The TI proxy can be used to enable secure communication between card terminals and TI connectors of the telematics infrastructure. The proxy forwards the terminal's data traffic via a WireGuard tunnel to a cloud gateway that manages access to the telematics infrastructure.
TI Proxy Wizard
TI Proxy Wizard
Step 1 - Import configuration
Step 1 Import configuration
Caption
Value
Description
TI Proxy Wizard UTMuser@firewall.name.fqdnApplicationsTI Proxy Step 1 - Import configuration
Files:
Browse... No files selected.
If available, configuration files can be uploaded here
Public IP address under which the WG tunnel for the connector is received
Endpoint Port:
60010
The corresponding port
Open Key:
Enter key value directlyCalculate from private key value Select from keys
Public key of the peer
Pre-Shared Key:
Pre-shared key to further secure the connection
Keepalive:
On25 Seconds
Sends a signal regularly. This keeps connections on NAT routers open.
Step 4 - TI Proxy
Step 4 TI Proxy
Connector IP:
10.180.96.90/---
IP address of the connector that enables the connection to the telematics infrastructure
usually a private IP address from a VPN
Step 4 - TI Proxy
Incoming IP:
10.0.2.1/---
IP address of the WG interface
Step 5 - Advanced Settings
Step 5 Advanced Settings
Create routes to the peer's networks:
Yes
Routes are created to the networks/hosts that were entered in step 3 under ‘'Enable peer networks’', with the interface that was displayed in step 2 as the gateway.
IP address of the card terminal in the internal network
Card terminal port:
4742
Port of the card terminal via which communication takes place
Incoming and outgoing port:
60000
Port on which the UTM receives the data packets
Configuration with the button Save and close
If a connection to the card terminal could be established, the name is displayed
If the error message Error: failed to restart ctproxy appears, this means that the proxy cannot reach the connector
Several card terminals can be added, these can also be located in different local networks notempty
New as of v14.0.9
TI-Proxy UTMuser@firewall.name.fqdnApplications
Status der impliziten Regelnotempty
New as of v14.0.8.2
Eine implizite Redirect-Regel ist aktiviert. Durch die Aktivierung der impliziten Regeln werden TCP Verbindungen des Konnektors zu den Kartenterminals per DESTNAT weitergeleitet. Dadurch ist ein Update der Kartenterminals aus dem Konnektor heraus möglich.
Die implizite Regel ist deaktiviert. Ein Update der Kartenterminals aus dem Konnektor heraus ist nicht möglich.