OBSERVA Telecom SQO14 POE ROUTER User Manual 2AI24QCI4NU Quick Start Guide

OBSERVA Telecom POE ROUTER 2AI24QCI4NU Quick Start Guide

User Manual

LTECPESQI4N4QuickStartGuideFCC ID: 2AI24QCI4NU FCC ID: 2AI24SQO14Issue01Date2016‐08
Contents1AboutThisDocument...............................................................................................................22DevicePanel..............................................................................................................................33WhatYouNeed.........................................................................................................................34HowItWorks.............................................................................................................................45SetUptheHardware.................................................................................................................55.1ChooseaLocation.........................................................................................................55.2InsertaSIMCardtotheSlot.........................................................................................65.3Outdoor(SQO14)LEDBehavior....................................................................................75.4ConnecttheSQO14totheQCI4NU..............................................................................85.5ConnecttheQCI4NU.....................................................................................................85.6MounttheSQO14.........................................................................................................95.6.1Polemounting...................................................................................................96ConnecttotheInternet..........................................................................................................117Wireless...................................................................................................................................137.1TurntheWirelessOnoroff.........................................................................................138Troubleshooting......................................................................................................................148.1PowerLED...................................................................................................................148.2RESETButton...............................................................................................................148.3LTELED........................................................................................................................158.4Wi‐FiLED.....................................................................................................................158.5ETHERNET1‐4LEDs.....................................................................................................169FCCRegulations.......................................................................................................................171 AboutThisDocumentThedocumentwillserveasaquickstartguideforLTEdevicemodelSQI4N4.TheSQI4N4
2 FiguFigu3 EnsuincludestwodetailedinfoLTECPESQDevicre2‐1QCI4Nre2‐2QCI4NWhaturethatyouhSQO14oparts,aninormation.I4N4 IndooOutdePaneNURearPaneNUFrontPaneYouNhaveeverythdoorunitandorUnitdoorUnitell.el.NeedingrequiredtQCI4NUdanoutdoorFCCID:2AFCCID:2AFigure2‐1Figure2‐2toproperlysPOWrunit.PleaseAI24QCI4NUAI24SQO14etupyourdeWERSUPPLYseefollowingMMevice.Ethergmatrixshowodel:QCI4NUodel:SQO14rnetCABLEwsforU
4 Figu1. 2. 3. 4. ThisInteHowIre4‐1LANanTheSQO14TheSQO14TheQCI4NUTheQCI4NUQuickStartrnet.ItWorndWAN.connectstotisconnectedUfunctionsasUalsoservesaGuideshowsrkstheLTEnetwototheQCI4NsaLAN&Wi‐astelephonesyouhowtoFigure4‐1ork.NU.‐Fiaccessgatadapter.setupyourteway.SQO14andQCI4NUinorrdertoaccessthe
5 SetUptheHardwareCAUTIONBeforeyoubegin,ensurethatyouarefamiliarwithallsafetyandaccidentpreventionproceduresnecessaryforworkingatheightsandwithelectricity.DoNOTinstalltheSQO14duringalightningstorm.5.1 ChooseaLocationTheSQO14canbemountedonapoleorantennamastoronawallusingthesuppliedbracketmount. ChooseamountingpointthatissturdyenoughtoholdtheSQO14,evenduringhighwinds. WhenchoosingalocationtoinstalltheSQO14,rememberthattheSQO14’sfrontpanelshouldpointtowardsyourserviceprovider’snearestbasestation.YoudonotneedtobeabletoseethebasestationfromtheSQO14’sposition.However,ifyouexperiencedifficultieswithsignalreception,aLineofSight(LoS)connectionmayprSQO14cebetterresults. ItissuggestedthatyoutransporttheSQO14toitsintendedinstallationlocationinitsoriginalprotectivepackaging.
MakconnStepFiguStepFiguStep5.2 InsCAUTIONkesuretheSnectthePoEp1Removethre5‐1Removp2Insertyoure5‐2Insertp3AlignandsertaSIMQO14isturncableyoudohecoverfromvethecover.urSIMcard.SIMCard.putthecoveMCardtnedoffbeforthisstep.OtmtheSQO14.rtoprotectittotheSeyouinserttherwise,the.Figure5‐2Figure5‐1tintheSQO1lotyourSIMcarSIMcardma14.rd.Itisrecomaybedamagemmendedtoed.NOT
5.3 Outdoor(SQO14)LEDBehaviorWhensetuptheOutdoorUnit,theLEDwillhavethefollowingbehavior.CPE State  Description  LED Behavior  LED illustration Power On  Power supply normal  Power LED on  Detect with no SIM card After CPE power on,detecting no SIM card Power LET and three signal strength LEDs blinking together, the frequency is 2 times per second.  Scanning the LTE network Scanning the LTE network  The first signal strength LED blinking Network Authentication CPE is authenticating  Two signal strength LEDs blinking Getting IP Address CPE getting IP address from LTE network Three signal strength LEDs blinking Signal Strength weak Signal strength is weak  Only first signal strength LED on, the other two off  Signal Strength good Signal strength is good  Two signal strength LEDs on  Signal Strength strong Signal strength is strong  Three signal strength LEDs on Firmware Upgrading CPE starting the firmware upgrading The first four LEDs blinking alternately  LAN connected  With local LAN connected  LAN LED indicator flashing 
LaySQOTheSignIfyoLeavTocoStepStepcablStepFiguNOT5.4 ConaCAT5eEtheO14location.maximumdialattenuatioouintendtovethecableloonnecttheCAp1Openthep2FeedtheeetotheSQOp3Puttheco5.5 Conre5‐3QCI4NUTE:Makesurennectthernetcable(nstanceoftheonmayresultusecabletieooseuntilaftAT5eEthernecoverofSQOendoftheCA14.overontheSQnnectthUHardwareCeyouhaveinheSQO1notincludedeCAT5ecableifyouusecaesorothermteryoufinishetcable:O14bytakeoAT5eEtherneQO14housinheQCI4NConnections.sertedyourS14tothe)fromyourieislimitedtobleextendermethodstosinstallingthefthescrewsetcablethrougandtwisttNUFigure5‐2SIMcardintoeQCI4NUintendedQCI100meters.rstocoveragecurethecaeQCI4NUandonthehousinughtherubbehescrew.theSQO14.UI4NUlocationgreaterdistanable,donottdSQO14.ng.er,andconnentoourintence.tightenthemecttheendondedmyet.ofthe
Step1ConnecttheCAT5eEthernetcablewhichisalreadyconnectedtotheSQO14totheQCI4NU’sRJ‐45PoEport.CAUTIONDonotconnectacomputeroraswitchdirectlytotheQCI4NU’sPoEportduetothehighPoEpower.Step2ConnectthesuppliedpoweradaptertotheQCI4NU.ThePOWERLEDshinesasteadygreenonceconnected.Step3ConnecttheincludedEthernetcablefromthecomputertooneoftheQCI4NU’sETHERNETports.Step4ConnectananalogphonetothePHONEporttouseVoIP.ThePHONELTEshouldlighton.5.6 MounttheSQO14SeetheinstallationinstructionstomounttheSQO14correctly.5.6.1 PolemountingPole diameter type:  The mounting pole diameter is Φ25 and Φ45MM; If the pole diameter is less thanΦ30, you need to add a C-type ring to make sure the device can be mounted on the pole.The specific mountingsteps are as follows:1. Using a screwdriver to loosen the metal hose clamps,through the terminal equipment mounting hole, the metal hose clamps and the pole is fixed;
Figure5‐3 pole typemounting A2. Using a screwdriver to lock the metal hose clamps, fixed terminal equipment.(Using software to enable   terminal equipment aligned in the direction of the base station, achieve the best effect.)Figure5‐4 pole typemounting BNote:(terminalequipmentcableoutletmustbeinstalleddownwarddirection.)Using a screwdriver to lock the metal hose clamps
3.  If the diameter of pole between 25mm and 30mm, it’s needed to use the rubber C-type ring to add the diameter of the pole. Figure5‐5C-type ring6 ConnecttotheInternetStep1OpenawebbrowserandentertheURLhttp://192.168.100.1ofindoorunitStep2EnterthedefaultUsernameandPassword.ClickLogin.(Fieldsarecase‐sensitive.)Figure6‐1LoginScreen.Figure6‐1NOTEIftheloginscreendoesnotopen,makesureinternetbrowser’sproxysettingsdisabled.YourcomputershouldalsobesettogetanIPaddressautomaticallyfromtheLTERouterDHCPServer,192.168.100.100to254.
FiguIfthcannre6‐2MainSeLTESignalnotacquireLTScreenBar&InternTESignal.TocetIconslocachecksignal,Figure6‐2atedaboveofgotoNetwofthepagearorkMenuregrayedoutt,itmeansthhatit
Figure6‐3NetworkFigure6‐3IftheSINRisbelow10db,replanningorrepositioningoftheoutdoor(SQO14)antennaisrequired.Note:SINRthresholdparametersis≥10db7 Wireless7.1 TurntheWirelessOnoroffStep1TheWIFIissettodefaultasON.Step2YoucanalsopresstheWIRELESSOn/Offbuttonforonesecondandreleaseit.
8 UseFiguTablLEDPWRIfthStepStepdefeFiguTorechecBasedefeTroubthissectioni8.1 Powre9‐1Powere9‐1PowerRepowerLEDp1Poweradap2Iftheprobective,please8.2 RESre9‐2RESETesetthedevicktheotherLedonthefoect.bleshoofyouhaveprwerLEDrLEDSymbolLEDDefinitioCOLOBlueisoff,pleaseapterMUSTbblemstillperscontactyourSETButButtonicetodefaultLEDs.llowingdefinotingroblemswithDonORecheck.bepluggedinsists,devicehrlocalvendottont,presstheRnitionsofthehyourLTEDevFigure8‐1STATOFFSteadntodevice.hardwarecomr.Figure8‐2RESETbuttoneotherLEDsvice.USdyOnmponentorpuntilthepos,itcandiagDESCNoPoPowepoweradaptewerLEDbeggnoseiftherCRIPTIONowerSupplyeronermaybeginstoblink.e’sanyhardThenware
8.3 LT E LEDFigure9‐3LTELEDSymbolFigure8‐3Table9‐2LTELEDDefinitionLEDCOLORSTATUSDESCRIPTIONLTEBlueSteadyOnInLTEnetworkBlinkingLTEscan,connect,completeLTEconnectivityOFFNoaccessinLTEnetworkIftheLTELEDisofforblinkingcontinuously,pleasecheck:Step1PoEcableMUSTbeconnectedbetweenQCI4NUandSQO14device.Step2Re‐powerontheQCI4NUdevice.Step3WaituntiltheLEDindicatorsteadies.Step4Iftheproblemstillpersists,devicehardwarecomponentmaybedefective,pleasecontactourtechnicalsupport.8.4 WiFiLEDFigure9‐4WIFILEDSymbolFigure8‐4Table9‐3WLANLEDDefinitionLEDCOLORSTATUSDESCRIPTIONWIFIBlueOFFWLAN function disable BlinkingData transmission through WLAN SteadyOnWLAN function enable IftheWIFILEDisoff,pleasecheck:WIFI:EnablewirelessfunctionandallconfigurationparametersMUSTbecorrect.SeetheWIFIconfigurationformoreinformation.
8.5 ETHERNET14LEDsFigure9‐6ETHERNET1~3LEDsSymbolFigure8‐5Table9‐5ETHERNET1‐3LEDsDefinitionLEDCOLORSTATUSDESCRIPTIONLAN1~LAN3GreenSteadyOnEthernet connection is normal BlinkingEthernet interface data being transmitted OFFEthernet connection is not established WAN/POEGreenSteadyOnWAN connection is normal BlinkingWAN interface data being transmitted OFFWAN connection is not established IftheLEDisoff,pleasecheck:Step1TheLANcableMUSTbeconnectedbetweendeviceandPC.Step2NICfunctiononthePCMUSTbeenabled.Step3Iftheproblemstillpersists,devicehardwarecomponentmaybedefective,pleasecontactyourlocalvendor.
      LTE Outdoor CPE User Guide 
  Index1GettingStarted..........................................................................................................................51.1WelcometotheCPE..................................................................................................51.2ComputerConfigurationRequirements....................................................................51.3LoggingIntotheWebManagementPage................................................................52Overview...................................................................................................................................62.1ViewingtheSystemInformation...............................................................................62.2ViewingtheDeviceInformation...............................................................................72.3ViewingCPUUsage...................................................................................................72.4ViewingMemoryUsage............................................................................................82.5Viewing4GStatus.....................................................................................................82.6ViewingLANStatus...................................................................................................92.7ViewingThroughputStatistics..................................................................................92.8ViewingDeviceList...................................................................................................93NetworkSetting......................................................................................................................103.1NetworkMode........................................................................................................103.24GSetting................................................................................................................103.2.1SettingConnectMethod.................................................................................113.2.2SettingFrequency(Earfcn)..............................................................................123.3APNManagement...................................................................................................133.4PINManagement....................................................................................................133.4.1ViewingtheStatusoftheUSIMCard..............................................................143.4.2EnablingPINVerification.................................................................................143.4.3DisablingPINVerification................................................................................143.4.4VerifyingthePIN..............................................................................................143.4.5ChangingthePIN.............................................................................................153.4.6SettingAutomaticVerificationofthePIN.......................................................153.4.7VerifyingthePUK............................................................................................153.5SIMLock..................................................................................................................163.6DMZSettings...........................................................................................................163.7StaticRoute.............................................................................................................173.7.1AddStaticRoute..............................................................................................173.7.2ModifyStaticRoute.........................................................................................173.7.3DeleteStaticRoute..........................................................................................183.8LANSetting..............................................................................................................183.8.1SettingLANHostParameters..........................................................................183.8.2ConfigurationtheDHCPServer.......................................................................183.8.3BundledAddressList.......................................................................................194Security...................................................................................................................................204.1SettingFirewall........................................................................................................204.2MACFiltering..........................................................................................................204.2.1EnablingMACFilter.........................................................................................214.2.2DisablingMACFilter........................................................................................21
  4.2.3SettingAllowaccessnetworkwithintherules................................................214.2.4SettingDenyaccessnetworkwithintherules................................................214.2.5AddingMACFilteringrule...............................................................................224.2.6ModifyingMACFilteringrule..........................................................................224.2.7DeletingMACFilteringrule.............................................................................224.3IPFiltering...............................................................................................................224.3.1EnablingIPFiltering.........................................................................................234.3.2DisablingIPFiltering........................................................................................234.3.3SettingAllowaccessnetworkoutsidetherules..............................................234.3.4SettingDenyaccessnetworkoutsidetherules...............................................244.3.5AddingIPFilteringrule....................................................................................244.3.6ModifyingIPFilteringrule...............................................................................244.3.7DeletingIPFilteringrule..................................................................................244.4URLFiltering............................................................................................................254.4.1EnablingURLFiltering.....................................................................................254.4.2DisablingURLFiltering....................................................................................254.4.3AddingURLFilteringlist..................................................................................254.4.4ModifyURLFilteringlist..................................................................................264.4.5DeletingURLFilteringlist................................................................................264.5PortForwarding.......................................................................................................264.5.1AddingPortForwardingrule...........................................................................264.5.2ModifyingPortForwardingrule......................................................................274.5.3DeletingPortForwardingrule.........................................................................274.6AccessRestriction....................................................................................................284.6.1AddAccessRestriction....................................................................................284.6.2ModifyAccessRestriction...............................................................................284.6.3DeleteAccessRestriction................................................................................284.7UPnP........................................................................................................................295VPNSetting.............................................................................................................................296System.....................................................................................................................................306.1Maintenance...........................................................................................................306.1.1Radio...............................................................................................................306.1.2Restart.............................................................................................................316.1.3Reset................................................................................................................316.1.4DownloadConfigurationFile...........................................................................316.1.5UploadConfigurationFile...............................................................................316.2VersionManager.....................................................................................................326.2.1ViewingVersionInfo.......................................................................................326.2.2VersionUpgrade..............................................................................................326.3FTPautoupgrade....................................................................................................336.4TR069......................................................................................................................346.5Date&Time............................................................................................................356.6DDNS.......................................................................................................................366.7Diagnosis.................................................................................................................37
  6.7.1Ping..................................................................................................................376.7.2Traceroute.......................................................................................................386.8PortMirror..............................................................................................................396.9Syslog.......................................................................................................................396.9.1Local................................................................................................................406.9.2Network...........................................................................................................406.10WEBsetting.............................................................................................................416.11Account...................................................................................................................426.12Logout.....................................................................................................................427FAQs........................................................................................................................................43
  1 GettingStarted1.1 WelcometotheCPEInthisdocument,theLTE(LongTermEvolution)CPE(customerpremisesequipment)willbereplacedbytheCPE.CarefullyreadthefollowingsafetysymbolstohelpyouuseyourCPEsafelyandcorrectly:AdditionalinformationOptionalmethodsorshortcutsforanactionPotentialproblemsorconventionsthatneedtobespecified1.2 ComputerConfigurationRequirementsForoptimumperformance,makesureyourcomputermeetsthefollowingrequirements.ItemRequirementCPUPentium500MHzorhigherMemory128MBRAMorhigherHarddisk50MBavailablespaceOperatingsystem Microsoft:WindowsXP,WindowsVista,orWindows7 Mac: Mac OS X10.5 or higherDisplayresolution1024x768pixelsorhigherBrowser InternetExplorer7.0orlater Firefox3.6orlater Opera10orlater Safari5orlater Chrome9orlater1.3 LoggingIntotheWebManagementPageUseabrowsertologintothewebmanagementpagetoconfigureandmanagetheCPE.ThefollowingproceduredescribeshowtouseacomputerrunningWindowsXPandInternetExplorer7.0tologintothewebmanagementpageoftheCPE.1. ConnecttheCPEproperly.
  2. LaunchInternetExplorer,enterhttp://192.168.1.1intheaddressbar,andpressEnter.AsshowninFigure1‐1. Figure1‐13. Entertheusernameandpassword,andclickLogIn.Youcanlogintothewebmanagementpageafterthepasswordisverified.AsshowninFigure1‐2. Figure1‐2Thedefaultusernameandpasswordarebothadmin.IfyouwanttocheckthedetailsoftheCPE,pleaseusethesuperuserlogintheCPE,theusernameandpasswordbothareadministrator.ToprotectyourCPEfromunauthorizedaccess,changethepasswordafteryourfirstlogin.TheCPEsupportsdiagnosticfunction.Ifyouencounterproblems,pleasecontactcustomerserviceforthespecificusingmethod.Toensureyourdatasafety,itisrecommendedthatyouturnonthefirewall,andconserveyourloginandFTPpasswordcarefully.2 Overview2.1 ViewingtheSystemInformationToviewtheSystemInformation,performthefollowingsteps:1. ChooseOverview;2. IntheSystemInformationarea,viewthesystemstatus,suchasRunningtimeandOnlinetime.AsshowninFigure2‐1.
  Figure2‐12.2 ViewingtheDeviceInformationToviewtheDeviceInformation,performthefollowingsteps:1. ChooseOverview;2. IntheDeviceInformationarea,viewthedeviceinformation,suchasProductname,Softwareversion,Firmwareversion,Bootromversion,CPESN,IMEI,IMSI,LTEsupportbandandModuleSN.AsshowninFigure2‐2. Figure2‐22.3 ViewingCPUUsageToviewtheDeviceInformation,performthefollowingsteps:1. ChooseOverview;2. IntheCPUUsagearea,viewthecpuusageinformation,suchasCurrentcpuusage,Maxcpuusage,Mincpuusage.AsshowninFigure2‐3. Figure2‐3
  2.4 ViewingMemoryUsageToviewtheDeviceInformation,performthefollowingsteps:1. ChooseOverview;2. IntheMemoryUsagearea,viewthememoryusageinformation,suchasTotalmemory,Currentmemoryusage,MaxmemoryusageandMinmemoryusage.AsshowninFigure2‐4. Figure2‐42.5 Viewing4GStatusToviewtheDeviceInformation,performthefollowingsteps:1. ChooseOverview;2. Inthe4GStatusarea,viewtheinformationaboutltenetwork,suchasUSIMcardstatus,ConnectStatus,Networkmode,Operatorinformation,SignalStrengthindicator,DL&ULMCS,DNSServerandAPNinformation.AsshowninFigure2‐5.  Figure2‐5
  2.6 ViewingLANStatusToviewtheDeviceInformation,performthefollowingsteps:1. ChooseOverview;2. IntheLANStatusarea,viewthelanstatus,suchasMacaddress,IPaddressandSubnetmask.AsshowninFigure2‐6.  Figure2‐62.7 ViewingThroughputStatisticsToviewtheDeviceInformation,performthefollowingsteps:1. ChooseOverview;2. IntheThroughputStatisticsarea,viewthethroughputstatistics,suchasAPNthroughputandLANthroughput.3. Inthisarea,alsoyoucanchooseandclickthebuttonResettoemptythethroughputstatistics.AsshowninFigure2‐7. Figure2‐72.8 ViewingDeviceListToviewtheDeviceInformation,performthefollowingsteps:1. ChooseOverview;2. IntheDeviceListarea,viewthedeviceinformationwhichconnecttotheCPE,suchasDevicename,Macaddress,IPaddressandLeasetime.AsshowninFigure2‐8.
   Figure2‐83 NetworkSetting3.1 NetworkModeTosetthenetworkmode,performthefollowingsteps:1. ChooseNetwork>NetworkMode;2. IntheNetworkModearea,selectamodebetweenRouteandBridge;3. ClickSubmit.AsshowninFigure3‐1. Figure3‐13.2 4GSettingTosettheLTENetwork,performthefollowingsteps:1. ChooseNetwork>4GSetting;2. Inthe4GSettingarea,youcanconfiguretheltenetwork3. Inthe4GSettingarea,youcanalsoviewthenetworkinformationsuchasfrequency,DL&ULMCS,RSRP,RSRQ,CINR,SINR,TxPower,CellID,PCI,MCCandMNC.AsshowninFigure3‐2.
   Figure3‐23.2.1 SettingConnectMethodTosettheltenetworkconnectmethod,performthefollowingsteps:1. ChooseNetwork>4GSetting;2. Inthe4GSettingarea,youcansettheconnectmethod;3. Therearetwomethodstoconnecttheltenetwork,itisneededtochooseamethodbetweenAutoandManual,ifyouwanttoautoconnecttotheltenetworkyoushouldchoosetheAuto,otherwiseyoushouldchooseManual;4. ClickSubmit.AsshowninFigure3‐3. Figure3‐3
  3.2.1.1 ManualConnectNetworkTomanualconnectthenetwork,performthefollowingsteps:1 ChooseNetwork>4GSetting;2 SettheConnectMethodtoManual;3 ClickPLMNtoscanthenetworkandselectanetworkyouwanttoconnect.Ifyoudon’twanttousethisfunction,itwillautoselectanetworktoconnect.4 IfyouwanttoconnecttotheLTEnetwork,youshouldclickconnectbuttontoconnectthenetwork,otherwiseyoucanclickthebuttonDisconnecttodisconnectfromltenetwork.AsshowninFigure3‐4. Figure3‐43.2.1.2 SettingScanModeTosettheltenetworkscanmode,performthefollowingsteps:1 chooseNetwork>4GSetting;2 Intheltesettingarea,youcansetthescanmode;3 YoucanchoosefullmodeorabandtheCPEsupported.4 ClickSubmit.AsshowninFigure3‐5. Figure3‐53.2.2 SettingFrequency(Earfcn)Tosetthefrequency,performthefollowingsteps:1 ChooseNetwork>4GSetting.2 Intheltesettingarea,clicktosetthefrequency.3 IntheFrequencySettingarea,youcanchooseaband,thenclickAddlisttochooseaEarfcnNumber.4 ClickSubmit.AsshowninFigure3‐6.
   Figure3‐63.3 APNManagementTosetandmanageAPN,performthefollowingsteps:1 ChooseNetwork>APNManagement.2 IntheAPNManagementarea,youcansettheAPN.3 ChooseaAPNnumberwhichyouwanttoset.4 IntheAPNSettingareayoucansettheAPNparameters,suchasenableordisabletheapn,apnname,username,passwordandsoon.5 IfyouwantsetaAPNasdefaultgateway,youshouldcheckthatisenabled.6 ClickSubmit.AsshowninFigure3‐7. Figure3‐73.4 PINManagementTomanagethePIN,youcanperformthefollowingoperationsonthePINManagementpage: EnableordisablethePINverification. VerifythePIN.
   ChangethePIN. SetautomaticverificationofthePIN.AsshowninFigure3‐8. Figure3‐83.4.1 ViewingtheStatusoftheUSIMCardToviewthestatusoftheUSIMcard,performthefollowingsteps:1 ChooseNetwork>PINManagement.2 ViewthestatusoftheUSIMcardintheUSIMcardstatusfield.3.4.2 EnablingPINVerificationToenablePINverification,performthefollowingsteps:1 ChooseNetwork>PINManagement.2 SetPINverificationtoEnable.3 EnterthePIN(4to8digits)intheEnterPINbox.4 ClickSubmit.3.4.3 DisablingPINVerificationTodisablePINverification,performthefollowingsteps:1 ChooseNetwork>PINManagement.2 SetPINverificationtoDisable.3 EnterthePIN(4to8digits)intheEnterPINbox.4 ClickSubmit.3.4.4 VerifyingthePINIfPINverificationisenabledbutthePINisnotverified,theverificationisrequired.Toverifythe
  PIN,performthefollowingsteps:1 ChooseNetwork>PINManagement.2 EnterthePIN(4to8digits)inthePINbox.3 ClickSubmit.3.4.5 ChangingthePINThePINcanbechangedonlywhenPINverificationisenabledandthePINisverified.TochangethePIN,performthefollowingsteps:1 ChooseNetwork>PINManagement.2 SetPINverificationtoEnable.3 SetChangePINtoEnable.4 EnterthecurrentPIN(4to8digits)inthePINbox.5 EnteranewPIN(4to8digits)intheNewPINbox.6 RepeatthenewPINintheConfirmPINbox.7 ClickSubmit.3.4.6 SettingAutomaticVerificationofthePINYoucanenableordisableautomaticverificationofthePIN.Ifautomaticverificationisenabled,theCPEautomaticallyverifiesthePINafterrestarting.ThisfunctioncanbeenabledonlywhenPINverificationisenabledandthePINisverified.ToenableautomaticverificationofthePIN,performthefollowingsteps:1. ChooseNetwork>PINManagement.2. SetPinverificationtoEnable.3. SetRemembermyPINtoEnable.4. ClickSubmit.3.4.7 VerifyingthePUKIfPINverificationisenabledandthePINfailstobeverifiedforthreeconsecutivetimes,thePINwillbelocked.Inthiscase,youneedtoverifythePUKandchangethePINtounlockit.ToverifythePUK,performthefollowingsteps:1. ChooseNetwork>PINManagement.2. EnterthePUKinthePUKbox.3. EnteranewPINintheNewPINbox.4. RepeatthenewPINintheConfirmPINbox.
  5. ClickSubmit.3.5 SIMLockIfyouwanttoconnectaspecifynetwork,andtheCPEcan’tconnectothernetwork,youcansetaSIMlock.TosettheSIMlock,performthefollowingsteps:1. ChooseNetwork>SIMLock.2. EntertheMCC(3digits)intheMCCbox.3. EntertheMNC(2digits)intheMNCbox.4. ClickSubmit.AsshowninFigure3‐9. Figure3‐93.6 DMZSettingsIfthedemilitarizedzone(DMZ)isenabled,thepacketssentfromtheWANaredirectlysenttoaspecifiedIPaddressontheLANbeforebeingdiscardedbythefirewall.TosetDMZ,performthefollowingsteps:1. ChooseNetwork>DMZSettings.2. SetDMZtoEnable.3. (Optional)SetICMPRedirecttoEnable.4. SetHostaddress.ThisIPaddressmustbedifferentfromtheIPaddresssetontheLANHostSettingspage,buttheymustbeonthesamenetworksegment.5. ClickSubmit.AsshowninFigure3‐10.
   Figure3‐103.7 StaticRoute3.7.1 AddStaticRouteToaddastaticroute,performthefollowingsteps:1. ChooseNetwork>StaticRoute.2. ClickAddlist.3. SettheDestIPaddressandSubnetmask.4. SelectaInterfacefromthedrop‐downlist.5. IfyouselectLANastheinterface,youneedsetaLANIPaddess.6. ClickSubmit.AsshowninFigure3‐11. Figure3‐113.7.2 ModifyStaticRouteTomodifyaaccessrestrictionrule,performthefollowingsteps:1. ChooseNetwork>StaticRoute.2. Choosetheitemtobemodified,andclickEdit.3. Repeatsteps3through5inthepreviousprocedure.
  4. ClickSubmit.3.7.3 DeleteStaticRouteTodeleteastaticroute,performthefollowingsteps:1. ChooseNetwok>StaticRoute.2. Choosetheitemtobedeleted,andclickDelete.3.8 LANSetting3.8.1 SettingLANHostParametersBydefault,theIPaddressis192.168.1.1withasubnetmaskof255.255.255.0.YoucanchangethehostIPaddresstoanotherindividualIPaddressthatiseasytoremember.MakesurethatIPaddressisuniqueonyournetwork.IfyouchangetheIPaddressoftheCPE,youneedtoaccessthewebmanagementpagewiththenewIPaddress.AsshowninFigure3‐12.Figure3‐12TochangetheIPaddressoftheCPE,performthefollowingsteps:1 ChooseNetwork>LANSetting.2 IntheLANHostSettingsarea,setIPaddressandsubnetmask.3 IntheDHCPSettingarea,settheDHCPservertoEnable.4 ClickSubmit.3.8.2 ConfigurationtheDHCPServerDHCPenablesindividualclientstoautomaticallyobtainTCP/IPconfigurationwhentheserverpowerson.YoucanconfiguretheCPEasaDHCPserverordisableit.WhenconfiguredasaDHCPserver,theCPEautomaticallyprovidestheTCP/IPconfigurationfortheLANclientsthatsupport
  DHCPclientcapabilities.IfDHCPserverservicesaredisabled,youmusthaveanotherDHCPserveronyourLAN,oreachclientmustbemanuallyconfigured.ToconfigureDHCPsettings,performthefollowingsteps:1. ChooseNetwork>LANSetting.2. SettheDHCPservertoEnable.3. SetStartIPaddress.ThisIPaddressmustbedifferentfromtheIPaddresssetontheLANHostSettingsarea,buttheymustbeonthesamenetworksegment.4. SetEndIPaddress.ThisIPaddressmustbedifferentfromtheIPaddresssetontheLANHostSettingsarea,buttheymustbeonthesamenetworksegment.5. SetLeasetime.Leasetimecanbesetto1to10,080minutes.Itisrecommendedtoretainthedefaultvalue.6. ClickSubmit.3.8.3 BundledAddressListYoucanbindanIPaddresstoadevicebasedonitsMACaddress.ThedevicewillreceivethesameIPaddresseachtimeitaccessestheDHCPserver.Forexample,youcanbindanIPaddresstoanFTPserverontheLAN.AsshowninFigure3‐13. Figure3‐13Toaddanitemtothesetuplist,performthefollowingsteps:1. ChooseNetwork>LANSetting.2. ClickAddlist.3. SettheMACaddressandIPAddress.4. ClickSubmit.Tomodifyaniteminthesetuplist,performthefollowingsteps:
  1. ChooseNetwork>LANSetting.2. Choosetheitemtobemodified,andclickEdit.3. SettheMACaddressandIPAddress.4. ClickSubmit.Todeleteaniteminthesetuplist,performthefollowingsteps:1. ChooseNetwork>LANSetting.2. Choosetheitemtobedeleted,andclickDelete.4 Security4.1 SettingFirewallThispagedescribeshowtosetthefirewall.Ifyouenableordisablethefirewall,youcanmodifytheconfiguration.Tosetthefirewall,performthefollowingsteps:1. ChooseSecurity>Firewall.2. ChooseEnableorDisabletomodifytheconfiguration.3. ClickSubmit.AsshowninFigure4‐1. Figure4‐1Ifyouchooseenablethefirewall,youcanmodifytheconfigurationaboutfirewall,suchasMacfilter,IPfilter,URLfilterandsoon.Ifyouchoosedisable,youcan’tmodifyanyconfigurationsaboutthefirewall.4.2 MACFilteringThispageenablesyoutoconfiguretheMACaddressfilteringrules.AsshowninFigure4‐2.
  Figure4‐24.2.1 EnablingMACFilterToenableMACaddressfilter,performthefollowingsteps:1. ChooseSecurity>MACFiltering2. SetMACfilteringtoEnable.3. ClickSubmit.4.2.2 DisablingMACFilterTodisableMACaddressfilter,performthefollowingsteps:1. ChooseSecurity>MACFiltering2. SetMACfilteringtoDisable.3. ClickSubmit.4.2.3 SettingAllowaccessnetworkwithintherulesTosetallowaccessnetworkwithintherules,performthefollowingsteps:1. ChooseSecurity>MACFiltering.2. SetAllowaccessnetworkwithintherules.3. ClickSubmit.4.2.4 SettingDenyaccessnetworkwithintherulesTosetdenyaccessnetworkwithintherules,performthefollowingsteps:1. ChooseSecurity>MACFiltering.2. SetDenyaccessnetworkwithintherules.
  3. ClickSubmit.4.2.5 AddingMACFilteringruleToaddaMACfilteringrule,performthefollowingsteps:1. ChooseSecurity>MACFiltering.2. ClickAddlist.3. SetMACaddress.4. ClickSubmit.4.2.6 ModifyingMACFilteringruleTomodifyaMACaddressrule,performthefollowingsteps:1. ChooseSecurity>MACFiltering.2. Choosetheruletobemodified,andclickEdit.3. SetMACaddress.4. ClickSubmit. 4.2.7 DeletingMACFilteringruleTodeleteaMACaddressfilterrule,performthefollowingsteps:1. ChooseSecurity>MACFiltering.2. Choosetheruletobedeleted,andclickDelete.4.3 IPFilteringDataisfilteredbyIPaddress.ThispageenablesyoutoconfiguretheIPaddressfilteringrules.AsshowninFigure4‐3.
  Figure4‐34.3.1 EnablingIPFilteringToenableIPFiltering,performthefollowingsteps:1. ChooseSecurity>IPFiltering.2. SetIPFilteringEnable.3. ClickSubmit. 4.3.2 DisablingIPFilteringTodisableIPFiltering,performthefollowingsteps:1. ChooseSecurity>IPFiltering.2. SetIPFilteringDisable.3. ClickSubmit.4.3.3 SettingAllowaccessnetworkoutsidetherulesTosetallowaccessnetwork,performthefollowingsteps:1. ChooseSecurity>IPFiltering.2. SetAllowaccessnetworkoutsidetherules.3. ClickSubmit.
  4.3.4 SettingDenyaccessnetworkoutsidetherulesTosetallowaccessnetwork,performthefollowingsteps:1. ChooseSecurity>IPFiltering.2. SetDenyaccessnetworkoutsidetherules.3. ClickSubmit. 4.3.5 AddingIPFilteringruleAddanIPaddressfilteringrule,performthefollowingsteps:1. ChooseSecurity>IPFiltering.2. ClickAddlist.3. SetService.4. SetProtocol.5. IntheSourceIPAddressRangebox,enterthesourceIPaddressorIPaddresssegmenttobefiltered.6. IntheSourceportrangebox,enterthesourceportorportsegmenttobefiltered.7. IntheDestinationIPAddressRangebox,enterthedestinationIPaddressorIPaddresssegmenttobefiltered.8. IntheDestinationportRangebox,enterthedestinationportorportsegmenttobefiltered.9. IntheStatusbox,chooseastatustherulewillbeexecuted.10. ClickSubmit.4.3.6 ModifyingIPFilteringruleTomodifyanIPfilteringrule,performthefollowingsteps:1. ChooseSecurity>IPFiltering.2. Choosetheruletobemodified,andclickEdit.3. Repeatsteps3through9inthepreviousprocedure.4. ClickSubmit.4.3.7 DeletingIPFilteringruleTodeleteanIPaddressfilteringrule,performthefollowingsteps:1. ChooseSecurity>IPFiltering.2. Choosetheruletobedeleted,andclickDelete.
  4.4 URLFilteringDataisfilteredbyuniformresourcelocator(URL).ThispageenablesyoutoconfigureURLfilteringrules.AsshowninFigure4‐4.Figure4‐44.4.1 EnablingURLFilteringToenableURLFiltering,performthefollowingsteps:1. ChooseSecurity>URLFiltering.2. SetURLFilteringtoEnable.3. ClickSubmit.4.4.2 DisablingURLFilteringTodisableURLFiltering,performthefollowingsteps:1. ChooseSecurity>URLFiltering.2. SetURLFilteringtoDisable.3. ClickSubmit.4.4.3 AddingURLFilteringlistToaddaURLfilteringlist,performthefollowingsteps:1. ChooseSecurity>URLFiltering.2. ClickAddlist.3. SetURL.4. ClickSubmit.
  4.4.4 ModifyURLFilteringlistTomodifyaURLfilteringrule,performthefollowingsteps:1. ChooseSecurity>URLFiltering.2. Choosetheruletobemodified,andclickEdit.3. SetURLaddress.4. ClickSubmit. 4.4.5 DeletingURLFilteringlistTodeleteaURLlist,performthefollowingsteps:1. ChooseSecurity>URLFiltering.2. Choosetheitemtobedeleted,andclickDelete.4.5 PortForwardingWhennetworkaddresstranslation(NAT)isenabledontheCPE,onlytheIPaddressontheWANsideisopentotheInternet.IfacomputerontheLANisenabledtoprovideservicesfortheInternet(forexample,workasanFTPserver),portforwardingisrequiredsothatallaccessestotheexternalserverportfromtheInternetareredirectedtotheserverontheLAN.AsshowninFigure4‐5. Figure4‐54.5.1 AddingPortForwardingruleToaddaportforwardingrule,performthefollowingsteps:1. ChooseSecurity>PortForwarding.2. ClickAddlist.
  3. SetService.4. SetProtocol.5. SetRemoteportrange.Theportnumberrangesfrom1to65535.6. SetLocalhost.ThisIPaddressmustbedifferentfromtheIPaddressthatissetontheLANHostSettingspage,buttheymustbeonthesamenetworksegment.7. SetLocalport.Theportnumberrangesfrom1to65535.8. ClickSubmit.4.5.2 ModifyingPortForwardingruleTomodifyaportforwardingrule,performthefollowingsteps:1. ChooseSecurity>PortForwarding.2. Choosetheitemtobemodified,andclickEdit.3. Repeatsteps3through7inthepreviousprocedure.4. ClickSubmit.4.5.3 DeletingPortForwardingruleTodeleteaportforwardingrule,performthefollowingsteps:1. ChooseSecurity>PortForwarding.2. Choosetheitemtobedeleted,andclickDelete.
  4.6 AccessRestrictionFigure4‐64.6.1 AddAccessRestrictionToaddaaccessrestrictionrule,performthefollowingsteps:1. ChooseSecurity>AccessRestriction.2. ClickAddlist.3. SetAccessRestrictiontoEnable.4. SetAccessRestrictionName.5. SetDeviceMACaddressorIPaddress.6. SetWeekdaysandtime.7. ClickSubmit.4.6.2 ModifyAccessRestrictionTomodifyaaccessrestrictionrule,performthefollowingsteps:1. ChooseSecurity>AccessRestriction.2. Choosetheitemtobemodified,andclickEdit.3. Repeatsteps4through6inthepreviousprocedure.4. ClickSubmit. 4.6.3 DeleteAccessRestrictionTodeleteaaccessrestrictionrule,performthefollowingsteps:1. ChooseSecurity>AccessRestriction.
  2. Choosetheitemtobedeleted,andclickDelete.4.7 UPnPOnthispage,youcanenableordisabletheUniversalPlugandPlay(UPnP)function.ToenableUPnP,performthefollowingsteps:1. ChooseSecurity>UPnP.2. SetUPnPtoEnable.3. ClickSubmit.AsshowninFigure4‐7.Figure4‐75 VPNSettingThisfunctionenablesyoutoconnectthevirtualprivatenetwork(VPN).ToconnecttheVPN,performthefollowingsteps:1. ChooseVPNSetting.2. IntheVPNSettingarea,enableVPN.3. SelectaprotocolfromProtocoldrop‐downlist.4. EnterUsernameandPassword.5. ClickSubmit.6. YoucanviewthestatusinVPNStatusarea.AsshowninFigure5‐1.
   Figure5‐16 System6.1 MaintenanceFigure6‐16.1.1 RadioToswitchtheradio,performthefollowingsteps:1. ChooseSystem>Maintenance.
  2. ClickON/OFFtoswitchradio.6.1.2 RestartThisfunctionenablesyoutorestarttheCPE.SettingstakeeffectonlyaftertheCPErestarts.TorestarttheCPE,performthefollowingsteps:1. ChooseSystem>Maintenance.2. ClickRestart.TheCPEthenrestarts.6.1.3 ResetThisfunctionenablesyoutorestoretheCPEtoitsdefaultsettings.TorestoretheCPE,performthefollowingsteps:1. ChooseSystem>Maintenance.2. ClickReset.TheCPEisthenrestoredtoitsdefaultsettings.6.1.4 DownloadConfigurationFileYoucandownloadtheexistingconfigurationfiletobackitup.To doso:1. ChooseSystem>Maintenance.2. ClickDownloadontheMaintenancepage.3. Inthedisplayeddialogbox,selectthesavepathandnameoftheconfigurationfiletobebackedup.4. ClickSave.Theprocedureforfiledownloadingmayvarywiththebrowseryouareusing.6.1.5 UploadConfigurationFileYoucanuploadabackedupconfigurationfiletorestoretheCPE.Todoso:1. ChooseSystem>Maintenance.2. ClickBrowseontheMaintenancepage.3. Inthedisplayeddialogbox,selectthebackedupconfigurationfile.4. ClickOpen.5. Thedialogboxchoses.IntheboxtoberightofConfigurationfile,thesavepathandnameofthebackedupconfigurationfilearedisplayed.6. ClickUpload.TheCPEuploadsthebackedupconfigurationfile.TheCPEthenautomaticallyrestarts.
  6.2 VersionManagerThisfunctionenablesyoutoupgradethesoftwareversionoftheCPEtothelatestversion.Itisrecommendedthatyouupgradethesoftwarebecausethenewversion,certainbugshavebeenfixedandthesystemstabilityisusuallyimproved.6.2.1 ViewingVersionInfoToviewtheversioninfo,performthefollowingsteps:1. ChooseSystem>VersionManager.2. IntheVersionInfoarea,youcanviewtheproductnameandsoftwareversion.AsshowninFigure6‐2. Figure6‐26.2.2 VersionUpgradeToperformanupgradesuccessfully,connecttheCPEtoyourcomputerthroughanetworkcable,savetheupgradefileonthecomputer,andmakesuretheCPEisnotconnectedtoanythingotherthanapoweradapterandthecomputer.Toperformanupgrade,performthefollowingsteps:1. ChooseSystem>VersionManager.2. IntheVersionUpgradearea,clickBrowse.Inthedisplayeddialogbox,selectthetargetsoftwareversionfile.3. ClickOpen.Thedialogboxchoses.ThesavepathandnameofthetargetsoftwareversionfilearedisplayedintheUpdatefilefield.4. ClickSubmit.5. Thesoftwareupgradestarts.Aftertheupgrade,theCPEautomaticallyrestartsandrunsthenewsoftwareversion.AsshowninFigure6‐3.
  Duringanupgrade,donotpowerofftheCPEordisconnectitfromthecomputer. Figure6‐36.3 FTPautoupgradeToperformaftpautoupgradesuccessfully,makesuretheCPEisconnectedtotheInternet.AsshowninFigure6‐4. Figure6‐4
  Toperformaftpautoupgrade,performthefollowingsteps:1. ChooseSystem>FTPautoupgrade.2. EnableFTPautoupgrade.3. IfyouwanttochecknewfirmwareafterconnecttoInternet,youneedtoenabletheitemofChecknewfirmwareafterconnecttoInternet.4. SetaftpaddresstotheUpgradefolderbox.5. SetVersionfile.6. SetUsernameandPassword.7. SettheIntervalofcheckingnewfirmware.8. SetStarttime.9. SetRandomtime.10. ClickSubmit.TheCPEwillautomaticallyupgradeaccordingtothesetting.Duringanupgrade,donotdisconnectthepowersupplyoroperatetheCPE.6.4 TR069TR‐069isastandardforcommunicationbetweenCPEsandtheauto‐configurationserver(ACS).IfyourserviceproviderusestheTR069automaticserviceprovisionfunction,theACSautomaticallyprovidestheCPEparameters.IfyousettheACSparametersonboththeCPEandACS,thenetworkparametersontheCPEareautomaticallysetusingtheTR‐069function,andyoudonotneedtosetotherparametersontheCPE.AsshowninFigure6‐5. Figure6‐5
  ToconfiguretheCPEtoimplementtheTR‐069function,performthefollowingsteps:1. ChooseSystem>TR‐069Settings.2. SetacsURLsource.Therearetwomethods,suchasURLandDHCP.3. IntheACSURLbox,entertheACSURLaddress.4. EnterACSusernameandpasswordfortheCPEauthentication.TousetheCPEtoaccesstheACS,youmustprovideausernameandpasswordforauthentication.TheusernameandthepasswordmustbethesameasthosedefinedontheACS.5. IfyousetPeriodicinformtoEnable,setPeriodicinforminterval.6. Setconnectionrequestusernameandpassword.7. ClickSubmit.6.5 Date&TimeYoucansetthesystemtimemanuallyorsynchronizeitwiththenetwork.IfyouselectSyncfromnetwork,theCPEregularlysynchronizesthetimewiththespecifiedNetworkTimeProtocol(NTP)server.Ifyouenabledaylightsavingtime(DST),theCPEalsoadjuststhesystemtimeforDST.Asshownin6‐6. Figure6‐6Tosetthedateandtime,performthefollowingsteps:1. ChooseSystem>Date&Time.
  2. SelectSetmanually.3. SetLocaltimeorclickSynctoautomaticallyfillinthecurrentlocalsystemtime.4. ClickSubmit.Tosynchronizethetimewiththenetwork,performthefollowingsteps:1. ChooseSystem>Date&Time.2. SelectSyncfromnetwork.3. FromthePrimaryNTPserverdrop‐downlist,selectaserverastheprimaryserverfortimesynchronization.4. FromtheSecondaryNTPserverdrop‐downlist,selectaserverastheIPaddressofthesecondaryserverfortimesynchronization.5. Ifyoudon’twanttouseotherNTPserver,youneedtoenableOptionalntpserver,andsetaserverIPaddress.6. SetTimezone.7. ClickSubmit.TosetDST,performthefollowingsteps:1. ChooseSystem>Date&Time.2. SetDSTenable.3. SetStartTimeandEndTime.4. ClickSubmit.TheCPEwillautomaticallyprovidetheDSTtimebasedonthetimezone.6.6 DDNSDynamicDomainNameServer(DDNS)serviceisusedtomaptheuser'sdynamicIPaddresstoafixedDNSservice.AsshowninFigure6‐7.
   Figure6‐7ToconfigureDDNSsettings,performthefollowingsteps:1. ChooseSystem>DDNS.2. SetDDNStoEnable.3. InServiceprovider,chooseDynDNS.orgororay.com.4. EnterDomainnameandHostname.Forexample,ifthedomainnameprovidedbyyourserviceprovideristest.customtest.dyndns.org,entercustomtest.dyndns.orgasDomainname,andtestasHostname.5. EnterUsernameandPassword.6. ClickSubmit.6.7 DiagnosisIftheCPEisnotfunctioningcorrectly,youcanusethediagnosistoolsontheDiagnosispagetopreliminarilyidentifytheproblemsothatactionscanbetakentosolveit.6.7.1 PingIftheCPEfailstoaccesstheInternet,runthepingcommandtopreliminarilyidentifytheproblem.Todoso:1. ChooseSystem>Diagnosis.2. IntheMethodarea,selectPing.3. EnterthedomainnameintheTargetIPordomainfield,forexample,www.google.com.4. SetPacketsizeandTimeout.
  5. SetCount.6. ClickPing.Waituntilthepingcommandisexecuted.TheexecutionresultsaredisplayedintheResultsbox.AsshowninFigure6‐8. Figure6‐86.7.2 TracerouteIftheCPEfailstoaccesstheInternet,runtheTraceroutecommandtopreliminarilyidentifytheproblem.Todoso:1. ChooseSystem>Diagnosis.2. IntheMethodarea,selectTraceroute.3. EnterthedomainnameintheTargetIPordomainfield.Forexample,www.google.com.4. SetMaximumhopsadTimeout.5. ClickTraceroute.Waituntilthetracerouecommandisexecuted.TheexecutionresultsaredisplayedintheResultsbox.AsshowninFigure6‐9.
   Figure6‐96.8 PortMirrorThisfunctionenablesyoutomonitororanalysisthedataflowofoneormorenetworkinterface.AsshowninFigure6‐10. Figure6‐10ToenablethePortMirror,performthefollowingsteps:1. ChooseSystem>PortMirror.2. SetPortMirrortoEnable.3. FromtheWANinterfacedrop‐downlist,selectaninterface.4. IntheForwardIPaddressbox,entertheIPaddress.5. ClickSubmit.6.9 SyslogThesyslogrecorduseroperationsandkeyrunningevents.
  6.9.1 LocalTosetthesyslogtolocal,performthefollowingsteps:1. ChooseSystem>Syslog.2. IntheSettingarea,setthemethodtoLocal.3. IntheLeveldrop‐downlist,selectaloglevel.4. ClickSubmit.ViewinglocalsyslogToviewthelocalsyslog,performthefollowingsteps:1. IntheKeywordbox,setakeyword.2. ClickPull,theresultboxwilldisplay.AsshowninFigure6‐11. Figure6‐116.9.2 NetworkTosetthesyslogtonetwork,performthefollowingsteps:1. ChooseSystem>Syslog.2. IntheSettingarea,setthemethodtoNetwork.3. IntheLeveldrop‐downlist,selectaloglevel.4. IntheForwardIPaddressbox,setaIPaddress.5. ClickSubmit.AsshowninFigure6‐12.
   Figure6‐12Thesyslogwilltransmittosomeclienttodisplaythroughnetwork.6.10 WEBsettingToconfiguretheparametersofWEB,performthefollowingsteps:1. ChooseSystem>WEBSetting.2. SetHTTPenable.IfyousetHTTPdisable,youwillcan’tloginthewebmanagementpagewiththeHTTPprotocol.3. SetHTTPport.Ifyouwanttochangetheloginport,youcansetanewportinthebox,thedefaultHTTPportis80.4. SetHTTPSenable.IfyouwanttologinthewebmanagementpagewiththeHTTPSprotocol,youneedtoenabletheHTTPS.5. IfyouwanttologinthewebmanagementpageformtheWAN,youneedtoEnableAllowingloginfromWAN.6. SettheHTTPSport.7. SetRefreshtime.8. SetSessiontimeout.9. ClickSubmit.AsshowninFigure6‐13.
   Figure6‐136.11 AccountThisfunctionenablesyoutochangetheloginpasswordoftheuser.Afterthepasswordchanges,enterthenewpasswordthenexttimeyoulogin.AsshowninFigure6‐14.Figure6‐14Tochangethepassword,performthefollowingsteps:1. ChooseSystem>Account.2. Selecttheusername,ifyouwanttochangethepasswordofnormaluser,youneedtosetEnableUserenable.3. Enterthecurrentpassword,setanewpassword,andconfirmthenewpassword.4. NewpasswordandConfirmpasswordmustcontain5to15characters.5. ClickSubmit.6.12 LogoutTologoutthewebmanagementpage,performthefollowingsteps:1. ChooseSystemandclickLogout
  2. Itwillbacktotheloginpage.7 FAQsThePOWERindicatordoesnotturnon. MakesurethatthepowercableisconnectedproperlyandtheCPEispoweredon. MakesurethatthepoweradapteriscompatiblewiththeCPE.FailstoLogintothewebmanagementpage. MakesurethattheCPEisstarted. VerifythattheCPEiscorrectlyconnectedtothecomputerthroughanetworkcable.Iftheproblempersists,contactauthorizedlocalservicesuppliers.TheCPEfailstosearchforthewirelessnetwork. Checkthatthepoweradapterisconnectedproperly. CheckthattheCPEisplacedinanopenareathatisfarawayfromobstructions,suchasconcreteorwoodenwalls. CheckthattheCPEisplacedfarawayfromhouseholdelectricalappliancesthatgeneratestrongelectromagneticfield,suchasmicrowaveovens,refrigerators,andsatellitedishes.Iftheproblempersists,contactauthorizedlocalservicesuppliers.ThepoweradapteroftheCPEisoverheated. TheCPEwillbeoverheatedafterbeingusedforalongtime.Therefore,powerofftheCPEwhenyouarenotusingit. CheckthattheCPEisproperlyventilatedandshieldedfromdirectsunlight.Theparametersarerestoredtodefaultvalues. IftheCPEpowersoffunexpectedlywhilebeingconfigured,theparametersmayberestoredtothedefaultsettings. Afterconfiguringtheparameters,downloadtheconfigurationfiletoquicklyrestoretheCPEtothedesiredsettings.
FCCRegulationsThisdevicecomplieswithpart15oftheFCCRules.Operationissubjecttothefollowingtwoconditions:(1)Thisdevicemaynotcauseharmfulinterference,and(2)thisdevicemustacceptanyinterferencereceived,includinginterferencethatmaycauseundesiredoperation.ThisequipmenthasbeentestedandfoundtocomplywiththelimitsforaClassBdigitaldevice,pursuanttopart15oftheFCCRules.Theselimitsaredesignedtoprovidereasonableprotectionagainstharmfulinterferenceinaresidentialinstallation.Thisequipmentgenerates,usesandcanradiateradiofrequencyenergyand,ifnotinstalledandusedinaccordancewiththeinstructions,maycauseharmfulinterferencetoradiocommunications.However,thereisnoguaranteethatinterferencewillnotoccurinaparticularinstallation.Ifthisequipmentdoescauseharmfulinterferencetoradioortelevisionreception,whichcanbedeterminedbyturningtheequipmentoffandon,theuserisencouragedtotrytocorrecttheinterferencebyoneormoreofthefollowingmeasures:—Reorientorrelocatethereceivingantenna.—Increasetheseparationbetweentheequipmentandreceiver.—Connecttheequipmentintoanoutletonacircuitdifferentfromthattowhichthereceiverisconnected.—Consultthedealeroranexperiencedradio/TVtechnicianforhelp.Caution:Changesormodificationsnotexpresslyapprovedbythemanufacturercouldvoidtheuser’sauthoritytooperatetheequipment.
ThisequipmentcomplieswiththeFCCRFradiationexposurelimitssetforthforanuncontrolledenvironment.Thisequipmentshouldbeinstalledandoperatedwithaminimumdistanceof20cmbetweentheradiatorandanypartofyourbody.Theantennasmustnotbeco‐locatedwithothertransmitterantennas.

Navigation menu