RUTX11 Maintenance

Wiki mirrorView source
The information in this page is updated in accordance with firmware version RUTX_R_00.07.22.1.

Summary

This page is an overview of the Maintenance section of RUTX11 devices.

Auto Reboot

Summary

Various automatic device reboot scenarios can be configured in the Auto Reboot section. Automatic reboots can be used as a prophylactic or precautionary measure that ensures the device will self-correct some unexpected issues, especially related to connection downtime.
This chapter is an overview of the Auto Reboot section of RUTX11 devices.

Ping/Wget Reboot

The Ping/Wget Reboot functions periodically send ICMP or Wget requests to a specified IP address or host and waits for a response. If no response is received, the device will attempt the same action a defined number of times at a defined frequency. If there is still no response, the device will execute the specified action (reboot, by default).
The Ping/Wget Reboot section contains one pre-configured rule by default:
To enable the default rule, use the off/on slider next to it. You can add more rules with the 'Add' button or delete them using the 'Delete' button. The maximum limit of instances is 30. If you wish to customize a rule, click the button that looks like a pencil next to it.
FieldValueDescription
Enableoff | on; default: offTurns the rule on or off.
No action on data limitoff | on; default: offStop actions when mobile data limit is reached.
TypePing | Wget ; default: PingMethod used for health checking.
  • Ping - sends ICMP requests to the specified host.
  • Wget - retrieves the contents of the specified web server.
Action if no echo is receivedDevice reboot | None| Modem reboot | Restart mobile connection | (Re)register | Send SMS; default: Device rebootAction that will be executed if there is no response after the specified amount of retries. If None is selected, only a message to syslog will be logged.
Phone Numberphone number(s); default: noneRecipient's phone number(s) specified in international format.
Message textstring; default: noneText to be included in the SMS message.
Interval1 minutes | 2 minutes | ... | 30 minutes | 1 hour | 2 hour; default: 5 minutesThe frequency at which ping/Wget requests are sent to the specified host. Note: The interval depends on the type of action.
Interval countinteger [1..9999]; default: 2Indicates how many additional times the device will try sending requests if the initial one fails.
Timeout (sec)integer [1..9999]; default: 5Maximum response time. If no echo is received after the amount of time specified in this field has passed, the ping/wget request is considered to have failed.
Packet sizeinteger [0..1000]; default: 56ICMP packet size in bytes.
InterfaceAutomatically selected | Ping from mobile; default: Automatically selectedSpecifies through which interface the pings will be sent. If Automatically selected is set, the pings will go through the main WAN interface.
IP typeIPv4 | IPv6; default: IPv4IP address version of the host to ping.
Action conditionWhen all requests fail | When any request fails; default: When all requests failSelect when the action will be executed.
Host to pinghost | ip; default: 8.8.8.8Hostname or IP address to which the Ping/Wget requests will be sent.
Host to ping from SIM 1ip; default: 8.8.8.8Hostname or IP address to which the ping requests will be sent (e.g., 1.1.1.1 or www.host.com if DNS server is configured correctly). The device performs the selected action only if all defined hosts for the active SIM fail to respond.
Host to ping from SIM 2ip; default: 8.8.8.8Hostname or IP address to which the ping requests will be sent (e.g., 1.1.1.1 or www.host.com if DNS server is configured correctly). The device performs the selected action only if all defined hosts for the active SIM fail to respond.
URLurl address; default: noneURL to which the wget requests will be sent (e.g., http://www.host.com).

Reboot Scheduler

The Reboot Scheduler is a function that reboots the device at a specified time interval regardless of other circumstances. It can be used as a prophylactic measure, for example, to reboot the device once at the end of every day.
You can add more rules with the 'Add' button or delete them using the 'Delete' button. The maximum limit of instances is 30. If you wish to customize a rule, click the button that looks like a pencil next to it.
The figure below is an example of the Periodic Reboot configuration page and the table below provides information on the fields contained in that page:
FieldValueDescription
Enableoff | on; default: offTurns the rule on or off.
ActionDevice reboot | Modem reboot; default: Device rebootAction that will be executed at the specified time.
Interval typeWeek days | Month days; default: Week daysScheduler instance interval type.
Week daysMonday | Tuesday | Wednesday | Thursday | Friday | Saturday | Sunday; default: MondayWeek day(s) when actions will be executed. This field becomes visible when Interval type is set to Week days.
Month dayinteger [1..31]; default: 1Day of the month on which the reboot will occur. This field becomes visible when Interval type is set to Month days.
Monthmonth(s) [january..december]; default: noneThe month(s) on which the reboot will occur. Leave empty to apply to all months. This field becomes visible when Interval type is set to Month days.
Day timetime [00:00..23:59]; default: noneExact time of day the reboot will take place
Force last dayoff | on; default: offForces intervals to accept last day of month as a valid option if selected day doesn't exist in the ongoing month. This field becomes visible when Interval type is set to Month days.

Backup

Summary

The Backup page is used to generate configuration backup files or upload existing ones to the device. This chapter is an overview of the Backup page in RUTX11 devices.

Create backup

The Backup configuration section is used to generate and download a file which stores the current device configuration. The backup file can later be uploaded to the same device or another device of the same type (product codes must match).
This section contains MD5, SHA256 checksum fields generated from latest downloaded backup file, 'Encrypt' option and the 'Download' button to generate and download the device configuration backup file.
Important notes:
1. Password field is required if Encrypt is turned on and that's when the field appears. Password that will be used to encrypt Backup file. It will have to be provided when extracting formatted zip archive to gain access to a tar file.
2. Backup file stores PIN code configured in RUTX11 Mobile page, but it will only be restored if device does not have PIN code already set when backup file is uploaded - PIN code from backup file will be set only if device does not have one set already.
3. If the device does not have an Internet connection when a Backup file is being loaded, it will not reinstall software packages installed from Package Manager. You can add the package installation files to the Backup file manually, a RUTX11 device will automatically install them when you load the Backup file even without a data connection.
To embed a Backup file with package installation files, follow these steps:
  • Download the necessary software package installation files from here
  • Download a Backup file.
  • Open the Backup file and create a new folder called backup_packages in the /etc directory.
  • Add the necessary package files to /etc/backup_packages
  • Make sure files in /etc/backup_packages are fully extracted with the *.ipk extensions

Upload backup

The Restore configuration section is used to upload a configuration file that was taken from this device or another device of the same type.
Turn on 'Encrypted' if backup file was previously encrypted and click the 'Browse' button to select a backup file from your computer and click the 'Upload archive' button to apply the selected configuration on to this device.
Important notes:
  • Password will be used when extracting formatted 7z or zip archive to gain access to a tar file.
  • Backup files can be uploaded only if they are taken from an identical device (identical Product code (can be checked in the Status → System page)) with identical or older firmware.
  • It is important to remember that the backup file not only changes the device configuration, but also the password. If you are unsure of the backup file's password, you may want to reconsider uploading it because you may lose access to device.

Backup Security Check

After uploading a backup file your device will calculate checksums for uploaded file and display them. If this backup file was the latest downloaded in your device then you can compare these checksums with the ones in your Create backup section to verify backup's integrity.
If everything is in order click Proceed to restore configuration to backup.

Troubleshoot

Troubleshoot Logs

The Troubleshoot section is used to download various files that contain information used for troubleshooting the device. Refer to the figure and table below for information on the Troubleshoot page.
FieldValueDescription
System logs- (interactive button)Displays the contents of the device's system log file. The system log contains records of various system related events, such as starts/stops of various services, errors, reboots, etc.
Kernel logs- (interactive button)Displays the contents of the device's kernel log file. The kernel log contains records of various events related to the processes of the operating system (OS).
Encryptoff | on; default: offTurn on AES 256 encryption and archive Troubleshoot file using zip format.
Passwordstring; default: nonePassword that will be used to encrypt Troubleshoot file. It will have to be provided when extracting formatted zip archive to gain access to a tar file.
Troubleshoot file- (interactive button)Downloads the device Troubleshoot file. It contains the device configuration information, logs and some other files. When requesting support, it is recommended to always provide the device Troubleshoot file to Teltonika engineers for analysis.

Logging Settings

The Logging Settings section is used to configure how and where the device stores system log data. The system log is a file that contains information on various system related events and is useful to engineers for troubleshooting the device.
FieldValueDescription
Save log inRAM memory | Flash memory; default: RAM memorySpecifies which type of memory to use for storing system logs.
Show hostnameoff | on; default: offShow hostname instead of IP address in syslog.
System log file sizeinteger [1..65535]; default: 128Maximum size (in kilobytes) of a log file. When threshold is reached, log rotation is performed.
External system log server Hostnamehost:port; default: noneIP address/host and port of an external server that will be used to store device logs.
Compressoff | on; default: offCompress previously rotated log files using gzip (.gz) format.
External system log server ProtocolUDP | TCP; default: UDPExternal system log server hostname and port in host:port format (i.e. 127.0.0.1:6001).
Delete log file- (interactive button)Deletes log file from device.

TCP dump

Enable TCP dumpoff | on; default: offTurns TCP dump packets capture on or off.
Select interfaceAny | LAN | WAN | WLAN; default: AnyOnly captures packets that move through the specified network interface.
Select protocol filterAll | ICMP | TCP | UDP | ARP; default: AllOnly captures packets that match the specified protocol.
HostDomain names or IP; default: noneOnly captures packets related to the specified host.
Portinteger [1..65535]; default: noneOnly captures packets related to the specified port.
Select packets directionIncoming/Outgoing | Incoming | Outgoing; default: Incoming/OutgoingOnly captures packets coming from the specified direction.
Select storageRAM memory | ; default: RAM memorySpecifies where the TCP dump file will be stored.
TCP dump file- (interactive button)Downloads the device TCP dump file. TCP dump is a program used to capture packets moving through network interfaces. By default, the device does not store TCP dump information. You must enable TCP dump and save the changes before you can download the file.

Diagnostics

The Diagnostics section is used to execute simple network diagnostic tests, including ping, traceroute and nslookup.
FieldValueDescription
MethodPing | Traceroute | Nslookup; default: PingSelects diagnostic method.
  • Ping - sends ICMP requests to the specified address.
  • Traceroute - displays the path that packets have to take in order to reach the specified address.
  • Nslookup - obtains domain name address and IP address mapping information.
ProtocolIPv4 | IPv6; default: IPv4Selects IP address family for diagnostic test.
Addressip | host; default: noneIP address or hostname on which the diagnostic test will be performed.
Perform-(interactive button)Performs diagnostic test when clicked.

Modem Debug

The Modem Debug section is used to send AT commands to the modem.
FieldValueDescription
AT commandAT command; default: noneField for the AT command.
Send-(interactive button)Sends at command to modem.
Response message- (read only text box)Response received from the sent AT command.
Clear-(interactive button)Clears response messages.
Export-(interactive button)Exports response messages to .csv file.

Events Log

Summary

The Events Log page contains information on various device related events. This article is an overview of the Events Log page for RUTX11 routers. The figure below is an example of the Events Log section. All events can be grouped by filters:
To export event log, use 'Export logs' feature:

Traffic Log

The Traffic Log section displays traffic which goes through one of the WAN interfaces. The device does collect data for the Traffic Log by default. To see Traffic Log information you must first enable Traffic Logging from the Services → Traffic Logging page.
The figure below is an example of the Traffic Log.

Hotspot Log

The Hotspot Log section displays Hotspot user information. The figure below is an example of the Hotspot Log.

CLI

Summary

The CLI or Command-line interface functionality allows you to enter and execute Linux commands within the device. This manual page provides an overview of the CLI page in RUTX11 devices.

CLI

The RutOS CLI is a console interface similar to the Linux Terminal program. Use the following credentials to log in:
  • Username: root
  • Password: device's password
If the login was successful, you should be greeted with a window similar to this:

Speed Test

Introduction

The Speed Test page provides with the possibility to test the data transfer speed of your WAN connection. This manual page provides an overview of the Speed Test windows in RUTX11 devices.
Important note: speed tests can drain a significant amount of data. Therefore, please make according considerations before using the speed test tool, especially if your data plan includes data limiting.

Speed Test

This network traffic speed speedometer will let you know what is your download and upload speed in Mbps.

Change Server

The speed test works by sending and downloading data from a public server and calculating the data transfer speed over a period of time. Usually the nearest server is selected automatically, but you can use the 'Change Server' button open to open a list of list of servers to choose from. This is optional, but using different servers may provide different results.
Once you choose a server you should see the server's service provider name appear and the IP of the server next to it. You can start the speed test by clicking the 'Start Speed Test' button.
Another way to use the speed test with a custom server is to click 'Use custom server URL' and enter your server URL (only official speed test servers with port 8080 are acceptable).

Custom Scripts

Summary

The User Scripts function allows users to write their own shell scripts that will be executed during the device's booting process. This page is an overview of the User Scripts function in RUTX11 devices.

Startup Script

The Startup Script section shows the contents of the /etc/rc.local file and allows the user to edit it. This scripts written in this file are executed at the end of the device's boot cycle. You can also execute the script via a command line interface with the following command:
sh /etc/rc.local
The figure below is an example of the Startup Script management section:

Reset Settings

Reset settings

The Reset settings page is used for restoring device's configuration.
Reset typeValueDescription
System settings-(single select)Resets all configuration except RMS data, mdcollect database, logs and PIN code.
Factory defaults-(single select)Resets device to factory configuration.
User's default configuration*-(single select)Resets device to user's default configuration.
*This button will be greyed out until you have created a User's default configuration.

Create user's default configuration

The Create user's default configuration section is used to create or delete a file which stores current device configuration. The default configuration can later be loaded in Reset settings page or via reset button.
Click the 'Create' button to generate default configuration file from your current device configuration.

Integrity

The Integrity is a system security feature used to protect and verify the consistency of important files and configurations on the device.

Integrity generation

This section lets you create a reference snapshot (baseline) of critical system files.
FieldValueDescription
Directorieslist; default: </etc/config>; </etc/init.d>Select the directories to include in the integrity database.
Generate-(interactive button)Creates an integrity file.
Last generated-(interactive button "Download")Shows when the baseline was last created.

Integrity validation

This section is used to check if anything has changed since the baseline was created.
FieldValueDescription
Validate fileFrom device | Upload; default: From deviceValidate the integrity database stored on this device or upload an external integrity file for verification.
Validate-(interactive button)Compares current integrity database against the saved.
SignatureStatusIndicates whether the signature is valid or not for database.
Scan timeDateWhen the validation was performed.
Scanned directoriesDirectoriesDirectories that were scanned.
NewCountNumber of new files found.
ModifiedCountNumber of modified files found.
MissingCountNumber of missing files found.

Integrity validation status

This is a detailed table showing of modified files.
FieldValueDescription
StatusModifiedShows the modified status of the file.
FilePathShows the file path.
SHA256 hashhashCompares the hash value of the expected and found file.
PermissionspermissionsCompares the permissions of the expected and found file.
OwnerownerCompares the owners of the expected and found files.
SizesizeCompares expected and found file sizes.