Open Internet Browser and enter default IP of the router http://192.168.100.1
The default login credentials are mentioned at the bottom the ACE Router appliance.
NOTE:
Change the default password after login to avoid un-authorized logins to the Router.

Dashboard allows you to view the status of the device such as Hosts, TCP Connections, System Load, Download/Upload statistics, Connected LAN/WAN Interfaces, Product Info & status of the License and various other link statistics in one single pane as shown below.

LAN can be configured on any port of the AnexGATE router.
LAN Port - To configure LAN port, go to Network - WAN/LANBefore configuration of LAN Port, Unselect the Port which are already member in the LAN Bridge by going into Network - Lan Bridge.
Once the Ports have been removed from the LAN Bridge membership. Configure the port as a LAN (Non-Bridge) port.
LAN Port. Go to Network - WAN/LAN.The AnexGATE ACE Hotspot router has capability of configuring multiple LAN/vLAN interfaces as shown in the image below.

Network - LAN Bridge
Note:
Warning:
Before disabling or deleting any default interfaces such as LAN_br0 to configure AnexSPOT. Make sure that different LAN has been configured on other port and is in working condition by testing connectivity towards router and PC-machine.
VLAN. Go to Network - LAN/WAN.VLAN ID interface mode and assign IP address on a port which is to be configured as VLAN.
NOTE:
VLAN can be set on WAN Interface as well. Make sure that the upstream/opposite interface link is also configured as VLAN (tagged/trunk port).
LAN Port - To configure LAN port, go to Network - IPv6 WAN/LANBefore configuration of LAN Port, Unselect the Port which are already member in the LAN Bridge by going into Network - Lan Bridge.
Once the Ports have been removed from the LAN Bridge membership. Configure the port as a LAN (Non-Bridge) port.
LAN Port. Go to Network - IPv6 WAN/LAN.
DHCP - Server.| Elements | Description |
|---|---|
**Interface** |
Select appropriate LAN interface. |
**Status** |
Enable / Disable the LAN DHCP Server. |
**DHCP v4 Server** |
Select this to enable DHCP v4 Server to assign IPV4 addresses to endpoints. |
**Force DHCP Server** |
Forces DHCP serving on the specified LAN interface even if another DHCP server is detected on the same LAN network. |
**Strict DHCP** |
Select this to only assign IP addresses to endpoints which are added in DHCP - Static Lease. |
**Start IP** |
Assign beginning IP address from the DHCP pool for the specified network. |
**End IP** |
Assign ending IP address from the DHCP pool for the specified network. |
**Lease Duration (Hours)** |
Assign DHCP lease time for the endpoint connected to the specified network. The time starts from 1 hour. |
**Primary/Secondary DNS** |
Assign Primary/Secondary DNS servers (optional). |

DHCP - Static Lease.
DHCP - Current Leases.
| Elements | Description |
|---|---|
**Interface** |
Select appropriate LAN interface. |
**Status** |
Enable / Disable the LAN DHCP Server. |
**Lease Duration (Hours)** |
Assign DHCP lease time for the endpoint connected to the specified network. |
**DHCPv6 Mode** |
Select Server Mode to assign IPv6 addresses to endpoints. |
**DHCPv6 Server Mode** |
Select Stateless + Statefull This mode is similar to the DHCPv4 process in IPv4. |
**DHCPv6 Router Advertisment Mode** |
Select Server Mode provides comprehensive network configuration to Hosts. |
**Announce IPv6 Default Route** |
Enable Deafult Route. |
**Primary/Secondary DNS** |
Assign Primary/Secondary DNS servers (optional). |

Network - WAN/LAN1. DHCP (Automatic IP assigned by the ISP Router)
2. Assigning Static IP Address with Gateway and DNS
3. PPPoE Dial Up on the AnexGATE ACE router.
NOTE:
**Single WAN link**, do not assign any metric on a WAN link interface under Metric Field.**Multiple WAN links**, metrics must be assigned to each WAN link interface to avoid network conflicts and configure Load Balancing.WAN can also be configured as VLAN by selecting WAN as interface type and assigning VLAN ID. Make sure the configured LAN/WAN interfaces are added under Firewall Rules in order to get the login page.
To configure WAN to receive IP via DHCP server from the upstream router, Go to Network - WAN/LAN.

To configure WAN as Static IP address, go to Network - WAN/LAN.

To configure WAN as PPPoE, go to Network - WAN/LAN.

IMPORTANT NOTE:
Either remove 10.10.0.10 network configuration from the router at the end, after all necessary WAN / LAN and hotspot configuration is done or leave it as a backup port to access the router. If considering leaving it as a backup port access, assign metric 2 for it to not interfere with existing WAN network.
To configure WAN as Static IP address, go to Network - IPv6 WAN/LAN.

Load Balancing can be performed, if multiple links are being configured. The AnexGATE ACE Router supports 3 modes of Load Balancing.
Balancing Interfaces has to be configured before setting up Load Balancing multiple links on the router.
WAN Interface/s must be added under Balancing interface in order to check the link status / reachability towards internet.
Following parameter values are added by default under Balancing interfaces.
| Element | Description |
|---|---|
**Status** |
Enable/Disable the configuration setting. Enable/Disable the configuration setting. |
**Interface** |
Select WAN interface to monitor Link Status. |
**Ping IPs** |
Assign Ping IPs to check if interface link status is still alive considering the reachability to them. |
**Minimum Responses** |
Number of Ping IPs that must reply for the link to be considered as successful. |
**Number of Ping Requests** |
Number of echo requests to send to each IP to check link status. |
**No of Rounds for Success** |
When a Down Interface is Back online then how many NO of successfull ping Rounds are required to consider it online |
**No of Rounds for Failed** |
When a Online Interface is Down then how many NO of unsuccessfull ping Rounds are required to consider it Offline |
**Terminate Existing Sessions** |
Enabling it will Shuffle the current sessions from Down interface to the one which in online |
**Monitor Link Performance** |
Enable this to check the overall link quality with packet loss and/or latency measurements. |
**Failure Packet Loss (%)** |
Maximum percentage of packet loss for a WAN link to be considered as DOWN when Monitor Link Performance is enabled. |
**Acceptable Packet Loss (%)** |
Minimum percentage of packet loss for a WAN link to be considered as UP when Monitor Link Performance is enabled. |
**Failure Latency (ms)** |
Maximum packet latency in milliseconds for a WAN link to be considered as DOWN when Monitor Link Performance is enabled. |
**Acceptable Latency (ms)** |
Minimum packet latency in milliseconds for a WAN link to be considered as UP when Monitor Link Performance is enabled. |
**Ping Response Timeout** |
Number of seconds to wait for ping response once a ping-request is sent from a WAN link before considering as lost. |
**Link Monitoring Interval (seconds)** |
Number of seconds between each Link Status check of WAN interfaces. |
NOTE:
**Performance Link Monitor** must be enabled in order to receive the Latency report in AnexCONNECT portal.
Load Balancing has to be configured only when there are multiple WAN links being configured.
Following are the Load Balancing Techniques which can be configured in AnexGATE Router:
| Elements | Description |
|---|---|
Router Outgoing Interface |
Working LAN Interface needs to be selected. Default = lan_br0. |
Import Routes from Table |
Import routes from specific IP rule list. Default = None. |
| Modes | |
Bandwidth Aggregation |
Multiple WAN Links configured are in Active-Active State where LAN systems can initiate TCP connection/session on any of the configured multiple WAN Link. |
Load Balance by Load Level |
Inbound/outbound Traffic flow can be configured on WAN links in terms of percentage which must be equal to 100. Example: WAN1 = 70% - Most of the traffic will flow through link WAN 1. WAN2 = 30% - Less traffic is directed over WAN 2 link. |
Failover Load Balance by Priority |
WAN Traffic will be initially flowing on WAN link with “Priority 1” as primary. - If the Primary link with Priority 1 goes down, the Secondary link with “Priority 2” will become active and will failover in certain amount of time within a minute considering the parameters mentioned under Balancing Interfaces.- If the Primary link with Priority 1 comes back online, the rollover will be performed switching back to Primary link within seconds without any interruption. |
Under Bandwidth Aggregation, both the links are in Active - Active state where TCP sessions/connections are established on one or other WAN port randomly.
If one link goes down the other links will act as a backup. If any TCP connection has been established on a link and that link goes offline, reload the browser to establish TCP session/connection on other link or start another ping session if testing.

Under Load Balance by Load Level, Both the links can be configured as per basis of weight. As shown in the image, WAN 1 is configured to handle 70 percent of traffic load flow through the link and WAN 2 is configured to handle 30 percent of traffic load flow.
If one of multiple WAN links goes down or offline, whole traffic load will be shifted to secondary link.

Under Failover Load Balance by Priority, WAN links are in Active - Passive state where Low Priority metric (1) takes precedence and become primary over other configured WAN links.
Initially, all the traffic flow will be on Primary Link with low metric priority. If the Primary link fails to reach/ping IPs per basis conditions applied in Balancing Interfaces, it will failover to secondary link according to the priority metric assigned. This usually takes a minute to failover to secondary link. This can be adjusted under Balancing Interfaces as per parameters mentioned above.
If the Primary link comes online, the secondary link will switch and get rolled over to primary link without any interruption in the local network.

The firewall configuration is fairly straight forward and automatically provides the router with a base rule set of rules and an understandable configuration file for additional rules.

To configure a Firewall Zone, Go to Firewall - Zones.
firewall zone groups one or more interfaces under a zone and serves as a source or destination for traffic forwarding*.*LAN WAN HSPT IPSEC zone and select multiple interfaces to add by pressing Ctrl button and click on the interface (WAN1, WAN2, WAN3, USB0) as per requirement as shown in the image below.

NAT Fowarding controls the traffic flow between zones. Under NAT Fowarding, click on + icon.
By default, the NAT Forwarding is done on following zones.
lan Destination Zone: wan
NOTE:
Source Zone: **lan** Destination Zone: **ipsec**
Source Zone: **ipsec** Destination Zone: **lan**

Port Forwarding directs AnexGATE router to send any incoming data from the internet to a specified device on LAN network.
To configure Port Forwarding rule, Go to Firewall - Port Forwarding.
| Elements | Description |
|---|---|
**Source Zone** |
Select the WAN Zone as a Source to listen to the incoming connections. |
**Source IP** |
Assign Source IP to only get port forward the request from source IP address. |
**Public IP** |
Enter Public IP configured on the Router to port forwards requests to internal (LAN) IP. |
**Public Port** |
Enter Public Port to accept WAN requests to be port forwarded only for that specific port. |
**Internal IP** |
Enter LAN IP Address for WAN requests to be redirected towards internal (LAN) IP. |
**Internal Port** |
Enter Internal Port that is listening to requests on the mentioned internal (LAN) IP. |
**Protocol** |
Specify TCP, UDP or both TCP/UDP protocols. |

Source Natting translates private IP addresses into specific public IP address.
To configure Port Forwarding rule, Go to Firewall - Source Nat (SNAT).
| Elements | Description |
|---|---|
**Source Zone** |
Select the LAN Zone. |
**Source IP** |
Assign Local Host IP address to be Nat. |
**Source Port** |
Assign Port to allow selected port, blank with allow all the ports. |
**Destination Zone** |
Select the WAN Zone which is the outgoing interface. |
**Destination IP** |
Assign a Destination Host IP. |
**Destination Port** |
Assign Port to allow selected port, blank with allow all the ports. |
**SNAT IP** |
Assign the Public IP to carry while Natting. |
**Protocol** |
Specify TCP, UDP or both TCP/UDP protocols. |
Enables you to control Domain Traffic control by whitelisting or blacklisting Domains.
To configure Domain Filter Go to Firewall - Domain Filter.

In an Ace Router, we can configure various protocol-based VPNs.
OpenVPN provides secure and encrypted communication over networks
To configure VPN, Go to VPN - OpenVPN.
| Elements | Description |
|---|---|
**Client** |
Select the No of Client from the drop down Menu. |
**Status** |
Enable or Disable the Client . |
**Protocal** |
Slelect the Protocal TCP or UDP . |
**Concentrator IP** |
Assign the Public IP of the VPN Server. |
**Port** |
Assign the port used by the VPN Server. |
**Cipher** |
Choose an encryption cipher for securing the communication. |
**Authentication** |
Choose an authentication method. |
**Passpharse** |
Assign a password (optional). |
**Compression** |
Compression can lead to improved overall network performance . |
**Route Pull** |
When enabled, the server can push specific routes to the client's routing table. |
**Remote Lan** |
This refers to the remote LAN of the OpenVPN server (optional). |
**Remote Lan Subnet** |
This specifies the subnet of the remote LAN that the client should access via the VPN tunnel (Optional). |
**Metric** |
Metric is used to determine the priority of routes when there are multiple routes to the same destination. |
**Persist Key** |
This option ensures that the encryption key negotiated during the VPN connection remains persistent even if the connection is temporarily lost. |
**Persist Tunnel** |
Similar to "Persist Key," this option keeps the VPN tunnel itself persistent even if the connection is temporarily lost. |
**TLS Verify Client** |
This option determines whether the OpenVPN client should verify the authenticity of the server's SSL/TLS certificate. |
**Files** |
Client files can be added Individually or as a ZIP file. |


| Element | Description |
VPN ID |
A unique identifier assigned to each SSL VPN user when their account is created. It allows the system to identify which router configuration should be pushed to the requested VPN client |
Concentrator Address |
This is the VPN concentrator’s IP address along with the correct port number. The router will use this to fetch all certificates and server details from the VPN server. The VPN ID must match to ensure proper configuration |
Metric |
Metric for all routes adding through VPN client and server |
Persist Key |
Avoids reloading crypto keys → faster reconnect. |
Persist Tunnel |
Keeps VPN network interface alive → smoother reconnection |

Go to VPN > SSL VPN Client
When we provide a unique VPN ID along with the correct VPN server IP address and port number, the router sends a request to the server. If the VPN ID is valid, the VPN server automatically pushes all necessary configuration files, including CA, CRT, KEY, and TLS certificates, to the router. The ACE then applies this configuration to establish a secure tunnel between the router and the VPN server. This process reduces manual interface configuration and minimizes errors during router setup.
Go to > Firewall > Rules > Zone
Go to the Zone settings and create a new zone named VPN1. Select the VPN interface (in this case, CTUN1; for OpenVPN it may appear as ovpn1). Enable NAT if required, based on the customer’s needs.
Next, create a forwarding rule between the LAN and the VPN zone as shown below. Only then will communication be established between the ACE LAN and the server-side machines.

Go to status > System Command > select ifconfig > give argument as ctun1
When you run the ifconfig command, it will display the status of all network interfaces. You can scroll down and check the VPN interface status, or you can specify the interface name (e.g., ifconfig ctun1) to view only that interface’s details. From this information, such as the tunnel IP address and the RX/TX byte counts, you can verify the tunnel status.

Go to status > System Command > select iproute
It will display the complete routing table details. From this, we can identify which networks are reachable through the VPN tunnel, as well as the tunnel gateway address

Go to > Status > System Command > command = ping IPv4 > Argument = 10.0.8.1
In this case, if we are able to reach the VPN server’s gateway (the tunnel address of the VPN server), we can confirm that VPN reach-ability is proper

| Elements | Description |
|---|---|
Status |
Enable or Disable the AnexSPOT feature. |
| AnexSPOT Client | |
Bind to Interface |
Select the LAN Gateway Interface on which the AnexSPOT feature has to be enabled. E.g.: LAN2 Port has been selected in the image. NOTE: Lan Bridge must not be used to configure AnexSPOT. |
Local Server Port |
Local Gateway server port will be assigned automatically. E.g.: Port 2060 has been assigned as the LAN Gateway server Port. |
Local Gateway Name |
Assign Local Gateway Name for the AnexSPOT instance being configured. |
| Controller Settings | |
Cloud Redirect URL |
Specify Cloud Redirect URL and path of the Authentication Server to forward the Authentication requests. E.g.: https://wifi.anexspot.com/auth NOTE: /auth is a mandatory after adding respective server domain name in Cloud Redirect URL. |
Cloud Server IP |
Specify Cloud Server IP of the Authentication Server to which the Authentication requests are forwarded. |
Maximum Clients |
Specify Maximum Number of clients that can be connected to AnexSPOT. E.g.: 100 |
Status Poll Interval |
Specify the time interval in minutes at which AnexSPOT will check for new connected clients, quota usage and handle Expired Sessions. Minimum Status Poll Interval assignment begins from 5 minutes. E.g.: 5 NOTE: The Status Poll interval (set in seconds) must not exceed half the duration set for No Auth Idle Timeout (set in minutes). Failing to do so will not start the AnexSPOT service. |
No Auth Idle Timeout (Mins) |
Specify the timeout interval in minutes after which an idle device that is not yet authenticated and is still in Pre Authentication state, its connection will be terminated. Minimum No Auth Idle Timeout assignment begins from 11 minutes. Eg: 20 |
Idle Timeout (Mins) |
Specify the time after which the Authenticated Device connection will be de-authenticated and logged out due to inactivity. Eg: 60 Number ‘0’ can be specified to configure it as unlimited time period where user will not de-authenticate due to inactivity. |
Block Connection Tethering |
Enable this option to block the Authenticated user from sharing Internet from his Mobile or Laptop Personal Hotspot to other network devices. |
Walled Garden Domains |
Add domain name that are to be whitelisted and can be accessed without authentication required. This field is optional. |
Walled Garden IPs |
Add IP addresses that are to be whitelisted and can be accessed without authentication required. This field is optional. |
Whitelisted MAC Addresses |
Add MAC Address of the devices that are to be whitelisted from the AnexSPOT and get internet access directly without authentication. |
SAVE |
Save the AnexSPOT configuration Settings. |

AnexSPOT - Configure.| Element | Description |
|---|---|
**MAC Address** |
Client's Mac address will be displayed who gets connected to the AnexSPOT Server. |
**IP Address** |
Client's IP Address will be displayed assigned by the ACE DHCP Server. |
**Authenticated Status** |
Preauthenticated/Authenticated state is displayed for the clients connected to AnexSPOT Server. Preauthenticated - Client needs to put his credentials in order to get access to the internet.Authenticated - Client has access to the internet. |
**Session ID** |
Session ID will be assigned by the AnexSPOT server after the client has been Authenticated. |
**Session Duration** |
Client's Session Duration assigned by the AnexSPOT Server. Once the session duration finishes, the client gets de-authenticated and looses Internet access. |
**Download Limit** |
Displays Client's Download Quota Limit. Once the quota limit is surpassed, the client gets de-authenticated, once the information from ACE router is sent to AnexSPOT cloud server. |
**Upload Limit** |
Displays Client's Upload Quota Limit. Once the quota limit is surpassed, the client gets de-authenticated, once the information from ACE router is sent to AnexSPOT cloud server. |
**Download Bandwidth (bps)** |
Displays Download Rate Limit assigned to the client by the AnexSPOT server. |
**Upload Bandwidth (bps)** |
Displays Upload Bandwidth rate Limit assigned to the client by the AnexSPOT server. |
**Logout** |
Click on the Logout icon to force logout the already authenticated clients. |

User icon under AnexSPOT - Configure - Current Instances table as shown in the image above. It will direct to the Users that are connected to AnexSPOT network.
NOTE:
1. Do not configure AnexSPOT on LAN_br0 interface.
2. The LAN port link must be up and connected to the device (Laptop/Router) before saving the AnexSPOT Settings.
3. Delete Bridge Interfaces (Eg: lan_br0) if any, to have a working AnexSPOT on a LAN interface that is configured under **Network - WAN/LAN** on a single port and is not a part of bridge configuration.
Under System Management, Admin and User password can be changed by entering the current default password and updating to new password accordingly.
NOTE:
Operator/User mode can be used for monitoring and diagnosis of the network and router. When using this credential, if any changes are being done the user will logout immediately without reflecting any changes in the router.

Under Administration - System Management - System Settings , The Hostname and Web Server Port of the ACE router to recognize and access the router accordingly.
NOTE:
Administration - Service and Restart WEBGUI Service after changing Dashboard Port.connect.anexgate.com for enabling AnexCONNECT feature. (Paid Subscription required)
Syslog must be configured in the ACE Hotspot router in order to receive device logs as well as NAT Logs of connected users to UAM hotspot.
To configure syslog settings,
Go to Administration - System Management - Syslog Settings in order to export the logs to the mentioned Public IP address and port.
NOTE:
The log buffer Size for USG model and ACE model is as follows:

Under Administration - Services, each service running on the AnexGATE HotSpot router can be restarted without rebooting the device if a particular service is not functioning properly.
Also, it is useful when you do any changes in the router. It is recommended to restart the UAM Hotspot service for it to function as expected.
Services used for AnexGATE HotSpot are as follows:
| Service | Description |
|---|---|
Networking |
Restart LAN/WAN Service. |
Firewall |
Restart Firewall Services like Zone, Rules and NAT Forward. |
Wireless LAN |
Restart Wireless LAN Service. |
Routing/Load Balance |
Restart Load Balancing Service. |
SSL VPN |
Restart SSL VPN Tunnel Service. |
IPSec VPN |
Restart IPSec Tunnel Service. |
Web GUI |
Restart Dashboard Service. |
UAM Hotspot |
Restart UAM HotSpot Service. |
NAT Export Client |
Restart UAM Export Service. |
AnexConnect |
Restart AnexCONNECT Service. |

Network Status and Logs allows the user to carry out Diagnostic operations over the AnexGATE Router.
The Diagnostic tools are as follows:
Bandwidth Graph displays a live graphical Representation of the traffic flowing through the Interfaces configured on the ACE Router. It displays the graph of Inbound/Outbound Traffic on each Interfaces.

Device or System Logs can be viewed at Status - Logs. The logs are stored temporarily and rotate as per Log buffer size assigned to the router.
NOTE:
All logs will be cleared after device reboot.

System command are set of Commands useful for diagnosing the AnexGATE Hotspot Router, as well as troubleshooting the connectivity problems.
| Command | Argument | Description |
|---|---|---|
**ping ipv4** |
<domain / ip address> Ex: google.com Ex: 8.8.8.8 |
Checks the reachability to the Domain or IP. |
| <domain / ip address> -I Ex: google.com -I eth1Ex: 8.8.8.8 -I eth0.1 |
Checks the reachability to the Domain or IP address on a particular interface. Interface = eth1, eth2, eth3 eth0.2, eth0.3 ( Interfaces for ACE Classic Plus Giga)etc.. |
|
**ifconfig** |
**no argument** | Displays ‘active’ interface configuration. |
| -a | Displays interface configuration along with ‘inactive’ interfaces. | |
**lsusb** |
**no argument** | Displays information about USB buses in the system and the devices connected to them. |
**traceroute** |
Ex: google.comEx: 8.8.8.8 |
Displays the route that a packet takes to reach the host. Useful, when you want to know about the route and about all the hops that a packet takes. |
**nslookup** |
Ex: google.com Ex: 8.8.8.8 |
Displays “A record” (IP Address) of the domain and vice-versa. Use this command to find the address record for a domain. It queries to domain name servers and get the details. |
**ip route** |
**no argument** | Displays IP routing table. |
**ipsec status** |
**no argument** | Displays detail verbose output the IPSec Tunnel connectivity status. |





| Problem | Troubleshooting |
|---|---|
| Not able to ping or access the AnexGATE Router Dashboard | - Connect the cable to the LAN port of the AnexGATE HOTSPOT Router and PC machine. - If not accessible on 192.168.100.0/24. Turn on DHCP mode in PC, Hotspot LAN interface provides an IP through Hotspot DHCP. - Once the IP is received from Hotspot DHCP, Configure static IP address 192.168.100.10 Gateway 192.168.100.1 on the system-PC and reboot the device in order to bring the LAN interface from Promiscuous mode to Working Mode. OR - One of the default WAN port is configured as 10.10.0.10 with gateway 10.10.0.1. Access the router using that port giving the System-PC an IP address as 10.10.0.1 and gateway 10.10.0.10 |
| LAN/WAN Connectivity Issues | - Go to Status - System Command- Check Internet Connectivity by pinging 8.8.8.8 or google.com in the router. - Refer Checking Status and Logsfor diagnosing connectivity issues. - Check License status on Dashboard. If the device has been resetted, the License will be removed. - Re-add the License. |
| Multiple WAN Links Configured but no Internet when pinged | - Add WAN link and LAN link has been added properly under their respective Firewall Zones in Firewall > Rules. - Add WAN Interfaces under Balancing Interfaces and assign track ips. - Configure Load Balancing mode properly. |
| Unable to get DHCP IP or ping Hotspot gateway on configured VLAN | - Check if the trunk/tagged port and access/untagged port for VLAN are configured properly on switch. The LAN cable connected to router must go into the switch trunnk/tagged port and exit from access/untagged ports of vLAN configured on the switch - Connect a Windows Laptop and assign VLAN ID to the network interface and check the connectivity. - Click on this link for further information on how to configure VLAN ID in windows Laptop. |