icom OS Routers (MRX, MRO, ECR, SCR, MIRO)
- 1 Sub categories
- 24 Articles
- Updated on Jan 29, 2025
- Published on Jun 26, 2024
The Startup wizard (also known as Quickstart wizard) starts an assisted configuration that enables you to set up the router for System time synchronisation User authentication Internet (WAN) connection VPN connection (icom Connectivity...
- Updated on Apr 8, 2025
- Published on Jun 26, 2024
INSYS routers are easy to install and feature a startup wizard that makes it easy to make them ready for operation. Proceed as follows to bring your router into service: Connect Internet connectivity (WAN) depending on technology (Cellular Radio...
- Updated on Dec 13, 2024
- Published on Sep 19, 2024
The industrial routers from INSYS icom are configured using a browser-based user interface. icom OS has a new UI (user interface or web interface) from version 5.5 . The Configuration Guides are based on the new UI . The configuration in th...
- Updated on Dec 13, 2024
- Published on Sep 17, 2024
The configuration of the router is called profile. Several profiles can be stored on one device so that the configuration of a device can be changed quickly. Term definitions The following terms or conditions are to be distinguished for profiles:...
- Updated on Oct 4, 2024
- Published on Sep 19, 2024
The router provides a command line interface (CLI) for a configuration from the local network or remote via Telnet or SSH. One parameter after the other will be entered line by line via the CLI and stored in the opened profile . The modification...
- Published on Sep 23, 2024
Lua is a script language that allows to include scripts in ASCII configuration files for the router. Command scope, limitations and syntax are described on the CLI page under Lua mode . ASCII configuration files are uploaded to the router in th...
- Updated on Dec 13, 2024
- Published on Sep 19, 2024
ASCII configurations are a sequence of commands as they could also be entered in the CLI . Each line contains a command that modifies the opened profile . Syntax and parameters can be taken from a downloaded profile in ASCII format for example....
- Updated on Sep 25, 2024
- Published on Sep 19, 2024
REST interface The documentation of the REST interface can be used as command reference. The REST API (application programming interface) is documented in a JSON file in compliance with the OpenAPI specification 3.0. You can download the REST API ...
- Updated on May 7, 2025
- Published on Sep 23, 2024
The Event & Action Handler permits to trigger actions based on the occurrence of an event. It is also possible to insert values as variables in the text of messages, HTTPS requests and paths . Events Events are changes of conditions in or at ...
- Published on May 7, 2025
Status information, event -dependent information as well as all parameters of the configuration can be inserted as variables in SMS and e-mail message text as well as the subject line of an e-mail message. Event-dependent information can only be us...
- Updated on Nov 27, 2024
- Published on Sep 24, 2024
The automatic update is used to provide devices in the field with updated firmware or configurations. To do this, you must provide a central server on which the update files and the download list are stored. The download list will then be checked by...
- Published on Sep 25, 2024
REST stands for Representational State Transfer and provides an interface for configuration, status query and execution of manual actions of the router via HTTP and HTTPS protocol. The following commands (HTTP methods) are available for editing the...
- Published on Sep 25, 2024
The certificates and keys as well as the Diffie-Hellman parameter set and the certificate revocation lists (CRL) stored in the certificate manager are used for authentication and encryption of protected connections and authentication of router acces...
- Updated on May 8, 2025
- Published on Sep 25, 2024
Protocols for the simple enrollment of certificates increase the scalability of the enrollment for large-scale network environments with PKI (public key infrastructure). Besides the initial enrollment of the certificates, the regular renewal of the ...
- Updated on Mar 10, 2025
- Published on Sep 19, 2024
WAN chains and WAN groups WAN chains allow to configure WAN connections individually by sequencing/cascading their individual components. Components of a WAN chain can be all interfaces, such as VPN interfaces or cellular interfaces. WAN chains ena...
- Updated on Dec 18, 2024
- Published on Sep 19, 2024
VPN A VPN (virtual private network) is used to connect IP end devices or entire networks with each other, in a safe way. The data is transmitted tamper-proof to a destination and cannot be read by third parties. You can configure the router for an...
- Updated on Mar 14, 2025
- Published on Sep 19, 2024
General Information The router connects several subnets and assumes forwarding of data packets from the devices in the respective subnets into other subnets. This means that incoming data packets are routed to certain network devices according to c...
- Updated on Apr 24, 2025
- Published on Sep 19, 2024
Netfilters The netfilters in the router manipulate and block all data packets on their way from the sender interface to the destination interface as shown in the following sketch. The netfilters consist of NAT (Network Address Translation) and IP f...
- Updated on Dec 18, 2024
- Published on Sep 19, 2024
The serial Ethernet gateway enables the addressing of serial end devices from the local network of the router or via the WAN interface, which are connected to the serial interface (if available). The data which is sent to a configurable network port...
- Updated on Mar 28, 2025
- Published on Sep 24, 2024
General Information Linux containers (LXC) can be installed and executed on the router. A container is a virtualisation of an independent system, it "feels" like an independent computer with own process management User management network e...
- Published on Sep 25, 2024
The router provides some useful troubleshooting tools in the Administration → Debugging menu. A click on OPEN DEBUG TOOLS permits to select the appropriate debug tool. Ping The Tool PING is a diagnosis tool for testing the reachabil...
- Updated on Nov 15, 2024
- Published on Oct 4, 2024
The following functions are available to secure the configuration of the router via the user interface: Protected access via HTTPS connection Authentication of a client using a certificate Protected access via HTTPS connection The user int...
- Updated on Apr 25, 2025
- Published on Sep 26, 2024
The reception of the cellular signal determines the signal indicator. This is indicated on the router by the Signal LED and displayed in the user interface. The following applies for all routers running icom OS: Depending on the cellular standard u...
- Updated on Oct 17, 2024
- Published on Sep 26, 2024
INSYS routers with icom OS (devices of the MRX, MRO, ECR, SCR and MIRO series) are perfectly suitable for customers who have used industrial routers with INSYS OS (the series MoRoS, EBW, IMON, MLR, RSM and QLM) as platform for their applications. Th...
- 6 Sub categories