MB Connect Line mbNET.rokey RKH 210 User manual

Manual
V 7.2.0 - en | Aug 25th, 2022
.

By purchasing an mbNET router, you’ve selected a Made in Germany product. Our products are manufactured
exclusively in Germany, to guarantee the highest quality and to secure jobs in Europe.
This manual describes the functions and operation of the mbNET.rokey Router RKH 210, RKH 216, RKH 235
andRKH 259 from hardware version HW03 and from firmware version 6.2.4.
Please read it carefully and keep in a safe place.
Find the latest information and updates on our website at www.mbconnectline.com.
We always welcome and are grateful for comments, suggestions for improvement and constructive criticism.
Trademarks and company logos
The use of a trademark and company logo not shown here is not an indication that it is freely available for use.
Publisher:
MB connect line GmbH
Remote Maintenance Solutions
Winnettener Str. 6
91550 Dinkelsbühl
GERMANY
Tel.: +49 (0) 700 MBCONNECT
+49 (0) 700 622 666 32
Website: www.mbconnectline.com
The latest information can be found on our website. We are always grateful for suggestions and proposed
improvements.
Copyright © MB connect line GmbH 1997 - 2022
Page 2 von 324 | V 7.2.0 - en | Aug 25th, 2022 |

Table of contents
1 General................................................................................................................................................... 9
2 Release note........................................................................................................................................11
3 Brief description..................................................................................................................................13
4 Features................................................................................................................................................13
5 Information about cyber-security......................................................................................................15
6 Warning signs..................................................................................................................................... 16
7 Security information........................................................................................................................... 16
8 Maintenance.........................................................................................................................................19
9 Disposal of old devices......................................................................................................................19
10 Legal notice......................................................................................................................................... 20
11 Technical Data.....................................................................................................................................21
12 Scope of Supply..................................................................................................................................27
13 Display, controls and connectors.....................................................................................................28
13.1 Front view of the device.............................................................................................................28
13.2 View at the top of the device..................................................................................................... 31
13.3 View of underside of device.......................................................................................................32
14 Interface assignment.......................................................................................................................... 33
14.1 Pin assignment of terminal blocks X1 and X2 on the top of the device.....................................33
14.2 Pin assignment of the RJ11 socket on the bottom of the device...............................................33
14.3 Pin assignment serial interfaces COM1/COM2 (front of device)................................................33
14.4 Pin assignment LAN/WAN port on front of device.....................................................................34
14.5 Pin assignment USB port on front of device..............................................................................35
15 Router Installation...............................................................................................................................36
16 Starting the router.............................................................................................................................. 37
17 Connect router to configuration PC................................................................................................. 38
18 Calling up the mbNET web Interface................................................................................................39
19 First Start............................................................................................................................................. 40
20 Portal server - First start................................................................................................................... 41
20.1 Internet - Configuring the Internet connection............................................................................42
20.1.1 External Router/Firewall WAN settings.......................................................................... 42
20.1.2 Modem Connection Settings.......................................................................................... 44
20.2 Portal Server - Settings..............................................................................................................44
Table of contents | Page 3 of 324

20.3 Finish - Apply settings................................................................................................................46
21 Quick Start - Cloud Status Page.......................................................................................................47
21.1 Quick Start..................................................................................................................................47
21.2 Diagnosis.....................................................................................................................................49
21.2.1 Output of device diagnostic information to a USB stick.................................................50
21.3 IoT...............................................................................................................................................51
22 Classic router - configuring the mbNET via the web interface......................................................52
22.1 Description of the graphical user interface (configuration interface).......................................... 52
22.2 Description of buttons, icons and fields..................................................................................... 53
23 System - settings and basic router configuration...........................................................................54
23.1 System > Info..............................................................................................................................55
23.2 System > CTM (Configuration Transfer Manager).....................................................................57
23.3 System > Settings.......................................................................................................................60
23.3.1 System > Settings > System Settings............................................................................62
23.3.2 System > Settings > Time Settings................................................................................63
23.3.3 System > Settings > NTP Settings................................................................................ 64
23.3.4 System > Settings > Mail Settings.................................................................................66
23.3.5 System > Settings > Device-API....................................................................................68
23.3.6 System > Settings > System Service.............................................................................70
23.4 System > WEB........................................................................................................................... 71
23.4.1 System > Web > HTTPS access for device configuration.............................................73
23.4.2 System > Web > System Services................................................................................ 74
23.5 System > User............................................................................................................................75
23.5.1 Added/Edited User..........................................................................................................76
23.6 System > Certificates..................................................................................................................78
23.6.1 Own certificate................................................................................................................79
23.6.1.1 Import own certificate.................................................................................................. 79
23.6.2 CA certificate (root certificate)........................................................................................81
23.6.2.1 Importing CA certificate (root certificate).....................................................................81
23.6.3 Partner certificate (IPSec).............................................................................................. 83
23.6.3.1 Import partner certificate............................................................................................. 83
23.6.4 CRL (revocation list).......................................................................................................85
23.6.4.1 Import CRL (revocation list)........................................................................................ 85
23.7 System > Memory devices.........................................................................................................87
23.7.1 USB.................................................................................................................................87
23.7.1.1 USB Settings............................................................................................................... 88
23.7.1.2 USB access from the network.....................................................................................89
23.7.1.3 USB devices................................................................................................................90
23.7.2 SD-Card..........................................................................................................................91
23.7.2.1 SD Access from network.............................................................................................92
23.8 System > Logging.......................................................................................................................92
23.8.1 General Settings.............................................................................................................94
23.8.2 External logging (server settings)...................................................................................95
Page 4 von 324 | V 7.2.0 - en | Aug 25th, 2022 |

23.9 System > Configuration (backup and restore)............................................................................96
23.10 System > Firmware (Firmware update)......................................................................................97
24 Network - connection settings and options.....................................................................................99
24.1 Network > LAN......................................................................................................................... 101
24.1.1 Interface........................................................................................................................101
24.1.2 Routes...........................................................................................................................106
24.2 Network > WAN........................................................................................................................108
24.2.1 Interface - set WAN interface type...............................................................................108
24.2.2 Routes...........................................................................................................................110
24.3 Network > Modem.................................................................................................................... 112
24.3.1 Analogue modem configuration....................................................................................112
24.3.1.1 Modem Settings.........................................................................................................114
24.3.1.2 Outgoing (configuration for outgoing connections)....................................................116
24.3.1.3 Incoming.....................................................................................................................119
24.3.1.4 Call Back....................................................................................................................122
24.3.2 GSM modem configuration...........................................................................................123
24.3.2.1 Modem Settings.........................................................................................................124
24.3.2.2 Outgoing SIM 1/SIM 2 (configuration for outgoing connections)...............................125
24.3.2.3 General SIM Settings................................................................................................ 129
24.3.2.4 SMS (Remotely control services via SMS Send SMS if,...)...................................... 132
24.4 Network > Internet (Internet connection and Internet settings)................................................ 136
24.4.1 Configure Internet connectivity.....................................................................................136
24.4.2 Internet settings (Connection settings).........................................................................142
24.5 Network > DHCP......................................................................................................................145
24.5.1 LAN DHCP server settings...........................................................................................146
24.5.2 LAN DHCP static lease server settings....................................................................... 147
24.6 Network > DNS-Server.............................................................................................................148
24.7 Network Hosts...........................................................................................................................152
24.8 Network > DynDNS.................................................................................................................. 154
24.8.1 System DynDNS settings (MB Connect Line DynDNS service)...................................154
24.8.2 Public DynDNS service................................................................................................ 155
25 Serial (serial port COM)....................................................................................................................158
25.1 COM settings............................................................................................................................159
25.2 COM network settings.............................................................................................................. 161
25.3 COM2 in the MPI/PROFIBUS version......................................................................................161
25.3.1 COM2 Settings............................................................................................................. 162
25.3.2 COM2 Network settings................................................................................................164
26 Security settings............................................................................................................................... 165
26.1 Security Settings > Firewall General........................................................................................166
26.2 Security Settings > WAN LAN (configuration of the firewall rules)...........................................168
26.2.1 Edit firewall rule............................................................................................................172
26.3 Security Settings > LAN-WAN (configuration of the firewall rules)...........................................174
26.3.1 Edit firewall rule............................................................................................................177
Table of contents | Page 5 of 324

26.4 Security Settings > Forwarding................................................................................................ 179
26.4.1 Edit Forwarding Rule....................................................................................................182
26.5 Security settings > NAT............................................................................................................184
26.5.1 SimpleNAT....................................................................................................................184
26.5.1.1 Edit SimpleNAT Rule.................................................................................................185
26.5.2 1:1 NAT.........................................................................................................................187
26.5.2.1 Edit 1:1 NAT rule.......................................................................................................188
27 VPN..................................................................................................................................................... 190
27.1 IPSec.........................................................................................................................................190
27.1.1 Configure IPSec connections.......................................................................................190
27.1.2 IPSec settings...............................................................................................................191
27.2 PPTP.........................................................................................................................................195
27.2.1 PPTP configuration.......................................................................................................195
27.2.2 PPTP client configuration.............................................................................................199
27.3 OpenVPN..................................................................................................................................201
27.3.1 Configure OpenVPN connections.................................................................................202
27.3.1.1 Connection type: Client router connection................................................................ 202
27.3.1.2 Connection type: Router-router connection - server mode....................................... 214
27.3.1.3 Connection type: Router-router connection - client mode.........................................226
27.4 Static key (key management)...................................................................................................241
28 IO-Manager.........................................................................................................................................243
28.1 Configuring the PLC connection...............................................................................................245
28.2 Logging - configuration.............................................................................................................247
28.3 Create tags............................................................................................................................... 249
28.4 Status........................................................................................................................................251
28.5 Diagnosis...................................................................................................................................252
29 Alarm Management...........................................................................................................................253
29.1 Digital inputs - Configuration.................................................................................................... 254
29.2 Multiplex Inputs.........................................................................................................................256
29.3 Digital outputs - Configuration..................................................................................................260
30 Extras..................................................................................................................................................262
30.1 LUA........................................................................................................................................... 262
30.2 IoT > Control (mbEDGE)..........................................................................................................266
30.2.1 IoT > Control > Docker - activate mbEDGE................................................................ 266
30.2.2 IoT > Control - after activating mbEDGE.....................................................................269
30.2.3 IoT > Control - activate Docker Management..............................................................271
30.2.3.1 Link to User Interface................................................................................................272
30.2.4 Flows and Dashboard...................................................................................................273
30.2.4.1 Activate flows and dashboard................................................................................... 273
30.2.4.1.1 Link to Flows (Node-RED)..................................................................................... 274
30.2.4.1.2 Link to Dashboard (Node-RED)............................................................................. 275
30.2.5 Backup and Delete flows..............................................................................................276
30.3 Network.....................................................................................................................................277
Page 6 von 324 | V 7.2.0 - en | Aug 25th, 2022 |

30.4 Key Management......................................................................................................................279
30.4.1 Create Backup-Key.......................................................................................................280
30.5 Firmware................................................................................................................................... 281
30.6 RoKEY.......................................................................................................................................283
31 Status (information and analysis)...................................................................................................285
31.1 Status > Interfaces....................................................................................................................285
31.2 Status > Network......................................................................................................................288
31.2.1 General......................................................................................................................... 288
31.2.2 Firewall..........................................................................................................................289
31.2.3 Network participants..................................................................................................... 289
31.3 Status > Modem....................................................................................................................... 291
31.3.1 GSM information...........................................................................................................291
31.3.2 Modem..........................................................................................................................293
31.4 WiFi...........................................................................................................................................294
31.5 Internet......................................................................................................................................296
31.6 DHCP........................................................................................................................................297
31.7 DNS Server...............................................................................................................................298
31.8 DynDNS.................................................................................................................................... 299
31.9 NTP...........................................................................................................................................300
31.10 VPN-IPSec................................................................................................................................301
31.11 VPN-PPTP................................................................................................................................ 302
31.11.1VPN PPTP server.........................................................................................................302
31.11.2VPN PPTP clients........................................................................................................ 303
31.12 VPN-OpenVPN..........................................................................................................................304
31.13 IoT.............................................................................................................................................305
31.13.1IoT > Docker.................................................................................................................305
31.13.2IoT > Docker Management...........................................................................................306
31.13.3IoT > Flows and Dashboard.........................................................................................307
31.14 Runtime.....................................................................................................................................308
31.15 Diagnostics - Network Resources............................................................................................ 309
31.16 Log-Analyzer.............................................................................................................................310
31.17 Storage media...........................................................................................................................313
31.18 Alarm Manager......................................................................................................................... 314
31.19 System...................................................................................................................................... 315
31.19.1System-Usage...............................................................................................................315
31.19.2System Information.......................................................................................................316
31.19.3MQTT Debug List.........................................................................................................317
32 Firmware update via the USB interface..........................................................................................318
33 Programming the mbCONNECT24 portal configuration via the USB interface..........................319
34 Factory settings when delivered.....................................................................................................320
34.1 User name and password - for access to the mbNET Web Interface......................................320
34.2 IP address of the mbNET.........................................................................................................320
Table of contents | Page 7 of 324

35 Load factory settings........................................................................................................................321
36 Device restart (Reset).......................................................................................................................322
37 Annex..................................................................................................................................................323
37.1 Set computer address (IP address) in Windows 10.................................................................323
Page 8 von 324 | V 7.2.0 - en | Aug 25th, 2022 |

1 General
Purpose of the documentation
This document describes the installation, use and functions of the mbNET.rokey industrial router
RKH 210, RKH 216, RKH 235 und RKH 259.
The document serves as a reference guide. Please read carefully and keep in a safe place.
Validity
The document is valid for industrial routers mbNET.rokey RKH 210, RKH 216, RKH 235 und RKH 259
- from firmware version V 6.2.4 and from hardware version HW03*
The SIMPLY.connect** function is only available for devices with the Simplify³-Logo* .
* see device rating plate.
**SIMPLY.connect is a web application that helps you
to set up a device (mbNET) in the Remote Service
Portal mbCONNECT24. More information is available
at: https://simplyconnect.mbconnectline.com/
Prerequisite/additionally required components
•Standard Windows PC with network card
•USB stick - recommended format: FAT32 or ext3;
recommended maximum size: 4 GB (FAT32), 16 GB (ext3)
•Internet access
Additionally required software
If you run mbNET as a portal server device in the remote service portal mbCONNECT24:
•mbCONNECT24 from version V 2.4.1
mbCONNECT24 is the central portal for secure remote maintenance via the Internet.
•mbDIALUP * from version V 3.8
remote client to establish a secure VPN connection to the mbCONNECT24 portal.
•mbCHECK * from version V 1.1.2
The program checks, among other things, whether at least one of the TCP ports 80TCP, 443TCP or
1194TCP in the firewall is enabled. At least one of these ports is required by mbDIALUP and the de-
vice (mbNET) in connection with mbCONNECT24.
* Current version can be downloaded at:www.mbconnectline.com.
General | Page 9 of 324

Related documents
Getting started with mbCONNECT24
This document describes the first steps and measures necessary to get a device (mbNET router) connected
via the Remote Client (mbDIALUP) to the portal server mbCONNECT24.
Current manuals and other information
The latest manuals and more information about products related to secure remote maintenance can be found
in the download portal at www.mbconnectline.com
Page 10 von 324 | V 7.2.0 - en | Aug 25th, 2022 |

2 Release note
Version Date Comments
V 6.0.6 Apr 11th, 2019 Start-Version
V 6.0.8 Jun 19th, 2019 Add connection and termination examples for serial interfaces in RS 485
2- and 4-wire operation. See Chapter:
"Pin assignment serial interfaces COM1/COM2 (front of device)"
Note on "Last error message" when the red Stat LED lights up.
See Chapter: "Front view of the device"
Add the description for the menu "IO-Manager".
See chapter: "IO-Manager"
V 6.1.0 Oct 1st, 2019 Note on the function SIMPLY.connect in the chapters
•"General > Validity"
•"Display, controls and connectors" > "Front view of the device"
The chapter ""Maintenance"" has been added, with the remark to check at
regular in-tervals the actuality of the firmware installed on the device.
V 6.1.1 Dec 5th, 2019 As of FW 6.1.1, the mbNET can function both as an NTP client and as an
NTP server. See "System > Settings > NTP Settings"
V 6.1.2 Mar. 11th, 2020 Correction of the current consumption: old = 1300 mA => new = 500 mA
Add the performance data for new LTE module, for devices with hardware
version HW04.
V 6.1.3 Apr 22nd, 2020 Add the processor performance data in the technical data.
V 6.1.4 July 6th, 2020 Add the transmission power of radio modules in the technical data.
V 6.2.0 Oct 19th, 2020 General revision
Additions to the menu: Extras > IoT (mbEDGE)
V 6.2 DR01 Mar 17th, 2021 General corrections, update / change of the encryption algorithms.
V 6.3.0 Nov 16th, 2011 Revision of the device web interface
V 6.3.1 Mar 28th, 2022 Addition of the chapter "Disposal of old devices"
Update of the chapter "Technical Data"; "Scope of Supply"
Release note | Page 11 of 324

Version Date Comments
V 7.2.0 Aug 25th, 2022 Devices with GSM modem:
The following fields/information have been added under Status > Modem
> GSM Information and in the Quickstart:
- Mobile number (Own number)
- MCC
- MNC
All SMS received from this device (mbNET) are now listed under Status >
Modem > SMS.
All devices:
Output of the device diagnosis information on a USB stick (see Quickstart
> Diagnosis).
The operating time of the device is displayed in the Quickstart and under
Status > System > System information.
It is now possible to "wake up" peripherally connected computers/PCs via
Wake-On-LAN (see Network > LAN -> Wake on LAN).
In the OpenVPN settings there is now an additional option in the Authenti-
cation tab.
It is now possible to use a TLS key for HMAC.
The Log Analyzer tab has been added to the Status menu.
The live log of the system can be seen under Log Analyzer.
The display can be filtered by "Priority" and/or "Application".
Page 12 von 324 | V 7.2.0 - en | Aug 25th, 2022 |

3 Brief description
The mbNET industrial router offers you optimum flexibility and security, making remote communication with
your systems both easy and secure. Thanks to its compact design, the mbNET router will fit into any switch
cabinet, and with its multiple interfaces and drivers, is the perfect solution for integrating different control sys-
tems. The configuration of the router is done via the Web interface of the device or via the remote maintenance
portal mbCONNECT24.
4 Features
•Fully configurable using Web interface via locally connected computer, or remotely via
mbCONENCT24.
•Deployable worldwide using optional mobile modem connections (optional) plus access via LAN and
Internet.
•Secure connection using an integrated firewall with IP filter, NAT and port forwarding, VPN with AES
(256-, 192-, 128-Bit), Blowfish (128-Bit), 3DES (168-Bit), DES (56-Bit) encryption, and authentication
via pre-shared key (PSK), static key or certificate (X.509).
•On-board 2-level remote access key
°Pos. REM: trigger remote access connection
°Pos. ONL: alarms, dashboards & router administration
°Pos. OFF: no connection with mbCONNECT24
•Alarm management:
°Fully configurable digital inputs and outputs, and the ability to send via email, SMS or Internet
dialup.
°Via remote output switching in the event of a fault or with an active Internet connection.
•Integrated server secures all settings, keys and certificates and allows data sharing within the network
via connected USB flash or connected SD card.
•Variable RS232, RS485, RS422 RS interface or optional MPI/PROFIBUS for connecting control
systems.
•Using the optional mbEDGE * function.
* mbEDGE is a software kit that makes it possible to extend the mbNET industrial router to an Edge Gateway.
More information about mbEDGE can be found at www.mbconnectline.com
Brief description | Page 13 of 324

Use of open source software
General
Our products include, among other things, open source software, which is manufactured by a third party and
has been published for free use by anyone. The open-source software is available under special open-source
software licences and copyright of third parties. In principle, each customer can use open source software
free of charge under the licence terms of the respective manufacturers. The customer's right to use the open
source software for purposes other than those for which our products were intended is regulated in detail by
the relevant open source software licences. The customer may freely use the open source software as set out
in the respective valid licence, beyond the intended purpose of the open source software in our products. In
the event that there is a contradiction between the licensing terms of one of our products and the respective
open source software licence, the respective applicable open source software licence shall take priority over
our licensing terms if the respective open source software is affected by this.
Use of the open source software is free of charge. We do not charge any usage fees or similar charges for the
use of open source software included in our products. Customer use of open source software in our products
is not part of the profit that we obtain from the contractual remuneration. All open source software programs
contained in our products are in the available list. The most important open source software licenses are listed
in the Licences section at the end of this publication.
If programs that are included in our products are under the GNU General Public License (GPL), GNU Less-
er General Public License (LGPL), the Berkeley Software Distribution (BSD), the Massachusetts Institute of
Technology (MIT), or other open source software license, which requires that the source code be made avail-
able, and this software was not already supplied with our product on a disk or in the source code, we will send
this at any time upon request. If we are required to send this on a disk, there will be a flat rate charge of €35.00.
Our offer to send the source code upon request, shall automatically end 3 years after delivery of the respective
product to the customer.
Requests must, where possible, be sent to the following address with the product's serial number:
MB connect line GmbH Fernwartungssysteme · Winnettener Str. 6 · 91550 Dinkelsbühl GERMANY
Special liability provisions
We assume no responsibility or liability if the open-source software programs included in our products are
used by customers in a manner that no longer corresponds to the purpose of the contract which serves as
the basis for the purchase of our products. This applies in particular to any use of the open source software
programs outside of our products. The warranty and liability provisions, which stipulate the applicable open
source software license for the corresponding open source software, as listed below, apply to the use of open-
sourcesoftwarebeyond the contractualpurpose.In particular, weare also notliableif the opensourcesoftware
in our products or the entire software configuration in our products is changed. The warranty contained in
the contract, which forms the basis for the purchase of our products, applies only to unchanged open source
software and the unchanged software configuration in our products.
Open source software used
For a list of the open source software used in our products, visit https://www.mbconnectline.com/down-
loads/open-source-software-licenses.txt.
Page 14 von 324 | V 7.2.0 - en | Aug 25th, 2022 |

5 Information about cyber-security
To prevent unauthorized access to facilities and systems, observe the following security recommendations:
General
•Periodically ensure that all relevant components meet these recommendations and any additional inter-
nal security policies.
•Perform a security assessment of the entire system. Use a cell protection concept with suitable prod-
ucts.
For example, "ICS-Security-Kompendium" from the BSI (Federal Office for Security in Information
Technology, Bundesamt für Sicherheit in der Informationstechnik)
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/ICS/ICS-Security_kompendium_pdf.html
shortened URL: http://bit.ly/1rP9znm
Physical access
•Restrict physical access to security-relevant components to qualified personnel.
Security of the software
•Keep software/firmware updated.
°Stay informed about security updates for the product.
°Stay informed about product updates.
You can find information about this at: www.mbconnectline.com
Passwords
•Define rules for the use of the devices and assigning passwords.
•Change passwords regularly, to increase security.
•Use only passwords with a high password strength. Avoid weak passwords such as "password1",
"123456789".
•Make sure that all passwords are protected and inaccessible to unauthorized personnel.
•Do not use the same password for different users and systems.
Information about cyber-security | Page 15 of 324

6 Warning signs
The following information signs and signal words are used in this document:
NOTICE
Note - indicates a potentially dangerous situation that can lead to property damage if not avoided.
TIP
A tip indicates additional information and guidance, for example on cyber security, which facilitates secure
use of the system.
7 Security information
General
•mbNET industrial routers are only used as part of an overall system.
•A machine operator is responsible for compliance with the specific application and regionally applicable
safety and accident prevention guidelines.
•When configuring the application, specific and local safety and accident prevention guidelines must be
observed.
•EN 60204-1 / IEC 204 compliant emergency stop devices must remain effective in all operating modes
of the machine system. There must be no undefined restart of the system.
•Faults that occur in the machinery, which can cause material or personal damage, must be intercept-
ed by additional external devices. These devices must ensure a safe operating state in case of failure.
Such devices include electromechanical safety switches, mechanical interlocks, etc.
•This manual is intended for project engineers, users and installers who use the mbNET Industrial
router. The operation of the mbNET industrial router and the signalling functions should be explained to
users. Installers should be provided with all the necessary data for installation.
•mbNET industrial routers are used only in connection with a complete system. For this reason, the
standards, safety and accident prevention guidelines for each application should be observed by the
project engineer, users and installers. The automation system operator is responsible for complying
with these guidelines.
Intended use
mbNET industrial routers should only be used as described in the manual.
Avoid improper use!
Safety-relevant functions should not be controlled via the mbNET industrial router alone. Uncontrolled restarts
must be completely excluded by programming.
Page 16 von 324 | V 7.2.0 - en | Aug 25th, 2022 |

Technical limits
The product is only intended for use within the technical limits specified in the data sheets.
EN/F Safety instructions
•Assembly, installation and commissioning of the router should be carried out only by qualified person-
nel. The respective national safety and accident prevention regulations must be observed.
•The router is built in accordance with the latest technology and all recognised safety rules (see declara-
tion of conformity).
•The router is designed exclusively for use in the control cabinet and with safety extra-low voltage
(SELV) in accordance with DIN EN IEC 62368-1 VDE 0868-1:2021-05.
•The router should only be connected to devices that meet the requirements of IEC / EN 62368-1.
•The router is only intended for use within buildings, not outdoors.
•Never open the router housing. Unauthorized opening and improper repair can be dangerous for users
of the router. The manufacturer is not responsible for unauthorized modifications.
The warranty becomes void if the device is opened!
•The router should not be disposed of with normal domestic waste in accordance with European stan-
dards (WEEE) and the German Electrical and Electronic Equipment Act. The device must be disposed
of accordingly.
ATTENTION! Electrostatic discharge!
Note the necessary precautions when handling electrostatically sensitive components (EN
61340-5-1 and IEC 61340-5-1)!
mbNET routers are maintenance-free units. If an mbNET router is damaged or malfunctions, the device must
be taken out of operation immediately and secured against unintended operation.
NOTICE
The MDH810, MDH815 and MDH830 should only be operated and connected via telephone systems and
not operated directly on the public telephone network.
Security information | Page 17 of 324

(F) Consignes de sécurité:
•Le routeur est construit selon l’état actuel de la technique et les règles techniques reconnues en
matière de sécurité (voir la déclaration de conformité).
•Le routeur doit être monté à un endroit sec. Aucun liquide ne doit pénétrer dans le routeur, car cela
pourrait occasionner des chocs électriques ou des courts-circuits.
•Le routeur est uniquement prévu pour l’utilisation dans des bâtiments et non pas à l’extérieur.
•Ne jamais ouvrir le boîtier du routeur. L’ouverture du routeur ou des réparations non adaptées peuvent
mettre en danger l’utilisateur du routeur. Le fabricant n’assure aucune garantie concernant les modifi-
cations arbitraires.
La garantie devient caduque en cas d’ouverture de l’appareil !
•Conformément aux prescriptions européennes et à la loi allemande relative à l’électronique et les ap-
pareils électroniques, il est interdit de mettre au rebut l’appareil avec les déchets domestiques nor-
maux. L’appareil doit être éliminé dans le respect des prescriptions.
AVERTISSEMENT
Les modèles MDH810, MDH815 et MDH830 doivent être utilisés et raccordés uniquement via des centrales
téléphoniques. Il est interdit de les faire fonctionner directement sur le réseau téléphonique public.
Page 18 von 324 | V 7.2.0 - en | Aug 25th, 2022 |

8 Maintenance
Our devices are maintenance-free units. If a device shows signs of damage or malfunctions, the device must
be put out of operation immediately and secured against unintentional operation.
NOTICE
Regardless of the maintenance-free hardware, there is a need for action in terms of IT security.
•Keep the software / firmware up to date.
•Note the "Information about cyber-security".
•Keep yourself informed about security updates of the product.
Information can be found at: www.mbconnectline.com
9 Disposal of old devices
In the interests of environmental protection, final holders must collect old devices separately from unsorted
municipal waste at the end of their service life.
Old batteries and accumulators that are not enclosed by the old device, as well as lamps that can be removed
fromthe olddevice withoutdestroying them,must beseparated fromthe olddevice ina non-destructivemanner
before they are handed over to a collection point.
The final holder is responsible for deleting personal data on the old devices to be disposed of.
MB connect line offers the possibility of returning and disposing of old devices. Details can be found at
www.mbconnectline.com/disposal.
Do not despose of old devices into household waste!
Only for EU countries:
Dispose of the device in accordance with the Waste Electrical and Electronic Equipment Directive 2012/19/
EU - WEEE.
Maintenance | Page 19 of 324

10 Legal notice
Qualified personnel
The product/system described in this documentation may be operated only by personnel qualified for the spe-
cific task in accordance with the relevant documentation, in particular its warning notices and safety instruc-
tions. Qualified personnel are persons who, due to their training, experience, instruction in and knowledge of
the relevant standards, regulations and accident prevention regulations have been authorized by the person
responsible for the safety of the machine to carry out the required activities and who have the ability to recog-
nize and avoid potential hazards.
Intended use
The device should only be used as described in the manual.
Limitation of liability
All technical information, data and notes about installation, operation and maintenance contained in the oper-
ating instructions are provided under consideration of our previous experience and findings to the best of our
knowledge. No claims may be derived from the information, figures and descriptions in this operating manual.
MB connect line GmbH assumes no liability for damages due to:
•Non-compliance with these instructions
•unintended use
•technical changes
Subject to content and technical modifications.
Trademarks
The use of a trademark and company logo not shown here is not an indication that it is freely available for use.
NOTICE
The device type RKH 259 AT&T is not CE marked and may not be used or put into service in the European
Economic Area (EEA).
Page 20 von 324 | V 7.2.0 - en | Aug 25th, 2022 |
This manual suits for next models
5
Table of contents
Other MB Connect Line Network Hardware manuals
Popular Network Hardware manuals by other brands

ATTO Technology
ATTO Technology iPBridge 2500C Installation and operation manual

TRENDnet
TRENDnet TEW-640MB Quick installation guide

DSC
DSC Sur-Gard System III SG-DRL3-IP Installation & operating manual

Eusso
Eusso USS4500-E user guide

MiLAN
MiLAN MIL-L1624MT user guide

Global Invacom
Global Invacom OTX manual

Seenergy
Seenergy SVR-816 user manual

NI
NI PCIe-6593 SAFETY, ENVIRONMENTAL, AND REGULATORY INFORMATION

Per Vices
Per Vices Noctar user manual

Altronix
Altronix TROVE T2SK78DV installation guide

Ruijie
Ruijie RG-EST350 Series Hardware installation and reference guide

NKE
NKE BOX Wi-Fi User manual and installation guide