User Manual WISE-6610 Series Indsutrial LoRaWAN Gateway
Copyright The documentation and the software included with this product are copyrighted 2018 by Advantech Co., Ltd. All rights are reserved. Advantech Co., Ltd. reserves the right to make improvements in the products described in this manual at any time without notice. No part of this manual may be reproduced, copied, translated or transmitted in any form or by any means without the prior written permission of Advantech Co., Ltd. Information provided in this manual is intended to be accurate and reliable.
Declaration of Conformity CE This product has passed the CE test for environmental specifications. Test conditions for passing included the equipment being operated within an industrial enclosure. In order to protect the product from being damaged by ESD (Electrostatic Discharge) and EMI leakage, we strongly recommend the use of CE-compliant industrial enclosure products.
Technical Support and Assistance 1. 2. Visit the Advantech web site at www.advantech.com/support where you can find the latest information about the product. Contact your distributor, sales representative, or Advantech's customer service center for technical support if you need additional assistance.
Safety Instructions Read these safety instructions carefully. Keep this User Manual for later reference. Disconnect this equipment from any DC outlet before cleaning. Use a damp cloth. Do not use liquid or spray detergents for cleaning. For plug-in equipment, the power outlet socket must be located near the equipment and must be easily accessible. Keep this equipment away from humidity. Put this equipment on a reliable surface during installation.
Wichtige Sicherheishinweise Bitte lesen sie Sich diese Hinweise sorgfältig durch. Heben Sie diese Anleitung für den späteren Gebrauch auf. Vor jedem Reinigen ist das Gerät vom Stromnetz zu trennen. Verwenden Sie Keine Flüssig-oder Aerosolreiniger. Am besten dient ein angefeuchtetes Tuch zur Reinigung. Die NetzanschluBsteckdose soll nahe dem Gerät angebracht und leicht zugänglich sein. Das Gerät ist vor Feuchtigkeit zu schützen.
Safety Precaution - Static Electricity Static electricity can cause bodily harm or damage electronic devices. To avoid damage, keep static-sensitive devices in the static-protective packaging until the installation period. The following guidelines are also recommended: Wear a grounded wrist or ankle strap and use gloves to prevent direct contact to the device before servicing the device. Avoid nylon gloves or work clothes, which tend to build up a charge.
Contents Chapter Chapter 1 Product Overview ............................... 1 1.1 1.2 1.3 Specifications............................................................................................ 2 Hardware Views........................................................................................ 3 1.2.1 Front View..................................................................................... 3 1.2.2 Rear View ..................................................................................
3.6.7 3.6.8 Chapter Update Firmware ........................................................................ 66 Reboot ........................................................................................ 67 4 Configuration in Typical Situations ...........................................68 4.1 4.2 4.3 Enabling the LoRaWAN and Network Server ......................................... 69 Changing the Raw LoRa Data Format .................................................... 86 Node-RED Setup .........
List of Figures Figure 1.1 Figure 1.2 Figure 1.3 Figure 1.4 Figure 2.1 Figure 2.2 Figure 2.3 Figure 2.4 Figure 2.5 Figure 2.6 Figure 2.7 Figure 2.8 Figure 2.9 Figure 3.1 Figure 3.2 Figure 3.3 Figure 3.4 Figure 3.5 Figure 3.6 Figure 3.7 Figure 3.8 Figure 3.9 Figure 3.10 Figure 3.11 Figure 3.12 Figure 3.13 Figure 3.14 Figure 3.15 Figure 3.16 Figure 3.17 Figure 3.18 Figure 3.19 Figure 3.20 Figure 3.21 Figure 3.22 Figure 3.23 Figure 3.24 Figure 3.25 Figure 3.26 Figure 3.27 Figure 3.28 Figure 3.29 Figure 3.
Figure 3.44 Figure 3.45 Figure 3.46 Figure 3.47 Figure 3.48 Figure 3.49 Figure 3.50 Figure 3.51 Figure 3.52 Figure 3.53 Figure 3.54 Figure 3.55 Figure 3.56 Figure 3.57 Figure 3.58 Figure 3.59 Figure 3.60 Figure 3.61 Figure 3.62 Figure 4.1 Figure 4.2 Figure 4.3 Figure 4.4 Figure 4.5 Figure 4.6 Figure 4.7 Figure 4.8 Figure 4.9 Figure 4.10 Figure 4.11 Figure 4.12 Figure 4.13 Figure 4.14 Figure 4.15 Figure 4.16 Figure 4.17 Figure 4.18 Figure 4.19 Figure 4.20 Figure 4.21 Figure 4.22 Figure 4.23 Figure 4.
Chapter Product Overview 1 1
1.1 Specifications Specifications Description WSN Support Standard LoRaWAN Frequency WISE-6610-NXXX: US 902-928 (MHz) WISE-6610-EXXX: EU 863-870 (MHz) WISE-6610-AXXX: AS 920-925 (Mhz) ANT Connector SMA Male Reverse connector x 1 Ethernet 10/100 Mbps, auto MDI/MDIX Connector RJ45 x 1 LAN Interface Protection 1.5-kV built-in magnetic isolation protection Digital I/O Port Type Digital input on voltage: 2.
1.2 Hardware Views 1.2.1 Front View 1 2 3 4 WAN I/O WISE-6610 DAT PWR - LoRa + ETH Figure 1.1 Front View No. Item Description 1 System LED panel See “System LED Panel” on page 4 for further details. 2 I/O (Power socket) Connect cabling for power. 3 ETH port RJ45 x 1 4 Antenna connector Connector for antenna. 1.2.2 Rear View 1 Figure 1.2 Rear View No. Item Description 1 DIN-Rail holes Screw holes (2) used in the installation of a DIN rail clip. 1.2.
1.2.4 System LED Panel LED Name LED Color PWR Green DAT Green WAN Green Description 1.3 Dimensions 83 [3.26] mm [inch] 125.40 [4.94] I/O 37.50 [1.47] 7.50 [0.30] 140 [5.51] 150 [5.90] Figure 1.
Chapter 2 Gateway Installation 2
2.1 Warning Warning: Before working on equipment that is connected to power lines, remove any jewelry (including rings, necklaces, and watches). Metal objects can heat up when connected to power and ground, which can cause serious burns or weld the metal object to the terminals. Caution! Exposure to chemicals can degrade the sealing properties of materials used in the sealed relay device.
Caution! To prevent the system from overheating, do not operate it in an area that exceeds the maximum recommended ambient temperature of: 70°C (158°F). Caution! If the switch is to be installed in a hazardous location, ensure that the DC power source is located away from the vicinity of the switch. Caution! The installation of the equipment must comply with all national and local electrical codes.
2.3 Installing the Gateway 2.3.1 Installing Antenna 1. Connect the antenna by screwing the antenna connectors in a clockwise direction. 610 E-6 WIS Ra Lo I/O N WA H ET T DA - Figure 2.1 Installing the Antenna Position the antenna for optimal signal strength. The location and position of the antenna is crucial for effective wireless connectivity 610 E-6 WIS Ra Lo I/O N WA H ET T DA R PW - Note! + 2. + R PW Figure 2.
2.3.2 Wall Mounting 1. 2. 3. 4. Locate the area to install and mark the four screw locations. It is suggested to place the device on the installation location and use the mounting locations to mark the location of the screw holes). If necessary first drill pilot holes. Drill four holes over the four marked locations on the wall. On concrete, it is recommended to install wall sinks Align the SmartSwarm over the installation location on the wall. Secure the SmartSwarm with screws (Ø 5.0 mm).
2.3.3 DIN Rain Mounting 2.3.3.1 Installing the DIN Rail Mounting Kit 1. Align the DIN rail clip with the rear of SmartSwarm. 2. Secure the DIN rail clip and the SmartSwarm with screws. 3. 4. Figure 2.4 Wall Mount Installation Position the rear panel of the SmartSwarm directly in front of the DIN rail, making sure that the top of the DIN rail clip hooks over the top of the DIN rail, as shown in the following illustration. Make sure the DIN rail is inserted behind the spring mechanism.
See the following figure demonstrating the correct position of a completed DIN installation. Figure 2.6 Correctly Installed DIN Rail Kit 2.3.3.2 Removing the DIN Rail Mounting Kit 1. Ensure that power is removed from the SmartSwarm, and disconnect all cables and connectors from the front panel of the SmartSwarm. 2. Push down on the top of the DIN rail clip release tab with your finger. As the clip releases, lift the bottom of the SmartSwarm, as shown in the following illustration. Figure 2.
2.4 Connecting the Gateway to Ethernet Port 2.4.1 RJ45 Ethernet Cable Wiring For RJ45 connectors, data-quality, twisted pair cabling (rated CAT5 or better) is recommended. The connector bodies on the RJ45 Ethernet ports are metallic and connected to the GND terminal. For best performance, use shielded cabling. Shielded cabling may be used to provide further protection.
Chapter 3 Managing Gateway 3
3.1 Access Interface To access the login window, connect the device to the network, see “Connecting the Gateway to Ethernet Port” on page 12. When WISE-6610 Series is first installed, make sure the network environment is configured to enable access to the device. Your computer and the device must be on the same network subnet to allow them to establish a network connection. Before you begin, make sure the device is powered on, see “Power Supply Installation” on page 13 for further information. 1.
3.2 Recommended Practices One of the easiest things to do to help increase the security posture of the network infrastructure is to implement a policy and standard for secure management. This practice is an easy way to maintain a healthy and secure network. After you have performed the basic configurations on your switches, the following is a recommendation which is considered best practice policy. 3.2.
3.3 Status 3.3.1 General Selecting the General item will open a screen displaying a summary of basic information about the device and its activities. This page is also displayed when you login to the web interface. Information is divided into several sections, based upon the type of device activity or the properties area: Mobile Connection, Primary LAN, Peripheral Ports and System Information. If the device is WiFi equipped, there will be a WiFi section.
3.3.2 Network To view information about the interfaces and the routing table, open the Network item in the Status menu. To access this page, click Status > Network. Figure 3.4 Status > Network 3.3.3 DHCP Information about the DHCP server activity is accessible via DHCP item. The DHCP server provides automatic configuration of the client devices connected to the device.
3.3.4 IPsec Selecting the IPsec option in the status menu of the web page will bring up the information for any IPsec Tunnels that have been established. If the tunnel has been built correctly, the screen will display IPsec SA established (highlighted in red in the figure below.) If there is no such text in log, the tunnel was not created. To access this page, click Status > IPsec. Figure 3.6 Status > IPsec 3.3.5 DynDNS The device supports DynamicDNS using a DNS server on www.dyndns.org.
3.3.6 System Log If there are any connection problems you may view the system log by selecting the System Log menu item. Detailed reports from individual applications running in the device will be displayed. Use the Save Log button to save the system log to a connected computer. (It will be saved as a text file with the .log extension.) The Save Report button is used for creating detailed reports. (It will be saved as a text file with the .txt extension.
3.4 Configuration 3.4.1 LAN To enter the Local Area Network configuration, select the LAN menu item in the Configuration section. LAN Configuration page is divided into IPv4 and IPv6 columns, see Figure 3.10. There is dual stack support of IPv4 and IPv6 protocols - they can run alongside, you can configure either one of them or both. If you configure both IPv4 and IPv6, other network devices will choose the communication protocol.
To access this page, click Configuration > LAN. Figure 3.10 Configuration > LAN Item Description DHCP Client Enables/disables the DHCP client function supporting both IPv4 and IPv6. disabled - The device does not allow automatic allocation of an IP address from a DHCP server in LAN network. enabled - The device allows automatic allocation of an IP address from a DHCP server in LAN network. IP Address A fixed IP address of the Ethernet interface.
Item Description Default Gateway Specifies the IP address of a default gateway. If filled-in, every packet with the destination not found in the routing table is sent to this IP address. Use proper IP address notation in IPv4 and IPv6 column. DNS Server Specifies the IP address of the DNS server. When the IP address is not found in the Routing Table, the device forwards the request to DNS server specified here. Use proper IP address notation in IPv4 and IPv6 column.
Configuration of Dynamic DHCP Server Item Description Enable dynamic DHCP leases Select this option to enable a dynamic DHCP server. IP Pool Start Starting IP addresses allocated to the DHCP clients. Use proper notation in IPv4 and IPv6 column. IP Pool End End of IP addresses allocated to the DHCP clients. Use proper IP address notation in IPv4 and IPv6 column. Lease time Time in seconds that the IP address is reserved before it can be reused.
3.4.1.3 IEEE 802.1X Authentication To prevent unauthorized radios from accessing data transmitting over wireless transmission, WISE-6610 Series provides rock solid security settings. Navigate to Configuration > LAN and locate Enable IEEE 802.1X Authentication. Item Description Enable IEEE 802.1X Tick the radio button to enable the authentication function. Authentication Authentication Method Click the drop-down menu to select the method type. Range: EAPPEAP/MSCHAPv2 or EAP-TLS.
The settings required in the LAN configuration menu for an IPv4 Dynamic DHCP configuration are shown in the following figure. Figure 3.13 LAN Configuration for a Dynamic Network Typology Example 2: IPv4 Dynamic and Static DHCP server The range of allocated addresses is from 192.168.1.2 to 192.168.1.4. The address is allocated for 600 seconds (10 minutes). The client with the MAC address 01:23:45:67:89:ab has the IP address 192.168.1.10.
The settings required in the LAN configuration menu for an IPv4 Dynamic and Static DHCP configuration are shown in the following figure. Figure 3.15 LAN Configuration for an IPv4 Dynamic and Static DHCP Network Topology Example 3: IPv6 Dynamic DHCP Server The range of dynamic allocated IPv6 addresses is from 2001:db8::1 to 2001:db8::ffff. The address is allocated for 600 second (10 minutes). The device is still accessible via IPv4 (192.168.1.1). Figure 3.
Figure 3.
3.4.2 NAT To configure the address translation function, click on NAT in the Configuration section of the main menu. There is independent IPv4 and IPv6 NAT configuration since there is dual stack IPv4 and IPv6 implemented in the router. The NAT item in the menu on the left will expand to IPv4 and IPv6 options and you can click IPv6 to enable and configure the IPv6 NAT - see Figure below. The configuration fields have the same meaning in the IPv4 NAT Configuration and IPv6 NAT Configuration forms.
If you require more than sixteen NAT rules, insert the remaining rules into the Startup Script. The Startup Script dialog is located on Scripts page in the Configuration section of the menu. When creating your rules in the Startup Script, use this command for IPv4 NAT: iptables -t nat -A napt -p tcp -dport [PORT_PUBLIC] -j DNAT -to-destination [IPADDR]:[PORT_PRIVATE] Enter the IP address [IPADDR], the public ports numbers [PORT_PUBLIC], and private [PORT_PRIVATE] in place of square brackets.
Example1: IPv4 NAT Configuration with Single Device Connected Figure 3.19 Topology for NAT Configuration Example 1 It is important to mark the Send all remaining incoming packets to default server check box for this configuration. The IP address in this example is the address of the device behind the router. The default gateway of the devices in the subnetwork connected to router is the same IP address as displayed in the Default Server IPv4 Address field. Figure 3.
remaining incoming packets to default server is inactive, the router denies connection attempts. Figure 3.21 Topology for NAT Configuration Example 2 Figure 3.
3.4.3 OpenVPN Select the OpenVPN item to configure an OpenVPN tunnel. The OpenVPN tunnel function allows you to create a secure connection between two separate LAN networks. The device allows you to create up to four OpenVPN tunnels. IPv4 and IPv6 dual stack is supported. To access this page, click Configuration > OpenVPN. Figure 3.23 Configuration > OpenVPN > 1st Tunnel Item Description Description Specifies the description or name of tunnel.
Item Description Protocol Specifies the communication protocol. UDP - The OpenVPN communicates using UDP. TCP server - The OpenVPN communicates using TCP in server mode. TCP client - The OpenVPN communicates using TCP in client mode. UDPv6 - The OpenVPN communicates using UDP over IPv6. TCPv6 server - The OpenVPN communicates using TCP over IPv6 in server mode. TCPv6 client - The OpenVPN communicates using TCP over IPv6 in client mode.
Item Description Authenticate Mode Specifies the authentication mode: none - No authentication is set. Pre-shared secret - Specifies the shared key function for both sides of the tunnel. Username/password - Specifies authentication using a CA Certificate, Username and Password. X.509 Certificate (multiclient) - Activates the X.509 authentication in multi-client mode. X.509 Certificate (client) - Activates the X.509 authentication in client mode. X.509 Certificate (server) - Activates the X.
Configuration A B Remote IP Address 10.0.0.2 10.0.0.1 Remote Subnet 192.168.2.0 192.168.1.0 Remote Subnet Mask 255.255.255.0 255.255.255.0 Local Interface IP Address 19.16.1.0 19.16.2.0 Remote Interface IP Address 19.16.2.0 19.16.1.0 Compression LZO LZO Authenticate mode none none Examples of different options for configuration and authentication of OpenVPN tunnel can be found in the application note OpenVPN Tunnel [5]. 3.4.
Figure 3.
Item Description Description Name or description of the tunnel. Host IP Mode IPv4 - The device communicates via IPv4 with the opposite side of the tunnel. IPv6 - The device communicates via IPv4 with the opposite side of the tunnel. Remote IP Address IPv4, IPv6 address or domain name of the remote side of the tunnel, based in the Host IP Mode above. Tunnel IP Mode Remote ID Identifier (ID) of remote side of the tunnel. It consists of two parts: a hostname and a domain-name.
Item Description IKE DH Group Specifies the Diffie-Hellman groups which determine the strength of the key used in the key exchange process. Higher group numbers are more secure, but require more time to compute the key. ESP Algorithm Specifies the means by which the device selects the algorithm: auto - The encryption and hash algorithm are selected automatically. manual - The encryption and hash algorithm are defined by the user.
Lifetime - (Rekey margin + random value in range (from 0 to Rekey margin * Rekey Fuzz/100)) The default exchange of keys is in the following time range: Minimal time: 1h - (9m + 9m) = 42m Maximal time: 1h - (9m + 0m) = 51m We recommend that you maintain the default settings. When you set key exchange times higher, the tunnel produces lower operating costs, but the setting also provides less security.
connection between two separate LAN networks. The device allows you to create four GRE tunnels. To access this page, click Configuration > GRE. Figure 3.27 Configuration > GRE > 1st Tunnel Item Description Description Description of the GRE tunnel. Remote IP Address IP address of the remote side of the tunnel. Remote Subnet IP address of the network behind the remote side of the tunnel. Remote Subnet Mask Specifies the mask of the network behind the remote side of the tunnel.
Example: GRE Tunnel Configuration Figure 3.28 Topology of GRE Tunnel Configuration Example GRE tunnel configuration: Configuration A B Remote IP Address 10.0.0.2 10.0.0.1 Remote Subnet 192.168.2.0 192.168.1.0 Remote Subnet Mask 255.255.255.0 255.255.255.0 Examples of different options for configuration of GRE tunnel can be found in the application note GRE Tunnel [7]. 3.4.6 L2TP Note! L2TP is an unencrypted protocol. L2TP via IPv6 is not supported.
To access this page, click Configuration > L2TP. Figure 3.29 Configuration > L2TP Item Description Mode Specifies the L2TP tunnel mode on the device side: L2TP server - Specify an IP address range offered by the server. L2TP client - Specify the IP address of the server. Server IP Address IP address of the server. Client Start IP Address IP address to start with in the address range. The range is offered by the server to the clients.
Configuration of the L2TP tunnel: Configuration A B Mode L2TP Server L2TP Client Server IP Address N/A 10.0.0.1 Client Start IP Address 192.168.2.5 N/A Client End IP Address 192.168.2.254 N/A Local IP Address 192.168.1.1 N/A Remote IP Address N/A N/A Remote Subnet 192.168.2.0 192.168.1.0 Remote Subnet Mask 255.255.255.0 255.255.255.0 Username username username Password password password 3.4.7 PPTP Note! PPTP is an unencrypted protocol. PPTP via IPv6 is not supported.
Item Description Username Username for the PPTP tunnel login. Password Password for the PPTP tunnel login. The changes in settings will apply after pressing the Apply button. The firmware also supports PPTP pass through, which means that it is possible to create a tunnel through the device. Example: PPTP Tunnel Configuration Figure 3.32 Topology of PPTP Tunnel Configuration Example Configuration of the PPTP tunnel: Configuration A B Mode PPTP Server PPTP Client Server IP Address N/A 10.0.0.
To access this page, click Configuration > Services > DynDNS. Figure 3.33 Configuration > Services > DynDNS Item Description Hostname The third order domain registered on the www.dyndns.org server. Username Username for logging into the DynDNS server. Password Password for logging into the DynDNS server. IP Mode Specifies a DynDNS service other than the www.dyndns.org. Possible other services: www.spdns.de, www.dnsdynamic.org, www.noip.com.
3.4.8.2 HTTP To access this page, click Configuration > Services > HTTP. Figure 3.35 Configuration > Services > HTTP Item Description Enable HTTP service Click the check box to set up Ethernet encapsulation (remote access) through HTTP function. Enable HTTPS service Click the check box to set up Ethernet encapsulation over HTTPS. Session Timeout Enter the variable in minutes to define the timeout period for the session. Apply Click Apply to save the values. 3.4.8.
The figure below displays an example of a NTP configuration with the primary server set to ntp.cesnet.cz and the secondary server set to tik.cesnet.cz and with the automatic change for daylight saving time enabled. Figure 3.37 Example of NTP Configuration 3.4.8.4 SNMP The SNMP page allows you to configure the SNMP v1/v2 or v3 agent which sends information about the device (and its expansion ports) to a management station. To open the SNMP page, click SNMP in the Configuration section of the main menu.
Item Description Location Location of where you installed the device. Contact Person who manages the device together with information how to contact this person. To enable the SNMPv1/v2 function, mark the Enable SNMPv1/v2 access check box. It is also necessary to specify a password for access to the Community SNMP agent. The default setting is public. You can define a different password for the Read community (read only) and the Write community (read and write) for SNMPv1/v2.
that there is a tree structure. The following figure displays the basic tree structure that is used for creating the OIDs. Figure 3.39 OID Basic Structure The SNMP values that are specific for Conel devices create the tree starting at OID = .1.3.6.1.4.1.30140. You interpret the OID in the following manner: iso.org.dod.internet.private.enterprises.conel This means that the device provides for example, information about the internal temperature (OID 1.3.6.1.4.1.248.40.1.3.
The list of available and supported OIDs and other details can be found in the application note SNMP Object Identifier [8]. Figure 3.40 SNMP Configuration Example Figure 3.41 MIB Browser Example In order to access a particular device enter the IP address of the SNMP agent which is the device, in the Remote SNMP agent field. The dialog displayed the internal variables in the MIB tree after entering the IP address. Furthermore, you can find the status of the internal variables by entering their OID.
The path to the objects is: iso ? org ? dod ? internet ? private ? enterprises ? conel ? protocols The path to information about the device is: iso ? org ? dod ? internet ? mgmt ? mib-2 ? system 3.4.8.5 SMTP Use the SMTP form to configure the Simple Mail Transfer Protocol client (SMTP) for sending e-mails. IPv6 e-mail servers are supported. To access this page, click Configuration > Services > SMTP. Figure 3.
-r: number of attempts to send e-mail (default setting: 2) Note! Commands and parameters can be entered only in lowercase. Example: Sending an e-mail: email -t john@doe.com -s "System Log" -m "Attached" -a /var/log/messages The command above sends an e-mail to address john@doe.com with the subject "System Log", body message "Attached" and attachment messages file with System Log of the device directly from the directory /var/log/. 3.4.8.6 SSH To access this page, click Configuration > Services > SSH.
Example: Startup Script Figure 3.45 Example of a Startup Script When the device starts up, stop syslogd program and start syslogd with remote logging on address 192.168.2.115 and limited to 100 entries. Add these lines to the Startup Script: killall syslogd syslogd -R 192.168.2.115 -S 100 3.4.9.2 Up/Down Scripts Use the Up/Down IPv4 and Up/Down IPv6 page to create scripts executed when the Mobile WAN connection is established (up) or lost (down).
Example: IPv6 Up/Down Script Figure 3.46 Example of IPv6 Up/Down Script After establishing or losing an IPv6 WAN connection (connection to mobile network), the device sends an email with information about the connection state. It is necessary to configure SMTP before. Add this line to the Up Script field: email -t name@domain.com -s "Router" -m "Connection up." Add this line to the Down Script field: email -t name@domain.com -s "Router" -m "Connection down." 3.4.
To access this page, click Configuration > Automatic Update. Figure 3.47 Configuration > Automatic Update Item Description Base URL Base URL, IPv4 or IPv6 address from which the configuration file will be downloaded. This option also specifies the communication protocol (HTTP, HTTPS, FTP or FTPS), see examples below. Unit ID Name of configuration (name of the file without extension).
Example 1: Automatic Update In the following example the device checks for new firmware or configuration file each day at 1:00 a.m. An example is given for the WISE-6610 Series device. Firmware file: http://example.com/SPECTRE-v3L-LTE.bin Configuration file:http://example.com/test.cfg Figure 3.48 Example of Automatic Update 1 Example 2: Automatic Update Based on MAC In the following example the device checks for new firmware or configuration each day at 1:00 a.m.
Programming and compiling of modules is described in the Application Note Programming of User Modules [10]. Figure 3.50 User Modules Item Description MODBUS TCP2RTU Provides a conversion of MODBUS TCP/IP protocol to MDBUS RTU protocol, which can be operated on the serial line. Easy VPN client Provides secure connection of LAN network behind our device with LAN network behind CISCO device. NMAP Enables TCP and UDP scan. Daily Reboot Enables daily reboot of the device at the specified time.
3.5.1.1 MQTT and LoRaWAN To access the gateway configuration page, navigate to Customization and click User Modules > LoRaWAN Gateway > MQTT and LoRaWAN. Figure 3.51 User Modules > LoRaWAN Gateway > MQTT and LoRaWAN Item Description LoRaWAN Radio Setting Model Name Enter the model name. LoRaWAN Radio Enable Click the drop-down menu to enable the radio channel and corresponding settings. Radio 0 Main Frequency(KHz) Enter the frequency setting for the interface.
Item Description LoRaWAN Web Username Enter an identifier used to access the Web user interface for the LoRaWAN network server. LoRaWAN Web Password Enter the corresponding password to the set LoRaWAN Web username. LoRaWAN Network Server HTTPS Enable Click the drop-down menu to enable the HTTPS service (default: Off). Update Database Click to upload an existing server database. Download Database Click to upload the current server database.
3.5.1.3 LoRaWAN Status The LoRaWAN Status menu displays specific information pertaining to the basic and channel settings of the LoRaWAN Gateway. To access the page use the following guidelines: 1. From the LoRaWAN router, Customization menu, click User Modules. 2. In User Modules, click the LoRaWAN Gateway link. 3. The LoRaWAN Gateway Settings menu displays. Under Router menu, click LoRaWAN Status. The LoRaWAN Gateway Settings menu displays listing Basic, Channel, and Live Up Stream status information.
3.5.1.4 LoRaWAN Server The LoRaWan Server is a ready-to-use solution, which includes a web-based user interface, providing the components needed to build networks. To access this page, click User Modules > LoRaWAN Gateway > LoRaWAN Server. Figure 3.
3.5.1.5 LoRaWAN Server (https) Enable the LoRaWAN Network Server HTTPS Enable function under MQTT and LoRaWAN to access the website through https. To access this page, click User Modules > LoRaWAN Gateway > LoRaWAN Server (https). Figure 3.54 User Modules > LoRaWAN Gateway > LoRaWAN Server (https) 3.5.1.6 Advantech Application To access this page, click User Modules > LoRaWAN Gateway > Advantech Application. For more details, see “Changing the Raw LoRa Data Format” on page 86. Figure 3.
3.6 Administration 3.6.1 Users Note! This configuration function is only available for users assigned the admin role! To assign roles and manage user accounts open the Users form in the Administration section of the main menu. The first frame of this configuration form contains an overview of available users. The table below describes the meaning of the buttons in this frame. To access this page, click Administration > Users. Figure 3.
3.6.2 Change Profile In addition to the standard profile, up to three alternate device configurations or profiles can be stored in device's non-volatile memory. You can save the current configuration to a device profile through the Change Profile menu item. Select the alternate profile to store the settings to and ensure that the Copy settings from current profile to selected profile box is checked. The current settings will be stored in the alternate profile after the Apply button is pressed.
3.6.4 Set Real Time Clock You can set the internal clock directly using the Set Real Time Clock dialog in the Administration section of in the main menu. You can set the Date and Time manually. When entering the values manually use the format yyyy-mm-dd as seen in the figure below. You can also adjust the clock using the specified NTP server. IPv4, IPv6 address or domain name is supported. After you enter the appropriate values, click the Apply button.
3.6.7 Update Firmware Select the Update Firmware menu item to view the current device firmware version and load new firmware into the device. There is current firmware version and firmware filename written out. When loading the new firmware, it has to have this name. To load new firmware, browse to the new firmware file and press the Update button to begin the update. Warning! Do not turn off the device during the firmware update. The firmware update can take up to five minutes to complete.
3.6.8 Reboot To reboot the device select the Reboot menu item and then press the Reboot button. To access this page, click Administration > Reboot. Figure 3.
Chapter Configuration in Typical Situations 4 4
4.1 Enabling the LoRaWAN and Network Server 1. 2. 3. 4. 5. Login WISE-6610 Series. See “Access Interface” on page 14. Go to Customization > User Modules. A list of available devices display. Click on the target LoRaWAN Gateway. Figure 4.1 Customization > User Modules The Settings menu displays. In LoRaWAN Radio Enable, click the drop-down menu to enable LoRaWAN function. Configure the main frequency for radio 0 and radio 1. For radio 1, there are eight channels and one standard channel. Note! 3. 1. 2.
4. 5. In LoRaWAN Network Server Setting, click the drop-down menu to enable LoRaWAN network server. In MQTT Broker Enable, click the drop-down menu to enable MQTT broker. 6. Figure 4.3 LoRaWAN Gateway > MQTT and LoRaWAN Click Save to save the configuration.
7. Click LoRaWAN Server and enter the default user name and password (root/ root) to log into the LoRaWAN Network Server page. Note! 8. 9. The LoRaWAN Network Server does not support IE or EDGE browser. Figure 4.4 LoRaWAN Gateway > LoRaWAN Server Click Infrastructure > Gateways to enter the Gateways List page. Click Create to add a new gateway. Figure 4.
10. In the Create new gateway page, configure the new gateway settings. Input the MAC which is the LoRaWAN gateway ID shows on the LoRaWAN setting Page. Figure 4.6 LoRaWAN Server > Infrastructure > Gateways > Create Item Description MAC Enter the LoRaWAN gateway ID shown on MQTT and LoRaWAN menu. Group Enter the opaque string with application-specific settings. TX Chain Enter a value to identify the radio chain used for downlinks (default: 0). It shall correspond to a radio_x (e.g.
12. Click Create to create your own network frequency. Figure 4.8 LoRaWAN Server > Infrastructure > Network > Create > General Item Description Name Enter the name of the network. NetID Enter the NetID of the network. Use 000000 or 000001 for private networks. SubID Enter the SubID of the network in the format of HexValue:Length which specifies the fixed bits in the DevAddr of the active node. (optional) Region Enter a value to determine the regional characteristics of LoRaWAN.
Parameter EU868 US902 CN779 EU433 AU915 CN580 AS923 KR920 IN865 RU864 RX2 Join Delay(s) 6 6 6 6 6 6 6 6 6 6 RX1 Delays 1 1 1 1 1 1 1 1 1 1 RX2 Delays 2 2 2 2 2 2 2 2 2 2 Gateway Power 16 26 12 12 30 19 16 23 30 16 Max EIRP (dBm) 16 30 12.15 12.15 30 19.
Item Description Max Data Rate Enter a value to define the highest DR (lowest SF) supported by the channels in this network. Additional channels may need to be given a different value. Note: The Max Data Rate is not always the last item (lowest SF) in the TX data rate table. Not all channels (frequencies) are allowed to use all data rates. For example, in EU868, the default channels use SF12/125 to SF7/125 only. The SF7/250 is allowed for the 867.3 MHz channel only and FSK for 867.7 MHz only.
15. Click Backends > Handlers to enter the Handlers List page. The WISE-6610 Series handler is created by default. The LoRaWAN data comes with the item with the Field in the handler settings. Figure 4.
16. Click Create to add a new handler rule. This function allows you to choose the desired uplink fields and supports the parse script option that helps you parse the raw data received from the sensor node as shown in Figure 4.13. Figure 4.12 LoRaWAN Server > Backends > Handlers > Create Item Description Application Enter the name of the handler. Uplink Fields Enter the filter values to be forwarded to the backend connector. Payload Enter the filter values as the format for automatic decoding.
Item Description D/L Expires Click the drop-down menu to define when the downlinks may be dropped. Never: – All class A downlinks for a device will be queued and eventually delivered. – All confirmed downlinks will be retransmitted until acknowledged even when a new downlink is sent. When Superseded: – Only the most recent class A downlinks will be scheduled for delivery. Superseded downlinks will be dropped.
18. Click Create to create your own connector rule. Figure 4.15 LoRaWAN Server > Backends > Connectors > Create Item Description Connector Name Enter the name of the connector. Application Click the drop-down menu to select the application to reference a specific backend handler. Format Click the drop-down menu to select the format. JSON: Encode data fields as Json structures such as {"NameOne":ValueOne, "NameTwo":ValueTwo}.
Item Description Failed Click the drop-down menu to select the flag indicates the failure items. badarg: Some connector parameters are bad. network: The destination server cannot be reached. topic: The target broker configuration is wrong. Submit Click Submit to save the values and update the screen. 19. Click Devices > Profiles to enter the Profiles List page. Define the profile rule for the LoRa node and assign the handler rule to each profile.
Item Description Can Join? Click the drop-down menu to select a flag to prevent the device from joining. FCnt Check Click the drop-down menu to select the FCnt check for the device. Strict 16-bit (default) or Strict 32-bit: Indicates a standard compliant counter. Reset on zero: Behaves as a "less strict 16-bit" which allows personalised (ABP) devices to reset the counter. This weakens the device security a bit as more reply attacks are possible.
Item Description Set RX1 DR Offset Enter a value to define the offset between the uplink and the RX1 slot downlink data rates. Set RX2 DR Enter a value to define the data rate for the second reception slot (RX2). Set RX2 Freq (MHz) Enter a value to define the default frequency in the RX2 receive window. Request Status? Click the drop-down menu to select the flag used to disable the status requests for simple devices that do not support the function (default: true).
Item Description App Arguments Enter the opaque string with application-specific settings. NwkSKey Enter the NwkSKey for the node. AppSKey Enter the AppSKey for the node. FCnt Up Enter a value to define the frame counter. FCnt Down Enter a value to define the frame counter. Submit Click Submit to save the values and update the screen. 24. Click Devices > Commissioned to enter the Devices List page. Figure 4.21 LoRaWAN Server > Devices > Commissioned 25.
26. After the LoRaWAN network, gateway, node, handler and connector funcitons are enabled. Click Received Frames to enter the Received Frames page and check the received messages. Figure 4.23 LoRaWAN Server > Received Frames 27. Since the MQTT broker on the WISE-6610 series is enabled by default, you can subscribe the MQTT "#" on 192.168.1.1 to receive the LoRaWAN node messages. Figure 4.
Figure 4.25 MQTT Subscription 28. Click Infrastructure > Events to enter the Events List page to view the events. Figure 4.
4.2 Changing the Raw LoRa Data Format This function parses and shows the raw data from an Advantech LRPv2 LoRa node. 1. Note! WISE-6610 series models does not parse data from a non-Advantech LoRa node through the Advantech Application function. Note! All the foregoing settings must be configured before using this function. To access this page, click User Modules > LoRaWAN Gateway > Advantech Application. Figure 4.27 User Modules > LoRaWAN Gateway > Advantech Application 2.
3. 4. 5. To get the sensor node data, the application server needs to be enabled first. After the application server is enabled, the Advantech application server will parse the data subscribed from the MQTT broker (WISE-6610 with topic uplink/ #) as shown in the figure below. Figure 4.29 User Modules > LoRaWAN Gateway > MQTT and LoRaWAN Click LoRaWAN Server > Devices > Activated (Nodes) to enter the Nodes List page. Figure 4.
6. Not only the data will be shown on the Advantech Application page, if you would like to apply the data to other software applications, you can also subscribe Topic “#” or direct Topic “Advantech/+/data” from the WISE-6610 MQTT server. Figure 4.32 Applying Data to Other Software Applications 4.3 Node-RED Setup 1. 2. Go to Customization > User Modules. A list of available devices display. Click on the target Node-RED. 3. Figure 4.33 Customization > User Modules The Settings menu displays.
www.advantech.com Please verify specifications before quoting. This guide is intended for reference purposes only. All product specifications are subject to change without notice. No part of this publication may be reproduced in any form or by any means, electronic, photocopying, recording or otherwise, without prior written permission of the publisher. All brand and product names are trademarks or registered trademarks of their respective companies. © Advantech Co., Ltd.