The new firmware version is out!
Being a patchlevel release it brings mainly a number of improves and updates. This includes security fixes for 1 critical, 5 high severity, 2 medium severity and 1 low severity vulnerabilities.
A few highlight points from 6.2.7 (as always, you are welcome to check out the Release notes):
Excited to announce our latest product VPN-BOX-UNO23. From now on is possible to buy a light-weight industrial computer with a pre-installed version of Advantech Linux and WebAccess/VPN On-Premises software in one box. WebAccess/VPN is the new Secure Networking Platform for Cellular Routers and Gateways for the safe interconnection of Advantech routers in the public Internet
The brochure for the product is possible to download here.
Customers can choose from two license options. The first one includes ...
SmartStart SL304 router EMEA model (EOL) is to be replaced by the new EMEA router model SL305. Last Time Buy (LTB) for model SL304 is set to 24. 12. 2020. From 16. 11. 2020 are accepted orders for replacement model SL305.
SL305 is compatible with older model SL304 in terms of hardware interface options (popular interface combination of 1 × Ethernet 10/100 + 1 × full DB9 RS232), software capabilities, size, and mounting options. The same as the previous model SL305 is fully supported by ...
We are pleased to announce that User Modules for cellular routers are newly called Router Apps. Advantech Router Apps are now available for download at Engineering Portal.
Router Apps add extended functions to Advantech Cellular Routers,with each app tailored to a specific solution. We benefit from extensive skills gained through implementing an array of SW features into a variety of devices over the past years. We categorized all Router Apps (IIoT, Industrial ...
Remote monitoring tools inform administrators about the overall system health, performance, and potential issues. This improves reliability and security of your network.
We just released guidelines for remote monitoring of Advantech cellular routers. This document lists all supported remote monitoring protocols and introduces various tools that can be used to remotely monitor Advantech routers. The combination of protocols and tools need to be carefully selected based on your needs as there is no single protocol that can monitor everything and no single tool that supports all protocols.
We released a Router App (User Module) with a Zabbix Agent. This can be used to integrate Advantech Cellular Routers with the Zabbix Monitoring System and securely monitor parameters that are not available via SNMP, such as CPU load, memory consumption, local time, or changes to the router configuration files. To simplify integration with the Zabbix server via either SNMP or the Agent we also released several Templates with all supported SNMP parameters and important agent-based parameters.
Detailed description of the Templates and the User Module itself, including ...
We just released a new version of R-SeeNet, which fixes an SQL injection vulnerability and also the SNMP trap processing for ICR-1601. We encourage all R-SeeNet users to upgrade.
R-SeeNet is the software system used for remote monitoring of Advantech cellular routers. For more information, please see the R-SeeNet website.
Another firmware version is released.
Being a patchlevel release it brings mainly a number of improves and updates. There are no security fixes in this version.
A few highlight points from 6.2.6 (as always, you are welcome to check out the Release notes):
We released a user module with NetFlow/IPFIX probe and collector. The module captures a source and a destination IP address of each observed network communication and the amount of data exchanged. This can be used by network monitors such as PRTG to identify unusual traffic flows caused by misconfigurations, security incidents or policy violations.
Detailed description of the module configuration and operation can be found in the NetFlow/IPFIX Application Note.
The User Modules can be downloaded here.
Our cellular routers are not affected by the Ripple20 vulnerabilities discovered in a TCP/IP software library of many IoT devices.