Introduction
COMMANDO R100-PRO Cloud Base Multi-Functional Wired Router with 5*10/100/1000M configurable LAN/WAN Ports, with functions like Router, Wireless Controller, Multi WAN Load Balancer, Firewall with Captive portal along with Standard Wireless Roaming Mechanism (802.11r) , Authentication Server to Integrate and Simplify the Traditional Networking Mode, AC Management, Portal Authentication, Deep Packet Inspection (DPI) Seven-Layer flow Control, Supports Intelligent Networking (SD-WAN), 3200+ Application Protocol Identification.
It has excellent data processing capability and multiple powerful functions including Multi WAN Load Balance, Access Control, Bandwidth Control, Session Limit, IM/P2P Blocking, VPN server, PPPoE Server, auto WAN failover recovery and captive portal to access infrastructure from anywhere via internet. It meets the needs of small and medium enterprise, Commercial set up where no down time affordable due to network issue, hotels and communities with 100+ volumes of users demanding a efficient and always UP network with high security. It is basically 5 in 1 Multi-functional device having feature like Multi WAN load balancer with auto fail-over mechanism for recovery due fault in connected multiple WAN links, Firewall, VPN Server, Wireless Controller for COMMANDO PRO Series AP, Cloud based authentication Configuration and monitoring, Enterprise Wired Router with features like static, Default and Dynamic connected route.
COMMANDO R100 PRO is multi-functional router with functions like Wireless Controller, Load Balancer with Multi-WAN auto failover, Firewall, VPN Server with Captive portal with following useful functions.
• Standard Wireless Roaming Mechanism (802.11r)
• WLAN controller can manage up to 100 APs & unlimited users, with Discovery, Configuration, and Monitoring Functions.
• DPI (Deep Packet Inspection) Seven Layer Flow Control
• Supports One Click Flow Control and Manual Flow Control
• 3200+ Application Protocol Identification, for more Accurate Flow Control, Improved Bandwidth Utilization
• Multi-WAN load balance with auto fail-over recovery for reliable and efficient access
• Access Point Management via Easy WEB GUI, Telnet and Could based Portal Authentication
• AC Intelligent Management Function, works together with COMMANDO AirPRO Series Wireless products with easy Access Point Management
• Supports COMMANDO Platform Management, Centralized Management and Maintenance via lifetime free Cloud base account
• VPN for Encrypted Communication, Ensure Remote Access Security
• Supports Multi-Vendor WAN Line simultaneous Access, WAN load sharing and balancing by different ISP, Rational use, Load Balancing with fail-over, Reduce Bandwidth Costs
• Wireless Marketing Function, various Authentication Methods to meet the needs of Different Users and Scenarios
• Tag based and port based VLANs to group control and relocate traffic pattern
• Fully protocol stack for both IPv4 and IPv6 and 100,00 concurrent sessions
• Supports IPsec, PPTP and L2TP VPN support up to 64 concurrent tunnels with max 2Gbps throughput (IPSec).
• QoS and Bandwidth Management for optimal bandwidth usage.
• High Availability for mission critical application with Multi-WAN load balance
• User certification by X.509 and authentication by Radius/AD/LDAP server for user and group management.
• Supports Multiple WANs, Failover/ Load Balance with configurable Ethernet
• Support DHCP based dynamic IP, Static IP, PPPoE, PPTP, L2TP
• IPv6 with Dual Stack, 6-in-4, 6-to-4, Dynamic, Static, PPPoE
• Supports VLAN Port Based, Tag- based
• NAT: ALG, Special AP, DMZ Host, Virtual Server/ Computer, PPTP/ L2TP/IPSec Pass-through, Up to 100,000 Sessions
• Supports Routing with Static, Default and Dynamically learn connected route
• Client & Server for DHCP, DDNS, IGMP
• Management Features with Web, Simple Telnet CLI, SNMP
• AP Auto Discovery, Monitoring & Alerting, Profile based Configuration, AP Load balance, AP Blacklisting and Whitelisting
• User Accounts, User Grouping, Bound Services
• Firewall, Access Control with Packet Filters, URL Blocking, Web Content Filters, Application Filters, MAC filter
• Support One Click Flow Control and Manual Flow Control
• Access Point Management with Cloud Portal Authentication, Connected LAN PC WEB GUI and Telnet.
R100 Functions can be broadly classified as follows:
Cloud Base Wired Router
It is 5* 10/100/1000M configurable and interchangeable LAN/WAN Port which support 100 Users with standard Wireless Roaming Mechanism (802.11r) with DPI (Deep Packet Inspection) Seven Layer Flow Control along with Portal based web access from anyone having credential via internet from any place. Support COMMANDO Cloud Platform Management, Centralized Management and Maintenance VPN for Encrypted Communication. Ensure Remote and cloud Access with security.
Multi-WAN load balancing with auto Fail over Mechanism
Support up to 4 WAN, Multi WAN Access, Simultaneous WAN access provided by different (ISP) Operators with all used at a time via load balancing and preventing network outage automatically via fail-over mechanism, Rational use, Reduce Bandwidth Costs.
Wireless Marketing Function
High Authentication Methods via cloud based, time based, ticket based to meet the needs of different Users and Scenarios, Multi-functional Fusion. The COMMANDO Integrates Functions Such as DPI Flow Control, Load Balancing, AC Controller, VPN, and Authentication Server to Integrate and Simplify the Traditional Networking Mode. Equivalent to Integrating Multiple Devices and a Unified Network Management Platform into one Device, greatly reducing Networking and Maintenance costs
Deep Packet Inspection
It supports Multi-line and each line is backed up with Each other. It has new Generation of DPI-based Traffic Identification Mechanism, and Fine Traffic Control with Link Balancing and Application Offloading to offload Core Applications.
Wireless Access Point Controller
It acts as Access Point Controller for COMMANDO PRO based AP, Support COMMANDO’s PRO AP Centralized Management, AP can be configured as Virtual Antenna available with this controller without any Configuration and connection to Controller. It automatically Read Wireless Configuration after accessing the Network, AP Zero-based Networking, Expansion at any time, Support Standard Wireless Roaming Mechanism (802.11r), to achieve Seamless Roaming between APs, Live streaming of Games, Video, Movies, voice, etc. is Uninterrupted.
Network Security
Built-efficient Behavior Management Routing and Firewall Modules, Support Flexible user Access Control Policies, Network Security, Network security to meet Different Customer needs. MAC Filtering function to block the access of illegal hosts. Supporting One-Click IP-MAC Binding to avoid ARP spoofing.
VPN (Virtual Private Network)
Support IPsec, PPTP, L2TP and Open VPN, Allowing Offices in Different Regions of the Enterprise to Access ERP, CRM, Internal Server and other Production Systems of the company's Local Area Network at Any Time to Improve Work Efficiency. Out-of-office Employees can Access the Company's internal Network Resources through Secure Channels anytime and anywhere via COMMANDO Cloud access.
Online Behavior Management
Access Rules can permit or deny user for applications of FTP downloading, Email, Web browsing and so on. Supporting URL Filtering to prevent potential hazards from visiting the malicious Web sites. Bandwidth Control with flexible bandwidth management to automatically control the bandwidth of the host in bi-direction to avoid bandwidth over occupation, as well as optimize bandwidth usage. Session Limit to avoid few people to access resource.
System security
• Application identification for service awareness technology to identify packets of dynamic protocols such as HTTP and RTP by checking Layer 4 to Layer 7 information in the packets, helping implement fine grained QoS management.
• URL filtering: URL filtering regulates online behavior by controlling which URLs users can access to secure the network and system data.
• Intrusion prevention: Intrusion prevention detects intrusions, such as buffer overflow attacks, Trojan horses, and worms, by analyzing network traffic and takes actions to quickly terminate the intrusions. In this way, intrusion prevention protects the information system and network architecture of enterprises.
Built-in application identification server
Supports Layer 4 to Layer 7 application identification and can identify over 3200+ applications and application-based policy control technologies, including traffic blocking, traffic limit, and priority adjustment policies.
It has WAN1 which is by Default WAN port. WAN ports can be configured in ADSL/ PPPoE, Static IP or DHCP mode as per settings provided by ISP. We can setup multiple WAN ports based on requirement. LAN1 & WAN1 are by default ports & rest all configurable into WAN/LAN ports as per customer requirement. LAN1 is default LAN Port. USB port for mainly to upgrade system. Power to power ON the device, Power LED indicator will be on. SYS indication Green and ON to show system working properly. NET is Green and ON to show router connected to internet.
How to take access of COMMANDO R100?
Connect any port of LAN (1-4) to PC via RJ-45 cable.
Open Network and sharing center.
Go to Change adapter settings.
Double click on Local Area Connection.
Go to Properties. Double click on Internet Protocol Version 4(TCP/IPv4) option and set any IP address from 192.168.1.2 to 254 to as shown below.
Fig 1. IP setting in PC connected to COMMANDO R100
Open any web browser like Chrome/Firefox/Internet Explorer/Opera etc. and enter default IP address 192.168.1.1 in address field.
Fig 2. Login page for R100
Default Username: admin
Default Password: *******
(Default password is written on backside of device)
Note: Both Username and Password can be changed as per user choice.
After giving proper username and password. The System Overview page displays the basic system information like connection, interface, traffic analysis.
In system overview you can monitor network performance and many parameters on single page. You can check, Rate Status, Connection Status, Interface Status, AC Status and also monitor traffic analysis for different services.
Fig 3. Default System Overview page
Fig 4. System Overview page after connecting LAN and WAN ports
Fig 5. Connection status LAN and WAN ports
I. Trouble in getting Internet Via DHCP WAN:
If DHCP WAN link not able to provide proper DNS via connected WAN link DHCP server following measure will solve the issue.
Fig 6. Non-Proper DNS via DHCP Server
Note: Changed LAN IP and taken access of R100 via new set LAN IP as DHCP server in WAN is set as 192.168.1.0/24 network.
Fig 7. WAN-1 Getting 192.168.1.1 as preferred DNS server IP automatically
To solve this issue, Click on Network>DNS> Multiline DNS then Click add
Fig 8. Multi DNS server Setting in R100.
Then add proper DNS server IP and see the system overview page.
Fig 9. System overview page after proper setting LAN and WAN along with DNS server.
Traffic Analysis
It displays detailed information relating to the data traffic of all interfaces and IP addresses. You can monitor the traffic according to this information for last 30 minutes, 1hour or 1day.
Fig 10. Traffic analysis for all application from last 30 minutes.
Fig 11. Traffic analysis for video application for 1 day
Fig 12. Transmission and Receiving Rate Graphs
II. Default page for shortcut Buttons for easy access to important web pages for users
Account Setting: On this page, you can view the detailed information of all accounts you have established.
Fig 13. Account setting icon
After clicking on account setting Icon user will be redirected to page System Setup > Administration > User Accounts
Fig 14. Default User Account setting
From Edit and Add account option you can create username and password as per your choice and even change the admin account for login to device.
Fig 15. Editing User Account setting
Fig 16. Logging with New account
Fig 17. User Account setting after changing accounts
Remote Access:
Supports Remote telnet and Web management via remote access. By default, all remote access is disabled.
Fig 18. Remote access shortcut
After clicking remote access user will be directed to System Setup > Administration > Remote Access pages
Fig 19. Default Remote access control.
Fig 20. Changing Remote access control setting.
Fig 21. Telnet access of R100
Action Logs:
The Log system of Router can record, classify and manage the system information effectively.
Fig 22. Action Logs shortcut
After clicking action log user will be directed to Log > System Logs > Action Logs
Fig 23. Action Logs in system logs to show the date, time, users, IP and interface to login in R100
Logout:
Logging out means to end access of device. Logging out informs the device that the current user wishes to end the login session.
Fig 24. Logout shortcut
After Clicking Logout, it will be directed to Login page.
Fig 25. Login page after Logout
Message Notification:
Message notifications shows level 5 having severity Normal but significant conditions for user action logs.
Fig 26. Message notifications Shortcut
After clicking Message Notification, Log > System Logs > Notification page will be opened.
Fig 27. Default Message notifications page
Version Upgrade:
Displays the current configuration version of the Router and allows Automatic or manual Updates.
Fig 28. Version Upgrade page
After clicking Version, Upgrade System Setup > Upgrading > Version Upgrade page will be opened.
Fig 29. Default Version Upgrade page
Link to Cloud:
Cloud service helps users to log ON online for managing the router. You can view and manage your devices, such as check the running status, modify the configuration, and set the authentication for captive portal.
Fig 30. Link to Cloud shortcut
After clicking System Setup > Cloud Account, Cloud account page will be opened.
Fig 31. Link to Cloud account page
CPU, Memory, Trans and receive icons:
These help us to know running status of router.
Fig 32. CPU, Memory, Trans and receive icon default display
Fig 33. CPU, Memory, Trans and receive icon display after data transfer enabled
Language Options:
Helps to select language as per choice of user.
Fig 34. Language selection icon
Monitoring
Monitoring helps to monitor users, devices, ports and devices already configured in network setup.
Interface:
Displays the current enabled WAN/LAN port(s). All Interface Status automatically refresh in 5 sec intervals.
Terminal:
Terminal monitoring helps to see all IP/MAC binding with Trans, Receive Rates, Uptime of all users and devices with names in remark and also can change, limit and modify the users
Protocol:
Protocol Monitoring refresh automatically every 5 seconds by default. It shows Flow/Connections distribution for protocols like HTTP, video, Game, Download, Transport, IM, Common, Test, Unknown, other with percentage and KB or MB downloads.
Policy:
Strategy Monitoring for created policy for the entry of the packets allowed or prohibited.
System:
System Monitoring shows performance load for 1hrs, 1day,7 days or 30 days with avg and peak for CPU Usage, Memory Usage, Disk Usage, Online terminal with specific selection options.
Flow Control:
Displays the number of flow control frames received or transmitted on the port.
1. Interface
Physical interfaces exist on interface cards and transmit service data. Physical interfaces are classified into the following types:
LAN-side interface used to exchange data with network devices on LANs like Ethernet/Fast Ethernet/ Gigabit Ethernet.
Management interface used to log in to router for configuration and management purposes.
USB interface are data transmission interface.
By clicking on Monitoring > Interface we can view the Interface Monitoring
Fig 1.1.1 Default interface monitoring page
Fig 1.1.2 Interface monitoring page after changing LAN and WAN IP
Following fig shows LAN cable is connected to LAN1, LAN2, LAN3 with 1000Mbps full duplex speed along with Ip address 192.168.0.1/24, MAC:08:9b:4b:50:1c:bc and LAN4 not connected.
Fig 1.1.3 LAN Interface status
Following fig shows WAN cable is connected to WAN1 and is configured as a Default Gateway. It is up from duration mentioned in figure. It is connected and getting IP from External DHCP server having IP address 192.168.1.38/24 with gateway 192.168.1.1 and DNS: 192.168.1.1 having MAC id 08:24:7c:e0:63:33. Bind Device used is veth5 with speed of connection 100Mbps, Full-Duplex.
Fig 1.1.4 WAN Interface status
2. Terminal
Terminal monitoring helps to see all IP/MAC binding with Trans, Receive Rates, Uptime of all users and devices with names in remark and also can change, limit and modify the users.
For Configure and view Terminal Monitoring, Click on Monitoring > Terminal
Fig 1.2.1 Default Terminal Monitoring page
Fig 1.2.2 Terminal Monitoring after connecting devices page
We can take actions to connected IP/MAC devices as per action clicked.
Fig 1.2.3 Terminal Monitoring action page
By clicking details for Monitoring > Terminal Details for connected DESKTOP (PC) having IP 192.168.0.14 following pages are displayed.
Fig 1.2.4 Terminal Monitoring details Basic information page
Fig 1.2.5 Terminal Monitoring connection details page
Fig 1.2.6 Terminal Monitoring flow details page
Fig 1.2.7 Default Terminal Monitoring History Logs page
Fig 1.2.8 Terminal Monitoring History Logs page
3. Protocol
Protocol Monitoring shows Flow/Connections distribution for protocols like HTTP, video, Game, Download, Transport, IM, Common, Test, Unknown, other with percentage and KB or MB downloads.
For Protocol Monitoring, Click on Monitoring > Protocol
Fig 1.3.1 Protocol Monitoring flow/connections distribution default page
Fig 1.3.2 Protocol Monitoring flow/connections distribution for 1 day page
Fig 1.3.3 Default Protocol Monitoring Graphs default page
Fig 1.3.4 Protocol Monitoring Graphs for last 1 hour page
4. Policy
Network policy is a collection of rules that govern the behaviors of network devices. The primary purpose of a network security policy is to inform users and staff the requirements for protecting various assets. These assets take many forms, including passwords, documents, or even servers. Strategy Monitoring for created policy for the entry of the packets allowed or prohibited.
For Strategy Monitoring, Click on Monitoring > Policy
Fig 1.4.1 Default Policy Monitoring page
5. System
System Monitoring shows performance load for 1hrs, 1day,7 days or 30 days with avg and peak for CPU Usage, Memory Usage, Disk Usage, Online terminal with specific selection options.
System Monitoring for Performance/Network Load, Click on Monitoring > System
Fig 1.5.1 Default System Monitoring page
Fig 1.5.2 System Monitoring for 1hour page
6. Flow Control
Flow control determines how resources in a network are allocated to packets traversing the network. Displays the number of flow control frames received or transmitted on the port.
For Flow Control Monitoring, Click on Monitoring > Flow Control
Fig 1.6.1 Default Flow Control page
Fig 1.6.2 Flow Control page
