Remote monitoring tools inform administrators about the overall system health, performance, and potential issues. This improves reliability and security of your network.
We just released guidelines for remote monitoring of Advantech cellular routers. This document lists all supported remote monitoring protocols and introduces various tools that can be used to remotely monitor Advantech routers. The combination of protocols and tools need to be carefully selected based on your needs as there is no single protocol that can monitor everything and no single tool that supports all protocols.
We released a Router App (User Module) with a Zabbix Agent. This can be used to integrate Advantech Cellular Routers with the Zabbix Monitoring System and securely monitor parameters that are not available via SNMP, such as CPU load, memory consumption, local time, or changes to the router configuration files. To simplify integration with the Zabbix server via either SNMP or the Agent we also released several Templates with all supported SNMP parameters and important agent-based parameters.
Detailed description of the Templates and the User Module itself, including ...
We just released a new version of R-SeeNet, which fixes an SQL injection vulnerability and also the SNMP trap processing for ICR-1601. We encourage all R-SeeNet users to upgrade.
R-SeeNet is the software system used for remote monitoring of Advantech cellular routers. For more information, please see the R-SeeNet website.
Another firmware version is released.
Being a patchlevel release it brings mainly a number of improves and updates. There are no security fixes in this version.
A few highlight points from 6.2.6 (as always, you are welcome to check out the Release notes):
We released a user module with NetFlow/IPFIX probe and collector. The module captures a source and a destination IP address of each observed network communication and the amount of data exchanged. This can be used by network monitors such as PRTG to identify unusual traffic flows caused by misconfigurations, security incidents or policy violations.
Detailed description of the module configuration and operation can be found in the NetFlow/IPFIX Application Note.
The User Modules can be downloaded here.
Our cellular routers are not affected by the Ripple20 vulnerabilities discovered in a TCP/IP software library of many IoT devices.
Another firmware version is out!
Being a patchlevel release it brings mainly a number of fixes. This includes security fixes for 1 medium severity vulnerability.
A few highlight points from 6.2.5 (as always, you are welcome to check out the Release notes):
For details regarding distributed firmware versions per particular router module have a look into Firmware Distribution Overview.
Last firmware version could always ...
In our efforts to further enhance security of our products we just released Security Guidelines. This Application Note provides recommendations for securing a cellular router and keeping it secure during installation, operation, maintenance and decommissioning. We aim at further improving this document, so please let us know in what security aspects you need additional guidance.
Another firmware version is out!
Being a patchlevel release it brings mainly a number of fixes. This includes security fixes for 4 critical, 3 high severity and 7 medium severity vulnerabilities.
A few highlight points from 6.2.4 (as always, you are welcome to check out the Release notes):
After the initial release of WebAccess/VPN last year and a patchlevel 1.0.1 version we follow with a minor release 1.1.0.
The WebAccess/VPN is a VPN management solution - a tool that can help you setup and organize secure network (or multiple secure networks) of routers and devices connected to the routers. You can read introductory information at WebAccess/VPN page and also follow to more documentation describing system principles, operation and usage.
The 1.1.0 release brings several improvements. For details, please check out 1.1.0 release notes, the following is just ...