Transforming Networks with Digi Remote Manager

In the ever-evolving landscape of network management, Digi Remote Manager (Digi RM) stands out as a transformative technology platform that takes networks to the next level, enabling smarter operations for both networks and the individuals tasked with managing them. By seamlessly bringing together a myriad of dispersed Internet of Things (IoT) devices, Digi RM evolves them into a dynamic, intelligent network. 

Features of Digi Remote Manager

1. Effortless Device Management

Digi RM simplifies the configuration, deployment, monitoring, and management of hundreds or even thousands of mission-critical devices from a single point of command. The platform’s exclusive drag-and-drop grouping technology facilitates the auto-assimilation, updating, and deployment of devices with ease.

2. Insightful Dashboard and Reporting

The flexible Digi RM dashboard allows users to customize and position crucial information as needed. Pre-built reports with critical device health metrics can be tailored to include specific data, and alerts can be configured for specified conditions. This allows for a deeper understanding of network performance and facilitates informed decision-making.

3. Security and Compliance

Digi RM ensures an always-on, always-secure network with software-defined protection. It automatically scans and fixes any out-of-compliance device configurations in the group, maintaining the integrity of the network and alerting administrators if key settings deviate.

4. Cloud Integration

Digi RM provides pre-configured APIs that streamline the access, connection, and analysis of data collected from devices. Cloud connectors enable seamless integration with third-party analytics and visualization dashboard applications. For custom integrations, the platform offers a rich web service API.

5. Digi Containers

Digi Containers, an add-on service to Digi Remote Manager, simplifies the deployment of custom applications via containers. These containers streamline the process of building, deploying, and running custom applications on devices managed with Digi RM. Lightweight Linux Containers (LXC) tools enable developers to package custom applications, complete with dependencies, into a portable bundle.

6. WAN Bonding

Digi WAN Bonding combines multiple connections into a resilient connectivity solution, ensuring optimal performance and maximum uptime globally. Features such as Digi SureLink®, policy-based routing, and interface bonding prevent external network failures from causing downtime, providing a robust and reliable network connection.

7. Mobile VPN

Digi Mobile VPN offers a secure connection between data centers and Digi routers, including connected edge devices. Orchestrated through Digi Remote Manager, this service provides persistent, secure connectivity—a crucial feature for applications in public sectors, emergency response, and mass transit.

8. Digi Remote Manager Mobile App

The Digi RM mobile app enhances user convenience by enabling device registration via QR codes. The Configuration Manager feature allows for the automatic application of custom configurations. Users can monitor the overall health of their network and individual device statuses through the app.

5Gstore’s Utilization of Digi Remote Manager

5Gstore harnesses the power of Digi Remote Manager across various aspects of network management.

  • Configuration Management
    • 5Gstore utilizes Digi RM’s Configuration Manager for both individual devices and bulk configurations, streamlining the process of setting up and managing devices across the network.
  • Firmware Management
    • Digi RM facilitates firmware management for 5Gstore, allowing them to update firmware on individual devices or in bulk, ensuring that all devices are running the latest and most secure versions.
  • Monitoring Data Usage
    • Leveraging Digi IntelliFlow, a key feature of Digi Remote Manager, 5Gstore actively monitors data usage via alarms and network traffic visualization tools. This provides actionable insights into the network’s application data, focusing on the top 10 users or destinations.
  • WAN Bonding for Network Redundancy
    • 5Gstore employs Digi WAN Bonding to achieve resilient connectivity and maximum performance across multiple connections. This ensures that our employees’ networks remain robust and operational even in the face of connection failures.

In conclusion, Digi Remote Manager serves as a cornerstone in modern network management, empowering organizations like 5Gstore to achieve efficiency, security, and resilience in their networks. As technology continues to advance, Digi RM remains at the forefront, providing a comprehensive solution for managing the complexities of IoT devices and ensuring the seamless operation of intelligent networks.

Benefits of IP Passthrough

In the complex world of internet configurations, users often grapple with challenges, especially when combining their Internet Service Provider’s (ISP) router, or a cellular router, with a personal router. Enter a common hurdle known as “double NAT,” which can cause disruptions in applications such as Voice over IP (VoIP) and VPNs. However, a solution exists: IP Passthrough mode. This article will delve into what IP Passthrough is, how it operates, and why it’s helpful for users seeking greater control over their network security, especially when using VoIP and VPNs.

IP Passthrough: What Is It?

IP Passthrough is a feature that allows a user’s personal router to bypass the ISP’s router and directly obtain the IP address from the Internet Service Provider. In simpler terms, it eliminates the double NAT scenario by enabling the user’s devices to communicate directly with the ISP’s network.

How Does IP Passthrough Work?

When IP Passthrough is enabled, the personal router takes on a more prominent role in the network setup. Instead of relying on the ISP’s router for assigning IP addresses, the user’s router directly interfaces with the ISP’s modem, receiving a unique IP address. This direct connection ensures that VoIP calls and VPN connections traverse the network with minimal interference, optimizing performance and reliability.

Why Choose IP Passthrough?

Enhanced Control Over Security

One of the compelling reasons users opt for IP Passthrough is the desire for greater control over their network security. In a typical setup where the ISP’s router manages security features, users may find themselves limited in terms of customization. IP Passthrough allows individuals to take charge of their security settings directly from their personal router. This means implementing specific firewall rules, setting up intrusion detection systems, and managing access controls according to their preferences. The result is a highly personalized and robust security infrastructure that aligns with individual needs and concerns.

Optimization for VoIP and VPN Applications

For users heavily reliant on applications like Voice over IP (VoIP) and Virtual Private Networks (VPNs), IP Passthrough offers a significant advantage. In a double NAT environment, these applications may encounter difficulties due to restricted access to specific ports. IP Passthrough eliminates these restrictions, creating a direct pathway for VoIP and VPN traffic. This optimization ensures that VoIP calls are crystal clear without interruptions, and VPN connections operate securely and swiftly. By allowing these applications to function at their best, IP Passthrough enhances the overall user experience for individuals and businesses alike.

Freedom from ISP Restrictions

By choosing IP Passthrough, users liberate themselves from the constraints imposed by their Internet Service Provider’s (ISP) router or firewall. In a traditional setup, the ISP’s equipment often comes with predefined settings and limitations that may not align with the user’s preferences. IP Passthrough enables users to break free from these constraints and set up their network according to their unique requirements. This includes configuring advanced networking features, managing Quality of Service (QoS) settings, and implementing specialized protocols that may be crucial for specific applications.

Efficient Resource Utilization

IP Passthrough contributes to more efficient resource utilization within the network. By eliminating the need for double NAT translation, it streamlines the data flow, reducing latency and optimizing bandwidth usage. This efficiency becomes particularly pronounced in scenarios where multiple devices and applications are concurrently accessing the network. Users benefit from a smoother and more responsive network environment, ensuring that every connected device enjoys optimal performance without unnecessary bottlenecks.

Future-Proofing the Network

We live in a time where technology is rapidly evolving and our reliance on internet-connected devices has increased. This raises the importance of future-proofing your network. IP Passthrough provides a flexible foundation that can adapt to changing needs and emerging technologies. Users can seamlessly integrate new devices, applications, and services without being hindered by the limitations of a double NAT setup. This adaptability ensures that the network remains robust and ready for the challenges of tomorrow’s digital landscape.

Setting Up IP Passthrough: A User-Friendly Process

Configuring IP Passthrough might sound intimidating, but most routers simplify the process through user-friendly interfaces. Users typically access their router’s settings, locate the IP Passthrough option, and enable it. For those unfamiliar with the setup, you may be able to reach out to the ISP’s customer support to receive assistance.

If you’re searching for instructions on setting up IP Passthrough on your cellular router, look no further than our YouTube videos below. These cover Digi, Inseego, Peplink, and Sierra Wireless devices.

Digi
Inseego
Peplink
Sierra Wireless

What is SpeedFusion Connect Relay from Peplink?

If you have a WAN connection at your home that you wish you could use while you’re traveling, then Peplink’s SpeedFusion Connect Relay is the solution. As long as your hardware is running firmware 8.2 or higher, this allows you to connect your mobile Peplink router to your home Peplink router and use its Internet connection to connect to the Internet. This essentially makes it look like you’re at home rather than connected through the mobile network or VPN connection you’re using. So, it might allow you to connect to things like streaming services more easily.

To learn how to set this up on your own, check out our video at YouTube. You may also follow the steps below. 

Configuring the Relay Server

Start by connecting to and logging into your home router. This will act as the Relay server in the connection. We’ll be using a Peplink MAX BR1 Mini in our example. 

Navigate to the SpeedFusion Connect tab. Click on setup relay mode. A new screen should appear. Click where it says cloud location and select the location closest to your home. 

When done, click on the green checkmark to the right, followed by the apply changes button at the top right. 

Once applied, your SpeedFusion connect name will appear with a relay sharing code to the right. Copy this and then apply the changes before moving on. 

Configuring the Relay Client

Now that we have configured the server connection, we’re going to log into the client router. In this case we will be using a Peplink Balance 20X.

Navigate to the SpeedFusion Connect tab. Select choose cloud location and a new screen will appear. Refer to cloud location here and click where you see the blank field. A drop down should appear. Select home sharing and then paste in the code you copied from the server router. Click the green checkmark to the right, followed by apply changes at the top right. 

Navigate back to the Dashboard to check the status of the changes. Once applied, we will see the SpeedFusion connection appear. Wait while it cycles through the connection process. After a moment, it should say established

Routing All Traffic Over the SpeedFusion Relay

At this time, we need to configure the client router to send all traffic over our newly connected Speed Fusion relay. Navigate to the network tab, although for some Peplink routers, this will be under the advanced tab. Select Outbound Policy on the left. Click on Add rule here. 

Give the custom rule a unique name such as SpeedFusion Relay. Confirm the enable checkbox is checked. Source and Destination should be set to Any. Set the algorithm to priority and then drag and drop your SpeedFusion connection into the WAN list. It should be positioned at the top of the list so that all traffic routes over this connection first. If this fails for some reason, it will fail over to the WAN connection or connections you have in place. 

Leave the remaining settings as is. Click save, then apply changes. We’ll then go back to the Dashboard page again to confirm changes are applied and our SpeedFusion is still established. 

Checking the Connection

We can also check the connection at the server router and then verify our configuration is working. Once logged back into the server router, first verify the Speed Fusion connection shows it is established here with 1 out of 1 relay clients. Note that additional client connections can be purchased if needed. 

At the client router’s web admin page, navigate to the status tab and click on client list. This is where we can confirm the IP address our computer is receiving from the router’s private network. Now that we’ve noted this, we’ll go to active sessions on the left. Click on the search tab at the top of this page and then scroll through the outbound sessions list. This is where it tells us which Internet or WAN service our computer is connecting to the Internet over. As we can see here, it shows our SpeedFusion relay connection, which confirms our configuration is working correctly. 

If you have more questions, or you’re interested in purchasing additional relay connections, contact our team by phone, email, or chat!

Adding Firewall Rules to Secure Your Peplink

Firewalls establish a security barrier between your devices and the Internet by using rules to allow or deny access in and out of your network. 

In the case of our Peplink routers, the firewall configuration may differ from other routers, but the result is always the same. 

You may want your network locked down from any incoming connections and only allow your personal devices access out to the Internet. Or you might have devices on your network separated in different VLANs. Should you need to allow communication with one of these devices, but deny other connections, set up an Internal network rule to accomplish this. 

For more information, check out our Peplink firewall demo video on YouTube. Have questions? Just reach out to your friends at 5Gstore today!