Prev

Next

Characteristics and differences between RS485 and RS232 RS232 and RS485 have always been the weak current common interface, but there are a lot of people do not understand the difference between them is not very thorough.   I. overview of RS485   RS-485 serial bus is widely used when the communication distance is tens of meters to thousands of meters. RS-485...

更多文章

What is M2M? As is known to all, besides providing more broadband speed and quality, 5G is characterized by the application of the Internet of things (IoT) from the demand and design stage. In order to adapt to different applications, mobile communication technology with no wiring, high coverage and high reusability has become an important...

更多文章

The similarities and differences between industrial... 1. definition of industrial 4G router and industrial switch   Industrial 4G router:   Industrial 4G router is a network device responsible for path finding. It provides users with communication by finding the least communication from multiple paths in the interconnection network. Industrial 4G router...

更多文章

4g router features of E-lins Technology With the development of new communication technologies and the continuous improvement of network efficiency and function of wireless communication, 4G has been widely used. 4G industrial-grade wireless routers are playing an increasingly important role in the applications of various industries, and the price is getting...

更多文章

E-Lins Industrial router applications Industrial-grade routers as Internet network layer communication equipment application in all walks of life, brought a lot of convenience for our industry. "E-Lins" introduce the application of industrial router scenario analysis.   1 The self-service terminal network   E-lins industrial router networking...

更多文章

twitter

4g router features of E-lins Technology

Category : 产品文章

With the development of new communication technologies and the continuous improvement of network efficiency and function of wireless communication, 4G has been widely used. 4G industrial-grade wireless routers are playing an increasingly important role in the applications of various industries, and the price is getting cheaper and cheaper. Currently, there are a lot of optional devices in the market, so how to choose one that can guarantee long-term use, stability and reliability, and affordable price is the problem that customers think about the most. The following is a specific selection reference for the 4G industrial wireless router of E-lins technology.

 

I. Industrial-grade design

1. Adopt high-performance industrial-grade 32-bit processor and adopt qualcomm chip, the world’s top wireless solution, with high processing speed, low power consumption, low heat output, strong compatibility and more stable, which can meet the requirement of 365 days a year, 7*24 hours long and stable operation without dropping the line.

2. Adopt high-performance industrial-grade communication module and high-quality communication module of huawei and other first-tier brands, with strong reception ability, stable signal and faster transmission.

The operating system uses OpenWRT, a highly modular, highly automated embedded Linux system, which makes the device more stable, has a large capacity of Flash and memory, and can support the requirements of customized development. High quality PCB circuit boards are manufactured with high quality materials and high standard. Stable industrial components are used for product components. All the machines are automated to realize patch production, ensuring the stability and reliability of the products. The power supply adopts wide voltage design to support dc5v-40v, with built-in anti-phase protection and over-voltage and over-current protection of the power supply, which can withstand the impact of instantaneous high voltage and current. Ethernet USES gigabit network port, built-in electromagnetic protection Ethernet interface built-in 1.5kv electromagnetic isolation protection, gigabit network port, faster transmission speed. The shell with strong anti-interference ability adopts thickened metal shell, shielding electromagnetic interference, and the equipment protection grade IP34, which is suitable for use in harsh industrial environment.

 

II. Powerful function

 

Multi-mode multi-card, load balancing

Expand network equipment and server bandwidth, increase throughput, enhance network data processing capacity, and improve network flexibility and availability.

 

Support global network formats

Support 2G, 3G and 4G networks of the three major domestic operators, or support Europe, southeast Asia, Africa, Latin America and other countries.

 

Support wired wireless backup

WAN port and LAN port can be flexibly switched to support wired and wireless backup of WAN port, with wired priority and wireless backup.

 

Serial transmission

Support simultaneous RS 232/485 serial port transmission.

 

Support APN/VPDN special network card, support a variety of VPN support APN/VPDN special network card use, at the same time support PPTP, L2TP, Ipsec, OpenVPN, GRE and other VPN.

 

Powerful WIFI function

WIFI supports 802.11b/g/n, WIFI AP, AP Client, repeater, relay bridge, WDS and other working modes, 802.11ac, or 5.8g (optional).

 

Support IP penetration function can achieve the IP address of the host IP obtained for the router, which is equivalent to the host directly plugging in the card to dial up the Internet to obtain the IP of the base station.

 

VLAN virtual LAN division through the division of VLAN, enhance the security of the LAN, VLAN technology, can be different locations, different networks, different users together, forming a virtual network environment. Support QOS, bandwidth speed limit support different network port bandwidth speed limit, IP speed limit, total bandwidth speed limit. Support DHCP, DDNS, firewalls, NAT and the function such as DMZ host support ICMP, TCP, UDP, Telnet, FTP, HTTP, HTTPS and network protocol support time to restart, SMS control, GPS/beidou positioning function (optional), support M2M cloud platform management, mobile monitoring and WEB monitoring, device data monitoring, traffic limit function, push resources, statistics, the remote device management (remote restart, WiFi switch), remote parameter modification, traffic restrictions, GPS tracking trajectory.

 

III. stable and reliable

1. Support hardware WDT watchdog, provide anti-dropping mechanism, and ensure that the data terminal is always online.

2. Support ICMP detection and traffic detection, automatically restart the equipment if network abnormality is found in time to ensure the stability and reliability of the system in long-term use.

3. Industrial-grade design, metal shell, anti-interference, anti-radiation, 95% humidity, no condensation, high temperature and low temperature resistance, minus 30 degrees to 75 degrees high temperature can work normally.

4. Our products have passed CCC certification, European CE certification and other certifications

 

Simple operation, easy to use

1. Simple Internet access, push-stick user card interface, insert mobile phone card/Internet of things card/special network card, and you can use the network port and WIFI after power on.

2. Support software and hardware to restore factory Settings, software can clear parameters, hardware RST one-key to restore factory Settings.

3. Product quick operation manual, WEB menu-type page, can quickly set up the device for use.

4. Diagnostic tools: log download and view, remote log record, ping detection, route tracking, easy to detect device information.

How to Setup VPN Server in Windows Server

Category : 技术相关

Windows Server support VPN Server features. Here let’s talk how to set up it.

Step1) Open “Server Manager“.

Step2) On the top menu, click on “Action” and “Add Roles“.

This will bring up the role installation wizard. On the first screen titled “Before your begin” read the requirements and click “Next” to continue.

Step3) Next, on the screen titled “Select Server Roles“, place check mark on “Network Policy and Access Services” and click “Next” to continue.

On the third screen titled “Network Policy and Access Services” read what it is stated and click “Next” to continue.

On the following screen titled “Select Role Services” place a check mark on “Routing and Remote Access Services” and make sure “Remote Access Service” and “Routing” are selected as well. Click “Next” to continue”.

Step4) Next, on the screen titled “Confirm Installation Selection“, you will get a summary of everything that will be installed. Make sure everything looks good and click on the “Install” button. Once the installation finishes, click “Close” to end the wizard.

Back on the main Server Manager window, right click on “Configure and Enable Routing and Remote Access“.

This will bring up the “Routing and Remote Access Wizard“. On the first window, click “Next“.

Step5) On the second window, select “Custom Configuration” and click “Next” to continue.

Step6) Next, place a check mark on “VPN access” and click “Next” to continue.

On the last screen of the wizard, click “Finish” and then click “Start Service” on the following window that will pop up.

Step7) Once the process is finished, and you are back on the main Server Manager window, routing and remote access should now be up and running.

Step8) Open Ports on the Firewall

For PPTP open:

Port 1723 TCP
Port 47 GRE

Step9) Give Domain Users Access to the VPN

If you are on a domain, go to your domain server, click on “Start“, “All Programs“, “Administrative Tools“, “Active Directory Users and Computers“.

Step10) On the left hand side column, look for your domain users. Double click on the user you want to give access to. This will bring up the properties for that user. Click on the “Dial-In” tab and under “Network Access Permission” select “Allow Access“. Click “Apply” and “Ok” to finish.

Repeat the same operation for all users on your network you want to give VPN access to. And that is it, as simple as that!

Now the VPN Server is set.

What is VPN

Category : 其他, 技术相关

A virtual private network (VPN) extends a private network across a public network or internet. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

VPNs can provide functionality, security and/or network management benefits to the user. But they can also lead to new issues, and some VPN services, especially “free” ones, can actually violate their users’ privacy by logging their usage and making it available without their consent, or make money by selling the user’s bandwidth to other users.

Some VPNs allow employees to securely access a corporate intranet while located outside the office. Some can securely connect geographically separated offices of an organization, creating one cohesive network. Individual Internet users can use some VPNs to secure their wireless transactions, to circumvent geo-restrictions and censorship, and/or to connect to proxy servers for the purpose of protecting personal identity and location. But some Internet sites block access via known VPNs to prevent the circumvention of their geo-restrictions.

A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryption. A VPN available from the public Internet can provide some of the benefits of a wide area network (WAN). From a user perspective, the resources available within the private network can be accessed remotely.

Traditional

VPNs are characterized by a point-to-point topology, and they do not tend to support or connect broadcast domains, so services such as Microsoft NetBIOS may not be fully supported or work as they would on a local area network (LAN). Designers have developed VPN variants, such as Virtual Private LAN Service (VPLS), and layer-2 tunneling protocols, to overcome this

limitation.