Template:Networking tswos manual maintenance: Difference between revisions

From Teltonika Networks Wiki
No edit summary
No edit summary
 
(8 intermediate revisions by the same user not shown)
Line 44: Line 44:
     <tr>
     <tr>
         <td>Type</td>
         <td>Type</td>
         <td>Ping {{!}} <span style="color:olive">Wget</span>{{#switch:{{{name}}}|TSW202={{!}} <span style="color:blue">Port|#default=}}; default</span>: <b>Ping</b></td>
         <td>Ping {{!}} <span style="color:olive">Wget</span>{{#switch:{{{name}}}|TSW202= {{!}} <span style="color:blue">Port</span>|#default=}}; default: <b>Ping</b></td>
         <td>Method used for health checking.
         <td>Method used for health checking.
             <ul>
             <ul>
Line 54: Line 54:
     <tr>
     <tr>
         <td>Action if no echo is received</td>
         <td>Action if no echo is received</td>
         <td>Device reboot {{!}} None; default: <b>Device reboot</b></td>
         <td>Device reboot {{!}} None{{#switch:{{{name}}}|TSW202 = {{!}} <span style="color:blue">Restart port</span>|#default=}}; default: <b>Device reboot</b></td>
         <td>Action that will be executed if there is no response after the specified amount of retries. If <b>None</b> is selected, only a message to syslog will be logged.</td>
         <td>Action that will be executed if there is no response after the specified amount of retries. If <b>None</b> is selected, only a message to syslog will be logged.</td>
     </tr>
     </tr>
Line 96: Line 96:
         <td>host {{!}} ip; default: <b>8.8.8.8</b></td>
         <td>host {{!}} ip; default: <b>8.8.8.8</b></td>
         <td>Hostname or IP address to which the Ping/Wget requests will be sent.</td>
         <td>Hostname or IP address to which the Ping/Wget requests will be sent.</td>
     </tr>
     </tr>{{#switch:{{{name}}}|TSW202=
     <tr>
     <tr>
         <td><span style="color:blue">Ping by</span></td>
         <td><span style="color:blue">Ping by</span></td>
Line 106: Line 106:
         <td>port number and number of devices (unsigned integer); default: <b>Port1:1</b></td>
         <td>port number and number of devices (unsigned integer); default: <b>Port1:1</b></td>
         <td>Port number and number of devices addresses to be pinged. (Number of devices connected must be less or equal to the actual number of connected devices to the port).</td>
         <td>Port number and number of devices addresses to be pinged. (Number of devices connected must be less or equal to the actual number of connected devices to the port).</td>
     </tr>
     </tr>|#default=}}
</table>
</table>


Line 166: Line 166:
==Backup==
==Backup==
===Summary===
===Summary===
----
 
The <b>Backup</b> page is used to generate configuration backup files or upload existing ones to the device. This chapter is an overview of the Backup page in {{{name}}} devices.
The <b>Backup</b> page is used to generate configuration backup files or upload existing ones to the device. This chapter is an overview of the Backup page in {{{name}}} devices.


===Create default configuration===
===Create backup===
----
 
The <b>Create default configuration</b> section is used to create or delete a file which stores current device configuration. The default configuration can later be loaded in [[{{{name}}}_Maintenance#Backup|Backup]] page or via reset button.
The <b>Backup configuration</b> section is used to generate and download a file which stores the current device configuration. The backup file can later be uploaded to the same device or another device of the same type (product codes must match).
 
This section contains MD5, SHA256 checksum fields generated from latest downloaded backup file, 'Encrypt' option and the 'Download' button to generate and download the device configuration backup file.
 
[[File:Networking_rutos_manual_backup_create_backup.png|border|class=tlt-border]]
 
{{#ifeq:{{{no_packages}}}|1||
<b><u>Important notes</u></b>:


Click the 'Create' button to generate default configuration file from your current device configuration.
1. Password field is required if Encrypt is turned on and that's when the field appears. Password that will be used to encrypt Backup file. It will have to be provided when extracting formatted zip archive to gain access to a tar file.


[[File:Networking_tswos_manual_maintenance_backup_create_default_configuration.png|border|class=tlt-border]]
2. If the device does not have an Internet connection when a Backup file is being loaded, <u>it will not reinstall software packages installed from Services → [[{{{name}}} Package Manager|Package Manager]]</u>. You can add the package installation files to the Backup file manually, a {{{name}}} device will automatically install them when you load the Backup file even without a data connection.


===Backup configuration===
To embed a Backup file with package installation files, follow these steps:
----
The <b>Backup configuration</b> section is used to generate and download a file which stores the current device configuration. The backup file can later be uploaded to the same device or another device of the same type (product codes must match).


This section contains MD5, SHA256 checksum fields generated from latest downloaded backup file, 'Download' button to generate and download the device configuration backup file.
<ul>
    <li>Download the necessary software package installation files <b>[[{{{name}}} Package Downloads|from here]]</b></li>
    <li>Download a Backup file.</li>
    <li>Open the Backup file and create a new folder called <i>backup_packages</i> in the <i>/etc</i> directory.</li>
    <li>Add the necessary package files to <i>/etc/backup_packages</i></li>
    <li>Make sure files in <i>/etc/backup_packages</i> are fully extracted with the *.ipk extensions</li>
</ul>}}


[[File:Networking_tswos_manual_maintenance_backup_backup_configuration.png|border|class=tlt-border]]
===Upload backup===


===Restore configuration===
----
The <b>Restore configuration</b> section is used to upload a configuration file that was taken from this device or another device of the same type.
The <b>Restore configuration</b> section is used to upload a configuration file that was taken from this device or another device of the same type.


Click the 'Browse' button to select a backup file from your computer and click the 'Upload archive' button to apply the selected configuration on to this device.
Turn on 'Encrypted' if backup file was previously encrypted and click the 'Browse' button to select a backup file from your computer and click the 'Upload archive' button to apply the selected configuration on to this device.


[[File:Networking_tswos_manual_maintenance_backup_restore_configuration.png|border|class=tlt-border]]
[[File:Networking_rutos_manual_backup_upload_backup.png|border|class=tlt-border]]


<b>Important notes</b>:  
<b>Important notes</b>:  
<ul>
<ul>
    <li>Password will be used when extracting formatted 7z or zip archive to gain access to a tar file.</li>
     <li>Backup files can be uploaded only if they are taken from an identical device (identical Product code (can be checked in the Status → [[{{{name}}} System|System]] page)) with identical or older firmware.</li>
     <li>Backup files can be uploaded only if they are taken from an identical device (identical Product code (can be checked in the Status → [[{{{name}}} System|System]] page)) with identical or older firmware.</li>
     <li>It is important to remember that the backup file not only changes the device configuration, but also the password. If you are unsure of the backup file's password, you may want to reconsider uploading it because you may lose access to device.</li>
     <li>It is important to remember that the backup file not only changes the device configuration, but also the password. If you are unsure of the backup file's password, you may want to reconsider uploading it because you may lose access to device.</li>
Line 201: Line 211:
====Backup Security Check====
====Backup Security Check====
----
----
After uploading a backup file your device will calculate checksums for uploaded file and display them. If this backup file was the latest downloaded in your device then you can compare these checksums with the ones in your [[#Backup configuration|Backup configuration]] section to verify backup's integrity.
After uploading a backup file your device will calculate checksums for uploaded file and display them. If this backup file was the latest downloaded in your device then you can compare these checksums with the ones in your [[#Create backup|Create backup]] section to verify backup's integrity.


If everything is in order click <b>Proceed</b> to restore configuration to backup.
If everything is in order click <b>Proceed</b> to restore configuration to backup.


[[File:Networking_rutos_manual_backup_backup_security_check.png|border|class=tlt-border]]
[[File:Networking_rutos_manual_backup_backup_security_check.png|border|class=tlt-border]]
===Restore default settings===
----
The <b>Restore default settings</b> section is used for restoring device's configuration.
[[File:Networking_tswos_manual_maintenance_backup_restore_default_settings.png|border|class=tlt-border]]
<table class="nd-mantable">
    <tr>
        <th>Field</th>
      <th>Value</th>
      <th>Description</th>
    </tr>
    <tr>
  <td>Restore to factory defaults</td>
        <td>-(interactive button)</td>
        <td>Restores device to manufacturer's default settings.</td>
    </tr>
    <tr>
  <td>Restore to user's defaults<span class="asterisk">*</span></td>
        <td>-(interactive button)</td>
        <td>Restores device to custom configuration set by the user.</td>
    </tr>
</table>
<span class="asterisk">*</span> You will not see this button until you have created a <b>[[{{{name}}}_Maintenance#Create_default_configuration|User's default configuration]]</b>.


==Troubleshoot==
==Troubleshoot==
Line 238: Line 222:
The <b>Logging Settings</b> section is used to configure how and where the device stores system log data. The system log is a file that contains information on various system related events and is useful to engineers for troubleshooting the device.
The <b>Logging Settings</b> section is used to configure how and where the device stores system log data. The system log is a file that contains information on various system related events and is useful to engineers for troubleshooting the device.


[[File:Networking_tswos_manual_maintenance_troubleshoot_logging_settings.png|border|class=tlt-border]]
[[File:Networking_tswos_manual_maintenance_troubleshoot_logging_settings_v1.png|border|class=tlt-border]]


<table class="nd-mantable">
<table class="nd-mantable">
Line 254: Line 238:
       <td>External system log server</td>
       <td>External system log server</td>
       <td>ip; default: <b>none</b></td>
       <td>ip; default: <b>none</b></td>
       <td>IP address of an external server that will be used to store device logs.</td>
       <td>IP address/host and port of an external server that will be used to store device logs.</td>
    </tr>
    <tr>
      <td>External system log server port</td>
      <td>integer [0..65535]; default: <b>none</b></td>
      <td>TCP/UDP port number of the external log server.</td>
     </tr>
     </tr>
     <tr>
     <tr>
Line 297: Line 276:
The <b>Troubleshoot</b> section is used to download various files that contain information used for troubleshooting the device. Refer to the figure and table below for information on the Troubleshoot page.
The <b>Troubleshoot</b> section is used to download various files that contain information used for troubleshooting the device. Refer to the figure and table below for information on the Troubleshoot page.


[[File:Networking_tswos_manual_maintenance_troubleshoot_troubleshoot.png|border|class=tlt-border]]
[[File:Networking_tswos_manual_maintenance_troubleshoot_troubleshoot_v1.png|border|class=tlt-border]]


<table class="nd-mantable">
<table class="nd-mantable">
Line 314: Line 293:
         <td>- (interactive button)</td>
         <td>- (interactive button)</td>
         <td>Displays the contents of the device kernel log file. The kernel log contains records of various events related to the processes of the operating system (OS).</td>
         <td>Displays the contents of the device kernel log file. The kernel log contains records of various events related to the processes of the operating system (OS).</td>
    </tr>
    <tr>
        <td>Encrypt</td>
        <td>off {{!}} <span style="color:blue">on</span>; default: <b>off</b></td>
        <td>Turn on AES 256 encryption and archive Troubleshoot file using zip format.</td>
    </tr>
    <tr>
        <td><span style="color:blue">Password</span></td>
        <td>string; default: <b>none</b></td>
        <td>Password that will be used to encrypt Troubleshoot file. It will have to be provided when extracting formatted zip archive to gain access to a tar file.</td>
     </tr>
     </tr>
     <tr>
     <tr>
Line 327: Line 316:
     <tr>
     <tr>
         <td>Enable TCP dump</td>
         <td>Enable TCP dump</td>
         <td>off {{!}} on; default: <b>off</b></td>
         <td>off {{!}} <span style="color:green">on</span>; default: <b>off</b></td>
         <td>Turns TCP dump packets capture on or off.</td>
         <td>Turns TCP dump packets capture on or off.</td>
     </tr>
     </tr>
</table>
====TCP dump====
----
<b>TCP dump</b> is used to capture packets moving through network interfaces. By default, the device does not store TCP dump information. You must enable TCP dump and save the changes before you can download the file.
If you enable TCP dump, you will notice additional configuration fields appear. Refer to the figure and table below for realted information.
[[File:Networking_tswos_manual_maintenance_troubleshoot_tcp_dump.png|border|class=tlt-border]]
<table class="nd-mantable">
     <tr>
     <tr>
         <th>Field</th>
         <td><span style="color:green">Select interface</span></td>
      <th>Value</th>
         <td>Any {{!}} br0.1; default: <b>Any</b></td>
      <th>Description</th>
    </tr>
    <tr>
        <td>Enable TCP dump</td>
         <td>off {{!}} on; default: <b>off</b></td>
        <td>Turns TCP dump packet capture on or off.</td>
    </tr>
    <tr>
        <td>Select interface</td>
        <td>network interface; default: '''Any'''</td>
         <td>Only captures packets that move through the specified network interface.</td>
         <td>Only captures packets that move through the specified network interface.</td>
     </tr>
     </tr>
     <tr>
     <tr>
         <td>Select protocol filter</td>
         <td><span style="color:green">Select protocol filter</span></td>
         <td>All {{!}} ICMP {{!}} TCP {{!}} UDP {{!}} ARP; default: <b>All</b></td>
         <td>All {{!}} ICMP {{!}} TCP {{!}} UDP {{!}} ARP; default: <b>All</b></td>
         <td>Only captures packets that match the specified protocol.</td>
         <td>Only captures packets that match the specified protocol.</td>
     </tr>
     </tr>
     <tr>
     <tr>
         <td>Select packets direction</td>
         <td><span style="color:green">Select packets direction</span></td>
         <td>Incoming/Outgoing {{!}} Incoming {{!}} Outgoing; default: <b>Incoming/Outgoing</b></td>
         <td>Incoming/Outgoing {{!}} Incoming {{!}} Outgoing; default: <b>Incoming/Outgoing</b></td>
         <td>Only captures packets coming from the specified direction.</td>
         <td>Only captures packets coming from the specified direction.</td>
     </tr>
     </tr>
     <tr>
     <tr>
         <td>Host</td>
         <td><span style="color:green">Host</span></td>
         <td>ip {{!}} host; default: <b>none</b></td>
         <td>Domain names or IP; default: <b>none</b></td>
         <td>Only captures packets related to the specified host.</td>
         <td>Only captures packets related to the specified host.</td>
     </tr>
     </tr>
     <tr>
     <tr>
         <td>Port</td>
         <td><span style="color:green">Port</span></td>
         <td>integer [0..65335]; default: <b>none</b></td>
         <td>integer [1..65535]; default: <b>none</b></td>
         <td>Only captures packets related to the specified communication port.</td>
         <td>Only captures packets related to the specified port.</td>
     </tr>
     </tr>
     <tr>
     <tr>
         <td>Select storage</td>
         <td><span style="color:green">Select storage</span></td>
         <td>RAM memory; default: <b>RAM memory</b></td>
         <td>RAM memory; default: <b>RAM memory</b></td>
         <td>Specifies where the TCP dump file will be stored.</td>
         <td>Specifies where the TCP dump file will be stored.</td>
Line 435: Line 403:


[[File:Networking_tswos_manual_maintenance_cli.png]]
[[File:Networking_tswos_manual_maintenance_cli.png]]
==Reset settings==
===Reset settings===
The <b>Reset settings</b> page is used for restoring device's configuration.
[[File:Networking_tswos_manual_backup_restore_default_settings.png|border|class=tlt-border]]
<table class="nd-mantable">
    <tr>
        <th>Reset type</th>
      <th>Value</th>
      <th>Description</th>
    </tr>
    <tr>
  <td>System settings</td>
        <td>-(single select)</td>
        <td>Resets all configuration except RMS data, mdcollect database, logs and PIN code.</td>
    </tr>
    <tr>
  <td>Factory defaults</td>
        <td>-(single select)</td>
        <td>Resets device to factory configuration.</td>
    </tr>
    <tr>
  <td>User's default configuration<span class="asterisk">*</span></td>
        <td>-(single select)</td>
        <td>Resets device to user's default configuration.</td>
    </tr>
</table>
<span class="asterisk">*</span>This button will be greyed out until you have created a <b>[[{{{name}}}_Maintenance#Create_user's_default_configuration|User's default configuration]]</b>.
===Create user's default configuration===
The <b>Create user's default configuration</b> section is used to create or delete a file which stores current device configuration. The default configuration can later be loaded in [[{{{name}}}_Maintenance#Reset_settings|Reset settings]] page or via reset button.
Click the 'Create' button to generate default configuration file from your current device configuration.
[[File:Networking_tswos_manual_backup_create_default_configuration.png|border|class=tlt-border]]


[[Category:{{{name}}} System section]]
[[Category:{{{name}}} System section]]

Latest revision as of 11:04, 28 October 2024

The information in this page is updated in accordance with firmware version .

Summary

This page is an overview of the Maintenance section of {{{name}}} devices.

Auto Reboot

Summary


Various automatic device reboot scenarios can be configured in the Auto Reboot section. Automatic reboots can be used as a prophylactic or precautionary measure that ensures the device will self-correct some unexpected issues, especially related to connection downtime.

This chapter is an overview of the Auto Reboot section of {{{name}}} devices.

Ping/Wget Reboot


The Ping/Wget Reboot functions periodically send ICMP or Wget requests to a specified IP address or host and waits for a response. If no response is received, the device will attempt the same action a defined number of times at a defined frequency. If there is still no response, the device will execute the specified action (reboot, by default).

The Ping/Wget Reboot section contains one pre-configured rule by default:

To enable the default rule, use the off/on slider next to it. You can add more rules with the 'Add' button or delete them using the 'Delete' button. If you wish to customize a rule, click the button that looks like a pencil next to it.

Field Value Description
Enable off | on; default: off Turns the rule on or off.
Type Ping | Wget; default: Ping Method used for health checking.
  • Ping - sends ICMP requests to the specified host.
  • Wget - retrieves the contents of the specified web server.
Action if no echo is received Device reboot | None; default: Device reboot Action that will be executed if there is no response after the specified amount of retries. If None is selected, only a message to syslog will be logged.
Interval 5 mins | 15 mins | 30 mins | 1 hour | 2 hours; default: 5 mins The frequency at which ping/Wget requests are sent to the specified host.
Interval count integer [1..9999]; default: 2 Indicates how many additional times the device will try sending requests if the initial one fails.
Timeout (sec) integer [1..9999]; default: 5 Maximum response time. If no echo is received after the amount of time specified in this field has passed, the ping/wget request is considered to have failed.
URL url; default: none URL to which the wget requests will be sent. E.g. http://www.host.com
Packet size integer [0..1000]; default: 56 ICMP packet size in bytes.
Interface Automatically selected; default: Automatically selected Specifies through which interface the pings will be sent. If Automatically selected is set, the pings will go through the main WAN interface.
IP type IPv4 | IPv6; default: IPv4 IP address version of the host to ping.
Host to ping host | ip; default: 8.8.8.8 Hostname or IP address to which the Ping/Wget requests will be sent.

Reboot Scheduler


The Reboot Scheduler is a function that reboots the device at a specified time interval regardless of other circumstances. It can be used as a prophylactic measure, for example, to reboot the device once at the end of every day.

You can add more rules with the 'Add' button or delete them using the 'Delete' button. If you wish to customize a rule, click the button that looks like a pencil next to it.

The figure below is an example of the Periodic Reboot configuration page and the table below provides information on the fields contained in that page:

Field Value Description
Enable off | on; default: off Turns the rule on or off.
Interval type Week days | Month days; default: Week days Scheduler instance interval type.
Week days Monday | Tuesday | Wednesday | Thursday | Friday | Saturday | Sunday; default: Monday Week day(s) when actions will be executed. This field becomes visible when Interval type is set to Week days.
Month day integer [1..31]; default: 1 Day of the month on which the reboot will occur. This field becomes visible when Interval type is set to Month days.
Month month(s) [january..december]; default: none The month(s) on which the reboot will occur. Leave empty to apply to all months. This field becomes visible when Interval type is set to Month days.
Day time time [00:00..23:59]; default: none Exact time of day the reboot will take place
Force last day off | on; default: off Forces intervals to accept last day of month as a valid option if selected day doesn't exist in the ongoing month. This field becomes visible when Interval type is set to Month days.

Backup

Summary

The Backup page is used to generate configuration backup files or upload existing ones to the device. This chapter is an overview of the Backup page in {{{name}}} devices.

Create backup

The Backup configuration section is used to generate and download a file which stores the current device configuration. The backup file can later be uploaded to the same device or another device of the same type (product codes must match).

This section contains MD5, SHA256 checksum fields generated from latest downloaded backup file, 'Encrypt' option and the 'Download' button to generate and download the device configuration backup file.

Important notes:

1. Password field is required if Encrypt is turned on and that's when the field appears. Password that will be used to encrypt Backup file. It will have to be provided when extracting formatted zip archive to gain access to a tar file.

2. If the device does not have an Internet connection when a Backup file is being loaded, it will not reinstall software packages installed from Services → [[{{{name}}} Package Manager|Package Manager]]. You can add the package installation files to the Backup file manually, a {{{name}}} device will automatically install them when you load the Backup file even without a data connection.

To embed a Backup file with package installation files, follow these steps:

  • Download the necessary software package installation files [[{{{name}}} Package Downloads|from here]]
  • Download a Backup file.
  • Open the Backup file and create a new folder called backup_packages in the /etc directory.
  • Add the necessary package files to /etc/backup_packages
  • Make sure files in /etc/backup_packages are fully extracted with the *.ipk extensions

Upload backup

The Restore configuration section is used to upload a configuration file that was taken from this device or another device of the same type.

Turn on 'Encrypted' if backup file was previously encrypted and click the 'Browse' button to select a backup file from your computer and click the 'Upload archive' button to apply the selected configuration on to this device.

Important notes:

  • Password will be used when extracting formatted 7z or zip archive to gain access to a tar file.
  • Backup files can be uploaded only if they are taken from an identical device (identical Product code (can be checked in the Status → [[{{{name}}} System|System]] page)) with identical or older firmware.
  • It is important to remember that the backup file not only changes the device configuration, but also the password. If you are unsure of the backup file's password, you may want to reconsider uploading it because you may lose access to device.

Backup Security Check


After uploading a backup file your device will calculate checksums for uploaded file and display them. If this backup file was the latest downloaded in your device then you can compare these checksums with the ones in your Create backup section to verify backup's integrity.

If everything is in order click Proceed to restore configuration to backup.

Troubleshoot

Logging Settings


The Logging Settings section is used to configure how and where the device stores system log data. The system log is a file that contains information on various system related events and is useful to engineers for troubleshooting the device.

Field Value Description
System log buffer size integer; default: 128 System log buffer size in kibibytes (KiB).
External system log server ip; default: none IP address/host and port of an external server that will be used to store device logs.
External system log server protocol UDP | TCP; default: UDP Communication protocol used by the external log server.
Save log in RAM memory | Flash memory; default: RAM memory Specifies which type of memory to use for storing system logs.
System log file size integer [10..500]; default: 200 Maximum size (in kilobytes) of a log file. When threshold is reached, log rotation is performed. Can be set to value from 10kB to 500kB. Smaller the file, larger amount of old logs is saved.
Compress off | on; default: off Compress old rotated logs using GZ format.
Delete - (interactive button) Deletes log file from router.
Show hostname off | on; default: off Show hostname instead of IP address in syslog.

Troubleshoot


The Troubleshoot section is used to download various files that contain information used for troubleshooting the device. Refer to the figure and table below for information on the Troubleshoot page.

Field Value Description
System log - (interactive button) Displays the contents of the device system log file. The system log contains records of various system related events, such as starts/stops of various services, errors, reboots, etc.
Kernel log - (interactive button) Displays the contents of the device kernel log file. The kernel log contains records of various events related to the processes of the operating system (OS).
Encrypt off | on; default: off Turn on AES 256 encryption and archive Troubleshoot file using zip format.
Password string; default: none Password that will be used to encrypt Troubleshoot file. It will have to be provided when extracting formatted zip archive to gain access to a tar file.
Troubleshoot file - (interactive button) Downloads the device Troubleshoot file. It contains the device configuration information, logs and some other files. When requesting support, it is recommended to always provide the device Troubleshoot file to Teltonika engineers for analysis.
TCP dump file - (interactive button) Downloads the device TCP dump file. TCP dump is a program used to capture packets moving through network interfaces. By default, the device does not store TCP dump information. You must enable TCP dump and save the changes before you can download the file.
Enable TCP dump off | on; default: off Turns TCP dump packets capture on or off.
Select interface Any | br0.1; default: Any Only captures packets that move through the specified network interface.
Select protocol filter All | ICMP | TCP | UDP | ARP; default: All Only captures packets that match the specified protocol.
Select packets direction Incoming/Outgoing | Incoming | Outgoing; default: Incoming/Outgoing Only captures packets coming from the specified direction.
Host Domain names or IP; default: none Only captures packets related to the specified host.
Port integer [1..65535]; default: none Only captures packets related to the specified port.
Select storage RAM memory; default: RAM memory Specifies where the TCP dump file will be stored.

Events Log

Summary


The Events Log page contains information on various device related events. This article is an overview of the Events Log page for {{{name}}} routers.

All Events


The All Events page contains a chronological list of various events related to the device. The figure below is an example of the Events Log section:

General Events


The General Events page contains a chronological list of general events related to the device. The figure below is an example of the Events Log section:

System Events


The System Events page contains a chronological list of system events related to the device. The figure below is an example of the Events Log section:

Network Events


The Netwrok Events page contains a chronological list of network events related to the device. The figure below is an example of the Events Log section:

Connections Events


The Connections Events page contains a chronological list of connections events related to the device. The figure below is an example of the Events Log section:

CLI

Summary


The CLI or Command-line interface functionality allows you to enter and execute Linux commands within the device. This manual page provides an overview of the CLI page in {{{name}}} devices.

CLI


The RutOS CLI is a console interface similar to the Linux Terminal program. Use the following credentials to log in:

  • Username: root
  • Password: device's password

If the login was successful, you should be greeted with a window similar to this:

Reset settings

Reset settings

The Reset settings page is used for restoring device's configuration.

Reset type Value Description
System settings -(single select) Resets all configuration except RMS data, mdcollect database, logs and PIN code.
Factory defaults -(single select) Resets device to factory configuration.
User's default configuration* -(single select) Resets device to user's default configuration.

*This button will be greyed out until you have created a [[{{{name}}}_Maintenance#Create_user's_default_configuration|User's default configuration]].

Create user's default configuration

The Create user's default configuration section is used to create or delete a file which stores current device configuration. The default configuration can later be loaded in [[{{{name}}}_Maintenance#Reset_settings|Reset settings]] page or via reset button.

Click the 'Create' button to generate default configuration file from your current device configuration.


[[Category:{{{name}}} System section]]