Select Page

RUT240 Administration

Summary #

This page is an overview of the Administration section of RUT240 routers.

The information in this page is updated in accordance with the RUT2XX_R_00.01.12 firmware version.

General #

The General section is used to set up some of the router’s managerial parameters, such as password, name, language, etc. For more information on the General section, refer to figure and table below.

Networking rut240 manual administration general v1.png
FieldValueDescription
Router namestring; default: RUT240The router’s model name.
Host namestring; default: Teltonika-RUT240.comThe router’s hostname. This can be used for communication with other LAN hosts.
Current passwordstring; default: noneThe router’s current password.
New password | Confirm new passwordstring; default: noneA new password for the router. The password must be comprised of 8-32 characters, including at least one upper case letter, one lower case letter and one digit.
LanguageEnglish | Deutsch | Français | Turkish; default: EnglishSelects the router’s WebUI language.
IPv6 Supportyes | no; default: noTurns IPv6 support on or off.
Show mobile info at login pageyes | no; default: noShows mobile data connection information (signal strength, state, service mode) at login page.
Show WAN IP at login pageyes | no; default: noShows the router’s WAN IP address at login page.
LEDs Indicationyes | no; default: yesTurns the router’s LED indications on or off.
Min timeinteger [5..60]; default: 5Specifies the minimum amount of time (in seconds) that the reset button has to be pressed and held down in order to initiate a factory reset.
Max timeinteger [5..100]; default: 30Specifies the maximum amount of time (in seconds) that the reset button has to be pressed and held down in order to initiate a factory reset.
ActionReboot|User’s defaults configuration|Factory defaults configuration; default:RebootThe action to be performed when this rule is met.
Restore to User’s default-(interactive button)Restores the router to custom configuration set by the user.
Restore to Factory default’s-(interactive button)Restores the router to manufacturer default settings.

Troubleshoot #

The Troubleshoot section is used to download various files that contain information used for troubleshooting the router. Refer to the figure and table below for information on the Troubleshoot page.

Networking rut2xx manual administration troubleshoot v1.png
FieldValueDescription
System log levelDebug | Info | Notice | Warning | Error | Critical | Alert | Emergency; default: debugSpecifies the information output level of the system log.Debug – contains basic information that is diagnostically helpful to most people (i.e., not just engineers).Info – general useful information (e.g., configuration changes, starts and stops of services, etc.)Notice – conditions that are not error conditions, but that may require special handling.Warning – anything that can potentially cause application oddities, but for which the system is automatically recovering from (e.g., retrying an operation, missing secondary data, etc.)Error – errors that are fatal to the operation, but not the service or application (can’t open a required file, missing data, etc.) Solving these types of errors will usually require user intervention.Critical – critical conditions, device errors.Alert – a condition that must be corrected immediately.Emergency – a panic condition, i.e., system is no longer usable.
Save log inRAM memory | Flash memory; default: RAM memorySpecifies which type of memory to use for storing system logs.
Include GSMD informationyes | no; default: yesWhen checked, includes the router’s GSMD information in the log file.
Include PPPD informationyes | no; default: noWhen checked, includes the router’s PPPD information in the log file.
Include chat script informationyes | no; default: yesWhen checked, includes the router’s chat script information in log file.
System log– (interactive button)Displays the contents of the router’s system log file. The system log contains records of various system related events, such as starts/stops of various services, errors, reboots, etc.
Kernel log– (interactive button)Displays the contents of the router’s kernel log file. The kernel log contains records of various events related to the processes of the operating system (OS).
Troubleshoot file– (interactive button)Downloads the router’s Troubleshoot file. It contains the router’s configuration information, logs and some other files. When requesting support, it is recommended to always provide the router’s Troubleshoot file to Teltonika engineers for analysis.
TCP dump file– (interactive button)Downloads the router’s TCP dump file. TCP dump is a program used to capture packets moving through network interfaces. By default, the router does not store TCP dump information. You must enable TCP dump and save the changes before you can download the file.
Enable TCP dump*yes | no; default: noTurns TCP dump packets capture on or off.

TCP dump #

TCP dump is a program used to capture packets moving through network interfaces. By default, the router does not store TCP dump information. You must enable TCP dump and save the changes before you can download the file.

If you enable TCP dump, you will notice additional configuration fields appear. Refer to the figure and table below for realted information.

Networking rutxxx manual administration troubleshoot tcpdump v1.png
FieldValueDescription
Enable TCP dumpyes | no; default: noTurns TCP dump packet capture on or off.
Select interfacenetwork interface; default: anyOnly captures packets that move through the specified network interface.
Select protocol filterall | icmp | tcp | udp | arp; default: allOnly captures packets that match the specified protocol.
Select packets directionIN/OUT | Incoming | Outgoing; default: IN/OUTOnly captures packets coming from the specified direction.
Hostip | host; default: noneOnly captures packets related to the specified host.
Portinteger [0..65335]; default: noneOnly captures packets related to the specified communication port.
Select storageInternal storage; default: Internal storageSpecifies where the TCP dump file will be stored.

Backup #

The Backup page is used to generate the user’s defaults configuration and download or upload backup files to the router.

Backup/Restore Configuration #

The Backup/Restore Configuration sections are used to download or upload configuration backup files to the router. Backup files can be uploaded only from identical devices with identical or older firmware. Once a backup file is uploaded to a router, that router will have identical configuration as the router from which the backup file originated (was downloaded from).

Networking rut2xx manual administration backup v1.png
  • Backup Configuration – generates and downloads the router’s backup file based on the current configuration.
  • Restore Configuration – uploads a configuration backup file to the router. This can be done in two ways:

Important: backup files can be uploaded only when taken from a device with an identical Product code (can be checked in Status > Device) and identical or older firmware.

Access Control #

The Access Control page is used to manage remote and local access to the router.

Important: turning on remote access leaves the router vulnerable to external attackers. Make sure you use a strong password.

General #

The General section is used to manage SSH, HTTP(S) and CLI access to the router.

SSH

Networking rutxxx manual administration access control general ssh v1.png
FieldValueDescription
Enable SSH accessyes | no; default: yesTurns SSH access from the local network (LAN) on or off.
Remote SSH accessyes | no; default: noTurns SSH access from remote networks (WAN) on or off.
Portinteger [0..65535]; default: 22Selects which port to use for SSH access.


WebUI

Networking rutxxx manual administration access control general webui v1.png
FieldValueDescription
Enable HTTP accessyes | no; default: yesTurns HTTP access from the local network (LAN) to the router’s WebUI on or off.
Enable HTTPS accessyes | no; default: yesTurns HTTPS access from the local network (LAN) to the router’s WebUI on or off.
Redirect to HTTPSyes | no; default: noRedirects connection attempts from HTTP to HTTPS.
Enable remote HTTP accessyes | no; default: noTurns HTTP access from remote networks (WAN) to the router’s WebUI on or off.
Portinteger [0..65535]; default: 80Selects which port to use for HTTP access.
Enable remote HTTPS accessyes | no; default: noTurns HTTPS access from remote networks (WAN) to the router’s WebUI on or off.
Portinteger [0..65535]; default: 443Selects which port to use for HTTPS access.
uhttpd certificate– (interactive button)In order to reach the router using HTTPS, you should first download the uhttpd certificate and add it to your trusted CA list.
Enable JSON RPCyes | no; default: yesTurns JSON-RPC access via ubus on or off.
RFC1918 Filteryes | no; default: yesTurns Address Allocation for Private Internets on or off.


CLI

Networking rutxxx manual administration access control general cli v1.png
FieldValueDescription
Enable CLIyes | no; default: yesTurns CLI access from the local network (LAN) on or off.
Enable remote CLIyes | no; default: noTurns CLI access from remote networks (WAN) on or off.
Port rangerange of integers [0..65534]-[1..65535]; default: 4200-4220Selects which ports to use for CLI access.
Shell limitinteger [1..10]; default: 5Maximum number of active CLI connections.

Safety #

The Safety section is used to manage the List Of Blocked Addresses. After a user attempts to login to this devices via SSH/HTTP, he will have a limited amount of retries in case of unsuccessful login attempts. This limit is called Fail count and is set in this page. After the user exhausts the maximum number of attempts, his IP address will be blocked from making more attempts and added to the List Of Blocked Addresses.

Block Unwanted Access

Networking rutxxx manual administration access control safety block unwanted access v1.png
FieldValueDescription
Enableyes | no; default: yesTurns secure SSH/HTTP access on or off. If this is checked, devices logging in have a limited amount of tries specified in the Fail count field to log in to the router via SSH/HTTP.
Clean after rebootyes | no; default: noIf this field is checked, addresses are removed from the List Of Blocked Addresses after every router reboot.
Fail countinteger; default: 5Maximum login fail count after which the device’s address is blocked and addedd to the List Of Blocked Addresses.


List Of Blocked Addresses

Networking rutxxx manual administration access control safety list of blocked addresses v2.png

The screenshot above is of a list that contains one blocked address. If you or someone you know gets blocked accidentally, you can unblock users from this section by deleting their IP addresses from the list.

Note: the list gets cleared after a factory reset.

Diagnostics #

The Diagnostics section is used to execute simple network diagnostic tests, including pingtraceroute and nslookup.

Networking rutxxx manual administration diagnostics v1.png

Enter an address in the Host field and execute one of the following actions:

  • Ping – sends ICMP requests to the specified address.
  • Traceroute – displays the path that packets have to take in order to reach the specified address.
  • Nslookup – obtains domain name address and IP address mapping information.

MAC Clone #

The MAC Clone section is used to change the router’s WAN MAC address. You can change the MAC address by entering a new custom value in the WAN MAC address field or click the ‘Get PC MAC address’ button to obtain your PC’s MAC address and use it to fill the field.

Networking rutxxx manual administration mac clone v2.png

In some cases access to a local network is protected by a MAC filter. For example, your company’s main router may bind the MAC addresses of devices to the physical Internet sockets they usually connect to. In these cases only the device that is bound to the socket may gain access to the network. You can use MAC Clone to “clone” your PCs address and apply it to your router’s WAN Ethernet port to gain access to such networks.

Overview #

The Overview section is used to select which widgets should be visible in the Status > Overview page.

Networking rut240 manual administration overview v1.png

Simply select the widgets that you would like to view in the Overview page and click the ‘Save’ button.

RMS #

RMS (Remote Management System) is a cloud system designed by Teltonika and intended for remote monitoring and management of Teltonika-Networks products.

The figure below is a screenshot of the RMS section taken from a device which has been connected to RMS:

Networking rutxxx manual administration rms connected v1.png
FieldValueDescription
Connection typeEnabled | Standby | Disabled; default: EnabledDefines how the device will connect to RMS:Enabled – the device attempts to connect to RMS every 2-5 minutes (every 2 minutes the first hour; then every 5 minutes). If it cannot connect for 14 days, it will enter Standby mode.Standby – the device attempts to connect to RMS every 6 hours.Disabled – RMS functionality is disabled.
Hostnamehost | ip; default: rms.teltonika.ltAddress of the RMS server. If you’re using regular RMS, just leave the default address (rms.teltonika.lt).
Portinteger [0..65535]; default: 15009Port number for connecting to RMS. If you’re using regular RMS, just leave the default port (15009).

The RMS server waits for incoming connections. Since the device attempts to connect at a fixed interval, it may not connect instantly after you add it to RMS. While it is disconnected, you can check how much time is left until the next connection attempt in the Status section:

Networking rutxxx manual administration rms disconnected v1.png

To speed up the process by initiating an immediate connection attempt, click the ‘Connect’ button.

Root CA #

The Root CA section is used to add a root CA certificate file to the router. There is a default file already preloaded on the device which will be overwritten by any uploaded file. The certificates must be in .pem format, maximum file size is 300 KB. These certificates are only needed if you want to use HTTPS for your services and the default file should be sufficient in most cases.

Networking rutxxx manual administration root ca v1.png

Submit a Comment

Your email address will not be published. Required fields are marked *