:
l DNS server: The IP address of the DNS server.
n HTTP test: Uses HTTP(s) GET requests to determine connectivity to the configured
web server.
If HTTP test is selected, complete the following:
l Web server: The URL of the web server.
n Test DNS servers configured for this interface: Tests communication with DNS
servers that are either provided by DHCP, or statically configured for this interface.
n Test the interface status: Tests the current status of the interface. The test fails if
the interface is down. Failing this test infers that all other tests fail.
If Test the interface status is selected, complete the following:
l Down time: The amount of time that the interface is down before the test can
be considered to have failed.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and
take the format number{w|d|h|m|s}.
For example, to set Down time to ten minutes, enter 10m or 600s.
l Initial connection time: The amount of time to wait for the interface to
connect for the first time before the test is considered to have failed.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and
take the format number{w|d|h|m|s}.
For example, to set Initial connection time to ten minutes, enter 10m or 600s.
n Custom test: Tests the interface with custom commands.
If Custom test is selected, complete the following:
l The Commands to run to test.
n TCP connection test: Tests that the interface can reach a destination port on the
configured host.
If TCP connection test is selected, complete the following:
l TCP connect host: The hostname or IP address of the host to create a
TCP connection to.
l TCP connect port: The TCP port to create a TCP connection to.
n Test another interface's status: Tests the status of another interface.
If Test another interface's status is selected, complete the following:
l Test interface: The interface to test.
l IP version: The type of IP connection, one of:
o Any: Either the IPv4 or IPv6 connection must be up.
o Both: Both the IPv4 or IPv6 connection must be up.
o IPv4: The IPv4 connection must be up.
o IPv6: The IPv6 connection must be up.
l Expected status: The status required for the test to past.
o Up: The test will pass only if the referenced interface is up and passing its
own SureLink tests (if applicable).
o Down: The test will pass only if the referenced interface is down or failing its
own SureLink tests (if applicable).
e. Repeat for each additional test.
12. Add recovery actions:
a. Click to expand Recovery actions.
By default, there are two preconfigured recovery actions:
n Update routing: Uses the Change default gateway action, which increases the
interface's metric by 100 to change the default gateway.
n Restart interface.
b. Click .
New recovery actions are enabled by default. To disable, click to toggle off Enable.
c. Type a Label for the recovery action.
d. For Recovery type, select Reboot device.
e. For Recovery type, select the type of recovery action. If multiple recovery actions are
configured, they are performed in the order that they are listed.
n Change default gateway: Increases the interface's metric to change the default
gateway.
If Change default gateway is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l Increase metric to change active default gateway: Increase the interface's
metric by this amount. This should be set to a number large enough to change
the routing table to use another default gateway. The default is 100.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
n Restart interface.
If Restart interface is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
n Reset modem: This recovery action is available for WWAN interfaces only.
If Reset modem is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
n Switch to alternate SIM: Switches to an alternate SIM. This recovery action is
available for WWAN interfaces only.
If Switch to alternate SIM is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
n Reboot device.
If Reboot device is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
n Execute custom Recovery commands.
If Recovery commands is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l The Commands to run to recovery connectivity.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
n Powercycle the modem. This recovery action is available for WWAN interfaces
only.
If Powercycle the modem is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
f. Repeat for each additional recovery action.
13. (Optional) Configure advanced SureLink parameters:
a. Click to expand Advanced settings.
b. For Delayed Start, type the amount of time to wait while the device is starting before
SureLink testing begins. This setting is bypassed when the interface is determined to be
up.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}.
For example, to set Delayed start to ten minutes, enter 10m or 600s.
The default is 300 seconds.
c. For Backoff interval, type the time to add to the test interval when restarting the list of
actions. This option is capped at 15 minutes.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}.
For example, to set Backoff interval to ten minutes, enter 10m or 600s.
The default is 300 seconds.
d. Test interface gateway by pinging is used by the Interface gateway Ping test as the
endpoint for traceroute to use to determine the interface gateway. The default is 8.8.8.8,
and should only be changed if this IP address is not accessible due to networking issues.
14. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
4. Enable SureLink:
5. By default, the Test DNS servers configured for this interface test is automatically
configured and enabled. This tests communication with DNS servers that are either provided
by DHCP, or statically configured for this interface.
To add additional tests:
a. Add a test:
(config vpn ipsec tunnel ipsec_example surelink tests 1)> enable false
(config vpn ipsec tunnel ipsec_example surelink tests 1)>
(config vpn ipsec tunnel ipsec_example surelink tests 1)> label string
(config vpn ipsec tunnel ipsec_example surelink tests 1)>
d. if the test should apply to both IPv6 rather than IPv4, enable IPv6:
(config vpn ipsec tunnel ipsec_example surelink tests 1)> ipv6 true
(config vpn ipsec tunnel ipsec_example surelink tests 1)>
(config vpn ipsec tunnel ipsec_example surelink tests 1)> test value
(config vpn ipsec tunnel ipsec_example surelink tests 1)>
n http: Uses HTTP(s) GET requests to determine connectivity to the configured web
server.
If http is set, set the URL of the web server.
n dns_configured: Tests communication with DNS servers that are either provided
by DHCP, or statically configured for this interface.
n interface_up: Tests the current status of the interface. The test fails if the interface
is down. Failing this test infers that all other tests fail.
If interface_up is set, complete the following:
l Set the amount of time that the interface is down before the test can be
considered to have failed.
where value is any number of weeks, days, hours, minutes, or seconds, and
takes the format number{w|d|h|m|s}.
For example, to set interface_down_time to ten minutes, enter either 10m or
600s:
l Set the amount of time to wait for the interface to connect for the first time
before the test is considered to have failed.
where value is any number of weeks, days, hours, minutes, or seconds, and
takes the format number{w|d|h|m|s}.
For example, to set interface_timeout to ten minutes, enter either 10m or
600s:
n tcp_connection: Tests that the interface can reach a destination port on the
configured host.
If tcp_connection is selected, complete the following:
l Set the hostname or IP address of the host to create a TCP connection to:
n Set the number of failures for this recovery action to perform, before moving to the
next recovery action:
The default is 3.
n Set the time to wait before the next test is run. If set to the default value of 0s, the
test interval is used.
f. Set the type of recovery action. If multiple recovery actions are configured, they are
performed in the order that they are listed. The command varies depending on whether
the interface is a WAN or WWAN:
n WAN interfaces:
n WWAN interfaces:
The default is 3.
l Set the amount that the interface's metric should be increased. This should be
set to a number large enough to change the routing table to use another
default gateway.
n restart_interface.
If restart_interface is selected, complete the following:
l Set the number of failures for this recovery action to perform, before moving to
the next recovery action:
The default is 3.
l Set the time to wait before the next test is run. If set to the default value of 0s,
the test interval is used.
The default is 3.
l Set the time to wait before the next test is run. If set to the default value of 0s,
the test interval is used.
The default is 3.
l Set the time to wait before the next test is run. If set to the default value of 0s,
the test interval is used.
The default is 3.
l Set the time to wait before the next test is run. If set to the default value of 0s,
the test interval is used.
n reboot_device.
If reboot_device is selected, complete the following:
l Set the number of failures for this recovery action to perform, before moving to
the next recovery action:
The default is 3.
l Set the time to wait before the next test is run. If set to the default value of 0s,
the test interval is used.
The default is 3.
l Set the commands to run to attempt to recovery connectivity.
l Set the time to wait before the next test is run. If set to the default value of 0s,
the test interval is used.
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set interval to ten minutes, enter either 10m or 600s:
The default is 1.
e. Set the amount of time that the device should wait for a response to a test attempt before
considering it to have failed:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set timeout to ten minutes, enter either 10m or 600s:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set delayed_start to ten minutes, enter either 10m or 600s:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set backoff_interval to ten minutes, enter either 10m or 600s:
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the menu, select Status > IPsec.
The IPsec page appears.
2. To view configuration details about an IPsec tunnel, click the (configuration) icon in the
upper right of the tunnel's status pane.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. To display details about all configured IPsec tunnels, type the following at the prompt:
>
Tunnel : ipsec1
Enable : true
Status : pending
Hostname : 192.168.2.1
Zone : ipsec
Mode : tunnel
Type : esp
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
n Sensitive material: Also includes sensitive material in dumps (for example, encryption
keys).
6. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
(config)> save
Configuration saved.
>
WARNING! The Simple Certificate Enrollment Protocol (SCEP) uses unencrypted HTTP
communication. Please ensure you are utilizing a VPN to secure your communications.
Simple Certificate Enrollment Protocol (SCEP) is a mechanism that allows for large-scale X.509
certificate deployment. You can configure Connect EZ 16/32 device to function as a SCEP client that
will connect to a SCEP server that is used to sign Certificate Signing Requests (CSRs), provide
Certificate Revocation Lists (CRLs), and distribute valid certificates from a Certificate Authority (CA).
Required configuration
n Enable the SCEP client.
n The fully-qualified domain name of the SCEP server to be used for certificate requests.
n The challenge password provided by the SCEP server that the SCEP client will use when
making SCEP requests.
n The distinguished name to be used for the CSR.
Additional configuration
n The number of days that the certificate enrollment can be renewed, prior to the request
expiring.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
12. For FQDN, type the fully qualified domain name or IP address of the SCEP server.
13. (Optional) For CA identity, type a string that will be understood by the certificate authority.
For example, it could be a domain name or a user name. If the certificate authority has
multiple CA certificates, this field can be used to distinguish which is required.
14. For Path, Type the HTTP URL path required for accessing the certificate authority. You should
leave this option at the default of /cgi-bin/pkiclient.exe unless directed by the CA to use
another path.
15. For Password, type the challenge password as configured on the SCEP server.
16. For Encryption Algorithm, select the PKCS#7 encryption algorithm. The default is Auto, which
automatically selects the best algorithm.
17. For Signature Algorithm, select the PKCS#7 signature algorithm. The default is Auto, which
automatically selects the best algorithm.
18. Click to expand Distinguished Name.
19. Type the value for each appropriate Distinguished Name attribute.
20. (Optional) Configure the certificate revocation list (CRL):
a. Click to expand CRL.
b. Click Enable to enable the CRL.
c. For Type, select the type of CRL:
n URL: The URL to the file name used to access the certificate revocation list from the
CA.
n CRLDP: The CRL distribution point.
n getCRL: A CRL query using the issuer name and serial number from the certificate
whose revocation status is being queried.
The default is URL.
d. If Type is set to URL, for URL, type the URL to be used.
21. Configure certificate renewal:
a. Click to expand Renewal.
b. Click Use New Private Key to enable the creation of a new private key for renewal
requests.
c. Use Client Certificate is enabled by default. Click to disable the use of a client certificate
for renewal requrests.
22. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
5. Set the url parameter to the fully qualified domain name or IP address of the SCEP server:
6. (Optional) Set a CA identity string that will be understood by the certificate authority. For
example, it could be a domain name or a user name. If the certificate authority has multiple
CA certificates, this field can be used to distinguish which is required.
7. Set the HTTP URL path required for accessing the certificate authority. You should leave this
option at the default of /cgi-bin/pkiclient.exe unless directed by the CA to use another path.
b. The use of a client certificate for renewal requests is enabled by default. To disable:
12. Set the maximum time that the device will poll the SCEP server, when operating in manual
mode:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the format
number{w|d|h|m|s}.
For example, to set max_poll_time to ten minutes, enter either 10m or 600s:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the format
number{w|d|h|m|s}.
For example, to set polling_interval to ten minutes, enter either 10m or 600s:
15. Set the number of days that the certificate enrollment can be renewed, prior to the request
expiring. This value is configured on the SCEP server, and is used by the Connect EZ 16/32
device to determine when to start attempting to auto-renew an existing certificate. The default
is 7.
Fortinet configuration
On the Fortinet server:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
9. For FQDN, type the fully qualified domain name or IP address of the Fortinet server.
10. For Password, type the challenge password. This corresponds to the Default enrollment
password on the Fortinet server.
12. Type the value for each appropriate Distinguished Name attribute. The values entered here
must correspond to the DN attributes in the Enrollment Request on the Fortinet server.
13. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
5. Set the url parameter to the fully qualified domain name or IP address of the SCEP server:
6. Set the challenge password as configured on the SCEP server. This corresponds to the Default
enrollment password on the Fortinet server.
7. Set Distinguished Name attributes. The values entered here must correspond to the DN
attributes in the Enrollment Request on the Fortinet server.
a. Set the Domain Component:
8. Set the number of days that the certificate enrollment can be renewed, prior to the request
expiring. This value must match the setting of the Allow renewal x days before the certified
is expired option on the Fortinet server.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. To display details about all configured SCEP clients, type the following at the prompt:
>
For example:
Client Certificate
------------------
Subject : C=US,ST=MA,L=BOS,O=Digi,OU=IT1,CN=dummy
Issuer : CN=TA-SCEP-1-CA
Serial : 1100000017A30C8EDD3805EB52000000000017
Expiry : Jun 4 19:05:25 2022 GMT
>
OpenVPN
OpenVPN is an open-source Virtual Private Network (VPN) technology that creates secure point-to-
point or site-to-site connections in routed or bridged configurations. OpenVPN uses a custom security
protocol that is Secure Socket Layer (SSL) / Transport Layer Security (TLS) for key exchange. It uses
standard encryption and authentication algorithms for data privacy and authentication over TCP or
UDP.
The OpenVPN server can push the network configuration, such as the topology and IP routes, to
OpenVPN clients. This makes OpenVPN simpler to configure as it reduces the chances of a
configuration mismatch between the client and server. OpenVPN also supports cipher negotiation
between the client and server. This means you can configure the OpenVPN server and clients with a
range of different cipher options and the server will negotiate with the client on the cipher to use for
the connection.
For more information on OpenVPN, see www.openvpn.net.
OpenVPN modes:
There are two modes for running OpenVPN:
n Routing mode, also known as TUN.
n Bridging mode, also known as TAP.
n OpenVPN managed—The Connect EZ 16/32 device creates the interface and then uses its
standard configuration to set up the connection (for example, its standard DHCP server
configuration).
n Device only—IP addressing is controlled by the system, not by OpenVPN.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
and you must create an OpenVPN authentication group and user. See Configure an
OpenVPN Authentication Group and User for instructions.
b. Paste the contents of the CA certificate (usually in a ca.crt file), the Public key (for
example, server.crt), the Private key (for example, server.key), and the Diffie Hellman
key (usually in dh2048.pem) into their respective fields. The contents will be hidden when
the configuration is saved.
10. (Optional) Click to expand Access control list to restrict access to the OpenVPN server:
n To limit access to specified IPv4 addresses and networks:
a. Click IPv4 Addresses.
b. For Add Address, click .
c. For Address, enter the IPv4 address or network that can access the device's
service-type. Allowed values are:
l A single IP address or host name.
l A network designation in CIDRnotation, for example, 192.168.1.0/24.
l any: No limit to IPv4 addresses that can access the service-type.
d. Click again to list additional IP addresses or networks.
n To limit access to specified IPv6 addresses and networks:
a. Click IPv6 Addresses.
b. For Add Address, click .
c. For Address, enter the IPv6 address or network that can access the device's
service-type. Allowed values are:
l A single IP address or host name.
l A network designation in CIDRnotation, for example, 2001:db8::/48.
l any: No limit to IPv6 addresses that can access the service-type.
d. Click again to list additional IP addresses or networks.
n To limit access to hosts connected through a specified interface on the device:
a. Click Interfaces.
b. For Add Interface, click .
c. For Interface, select the appropriate interface from the dropdown.
d. Click again to allow access through additional interfaces.
n To limit access based on firewall zones:
a. Click Zones. By default, there are three firewall zones already configured: Internal,
Edge, and IPsec.
b. For Add Zone, click .
c. For Zone, select the appropriate firewall zone from the dropdown.
See Firewall configuration for information about firewall zones.
d. Click again to allow access through additional firewall zones.
11. (Optional) Click to expand Advanced Options to manually set additional OpenVPN
parameters.
a. Click Enable to enable the use of additional OpenVPN parameters.
b. Click Override if the additional OpenVPN parameters should override default options.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
b. Set the firewall zone for the OpenVPN server. For TUN device types, this should be set to
internal to treat clients as LAN devices.
Zone: The zone for the local TUN interface. To treat clients as LAN
devices this would usually be
set to internal.
Format:
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
Current value:
c. (Optional) Set the route metric for the OpenVPN server. If multiple active routes match a
destination, the route with the lowest metric will be used.
where value is a number between 1 and 255. The number entered here will represent
the first client IP address. For example, if address is set to 192.168.1.1/24 and
server_first_ip is set to 80, the first client IP address will be 192.168.1.80.
The default is from 80.
ii. Set the last address in the range limit:
where value is a number between 1 and 255. The number entered here will represent
the last client IP address. For example, if address is set to 192.168.1.1/24 and
server_last_ip is set to 99, the last client IP address will be 192.168.1.80.
The default is from 80.
6. (Optional) Set the port that the OpenVPN server will use:
iii. Paste the contents of the public key (for example, server.crt) into the value of the
server_cert parameter:
iv. Paste the contents of the private key (for example, server.key) into the value of the
server_key parameter:
v. Paste the contents of the Diffie Hellman key (usually in dh2048.pem) into the value of
the diffie parameter:
8. (Optional) Set the access control list to restrict access to the OpenVPN server:
n To limit access to specified IPv4 addresses and networks:
(config vpn openvpn server name)> add acl address end value
(config vpn openvpn server name)>
(config vpn openvpn server name)> add acl address6 end value
(config vpn openvpn server name)>
(config vpn openvpn server name)> add acl interface end value
(config vpn openvpn server name)>
(config vpn openvpn server name)> add acl zone end value
(config vpn openvpn server name)>
Where value is a firewall zone defined on your device, or the any keyword.
Additional Configuration
--------------------------------------------------------
-----------------------
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
b. Configure whether the additional OpenVPN parameters should override default options:
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
c. Click OpenVPN access to enable OpenVPN access rights for users of this group.
d. Click to expand the OpenVPN node.
e. Click to add a tunnel.
f. For Tunnel, select an OpenVPN tunnel to which users of this group will have access.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Use the add auth group command to add a new authentication. For example, to add a group
named OpenVPN_Group:
5. Add an OpenVPN tunnel to which users of this group will have access:
a. Determine available tunnels:
Additional Configuration
---------------------------------------------------------------------
----------
OpenVPN_server1 OpenVPN server
b. Add a tunnel:
(config auth group OpenVPN_Group)> add auth group test acl openvpn
tunnels end /vpn/openvpn/server/OpenVPN_server1
(config auth group OpenVPN_Group)>
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
5. (Optional) Set the route metric for the OpenVPN server. If multiple active routes match a
destination, the route with the lowest metric will be used.
7. Paste the content of the client.ovpn file into the value of the config_file parameter:
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
4. For Add, type a name for the OpenVPN client and click .
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
4. The default behavior is to use an OVPN file for client configuration. To disable this behavior
and configure the client manually:
Format:
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
Current value:
7. (Optional) Set the route metric for the OpenVPN server. If multiple active routes match a
destination, the route with the lowest metric will be used.
12. Paste the contents of the public key (for example, client.crt) into the value of the public_cert
parameter:
13. Paste the contents of the private key (for example, client.key) into the value of the private_
key parameter:
b. Configure whether the additional OpenVPN parameters should override default options:
(config)> save
Configuration saved.
>
To configure the Connect EZ 16/32 device to regularly probe the OpenVPN connection:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
6. Enable SureLink.
7. (Optional) Change the Test interval between connectivity tests.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}.
For example, to set Interval to ten minutes, enter 10m or 600s.
The default is 15 minutes.
8. (Optional) If more than one test target is configured, for Success condition, select either:
n One test passes: Only one test needs to pass for Surelink to consider an interface to be
up.
n All test pass: All tests need to pass for SureLink to consider the interface to be up.
9. (Optional) For Pass threshold, type or select the number of times that the test must pass after
failure, before the interface is determined to be working and is reinstated.
10. (Optional) For Response timeout, type the amount of time that the device should wait for a
response to a test failure before considering it to have failed.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}.
For example, to set Response timeout to ten minutes, enter 10m or 600s.
The default is 15 seconds.
11. Click to expand Tests.
By default, Test DNS servers configured for this interface is automatically configured and
enabled. This test communication with DNS servers that are either provided by DHCP, or
statically configured for this interface.
a. Click .
New tests are enabled by default. To disable, click to toggle off Enable.
b. Type a Label for the test.
c. Click to toggle on IPv6 if the test should apply to both IPv6 rather than IPv4.
d. Select the Test type.
Available test types:
n Ping test: Uses ICMP to determine connectivity.
If Ping test is selected, complete the following:
l Ping target: The type of target for the ping, one of:
o Hostname or IP address of an external server.
o Ping host: hostname or IP address of the server.
o The Interface gateway. If Interface gateway is selected, an initial
traceroute is sent to the hostname or IP address configured in the SureLink
advanced settings, and then the first hop in that route is used for the ping
test.
New recovery actions are enabled by default. To disable, click to toggle off Enable.
c. Type a Label for the recovery action.
d. For Recovery type, select Reboot device.
e. For Recovery type, select the type of recovery action. If multiple recovery actions are
configured, they are performed in the order that they are listed.
n Change default gateway: Increases the interface's metric to change the default
gateway.
If Change default gateway is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l Increase metric to change active default gateway: Increase the interface's
metric by this amount. This should be set to a number large enough to change
the routing table to use another default gateway. The default is 100.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
n Restart interface.
If Restart interface is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
n Reset modem: This recovery action is available for WWAN interfaces only.
If Reset modem is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
n Switch to alternate SIM: Switches to an alternate SIM. This recovery action is
available for WWAN interfaces only.
If Switch to alternate SIM is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
n Reboot device.
If Reboot device is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
n Execute custom Recovery commands.
If Recovery commands is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l The Commands to run to recovery connectivity.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
n Powercycle the modem. This recovery action is available for WWAN interfaces
only.
If Powercycle the modem is selected, complete the following:
l SureLink test failures: The number of failures for this recovery action to
perform, before moving to the next recovery action.
l Override wait interval before performing the next recovery action: The
time to wait before the next test is run. If set to the default value of 0s, the Test
interval is used.
f. Repeat for each additional recovery action.
13. (Optional) Configure advanced SureLink parameters:
a. Click to expand Advanced settings.
b. For Delayed Start, type the amount of time to wait while the device is starting before
SureLink testing begins. This setting is bypassed when the interface is determined to be
up.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}.
For example, to set Delayed start to ten minutes, enter 10m or 600s.
The default is 300 seconds.
c. For Backoff interval, type the time to add to the test interval when restarting the list of
actions. This option is capped at 15 minutes.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}.
For example, to set Backoff interval to ten minutes, enter 10m or 600s.
The default is 300 seconds.
d. Test interface gateway by pinging is used by the Interface gateway Ping test as the
endpoint for traceroute to use to determine the interface gateway. The default is 8.8.8.8,
and should only be changed if this IP address is not accessible due to networking issues.
14. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
4. Enable SureLink:
5. By default, the Test DNS servers configured for this interface test is automatically
configured and enabled. This tests communication with DNS servers that are either provided
by DHCP, or statically configured for this interface.
To add additional tests:
a. Add a test:
d. if the test should apply to both IPv6 rather than IPv4, enable IPv6:
n http: Uses HTTP(s) GET requests to determine connectivity to the configured web
server.
If http is set, set the URL of the web server.
n dns_configured: Tests communication with DNS servers that are either provided
by DHCP, or statically configured for this interface.
n interface_up: Tests the current status of the interface. The test fails if the interface
is down. Failing this test infers that all other tests fail.
If interface_up is set, complete the following:
l Set the amount of time that the interface is down before the test can be
considered to have failed.
where value is any number of weeks, days, hours, minutes, or seconds, and
takes the format number{w|d|h|m|s}.
l Set the amount of time to wait for the interface to connect for the first time
before the test is considered to have failed.
where value is any number of weeks, days, hours, minutes, or seconds, and
takes the format number{w|d|h|m|s}.
For example, to set interface_timeout to ten minutes, enter either 10m or
600s:
n tcp_connection: Tests that the interface can reach a destination port on the
configured host.
If tcp_connection is selected, complete the following:
l Set the hostname or IP address of the host to create a TCP connection to:
n Set the number of failures for this recovery action to perform, before moving to the
next recovery action:
The default is 3.
n Set the time to wait before the next test is run. If set to the default value of 0s, the
test interval is used.
f. Set the type of recovery action. If multiple recovery actions are configured, they are
performed in the order that they are listed. The command varies depending on whether
the interface is a WAN or WWAN:
n WAN interfaces:
n WWAN interfaces:
The default is 3.
l Set the amount that the interface's metric should be increased. This should be
set to a number large enough to change the routing table to use another
default gateway.
n restart_interface.
If restart_interface is selected, complete the following:
l Set the number of failures for this recovery action to perform, before moving to
the next recovery action:
The default is 3.
l Set the time to wait before the next test is run. If set to the default value of 0s,
the test interval is used.
The default is 3.
l Set the time to wait before the next test is run. If set to the default value of 0s,
the test interval is used.
The default is 3.
l Set the time to wait before the next test is run. If set to the default value of 0s,
the test interval is used.
The default is 3.
l Set the time to wait before the next test is run. If set to the default value of 0s,
the test interval is used.
n reboot_device.
If reboot_device is selected, complete the following:
l Set the number of failures for this recovery action to perform, before moving to
the next recovery action:
The default is 3.
l Set the time to wait before the next test is run. If set to the default value of 0s,
the test interval is used.
The default is 3.
l Set the commands to run to attempt to recovery connectivity.
l Set the time to wait before the next test is run. If set to the default value of 0s,
the test interval is used.
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set interval to ten minutes, enter either 10m or 600s:
The default is 1.
e. Set the amount of time that the device should wait for a response to a test attempt before
considering it to have failed:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set timeout to ten minutes, enter either 10m or 600s:
f. Set the amount of time to wait while the device is starting before SureLink testing begins.
This setting is bypassed when the interface is determined to be up.
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set delayed_start to ten minutes, enter either 10m or 600s:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set backoff_interval to ten minutes, enter either 10m or 600s:
See Show SureLink status and statistics for information about showing Surelink status for OpenVPN
clients.
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the menu, select Status > OpenVPN > Servers.
The OpenVPN Servers page appears.
2. To view configuration details about an OpenVPN server, click the (configuration) icon in the
upper right of the OpenVPN server's status pane.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. To display details about all configured OpenVPN servers, type the following at the prompt:
>
Server : OpenVPN_server1
Enable : true
Type : tun
Zone : internal
IP Address : 192.168.30.1/24
Port : 1194
Use File : true
Metric : 0
Protocol : udp
First IP : 80
Last IP : 99
>
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the menu, select Status > OpenVPN > Clients.
The OpenVPN Clients page appears.
2. To view configuration details about an OpenVPN client, click the (configuration) icon in the
upper right of the OpenVPN client's status pane.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. To display details about all configured OpenVPN clients, type the following at the prompt:
>
Client : OpenVPN_client1
Enable : true
Status : up
Username : user1
IP address : 123.122.121.120
Remote : 120.121.122.123
MTU : 1492
Zone : internal
IP Address : 192.168.30.1/24
Port : 1194
Use File : true
Metric : 0
Protocol : udp
Port : 1194
Type : tun
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Add the GRE endpoint interface. For example, to add an interface named gre_endpoint:
6. Set the IP address and subnet mask of the local GRE endpoint. For example, to set the local
GRE endpoint's IP address and subnet mask to 10.10.1.1/24:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
8. If GRE is selected for the Mode, for Remote endpoint, type the IP address of the GRE endpoint
on the remote peer.
9. If GRETAP is selected for Mode, for Local endpoint, select the interface.
10. (Optional) For Key, enter a key that will be inserted in GRE packets created by this tunnel. It
must match the key set by the remote endpoint. Allowed value is an integer between 0 and
4294967295, or an IP address.
11. (Optional) Enable keepalive reply to enable the device to reply to Cisco GRE keepalive
packets.
12. (Optional) Enable open routing to enable packets destined for an address which is not
explicitly in the routing table to exit the IP tunnel.
13. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Add the GRE endpoint tunnel. For example, to add a tunnel named gre_example:
6. If type is set to gre, set the IP address of the GRE endpoint on the remote peer:
7. (Optional) Set a key that will be inserted in GRE packets created by this tunnel.
The key must match the key set by the remote endpoint.
9. (Optional) Enable the device to allow packets destined for an address which is not explicitly in
the routing table to exit the IP tunnel:
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the menu, click Status > IP tunnels.
The IP Tunnelspage appears.
2. To view configuration details about a GRE tunnel, click the (configuration) icon in the upper
right of the tunnel's status pane.
Configuration procedures
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
15. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
5. Set the remote endpoint to public IP address of the Connect EZ 16/32-2 device:
6. Add a policy:
(config vpn ipsec tunnel ipsec_gre1 policy 0)> local type custom
(config vpn ipsec tunnel ipsec_gre1 policy 0)>
8. Set the local network address to the IP address and subnet of the local GRE tunnel,
172.30.0.1/32:
(config vpn ipsec tunnel ipsec_gre1 policy 0)> local custom 172.30.0.1/32
(config vpn ipsec tunnel ipsec_gre1 policy 0)>
9. Set the remote network address to the IP address and subnet of the remote GRE tunnel,
172.30.0.2/32:
Command line
1. At the command line, type config to enter configuration mode:
> config
(config)>
5. Set the IPv4 address to the IP address of the local GRE tunnel, 172.30.0.1/32:
3. For Local endpoint, select the IPsec endpoint interface created in Task two (Interface: ipsec_
endpoint1).
4. For Remote endpoint, type the IP address of the GRE tunnel on Connect EZ 16/32-2,
172.30.0.2.
Command line
1. At the command line, type config to enter configuration mode:
> config
(config)>
3. Set the local endpoint to the IPsec endpoint interface created in Task two
(/network/interface/ipsec_endpoint1):
4. Set the remote endpoint to the IP address of the GRE tunnel on Connect EZ 16/32-2,
172.30.0.2:
Command line
1. At the command line, type config to enter configuration mode:
> config
(config)>
4. Set the device to the GRE tunnel created in Task three (/vpn/iptunnel/gre_tunnel1):
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
15. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
4. Set the pre-shared key to the same pre-shared key that was configured for the Connect EZ
16/32-1 (testkey):
5. Set the remote endpoint to public IP address of the Connect EZ 16/32-1 device:
6. Add a policy:
(config vpn ipsec tunnel ipsec_gre2 policy 0)> local type custom
(config vpn ipsec tunnel ipsec_gre2 policy 0)>
8. Set the local network address to the IP address and subnet of the local GRE tunnel,
172.30.0.2/32:
(config vpn ipsec tunnel ipsec_gre2 policy 0)> local custom 172.30.0.2/32
(config vpn ipsec tunnel ipsec_gre2 policy 0)>
9. Set the remote network address to the IP address and subnet of the remote GRE tunnel,
172.30.0.1/32:
Command line
> config
(config)>
5. Set the IPv4 address to the IP address of the local GRE tunnel, 172.30.0.2/32:
3. For Local endpoint, select the IPsec endpoint interface created in Task two (Interface: ipsec_
endpoint2).
4. For Remote endpoint, type the IP address of the GRE tunnel on Connect EZ 16/32-1,
172.30.0.1.
Command line
1. At the command line, type config to enter configuration mode:
> config
(config)>
3. Set the local endpoint to the IPsec endpoint interface created in Task two
(/network/interface/ipsec_endpoint2):
4. Set the remote endpoint to the IP address of the GRE tunnel on Connect EZ 16/32-1,
172.30.0.1:
Command line
1. At the command line, type config to enter configuration mode:
> config
(config)>
4. Set the device to the GRE tunnel created in Task three (/vpn/iptunnel/gre_tunnel2):
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
f. (Optional) Enable keep-alive reply to enable the device to reply to Cisco GRE keep-alive
packets.
g. (Optional) Enable open routing to enable packets destined for an address which is not
explicitly in the routing table to exit the IP tunnel.
4. Assign an IP address to the IP tunnel:
a. Click Network > Interfaces.
b. For Add Interface, type a name for the interface and click .
5. Configure NHRP:
a. Click Network > Routing Services.
b. Enable routing services.
c. Click to expand NHRP.
d. Enable NHRP.
e. Click to expand Network.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Create an IP tunnel.
a. Add an IP tunnel. For example, to add a tunnel named dmvpn_tunnel:
d. Set the key to a four-octet value that matches the key on the remote endpoint. For
example:
f. (Optional) Enable the device to allow packets destined for an address which is not
explicitly in the routing table to exit the IP tunnel:
e. Set the IP address and netmask of the tunnel. The netmask must be set to /32. For
example, to set the IP address to 10.20.1.4/32:
5. Configure NHRP:
a. Type ... to return to the top level of the configuration schema:
c. Enable NHRP:
(config network route service nhrp network 0)> add nhs end
(config network route service nhrp network 0 nhs 0)>-
6. Set the hostname or IP address of the node that will be the next hop server:
(config network route service nhrp network 0 nhs 0)> nbma hostname/IP_
address
(config network route service nhrp network 0 nhs 0)>
b. Enable BGP:
c. Set the autonomous system number for this device. For example, to set the autonomous
system number to 66007:
e. Add a neighbour:
(config)> save
Configuration saved.
>
L2TP
Your Connect EZ 16/32 device supports PPP-over-L2TP (Layer 2 Tunneling Protocol).
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
e. (Optional) Type the L2TP network server port to use to connect to the server, if other
than the default of 1701.
f. (Optional) Type the Username to use to log into the server.
g. (Optional) Type the Password to use to log into the server.
h. (Optional) Type the Metric for the tunnel, if other than the default of 1.
i. Select a firewall Zone for the tunnel. This is used by packet filtering rules and access
control lists to restrict network traffic on the tunnel.
j. (Optional): Custom PPP configuration:
i. Enable custom PPP configuration.
ii. Enable Override if the custom configuration should override the default configuration
and only use the custom options.
iii. For Configuration file, paste or type the configuration data in the format of a pppd
options file.
7. To add an L2TP network server:
a. Click to expand L2TP network servers.
b. For Add L2TP network server, type a name for the LNS and click .
c. LNSs are enabled by default. To disable, toggle off Enable.
d. For L2TP access concentrator, type the IP addressof the L2TP access concentrator that
this server will allow connections from. This can also be:
n A range of IP addresses, using the format x.x.x.x-y.y.y.y, for example 192.168.188.1-
192.168.188.254.
n The keyword any, which means that the server will accept connections from any IP
address.
e. For Local IP address, type the IP address of the L2TP virtual network interface.
f. For Remote IP address, type the IP address to assign to the remote peer.
g. (Optional) For Authentication method, select one of the following:
n None: No authentication is required.
n Automatic: The device will attempt to connect using CHAP first, and then PAP.
n CHAP: Uses the Challenge Handshake Authentication Profile (CHAP) to
authenticate.
n PAP: Uses the Password Authentication Profile (PAP) to authenticate.
If Automatic, CHAP, or PAP is selected, enter the Username and Password required to
authenticate.
The default is None.
h. (Optional) For Authentication method, select the authentication method, one of:
n None: No authentication is required.
n Automatic: The device will attempt to connect using CHAP first, and then PAP.
n CHAP: Uses the Challenge Handshake Authentication Profile (CHAP) to
authenticate.
n PAP: Uses the Password Authentication Profile (PAP) to authenticate.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. (Optional) Set the UDP listening port that L2TP servers will listen on:
Where value is a firewall zone defined on your device, or the any keyword.
Additional Configuration
--------------------------------------------------------
-----------------------
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
(config)>
where name is the name of the LAC. For example, to add an LACnamed lac_tunnel:
c. (Optional) Set the UDP port to use to connect to the L2TP network server:
Zone: The firewall zone assigned to this tunnel. This can be used
by packet
filtering rules and access control lists to restrict network
traffic on this
tunnel.
Format:
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
Current value:
ii. Enable overriding, if the custom configuration should override the default
configuration and only use the custom options:
iii. Paste or type the configuration data in the format of a pppd options file:
where name is the name of the LNS. For example, to add an LNS named lns_server:
b. Set the IP address of the L2TP access concentrator that this server will allow connections
from:
Zone: The firewall zone assigned to this tunnel. This can be used
by packet
filtering rules and access control lists to restrict network
traffic on this
tunnel.
Format:
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
Current value:
ii. Enable overriding, if the custom configuration should override the default
configuration and only use the custom options:
iii. Paste or type the configuration data in the format of a pppd options file:
(config)> save
Configuration saved.
>
Note The Connect EZ 16/32 does not currently support the configuration of IPsec protocol/port traffic
selectors. This means that you cannot restrict traffic on the IPsec tunnel to L2TP traffic (typically UDP
port 1701).
While multiple L2TP clients are supported on the Connect EZ 16/32 by configuring a separate LNS for
each client, multiple clients behind a Network Address Translation (NAT) device are not supported,
because they will all appear to have the same IP address.
Web
Command line
Show the status of L2TP access connectors from the Admin CLI
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. To display details about all configured L2TP access connectors, type the following at the
prompt:
>
Show the status of L2TP network servers from the Admin CLI
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. To display details about all configured L2TP access connectors, type the following at the
prompt:
>
>
L2TPv3 Ethernet
Your Connect EZ 16/32 device supports Layer 2 Tunneling Protocol Version 3 (L2TPv3) static
unmanaged Ethernet tunnels.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
g. For Sequence numbering control, determine the sequence number control to prevent or
detect out of order packets. Allowed values are:
n None: No sequence numbering.
n Send: Add a sequence number to each outgoing packet.
n Receive: Reorder packets if they are received out of order.
n Both: Add a sequence number to each outgoing packet, and reorder packets if they
are received out of order.
The default is None.
h. Repeat for additional sessions.
11. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Add a L2TPv3 Ethernet tunnel. For example, to add a tunnel named L2TPv3_example:
6. Set the tunnel identifier for this tunnel. This must match the value for peer tunnel ID on the
remote peer.
10. Set the session identifier for this session. This must match the value for peer session ID on the
remote peer.
(config)> save
Configuration saved.
>
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the menu, select Status. Under VPN, select L2TPv3 Ethernet.
The L2TPv3 Ethernet page appears.
2. To view configuration details about an L2TPV3 tunnel, click the (configuration) icon in the
upper right of the tunnel's status pane.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. To display details about all configured L2TPv3 Ethernet tunnels, type the following at the
prompt:
>
Local IP : 4.3.2.1
Remote IP : 10.10.10.1
Tunnel ID : modem
Peer Tunnel ID : 10.10.10.1 === 4.3.2.1
Session ID : 255
Peer Session ID : 1476
Lifetime (Actual) : 600
Device : le_test_test
RX Packets : 2,102
RX Bytes : 462
TX Packets : 2,787
TX Byptes : 3,120
>
MACsec
MACsec (Media Access Control Security) is a 802.1ae (Layer2) VPN protocol that can be used to create
a secure MACsec tunnel over a wired Ethernet LAN. The MACsec uses keys to provide multiple
authentications between hosts in a network.
A MACsec tunnel must be tied to a physical interface. You cannot create a MACsec tunnel for a bridge.
Security modes
Two security modes are available for a MACsec tunnel.
n Automatic: Uses a pre-shared key to generate association key information, which is
periodically rotated through using 802.1x.
n Manual: Uses connectivity association key information that is manually entered in the CAK and
CKN fields.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
5. Click Enable.
6. For Local endpoint, select the local network device you want to use to connect to the peer
device.
7. For Security mode, select your desired mode.
n Automatic: Uses a pre-shared key to generate association key information, which is
periodically rotated through using 802.1x.
n Manual: Uses connectivity association key information that is manually entered in the
CAK and CKN fields.
8. If you selected Manual, additional required fields display.
a. For CAK, enter the connectivity associated key. The key format is 16 hex digits.
b. For CKN, enter the connectivity associated key name. The key format is 32 hex digits.
9. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
where value is the association key. The key format is 16 hex digits.
b. Specify the connectivity association key name:
where value is the association key name. The key format is 32 hex digits.
8. Save the configuration and apply the change.
(config)> save
Configuration saved.
>
NEMO
Network Mobility (NEMO) is a mobile networking technology that provides access to one or more
Local Area Networks (LANs) on your device. NEMO creates a tunnel between the home agent on the
mobile private network and the Connect EZ 16/32 device, isolating the connection from internet traffic
and advertising the IP subnets of the LANs for remote access and device management.
Dynamic Mobile Network Routing (DMNR) is the implementation of NEMO for Verizon Wireless Private
Networks. DMNRsupport requires the use of Verizon SIM cards that have DMNRenabled.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
7. For Key, type the key used to authenticate to the home agent. This is provided by your cellular
carrier.
8. For Home agent SPI, type the Security Parameter Index (SPI) value, which is used in the
authentication extension when registering. This should be normally left at the default setting
of 256 unless your service provider indicates a different value.
9. For Home agent registration lifetime, in seconds, type the number of seconds number of
seconds until the authorization key expires. This is provided by your cellular carrier.
10. For MTU discovery, leave enabled to determine the maximum transmission unit (MTU) size.
If disabled, for MTU, type the MTU size. The default MTU size for LANs on the Connect EZ 16/32
device is 1500. The MTU size of the NEMO tunnel will be smaller, to take into account the
required headers.
11. Click to expand Care of address to configure the local WAN interface of the internet facing
network.
a. For Type, select the method to determine the local network interface that is used to
communicate with the peer.
n If Default route is selected, the network interface that is used will be the same as
the default route.
n If Interface is selected, specify the local network interface.
n If IP address is selected, type the IP address.
The default is Default route.
12. Click to expand GRE tunnel local endpoint.
a. For Type, select the local endpoint of the GRE endpoint negotiated by NEMO.
n If Default route is selected, the network interface that is used will be the same as
the default route.
n If Interface is selected, specify the local network interface.
The default is Default route.
13. Click to expand Local networks.
a. For Add Interface, click to add a local network to use as a virtual NEMO network
interface.
b. For Interface, select the local interface to use as a virtual NEMO network interface.
Generally, this will be the a Local Area Network (LAN).
c. (Optional) Repeat for additional interfaces.
14. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
> config
(config)>
3. Add a NEMO tunnel. For example, to add a NEMO tunnel named nemo_example:
5. Set the IPv4 address of the NEMO home agent. This is provided by your cellular carrier.
6. Set the key used to authenticate to the home agent. This is provided by your cellular carrier.
7. Set the the number of seconds number of seconds until the authorization key expires. This is
provided by your cellular carrier.
If disabled, set the MTU size. The default MTU size for LANs on the Connect EZ 16/32 device is
1500. The MTU size of the NEMO tunnel will be smaller, to take into account the required
headers.
The Internal firewall zone configures the Connect EZ 16/32 device to trust traffic going to the
tunnel and allows it through the network.
11. Configure the Care-of-Address, the local WAN interface of the internet facing network.
a. Set the method to determine the Care-of-Address:
n ip
If ip is used, set the IP address:
(config)> save
Configuration saved.
>
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the menu, select Status > NEMO.
The NEMO page appears.
2. To view configuration details about an NEMO tunnel, click the (configuration) icon in the
upper right of the tunnel's status pane.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. To display details about all configured NEMO tunnels, type the following at the prompt:
>
>
WireGuard VPN
WireGuard is a VPN1 is a protocol that operates at the network layer to provide communication
between devices over a public network. It encrypts and encapsulates traffic to protect information.
WireGuard supports full networking capabilities including standard, policy-based, and static routes, as
well as firewalls. In addition to having IPs inside the tunnel, like IPSec and OpenVPN, you can use this
WireGuard tunnel for policy-based routing: send only certain traffic through the tunnel or use it for
static routes to send routing and networking through regardless of the source IP. You can also have
multiple tunnels.
There are two modes available when configuring a WireGuard VPN:
n Client mode: Configure the Connect EZ 16/32 device to act as a client, so it establishes an
outbound WireGuard VPN tunnel to a remote server.
n Server mode: Configure the Connect EZ 16/32 device to act as a server, so one or more remote
devices can establish an inbound WireGuard VPN tunnel to the device.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Tunnel
setting UI Configuration
Enable The new tunnel is enabled by default. It can be disabled if the tunnel is being
set up for future use or if you want to stop the tunnel while testing other
configuration changes.
Tunnel
setting UI Configuration
Peers a. Click to add a new peer.
n If this Connect EZ 16/32 is the WireGuard client, then only add one
peer. The peer is the remote Wireguard server to which it connects.
n If this Connect EZ 16/32 is the WireGuard server, add one or more
peers. The peer(s) are the remote WireGuard clients that will
connect to this device.
b. Configure the settings for the new peer(s).
If the new peer is to act as the WireGuard server, make sure to configure
the following settings:
n [Remote] Public key
n [Remote] Pre-shared key (optional)
n [Remote] Allowed addresses: Only traffic destined for an IP address
added here is sent to this peer.
n [Remote] Endpoint address
n [Remote] Endpoint port
If the new peer is to act as a remote WireGuard client, make sure to
configure the following settings:
n [Client] Public key
n [Client] Pre-shared key (optional)
n [Local and Remote] Allowed addresses
Device Enable to allow the Connect EZ 16/32 to generate its own public and private
managed keys. If this setting is enabled, it triggers the Connect EZ 16/32 to automatically
private generate a private key and corresponding public key. This private and public
key key is used to establish the encrypted communication between the client and
peer via the Wireguard tunnel. To see the public key, navigate to Status > VPN
> WireGuard.
Private Type the private key for the Wireguard tunnel, if the Device managed private
key key setting is disabled.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
> config
(config)>
7. The table below lists the required settings for creating and configuring a client WireGuard
tunnel.
Configuration Description
add Add a new WireGuard tunnel.
To enable:
For a peer that acts as the remote Wireguard server, configure the
following settings:
n [Remote] Device managed public key
Parameters
tunnel Tunnel Name (Required)
peer Peer (Required)
n [Remote] Public key
For a peer(s) that acts as the remote WireGuard client, configure the
following settings:
n [Client] Public key
To disable:
private-key Type the private key for the Wireguard tunnel, if the Device managed
private key setting is disabled.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
5. Select External.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
5. Select External.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
(config)> save
Configuration saved.
>
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Example:
# openssl req -newkey rsa:2048 -nodes -keyout key.pem -x509 -days 365
-out certificate.pem
b. Paste the contents of certificate.pem and key.pem into the SSL certificate field. The
contents of the certificate.pem must be first. For example:
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
Where value is a firewall zone defined on your device, or the any keyword.
Additional Configuration
--------------------------------------------------------
-----------------------
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
(config)>
Example
a. Generate the SSL certificate and private key, for example:
# openssl req -newkey rsa:2048 -nodes -keyout key.pem -x509 -days 365
-out certificate.pem
b. Paste the contents of certificate.pem and key.pem into the service web_admin cert
command. Enclose the contents of certificate.pem and key.pem in quotes. For example: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-----END CERTIFICATE-----
-----BEGIN PRIVATE KEY-----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-----END PRIVATE KEY-----"
(config)>
7. (Optional) Set the minimum TLS version that can be used by client to negotiate the HTTPS
session:
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
(config)> save
Configuration saved.
>
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
KexAlgorithms +diffie-hellman-group14-sha1
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
Where value is a firewall zone defined on your device, or the any keyword.
Additional Configuration
--------------------------------------------------------
-----------------------
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
(config)>
b. To override the standard SSH configuration and only use the config_file parameter:
n If override is set to true, entries in Configuration file will be used in place of the
standard SSH configuration.
n If override is set to false, entries in Configuration file will be added to the
standard SSH configuration.
The default is false.
c. Set the configuration settings:
where value is one or more entires in the form of an OpenSSH sshd_config file. For
example, to enable the diffie-helman-group-sha-14 key exchange algorithm:
(config)> save
Configuration saved.
>
The private key file is named id_rsa and the public key file is named id_rsa.pub. (The .pub extension
is automatically appended to the name specified for the private key output file.)
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
You can add configure passwordless SSH login for an existing user or include the support when
creating a new user. See User authentication for information about creating a new user. These
instructions assume an existing user named temp_user.
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Add an SSH key for the user by using the ssh_key command and pasting or typing a public
encryption key:
where:
n key_name is a name for the key.
n key is a public SSH key, which you can enter by pasting or typing a public encryption
key that this user can use for passwordless SSH login
4. Save the configuration and apply the change.
(config)> save
Configuration saved.
>
Note Telnet is an insecure protocol and should only be used for backward-compatibility reasons, and
only if the network connection is otherwise secured.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
4. Click Enable.
5. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
(config)> save
Configuration saved.
>
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
6. Multicast DNS (mDNS) is disabled by default. mDNS is a protocol that resolves host names in
small networks that do not have a DNS server. To enable mDNS, click Enable mDNS.
7. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
Where value is a firewall zone defined on your device, or the any keyword.
Additional Configuration
--------------------------------------------------------
-----------------------
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
(config)>
(config)> save
Configuration saved.
>
Configure DNS
The Connect EZ 16/32 device includes a caching DNS server which forwards queries to the DNS servers
that are associated with the network interfaces, and caches the results. This server is used within the
device, and cannot be disabled. Use the access control list to restrict external access to this server.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
Where value is a firewall zone defined on your device, or the any keyword.
Additional Configuration
--------------------------------------------------------
-----------------------
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
(config)>
c. To restrict the device's use of this DNS server based on the domain, use the domain
command. If no domain are listed, then all queries may be sent to this server.
10. (Optional) Add host names and their IP addresses that the device's DNS server will resolve
a. Add a host:
(config)> save
Configuration saved.
>
Command line
eth1 fe80::227:4ff:fe2b:ae12
eth1 fe80::227:4ff:fe44:105b
eth1 fe80::240:ffff:fe80:23b0
>
SNMP Security
By default, the Connect EZ 16/32 device automatically blocks SNMP packets from being received over
WAN and LAN interfaces. As a result, if you want a Connect EZ 16/32 device to receive SNMP packets,
you must configure the SNMP access control list to allow the device to receive the packets. See
Configure Simple Network Management Protocol (SNMP).
Dynamic SNMP
To expose a specific device property for SNMP monitoring that is not included in the standard MIB -
properties like serial number, system firmware version, hardware model name, and dynamic properties
- you can query the runtime database for the property value and then add a Dynamic SNMP. The
device property is added to the custom MIB.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
Where value is a firewall zone defined on your device, or the any keyword.
Additional Configuration
--------------------------------------------------------
-----------------------
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
(config)>
6. Set the password for the user that will be used to connect to the SNMP agent:
7. (Optional) Set the port number for the SNMP agent. The default is 161.
9. (Optional) Set the authentication type. Allowed values are MD5 or SHA. The default is MD5.
10. (Optional) Set the privacy passphrase. If not set, the password, entered above, is used.
11. (Optional) Set the privacy protocol, either DES or AES. The default is DES.
12. (Optional) Add Dynamic SNMP Properties to expose specific details about your device for
SNMP monitoring that are not included in the standard MIB.
Where value can be any element in the runtime table you want to expose to SNMP monitoring
(for example, "system.cpu_temp" or "system.name").
13. (Optional) Enable read-only access to to SNMP version 2c.
(config)> save
Configuration saved.
>
Download MIBs
This procedure is available from the WebUI only.
Web
1. Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
2. Enable SNMP.
See Configure Simple Network Management Protocol (SNMP) for information about enabling
and configuring SNMP support on the Connect EZ 16/32 device.
3. On the main menu, click Status. Under Services, click SNMP.
Note If you have recently enabled SNMP and the SNMP option is not visible, refresh your
browser.
4. Click Download.
Location information
Your Connect EZ 16/32 device can be configured to use the following location sources:
n User-defined static location.
n Location messages forwarded to the device from other location-enabled devices.
You can also configure your Connect EZ 16/32 device to forward location messages, either from the
Connect EZ 16/32 device or from external sources, to a remote host. Additionally, the device can be
configured to use a geofence, to allow you to determine actions that will be taken based on the
physical location of the device.
This section contains the following topics:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
where int is any integer between -90 and 90, with up to six decimal places.
7. Set the longitude of the device:
where int is any integer between -180 and 180, with up to six decimal places.
8. Set the altitude of the device:
(config)> save
Configuration saved.
>
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
> config
(config)>
6. Set the UDP port that will receive incoming location messages.
Where value is a firewall zone defined on your device, or the any keyword.
Additional Configuration
--------------------------------------------------------
-----------------------
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
(config)>
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
__|%s|__|%v|__
14. Type a four-digit alphanumeric Vehicle ID that will be included with to location messages. If
no vehicle ID is configured, this setting defaults to 0000.
15. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
4. Set the hostname or IP address of the remote host to which location messages will be sent:
6. Set the TCP or UDP port on the remote host to which location messages will be sent:
7. Set the number of Location update intervals to wait before forwarding location data to this
server. See Configure the location service for more information about setting the Location
update interval.
8. Set the protocol type for the messages. Allowed values are taip or nmea; the default is taip:
The default setting is Default, which means that the talker ID provided by the source will
be used.
b. Determine the behavior when fix is invalid:
12. (Optional) Specify types of messages that will be forwarded. Allowed values vary depending on
the message protocol type. By default, all message types are forwarded.
n If the message protocol type is NMEA:
Allowed values are:
l gga: Reports time, position, and fix related data.
l gll: Reports position data: position fix, time of position fix, and status.
l gsa: Reports GPS DOP and active satellites.
l gsv: Reports the number of SVs in view, PRN, elevation, azimuth, and SNR.
b. Use the index number to delete the message type. For example, to delete the gsa
(index number 2) message type:
b. Use the add command to add the message type. For example, to add the gsa
message type:
2 id
3 ln
4 pv
(config service location forward 0)>
b. Use the index number to delete the message type. For example, to delete the id
(index number 2) message type:
b. Use the add command to add the message type. For example, to add the id
message type:
(config)> save
Configuration saved.
>
Configure geofencing
Geofencing is a mechanism to create a virtual perimeter that allows you configure your Connect EZ
16/32 device to perform actions when entering or exiting the perimeter. For example, you can
configure a device to factory default if its location service indicates that it has been moved outside of
the geofence.
Multiple geofences can be defined for one device, allowing for a complex configuration in which
different actions are taken depending on the physical location of the device.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
c. For Radius, type the radius of the circle. Allowed values are an integer followed by
m or km, for example, 100m or 1km.
n If Polygonal is selected:
a. Click to expand Coordinates.
b. Click to add a point that represents a vertex of the polygon. A vertex is the point
at which two sides of a polygon meet.
c. Type the Latitude and Longitude of one of the vertices of the polygon. Allowed
values are:
l For Latitude, any integer between -90 and 90, with up to six decimal places.
l For Longitude, any integer between -180 and 180, with up to six decimal
places.
d. Click again to add an additional point, and continue adding points to create the
desired polygon.
For example, to configure a square polygon around the Digi headquarters, configure a
polygon with four points:
7. Define actions to be taken when the device's location triggers a geofence event:
n To define actions that will be taken when the device enters the geofence, or is inside
the geofence when it boots:
b. (Optional) Enable Bootup action to configure the device to perform the On entry
actions if the device is inside the geofence when it boots.
c. For Number of intervals, type or select the number of Update Intervals that must
take place prior to performing the On entry actions.
For example, if the Update interval is 1m (one minute) and the Number of
intervals is 3, the On entry actions will not be performed until the device has been
inside the geofence for three minutes.
d. Click to expand Actions.
e. Click to create a new action.
b. (Optional) Enable Bootup action to configure the device to perform the On exit
actions if the device is inside the geofence when it boots.
c. For Number of intervals, type or select the number of Update Intervals that must
take place prior to performing the On exit actions.
For example, if the Update interval is 1m (one minute) and the Number of
intervals is 3, the On entry actions will not be performed until the device has been
inside the geofence for three minutes.
d. Click to expand Actions.
e. Click to create a new action.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Add a geofence:
4. Set the amount of time that the geofence should wait between polling for updated location
data:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the format
number{w|d|h|m|s}.
For example, to set update_interval to ten minutes, enter either 10m or 600s:
longitude int
(config service location geofence test_geofence)>
6. Define actions to be taken when the device's location triggers a geofence event:
n To define actions that will be taken when the device enters the geofence, or is inside
the geofence when it boots:
a. (Optional) Configure the device to preform the actions if the device is inside the
geofence when it boots:
b. Set the number of update_intervals that must take place prior to performing the
actions:
For example, if the update interval is 1m (one minute) and the num_intervals is set
to 3, the actions will not be performed until the device has been inside the
geofence for three minutes.
c. Add an action:
i. Type ... to return to the root of the configuration:
If the script begins with #!, then the proceeding file path will be used to invoke
the script interpreter. If not, then the default shell will be used.
ii. To log the output of the script to the system log:
iii. To log the errors from the script to the system log:
iv. (Optional) Set the maximum amount of system memory that will be available
for the script and it spawned processes:
If you disable the sandbox, the script may render the system unusable.
vi. Repeat for any additional actions.
n To define actions that will be taken when the device exits the geofence, or is outside the
geofence when it boots:
a. (Optional) Configure the device to preform the actions if the device is outside the
geofence when it boots:
b. Set the number of update_intervals that must take place prior to performing the
actions:
For example, if the update interval is 1m (one minute) and the num_intervals is set
to 3, the actions will not be performed until the device has been outside the
geofence for three minutes.
c. Add an action:
i. Type ... to return to the root of the configuration:
If the script begins with #!, then the proceeding file path will be used to invoke
the script interpreter. If not, then the default shell will be used.
ii. To log the output of the script to the system log:
iii. To log the errors from the script to the system log:
iv. (Optional) Set the maximum amount of system memory that will be available
for the script and it spawned processes:
If you disable the sandbox, the script may render the system unusable.
vi. Repeat for any additional actions.
7. Save the configuration and apply the change.
(config)> save
Configuration saved.
>
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the main menu, click Status.
2. Under Services, click Location.
The device's current location is displayed, along with the status of any configured geofences.
Command line
Location Status
---------------
State : enabled
Source : 192.168.2.3
Latitude : 44* 55' 14.809" N (44.92078)
Longitude : 93* 24' 47.262" w (-93.413128)
Altitude : 279 meters
>
>
Modbus gateway
The Connect EZ 16/32 supports the ability to function as a Modbus gateway, to provide serial-to-
Ethernet connectivity to Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs), and
other industrial devices. MODBUS provides client/server communication between devices connected
on different types of buses and networks, and the Modbus gateway allows for communication
between buses and networks that use the Modbus protocol.
This section contains the following topics:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
3. The new Modbus gateway server is enabled by default. Toggle off Enable the server to
disable.
4. For Connection type, select Socket or Serial. Available options in the gateway server
configuration vary depending on this setting.
n If Socket is selected for Connection type:
a. For IP Protocol, select TCP or UDP. The default is TCP.
b. For Port, enter or select an appropriate port. The default is port 502.
n If Serial is selected for Connection type:
a. For Serial port, select the appropriate serial port on the Connect EZ 16/32 device.
5. For Packet mode, select RTU or RAW (if Connection type is set to Socket) or ASCII (if
Connection typeis set to Serial) for the type of packet that will be used by this connection.
The default is RTU.
6. For Packet idle gap, type the maximum allowable time between bytes in a packet.
Allowed values are between 10 milliseconds and one second, and take the format number
{ms|s}.
For example, to set Packet idle gap to 20 milliseconds, enter 20ms.
7. If Connection type is set to Socket, for Inactivity timeout, type the amount of time to wait
before disconnecting the socket when it has become inactive.
Allowed values are any number of minutes or seconds up to a maximum of 15 minutes, and
take the format number{m|s}.
For example, to set Inactivity timeout to ten minutes, enter 10m or 600s.
8. (Optional) If Connection type is set to Serial, click Half duplex to enable half duplex (two
wire) mode.
9. (Optional) If Connection type is set to Socket, click to expand Access control list:
n To limit access to specified IPv4 addresses and networks:
a. Click IPv4 Addresses.
b. For Add Address, click .
c. For Address, enter the IPv4 address or network that can access the device's web
administration service. Allowed values are:
l A single IP address or host name.
l A network designation in CIDRnotation, for example, 192.168.1.0/24.
l any: No limit to IPv4 addresses that can access the web administration service.
d. Click again to list additional IP addresses or networks.
Configure clients
1. Click to expand Clients.
2. For Add Modbus client, type a name for the client and click .
3. The new Modbus gateway client is enabled by default. Toggle off Enable the client to disable.
4. For Connection type, select Socket or Serial. Available options in the gateway server
configuration vary depending on this setting.
n If Socket is selected for Connection type:
a. For IP Protocol, select TCP or UDP. The default is TCP.
b. For Port, enter or select an appropriate port. The default is port 502.
c. For Remote host, type the hostname or IP address of the remote host on which the
Modbus server is running.
n If Serial is selected for Connection type:
a. For Serial port, select the appropriate serial port on the Connect EZ 16/32 device.
5. For Packet mode, select RTU or RAW (if Connection type is set to Socket) or ASCII (if
Connection typeis set to Serial) for the type of packet that will be used by this connection.
The default is RTU.
6. For Packet idle gap, type the maximum allowable time between bytes in a packet.
Allowed values are between 10 milliseconds and one second, and take the format number
{ms|s}.
For example, to set Packet idle gap to 20 milliseconds, enter 20ms.
7. If Connection type is set to Socket, for Inactivity timeout, type the amount of time to wait
before disconnecting the socket when it has become inactive.
Allowed values are any number of minutes or seconds up to a maximum of 15 minutes, and
take the format number{m|s}.
For example, to set Inactivity timeout to ten minutes, enter 10m or 600s.
8. (Optional) If Connection type is set to Serial, click Half duplex to enable half duplex (two
wire) mode.
9. (Optional) If Connection type is set to Socket, click to expand Access control list:
n To limit access to specified IPv4 addresses and networks:
a. Click IPv4 Addresses.
b. For Add Address, click .
c. For Address, enter the IPv4 address or network that can access the device's web
administration service. Allowed values are:
14. For Fixed Modbus server address, if request messages handled by this client should always
be forwarded to a specific device, type the device's Modbus address. Leave at the default
setting of 0 to allow messages that match the Modbus address filter to be forwarded to
devices based on the Modbuss address in the message.
15. For Adjust Modbus server address, type a value to adjust the Modbus server address
downward by the specified value prior to delivering the message. Allowed values are 0 through
255. Leave at the default setting of 0 to not adjust the server address.
If a packet contains a Modbus server address above the amount entered here, the address will
be adjusted downward by this amount before the packet is delivered. This allows you to
configure clients on the gateway that will forward messages to remote devices with the same
Modbus address on different buses. For example, if there are two devices on two different
buses that have the same Modbus address of 10, you can create two clients on the gateway:
n Client one:
l Modbus address filter set to 10.
This will configure the gateway to deliver all messages that have the Modbus server
address of 10 to this device.
n Client two:
l Modbus address filter set to 20.
l Adjust Modbus server address set to 10.
This will configure the gateway to deliver all messages that have the Modbus server
address address of 20 to the device with address 10.
16. Repeat these steps to configure additional clients.
17. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
4. Configure servers:
a. Add a server:
where value is any number between 10 milliseconds and one second, and take
the format number{ms|s}.
For example, to set idle_gap to 20 milliseconds, enter 20ms.
v. Set the amount of time to wait before disconnecting the socket when it has
become inactive:
Serial
Additional Configuration
-------------------------------------------------------
------------------------
port1 Port 1
where value is any number between 10 milliseconds and one second, and take
the format number{ms|s}.
For example, to set idle_gap to one second, enter 1000ms or 1s.
iv. (Optional) Enable half-duplex (two wire) mode:
b. Add a client:
where value is any number between 10 milliseconds and one second, and take
the format number{ms|s}.
For example, to set idle_gap to 20 milliseconds, enter 20ms.
v. Set the amount of time to wait before disconnecting the socket when it has
become inactive:
vi. Set the hostname or IP address of the remote host on which the Modbus server
is running:
Serial
Additional Configuration
-------------------------------------------------------
------------------------
port1 Port 1
where value is any number between 10 milliseconds and one second, and take
the format number{ms|s}.
For example, to set idle_gap to one second, enter 1000ms or 1s.
iv. (Optional) Enable half-duplex (two wire) mode:
Allowed values are between 1 millisecond and 700 milliseconds, and take the format
numberms.
For example, to set response_timeout to 100 milliseconds:
n To filter for all messages with addresses in the range of 20 to 30, set the index 0
entry to 20-30:
To add additional filters, increment the index number. For example, to add an additional
filter for addresses in the range of 50-100:
g. If request messages handled by this client should always be forwarded to a specific device,
, use fixed_server_address to set the device's Modbus address:
Leave at the default setting of 0 to allow messages that match the Modbus address filter to
be forwarded to devices based on the Modbuss address in the message.
h. To adjust the Modbus server address downward by the specified value prior to delivering
the message, use adjust_server_address:
where value is an integer from 0 to 255. Leave at the default setting of 0 to not adjust the
server address.
If a packet contains a Modbus server address above the amount entered here, the address
will be adjusted downward by this amount before the packet is delivered. This allows you
to configure clients on the gateway that will forward messages to remote devices with the
same Modbus address on different buses. For example, if there are two devices on two
different buses that have the same Modbus address of 10, you can create two clients on
the gateway:
n Client one:
l filter set to 10.
This will configure the gateway to deliver all messages that have the Modbus server
address of 10 to this device.
n Client two:
l filter set to 20.
l adjust_server_address set to 10.
This will configure the gateway to deliver all messages that have the Modbus server
address address of 20 to the device with address 10.
i. Repeat the above instructions for additional clients.
6. Save the configuration and apply the change.
(config)> save
Configuration saved.
>
Modbus hardening
Modbus hardening refers to the process of enhancing the security and reliability of Modbus
communications between devices over a network by implementing various protective measures. This
includes configuring the Modbus systems to minimize vulnerabilities, applying access controls, using
encryption, segmenting networks, upgrading firmware on the devices, as well as monitoring and
logging. Modbus hardening is about making the serial communication between devices over a
network more secure against cyber threats.
Note To see how you can implement security measures for you Modbus gateway service, see Use case
| Secure your Modbus gateway service.
1. Determine the devices on your network that need to communicate with each other via the
Modbus Gateway service.
2. Isolate Modbus traffic using VLANS or separate network interfaces.
3. Implement strong authentication.
4. Define access policies.
Update the Services > Modbus Gateway > Gateway servers > Access control list settings to
only allow access to the Modbus service on the specific network interfaces, firewall zones, and
source IP addresses that you expect the Modbus queries to come from. See Configure the
Modbus gateway for more information.
5. Create a VPN tunnel, such as IPsec or Wireguard, to protect data in transit between your
devices.
6. Configure firewalls to monitor and control incoming and outgoing traffic.
By implementing these advanced security protocols and ensuring reliable data transmission, this
service effectively addresses the challenges of data integrity and privacy on your network.
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the menu, select Status > Modbus Gateway.
The Modbus Gateway page appears.
Statistics related to the Modbus gateway server are displayed. If the message Server
connections not available is displayed, this indicates that there are no connected clients.
n To view information about Modbus gateway clients, click Clients.
n To view statistics that are common to both the clients and server, click Common
Statistics.
n To view configuration details about the gateway, click the (configuration) icon in the
upper right of the gateway's status pane.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Use the show modbus-gateway command at the system prompt:
Client Uptime
-------------------- ------
modbus_socket_41 0
modbus_socket_21 0
modbus_serial_client 428
>
If the message Server connections not available is displayed, this indicates that there are no
connected clients.
3. Use the show modbus-gateway verbose command at the system prompt to display more
information:
Client Uptime
-------------------- ------
modbus_socket_41 0
modbus_socket_21 0
modbus_serial_client 506
Common Statistics
-----------------
Configuration Updates : 1
Client Configuration Failure : 0
Server Configuration Failure : 0
Configuration Load Failure : 0
Incoming Connections : 4
Internal Error : 0
Resource Shortages : 0
Servers
-------
modbus_socket
-------------
Client Lookup Errors : 0
Incoming Connections : 4
Packet Errors : 0
RX Broadcasts : 0
RX Requests : 12
TX Exceptions : 0
TX Responses : 12
Clients
-------
modbus_socket_41
----------------
Address Translation Errors : 0
Connection Errors : 0
Packet Errors : 0
RX Responses : 4
RX Timeouts : 0
TX Broadcasts : 0
TX Requests : 4
modbus_socket_21
----------------
Address Translation Errors : 0
Connection Errors : 0
Packet Errors : 0
RX Responses : 4
RX Timeouts : 0
TX Broadcasts : 0
TX Requests : 4
modbus_serial_client
--------------------
Address Translation Errors : 0
Connection Errors : 0
Packet Errors : 0
RX Responses : 4
RX Timeouts : 0
TX Broadcasts : 0
TX Requests : 4
>
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
System
time setting UI Configuration
Timezone (Optional) Set the timezone for the location of your Connect EZ 16/32 device.
The default is UTC.
Where value is the timezone using the format specified with the following
command:
(config)>
System
time setting UI Configuration
n If adding one or more NTP servers:
Note If multiple NTP servers are added, time samples are obtained
from each server. Selection algorithms are used to determine the most
accurate time.
Note This list is synchronized with the list of servers included with NTP
server configuration, and changes made to one will be reflected in the
other. See Configure the device as an NTP server for more information
about NTP server configuration.
(config)> save
Configuration saved.
>
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Test the configured NTP servers for connectivity:
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Synchronize the device's local date and time:
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Set the device's local date and time:
where value is the date in year-month-day hour:minute:second format. The value must be
surrounded by double quotes. For example:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Note By default, the access control list for the NTP service is empty, which means that all
downstream hosts connected to the Connect EZ 16/32 device can use the NTP service.
6. Enable Fall back to local clock to allow the device's local system clock to be used as backup
time source.
7. (Optional) Add upstream NTP servers that the device will use to synchronize its time. The
default setting is time.devicecloud.com.
n To change the default value of the NTP server:
a. Click NTP servers.
b. For Server, type a new server name.
n To add an NTP server:
a. Click NTP servers.
b. For Add Server, click .
c. For Server, enter the hostname of the upstream NTP server that the device will use
to synchronize its time.
d. Click to add additional NTP servers. If multiple servers are included, servers are
tried in the order listed until one succeeds.
Note This list is synchronized with the list of servers included with NTP client configuration,
and changes made to one will be reflected in the other. See Configure the system time
synchronization for more information about NTP client configuration.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
4. (Optional) Add an upstream NTP server that the device will use to synchronize its time to the
appropriate location in the list of NTP servers. The default setting is time.devicecloud.com.
n To delete the default NTP server, time.devicecloud.com:
n To add the NTP server to the beginning of the list, use the index value of 0 to indicate
that it should be added as the first server:
n To add the NTP server to the end of the list, use the index keyword end:
n To add the NTP server in another location in the list, use an index value to indicate the
appropriate position. For example:
Note This list is synchronized with the list of servers included with NTP client configuration,
and changes made to one will be reflected in the other. See Configure the system time
synchronization for more information about NTP client configuration.
5. Allow the device's local system clock to be used as backup time source:
6. (Optional) Configure the access control list to limit downstream access to the Connect EZ 16/32
device's NTP service.
n To limit access to specified IPv4 addresses and networks:
Where value is a firewall zone defined on your device, or the any keyword.
Additional Configuration
--------------------------------------------------------
-----------------------
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
(config)>
Note By default, the access control list for the NTP service is empty, which means that all
downstream hosts connected to the Connect EZ 16/32 device can use the NTP service.
7. (Optional) Set the timezone for the location of your Connect EZ 16/32 device. The default is
UTC.
Where value is the timezone using the format specified with the following command:
Timezone: The timezone for the location of this device. This is used to
adjust the time for log
messages. It also affects actions that occur at a specific time of day.
Format:
Africa/Abidjan
Africa/Accra
Africa/Addis_Ababa
...
(config)>
(config)> save
Configuration saved.
>
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the main menu, click Status.
2. Under Services, click NTP.
The NTP server status page is displayed.
Command line
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Add the multicast route. For example, to add a route named test:
4. The multicast route is enabled by default. If it has been disabled, enable the route:
5. Set the source address for the route. This must be a multicast IP address between 224.0.0.1
and 239.255.255.255.
6. Set the source interface for the route where multicast packets will arrive:
a. Use the ? to determine available interfaces:
b. Set the interface. For example:
7. Set a destination interface that the Connect EZ 16/32 device will send mutlicast packets to:
a. Use the ? to determine available interfaces:
b. Set the interface. For example:
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
d. Complete the rest of the interface configuration. See Configure a Wide Area Network (WAN)
or Configure a Local Area Network (LAN) for further information.
e. Disable any other interfaces associated with the devices that were added to the Ethernet
bond.
For example, if ETH1 and ETH2 were added to the Ethernet bond, disable the ETH1 and
ETH2 interfaces:
In some cases, the device may be a part of a bridge, in which case you should remove the
device from the bridge.
See Configure a bridge for more information.
9. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
Additional Configuration
---------------------------------------------------------------------
-------
loopback
b. Add a device:
d. Complete the rest of the interface configuration. See Configure a Wide Area Network (WAN)
or Configure a Local Area Network (LAN) for further information.
8. Disable any other interfaces associated with the devices that were added to the Ethernet bond.
For example, if ETH1 and ETH2 were added to the Ethernet bond, and they are included with
the ETH1 and ETH2 interfaces:
a. Type ... to return to the root of the configuration:
In some cases, the device may be a part of a bridge, in which case you should remove the
device from the bridge.
See Configure a bridge for more information.
9. Save the configuration and apply the change.
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
Where value is a firewall zone defined on your device, or the any keyword.
Additional Configuration
--------------------------------------------------------
-----------------------
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
(config)>
(config)> save
Configuration saved.
>
Note Using iPerf clients that are at a version earlier than iPerf3 to connect to the Connect EZ 16/32
device's iPerf3 server may result in unpredictable results. As a result, Digi recommends using an iPerf
client at version 3 or newer to connect to the Connect EZ 16/32 device's iPerf3 server.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
4. (Optional) Set the port number for the iPerf server listening port. The default is 5201.
5. (Optional) Set the access control list to restrict access to the iPerf server:
n To limit access to specified IPv4 addresses and networks:
Where value is a firewall zone defined on your device, or the any keyword.
Additional Configuration
--------------------------------------------------------
-----------------------
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
(config)>
(config)> save
Configuration saved.
>
$ iperf3 -c device_ip
where device_ip is the IP address of the Connect EZ 16/32 device. For example:
$ iperf3 -c 192.168.2.1
Connecting to host 192.168.2.1, port 5201
[ 4] local 192.168.3.100 port 54934 connected to 192.168.1.1 port 5201
[ ID] Interval Transfer Bandwidth Retr Cwnd
[ 4] 0.00-1.00 sec 26.7 MBytes 224 Mbits/sec 8 2.68 MBytes
[ 4] 1.00-2.00 sec 28.4 MBytes 238 Mbits/sec 29 1.39 MBytes
[ 4] 2.00-3.00 sec 29.8 MBytes 250 Mbits/sec 0 1.46 MBytes
[ 4] 3.00-4.00 sec 31.2 MBytes 262 Mbits/sec 0 1.52 MBytes
[ 4] 4.00-5.00 sec 32.1 MBytes 269 Mbits/sec 0 1.56 MBytes
[ 4] 5.00-6.00 sec 32.5 MBytes 273 Mbits/sec 0 1.58 MBytes
[ 4] 6.00-7.00 sec 33.9 MBytes 284 Mbits/sec 0 1.60 MBytes
[ 4] 7.00-8.00 sec 33.7 MBytes 282 Mbits/sec 0 1.60 MBytes
[ 4] 8.00-9.00 sec 33.5 MBytes 281 Mbits/sec 0 1.60 MBytes
[ 4] 9.00-10.00 sec 33.2 MBytes 279 Mbits/sec 0 1.60 MBytes
- - - - - - - - - - - - - - - - - - - - - - - - -
[ ID] Interval Transfer Bandwidth Retr
[ 4] 0.00-10.00 sec 315 MBytes 264 Mbits/sec 37 sender
[ 4] 0.00-10.00 sec 313 MBytes 262 Mbits/sec receiver
iperf Done.
$
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
4. (Optional) Set the port number for the iPerf server listening port. The default is 5201.
5. (Optional) Set the access control list to restrict access to the iPerf server:
n To limit access to specified IPv4 addresses and networks:
Where value is a firewall zone defined on your device, or the any keyword.
Additional Configuration
--------------------------------------------------------
-----------------------
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
(config)>
(config)> save
Configuration saved.
>
$ iperf3 -c device_ip
where device_ip is the IP address of the Connect EZ 16/32 device. For example:
$ iperf3 -c 192.168.2.1
Connecting to host 192.168.2.1, port 5201
[ 4] local 192.168.3.100 port 54934 connected to 192.168.1.1 port 5201
[ ID] Interval Transfer Bandwidth Retr Cwnd
iperf Done.
$
Note You can also configure the minimum TLS version in the AnywhereUSB Manager. See Configure
the minimum TLS version.
Web
1. Log into the local Web UI as a user with full Admin access rights.
2. Access the device configuration:
a. In the menu, click System. Under Configuration, click Device Configuration.
Note You can also enable the AnywhereUSB service and specify the port on the AnywhereUSB
Configuration page. To display this page, click System > Configuration > AnywhereUSB
Configuration. See AnywhereUSB Configuration page.
a Hub is no longer available, and the computer is disconnected from all groups and devices on
that Hub. The default value is 20 seconds. The minimum value is 15 seconds.
n The keepalive timeout value would need to be longer if the network has more latency
(such as a cellular or satellite link), or an internet link with unreliable packet delivery.
n If the value is too short, devices will be disconnected, which may have an adverse affect
on some devices, such as USB memory.
n If the value is too long, Hubs that are removed from the network will not be noticed as
gone for a long time, and devices that are no longer connected will be unresponsive for
a long time.
11. (Optional) For TLS identity certificate, paste an SSL certificate and private key in PEM format.
For detailed instructions about loading an SSL certificate for AnywhereUSB, see Load an SSL
certificate.
Note If the TLS identity certificate is empty, the certificate for the web administration service
is used.
12. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
where int is any integer between 1 and 65535. The default value is 18574. If you change the
port number you must also change the corresponding port number on your computer.
5. Configure access control:
n To limit access to specified IPv4 addresses and networks:
Where value is a firewall zone defined on your device, or the any keyword.
Additional Configuration
--------------------------------------------------------
-----------------------
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
(config)>
7. Select the minimum TLS version that the AnywhereUSB service will accept.
where value is any number of weeks, days, hours, minutes, or seconds, and takes the format
number{w|d|h|m|s}.
For example, to set keep_alive_interval to ten minutes, enter either 10m or 600s:
9. Set the keep-alive timeout to how long the AnywhereUSB Manager should wait for a
keepalive response. When the value of the response time is reached, the Manager decides that
a Hub is no longer available, and the computer is disconnected from all groups and devices on
that Hub. The default value is 20 seconds. The minimum value is 15 seconds.
where value is any number of weeks, days, hours, minutes, or seconds, and takes the format
number{w|d|h|m|s}.
For example, to set keep_alive_timeout to ten minutes, enter either 10m or 600s:
10. (Optional) Paste an SSL certificate and private key in PEM format. If empty, the certificate for
the web administration service is used.
(config)> save
Configuration saved.
>
Note Although pip is provided to help facilitate the installation of Python packages, there are
limitations in Python package support due to package dependencies, storage limitations, and
other issues.
Note For more information, see the following topics: Configure SSH access, Use SSH with key
authentication, and Allow remote access for web administration and SSH.
Example script
import socket
import socketserver
class MyTCPHandler(socketserver.BaseRequestHandler):
"""
The request handler class for our server.
def handle(self):
# self.request is the TCP socket connected to the client
self.data = self.request.recv(1024).strip()
print("{} wrote:".format(self.client_address[0]))
print(self.data)
# just send back the same data, but upper-cased
self.request.sendall(self.data.upper())
if __name__ == "__main__":
HOST, PORT ='', 9999
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
4. Set the shell command that will execute the custom firewall rules script:
(config)> save
Configuration saved.
>
Python modules
The Connect EZ 16/32 supports Python 3.6 and provides you with the ability to run Python
applications on the device interactively or from a file. It also offers extensions to manage your
Connect EZ 16/32:
n The digidevice module provides platform-specific extensions that allow you to interact with
the device’s configuration and interfaces.
The following submodules are included with the digidevice module:
l LEDs: digidevice.led
l SMS: digidevice.sms
l GPS: digidevice.location
l Digi Remote Manager:
o digidevice.datapoint
o digidevice.device_request
o digidevice.name
l Device configuration: digidevice.config
l Command line interface: digidevice.cli
Digidevice module
The Python digidevice module provides platform-specific extensions that allow you to interact with
the device’s configuration and interfaces. The following submodules are included with the digidevice
module:
This section contains the following topics:
1. Select a device in Remote Manager that is configured to allow shell access to the admin user,
and click Actions > Open Console. Alternatively, log into the Connect EZ 16/32 local command
line as a user with shell access.
Depending on your device configuration, you may be presented with an Access selection
menu. Type shell to access the device shell.
2. At the shell prompt, use the python command with no parameters to enter an interactive
Python session:
# python
Python 3.10.1 (main, Mar 30 2023, 23:47:13) [GCC 11.2.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>>
4. Execute a CLI command using the cli.execute(command) function. For example, to print the
system status and statistics to stdout using the show system command:
>>>
5. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit().
1. Select a device in Remote Manager that is configured to allow shell access to the admin user,
and click Actions > Open Console. Alternatively, log into the Connect EZ 16/32 local command
line as a user with shell access.
Depending on your device configuration, you may be presented with an Access selection
menu. Type shell to access the device shell.
2. At the shell prompt, use the python command with no parameters to enter an interactive
Python session:
# python
Python 3.10.1 (main, Mar 30 2023, 23:47:13) [GCC 11.2.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>>
>>> help(cli.execute)
Help on function execute in module digidevice.cli:
execute(command, timeout=5)
Execute a CLI command with the timeout specified returning the results.
...
5. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit().
1. Select a device in Remote Manager that is configured to allow shell access to the admin user,
and click Actions > Open Console. Alternatively, log into the Connect EZ 16/32 local command
line as a user with shell access.
Depending on your device configuration, you may be presented with an Access selection
menu. Type shell to access the device shell.
2. At the shell prompt, use the python command with no parameters to enter an interactive
Python session:
# python
Python 3.10.1 (main, Mar 30 2023, 23:47:13) [GCC 11.2.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>>
5. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit().
You can also upload multiple datapoints:
1. Select a device in Remote Manager that is configured to allow shell access to the admin user,
and click Actions > Open Console. Alternatively, log into the Connect EZ 16/32 local command
line as a user with shell access.
Depending on your device configuration, you may be presented with an Access selection
menu. Type shell to access the device shell.
2. At the shell prompt, use the python command with no parameters to enter an interactive
Python session:
# python
Python 3.10.1 (main, Mar 30 2023, 23:47:13) [GCC 11.2.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>>
6. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit().
Once the datapoints have been uploaded to Remote Manager, they can be viewed via Remote
Manager or accessed using Web Services calls. See the Digi Remote Manager Programmers Guide for
more information on web services and datapoints.
1. Select a device in Remote Manager that is configured to allow shell access to the admin user,
and click Actions > Open Console. Alternatively, log into the Connect EZ 16/32 local command
line as a user with shell access.
Depending on your device configuration, you may be presented with an Access selection
menu. Type shell to access the device shell.
2. At the shell prompt, use the python command with no parameters to enter an interactive
Python session:
# python
Python 3.10.1 (main, Mar 30 2023, 23:47:13) [GCC 11.2.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>>
>>> help(datapoint.upload)
Help on function upload in module digidevice.datapoint:
>>> help(datapoint.upload_multiple)
Help on function upload_multiple in module digidevice.datapoint:
upload_multiple(datapoints:List[digidevice.datapoint.DataPoint],
timeout:float=None)
...
6. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit().
1. Select a device in Remote Manager that is configured to allow shell access to the admin user,
and click Actions > Open Console. Alternatively, log into the Connect EZ 16/32 local command
line as a user with shell access.
Depending on your device configuration, you may be presented with an Access selection
menu. Type shell to access the device shell.
2. At the shell prompt, use the python command with no parameters to enter an interactive
Python session:
# python
Python 3.10.1 (main, Mar 30 2023, 23:47:13) [GCC 11.2.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>>
4. Use config.load() and the get() method to return the device's configuration:
a. Return the entire configuration:
>>> from pprint import pprint # use pprint vs. print to make the
output easier to read
>>> cfg = config.load()
>>> pprint(cfg.dump().splitlines())
...
network.interface.lan1.device=/network/bridge/lan1
network.interface.lan1.enable=true
network.interface.lan1.ipv4.address=192.168.2.1/24
network.interface.lan1.ipv4.connection_monitor.attempts=3
...
Which returns:
192.168.2.1/24
1. Select a device in Remote Manager that is configured to allow shell access to the admin user,
and click Actions > Open Console. Alternatively, log into the Connect EZ 16/32 local command
line as a user with shell access.
Depending on your device configuration, you may be presented with an Access selection
menu. Type shell to access the device shell.
2. At the shell prompt, use the python command with no parameters to enter an interactive
Python session:
# python
Python 3.10.1 (main, Mar 30 2023, 23:47:13) [GCC 11.2.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>>
>>> cfg.commit()
True
>>>
>>> print(cfg.get("system.name"))
New-Name
>>>
1. Select a device in Remote Manager that is configured to allow shell access to the admin user,
and click Actions > Open Console. Alternatively, log into the Connect EZ 16/32 local command
line as a user with shell access.
Depending on your device configuration, you may be presented with an Access selection
menu. Type shell to access the device shell.
2. At the shell prompt, use the python command with no parameters to enter an interactive
Python session:
# python
Python 3.10.1 (main, Mar 30 2023, 23:47:13) [GCC 11.2.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>>
>>> help(config)
Help on module acl.config in acl:
NAME
acl.config - Python interface to ACL configuration (libconfig).
...
5. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit().
Use Remote Manager's SCI interface to create SCI requests that are sent to your Connect EZ 16/32
device, and use the device_request module to send responses to those requests to Remote Manager.
See the Digi Remote Manager Programmers Guide for more information on SCI.
Task one: Use the device_request module on your Connect EZ 16/32 device to create a response
1. Select a device in Remote Manager that is configured to allow shell access to the admin user,
and click Actions > Open Console. Alternatively, log into the Connect EZ 16/32 local command
line as a user with shell access.
Depending on your device configuration, you may be presented with an Access selection
menu. Type shell to access the device shell.
2. At the shell prompt, use the python command with no parameters to enter an interactive
Python session:
# python
Python 3.10.1 (main, Mar 30 2023, 23:47:13) [GCC 11.2.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>>
5. Register a callbackup function that will be called when the device receives a SCI request from
Remote Manager:
Note Leave the interactive Python session active while completing task two, below. Once you have
completed task two, exit the interactive session by using Ctrl-D. You can also exit the session using
exit() or quit().
Task two: Create and send an SCI request from Digi Remote Manager
The second step in using the device_request module is to create an SCI request that Remote
Manager will forward to the device. For example, you can create in SCI request a the Remote Manager
API explorer:
d. Click Add.
e. Click OK.
3. Click Examples > SCI > Data Service > Send Request.
Code similar to the following will be displayed in the HTTP message body text box:
<sci_request version="1.0">
<data_service>
<targets>
<device id="00000000-00000000-0000FFFF-A83CF6A3"/>
</targets>
<requests>
<device_request target_name="myTarget">
my payload string
</device_request>
</requests>
</data_service>
</sci_request>
Note The value of the target_name parameter in the device_request element must
correspond to the target parameter of the device_request.register function in the Python
script. In this example, the two are the same.
4. Click Send.
Once that the request has been sent to the device, the handler on the device is executed.
n On the device, you will receive the following output:
<sci_reply version="1.0">
<data_service>
<device id="00000000-00000000-0000FFFF-A83CF6A3"/>
<requests>
<device_request target_name="myTarget"
status="0">OK</device_request>
</requests>
</device>
</data_service>
</sci_request>
1. Create a Python application, called showsystem.py, that uses the digidevice.cli module to
create a response containing information about device and the device_request module to
respond with this information to a request from Remote Manager:
2. Upload the showsystem.py application to the /etc/config/scripts directory on two or more Digi
devices. In this example, we will upload it to two devices, and use the same request in Remote
Manager to query both devices.
See Configure scripts to run automatically for information about uploading Python
applications to your device. You can also create the script on the device by using the vi
command when logged in with shell access.
3. For both devices:
a. Configure the device to automatically run the showsystem.py application on reboot, and
to restart the application if it crashes. This can be done from either the WebUI or the
command line:
Web
i. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin
access rights.
ii. Access the device configuration:
Remote Manager:
i. Locate your device as described in Use Digi Remote Manager to view and manage
your device.
ii. Click the Device ID.
iii. Click Settings.
iv. Click to expand Config.
ix. Click Apply to save the configuration and apply the change.
Command line
i. Select the device in Remote Manager and click Actions > Open Console, or log into
the Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access
selection menu. Type admin to access the Admin CLI.
ii. At the command line, type config to enter configuration mode:
> config
(config)>
(config)> save
Configuration saved.
>
b. Run the showsystem.py application. You can run the application by either rebooting the
device, or by running it from the shell prompt.
n To reboot the device:
i. From the WebUI:
i. From the main menu, click System.
ii. Click Reboot.
i. From the command line, at the Admin CLI prompt, type:
> reboot
# exit
<sci_request version="1.0">
<data_service>
<targets>
<device id="00000000-00000000-0000FFFF-A83CF6A3"/>
<device id="00000000-00000000-0000FFFF-485740BC"/>
</targets>
<requests>
<device_request target_name="myTarget">
my payload string
</device_request>
</requests>
</data_service>
</sci_request>
7. For the device_request element, replace the value of target_name with showSystem. This
matches the target parameter of the device_request.register function in the showsystem.py
application.
<device_request target_name="showSystem">
8. Click Send.
You should receive a response similar to the following:
<sci_reply version="1.0">
<data_service>
<device id="00000000-00000000-0000FFFF-A83CF6A3"/>
<requests>
<device_request target_name="showSystem" status="0">Model
: Digi Connect EZ 16/32
Serial Number : Connect EZ 16/32-000068
Hostname : Connect EZ 16/32
MAC : 00:40:D0:13:35:36
Timezone : UTC
Current Time : Thu, Jan 11, 2024 12:10:00
CPU : 1.1
Uptime : 1 day, 21 hours, 49 minutes, 47
seconds (164987s)
Temperature : 39C
Disk
----
Load Average : 0.10, 0.05, 0.00
RAM Usage : 85.176MB/250.484MB(34%)
Disk /etc/config Usage : 0.068MB/13.416MB(1%)
Disk /opt Usage : 47.724MB/5309.752MB(1%)
Disk /overlay Usage : MB/MB(%)
Disk /tmp Usage : 0.004MB/40.96MB(0%)
Disk /var Usage : 0.820MB/32.768MB(3%)</device_
request>
</requests>
</device>
<device id="00000000-00000000-0000FFFF-485740BC"/>
<requests>
<device_request target_name="showSystem" status="0">Model
: Digi Connect EZ 16/32
Serial Number : Connect EZ 16/32-000023
Hostname : Connect EZ 16/32
MAC : 00:40:D0:26:79:1C
Timezone : UTC
Current Time : Thu, Jan 11, 2024 12:10:00
CPU : 1.1
Uptime : 4 day, 13 hours, 43 minutes, 22
seconds (395002s)
Temperature : 37C
</device>
</data_service>
</sci_request>
Help for using Python to respond to Digi Remote Manager SCI requests
Get help for respond to Digi Remote Manager Server Command Interface (SCI) requests by accessing
help for digidevice.device_request:
1. Select a device in Remote Manager that is configured to allow shell access to the admin user,
and click Actions > Open Console. Alternatively, log into the Connect EZ 16/32 local command
line as a user with shell access.
Depending on your device configuration, you may be presented with an Access selection
menu. Type shell to access the device shell.
2. At the shell prompt, use the python command with no parameters to enter an interactive
Python session:
# python
Python 3.10.1 (main, Mar 30 2023, 23:47:13) [GCC 11.2.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>>
>>> help(device_request)
Help on module digidevice.device_request in digidevice:
NAME
digidevice.device_request - APIs for registering device request handlers
...
You can also use the help command with available device_request functions:
n Use the help command with device_request.register:
>>> help(device_request.register)
Help on function register in module digidevice.device_request:
>>> help(device_request.unregister)
Help on function unregister in module digidevice.device_request:
5. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit().
1. Select a device in Remote Manager that is configured to allow shell access to the admin user,
and click Actions > Open Console. Alternatively, log into the Connect EZ 16/32 local command
line as a user with shell access.
Depending on your device configuration, you may be presented with an Access selection
menu. Type shell to access the device shell.
2. At the shell prompt, use the python command with no parameters to enter an interactive
Python session:
# python
Python 3.10.1 (main, Mar 30 2023, 23:47:13) [GCC 11.2.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>>
>>> runt.start()
>>>
5. Use the keys() method to display available keys in the runtime database, and use the get()
method to print information from the runtime database:
a. Print available keys:
>>> print(runt.keys(""))
>>> print(runt.keys("system"))
>>> print(runt.get("system.mac"))
1. Select a device in Remote Manager that is configured to allow shell access to the admin user,
and click Actions > Open Console. Alternatively, log into the Connect EZ 16/32 local command
line as a user with shell access.
Depending on your device configuration, you may be presented with an Access selection
menu. Type shell to access the device shell.
2. At the shell prompt, use the python command with no parameters to enter an interactive
Python session:
# python
Python 3.10.1 (main, Mar 30 2023, 23:47:13) [GCC 11.2.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>>
>>> runt.start()
>>>
>>> print(runt.get("my-variable"))
my-variable
>>>
>>> runt.stop()
>>>
8. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit().
1. Select a device in Remote Manager that is configured to allow shell access to the admin user,
and click Actions > Open Console. Alternatively, log into the Connect EZ 16/32 local command
line as a user with shell access.
Depending on your device configuration, you may be presented with an Access selection
menu. Type shell to access the device shell.
2. At the shell prompt, use the python command with no parameters to enter an interactive
Python session:
# python
Python 3.10.1 (main, Mar 30 2023, 23:47:13) [GCC 11.2.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>>
>>> help(runt)
NAME
acl.runt - Python interface to ACL runtime database (runtd).
...
5. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit().
Note Because causing a profile to be automatically pushed from Remote Manager may change the
behavior of the device, including overwriting existing usernames and passwords, the name
submodule should be used with caution. As a result, support for this functionality is disabled by
default on Remote Manager.
Enable support on Digi Remote Manager for uploading custom device names
{
"name" : "AllowDeviceToSetOwnNameEnabled",
"value" : "true"
}
5. Click Send.
1. Select a device in Remote Manager that is configured to allow shell access to the admin user,
and click Actions > Open Console. Alternatively, log into the Connect EZ 16/32 local command
line as a user with shell access.
Depending on your device configuration, you may be presented with an Access selection
menu. Type shell to access the device shell.
2. At the shell prompt, use the python command with no parameters to enter an interactive
Python session:
# python
Python 3.10.1 (main, Mar 30 2023, 23:47:13) [GCC 11.2.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>>
>>> name.upload("my_name")
5. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit().
1. Select a device in Remote Manager that is configured to allow shell access to the admin user,
and click Actions > Open Console. Alternatively, log into the Connect EZ 16/32 local command
# python
Python 3.10.1 (main, Mar 30 2023, 23:47:13) [GCC 11.2.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>>
>>> help(name)
NAME
digidevice.name - API for uploading name from the device
...
5. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit().
1. Select a device in Remote Manager that is configured to allow shell access to the admin user,
and click Actions > Open Console. Alternatively, log into the Connect EZ 16/32 local command
line as a user with shell access.
Depending on your device configuration, you may be presented with an Access selection
menu. Type shell to access the device shell.
2. At the shell prompt, use the python command with no parameters to enter an interactive
Python session:
# python
Python 3.10.1 (main, Mar 30 2023, 23:47:13) [GCC 11.2.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>>
>>> maintenance.state()
'IN_SERVICE'
>>>
>>> maintenance.out_of_service()
>>> maintenance.state()
'OUT_OF_SERVICE'
>>>
>>> maintenance.in_service()
>>> maintenance.state()
'IN_SERVICE'
>>>
Note Leave the interactive Python session active while completing task two, below. Once you have
completed task two, exit the interactive session by using Ctrl-D. You can also exit the session using
exit() or quit().
1. Select a device in Remote Manager that is configured to allow shell access to the admin user,
and click Actions > Open Console. Alternatively, log into the Connect EZ 16/32 local command
line as a user with shell access.
Depending on your device configuration, you may be presented with an Access selection
menu. Type shell to access the device shell.
2. At the shell prompt, use the python command with no parameters to enter an interactive
Python session:
# python
Python 3.10.1 (main, Mar 30 2023, 23:47:13) [GCC 11.2.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>>
>>> help(maintenance )
Help on module digidevice.maintenance in digidevice:
NAME
digidevice.maintenance
DESCRIPTION
API for setting the device's service state. The service state is
stored
in runt.
...
5. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit().
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
(config)> save
Configuration saved.
>
#!/usr/bin/python3.10.1
import os
import threading
import sys
from digidevice.sms import Callback, send
COND = threading.Condition()
if __name__ == '__main__':
if len(sys.argv) > 1:
dest = sys.argv[1]
else:
dest = '+15005550006'
my_callback = Callback(sms_test_callback, metadata=True)
send_sms(dest, 'Hello World!')
print("Please send an SMS message now.")
print("Execution halted until a message is received or 60 seconds have
passed.")
# acquire the semaphore and wait until a callback occurs
COND.acquire()
try:
COND.wait(60.0)
except Exception as err:
print("exception occured while waiting")
print(err)
COND.release()
my_callback.unregister_callback()
#!/usr/bin/python
# Take an incoming SMS message from a specified phone number and run it as
# a CLI command. Send a reponse SMS to the sender before running the command
import os
import threading
import sys
from digidevice import cli
from digidevice.sms import Callback, send
COND = threading.Condition()
allowed_incoming_phone_number = '2223334444'
print(sms)
print(info)
#if sms == "Reboot":
# send_sms(dest, 'Reboot message received, rebooting device...')
# response = cli.execute("reboot")
# print (response)
send_sms(dest, 'Message received (' + sms + '). Performing as CLI
command...')
response = cli.execute(sms)
if not response:
response = 'OK'
send_sms(dest, 'CLI results: ' + response)
print (response)
COND.acquire()
COND.notify()
COND.release()
if __name__ == '__main__':
if len(sys.argv) > 1:
dest = sys.argv[1]
else:
dest = allowed_incoming_phone_number
my_callback = Callback(sms_test_callback, metadata=True)
#send_sms(dest, 'Ready to receive incoming SMS message')
print("Waiting up to 60 seconds for incoming SMS message")
# acquire the semaphore and wait until a callback occurs
COND.acquire()
try:
COND.wait(60.0)
except Exception as err:
print("exception occured while waiting")
print(err)
COND.release()
my_callback.unregister_callback()
os.system('rm -f /var/run/sms/scripts/*') # remove all stored SMS messages,
since we've processed them
print("SMS script finished. Please re-run if you want to check for more
incoming SMS messages")
os._exit(0)
1. Select a device in Remote Manager that is configured to allow shell access to the admin user,
and click Actions > Open Console. Alternatively, log into the Connect EZ 16/32 local command
line as a user with shell access.
Depending on your device configuration, you may be presented with an Access selection
menu. Type shell to access the device shell.
2. Determine the path to the serial port:
# ls /dev/serial/
by-id by-path port1
#
3. At the shell prompt, use the python command with no parameters to enter an interactive
Python session:
# python
Python 3.10.1 (main, Mar 30 2023, 23:47:13) [GCC 11.2.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>>
5. You can now perform operations on the serial port. For example, to write a message to the
serial port:
6. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit().
"""
MQTT client example:
- Reporting some device metrics from runt
- Reporting DHCP clients
- Firmware update feature (simple implementation, read TODO in cmd_fwupdate)
"""
import sys
import time
import paho.mqtt.client as mqtt
import json
from acl import runt, config
from http import HTTPStatus
import urllib.request
import tempfile
import os
from digidevice import cli
POLL_TIME = 60
def cmd_reboot(params):
print("Rebooting unit...")
try:
cli.execute("reboot", 10)
except:
print("Failed to run 'reboot' command")
return HTTPStatus.INTERNAL_SERVER_ERROR
return HTTPStatus.OK
def cmd_fwupdate(params):
try:
fw_uri = params["uri"]
except:
print("Firmware file URI not passed")
return HTTPStatus.BAD_REQUEST
try:
fd, fname = tempfile.mkstemp()
os.close(fd)
try:
urllib.request.urlretrieve(fw_uri, fname)
except:
print("Failed to download FW file from URI {}".format(fw_uri))
return HTTPStatus.NOT_FOUND
try:
ret = cli.execute("system firmware update file " + fname, 60)
except:
print("Failed to run firmware update command")
return HTTPStatus.INTERNAL_SERVER_ERROR
return HTTPStatus.OK
CMD_HANDLERS = {
"reboot": cmd_reboot,
"fw-update": cmd_fwupdate
}
if cmd_path.startswith(PREFIX_CMD):
path = cmd_path[len(PREFIX_CMD):]
else:
print("Invalid command path ({}), cannot send reply".format(cmd_path))
return
reply = {
"cmd": cmd,
"status": status
}
Supported commands:
- "fw-update"
params:
- "uri": "<firmware_file_URL>"
- "reboot"
params:
"""
try:
m = json.loads(msg.payload)
cid = m["cid"]
cmd = m["cmd"]
try:
payload = m["params"]
except:
payload = None
except:
print("Invalid command format: {}".format(msg.payload))
if not cid:
# Return if client-ID not passed
return None
send_cmd_reply(client, msg.topic, cid, cmd, HTTPStatus.BAD_REQUEST)
try:
status = CMD_HANDLERS[cmd](payload)
except:
print("Invalid command: {}".format(cmd))
status = HTTPStatus.NOT_IMPLEMENTED
def publish_dhcp_leases():
leases = []
try:
with open('/etc/config/dhcp.leases', 'r') as f:
for line in f:
elems = line.split()
if len(elems) != 5:
continue
leases.append({"mac": elems[1], "ip": elems[2], "host": elems
[3]})
if leases:
client.publish(PREFIX_EVENT + "/leases", json.dumps(leases,
separators=(',',':')))
except:
print("Failed to open DHCP leases file")
def publish_system():
avg1, avg5, avg15 = runt.get("system.load_avg").split(', ')
ram_used = runt.get("system.ram.per")
disk_opt = runt.get("system.disk./opt.per")
disk_config = runt.get("system.disk./etc/config.per")
msg = json.dumps({
"load_avg": {
"1min": avg1,
"5min": avg5,
"15min": avg15
},
"disk_usage": {
"/opt": disk_opt,
"/etc/config:": disk_config,
"ram": ram_used
}
})
runt.start()
serial = runt.get("system.serial")
client = mqtt.Client()
client.on_connect = on_connect
client.on_message = on_message
try:
client.connect("192.168.1.100", 1883, 60)
client.loop_start()
except:
print("Failed to connect to MQTT server")
sys.exit(1)
while True:
publish_dhcp_leases()
publish_system()
time.sleep(POLL_TIME)
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the menu, click System. Under Administration, click File System.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, use the scp command to upload the Python application script to the
Connect EZ 16/32 device:
> scp host hostname-or-ip user username remote remote-path local local-
path to local
where:
n hostname-or-ip is the hostname or IP address of the remote host.
n username is the name of the user on the remote host.
n remote-path is the path and filename of the file on the remote host that will be copied
to the Connect EZ 16/32 device.
n local-path is the location on the Connect EZ 16/32 device where the copied file will be
placed.
For example:
Note You can also create scripts by using the vi command when logged in with shell access.
Note This feature does not provide syntax or error checking. Certain commands can render the device
inoperable. Use with care.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Custom scripts are enabled by default. To disable, toggle off Enable to toggle off.
5. (Optional) For Label, provide a label for the script.
6. For Run mode, select the mode that will be used to run the script. Available options are:
n On boot: The script will run once each time the device boots.
l If On boot is selected, select the action that will be taken when the script
completes in Exit action. Available options are:
o None: Action taken when the script exits.
o Restart script: Runs the script repeatedly.
o Reboot: The device will reboot when the script completes.
n Interval: The script will start running at the specified interval, within 30 seconds after
the configuration change is saved.
l If Interval is selected, in Interval, type the interval.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and
take the format number{w|d|h|m|s}.
For example, to set Interval to ten minutes, enter 10m or 600s.
l Click to enable Run single to run only a single instance of the script at a time.
If Run single is not enabled, a new instance of the script will be started at every
interval, regardless of whether the script is still running from a previous interval.
n Set time: Runs the script at a specified time of the day.
l If Set Time is selected, specify the time that the script should run in Run time,
using the format HH:MM.
n During system maintenance: The script will run during the system maintenance time
window.
7. For Commands, type the commands that will execute the script.
n If a Python script is being used, include the full path to the Python script. For example:
python /etc/config/scripts/test.py
n If the script begins with #!, then the script will be invoked in the location specified by
the path for the script command. Otherwise, the default shell will be used (equivalent
to #!/bin/sh).
8. Script logging options:
a. Click to enable Log script output to log the script's output to the system log.
b. Click to enable Log script errors to log script errors to the system log.
If neither option is selected, only the script's exit code is written to the system log.
9. For Maximum memory, enter the maximum amount of memory available to be used by the
script and its subprocesses, using the format number{b|bytes|KB|k|MB|MB|M|GB|G|TB|T}.
10. Sandbox is enabled by default, which restricts access to the file system and available
commands that can be used by the script. This option protects the script from accidentally
destroying the system it is running on.
11. Click to enable Once to configure the script to run only once at the specified time.
If Once is enabled, rebooting the device will cause the script to not run again. The only way to
re-run the script is to:
n Remove the script from the device and add it again.
n Make a change to the script.
n Uncheck Once.
12. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Add a script:
where value is any string. if spaces are used, enclose value within double quotes.
5. Set the mode that will be used to run the script:
where value is any number of weeks, days, hours, minutes, or seconds, and takes
the format number{w|d|h|m|s}.
For example, to set on_interval to ten minutes, enter either 10m or 600s:
If once is set to false, a new instance of the script will be started at every interval,
regardless of whether the script is still running from a previous interval.
n set_time: Runs the script at a specified time of the day.
l If set_time is set, set the time that the script should run, using the format HH:MM:
n maintenance_time: The script will run during the system maintenance time window.
where filename is the path and filename of the script, and any related command line
information.
n If a Python script is being used, include the full path to the Python script and enclose in
quotation marks. For example:
n If the script begins with #!, then the script will be invoked in the location specified by
the path for the script command. Otherwise, the default shell will be used (equivalent
to #!/bin/sh).
7. Script logging options:
n To log the script's output to the system log:
If syslog_stdout and syslog_stderr are not enabled, only the script's exit code is written to
the system log.
8. Set the maximum amount of memory available to be used by the script and its subprocesses:
If once is enabled, rebooting the device will cause the script to run again. The only way to re-
run the script is to:
n Remove the script from the device and add it again.
n Make a change to the script.
n Disable once.
10. Sandbox is enabled by default. This option protects the script from accidentally destroying the
system it is running on.
(config)> save
Configuration saved.
>
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. At the Status page, click Scripts.
The Scripts page displays:
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Use the show scripts command at the system prompt:
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. At the Status page, click Scripts.
The Scripts page displays:
2. For scripts that are currently running, click Stop Script to stop the script.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Determine the name of scripts that are currently running:
(config)> save
Configuration saved.
>
Note The Python interactive session is not available from the Admin CLI. You must access the device
shell in order to run Python applications from the command line. See Authentication groups for
information about configuring authentication groups that include shell access.
1. Select a device in Remote Manager that is configured to allow shell access to the admin user,
and click Actions > Open Console. Alternatively, log into the Connect EZ 16/32 local command
line as a user with shell access.
Depending on your device configuration, you may be presented with an Access selection
menu. Type shell to access the device shell.
2. At the shell prompt, use the python command with no parameters to enter an interactive
Python session:
# python
Python 3.10.1 (main, Mar 30 2023, 23:47:13) [GCC 11.2.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>>
3. Type Python commands at the Python prompt. For example, to view help for the digidevice
module, type:
>>> help("digidevice")
Help on package digidevice:
NAME
digidevice - Digi device python extensions
DESCRIPTION
This module includes various extensions that allow Python
to interact with additional features offered by the device.
...
4. Use Ctrl-D to exit the Python session. You can also exit the session using exit() or quit().
Note Python applications cannot be run from the Admin CLI. You must access the device shell in
order to run Python applications from the command line. See Authentication groups for information
about configuring authentication groups that include shell access.
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
a. On the menu, click System. Under Administration, click File System.
Command line
a. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
b. At the command line, use the scp command to upload the Python application script to the
Connect EZ 16/32 device:
where:
n hostname-or-ip is the hostname or IP address of the remote host.
n username is the name of the user on the remote host.
n remote-path is the path and filename of the file on the remote host that will be
copied to the Connect EZ 16/32 device.
n local-path is the location on the Connect EZ 16/32 device where the copied file will
be placed.
For example:
To upload a script from a remote host with an IP address of 192.168.4.1 to the
/etc/config/scripts directory on the Connect EZ 16/32 device, issue the following
command:
Note You can also create scripts by using the vi command when logged in with shell access.
2. Select a device in Remote Manager that is configured to allow shell access to the admin user,
and click Actions > Open Console. Alternatively, log into the Connect EZ 16/32 local command
line as a user with shell access.
Depending on your device configuration, you may be presented with an Access selection
menu. Type shell to access the device shell.
3. Use the python command to run the Python application. In the following example, the Python
application, test.py, takes 3 parameters: 120, ports and storage:
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the menu, click System. Under Administration, click File System.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, use the scp command to upload the Python application script to the
Connect EZ 16/32 device:
> scp host hostname-or-ip user username remote remote-path local local-
path to local
where:
n hostname-or-ip is the hostname or IP address of the remote host.
n username is the name of the user on the remote host.
n remote-path is the path and filename of the file on the remote host that will be copied
to the Connect EZ 16/32 device.
n local-path is the location on the Connect EZ 16/32 device where the copied file will be
placed.
For example:
To upload a script from a remote host with an IP address of 192.168.4.1 to the
/etc/config/scripts directory on the Connect EZ 16/32 device, issue the following command:
Note You can also create scripts by using the vi command when logged in with shell access.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Custom scripts are enabled by default. To disable, toggle off Enable to toggle off.
5. (Optional) For Label, provide a label for the script.
6. For Run mode, select Manual.
7. For Commands, type the commands that will execute the script.
n If a Python script is being used, include the full path to the Python script. For example:
python /etc/config/scripts/test.py
n If the script begins with #!, then the script will be invoked in the location specified by
the path for the script command. Otherwise, the default shell will be used (equivalent
to #!/bin/sh).
8. Script logging options:
a. Click to enable Log script output to log the script's output to the system log.
b. Click to enable Log script errors to log script errors to the system log.
If neither option is selected, only the script's exit code is written to the system log.
9. For Maximum memory, enter the maximum amount of memory available to be used by the
script and its subprocesses, using the format number{b|bytes|KB|k|MB|MB|M|GB|G|TB|T}.
10. Sandbox is enabled by default, which restricts access to the file system and available
commands that can be used by the script. This option protects the script from accidentally
destroying the system it is running on.
11. Click to enable Once to configure the script to run only once at the specified time.
If Once is enabled, rebooting the device will cause the script to not run again. The only way to
re-run the script is to:
n Remove the script from the device and add it again.
n Make a change to the script.
n Uncheck Once.
12. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Add a script:
where value is any string. if spaces are used, enclose value within double quotes.
5. Set the run mode to manual:
where filename is the path and filename of the script, and any related command line
information.
n If a Python script is being used, include the full path to the Python script and enclose in
quotation marks. For example:
n If the script begins with #!, then the script will be invoked in the location specified by
the path for the script command. Otherwise, the default shell will be used (equivalent
to #!/bin/sh).
7. Script logging options:
n To log the script's output to the system log:
If syslog_stdout and syslog_stderr are not enabled, only the script's exit code is written to
the system log.
8. Set the maximum amount of memory available to be used by the script and its subprocesses:
If once is enabled, rebooting the device will cause the script to run again. The only way to re-
run the script is to:
n Remove the script from the device and add it again.
n Make a change to the script.
n Disable once.
10. Sandbox is enabled by default. This option protects the script from accidentally destroying the
system it is running on.
(config)> save
Configuration saved.
>
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. At the Status page, click Scripts.
The Scripts page displays:
2. For scripts that are enabled and configured to have a run mode of Manual, click Start Script
to start the script.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Determine the name of scripts that are currently running:
(config)> save
Configuration saved.
>
Default
Feature Description configuration
Idle timeout Determines how long a user session can be idle before the n 10 minutes
system automatically disconnects.
Allow shell If disabled, prevents all authentication prohibits access to n Enabled
the shell prompt for all authentication groups. This does not
prevent access to the Admin CLI.
Methods Determines how users are authenticated for access: local n local users
users, TACACS+, or RADIUS.
Groups Associates access permissions for a group. . You can modify n admin:
the released groups and create additional groups as needed Provides the
for your site. A user can be assigned to more than one group. logged-in user
with
administrative
and shell
access.
n serial: Provides
the logged-in
user with
access to serial
ports.
Users Defines local users for the Connect EZ 16/32. n admin: Belongs
to both the
admin and
serial groups.
TACACS+ Configures support for TACACS+ (Terminal Access Controller n Not configured
Access-Control System Plus) servers and users.
RADIUS Configures support for RADIUS (Remote Authentication Dial- n Not configured
In User Service) servers and users.
LDAP Configures support for LDAP (Lightweight Directory Access n Not configured
Protocol) servers and users.
Serial Configures authentication for serial TCP and autoconnect n Not
services. configured
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
5. Select the appropriate authentication type for the new method from the Method drop-down.
Note Authentication methods are attempted in the order they are listed until the first
successful authentication result is returned. See Rearrange the position of authentication
methods for information about how to reorder the authentication methods.
Command line
Authentication methods are attempted in the order they are listed until the first successful
authentication result is returned. This procedure describes how to add methods to various places in
the list.
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Add the new authentication method to the appropriate location in the list:
n To determine the current list of authentication methods:
a. Select the device in Remote Manager and click Actions > Open Console, or log into
the Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access
selection menu. Type admin to access the Admin CLI.
b. At the command line, type config to enter configuration mode:
> config
(config)>
c. Use the show auth method command to display the current authentication
methods configuration:
n To add the new authentication method to the beginning of the list, use the index value
of 0 to indicate that it should be added as the first method:
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Use the show auth method command to determine the index number of the authentication
method to be deleted:
Where n is index number of the authentication method to be deleted. For example, to delete
the TACACS+ authentication method as displayed by the example show command, above:
(config)> save
Configuration saved.
>
Web
Authentication methods are reordered by changing the method type in the Method drop-down for
each authentication method to match the appropriate order.
For example, the following configuration has Local users as the first method, and RADIUS as the
second.
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
(config)> save
Configuration saved.
>
Authentication groups
Authentication groups are used to assign access rights to Connect EZ 16/32 users. Three types of
access rights can be assigned:
n Admin access: Users with Admin access can be configured to have either:
l The ability to manage the Connect EZ 16/32 device by using the WebUI or the Admin CLI.
l Read-only access to the WebUI and Admin CLI.
n Shell access: Users with Shell access have the ability to access the shell when logging into the
Connect EZ 16/32 via ssh, telnet, or the serial console.
Shell access is not available if the Allow shell parameter has been disabled. See Disable shell
access for more information about the Allow shell parameter.
n Serial access: Users with Serial access have the ability to log into the Connect EZ 16/32 device
by using the serial console.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
n Shell access:
Shell access is not available if the Allow shell parameter has been disabled. See
Disable shell access for more information about the Allow shell parameter.
n Serial access:
l To enable Serial access for the admin group:
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
5. Click the following options, as appropriate, to enable or disable access rights for each:
n Admin access
For groups assigned Admin access, you can also determine whether the Access level
should be Full access or Read-only access.
where value is either:
l Full access full: provides users of this group with the ability to manage the Connect
EZ 16/32 device by using the WebUI or the Admin CLI.
l Read-only access read-only: provides users of this group with read-only access to
the WebUI and Admin CLI.
The default is Full access full.
n Serial access
6. (Optional) Configure OpenVPN access. See for further information.
7. (Optional) Configure captive portal access:
a. Enable captive portal access rights for users of this group by checking the box next to
Captive portal access.
b. Click Captive portals to expand the Captive portal node.
c. For Add Captive portal, click .
d. In the Captive portal dropdown, select a captive portal to which users of this group will
have access.
e. Click again to add additional captive portals.
8. Interactive shell access
Shell access is not available if the Allow shell parameter has been disabled. See Disable shell
access for more information about the Allow shell parameter.
9. (Optional) Enable users that belong to this group to query the device for Nagios monitoring by
checking the box next to Nagios access.
10. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Use the add auth group command to add a new authentication. For example, to add a group
named test:
l read-only: provides users of this group with read-only access to the WebUI and
Admin CLI.
The default is full.
n Shell access:
Shell access is not available if the Allow shell parameter has been disabled. See Disable
shell access for more information about the Allow shell parameter.
n Serial access:
c. Add a captive portal to which users of this group will have access:
i. Determine available portals:
(config)> add auth group test acl portal portals end portal1
(config)>
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
(config)> save
Configuration saved.
>
Local users
Local users are authenticated on the device without using an external authentication mechanism such
as TACACS+ or RADIUS. Local user authentication is enabled by default, with one preconfiged default
user.
Default user
At manufacturing time, each Connect EZ 16/32 device comes with a default user configured as follows:
n Username: admin.
n Password: The default password is displayed on the label on the bottom of the device.
Note The default password is a unique password for the device, and is the most critical
security feature for the device. If you reset the device to factory defaults, you must log in using
the default user and password, and you should immediately change the password to a custom
password. Before deploying or mounting the Connect EZ 16/32 device, record the default
password, so you have the information available when you need it even if you cannot
physically access the label on the bottom of the device.
The default admin user is preconfigured with both Admin and Serial access. You can configure the
admin user account to fit with the needs of your environment.
This section contains the following topics:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
You can also change the password for the active user by clicking the user name in the menu
bar:
The active user must have full Admin access rights to be able to change the password.
6. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
Where:
n username is the name of the user.
n pwd is the new password for the user. The password must be at least eight characters
long and must contain at least one uppercase letter, one lowercase letter, one number,
and one special character.
4. Save the configuration and apply the change.
(config)> save
Configuration saved.
>
n The amount of time that the user is locked out of the system after the specified number of
unsuccessful login attempts.
n An optional public ssh key, to authenticate the user when using passwordless SSH login.
n Two-factor authentication information for user login over SSH, telnet, and the serial console:
l The verification type for two-factor authentication: Either time-based or counter-based.
l The security key.
l Whether to allow passcode reuse (time based verification only).
l The passcode refresh interval (time based verification only).
l The valid code window size.
l The login limit.
l The login limit period.
l One-time use eight-digit emergency scratch codes.
To configure a local user:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Note Every user must be configured with at least one group. You can add multiple groups to a
user by clicking Add again and selecting the next group.
9. (Optional) Add SSH keys for the user to use passwordless SSH login:
a. Click SSH keys.
b. In Add SSH key, paste or type a public encryption key that this user can use for
passwordless SSH login and click .
10. (Optional) Configure two-factor authentication for SSH, telnet, and serial console login:
a. Click Two-factor authentication.
b. Check Enable to enable two-factor authentication for this user.
c. Select the Verification type:
n Time-based (TOTP): Time-based One-Time Password (TOTP) authentication uses
the current time to generate a one-time password.
n Counter-based (HOTP): HMAC-based One-Time Password (HOTP) uses a counter to
validate a one-time password.
d. Generate a Secret key:
i. Click ... next to the field label and select Generate secret key.
ii. Copy the secret key for use with an application or mobile device to generate
passcodes.
e. For time-based verification only, select Disallow code reuse to prevent a code from being
used more than once during the time that it is valid.
f. For time-based verification only, in Code refresh interval, type the amount of time that a
code will remain valid.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}. For example, to set Code refresh interval to ten minutes,
enter 10m or 600s.
g. In Valid code window size, type the allowed number of concurrently valid codes. In cases
where TOTP is being used, increasing the Valid code window size may be necessary when
the clocks used by the server and client are not synchronized.
h. For Login limit, type the number of times that the user is allowed to attempt to log in
during the Login limit period. Set Login limit to 0 to allow an unlimited number of login
attempts during the Login limit period.
i. For Login limit period, type the amount of time that the user is allowed to attempt to log
in.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}. For example, to set Login limit period to ten minutes, enter
10m or 600s.
j. Scratch codes are emergency codes that may be used once, at any time. To add a scratch
code:
i. Click Scratch codes.
ii. For Add Code, click .
iii. For Code, enter the scratch code. The code must be eight digits, with a minimum of
10000000.
iv. Click again to add additional scratch codes.
11. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
5. Set the user's password. The password must be at least eight characters long and must contain
at least one uppercase letter, one lowercase letter, one number, and one special character.
a. Set the number of unsuccessful login attempts before the user is locked out of the device.
where value is any integer. The minimum value is 1, and the default value is 5.
b. Set the amount of time that the user is locked out after the number of unsuccessful login
attempts defined in lockout tries:
where value is any number of minutes, or seconds, and takes the format number{m|s}.
For example, to set duration to ten minutes, enter either 10m or 600s:
The minimum value is 1 second, and the maximum is 15 minutes. The default is 15
minutes.
7. Add groups for the user.
Groups define user access rights. See Authentication groups for information about configuring
groups.
a. Add a group to the user. For example, to add the admin group to the user:
8. (Optional) Add SSH keys for the user to use passwordless SSH login:
a. Change to the user's ssh_key node:
b. Add the key by using the ssh_key command and pasting or typing a public encryption key
that this user can use for passwordless SSH login:
9. (Optional) Configure two-factor authentication for SSH, telnet, and serial console login:
a. Change to the user's two-factor authentication node:
f. For time-based verification only, configure the code refresh interval. This is the amount of
time that a code will remain valid.
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set refresh_interval to ten minutes, enter either 10m or 600s:
h. Configure the login limit. This represents the number of times that the user is allowed to
attempt to log in during the Login limit period. Set to 0 to allow an unlimited number of
login attempts during the Login limit period
i. Configure the login limit period. This is the amount of time that the user is allowed to
attempt to log in.
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set login_limit_period to ten minutes, enter either 10m or 600s:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
4. Click the menu icon (...) next to the name of the user to be deleted and select Delete.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
(config)> save
Configuration saved.
>
Note TACACS+ configuration, including filenames and locations, may vary depending on your
platform and installation. This example assumes a Ubuntu installation.
To define users:
1. Open the TACACS+ server configuration file in a text editor. For example:
2. Add users to the file using the following format. This example will create two users, one with
admin and serial access, and one with only serial access.
user = user1 {
name ="User1 for Connect EZ 16/32"
pap = cleartext password1
service = system {
groupname = admin,serial
}
}
user = user2 {
name ="User2 for Connect EZ 16/32"
pap = cleartext password2
service = system {
groupname = serial
}
}
The groupname attribute is optional. If used, the value must correspond to authentication
groups configured on your Connect EZ 16/32. Alternatively, if the user is also configured as a
local user on the Connect EZ 16/32 device and the LDAP server authenticates the user but does
not return any groups, the local configuration determines the list of groups. See Authentication
groups for more information about authentication groups. The groupname attribute can
contain one group or multiple groups in a comma-separated list.
3. Save and close the file.
4. Verify that your changes did not introduce any syntax errors:
If successful, this command will echo the configuration file to standard out. If the command
encounters any syntax errors, a message similar to this will display:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
key = testing123
Note DAL authentication does not support the use of the # character in the key (e.g.,
DAL#123;&). If included, the server will be unable to decipher the request.
c. Select TACACS+ for the new method from the Method drop-down.
Authentication methods are attempted in the order they are listed until an authentication
response, either pass or fail, is received. If Authoritative is enabled (see above), non-
authoritative methods are not attempted. See Rearrange the position of authentication
methods for information about rearranging the position of the methods in the list.
11. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. (Optional) Prevent other authentication methods from being used if TACACS+ authentication
fails. Other authentication methods will only be used if the TACACS+ server is unavailable.
4. (Optional) Configure the group_attribute. This is the name of the attribute used in the TACACS+
server's configuration to identify the Connect EZ 16/32 authentication group or groups that the
user is a member of. For example, in TACACS+ user configuration, the group attribute in the
sample tac_plus.conf file is groupname, which is also the default setting for the group_
attribute in the Connect EZ 16/32 configuration.
5. (Optional) Configure the type of service. This is the value of the service attribute in the the
TACACS+ server's configuration. For example, in TACACS+ user configuration, the value of the
service attribute in the sample tac_plus.conf file is system, which is also the default setting in
the Connect EZ 16/32 configuration.
6. (Optional) Enable command authorization, which instructs the device to communicate with the
TACACS+ server to determine if the user is authorized to execute a specific command. Only the
first configured TACACS+ server will be used for command authorization.
7. (Optional) Enable command accounting, which instructs the device to communicate with the
TACACS+ server to log commands that the user executes. Only the first configured TACACS+
server will be used for command accounting.
(config)> save
Configuration saved.
>
...
Configuration appears to be OK
backup RADIUS servers are unavailable. Additionally, users who are configured locally but are not
configured on the RADIUS server are still able to log into the device. Authentication methods are
attempted in the order they are listed until the first successful authentication result is returned;
therefore if you want to ensure that users are authenticated first through the RADIUS server, and only
authenticated locally if the RADIUS server is unavailable or if the user is not defined on the RADIUS
server, then you should list the RADIUS authentication method prior to the Local users authentication
method.
See User authentication methods for more information about authentication methods.
If the RADIUS servers are unavailable and the Connect EZ 16/32 device falls back to local
authentication, only users defined locally on the device are able to log in. RADIUS users cannot log in
until the RADIUS servers are brought back online.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
secret=testing123
e. For Timeout, type or select the amount of time in seconds to wait for the RADIUS server to
respond. Allowed value is any integer from 3 to 60. The default value is 3.
f. (Optional) Click again to add additional RADIUS servers.
5. (Optional) Enable Authoritative to prevent other authentication methods from being
attempted if RADIUS login fails.
6. (Optional) Click RADIUS debug to enable additional debug messages from the RADIUS client.
7. (Optional) For NAS ID, type the unique identifier for this network access server (NAS). You can
use the fully-qualified domain name of the NAS or any arbitrary string. If not set, the default
value is used:
n If you are accessing the Connect EZ 16/32 device by using the WebUI, the default value
is for NAS ID is httpd.
n If you are accessing the Connect EZ 16/32 device by using ssh, the default value is sshd.
c. Select RADIUS for the new method from the Method drop-down.
Authentication methods are attempted in the order they are listed until an authentication
response, either pass or fail, is received. If Authoritative is enabled (see above), non-
authoritative methods are not attempted. See Rearrange the position of authentication
methods for information about rearranging the position of the methods in the list.
9. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. (Optional) Prevent other authentication methods from being used if RADIUS authentication
fails. Other authentication methods will only be used if the RADIUS server is unavailable.
5. (Optional) Configure the NAS ID. This is a unique identifier for this network access server (NAS).
You can use the fully-qualified domain name of the NAS or any arbitrary string. If not set, the
default value is used:
n If you are accessing the Connect EZ 16/32 device by using the WebUI, the default value
is for NAS ID is httpd.
n If you are accessing the Connect EZ 16/32 device by using ssh, the default value is sshd.
d. Configure the amount of time in seconds to wait for the RADIUS server to respond. Allowed
value is any integer from 3 to 60. The default value is 3.
(config)> save
Configuration saved.
>
LDAP
Your Connect EZ 16/32 device supports LDAP (Lightweight Directory Access Protocol), a protocol used
for directory information services over an IP network. LDAP can be used with your Connect EZ 16/32
device for centralized authentication and authorization management for users who connect to the
device. With LDAP support, the Connect EZ 16/32 device acts as an LDAP client, which sends user
credentials and connection parameters to an LDAP server. The LDAP server then authenticates the
LDAP client requests and sends back a response message to the device.
When you are using LDAP authentication, you can have both local users and LDAP users able to log in
to the device. To use LDAP authentication, you must set up a LDAP server that is accessible by the
Connect EZ 16/32 device prior to configuration. The process of setting up a LDAP server varies by the
server environment.
This section contains the following topics:
$ gedit ./add_user.ldif
dn: uid=john,dc=example,dc=com
objectClass: inetOrgPerson
cn: John Smith
sn: Smith
uid: john
userPassword: password
ou: admin serial
n The value of uid and userPassword must correspond to the username and password
used to log into the Connect EZ 16/32 device.
n The ou attribute is optional. If used, the value must correspond to authentication
groups configured on your Connect EZ 16/32. Alternatively, if the user is also configured
as a local user on the Connect EZ 16/32 device and the LDAP server authenticates the
user but does not return any groups, the local configuration determines the list of
groups. See Authentication groups for more information about authentication groups.
Other attributes may be required by the user’s objectClass. Any objectClass may be used as
long it allows the uid, userPassword, and ou attributes.
3. Save and close the file.
4. Add the user to the OpenLDAP server:
5. Verify that the user has been added by performing an LDAP search:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
n Start TLS: Makes a non-secure TCP connection to the LDAP server on port 389, then
sends a request to upgrade the connection to a secure TLS connection. This is the
preferred method for LDAP.
7. If Enable TLS or Start TLS are selected for TLS connection:
n Leave Verify server certificate at the default setting of enabled to verify the server
certificate with a known Certificate Authority.
n Disable Verify server certificate if the server is using a self-signed certificate.
8. (Optional) For Server login, type a distinguished name (DN) that is used to bind to the LDAP
server and search for users, for example cn=user,dc=example,dc=com. Leave this field blank
if the server allows anonymous connections.
9. (Optional) For Server password, type the password used to log into the LDAP server. Leave
this field blank if the server allows anonymous connections.
10. For User search base, type the distinguished name (DN) on the server to search for users. This
can be the root of the directory tree (for example, dc=example,dc=com) or a sub-tree (for
example. ou=People,dc=example,dc=com).
11. For Login attribute, enter the user attribute containing the login of the authenticated user.
For example, in the LDAP user configuration, the login attribute is uid. If this attribute is not
set, the user will be denied access.
12. (Optional) For Group attribute, type the name of the user attribute that contains the list of
Connect EZ 16/32 authentication groups that the authenticated user has access to. See LDAP
user configuration for further information about the group attribute.
13. For Timeout, type or select the amount of time in seconds to wait for the LDAP server to
respond. Allowed value is between 3 and 60 seconds.
14. Add LDAP to the authentication methods:
a. Click Authentication > Methods.
b. For Add method, click .
c. Select LDAP for the new method from the Method drop-down.
Authentication methods are attempted in the order they are listed until an authentication
response, either pass or fail, is received. If Authoritative is enabled (see above), non-
authoritative methods are not attempted. See Rearrange the position of authentication
methods for information about rearranging the position of the methods in the list.
15. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. (Optional) Prevent other authentication methods from being used if LDAP authentication fails.
Other authentication methods will only be used if the LDAP server is unavailable.
For example:
7. Set the password used to log into the LDAP server. Leave this option unset if the server allows
anonymous connections.
8. Set the distinguished name (DN) on the server to search for users. This can be the root of the
directory tree (for example, dc=example,dc=com) or a sub-tree (for example.
ou=People,dc=example,dc=com).
where value is the user attribute containing the login of the authenticated user. For example,
in the LDAP user configuration, the login attribute is uid. . If this attribute is not set, the user
will be denied access.
10. (Optional) Set the name of the user attribute that contains the list of Connect EZ 16/32
authentication groups that the authenticated user has access to. See LDAP user configuration
for further information about the group attribute.
For example:
11. Configure the amount of time in seconds to wait for the LDAP server to respond.
(config)> save
Configuration saved.
>
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
4. (Optional) For TLS identity certificate, paste a TLS certificate and private key in PEM format.
If empty, the certificate for the web administration service is used. See Configure the web
administration service for more information.
5. For Peer authentication, select the method used to verify the certificate of a remote peer.
6. Include standard CAs is enabled by default. This allows peers with certificates that have been
signed by standard Certificate Authorities (CAs) to authenticate.
7. Click to expand Custom certificate authorities to add the public certificates of custom CAs.
a. For Add CA certificate, type the name of a custom CA and click .
b. Paste the public certificate for the custom CA in PEM format.
c. Repeat for additional custom CA certificates.
8. Click to expand Peer certificates to add the public certificates of trusted peers.
a. For Add Peer certificate, type the name of a trusted peer and click .
b. Paste the public certificate for the trusted peer in PEM format.
c. Repeat for additional trusted peer certificates.
9. Enable TelNet Login, which requires a user to login via the TelNet connection before accessing
a port.
10. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
where:
n CA-cert-name is the name of the certificate for the custom certificate authority.
n cert-and-private-key is the certificate and private key for the custom certificate
authority.
Repeat for additional custom certificate authorities.
7. Require a user to login via the TelNet connection before accessing a port.
(config)> save
Configuration saved.
>
Note If shell access is disabled, re-enabling it will erase the device's configuration and perform a
factory reset.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Note If shell access is disabled, re-enabling it will erase the device's configuration and perform
a factory reset.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
Note If shell access is disabled, re-enabling it will erase the device's configuration and perform
a factory reset.
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
where value is any number of weeks, days, hours, minutes, or seconds, and takes the format
number{w|d|h|m|s}.
For example, to set idle_timeout to ten minutes, enter either 10m or 600s:
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
5. Create the user. In this example, the user is being created with the username adminuser:
1. The user is authenticated by the RADIUS server. If the RADIUS server is unavailable,
2. The user is authenticated by the TACACS+ server. If both the RADIUS and TACACS+ servers are
unavailable,
3. The user is authenticated by the Connect EZ 16/32 device using local authentication.
This example uses a FreeRadius 3.0 server running on ubuntu, and a TACACS+ server running on
ubuntu. Server configuration may vary depending on the platforms or type of servers used in your
environment.
Web
1. Configure a user on the RADIUS server:
a. On the ubuntu machine hosting the FreeRadius server, open the /etc/freeradius/3.0/users
file:
In this example:
n The user's username is admin1.
n The user's password is password1.
n The authentication group on the Connect EZ 16/32 device, admin, is identified in
the Unix-FTP-Group-Names parameter.
c. Save and close the users file.
2. Configure a user on the TACACS+ server:
a. On the ubuntu machine hosting the TACACS+ server, open the /etc/tacacs+/tac_plus.conf
file:
user = admin1 {
name ="Admin1 for TX64"
pap = cleartext password1
service = system {
groupname = admin
}
}
}
In this example:
n The user's username is admin1.
n The user's password is password1.
n The authentication group on the Connect EZ 16/32 device, admin, is identified in
the groupname parameter.
c. Save and close the tac_plus.conf file.
3. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
4. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Configure a user on the RADIUS server:
a. On the ubuntu machine hosting the FreeRadius server, open the /etc/freeradius/3.0/users
file:
In this example:
n The user's username is admin1.
n The user's password is password1.
n The authentication group on the Connect EZ 16/32 device, admin, is identified in
the Unix-FTP-Group-Names parameter.
c. Save and close the users file.
2. Configure a user on the TACACS+ server:
a. On the ubuntu machine hosting the TACACS+ server, open the /etc/tacacs+/tac_plus.conf
file:
user = admin1 {
name ="Admin1 for TX64"
pap = cleartext password1
service = system {
groupname = admin
}
}
}
In this example:
n The user's username is admin1.
n The user's password is password1.
n The authentication group on the Connect EZ 16/32 device, admin, is identified in
the groupname parameter.
c. Save and close the tac_plus.conf file.
3. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
4. At the command line, type config to enter configuration mode:
> config
(config)>
This output indicates that on this example system, only local authentication is configured.
b. Add RADIUS authentication to the beginning of the list:
2 local
(config)>
Firewall configuration
Firewall configuration includes the following configuration options:
n Zones: A zone is a firewall access group to which network interfaces can be added. You then
use zones to configure packet filtering and access control lists for interfaces that are included
in the zone. Preconfigured zones include:
l Any: Matches any network interface, even if they are not assigned to this zone.
l Loopback: Zone for interfaces that are used for communication between processes
running on the device.
l Internal: Used for interfaces connected to trusted networks. By default, the firewall will
allow most access from this zone.
l External: Used for interfaces to connect to untrusted zones, such as the internet. This zone
has Network Address Translation (NAT) enabled by default. By default, the firewall will
block most access from this zone.
l Edge: Used for interfaces connected to trusted networks, where the device is a client on
the edge of the network rather than a router or gateway.
l Setup: Used for interfaces involved in the initial setup of the device. By default, the firewall
will only allow this zone to access administration services.
l IPsec: The default zone for IPsec tunnels.
l Dynamic routes: Used for routes learned using routing services.
n Port forwarding: A list of rules that allow network connections to the Connect EZ 16/32 to be
forwarded to other servers by translating the destination address.
n Packet filtering: A list of packet filtering rules that determine whether to accept or reject
network connections that are forwarded through the Connect EZ 16/32.
n Custom rules: A script that is run to install advanced firewall rules beyond the
scope/capabilities of the standard device configuration.
n Quality Of Service: Quality of Service (QOS) options for bandwidth allocation and policy-
based traffic shaping and prioritizing.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
5. (Optional) If traffic on this zone will be forwarded from a private network to the internet,
enable Network Address Translation (NAT).
6. Click Apply to save the configuration and apply the change.
See Configure the firewall zone for a network interface for information about how to configure
network interfaces to use a zone.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Add the new zone. For example, to add a zone named my_zone:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Use the del command to delete a custom firewall rule. For example:
(config)> save
Configuration saved.
>
n A white list of devices, based on either IP address or firewall zone, that are authorized to
leverage this forwarding rule.
To configure a port forwarding rule:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Port forwarding rules are enabled by default. To disable, toggle off Enable.
5. (Optional) Type a Label that will be used to identify the rule.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
Network connections will only be forwarded if their destination address matches the IP
address of this network interface.
5. Set the IP version. Allowed values are ipv4 and ipv6. The default is ipv4.
6. Set the public-facing port number that network connections must use for their traffic to be
forwarded.
Network connections will only be forwarded if they match the selected protocol. Allowed
values are custom, tcp, tcpudp, or upd. The default is tcp.
8. Set the IP address of the server to which traffic should be forwarded:
n For IPv4 addresses:
9. Set the public-facing port number(s) that network connections must use for their traffic to be
forwarded.
where value is the port number, comma-separated list of port numbers, or range of port
numbers on the server to which traffic should be forwarded. For example, to forward traffic to
ports one, three, and five through ten, enter 1, 3, 5-10.
10. (Optional) To create a white list of devices that are authorized to leverage this forwarding rule,
based on either the IP address or firewall zone, change to the acl node:
Additional Configuration
-------------------------------------------------------------------
-----------
any
dynamic_routes
edge
external
internal
ipsec
loopback
setup
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Determine the index number of the port forwarding rule you want to delete:
1
acl
no address6
no zone
enable false
interface
ip_version ipv6
label IPv6 port forwarding rule
port 10002
protocol tcp
to_address6 c097:4533:bd63:bb12:9a6f:5569:4b53:c29a
to_port 10003
(config)>
4. To delete the rule, use the index number with the del command. For example:
(config)> save
Configuration saved.
>
Packet filtering
By default, one preconfigured packet filtering rule, Allow all outgoing traffic, is enabled and
monitors traffic going to and from the Connect EZ 16/32 device. The predefined settings are intended
to block unauthorized inbound traffic while providing an unrestricted flow of outgoing data. You can
modify the default packet filtering rule and create additional rules to define how the device accepts or
rejects traffic that is forwarded through the device.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
n To edit the default packet filtering rule or another existing packet filtering rule, click to
expand the rule.
The packet filtering rule configuration window is displayed.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
To edit the default packet filtering rule or another existing packet filtering rule:
a. Determine the index number of the appropriate packet filtering rule:
6. Set the destination firewall zone. Packets destined for network interfaces that are members of
this zone will either be accepted, rejected or dropped by this rule.
See Firewall configuration for more information about firewall zones.
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
4. To enable a packet filtering rule, use the index number with the enable true command. For
example:
5. To disable a packet filtering rule, use the index number with the enable false command. For
example:
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Determine the index number of the packet filtering rule you want to delete:
dst_zone any
enable true
ip_version any
label Allow all outgoing traffic
protocol any
src_zone internal
1
action drop
dst_zone internal
enable true
ip_version any
label My packet filter
protocol any
src_zone external
(config)>
4. To delete the rule, use the index number with the del command. For example:
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
4. (Optional) Instruct the device to override all preconfigured firewall behavior and rely solely on
the custom firewall rules:
5. Set the shell command that will execute the custom firewall rules script:
(config)> save
Configuration saved.
>
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
4. Set the interface for the binding. Use the index number of the binding; for example, to set the
interface for the Outbound binding:
a. Use the ? to determine available interfaces:
b. Set the interface. For example:
5. Examine the remaining default settings and modify as appropriate for your network.
6. Save the configuration and apply the change.
(config)> save
Configuration saved.
>
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
New QoS binding policies are enabled by default. To disable, toggle off Enable.
c. (Optional) Type a Label for the binding policy.
d. For Weight, type a value for the amount of available bandwidth allocated to the policy,
relative to other policies for this binding.
The larger the weight, with respect to the other policy weights, the larger portion of the
maximum bandwidth is available for this policy. For example, if a binding contains three
policies, and each policy contains a weight of 10, each policy will be allocated one third of
the total interface bandwidth.
e. For Latency, type the maximum delay before the transmission of packets. A lower latency
means that the packets will be scheduled more quickly for transmission.
f. Select Default to identify this policy as a fall-back policy. The fall-back policy will be used
for traffic that is not matched by any other policy. If there is no default policy associated
with this binding, packets that do not match any policy rules will be dropped.
g. If Default is disabled, you must configure at least one rule:
i. Click to expand Rule.
ii. For Add Rule, click .
New QoS binding policy rules are enabled by default. To disable, toggle off Enable.
iii. (Optional) Type a Label for the binding policy rule.
iv. For Type Of Service, type the value of the Type of Service (ToS) packet header that
defines packet priority. If unspecified, this field is ignored.
See https://www.tucny.com/Home/dscp-tos for a list of common TOS values.
v. For Protocol, select the IP protocol matching criteria for this rule.
vi. For Source port, type the port, or any, as a source traffic matching criteria.
vii. For Destination port, type the port, or any, as a destination traffic matching criteria.
viii. Click to expand Source address and select the Type:
n Any: Source traffic from any address will be matched.
n Interface: Only traffic from the selected Interface will be matched.
n IPv4 address: Only traffic from the IP address typed in IPv4 address will be
matched. Use the format IPv4_address[/netmask], or use any to match any
IPv4 address.
n IPv6 address: Only traffic from the IP address typed in IPv6 address will be
matched. Use the format IPv6_address[/prefix_length], or use any to match
any IPv6 address.
n MAC address: Only traffic from the MAC address typed in MAC address will be
matched.
ix. Click to expand Destination address and select the Type:
n Any: Traffic destined for anywhere will be matched.
n Interface: Only traffic destined for the selected Interface will be matched.
n IPv4 address: Only traffic destined for the IP address typed in IPv4 address
will be matched. Use the format IPv4_address[/netmask], or use any to match
any IPv4 address.
n IPv6 address: Only traffic destined for the IP address typed in IPv6 address
will be matched. Use the format IPv6_address[/prefix_length], or use any to
match any IPv6 address.
Repeat to add a new rule. Up to 30 rules can be configured.
10. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Add a binding:
5. Set the interface to queue egress packets on. The binding will only match traffic that is being
sent out on this interface:
a. Use the ? to determine available interfaces:
b. Set the interface. For example:
6. (Optional) Set the maximum egress bandwidth of the interface, in megabits, allocated to this
binding.
where int is an integer between 1 and 1000. Typically, this should be 95% of the available
bandwidth. The default is 95.
7. Create a policy for the binding:
At least one policy is required for each binding. Each policy can contain up to 30 rules.
a. Change to the policy node of the configuration:
b. Add a policy:
d. Set a value for the amount of available bandwidth allocated to the policy, relative to other
policies for this binding.
The larger the weight, with respect to the other policy weights, the larger portion of the
maximum bandwidth is available for this policy. For example, if a binding contains three
policies, and each policy contains a weight of 10, each policy will be allocated one third of
the total interface bandwidth.
where int is any integer between 1 and 65535. The default is 10.
e. Set the maximum delay before the transmission of packets. A lower number means that
the packets will be scheduled more quickly for transmission.
The fall-back policy will be used for traffic that is not matched by any other policy. If there
is no default policy associated with this binding, packets that do not match any policy
rules will be dropped. If the policy is not a fall-back policy, you must configure at least one
rule:
i. Change to the rule node of the configuration:
iii. (Optional) Set a label for the new binding policy rule:
iv. Set the value of the Type of Service (ToS) packet header that defines packet priority. If
unspecified, this field is ignored.
where value is the IP port number, a range of port numbers using the format IP_port-
IP_port, or any.
vii. Set the destination port to define a destination matching criteria:
where value is the IP port number, a range of port numbers using the format IP_port-
IP_port, or any.
viii. Set the source address type:
n address: Only traffic from the IP address typed in IPv4 address will be
matched. Set the address that will be matched:
n address: Only traffic destined for the IP address typed in IPv4 address will be
matched. Set the address that will be matched:
(config)> save
Configuration saved.
>
Web filtering
Web filtering allows you to control access to services that can be accessed through the Connect EZ
16/32 device by forwarding all Domain Name System (DNS) traffic to a web filtering service. This
allows the network security administrator to configure a set of policies with the web filtering service
that are applied to all routing devices with web filtering enabled. For example, a policy may allow or
deny access to a specific service or type of service such as social media, gaming, and so on.
Your Connect EZ 16/32 device supports two methods for configuring web filtering:
n Cisco Umbrella (formally known as OpenDNS).
n Manual DNS server entry.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
5. Set umbrella_token to the API token generated in Task one: Generate a Cisco Umbrella API
token:
(config)> save
Configuration saved.
>
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the Admin CLI prompt, use the rm command to delete the web-filter-id file, and confirm
the deletion:
> rm /etc/config/web-filter-id
rm: remove '/etc/config/web-filter-id'? yes
>
Note These two IP addresses do not work with the OpenDNS option. See
https://www.opendns.com/setupguide/ for more information about using Cisco DNS servers
for web filtering.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
(config)> save
Configuration saved.
>
Web
This procedure assumes you have already configured web filtering to use either Cisco Umbrella or the
Cisco open DNS servers.
n See Configure web filtering with Cisco Umbrella for information about configuring web filtering
with Cisco Umbrella.
n See Configure web filtering with manual DNS servers for information about configuring web
filtering to use Cisco open DNS servers.
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
This procedure assumes you have already configured web filtering to use either Cisco Umbrella or the
Cisco open DNS servers.
n See Configure web filtering with Cisco Umbrella for information about configuring web filtering
with Cisco Umbrella.
n See Configure web filtering with manual DNS servers for information about configuring web
filtering to use Cisco open DNS servers.
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Disable web filtering:
$ curl -I http://www.internetbadguys.com
HTTP/1.1 200 OK
Server: Apache
Content-Type: text/html; charset=UTF-8
Accept-Ranges: bytes
Date: Thu, Jan 11, 2024 12:10:00
X-Varnish: 4201397492
Age: 0
Via: 1.1 varnish
Connection: keep-alive
$ curl -I www.internetbadguys.com
HTTP/1.1 403 Forbidden
Server: openresty/1.9.7.3
Date: Thu, Jan 11, 2024 12:10:00
Content-Type: text/html
Connection: keep-alive
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the Admin CLI prompt, use the show web-filtercommand to view information about the
web-filter service:
Enabled : true
Service : umbrella
Device ID : 0004b5s63f5e2de7aa
>
If the device is configured to use Cisco Umbrella for web filtering, a device ID is displayed. The
device ID is a unique ID assigned to the device by Cisco Umbrella. If there is a problem with the
device ID, you can clear the ID. See Clear the Cisco Umbrella device ID for instructions.
Note Container support must be enabled in Digi Remote Manager. Contact your Digi sales
representative for information.
1. In Remote Manager, create a Configuration template. See the Remote Manager User Guide for
instructions.
a. For the Settings step:
n Click Import from device and import settings from an appropriate device.
n Configure a script to run the container:
i. Click System.
ii. Click Scheduled tasks > Custom scripts.
iii. Click to add a custom script.
iv. Click the Label checkbox and type an identifiable label for the script, for
example, StartContainerScript.
v. To ensure that the script is always running:
i. Click the Run mode checkbox and select Interval.
ii. Click the Interval checkbox and enter a very short interval (for example,
one minute).
iii. Click the Run single checkbox, and toggle on to enable.
This will configure the device to regularly check if the script is running, but
only run if it is currently not running.
vi. For Commands, type the command to run the script. The command will vary
depending on how you want to run the script, and what application you want
to run inside the script. For example, to run the ping command inside a
container, the command would be:
i. Type or select the number of times, and select the time period.
ii. (Optional) Click Until to select a date and time when the automation
schedule will stop repeating.
b. To configure the automation to be triggered by device activity, click to enable one
or more of the following:
l Run when a device enters the target scope
l Run when a device in the target scope enters a maintenance window:
l Run when a device in the target scope leaves debug mode
Target scope refers to a device that either:
l Is member of a group that was selected on the Target page.
l Has a tag that was selected on the Target page.
l Is one of the devices included on the Target page.
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. From the main menu, click Status. Under Services, click Containers.
2. Click Upload New Container.
3. From your local file system, select the container file in *.tgz format.
You can download a simple example container file, test_lxc.tgz, from the Digi website.
4. Create Configuration is selected by default. This will create a configuration on the device for
the container when it is installed. If deselected, you will need to create the configuration
manually.
5. Click Apply.
6. If Create Configuration was deselected when the container was created, click to go to the
container configuration.
See Configure a container for further information about configuring the container.
Configure a container
Required configuration items
n The following configuration options are completed automatically if Create Configuration was
selected when the container was created. See Upload a new LXCcontainer for details:
l Name of the container.
l Enable the container.
l Whether or not the container should use the device's system libraries.
n Determine whether or not the device should including virtual networking capabilities.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
9. (Optional) Type a Working directory to configure an initial working directory for the
container. The directory is an absolute path within the container and must begin with "/". The
default is /.
10. (Optional) Click to expand Mounted directories to configure system directories that will be
mounted inside the container. Any mounted directories need to be accessible to a non-
privileged user.
a. For Add Directory, click .
b. For Directory, type the pathname of the directory to be mounted. The leading slash
should be removed, so for example to mount the /opt directory, type opt.
11. (Optional) Click to expand Serial ports to assign serial ports that the container will have
access to.
a. For Add Port, click .
b. For Port, select the serial port.
12. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
5. By default, the container will use the device's system libraries. To disable:
b. Set the network bridge device that will be used to provide network access:
i. Use the ? to determine the available bridges:
a. Set the amount of time to wait before restarting the container, if the container ever stops:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set restart_timeout to ten minutes, enter either 10m or 600s:
The default timeout of 0s means that if the container stops, it will not be restarted.
8. Type any optional parameters for the container:
The directory is an absolute path within the container and must begin with "/". The default is /.
10. (Optional) Set any system directories that should be mounted inside the container. Any
mounted directories need to be accessible to a non-privileged user.
a. Add a system directory to be mounted:
where directory is the pathname of the directory to be mounted. The leading slash should
be removed, so for example to mount the /opt directory, type opt.
b. Repeat for additional directories.
11. For Add Directory, click .
a. For Directory, type the pathname of the directory to be mounted. The leading slash
should be removed, so for example to mount the /opt directory, type opt.
12. (Optional) Assign serial ports that the container will have access to:
a. Determine available serial ports:
Serial
Additional Configuration
---------------------------------------------------------------------
----------
port1 Port 1
...
Note Container support must be enabled in Digi Remote Manager. Contact your Digi sales
representative for information.
1. Select a device in Remote Manager that is configured to allow shell access to the admin user,
and click Actions > Open Console. Alternatively, log into the Connect EZ 16/32 local command
line as a user with shell access.
Depending on your device configuration, you may be presented with an Access selection
menu. Type shell to access the device shell.
2. At the shell prompt, type:
# lxc container_name
lxc #
where container_name is the name of the container as configured on the device. For example:
# lxc test_lxc
lxc #
This will start the container by using /bin/sh -l, which runs the shell and loads the shell profile. The
default shell profile includes an lxc # prompt.
1. Select a device in Remote Manager that is configured to allow shell access to the admin user,
and click Actions > Open Console. Alternatively, log into the Connect EZ 16/32 local command
line as a user with shell access.
Depending on your device configuration, you may be presented with an Access selection
menu. Type shell to access the device shell.
# lxc test_lxc -p
lxc #
This will start the container by using /bin/sh -l, which runs the shell and loads the shell profile. The
default shell profile includes an lxc # prompt.
This will run the script from /usr/bin inside the container. If you have /usr/bin/my_python_script.py
on your device's native system, it will be ignored.
lxc # exit
#
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. From the main menu, click Status. Under Services, click Containers.
The Containers status page is displayed.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the prompt, type:
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the prompt, type:
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
For example:
9. Click to disable Sandbox. Sandbox restrictions are not necessary when a container is used.
10. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Add a script:
For example:
8. Disable the sandbox. Sandbox restrictions are not necessary when a container is used.
(config)> save
Configuration saved.
>
rootfs/tmp/
$
$ cd rootfs/etc
$
print("Hello world.\n")
$ cd ../..
5. Change user and group permissions on all files in the container file structure:
6. Tar and zip the directory structure to create a new container file:
# lxc python_lxc
lxc #
Note Container support must be enabled in Digi Remote Manager. Contact your Digi sales
representative for information.
1. In Remote Manager, create a Configuration template. See the Remote Manager User Guide for
instructions.
a. For the Settings step:
n Click Import from device and import settings from an appropriate device.
n Configure a script to run the container:
i. Click System.
ii. Click Scheduled tasks > Custom scripts.
iii. Click to add a custom script.
iv. Click the Label checkbox and type an identifiable label for the script, for
example, StartContainerScript.
v. To ensure that the script is always running:
i. Click the Run mode checkbox and select Interval.
ii. Click the Interval checkbox and enter a very short interval (for example,
one minute).
iii. Click the Run single checkbox, and toggle on to enable.
This will configure the device to regularly check if the script is running, but
only run if it is currently not running.
vi. For Commands, type the command to run the script. The command will vary
depending on how you want to run the script, and what application you want
to run inside the script. For example, to run the ping command inside a
container, the command would be:
i. Type or select the number of times, and select the time period.
ii. (Optional) Click Until to select a date and time when the automation
schedule will stop repeating.
b. To configure the automation to be triggered by device activity, click to enable one
or more of the following:
l Run when a device enters the target scope
l Run when a device in the target scope enters a maintenance window:
l Run when a device in the target scope leaves debug mode
Target scope refers to a device that either:
l Is member of a group that was selected on the Target page.
l Has a tag that was selected on the Target page.
l Is one of the devices included on the Target page.
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. From the main menu, click Status. Under Services, click Containers.
2. Click Upload New Container.
3. From your local file system, select the container file in *.tgz format.
You can download a simple example container file, test_lxc.tgz, from the Digi website.
4. Create Configuration is selected by default. This will create a configuration on the device for
the container when it is installed. If deselected, you will need to create the configuration
manually.
5. Click Apply.
6. If Create Configuration was deselected when the container was created, click to go to the
container configuration.
See Configure a container for further information about configuring the container.
Configure a container
Required configuration items
n The following configuration options are completed automatically if Create Configuration was
selected when the container was created. See Upload a new LXCcontainer for details:
l Name of the container.
l Enable the container.
l Whether or not the container should use the device's system libraries.
n Determine whether or not the device should including virtual networking capabilities.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
9. (Optional) Type a Working directory to configure an initial working directory for the
container. The directory is an absolute path within the container and must begin with "/". The
default is /.
10. (Optional) Click to expand Mounted directories to configure system directories that will be
mounted inside the container. Any mounted directories need to be accessible to a non-
privileged user.
a. For Add Directory, click .
b. For Directory, type the pathname of the directory to be mounted. The leading slash
should be removed, so for example to mount the /opt directory, type opt.
11. (Optional) Click to expand Serial ports to assign serial ports that the container will have
access to.
a. For Add Port, click .
b. For Port, select the serial port.
12. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
5. By default, the container will use the device's system libraries. To disable:
b. Set the network bridge device that will be used to provide network access:
i. Use the ? to determine the available bridges:
a. Set the amount of time to wait before restarting the container, if the container ever stops:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set restart_timeout to ten minutes, enter either 10m or 600s:
The default timeout of 0s means that if the container stops, it will not be restarted.
8. Type any optional parameters for the container:
The directory is an absolute path within the container and must begin with "/". The default is /.
10. (Optional) Set any system directories that should be mounted inside the container. Any
mounted directories need to be accessible to a non-privileged user.
a. Add a system directory to be mounted:
where directory is the pathname of the directory to be mounted. The leading slash should
be removed, so for example to mount the /opt directory, type opt.
b. Repeat for additional directories.
11. For Add Directory, click .
a. For Directory, type the pathname of the directory to be mounted. The leading slash
should be removed, so for example to mount the /opt directory, type opt.
12. (Optional) Assign serial ports that the container will have access to:
a. Determine available serial ports:
Serial
Additional Configuration
---------------------------------------------------------------------
----------
port1 Port 1
...
Note Container support must be enabled in Digi Remote Manager. Contact your Digi sales
representative for information.
1. Select a device in Remote Manager that is configured to allow shell access to the admin user,
and click Actions > Open Console. Alternatively, log into the Connect EZ 16/32 local command
line as a user with shell access.
Depending on your device configuration, you may be presented with an Access selection
menu. Type shell to access the device shell.
2. At the shell prompt, type:
# lxc container_name
lxc #
where container_name is the name of the container as configured on the device. For example:
# lxc test_lxc
lxc #
This will start the container by using /bin/sh -l, which runs the shell and loads the shell profile. The
default shell profile includes an lxc # prompt.
1. Select a device in Remote Manager that is configured to allow shell access to the admin user,
and click Actions > Open Console. Alternatively, log into the Connect EZ 16/32 local command
line as a user with shell access.
Depending on your device configuration, you may be presented with an Access selection
menu. Type shell to access the device shell.
# lxc test_lxc -p
lxc #
This will start the container by using /bin/sh -l, which runs the shell and loads the shell profile. The
default shell profile includes an lxc # prompt.
This will run the script from /usr/bin inside the container. If you have /usr/bin/my_python_script.py
on your device's native system, it will be ignored.
lxc # exit
#
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. From the main menu, click Status. Under Services, click Containers.
The Containers status page is displayed.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the prompt, type:
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the prompt, type:
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
For example:
9. Click to disable Sandbox. Sandbox restrictions are not necessary when a container is used.
10. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Add a script:
For example:
8. Disable the sandbox. Sandbox restrictions are not necessary when a container is used.
(config)> save
Configuration saved.
>
rootfs/tmp/
$
$ cd rootfs/etc
$
print("Hello world.\n")
$ cd ../..
5. Change user and group permissions on all files in the container file structure:
6. Tar and zip the directory structure to create a new container file:
# lxc python_lxc
lxc #
Web
To display system information:
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the main menu, click Status.
A secondary menu appears, along with a status panel.
2. On the secondary menu, click to display the details panel for the status you want to view.
Command line
To display system information, use the show system command.
n Show basic system information:
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access
selection menu. Type admin to access the Admin CLI.
2. Enter show system at the prompt:
Contact :
>
Timezone : UTC
Current Time : Thu, Jan 11, 2024 12:10:00 +0000
CPU : 1.4%
Uptime : 6 days, 6 hours, 21 minutes, 57 seconds
(541317s)
Load Average : 0.01, 0.03, 0.02
RAM Usage : 119.554MB/1878.984MB(6%)
Temperature : 40C
Location :
Contact :
Disk
----
Disk /etc/config Usage : 18.421MB/4546.371MB(0%)
Disk /var/log_mnt Usage : 0.104MB/14.868MB(1%)
Disk /opt Usage : 215.739MB/458.328MB(50%)
Disk /tmp Usage : 0.003MB/120.0MB(0%)
Disk /var Usage : 0.816MB/32.0MB(3%)
>
Configuration items
n A name for the device.
n The name of a contact for the device.
n The location of the device.
n A description of the device.
n A banner that will be displayed when users access terminal services on the device.
To enter system information:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Set a name for the device. This name will appear in log messages and at the command prompt.
6. Set the banner for the device. This is displayed when users access terminal services on the
device.
192.168.3.1(config)> save
Configuration saved.
192.168.3.1>
all newly installed devices are updated to that same version. For more information, see the Profiles
section of the Digi Remote Manager User Guide.
Downgrading
Downgrading to an earlier release of the firmware may result in the device configuration being erased.
Update firmware over the air (OTA) from the Digi firmware server
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the main menu, click System. Under Administration, click Firmware Update.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. >Use the system firmware ota check command to determine if new modem firmware is
available on the Digi firmware repository.
3. Use the modem firmware ota list command to list available firmware on the Digi firmware
repository.
> reboot
>
n To perform an OTA firmware update by using a specific version from the Digi firmware
repository, use the version parameter to identify the appropriate firmware version as
determined by using system firmware ota list command. For example:
> reboot
>
Command line
1. Download the Connect EZ 16/32 operating system firmware from the Digi Support FTP site to
your local machine.
2. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
3. Load the firmware image onto the device. We recommend using the /tmp directory.
> scp host hostname-or-ip user username remote remote-path local local-
path to local
where:
n hostname-or-ip is the hostname or IP address of the remote host.
n username is the name of the user on the remote host.
n remote-path is the path and filename of the file on the remote host that will be copied
to the Connect EZ 16/32 device.
n local-path is the location on the Connect EZ 16/32 device where the copied file will be
placed.
For example:
4. Verify that the firmware file has been successfully uploaded to the device:
> ls /tmp
-rw-r--r-- 1 root root 37511229 May 16 20:10 Connect EZ
16/32-24.9.bin
-rw-r--r-- 1 root root 2580 May 16 16:44 blank.json
...
>
5. Update the firmware by entering the system firmware update command, specifying the path
and file name to the firmware file:
6. Reboot the device to run the new firmware image using the reboot command.
> reboot
Rebooting system
>
7. Once the device has rebooted, log into the Connect EZ 16/32's command line as a user with
Admin access and verify the running firmware version by entering the show system command.
>
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the main menu, click System. Under Administration, click Firmware Update.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Duplicate the firmware:
Note Before attempting to update cellular module firmware, you should either ensure that there is a
SIM card in the module, or disable SIM failover. See Configure a Wireless Wide Area Network (WWAN)
for details about SIM failover.
Web
1. (Optional) Download the appropriate modem firmware from the Digi repository to your local
machine.
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
2. From the main menu, click Status > Modems.
3. Click the modem firmware version.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Use the modem firmware ota check command to determine if new modem firmware is
available on the Digi firmware repository.
>
3. Use the modem firmware ota list command to list available firmware on the Digi firmware
repository.
>
n To perform an OTA firmware update by using the most recent available modem
firmware from the Digi firmware repository, type:
>
n To perform an OTA firmware update by using a specific version from the Digi firmware
repository, use the version parameter to identify the appropriate firmware version as
determined by using modem firmware ota list command. For example::
>
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Use the modem firmware check command to determine if new modem firmware is available
on local device.
3. Use the modem firmware list command to list available firmware on the Connect EZ 16/32
device.
>
4. To perform an firmware update by using a local file, use the version parameter to identify the
appropriate firmware version as determined using the modem firmware check or modem
firmware list command. For example::
-----------------------------
Successfully updated firmware
>
External storage
You can mount and define partitions on an SD card from the External Storage page.
You can also enable the automount feature, which allows an SD card to automount onto the Connect
EZ 16/32 when the SD card is connected to the Connect EZ 16/32.
Note As an alternative, you can use the following CLI commands to configure an SD card:system
storage show, system storage mount, system storage format, and config system storage mount.
Note If an SD card is not connected to the device, the default mount path displays and a
message displays for the device path. No other fields display.
7. You can specify the partition on the SD card that you want to use.
a. From the Mount Device list box, select a partition.
b. Click Mount.
8. Enable the automount feature. When enabled, the SD card is automatically mounted as
configured when is is connected to the Connect EZ 16/32 or if it is rebooted.
a. Click Auto Mount.
b. Click Apply. Additional fields display.
9. Review the space available. The amount of space currently used and the corresponding
percentage displays in the Used Size field
(Optional) You can choose to generate a system log event when a specified percentage of the
share is used.
a. In the Monitor field, enter the threshold percentage. When this threshold is met, an
External Storage system log event is generated. For information about system log event
categories, see Configure options for the event and system logs.
b. If a system log event is generated, you can choose email a notification or save it to an
SNMP trap. See Configure an email notification for a system event and Configure an
SNMP trap for a system event.
c. Click Apply.
b. If a system log event is generated, you can choose email a notification or save it to an
SNMP trap. See Configure an email notification for a system event and Configure an
SNMP trap for a system event.
c. Click Apply.
1. Log into the Connect EZ 16/32 WebUI as a user with Admin access.
2. From the main menu, click System.
3. Click External Storage.
4. Expand the Logging Location section.
5. From the Store Logs to list box, select an option.
n RAM: The system and serial logs are stored in volatile memory. Log contents are not
retained across a reboot.
n SD Card: The system and serial logs are stored on the SD card. When this option is
selected, the Log Path field displays. The log path defaults to the mount path for the
SD card, but can be changed.
n NFS: The system and serial logs are stored on a network server. When this option is
selected, the Log Path field displays. The log path defaults to the mount path for the
network server, but can be changed.
6. Click Apply.
Note You may want to save your configuration settings to a file before rebooting. See Save
configuration to a file.
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. From the main menu, click System.
2. Click Reboot.
> reboot
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
4. For Reboot time, enter the time of the day that the device should reboot, using the format
HH:MM. The device will reboot at this time every day.
If Reboot time is set, but the device is unable to synchronize its time with an NTP server, the
device will reboot after it has been up for 24 hours. See System time synchronization for
information about configuring NTP servers. If Reboot window is set, the reboot will occur
during a random time within the reboot window.
5. For Reboot window, enter the maximum random delay that will be added to Reboot Time.
Allowed values are any number of hours, minutes, or seconds, and take the format number
{h|m|s}.
For example, to set parameter name to ten minutes, enter 10m or 600s.
The default is 10m, and the maximum allowed time is 24h.
6. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
where time is the time of the day that the device should reboot, using the format HH:MM. For
example, the set the device to reboot at two in the morning every day:
If reboot_time is set, but the device is unable to synchronize its time with an NTP server, the
device will reboot after it has been up for 24 hours. See System time synchronization for
information about configuring NTP servers. If reboot_window is set, the reboot will occur
during a random time within the reboot window.
4. Set the maximum random delay that will be added to reboot_time:
where value is any number of hours, minutes, or seconds, and takes the format number
{h|m|s}.
For example, to set reboot_window to ten minutes, enter either 10m or 600s:
(config)> save
Configuration saved.
>
Web
1. Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
2. On the main menu, click System. Under Configuration, click Configuration Maintenance.
4. Click CONFIRM.
5. After resetting the device:
a. Connect to the Connect EZ 16/32 by using the serial port or by using an Ethernet cable to
connect the Connect EZ 16/32 ETH2 port to your PC.
b. Log into the Connect EZ 16/32:
User name: Use the default user name: admin.
Password: Use the unique password printed on the bottom label of the device (or the
printed label included in the package).
c. (Optional) Reset the default password for the admin account. See Change the default
password for the admin user for further information.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Enter the following:
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
(config)> revert
(config)>
4. Set the password for the admin user prior to saving the changes:
(config)> save
Configuration saved.
>
Configure the Connect EZ 16/32 device to use custom factory default settings
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. Configure your Connect EZ 16/32 device to match the desired custom factory default
configuration.
For example, you may want to configure the device to use a custom APN or a particular
network configuration, so that when you reset the device to factory defaults, it will
automatically have your required network configuration.
2. On the main menu, click System. Under Configuration, click Configuration Maintenance.
Do not set a Passphrase for the configuration backup. The file will be downloaded using your
browser's standard download process.
4. After the configuration backup file has been downloaded, rename the file to:
custom-default-config.bin
5. Upload the file to the device:
a. From the main menu, select System > Filesystem.
b. Under Default device configuration, click .
Note After configuring a device to use custom factory default settings, wait five minutes after
restoring to defaults before:
n Powering off the device.
n Performing any additional configuration restoration activities.
If you do not wait five minutes after restoring to custom factory defaults before performing these
activities, the device will clear the custom factory defaults and reboot to standard factory defaults.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Enter the following:
> reboot
>
Note After configuring a device to use custom factory default settings, wait five minutes after
restoring to defaults before:
n Powering off the device.
n Performing any additional configuration restoration activities.
If you do not wait five minutes after restoring to custom factory defaults before performing these
activities, the device will clear the custom factory defaults and reboot to standard factory defaults.
2. On the menu, click System again. Ablue circle next to Find Me is blinking, indicating that the
Find Me feature is active.
3. To deactivate the Find Me feature, click System and click Find Me again.
A notification message appears, noting that the LED is no longer flashing on the device. Click
the x in the message to close it.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. To activate the Find Me feature, at the prompt, type the following at the command prompt:
3. To deactivate the Find Me feature, type the following at the command prompt:
4. To determine the status of the Find Me feature, type the following at the command prompt:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
2. Enable FIPS:
(config)> save
>
Configuration files
The Connect EZ 16/32 configuration file, /etc/config/accns.json, contains all configuration changes
that have been made to the device. It does not contain the complete device configuration; it only
contains changes to the default configuration. Both the default configuration and the changes
contained in the accns.json file are applied when the device reboots.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
> config
(config)>
(config)> save
Configuration saved.
>
Web
This procedure creates a binary archive file containing the device's configuration, certificates and
keys, and other information.
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the main menu, click System. Under Configuration, click Configuration Maintenance.
The file will be downloaded using your browser's standard download process.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Enter the following:
where
n path is the location on the Connect EZ 16/32's filesystem where the configuration
backup file should be saved.
n passphrase (optional) is a passphrase used to encrypt the configuration backup.
n type is the type of backup, either:
l archive: Creates a binary archive file containing the device's configuration,
certificates and keys, and other information.
l cli-config: Creates a text file containing only the configuration changes.
For example:
3. (Optional) Use scp to copy the file from your device to another host:
> scp host hostname-or-ip user username remote remote-path local local-
path to remote
where:
n hostname-or-ip is the hostname or IP address of the remote host.
n username is the name of the user on the remote host.
n remote-path is the location on the remote host where the file will be copied.
n local-path is the path and filename on the Connect EZ 16/32 device.
For example:
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the main menu, click System. Under Configuration, click Configuration Maintenance.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. If the configuration backup is on a remote host, use scp to copy the file from the host to your
device:
> scp host hostname-or-ip user username remote remote-path local local-
path to local
where:
n hostname-or-ip is the hostname or IP address of the remote host.
n username is the name of the user on the remote host.
n remote-path is the path and filename of the file on the remote host that will be copied
to the Connect EZ 16/32 device.
n local-path is the location on the Connect EZ 16/32 device where the copied file will be
placed.
For example:
where
n filepath is the the path and filename of the configuration backup file on the Connect EZ
16/32's filesystem (local-path in the previous step).
n passphrase (optional) is the passphrase to restore the configuration backup, if a
passphrase was used when the backup was created.
For example:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
n If Check if Python Out-of-Service is set, the maintenance window will only start if the
Python Out-of-Service is set. See Use Python to set the maintenance window for further
information.
7. If Central Management is disabled, click Device firmware update to instruct the system to
look for any updated device firmware during the maintenance window. If updated firmware is
found, it will then be installed. This options is only available if Central Management is
disabled; see Central management for more information.
8. If Central Management is disabled, click to enable Modem firmware update to instruct the
system to look for any updated modem firmware during the maintenance window. If updated
firmware is found, it will then be installed. Modem firmware update looks for updated firmware
both on the local device and over the network, using either a WAN or cellular connection. This
options is only available if Central Management is disabled; see Central management for
more information.
9. (Optional) Configure automated checking for device and modem firmware updates:
a. Click to expand Firmware update check.
b. Device firmware update check is enabled by default. This enables the automated
checking for device firmware updates.
c. Modem firmware update check is enabled by default. This enables the automated
checking for modem firmware updates.
d. For Frequency, select how often automated checking for device and modem firmware
should take place. Allowed values are Daily, Weekly, and Monthly. The default is Daily.
10. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
n out_of_service: The maintenance window will only start if the Python Out-of-
Service is set. See Use Python to set the maintenance window for further
information.
n time: Configure a time period for the maintenance window:
i. Configure the time of day that the maintenance window should start, using the
syntax HH:MM. If the start time is not set, maintenance tasks are not scheduled
and will not be run.
The behavior of the start time varies depending on the setting of the duration
length, which is configured in the next step.
l If the duration length is set to 0, all scheduled tasks will begin at the exact
time specified in the start time.
l If the duration length is set to 24 hours, the start time is effectively
obsolete and the maintenance tasks will be scheduled to run at any time.
Setting the duration length to 24 hours can potentially overstress the
device and should be used with caution.
l If the duration length is set to any value other than to 0 or 24 hours, the
maintenance tasks will run at a random time during the time allotted for
the duration window.
l If the duration length is set to one or more hours, the minutes field in the
start time is ignored and the duration window will begin at the beginning
of the specified hour.
ii. Configure the duration length (the amount of time that the maintenance tasks
will be run). If 0 is used, all scheduled tasks will begin at the start time, defined
in the previous step.
iii. Configure the frequency that the maintenance tasks should be run:
5. If Central Management is disabled, configure the device to look for any updated modem
firmware during the maintenance window. If updated firmware is found, it will then be
installed. The device will look for updated firmware both on the local device and over the
network, using either a WAN or cellular connection.
This options is only available if Central Management is disabled; see Central management for
more information.
b. Set how often automated checking for device firmware should take place:
(config)> save
Configuration saved.
>
b. Set how often automated checking for device firmware should take place:
(config)> save
Configuration saved.
>
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Disable encryption with the following command:
1. Configure your PCnetwork to connect to the 192.168.210 subnet. For example, on a Windows
PC:
a. Select the Properties of the relevant network connection on the Windows PC.
2. Connect the PC's Ethernet port to the ETH1 Ethernet port on your Connect EZ 16/32 device.
3. Open a telnet session and connect to the Connect EZ 16/32 device at the IP address of
192.168.210.1.
4. Log into the device:
n Username: admin
n Password: The default unique password for your device is printed on the device label.
5. At the shell prompt, type:
# rm /etc/config/.nocrypt
# flatfsd -i
This will re-enable encryption and leave the device at its factory default setting.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
where:
n eth_port is the name of the Ethernet port (for example, eth1)
n value is one of:
l 10—Sets the speed to 10 Mbps.
l 100—Sets the speed to 100 Mbps.
l 1000—Sets the speed to 1 Gbps. Available only for devices with Gigabit Ethernet
ports.
auto—Configures the device to automatically determine the best speed for the
Ethernet port.
The default is auto.
4. Save the configuration and apply the change.
(config)> save
Configuration saved.
>
Watchdog service
The Watchdog service can monitor the operation of your device, test the system for problems, and
automatically restart that device if it detects a fault or failure. You can also see metrics for the
Watchdog service and performance results of the tests performed.
When the Watchdog service has been enabled, the service name and green check mark displays in the
dashboard.
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
> config
(config)>
where value is any number of days, hours, minutes, or seconds, and takes the format number
{d|h|m|s}.
For example, to set interval to ten minutes, enter either 10m or 600s:
The maximum is two days (2d), and the default is five minutes (5m).
5. Set the number of test failures before the system reboots:
The minimum value is 60 percent, the maximum is 100 percent. The default is 90 percent.
c. Set the percentage of RAM usage that will trigger a reboot of the device:
The minimum value is 60 percent, the maximum is 100 percent. The default is 95 percent.
d. To log memory usage with every watchdog memory usage test, enable log_memory:
e. To have the interface(s) checked and rebooted after the specified amount of time:
(config)> save
Configuration saved.
>
1. Log in to the local Web UI of your device as a user with full Admin access rights.
2. To access the Watchdog Service page:
From the Dashboard of the device:
a. In the Services card, you can see the operational status of the Watchdog service.
A new window opens and displays a chart showing the test failures and when they occurred.
Command line
To view the results of the Watchdog tests:
1. Access the Command Line Interface for your Connect EZ, from either the local web UI as an
administrator with full access rights or from Digi Remote Manager.
2. At the prompt, type
show watchdog
All tests that were performed, as well as their status are listed.
3. Type exit to exit the CLI.
intelliFlow 883
Configure NetFlow Probe 895
intelliFlow
Digi intelliFlow is a reporting and graphical presentation tool for visualizing your network’s data usage
and network traffic information.
intelliFlow can be enabled on Digi Remote Manager to provide a full analysis of all Digi devices on
your network. Contact your Digi sales representative for information about enabling intelliFlow on
Remote Manager.
IntelliFlow is also available on the local device for device-specific visualization of network use. To use
intelliFlow on the local device, you must have access to the local WebUI. Once you enable intelliFlow,
the Status > intelliFlow option is available in the main menu. By default, intelliFlow is disabled on
the local device.
On the local device, intelliFlow provides charts on the following information:
n System utilisation
n Top data usage by host
n Top data usage by server
n Top data usage by service
n Host data usage over time
intelliFlow charts are dymanic; at any point, you can click inside the chart to drill down to view more
granular information, and menu options allow you to change various aspects of the information being
displayed.
This section contains the following topics:
Enable intelliFlow
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Enable IntelliFlow:
4. Set the firewall zone. Internal clients that are being monitored by IntelliFlow should be present
on the specified zone:
a. Determine available zones:
(config)>
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
6. Label is optional.
7. For Port number, type 9000.
8. For Service name, type MyService.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Add a port:
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
5. Label is optional.
6. For Domain name, type digi.com.
7. For Group, type Digi.
8. Click to add a another port.
9. For Domain name, type devicecloud.com.
10. For Group, type Digi.
11. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Add a group:
(config)> save
Configuration saved.
>
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. If you have not already done so, enable intelliFlow. See Enable intelliFlow.
2. From the menu, click Status > intelliFlow.
The System Utilisation chart is displayed:
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. If you have not already done so, enable intelliFlow. See Enable intelliFlow.
2. From the menu, click Status > intelliFlow.
n To display the Top Data Usage by Server chart, click Top Data Usage by Server.
n To display the Top Data Usage by Service chart, click Top Data Usage by Service.
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. If you have not already done so, enable intelliFlow. See Enable intelliFlow.
2. From the menu, click Status > intelliFlow.
3. Click Host Data Usage Over Time.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
n Random—Randomly selects one out of every n flows, where n is the value of Flow
sampler population.
n Hash—Randomly selects one out of every n flows using the hash of the flow key, where
n is the value of Flow sampler population.
7. For Flow sampler population, if you selected a flow sampler, enter the number of flows for
the sampler. Allowed value is any number between 2 and 16383. The default is 100.
8. For Inactive timeout, type the the number of seconds that a flow can be inactive before sent
to a collector. Allowed value is any number between 1 and 15. The default is 15.
9. For Active timeout, type the number of seconds that a flow can be active before sent to a
collector. Allowed value is any number between 1 and 1800. The default is 1800.
10. For Maximum flows, type the maximum number of flows to probe simultaneously. Allowed
value is any number between 0 and 2000000. The default is 2000000.
11. Add collectors:
a. Click to expand Collectors.
b. For Add Collector, click .
c. (Optional) Type a Label for the collector.
d. For Address, type the IP address of the collector.
e. (Optional) For Port, enter the port number used by the collector. The default is 2055.
Repeat to add additional collectors.
12. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Enable NetFlow:
where value is any number between 2 and 16383. The default is 100.
6. Set the number of seconds that a flow can be inactive before sent to a collector:
where value is any is any number between 1 and 15. The default is 15.
7. Set the number of seconds that a flow can be active before sent to a collector:
where value is any is any number between 1 and 1800. The default is 1800.
8. Set the maximum number of flows to probe simultaneously:
where value is any is any number between 0 and 2000000. The default is 2000000.
9. Add collectors:
a. Add a collector:
Firewall issues
To utilize the certificate-based security, you may need to open a port through your firewall for egress
connectivity to edp12.devicecloud.com. TCP port 3199 is used for communication with Remote
Manager.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Digi Remote Manager support is enabled by default. To disable, toggle off Enable central
management.
4. For Service, select Digi Remote Manager.
5. (Optional) For Management server, type the URL for the central management server.
The default varies depending on firmware versions:
n Firmware version 22.2.9.x and newer, the default is the edp12.devicecloud.com. This
server is for device-connectivity only, and uses enhanced security through certificate-
based communication. See Digi Remote Manager support for further infomation.
n Firmware prior to version 22.2.9.x, the default is the Digi Remote Manager server,
https://remotemanager.digi.com.
6. (Optional) For Management port, type the destination port for the remote cloud services
connection. The default is 3199.
7. Firmware server should normally be left at the default location.
8. (Optional) For Speedtest server, type the name or IP address of the server to use to test the
speed of the device's internet connection(s).
9. (Optional) For Retry interval, type the amount of time that the Connect EZ 16/32 device
should wait before reattempting to connect to remote cloud services after being disconnected.
The default is 30 seconds.
Allowed values are any number of hours, minutes, or seconds, and take the format number
{h|m|s}.
For example, to set Retry interval to ten minutes, enter 10m or 600s.
10. (Optional) For Keep-alive interval, type the amount of time that the Connect EZ 16/32 device
should wait between sending keep-alive messages to remote cloud services when using a non-
cellular interface. The default is 60 seconds.
Allowed values are any number of hours, minutes, or seconds, and take the format number
{h|m|s}.
For example, to set Keep-alive interval to ten minutes, enter 10m or 600s.
11. (Optional) For Cellular keep-alive interval, type the amount of time that the Connect EZ
16/32 device should wait between sending keep-alive messages to remote cloud services when
using a cellular interface. The default is 290 seconds.
Allowed values are any number of hours, minutes, or seconds, and take the format number
{h|m|s}.
For example, to set Cellular keep-alive interval to ten minutes, enter 10m or 600s.
12. (Optional) For Allowed keep-alive misses, type the number of allowed keep-alive misses. The
default is 3.
13. Enable watchdog is used to monitor the connection to Digi Remote Manager. If the
connection is down, you can configure the device to restart the connection, or to reboot. The
watchdog is enabled by default. To configure the Watchdog service and view metrics, see
Watchdog service.
14. If Enable watchdog is enabled:
a. (Optional) For Restart Timeout, type the amount of time to wait before restarting the
connection to the remote cloud services, once the connection is down.
Allowed values are any number of hours, minutes, or seconds, and take the format
number{h|m|s}.
For example, to set Restart Timeout to ten minutes, enter 10m or 600s.
The minimum value is 30 minutes and the maximum is 48 hours. If not set, this option is
disabled. The default is 30 minutes.
b. (Optional) For Reboot Timeout, type the amount of time to wait before rebooting the
device, once the connection to the remote cloud servicesis down. By default, this option is
not set, which means that the option is disabled.
Allowed values are any number of hours, minutes, or seconds, and take the format
number{h|m|s}.
For example, to set Reboot Timeout to ten minutes, enter 10m or 600s.
The minimum value is 30 minutes and the maximum is 48 hours. If not set, this option is
disabled. The default is disabled.
15. (Optional) Enable Locally authenticate CLI to require a login and password to authenticate
the user from the remote cloud services CLI. If disabled, no login prompt will be presented and
the user will be logged in as admin. The default is disabled.
16. (Optional) Configure the Connect EZ 16/32 device to communicate with remote cloud services
by using SMS:
a. Click to expand Short message service.
b. Enable SMS messaging.
c. For Destination phone number, type the phone number for the remote cloud services:
n Within the US: 12029823370
n International: 447537431797
d. (Optional) Type the Service identifier.
17. (Optional) Configure the Connect EZ 16/32 device to communicate with remote cloud services
via one of two methods: Pinhole or Proxy server.
If using the Pinhole method, refer to the following
If using the Proxy server method:
a. Click to expand HTTP Proxy.
b. Enable the use of an HTTP proxy server.
c. For Server, type the hostname of the HTTP proxy server.
d. For Port, type or select the port number on the HTTP proxy server that the device should
connect to. The default is 2138.
18. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Digi Remote Manager support is enabled by default. To disable Remote Manager support:
where value is any number of hours, minutes, or seconds, and takes the format number
{h|m|s}.
For example, to set the retry interval to ten minutes, enter either 10m or 600s:
6. (Optional) Set the amount of time that the Connect EZ 16/32 device should wait between
sending keep-alive messages to the Digi Remote Manager when using a non-cellular interface.
Allowed values are from 30 seconds to two hours. The default is 60 seconds.
where value is any number of hours, minutes, or seconds, and takes the format number
{h|m|s}.
For example, to set the keep-alive interval to ten minutes, enter either 10m or 600s:
7. (Optional) Set the amount of time that the Connect EZ 16/32 device should wait between
sending keep-alive messages to the Digi Remote Manager when using a cellular interface.
Allowed values are from 30 seconds to two hours. The default is 290 seconds.
where value is any number of hours, minutes, or seconds, and takes the format number
{h|m|s}.
For example, to set the cellular keep-alive interval to ten minutes, enter either 10m or 600s:
8. Set the number of allowed keep-alive misses. Allowed values are any integer between 2 and
64. The default is 3.
9. The watchdog is used to monitor the connection to remote cloud services. If the connection is
down, you can configure the device to restart the connection, or to reboot. The watchdog is
enabled by default. To disable:
The minimum value is 30 minutes and the maximum is 48 hours. If not set, this option is
disabled. The default is 30 minutes.
b. (Optional) Set the amount of time to wait before rebooting the device, once the
connection to the remote cloud servicesis down. By default, this option is not set, which
means that the option is disabled.
where value is any number of hours, minutes, or seconds, and takes the format number
{h|m|s}.
For example, to set reboot_timeout to ten minutes, enter either 10m or 600s:
The minimum value is 30 minutes and the maximum is 48 hours. If not set, this option is
disabled. The default is disabled.
11. firmware_url should normally be left at the default location. To change:
12. (Optional) Set the hostname or IP address of the speedtest server. The default is
speedtest.accns.com.
13. (Optional) Determine whether to require a login and password to authenticate the user from
the remote cloud services CLI:
If set to false, no login prompt will be presented and the user will be logged in as admin. The
default is false.
14. (Optional) Configure the Connect EZ 16/32 device to communicate with remote cloud
services by using SMS:
a. Enable SMS messaging:
15. (Optional) Configure the Connect EZ 16/32 device to communicate with remote cloud
services by using an HTTP proxy server:
c. (Optional) Set the port number on the proxy server that the device should connect to. The
default is 2138.
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
n To disable:
4. The interval between health sample uploads is set to 60 minutes by default. To change:
where value is one of 1, 5, 15, 30, or 60, and represents the number of minutes between
uploads of health sample data.
5. By default, the device will only report health metrics values to Digi Remote Manager that have
changed health metrics were last uploaded. This is useful to reduce the bandwidth used to
report health metrics. This is useful to reduce the bandwidth used to report health metrics.
Even if enabled, all metrics are uploaded once every hour.
To disable:
When disabled, all metrics are uploaded every Health sample interval.
6. (Optional) Tuning parameters allow to you configure what data are uploaded to the Digi
Remote Manager. By default, all tuning parameters are enabled.
To view a list of all available tuning parameters, use the show command:
bytes
enable true
tx
bytes
enable true
cellular
1
rx
bytes
enable true
packets
enable true
...
(config)>
To disable a tuning parameter, set its value to false. For example, to turn off all reporting for
the serial port:
(config)> save
Configuration saved.
>
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
4. For Device event log upload interval, change the interval between health sample uploads.
The default is 60 minutes.
5. Click Apply to save the configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. The interval between event log uploads is set to 60 minutes by default. To change:
where value is one of 1, 5, 15, 30, or 60, and represents the number of minutes between
uploads of health sample data.
4. Save the configuration and apply the change.
(config)> save
Configuration saved.
>
Pinhole method
Using the pinhole method requires your network administrator to remove the firewall connection on a
communication port. For more information, see Firewall concerns for outbound EDP connections to
Digi Remote Manager.
Tip To see instructions for setting up Squid and then configuring a device (not DAL) to reach Digi
Remote Manager, see the Digi Quick Note, Connecting to Digi Remote Manager Through Web Proxy.
Though this Quick Note references older technology and device types, it may provide a network
administrator with concrete examples from which they can draw correlations to newer technology
and devices.
1. If you have not already done so, click here to sign up for a Digi Remote Manager account.
2. Check your email for Digi Remote Manager login instructions.
3. Go to remotemanager.digi.com.
4. Log into your Digi Remote Manager account.
1. If you have not already done so, connect to your Digi Remote Manager account.
2. From the menu, click Devices to display a list of your devices.
3. Use the Filter bar to locate the device you want to manage. For example, to search by type of
device:
a. Click the Advanced Search button ( )
b. Click in the filter bar.
1. If you have not already done so, connect to your Digi Remote Manager account.
2. From the menu, click Devices to display a list of your devices.
3. Click Add.
Web
1. Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
2. On the dashboard, in Digi Remote Manager status pane, click Register device in new
account.
4. For Digi Remote Manager Username, type your Remote Manager username.
5. For Digi Remote Manager Password, type your Remote Manager password.
6. For Digi Remote Manager Group (optional), type the group to which the device will be
added, if needed.
7. Click Register.
The device is added to Remote Manager.
Command line
1. Log into the Connect EZ 16/32 local command line as a user with full Admin access rights.
2. Register a device.
where:
n group: group to add device in Digi Remote Manager.
n password: Digi Remote Manager password (required).
n username: Digi Remote Manager username (required).
1. Click Apply to save the configuration and apply the change.
2. Save the configuration and apply the change.
(config)> save
Configuration saved.
>
1. Using the Connect EZ 16/32 local WebUI, configure one Connect EZ 16/32 router to use as the
model configuration for all subsequent Connect EZ 16/32s you need to manage.
2. Register the configured Connect EZ 16/32 device in your Remote Manager account.
b. Click Create.
c. Enter a Name and an optional Description for the configuration, and select the Groups,
Device Type, and Firmware Version.
d. Click Save and continue.
e. Click Import from device and select the device configured above.
f. Click Import.
g. At the Settings page, configure any desired configuration overrides and click Continue.
h. At the File System page, make any desired changes to the files that were imported from
the device and click Continue.
i. At the Automations page, click Enable Scanning, make any other desired changes, and
click Save.
Digi Remote Manager provides multiple methods for applying configurations to registered devices.
You can also include site-specific settings with a profile to override settings on a device-by-device
basis.
Web
1. Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
The dashboard includes a Digi Remote Manager status pane:
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Use the show cloud command to view the status of your device's connection to Remote
Manager:
Status : Connected
Server : edp12.devicecloud.com Device ID : 00000000-00000000-89E1FE-
7550D7>
Learn more
To learn more about Digi Remote Manager features and functions, see the Digi Remote Manager User
Guide.
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the menu, click System. Under Administration, click File System.
2. Highlight a directory and click to open the directory and view the files in the directory.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the Admin CLI prompt, type ls /path/dir_name. For example, to display the contents of the
/etc/config directory:
> ls /etc/config
-rw-r--r-- 1 root root 856 Nov 20 20:12 accns.json
drw------- 2 root root 160 Sep 23 04:02 analyzer
drwxr-xr-x 3 root root 224 Sep 23 04:02 cc_acl
-rw-r--r-- 1 root root 47 Sep 23 04:02 dhcp.leases
...
>
Create a directory
Command line
This procedure is not available through the WebUI. To make a new directory, use the mkdir command,
specifying the name of the directory.
For example:
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the Admin CLI prompt, type mkdir /path/dir_name. For example, to create a directory
named temp in /etc/config:
> ls /etc/config
...
-rw-r--r-- 1 root root 1436 Aug 12 21:36 ssl.crt
-rw------- 1 root root 3895 Aug 12 21:36 ssl.pem
-rw-r--r-- 1 root root 10 Aug 5 06:41 start
drwxr-xr-x 2 root root 160 Aug 25 17:49 temp
>
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the Admin CLI prompt, type more /path/filename. For example, to view the contenct of the
file accns.json in /etc/config:
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
Command line
To rename a file named test.py in /etc/config/scripts to final.py:
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the Admin CLI prompt, type:
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the Admin CLI prompt, type:
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the menu, click System. Under Administration, click File System.
2. Highlight the directory containing the file to be deleted and click to open the directory.
3. Highlight the file to be deleted and click .
4. Click OK to confirm.
Command line
To delete a file named test.py in /etc/config/scripts:
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the Admin CLI prompt, type:
> rm /etc/config/scripts/test.py
rm: remove '/etc/config/scripts/test.py'? yes
>
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the Admin CLI prompt, type:
> rm /opt/temp/
rm: descend into directory '/opt/temp'? yes
rm: remove directory '/opt/temp'? yes
>
Upload files
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the menu, click System. Under Administration, click File System.
2. Highlight the directory to which the file will be uploaded and click to open the directory.
3. Click (upload).
4. Browse to the location of the file on your local machine. Select the file and click Open to
upload the file.
Download files
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the menu, click System. Under Administration, click File System.
2. Highlight the directory to which the file will be uploaded and click to open the directory.
3. Highlight the appropriate file and click (download).
> scp host hostname-or-ip user username remote remote-path local local-path to
local
where:
n hostname-or-ip is the hostname or IP address of the remote host.
n username is the name of the user on the remote host.
n remote-path is the path and filename of the file on the remote host that will be copied to the
Connect EZ 16/32 device.
n local-path is the location on the Connect EZ 16/32 device where the copied file will be placed.
For example:
To copy firmware from a remote host with an IP address of 192.168.4.1 to the /etc/config directory on
the Connect EZ 16/32 device, issue the following command:
> scp host hostname-or-ip user username remote remote-path local local-path to
remote
where:
n hostname-or-ip is the hostname or IP address of the remote host.
n username is the name of the user on the remote host.
n remote-path is the location on the remote host where the file will be copied.
n local-path is the path and filename on the Connect EZ 16/32 device.
For example:
To copy a support report from the Connect EZ 16/32 device to a remote host at the IP address of
192.168.4.1:
$ sftp ahmed@192.168.2.1
Password:
Connected to 192.168.2.1
sftp> put Connect EZ 16/32-24.9
Uploading Connect EZ 16/32-24.9 to Connect EZ 16/32-24.9
Connect EZ 16/32-24.9
100% 24M 830.4KB/s 00:00
sftp> exit
$
$ sftp ahmed@192.168.2.1
Password:
Connected to 192.168.2.1
sftp> get test.py
Fetching test.py to test.py
test.py
100% 254 0.3KB/s 00:00
sftp> exit
$
Perform a speedtest
To perform a speedtest:
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Use the iperf command to generate the report:
4. To change the size of the speedtest packet, use the size parameter:
5. By default, the speedtest uses nuttcp for the mode. To change this setting from nuttcp to iperf,
use the mode parameter:
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the main menu, click System. Under Administration, click Support Report.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Use the system support-report command to generate the report:
Note Information logged on the device will be erased when the device is powered off or rebooted to
avoid unnecessary wear to the flash memory. See Configure options for the event and system logs for
more information on how to enable persistent system logs.
Use 7-Zip or any other file-archiving utility to extract a support report. Its contents are organized into
the following directories:
/etc
This folder most notably contains a running list of the cellular connections that have been registered
by the device's radio.
/opt
Information stored here persists between reboots and system resets.
/tmp
Output from a series of diagnostic queries is stored in a randomly generated sub-directory within
/tmp. When combing through these logs, pay particular attention to config_dump-public (to verify
local device settings) and mmcli-dump (to validate the cellular connection status).
/var/log
The running system log is stored in "messages" until reaching a set line count (1,000 lines by default).
Once this limit is exceeded, that file is renamed to "messages.0" and a new running log is written to
the now-empty "messages" log.
/var/run
This directory can be disregarded for most troubleshooting/ diagnostic purposes.
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the main menu, click System > Logs.
2. Limit the display in the system log by using the Find search tool.
3. Use filters to configure the types of information displayed in the system logs.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Use the show log command at the Admin CLI prompt:
Timestamp Message
-------------- ---------------------------------------------------------
----
Nov 26 21:54:34 Connect EZ 16/32 netifd: Interface 'interface_wan' is
setting up now
Nov 26 21:54:35 Connect EZ 16/32 firewalld[621]: reloading status
...
>
3. (Optional) Use the show log number num command to limit the number of lines that are
displayed. For example, to limit the log to the most recent ten lines:
Timestamp Message
-------------- ---------------------------------------------------------
----
Nov 26 21:54:34 Connect EZ 16/32 netifd: Interface 'interface_wan' is
setting up now
Nov 26 21:54:35 Connect EZ 16/32 firewalld[621]: reloading status
...
>
4. (Optional) Use the show log filter value command to limit the number of lines that are
displayed. Allowed values are critical, warning, info, and debug. For example, to limit the
event list to only info messages:
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the main menu, click System > Logs.
2. Click System Logs to collapse the system logs viewer, or scroll down to Events.
3. Click Events to expand the event viewer.
4. Limit the display in the event log by using the Find search tool.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Use the show event command at the Admin CLI prompt:
3. (Optional) Use the show event number num command to limit the number of lines that are
displayed. For example, to limit the event list to the most recent ten lines:
4. (Optional) Use the show event table value command to limit the number of lines that are
displayed. Allowed values are error, info, and status. For example, to limit the event list to
only info messages:
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
d. The event categories that will be sent to the server are automatically enabled when the
server is enabled.
where value is any integer between 1 and 65535. The default is 514.
5. Set the IP protocol to use for communication with the syslog server:
(config)> save
Configuration saved.
>
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
4. (Optional) To change the Heartbeat interval from the default of 30 minutes, type a new value.
The heartbeat interval determines the amount of time to wait before sending a heartbeat
event if no other events have been sent.
Allowed values are any number of weeks, days, hours, minutes, or seconds, and take the
format number{w|d|h|m|s}.
For example, to set Heartbeat interval to ten minutes, enter 10m or 600s.
To disable the Heartbeat interval, enter 0s.
5. (Optional) To disable event categories, or to enable them if they have been disabled:
a. Click to expand Event Categories.
b. Click an event category to expand.
c. Depending on the event category, you can enable or disable informational events, status
events, and error events. Some categories also allow you to set the Status interval, which
Note You should only enable Preserve system logs temporarily to debug issues. Once you are
finished debugging, immediately disable Preserve system logs to avoid unnecessary wear to
the flash memory.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. (Optional) To change the heartbeat interval from the default of 30 minutes, set a new value.
The heartbeat interval determines the amount of time to wait before sending a heartbeat
event if no other events have been sent.
where value is any number of weeks, days, hours, minutes, or seconds, and takes the format
number{w|d|h|m|s}.
For example, to set the heartbeat interval to ten minutes, enter either 10m or 600s:
Note You should only enable Preserve system logs temporarily to debug issues. Once you are
finished debugging, immediately disable Preserve system logs to avoid unnecessary wear to
the flash memory.
5. (Optional) To disable event categories, or to enable them if they have been disabled:
a. Use the question mark (?) to determine available event categories:
Additional Configuration
---------------------------------------------------------------------
----------
arping ARP ping
config Configuration
dhcpserver DHCP server
firmware Firmware
location Location
modem Modem
netmon Active recovery
network Network interfaces
openvpn OpenVPN
portal Captive portal
remote Remote control
restart Restart
serial Serial
sms SMS commands
speed Speed
stat Network statistics
user User
wol Wake-On-LAN
b. Depending on the event category, you can enable or disable informational events, status
events, and error events. Some categories also allow you to set the status interval, which is
the time interval between periodic status events. For example, to configure DHCP server
logging:
i. Use the question mark (?) to determine what events are available for DHCP server
logging configuration:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set the status interval to ten minutes, enter either 10m or 600s:
6. (Optional) See Configure syslog servers for information about configuring remote syslog
servers to which log messages will be sent.
7. Save the configuration and apply the change.
(config)> save
Configuration saved.
>
6. Add a destination.
a. Click Add Destination.
b. In the Host Name field, enter the host name or IP address of the SNMP destination.
c. In the Port field, enter the UDP port of the SNMP destination. The default is 162.
d. In the Community name field, enter the SNMP destination community name. The default
is public.
e. Repeat this process to add an additional destination, if needed.
7. Click Apply to save the configuration and apply the change.
8. Review the system log event categories and select the type of information that you want to
save to the system log, and enable the Enable SNMP traps option. To configure these options,
see Configure options for the event and system logs.
Note Data traffic is captured to RAM and the captured data is lost when the device reboots unless you
save the data to a file. See Save captured data traffic to a file.
Web
1. Log into Digi Remote Manager, or log into the local Web UI as a user with full Admin access
rights.
2. Access the device configuration:
Remote Manager:
a. Locate your device as described in Use Digi Remote Manager to view and manage your
device.
b. Click the Device ID.
c. Click Settings.
d. Click to expand Config.
4. For Add Capture settings, type a name for the capture filter and click .
You can select from preconfigured filters to determine which types of packets to capture
or ignore, or you can create your own Berkeley packet filter expression.
b. To create a filter that either captures or ignores packets from a particular IP address or
network:
i. Click to expand Filter IP addresses or networks.
ii. Click to add an IP address/network.
iii. For IP address or network, type the IPv4 or IPv6 address (and optional netmask).
iv. For Source or destination IP address, select whether the filter should apply to
packets when the IP address/network is the source, the destination, or both.
v. Click Ignore this IP address or network if the filter should ignore packets from this
IP address/network. By default, is option is disabled, which means that the filter will
capture packets from this IP address/network.
vi. Click to add additional IP address/network filters.
c. To create a filter that either captures or ignores packets that use a particular IP protocol:
i. Click to expand Filter IP protocols.
ii. Click to add an IP protocol.
iii. For IP protocol to capture or ignore, select the protocol. If Other protocol is
selected, type the number of the protocol.
iv. Click Ignore this protocol if the filter should ignore packets that use this protocol. By
default, is option is disabled, which means that the filter will capture packets that use
this protocol.
v. Click to add additional IP protocols filters.
d. To create a filter that either captures or ignores packets from a particular port:
i. Click to expand Filter TCP/UDP port.
ii. Click to add a TCP /UDP port.
iii. For IP TCP/UDP port to capture or ignore, type the number of the port to be
captured or ingored.
iv. For TCP or UDP port, select the type of transport protocol.
v. For Source or destination TCP/UDP port, select whether the filter should apply to
packets when the port is the source, the destination, or both.
vi. Click Ignore this TCP/UDP port if the filter should ignore packets that use this port.
By default, is option is disabled, which means that the filter will capture packets that
use this port.
vii. Click to add additional port filters.
e. To create a filter that either captures or ignores packets from one or more specified MAC
addresses:
i. Click to expand Filter Ethernet MAC addresses.
ii. Click to add a MACaddress.
iii. For Ethernet MAC address, type the MAC address to be captured or ingored.
iv. For Source or destination Ethernet MAC address, select whether the filter should
apply to packets when the Ethernet MAC address is the source, the destination, or
both.
v. Click Ignore this MAC address if the filter should ignore packets that use this port. By
default, is option is disabled, which means that the filter will capture packets that use
this port.
vi. Click to add additional MACaddress filters.
f. To create a filter that either captures or ignores packets from one or more VLANs:
i. Click to expand Filter VLANs.
ii. Click to add a VLAN.
iii. For The VLAN to capture or ignore, type the number of the VLAN.
iv. Click Ignore this VLAN if the filter should ignore packets that use this port. By default,
is option is disabled, which means that the filter will capture packets that use this
port.
v. Click to add additional VLAN filters.
g. For Berkeley packet filter expression, type a filter using Berkeley Packet Filter (BPF)
syntax. See Example filters for capturing data traffic for examples of filters using BPF
syntax.
6. Add one or more interface to the capture filter:
a. Click to expand Device.
b. Click to add an interface to the capture setting instance.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
iii. Set whether the filter should apply to packets when the IP address/network is the
source, the destination, or both:
n either: The filter will apply to packets when the IP address/network is either
the source or the destination.
iv. (Optional) Set the filter should ignore packets from this IP address/network:
By default, is option is set to false, which means that the filter will capture packets
from this IP address/network.
v. Repeat these steps to add additional IP address filters.
b. To create a filter that either captures or ignores packets that use a particular IP protocol:
i. Add a new IP protocol filter:
ii. Use the ? to determine available protocols and the appropriate format:
iv. If other is set for the protocol, set the number of the protocol:
where value is an integer between 1 and 255 and represents the the number of the
protocol.
v. (Optional) Set the filter should ignore packets from this protocol:
By default, is option is set to false, which means that the filter will capture packets
from this protocol.
vi. Repeat these steps to add additional protocol filters.
c. To create a filter that either captures or ignores packets from a particular port:
i. Add a new port filter:
ii. Set the transport protocol that should be filtered for the port:
By default, is option is set to false, which means that the filter will capture packets
from this port.
v. Repeat these steps to add additional port filters.
d. To create a filter that either captures or ignores packets from one or more specified MAC
addresses:
i. Add a new MACaddress filter:
By default, is option is set to false, which means that the filter will capture packets
from this MACaddress.
v. Repeat these steps to add additional MAC addresses.
e. To create a filter that either captures or ignores packets from one or more specified VLANs:
i. Add a new VLAN filter:
By default, is option is set to false, which means that the filter will capture packets
from this MACaddress.
iv. Repeat these steps to add additional VLANs.
f. To create a filter using Berkeley Packet Filter (BPF) syntax:
where value is a filter using Berkeley Packet Filter (BPF) syntax. Values that contain spaces
must be enclosed in double quotes (").
See Example filters for capturing data traffic for examples of filters using BPF syntax.
6. (Optional) Schedule the analyzer to run, using this capture filter, based on a specified event or
at a particular time:
a. Enable scheduling for this capture filter:
b. Set the mode that will be used to run the capture filter:
where value is any number of weeks, days, hours, minutes, or seconds, and takes
the format number{w|d|h|m|s}.
For example, to set on_interval to ten minutes, enter either 10m or 600s:
n set_time: Runs the script at a specified time of the day. If set_time is set, set the
time that the script should run, using the format HH:MM:
n maintenance_time: The script will run during the system maintenance time
window.
c. Set the amount of time that the scheduled analyzer session will run:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set duration to ten minutes, enter either 10m or 600s:
where value is any number of weeks, days, hours, minutes, or seconds, and takes the
format number{w|d|h|m|s}.
For example, to set save_interval to ten minutes, enter either 10m or 600s:
(config)> save
Configuration saved.
>
ip host 192.168.1.1
ip proto protocol
where protocol is a number in the range of 1 to 255 or one of the following keywords: icmp,
icmp6, igmp, pim, ah, esp, vrrp, udp, or tcp.
n Capture to and from IP host 10.0.0.1 but filter out ports 22 and 80:
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Type the following at the Admin CLI prompt:
where capture_filter is the name of a packet capture configuration. See Configure packet
capture for the network analyzer for more information.
To determine available packet capture configurations, use the ?:
Note Data traffic is captured to RAM and the captured data is lost when the device reboots unless you
save the data to a file. See Save captured data traffic to a file.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Type the following at the Admin CLI prompt:
where capture_filter is the name of a packet capture configuration. See Configure packet
capture for the network analyzer for more information.
To determine available packet capture configurations, use the ?:
capture_ping
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Type the following at the Admin CLI prompt:
00 40 ff 80 01 20 b4 b6 86 21 b5 73 08 00 45 00 .@... ..
.!.s..E.
00 28 3d 36 40 00 80 06 14 bc 0a 0a 4a 82 0a 0a .(=6@... ....J..
4a 48 cd ae 00 16 a4 4b ff 5f ee 1f d8 23 50 10 JH.....K
._...#P.
08 02 c7 40 00 00 00 00 00 00 00 00 ...@.... ....
Ethernet Header
Destination MAC Addr : 00:40:D0:13:35:36
Source MAC Addr : fb:03:53:05:11:2f
Ethernet Type : IP (0x0800)
IP Header
IP Version : 4
Header Length : 20 bytes
ToS : 0x00
>
where capture_filter is the name of a packet capture configuration. See Configure packet
capture for the network analyzer for more information.
To determine available packet capture configurations, use the ?:
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
where:
n filename is the name of the file that the captured data will be saved to.
Determine filenames already in use:
Use the tab autocomplete feature to determine filenames that are currently in use:
n path is the path and filename to save captured traffic to. If a relative path is provided,
/etc/config/analyzer will be used as the root directory for the path and file.
To transfer the file to your PC, see Download captured data to your PC.
Web
Log into the Connect EZ 16/32 WebUI as a user with full Admin access rights.
1. On the menu, click System. Under Administration, click File System.
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Type scp to use the Secure Copy program to copy the file to your PC:
> scp host hostname-or-ip user username remote remote-path local local-
path to remote
where:
n hostname-or-ip is the hostname or IP address of the remote host.
n username is the name of the user on the remote host.
n remote-path is the location on the remote host where the file will be copied.
n local-path is the path and filename on the Connect EZ 16/32 device.
For example:
To download the traffic saved in the file /etc/config/analyzer/eth0.pcpng to a PCwith the IP
192.168.210.2, for a user named maria, to the /home/maria directory:
maria@192.168.210.2's password:
eth0.pcpng 100% 11KB 851.3KB/s
00:00
Command line
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. Type the following at the Admin CLI prompt:
where capture_filter is the name of a packet capture configuration. See Configure packet
capture for the network analyzer for more information.
To determine available packet capture configurations, use the ?:
test_capture
capture_ping
Note You can remove data traffic saved to a file using the rm command.
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the Admin CLI prompt, type the ping command followed by the host name or IP address of
the server to be pinged:
Example
This example shows using traceroute to verify that the Connect EZ device can route to host 8.8.8.8
(www.google.com) through the default gateway. The command output shows that 15 routing hops
were required to reach the host:
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the Admin CLI prompt, use the traceroute command to view IP routing information:
By entering a whois command on a Unix device, the output shows that the route is as follows:
Get started
The steps in this section explain how to install the AnywhereUSB Manager and configure the
Connect EZ 16/32 to allow you to use the AnywhereUSB ports.
Installation instructions
n Install the AnywhereUSB Manager: Windows
n Install the AnywhereUSB Manager: Linux
CAUTION! Only a Windows Administrator can perform the software install. If you are logged
in as a non-Windows Administrator user and you attempt to install the software, you will be
required to enter Windows Administrator log in credentials to be able to complete the
installation process.
Prerequisites
Before you begin, you should determine the following:
n Mode: Decide whether you want to run the AnywhereUSB Manager as a stand-alone or as a
service. For detailed information, see Service.
n Client ID: Determine a client ID for the computer on which you are installing the Manager. The
client ID is associated with the login credentials for the user currently logged on to the
computer, and is used by your computer and the Hub to create a connection. See Client ID
overview for more information.
n Uninstall previous version of the Manager: If you have previously installed the Manager on
your PC, you must uninstall the existing version before installing a newer version.
1. Download the AnywhereUSB Manager installer from the AnywhereUSB Drivers section of the
support page.
a. Navigate to the AnywhereUSB Plus support page.
b. Click the Product Resources tab. This should be selected by default.
c. In the Drivers & Patches section, click the AnywhereUSB Manager link.
d. From the drop-down list box, select Microsoft Windows.
e. Click the download link for the version of the installer than you want to download. Make a
note of the version number for future reference.
Note You should save the downloaded software to your computer before you start the
install process. This is useful if you decide to uninstall the AnywhereUSB Manager from
the original installer in the future.
2. Right-click on the downloaded software and select the Run as Administrator menu option.
3. Enter your Administrator login credentials. The AnywhereUSB Manager installation wizard
launches.
4. Click Next. The Ready to Install screen appears. You must specify which mode you want to
install: Standalone or Service. For detailed information about each mode, refer to Service.
5. Click Install. A status bar shows the progress of the installation process. When complete, the
Completed screen appears.
6. The options in the Completed screen are selected by default. De-select the option if you do
not want to use the feature.
Note If you have installed the Manager as a service, this option applies only to the
current admin user. Each time this admin user logs in, the Manager launches so the
user can administer the service. If a non-admin user logs in, the service is available, but
the AnywhereUSB Manager does not display.
Note If you deselected the Launch AnywhereUSB Manager option, the client ID entry dialog
does not automatically display. You must manually launch the Manager to continue with the
installation process. If you are in service mode, you must run it as Administrator.
n Service: If you installed the Manager in service mode, the client ID confirmation dialog
looks like this:
8. Enter a unique client ID. This client ID is associated with the login credentials for the user
currently logged on to the computer. See Client ID overview for more information about how
the client ID is used by your computer and the Hub to create a connection.
9. Click OK.
Step 2: Add the client ID for the PC to the AnywhereUSB Hub client ID list
This step allows the PCand the Hub to connect.
1. Right-click on the Hub name in the AnywhereUSB Manager and choose the Open Web
UI menu option. The web UI for the Hub launches.
2. Log in to the web UI using the Hub's user name and password.
3. Select System > AnywhereUSB Configuration.
4. In the Client Settings section, click Add Client.
5. In the Client ID field, enter the client ID that you just entered during the AnywhereUSB
Manager installation.
6. A list of the group numbers displays beneath the Group Access field. Click the check box next
to a group to which this client ID is allowed access. As you select groups, the selected group
numbers appear in the Group Access field. As an alternative, you can enter group numbers in
the Group Access field, for example: 1, 5-8, 10-24.
7. Click Apply.
8. Return to the AnywhereUSB Manager. The Manager should connect to the Hub within 60
seconds. You can select File > Refresh to have the Manager immediately try to connect to the
Hub.
Step 3: Verify that you can see a USB device in the AnywhereUSB Manager that is connected to
the Hub
1. Insert a USB memory stick into port 1 on the Hub. The memory stick appears in the
AnywhereUSB Manager.
2. Double-click on the group the memory stick is in to connect to the group.
3. In the Manager, verify that the memory stick and the group that it is in both have the message
(in use by you), which indicates that the USB device is connected to your PC.
NEXT STEP: Proceed to the next step: Step 2: Enable the AnywhereUSB Service.
Note The AnywhereUSB Manager shows information that pertains to the installed mode. Most
importantly, if you install the Manager in service mode, "SERVICE MODE" displays in the Manager
title bar and in the Status pane. See AnywhereUSB Manager Status pane for detailed information.
The table below compares the features in each mode. Refer to the table to help you determine which
mode is best for your organization. For more information about the user roles, see User roles.
Which users can see devices connected All users can see all the All users can see all the
to the computer devices in the groups that devices in the groups that
are connected to the are connected to the
computer. computer.
Service
n To ensure that all USB devices are connected to your computer at boot time, you must select
Enable Auto Connect for each group assigned to the client ID for the computer. The USB
devices in the groups connected to the computer are available to the users.
n Multiple users can log on with their Windows user account and use the devices connected by
the service to the computer at the same time.
n If you are not an Administrator, you cannot run the Manager but you can see and use the
devices that are connected from the Hub to you.
n Groups and devices remain connected when users log in or out.
Stand-alone
n If you install the AnywhereUSB Manager as a stand-alone, Digi recommends that you select
the Run AnywhereUSB Manager at Startup option during the installation process to
automatically launch the Manager each time you log in to your Windows user account.
n When the user logs in and starts the AnywhereUSB Manager, the Manager automatically
connects to groups that have Enable Auto Connect enabled. The USB devices in those groups
are connected to the machine.
n Groups and devices are connected when the Manager starts running if auto connect is enabled
for the group. If auto connect is not enabled for the group, you can manually connect to a
group. Groups and devices are disconnected when the Manager stops running, which typically
occurs when the user running the Manager logs off the computer.
Warnings
n Only an Administrator has the rights to install the AnywhereUSB Manager.
If you log onto the computer as a non-Administrative user and attempt to install the
AnywhereUSB Manager, you will be prompted during the installation process for an
Administrator user name and password. If you do not provide Administrator credentials, you
will not be able to complete the installation process.
n In stand-alone mode, only one user can open the AnywhereUSB Manager at a time. The
Manager cannot be opened simultaneously by multiple users. In addition, a single user cannot
run multiple instances of the Manager.
n In stand-alone mode, each user must have a different client ID, which results in an individual
Manager configuration. Digi does not support sharing a client ID between two different
Windows users or computers.
n Digi recommends that you do NOT install the AnywhereUSB Manager as a stand-alone, re-
install it, and then choose to run the Manager as a service. If this does occur, be aware that the
stand-alone and the service will have separate configurations. The Manager or service will only
use the stand-alone or service configuration, respectively.
n If you install the Manager as a service and then stop the service, the AnywhereUSB Manager
will choose not to run.
Note If you have previously installed an anywhereusb package on your PC, Digi recommends
uninstalling the existing awusbmanager package before installing the desired version.
Prerequisite
Client ID: A client ID is required during the awusbmanager package installation. Before you begin you
should determine the client ID you want to use for this computer. The client ID is associated with the
user currently logged on to the computer, and is used by your computer and the Hub to create a
connection. See Client ID overview for more information.
Note This link navigates to the AnywhereUSB 2 Plus support page, but you can also navigate to
any of the AnywhereUSB Plus support pages. The Linux AnywhereUSB Manager package is
the same on all support pages.
$ sha256sum ./40003060_C.tgz
8. Review the release notes to ensure that you have all of the information you may need.
Stand-alone or headless
For ease of use, Digi recommends that you choose a stand-alone package, which includes both the
stand-alone awusbmanager and the awusbmanager-headless binaries.
Distro type
n DEB: For Ubuntu, Debian and distros with aptitude/apt/apt-get/dpkg package manager, select
a deb package.
l 64-bit hosts: Choose the amd64 package.
l 32-bit hosts: Choose the i386 package.
l 64-bit server systems (without X11 or Wayland packages installed): Choose the headless
amd64 package.
n RPM: For RedHat, Rocky, AlmaLinux and distros with dnf/yum/zypper/rpm package manager,
select an rpm package.
l 64-bit hosts: Choose the x86_64 package.
l 32-bit hosts: Choose the i386 package.
l 64-bit server systems (without X11 or Wayland packages installed): Choose the headless
x86_64 package.
apt install
Note The dot and slash notation (./) is required to install the file.
dpkg
On some distros you may need to use dpkg:
Note The dot and slash notation (./) is required to install the file.
Note On some distros, log out and log back in is not enough and a reboot is required.
$ modinfo vhci-hcd
modinfo: ERROR: Module vhci-hcd not found.
b. If you see this error message, you must manually install the vhci-hcd module.
For RPM distros (RedHat-derived), the vhci-hcd module is available in the kmod-usbip
package from the add-on El Repo (https://elrepo.org) repository.
Note The release you pick must match the release version of the OS. For example, elrepo-
release-8.el8 for RHEL 8, elrepo-release-9.el9 for RHEL 9, etc.
c. When complete, re-run the modinfo to confirm the presence of the vhci-hcd driver.
$ modinfo vhci-hcd
Note If you chose a headless package, stop at this step and follow the installation process for
the headless package. When that is complete, proceed to Additional information: Get started
with the Manager and configuring the Hub.
$ awusbmanager
f. A list of the group numbers displays beneath the Group Access field. Click the check box
next to a group to which this client ID is allowed access. As you select groups, the selected
group numbers appear in the Group Access field. As an alternative, you can enter group
numbers in the Group Access field, for example: 1, 5-8, 10-24.
g. Click Apply.
h. Return to the AnywhereUSB Manager. The Manager should connect to the Hub within 60
seconds. You can select File > Refresh to have the Manager immediately try to connect to
the Hub.
8. Verify that you can see a USB device in the AnywhereUSB Manager that is connected to the
Hub.
a. Insert a USB memory stick into port 1 on the Hub. The memory stick appears in the
AnywhereUSB Manager.
b. Double-click on the group the memory stick is in to connect to the group.
c. Look for the inserted notification or find the USB device as /dev/sd*.
Additional information: Get started with the Manager and configuring the Hub
Review additional information about using the Manager with Linux and configuring your Hub.
n Work with the stand-alone or headless Manager: For detailed information about the
Manager and important notes, see Script: Initial configuration.
n Use the command line: Refer to the command line section in Script: Initial configuration for
information about using the command line.
n Monitor USB devices: Refer to Manage the Hubs using the AnywhereUSB Manager to learn
how to monitor devices connected to the Hub.
n Advanced topics and troubleshooting: Refer to the documentation in
/usr/share/doc/awusbmanager/ for next steps, advanced topics, troubleshooting information
and notes for various distributions.
Stand-alone
The simplest way to start the AnywhereUSB Manager is to run the stand-alone Manager .
$ awusbmanager
Notes
n You should run the stand-alone Manager as a normal (non-root) user, and not as root.
n The stand-alone client Managercan be used to control and monitor the headless Manager.
n USB devices connected through AnywhereUSB will be available to all users who have
appropriate access permissions.
n Only one user can open the AnywhereUSB Manager at a time. The Manager cannot be
opened simultaneously by multiple users. In addition, a single user cannot run multiple
instances of the Manager.
n When it is monitoring the headless Manager, the stand-alone Manager displays "HEADLESS" in
the AnywhereUSB Manager title bar and in the Status pane.
n If you run both the stand-alone and the headless Managers, the first Manager started
determines if it is running in headless or stand-alone mode.
n All other Managers must be stopped before you start the headless Manager.
n When the user logs in and runs the stand-alone Manager, the Manager automatically connects
to groups that have Enable Auto Connect enabled. The USB devices in those groups are
connected to the PC. If auto-connect is not enabled for the group, you can manually connect
to a group.
n When the Manager is iconized, the USB devices will still be available to users on the PC.
n When the Manager is stopped with File > Exit, or the user logs off, the USB devices will no
longer be available to the PC.
Headless
The standard awusbmanager package and the headless package provide a headless version of the
AnywhereUSB Manager. The awusbmanager-headless does not provide a window for AnywhereUSB
management, and is appropriate for server VMs without a display.
Run this command to launch the headless manager:
$ awusbmanager-headless
Notes
n You cannot run the awusbmanager binary as a GUI client manger.
n All other Managers must be stopped before you start the headless Manager.
n The awusbmanager-headless binary can be controlled via the cmdline using either the
awusbmanager or awusbmanager-headless binary. It can also be controlled by running a client
awusbmanager if the system has a graphical display.
n Only root or the same user can run the awusbmanager binary to configure the service.
n Once running, USB devices connected through the Hub are available to all users who have
appropriate access permissions.
n USB devices are available to users on the PC, even if the user that started the headless
Manager logs off. The headless agent runs until the PCis shut down.
n To start the awusbmanager-headless at boot, you will need to create and add a systemd
startup script.
n To ensure that all USB devices are connected to your computer at boot time, you must select
Enable Auto Connect for each group assigned to the client ID for the computer. The USB
devices in the groups connected to the computer are available to the users, and the users can
see and access the devices for which they have permission.
n USB devices connected through AnywhereUSB will be available to all users who have
appropriate access permissions.
n Only the user that initially started the Manager or the root user is allowed to monitor and
control the running Manager.
Command line
AnywhereUSB provides a cmdline to control and monitor the Hub. The stand-alone Manager or the
headless Manager needs to be running to use the cmdline.
Either Manager binary can be used to send commands to the running Manager. For example:
$ awusbmanager LIST
$ awusbmanager-headless LIST
Notes
n The same user or root can send cmdline commands to that running Manager.
#!/bin/bash -e
# Example script to configure Digi awusbmanager-headless
# Configure headless awusbmanager (once after install)
awusbmanager-headless KNOWN HUB ADD,AW24-010000
awusbmanager-headless AUTOCONNECT GROUP,AW24-010000.1
awusbmanager-headless AUTOCONNECT GROUP,AW24-010000.2
awusbmanager-headless AUTOCONNECT GROUP,AW24-010000.3
awusbmanager-headless AUTOFIND,OFF
awusbmanager-headless SET KEEPALIVES,3,120
Example: Monitoring
#!/bin/bash -e
# Check status of AnywhereUSB Manager devices
awusbmanager-headless LIST FULL
$ awusbmanager-headless
where the CLIENTIDNAMEis the client ID you have chosen for this PC.
3. Get the IP address of the Hub. This is needed to complete the connection between the
Manager and the Hub.
$ awusbmanager-headless list
Note This command can be used if you are on the same local subnet as the Hub. If you are not,
another method should be used.
4. Add the client ID for the PCto the AnywhereUSB Hub client ID list.
a. In a web browser, enter the Hub's IP address in the URL field and press Enter. The log in
screen for the Hub displays.
b. Log in to the web UI using the Hub's user name and password.
c. Select System > AnywhereUSB Configuration.
d. In the Client Settings section, click Add Client, then enter the client ID and the desired
group access.
e. Click Apply.
5. Verify that the Hub is connected to the Manager. When the connection is complete, the groups
you selected for the client ID display.
$ awusbmanager-headless list
Example output
$ awusbmanager LIST
AnywhereUSB Manager, below are the available devices:
AW8W-000001 (192.168.0.1:18574)
Group 1 (AW8W-000001.1) (In-use by you)
Group 2 (AW08-000001.2)
Group 3 (AW08-000001.3)
Group 4 (AW08-000001.4)
Group 5 (AW08-000001.5)
Group 6 (AW08-000001.6)
Group 7 (AW08-000001.7)
Group 8 (AW8W-002007.8)
Group 8 (AW08-000001.8)
6. Connect a device to the Hub and verify that you can see the device in the Manager.
$ awusbmanager-headless list
c. Look for the inserted notification or find the USB device as /dev/sd*.
Example output
$ awusbmanager LIST
AnywhereUSB Manager, below are the available devices:
AW8W-000001 (192.168.0.1:18574)
* Group 1 (AW8W-000001.1) (In-use by you)
USB DISK 3.0 (AW08-000001.1601) (In-use by you)
Group 2 (AW08-000001.2)
Group 3 (AW08-000001.3)
Group 4 (AW08-000001.4)
Group 5 (AW08-000001.5)
Group 6 (AW08-000001.6)
Group 7 (AW08-000001.7)
Group 8 (AW8W-002007.8)
Group 8 (AW08-000001.8)
7. Enable auto-connect for the group(s) to which you want to automatically connect each time
you start the headless agent.
8. Refer to Manage the Hubs using the AnywhereUSB Manager to learn how to monitor devices
connected to the Hub.to learn how to monitor devices connected to the Hub.
Refer to the documentation in /usr/share/doc/awusbmanager/ for next steps, advanced topics,
troubleshooting information and notes for various distributions.
Note You can also enable the AnywhereUSB service and specify the port on the AnywhereUSB
Configuration page. To display this page, click System > Configuration > AnywhereUSB
Configuration. See AnywhereUSB Configuration page.
your computer.
6. Click Apply to save the configuration and apply the change.
NEXT STEP: Proceed to the next step: Step 3: Name groups and assign ports to a group.
NEXT STEP: Proceed to the next step: Step 4: Assign groups to a client ID.
Note Make sure that you have at least one client ID created for the AnywhereUSB Manager and
device combination. You can manually add client IDs, if needed. See Add client IDs to the client list.
5. A list of the group numbers displays beneath the Group Access field. Click the check box next
to a group to which this client ID is allowed access. As you select groups, the selected group
numbers appear in the Group Access field.
You can also manually enter group numbers in the Group Access field.
NEXT STEP: Proceed to the next step: Step 5: Connect to a group of USB ports.
Note You can connect to only the groups that have been assigned to your client ID and that are not
currently connected to a different client ID.
Once you have connected to a group, no one else can connect to that group. You cannot connect to a
group that is already is use.
For detailed information about connecting to a group and USB ports, see Connect to a group or USB
device in the AnywhereUSB Manager.
When you have connected to a group, a note appears next to the group name, next to the devices in
the group, and in the Group Status pane to show that the device is being used by you.
NEXT STEP: Proceed to the next step: Step 6: Connect to a USB device in a group.
NEXT STEP: You have now completed all the steps. You can return to AnywhereUSB 2 Plus USB ports
on a Connect EZ 16/32.
Note Before you begin, make sure you have installed the AnywhereUSB Manager.
Note If the AnywhereUSB Manager was installed in service mode, only an Administrator can launch
the AnywhereUSB Manager.
Label Description
Application AnywhereUSB Manager displays in the title bar.
name
Client ID The client ID assigned to the user credentials used to log into the computer. For
information about the client ID, see Client ID overview.
Mode The mode that was selected during installation is indicated in the title bar. You can
install the Manager in either stand-alone or service mode.
Stand-alone mode
When installed in stand-alone mode, the AnywhereUSB Manager dialog title is
"AnywhereUSB Manager - <ClientID>", where <ClientID> is the client ID assigned to
the user credentials used to logged into the computer.
Service mode
When installed in service mode, the AnywhereUSB Manager dialog title is
"AnywhereUSB Manager - <ClientID> - SERVICE MODE", where <ClientID> is the client
ID assigned to the user credentials used to logged into the computer.
Icon Description
Minimizes the AnywhereUSB Manager into the task bar and the notification area of
the task bar.
Minimizes the AnywhereUSB Manager into the notification area of the task bar.
n Open Web UI
n Assign Local Name
n Add to Known Hubs
n Hide Hub
Label Description
Mode The AnywhereUSB Manager mode that was selected during installation.
n Windows: You can install the Manager in either stand-alone or service mode.
n Linux: You can pick a package and install the Manager as either headless or
stand-alone.
Stand-alone mode
When installed in stand-alone mode, AnywhereUSB displays in the Status pane.
Label Description
Service mode
When installed in service mode, AnywhereUSB SERVICE MODE displays in the
Status pane.
Headless mode
When installed in service mode, AnywhereUSB Headless displays in the Status
pane.
Manager The version number of the currently installed version of the
Version AnywhereUSB Manager.
Service The version number of the currently running AnywhereUSB service.
Version
Note This displays only when the Manager is installed in service mode.
Client ID The client ID assigned to the user credentials used to log into the computer. For
information about the client ID, see Client ID overview.
Connection A summary of the connection status for each of the Hubs listed in the
Summary AnywhereUSB Manager.
For information about the connection status messages, see AnywhereUSB Manager
connection status messages.
Label Description
State The current state of the Hub. For a list of status messages, see
AnywhereUSB Manager connection status messages.
Label Description
Name The name of the Hub supplied by the Hub. The default value for
the Hub name is the serial number assigned to the Hub. You can
change the Hub name in the Ethernet Network section of the web
UI. See Rename the AnywhereUSB Hub.
Local Name A descriptive local name for the Hub. The local name also displays
in the tree view in the left-hand pane in the AnywhereUSB
Manager. The local name is local to the computer on which the
AnywhereUSB Manager is running.
You can change the local name using the Assign Local Name menu
option for the Hub.
Model The model name for the AnywhereUSB Hub.
Serial The serial number of the Hub, which is found on the Hub label.
Label Description
Group No The group number from the Hub.
Group Name The name of the group supplied by the Hub. By default, a group is
named "Group" appended by a consecutive number, such as Group
1, Group 2, and so on.
You can change the group name in the AnywhereUSB screen in the
web UI. See Step 3: Name groups and assign ports to a group.
Label Description
Local Name A descriptive local name for the group. The local name also
displays in the tree view in the left-hand pane in the AnywhereUSB
Manager. The local name is local to the computer on which the
AnywhereUSB Manager is running.
You can change the local name using the Assign Local Name menu
option for the group.
Status A status message indicates whether a user is currently connected
this group. Options are:
n You are using this group
n No one is using this group
n In use by <client ID> at <machine name>
n Temporarily Blocked: This message displays when the client
ID has been blocked from a group and cannot connect to it.
See Block a client ID from connecting to groups.
Label Description
Vendor Name of the USB device vendor, if supplied by the device.
Product Name of the USB product, if supplied by the device.
Local A descriptive local name for the USB device. The local name also displays in the tree
Name view in the left-hand pane in the AnywhereUSB Manager. The local name is local to
the computer on which the AnywhereUSB Manager is running.
You can change the local name using the Assign a Local Name menu option for the
device. See Assign a local name to a USB device.
Vendor ID The USB vendor ID.
Product The USB product ID.
ID
Label Description
Address The USB device address that helps to identify a device.
Serial The serial number of the USB device, if supplied by the device.
Port on The number of the port on the Hub to which the USB device is connected.
Hub
Assigned The Windows address assigned to the virtual port. See Assign Device Address (use the
Port same virtual port number).
Status A status message indicates whether a user is currently using this device. Options are:
n You are using this device
n No one is using this device
n In use by <client ID> at <machine name>
n A question mark icon displays if the device class is unknown.
Message Description
Active The number of Hubs that are currently connected to the AnywhereUSB Manager.
(secure)
Attempting to The AnywhereUSB Manager is trying to connect to the Hub but a connection has
connect not yet been made. For troubleshooting information, see Hub connection is taking
too long.
Duplicate The Hub has been found twice and appears twice in the AnywhereUSB Manager.
Connection See Duplicate Connection.
Invalid Client A mismatch has occurred between the certificate associated with the client ID and
Certificate the certificate for the client ID on the Hub. See Multiple user accounts with the
same client ID.
Invalid Hub The Hub certificate has become invalid. See Step 1: Remove the Hub certificate.
Certificate
Unregistered The client ID is not registered with the Hub, and a connection between the Hub
Client ID and the PCcannot be established. See Problem: Client ID has not been added to
the Hub.
Unable to The number of Hubs that are unable to connect to the AnywhereUSB Manager.
Connect See Problem: TCP port is not configured correctly.
Duplicate Connection
The "Duplicate Connection" message displays if a Hub is found twice and appears twice in the
AnywhereUSB Manager.
This occurs if you have added a Hub to the known Hub list that is on same network as your computer,
and you have the Autofind Hubs feature enabled. The AnywhereUSB Manager attempts both
connections, and the first one to connect will connect as expected. The second connection is
discovered as a duplicate, and the Manager closes that connection and red Xdisplays.
In this situation, the Hub added to the known Hubs list is considered a duplicate Hub, and should be
removed from the known Hubs list.
Note For more information about the client ID, see Client ID overview.
The list below describes situations during which this may occur, and includes a resolution.
1. Remove the client ID from the Hub. See Remove a Hub certificate.
2. Add the client ID to the Hub. See Add a Hub certificate.
1. Remove the client ID from the Hub. See Remove a Hub certificate.
2. Add the client ID to the Hub. See Add a Hub certificate.
Unable to connect
The "Unable to connect" status message displays in the Hub Status pane when the Hub is included in
the known Hubs list but the Hub is offline or the network is unreachable. For example, a firewall issue
or other network issue could be blocking access from the Manager to the Hub.
Note If you add a Hub to the list of known Hubs and you have the Hub autofind feature enabled, this
may result in a duplicate connection for the same Hub. See Duplicate Hub.
n If you cannot ping the Hub, check the configuration of the PC, and the Hub network settings,
including firewalls and the network between them.
Unregistered Client ID
The message "Invalid Client ID" displays when the client ID is not registered with the Hub, and a
connection between the Hub and the PCcannot be established.
The client ID is a unique identifier assigned to a user account the first time a user logs in to a
computer and opens the AnywhereUSB Manager. The client ID is associated with the login
credentials for the user currently logged on to the computer.
Note For more information about the client ID, see Client ID overview.
Setup tab
n Client ID
n Start Manager minimized
n Autofind Hubs
n Include IPv6 Addrs in Autofind
n Use All Hub IPv4 Addresses
n Hide unauthorized Hubs
n Auto-register Hub Cert
n Restore default settings
n Minimum TLS Version
Advanced tab
n Specify search, response, and keepalive intervals for a Hub
Note The Power cycle off time option is not used. Any value in the field is ignored. The power cycle
off time configured for the Hub is 1 second.
Performance tab
n Manage USB isochronous transfers for audio and video streams
The table below shows how the Autofind Hubs and Include IPv6 Addrs in Autofind options work
together to influence which Hubs can connect to the Manager.
Note You can manually add Hubs to the Known Hubs list. This can include Hubs that are on the same
network as your computer, or on a different network. You can also manually add Hubs with an IPv6 or
an IPv4 address, regardless of how the Include IPv6 Addrs in Autofind option is configured.
After you have added your Hubs to the known Hubs list, you should disable Autofind Hubs.
For an overview of this process, see Create initial list of Known Hubs.
Note For detailed information about the Autofind Hubs option, see Autofind Hubs and Include IPv6
Addrs in Autofind options.
The status of the Autofind Hubs option determines which Hubs can automatically connect to the
Manager.
To configure the Autofind Hubs option:
Note The list of Hubs that is automatically found is influenced by the configuration of
the Include IPv6 Addrs in Autofind option. Verify the status of the Include IPv6 Addrs
in Autofind option.
Note You can manually add IPv6 addresses to the the Known Hubs list and these are able to connect
to the Manager, regardless of the status of the Include IPv6 Addrs in Autofind option.
Note The status of the Include IPv6 Addrs in Autofind option is considered only if the Autofind
Hubs option is enabled.
Enabled Disabled Connection attempts using all discovered IPv4 addresses for
Hub, if any.
Disabled N/A The Autofind feature is not used. The only connection
attempts are from the Known Hubs list.
Note This option is considered only if the Autofind Hubs option is enabled.
n Enable: Both IPv4 and IPv6 addresses of Hubs discovered by Autofind are used to
attempt connections to the Manager.
This is the default.
n Disable: Only IPv4 addresses of Hubs discovered by Autofind are used to attempt
connections to the Manager.
5. Click Save.
Note The Hub local name is different from the default Hub name. For detailed information about the
default name, see Rename a Hub and the groups in a Hub.
Note The group local name is different from the default group name. For detailed information about
the default name, see Rename a Hub and the groups in a Hub.
n Auto-connect: If you have auto-connect enabled for the group, you are not allowed to
disconnect from the group. You have to first disable auto-connect, and then disconnect from
the group. The next time you log in to your computer, you will not be automatically connected
to this group.
n Power cycle on disconnect: The power cycle on disconnect feature ensures that when a
group is disconnected from a Hub, the Hub turns off power to all of the USB ports in the group
and then one second later turns it back on. This feature is globally enabled by default on the
Hub, so to be able to disconnect from a group, you need to globally disable the power cycle on
disconnect feature.
To disconnect from a group:
Note To ensure that you can no longer connect to a USB device in a group, the best method is to
move the port to a group on the Hub to which you are not connected. See Step 3: Name groups and
assign ports to a group.
Warnings
n Auto-connect: If you have auto-connect enabled for the group, you are not allowed to
disconnect from a USB device in the group until you disable auto-connect. If the USB device is
in a group to which you are connected, other users cannot connect the USB device after you
have disconnected from it, since you still own the group that the USB device is in. See Disable
auto-connect for a group.
n Power cycle on disconnect: If you have the power cycle on disconnect feature enabled, the
Hub automatically cycles the power to each USB device when it disconnects. To ensure that a
USB device remains disconnected, you must disable this feature. See Cycle the power to a
device when it disconnects from a PC.
To disconnect from a device in a group:
Note When you open the AnywhereUSB Manager, the Manager attempts to connect to the groups to
which you are allowed access. If someone else already owns the group, you will not be connected to
that group.
If you have auto-connect enabled for the group, it controls how you can disconnect:
n If auto-connect is enabled, you are not allowed to disconnect from the group. The Disconnect
from Group option cannot be selected. You have to first disable auto-connect, and then
disconnect from the group.
n You can disconnect from a USB device in the group, but if auto-connect is enabled, the device
is immediately re-connected.
For this to work as expected, you should also choose to automatically start the AnywhereUSB
Manager each time you start your computer. For example, you can enable auto-connect for a group
that has a camera connected to a port in the group. Every time the computer starts, the
AnywhereUSB Manager starts and automatically connects the camera to your computer.
(Optional) You can verify that the Hub was added to the list
1. Select the Hub and make a note of the IP address in the Hub status pane.
2. Select Configure > Known Hubs. The Known Hubs dialog appears.
3. Verify that the IP address for the Hub is in the list.
a. In the Hub TCP port (most systems should leave at default) field, a TCP port number is
entered by default. You can change this entry, but it is not recommended.
b. Click Standard to hide the Hub TCP port (most systems should leave at default) field.
6. Click OK. The Hub appears in the Hub list in the Known Hubs dialog.
7. Click Close to close the Known Hubs dialog. The AnywhereUSB Manager attempts to connect
to the new Hub.
Working with the known Hubs list and the Autofind Hubs option
You should be aware of how the Autofind Hubs option works with the Hubs you add to the known
Hubs list.
If you have the Autofind Hubs option selected for the Hub, when you open the
AnywhereUSB Manager, all Hubs connected to the same network as your computer are
automatically found and appear in the AnywhereUSB Manager. In addition, any Hubs you have
added to the known Hubs list are found and also appear.
Duplicate Connection
The "Duplicate Connection" message displays if a Hub is found twice and appears twice in the
AnywhereUSB Manager.
This occurs if you have added a Hub to the known Hub list that is on same network as your computer,
and you have the Autofind Hubs feature enabled. The AnywhereUSB Manager attempts both
connections, and the first one to connect will connect as expected. The second connection is
discovered as a duplicate, and the Manager closes that connection and red Xdisplays.
In this situation, the Hub added to the known Hubs list is considered a duplicate Hub, and should be
removed from the known Hubs list.
Note As an alternative, you can choose to hide a Hub that is automatically found. This ensures that
while the Hub is still automatically found, it does not appear in the AnywhereUSB Manager.
Note You can choose to automatically hide all unauthorized Hubs, which is a Hub that has failed to
connect to your computer. See Hide all unauthorized Hubs.
Note After you have hidden a Hub, you can choose to re-display it. See Display a hidden Hub.
Hide a Hub that does not currently display in the AnywhereUSB Manager
Note After you have hidden a Hub, you can choose to re-display it. See Display a hidden Hub.
a. In the Hub TCP port (most systems should leave at default) field, a TCP port number is
entered by default. You can change this entry, but it is not recommended.
b. Click Standard to hide the Hub TCP port (most systems should leave at default) field.
6. Click OK. The Hub appears in the Hub list in the Hidden Hubs dialog.
7. Click Close to close the Hidden Hubs dialog.
Note You can choose to automatically hide any individual Hub. See Hide an individual Hub.
Note After you have hidden unauthorized Hubs, you can choose to re-display unauthorized, hidden
Hubs. See Display unauthorized Hubs.
Note This can also be done using a CLI command: use all hub addresses
Note You cannot manually perform a refresh of the Hubs displayed in the
AnywhereUSB Manager.
n Wait for Hub response for .... sec: Specifies the time interval from the last discovery
refresh that the AnywhereUSB Manager will stop looking for more Hubs. Default and
minimum values are both 4 seconds.
n Send Keep-Alive every ... sec: Specifies how often the AnywhereUSB Manager sends
a keepalive request to the Hubs connected to the network. This impacts network
utilization because each AnywhereUSB Manager will send one packet at this interval
5. Click Save.
Note You can also configure the minimum TLS version in the Hub's web UI. See Configure
AnywhereUSB services.
n If Auto-register Hub Cert is enabled, the Manager stores the Hub certificate and connects to
the Hub.
n If Auto-register Hub Cert is disabled, the Manager rejects the connection the Hub.
For detailed information, see Configure the Auto-register Hub Cert feature.
Note This feature is only available for Windows 10 and newer, and Windows Server 2016 and newer.
Note You must restart your PC after configuration is complete to apply the configuration changes.
1. Power on the Hub and connect the USB device (or devices) to the desired USB ports.
For best results, you should connect all of the devices that you want to use.
2. Open the AnywhereUSB Manager.
3. Expand the Hub that has the group or groups that contain the USB ports to which you have
connected devices.
4. Connect to the group or groups that contain the connected devices.
a. Right-click on the group name.
b. Click Connect to the Group.
c. Repeat for all groups.
5. Choose Configure > Device to Port Assignment. The Device Address to Port Assignment
dialog displays. A list of the devices connected to the groups displays.
n Host: The name of the Hub.
n Device: The identifier assigned to the device by the Hub.
n Port: Virtual port number assigned internally by the AnywhereUSB Manager. The
assign device address feature allows you to use the same virtual port number on every
connect.
6. Select the devices that you want to pin to a virtual port number.
Click on one port, or press the CTRL key to select multiple ports. When selections are
complete, click Assign. To select all of the ports, click Assign All. The assigned ports are
bolded.
7. To remove a selected port from the list:
Click on the port that you want to unassign, or press the CTRL key to select multiple ports.
When selections are complete, click Unassign. To de-select all of the ports, click Unassign All.
8. Select the Show Assign Port in Device Menu option to display the assigned virtual port
number in the AnywhereUSB Manager USB Device Status pane.
Note If you change any options in the Performance tab, you must restart the AnywhereUSB
Manager to apply the change.
Note You can also create a debug log file using the USB Debug Logging Wizard, which is accessed
from the web UI. See Create a debug log file with the USB Debug Logging Wizard.
Note If you installed the AnywhereUSB Manager in service mode, you must have
Administrator rights on the computer to copy the file.
Note The Latency Graph menu item is not available when the AnywhereUSB Manager is installed in
service mode.
3. Right-click on the service to display the shortcut menu, and click Start. The Status for the
service changes to Running.
$ anywhereusb-headless stop
$ anywhereusb-headless
Note To start the awusbmanager-headless at boot, you will need to create and add a systemd
startup script.
Cycle the power to a USB device connected to the Hub from the
AnywhereUSB Manager
This feature enables you to cycle the power to a selected USB device from the
AnywhereUSB Manager.
The USB device can be connected directly to the AnywhereUSB Hub or to a downstream USB hub.
Cycling the power has the same effect as removing the USB device from the Hub and then
reconnecting it. When you use this feature, the power supplied by the port to the USB device is turned
off for 1 second and then turned on. The USB device you choose to power cycle must be assigned to a
group that you are allowed to access.
If an externally powered USB device (one that is not powered by the Hub) is connected to the Hub,
the power cycle feature may have no effect on the USB device.
Note You can also cycle the power to a selected USB device using the power cycle CLI command.
Note Additional power cycle methods are available. See Power cycle feature.
Note You can also power cycle a port using the powercycle port CLI command.
Note Additional power cycle methods are available. See Power cycle feature.
Note This feature is disabled by default on the AnywhereUSB Plus 24 variant without Wi-Fi. If your
device has a serial number greater than or equal to AW24-010000, this feature can be enabled.
Otherwise, the feature does not work as expected and should not be enabled.
When a disconnect occurs, the Hub turns off power to the device and then one second later turns it
back on. The re-powered device is then ready to make a new connection to the same or a different
PC. Note that if the PCis connected to the group, the USB device can only reconnect to that same PC.
Disconnects happen when:
n A device is manually disconnected from the PC.
n From the AnywhereUSB Manager, expand a Hub to display the groups connected to the PC.
Right-click on a device in a group and select Disconnect Device to disconnect the device from
the PC. This menu option is not available if a PC is not connected to the group. The power to
the device is cycled and the device reconnects to the same PC.
n A group of devices is disconnected from the Hub
From the AnywhereUSB Manager, expand a Hub to display the groups. Right-click on a group
and select Disconnect from Group. The power to all of the USB devices in the group is cycled
and the group waits to be connected to the same or a different PC.
n PC and/or the Hub reboots
If the PCand/or the Hub reboots, then after the keepalive timeout occurs, all of the USB
devices that were connected to that PCare power cycled.
n PCand/or the Hub loses connection to the network
If the PCand the Hub lose network connectivity, then the USB devices that were connected to
that Hub are power cycled if the connectivity is not restored before the keepalive timeout
occurs. The groups are then ready to connect to the same or a different PC.
Considerations
The following examples explain situations in which this feature does not work as expected.
n If you have self-powered USB devices, then this feature will not be able to power cycle this
device. An example is a hard drive with a power cord plugged into a power source other than
the Hub.
n If you have devices connected on a downstream USB hub and the hub does not support USB
power control, then the feature will not cycle those devices.
Note Additional power cycle methods are available. See Power cycle feature.
Note This feature is disabled by default on the AnywhereUSB Plus 24 variant without Wi-Fi. If your
device has a serial number greater than or equal to AW24-010000, this feature can be enabled.
Otherwise, the feature does not work as expected and should not be enabled.
Note You can also disable this feature using the power_cycle_on_unbind CLI command.
Service Settings
Click Service Settings to expand this section.
Item Description
Enable Click Enable to enable the AnywhereUSB service.
Port Specify the port number that is used to access the Hub. The default
value is 18574. If you change the port number you must also change
the corresponding port number on your computer.
Enable USB debug logging Select this option to enable USB debug logging. This feature should
only be used when working with Digi Technical Support to debug an
issue.
Group Settings
Click Group Settings to expand this section. In this section you can name groups and assign USB
ports to the groups.
For instructions, see Step 3: Name groups and assign ports to a group.
Item Description
Group Description A free-form description of a group. You can type over the default
description.
One row displays for each group, and 2 groups are available.
The Unassigned group row is used for any port that is not assigned
to a group.
Item Description
Port Assignments Specify the USB ports in each group. Each port on a Hub can be
assigned to only one group. Ports that are not assigned to a group
can be put in the Unassigned group.
Client Settings
Click Client Settings to expand this section and display information about the clients that can
connect to the Hub.
For more information, see Configure and manage client IDs.
Item Description
Select a client to configure Select the existing client that you want to update or remove.
n Edit: Click Edit to update the selected client.
n Remove: Click Remove to remove the selected client.
Client ID The client ID is a unique identifier assigned to a user account the
first time a user logs in to a computer and opens the
AnywhereUSB Manager. During this process, the AnywhereUSB
Manager creates a secure identity certificate that is associated with
the client ID. This certificate is used to validate your user account
with the Hub.
See Configure and manage client IDs.
Certificate The status of the certificate associated with the client ID. This
certificate is used to validate your user account with the Hub.
The Certificate value is Unavailable until certificates have been
exchanged between the computer and the Hub. After this occurs,
the Certificate value is updated to Available.
See Configure a client ID.
Description A free-form description of the client.
Group Access The groups that this client is allowed to access. The USB ports in
the group can be accessed by this user account.
See Configure a client ID.
Add Client Click Add Client to manually add a new client ID.
See Manually add a client ID.
Automatically Register This feature is not currently implemented.
Unknown Clients
You can access this page in two ways from the web UI:
n Click Dashboard, and then click Show Details in the AnywhereUSB Service pane.
n Click Status > Services > AnywhereUSB.
USB Devices
Click USB Devices to expand this section and display information about the USB devices connected
to the AnywhereUSB Hub.
Item Description
Click the (configuration) icon in the upper right corner of the page
configuration icon to access the AnywhereUSB Configuration page. See
AnywhereUSB Configuration page for more information.
Port The number of the USB port to which the USB device is connected.
Serial number The serial number of the USB device, if supplied by the device.
Cycle Click Cycle to power off the port for 3 seconds, and then power it
back on. For more information, see Cycle the power to a port on a
Hub from the web UI.
Groups in Use
Click to expand this section and display information about the groups connected to the AnywhereUSB
Hub.
Item Description
Click the (configuration) icon in the upper right corner of the page
configuration icon to access the AnywhereUSB Configuration page. See Configure and
manage the AnywhereUSB Hub in the web user interface for more
information.
Group A group to which the client has connected. See Connect to a group
or USB device in the AnywhereUSB Manager.
Client ID The unique identifier of the client that has connected to this group.
For more information, see Client ID overview.
IP Address The network address of the client's computer.
Blocked Client
Click Blocked Client to block a client ID from connecting to a device group or groups.
The first section displays information about the client IDs that are currently blocked.
Item Description
Client ID A client ID that is currently blocked.
Blocked Groups The number of groups from which the client ID is blocked.
Expiration The remaining time for the block.
Unblock When a client ID is blocked, the Unblock button displays. Click
Unblock to remove the block before the default time period.
For more detailed information, see Unblock a client ID.
Click the (configuration) icon in the upper right corner of the page
configuration icon to access the AnywhereUSB Configuration page. See
AnywhereUSB Configuration page for more information.
Item Description
Client ID From the Client ID list box, select the client ID that you want to
block.
Block Groups Select the group(s) that you want to block for the client ID. All of the
groups are selected by default.
You can enter the groups in the Block Groups field, or click on a
group from the group options below the field to deselect it.
Apply Click Apply to the block the selected client ID from the selected
group(s).
Debug Logging
Click Debug Logging to expand this section and access the USB Debug Logging Wizard.
Item Description
Debug Logging Wizard Click Debug Logging Wizard to launch the USB Debug Logging
Wizard. See Create a debug log file with the USB Debug Logging
Wizard.
Note A USB device does not have a name that can be changed. However, a local name can be
assigned to a USB device in the AnywhereUSB Manager. See Assign a local name to a USB device.
The default Hub name and group name can be seen by every user that connects to the Hub. You can
also give a Hub and groups a local name that can be see only by the user that assigns the name. See
Assign a local name to a Hub and Assign a local name to a group.
Note Only administrators can rename the Hubs and the groups.
Note The name can consist of the following characters: 0-9, A-Z, a-z, dash (-), or period (.). You cannot
use spaces, underscores (_), comma (,), forward slash (/), or ampersand (&).
3. Expand System.
4. In the Name field, enter a descriptive name for the Hub. The name cannot have spaces or
underscores.
5. Click Apply.
Rename a group
You can rename a group in the AnywhereUSB page in the web UI.
By default, a group is named "Group" appended by a consecutive number, such as Group 1. The group
name displays in the Group Name field in the Group Status pane in the AnywhereUSB Manager.
Note You can have up to 255 client IDs in the client list.
Configure a client ID
You can assign a descriptive name to a client ID in the client list, and update the groups the client ID is
allowed to access. The client ID can access all of the ports in the specified groups, as defined in the
Group Settings section.
Note If needed, you can also add additional client IDs to the list.
Note The Certificate value is Unavailable until certificates have been exchanged between the
computer and the Hub. After this occurs, the Certificate value is updated to Available.
Note You can have up to 255 client IDs in the client list.
After you have added a client ID, the certificate is unavailable until the first time a computer with the
new client ID connects to the Hub. For more information about client IDs, see Client ID overview.
When the computer connects to the Hub for the first time, the credentials are exchanged between the
computer and the Hub. After the initial connection, only that computer with the client ID and unique
identity certificate is able to connect to the Hub. Any other computer with the same client ID will be
rejected. For information about computers with the same client ID, see AnywhereUSB Manager client
ID is not unique.
WARNING! Digi recommends that you use a private network to connect the computer to
the Hub. This ensures that only clients IDs with known user credentials can connect to the
Hub. The first time that a client ID on a computer connects to the Hub, the unique
credentials for this known user are stored in your Hub. If you do not use a private network,
an unknown computer with the same client ID may happen to connect to the Hub before
the known computer connects. In this case, the known computer will not be able to
connect and authenticate.
Note Digi recommends disabling the Automatically Register Unknown Clients option if you choose
to manually add multiple client IDs to the client list. See Automatically reject unknown clients.
4. Click Add Client. A new row labeled "New Client" is added to the client list and the Settings
for Client section is populated for the new client.
5. Enter information about the client ID in the Settings for Client "New Client" section.
a. In the Client ID field, enter the client ID for the computer.
b. In the Description field, enter a descriptive name for the client ID.
c. Click the check box next to a group to which the computer is allowed access. As you select
groups, the selected group numbers appear in the Group Access field in the Settings for
Clients section.
Note The Certificate value is Unavailable until certificates have been exchanged between the
computer and the Hub. After this occurs, the Certificate value is updated to Available.
Remove a client ID
You can remove a client ID from the client list when a user logged in to a computer should no longer
have access to the Hub.
Note If you have selected the Automatically Register Unknown Clients option, any client ID
removed from the list is automatically added to the client list again the next time the computer tries
to connect.
Client ID overview
The client ID is a unique identifier for the computer that you assign when you initially install the
Anywhere USB Manager. When you launch the Manager for the first time and log in, the Manager
creates a secure identity certificate that is associated with the client ID. This certificate is used to
validate your account with the Hub.
n Stand-alone: If you installed the Manager as a stand-alone, the client ID and the certificate
identify the user on the computer.
n Service: If you installed the Manager as a service, the client ID and the certificate identify the
computer.
When the client ID and certificate have been created, the computer is able to connect to the Hubs that
recognize that client ID. Any other computer with the same client ID will be rejected.
Note In some cases, multiple computers may inadvertently be used by multiple users that have the
same client ID. To fix this issue, see AnywhereUSB Manager client ID is not unique.
Client ID length
The number of characters allowed in the Client ID field is variable and is dependent on UTF-8
encoding of the characters. Note that some characters are multi-byte characters, which reduces the
number of characters that are allowed in the field. Currently, the Client ID field is a maximum of 63
bytes encoded in UTF-8.
WARNING! Digi recommends that you use a private network to connect the computer to
the Hub. This ensures that only clients IDs with known user credentials can connect to the
Hub. The first time that a client ID on a computer connects to the Hub, the unique
credentials for this known user are stored in your Hub. If you do not use a private network,
an unknown computer with the same client ID may happen to connect to the Hub before
the known computer connects. In this case, the known computer will not be able to
connect and authenticate.
Note If the user deselects the Launch AnywhereUSB Manager option during installation, the
AnywhereUSB Manager does not automatically open after the installation process completes.
In this case, the client ID dialog does not display.
n New user logs in: After the AnywhereUSB Hub software is installed, any user can log into that
computer and open the AnywhereUSB Manager. The first time a new user opens the
AnywhereUSB Manager, the client ID dialog appears. The user must enter a client ID before
the AnywhereUSB Manager will open.
After the initial launch of the AnywhereUSB Manager, the next time the user logs in, the computer is
able to connect to the Hubs that recognize that client ID.
Clients option is disabled by default, meaning that computers that have not previously connected to
the Hub are rejected, and cannot connect to the Hub.
You can enable this feature so that client IDs for an unknown computer are automatically added to
the client list for the Hub. When any AnywhereUSB Manager starts (stand-alone) or is running as
service and the Hub is visible, that Manager's client ID is added to the Hub's configuration.
n Disable (this is the default): Automatically reject unknown clients
n Enable: Automatically register unknown clients
Additional considerations
Specify groups for an automatically registered client
You can specify the groups which the automatically registered clients can access. By default, when the
client connects to the Hub, that user has access to the ports in those groups. If you do not specify
groups, the user can connect to the Hub but does not have access to any ports on the Hub until you
manually assign groups to that client ID.
If the auto-register feature is enabled on any network (secure or insecure), be aware that
any client that has the AnywhereUSB Manager installed is able to connect to the Hub and
access all USB devices in the groups that allow access to automatically registered clients.
Note This feature is inherently insecure. Digi recommends that you disable the Automatically
Register Unknown Clients option and manually add client IDs to the list. See Manually add a client
ID.
n Secure network: If the Hub is on a secure network, you may want to enable this feature for
the initial set up, when many clients are connecting to the Hub. Once initial set up is complete,
you can disable this feature and then manually add client IDs to the Hub. This method gives
you more control over the clients that can connect to the Hub.
If you choose to not disable this feature after initial set up, any new clients that install the
AnywhereUSB Manager are able to automatically connect to the Hub.
n Insecure (public) network: If the Hub is on an insecure or a public network, you should keep
the auto-register feature disabled, to ensure that you have control over the clients that
connect to the Hub. This method helps to eliminate access from an unwanted client to your
Hub and any devices connected to the Hub.
Note A red Xmay display in other situations as well. See Red Xicon next to a Hub in the
AnywhereUSB Manager.
Note This feature is inherently insecure. Digi recommends that you disable the Automatically
Register Unknown Clients option and manually add client IDs to the list. See Manually add a client
ID.
To confirm that a client ID has been added automatically, you can review the client ID list.
Specify groups for an automatically registered client
You can specify the groups which the automatically-registered clients can access. If you do not specify
groups in the auto-register feature, you can manually configure group access to the client.
By default, the client will have access to the ports in the groups specified in the Group Access field.
To ensure that the automatically registered clients are given access to the desired ports, you should
verify which ports are assigned to each group.
If needed, you can change the groups for the client in the Hub configuration after the client ID has
been registered.
Note If you do not specify groups you can manually give that client access to selected groups
after they have been registered with the Hub. See Configure a client ID.
Block a client ID
You can temporarily block a client ID from being able to connect to the devices in a group or a set of
groups. This feature is useful if you need to control which client IDs can access the devices in a group
or groups. The client ID is blocked for the default time period.
When you apply a block, the client ID is automatically disconnected from the devices in the group(s)
selected for the block. During the block time period, the client ID can't manually reconnect to the
devices in the blocked group, and auto-connect is suspended. Another client ID can connect to the
group during the block time period.
You can block a client ID that is already blocked. Any existing block is replaced by the new block, and
the default block time period starts over. This is useful if you need to change the groups included in
the block or if you need to extend the block time period.
Note Only a Hub administrator can access the AnywhereUSB Status page and block a client ID.
Unblock a client ID
You can unblock a client ID before the default block client ID time limit is reached.
When a client ID is unblocked, any group that has auto-connect enabled automatically reconnects.
The client ID can also manually reconnect to devices in the previously blocked groups.
Note Only a Hub administrator can access the AnywhereUSB Status page and unblock a client ID.
3. In the Client block duration field, enter the default time period.
n Default: 10 minutes
n Maximum: 100 hours
n Minimum: 30 seconds
4. Click Apply to save the changes.
USB Devices
Click USB Devices to expand this section and display information about the USB devices connected
to the AnywhereUSB Hub.
Item Description
Click the (configuration) icon in the upper right corner of the page
configuration icon to access the AnywhereUSB Configuration page. See
AnywhereUSB Configuration page for more information.
Port The number of the USB port to which the USB device is connected.
Serial number The serial number of the USB device, if supplied by the device.
Cycle Click Cycle to power off the port for 3 seconds, and then power it
back on. For more information, see Cycle the power to a port on a
Hub from the web UI.
Groups in Use
Click to expand this section and display information about the groups connected to the AnywhereUSB
Hub.
Item Description
Click the (configuration) icon in the upper right corner of the page
configuration icon to access the AnywhereUSB Configuration page. See Configure and
manage the AnywhereUSB Hub in the web user interface for more
information.
Group A group to which the client has connected. See Connect to a group
or USB device in the AnywhereUSB Manager.
Client ID The unique identifier of the client that has connected to this group.
For more information, see Client ID overview.
IP Address The network address of the client's computer.
Blocked Client
Click Blocked Client to block a client ID from connecting to a device group or groups.
The first section displays information about the client IDs that are currently blocked.
Item Description
Client ID A client ID that is currently blocked.
Blocked Groups The number of groups from which the client ID is blocked.
Expiration The remaining time for the block.
Unblock When a client ID is blocked, the Unblock button displays. Click
Unblock to remove the block before the default time period.
For more detailed information, see Unblock a client ID.
Click the (configuration) icon in the upper right corner of the page
configuration icon to access the AnywhereUSB Configuration page. See
AnywhereUSB Configuration page for more information.
Item Description
Client ID From the Client ID list box, select the client ID that you want to
block.
Block Groups Select the group(s) that you want to block for the client ID. All of the
groups are selected by default.
You can enter the groups in the Block Groups field, or click on a
group from the group options below the field to deselect it.
Apply Click Apply to the block the selected client ID from the selected
group(s).
Debug Logging
Click Debug Logging to expand this section and access the USB Debug Logging Wizard.
Item Description
Debug Logging Wizard Click Debug Logging Wizard to launch the USB Debug Logging
Wizard. See Create a debug log file with the USB Debug Logging
Wizard.
Prerequisites
n Access to the Hub from your computer using one of these options:
l An Ethernet cable must be connected to the Hub and your computer.
l Both your computer and Hub must be connected to your private network.
n A power supply must be connected to the Hub and the Hub powered on.
n Determine the IP address that you want to assign to the Hub.
To configure your laptop and assign an IP address to the Hub:
3. Click Properties. The Internet Protocol Version 4 (TCP/IPv4) Properties dialog appears.
4. Select Use the following IP address.
Note IMPORTANT: Make note of the current IP address entries for IP address, Subnet mask,
and Default gateway. You will need this information to complete the final step of the process.
6. Click OK.
7. Open a browser window.
8. Enter the default gateway IP address to access the Hub: 192.168.210.1. The Hub login screen
displays.
9. Log into the Hub using the default user name and password. The default user name is admin
and the default password is printed on the bottom label of the device and on the loose label
included in the package. If the defaults to not work, they may have been changed. Confirm this
information with your system administrator.
10. Update the IP address for the device.
11. On your PC, revert the IP address information to the original entries.
a. Return to the Internet Protocol Version 4 (TCP/IPv4) Properties dialog.
b. Enter the original IP address entries for IP address, Subnet mask, and Default gateway.
c. Click OK.
Create a debug log file with the USB Debug Logging Wizard
You can use the USB Debug Logging Wizard to help you collect debug logs when you are having
issues with a USB device connected to a Hub. When the wizard process is complete, you can send the
debug logs to Digi Technical Support.
Note You should create a debug log file only at the direction of Digi Tech Support.
During the process, the Enable USB debug logging option is temporarily enabled to allow USB debug
logging. When the wizard is completed, the option is disabled. For information about this option, see
AnywhereUSB Configuration page.
During the process, two log files are created, and you should send both of these to Digi Tech Support.
n USB Debug Log: The USB debug log file is created by running the USB Debug Logging Wizard
from the Hub's web UI: usbtrace.tar.gz
n AnywhereUSB Manager Support Log: The support log is created from the AnywhereUSB
Manager: awusbmanager_support.bin.
Note The location of the saved files displays in a dialog after the files have been completed and
downloaded. The file is overwritten each time you create a new log file. If you want to save a file
before it is overwritten, rename the file or move it to a different location.
Note Be sure to note which USB device(s) are currently plugged into which USB port(s) of the
Hub as you unplug the devices. This ensures that you can plug each device into the same USB
port when the testing procedure is complete.
2. Reboot the Hub. This ensures that the log files are as helpful as possible.
n Choose Help > Create Support File. The support file is created: awusbmanager_
support.bin
n When complete, a dialog displays, showing you the location of the file. Make a note
of the file location and click OK to close the dialog.
10. Download the debug logging file from the USB Debug Logging Wizard.
a. Click Next to move to the next page of the USB Debug Logging Wizard.
b. Click Download Logs to download the debug log file: usbtrace.tar.gz
11. Click Next in the USB Debug Logging Wizard to review the final instructions. You will do these
in Step 3.
12. Click Finish to close the USB Debug Logging Wizard.
13. Copy the files created in step 9 (support file from the Manager) and step 10 (debug log file
from the USB Debug Logging Wizard) to a known location.
Step 3: Send log files to Digi Tech Support and reconnect USB devices to your
Hub.
1. Navigate to the known location where you saved the log files.
2. Combine the usbtrace.tar.gz and awusbmanager_support.bin files into a .zip file.
3. Email the zipped file to Digi Technical Support.
a. From the Digi Tech Support case documenting the issue, open an email reply to Digi
Technical Support.
b. In the body of the email, enter the wall clock time of the occurrence that you just collected
and your time zone.
c. Attach the .zip file.
If the resulting .zip file is too large for email, the Digi Tech Support Engineer you're
working with can provide a Box folder so you can upload the files. Please coordinate as
necessary.
d. Send the email reply.
4. Physically reconnect all of the USB devices to the Hub that you had disconnected from the
Hub.
Note Be sure to plug each device into the same USB port it originally was plugged into. This
ensures that Hub is restored to normal operation.
User roles
The actions that users can perform in the AnywhereUSB Manager and in the AnywhereUSB Hub's
web UI are determined by the user's access rights.
n Windows Administrator: A user must have Windows administrative rights to be able to install
the AnywhereUSB Manager in either service or stand-alone mode.
n Hub Administrator: A Hub Administrator must have the AnywhereUSB Hub's user name and
password to be able to log into the Hub's web UI to configure the Hub.
n User: A user can access the AnywhereUSB Manager to configure the Manager and access
devices connected to the Hub. A user does not have the Hub's user name and password and
cannot access the Hub's web UI.
Windows
Action User Administrator
Install the AnywhereUSB Manager X
Uninstall the AnywhereUSB Manager X
Launch the AnywhereUSB Manager X X
Configure the AnywhereUSB Manager X X
Manage devices connected to the Hub in the AnywhereUSB Manager X X
In the AnywhereUSB Manager, see the devices connected to the Hub X X
that are in the groups to which you have access
In the AnywhereUSB Manager, use the devices connected to the Hub X X
that are in the group assigned to your client ID
Send commands using the AnywhereUSB Manager command line X X
Note When installed in service mode, the Manager runs only if the user logged into the computer has
Windows Administrator credentials.
Windows
Action User Administrator
Install AnywhereUSB Manager X
Uninstall the AnywhereUSB Manager X
Launch the AnywhereUSB Manager X
Configure the AnywhereUSB Manager X
Manage devices connected to the Hub in the AnywhereUSB Manager X
In the AnywhereUSB Manager, see the devices connected to the Hub X
that are in the groups assigned to your client ID
Windows
Action User Administrator
In the AnywhereUSB Manager, use the devices connected to the Hub X
that are in the groups assigned to your client ID
Send commands using the AnywhereUSB Manager command line X
Start and stop the AnywhereUSB Service from the Windows OS X
Note If you need to configure the Hub, see your system administrator for the Hub's login credentials.
Hub
Administrator
Terminology
Role Description
Computer The physical or virtual equipment (such as a PC, laptop, or virtual
machine), which is used to remotely access the AnywhereUSB Plus
Hub.
Client ID The client ID is a unique identifier assigned to a user account the first
time a user logs in to a computer and opens the
AnywhereUSB Manager.
During this process, the AnywhereUSB Manager creates a secure
identity certificate that is associated with the client ID. This certificate
is used to validate your user account with the Hub. For more
information, see Client ID overview.
Group A group is a set of USB ports on an AnywhereUSB Plus Hub with
exclusive access to a single user account. Each USB port can be
assigned to only one group by the Hub administrator.
When you log into the computer and connect to a Hub, you are
allowed to connect to any groups assigned to your client ID.
See Create groups and assign client IDs to the groups for more
information.
Client ID overview
The client ID is a unique identifier for the computer that you assign when you initially install the
Anywhere USB Manager. When you launch the Manager for the first time and log in, the Manager
creates a secure identity certificate that is associated with the client ID. This certificate is used to
validate your account with the Hub.
n Stand-alone: If you installed the Manager as a stand-alone, the client ID and the certificate
identify the user on the computer.
n Service: If you installed the Manager as a service, the client ID and the certificate identify the
computer.
When the client ID and certificate have been created, the computer is able to connect to the Hubs that
recognize that client ID. Any other computer with the same client ID will be rejected.
Note In some cases, multiple computers may inadvertently be used by multiple users that have the
same client ID. To fix this issue, see AnywhereUSB Manager client ID is not unique.
Client ID length
The number of characters allowed in the Client ID field is variable and is dependent on UTF-8
encoding of the characters. Note that some characters are multi-byte characters, which reduces the
number of characters that are allowed in the field. Currently, the Client ID field is a maximum of 63
bytes encoded in UTF-8.
WARNING! Digi recommends that you use a private network to connect the computer to
the Hub. This ensures that only clients IDs with known user credentials can connect to the
Hub. The first time that a client ID on a computer connects to the Hub, the unique
credentials for this known user are stored in your Hub. If you do not use a private network,
an unknown computer with the same client ID may happen to connect to the Hub before
the known computer connects. In this case, the known computer will not be able to
connect and authenticate.
Note If the user deselects the Launch AnywhereUSB Manager option during installation, the
AnywhereUSB Manager does not automatically open after the installation process completes.
In this case, the client ID dialog does not display.
n New user logs in: After the AnywhereUSB Hub software is installed, any user can log into that
computer and open the AnywhereUSB Manager. The first time a new user opens the
AnywhereUSB Manager, the client ID dialog appears. The user must enter a client ID before
the AnywhereUSB Manager will open.
After the initial launch of the AnywhereUSB Manager, the next time the user logs in, the computer is
able to connect to the Hubs that recognize that client ID.
Prerequisites
Before you begin, you should decide whether you want to run the AnywhereUSB Manager as a
stand-alone or as a service. For detailed information, see Service.
CAUTION! Only a Windows Administrator can perform the software install. If you are logged
in as a non-Windows Administrator user and you attempt to install the software, you will be
required to enter Windows Administrator login credentials to be able to complete the
installation process.
1. Download the AnywhereUSB Manager installer from the AnywhereUSB Drivers section of the
support page.
a. Navigate to the AnywhereUSB Plus support page.
b. Click the Product Resources tab. This should be selected by default.
c. In the Drivers & Patches section, click the AnywhereUSB Manager link.
d. From the drop-down list box, select Microsoft Windows.
e. Click the download link for the version of the installer than you want to download. Make a
note of the version number for future reference.
Note You should save the downloaded software to your computer before you start the
install process. This is useful if you decide to uninstall the AnywhereUSB Manager from
the original installer in the future.
Note You can also uninstall the AnywhereUSB Manager using the AnywhereUSB Manager installer.
See Uninstall the AnywhereUSB Manager on a Windows OS using the original installer.
1. If you have a client AnywhereUSB Manager window open, you must exit the Manager.
a. Navigate to the Manager.
b. Choose File > Exit. The Manager closes.
2. Open the Windows Control Panel and select Programs > Progams and Features.
3. Find Digi AnywhereUSB Manager in the list, and right-click on the name to display the
shortcut menu.
4. Click Change. The AnywhereUSB Manager installation wizard appears.
5. Click Next. The Program Maintenance window appears.
6. Select the Remove option.
7. Click Next. The Remove the Program screen appears.
8. Make sure that Remove User Configuration is not selected. This preserves your current
configuration.
9. Click Remove.
10. Click Finish.
n Linux
n Windows 2019 Server Core edition
To uninstall the AnywhereUSB Manager from a Windows OS:
1. Locate the AnywhereUSB Manager installer. You must run the same version of the installer to
uninstall the AnywhereUSB Manager that you used to install it.
n If you saved the installer when you originally installed the AnywhereUSB Manager,
navigate to that location on your computer.
n If you did not, you can download the installer from the Support Tools website.
a. Navigate to https://www.digi.com/support#support-tools.
b. From the Support Downloads section, click Drivers.
c. Find and select AnywhereUSB Plus from the product list.
d. Select your AnywhereUSB Plus model.
e. Select and download the appropriate software for your operating system.
2. Click on the downloaded software to launch the AnywhereUSB Manager installation wizard.
The Welcome screen appears.
7. Click Remove. If the AnywhereUSB Manager is open, the following dialog displays. Do not
change the default settings.
Prerequisites
n Powershell must be installed on your Windows server. Powershell is used to get the identifying
number for the AnywhereUSB Manager.
n Make sure that your Windows OS is updated to the latest version available.
To uninstall the AnywhereUSB Manager:
Note Be sure to include the double-quotes before and after the bracketed command. The
identifying number is an example so do not copy and paste the command.
3. Press Enter to launch the AnywhereUSB Manager window. The Welcome screen displays.
4. Follow the standard Windows uninstall process to complete the removal of the AnywhereUSB
Manager. For instructions, see Uninstall the AnywhereUSB Manager on a Windows OS using
the original installer and begin at Step 3.
$ anywhereusb-headless stop
$ anywhereusb-headless
Note To start the awusbmanager-headless at boot, you will need to create and add a systemd
startup script.
Note For installations using the rpm -i, see /usr/share/doc/awusbmanager/README for more
information.
The awusbmanager and awusbmanager-headless packages can be installed over each other and will
replace the previously installed package.
Troubleshooting an update
n If the update does not appear to be installed correctly, Digi recommends uninstalling and then
installing the awusbmanager package.
n If a newer version of the awusbmanager package is currently installed on your PC, Digi
recommends uninstalling any old awusbmanager package before installing this version.
n A reboot may be required after you have installed the awusbmanager package to ensure that
the user is able to properly manage AnywhereUSB.
2. Once the uninstall is complete, you can re-install the awusbmanager packagee. See Install the
AnywhereUSB Manager: Linux.
Note When you open the AnywhereUSB Manager, the Manager attempts to connect to the groups to
which you are allowed access. If someone else already owns the group, you will not be connected to
that group.
Note Digi recommends that you create new client IDs and assign groups from the web UI. See
Manually add a client ID.
> config
(config)> service anywhereusb clients
(config service anywhereusb clients)> add end
(config service anywhereusb clients 0)> id client1
(config service anywhereusb clients 0)> descripton "lab computer"
(config service anywhereusb clients 0)> groups
(config service anywhereusb clients 0 groups)> add end group01
(config service anywhereusb clients 0 groups)> add end group02
(config service anywhereusb clients 0 groups)> save
Configuration saved.
Syntax
>awusbmanager autoconnect clear all
Examples
Run the list command to verify the current state of the auto-connect feature for the Hubs, groups, and
devices. In this example, Group 1 has auto connect enabled, and the device in Group 1 has inherited
the auto connect feature.
AW02-000001 (AW02-000001.local.:18574)
Group 2 (AW02-000001.2)
* Group 1 (AW02-000001.1) (In-use by you)
+ U3 Cruzer Micro (AW02-000001.1101)
Run the list command again to verify that the auto connect feature has been disabled. No asterisks or
plus signs should display.
AW02-000001 (AW02-000001.local.:18574)
Group 2 (AW02-000001.2)
Group 1 (AW02-000001.1) (In-use by you)
U3 Cruzer Micro (AW02-000001.1101)
Note For more information about auto connect, see Configure the auto-connect feature for a group.
Syntax
>awusbmanager autoconnect clear group,<address>
Parameters
address: The address of the group for which you want to disable the auto connect feature.
Examples
Run the list command to verify the current state of the auto-connect feature for a group and to
determine the address for a group. In this example, Group 1 has the auto connect feature enabled, so
an asterisk displays next to the group name.
The [address] for a group is the name of the Hub appended by the number of the group. In this
example, the auto connect feature will be disabled for Group 1, so the group name is highlighted
below.
AW02-000001 (AW02-000001.local.:18574)
Group 2 (AW02-000001.2)
* Group 1 (AW02-000001.1) (In-use by you)
+ U3 Cruzer Micro (AW02-000001.1101) (In-use by you)
Run the list command again to verify that the auto connect feature has been disabled. In this
example, the auto connect feature has been disabled for Group 1, so an asterisk no longer displays
next to the group name. In addition, the plus sign no longer displays next to the devices in Group 1.
Note If you were connected to the group and the devices in the group, you will still be connected. If
you want do disconnect from them, you can use the disconnect group command.
AW02-000001 (AW02-000001.local.:18574)
Group 2 (AW02-000001.2)
Group 1 (AW02-000001.1) (In-use by you)
U3 Cruzer Micro (AW02-000001.1101) (In-use by you)
autoconnect group
Enable the auto-connect feature for a specified group. This feature ensures that when you start the
AnywhereUSB Manager as a stand-alone or when it starts at Windows start-up if installed as a
service, you are automatically connected to all of the groups to which you are allowed access that
have auto connect enabled.
When you enable auto-connect for a group, an asterisk displays next to the group name. In addition,
any devices in the group inherit the auto connect feature, and will also be automatically connected. A
plus sign displays next to the devices when the auto-connect feature is inherited.
You can disable the auto-connect feature for the group if needed.
Note For more information about auto connect, see Configure the auto-connect feature for a group.
Syntax
>awusbmanager autoconnect group,<address>
Parameters
address: The address of the group for which you want to enable the auto connect feature.
Examples
Run the list command to verify the current state of the auto-connect feature for a group and to
determine the address for a group. In this example, Group 2 has the auto connect feature enabled, so
an asterisk displays next to the group name. The auto connect feature is not enabled for Group 1, so
an asterisk does not display.
The [address] for a group is the name of the Hub appended by the number of the group. In this
example, the auto connect feature will be enabled for Group 1, so the group name is highlighted
below.
AW02-000001 (AW02-000001.local.:18574)
* Group 2 (AW02-000001.2) (In-use by you)
Group 1 (AW02-000001.1) (In-use by you)
U3 Cruzer Micro (AW02-000001.1101)
Run the list command again to verify that the auto connect feature has been enabled. An asterisk
displays next to the group name. A plus sign displays next to the names of the devices in the group to
show that the auto connect feature is inherited from the group.
AW02-000001 (AW02-000001.local.:18574)
* Group 2 (AW02-000001.2) (In-use by you)
* Group 1 (AW02-000001.1) (In-use by you)
+ U3 Cruzer Micro (AW02-000001.1101( (In-use by you)
autofind
Enables and disables the autofind feature. When enabled, all Hubs connected to the network when
AnywhereUSB Manager launches are automatically found. This command works as a toggle, or you
can can specify "on" or "off." Before you used the command, you should verify the status of the
autofind feature.
The status of the autofind feature is displayed when you run the list command.
Note For information about this feature in the AnywhereUSB Manager, see Autofind Hubs and
Include IPv6 Addrs in Autofind options.
Syntax
>awusbmanager autofind[,on|,off]
Parameters
on: Enables the autofind feature. When enabled, all Hubs connected to the network when
AnywhereUSB Manager launches are automatically found. This option is not required.
off: Disables the autofind feature. When disabled, Hubs are not automatically found when
AnywhereUSB Manager launches. In this case, you must manually add the Hubs to which you want
to connect to the known Hubs list. This option is not required.
Examples
Run the list command to verify the status of the autofind feature. In this example, the autofind feature
is enabled.
AW02-000001 (AW02-000001.local.:18574)
Group 2 (AW02-000001.2) (In-use by you)
Group 1 (AW02-000001.1) (In-use by you)
U3 Cruzer Micro (AW02-000001.1101)
Run the autofind command to disable the feature. You can specify the "off" option, but it is not
required.
>awusbmanager autofind,off
AW02-000001 (AW02-000001.local.:18574)
Group 2 (AW02-000001.2) (In-use by you)
Group 1 (AW02-000001.1) (In-use by you)
U3 Cruzer Micro (AW02-000001.1101)
You can run the autofind command again to enable the feature. You can specify the "on" option, but it
is not required.
>awusbmanager autofind
AW02-000001 (AW02-000001.local.:18574)
Group 2 (AW02-000001.2) (In-use by you)
Group 1 (AW02-000001.1) (In-use by you)
U3 Cruzer Micro (AW02-000001.1101)
connect device
Connect to a USB device in a group to which you have access. You cannot connect to a device in a
group that is already in use.
You must be connected to the group before you can connect to a device in that group.
Syntax
>awusbmanager connect device,<address>
Parameters
address: The address of the device to which you want to connect. Run the list command to get the
device address.
Examples
If you have connected to a group, and then disconnect from a device in that group, you no longer
have access to the device. You can reconnect to that device.
Run the list command to make sure you are connected to the group that the device you want to
connect to is in. In this example, the device is in Group 1, so you should be connected to Group 1.
You will need the address for device to which you want to connect.
AW02-000001 (AW02-000001.local.:18574)
Group 2 (AW02-000001.2) (In-use by you)
Group 1 (AW02-000001.1) (In-use by you)
U3 Cruzer Micro (AW02-000001.1101)
Run the connect device command. If required to access the device, include the device password.
Run the list command again to verify that the device is connected.
AW02-000001 (AW02-000001.local.:18574)
Group 2 (AW02-000001.2) (In-use by you)
Group 1 (AW02-000001.1) (In-use by you)
U3 Cruzer Micro (AW02-000001.1101) (In-use by you)
connect group
You can connect to a group so that you have access to the ports in the group. Once you have
connected to a group, no one else can connect to that group. You cannot connect to a group that is
already is use.
When you connect to a group, you are automatically connected to all of the ports in the group to
which you are allowed access.
Syntax
>awusbmanager connect group,<address>
Parameters
address: The address of the group to which you want to connect.
Examples
Run the list command to determine the address for the group to which you want to connect. In this
example, you will connect to Group 1.
AW02-000001 (AW02-000001.local.:18574)
Group 2 (AW02-000001.2) (In-use by you)
Group 1 (AW02-000001.1)
U3 Cruzer Micro (AW02-000001.1101)
Run the list command again to verify that you are connected to the group and to all of the ports in the
group to which you are allowed access.
AW02-000001 (AW02-000001.local.:18574)
Group 2 (AW02-000001.2) (In-use by you)
Group 1 (AW02-000001.1) (In-use by you)
U3 Cruzer Micro (AW02-000001.1101) (In-use by you)
device info
Displays information about a device. For more information, see AnywhereUSB Manager USB Device
Status pane.
Syntax
>awusbmanager device info,<address>
Parameters
address: The address of the device for which you want to display information. The address is required.
Examples
Run the list command to determine the device's address.
AW02-000001 (AW02-000001.local.:18574)
* Group 2 (AW02-000001.2) (In-use by you)
* Group 1 (AW02-000001.1) (In-use by you)
+ U3 Cruzer Micro "USB stick 1" (AW02-000001.1101) (In-use by you)
ADDRESS: AW02-000001.1101
LOCALNAME: USB stick 1
VENDOR: SanDisk
VENDOR ID: 0x0781
PRODUCT: U3 Cruzer Micro
PRODUCT ID: 0x5406
SERIAL: 0770000F0000000C
PORT ON HUB: 2
AUTOCONNECT: inherited
IN USE BY: YOU
device name
Change or assign the local name of a device.
Syntax
>awusbmanager device name,<address>,<new name>
Parameters
device name: The device's address.
new name: The new local name for the device.
Examples
Run the list command to determine the device's address.
disconnect device
Disconnect from a USB device to which you no longer need access. You will remain connected to the
group that the device is in. Other users cannot connect the USB device, since you still own the group
that the USB device is in.
Note To ensure that you can no longer connect to a USB device in a group, the best method is to
move the port to a group on the Hub to which you are not connected. See Step 3: Name groups and
assign ports to a group.
Warnings
n Auto-connect: If you have auto-connect enabled for the group, you are not allowed to
disconnect from a USB device in the group until you disable auto-connect. If the USB device is
in a group to which you are connected, other users cannot connect the USB device after you
have disconnected from it, since you still own the group that the USB device is in. See Disable
auto-connect for a group.
n Power cycle on disconnect: If you have the power cycle on disconnect feature enabled, the
Hub automatically cycles the power to each USB device when it disconnects. To ensure that a
USB device remains disconnected, you must disable this feature. See Cycle the power to a
device when it disconnects from a PC.
Syntax
>awusbmanager disconnect device,<address>
Parameters
address: The address of the device from which you want to disconnect.
Examples
Run the list command to view the address for device from which you want to disconnect.
AW02-000001 (AW02-000001.local.:18574)
Group 2 (AW02-000001.2) (In-use by you)
Group 1 (AW02-000001.1) (In-use by you)
U3 Cruzer Micro (AW02-000001.1101) (In-use by you)
Run the list command again to verify that the device is disconnected.
AW02-000001 (AW02-000001.local.:18574)
Group 2 (AW02-000001.2) (In-use by you)
Group 1 (AW02-000001.1) (In-use by you)
U3 Cruzer Micro (AW02-000001.1101)
disconnect group
You can disconnect from a group that has ports you no longer need access to. You are disconnected
from all USB devices and ports in that group. Any other user can then connect to that group.
Warnings
n Auto-connect: If you have auto-connect enabled for the group, you are not allowed to
disconnect from a USB device in the group until you disable auto-connect. If the USB device is
in a group to which you are connected, other users cannot connect the USB device after you
have disconnected from it, since you still own the group that the USB device is in. See Disable
auto-connect for a group.
n Power cycle on disconnect: If you have the power cycle on disconnect feature enabled, the
Hub automatically cycles the power to each USB device when it disconnects. To ensure that a
USB device remains disconnected, you must disable this feature. See Cycle the power to a
device when it disconnects from a PC.
Syntax
>awusbmanager disconnect group, [address]
Parameters
address: The address of the group from which you want to disconnect.
Examples
Run the list command to determine the address for the group to which you want to connect.
Make sure that auto connect is disabled for the group. When it is disabled, an asterisk does not
display next to the group name. If you need to disable auto connect for the group, see autoconnect
clear group.
AW02-000001 (AW02-000001.local.:18574)
Group 2 (AW02-000001.2) (In-use by you)
Group 1 (AW02-000001.1) (In-use by you)
U3 Cruzer Micro (AW02-000001.1101) (In-use by you)
Run the list command again to verify that the group is disconnected.
AW02-000001 (AW02-000001.local.:18574)
Group 2 (AW02-000001.2) (In-use by you)
Group 1 (AW02-000001.1)
U3 Cruzer Micro (AW02-000001.1101)
exit
Shuts down the service. If the AnywhereUS Manager is open, it is shut down as well.
Syntax
>awusbmanager exit
group info
Displays information about a group. For more information, see AnywhereUSB Manager Group Status
pane.
Syntax
>awusbmanager group info,[address]
Parameters
address: The address of the group for which you want to display information. The address is required
Examples
Run the list command to determine the group's address.
ADDRESS: AW02-000001.2
LOCALNAME: Admin group
GROUP: 2
NAME: Group 2
PORTS: 2
AUTOCONNECT: enabled
IN USE BY: YOU
group name
Change or assign the local name of the group.
Syntax
>awusbmanager group name,<address,<new name>
Parameters
group name: The group's address.
new name: The new local name for the group.
Examples
Run the list command to determine the group's address.
Note For information on hiding Hubs in the AnywhereUSB Manager, see Hide an individual Hub and
Hide all unauthorized Hubs.
Syntax
>awusbmanager hidden hub add,<address>[:port]
Parameters
address: The address of the Hub that you want to hide.
port: The TCP port number for the Hub you want to hide. This is required if the TCP port number is
not the default (18574).
Examples
Run the hidden hub add command to add a Hub to the hidden Hub list.
n Use the default port of 18574:
You can then run the hidden hub list command to verify that the Hubs were added to the list of
hidden Hubs.
10.10.10.34:18574
10.10.10.56:5600
Note For information on hiding Hubs in the AnywhereUSB Manager, see Hide an individual Hub and
Hide all unauthorized Hubs.
Syntax
>awusbmanager hidden hub list
Examples
Run the hidden hub list command.
10.10.10.50:18574
10.10.10.21:18574
Syntax
>awusbmanager hidden hub remove,<address>[:port]
Parameters
address: The address of the hub that you want to remove from the hidden Hub list. This is required.
port: The TCP port number for the Hub you want to remove. This is required if the TCP port number is
not the default (18574).
Examples
Run the hidden hub list command to verify the address and port number of the Hub that you
want to remove.
10.10.10.21:18574
10.10.10.34:18574
10.10.10.56:5600
n If the TCP port number is not the default, entering the port number in the command is
required.
Run the hidden hub list command again to verify that the specified Hubs have been removed.
10.10.10.21:18574
Syntax
>awusbmanager hidden hub remove all
Examples
Run the hidden hub list command to view the list of hidden Hubs.
10.10.10.12:18574
10.10.10.14:18574
10.10.10.15:5600
Run the hidden hub list command again to verify that the Hubs have been removed.
help
Displays a list of the CLI commands for the AnywhereUSB Manager.
Syntax
>awusbmanager help
hub info
Displays information about the Hubs. For more information, see AnywhereUSB Manager Hub Status
pane.
Syntax
>awusbmanager hub info,<hub name>
Parameters
hub name: The address of the Hub for which you want to display information. The address is required.
Examples
Run the list command to determine Hub's address.
NAME: AW02-000001
LOCALNAME: HUB-000001
MODEL: AnywhereUSB 2 Plus
hub name
Change or assign the local name of the Hub.
Syntax
>awusbmanager hub name,<address[:port]>,<new name>
Parameters
address: The Hub's address.
port: The TCP port number for the Hub you want to rename. This is required if the TCP port number is
not the default (18574).
new name: The new local name for the Hub.
Examples
Run the list command to determine the Hub's address.
AW02-000001 (AW02-000001.local.:18574)
Group 2 (AW02-000001.2) (In-use by you)
Group 1 (AW02-000001.1) (In-use by you)
U3 Cruzer Micro (AW02-000001.1101)
Auto-Find: enabled
Autoconnect All: disabled
AnywhereUSB Manager not running as a service
Note For information about using this feature in the AnywhereUSB Manager, see Manage the list of
known Hubs.
Syntax
>awusbmanager known hub add,<address>[:port]
Parameters
address: The address of the Hub or a Hub hostname that can be resolved by your network
nameservers. This is required.
port: The TCP port number, which is 18574 by default. You can change the TCP port number if needed.
Examples
Add a known Hub
Run the known hub add command to add a Hub to the known Hub list.
n Use and address and the default port of 18574:
You can then run the known hub list command to verify that the Hub was added to the list.
10.10.10.56:18574
awusb1.work.com:9999
10.10.56.14:5600
Note For more information about known Hubs, see Manage the list of known Hubs.
Syntax
>awusbmanager known hub list
Examples
Run the known hub list command.
10.10.10.50:18574
10.10.10.12:18574
Note For information about using this feature in the AnywhereUSB Manager, see Manage the list of
known Hubs.
Syntax
>awusbmanager known hub remove,<address>[:port]
Parameters
address: The address of the hub that you want to remove from the known Hub list. This is required.
port: The TCP port number for the Hub you want to remove. This is required if the TCP port number is
not the default (18574).
Examples
Run the known hub list command to verify the address and port number of the Hub that you
want to remove.
10.10.01.12:18574
10.10.01.14:18574
10.10.01.15:5600
n If the TCP port number is not the default, entering the port number in the command is
required.
Run the known hub list command again to verify that the Hubs have been removed.
10.10.01.12:18574
Syntax
>awusbmanager known hub remove all
Examples
Run the known hub list command to view the list of known Hubs.
10.10.01.12:18574
10.10.01.14:18574
10.10.01.15:5600
Run the known hub list command again to verify that the Hubs have been removed.
list
Displays a list of Hubs, groups, and devices on the network as well as any Hubs the
AnywhereUSB Manager knows about.
Note This information is similar to what displays in the AnywhereUSB Manager. See AnywhereUSB
Manager overview: Status panes, menus, and icons.
If a group has auto-connect enabled, an asterisk displays next to the group name.
Additional information about features displays at the bottom of the list:
n Status of the autofind feature: enabled or disabled.
n Status of the auto connect all feature: enabled or disabled.
n Specifies whether the AnywhereUSB Manager is running as a service.
Syntax
>awusbmanager list
Examples
This example shows one Hub: AW02-000001. If assigned, the local name for the Hub displays
surrounded by quotes: "Hub 1".
On the Hub, Group 1 has the auto connect feature enabled, as specified by the asterisk next to the
group name.
The address for each group is in parentheses after the group name. In this example the address for
Group 1 is AW02-000001.1.
The address for a device is in parentheses after the device name. In this example the address for the
US Cruzer Micro device is AW02-000001.1101.
list full
Displays a list of all Hubs, groups, and devices on the network and includes all information about each
Hub, group, or device. This command displays the same information retrieved by running these
commands: list, hub info, group info, and device info.
If a group has auto-connect enabled, an asterisk displays next to the group name.
Additional information about features displays at the bottom of the list:
n Status of the autofind feature: enabled or disabled.
n Status of the auto connect all feature: enabled or disabled.
n Specifies whether the AnywhereUSB Manager is running as a service.
Syntax
>awusbmanager list full
Examples
Run the list full command.
The example below shows the Hub on the network, and the groups and devices on that Hub.
Information about the Hub, group, and device is also returned.
AW08-D00001 (10.10.12.12:18574)
NAME: AW08-D00001
MODEL: AnywhereUSB 8 Plus
VERSION: 3.0.1.2 awusb
STATE: Active (secure)
ADDRESS: 10.10.12.12
PORT: 18574
CONNECTED FOR: 14 sec
CONNECTION ID: 3
INTERFACE: eth0
SERIAL NUMBER: AW08-D00001
AUTOCONNECT: disabled
Group 2 (AW08-D00001.2)
ADDRESS: AW08-D00001.2
GROUP: 2
NAME: Group 2
PORTS: 5 6 7 8
AUTOCONNECT: disabled
IN USE BY: NO ONE
Cruzer (AW08-D00001.1906)
ADDRESS: AW08-D00001.1906
VENDOR: SanDisk
VENDOR ID: 0x0781
PRODUCT: Cruzer
PRODUCT ID: 0x5530
SERIAL: 20040000920A1C707B00
AUTOCONNECT: disabled
IN USE BY: NO ONE
power cycle
This command enables you to power cycle a selected USB device.
The USB device can be connected directly to the AnywhereUSB Hub or to a downstream USB hub.
Cycling the power has the same effect as removing the USB device from the Hub and then
reconnecting it. When you use this feature, the power supplied by the port to the USB device is turned
off for 1 second and then turned on. The USB device you choose to power cycle must be assigned to a
group that you are allowed to access.
If an externally powered USB device (one that is not powered by the Hub) is connected to the Hub,
the power cycle feature may have no effect on the USB device.
Note You can also cycle the power to a selected USB device from the AnywhereUSB Manager. See
Cycle the power to a USB device connected to the Hub from the AnywhereUSB Manager.
Note Additional power cycle methods are available. See Power cycle feature.
Syntax
>awusbmanager power cycle,<device address>
Parameters
device address: The address of the device that you want power cycle.
Example
Run the list command to get the device address. In this example, the device address is AW08-
000016.1905.
Syntax
Parameters
true|false: Enter true to allow remote access to USB devices connected to this server. Enter false to
not allow remote access to USB devices connected to this server.
Syntax
config service anywhereusb port {1-65535}
Parameters
port {1-65535}: The port number that is used to access the Hub. The default value is 18574.
You can also do this in the web UI. See Step 3: Name groups and assign ports to a group.
Syntax
config service anywhereusb groups [option]
Options
group(01-24) description "string": Enter a name for the group. Replace string with the group name.
You must have double quotes around the name.
group(01-24) ports (0-23) (1-24): Specify group number to change and a single port or a range of ports
to assign to this group.
Note Ports can only be assigned to one group at a time. If a port is assigned to a new group, it is
removed from the current group.
Examples
Specify a group name for group 2
You can change this port designation to "1". The syntax here changes the value of the index 0 item to
port 1.
Syntax
config service anywhereusb clients [option]
Options
0-255: Specify the client index.
[id "string"]: Specify the client ID for the computer.
[description "string]" : Specify a descriptive name for the computer.
groups (0-23) (group01-24): Specify the groups this client ID can access.
Examples
You must be in configuration mode to use these commands.
Show a list of clients
This command shows the client description, the groups assigned to the client, and the client ID for
each client.
> config
(config) > show service anywhereusb clients
0
description Client description
groups
0 group01
1 group02
id Client_ID
......
> config
(config)> add service anywhereusb clients (0-254|end)
(config service anywhereusb clients 0)> id "Client_ID"
(config service anywhereusb clients 0)> save
Replace a group
This example replaces the group at index 0 with group 2. The client must have at least one group
already assigned.
Delete a client
You must specify the index of the client (0-254) to delete it.
> config
(config)> del service anywhereusb clients (6)
(config)> save
Syntax
config service anywhereusb autoreg [option]
enable (true|false)
Determine whether unknown clients should be registered.
groups (0-23) (group01-24)
List the group numbers to which an unknown client is allowed access.
Examples
Enable autoregistration for the Hub
Syntax
config service anywhereusb client_block_duration [number{w|d|h|m|s}]
Examples
Set the default time limit to 15 minutes
powercycle port
This command enables you to power cycle a port on an AnywhereUSB Hub.
When you power cycle the port, the port is powered off for 1 second and then powered on.
If a USB device is connected to the port, the USB device is powered off and then powered back on,
which has the same effect as removing the USB device from the Hub and then reconnecting it.
If an externally powered USB device (one that is not powered by the Hub) is connected to the Hub,
the power cycle feature may have no effect on the USB device.
Note You can also perform a power cycle a port from the web UI. See Cycle the power to a port on a
Hub from the web UI.
Note Additional power cycle methods are available. See Power cycle feature.
Syntax
system anywhereusb powercycle <portN>
Parameters
portN: The port number that you want to power cycle.
Example
Run the device info command to get the port number on the Hub to which the USB device is
connected. In this example, the USB device is connected to port 2.
power_cycle_on_unbind
Globally enable and disable the power cycle on disconnect feature. When enabled, the power to each
USB device is cycled by default when it disconnects from a PC.
The power cycle on disconnect feature is globally enabled by default for all groups and ports on the
Hub. You can choose to globally disable this feature if desired.
Note This feature is disabled by default on the AnywhereUSB Plus 24 variant without Wi-Fi. If your
device has a serial number greater than or equal to AW24-010000, this feature can be enabled.
Otherwise, the feature does not work as expected and should not be enabled.
Note You can also disable this feature from the web UI. See Disable the power cycle on disconnect
feature.
Syntax
config service anywhereusb power_cycle_on_unbind enable <true|false>
Parameters
true|false: Enter false to disable the feature. Enter true to enable the feature.
so if it starts trying these extra default IPv4 IP addresses, it may take extra time (minutes) for the
Manager to connect or reconnect.
By default, this option is deselected and the Manager does not attempt to connect to these
addresses.
Note This can also be done in the Preferences dialog. See Use all Hub IPv4 addresses.
Syntax
USEALLHUBADDRS,[on|off]
Parameters
off: Disable the feature. The AnywhereUSB Manager will not attempt to connect to the extra IPv4 IP
addresses. This is the default.
on: Enable the feature. The AnywhereUSB Manager will attempt to connect to the extra IPv4 IP
addresses.
Note See Client ID overview for more information about how the client ID is used by your computer
and the Hub to create a connection.
In some cases, multiple computers may inadvertently be used by multiple users that have the same
client ID. When this occurs, and computers with the same client ID attempt to connect with the same
Hub, the first computer to associate itself with the Hub will be able to connect to the Hub.
Subsequent computers with the same client ID will not be able to connect to that Hub.
You can fix this issue by changing the client ID of your computer to a unique client ID. See Change the
client ID.
n If the Hub is across a switch or router that does not forward mDSN traffic, the
AnywhereUSB Manager will not be able to discover the Hub. In this case, add the Hub to the
known Hubs list. See Manage the list of known Hubs.
n The firewall or router may block access to the AnywhereUSB port, which by default is TCP port
18574. If the Hub can be discovered but the connection fails (the state of the connection is
"Unable to connect"), you may need to reopen the AnywhereUSB port.
Note If you do not want to display the Hubs that have failed to connect with your computer, you can
hide them. See Hide all unauthorized Hubs.
n Duplicate Connection
n Multiple user accounts with the same client ID
n Step 1: Remove the Hub certificate
n Problem: TCP port is not configured correctly
n Problem: Client ID has not been added to the Hub
Command line
1. Connect to the Connect EZ 16/32 device by using a serial connection, SSH or telnet, or the
Terminal in the WebUI or the Console in the Digi Remote Manager. See Access the command
line interface for more information.
n For serial connections, the default configuration is:
l 115200 baud rate
l 8 data bits
l no parity
l 1 stop bit
l no flow control
n For SSH and telnet connections, the Setup IP address of the device is 192.168.2.1 on
the .
2. At the login prompt, enter the username and password of a user with Admin access:
login: admin
Password: **********
The default username is admin. The default unique password for your device is printed on the
device label.
3. Depending on the device configuration, you may be presented with another menu, for
example:
a: Admin CLI
q: Quit
Connecting now...
Press Tab to autocomplete commands
Press '?' for a list of commands and details
Type 'help' for details on navigating the CLI
Type 'exit' to disconnect from the Admin CLI
>
See Command line interface for detailed instructions on using the command line interface.
Command line
1. At the command prompt, type exit.
> exit
2. Depending on the device configuration, you may be presented with another menu, for
example:
a: Admin CLI
q: Quit
2. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
The Admin CLI prompt appears.
>
> help
Commands
------------------------------------------------------------------------------
-
? Show commands help
<Tab> Tab completion, displays all valid commands to complete command,
if only one command is possible, it is used
<Space> Like tab except shortest prefix is used if command is valid
<Enter> Enter an input. If quoting then a new line is created instead. If
the input is invalid then characters will be deleted until a
prefix for a valid command is found.
Ctrl + A Move cursor to start of line
Ctrl + E Move cursor to end of line
Ctrl + W Delete word under cursor until start of line or [\',", ,\,/,.]
Ctrl + R If the current input is invalid then characters will be deleted
until a prefix for a valid command is found.
Ctrl + left Jump cursor left until start of line or [\',", ,\,/,.]
Ctrl + right Jump cursor right until start of line or [\',", ,\,/,.]
>
> ?
Commands
------------------------------------------------------------------------------
-
config View and modify the configuration
exit Exit the CLI
analyzer Analyzer commands.
cp Copy a file or directory.
grep Grep a file.
help Show CLI editing and navigation commands.
ls List a directory.
mkdir Create a directory.
modem Modem commands.
more View a file.
mv Move a file or directory.
ping Ping a host.
reboot Reboot the system.
rm Remove a file or directory.
scp Copy a file or directory over SSH.
show Show instance statistics.
>
1. To display further information about the show command, type either show ? or show help:
> show ?
Commands
------------------------------------------------------------------------
--
> show
Use the Tab key or the space bar to display abbreviated help
When executed from the root command prompt, pressing the Tab key or the space bar displays an
abbreviated list of available commands:
Similar behavior is available with any command name:
auto-completes to
Available commands
The following commands are available from the Admin CLI prompt:
Command Description
config Used to view and modify the configuration.
See Device configuration using the command line interface for more information
about using the config command.
exit Exits the CLI.
analyzer Analyzer commands.
cat View a file.
clear Commands to clear the device's status or systems.
container Create, delete, or interact with a container.
cp Copies a file or directory.
grep Grep a file.
help Displays:
n CLI editing and navigation commands, when executed from the root of the
Admin CLI prompt.
n Available commands, syntax diagram, and parameter information, when
executed in conjunction with another command.
See Display help for commands and parameters for information about the help
command.
ls Lists the contents of a directory.
mkdir Creates a directory.
modem Executes modem commands.
monitoring Monitoring commands.
more Displays the contents of a file.
mv Moves a file or directory.
ping Pings a remote host using Internet Control Message Protocol (ICMP) Echo Request
messages.
poweroff Powers off the system.
reboot Reboots the Connect EZ 16/32 device.
rm Removes a file.
scp Uses the secure copy protocol (SCP) to transfer files between the Connect EZ 16/32
Command Description
device and a remote host.
See Use the scp command for information about using the scp command.
show Displays information about the device and the device's configuration.
See Display status and statistics using the show command for more information
about the show command.
iperf Perform a speedtest.
ssh SSH login to a remote server.
system Issues commands related to system functionality.
tail Tail a file.
telnet Telnet login to a remote server.
traceroute Sends and tracks route packets to a destination host.
Note For commands that operate on the Connect EZ 16/32's file system, such as the cp, ls, and mkdir
commands, see File system for information about the file system, including how to copy, move and
delete files and directories.
> scp host hostname-or-ip user username remote remote-path local local-path to
local
where:
n hostname-or-ip is the hostname or IP address of the remote host.
n username is the name of the user on the remote host.
n remote-path is the path and filename of the file on the remote host that will be copied to the
Connect EZ 16/32 device.
n local-path is the location on the Connect EZ 16/32 device where the copied file will be placed.
For example:
To copy firmware from a remote host with an IP address of 192.168.4.1 to the /etc/config directory on
the Connect EZ 16/32 device, issue the following command:
> scp host hostname-or-ip user username remote remote-path local local-path to
remote
where:
n hostname-or-ip is the hostname or IP address of the remote host.
n username is the name of the user on the remote host.
n remote-path is the location on the remote host where the file will be copied.
n local-path is the path and filename on the Connect EZ 16/32 device.
For example:
To copy a support report from the Connect EZ 16/32 device to a remote host at the IP address of
192.168.4.1:
support-report-0040D0133536-24-01-12-12:10:00.bin
>
show config
The show config command displays all the configuration settings for the device that have been
changed from the default settings. This is a particularly useful when troubleshooting the device.
>
show system
The show system command displays system information and statistics for the device, including CPU
usage.
Contact :
>
show network
The show network command displays status and statistics for network interfaces.
>
Note When the config command is executed at the root prompt, certain configuration actions that
are available in configuration mode cannot be performed. This includes validating configuration
changes, canceling and reverting configuration changes, and performing actions on elements in lists.
See Configuration mode for information about using configuration mode.
Display help for the config command from the root Admin CLI
prompt
Display additional configuration commands, as well as available parameters and values, by entering
the question mark (?) character after the config command.
1. For example:
> config ?
> config ?
Additional Configuration
-------------------------------------------------------------------------
-
application Custom scripts
auth Authentication
cloud Central management
firewall Firewall
monitoring Monitoring
network Network
serial Serial
service Services
system System
vpn VPN
> config
2. You can then display help for the additional configuration commands. For example, to display
help for the config service command:
Additional Configuration
-------------------------------------------------------------------------
-
dns DNS
mdns Service Discovery (mDNS)
multicast Multicast
ntp NTP
remote_control Remote control
snmp SNMP
ssh SSH
telnet Telnet
web_admin Web administration
Additional Configuration
-------------------------------------------------------------------------
-
acl Access control list
mdns
4. Lastly, display the allowed values and other information for the enable parameter:
Configuration mode
Configuration mode allows you to perform multiple configuration tasks and validate the changes prior
to saving them. You can cancel all changes without saving them at any time. Configuration changes
do not take effect until the configuration is saved.
> config
(config)>
When the command line is in configuration mode, the prompt will change to include (config), to
indicate that you are currently in configuration mode.
(config)> service
(config service)>
See Move within the configuration schema for more information about moving within the
configuration.
(config)> save
Configuration saved.
>
After using save to save changes to the configuration, you will automatically exit configuration mode.
To return to configuration mode, type config again.
(config)> cancel
>
After using cancel to discard unsaved changes to the configuration, you will automatically exit
configuration mode.
Configuration actions
In configuration mode, configuration actions are available to perform tasks related to saving or
canceling the configuration changes, and to manage items and elements in lists. The commands can
be listed by entering a question mark (?) at the config prompt.
The following actions are available:
(config)> ?
(config)> ?
Additional Configuration
------------------------------------------------------------------------
--
application Custom scripts
auth Authentication
cloud Central management
firewall Firewall
monitoring Monitoring
network Network
serial Serial
service Services
system System
vpn VPN
(config)>
2. You can then display help for the additional configuration commands. For example, to display
help for the config service command, use one of the following methods:
n At the config prompt, enter service ?:
(config)> service ?
(config)> service
(config service)>
(config service)> ?
config> service ?
Services
Additional Configuration
------------------------------------------------------------------------
--
dns DNS
mdns Service Discovery (mDNS)
multicast Multicast
ntp NTP
remote_control Remote control
snmp SNMP
ssh SSH
telnet Telnet
web_admin Web administration
(config)> service
3. Next, to display help for the service ssh command, use one of the following methods:
n At the config prompt, enter service ssh ?:
(config)> service
(config service)>
Additional Configuration
------------------------------------------------------------------------
--
acl Access control list
mdns
4. Lastly, to display allowed values and other information for the enable parameter, use one of
the following methods:
n At the config prompt, enter service ssh enable ?:
(config)> service
(config service)>
(config)> service
(config service)>
You can also enter multiple nodes at once to move multiple steps in the configuration:
n Move backward one node in the configuration by entering two periods (..):
You can also move back multiples nodes in the configuration by typing multiple sets of two
periods:
n Move to the root of the config prompt from anywhere within the configuration by entering
three periods (...):
2. Add an authentication method by using the add index_item command. For example:
n To add the TACACS+ authentication method to the beginning of the list, use the index
number 0:
n To add the TACACS+ authentication method to the end of the list, use the end keyword:
1. Use the show command to verify that the user is not currently a member of any groups:
2. Use the end keyword to add the admin group to the user's configuration:
3. Use the show command again to verify that the admin group has been added to the user's
configuration:
2. Delete one of the authentication methods by using the del index_number command. For
example:
a. To delete the local authentication method, use the index number 0:
b. Use the show command to verify that the local authentication method was removed:
2. To configure the device to use TACACS+ authentication first to authenticate a user, use the
move index_number_1 index_number_2 command:
CAUTION! The revert command reverts all changes to the default configuration, not only
unsaved changes.
(config)> revert
(config)>
2. Set the password for the admin user prior to saving the changes:
(config)> save
Configuration saved.
>
(config)> save
Configuration saved.
>
(config)> auth
(config auth)>
1. Select the device in Remote Manager and click Actions > Open Console, or log into the
Connect EZ 16/32 local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. At the config prompt, create a new user with the username user1:
n Method one: Create a user at the root of the config prompt:
(config)> auth
(config auth)>
admin
acl
admin
enable true
nagios
enable false
openvpn
enable false
no tunnels
portal
enable false
no portals
serial
enable false
no ports
shell
enable false
serial
acl
admin
enable true
nagios
enable false
openvpn
enable false
no tunnels
portal
enable false
no portals
serial
enable true
ports
0 port1
shell
enable false
(config auth user user1)>
ain calibrate
Measure current value of analog input, and set it as zero offset.
Syntax
ain calibrate <name> <type> <setpoint>
Parameters
name: Name of the analog input.
type: Calibrate low or high-end of analog input range.
setpoint: Reference voltage/current connected on the analog input (in mV/uA). (Minimum: 0)
ain calibration-reset
Reset both voltage and current calibration of analog input.
Syntax
ain calibration-reset <name>
Parameters
name: Name of the analog input.
analyzer clear
Clears the traffic captured by the analyzer.
Syntax
analyzer clear <name>
Parameters
name: Name of the capture filter to use.
analyzer save
Saves the current captured traffic to a file.
Syntax
analyzer save <name> <path>
Parameters
name: Name of the capture filter to use.
path: The path and filename to save captured traffic to. If a relative path is provided,
/etc/config/analyzer will be used as the root directory for the path and file.
analyzer start
Start a capture session of packets on this devices interfaces.
Syntax
analyzer start <name>
Parameters
name: Name of the capture filter to use.
analyzer stop
Stops the traffic capture session.
Syntax
analyzer stop <name>
Parameters
name: Name of the capture filter to use.
cat
View the contents of a file.
Syntax
cat <path>
Parameters
path: The file to view.
Syntax
clear dhcp-lease ip-address ADDRESS
Parameters
address: An IPv4 or IPv6 address
Syntax
clear dhcp-lease mac ADDRESS
Parameters
address: 12-digit, colon-delimited MACaddress [00:11:22:AA:BB:CC]
Syntax
config system storage sd mount [true|false]
Parameters
mount: Enable automount (true) or disable automount (false)
Syntax
config system storage sd partition [1-N]
Parameters
partition: Specify the partition number to be automounted.
Syntax
config system storage [sd|nfs] used_percent [1-N]
Parameters
system storage: Specify the storage device (sd, nfs).
used-percent: Specify a percent value of the used storage. When this percent value is met, a system
event is generated.
cp
Copy a file or directory.
Syntax
cp <source> <destination> [force]
Parameters
source: The source file or directory to copy.
destination: The destination path to copy the source file or directory to.
force: Do not ask to overwrite the destination file if it exists.
dio state
Set digital I/O.
Syntax
dio state <name> <state>
Parameters
name: Name of the digital I/O.
state: State of the digital I/O.
grep
Grep the contents of a file.
Syntax
grep <match> <path>
Parameters
match: Output all lines in file matching string.
path: The file to grep.
help
Show CLI editing and navigation commands.
Syntax
help
Parameters
None
ls
List a directory.
Syntax
ls <path> [show-hidden]
Parameters
path: List files and directories under this path.
show-hidden: Show hidden files and directories. Hidden filenames begin with '.'.
mkdir
Create a directory. Parent directories are created as needed.
Syntax
mkdir <path>
Parameters
path: The directory path to create.
modem at
Send an AT command to the modem and display the response.
Syntax
modem at <cmd> [name STRING] [imei STRING]
Parameters
cmd: The AT command string.
name: The configured name of the modem to execute this CLI command on.
imei: The IMEI of the modem to execute this CLI command on.
modem at-interactive
Start an AT command session on the modem's AT serial port.
Syntax
modem at-interactive [name STRING] [imei STRING]
Parameters
name: The configured name of the modem to execute this CLI command on.
imei: The IMEI of the modem to execute this CLI command on.
Syntax
modem firmware bundle ota check [name STRING]
Parameters
name: The configured name of the modem to execute this CLI command on.
Syntax
modem firmware bundle ota download [name STRING] [version STRING] [binary
STRING]
Parameters
name: The configured name of the modem to execute this CLI command on.
version: Firmware version name.
binary: Firmware binary position.
Syntax
modem firmware bundle ota list [name STRING]
Parameters
name: The configured name of the modem to execute this CLI command on.
Syntax
modem firmware bundle ota update [name STRING] [version STRING]
Parameters
name: The configured name of the modem to execute this CLI command on.
version: Firmware version name.
Syntax
modem firmware check [name STRING] [imei STRING]
Parameters
name: The configured name of the modem to execute this CLI command on.
imei: The IMEI of the modem to execute this CLI command on.
Syntax
modem firmware list [name STRING] [imei STRING]
Parameters
name: The configured name of the modem to execute this CLI command on.
imei: The IMEI of the modem to execute this CLI command on.
Syntax
modem firmware ota check [name STRING] [imei STRING]
Parameters
name: The configured name of the modem to execute this CLI command on.
imei: The IMEI of the modem to execute this CLI command on.
Syntax
modem firmware ota download [name STRING] [imei STRING] [version STRING]
Parameters
name: The configured name of the modem to execute this CLI command on.
imei: The IMEI of the modem to execute this CLI command on.
version: Firmware version name.
Syntax
modem firmware ota list [name STRING] [imei STRING]
Parameters
name: The configured name of the modem to execute this CLI command on.
imei: The IMEI of the modem to execute this CLI command on.
Syntax
modem firmware ota update [name STRING] [imei STRING] [version STRING]
Parameters
name: The configured name of the modem to execute this CLI command on.
imei: The IMEI of the modem to execute this CLI command on.
version: Firmware version name.
Syntax
modem firmware update [name STRING] [imei STRING] [version STRING]
Parameters
name: The configured name of the modem to execute this CLI command on.
imei: The IMEI of the modem to execute this CLI command on.
version: Firmware version name.
Syntax
modem pin change <old-pin> <new-pin> [name STRING] [imei STRING]
Parameters
old-pin: The SIM's PIN code.
new-pin: The PIN code to change to.
name: The configured name of the modem to execute this CLI command on.
imei: The IMEI of the modem to execute this CLI command on.
Syntax
modem pin disable <pin> [name STRING] [imei STRING]
Parameters
pin: The SIM's PIN code.
name: The configured name of the modem to execute this CLI command on.
imei: The IMEI of the modem to execute this CLI command on.
Syntax
modem pin enable <pin> [name STRING] [imei STRING]
Parameters
pin: The SIM's PIN code.
name: The configured name of the modem to execute this CLI command on.
imei: The IMEI of the modem to execute this CLI command on.
Syntax
modem pin status [name STRING] [imei STRING]
Parameters
name: The configured name of the modem to execute this CLI command on.
imei: The IMEI of the modem to execute this CLI command on.
Syntax
modem pin unlock <pin> [name STRING] [imei STRING]
Parameters
pin: The SIM's PIN code.
name: The configured name of the modem to execute this CLI command on.
imei: The IMEI of the modem to execute this CLI command on.
Syntax
modem puk status [name STRING] [imei STRING]
Parameters
name: The configured name of the modem to execute this CLI command on.
imei: The IMEI of the modem to execute this CLI command on.
Syntax
modem puk unlock <puk> <new-pin> [name STRING] [imei STRING]
Parameters
puk: The SIM's PUK code.
new-pin: The PIN code to change to.
name: The configured name of the modem to execute this CLI command on.
imei: The IMEI of the modem to execute this CLI command on.
modem reset
Reset the modem hardware (reboot it). This can be useful if the modem has stopped responding to
the network or is behaving inconsistently.
Syntax
modem reset [name STRING] [imei STRING]
Parameters
name: The configured name of the modem to execute this CLI command on.
imei: The IMEI of the modem to execute this CLI command on.
modem scan
List of carriers present in the network.
Syntax
modem scan [name STRING] [imei STRING] [timeout INTEGER]
Parameters
name: The configured name of the modem to execute this CLI command on.
imei: The IMEI of the modem to execute this CLI command on.
timeout: The amount of time in seconds to wait for modem scan to complete. (Default: 300)
modem sim-slot
Show or change the modem's active SIM slot. This applies only to modems with multiple SIM slots.
Syntax
modem sim-slot <slot> [name STRING] [imei STRING]
Parameters
slot: The SIM slot to change to.
name: The configured name of the modem to execute this CLI command on.
imei: The IMEI of the modem to execute this CLI command on.
Syntax
modem sms send <msisdn> <message> [name STRING] [imei STRING]
Parameters
msisdn: Destination phone number (MSISDN).
message: Message to send.
name: The configured name of the modem to execute this CLI command on.
imei: The IMEI of the modem to execute this CLI command on.
Syntax
modem sms send-binary <msisdn> <message> [name STRING] [imei STRING]
Parameters
msisdn: Destination phone number (MSISDN).
message: Message to send.
name: The configured name of the modem to execute this CLI command on.
imei: The IMEI of the modem to execute this CLI command on.
Syntax
monitoring metrics upload
Parameters
None
monitoring
Commands to clear the device's status or systems.
monitoring metrics
Device metrics commands.
uplaod
Immediately upload current device health metrics. Functions as if a scheduled upload was triggered.
Parameters
None
Syntax
monitoring metrics upload
Parameters
None
more
View a file.
Syntax
more <path>
Parameters
path: The file to view.
mv
Move a file or directory.
Syntax
mv <source> <destination> [force]
Parameters
source: The source file or directory to move.
destination: The destination path to move the source file or directory to.
force: Do not ask to overwrite the destination file if it exists.
ping
Ping a host using ICMP echo.
Syntax
ping <host> [interface STRING] [source STRING] [ipv6] [size INTEGER] [count
INTEGER] [broadcast]
Parameters
host: The name or address of the remote host to send ICMP ping requests to. If broadcast is enabled,
can be the broadcast address.
interface: The network interface to send ping packets from when the host is reachable over a default
route. If not specified, the system's primary default route will be used.
source: The ping command will send a packet with the source address set to the IP address of this
interface, rather than the address of the interface the packet is sent from.
ipv6: If a hostname is defined as the value of the 'host' parameter, use the hosts IPV6 address.
size: The number of bytes sent in the ICMP ping request. (Minimum: 0, Default: 56)
count: The number of ICMP ping requests to send before terminating. (Minimum: 1, Default: 100)
broadcast: Enable broadcast ping functionality.
poweroff
Power off the system.
Syntax
poweroff
Parameters
None
reboot
Reboot the system.
Parameters
None
rm
Remove a file or directory.
Syntax
rm <path> [force]
Parameters
path: The path to remove.
force: Force the file to be removed without asking.
scp
Copy a file or directory over SSH.
Syntax
scp <local> <remote> <host> <user> <to> [port INTEGER]
Parameters
local: The path and name of the file on the local device to copy to or from.
remote: The path and name of the file on the remote host to copy to or from.
host: The hostname or IP address of the remote host.
user: The username to use when connecting to the remote host.
to: Determine whether to copy the file from the local device to the remote host, or from the remote
host to the local device.
port: The SSH port to use to connect to the remote host. (Minimum: 1, Maximum: 65535, Default: 22)
show ain
Show analog input status.
Syntax
show ain [name STRING]
Parameters
name: Name of the analog input.
show analyzer
Show packets from a specified analyzer capture.
Syntax
show analyzer <name>
Parameters
name: Name of the capture filter to use.
show arp
Show ARP tables. If no IP version is specified IPv4 & IPV6 will be displayed.
Syntax
show arp [ipv4] [ipv6] [verbose]
Parameters
ipv4: Display IPv4 routes. If no IP version is specified IPv4 & IPV6 will be displayed.
ipv6: Display IPv6 routes. If no IP version is specified IPv4 & IPV6 will be displayed.
verbose: Display more information (less concise, more detail).
show cloud
Show drm status & statistics.
Syntax
show cloud
Parameters
None
show config
Show a summary of changes made to the default configuration. The changes shown are not suitable
for pasting into a CLI session.
Syntax
show config [cli_format]
Parameters
cli_format: Show the exact CLI commands required to configure the device from a default
configuration. The changes shown are suitable for pasting into a CLI session, although individual
output lines maybe context sensitive and unable to be entered in isolation.
show dhcp-lease
Show DHCP leases.
Syntax
show dhcp-lease [all] [verbose]
Parameters
all: Show all leases (active and inactive (not in etc/config/dhcp.*lease)).
verbose: Display more information (less concise, more detail).
show dio
Show digital I/O status.
Syntax
show dio [name STRING]
Parameters
name: Name of the digital I/O.
show dns
Show DNS servers and associated domains.
Syntax
show dns
Parameters
None
show eth
Show ethernet status & statistics.
Syntax
show eth [name STRING]
Parameters
name: Display more details and configuration data for a specific ethernet instance.
show event
Show event list (high level).
Syntax
show event [table <status|error|info>] [number INTEGER]
Parameters
table: Type of event log to be displayed (status, error, info).
number: Number of lines to retrieve from log. (Minimum: 1, Default: 20)
show hotspot
Show hotspot statistics.
Syntax
show hotspot [name STRING] [ip STRING]
Parameters
name: The configured instance name of the hotspot.
ip: IP address of a specific client, to limit the status display to only this client.
show ipsec
Show IPsec status & statistics.
Syntax
show ipsec [tunnel STRING] [all] [verbose]
Parameters
tunnel: Display more details and config data for a specific IPsec tunnel.
all: Display all tunnels including disabled tunnels.
verbose: Display status of one or all tunnels in plain text.
Syntax
show l2tp lac [name STRING]
Parameters
name: Display more details for a specific L2TP access concentrator.
Syntax
show l2tp lns [name STRING]
Parameters
name: Display more details for a specific L2TP network server.
show l2tpeth
Show L2TPv3 ethernet tunnel session status and statistics.
Syntax
show l2tpeth [name STRING]
Parameters
name: Display more details for a specific L2TPv3 ethernet tunnel session.
show location
Show location information.
Syntax
show location [geofence]
Parameters
geofence: Show geofence information.
show log
Syntax
show log [number INTEGER] [filter <critical|warning|debug|info>]
Parameters
number: Number of lines to retrieve from log. (Minimum: 1, Default: 20)
filter: Filters for type of log message displayed (critical, warning, info, debug). Note, filters from the
number of messages retrieved not the whole log (this can be very time consuming). If you require
more messages of the filtered type, increase the number of messages retrieved using 'number'.
show manufacture
Show manufacturer information.
Syntax
show manufacture [verbose]
Parameters
verbose: Display more information (less concise, more detail).
show modbus-gateway
Show modbus gateway status & statistics.
Syntax
show modbus-gateway [verbose]
Parameters
verbose: Display more information (less concise, more detail).
show modem
Show modem status & statistics.
Syntax
show modem [name STRING] [imei STRING] [verbose]
Parameters
name: The configured name of the modem to execute this CLI command on.
imei: The IMEI of the modem to execute this CLI command on.
verbose: Display more information (less concise, more detail).
show nemo
Show NEMO status and statistics.
Syntax
show nemo [name STRING]
Parameters
name: Display more details and configuration data for a specific NEMO instance.
show network
Show network interface status & statistics.
Syntax
show network [interface STRING] [all] [verbose]
Parameters
interface: Display more details and config data for a specific network interface.
all: Display all interfaces including disabled interfaces.
verbose: Display more information (less concise, more detail).
show ntp
Show NTP status & statistics.
Syntax
show ntp
Parameters
None
Syntax
show openvpn client [name STRING] [all]
Parameters
name: Display more details and config data for a specific OpenVPN client.
all: Display all clients including disabled clients.
Syntax
show openvpn server [name STRING] [all]
Parameters
name: Display more details and config data for a specific OpenVPN server.
all: Display all servers including disabled servers.
show route
Show IP routing information.
Syntax
show route [ipv4] [ipv6] [verbose]
Parameters
ipv4: Display IPv4 routes.
ipv6: Display IPv6 routes.
verbose: Display more information (less concise, more detail).
show scep-client
Show SCEP client status and statistics.
Syntax
show scep-client [name STRING]
Parameters
name: Display more details and configuration data for a specific SCEP client instance.
show scripts
Show scheduled system scripts.
Syntax
show scripts
Parameters
None
show serial
Show serial status and statistics.
If the
Syntax
show serial [port STRING]
Parameters
port: Display more details and configuration data for a specific serial port.
Syntax
show surelink interface [name STRING] [all]
Parameters
name: The name of a specific network interface.
all: Show all network interfaces.
Syntax
show surelink ipsec [tunnel STRING] [all]
Parameters
tunnel: The name of a specific IPsec tunnel.
all: Show all IPsec tunnels.
Syntax
show surelink openvpn [client STRING] [all]
Parameters
client: The name of the OpenVPN client.
all: Show all OpenVPN clients.
Syntax
show surelink state
Parameters
None
show system
Show system status & statistics.
Syntax
show system [verbose]
Parameters
verbose: Display more information (disk usage, etc).
show version
Show firmware version.
Syntax
show version [verbose]
Parameters
verbose: Display more information (build date).
show vrrp
Show VRRP status & statistics.
Syntax
show vrrp [name STRING] [all] [verbose]
Parameters
name: Display more details and config data for a specific VRRP instance.
all: Display all VRRP instances including disabled instances.
verbose: Display all VRRP status and statistics including disabled instances.
show web-filter
Show web filter status & statistics.
Syntax
show web-filter
Parameters
None
iperf
Perform a speedtest to a remote host using nuttcp or iPerf. The system's primary default route will be
used. The speed test will take approximately 30 seconds to complete.
Syntax
iperf <host> [size INTEGER] [mode <nuttcp|iperf>] [output <text|json>]
Parameters
host: The name or address of the remote speed test host/server.
size: The number of kilobytes sent in the speed test packets. (Minimum: 0, Default: 1000)
mode: The type of speed test protocol to run. (Default: nuttcp)
output: The format of output to display the speed test results as. (Default: text)
ssh
Use SSH protocol to log into a remote server.
Syntax
ssh <host> <user> [port INTEGER] [command STRING]
Parameters
host: The hostname or IP address of the remote host.
user: The username to use when connecting to the remote host.
port: The SSH port to use to connect to the remote host. (Minimum: 1, Maximum: 65535, Default: 22)
command: The command that will be automatically executed once the SSH session to the remote
host is established.
system backup
Save the device's configuration to a file. Archives are full backups including generated SSH keys and
dynamic DHCP lease information. Command backups are a list of CLI commands required to build the
device's configuration.
Syntax
system backup [type <custom-defaults|cli-config|archive>] [path STRING]
[passphrase STRING] [remove <custom-defaults>]
Parameters
type: The type of backup file to create. Archives are full backups including generated SSH keys and
dynamic DHCP lease information. CLI configuration backups are a list of CLI commands used to build
the device's configuration. (Default: archive)
path: The file path to save the backup to. (Default: /var/log/)
passphrase: Encrypt the archive with a passphrase.
remove: Remove a backup file.
Syntax
system cloud register <username> <password> [group STRING]
Parameters
username: Digi Remote Manager username.
system disable-cryptography
Erase the device's configuration and reboot into a limited mode with no cryptography available. The
device's shell will be accessible over Telnet (port 23) at IP address 192.168.210.1. To return the device
to normal operation, perform the configuration erase procedure with the device's ERASE button twice
consecutively.
Syntax
system disable-cryptography
Parameters
None
system duplicate-firmware
Duplicate the running firmware to the alternate partition so that the device will always boot the same
firmware version.
Syntax
system duplicate-firmware
Parameters
None
system factory-erase
Erase the device to restore to factory defaults. All configuration and automatically generated keys will
be erased.
Syntax
system factory-erase
Parameters
None
system find-me
Find Me function to flash LEDs on this device to help users locate the unit.
Syntax
system find-me <state>
Parameters
state: Find Me control to flash cellular-related LEDs.
Syntax
system firmware ota check
Parameters
None
Syntax
system firmware ota list
Parameters
None
Syntax
system firmware ota update [version STRING]
Parameters
version: Firmware version name.
Syntax
system firmware update <file>
Parameters
file: Firmware filename and path.
Syntax
system power ignition off_delay <off_delay>
Parameters
off_delay: Ignition power off delay. Format: number{h|m|s}, Max: 18h. (Minimum: 0s, Maximum: 18h)
system restore
Restore the device's configuration from a backup archive or CLI commands file.
Syntax
system restore <path> [passphrase STRING]
Parameters
path: The path to the backup file.
passphrase: Decrypt the archive with a passphrase.
Syntax
system script start <script>
Parameters
script: Script to start.
Syntax
system script stop <script>
Parameters
script: Script to stop.
Syntax
system serial clear <port>
Parameters
port: Serial port.
Syntax
system serial copy <source> <destination> [all] [label] [base] [serial]
[session] [monitor] [service] [hangup] [autoconnect] [framing] [modem] [ppp_
dialin] [udp] [logging]
Parameters
source: The serial port to copy settings from.
destination: A list of serial ports to copy settings to. Example: 1-4,8-10 or all.
all: Copy all serial port settings.
label: Copy label setting.
base: Copy enable, mode, sharing, and signal settings.
serial: Copy baudrate, data bits, parity, stop bits, and flow control settings.
session: Copy escape, history, exclusive, and idle timeout settings.
monitor: Copy signal change monitoring settings.
service: Copy SSH, TCP, and Telnet service settings.
hangup: Copy hangup on signal loss settings.
autoconnect: Copy autoconnect settings.
framing: Copy data framing settings.
modem: Copy modem emulator settings.
ppp_dialin: Copy PPP dial-in settings.
udp: Copy UDP serial settings.
logging: Copy logging settings.
Syntax
system serial ipport <destination> <service> <base>
Parameters
destination: A list of serial ports to set IP port numbers. Example: 1-4,8-10 or all.
service: The service type to set IP port numbers.
base: Set service IP port numbers to base port + serial port number. (Minimum: 1, Maximum: 65535)
Syntax
system serial restart <port>
Parameters
port: Serial port.
Syntax
system serial save <port> <path>
Parameters
port: Serial port.
path: The path and filename to save captured traffic to. If a relative path is provided, /etc/config/serial
will be used as the root directory for the path and file.
Syntax
system serial show <port>
Parameters
port: Serial port.
Syntax
system storage format sd [ext4|exfat]
Parameters
file system type: Select file system type for an SD card (exfat4, exfat).
Syntax
system storage mount /opt/ext/sd <partition>
Parameters
partition: Specify the partition number to be mounted.
Syntax
system storage show
Parameters
None
Example
SD Card
-------
Mount Path: /opt/ext/sd
Device Path: /dev/sdb
Total Size: 3965MB
Partitions:
Num Type Size
--- ----- ------
1 exfat 3964MB
Syntax
system storage unmount /opt/ext/sd
Parameters
None
system support-report
Save a support report to a file and include with support requests.
Syntax
system support-report [path STRING]
Parameters
path: The file path to save the support report to. (Default: /var/log/)
Syntax
system time set <datetime>
Parameters
datetime: The date in year-month-day hour:minute:second format (e.g "2021-09-26 12:24:48").
Syntax
system time sync
Parameters
None
Syntax
system time test
Parameters
None
tail
Tail a file to see its contents.
Syntax
tail <path> [timeout INTEGER] [filter STRING] [match STRING]
Parameters
path: The file to tail.
timeout: The amount of time in seconds to tail the file. (Default: 10)
filter: Only see output that contains this string.
match: Stop tail when this string is detected in output.
telnet
Use Telnet protocol to log into a remote server.
Syntax
telnet <host> [port INTEGER]
Parameters
host: The hostname or IP address of the remote host.
port: The telnet port to use to connect to the remote host. (Minimum: 1, Maximum: 65535, Default: 23)
traceroute
Print the route packets trace to network host.
Syntax
traceroute <host> [ipv6] [gateway STRING] [interface STRING] [first_ttl
INTEGER] [max_ttl INTEGER] [port INTEGER] [nqueries INTEGER] [src_addr STRING]
[tos INTEGER] [waittime INTEGER] [pausemsecs INTEGER] [packetlen INTEGER]
[debug] [dontfragment] [icmp] [nomap] [bypass]
Parameters
host: The host that we wish to trace the route packets for.
ipv6: If a hostname is defined as the value of the 'host' parameter, use the hosts IPV6 address.
gateway: Tells traceroute to add an IP source routing option to the outgoing packet that tells the
network to route the packet through the specified gateway.
interface: Specifies the interface through which traceroute should send packets. By default, the
interface is selected according to the routing table.
first_ttl: Specifies with what TTL to start. (Minimum: 1, Default: 1)
max_ttl: Specifies the maximum number of hops (max time-to-live value) traceroute will probe.
(Minimum: 1, Default: 30)
port: Specifies the destination port base traceroute will use (the destination port number will be
incremented by each probe). A value of -1 specifies that no specific port will be used. (Minimum: -1,
Default: -1)
nqueries: Sets the number of probe packets per hop. A value of -1 indicated. (Minimum: 1, Default: 3)
src_addr: Chooses an alternative source address. Note that you must select the address of one of the
interfaces. By default, the address of the outgoing interface is used.
tos: For IPv4, set the Type of Service (ToS) and Precedence value. Useful values are 16 (low delay) and
8 (high throughput). Note that in order to use some TOS precedence values, you have to be super
user. For IPv6, set the Traffic Control value. A value of -1 specifies that no value will be used.
(Minimum: -1, Default: -1)
waittime: Determines how long to wait for a response to a probe. (Minimum: 1, Default: 5)
pausemsecs: Minimal time interval between probes. (Minimum: 0, Default: 0)
packetlen: Total size of the probing packet. Default 60 bytes for IPv4 and 80 for Ipv6. A value of -1
specifies that the default value will be used. (Minimum: -1, Default: -1)
debug: Enable socket level debugging.
dontfragment: Do not fragment probe packets.
icmp: Use ICMP ECHO for probes.
nomap: Do not try to map IP addresses to host names when displaying them.
bypass: Bypass the normal routing tables and send directly to a host on an attached network.
vtysh
Opens the integrated shell for FRRouting (FRR), for more information on FRRouting and VTYSH, visit
the FRRouting documentation at https://docs.frrouting.org/projects/dev-guide/en/latest/vtysh.html.
Syntax
vtysh
Parameters
None
English
Bulgarian--български
Croatian--Hrvatski
French--Français
Greek--Ελληνικά
Hungarian--Magyar
Italian--Italiano
Latvian--Latvietis
Lithuanian--Lietuvis
Polish--Polskie
Portuguese--Português
Slovak--Slovák
Slovenian--Esloveno
Spanish--Español
RF exposure statement
In order to comply with RF exposure limits established in the ANSI C95.1 standards, the distance
between the antenna or antennas and the user should not be less than 20 cm.
CE labeling requirements
The “CE” marking must be affixed to a visible location on the OEM product. The following figure
shows CE labeling requirements.
The CE mark shall consist of the initials “CE” taking the following form:
n If the CE marking is reduced or enlarged, the proportions given in the above graduated
drawing must be respected.
n The CE marking must have a height of at least 5 mm except where this is not possible on
account of the nature of the apparatus.
n The CE marking must be affixed visibly, legibly, and indelibly.
Safety notices
n Read all instructions before installing and powering the router. You should keep these
instructions in a safe place for future reference.
n If the power supply shows signs of damage or malfunction, stop using it immediately, turn off
the power and disconnect the power supply before contacting your supplier for a repair or
replacement.
n Changes or modifications not expressly approved by the party responsible for compliance
could void the user’s authority to operate the equipment. Use only the accessories,
attachments, and power supplies provided by the manufacturer-connecting non-approved
antennas or power supplies may damage the router, cause interference or create an electric
shock hazard, and will void the warranty.
n Do not attempt to repair the product. The router contains no electronic components that can
be serviced or replaced by the user. Any attempt to service or repair the router by the user will
void the product warranty.
n Ports that are capable of connecting to other apparatus are defined as SELVports. To ensure
conformity with IEC60950 ensure that these ports are only connected to ports of the same type
on other apparatus.
This product contains high quality materials and components which can be
recycled. At the end of its life this product MUST NOT be mixed with other
commercial waste for disposal. Check with the terms and conditions of your
supplier for disposal information.