0% found this document useful (0 votes)
38 views13 pages

GWN Router Configuration File Tool User Guide v1.1.1

guide configuration access point grandstream

Uploaded by

Yves Douman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views13 pages

GWN Router Configuration File Tool User Guide v1.1.1

guide configuration access point grandstream

Uploaded by

Yves Douman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Grandstream Networks, Inc.

Router Configuration File Tool


User Guide

Version: 1.1.1
Date: 2023/6/23
Table of Contents

PROCESS OF MODIFYING CONFIGURATION FILE .................................................... 4

USAGE IN LINUX ........................................................................................................... 5


Decryption ................................................................................................................................................. 5
Command .............................................................................................................................................. 5
Note ....................................................................................................................................................... 6
Encryption .................................................................................................................................................. 6
Command .............................................................................................................................................. 6
Note ....................................................................................................................................................... 9

USAGE IN WINDOWS .................................................................................................. 10


Decryption ............................................................................................................................................... 10
Command ............................................................................................................................................ 10
Note ..................................................................................................................................................... 11
Encryption ................................................................................................................................................ 11
Command ............................................................................................................................................ 11
Note ..................................................................................................................................................... 13

Page | 2
Table of Figures

Figure 1 : Example of successful decryption in Linux ................................................................................... 5


Figure 2 : Example of decryption failure in Linux (using wrong type) ........................................................... 6
Figure 3 : Example of successful encryption in Linux ................................................................................... 8
Figure 4 : Example of encryption failure in Linux (missing "www/" directory) ............................................... 8
Figure 5 : Example of successful decryption in Windows ........................................................................... 10
Figure 6 : Example of decryption failure in Windows(using wrong type) .................................................... 11
Figure 7 : Example of successful encryption in Windows ........................................................................... 12
Figure 8 : Example of encryption failure in Windows(missing "www/" directory) ........................................ 13

Table of Tables

Page | 3
PROCESS OF MODIFYING CONFIGURATION FILE
1.Export the configuration file from the web of the device;
2.Use this tool to decrypt the configuration file;
3.Modify the decrypted configuration file;
4.Use this tool to encrypt and generate a new configuration file;
5.Import the new configuration file to the device.

Page | 4
USAGE IN LINUX

Decryption

Command

./gscfgtool -t TYPE -f INTPUT-FILE -d

TYPE:
Router product model: GWN7062, GWN7052, GWN7052F, GWN7001, GWN7002, GWN7003.

INTPUT-FILE:
Exported configuration file.

Figure 1: Example of successful decryption in Linux

Page | 5
Figure 2: Example of decryption failure in Linux (using wrong type)

Note

1.The decrypted configuration file will be stored in the program running directory, see "data/",
"etc/config/", "www/", "tmp/".

Encryption

Command

./gscfgtool -t TYPE -f INTPUT-FILE -e

TYPE:
Router product model: GWN7062, GWN7052, GWN7052F, GWN7001, GWN7002, GWN7003.

OUTPUT-FILE:
New configuration file.

Page | 6
Page | 7
Figure 3: Example of successful encryption in Linux

Figure 4: Example of encryption failure in Linux (missing "www/" directory)

Page | 8
Note

1.The program running directory needs four directories "data/", "etc/config/", "www/" and "tmp/" to
generate configuration file.

Page | 9
USAGE IN WINDOWS

Decryption

Command

[Link] -t TYPE -f INTPUT-FILE -d

TYPE:
Router product model: GWN7062, GWN7052, GWN7052F, GWN7001, GWN7002, GWN7003.

INTPUT-FILE:
Exported configuration file.

Figure 5: Example of successful decryption in Windows

P a g e | 10
Figure 6: Example of decryption failure in Windows(using wrong type)

Note

1.The decrypted configuration file will be stored in the program running directory, see "data/",
"etc/config/", "www/", "tmp/";
2."[Link]" depends on "[Link]" and "[Link]", which we have provided. If the "[Link]" we
provided doesn't work properly or you want a newer version, you can download it from "[Link]
[Link]/";
3.Note that "[Link]" and "[Link]" must be in the same directory as "[Link]" or in any directory
specified by the environment variable "PATH".

Encryption

Command

[Link] -t TYPE -f OUTPUT-FILE -e

TYPE:
Router product model: GWN7062, GWN7052, GWN7052F, GWN7001, GWN7002, GWN7003.

OUTPUT-FILE:
New configuration file.

P a g e | 11
Figure 7: Example of successful encryption in Windows

P a g e | 12
Figure 8: Example of encryption failure in Windows(missing "www/" directory)

Note

1.The program running directory needs four directories "data/", "etc/config/", "www/" and "tmp/" to
generate configuration file;
2."[Link]" depends on "[Link]" and "[Link]", which we have provided. If the "[Link]" we
provided doesn't work properly or you want a newer version, you can download it from "[Link]
[Link]/";
3.Note that "[Link]" and "[Link]" must be in the same directory as "[Link]" or in any directory
specified by the environment variable "PATH".

P a g e | 13

You might also like