Grandstream Networks, Inc.
Router Configuration File Tool
User Guide
Version: 1.1.1
Date: 2023/6/23
Table of Contents
PROCESS OF MODIFYING CONFIGURATION FILE .................................................... 4
USAGE IN LINUX ........................................................................................................... 5
Decryption ................................................................................................................................................. 5
Command .............................................................................................................................................. 5
Note ....................................................................................................................................................... 6
Encryption .................................................................................................................................................. 6
Command .............................................................................................................................................. 6
Note ....................................................................................................................................................... 9
USAGE IN WINDOWS .................................................................................................. 10
Decryption ............................................................................................................................................... 10
Command ............................................................................................................................................ 10
Note ..................................................................................................................................................... 11
Encryption ................................................................................................................................................ 11
Command ............................................................................................................................................ 11
Note ..................................................................................................................................................... 13
Page | 2
Table of Figures
Figure 1 : Example of successful decryption in Linux ................................................................................... 5
Figure 2 : Example of decryption failure in Linux (using wrong type) ........................................................... 6
Figure 3 : Example of successful encryption in Linux ................................................................................... 8
Figure 4 : Example of encryption failure in Linux (missing "www/" directory) ............................................... 8
Figure 5 : Example of successful decryption in Windows ........................................................................... 10
Figure 6 : Example of decryption failure in Windows(using wrong type) .................................................... 11
Figure 7 : Example of successful encryption in Windows ........................................................................... 12
Figure 8 : Example of encryption failure in Windows(missing "www/" directory) ........................................ 13
Table of Tables
Page | 3
PROCESS OF MODIFYING CONFIGURATION FILE
1.Export the configuration file from the web of the device;
2.Use this tool to decrypt the configuration file;
3.Modify the decrypted configuration file;
4.Use this tool to encrypt and generate a new configuration file;
5.Import the new configuration file to the device.
Page | 4
USAGE IN LINUX
Decryption
Command
./gscfgtool -t TYPE -f INTPUT-FILE -d
TYPE:
Router product model: GWN7062, GWN7052, GWN7052F, GWN7001, GWN7002, GWN7003.
INTPUT-FILE:
Exported configuration file.
Figure 1: Example of successful decryption in Linux
Page | 5
Figure 2: Example of decryption failure in Linux (using wrong type)
Note
1.The decrypted configuration file will be stored in the program running directory, see "data/",
"etc/config/", "www/", "tmp/".
Encryption
Command
./gscfgtool -t TYPE -f INTPUT-FILE -e
TYPE:
Router product model: GWN7062, GWN7052, GWN7052F, GWN7001, GWN7002, GWN7003.
OUTPUT-FILE:
New configuration file.
Page | 6
Page | 7
Figure 3: Example of successful encryption in Linux
Figure 4: Example of encryption failure in Linux (missing "www/" directory)
Page | 8
Note
1.The program running directory needs four directories "data/", "etc/config/", "www/" and "tmp/" to
generate configuration file.
Page | 9
USAGE IN WINDOWS
Decryption
Command
[Link] -t TYPE -f INTPUT-FILE -d
TYPE:
Router product model: GWN7062, GWN7052, GWN7052F, GWN7001, GWN7002, GWN7003.
INTPUT-FILE:
Exported configuration file.
Figure 5: Example of successful decryption in Windows
P a g e | 10
Figure 6: Example of decryption failure in Windows(using wrong type)
Note
1.The decrypted configuration file will be stored in the program running directory, see "data/",
"etc/config/", "www/", "tmp/";
2."[Link]" depends on "[Link]" and "[Link]", which we have provided. If the "[Link]" we
provided doesn't work properly or you want a newer version, you can download it from "[Link]
[Link]/";
3.Note that "[Link]" and "[Link]" must be in the same directory as "[Link]" or in any directory
specified by the environment variable "PATH".
Encryption
Command
[Link] -t TYPE -f OUTPUT-FILE -e
TYPE:
Router product model: GWN7062, GWN7052, GWN7052F, GWN7001, GWN7002, GWN7003.
OUTPUT-FILE:
New configuration file.
P a g e | 11
Figure 7: Example of successful encryption in Windows
P a g e | 12
Figure 8: Example of encryption failure in Windows(missing "www/" directory)
Note
1.The program running directory needs four directories "data/", "etc/config/", "www/" and "tmp/" to
generate configuration file;
2."[Link]" depends on "[Link]" and "[Link]", which we have provided. If the "[Link]" we
provided doesn't work properly or you want a newer version, you can download it from "[Link]
[Link]/";
3.Note that "[Link]" and "[Link]" must be in the same directory as "[Link]" or in any directory
specified by the environment variable "PATH".
P a g e | 13