GemTek Technology WIXS-168 WiMAX Outdoor CPE User Manual WIXS 168 User Manual rev

Gemtek Technology Co., Ltd. WiMAX Outdoor CPE WIXS 168 User Manual rev

Contents

User manual 1

User Manual
Gemtek WiMAX Modem
Manual Version: 1.2
Manual Date: Apr. 30 2009
Software Version: R4.6.0.0-17743-v5.7.0
Software Date: Feb. 20 2009
i
CONTENTS
Chapter 1 Overview..................................................................1-1
1.1. Indoor CPE............................................................................................. 1-1
1.2. Outdoor CPE.......................................................................................... 1-2
Chapter 2 WEB-GUI.................................................................2-3
2.1. System Configuration Login.................................................................. 2-3
2.2. System Logout ....................................................................................... 2-6
2.3. Account.................................................................................................. 2-7
2.4. Date........................................................................................................ 2-8
2.5. Language................................................................................................ 2-9
2.6. Scanner................................................................................................. 2-10
2.7. Authentication...................................................................................... 2-12
2.8. Bridge Mode ........................................................................................ 2-14
2.9. NAT Mode ........................................................................................... 2-15
2.10. Firewall ................................................................................................ 2-16
2.11. DHCP Server........................................................................................ 2-18
2.12. NAT ALG............................................................................................. 2-20
2.13. Port Forwarding ................................................................................... 2-21
2.14. Port Trigger.......................................................................................... 2-22
2.15. DDNS................................................................................................... 2-23
2.16. TR-069................................................................................................. 2-25
2.17. SNMP................................................................................................... 2-27
2.18. Log....................................................................................................... 2-28
2.19. Upgrade................................................................................................ 2-29
2.20. Recovery .............................................................................................. 2-31
2.21. Reboot.................................................................................................. 2-32
ii
FIGURES
Figure 1-1 Indoor CPE Front Panel LED ............................................... 1-1
Figure 1-2 Outdoor CPE installation ...................................................... 1-2
Figure 2-1 Login Page ............................................................................ 2-3
Figure 2-2 WiMAX Status...................................................................... 2-4
Figure 2-3 WiMAX Status-Service Flow ............................................... 2-4
Figure 2-4 Network Status...................................................................... 2-5
Figure 2-5 Device Status......................................................................... 2-5
Figure 2-6 Logout ................................................................................... 2-6
Figure 2-7 Account ................................................................................. 2-7
Figure 2-8 Date ....................................................................................... 2-8
Figure 2-9 Language............................................................................... 2-9
Figure 2-10 Scanner with Bandwidth range 6~10MHz........................ 2-10
Figure 2-11 Scanner with Bandwidth range 3~5MHz ...........................2-11
Figure 2-12 Authentication................................................................... 2-12
Figure 2-13 Authentication-View Certificates...................................... 2-13
Figure 2-14 Bridge Mode...................................................................... 2-14
Figure 2-15 NAT Mode......................................................................... 2-15
Figure 2-16 Firewall ............................................................................. 2-16
Figure 2-17 Firewall Filter.................................................................... 2-17
Figure 2-18 DHCP Server Enabled....................................................... 2-18
Figure 2-19 DHCP Server Disabled...................................................... 2-19
Figure 2-20 NAT ALG.......................................................................... 2-20
Figure 2-21 Port Forwarding ................................................................ 2-21
Figure 2-22 Port Trigger ....................................................................... 2-22
Figure 2-23 DDNS Enabled.................................................................. 2-23
Figure 2-24 DDNS Disabled................................................................. 2-24
Figure 2-25 TR-069 .............................................................................. 2-26
Figure 2-26 TR-069-Certificate File Upload ........................................ 2-26
Figure 2-27 SNMP enabled................................................................... 2-27
Figure 2-28 SNMP disabled.................................................................. 2-27
Figure 2-29 Log .................................................................................... 2-28
Figure 2-30 Web/FTP Upgrade............................................................. 2-29
Figure 2-31 Web Upgrade Summary .................................................... 2-30
Figure 2-32 TFTP Upgrade................................................................... 2-30
Figure 2-33 Recovery ........................................................................... 2-31
iii
Figure 2-34 Reboot Button ................................................................... 2-32
Figure 2-35 Reboot Confirmation......................................................... 2-33
1-1
Chapter 1 Overview
This chapter describes the panel function and installation procedure for the
CPE.
1.1. Indoor CPE
Front Panel LED
Power LED: ON: power on OFF: power fail
LAN LED: ON: connect OFF: disconnect Blinking: data transmit
When the CPE powers on, the LED indicates the CPE states as follow.
Only Red LED is Blinking: synchronization
Only Yellow LED is Blinking: authentication
Only Green LED is Blinking: DHCP client negotiation
After the CPE has connected to the base station, the signal strength LED are
defined as follow.
Only Red LED is ON: the signal is weak. (CINR<8dB)
Yellow LED is ON: the signal strength is medium. (8dBCINR<15dB)
Green LED is ON: the signal strength is good. (15dBCINR)
Figure 1-1 Indoor CPE Front Panel LED
1-2
Rear Panel
Power jack: DC 12V / 1.5A
LAN port: 10/100Base-TX
Reset button: To reboot the CPE
1.2. Outdoor CPE
Power Injector – Power Over Ethernet 802.3af compliant
LAN port: 10/100Base-TX
Figure 1-2 Outdoor CPE installation
2-3
Chapter 2 WEB-GUI
This chapter describes how to configure the CPE in order to connect to the base
station.
2.1. System Configuration Login
The CPE will enable a DHCP server by default. Computers or network devices
connected to its LAN side can get IP address automatically from CPE. If you disable
CPE’s DHCP server by yourself, set the IP address, netmask, and gateway as
following.
IP address: 10.1.1.x, 1 x 253
Netmask: 255.255.255.0
Gateway: 10.1.1.254
Connect to http://10.1.1.254/ with a browser, and you will see a webpage such as the
one shown in Figure 2-1. The administrator username and password are as shown
below:
Username: admin
Password: admin
Gemtek CPE also support multi-level user login. Please contact with Gemtek to
define multi-user features.
Figure 2-1 Login Page
2-4
If there is no error, the user can login into the Status Page, and WiMAX Status,
Network Status, and Device Status are as shown in Figure 2-2, Figure 2-3, Figure 2-4,
and Figure 2-5.
Figure 2-2 WiMAX Status
Figure 2-3 WiMAX Status-Service Flow
2-5
Figure 2-4 Network Status
Figure 2-5 Device Status
2-6
2.2. System Logout
Press the Logout” button as shown in Figure 2-6 to logout of the system and
go back to the “Login” page as shown in Figure 2-1.
Figure 2-6 Logout
2-7
2.3. Account
Personalization Account
The Account page is used for changing the password of the WEB-UI account as
shown in Figure 2-7. After setting the configurations of these fields, press the “Apply”
button to write the new configurations into the CPE and the new configurations will
take effect.
Figure 2-7 Account
2-8
2.4. Date
Personalization Date
If the system date is not in the valid duration of the uploaded certificate file, the
CPE will not pass the authentication from the base station. The system date of a CPE
can be synchronized with the PC that is connected to its LAN side by clicking the
“Synchronize with PCbutton. The system date of a CPE can also be automatically
updated by synchronizing time with an NTP server assigned manually by the user or
from the DHCP server. The selection of different time zone and daylight saving option
are available as well for different regions. Please refer to Figure 2-8 for more detail.
After setting the configurations of these fields, press the “Apply” button to write the
new configurations into the CPE and press “Reboot” as shown in Figure 2-35, to
reboot the system in order for the new configurations to take effect.
Figure 2-8 Date
2-9
2.5. Language
Personalization Language
The Language page allows users to select one of the languages in the
drop-down list for viewing the WEB-GUI as shown in Figure 2-9. After selecting the
desired language, press the “Apply” button to view the WEB-GUI in the selected
language.
Figure 2-9 Language
2-10
2.6. Scanner
WiMAX Scanner (can only be accessed by administrator)
The Scanner page allows users to stop or start WiMAX connection with a BS
by simply clicking the “start” or “stop” button in the “Start/Stop WiMAX” section.
The “Channel Tablesection lists all the channels that are stored in the channel table
along with channel status associated to the channel used to connect the CPE to a BS.
Users are allowed to add, remove, and edit channels in the channel table. Please refer
to Figure 2-10 and Figure 2-11 for more detail. After changing the channel table, press
the “Apply” button to write the new configurations into the CPE. If the “Bandwidth
range” of the channel table is changed, then press “Reboot” as shown in Figure 2-35,
to reboot the system in order for the new configurations to take effect; otherwise, just
simply restart the system by using the “start and “stop” button in the “Start/Stop
WiMAX” section. Please note that when the CPE is connected to a BS, a green check
will appear on the “Active” of the linked frequency in the “Channel Table” section as
well as beside the small CPE icon on the top banner; otherwise, a red x will appear
beside the small CPE icon on the top banner.
Figure 2-10 Scanner with Bandwidth range 6~10MHz
2-11
Figure 2-11 Scanner with Bandwidth range 3~5MHz
2-12
2.7. Authentication
WiMAX Authentication (can only be accessed by administrator)
Users can enable or disable the authentication by selecting one of the two
methods supported, EAP-TLS and EAP-TTLS, or by selecting none in “Phase 1” field.
Users can also choose one of five key encoding methods listed in “Phase 2”. Identity,
username, and password should be entered respectively as agreed upon with the BS, if
authentication is required. After setting the configurations of these fields, press the
“Apply” button to write the new configurations into the CPE and press “Reboot” as
shown in Figure 2-35, to reboot the system in order for the new configurations to take
effect. Certificates required for authentication can be uploaded in the “Certificate File
Upload” section. Contents of the certificates that are currently in the CPE can be
viewed in details by clicking “View CA Certificate” as shown in Figure 2-13. Note
that the only certificate format supported is PEM (Privacy Enhanced Mail, Base64
encoded DER certificate). Please confirm the format before uploading. Certificates in
the CPE can also be deleted by pressing the “Delete” button. Please refer to Figure
2-12 for more details.
Figure 2-12 Authentication
2-13
Figure 2-13 Authentication-View Certificates
2-14
2.8. Bridge Mode
Networking Bridge/NAT Mode
Bridge mode is enabled by simply selecting “Bridge Mode” as shown in Figure
2-14. By selecting “Static” IP type, users can manually assign the “IP address” and
“netmask”. The “IP address” and “netmask” can also be automatically assigned by
the DHCP server by selecting “DHCP” IP type. After setting the configurations of
these fields, press the “Apply” button to write the new configurations into the CPE
and go to “Management Reboot” as shown in Figure 2-35, to reboot the system in
order for the new configurations to take effect.
Figure 2-14 Bridge Mode
2-15
2.9. NAT Mode
Networking Bridge/NAT Mode
NAT mode is enabled by simply selecting “NAT Mode” as shown in Figure
2-15. By selecting “Static” WAN IP type, users can manually assign the “WAN IP
address”, “WAN netmask”, and “WAN gateway”. The “WAN IP address”, “WAN
netmask”, and “WAN gateway” can also be automatically assigned by the DHCP
server by selecting “DHCP” WAN IP type. Users can also configure LAN IP
address”, “LAN netmask”, and “MTU”, which should be between 68 and 1500. After
setting the configurations of these fields, press the “Apply” button to write the new
configurations into the CPE and go to “Management Reboot” as shown in Figure
2-35, to reboot the system in order for the new configurations to take effect.
Figure 2-15 NAT Mode
2-16
2.10. Firewall
Networking Firewall (can only be accessed by administrator)
The “CPE Access Control” section of this page gives users the ability to allow
or deny web/telnet access from WAN. By enabling and identifying a DMZ host, an
external attacker only has access to the DMZ host, rather than the entire private
network at the CPE’s back end. Furthermore, the redirection of ICMP can also be
enabled. The “Firewall Filter” section of this page is used to filter incoming network
traffic based on MAC, IP, protocol, TCP/UDP port and interface. Please refer to
Figure 2-16 and Figure 2-17 for more details. After setting the configurations of these
fields, press the “Apply” button to write the new configurations into the CPE and
press “Reboot” as shown in Figure 2-35, to reboot the system in order for the new
configurations to take effect.
Figure 2-16 Firewall
2-17
Figure 2-17 Firewall Filter
2-18
2.11. DHCP Server
Networking DHCP Server
DHCP server will automatically start up when the CPE is powered on if “DHCP
server” is enabled. If enabled, this page shows the previous configuration of the
DHCP server as shown in Figure 2-18; otherwise, it shows that the DHCP server is
disabled as shown in Figure 2-19. Note that “Primary DNS” and “Domain Name” are
required for DHCP server settings, and “Max lease time (seconds)” is between 1 and
99999999. Specific IP address can also be assigned to a specific MAC address in
“Permanent Host Configuration” as shown in Figure 2-18. Please note that DHCP
server is only applicable when the CPE is in NAT mode. After setting the
configurations of these fields, press the “Apply” button to write the new
configurations into the CPE and press “Reboot” as shown in Figure 2-35, to reboot
the system in order for the new configurations to take effect.
Figure 2-18 DHCP Server Enabled
2-19
Figure 2-19 DHCP Server Disabled
2-20
2.12. NAT ALG
Networking NAT ALG (can only be accessed by administrator)
By selecting or deselecting the checkbox, users can enable or disable BSID
authorization of SIP ALG as shown in Figure 2-20. With it enabled, BSID can be used
in SIP authentication to decide if the ATA is within the service area. Please note that
NAT ALG is only applicable when the CPE is in NAT mode. After changing the
configuration, press the “Apply” button to write the new configuration into the CPE
and press “Reboot” as shown in Figure 2-35, to reboot the system in order for the new
configurations to take effect.
Figure 2-20 NAT ALG
2-21
2.13. Port Forwarding
Networking Port Forwarding
Port forwarding redirects incoming network traffic from pre-defined “WAN
Port” range to pre-defined “LAN IP Address” and “LAN Port” range. Users are
allowed to add, remove, edit, enable, and disable port forwarding rules here as shown
in Figure 2-21. Please note that port forwarding is only applicable when the CPE is in
NAT mode. After setting the configurations of these fields, press the “Apply” button
to write the new configurations into the CPE and press “Reboot” as shown in Figure
2-35, to reboot the system in order for the new configurations to take effect.
Figure 2-21 Port Forwarding
2-22
2.14. Port Trigger
Networking Port Trigger
Port trigger dynamically opens port forwarding from a pre-defined WAN
“Forwarding Port” range to a pre-defined LAN “Forwarding Port” range when a client
on the local network makes an outgoing connection to a predetermined “Trigger Port”
range. Users are allowed to add, remove, edit, enable, and disable port trigger
mappings here as shown in Figure 2-22. Please note that port trigger is only
applicable when the CPE is in NAT mode. After setting the configurations of these
fields, press the “Apply” button to write the new configurations into the CPE and
press “Reboot” as shown in Figure 2-35, to reboot the system in order for the new
configurations to take effect.
Figure 2-22 Port Trigger
2-23
2.15. DDNS
Networking DDNS
By selecting or deselecting the checkbox, users can enable or disable DDNS as
shown in Figure 2-23 and Figure 2-24. To enable DDNS, registration with at least one
of the seven service providers is required, and can be done by clicking the “Sign Up”
hyperlink and following the procedures. Enter the hostname, username, and password
you have registered with the service provider and press the “Apply” button to save the
changes into the CPE. The CPE will be able to notify the selected domain name server
to change the active DNS configuration of its configured hostnames and addresses in
real time by using the Internet Protocol Suite after pressing “Reboot” as shown in
Figure 2-35.
Figure 2-23 DDNS Enabled
2-24
Figure 2-24 DDNS Disabled
2-25
2.16. TR-069
Management TR-069 (can only be accessed by administrator)
TR-069 client will automatically start up when the CPE is operational if the
“TR-069 Active Flag” is enabled. The “ACS Server URL” is the URL used by
TR-069 client to connect to the ACS server, and TR-069 client uses the “ACS
Username” and “ACS Password” to login the ACS Server. When the “Inform Enable”
is enabled, TR-069 client will periodically query the ACS server according to the
“Inform Interval”. The ACS server can also use the “Connection Request Username”
and “Connection Request Password” to connect to the CPE and get/set parameter via
connection request mechanism. Nevertheless, all of the above parameters will be
overwritten if Option-43 is activated. However, the parameters changed by Option-43
will not be saved into the CPE. In other words, all of the above parameters will be
restored when the CPE reboots. TR-069 certificates required for HTTPS protocol can
be uploaded in the “TR-069 Certificate File Upload” section. Note that the only
certificate format supported is PEM (Privacy Enhanced Mail, Base64 encoded DER
certificate). Please confirm the format before uploading. Please refer to Figure 2-25
and Figure 2-26 for more details. After setting the configurations of these fields, press
the “Apply” button to write the new configurations into the CPE. If only the “Inform
Enable” and/or “Inform Interval” have been changed, then do nothing and the change
will take effect in the next inform interval; otherwise press “Reboot” as shown in
Figure 2-35, to reboot the system in order for the new configurations to take effect.
2-26
Figure 2-25 TR-069
Figure 2-26 TR-069-Certificate File Upload
2-27
2.17. SNMP
Management SNMP (can only be accessed by administrator)
This page is used to enable disable SNMP server as shown in Figure 2-27 and
Figure 2-28. When SNMP is enabled, the community string of the SNMP server can
be changed. After setting the configurations of these fields, press the “Apply” button
to write the new configurations into the CPE and press “Reboot” as shown in Figure
2-35, to reboot the system in order for the new configurations to take effect.
Figure 2-27 SNMP enabled
Figure 2-28 SNMP disabled
2-28
2.18. Log
Management Log (can only be accessed by administrator)
This page displays the system message log as shown in Figure 2-29.
Figure 2-29 Log
2-29
2.19. Upgrade
Management Upgrade (can only be accessed by administrator)
To perform web upgrade, press the “Brows…” button to choose the firmware
file in the computer in the “Web Upgrade” section, and press the “Upload” button to
upload the file into the CPE. Please refer to Figure 2-30 for more details. After the
firmware file is uploaded, the summary will be displayed as shown in Figure 2-31.
Then press the “Apply” button to upgrade the firmware. This upgrade procedure takes
about 3 minutes and reboots the CPE afterwards automatically.
To perform FTP upgrade, input the FTP server IP address, FTP username and
password, firmware file path, and firmware file name. Press the “Upgradebutton in
the “FTP Upgrade” section and the CPE will start to download the firmware from the
FTP server and upgrade. The CPE will automatically reboot itself afterwards. Please
refer to Figure 2-30 for more details.
To perform TFTP upgrade, input the TFTP server IP address and the firmware
file path and press the “Upgrade” button in the “TFTP Upgrade” section. It takes
about 3 minutes for a CPE to download the firmware from a TFTP server and upgrade
it. The CPE automatically reboots itself afterwards. Please refer to Figure 2-32 for
more details.
Figure 2-30 Web/FTP Upgrade
2-30
Figure 2-31 Web Upgrade Summary
Figure 2-32 TFTP Upgrade
2-31
2.20. Recovery
Management Recovery (can only be accessed by administrator)
Both current firmware version and previous firmware version are shown in the
“Firmware Rollback” section. Firmware rollback can be performed by pressing the
“Rollback” button. Device configuration file that includes files such as, .configdb and
ddns.conf, can be uploaded from PC to CPE as well as downloaded from CPE to PC.
To restore a CPE back to factory default settings, just press the Factory Default”
button in the “Factory Default Settings” section. Please refer to Figure 2-33 for more
details.
Figure 2-33 Recovery
2-32
2.21. Reboot
Press the “Reboot” and “Yes” buttons to reboot the system. Please refer to
Figure 2-35 and Figure 2-35 for more details.
Figure 2-34 Reboot Button
2-33
Figure 2-35 Reboot Confirmation
2-34
1.3. Europe – EU Declaration of Conformity
This device complies with the essential requirements of the R&TTE Directive 1999/5/EC.
The following test methods have been applied in order to prove presumption of conformity
with the essential requirements of the R&TTE Directive 1999/5/EC:
- EN 60950-1: 2006+A11:2009
Safety of Information Technology Equipment
- EN50385 : (2002)
- Product standard to demonstrate the compliance of radio base stations and fixed terminal
stations for wireless telecommunication systems with the basic restrictions or the
reference levels related to human exposure to radio frequency electromagnetic fields
(110MHz - 40 GHz) - General public
EN 301 489-1 V1.8.1 (2008-04)
- Electromagnetic compatibility and Radio Spectrum Matters (ERM); Electro Magnetic
Compatibility (EMC) standard for radio equipment and services; Part 1: Common
technical requirements
EN 301 489-4 V1.4.1 (2009-05)
Electromagnetic compatibility and Radio spectrum Matters (ERM); ElectroMagnetic
Compatibility (EMC) standard for radio equipment and services; Part 4: Specific
conditions for fixed radio links, Broadband Data Transmission System Base stations,
ancillary equipment and services.
EN 302 326-2 V1.2.2 (2007-06)
Fixed Radio Systems; Multipoint Equipment and Antennas; Part 2: Harmonized EN
covering the essential requirements of article 3.2 of the R&TTE Directive for Digital
Multipoint Radio Equipment
EN 302 326-3 V1.3.1 (2008-02)
Fixed Radio Systems;Multipoint Equipment and Antennas;Part 3: Harmonized EN
covering the essential requirementsof article 3.2 of the R&TTE Directivefor Multipoint
Radio Antennas
0560
Česky
[Czech]
[Jméno výrobce] tímto prohlašuje, že tento [typ zařízení] je ve shodě se základními požadavky a
dalšími příslušnými ustanoveními směrnice 1999/5/ES.
Dansk Undertegnede [fabrikantens navn] erklærer herved, at følgende udstyr [udstyrets
2-35
[Danish] typebetegnelse] overholder de væsentlige krav og øvrige relevante krav i direktiv 1999/5/EF.
Deutsch
[German]
Hiermit erklärt [Name des Herstellers], dass sich das Gerät [Gerätetyp] in Übereinstimmung
mit den grundlegenden Anforderungen und den übrigen einschlägigen Bestimmungen der
Richtlinie 1999/5/EG befindet.
Eesti
[Estonian]
Käesolevaga kinnitab [tootja nimi = name of manufacturer] seadme [seadme tüüp = type of
equipment] vastavust direktiivi 1999/5/EÜ põhinõuetele ja nimetatud direktiivist tulenevatele
teistele asjakohastele sätetele.
English Hereby, [name of manufacturer], declares that this [type of equipment] is in compliance with the
essential requirements and other relevant provisions of Directive 1999/5/EC.
Español
[Spanish]
Por medio de la presente [nombre del fabricante] declara que el [clase de equipo] cumple con
los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva
1999/5/CE.
Ελληνική
[Greek]
ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ [name of manufacturer] ∆ΗΛΩΝΕΙ ΟΤΙ [type of equipment]
ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ ΟΥΣΙΩ∆ΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ
∆ΙΑΤΑΞΕΙΣ ΤΗΣ Ο∆ΗΓΙΑΣ 1999/5/ΕΚ.
Français
[French]
Par la présente [nom du fabricant] déclare que l'appareil [type d'appareil] est conforme aux
exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE.
Italiano
[Italian]
Con la presente [nome del costruttore] dichiara che questo [tipo di apparecchio] è conforme ai
requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE.
Latviski
[Latvian]
Ar šo [name of manufacturer / izgatavotāja nosaukums] deklarē, ka [type of equipment /
iekārtas tips] atbilst Direktīvas 1999/5/EK būtiskajām prasībām un citiem ar to saistītajiem
noteikumiem.
Lietuvių
[Lithuanian]
Šiuo [manufacturer name] deklaruoja, kad šis [equipment type] atitinka esminius reikalavimus
ir kitas 1999/5/EB Direktyvos nuostatas.
Nederlands
[Dutch]
Hierbij verklaart [naam van de fabrikant] dat het toestel [type van toestel] in overeenstemming
is met de essentiële eisen en de andere relevante bepalingen van richtlijn 1999/5/EG.
Malti
[Maltese]
Hawnhekk, [isem tal-manifattur], jiddikjara li dan [il-mudel tal-prodott] jikkonforma
mal-ħtiġijiet essenzjali u ma provvedimenti oħrajn relevanti li hemm fid-Dirrettiva 1999/5/EC.
Magyar
[Hungarian]
Alulírott, [gyártó neve] nyilatkozom, hogy a [... típus] megfelel a vonatkozó alapvetõ
követelményeknek és az 1999/5/EC irányelv egyéb elõírásainak.
Polski
[Polish]
Niniejszym [nazwa producenta] oświadcza, że [nazwa wyrobu] jest zgodny z zasadniczymi
wymogami oraz pozostałymi stosownymi postanowieniami Dyrektywy 1999/5/EC.
Português
[Portuguese]
[Nome do fabricante] declara que este [tipo de equipamento] está conforme com os requisitos
essenciais e outras disposições da Directiva 1999/5/CE.
Slovensko [Ime proizvajalca] izjavlja, da je ta [tip opreme] v skladu z bistvenimi zahtevami in ostalimi
2-36
[Slovenian] relevantnimi določili direktive 1999/5/ES.
Slovensky
[Slovak]
[Meno výrobcu] týmto vyhlasuje, že [typ zariadenia] spĺňa základné požiadavky a všetky
príslušné ustanovenia Smernice 1999/5/ES.
Suomi
[Finnish]
[Valmistaja = manufacturer] vakuuttaa täten että [type of equipment = laitteen tyyppimerkintä]
tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sitä koskevien direktiivin
muiden ehtojen mukainen.
Svenska
[Swedish]
Härmed intygar [företag] att denna [utrustningstyp] står I överensstämmelse med de väsentliga
egenskapskrav och övriga relevanta bestämmelser som framgår av direktiv 1999/5/EG.
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class
B digital device, pursuant to Part 15 of the FCC Rules. These limits are
designed to provide reasonable protection against harmful interference in a
residential installation. This equipment generates, uses and can radiate radio
frequency energy and, if not installed and used in accordance with the
instructions, may cause harmful interference to radio communications.
However, there is no guarantee that interference will not occur in a particular
installation. If this equipment does cause harmful interference to radio or
television reception, which can be determined by turning the equipment off and
on, the user is encouraged to try to correct the interference by one of the
following measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from that to
which the receiver is connected.
- Consult the dealer or an experienced radio/TV technician for help.
FCC Caution: Any changes or modifications not expressly approved by the
party responsible for compliance could void the user's authority to operate this
equipment.
This device complies with Part 15 of the FCC Rules. Operation is subject to the
following two conditions: (1) This device may not cause harmful interference,
and (2) this device must accept any interference received, including
interference that may cause undesired operation.
IMPORTANT NOTE:
2-37
Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an
uncontrolled environment. This equipment should be installed and operated
with minimum distance 20 cm between the radiator & your body.
This transmitter must not be co-located or operating in conjunction with any
other antenna or transmitter.
The availability of some specific channels and/or operational frequency bands
are country dependent and are firmware programmed at the factory to match
the intended destination. The firmware setting is not accessible by the end
user.
Due to the essential high output power natural of WiMAX device, use of this
device with other transmitter at the same time may exceed the FCC RF
exposure limit and such usage must be prohibited (unless such
co-transmission has been approved by FCC in the future).

Navigation menu