Green Packet Berhad OX250-GP Outdoor WiMAX CPE User Manual 0 5

Green Packet Berhad, Taiwan Outdoor WiMAX CPE 0 5

User Manual

 1     User Manual OX-250 WiMAX Outdoor CPE Version 0.5 Nov. 8 , 2010      This Document may be subject to change, please contact with us for the latest version.
 2Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.    These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.    However, there is no guarantee that interference will not occur in a particular installation.    If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:  -  Reorient or relocate the receiving antenna. -  Increase the separation between the equipment and receiver. -  Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. -  Consult the dealer or an experienced radio/TV technician for help.  FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment.  This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.  IMPORTANT NOTE: FCC Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 50cm between the radiator & your body.  This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.  Due to the essential high output power natural of WiMAX device, use of this device with other transmitter at the same time may exceed the FCC RF exposure limit and such usage must be prohibited (unless such co-transmission has been approved by FCC in the future).
 3History  Revision  Date of Issue  Scope Author 0.1  2010-10-14  First draft  IChia Lin. 0.2  2010-10-18  Add specification  IChia Lin 0.3 2010/1 0/26 Change min.30cm distance to 35cm,add install and ground guide  IChia Lin 0.4  2010/11/4  Update figure 70  IChia Lin 0.5  2010/11/8  Change min.35cm distance to 50cm  IChia Lin
 4Table of Contents History ...................................................................................................................................... 3 Table of Contents..................................................................................................................... 4 List of Figures.......................................................................................................................... 6 List of Tables............................................................................................................................ 9 1. Introduction...................................................................................................................11 1.1. Connect..............................................................................................................11 1.2. Logout............................................................................................................... 12 1.3. Status ................................................................................................................ 13 1.4. Device Status.................................................................................................... 13 1.5. Setup Wizard .................................................................................................... 15 2. Network.........................................................................................................................20 2.1. LAN.................................................................................................................... 20 2.1.1. IP........................................................................................................... 20 2.1.2. DHCP.................................................................................................... 21 2.2. WAN................................................................................................................... 23 2.2.1. WAN...................................................................................................... 24 2.2.2. DNS ...................................................................................................... 26 2.3. VLAN ................................................................................................................. 28 2.4. DDNS................................................................................................................. 29 3. Advanced Setting......................................................................................................... 32 3.1. NAT.................................................................................................................... 32 3.1.1. Port Forward........................................................................................ 32 3.1.2. Port Trigger.......................................................................................... 34 3.1.3. DMZ ...................................................................................................... 36 3.1.4. ALG ...................................................................................................... 37 3.2. Firewall.............................................................................................................. 38 3.2.1. IP Filter................................................................................................. 38 3.2.2. DOS ...................................................................................................... 40 3.3. Route................................................................................................................. 41 3.3.1. Static Route ......................................................................................... 41 3.3.2. RIP........................................................................................................ 43 3.4. UPnP.................................................................................................................. 46 3.4.1. UPnP Setting ....................................................................................... 46 3.5. IGMP Proxy....................................................................................................... 47 3.5.1. IGMP Proxy Setting............................................................................. 47 3.5.2. VPN Setting ......................................................................................... 48 3.6. PPTP.................................................................................................................. 48 3.6.1. PPTP Server ........................................................................................ 48 3.6.2. PPTP Client.......................................................................................... 51 3.6.3. L2TP ..................................................................................................... 53 3.6.4. L2TP Server......................................................................................... 53 3.6.5. L2TP Client .......................................................................................... 57 3.7. IPSec ................................................................................................................. 59 3.7.1. Connection .......................................................................................... 59 4. WiMAX...........................................................................................................................64 4.1. Profile................................................................................................................ 64 4.1.1. Connect Settings ................................................................................ 65
 54.1.2. Frequency Settings............................................................................. 67 4.1.3. Authentication Settings ..................................................................... 69 4.2. Connect............................................................................................................. 72 4.3. Wide Scan......................................................................................................... 73 4.4. Link Status........................................................................................................ 74 4.5. Link Statistics................................................................................................... 75 4.6. Connection Info................................................................................................ 76 4.7. Service Flow..................................................................................................... 76 5. Administrator ............................................................................................................... 77 5.1. Remote Control................................................................................................ 77 5.1.1. HTTP..................................................................................................... 78 5.1.2. TELNET................................................................................................ 79 5.1.3. SSH....................................................................................................... 80 5.1.4. SNMP.................................................................................................... 81 5.1.5. TR-069.................................................................................................. 82 5.1.6. OMA-DM............................................................................................... 84 5.2. Password.......................................................................................................... 86 6. System ..........................................................................................................................88 6.1. Date and Time .................................................................................................. 88 6.1.1. Date ...................................................................................................... 89 6.1.2. Time Zone............................................................................................ 89 6.2. Upgrade Firmware ........................................................................................... 90 6.2.1. Upgrade File ........................................................................................ 90 6.2.2. Upgrade Link....................................................................................... 91 6.3. Log..................................................................................................................... 92 6.4. Backup/Restore................................................................................................ 92 6.4.1. Configuration Backup ........................................................................ 92 6.4.2. Configuration Restore........................................................................ 94 6.4.3. Factory Defaults.................................................................................. 95 7. Installing and grounding device................................................................................. 97 Specification ........................................................................................................................ 100
 6 List of Figures Figure 1 Login page....................................................................................................... 12 Figure 2 Logout.............................................................................................................. 12 Figure 3 Status window................................................................................................. 13 Figure 4 Device status................................................................................................... 14 Figure 5 Setup Wizard ................................................................................................... 15 Figure 6 Wizard LAN Settings in Setup Wizard .......................................................... 16 Figure 7 WiMAX Frequency Settings By List in Setup Wizard.................................. 17 Figure 8 WiMAX Frequency Settings By Range in Setup Wizard............................. 17 Figure 9 WiMAX Authentication Settings in Setup Wizard........................................ 18 Figure 10 Wizard Save..................................................................................................... 19 Figure 11 Network Topology........................................................................................... 20 Figure 12 Network>LAN>IP............................................................................................. 20 Figure 13 Network>LAN>DHCP...................................................................................... 22 Figure 14 Network>WAN>WAN....................................................................................... 24 Figure 15 Network>WAN>DNS ....................................................................................... 26 Figure 16 Network>VLAN................................................................................................ 28 Figure 17 Network>DDNS ............................................................................................... 30 Figure 18 Advanced>NAT>Port Forward....................................................................... 33 Figure 19 Advanced>NAT>Port Trigger......................................................................... 34 Figure 20 Advanced>NAT>DMZ...................................................................................... 36 Figure 21 Advanced>NAT>ALG...................................................................................... 37 Figure 22 Advanced>Firewall>IP Filter.......................................................................... 38 Figure 23 Advanced>Firewall>DDOS............................................................................. 40 Figure 24 Advanced>Route>Static Route ..................................................................... 41
 7Figure 25 Advanced>Route>Static Route>Add ............................................................ 41 Figure 26 Advanced>Route>RIP .................................................................................... 43 Figure 27 Advanced UPnP .............................................................................................. 46 Figure 28 Advanced>IGMP Proxy .................................................................................. 47 Figure 29 VPN>PPTP>Server.......................................................................................... 49 Figure 30 VPN>PPTP>Client........................................................................................... 51 Figure 31 VPN>PPTP>Client>Add.................................................................................. 51 Figure 32 VPN>L2TP>Server .......................................................................................... 54 Figure 33 VPN>L2TP>Client ........................................................................................... 57 Figure 34 VPN>L2TP>Client>Add .................................................................................. 57 Figure 35 VPN>IPsec Overview...................................................................................... 59 Figure 36 VPN>IPsec>Add.............................................................................................. 60 Figure 37 Wireless Broadband Access.......................................................................... 64 Figure 38 WiMAX>ProfiIe>Connect Settings ................................................................ 65 Figure 39 WiMAX>Profile>Frequency Settings>By List .............................................. 67 Figure 40 WiMAX>Profile>Frequency Settings>By Range.......................................... 68 Figure 41 WiMAX>ProfiIe>Authenticaton Settings (No Authentication).................... 69 Figure 42 WiMAX>ProfiIe>Authenticaton Settings (User Authentication)................. 70 Figure 43 WiMAX>Connect>Connect ............................................................................ 72 Figure 44 WiMAX>Wide Scan ......................................................................................... 73 Figure 45 WiMAX>link Status ......................................................................................... 74 Figure 46 WiMAX Link Statistics .................................................................................... 75 Figure 47 WiMAX Connection Info................................................................................. 76 Figure 48 WiMAX Service Flow ...................................................................................... 76 Figure 49 Administration>Remote Control>HTTP........................................................ 78 Figure 50 Administration>Remote Control>Telnet....................................................... 79 Figure 51 Administration>Remote Control>SSH.......................................................... 80
 8Figure 52 Administration>Remote Control>SNMP....................................................... 81 Figure 53 Administration>Remote Control>TR-069..................................................... 82 Figure 54 Administration>Remote Control>OMA-DM.................................................. 84 Figure 55 Administrator>Password ............................................................................... 86 Figure 56 System>Date/Time>Date................................................................................ 88 Figure 57 System>Date/Time>Time Zone...................................................................... 89 Figure 58 System>Upgrade Firmware>Upgrade File ................................................... 90 Figure 59 System>Upgrade Firmware>Upgrade Link.................................................. 91 Figure 60 System Log...................................................................................................... 92 Figure 61 System>Backup/Restore>Backup ................................................................ 92 Figure 62 File Download.................................................................................................. 93 Figure 63 Save File As..................................................................................................... 93 Figure 64 System>Backup/Restore>Restore................................................................ 94 Figure 65 System>Backup/Restore>Factory Defaults ................................................. 95 Figure 66 Restore to factory reset warning .................................................................. 96 Figure 67 Mounting accessory list....................................................................................... 97 Figure 68 Pole-Mount the Outdoor CPE Device ................................................................. 98 Figure 69 Wall-Mount the Outdoor CPE Device.................................................................. 98 Figure 70 Connect the ground wire ..................................................................................... 99
 9List of Tables Table 1 Button definition shown on Setup Wizard ................................................... 15 Table 2 Field definition for Network>LAN>IP ............................................................ 21 Table 3 Field definition for Network>LAN>DHCP ..................................................... 23 Table 4 Field definition for Network>WAN>WAN ...................................................... 26 Table 5 Field definition for Network>WAN>DNS....................................................... 27 Table 6 Field definition for Network>VLAN ............................................................... 29 Table 7 Field definition for Network>DDNS............................................................... 31 Table 8 Field definition for Advanced>NAT>Port Forward ...................................... 33 Table 9 Field definition for Advanced>NAT>Port Trigger ........................................ 35 Table 10 Field definition for Advanced> Firewall>IP Filter ........................................ 39 Table 11 Field definition for Advanced> Firewall>DDOS........................................... 40 Table 12 Field definition for Advanced>Route>Static Route..................................... 42 Table 13 Field definition for Advanced>Route>RIP.................................................... 45 Table 14 Field definition for Advanced> UPnP............................................................ 46 Table 15 Field definition for Advanced>IGMP Proxy.................................................. 47 Table 16 Field definition for VPN>PPTP>Server ......................................................... 51 Table 17 Field definition for VPN>PPTP>Client .......................................................... 52 Table 18 Field definition for VPN>L2TP>Server.......................................................... 56 Table 19 Field definition for VPN>L2TP>Client>Add.................................................. 58 Table 20 Field definition for VPN>IPsec>Add ............................................................. 63 Table 21 Field definition for WiMAX>ProfiIe>Connect Settings................................ 67 Table 22 Field definition for WiMAX>Profile>Frequency Settings>By Range......... 69 Table 23 Field definition for WiMAX>ProfiIe>Authentication Settings..................... 72 Table 24 Field definition for WiMAX>Connect>Connect............................................ 73 Table 25 Field definition for WiMAX>Wide Scan......................................................... 74 Table 26 Field definition for Administration>Remote Control>HTTP ....................... 78
 10Table 27 Field definition for Administration>Remote Control>Telnet ...................... 79 Table 28 Field definition for Administration>Remote Control>SSH ......................... 80 Table 29 Field definition for Administration>Remote Control>SNMP ...................... 81 Table 30 Field definition for Administration>Remote Control>TR-069..................... 83 Table 31 Field definition for Administration>Remote Control>OMA-DM ................. 85 Table 32 Field definition for Administrator>Password............................................... 87 Table 33 Field definition for Administrator>Password............................................... 89 Table 34 Field definition for System>Date/Time>Time Zone..................................... 90 Table 35 Field definition for System>Upgrade Firmware>Upgrade File................... 91 Table 36 Field definition for System>Upgrade Firmware>Upgrade Link ................. 91 Table 37 Field definition for System>Backup/Restore>Backup................................ 94 Table 38 System>Backup/Restore>Restore................................................................ 95
 111. Introduction The WiMAX Outdoor CPE Software platform comes with a Web-based Configuration Manager, which gives users the ability to manage, configure and analyze the platforms environment. The Connection Manager works with all versions of Windows after Windows 95. The supported browser version:   Internet Explorer 6.0 or later (Recommended)   Netscape 7.1 and higher   Firefox 1.0 and higher   Mozilla 1.5 and higher 1.1. Connect Users need to connect to the WiMAX Outdoor CPE platform. It’s assumed that the user has a fully working WiMAX Out door CPE plat form and properly connected. From the web b rowser connect to the device, ent ering the IP address of the device; it  will prompt user to e nter the username and password. The default usernames and passwords are as follows. Username/password  Operator/o perator  gue st/guest
 12   Figure 1  Login page 1.2. Logout The “Log out” wind ow allows users to  disconnect from the d evice and  exit the W eb-based Configuration Manager.  Figure 2  Logout
 131.3. Status After user has established a connection, user will see the “Status” window. This window shows all the status and system information. It gives us er an initial overview of the current st atus of the device.    Figure 3  Status window 1.4. Device Status The “Device  status” wi ndow displ ays firmwa re versi on informatio n of the WiMAX Out door CPE.
 14 Figure 4  Device status
 151.5. Setup Wizard The setup wizard will allow user to quickly configure the basic networking settings on the CPE. Click the “Setup Wizard” menu item to enter the wizard. The first page will display all the steps necessary to complete the wizard settings as shown in Figure 5. Later, click the “Next” button to continue the next steps. The definition of each button shown on web page is defined in the Table 1.  Figure 5  Setup Wizard  Name  Description Next  Continue to the next step Back  Return to the previous step Save  Commit the changes made and save to WiMAX outdoor CPE Table 1  Button definition shown on Setup Wizard
 16 Step 1: LAN Settings. In this  step user can configure both IP  and DHCP configuration parameters as shown in Figure 6.  Figure 6  Wizard LAN Settings in Setup Wizard
 17 Step2:  WiMAX Frequency Settings.  This  step will qui ckly configure the WiMAX  frequencies. There are two types of configuring the frequencies. User can configure it through simply entering a frequ ency in the frequen cy list as  shown in Fig ure 7 or by gi ving a starting and ending frequency value and a step size to traverse the range as shown in Figure 8.  Figure 7  WiMAX Frequency Settings By List in Setup Wizard  Figure 8  WiMAX Frequency Settings By Range in Setup Wizard
 18 Step 3: WiMAX Authen tication Settings. Thi s will config ure WiMAX Auth entication settings. There are 4 possible options for “Aut hentication Mode” as No  authentication, User authentication, Device au thentication, and Us er an d device aut hentication. Dep ending o n which mode user selects, and it will appear different EAP settings for configuration. Except “No authentication” is selected, user needs to define the EAP supplicant as shown in Figure 9.  Figure 9  WiMAX Authentication Settings in Setup Wizard  Detailed definition of each item in EAP supplicant is listed below.   EAP Mode:  WiMAX out door CPE suppor ts EAP-TLS, EAP-TTL S, EAP-SIM, and  EAP-AKA.   Anonymous ID: User needs to fill the Outer ID at this field.   Inner Mode: WiMAX out door CPE supports MS-CHAPv2, MS-CHAP, CHAP, MD5, and PAP.   Username: User needs to fill username at this field.     Password: User needs to fill password at this field.  Once the u ser compl etes all the ste ps, user  needs to click the  “Save” b utton to save th e settings, or click “Ba ck” button to return to  previous step as shown in Figure 10. It will reload some services and return to the “Home” window after saving all settings.
 19 Figure 10  Wizard Save
 202. Network Refer to Figure 101, for proper network connection.  Figure 11  Network Topology 2.1. LAN 2.1.1. IP From the “Network>LAN>IP” window, user can update the LAN information as shown in Figure 12. The definition for each field is shown on Table 2.    Figure 12  Network>LAN>IP
 21 Name  Description IP Address  IP address of the WiMAX outdoor CPE IP Subnet Mask  Subnet Mask of the WiMAX outdoor CPE Save  Commits the  chan ges m ade, and set the LAN IP  information , some services will be reloaded. Cancel  Reset the fields to the last saved values Table 2  Field definition for Network>LAN>IP   2.1.2. DHCP Use the “Net work>LAN>DHCP” t ab to  configure the DHCP  serve r inform ation. The defa ult DHCP Server setup is ena bled, and user co uld disable this functi on from setu p as sho wn in Figure 13. When user disables the DHCP server, it requires to set a static IP address on host PC for CPE to configure. Please be noted that without the static IP address set properly on the host PC, user can not open the CPE web page for configuration. When DHCP  se rver i s e nabled, user need s to  define the IP  pool range f or dyn amically assigning the IP address. The advant age of usi ng DHCP server is that the addre sses which are no longer in use  will be returned to  the IP address pool so that the server can reallocate them to other machines in the network. There are three DNS servers the user can configure to assign an IP address. Static DHCP will assign an IP address on the LAN to a specific device based on its MAC address. The definition for each field is shown on Table 3.
 22 Figure 13 Network>LAN>DHCP
 23 Name  Description Enable If the enable box is ch ecked for D HCP server, the DHCP  server will assig n IP addre ss to it s clie nt with the sp ecified IP  addre ss range. Start IP  Starting IP address range End IP  Ending IP address range Lease Time The lea se time is a cont rolled time p eriod, allo wing the DHCP  server to reclaim (and then reallocate) IP addresses that are  not renewed (dynamic re -use of IP  ad dresses). Le ase tim e i s measured in minutes in the Configuration Manager. First DNS Server Second DNS Server Third DNS Server User can sp ecify three DNS serve r and  select how the DNS  Server is assigned. There are three options for assigning the DNS server.  From ISP  User Defined  Non e If user sel ects “None”, then the DH CP server will no t give clients the DNS se rver inform ation. If a ll the three DNS servers setting  are set to “Non e”, then the DHCP  server will u se the LAN IP  address as the DNS server information for the clients. If the user chooses “User Defined” and leaves the IP address as “0.0.0.0” it will change the field to “None”. Add  Click on the “Add” button to enter a static leased IP address. Enter the MAC address of the Ethernet device and enter the IP address.OK  Click the “OK” button to exit out of edit mode. Save  Commit the  changes ma de an d save  to WiMAX  outdoor CPE, some services will be reloaded. Cancel  Reset fields to the last saved values. Table 3  Field definition for Network>LAN>DHCP  2.2. WAN The wide area netwo rk i s anothe r network that user can conn ect to the internet with the
 24WiMAX outdoor CPE. 2.2.1. WAN In Figure 14, it demonstrates ho w to co nfigure WAN IP on CPE web p age. The definition for  each field is shown on Table 4.    Figure 14  Network>WAN>WAN
 25 Name  Description Operation Mode Select the WAN operation mode  Bridge  Routin g  NA T WAN Protocol Select the WAN encapsulation protocol  Ethernet  PPPoE Get IP Method Enter the IP method  From ISP  Us er WAN IP Request Timeout The time the  DHCP client waits to re ceive the IP  address from the BS. If it  doesn’t get the IP , it will  timeout and the CPE will  disconnect the WiMAX conne ction. T he default value is 12 0 seconds. If u ser ente rs 0, it will wait to  receive the IP  addre ss infinitely until it’s stopped by the user. WAN IP Address  If user chooses “User” for IP Method, user should enter the WAN IP address WIN IP Subnet Mask  If user chooses “User” for IP Method, user should enter the WAN IP subnet mask. Gateway IP Address  If us er chooses “User” for IP  Method, use r shou ld enter IP  gateway address MTU  Enter the MTU Clone MAC Address  Enter the clone MAC address to be used by WAN PPPoE Setting User Name  The user name to c onnect PPPoE s erver via the selec ted Auth Protocol Password  The password of the corresponding username Retype Password  Type the “Password” again Auth Protocol The a uthentication protocol of t he p eer re quired. S elect which Authentication protocol to use.  P AP  CHAP  MSCHAPv1  MSCHAPv2
 26Encryption Encryption Scheme No MPPE 40 bits: 40-bit encryption with MPPE MPPE 128 bits: 128-bit encryption with MPPE Auto: automatically selected Idle Timeout  Disconnect if the link is idle for the assigned seconds AC Name  The name of the access concentrator to connection to Save Commit the  changes ma de and  save to WiMAX ou tdoor CPE, after clicking the Save button user will get a message aski ng if user want s t o reb oot the  CPE. Reb oot is ne cessary for the  device to switch to a different profile. Cancel  Reset field to the last saved values   Table 4  Field definition for Network>WAN>WAN  2.2.2. DNS In Figure 15, it demonstrates how to configure WAN DNS on CPE web page. The definition for each field is shown on Table 5.  Figure 15  Network>WAN>DNS
 27 Name  Description First DNS Server Enter the WAN DNS information.  User Defined  From ISP If user sele cts “User Define”, u ser n eeds to ente r a valid IP  address for the DNS server. Second DNS Server  Same as First DNS Server Third DNS Server  Same as First DNS Server Save  Commit the changes made and save to WiMAX outdoor CPE Cancel  Reset fields to the last saved values Table 5  Field definition for Network>WAN>DNS
 282.3. VLAN In Figure 16, it demonstrates how to configure VLAN setting on CPE web page. The definition for each field is shown on Table 6.  Figure 16  Network>VLAN
 29 Name  Description Management VLAN VLAN ID  Setting the management VLAN ID Priority  Setting the management Priority Port Settings PVID Group  Select the VLAN group as the PVID Priority  Setting the port priority VLAN Rule VID  Setting the VID of this group Join  Add this port into this group Tag  Mark the out-going packets of this port i n this VLAN as tagged or untagged Save  Commit the changes made and save to the CPE device Cancel  Reset fields to the last saved values Table 6  Field definition for Network>VLAN 2.4. DDNS DDNS st ands for Dy namic Dom ain N ame Serv ices. It provides a function to conve rt the domain name to the unique IP address. With DDNS, users is able to find and connect to CPE no matter what IP address CPE is curre ntly using, that is, DDNS can map CP E's dynamic IP address to a static hostname. The best profit of this  function allows user to access CPE from everywhere. In Figure 17,  it demonst rates how to confi gure DDNS on CPE  web page. The definition for each field is shown on Table 7.
 30 Figure 17  Network>DDNS
 31 Name  Description Enable Dynamic DNS  Click the check box to enable dynamic DNS Service Provider  Enter the URL of the Service Provider Service Type* Enter the service type (DYNDNS only)  Dynami c  St atic  Cu stom Domain Name  Enter the domain name Login Name  Enter the username Password  Enter the password IP Update Policy Select the Policy to be used  Auto Detect  WA N IP  User Defined User Defined IP  If user sele cts “User Defined” as the IP  policy, user has to ente r the IP address. Wildcards* Allow hostname to use wildcards such as “* ”. It will allow “*host.dyndns.org” to  be aliased to th e sa me IP  address a s “host.hyndns.org” MX*  Enable mail routing Back MX*  Enable Second mail routing MX Host*  Host that mail will be routed to Save  Commit the changes made and save to WiMAX outdoor CPE Cancel  Reset fields to the last saved values Note: * Supported by DYNDNS service provider. Table 7  Field definition for Network>DDNS
 323. Advanced Setting The “Advanced Settings” window will allow user to set rules for incoming and outgoing traffic. 3.1. NAT Network Add ress Translation (NA T) i s the  process of modif ying the net work address information o f the host in a p acket whil e in  transit, so that it ca n be rem apped to a given address space in another network. For example, the source address of a packet in a network is changed to a different IP address known within another network. 3.1.1. Port Forward Port forwarding, as the literal meaning, is the act of forwarding the data from WAN side to the particular port of the private IP. This function can allow remote computers to reach a port on a private IP address within a private LAN. In the following, it will  introduce how to setup for Port Forward. First, user needs to click the “Add” button and then select which forward type, TCP or UDP or TCP/UDP, is p referred to trig ger the special application as shown in Figure 18. User needs to assign some specific port for the WAN IP to be forwarded to the defined LAN IP and port, and then click the “Save” button to add a Port Forward rule. The definition for each field is shown on Table 8.
 33 Figure 18  Advanced>NAT>Port Forward  Name  Description Activate  Check the box to activate the “Port Forward” rule Name  Name of the Port Forward rule Protocol  User ne eds to define the desired  protocol for rul e. A vailable options are: TCP, UDP, or TCP/UDP Incoming Port(s)  User nee ds to define inco ming port ra nge for Port Forwardin g rule. Forward Port(s) User needs to define to which port range will be translated for Port Forwarding rule. The p acket will  be forwarded to one of these ports if it matches the rule. Server IP User ne eds to define whi ch IP  address will be translated to if it matches the Port Forwarding rule. The packet will be forwarded to this IP address if it matches the rule. Trash  Delete the Port Forward rule Add  Click the “Add” button to create a new Port Forward rule OK  Click the “OK” button to exit table edit mode Save  Commit the changes made and save to the CPE Cancel  Reset field to the last saved values. Table 8  Field definition for Advanced>NAT>Port Forward
 343.1.2. Port Trigger The “Advanced>NAT>Port Trigger” tab allows user to configure Port Trigger rules. Port Trigger is a way to automate port forwarding in which outbound traffic on predetermined ports (‘trigger port’) causes inboun d traf fic to spe cific incomi ng po rts to be dyn amically forwarde d to the initiating host, while the  outbound ports are in use. This allows users behind WiMAX outdoor CPE on the  LAN to provide se rvices t hat woul d no rmally re quire the com puter to have IP  address on the LAN. Port triggering triggers an open incoming port (‘open port’) when a client on the local network makes an outgoing connection on a predetermined port or range of ports. The definition for each field is shown on Table 9.  Figure 19  Advanced>NAT>Port Trigger
 35 Name  Description Activate  Check the box to activate the Port Trigger rule Name  Name of the Port Trigger rule Protocol  It defines which protocol the outgoing packet used will trigger th e rule. Available options are TCP, UDP or TCP/UDP Trigger Port(s)  It defines which port range the outgoing packet will trigger the rule. User needs to enter the starting and ending port range Open Protocol  It defines wh ich protocol will be open ed if the rule had bee n triggered. Available options are TCP, UDP or TCP/UDP Trash  Delete the Port Trigger rule Add  Click the “Add” button to enter a Port Trigger rule OK  Click the “OK” button to exit, table edit mode. Save  Commit the changes made and save to the CPE Cancel  Reset fields to the last saved vaules Table 9  Field definition for Advanced>NAT>Port Trigger
 363.1.3. DMZ DMZ stands for Demilitarized Zone. It is a phy sical or logi cal sub-network that contains and exposes an organization's external services to a larger un-trusted network, usually the Internet. The term is normally referred to as a DMZ by IT professionals. It is sometimes referred to as a Perimeter Ne twork. The p urpose of a DMZ is  to add an additio nal layer of se curity to an organization's LAN; an external attacker only has access to equipment in the DMZ, rather than any other part of the network. The “Advanced>NAT>DMZ” tab allows user to configure a DMZ h ost IP address as shown in Figure 20. In DMZ Setting s, user needs to enter the IP address of the DMZ h ost. The “Save” button will save the changes to WiMAX outdoor CPE and the “Cancel” button will reset the field to last saved value. It will disable DMZ host when entering “0.0.0.0”.  Figure 20  Advanced>NAT>DMZ
 373.1.4. ALG There a re th ree AL Gs th at use r can enable from  “Advanced>NAT>ALG” t ab. ALG allo ws legitimate ap plication traf fic to p ass throu gh the WiMAX out door CPE that would have  otherwise re stricted. Wit hout ALG s, some  application may n ot work well  beca use of NAT/firewall settings. User could click on the check box to enable ALGs. Note: If user is using any of these types of application protocols user needs to enable them in the ALG settings.  FTP  ALG  H.323 ALG  PPTP  ALG   Enable SIP ALG set BSID  Figure 21  Advanced>NAT>ALG
 383.2. Firewall In networking, firewalls a re used to blo ck un-wanted traffic or prevent fr om DDOS att acks. It will prevent unauthorized devices to enter a trusted network.   3.2.1. IP Filter The IP filter rules will drop or discard traffic that the filter criteria. User can define IP filter rules as shown in Figure 22. The definition for each field is shown on Table 10.  Figure 22  Advanced>Firewall>IP Filter
 39 Name  Description Add  Click the "Add" button to create a new IP Filter rule OK  Click the "OK" button will exit the table edit mode Active  Check the box to activate the IP Filter rule Source IP  Source IP to filter on. It can be in one of the following formats: IP address (ex. 192.168.0.222) Subnet (ex. 192.168.1.0/24) IP range (ex. 192.168.0.150~192.168.0.160) 0.0.0.0/0 means any   Source Port  Source Port to filter on. It can be one of the following formats: Port number (ex. 8080) Port Range (ex. 1024~2048) Destination IP  Destination IP to filter on. It can be in one of the following formats:IP address (ex. 192.168.0.222) Subnet (ex. 192.168.1.0/24) IP range (ex. 192.168.0.150~192.168.0.160) 0.0.0.0/0 means any Destination Port  Destination port to filter on. It can be one of the following formats:Port number (ex. 8080) Port Range (ex. 1024~2048) Protocol  Protocol to filter on Trash  Delete the IP Filter rule Save  Commit the changes made and save to WiMAX outdoor CPE Cancel  Reset fields to the last saved values Table 10  Field definition for Advanced> Firewall>IP Filter
 403.2.2. DOS Before taking about the DDOS service, it will introduce DDOS Attack first. DDOS attack stands for denial-of-service attack (DoS attack) or distributed denial-of-service attack. It is an attempt to make a computer resource unavailable to its intended users. One common method of attack involves saturating the targeted machine with extern al communications requests, such that it cannot re spond to legitim ate traf fic, or res ponds so slo wly as  to be ren dered ef fectively unavailable. DDOS se rvice here is used to prevent DDOS At tack, and it provides T CP SYN Flood, UDP Flood, ICMP  Flood, and Port Scan for  selection. Th e definition for each field is shown on Table 11.    Figure 23  Advanced>Firewall>DDOS  Name  Description TCP SYN Flood  It will prevent SYN flood from WAN or LAN UDP Flood  It will prevent UDP flood to WiMAX outdoor CPE ICMP Flood  It will prevent ICMP flood from WAN or LAN Port Scan  It will prevent port scanning from WAN and issue an alarm entry in the system log. Save  Commit the changes made and save to WiMAX outdoor CPE Cancel  Reset fields to the last saved values. Table 11  Field definition for Advanced> Firewall>DDOS
 413.3. Route A route is a path in a network, which can direct the flow of network traffic. 3.3.1. Static Route The static route is a ha rd coded p ath in the router that sp ecifies how it will get to a cert ain subnet by using a defined path. User could manually add routes to routing table as shown in Figure 24 and Figure 25. The definition for each field is shown on Table 12.  Figure 24  Advanced>Route>Static Route  Figure 25  Advanced>Route>Static Route>Add
 42 Name  Description Destination IP  Enter the Destination IP address user would like to reach Subnet Mask  Enter the subnet mask. Next Hop Select where the next hop will be.   WAN or LAN interface directly  IP  Address Metric  Enter the metric value, “cost” of transmission for routing purposesTrash  Will remove the selected route Add  Will enter in edit mode to add a static route Save  Commit the changes made and save to WiMAX outdoor CPE Cancel  Reset fields to the last saved values Table 12  Field definition for Advanced>Route>Static Route
 433.3.2. RIP The Ro uting Information  Protocol (RI P) is a dy namic ro uting protocol u sed in local a rea networks. It allows a  router to exchan ge ro uting inf ormation with  other route rs. User  could setup the RIP routing rul e as  shown in Figure  26. The definitio n for each fiel d is sho wn on  Table 13.  Figure 26  Advanced>Route>RIP
 44 Name  Description General Setup | Enable  Clicking the enable check box will activate the RIP routing rule Redistribute Edit Click the “Edit” button to  activate the st atic ro ute or chan ge the metric value. The static route refers to the static routes defined in Advanced>Route>Static Route window Redistribute | OK  Click the “OK” button to exit edit table mode LAN Direction  Non e  RX  TX  RX/TX Version If user selects “RX, TX or RX/TX”  for Direction, user will  get the following RIP version options available.  RIP-1  RIP-2B  RIP-2M Authentication If user select s RIP-2B or  RIP-2M for V ersion, user  will get the following Authentication options.  Non e  Te x t   MD5 Authentication ID  If user sele cts “MD5” for  Authentication type, user can ente r the authentication ID and Key Authentication Key If user enters “text” for  Authentication, user ca n enter a text authentication key. If user enters  “MD5” for Authenti cation type,  user also needs to enter an Authentication ID and Key. WAN Direction  Non e  RX  TX  RX/TX Version If user selects “RX, TX or RX/TX”  for Direction, user will  get the following RIP version options available.  RIP-1  RIP-2B  RIP-2M
 45Name  Description Authentication If user select s RIP-2B or  RIP-2M for V ersion, user  will get the following Authentication options.  Non e  Te x t   MD5 Authentication ID  If user sele cts “MD5” for  Authentication type, user can ente r the authentication ID and Key Authentication Key If user enters “text” for  Authentication, user ca n enter a text authentication key. If user enters  “MD5” for Authenti cation type,  user also needs to enter an Authentication ID and Key. Save  Commit the changes made and save to WiMAX outdoor CPE Cancel  Reset fields to the last saved values Table 13  Field definition for Advanced>Route>RIP
 463.4. UPnP Two methods of simplifying the process of connecting a device to the network are available as shown in Figure 27. UPnP allows devices to connect seamlessly to networks in the home (data sharing, communications, and e ntertainment) a nd in  co rporate e nvironments for sim plified installation o f compute r components. NA T Po rt Mappin g Pro tocol (NAP-P MP) allo ws a computer in a privae network (b ehind a NA T router) to automatically configu re the router to  allow parties outside the private network to contact itself. The definition for each field of UPnP Setting is shown on Table 14. 3.4.1. UPnP Setting  Figure 27  Advanced UPnP  Name  Description Enable UPnP  Check the check box to enable UPnP Enable NAT-PMP  Check the check box to enable NAT-PMP Save  Commit the changes made and save to WiMAX outdoor CPE Cancel  Reset fields to the last saved values Table 14  Field definition for Advanced> UPnP
 473.5. IGMP Proxy IGMP proxy enabl es the  system to issue IGMP  ho st message s on beh alf of host s that th e system discovered through standard IGMP interface. The system acts as a proxy for its hosts. 3.5.1.  IGMP Proxy Setting Internet Gro up Mana gement Protocol (IGMP)  proxy can be used to imple ment multica st routing. It works by IGMP  frame forwarding, and commonly is used when the re is no need to  use more advanced protocol, for exam ple PIM. In WiMAX outdoor WiMAXx CPE, it provides IGMP Proxy function, and user can enable or disable this function from Web page as shown in Figure 28.    Figure 28  Advanced>IGMP Proxy  Name  Description Enable IGMP Proxy  Check the check box to enable IGMP Proxy Save  Commit the changes made and save to WiMAX outdoor CPE Cancel  Reset field to the last saved values Table 15  Field definition for Advanced>IGMP Proxy
 483.5.2. VPN Setting VPN (Virtual Private Network) is a network that is implemented in an additional software layer on top of an existing larger network for the purpose of providing a secure extension of a private network into an insecure network such as the Internet. The links between nodes of a VPN are formed over logical connections or virtual circuits between hosts of the larger network.   VPNs are often installed by organizations to provide remote access to a secure organizational network. G enerally, a V PN has a n etwork t opology more  complex than a point-to -point connection. VPNs are also used to mask the IP  a ddress of individual comp uters withi n the Internet in order, for instance, to surf the World Wide Web anonymously or to access location restricted services, such as Internet television. Here, VPN Settings  allow us er to set rules for VPN, and it supports PPTP, L2TP, and IPsec. 3.6. PPTP The Point-to-Point T unneling Protocol (PPTP)  is a method for i mplementing virtual private  networks. PPTP does not provide c onfidentiality or encryptio n; it relies on the proto col being tunneled to provide privacy. 3.6.1. PPTP Server A PPTP  Server (Point -To-Point Tunneling Proto col) allows user t o con nect se curely from a place (such as the hou se) to a LAN located in  another location, such a s the of fice. This wa y user can use the services provided in the office at the comfort of the  house. The definition for each field of PPTP Server is shown on Table 16.
 49 Figure 29  VPN>PPTP>Server
 50 Name  Description PPTP Server Enable    Activate PPTP server. Server Name    Offer a service name Auth Protocol Require the peer to auth enticate itself before allowing netwo rk packets to be sent or received. We support the following protocol:  PAP: Password Authentication Protocol   CHAP: Challenge Handshake Authentication Protocol   MSCHAP: Microsoft Chall enge Han dshake Authentication Protocol   MSCHAPv2: Microsoft Challenge Handshake Authentication Protocol, Version 2 Encryption Encryption Scheme: None MPPE 40 bits: 40-bit encryption with MPPE MPPE 128 bits: 128-bit encryption with MPPE Auto: automatically select Local IP Address  The IP of router Remote Start IP  As sessions are established, IP addresses are assig ned starting from “Remote Start IP” Idle Timeout  Disconnect if the link is idle for the assigned seconds DNS Server 1  The primary DNS (Domain Name Server) addresses to clients DNS Server 2 The secondary DNS (Domain Name Server) addresses to clientsUser Access List User name  User ID to connect PPTP server via the selected Auth Protocol Server  Server protocol type Password  Password to connect PPTP server via the selected Auth ProtocolIP address  IP address of the connected client Connection List User name  The user name of the connection Remote IP address  The peer address of the connection PPTP IP address  The assigned IP address of PPTP Login Time  The time of the connection created Link Time(s)  Timer from the connected time Save  Commit the changes made and save to the CPE Cancel  Reset fields to the last saved values
 51Table 16  Field definition for VPN>PPTP>Server 3.6.2. PPTP Client User could setup PPTP  Client as sh own in Fi gure 30 and Figu re 31. The definition for each  field of PPTP Client is shown on Table 17.  Figure 30  VPN>PPTP>Client  Figure 31  VPN>PPTP>Client>Add
 52 Name  Description PPTP Client Add  Add a new connection setting Edit  Edit the existed connection setting Edit PPTP Client Profile Name  The name for this connection setting Auth Protocol The Authe ntication protocol of t he p eer requi red. Select  which Authentication protocol to use.  P AP  CHAP  MSCHAPv1  MSCHAPv2 Encryption Enc ryption scheme Server IP Address  The IP address of PPTP server Username  The use r ID to  conne ct PPTP  server via the s elected Auth Protocol Password  The password of the corresponding user ID Retype  Type the “Password” again Get IP automatically?  Obtain the dynamic IP address, assigned by the PPTP server Assign IP Address  Assign the static IP address for this connection setting Idle Timeout  Disconnect if the link is idle for the assigned seconds Save  Commit the changes made and save to WiMAX outdoor CPE Cancel  Reset fields to the last saved values Table 17 Field definition for VPN>PPTP>Client
 533.6.3.  L2TP In com puter networking, L ayer 2  Tunneling Prot ocol (L2TP) is  a tunneli ng p rotocol used to  support virtual private networks (VPNs). It does not provide any encryption or confidentiality by itself. It relies on an encryption protocol that it passes within the tunnel to provide privacy. The entire L2TP packet, including payload and L2TP header, is sent within a UDP  datagram. It is common to carry Point-to-Point Protocol (PPP) session within an L2TP tunnel. L2TP does not provide confidentiality or strong aut hentication by it self. IPsec is of ten used to secu re L2 TP packets by providing confidentiality, authentication and integrity. Above is based on information from Wikipedia (http://en.wikipedia.org/wiki/Layer_2_Tunneling_Protocol) 3.6.4. L2TP Server User can setup WiMAX outdoor CPE from web page as shown in Figure 32. The definition for each field of PPTP Server is shown on Table 18.
 54 Figure 32  VPN>L2TP>Server
 55 Name  Description L2TP Server Enable  Check the check box to activate L2TP server. Server Name  Enter a service name Support Protocol  The supported protocol of L2TP messages Version   ALL: L2TPv2 and L2TPv3   2: L2TPv2 only   3: L2TPv3 only Auth Protocol Require the peer to auth enticate itself before allowing netwo rk packets to  b e se nt or  received. The  followin g p rotocols a re supported:   PAP: Password Authentication Protocol   CHAP: Challenge Handshake Authentication protocol   MSCHAP: Microsoft Chall enge Han dshake Authentication Protocol   MSCHAPv2: Microsoft Challenge Handshake Authentication Protocol, Version 2 Encryption Encryption Scheme  Non e   MPPE 40 bits: 40-bit encryption with MPPE   MPPE 128 bits: 128-bit encryption with MPPE   Auto: automatically select Local IP Address  The IP of router Remote Start IP  As sessions are established, IP addresses are assig ned starting from “Remote Start IP” Restrict Client IP?  To restrict client IP address range for the client Allow Client IP  The IP address range for the client Idle Timeout  Disconnect if the link is idle for the given number of seconds DNS Server 1  The primary DNS (Domain Name Server) addresses to the clientsDNS Server 2  The second ary DNS (Do main Name Server) ad dresses to the  clients User Access List User Name  User ID to connect L2TP server via the selected Auth Protocol Server  Server Protocol type Password  Password to connect L2TP server via the selected Auth Protocol IP Address  IP address of the connected client
 56Name  Description Connection List User Name  The user name of the connection Remote IP Address  The peer address of the connection PPTP IP Address  The assigned IP address of L2TP Login Time  The time of the connection created Link Time(s)  Elapsed time connected Save  Commit the changes made and save to WiMAX outdoor CPE Cancel  Reset fields to the last saved values Table 18 Field definition for VPN>L2TP>Server
 573.6.5. L2TP Client User could setup PPTP  Client as sh own in Fi gure 33 and Figu re 34. The definition for each  field of PPTP Client is shown on Table 19.  Figure 33  VPN>L2TP>Client   Figure 34  VPN>L2TP>Client>Add
 58 Name  Description L2TP Client Add  Add a new connection setting Edit  Edit the existed connection setting Edit L2TP Client Profile Name  The name of this connection setting L2TP Protocol Version The me ssage of L2TP  p rotocol versi on for thi s connection setting  2  3 NAT Mode Enable or disable NAT when connected to PPTP server  Y es: enable  No: disable Auth Protocol The Authentication Protocol of the peer required. Select which Authentication protocol to use.  P AP  CHAP  MSCHAPv1  MSCHAPv2 Encryption Enc ryption Scheme Server IP Address    The IP address of L2TP server Username  The username to conne ct L2TP se rver via the select ed Auth Protocol Password  The password of the corresponding username Retype  Type the “Password” again Get IP Automatically?  Obtain the dynamic IP address, assigned by the L2TP server Assign IP Address  Assign the static IP address for this connection setting Idle Timeout  Disconnect if the link is idle for the assigned seconds Save  Commit the changes made and save to WiMAX outdoor CPE Cancel  Reset fields to the last saved values Table 19 Field definition for VPN>L2TP>Client>Add
 593.7. IPSec Internet Protocol Security  (IPsec) is a n end- to-end secu rity solu tion and operated at the  IP Layer. It provides secure communication between pairs of hosts, pairs of security gateways or between security gateways and a host. It’s based on a suite of protocols for securing IP traffic by authenticating and encrypting each IP packet of the data stream. 3.7.1. Connection  Figure 35  VPN>IPsec Overview
 60 Figure 36  VPN>IPsec>Add
 61Name  Description Add  Click the "Add" button to add an IPsec connection rule Property Enable  Enable IPsec connection. Connection Name  The name of the connection Connection Type Select the connection type  Initiator  On Demand  Re sponder Gateway Information Local Endpoint Interface  The interface of the WiMAX outdoor CPE public-network interface Local Endpoint IP Address  The IP  add ress o r Do main Na me of the WiMAX out door CPE public-network interface Remote Endpoint IP Address  The IP address or Domain Name of the remote peer. Authentication Method Pre-Shared Key  The pre-share key that two security gateways use to authenticate Local ID Type States ho w the WiMAX out door CPE shoul d be identified for  authentication   IP: The WiMAX out door CPE is identi fied by the assi gned IP fo r authentication. The default value is 0.0.0.0. Content  The IP address Remote ID Type States how the remote peer should be identified for authentication   IP: The remote pee r is identified  by the assign ed IP  for authentication. The default value is 0.0.0.0, and this means WiMAX outdoor CPE will accept any IP. Content  The IP address IKE Phase 1
 62Name  Description Proposal Add Press the A dd button to enter an  Encryption a nd Authentication algorithm Cli ck th e tra sh t o rem ove the  sele cted algorithm. En cryption Algorithm:  DES  3DES  AES128  AES192  AES256 Authentication Algorithm:  MD5  SHA-1 Proposal OK  Click the OK button to exit the table edit mode Key Group  The DH group used to negotiate the IKE/ISAKMP SA. SA Life Time  The period that the keying channel  of  a connection (IKE/ISAKM P SA)  should last before being renegotiated. Dead Peer Detection (DPD)  Enable or disable the Dead Peer Detection protocol (RFC 3706) DPD Interval  The time interval when R_U_THERE messages are sent to the peer. DPD Idle Try The retry co unter fo r DPD. The tim eout interval i s "DP D inte rval" multiplied by "DPD Idle Try". After the timeout interval all connections to the peer are deleted if they are inactive. Local Network  The private subnet behind the WiMAX outdoor CPE. Address Type Single Address: The private subnet consisting of one IP address. Subnet a ddress: The  private sub net consisting wi thin the sub net IP addresses. Start IP Address  The only IP address allowed in the subnet Subnet Mask  The netmask of the subnet (Subnet address) Local Port Restrict the traffic selector to a single protocol and/or port.   Any: No restriction   ICMP: Restrict the traffic selector to ICMP protocol.   TCP: Restrict the traffic selector to TCP protocol. If the port number is 0, all TCP port numbers are accepted.   UDP: Re strict t he t raffic selector to UDP  protoco l. If the port number is 0, all UDP port numbers are accepted. Remote Network  The private subnet behind the remote peer. Address Type  Single Address: The private subnet consisting of one IP address. Subnet address: The private subnet consisting of subnet IP addresses.
 63Name  Description Start IP Address  The only IP address allowed in the subnet Subnet Mask  The netmask of the subnet (Subnet address) Remote Port Restrict the traffic selector to a single protocol and/or port.   Any: No restriction   ICMP: Restrict the traffic selector to ICMP protocol.   TCP: Restrict the traffic selector to TCP protocol. If the port number is 0, all TCP port numbers are accepted.   UDP: Re strict t he t raffic selector to UDP  protoco l. If the port number is 0, all UDP port numbers are accepted. IPSec Proposal Encapsulation Mode The type of the connection:   Tunnel: signifying a host-to-host, host-to-subnet, or subnet-to subnet tunnel.   Transport: signifying host-to-host transport made. Active Protocol  Whether authentication should be done as part of ESP encryption and/or separately using the AH protocol. Encryption Algorithm  NULL  AES128  AES192  AES256  DES  3DES Authentication Algorithm  MD5  SHA-1 SA Life Time The time interval a particular instance of a connection (a set of encryption/authentication key for user packets) should last, from successful negotiation to expiry. Perfect Forward Secrecy (PFS)  Whether Perfect Forward Secrecy of keys is desired on the connection's keying channel. Save  Commit the changes made and save to the CPE device Cancel  Reset fields to the last saved values. Table 20  Field definition for VPN>IPsec>Add
 644. WiMAX This technolo gy is based  on the IEEE 802.16 st andard, ena bling the delivery of last mile wireless broadband access.   Figure 37  Wireless Broadband Access  4.1. Profile In the profile tab, the user can set WiMAX standard settings, which include how to establish a connection, frequency information and how to authenticate.
 654.1.1. Connect Settings  Figure 38  WiMAX>ProfiIe>Connect Settings
 66 Name  Description Connect Options Settings Auto Reconnect  Indicate th e interval in  second to “a uto re connect”. 0 mean s disabled. Auto Reconnect Mode Use CINR or RSSI as the crite rion of “Auto Connect Mode”. Note that “Auto Connect Mode” refer to following “Auto Connect Mode” in “Connect Mode”. NDS Mode  Enable NDS mode or not. (NDS is still testing) NDS parameter  Upload a file which contains NDS parameter information Enable Handover  Enable handover or not Enable Idle Mode  Enable Idle Mode or not Idle Mode Interval Only valid if previous “Enable Idle Mode” set to enable. Interval in seconds whi ch firmware will  trigger Idle Mode after nit packet  traffic. CINR & RS SI Refre sh Interval  Interval in seconds to update CINR & RSSI after connected LDRP Time LDRP (Lo w Data Rate  Protection ). When it’s  enable, if th e uplink/downlink data rate is smaller than the LDRP time, the CPE will send disconnect command to BS. lDRP TX/RX Rate  LDRP uplink/downlink data rate Antenna Group Mode  Auto Mode or Manual Mode Antenna Ma nual Sele ct Group Mode Only valid if previous “Antenna Group Mode” set to Manual Mode. Valid options: Internal group 1 Internal group 2 External group Connect Type Settings Search  Click on the search button to search for available BSID Connect Mode Select a connect mode Auto Connect Mode: It will  connect to one of the BSID in the li st, indiscriminately. Network Search Mode: User needs to select one of the BSID from the list, it will use the BSID to co nnect to WiMAX after device i s reboot.
 67Search  Click on the search button to search for available BSID's Connect Mode Select a connect mode.   Auto Connect Mode: It will  connect to o ne of the BSI D's in the list, indiscriminately   Network Search Mo de: User ne eds to select one of the  BSID's from  the list, it wi ll us e that BSID to conn ect to WiMAX after device is reboot. Save  Commit the changes made and save to WiMAX outdoor CPE Cancel  Reset fields to the last saved values Table 21  Field definition for WiMAX>ProfiIe>Connect Settings 4.1.2. Frequency Settings The frequency list window  will display all the configu red frequencies and thei r bandwidth. To set additional frequencies, click on the “Add” button.  Figure 39  WiMAX>Profile>Frequency Settings>By List
 68 Figure 40  WiMAX>Profile>Frequency Settings>By Range
 69 Name  Description Setting Type There are two display types user can select.   User can choose to display the data by List. If user selects "By List", user also has the option to add more frequencies.   "By Range"  will display the freq uency by rang e a nd the  incremental value. See Figure "Frequency By Range" for more detail. Joint Wide Scan Result  Yes me ans to app end wide sca n resu lt to the freq uency setting . Only valid when setting type is “By List”. Default Bandwidth Select the default bandwidth to be used in Frequency List  5 MHz  10 MHz Valid Band Info  Valid ba nd in formation. If the fre quencies a ren’t located u sing th e valid band range, the frequency setting will be rejected. Add  The "Add" button will allow user to enter more frequency lists OK  Click the "OK" button to exit table edit mode Save  Commit the changes made and save to WiMAX outdoor CPE Cancel  Reset fields to the last saved values Table 22  Field definition for WiMAX>Profile>Frequency Settings>By Range 4.1.3. Authentication Settings  Figure 41  WiMAX>ProfiIe>Authenticaton Settings (No Authentication)
 70 Figure 42  WiMAX>ProfiIe>Authenticaton Settings (User Authentication)
 71 Name  Description Authentication Authentication Mode  The method used in authentication. Data Encryption AES-CCM  Enable MS’ s cap ability of encryptin g/decrypting traf fic by AES-CCM. Data Encryption AES-CBC  Enable MS' s ca pability of  encry pting/decrypting traf fic by AES-CBC. Key Encryption AES-key wrap  Enable MS's capability of decrypting TEK by AES-Key wrap.Key Encryption AES-ECB  Enable MS's capability of decrypting TEK by AES-ECB. EAP Supplicant EAP Mode  The EAP method used in authentication Anonymous ID  The identity encoded in EAP Identity Response message Root CA Certificate  The root CA's X.509 certificate. Client CA Certificate  The MS's X.509 certificate. Private Key  The MS' s pri vate key file corre sponding to the publ ic key  enhanced in x.509 certificate Private Key Password  The key used to decrypt the MS’s private key file Inner Mode  The EAP-TTLS inner method User name  The user name used in EAP-TTLS inner method Password  The password used in EAP-TTLS inner method. Options Auto Prepend Auth Mode Enable the MS to automatically decorate “{am=i}” in the EAP Identity Resp onse me ssage Th e valu e of "i" dep ends on Authentication Mode field. Random Outer ID  Enable MS t o gene rate 16-bytes random num ber as the user name in the EAP Identity Response message. Ignore Cert Verification  MS ski ps t o v erify t he BS's ce rtificate receiv ed in t he EAP-TLS or EAP-TTLS procedure. Same EAP Outer ID in ReAuth  Use the same EAP outer ID when doing re-auth MAC address in EAP-TLS outer ID  Add MAC address in outer ID when EAP mode is EAP-TLSDelete existed Device Certificate file Delete device certificate file which was uploaded in the field “MTK-authorized Device Certificate” Delete existed Private Key  Delete d evice private key  which wa s uploaded in the field “Device Private Key”
 72Save  Commit the changes made and save to CPE Cancel  Reset fields to the last saved values Table 23  Field definition for WiMAX>ProfiIe>Authentication Settings 4.2. Connect  Figure 43  WiMAX>Connect>Connect
 73 Name  Description Disconnect  Click the disconnect button to terminate the connection Connect  Click the connect button to connect to a BSID Connect Mode Select a connect mode.   Auto Connect Mode: It will  connect to o ne of the BSI D's in the list indiscriminately   Network Search Mo de: User ne eds to select one of the  BSID's from  the list, it wi ll us e that BSID to conn ect to WiMAX after device is reboot. Search  Click the search button to scan the frequency Table 24  Field definition for WiMAX>Connect>Connect 4.3. Wide Scan The “Wide Scan” function is used for scannin g BS based on scanning rule. Use r can set the scan rule with defining start, stop frequency, step, and channel bandwidth, and CPE will base on this rule to scan th e BS as  shown in Figure 44. The definitio n for ea ch field is shown on Table 25.  Figure 44  WiMAX>Wide Scan
 74 Name  Description Auto Wide Scan  Select “Yes” to do “wide scan” automatically when there are no available BS.Wide Scan Range Add/Ok  User can specify the wide scan range to reduce search time Wide Scan Result Search  Show the result of wide scan. Search button can trigger wide scan Clear  Clear button clear current search result Save/Cancel Save/Can cel current setting Table 25  Field definition for WiMAX>Wide Scan 4.4. Link Status The “Link Status” menu item shows a brief profile of the current WiMAX link.  Figure 45  WiMAX>link Status
 754.5. Link Statistics Wimax>Link Statistics   The“Link Statistics”menu item will display statistical information in the WiMAX link.  Figure 46  WiMAX Link Statistics
 764.6. Connection Info The connection info window will show the connection ID and its connection type.  Figure 47 WiMAX Connection Info 4.7. Service Flow The WiMAX service flow window will show the status and direction of each service flow ID.  Figure 48  WiMAX Service Flow
 775. Administrator 5.1. Remote Control Remote access is the ability to get access to WiMAX outdoor CPE from a remote computer or network. WiMAX outdoor CPE supports five different types of remote access protocols.   HTTP allows user to set the port and configure both HTTP and HTTPS protocols.   Telnet typically provides access to a command-line interface on a remote machine.   SSH Sec ure Shell (SSH) is  a network  pr otocol u sed to allow remote con nections between two  device s usi ng a se cure chan nel. It use s publi c-key cryptog raphy to  authenticate the rem ote entity. An SSH  server, by de fault, listens on the st andard TCP port 22.   SNMP is typically used for network management to monitor network-attached devices for conditions that warrant admin istrative assi stance or to view and retri eve network  statistical information.   TR-069 using TR-069 the terminals can communicate with he Auto Configuration Servers (ACS) and establish the configuration automatically.
 785.1.1. HTTP  Figure 49  Administration>Remote Control>HTTP  Name  Description HTTP Server Enable    Check the box to allow http connections. Port Number  Enter the http port number (default is port 80) HTTPS Server Enable    Check the box to allow https connections. Port Number  Enter the https port number (default is port 443) HTTP and HTTPS Allow Connection from WAN  Check the check-box to allow connections from WAN. Save  Commit the changes made and save to WiMAX outdoor CPE. Cancel  Reset fields to the last saved values. Table 26  Field definition for Administration>Remote Control>HTTP
 795.1.2. TELNET  Figure 50  Administration>Remote Control>Telnet  Name  Description Enable    Check the box to allow Telnet connections. Port Number  Enter the Telent port number (default is port 23) Allow Connection from WAN  Check the check-box to allow connections from WAN. Save  Commit the  changes ma de and  save to WiMAX outdoo r CPE. Cancel  Reset fields to the last saved values. Table 27  Field definition for Administration>Remote Control>Telnet
 80 5.1.3. SSH  Figure 51  Administration>Remote Control>SSH  Name  Description Enable    Check the box to allow SSH connections. Port Number  Enter the SSH port (default is port 22) Allow Connection from WAN  Check the check-box to allow connections from WAN. Save  Commit the  changes ma de and  save to WiMAX outdoo r CPE. Cancel  Reset fields to the last saved values. Table 28  Field definition for Administration>Remote Control>SSH
 815.1.4. SNMP  Figure 52  Administration>Remote Control>SNMP  Name  Description Enable   Checking the enable button will allow SNMP applications to query and set some of the SNMP variables. Location  Enter the Location SNMP string variable. Contact  Enter the Contact SNMP string variable. Read Community  Enter Read community string to query SNMP data. Write Community  Enter Write community string to query SNMP variables. Trap Server  Enter the I P Addre ss of trap  server where yo u wa nt tra p notifications to be sent to. Trap community  Enter the T rap community to act as  a password for sending trap notifications to the target SNMP manager. Save  Commit the changes made and save to WiMAX outdoor CPE. Cancel  Reset fields to the last saved values. Table 29  Field definition for Administration>Remote Control>SNMP
 825.1.5. TR-069 Using TR-069 the terminals can communicate with the Auto Configuration Servers (ACS) and establish the configuration automatically. It’s the current standard for activation of terminals in the DSL broadband market.  Figure 53  Administration>Remote Control>TR-069
 83 Name  Description Enable   To enable or disabl e the TR- 069 activity on the WiMAX outdoo r CPE. ACS Server URL  The ACS URL for the WiMAX outdoor CPE to connect to. ACS Username  The usernam e for the Wi MAX outdoor CPE when  connected to  ACS. ACS Password  The pa ssword for the Wi MAX outdoor CPE when  connected to ACS. Periodical Inform Enable  To enable or disable the periodical inform to ACS for the WiMAX  outdoor CPE. Periodical Inform Interval  The interval between two periodical inform. Connection Request Username Enter the username for the ACS to perform connection request to WiMAX outdoor CPE. Connection Request Password Enter the password for the ACS to  perform connection request to WiMAX outdoor CPE. CA Certificate File  The CA certi ficate file is use d to ident ify the certificate of ACS  when D-230 communicated ACS with HTTPS URL. CA Certificate Info  Displays the subject field of the CA Certificate. CLIENT Certificate File  The CLIENT  certificate file is used wh en WiMAX outdoor CPE  communicates with HTTPS URL. CLIENT Certificate Info  Displays the subject field of the CLIENT Certificate. Save  Commit the changes made and save to WiMAX outdoor CPE. Cancel  Reset fields to the last saved values. Table 30  Field definition for Administration>Remote Control>TR-069
 845.1.6. OMA-DM Using OMA DM the termi nals can communicate with the OMA  DM Server a nd establish the configuration automatically. It’s the curre nt standard for activation of terminals in OMA (Open Mobile Alliance).  Figure 54  Administration>Remote Control>OMA-DM
 85 Name  Description Enable   To enable or disable the OMA-DM activity of the WiMAX outdoor CPE. Server URL  The DM Server URL for the WiMAX outdoor CPE to connect to. Server Port  The DM Server Port for the WiMAX outdoor CPE to connect to. Server Auth Type  The DM Server authentication type. Server ID  The Server ID for the WiMAX outdoor CPE when con nected to DM Server. Server Password  The Server passwo rd for the WiMAX outdoor CPE whe n connected to DM Server. Client Auth Type  The DM Client authentication type. Client ID  The Client ID for the WiMAX outdoor CPE when connected to DM Server. Client Password  The Client password for the WiMAX outdoor CPE whe n connected to DM Server. Periodical Client- initiated Enable To enable or disable the periodical client-initiated session to DM server for the WiMAX outdoor CPE. Periodical Client- initiated Interval  The interval between two periodical client-initiated session. Save  Commit the changes made and save to WiMAX outdoor CPE. Cancel  Reset fields to the last saved values. Table 31  Field definition for Administration>Remote Control>OMA-DM
 865.2. Password Note: The default usernames and passwords admin/admin and guest/guest. The user with administrative privileges (belonging to the “ad min” group) has access to all the  features in the software. A user with “guest” privileges (belonging to the “guest” group)only has a subset of the features available to them. Note: There can only be one username in each of the groups (one to one relationship).  Figure 55 Administrator>Password
 87 Name  Description Change Password Group Select which  grou p the u ser belongs t o that you would like to change the password for.   admin, if the  user is p art of the admin g roup, they have full access to tall the features.   guest, if the user is part of the guest group, they have limited access to the features. Old Password  Enter the old password. New Password  Enter the new password. Retype  Retype the new password. Save  Commit the chang es made and save to WiMAX outdoor  CPE, it will only commit the change made to the password. Cancel  Reset fields to the last saved values. Change Username Group Select which  grou p the u ser belongs t o that you would like to change the username for.   admin, if the  user is p art of the admin g roup, they have full access to tall the features.   guest, if the user is part of the guest group, they have limited access to the features. Old Username  Enter the username you want to change. New Username  Enter the new username. Password Enter the original password, the pa ssword will not change. If you enter an incorrect  or different password  the change  will not be committed Save Commit the chang es made and save to WiMAX outdoor  CPE, it will only commit the change made to the username. Cancel  Reset fields to the last saved values. Table 32  Field definition for Administrator>Password
 886. System 6.1. Date and Time User can co nfigure the d ate and time  on the  device. The use r can ma nually configu re the system time, or ch oose to get the date and time  from a time server . The “Sa ve” button will commit the configuration, and the “Cancel” button will clear the fields. The “Time Zone” tab will allow you to set the time  zone and set the st arting and finish time for d aylight saving period. User can also enable or disable “Daylight Savings Time”.  NOTE: If user doe sn’t configure the time on  the WiMAX out door CPE it will use the defaul t system starting time. The default system starting time is set to 1970/1/1 00:00:00  Figure 56  System>Date/Time>Date
 896.1.1. Date Name  Description Manual  If user selects the Manual option, then use need to enter the time and date manually. New Time  New time manually entered New Date  New date manually entered Get From Time Server  If user select s this option it will  get th e local time from a time  server automatically. Time Protocol  Select the Time protocol Time Server Address  Enter the address of the time server. Save  Commit the changes made and save to WiMAX outdoor CPE Cancel    Reset fields to the last saved values Table 33  Field definition for Administrator>Password  6.1.2. Time Zone  Figure 57  System>Date/Time>Time Zone
 90 Name  Description Time Zone    Enter the time zone of for the location Enable Daylight Savings  If user  wants to ena ble Daylight Savi ngs Ti me, u ser needs to check the box. Start Date    Enter the beginning date for Daylight Savings time End Date  Enter the end date for Daylight Savings time. Save  Commit the changes made and save to WiMAX outdoor CPE Cancel    Reset fields to the last saved values Table 34  Field definition for System>Date/Time>Time Zone  6.2. Upgrade Firmware The “Upgrade” window allows user to upgrade the firmware on your device. Users can choose to upgrade the firmware by entering the file path or entering the URL of the upgrade file. Note: After pressing the “Upgrade” button. It will automatically reboot the WiMAX outdoor CPE and upgrade the firmware with the spe cified file. User will be prompted to login to the WiMAX outdoor CPE after the upgrade is complete. 6.2.1. Upgrade File   Figure 58  System>Upgrade Firmware>Upgrade File
 91 Name  Description Browse  Enter the full path of the file you want to upgrad e. The "browse" button will help user to find the file on the server. Upgrade  It will start upgrading the file Status  The status bar will  display whic h segment it's processi ng and what percentage of the upgrade has been completed. Table 35  Field definition for System>Upgrade Firmware>Upgrade File  6.2.2. Upgrade Link  Figure 59  System>Upgrade Firmware>Upgrade Link  Name  Description Upgrade Link  Enter the complete URL path of the file that user wants to upgradeUpgrade  It will start upgrading the file Status  The status window will display which segment it's processing and what percentage of the upgrade has been completed. Table 36  Field definition for System>Upgrade Firmware>Upgrade Link
 926.3. Log The “Sy stem>Log” will di splay system log out put. The “Ref resh” button  will clear the l og window and display the most current system log information.  Figure 60  System Log 6.4. Backup/Restore The Backup/Restore tab will allow user to  save and restore the  configuration on the WiMAX outdoor CPE . User  can a lso re set the  WiM AX out door CPE to factory defa ults from the  “Factory Defaults” tab. 6.4.1. Configuration Backup  Figure 61  System>Backup/Restore>Backup
 93 Figure 62  File Download   Figure 63  Save File As
 94 Name  Description Backup Click the "Backup" button o save the current configuration on the WiMAX outdoor CPE. After user clicks the "Backup" button "File Download" window will pop-up and prompt user to save the file. In the "Save  As" windo w, enter  the na me and location, where user wishs to download the file to. Table 37  Field definition for System>Backup/Restore>Backup  6.4.2.  Configuration Restore  Figure 64  System>Backup/Restore>Restore
 95 Name  Description File Restore Enter the path of the configuration file user wants to restore. Click on the "Bro wse" button  to help u ser to navig ate throu gh directories and search for the file. After user enters the complete file path, click the "File Re store" button. It will begin  restoring the configuration from the file specified.   URL Restore Enter the configuration URL path user wants to restore from. After entering the complete URL path, click the "URL Restore" button. It will begin restoring the configuration from the URL l ocation user specified. Table 38  System>Backup/Restore>Restore   6.4.3. Factory Defaults Factory default will set all  the configurations  back to factory def aults. Any configurations that user ha s ma de will be ch anged back to the factory  default settings. Af ter sel ecting “Re set” button, user will be prompted with a window to confirm or cancel the action. Warning: Restore factory defaults will clear any IP addresses and setting that may have been configured on the WiMAX outdoor CPE.  Figure 65  System>Backup/Restore>Factory Defaults
 96 Figure 66  Restore to factory reset warning
 977.  Installing and grounding device Before installing the Outdoor CPE Device Before installing, it is important to comply with the precautions listed below.     It must be install ed by  qua lified ser vice personn el who ar e w ell-trained in the  correct proce dures for handling an d installing  the      equipment.    Avoid in stalling or working o n equipment in ad verse weather conditions. On ce it  must be i nstalled in  adverse weather co nditions, i t’s necessary to well protect the equipment.   Do not install the device near overhead power lines or power circuits, or where the device can fall onto such power lines or circuits.   Do not disassemble the product. Opening or removing covers may expose you to electric shock. Warranty void if seal is broken.   Do not place or construct objects in close proximity to the device.     Be sure to check the supplied mounting accessory is correct as listed in Figure 67. Please be noted that the mounting kits should be used for the pole with diameter between 34 ~ 49 mm.   Under normal operating condition, it should be at least 50 cm away from the body of the user.    Mounting Accessories:Bracket with Tab: 1 pcBracket W/L Tab: 1 pcArm Bracket: 1 pcScrews with length 60mm: 2 pcsScrews with length 35mm: 2 pcsNuts: 3 pcsSplit Washers: 3 pcsFlat Washers: 3 pcsLockwasher: 2 pcs Figure 67 Mounting accessory list   An Overview of the Outdoor CPE Device Installation Service personnel needs to follow the steps for installing Outdoor CPE Device   1.  Pole-mounting or Wall-mounting the Outdoor CPE Device.   2.  Grounding the Outdoor CPE Device 3.  Connect the Outdoor CPE Device to PoE unit 4.  Connect PC to PoE unit for configuring the Outdoor CPE Device 5.  Connect the PoE unit to the power source to power up the Outdoor CPE Device 6.  Use PC to configure the Outdoor CPE Device  Pole-Mounting the Outdoor CPE Device In the following steps, it introduces how to pole-mounting the Outdoor CPE Device. 1.  Assemble the mounting hardware brackets onto pole first: Take the Screws with 60mm length to pass through the Split washer and Flat washer in order, and then screw the Brackets together with nuts. 2.  Use the Screw with 35mm length to attach the Outdoor CPE Device to the tab of the Bracket. Ensure the Lockwasher is located between the Bracket’s tab and the Outdoor CPE Device’s tab. Be sure to orient the Outdoor CPE Device with the connector towards the bottom. Remember to orderly add the Split washer, Flat washer and Nuts as shown in Figure 68. Do not over-tighten before finishing the Outdoor CPE Device alignment. 3.  Adjust the azimuth and elevation of the Outdoor CPE Device toward the direction of WiMAX Base Station location.
 984.  Tighten the screws to secure the Outdoor CPE Device tightly. It is not necessary to use Arm Bracket for pole-mounting. Arm Bracket is only used for wall-mounting.   NutBracket W/L TabBracket with TabFlat washerSplit washerScrew (60mm)Screw (35mm)NutFlat washerSplit washerLockwasher Figure 68 Pole-Mount the Outdoor CPE Device  Wall-Mounting the Outdoor CPE Device In the following steps, it introduces how to wall-mounting the Outdoor CPE Device. 1.  Install the Bra cket with tab on a  wall b y usi ng t wo mou nting scre ws appr opriate for the wall’s con struction m aterial. T he ap propriate mounting hardware should be purchased directly from a local supplier. 2.  Connect the Arm Bracket to Outdoor CPE Device with the 35mm length Screw, Lockwasher, Split washer, Flat washer, and Nut orderly as shown in Figure 69. Ensure the Lockwasher is located between the Bracket’s tab and the Outdoor CPE Device’s tab. Do not over-tighten before finishing the Outdoor CPE Device alignment. 3.  Secure the other side of Arm Bracket along with Lockwasher to the Bracket’s tab mounted on wall. Ensure that the bolt head is positioned in the socket of the Bracket. Do not over-tighten before finishing the Outdoor CPE Device alignment. 4.  Adjust the azimuth and elevation of the Outdoor CPE Device toward the direction of WiMAX Base Station location. 5.  Tighten the screws to secure the Outdoor CPE Device tightly. NutFlat washerSplit washerLockwasherArm BracketCustomer supplied screwNutFlat washerSplit washerScrew (35mm)Bracket with TabScrew (35mm)Customer supplied screwLockwasher Figure 69 Wall-Mount the Outdoor CPE Device  Grounding the Outdoor CPE Device Grounding the Out door C PE Device is  e ssential to  a void serious i njury to  ser vice pers onnel an d damage t o t he Outdoor CPE Device. T he following steps introduce how to ground the Outdoor CPE Device. 1.  Remove the ground screw installed on the side of the Outdoor CPE Device, as shown in Figure 70. 2.  Cut the required length of the ground wire, and then strip the insulation from the ground wire by using either a wire cutter/stripper or utility knife. 3.  Crimp the ground wire to the copper cable lug, and then connect the cable lug to the grounding connection on the side of the Outdoor CPE Device. Please be noted that the thickness of the cable lug should be less than 0.85mm. 4.  Tighten the screw by using the appropriate size and type of screw driver to secure the copper cable lug to the Outdoor CPE Device. 5.  Strip the other end of the ground wire and connect to the main ground.
 99 Copper Cable LugGround Wire to EarthGrounding Screw Figure 70 Connect the ground wire
 100Specification Physical Standard  Description  XS-618-25MM PoE Standard- IEEE802.3af Compliant  ● Wireless Standard - IEEE802.16e-2005  ● General Standard Ethernet Interface - 10 /100 Base-T    ● WiMAX Specification Radio Frequency  2500MHz~2690MHz  ● Air Interface  Scalable OFDMA  ● RF Configuration  TX& RX Configuration  2T2R Modulation - DL & UL  QPSK, 16QAM, 64QAM  ● Channel Bandwidth    5, 10 MHZ    ● CTC-QPSK-1/2 @ 5MHz BW CTC-16QAM-3/4@ 5MHz BW CTC-64QAM-3/4@ 5MHz BW   - 95 dBm   - 85 dBm   - 80 dBm Receiver Sensitivity CTC-QPSK-1/2@10MHz BW CTC-16QAM-3/4@10MHz BW CTC-64QAM-3/4@10MHz BW   - 92 dBm   - 83 dBm   - 78 dBm Firmware Feature   Bridge /Gateway Switching Mode  ● DDNS /DNS Relay  ● Network Time Protocol  ● IPv4   ● Network Address Translation  ● DHCP Client-WAN /DHCP Server-LAN  ● Port Forwarding /Trigger Support  ● NAT ALG -NAT FTP /PPTP /H.323 ALG    ● Networking UPnP, NAT-PMP & IGMP Proxy Support  ● TR-069 /OMADM /SNMPv2 MIB II  ● HTTP /HTTPS /SSH /Telnet    ● BS Scanning- Auto /Manual Connection    ● Web Access User Interface  ● Web Link Status Display  ● Web System Log Display  ● User Account Permission Control  ● Web Firmware Upgrade /Firmware Rollback ● Network Management Rest Factory Default Configuration &Settings  ● QoS Scheduling    UGS; RT-VR; NRT-VR; BE; ERT-VR  ● VLAN  VLAN packet pass through  ●
 101VPN    PPTP Server /Client, L2TP Server /Client   VPN Pass Through-IPSec, PPTP, and L2TP  ● Authentication  User /Device /User and Device Authentication   ● Security  AES-CCM /CBC /ECB /Key Wrap PKM v2, EAP TLS /TTLS / MSCHAPv2 /MS-CHAP /CHAP /MD5 /PAP X.509 Certificate   ● Firewall   IP Filter, DDOS, DMZ, NAT /NAPT Support  ● Mechanical Specification Dimension (L xW xH)  354 x 220 x 68 mm (Without Tab) 354 x 220 x 102 mm (With Tab) CPE Weight /without Accessories  < 2 Kg Power Requirements  100 ~ 240VAC /50 ~ 60Hz Power Input Voltage   + 48VDC Power Consumption@Continue TX Mode  <=15 W Output Power @Antenna Port  >= 25 dBm Antenna /Internal Patch Antenna  >= 14 dBi   LAN Port /RJ45 Connector  1xRJ45 Port Operating Temperature@Ambient Temp.   -40℃  ~ + 60℃ Operation Humidity /Non-condensing    5 to 85%   Storage Temperature@Ambient Temp.   - 40℃  ~ + 85℃ Storage Humidity /Non-condensing    5 to 85%   Grounding Design  ● Surge Protection    +/- 4 KV Hardware Specification Waterproof & Anti-Dust  IP67 Compliance

Navigation menu