User Guide for GRANDSTREAM models including: GWN Router Configuration File Tool, Router Configuration File Tool, Configuration File Tool, File Tool

DocTeam

"Mohamed Boujadi"

User Guide

Tools- Grandstream Networks

Inc. - Router Configuration File Tool User Guide Version

23 juin 2023 — P a g e | 11. Figure 6: Example of decryption failure in Windows(using wrong type). Note. 1.The decrypted configuration file will be stored in the program ...


File Info : application/pdf, 13 Pages, 569.85KB

PDF preview unavailable. Download the PDF instead.

GWN Router Configuration File Tool User Guide
Grandstream Networks Inc.
Router Configuration File Tool User Guide
Version: 1.1.1 Date: 2023/6/23

Table of Contents
PROCESS OF MODIFYING CONFIGURATION FILE .................................................... 4 USAGE IN LINUX ........................................................................................................... 5
Decryption ................................................................................................................................................. 5 Command .............................................................................................................................................. 5 Note ....................................................................................................................................................... 6
Encryption.................................................................................................................................................. 6 Command .............................................................................................................................................. 6 Note ....................................................................................................................................................... 9
USAGE IN WINDOWS .................................................................................................. 10
Decryption ............................................................................................................................................... 10 Command ............................................................................................................................................ 10 Note ..................................................................................................................................................... 11
Encryption................................................................................................................................................ 11 Command ............................................................................................................................................ 11 Note ..................................................................................................................................................... 13
Page | 2

Table of Figures
Figure 1 : Example of successful decryption in Linux ................................................................................... 5 Figure 2 : Example of decryption failure in Linux (using wrong type) ........................................................... 6 Figure 3 : Example of successful encryption in Linux ................................................................................... 8 Figure 4 : Example of encryption failure in Linux (missing "www/" directory) ............................................... 8 Figure 5 : Example of successful decryption in Windows ........................................................................... 10 Figure 6 : Example of decryption failure in Windows(using wrong type) .................................................... 11 Figure 7 : Example of successful encryption in Windows........................................................................... 12 Figure 8 : Example of encryption failure in Windows(missing "www/" directory) ........................................ 13
Table of Tables
Page | 3

PROCESS OF MODIFYING CONFIGURATION FILE
1Export the configuration file from the web of the device; 2Use this tool to decrypt the configuration file; 3Modify the decrypted configuration file; 4Use this tool to encrypt and generate a new configuration file; 5Import the new configuration file to the device.
Page | 4

USAGE IN LINUX
Decryption
Command
./gscfgtool -t TYPE -f INTPUT-FILE -d TYPE:
Router product model: GWN7062, GWN7052, GWN7052F, GWN7001, GWN7002, GWN7003. INTPUT-FILE:
Exported configuration file.

Figure 1: Example of successful decryption in Linux

Page | 5

Figure 2: Example of decryption failure in Linux (using wrong type)
Note
1The decrypted configuration file will be stored in the program running directory, see "data/", "etc/config/", "www/", "tmp/".
Encryption
Command
./gscfgtool -t TYPE -f INTPUT-FILE -e TYPE:
Router product model: GWN7062, GWN7052, GWN7052F, GWN7001, GWN7002, GWN7003. OUTPUT-FILE:
New configuration file.
Page | 6

Page | 7

Figure 3: Example of successful encryption in Linux

Figure 4: Example of encryption failure in Linux (missing "www/" directory)

Page | 8

Note
1The program running directory needs four directories "data/", "etc/config/", "www/" and "tmp/" to generate configuration file.
Page | 9

USAGE IN WINDOWS
Decryption
Command
gscfgtool.exe -t TYPE -f INTPUT-FILE -d TYPE:
Router product model: GWN7062, GWN7052, GWN7052F, GWN7001, GWN7002, GWN7003. INTPUT-FILE:
Exported configuration file.
Figure 5: Example of successful decryption in Windows
P a g e | 10

Figure 6: Example of decryption failure in Windows(using wrong type)
Note
1The decrypted configuration file will be stored in the program running directory, see "data/", "etc/config/", "www/", "tmp/";
2"gscfgtool.exe" depends on "7z.exe" and "7z.dll", which we have provided. If the "7z.exe" we provided doesn't work properly or you want a newer version, you can download it from "https://www.7zip.org/";
3Note that "7z.exe" and "7z.dll" must be in the same directory as "gscfgtool.exe" or in any directory specified by the environment variable "PATH".
Encryption
Command
gscfgtool.exe -t TYPE -f OUTPUT-FILE -e TYPE:
Router product model: GWN7062, GWN7052, GWN7052F, GWN7001, GWN7002, GWN7003. OUTPUT-FILE:
New configuration file.
P a g e | 11

Figure 7: Example of successful encryption in Windows
P a g e | 12

Figure 8: Example of encryption failure in Windows(missing "www/" directory)
Note
1The program running directory needs four directories "data/", "etc/config/", "www/" and "tmp/" to generate configuration file;
2"gscfgtool.exe" depends on "7z.exe" and "7z.dll", which we have provided. If the "7z.exe" we provided doesn't work properly or you want a newer version, you can download it from "https://www.7zip.org/";
3Note that "7z.exe" and "7z.dll" must be in the same directory as "gscfgtool.exe" or in any directory specified by the environment variable "PATH".
P a g e | 13



References

Microsoft Word for Microsoft 365