Green Packet Berhad OX250-GP Outdoor WiMAX CPE User Manual 0 5
Green Packet Berhad, Taiwan Outdoor WiMAX CPE 0 5
User Manual
User Manual OX-250 WiMAX Outdoor CPE Version 0.5 Nov. 8 , 2010 This Document may be subject to change, please contact with us for the latest version. Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures: Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. IMPORTANT NOTE: FCC Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 50cm between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. Due to the essential high output power natural of WiMAX device, use of this device with other transmitter at the same time may exceed the FCC RF exposure limit and such usage must be prohibited (unless such co-transmission has been approved by FCC in the future). History Revision Date of Issue Scope Author 0.1 2010-10-14 First draft IChia Lin. 0.2 2010-10-18 Add specification IChia Lin Change min.30cm distance to 35cm,add install and ground guide IChia Lin 0.3 2010/1 0/26 0.4 2010/11/4 Update figure 70 IChia Lin 0.5 2010/11/8 Change min.35cm distance to 50cm IChia Lin Table of Contents History ...................................................................................................................................... 3 Table of Contents..................................................................................................................... 4 List of Figures .......................................................................................................................... 6 List of Tables............................................................................................................................ 9 1. Introduction ...................................................................................................................11 1.1. 1.2. 1.3. 1.4. 1.5. 2. Connect..............................................................................................................11 Logout............................................................................................................... 12 Status ................................................................................................................ 13 Device Status.................................................................................................... 13 Setup Wizard .................................................................................................... 15 Network......................................................................................................................... 20 2.1. LAN.................................................................................................................... 20 2.1.1. IP........................................................................................................... 20 2.1.2. DHCP.................................................................................................... 21 2.2. WAN................................................................................................................... 23 2.2.1. WAN...................................................................................................... 24 2.2.2. DNS ...................................................................................................... 26 2.3. VLAN ................................................................................................................. 28 2.4. DDNS................................................................................................................. 29 3. Advanced Setting......................................................................................................... 32 3.1. NAT .................................................................................................................... 32 3.1.1. Port Forward........................................................................................ 32 3.1.2. Port Trigger.......................................................................................... 34 3.1.3. DMZ ...................................................................................................... 36 3.1.4. ALG ...................................................................................................... 37 3.2. Firewall.............................................................................................................. 38 3.2.1. IP Filter ................................................................................................. 38 3.2.2. DOS ...................................................................................................... 40 3.3. Route ................................................................................................................. 41 3.3.1. Static Route ......................................................................................... 41 3.3.2. RIP ........................................................................................................ 43 3.4. UPnP.................................................................................................................. 46 3.4.1. UPnP Setting ....................................................................................... 46 3.5. IGMP Proxy....................................................................................................... 47 3.5.1. IGMP Proxy Setting............................................................................. 47 3.5.2. VPN Setting ......................................................................................... 48 3.6. PPTP.................................................................................................................. 48 3.6.1. PPTP Server ........................................................................................ 48 3.6.2. PPTP Client.......................................................................................... 51 3.6.3. L2TP ..................................................................................................... 53 3.6.4. L2TP Server ......................................................................................... 53 3.6.5. L2TP Client .......................................................................................... 57 3.7. IPSec ................................................................................................................. 59 3.7.1. Connection .......................................................................................... 59 4. WiMAX........................................................................................................................... 64 4.1. Profile ................................................................................................................ 64 4.1.1. Connect Settings ................................................................................ 65 Frequency Settings............................................................................. 67 4.1.2. 4.1.3. Authentication Settings ..................................................................... 69 4.2. Connect............................................................................................................. 72 4.3. Wide Scan......................................................................................................... 73 4.4. Link Status........................................................................................................ 74 4.5. Link Statistics................................................................................................... 75 4.6. Connection Info................................................................................................ 76 4.7. Service Flow ..................................................................................................... 76 5. Administrator ............................................................................................................... 77 5.1. Remote Control ................................................................................................ 77 5.1.1. HTTP..................................................................................................... 78 5.1.2. TELNET ................................................................................................ 79 5.1.3. SSH....................................................................................................... 80 5.1.4. SNMP.................................................................................................... 81 5.1.5. TR-069 .................................................................................................. 82 5.1.6. OMA-DM............................................................................................... 84 5.2. Password .......................................................................................................... 86 6. System .......................................................................................................................... 88 6.1. Date and Time .................................................................................................. 88 6.1.1. Date ...................................................................................................... 89 6.1.2. Time Zone ............................................................................................ 89 6.2. Upgrade Firmware ........................................................................................... 90 6.2.1. Upgrade File ........................................................................................ 90 6.2.2. Upgrade Link ....................................................................................... 91 6.3. Log..................................................................................................................... 92 6.4. Backup/Restore................................................................................................ 92 6.4.1. Configuration Backup ........................................................................ 92 6.4.2. Configuration Restore........................................................................ 94 6.4.3. Factory Defaults.................................................................................. 95 7. Installing and grounding device................................................................................. 97 Specification ........................................................................................................................ 100 List of Figures Figure 1 Login page....................................................................................................... 12 Figure 2 Logout.............................................................................................................. 12 Figure 3 Status window ................................................................................................. 13 Figure 4 Device status................................................................................................... 14 Figure 5 Setup Wizard ................................................................................................... 15 Figure 6 Wizard LAN Settings in Setup Wizard .......................................................... 16 Figure 7 WiMAX Frequency Settings By List in Setup Wizard.................................. 17 Figure 8 WiMAX Frequency Settings By Range in Setup Wizard ............................. 17 Figure 9 WiMAX Authentication Settings in Setup Wizard ........................................ 18 Figure 10 Wizard Save..................................................................................................... 19 Figure 11 Network Topology........................................................................................... 20 Figure 12 Network>LAN>IP............................................................................................. 20 Figure 13 Network>LAN>DHCP...................................................................................... 22 Figure 14 Network>WAN>WAN....................................................................................... 24 Figure 15 Network>WAN>DNS ....................................................................................... 26 Figure 16 Network>VLAN................................................................................................ 28 Figure 17 Network>DDNS ............................................................................................... 30 Figure 18 Advanced>NAT>Port Forward....................................................................... 33 Figure 19 Advanced>NAT>Port Trigger......................................................................... 34 Figure 20 Advanced>NAT>DMZ...................................................................................... 36 Figure 21 Advanced>NAT>ALG...................................................................................... 37 Figure 22 Advanced>Firewall>IP Filter.......................................................................... 38 Figure 23 Advanced>Firewall>DDOS............................................................................. 40 Figure 24 Advanced>Route>Static Route ..................................................................... 41 Figure 25 Advanced>Route>Static Route>Add ............................................................ 41 Figure 26 Advanced>Route>RIP .................................................................................... 43 Figure 27 Advanced UPnP .............................................................................................. 46 Figure 28 Advanced>IGMP Proxy .................................................................................. 47 Figure 29 VPN>PPTP>Server.......................................................................................... 49 Figure 30 VPN>PPTP>Client........................................................................................... 51 Figure 31 VPN>PPTP>Client>Add.................................................................................. 51 Figure 32 VPN>L2TP>Server .......................................................................................... 54 Figure 33 VPN>L2TP>Client ........................................................................................... 57 Figure 34 VPN>L2TP>Client>Add .................................................................................. 57 Figure 35 VPN>IPsec Overview ...................................................................................... 59 Figure 36 VPN>IPsec>Add.............................................................................................. 60 Figure 37 Wireless Broadband Access.......................................................................... 64 Figure 38 WiMAX>ProfiIe>Connect Settings ................................................................ 65 Figure 39 WiMAX>Profile>Frequency Settings>By List .............................................. 67 Figure 40 WiMAX>Profile>Frequency Settings>By Range.......................................... 68 Figure 41 WiMAX>ProfiIe>Authenticaton Settings (No Authentication) .................... 69 Figure 42 WiMAX>ProfiIe>Authenticaton Settings (User Authentication)................. 70 Figure 43 WiMAX>Connect>Connect ............................................................................ 72 Figure 44 WiMAX>Wide Scan ......................................................................................... 73 Figure 45 WiMAX>link Status ......................................................................................... 74 Figure 46 WiMAX Link Statistics .................................................................................... 75 Figure 47 WiMAX Connection Info ................................................................................. 76 Figure 48 WiMAX Service Flow ...................................................................................... 76 Figure 49 Administration>Remote Control>HTTP........................................................ 78 Figure 50 Administration>Remote Control>Telnet....................................................... 79 Figure 51 Administration>Remote Control>SSH.......................................................... 80 Figure 52 Administration>Remote Control>SNMP....................................................... 81 Figure 53 Administration>Remote Control>TR-069 ..................................................... 82 Figure 54 Administration>Remote Control>OMA-DM.................................................. 84 Figure 55 Administrator>Password ............................................................................... 86 Figure 56 System>Date/Time>Date................................................................................ 88 Figure 57 System>Date/Time>Time Zone...................................................................... 89 Figure 58 System>Upgrade Firmware>Upgrade File ................................................... 90 Figure 59 System>Upgrade Firmware>Upgrade Link .................................................. 91 Figure 60 System Log...................................................................................................... 92 Figure 61 System>Backup/Restore>Backup ................................................................ 92 Figure 62 File Download.................................................................................................. 93 Figure 63 Save File As..................................................................................................... 93 Figure 64 System>Backup/Restore>Restore................................................................ 94 Figure 65 System>Backup/Restore>Factory Defaults ................................................. 95 Figure 66 Restore to factory reset warning .................................................................. 96 Figure 67 Mounting accessory list....................................................................................... 97 Figure 68 Pole-Mount the Outdoor CPE Device ................................................................. 98 Figure 69 Wall-Mount the Outdoor CPE Device.................................................................. 98 Figure 70 Connect the ground wire ..................................................................................... 99 List of Tables Table 1 Button definition shown on Setup Wizard ................................................... 15 Table 2 Field definition for Network>LAN>IP ............................................................ 21 Table 3 Field definition for Network>LAN>DHCP ..................................................... 23 Table 4 Field definition for Network>WAN>WAN ...................................................... 26 Table 5 Field definition for Network>WAN>DNS....................................................... 27 Table 6 Field definition for Network>VLAN ............................................................... 29 Table 7 Field definition for Network>DDNS............................................................... 31 Table 8 Field definition for Advanced>NAT>Port Forward ...................................... 33 Table 9 Field definition for Advanced>NAT>Port Trigger ........................................ 35 Table 10 Field definition for Advanced> Firewall>IP Filter ........................................ 39 Table 11 Field definition for Advanced> Firewall>DDOS ........................................... 40 Table 12 Field definition for Advanced>Route>Static Route..................................... 42 Table 13 Field definition for Advanced>Route>RIP.................................................... 45 Table 14 Field definition for Advanced> UPnP............................................................ 46 Table 15 Field definition for Advanced>IGMP Proxy.................................................. 47 Table 16 Field definition for VPN>PPTP>Server ......................................................... 51 Table 17 Field definition for VPN>PPTP>Client .......................................................... 52 Table 18 Field definition for VPN>L2TP>Server.......................................................... 56 Table 19 Field definition for VPN>L2TP>Client>Add.................................................. 58 Table 20 Field definition for VPN>IPsec>Add ............................................................. 63 Table 21 Field definition for WiMAX>ProfiIe>Connect Settings................................ 67 Table 22 Field definition for WiMAX>Profile>Frequency Settings>By Range ......... 69 Table 23 Field definition for WiMAX>ProfiIe>Authentication Settings..................... 72 Table 24 Field definition for WiMAX>Connect>Connect............................................ 73 Table 25 Field definition for WiMAX>Wide Scan......................................................... 74 Table 26 Field definition for Administration>Remote Control>HTTP ....................... 78 Table 27 Field definition for Administration>Remote Control>Telnet ...................... 79 Table 28 Field definition for Administration>Remote Control>SSH ......................... 80 Table 29 Field definition for Administration>Remote Control>SNMP ...................... 81 Table 30 Field definition for Administration>Remote Control>TR-069..................... 83 Table 31 Field definition for Administration>Remote Control>OMA-DM ................. 85 Table 32 Field definition for Administrator>Password............................................... 87 Table 33 Field definition for Administrator>Password............................................... 89 Table 34 Field definition for System>Date/Time>Time Zone ..................................... 90 Table 35 Field definition for System>Upgrade Firmware>Upgrade File................... 91 Table 36 Field definition for System>Upgrade Firmware>Upgrade Link ................. 91 Table 37 Field definition for System>Backup/Restore>Backup................................ 94 Table 38 System>Backup/Restore>Restore................................................................ 95 10 1. Introduction The WiMAX Outdoor CPE Software platform comes with a Web-based Configuration Manager, which gives users the ability to manage, configure and analyze the platforms environment. The Connection Manager works with all versions of Windows after Windows 95. The supported browser version: Internet Explorer 6.0 or later (Recommended) Netscape 7.1 and higher Firefox 1.0 and higher Mozilla 1.5 and higher 1.1. Connect Users need to connect to the WiMAX Outdoor CPE platform. It’s assumed that the user has a fully working WiMAX Out door CPE plat form and properly connected. From the web b rowser connect to the device, ent ering the IP address of the device; it will prompt user to e nter the username and password. The default usernames and passwords are as follows. Username/password Operator/o gue perator st/guest 11 Figure 1 Login page 1.2. Logout The “Log out” wind ow allows users to disconnect from the d evice and exit the W eb-based Configuration Manager. Figure 2 Logout 12 1.3. Status After user has established a connection, user will see the “Status” window. This window shows all the st atus and system information. It gives us er an initial overview of the current st atus of the device. Figure 3 Status window 1.4. Device Status The “Device status” wi ndow displ ays firmwa re versi on informatio n of the WiMAX Out door CPE. 13 Figure 4 Device status 14 1.5. Setup Wizard The setup wizard will allow user to quickly configure the basic networking settings on the CPE. Click the “Setup Wizard” menu item to enter the wizard. The first page will display all the steps necessary to complete the wizard settings as shown in Figure 5. Later, click the “Next” button to continue the next steps. The definition of each button shown on web page is defined in the Table 1. Figure 5 Setup Wizard Name Description Next Continue to the next step Back Return to the previous step Save Commit the changes made and save to WiMAX outdoor CPE Table 1 Button definition shown on Setup Wizard 15 Step 1: LAN Settings. In this step user can configure both IP and DHCP configuration parameters as shown in Figure 6. Figure 6 Wizard LAN Settings in Setup Wizard 16 Step2: WiMAX Frequency Settings. This step will qui ckly configure the WiMAX frequencies. There are two types of configuring the frequencies. User can configure it through simply entering a frequ ency in the frequen cy list as shown in Fig ure 7 or by gi ving a st arting and ending frequency value and a step size to traverse the range as shown in Figure 8. Figure 7 Figure 8 WiMAX Frequency Settings By List in Setup Wizard WiMAX Frequency Settings By Range in Setup Wizard 17 Step 3: WiMAX Authen tication Settings. Thi s will config ure WiMAX Auth entication settings. The re a re 4 possible options for “Aut hentication Mode” as No authentication, User authentication, Device au thentication, and Us er an d device aut hentication. Dep ending o n which mode user selects, and it will appear different EAP settings for configuration. Except “No authentication” is selected, user needs to define the EAP supplicant as shown in Figure 9. Figure 9 WiMAX Authentication Settings in Setup Wizard Detailed definition of each item in EAP supplicant is listed below. EAP Mode: WiMAX out door CPE suppor ts EAP-TLS, EAP-TTL S, EAP-SIM, and EAP-AKA. Anonymous ID: User needs to fill the Outer ID at this field. Inner Mode: WiMAX out door CPE sup ports MS-CHAPv2, MS-CHAP, CHAP, MD5, and PAP. Username: User needs to fill username at this field. Password: User needs to fill password at this field. Once the u ser compl etes all the ste ps, user needs to click the “Save” b utton to save th e settings, or click “Ba ck” button to return to previous step as shown in Figure 10. It will reload some services and return to the “Home” window after saving all settings. 18 Figure 10 Wizard Save 19 2. Network Refer to Figure 101, for proper network connection. Figure 11 Network Topology 2.1. LAN 2.1.1. IP From the “Network>LAN>IP” window, user can update the LAN information as shown in Figure 12. The definition for each field is shown on Table 2. Figure 12 Network>LAN>IP 20 Name Description IP Address IP address of the WiMAX outdoor CPE IP Subnet Mask Subnet Mask of the WiMAX outdoor CPE Save Cancel Commits the chan ges m ade, and set the LAN IP information , some services will be reloaded. Reset the fields to the last saved values Table 2 Field definition for Network>LAN>IP 2.1.2. DHCP Use the “Net work>LAN>DHCP” t ab to configure the DHCP serve r inform ation. The defa ult DHCP Server setup is ena bled, and user co uld disable this functi on from setu p as sho wn in Figure 13. When user disables the DHCP server, it requires to set a static IP address on host PC for CPE to configure. Please be noted that without the static IP address set properly on the host PC, user can not open the CPE web page for configuration. When DHCP se rver i s e nabled, user need s to define the IP pool range f or dyn amically assigning the IP address. The advant age of usi ng DHCP server is that the addre sses which are no longer in use will be returned to the IP address pool so that the server can reallocate them to other machines in the network. There are three DNS servers the user can configure to assign an IP address. Static DHCP will assign an IP address on the LAN to a specific device based on its MAC address. The definition for each field is shown on Table 3. 21 Figure 13 Network>LAN>DHCP 22 Name Description If the enable box is ch ecked for D HCP server, the DHCP server Enable will assig n IP addre ss to it s clie nt with the sp ecified IP addre ss range. Start IP Starting IP address range End IP Ending IP address range The lea se time is a cont rolled time p eriod, allo wing the DHCP Lease Time server to reclaim (and then reallocate) IP addresses that are not renewed (dynamic re -use of IP ad dresses). Le ase tim e i s measured in minutes in the Configuration Manager. User can sp ecify three DNS serve r and select how the DNS Server is assigned. There are three options for assigning the DNS server. First DNS Server Second DNS Server Third DNS Server From ISP User Defined Non If user sel ects “None”, then the DH CP server will no t give client s the DNS se rver inform ation. If a ll the three DNS servers setting are set to “Non e”, then the DHCP server will u se the LAN IP address as the DNS server information for the clients. If the user chooses “User Defined” and leaves the IP address as “0.0.0.0” it will change the field to “None”. Add OK Save Cancel Click on the “Add” button to enter a static leased IP address. Enter the MAC address of the Ethernet device and enter the IP address. Click the “OK” button to exit out of edit mode. Commit the changes ma de an d save to WiMAX outdoor CPE, some services will be reloaded. Reset fields to the last saved values. Table 3 Field definition for Network>LAN>DHCP 2.2. WAN The wide area netwo rk i s anothe r network that user can conn ect to the internet with the 23 WiMAX outdoor CPE. 2.2.1. WAN In Figure 14, it demonstrates ho w to co nfigure WAN IP on CPE web p age. The definition for each field is shown on Table 4. Figure 14 Network>WAN>WAN 24 Name Description Select the WAN operation mode Operation Mode Bridge Routin NA Select the WAN encapsulation protocol WAN Protocol Ethernet PPPoE Enter the IP method Get IP Method From Us ISP er The time the DHCP client waits to re ceive the IP address from the BS. If it doesn’t get the IP , it will timeout and the CPE will WAN IP Request Timeout disconnect the WiMAX conne ction. T he default value is 12 seconds. If u ser ente rs 0, it will wait to receive the IP addre ss infinitely until it’s stopped by the user. WAN IP Address WIN IP Subnet Mask Gateway IP Address If user chooses “User” for IP Method, user should enter the WAN IP address If user chooses “User” for IP Method, user should enter the WAN IP subnet mask. If us er chooses “User” for IP Method, use r shou ld enter IP gateway address MTU Enter the MTU Clone MAC Address Enter the clone MAC address to be used by WAN PPPoE Setting User Name The user name to c onnect PPPoE s erver via the selec ted Auth Protocol Password The password of the corresponding username Retype Password Type the “Password” again The a uthentication protocol of t he p eer re quired. S elect which Authentication protocol to use. Auth Protocol P AP CHAP MSCHAPv1 MSCHAPv2 25 Encryption Scheme No Encryption MPPE 40 bits: 40-bit encryption with MPPE MPPE 128 bits: 128-bit encryption with MPPE Auto: automatically selected Idle Timeout Disconnect if the link is idle for the assigned seconds AC Name The name of the access concentrator to connection to Commit the changes ma de and save to WiMAX ou tdoor CPE, Save after clicking the Save button user will get a message aski ng if user want s t o reb oot the CPE. Reb oot is ne cessary for the device to switch to a different profile. Cancel Reset field to the last saved values Table 4 Field definition for Network>WAN>WAN 2.2.2. DNS In Figure 15, it demonstrates how to configure WAN DNS on CPE web page. The definition for each field is shown on Table 5. Figure 15 Network>WAN>DNS 26 Name Description Enter the WAN DNS information. First DNS Server User Defined From ISP If user sele cts “User Define”, u ser n eeds to ente r a valid IP address for the DNS server. Second DNS Server Same as First DNS Server Third DNS Server Same as First DNS Server Save Commit the changes made and save to WiMAX outdoor CPE Cancel Reset fields to the last saved values Table 5 Field definition for Network>WAN>DNS 27 2.3. VLAN In Figure 16, it demonstrates how to configure VLAN setting on CPE web page. The definition for each field is shown on Table 6. Figure 16 Network>VLAN 28 Name Description Management VLAN VLAN ID Setting the management VLAN ID Priority Setting the management Priority Port Settings PVID Group Select the VLAN group as the PVID Priority Setting the port priority VLAN Rule VID Setting the VID of this group Join Add this port into this group Tag Mark the out-going packets of this port i n this VLAN as tagged or untagged Save Commit the changes made and save to the CPE device Cancel Reset fields to the last saved values Table 6 Field definition for Network>VLAN 2.4. DDNS DDNS st ands for Dy namic Dom ain N ame Serv ices. It provides a function to conve rt the domain name to the unique IP address. With DDNS, users is able to find and connect to CPE no matter what IP address CPE is curre ntly using, that is, DDNS can map CP E's dynamic IP address to a st atic hostname. The best profit of this function allows user to access CPE from everywhere. In Figure 17, it demonst rates how to confi gure DDNS on CPE web page. The definition for each field is shown on Table 7. 29 Figure 17 Network>DDNS 30 Name Description Enable Dynamic DNS Click the check box to enable dynamic DNS Service Provider Enter the URL of the Service Provider Enter the service type (DYNDNS only) Service Type* Dynami St atic Cu stom Domain Name Enter the domain name Login Name Enter the username Password Enter the password Select the Policy to be used IP Update Policy Auto WA N IP User User Defined IP Detect Defined If user sele cts “User Defined” as the IP policy, user has to ente r the IP address. Allow hostname to use wildcards such as “* Wildcards* ”. It will allow “*host.dyndns.org” to be aliased to th e sa me IP address a s “host.hyndns.org” MX* Enable mail routing Back MX* Enable Second mail routing MX Host* Host that mail will be routed to Save Commit the changes made and save to WiMAX outdoor CPE Cancel Reset fields to the last saved values Note: * Supported by DYNDNS service provider. Table 7 Field definition for Network>DDNS 31 3. Advanced Setting The “Advanced Settings” window will allow user to set rules for incoming and outgoing traffic. 3.1. NAT Network Add ress Translation (NA T) i s the process of modif ying the net work address information o f the host in a p acket whil e in transit, so that it ca n be rem apped to a given address space in another network. For example, the source address of a packet in a network is changed to a different IP address known within another network. 3.1.1. Port Forward Port forwarding, as the literal meaning, is the act of forwarding the data from WAN side to the particular port of the private IP. This function can allow remote computers to reach a port on a private IP address within a private LAN. In the following, it will introduce how to setup for Port Forward. First, user needs to click the “Add” button and then select which forward type, TCP or UDP or TCP/UDP, is p referred to trig ger the special application as shown in Figure 18. User needs to assign some specific port for the WAN IP to be forwarded to the defined LAN IP and port, and then click the “Save” button to add a Port Forward rule. The definition for each field is shown on Table 8. 32 Figure 18 Advanced>NAT>Port Forward Name Description Activate Check the box to activate the “Port Forward” rule Name Name of the Port Forward rule User ne eds to define the desired Protocol protocol for rul e. A vailable options are: TCP, UDP, or TCP/UDP User nee ds to define inco ming port ra nge for Port Forwardin g Incoming Port(s) rule. User needs to define to which port range will be translated for Port Forward Port(s) Forwarding rule. The p acket will be forwarded to one of these ports if it matches the rule. User ne eds to define whi ch IP address will be translated to if it Server IP matches the Port Forwarding rule. The packet will be forwarded to this IP address if it matches the rule. Trash Delete the Port Forward rule Add Click the “Add” button to create a new Port Forward rule OK Click the “OK” button to exit table edit mode Save Commit the changes made and save to the CPE Cancel Reset field to the last saved values. Table 8 Field definition for Advanced>NAT>Port Forward 33 3.1.2. Port Trigger The “Advanced>NAT>Port Trigger” tab allows user to configure Port Trigger rules. Port Trigger is a way to automate port forwarding in which outbound traffic on predetermined ports (‘trigger port’) causes inboun d traf fic to spe cific incomi ng po rts to be dyn amically forwarde d to the initiating host, while the outbound ports are in use. This allows users behind WiMAX outdoor CPE on the LAN to provide se rvices t hat woul d no rmally re quire the com puter to have IP address on the LAN. Port triggering triggers an open incoming port (‘open port’) when a client on the local network makes an outgoing connection on a predetermined port or range of ports. The definition for each field is shown on Table 9. Figure 19 Advanced>NAT>Port Trigger 34 Name Description Activate Check the box to activate the Port Trigger rule Name Name of the Port Trigger rule It defines which protocol the outgoing packet used will trigger th e Protocol rule. Available options are TCP, UDP or TCP/UDP It defines which port range the outgoing packet will trigger the rule. Trigger Port(s) User needs to enter the starting and ending port range It defines wh ich protocol will be open Open Protocol ed if the rule had bee triggered. Available options are TCP, UDP or TCP/UDP Trash Delete the Port Trigger rule Add Click the “Add” button to enter a Port Trigger rule OK Click the “OK” button to exit, table edit mode. Save Commit the changes made and save to the CPE Cancel Reset fields to the last saved vaules Table 9 Field definition for Advanced>NAT>Port Trigger 35 3.1.3. DMZ DMZ stands for Demilitarized Zone. It is a phy sical or logi cal sub-network that contains and exposes an organization's external services to a larger un-trusted network, usually the Internet. The term is normally referred to as a DMZ by IT professionals. It is sometimes referred to as a Perimeter Ne twork. The p urpose of a DMZ is to add an additio nal layer of se curity to an organization's LAN; an external attacker only has access to equipment in the DMZ, rather than any other part of the network. The “Advanced>NAT>DMZ” tab allows user to configure a DMZ h ost IP address as shown in Figure 20. In DMZ Setting s, user needs to enter the IP address of the DMZ h ost. The “Save” button will save the changes to WiMAX outdoor CPE and the “Cancel” button will reset the field to last saved value. It will disable DMZ host when entering “0.0.0.0”. Figure 20 Advanced>NAT>DMZ 36 3.1.4. ALG There a re th ree AL Gs th at use r can enable from “Advanced>NAT>ALG” t ab. ALG allo ws legitimate ap plication traf fic to p ass throu gh the WiMAX out door CPE that would have otherwise re stricted. Wit hout ALG s, some application may n ot work well beca use of NAT/firewall settings. User could click on the check box to enable ALGs. Note: If user is using any of these types of application protocols user needs to enable them in the ALG settings. FTP ALG H.323 ALG PPTP ALG Enable SIP ALG set BSID Figure 21 Advanced>NAT>ALG 37 3.2. Firewall In networking, firewalls a re used to blo ck un-wanted traffic or prevent fr om DDOS att acks. It will prevent unauthorized devices to enter a trusted network. 3.2.1. IP Filter The IP filter rules will drop or discard traffic that the filter criteria. User can define IP filter rules as shown in Figure 22. The definition for each field is shown on Table 10. Figure 22 Advanced>Firewall>IP Filter 38 Name Description Add Click the "Add" button to create a new IP Filter rule OK Click the "OK" button will exit the table edit mode Active Check the box to activate the IP Filter rule Source IP Source IP to filter on. It can be in one of the following formats: IP address (ex. 192.168.0.222) Subnet (ex. 192.168.1.0/24) IP range (ex. 192.168.0.150~192.168.0.160) 0.0.0.0/0 means any Source Port Source Port to filter on. It can be one of the following formats: Port number (ex. 8080) Port Range (ex. 1024~2048) Destination IP Destination IP to filter on. It can be in one of the following formats: IP address (ex. 192.168.0.222) Subnet (ex. 192.168.1.0/24) IP range (ex. 192.168.0.150~192.168.0.160) 0.0.0.0/0 means any Destination Port Destination port to filter on. It can be one of the following formats: Port number (ex. 8080) Port Range (ex. 1024~2048) Protocol Protocol to filter on Trash Delete the IP Filter rule Save Commit the changes made and save to WiMAX outdoor CPE Cancel Reset fields to the last saved values Table 10 Field definition for Advanced> Firewall>IP Filter 39 3.2.2. DOS Before taking about the DDOS service, it will introduce DDOS Attack first. DDOS attack stands for denial-of-service attack (DoS attack) or distributed denial-of-service attack. It is an attempt to make a computer resource unavailable to its intended users. One common method of attack involves saturating the targeted machine with extern al communications requests, such that it cannot re spond to legitim ate traf fic, or res ponds so slo wly as to be ren dered ef fectively unavailable. DDOS se rvice here is used to prevent DDOS At tack, and it provides T CP SYN Flood, UDP Flood, ICMP Flood, and Port Scan for selection. Th e definition for each field is shown on Table 11. Figure 23 Advanced>Firewall>DDOS Name Description TCP SYN Flood It will prevent SYN flood from WAN or LAN UDP Flood It will prevent UDP flood to WiMAX outdoor CPE ICMP Flood It will prevent ICMP flood from WAN or LAN It will prevent port scanning from WAN and issue an alarm entry in Port Scan the system log. Save Commit the changes made and save to WiMAX outdoor CPE Cancel Reset fields to the last saved values. Table 11 Field definition for Advanced> Firewall>DDOS 40 3.3. Route A route is a path in a network, which can direct the flow of network traffic. 3.3.1. Static Route The static route is a ha rd coded p ath i n the router that sp ecifies how it will get to a cert ain subnet by using a defined path. User could manually add routes to routing table as shown in Figure 24 and Figure 25. The definition for each field is shown on Table 12. Figure 24 Advanced>Route>Static Route Figure 25 Advanced>Route>Static Route>Add 41 Name Description Destination IP Enter the Destination IP address user would like to reach Subnet Mask Enter the subnet mask. Select where the next hop will be. Next Hop IP WAN or LAN interface directly Address Metric Enter the metric value, “cost” of transmission for routing purposes Trash Will remove the selected route Add Will enter in edit mode to add a static route Save Commit the changes made and save to WiMAX outdoor CPE Cancel Reset fields to the last saved values Table 12 Field definition for Advanced>Route>Static Route 42 3.3.2. RIP The Ro uting Information Protocol (RI P) is a dy namic ro uting protocol u sed in local a rea networks. It allows a router to exchan ge ro uting inf ormation with other route rs. User could setup the RIP routing rul e as shown i n Figure 26. The definitio n for each fiel d is sho wn on Table 13. Figure 26 Advanced>Route>RIP 43 Name Description General Setup | Enable Clicking the enable check box will activate the RIP routing rule Click the “Edit” button to activate the st atic ro ute or chan ge the Redistribute Edit metric value. The static route refers to the static routes defined in Advanced>Route>Static Route window Redistribute | OK Click the “OK” button to exit edit table mode LAN Non Direction RX TX RX/TX If user selects “RX, TX or RX/TX” for Direction, user will get the following RIP version options available. Version RIP-1 RIP-2B RIP-2M If user select s RIP-2B or RIP-2M for V ersion, user will get the following Authentication options. Authentication Non Te xt MD5 Authentication ID If user sele cts “MD5” for Authentication type, user can ente r the authentication ID and Key If user enters “text” for Authentication Key Authentication, user ca n enter a text authentication key. If user enters “MD5” for Authenti cation type, user also needs to enter an Authentication ID and Key. WAN Non Direction RX TX RX/TX If user selects “RX, TX or RX/TX” for Direction, user will get the following RIP version options available. Version RIP-1 RIP-2B RIP-2M 44 Name Description If user select s RIP-2B or RIP-2M for V ersion, user will get the following Authentication options. Authentication Non Te xt MD5 Authentication ID If user sele cts “MD5” for Authentication type, user can ente r the authentication ID and Key If user enters “text” for Authentication Key Authentication, user ca n enter a text authentication key. If user enters “MD5” for Authenti cation type, user also needs to enter an Authentication ID and Key. Save Commit the changes made and save to WiMAX outdoor CPE Cancel Reset fields to the last saved values Table 13 Field definition for Advanced>Route>RIP 45 3.4. UPnP Two methods of simplifying the process of connecting a device to the network are available as shown in Figure 27. UPnP allows devices to connect seamlessly to networks in the home (data sharing, communications, and e ntertainment) a nd in co rporate e nvironments for sim plified installation o f compute r components. NA T Po rt Mappin g Pro tocol (NAP-P MP) allo ws a computer in a privae network (b ehind a NA T rout er) to automatically configu re the router to allow parties outside the private network to contact itself. The definition for each field of UPn P Setting is shown on Table 14. 3.4.1. UPnP Setting Figure 27 Advanced UPnP Name Description Enable UPnP Check the check box to enable UPnP Enable NAT-PMP Check the check box to enable NAT-PMP Save Commit the changes made and save to WiMAX outdoor CPE Cancel Reset fields to the last saved values Table 14 Field definition for Advanced> UPnP 46 3.5. IGMP Proxy IGMP proxy enabl es the system to issue IGMP ho st message s on beh alf of host s that th e system discovered through standard IGMP interface. The system acts as a proxy for its hosts. 3.5.1. IGMP Proxy Setting Internet Gro up Mana gement Protocol (IGMP) proxy can be used to imple ment multica st routing. It works by IGMP frame forwarding, and commonly is used when the re is no need to use more advanced protocol, for exam ple PIM. In WiMAX outdoor WiMAXx CPE, it provides IGMP Proxy function, and user can enable or disable this function from Web page as shown in Figure 28. Figure 28 Advanced>IGMP Proxy Name Description Enable IGMP Proxy Check the check box to enable IGMP Proxy Save Commit the changes made and save to WiMAX outdoor CPE Cancel Reset field to the last saved values Table 15 Field definition for Advanced>IGMP Proxy 47 3.5.2. VPN Setting VPN (Virtual Private Network) is a network that is implemented in an additional software layer on top of an existing larger network for the purpose of providing a secure extension of a private network into an insecure network such as the Internet. The links between nodes of a VPN are formed over logical connections or virtual circuits between hosts of the larger network. VPNs are often installed by organizations to provide remote access to a secure organizational network. G enerally, a V PN has a n etwork t opology more complex than a point-to -point connection. VPNs are also used to mask the IP a ddress of individual comp uters withi n the Internet in order, for instance, to surf the World Wide Web anonymously or to access location restricted services, such as Internet television. Here, VPN Settings allow us er to s et rules for VPN, and it supports PPTP, L2TP, and IPsec. 3.6. PPTP The Point-to-Point T unneling Protocol (PPTP) is a method for i mplementing virtual private networks. PPTP does not provide c onfidentiality or encryptio n; it relies on the proto col being tunneled to provide privacy. 3.6.1. PPTP Server A PPTP Server (Point -To-Point T unneling Proto col) allows user t o con nect se curely from a place (such as the hou se) to a LAN located in another location, such a s the of fice. This wa y user can use the services provided in the office at the comfort of the house. The definition for each field of PPTP Server is shown on Table 16. 48 Figure 29 VPN>PPTP>Server 49 Name Description PPTP Server Enable Activate PPTP server. Server Name Offer a service name Require the peer to auth enticate itself before allowing netwo rk packets to be sent or received. We support the following protocol: Auth Protocol PAP: Password Authentication Protocol CHAP: Challenge Handshake Authentication Protocol MSCHAP: Microsoft Chall enge Han dshake Authentication Protocol MSCHAPv2: Microsoft Challenge Handshake Authentication Protocol, Version 2 Encryption Scheme: None Encryption MPPE 40 bits: 40-bit encryption with MPPE MPPE 128 bits: 128-bit encryption with MPPE Auto: automatically select Local IP Address Remote Start IP The IP of router As sessions are established, IP addresses are assig ned starting from “Remote Start IP” Idle Timeout Disconnect if the link is idle for the assigned seconds DNS Server 1 The primary DNS (Domain Name Server) addresses to clients DNS Server 2 The secondary DNS (Domain Name Server) addresses to clients User Access List User name User ID to connect PPTP server via the selected Auth Protocol Server Server protocol type Password Password to connect PPTP server via the selected Auth Protocol IP address IP address of the connected client Connection List User name The user name of the connection Remote IP address The peer address of the connection PPTP IP address The assigned IP address of PPTP Login Time The time of the connection created Link Time(s) Timer from the connected time Save Commit the changes made and save to the CPE Cancel Reset fields to the last saved values 50 Table 16 Field definition for VPN>PPTP>Server 3.6.2. PPTP Client User could setup PPTP Client as sh own in Fi gure 30 and Figu re 31. The definition for each field of PPTP Client is shown on Table 17. Figure 30 VPN>PPTP>Client Figure 31 VPN>PPTP>Client>Add 51 Name Description PPTP Client Add Add a new connection setting Edit Edit the existed connection setting Edit PPTP Client Profile Name The name for this connection setting The Authe ntication protocol of t he p eer requi red. Select which Authentication protocol to use. Auth Protocol P AP CHAP MSCHAPv1 MSCHAPv2 Encryption Enc ryption scheme Server IP Address The IP address of PPTP server Username The use r ID to conne ct PPTP server via the s elected Auth Protocol Password The password of the corresponding user ID Retype Type the “Password” again Get IP automatically? Obtain the dynamic IP address, assigned by the PPTP server Assign IP Address Assign the static IP address for this connection setting Idle Timeout Disconnect if the link is idle for the assigned seconds Save Commit the changes made and save to WiMAX outdoor CPE Cancel Reset fields to the last saved values Table 17 Field definition for VPN>PPTP>Client 52 3.6.3. L2TP In com puter networking, L ayer 2 Tunneling Prot ocol (L2TP) is a tunneli ng p rotocol used to support virtual private networks (VPNs). It does not provide any encryption or confidentiality by itself. It relies on an encryption protocol that it passes within the tunnel to provide privacy. The entire L2TP packet, including payload and L2TP header, is sent within a UDP datagram. It is common to carry Point-to-Point Protocol (PPP) session within an L2TP tunnel. L2TP does not provide confidentiality or strong aut hentication by it self. IPsec is of ten use d to secu re L2 TP packets by providing confidentiality, authentication and integrity. Above is based on information from Wikipedia (http://en.wikipedia.org/wiki/Layer_2_Tunneling_Protocol) 3.6.4. L2TP Server User can setup WiMAX outdoor CPE from web page as shown in Figure 32. The definition for each field of PPTP Server is shown on Table 18. 53 Figure 32 VPN>L2TP>Server 54 Name Description L2TP Server Enable Check the check box to activate L2TP server. Server Name Enter a service name Support Protocol The supported protocol of L2TP messages Version ALL: L2TPv2 and L2TPv3 2: L2TPv2 only 3: L2TPv3 only Require the peer to auth enticate itself before allowing netwo rk packets to b e se nt or received. The followin g p rotocols a re supported: Auth Protocol PAP: Password Authentication Protocol CHAP: Challenge Handshake Authentication protocol MSCHAP: Microsoft Chall enge Han dshake Authentication Protocol MSCHAPv2: Microsoft Challenge Handshake Authentication Protocol, Version 2 Encryption Scheme Non Encryption Local IP Address Remote Start IP MPPE 40 bits: 40-bit encryption with MPPE MPPE 128 bits: 128-bit encryption with MPPE Auto: automatically select The IP of router As sessions are established, IP addresses are assig ned starting from “Remote Start IP” Restrict Client IP? To restrict client IP address range for the client Allow Client IP The IP address range for the client Idle Timeout Disconnect if the link is idle for the given number of seconds DNS Server 1 The primary DNS (Domain Name Server) addresses to the clients DNS Server 2 The second ary DNS (Do main Name Server) ad dresses to the clients User Access List User Name User ID to connect L2TP server via the selected Auth Protocol Server Server Protocol type Password Password to connect L2TP server via the selected Auth Protocol IP Address IP address of the connected client 55 Name Description Connection List User Name The user name of the connection Remote IP Address The peer address of the connection PPTP IP Address The assigned IP address of L2TP Login Time The time of the connection created Link Time(s) Elapsed time connected Save Commit the changes made and save to WiMAX outdoor CPE Cancel Reset fields to the last saved values Table 18 Field definition for VPN>L2TP>Server 56 3.6.5. L2TP Client User could setup PPTP Client as sh own in Fi gure 33 and Figu re 34. The definition for each field of PPTP Client is shown on Table 19. Figure 33 VPN>L2TP>Client Figure 34 VPN>L2TP>Client>Add 57 Name Description L2TP Client Add Add a new connection setting Edit Edit the existed connection setting Edit L2TP Client Profile Name The name of this connection setting The me ssage of L2TP p rotocol versi on for thi s connection L2TP Protocol Version setting 2 3 Enable or disable NAT when connected to PPTP server NAT Mode Y es: enable No: disable The Authentication Protocol of the peer required. Select which Authentication protocol to use. P Auth Protocol AP CHAP MSCHAPv1 MSCHAPv2 Encryption Enc ryption Scheme Server IP Address The IP address of L2TP server The usern ame to conne ct L2TP se rver via the select ed Auth Username Protocol Password The password of the corresponding username Retype Type the “Password” again Get IP Automatically? Obtain the dynamic IP address, assigned by the L2TP server Assign IP Address Assign the static IP address for this connection setting Idle Timeout Disconnect if the link is idle for the assigned seconds Save Commit the changes made and save to WiMAX outdoor CPE Cancel Reset fields to the last saved values Table 19 Field definition for VPN>L2TP>Client>Add 58 3.7. IPSec Internet Protocol Security (IPsec) is a n end- to-end secu rity solu tion and operated at the IP Layer. It provides secure communication between pairs of hosts, pairs of security gateways or between security gateways and a host. It’s based on a suite of protocols for securing IP traffic by authenticating and encrypting each IP packet of the data stream. 3.7.1. Connection Figure 35 VPN>IPsec Overview 59 Figure 36 VPN>IPsec>Add 60 Name Description Add Click the "Add" button to add an IPsec connection rule Property Enable Enable IPsec connection. Connection Name The name of the connection Select the connection type Connection Type Initiator On Re Demand sponder Gateway Information Local Endpoint Interface Local Endpoint IP Address Remote Endpoint IP Address The interface of the WiMAX outdoor CPE public-network interface The IP add ress o r Do main Na me of the WiMAX out door CPE public-network interface The IP address or Domain Name of the remote peer. Authentication Method Pre-Shared Key The pre-share key that two security gateways use to authenticate States ho w the WiMAX out Local ID Type door CPE shoul d be identified for authentication IP: The WiMAX out door CPE is identi fied by the assi gned IP fo r authentication. The default value is 0.0.0.0. Content The IP address States how the remote peer should be identified for authentication Remote ID Type IP: The remote pee r is identified by the assign ed IP for authentication. The default value is 0.0.0.0, and this means WiMAX outdoor CPE will accept any IP. Content The IP address IKE Phase 1 61 Name Description Press the A dd button to enter an Encryption a nd Authentication algorithm Cli ck th e tra sh t o rem ove the sele cted algorithm. En cryption Algorithm: DES 3DES Proposal Add AES128 AES192 AES256 Authentication Algorithm: MD5 SHA-1 Proposal OK Click the OK button to exit the table edit mode Key Group The DH group used to negotiate the IKE/ISAKMP SA. SA Life Time The period that the keying channel of a connection (IKE/ISAKM P SA) should last before being renegotiated. Dead Peer Detection (DPD) Enable or disable the Dead Peer Detection protocol (RFC 3706) DPD Interval The time interval when R_U_THERE messages are sent to the peer. The retry co unter fo r DPD. The tim eout interval i s "DP D inte rval" DPD Idle Try multiplied by "DPD Idle Try". After the timeout interval all connections to the peer are deleted if they are inactive. Local Network The private subnet behind the WiMAX outdoor CPE. Single Address: The private subnet consisting of one IP address. Address Type Subnet a ddress: The private sub net consisting wi thin the sub net IP addresses. Start IP Address The only IP address allowed in the subnet Subnet Mask The netmask of the subnet (Subnet address) Restrict the traffic selector to a single protocol and/or port. Local Port Any: No restriction ICMP: Restrict the traffic selector to ICMP protocol. TCP: Restrict the traffic selector to TCP protocol. If the port number is 0, all TCP port numbers are accepted. UDP: Re strict t he t raffic selector to UDP protoco l. If the port number is 0, all UDP port numbers are accepted. Remote Network Address Type The private subnet behind the remote peer. Single Address: The private subnet consisting of one IP address. Subnet address: The private subnet consisting of subnet IP addresses. 62 Name Description Start IP Address The only IP address allowed in the subnet Subnet Mask The netmask of the subnet (Subnet address) Restrict the traffic selector to a single protocol and/or port. Remote Port Any: No restriction ICMP: Restrict the traffic selector to ICMP protocol. TCP: Restrict the traffic selector to TCP protocol. If the port number is 0, all TCP port numbers are accepted. UDP: Re strict t he t raffic selector to UDP protoco l. If the port number is 0, all UDP port numbers are accepted. IPSec Proposal The type of the connection: Encapsulation Mode Tunnel: signifying a host-to-host, host-to-subnet, or subnet-to subnet tunnel. Transport: signifying host-to-host transport made. Whether authentication should be done as part of ESP encryption and/or Active Protocol separately using the AH protocol. NULL AES128 AES192 Encryption Algorithm AES256 DES 3DES Authentication Algorithm MD5 SHA-1 The time interval a particular instance of a connection (a set of SA Life Time encryption/authentication key for user packets) should last, from successful negotiation to expiry. Perfect Forward Secrecy Whether Perfect Forward Secrecy of keys is desired on the connection's (PFS) keying channel. Save Commit the changes made and save to the CPE device Cancel Reset fields to the last saved values. Table 20 Field definition for VPN>IPsec>Add 63 4. WiMAX This technolo gy is based on the IEEE 802.16 st andard, ena bling the delivery of last mile wireless broadband access. Figure 37 Wireless Broadband Access 4.1. Profile In the profile tab, the user can set WiMAX standard settings, which include how to establish a connection, frequency information and how to authenticate. 64 4.1.1. Connect Settings Figure 38 WiMAX>ProfiIe>Connect Settings 65 Name Description Connect Options Settings Auto Reconnect Indicate th e interval in second to “a uto re connect”. 0 mean s disabled. Use CINR or RSSI as the crite rion of “Auto Connect Mode”. Note Auto Reconnect Mode that “Auto Connect Mode” refer to following “Auto Connect Mode” in “Connect Mode”. NDS Mode Enable NDS mode or not. (NDS is still testing) NDS parameter Upload a file which contains NDS parameter information Enable Handover Enable handover or not Enable Idle Mode Enable Idle Mode or not Only valid if previous “Enable Idle Mode” set to enable. Interval in Idle Mode Interval seconds whi ch firmware will trigger Idle Mode after nit packet traffic. CINR & RS SI Refre sh Interval Interval in seconds to update CINR & RSSI after connected LDRP (Lo w Data Rate LDRP Time Protection ). When it’s enable, if th e uplink/downlink data rate is smaller than the LDRP time, the CPE will send disconnect command to BS. lDRP TX/RX Rate LDRP uplink/downlink data rate Antenna Group Mode Auto Mode or Manual Mode Only valid if previous “Antenna Group Mode” set to Manual Mode. Antenna Ma nual Sele ct Group Mode Valid options: Internal group 1 Internal group 2 External group Connect Type Settings Search Click on the search button to search for available BSID Select a connect mode Auto Connect Mode: It will connect to on e of the BSID in the li st, Connect Mode indiscriminately. Network Search Mode: User needs to select one of the BSID from the list, it will use the BSID to co nnect to WiMAX after device i s reboot. 66 Search Click on the search button to search for available BSID's Select a connect mode. Auto Connect Mode: It will connect to o ne of the BSI D's in the list, indiscriminately Connect Mode Network Search Mo de: User ne eds to select one of the BSID's from the list, it wi ll us e that BSID to conn ect to WiMAX after device is reboot. Save Commit the changes made and save to WiMAX outdoor CPE Cancel Reset fields to the last saved values Table 21 Field definition for WiMAX>ProfiIe>Connect Settings 4.1.2. Frequency Settings The frequency list window will display all the configu red frequencies and thei r bandwidth. To set additional frequencies, click on the “Add” button. Figure 39 WiMAX>Profile>Frequency Settings>By List 67 Figure 40 WiMAX>Profile>Frequency Settings>By Range 68 Name Description There are two display types user can select. User can choose to display the data by List. If user selects "By List", user also has the option to add more frequencies. Setting Type "By Range" will display the freq uency by rang e a nd the incremental value. See Figure "Frequency By Range" for more detail. Joint Wide Scan Result Yes me ans to app end wide sca n resu lt to the freq uency setting . Only valid when setting type is “By List”. Select the default bandwidth to be used in Frequency List Default Bandwidth 5 10 Valid Band Info MHz MHz Valid ba nd in formation. If the fre quencies a ren’t located u sing th e valid band range, the frequency setting will be rejected. Add The "Add" button will allow user to enter more frequency lists OK Click the "OK" button to exit table edit mode Save Commit the changes made and save to WiMAX outdoor CPE Cancel Reset fields to the last saved values Table 22 Field definition for WiMAX>Profile>Frequency Settings>By Range 4.1.3. Authentication Settings Figure 41 WiMAX>ProfiIe>Authenticaton Settings (No Authentication) 69 Figure 42 WiMAX>ProfiIe>Authenticaton Settings (User Authentication) 70 Name Description Authentication Authentication Mode Data Encryption AES-CCM Data Encryption AES-CBC The method used in authentication. Enable MS’ s cap ability of encryptin g/decrypting traf fic by AES-CCM. Enable MS' s ca pability of encry pting/decrypting traf fic by AES-CBC. Key Encryption AES-key wrap Enable MS's capability of decrypting TEK by AES-Key wrap. Key Encryption AES-ECB Enable MS's capability of decrypting TEK by AES-ECB. EAP Supplicant EAP Mode The EAP method used in authentication Anonymous ID The identity encoded in EAP Identity Response message Root CA Certificate The root CA's X.509 certificate. Client CA Certificate The MS's X.509 certificate. Private Key The MS' s pri vate key file corre sponding to the publ ic key enhanced in x.509 certificate Private Key Password The key used to decrypt the MS’s private key file Inner Mode The EAP-TTLS inner method User name The user name used in EAP-TTLS inner method Password The password used in EAP-TTLS inner method. Options Enable the MS to automatically decorate “{am=i}” in the EAP Auto Prepend Auth Mode Identity Resp onse me ssage Th e valu e of "i" dep ends on Authentication Mode field. Random Outer ID Ignore Cert Verification Same EAP Outer ID in ReAuth MAC address in EAP-TLS outer ID Enable MS t o gene rate 16-bytes random num ber as the user name in the EAP Identity Response message. MS ski ps t o v erify t he BS's ce rtificate receiv ed in t he EAP-TLS or EAP-TTLS procedure. Use the same EAP outer ID when doing re-auth Add MAC address in outer ID when EAP mode is EAP-TLS Delete existed Device Delete device certificate file which was uploaded in the field Certificate file “MTK-authorized Device Certificate” Delete existed Private Key Delete d evice private key which wa s uploaded in the field “Device Private Key” 71 Save Commit the changes made and save to CPE Cancel Reset fields to the last saved values Table 23 Field definition for WiMAX>ProfiIe>Authentication Settings 4.2. Connect Figure 43 WiMAX>Connect>Connect 72 Name Description Disconnect Click the disconnect button to terminate the connection Connect Click the connect button to connect to a BSID Select a connect mode. Auto Connect Mode: It will connect to o ne of the BSI D's in the list indiscriminately Connect Mode Network Search Mo de: User ne eds to select one of the BSID's from the list, it wi ll us e that BSID to conn ect to WiMAX after device is reboot. Search Click the search button to scan the frequency Table 24 Field definition for WiMAX>Connect>Connect 4.3. Wide Scan The “Wide Scan” function is used for scannin g BS based on scanning rule. Use r can set the scan rule with defining start, stop frequency, step, and channel bandwidth, and CPE will base on this rule to scan th e BS as shown in Figure 44. The definitio n for ea ch field is shown on Table 25. Figure 44 WiMAX>Wide Scan 73 Name Description Auto Wide Scan Select “Yes” to do “wide scan” automatically when there are no available BS. Wide Scan Range Add/Ok User can specify the wide scan range to reduce search time Wide Scan Result Search Show the result of wide scan. Search button can trigger wide scan Clear Clear button clear current search result Save/Cancel Save/Can cel current setting Table 25 Field definition for WiMAX>Wide Scan 4.4. Link Status The “Link Status” menu item shows a brief profile of the current WiMAX link. Figure 45 WiMAX>link Status 74 4.5. Link Statistics Wimax>Link Statistics The“Link Statistics”menu item will display statistical information in the WiMAX link. Figure 46 WiMAX Link Statistics 75 4.6. Connection Info The connection info window will show the connection ID and its connection type. Figure 47 WiMAX Connection Info 4.7. Service Flow The WiMAX service flow window will show the status and direction of each service flow ID. Figure 48 WiMAX Service Flow 76 5. Administrator 5.1. Remote Control Remote access is the ability to get access to WiMAX outdoor CPE from a remote computer or network. WiMAX outdoor CPE supports five different types of remote access protocols. HTTP allows user to set the port and configure both HTTP and HTTPS protocols. Telnet typically provides access to a command-line interface on a remote machine. SSH Sec ure Shell (SSH) is a network pr otocol u sed to allow remote con nections between two device s usi ng a se cure chan nel. It use s publi c-key cryptog raphy to authenticate the rem ote entity. An SSH server, by de fault, listens on the st andard TCP port 22. SNMP is typically used for network management to monitor network-attached devices for conditions that warrant admin istrative assi stance or to view and retri eve network statistical information. TR-069 using TR-069 the terminals can communicate with he Auto Configuration Servers (ACS) and establish the configuration automatically. 77 5.1.1. HTTP Figure 49 Administration>Remote Control>HTTP Name Description HTTP Server Enable Check the box to allow http connections. Port Number Enter the http port number (default is port 80) HTTPS Server Enable Check the box to allow https connections. Port Number Enter the https port number (default is port 443) HTTP and HTTPS Allow Connection from WAN Check the check-box to allow connections from WAN. Save Commit the changes made and save to WiMAX outdoor CPE. Cancel Reset fields to the last saved values. Table 26 Field definition for Administration>Remote Control>HTTP 78 5.1.2. TELNET Figure 50 Administration>Remote Control>Telnet Name Description Enable Check the box to allow Telnet connections. Port Number Enter the Telent port number (default is port 23) Allow Connection from WAN Check the check-box to allow connections from WAN. Commit the changes ma de and save to WiMAX outdoo r Save CPE. Cancel Reset fields to the last saved values. Table 27 Field definition for Administration>Remote Control>Telnet 79 5.1.3. SSH Figure 51 Administration>Remote Control>SSH Name Description Enable Check the box to allow SSH connections. Port Number Enter the SSH port (default is port 22) Allow Connection from WAN Check the check-box to allow connections from WAN. Commit the changes ma de and save to WiMAX outdoo r Save CPE. Cancel Reset fields to the last saved values. Table 28 Field definition for Administration>Remote Control>SSH 80 5.1.4. SNMP Figure 52 Administration>Remote Control>SNMP Name Description Checking the enable button will allow SNMP applications to query Enable and set some of the SNMP variables. Location Enter the Location SNMP string variable. Contact Enter the Contact SNMP string variable. Read Community Enter Read community string to query SNMP data. Write Community Enter Write community string to query SNMP variables. Enter the I P Addre ss of trap Trap Server server where yo u wa nt tra p notifications to be sent to. Trap community Enter the T rap community to act as a password for sending trap notifications to the target SNMP manager. Save Commit the changes made and save to WiMAX outdoor CPE. Cancel Reset fields to the last saved values. Table 29 Field definition for Administration>Remote Control>SNMP 81 5.1.5. TR-069 Using TR-069 the terminals can communicate with the Auto Configuration Servers (ACS) and establish the configuration automatically. It’s the current standard for activation of terminals in the DSL broadband market. Figure 53 Administration>Remote Control>TR-069 82 Name Description To ena ble or disabl e the TR- 069 a ctivity on the WiMAX outdoo r Enable CPE. ACS Server URL The ACS URL for the WiMAX outdoor CPE to connect to. The usernam e for the Wi MAX outdoor CPE when connected to ACS Username ACS. The pa ssword for the Wi MAX outdoor CPE when connected to ACS Password ACS. Periodical Inform Enable To enable or disable the periodical inform to ACS for the WiMAX outdoor CPE. Periodical Inform Interval The interval between two periodical inform. Connection Request Enter the username for the ACS to perform connection request to Username WiMAX outdoor CPE. Connection Request Enter the password for the ACS to perform connection request to Password WiMAX outdoor CPE. The CA certi ficate file is use d to ident ify the certificate of ACS CA Certificate File when D-230 communicated ACS with HTTPS URL. CA Certificate Info Displays the subject field of the CA Certificate. CLIENT Certificate File The CLIENT certificate file is used wh en WiMAX outdoor CPE communicates with HTTPS URL. CLIENT Certificate Info Displays the subject field of the CLIENT Certificate. Save Commit the changes made and save to WiMAX outdoor CPE. Cancel Reset fields to the last saved values. Table 30 Field definition for Administration>Remote Control>TR-069 83 5.1.6. OMA-DM Using OMA DM the termi nals can communicate with the OMA DM Server a nd establish the configuration automatically. It’s the curre nt standard for activation of terminals in OMA (Open Mobile Alliance). Figure 54 Administration>Remote Control>OMA-DM 84 Name Description To enable or disable the OMA-DM activity of the WiMAX outdoor Enable CPE. Server URL The DM Server URL for the WiMAX outdoor CPE to connect to. Server Port The DM Server Port for the WiMAX outdoor CPE to connect to. Server Auth Type The DM Server authentication type. The Server ID for the WiMAX outdoor CPE when con Server ID nected to DM Server. Server Password Client Auth Type The Server passwo rd for the WiMAX outdoor CPE whe connected to DM Server. The DM Client authentication type. The Client ID for the WiMAX outdoor CPE when connected to DM Client ID Server. Client Password The Client password for the WiMAX outdoor CPE whe connected to DM Server. Periodical Client- To enable or disable the periodical client-initiated session to DM initiated Enable server for the WiMAX outdoor CPE. Periodical Clientinitiated Interval The interval between two periodical client-initiated session. Save Commit the changes made and save to WiMAX outdoor CPE. Cancel Reset fields to the last saved values. Table 31 Field definition for Administration>Remote Control>OMA-DM 85 5.2. Password Note: The default usernames and passwords admin/admin and guest/guest. The user with administrative privileges (belonging to the “ad min” group) has access to all the features in the software. A user with “guest” privileges (belonging to the “guest” group)only has a subset of the features available to them. Note: There can only be one username in each of the groups (one to one relationship). Figure 55 Administrator>Password 86 Name Description Change Password Select which grou p the u ser belongs t o that you would like to change the password for. Group admin, if the user is p art of the admin g roup, they have full access to tall the features. guest, if the user is part of the guest group, they have limited access to the features. Old Password Enter the old password. New Password Enter the new password. Retype Retype the new password. Save Cancel Commit the chang es made and save to WiMAX outdoor CPE, it will only commit the change made to the password. Reset fields to the last saved values. Change Username Select which grou p the u ser belongs t o that you would like to change the username for. Group admin, if the user is p art of the admin g roup, they have full access to tall the features. guest, if the user is part of the guest group, they have limited access to the features. Old Username Enter the username you want to change. New Username Enter the new username. Enter the original password, the pa ssword will not change. If you Password enter an incorrect or different password the change will not be committed Commit the chang es made and save to WiMAX outdoor CPE, it Save will only commit the change made to the username. Cancel Reset fields to the last saved values. Table 32 Field definition for Administrator>Password 87 6. System 6.1. Date and Time User can co nfigure the d ate and time on the device. The use r can ma nually configu re the system time, or ch oose to get the date and time fro m a time server . The “Sa ve” button will commit the configuration, and the “Cancel” button will clear the fields. The “Time Zone” tab will allow you to set the time zone and set the st arting and finish time for d aylight saving period. User can also enable or disable “Daylight Savings Time”. NOTE: If user doe sn’t con figure the time on the WiMAX out door CPE it will use the defaul t system starting time. The default system starting time is set to 1970/1/1 00:00:00 Figure 56 System>Date/Time>Date 88 6.1.1. Date Name Description If user selects the Manual option, then use need to enter the time Manual and date manually. New Time New time manually entered New Date New date manually entered Get From Time Server If user select s this option it will get th e local time from a time server automatically. Time Protocol Select the Time protocol Time Server Address Enter the address of the time server. Save Commit the changes made and save to WiMAX outdoor CPE Cancel Reset fields to the last saved values Table 33 Field definition for Administrator>Password 6.1.2. Time Zone Figure 57 System>Date/Time>Time Zone 89 Name Description Time Zone Enter the time zone of for the location Enable Daylight Savings If user wants to ena ble Daylight Savi ngs Ti me, u ser needs to check the box. Start Date Enter the beginning date for Daylight Savings time End Date Enter the end date for Daylight Savings time. Save Commit the changes made and save to WiMAX outdoor CPE Cancel Reset fields to the last saved values Table 34 Field definition for System>Date/Time>Time Zone 6.2. Upgrade Firmware The “Upgrade” window allows user to upgrade the firmware on your device. Users can choose to upgrade the firmware by entering the file path or entering the URL of the upgrade file. Note: After pressing the “Upgrade” button. It will automatically reboot the WiMAX outdoor CPE and upgrade the firmware with the spe cified file. User will be prom pted to login to the WiMAX outdoor CPE after the upgrade is complete. 6.2.1. Upgrade File Figure 58 System>Upgrade Firmware>Upgrade File 90 Name Description Enter the full path of the file you want to upgrad e. The "browse" Browse button will help user to find the file on the server. Upgrade It will start upgrading the file The status bar will display whic h segment it's processi ng and Status what percentage of the upgrade has been completed. Table 35 Field definition for System>Upgrade Firmware>Upgrade File 6.2.2. Upgrade Link Figure 59 System>Upgrade Firmware>Upgrade Link Name Description Upgrade Link Enter the complete URL path of the file that user wants to upgrade Upgrade It will start upgrading the file The status window will display which segment it's processing and Status what percentage of the upgrade has been completed. Table 36 Field definition for System>Upgrade Firmware>Upgrade Link 91 6.3. Log The “Sy stem>Log” will di splay system log out put. The “Ref resh” button will clear the l og window and display the most current system log information. Figure 60 System Log 6.4. Backup/Restore The Backup/Restore tab will allow user to save and restore the configuration on the WiMAX outdoor CPE . User can a lso re set the WiM AX out door CPE to factory defa ults from the “Factory Defaults” tab. 6.4.1. Configuration Backup Figure 61 System>Backup/Restore>Backup 92 Figure 62 File Download Figure 63 Save File As 93 Name Description Click the "Backup" button o save the current configuration on the WiMAX outdoor CPE. After user clicks the "Backup" button "File Download" window will pop-up and prompt user to sav e the file. Backup In the "Save As" windo w, enter the na me and location, where user wishs to download the file to. Table 37 Field definition for System>Backup/Restore>Backup 6.4.2. Configuration Restore Figure 64 System>Backup/Restore>Restore 94 Name Description Enter the path of the configuration file user wants to restore. Click on the "Bro wse" button to help u File Restore ser to navig ate throu gh directories and search for the file. After user enters the complete file path, click the "File Re store" button. It will begin restoring the configuration from the file specified. Enter the configuration URL path user wants to restore from. After URL Restore entering the complete URL path, click the "URL Restore" button. It will begin restoring the configuration from the URL l ocation user specified. Table 38 System>Backup/Restore>Restore 6.4.3. Factory Defaults Factory default will set all the configurations back to factory def aults. Any configurations that user ha s ma de will be ch anged back to the factory default settings. Af ter sel ecting “Re set” button, user will be prompted with a window to confirm or cancel the action. Warning: Restore factory defaults will clear any IP addresses and setting that may have been configured on the WiMAX outdoor CPE. Figure 65 System>Backup/Restore>Factory Defaults 95 Figure 66 Restore to factory reset warning 96 7. Installing and grounding device Before installing the Outdoor CPE Device Before installing, it is important to comply with the precautions listed below. It must be install ed by qua lified ser vice personn el who ar e w ell-trained in the correct proce dures for handling an d installing the Avoid in stalling or working o n equ ipment in ad verse weather conditions. On ce it must be i nstalled in adverse weather co nditions, i t’s Do not install the device near overhead power lines or power circuits, or where the device can fall onto such power lines or circuits. Do not disassemble the product. Opening or removing covers may expose you to electric shock. Warranty void if seal is broken. Do not place or construct objects in close proximity to the device. equipment. necessary to well protect the equipment. Be sure to check the supplied mounting accessory is correct as listed in Figure 67. Please be noted that the mounting kits should be used for the pole with diameter between 34 ~ 49 mm. Under normal operating condition, it should be at least 50 cm away from the body of the user. Mounting Accessories: Bracket with Tab: 1 pc Screws with length 35mm: 2 pcs Bracket W/L Tab: 1 pc Nuts: 3 pcs Arm Bracket: 1 pc Split Washers: 3 pcs Screws with length 60mm: 2 pcs Flat Washers: 3 pcs Lockwasher: 2 pcs Figure 67 Mounting accessory list An Overview of the Outdoor CPE Device Installation Service personnel needs to follow the steps for installing Outdoor CPE Device 1. Pole-mounting or Wall-mounting the Outdoor CPE Device. 2. Grounding the Outdoor CPE Device 3. Connect the Outdoor CPE Device to PoE unit 4. Connect PC to PoE unit for configuring the Outdoor CPE Device 5. Connect the PoE unit to the power source to power up the Outdoor CPE Device 6. Use PC to configure the Outdoor CPE Device Pole-Mounting the Outdoor CPE Device In the following steps, it introduces how to pole-mounting the Outdoor CPE Device. 1. Assemble the mounting hardware brackets onto pole first: Take the Screws with 60mm length to pass through the Split washer and Flat washer in order, and then screw the Brackets together with nuts. 2. Use the Screw with 35mm length to attach the Outdoor CPE Device to the tab of the Bracket. Ensure the Lockwasher is located between the Bracket’s tab and the Outdoor CPE Device’s tab. Be sure to orient the Outdoor CPE Device with the connector towards the bottom. Remember to orderly add the Split washer, Flat washer and Nuts as shown in Figure 68. Do not over-tighten before finishing the Outdoor CPE Device alignment. 3. Adjust the azimuth and elevation of the Outdoor CPE Device toward the direction of WiMAX Base Station location. 97 4. Tighten the screws to secure the Outdoor CPE Device tightly. It is not necessary to use Arm Bracket for pole-mounting. Arm Bracket is only used for wall-mounting. Screw (35mm) Screw (60mm) Lockwasher Split washer Split washer Flat washer Flat washer Bracket with Tab Nut Bracket W/L Tab Nut Figure 68 Pole-Mount the Outdoor CPE Device Wall-Mounting the Outdoor CPE Device In the following steps, it introduces how to wall-mounting the Outdoor CPE Device. 1. Install the Bra cket with tab on a wall b y usi ng t wo mou nting scre ws appr opriate for the wall’s con struction m aterial. T he ap propriate mounting hardware should be purchased directly from a local supplier. 2. Connect the Arm Bracket to Outdoor CPE Device with the 35mm length Screw, Lockwasher, Split washer, Flat washer, and Nut orderly as shown in Figure 69. Ensure the Lockwasher is located between the Bracket’s tab and the Outdoor CPE Device’s tab. Do not over-tighten before finishing the Outdoor CPE Device alignment. 3. Secure the other side of Arm Bracket along with Lockwasher to the Bracket’s tab mounted on wall. Ensure that the bolt head is positioned in the socket of the Bracket. Do not over-tighten before finishing the Outdoor CPE Device alignment. 4. Adjust the azimuth and elevation of the Outdoor CPE Device toward the direction of WiMAX Base Station location. 5. Tighten the screws to secure the Outdoor CPE Device tightly. Screw (35mm) Screw (35mm) Customer supplied screw Arm Bracket Lockwasher Split washer Bracket with Tab Flat washer Nut Customer supplied screw Split washer Lockwasher Flat washer Nut Figure 69 Wall-Mount the Outdoor CPE Device Grounding the Outdoor CPE Device Grounding the Out door C PE Device is e ssential to a void serious i njury to ser vice pers onnel an d damage t o t he Outdoor CPE Device. T he following steps introduce how to ground the Outdoor CPE Device. 1. Remove the ground screw installed on the side of the Outdoor CPE Device, as shown in Figure 70. 2. Cut the required length of the ground wire, and then strip the insulation from the ground wire by using either a wire cutter/stripper or utility knife. 3. Crimp the ground wire to the copper cable lug, and then connect the cable lug to the grounding connection on the side of the Outdoor CPE Device. Please be noted that the thickness of the cable lug should be less than 0.85mm. 4. Tighten the screw by using the appropriate size and type of screw driver to secure the copper cable lug to the Outdoor CPE Device. 5. Strip the other end of the ground wire and connect to the main ground. 98 Copper Cable Lug Grounding Screw Ground Wire to Earth Figure 70 Connect the ground wire 99 Specification Physical Standard General Standard Description XS-618-25MM PoE Standard- IEEE802.3af Compliant ● Wireless Standard - IEEE802.16e-2005 ● Ethernet Interface - 10 /100 Base-T ● WiMAX Specification Radio Frequency ● Air Interface 2500MHz~2690MHz Scalable OFDMA RF Configuration TX& RX Configuration 2T2R Modulation - DL & UL QPSK, 16QAM, 64QAM ● Channel Bandwidth 5, 10 MHZ ● Receiver Sensitivity CTC-QPSK-1/2 @ 5MHz BW CTC-16QAM-3/4@ 5MHz BW CTC-64QAM-3/4@ 5MHz BW ● - 95 dBm - 85 dBm - 80 dBm CTC-QPSK-1/2@10MHz BW CTC-16QAM-3/4@10MHz BW CTC-64QAM-3/4@10MHz BW - 92 dBm - 83 dBm - 78 dBm Firmware Feature Networking Network Management Bridge /Gateway Switching Mode ● DDNS /DNS Relay ● Network Time Protocol ● IPv4 ● Network Address Translation ● DHCP Client-WAN /DHCP Server-LAN ● Port Forwarding /Trigger Support ● NAT ALG -NAT FTP /PPTP /H.323 ALG ● UPnP, NAT-PMP & IGMP Proxy Support ● TR-069 /OMADM /SNMPv2 MIB II ● HTTP /HTTPS /SSH /Telnet ● BS Scanning- Auto /Manual Connection ● Web Access User Interface ● Web Link Status Display ● Web System Log Display ● User Account Permission Control ● Web Firmware Upgrade /Firmware Rollback ● Rest Factory &Settings ● Default Configuration QoS Scheduling UGS; RT-VR; NRT-VR; BE; ERT-VR ● VLAN VLAN packet pass through ● 100 VPN PPTP Server /Client, L2TP Server /Client VPN Pass Through-IPSec, PPTP, and L2TP ● Authentication User /Device Authentication ● Security AES-CCM /CBC /ECB /Key Wrap PKM v2, EAP TLS /TTLS / MSCHAPv2 /MS-CHAP /CHAP /MD5 /PAP X.509 Certificate ● IP Filter, DDOS, DMZ, NAT /NAPT Support ● Firewall /User and Device Mechanical Specification Dimension (L xW xH) CPE Weight /without Accessories < 2 Kg Power Requirements 100 ~ 240VAC /50 ~ 60Hz Power Input Voltage + 48VDC Power Consumption@Continue TX Mode <=15 W Output Power @Antenna Port Antenna /Internal Patch Antenna Hardware Specification 354 x 220 x 68 mm (Without Tab) 354 x 220 x 102 mm (With Tab) >= 25 dBm >= 14 dBi LAN Port /RJ45 Connector 1xRJ45 Port Operating Temperature@Ambient Temp. -40℃ ~ + 60℃ Operation Humidity /Non-condensing 5 to 85% Storage Temperature@Ambient Temp. - 40℃ ~ + 85℃ Storage Humidity /Non-condensing Grounding Design Surge Protection Waterproof & Anti-Dust 5 to 85% ● +/- 4 KV IP67 Compliance 101
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : Yes Encryption : Standard V4.4 (128-bit) User Access : Print, Copy, Extract Author : 4683 Create Date : 2010:11:08 14:09:47+08:00 Modify Date : 2010:11:12 03:56:10-08:00 XMP Toolkit : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:08:04 Format : application/pdf Creator : 4683 Title : Microsoft Word - User Manual_0.5.doc Creator Tool : PScript5.dll Version 5.2.2 Metadata Date : 2010:11:12 03:56:10-08:00 Producer : Acrobat Distiller 9.0.0 (Windows) Document ID : uuid:8676b2c3-11af-4c79-b47b-b9751c650790 Instance ID : uuid:a4695585-c875-4579-be93-7fda26034429 Page Count : 101EXIF Metadata provided by EXIF.tools