Grandstream Gwn Router Configuration File Tool User Guide

GWN Router Configuration File Tool

Product Information

ProductRouter Configuration File Tool
ManufacturerGrandstream Networks Inc.
Version1.1.1
Date2023/6/23

Product Usage Instructions

Process of Modifying Configuration File

  1. Export the configuration file from the web of the device.
  2. Use this tool to decrypt the configuration file.
  3. Modify the decrypted configuration file.
  4. Use this tool to encrypt and generate a new configuration
    file.
  5. Import the new configuration file to the device.

Usage in Linux

Decryption

Command:

./gscfgtool -t TYPE -f INTPUT-FILE -d TYPE:

Type:

Router product model: GWN7062, GWN7052, GWN7052F, GWN7001,
GWN7002, GWN7003.

INTPUT-FILE:

Exported configuration file.

Example of successful decryption in Linux:

Example of successful decryption in Linux

Usage in Windows

Decryption

Command:

./gscfgtool -t TYPE -f INTPUT-FILE -d TYPE:

Type:

Router product model: GWN7062, GWN7052, GWN7052F, GWN7001,
GWN7002, GWN7003.

INTPUT-FILE:

Exported configuration file.

Example of successful decryption in
Windows:

Example of successful decryption in Windows

Grandstream Networks Inc.
Router Configuration File Tool User Guide
Version: 1.1.1 Date: 2023/6/23

Table of Contents
PROCESS OF MODIFYING CONFIGURATION FILE ……………………………………………. 4 USAGE IN LINUX …………………………………………………………………………………………….. 5
Decryption ………………………………………………………………………………………………………………………………. 5 Command ……………………………………………………………………………………………………………………………. 5 Note ……………………………………………………………………………………………………………………………………. 6
Encryption……………………………………………………………………………………………………………………………….. 6 Command ……………………………………………………………………………………………………………………………. 6 Note ……………………………………………………………………………………………………………………………………. 9
USAGE IN WINDOWS …………………………………………………………………………………….. 10
Decryption …………………………………………………………………………………………………………………………….. 10 Command ………………………………………………………………………………………………………………………….. 10 Note ………………………………………………………………………………………………………………………………….. 11
Encryption……………………………………………………………………………………………………………………………… 11 Command ………………………………………………………………………………………………………………………….. 11 Note ………………………………………………………………………………………………………………………………….. 13
Page | 2

Table of Figures
Figure 1 : Example of successful decryption in Linux ……………………………………………………………………….. 5 Figure 2 : Example of decryption failure in Linux (using wrong type) ………………………………………………….. 6 Figure 3 : Example of successful encryption in Linux ……………………………………………………………………….. 8 Figure 4 : Example of encryption failure in Linux (missing “www/” directory) ……………………………………….. 8 Figure 5 : Example of successful decryption in Windows ………………………………………………………………… 10 Figure 6 : Example of decryption failure in Windows(using wrong type) ……………………………………………. 11 Figure 7 : Example of successful encryption in Windows………………………………………………………………… 12 Figure 8 : Example of encryption failure in Windows(missing “www/” directory) …………………………………. 13
Table of Tables
Page | 3

PROCESS OF MODIFYING CONFIGURATION FILE
1Export the configuration file from the web of the device; 2Use this tool to decrypt the configuration file; 3Modify the decrypted configuration file; 4Use this tool to encrypt and generate a new configuration file; 5Import the new configuration file to the device.
Page | 4

USAGE IN LINUX
Decryption
Command
./gscfgtool -t TYPE -f INTPUT-FILE -d TYPE:
Router product model: GWN7062, GWN7052, GWN7052F, GWN7001, GWN7002, GWN7003. INTPUT-FILE:
Exported configuration file.

Figure 1: Example of successful decryption in Linux

Page | 5

Figure 2: Example of decryption failure in Linux (using wrong type)
Note
1The decrypted configuration file will be stored in the program running directory, see “data/”, “etc/config/”, “www/”, “tmp/”.
Encryption
Command
./gscfgtool -t TYPE -f INTPUT-FILE -e TYPE:
Router product model: GWN7062, GWN7052, GWN7052F, GWN7001, GWN7002, GWN7003. OUTPUT-FILE:
New configuration file.
Page | 6

Page | 7

Figure 3: Example of successful encryption in Linux

Figure 4: Example of encryption failure in Linux (missing “www/” directory)

Page | 8

Note
1The program running directory needs four directories “data/”, “etc/config/”, “www/” and “tmp/” to generate configuration file.
Page | 9

USAGE IN WINDOWS
Decryption
Command
gscfgtool.exe -t TYPE -f INTPUT-FILE -d TYPE:
Router product model: GWN7062, GWN7052, GWN7052F, GWN7001, GWN7002, GWN7003. INTPUT-FILE:
Exported configuration file.
Figure 5: Example of successful decryption in Windows
P a g e | 10

Figure 6: Example of decryption failure in Windows(using wrong type)
Note
1The decrypted configuration file will be stored in the program running directory, see “data/”, “etc/config/”, “www/”, “tmp/”;
2″gscfgtool.exe” depends on “7z.exe” and “7z.dll”, which we have provided. If the “7z.exe” we provided doesn’t work properly or you want a newer version, you can download it from “https://www.7zip.org/”;
3Note that “7z.exe” and “7z.dll” must be in the same directory as “gscfgtool.exe” or in any directory specified by the environment variable “PATH”.
Encryption
Command
gscfgtool.exe -t TYPE -f OUTPUT-FILE -e TYPE:
Router product model: GWN7062, GWN7052, GWN7052F, GWN7001, GWN7002, GWN7003. OUTPUT-FILE:
New configuration file.
P a g e | 11

Figure 7: Example of successful encryption in Windows
P a g e | 12

Figure 8: Example of encryption failure in Windows(missing “www/” directory)
Note
1The program running directory needs four directories “data/”, “etc/config/”, “www/” and “tmp/” to generate configuration file;
2″gscfgtool.exe” depends on “7z.exe” and “7z.dll”, which we have provided. If the “7z.exe” we provided doesn’t work properly or you want a newer version, you can download it from “https://www.7zip.org/”;
3Note that “7z.exe” and “7z.dll” must be in the same directory as “gscfgtool.exe” or in any directory specified by the environment variable “PATH”.
P a g e | 13

Documents / Resouces

Download manual
Here you can download full pdf version of manual, it may contain additional safety instructions, warranty information, FCC rules, etc.


Related Manuals