Tecom Co WM5347N WiMAX Indoor CPE User Manual WM5347N v1 3b nc
Tecom Co Ltd WiMAX Indoor CPE WM5347N v1 3b nc
Tecom Co >
Contents
- 1. user manual
- 2. revised manual
- 3. User Manual
user manual
WIMAX CPE WM5347N Users Manual Version: 1.3b Release Date: 2010-10-06 Copyright © 2010 TECOM communications WM5347N User Manual Revision and Amendment Records Revision Date Descriptions Author 1.0 2010-03-12 Initial Draft Hsling Lin 1.1 2010-03-19 Initial Release Hsling Lin 1.2 2010-06-15 Initial Release Dennis Tien 1.3b 2010-10-06 Release Dennis Tien, Kevin Tsou WM5347N User Manual Table of Contents 1. OVERVIEW.................................................................................................................... 1 2. INSTALLATION............................................................................................................. 2 2.1. 2.2. 2.3. 2.4. 3. IN THE BOX ......................................................................................................................... 2 INDICATORS ........................................................................................................................ 3 CONNECTORS ..................................................................................................................... 4 NETWORK CONNECTION ...................................................................................................... 6 INTRODUCTION ........................................................................................................... 8 3.1. 3.2. 3.3. 3.4. CONNECT ........................................................................................................................... 8 LOGOUT.............................................................................................................................. 9 HOME ................................................................................................................................. 9 ABOUT ...............................................................................................................................10 4. WIZARD....................................................................................................................... 11 5. NETWORK .................................................................................................................. 16 5.1. LAN ..................................................................................................................................16 5.1.1. IP...............................................................................................................................16 5.1.2. DHCP ........................................................................................................................17 5.2. WAN.................................................................................................................................19 5.2.1. WAN..........................................................................................................................19 5.2.2. PPPoE.......................................................................................................................21 5.2.3. GRE ..........................................................................................................................23 5.2.4. EtherIP ......................................................................................................................24 5.3. VLAN ................................................................................................................................25 5.4. DDNS ...............................................................................................................................27 6. ADVANCED SETTING ................................................................................................ 29 6.1. NAT ..................................................................................................................................29 6.1.1. Port Forward..............................................................................................................29 6.1.2. Port Trigger ...............................................................................................................31 6.1.3. DMZ ..........................................................................................................................33 6.1.4. ALG ...........................................................................................................................34 6.2. FIREWALL ..........................................................................................................................35 6.2.1. IP Filter ......................................................................................................................35 6.2.2. MAC Filter .................................................................................................................36 6.2.3. DDOS........................................................................................................................37 6.3. ROUTE...............................................................................................................................38 6.3.1. Static Route...............................................................................................................38 6.3.2. RIP ............................................................................................................................39 6.4. UPNP................................................................................................................................42 6.4.1. UPnP Setting.............................................................................................................42 ii WM5347N User Manual 6.5. IGMP PROXY .....................................................................................................................42 6.5.1. IGMP Proxy Setting ...................................................................................................42 6.6. CONTENT FILTER................................................................................................................43 7. VPN SETTING ............................................................................................................. 45 7.1. PPTP................................................................................................................................45 7.1.1. PPTP Server .............................................................................................................45 7.1.2. PPTP Client ...............................................................................................................47 7.2. L2TP.................................................................................................................................49 7.2.1. L2TP Server ..............................................................................................................49 7.2.2. L2TP Client................................................................................................................51 7.3. IPSEC ................................................................................................................................53 7.3.1. Connection ................................................................................................................53 8. VOIP PHONE............................................................................................................... 59 8.1. GENERAL ...........................................................................................................................59 8.1.1. System ......................................................................................................................59 8.1.2. Media ........................................................................................................................59 8.1.3. QoS ...........................................................................................................................61 8.1.4. Provision....................................................................................................................62 8.2. ACCOUNT ..........................................................................................................................63 8.2.1. Status ........................................................................................................................63 8.2.2. Server........................................................................................................................64 8.2.3. User...........................................................................................................................66 8.2.4. Feature......................................................................................................................69 8.2.5. Dialing .......................................................................................................................71 8.2.6. Speed Dial.................................................................................................................72 8.2.7. FAX ...........................................................................................................................73 8.2.8. RTP ...........................................................................................................................73 8.3. LINE ..................................................................................................................................74 8.3.1. Phone........................................................................................................................74 8.3.2. Voice .........................................................................................................................75 8.3.3. Profile ........................................................................................................................77 9. WIMAX......................................................................................................................... 78 9.1. PROFILE ............................................................................................................................78 9.1.1. Connect Settings .......................................................................................................78 9.1.2. Frequency Settings....................................................................................................79 9.1.3. Authentication Settings ..............................................................................................81 9.2. CONNECT ..........................................................................................................................84 9.3. WIDE SCAN ........................................................................................................................85 9.4. LINK STATUS ......................................................................................................................86 9.5. LINK STATISTICS ................................................................................................................87 9.6. CONNECTION INFO .............................................................................................................88 9.7. SERVICE FLOW ..................................................................................................................89 10. WIFI .......................................................................................................................... 90 iii WM5347N User Manual 10.1. WLAN...............................................................................................................................90 10.2. MAC ADDRESS FILTER .......................................................................................................95 10.3. STA LIST ...........................................................................................................................96 11. ADMINISTRATOR.................................................................................................... 98 11.1. REMOTE CONTROL .............................................................................................................98 11.1.1. HTTP.........................................................................................................................98 11.1.2. TELNET.....................................................................................................................99 11.1.3. SSH.........................................................................................................................100 11.1.4. SNMP ......................................................................................................................101 11.1.5. TR-069 ....................................................................................................................102 11.1.6. OMA-DM .................................................................................................................103 11.2. PASSWORD ......................................................................................................................105 12. SYSTEM ................................................................................................................. 107 12.1. DATE AND TIME ................................................................................................................107 12.1.1. Date.........................................................................................................................107 12.1.2. Time Zone ...............................................................................................................108 12.2. UPGRADE FIRMWARE .......................................................................................................109 12.2.1. Upgrade File............................................................................................................109 12.2.2. Upgrade Link ...........................................................................................................110 12.2.3. 111 12.3. LOG .................................................................................................................................111 12.4. BACKUP/RESTORE ...........................................................................................................112 12.4.1. Configuration Backup ..............................................................................................112 12.4.2. Configuration Restore..............................................................................................114 12.4.3. Factory Defaults ......................................................................................................115 iv WM5347N User Manual List of Figures FIGURE 1. DEVICE INSTALLATION .......................................................................................... 2 FIGURE 2. DEVICE FRONT PANEL ......................................................................................... 3 FIGURE 3. DEVICE PEAR PANEL ........................................................................................... 4 FIGURE 4. OVERVIEW OF HARDWARE CONNECTIONS ............................................................. 6 FIGURE 5. LOGIN................................................................................................................. 8 FIGURE 6. LOGOUT ............................................................................................................. 9 FIGURE 7. HOME ................................................................................................................. 9 FIGURE 8. ABOUT CPE CONFIGURATION MANAGER ............................................................. 10 FIGURE 9. WIZARD LAN SETTINGS ..................................................................................... 11 FIGURE 10. WIZARD W IMAX FREQUENCY (BY LIST).............................................................. 12 FIGURE 11. WIZARD W IMAX FREQUENCY (BY RANGE) ......................................................... 12 FIGURE 12. WIZARD W IMAX AUTHENTICATION SETTINGS ...................................................... 13 FIGURE 13. WIZARD VOIP SETTINGS .................................................................................... 13 FIGURE 14. WIZARD WLAN SETTINGS ................................................................................. 14 FIGURE 15. WIZARD SAVE ................................................................................................... 15 FIGURE 16. NETWORK TOPOLOGY ........................................................................................ 16 FIGURE 17. NETWORK>LAN>IP .......................................................................................... 17 FIGURE 18. NETWORK>LAN>DHCP.................................................................................... 19 FIGURE 19. NETWORK>WAN>WAN .................................................................................... 21 FIGURE 20. NETWORK>WAN>PPPOE................................................................................. 23 FIGURE 21. NETWORK>WAN>GRE..................................................................................... 24 FIGURE 22. NETWORK>WAN>ETHERIP............................................................................... 24 FIGURE 23. NETWORK>VLAN ............................................................................................. 26 FIGURE 24. NETWORK>DDNS............................................................................................. 28 FIGURE 25. ADVANCED>NAT>PORT FORWARD .................................................................... 30 FIGURE 26. ADVANCED>NAT>PORT FORWARD>W IZARD ...................................................... 31 FIGURE 27. ADVANCED>NAT>PORT TRIGGER ...................................................................... 32 FIGURE 28. ADVANCED>NAT>PORT TRIGGER>W IZARD ........................................................ 33 FIGURE 29. ADVANCED>NAT>DMZ..................................................................................... 34 FIGURE 30. ADVANCED>NAT>ALG ..................................................................................... 35 FIGURE 31. ADVANCED>FIREWALL>IP FILTER ...................................................................... 36 FIGURE 32. ADVANCED>FIREWALL>MAC FILTER .................................................................. 37 WM5347N User Manual FIGURE 33. ADVANCED>FIREWALL>DDOS........................................................................... 38 FIGURE 34. ADVANCED>ROUTE>STATIC ROUTE ................................................................... 39 FIGURE 35. ADVANCED>ROUTE>STATIC ROUTE>ADD ........................................................... 39 FIGURE 36. ADVANCED>ROUTE>RIP ................................................................................... 41 FIGURE 37. ADVANCED>UPNP ............................................................................................ 42 FIGURE 38. ADVANCED>IGMP PROXY ................................................................................. 43 FIGURE 39. ADVANCED>CONTENT FILTER ............................................................................ 44 FIGURE 40. VPN>PPTP SERVER ........................................................................................ 47 FIGURE 41. VPN>PPTP CLIENT .......................................................................................... 48 FIGURE 42. VPN>PPTP CLIENT>ADD ................................................................................. 48 FIGURE 43. VPN>L2TP SERVER ......................................................................................... 51 FIGURE 44. VPN>L2TP CLIENT .......................................................................................... 52 FIGURE 45. VPN>L2TP CLIENT>ADD .................................................................................. 53 FIGURE 46. VPN>IPSEC>CONNECTION OVERVIEW ............................................................... 56 FIGURE 47. VPN>IPSEC>CONNECTION>ADD ....................................................................... 57 FIGURE 48. VPN>IPSEC>CONNECTION>ADD (CONTINUED)................................................... 58 FIGURE 49. VOIP PHONE>GENERAL>SYSTEM ...................................................................... 59 FIGURE 50. VOIP PHONE>GENERAL>MEDIA ......................................................................... 61 FIGURE 51. VOIP PHONE>GENERAL>QOS ........................................................................... 62 FIGURE 52. VOIP PHONE>GENERAL>PROVISION .................................................................. 63 FIGURE 53. VOIP PHONE>ACCOUNT 1-4>STATUS ................................................................ 64 FIGURE 54. VOIP PHONE>ACCOUNT 1-2>SERVER ................................................................ 65 FIGURE 55. VOIP PHONE>ACCOUNT 1-2>USER.................................................................... 68 FIGURE 56. VOIP PHONE>ACCOUNT 1-2>FEATURE .............................................................. 71 FIGURE 57. VOIP PHONE>ACCOUNT 1-2>DIALING ................................................................ 72 FIGURE 58. VOIP PHONE>ACCOUNT 1-2>SPEED DIAL .......................................................... 73 FIGURE 59. VOIP PHONE>ACCOUNT 1-2>FAX ..................................................................... 73 FIGURE 60. VOIP PHONE>ACCOUNT 1-2>RTP..................................................................... 74 FIGURE 61. VOIP PHONE>LINE 1-2>PHONE ......................................................................... 75 FIGURE 62. VOIP PHONE>LINE 1-2>VOICE .......................................................................... 76 FIGURE 63. VOIP PHONE>LINE 1-2>PROFILE ....................................................................... 77 FIGURE 64. WIMAX>PROFILE>CONNECT SETTINGS ............................................................. 79 FIGURE 65. WIMAX>PROFILE>FREQUENCY SETTINGS (BY LIST) ........................................... 80 FIGURE 66. WIMAX>PROFILE>FREQUENCY SETTINGS (BY RANGE)....................................... 81 FIGURE 67. WIMAX>PROFILE>AUTHENTICATION SETTINGS .................................................. 83 vi WM5347N User Manual FIGURE 68. WIMAX>CONNECT ........................................................................................... 85 FIGURE 69. WIMAX>W IDE SCAN......................................................................................... 86 FIGURE 70. WIMAX LINK STATUS ........................................................................................ 87 FIGURE 71. WIMAX LINK STATISTICS ................................................................................... 88 FIGURE 72. WIMAX CONNECTION INFO ................................................................................ 89 FIGURE 73. WIMAX SERVICE FLOW ..................................................................................... 89 FIGURE 74. WIFI>WLAN NONE ......................................................................................... 93 FIGURE 75. WIFI>WLAN WEP ........................................................................................... 94 FIGURE 76. WIFI>WLAN PERSONAL.................................................................................... 94 FIGURE 77. WIFI>WLAN ENTERPRISE ................................................................................. 95 FIGURE 78. WIFI>MAC ADDRESS FILTER ............................................................................. 96 FIGURE 79. WIFI>STA LIST ................................................................................................ 96 FIGURE 80. ADMINISTRATION>REMOTE CONTROL>HTTP...................................................... 99 FIGURE 81. ADMINISTRATION>REMOTE CONTROL>TELNET ............................................... 100 FIGURE 82. ADMINISTRATION>REMOTE CONTROL>SSH...................................................... 100 FIGURE 83. ADMINISTRATION>REMOTE CONTROL>SNMP ................................................... 101 FIGURE 84. ADMINISTRATION>REMOTE CONTROL>TR-069 ................................................. 103 FIGURE 85. ADMINISTRATION>REMOTE CONTROL>OMA-DM .............................................. 104 FIGURE 86. ADMINISTRATION>PASSWORD .......................................................................... 106 FIGURE 87. SYSTEM>DATE/TIME>DATE ............................................................................. 108 FIGURE 88. SYSTEM>DATE/TIME>TIME ZONE ..................................................................... 109 FIGURE 89. SYSTEM>UPGRADE FIRMWARE>UPGRADE FILE ................................................. 110 FIGURE 90. SYSTEM>UPGRADE FIRMWARE>UPGRADE LINK ................................................ 110 FIGURE 91. SYSTEM>UPGRADE FIRMWARE>CWMP UPGRADE ............................................ 111 FIGURE 92. SYSTEM>LOG ................................................................................................. 111 FIGURE 93. SYSTEM>BACKUP/RESTORE>BACKUP .............................................................. 112 FIGURE 94. FILE DOWNLOAD ............................................................................................. 113 FIGURE 95. SAVE FILE AS ................................................................................................. 113 FIGURE 96. SYSTEM>BACKUP/RESTORE>RESTORE ............................................................ 114 FIGURE 97. SYSTEM>BACKUP/RESTORE>FACTORY DEFAULTS ............................................ 115 FIGURE 98. RESTORE TO FACTORY DEFAULT W ARNING ....................................................... 115 vii WM5347N User Manual 1. Overview This chapter provides an overview of the WiMAX modem and describes its features and system requirements. This chapter contains the following topics: Introduction Features System Requirements Introduction Congratulations on becoming the owner of the WiMAX modem. You will now be able to access the Internet using high-speed WiMAX connection. This user manual will show the User how to install and set up this device. Features WiMAX Module for high-speed internet access Features 10/100Base-T Ethernet to provide Internet connectivity for all computers on User LAN Supports 802.16e WAN Access configuration program via a HTML browser System Requirements In order to use this WiMAX modem, User must have the following: Up and running ISP service on User WiMAX network A web browser such as Internet Explorer v5.0, Netscape v4.7 or later- For system configuration, using the supplied web-based program. WM5347N User Manual 2. Installation 2.1. In The Box In addition to this document, the WiMAX modem should come with the following: 1. Warranty Card x 1 2. Quick Installation Guide x 1 3. CD-ROM x 1 4. WM5347N x 1 5. Power Adaptor x 1 6. Ethernet Cable x 1 04 01 02 03 05 06 Figure 1. Device Installation WM5347N User Manual 2.2. Indicators LEDs on the front panel indicate the status of WiMAX modem (see Figure 2). Figure 2. Label Device Front Panel Color Function Power Green On: Unit is powered on Off: Unit is powered off WiMAX Orange On: WAN is active Off: No WAN link WLAN Green On: WIFI is enabled Off: WIFI is disabled WM5347N User Manual Green Signal strength of the WiMAX VoIP1 / VoIP2 Green On: Registered on server Off: Non-register LAN1 / LAN2 Green On: LAN connected Blinking: Data transfer Off: No connection Note: LAN LED’s are on RJ-45 connectors. Table 1. Illustration of WM5047 Front Panel 2.3. Connectors Ports on the rear panel for WiMAX modem are for data and power connections (see Figure 3). Figure 3. Device Pear Panel WM5347N User Manual Label Function LAN1, LAN2 RJ-45 connector: Connect device to PC’s Ethernet port, or to the uplink port on LAN hub, using the cable provided. PHONE1, PHONE2 RJ-11 connector: Connect device to telephone port using the cable provided. RESET Press 5 seconds to return device to Factory Default Setting. ON / OFF Power ON / OFF the modem. POWER Connect to the supplied power adapter cable. Table 2. Illustration of Device Rear Panel Before you start, switch off all devices. These include the User computer(s), WARNING User LAN hub /switch (if applicable), and WiMAX modem. WM5347N User Manual 2.4. Network Connection Figure 4 illustrates the hardware connections. The layout of the parts on the device may differ from the layout shown. Refer to the steps below for specific instructions. Figure 4. Overview of Hardware Connections Step 1. Connect Ethernet cable. If user is connecting WiMAX modem to LAN, attach one end of the Ethernet cable to a regular hub port or PC, and the other to the Ethernet port on WiMAX modem. Step 2. Attach power connector. Connect AC power adapter plug to DC 12V connector on the back of the WiMAX modem and plug power adapter into a wall outlet or power strip. Step 3. Turn the power switch to ON. Turn the power switch to ON. WM5347N User Manual Step 4. Configure WiMAX modem through WEB interface The detail for Step 4 will be described in Chapter 3. It will help user to configure the WiMAX modem based on user needs. Step 5. Save the configurations and Reboot. All the settings that user makes on the WiMAX modem will take effect after rebooting. WM5347N User Manual 3. Introduction The CPE Software platform comes from with a Web-based Configuration Manager, which gives users the ability to manage, configure and analyze the platforms environment. The Connection Manager works with all versions of Windows after Windows 95. The supported browser version: Internet Explorer 6.0 or later (Recommended) Netscape 7.1 and higher Firefox 1.0 and higher Mozilla 1.5 and higher 3.1. Connect User need to connect to the CPE platform properly. It’s assumed that the user has a fully working CPE platform and properly connected. From the web browser, connect to the device by entering the IP address of the device; it will prompt you to enter your username and password. The default usernames and passwords are as follows: Username/password admin/admin guest/guest Figure 5. Login WM5347N User Manual 3.2. Logout The “Logout” window allows users to disconnect from the device and exit the Web-based Configuration Manager. Figure 6. 3.3. Logout Home After you’ve established a connection, you will see the “Home” window. This window shows all the settings as they currently are configured and system information. It gives you an initial overview of the current status of your device. Figure 7. Home WM5347N User Manual 3.4. About The “About” window will show you pertinent version information on the CPE. Figure 8. About CPE Configuration Manager 10 WM5347N User Manual 4. Wizard The wizard will allow you to quickly configure the basic networking settings on the CPE. Click the “Wizard” menu item to enter the wizard. The first page will display all the steps necessary to complete the wizard settings. Click the “Next” button to continue to the next step. Name Description Next Continue to the next step. Back Return to the previous step. Save Commit the changes mad and save to CPE device. Step 1: LAN Settings. In this step you can configure both IP and DHCP configuration parameters. Figure 9. Wizard LAN Settings 11 WM5347N User Manual Step 2: WiMAX Frequency Settings. This step will quickly configure the WiMAX frequencies. You have two forms of configuring the frequency. You can configure it through simply entering a frequency list or by setting a range, by giving a starting and ending frequency value and a step size to traverse the range. Figure 10. Figure 11. Wizard WiMAX Frequency (By List) Wizard WiMAX Frequency (By Range) Step 3: WiMAX Authentication Settings. This will configure WiMAX Authentication settings. There are 4 possible options for “Authentication Mode”. Depending on which mode you select, you will have different EAP settings to configure. 12 WM5347N User Manual Figure 12. Wizard WiMAX Authentication Settings Step 4: VoIP Settings. This step will configure VoIP. Figure 13. Wizard VoIP Settings 13 WM5347N User Manual Step 5: Configures WLAN settings. See section WiFi WLAN for complete details on WLAN setting parameters. Depending on which encryption type you select, you will get corresponding attributes to configure for that encryption type. Figure 14. Wizard WLAN Settings Once you’ve completed all the steps, you need to click on the “Save” button to save the settings, or click on “Back” to return to the previous step. It will reload some services and return to the “Home” window. 14 WM5347N User Manual Figure 15. Wizard Save 15 WM5347N User Manual 5. Network Refer to Figure 12, for proper network connection. Figure 16. 5.1. Network Topology LAN 5.1.1. IP From the “Network>LAN>IP” window, you can update the LAN information. Name Description IP Address IP address of the CPE device. IP Subnet Mask Subnet Mask of the CPE device. Save Commit the changes made, and set the LAN IP information, some services will be reloaded. Cancel Reset fields to the last saved values. 16 WM5347N User Manual Figure 17. 5.1.2. Network>LAN>IP DHCP Use the “Network>LAN>DHCP” tab to configure the DHCP server information. There are three DNS servers the user can configure to assign an IP address. Static DHCP will assign an IP address on the LAN to a specific device based on its MAC address. “Network>LAN>DHCP” Name Description DHCP Server DHCP Mode None Server Relay When Server mode is selected, the DHCP server will assign IP address to its client with the specified IP address range. When Relay IP mode is selected, you need to assign a DHCP relay agent in “Relay IP” column. Start IP Starting IP address range. End IP Ending IP address range. Lease Time The lease time is a controlled time period, allowing the DHCP server to reclaim (and then reallocate) IP addresses that are not renewed (dynamic re-use of IP addresses) Lease time is measured in minutes in the Configuration Manager. Relay IP User needs to assign a DHCP relay agent IP address, when “Relay mode” selected. DNS Server assigned First DNS Server You can specify three DNS server and select how the 17 WM5347N User Manual Second DNS Server Third DNS Server DNS Server is assigned. There are three options for assigning the DNS server: From ISP User Defined None If User selects “None”, then the DHCP server will not give clients the DNS server information. If all the three DNS servers setting are set to “None”, then the DHCP server will use the LAN IP address as the DNS server information for the clients. If the user chooses “User Defined” and leaves the IP address as “0.0.0.0” it will change the field to “None”. Static DHCP Add Click on the “Add” button, to enter a static leased IP address. Enter the MAC address of the Ethernet device and enter the IP address. OK Click the “OK” button to exit the table edit mode. DHCP Leased Hosts Refresh Click the “Refresh” button to refresh DHCP leased hosts information. Save Commit the changes made, and save to CPE device, some services will be reloaded. Cancel Reset fields to the last saved values. 18 WM5347N User Manual Figure 18. 5.2. Network>LAN>DHCP WAN The wide area network is another network that you can connect to the internet with the CPE device. 5.2.1. WAN “Network>WAN>WAN” Name Description WAN IP Operation Mode Here provides three operation modes: Bridge 19 WM5347N User Manual Router NAT WAN Protocol Please base on ISP provides connection method to select one protocol for network connection. Ethernet PPPoE GRE Tunnel EtherIP Tunnel Bridging LAN ARP Bridging LAN ARP: Yes No Get IP Method Enter the IP gotten method: From ISP User WAN IP Request Timeout The time the DHCP client waits to receive the IP address from the BS. If it doesn’t get the IP it will timeout and the CPE will disconnect the WiMAX connection. The default value is 120 seconds. If you enter 0, will wait to receive the IP address infinitely until it’s stopped by the user. WAN IP Address If you chose “User” for IP Method, enter the WAN IP address. WAN IP Subnet Mask If you chose “User” for IP Method, enter the WAN IP subnet Mask. Gateway IP Address If you chose “User” for IP Method, enter the IP gateway address. MTU Enter the MTU. Clone MAC Address Clone MAC address of WAN port. WAN DNS First DNS Server Enter the WAN DNS information. User Defined From ISP If you select “User Defined”, you need to enter a valid IP address for the DNS server. Second DNS Server See First DNS Server. Third DNS Server See First DNS Server. Save Commit the changes made, and save to CPE device, after clicking the Save button you will get a message asking if you want to reboot the CPE. Reboot is required so the 20 WM5347N User Manual device can switch to a different profile. Cancel Reset fields to the last saved values. Figure 19. 5.2.2. Network>WAN>WAN PPPoE Before you configure PPPoE, you need to set “WAN” Protocol to “PPPoE” in WAN page. “Network>WAN>PPPoE” Name Description User Name Enter the username. Password Enter the password. Retype Password Enter the password again. Auth Protocol Require the peer to authenticate itself before allowing network packets to be sent or received. We support the following protocol: 21 WM5347N User Manual PAP: Password Authentication Protocol. CHAP: Challenge Handshake Authentication Protocol. MSCHAP: Microsoft Challenge Handshake Authentication Protocol. MSCHAPv2: Microsoft Challenge Handshake Authentication Protocol, Version2. Encryption Encryption Scheme: None: MPPE 40 bits: 40-bit encryption with MPPE. MPPE 128 bits: 128-bit encryption with MPPE. Auto: automatically select encryption scheme. Idle Timeout Disconnect if the link is idle for the assigned seconds. AC Name AC name. DNS overwrite DNS overwrite. MPPE_Stateful MPPE Stateful. Connection Trigger Connection Trigger Model: AlwaysOn: Trigger connection automatically. Manual: Trigger connection by manual. Connection Timeout Connection timeout. PPPoE Connect Click this button to connect network. PPPoE Disconnect Click this button to disconnect network. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. 22 WM5347N User Manual Figure 20. 5.2.3. Network>WAN>PPPoE GRE Before you configure GRE, you need to set “WAN Protocol” to “GRE Tunnel” in WAN page. “Network>WAN>GRE” Name Description Peer IP Address Enter IP address. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. 23 WM5347N User Manual Figure 21. 5.2.4. Network>WAN>GRE EtherIP Before you configure EtherIP, you should set “WAN Protocol” to “EtherIP Tunnel” in WAN tag. “Network>WAN>EtherIP” Name Description Peer IP Address Enter IP address. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. Figure 22. Network>WAN>EtherIP 24 WM5347N User Manual 5.3. VLAN “Network>VLAN” Name Description Management VLAN VLAN ID Setting the management VLAN ID. Priority Setting the management Priority. Port Settings PVID Group Select the VLAN group as the PVID Priority Setting the port Priority. VLAN Rules VID Setting the VID of this group. Join Add this port into this group. Tag Mark the out-going packets of this port in this VLAN as tagged or untagged. Save Commit the changes made and save to CPE device Cancel Reset fields to the last saved values 25 WM5347N User Manual Figure 23. Network>VLAN 26 WM5347N User Manual 5.4. DDNS “Network>DDNS” Name Description Enable Dynamic DNS Click the check box to enable dynamic DNS. Service Provider Enter the URL of the service provider. Service Type* Enter the service type (DYNDNS only) Dynamic Static Custom Domain Name Enter the domain name. Login Name Enter the username. Password Enter the password. IP Update Policy Select the Policy to be used: Auto Detect WAN IP User Defined User Defined IP If you selected “User Defined” ad the IP policy, then enter the IP address. Wildcards* Allows hostname to use wildcards such as “*”. It will allow “*hos.dyndns.org” to be aliased to the same IP address as “host.hyndns.org”. MX* Enable mail routing. Backup MX* Enable Second mail routing. MX Host* Host where mail will be routed to. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. NOTE: * Supported by DYNDNS service provider 27 WM5347N User Manual Figure 24. Network>DDNS 28 WM5347N User Manual 6. Advanced Setting The “Advanced Settings” window will allow you to set rules for incoming and outgoing traffic. 6.1. NAT Network Address Translation (NAT) is the process of modifying the network address information of the host in a packet while in transit, so that it can be remapped to a given address space in another network. For example, the source address of a packet in a network is changed to a different IP address known within another network. 6.1.1. Port Forward The “Advanced>NAT>Port Forward” tab is used to create “Port Forward” rules based on protocol port. Click the “Add” button to add a Port Forward rule. “Advanced>NAT>Port Forward” Name Description Activate Check the box to activate the “Port Forward” rule. Name Name of the Port Forward rule. Protocol Which Protocol to be matched by the rule? Available options are: TCP, UDP, or TCP/UDP. Incoming Port(s) Which port range to be matched by the Port Forward rule? Enter the starting and ending port range. Forward Ports(s) Which port range will be translated to if it matches the rule? The packet will be forwarded to one of these ports if it matches the rule. Enter the starting and ending port range. Server IP Which IP address will be translated to if it matched the rule? The packet will be forwarded to this IP address if it matched the rule. Trash Delete the Port Forward rule. Add Click the “Add” button to create a new Port Forward rule. Wizard The wizard will allow you to quickly configure Port Forward rule. OK Click the “OK” button to exit the table edit mode. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. 29 WM5347N User Manual Figure 25. Advanced>NAT>Port Forward “Advanced>NAT>Port Forward>Wizard” Name Description Port Forward Rule Select one protocol for Port Forward Rule: Dynamic Name Server (DNS) FTP Server IPSEC Mail(POP3) Mail(SMTP) PPTP RealPlayer 8 Plus SSH SNMP SNMP Trap Telnet Server TFTP Rule Name Name of the Port Forward rule. Protocol Which Protocol to be matched by the rule? Available options are: TCP, UDP, or TCP/UDP. Incoming Start and End Port(s) Which port range to be matched by the Port Forward rule? Enter the starting and ending port range. Forwarding Start and Which port range will be translated to if it matches the rule? End Ports(s) The packet will be forwarded to one of these ports if it matches the rule. Enter the starting and ending port range. 30 WM5347N User Manual Server IP Which IP address will be translated to if it matched the rule? The packet will be forwarded to this IP address if it matched the rule. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. Figure 26. 6.1.2. Advanced>NAT>Port Forward>Wizard Port Trigger The “Advanced>NAT>Port Trigger” tab allows you to configure Port Trigger rules. Port Trigger is a way to automate port forwarding in which outbound traffic on predetermined ports (“trigger port”) causes inbound traffic to specific incoming ports to be dynamically forwarded to the initiating host, while the outbound ports are in use. This allows users behind CPE on the LAN to provide services that would normally require the computer to have IP address on the LAN. Port triggering triggers an open incoming port (‘open port’) when a client on the local network makes an outgoing connection on a predetermined port or range of ports. “Advanced>NAT>Port Trigger” Name Description Activate Check the box to activate the “Port Trigger” rule. Name Name of the Port Trigger rule. Protocol Which Protocol the outgoing packet used will trigger the rule? Available options are: TCP, UDP, or TCP/UDP. Trigger Port(s) Which ports range the outgoing packet will trigger the rule? 31 WM5347N User Manual Enter the starting and ending port range. Open protocol Which protocol will be opened if the rule had been triggered? Available options are: TCP, UDP or TCP/UDP. Trash Delete the Port Trigger rule. Wizard The wizard will allow you to quickly configure Port Forward rule. Add Click the “Add” button to create a new Port Trigger rule. OK Click the “OK” button to exit the table edit mode. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. Figure 27. Advanced>NAT>Port Trigger “Advanced>NAT>Port Trigger>Wizard” Name Description Port Trigger Rule Select one application for Port Trigger Rule: Aim Talk Asheron’s Call Calista IP Phone Net2Phone RainboxSix/Rogue Spea Rule Name Name of the Port Trigger rule. Trigger Protocol Which Protocol the outgoing packet used will trigger the rule? Available options are: TCP, UDP, or TCP/UDP. Trigger Start and Which ports range the outgoing packet will trigger the rule? 32 WM5347N User Manual End Port Enter the starting and ending port range. Open protocol Which protocol will be opened if the rule had been triggered? Available options are: TCP, UDP or TCP/UDP. Open Start and End Port Which ports range of the protocol will trigger the rule? Enter the starting and ending port range. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. Figure 28. 6.1.3. Advanced>NAT>Port Trigger>Wizard DMZ The “Advanced>NAT>DMZ” tab allows you to configure a DMZ (Demilitarized Zone) host IP address. Enter the IP address of the DMZ host. The “Save” button will save the changes to CPE device and the “Cancel” button will reset the field to last saved value. Enter “0.0.0.0” to disable DMZ host. 33 WM5347N User Manual Figure 29. 6.1.4. Advanced>NAT>DMZ ALG There are three ALGs you can enable from “Advanced>NAT>ALG” tab. ALG allows legitimate application traffic to pass through the CPE device that would have otherwise been restricted. Without ALGs, some application may not work well because of NAT/firewall settings. Click on the check box to enable ALGs. NOTE: If you are using any of these types of application protocols you need to enable them in the ALG settings. Enable FTP ALG Enable H.323 ALG Enable IPsec ALG Enable L2TP ALG Enable PPTP ALG Enable RTSP ALG Enable SIP ALG Enable SIP ALG set BSID 34 WM5347N User Manual Figure 30. 6.2. Advanced>NAT>ALG Firewall In networking, firewalls are used to block un-wanted traffic or prevent from DDoS attacks. It will prevent unauthorized devices to enter a trusted network. 6.2.1. IP Filter The IP filter rules will drop or discard traffic that fits the filter criteria. “Advanced>Firewall>IP Filter” Name Description Activate Check the box to activate the “IP Filter” rule. Source IP/Mask Source IP to filter on and mask. Source Port Source port to filter on. Destination IP/Mask Destination IP to filter on and mask. Destination Port Destination port to filter on. Protocol Protocol to filter on. Trash Delete the IP Filter rule. Add Click the “Add” button to create a new IP Filter rule. 35 WM5347N User Manual OK Click the “OK” button to exit the table edit mode. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. Figure 31. 6.2.2. Advanced>Firewall>IP Filter MAC Filter “Advanced>Firewall>MAC Filter” Name Description MAC List Blacklist/Whitelist Select Blacklist or Whitelist. MAC Filter Rules Activate Check the box to activate the “MAC Filter” rule. Source MAC Source MAC to filter on and mask. Destination MAC Destination MAC to filter on and mask. Mon ~ Sun You can select days of week, and setup the “Start Time” Start Time ~ End Time and “End Time” for MAC filter. Add Add a new MAC filter rule. OK Click the “OK” button to exit the table edit mode. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. 36 WM5347N User Manual Figure 32. 6.2.3. Advanced>Firewall>MAC Filter DDOS “Advanced>Firewall>DDOS” Name Description TCP SYN Flood UDP Flood It will prevent SYN flood from WAN or LAN. It will prevent UDP flood to CPE device. ICMP Flood It will prevent ICMP flood from WAN or LAN. Port Scan It will prevent port scanning from WAN and issue an alarm entry in the system log. LAND Attack It will prevent LAND attack. IP Spoof It will prevent IP spoof attack. ICMP redirect It will prevent ICMP redirect attack. PING of Death It will prevent ping of death attack. PING from WAN It will ping from WAN. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. 37 WM5347N User Manual Figure 33. 6.3. Advanced>Firewall>DDOS Route A route is a path in the network, which can direct the flow of network traffic. 6.3.1. Static Route The static route is a hard coded path in the router that specifies how it will get to a certain subnet by using a defined path. “Advanced>Route>Static Route” Name Description Destination IP Enter the Destination IP address you would like to reach. Subnet Mask Enter the subnet mask. Next Hop Select where the next hop will be. WAN or LAN interface directly IP Address Metric Enter the metric value, “cost” of transmission for routing purposes. Trash Will remove the selected route. Add Will enter in edit mode to add a static route. 38 WM5347N User Manual Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. Figure 34. Figure 35. 6.3.2. Advanced>Route>Static Route Advanced>Route>Static Route>Add RIP The Routing Information Protocol (RIP) is a dynamic routing protocol used in local area networks. It allows a router to exchange routing information with other routers. “Advanced>Route>RIP” Name Description General Setup Enable Click the enable check box will activate the RIP routing rule. Redistribute Edit Click “Edit” button to activate the static route or change the metric value. The static route refers to the static routes 39 WM5347N User Manual defined in Advanced>Route>Static Route window. OK Click the “OK” button to exit edit table mode. LAN Direction None RX TX RX/TX Version If you select “RX, TX or RX/TX” for Direction you will get the following RIP version options available. RIP-1 RIP-2B RIP-2M Authentication If you select “RIP-2B or RIP-2M” for Version, you will get the following Authentication options. None Text MD5 Authentication ID If you select “MD5” for Authentication type, you can enter the authentication ID and Key. Authentication Key If you select “Text” for Authentication you can enter a text authentication key. If you select “MD5” for Authentication type, you also need to enter an Authentication ID and Key. WAN Direction None RX TX RX/TX Version If you select “RX, TX or RX/TX” for Direction you will get the following RIP version options available. RIP-1 RIP-2B RIP-2M Authentication If you select “RIP-2B or RIP-2M” for Version, you will get the following Authentication options. None Text MD5 Authentication ID If you select “MD5” for Authentication type, you can enter 40 WM5347N User Manual the authentication ID and Key. Authentication Key If you select “Text” for Authentication you can enter a text authentication key. If you select “MD5” for Authentication type, you also need to enter an Authentication ID and Key. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. Figure 36. Advanced>Route>RIP 41 WM5347N User Manual 6.4. UPnP Two methods of simplifying the process of connecting a device to the network are available. UPnP allows devices to connect seamlessly to networks in the home (data sharing, communications, and entertainment) and in corporate environments for simplified installation of computer components. NAT Port Mapping Protocol (NAT-PMP) allows a computer in a private network (behind a NAT router) to automatically configure the router to allow parties outside the private network to contact itself. 6.4.1. UPnP Setting “Advanced>UPnP” Name Description Enable UPnP Check the check box to enable UPnP. Enable NAT-PMP Check the check box to enable NAT-PMP. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. Figure 37. 6.5. Advanced>UPnP IGMP Proxy IGMP proxy enables the system to issue IGMP host messages on behalf of hosts that the system discovered through standard IGMP interfaces. The system acts as a proxy for its hosts. 6.5.1. IGMP Proxy Setting “Advanced>IGMP Proxy” Name Description Enable IGMP Proxy Check the check box to enable IGMP Proxy. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. 42 WM5347N User Manual Figure 38. 6.6. Advanced>IGMP Proxy Content Filter “Advanced>Content Filter” Name Description URL List Enable URL Filter Check the check box to enable URL Filter Blacklist/Whitelist Select Blacklist or Whitelist: Blacklist : The URL list in “URL Filter Rules” wouldn’t be allowed to access. Whitelist : Only allow to access the URL list in “URL Filter Rules”. URL Filter Rules Active Check the box to activate the “URL Filter” rule. URL Enter the URL. Add Add a new URL filter rule. OK Click the “OK” button to exit edit table mode Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. 43 WM5347N User Manual Figure 39. Advanced>Content Filter 44 WM5347N User Manual 7. VPN Setting The “VPN Settings” window will allow you to set rules for VPN. 7.1. PPTP The Point-to-Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks. PPTP does not provide confidentiality or encryption; it relies on the protocol being tunneled to provide privacy. 7.1.1. PPTP Server “VPN>PPTP Server” Name Description PPTP Server Enable Activate PPTP server. Server Name Offer a server name. Auth Protocol Require the peer to authenticate itself before allowing network packets to be sent or received. We support the following protocol: PAP: Password Authentication Protocol. CHAP: Challenge Handshake Authentication Protocol. MSCHAP: Microsoft Challenge Handshake Authentication Protocol. MSCHAPv2: Microsoft Challenge Authentication Protocol, Version2. Encryption Handshake Encryption Scheme: None: MPPE 40 bits: 40-bit encryption with MPPE. MPPE 128 bits: 128-bit encryption with MPPE. Auto: automatically select. Local IP Address The IP of router. Remote Start IP As sessions are established, IP addresses are assigned starting from “Remote Start IP”. Idle Timeout Disconnect if the link is idle for the assigned seconds. DNS Server 1 The primary DNS (Domain Name Server) addresses to the 45 WM5347N User Manual clients. DNS Server 2 The secondary DNS (Domain Name Server) addresses to the clients. User Access List User Name Username to connect PPTP server via the selected Auth Protocol. Server Server protocol type. Password Password to connect PPTP server via the selected Auth Protocol. IP Address IP address of the connected client. Connection List User Name The user name of the connection. Remote IP Address The peer address of the connection. PPTP IP Address The assigned IP address of PPTP. Login Time The time of the connection created. Link Time(s) Timer from the connected time. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. 46 WM5347N User Manual Figure 40. 7.1.2. VPN>PPTP Server PPTP Client “VPN>PPTP Client” Name Description PPTP Client Add Add a new connection setting. Edit Edit the existed connection setting. Edit PPTP Client Profile Name The name of this connection setting. Auth Protocol The authentication protocol of the peer required. Encryption Encryption Scheme. Server IP Address The IP address of PPTP server. User Name The username to connect PPTP server via the selected 47 WM5347N User Manual Auth Protocol. Password The password of the corresponding username. Retype Type the “Password” again. Get IP automatically? Obtain the dynamic IP address, assigned by the PPTP server. Assign IP Address Assign the static IP address for this connection setting. Idle Timeout Disconnect if the link is idle for the assigned seconds. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. Figure 41. Figure 42. VPN>PPTP Client VPN>PPTP Client>Add 48 WM5347N User Manual 7.2. L2TP In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support Virtual Private Networks (VPNs). It dies not provide any encryption or confidentiality by itself; It relies on an encryption protocol that it passes within the tunnel to provide privacy. The entire L2TP packet, including payload and L2TP header, is sent within a UDP datagram. It is common to carry Point-to-Point Protocol (PPP) sessions within an L2TP tunnel. L2TP does not provide confidentiality or strong authentication by itself. IPsec is often used to secure L2TP packets by providing confidentiality, authentication and integrity. http://en.wikipedia.org/wiki/L2TP#cite_note-0 7.2.1. L2TP Server “VPN>L2TP Server” Name Description L2TP Server Enable Check the box to activate L2TP server. Server Name Enter a server name. Auth Protocol Require the peer to authenticate itself before allowing network packets to be sent or received. The following protocol are supported: PAP: Password Authentication Protocol. CHAP: Challenge Handshake Authentication Protocol. MSCHAP: Microsoft Challenge Handshake Authentication Protocol. MSCHAPv2: Microsoft Challenge Authentication Protocol, Version2. Handshake Encryption Encryption Scheme: No MPPE 40 bits: 40-bit encryption with MPPE. MPPE 128 bits: 128-bit encryption with MPPE. Auto: automatically select. Local IP Address The IP of router. Remote Start IP As sessions are established, IP addresses are assigned starting from “Remote Start IP”. Restrict Client IP? To restrict IP address range for the client. Allow Client IP The IP address range for the client. Idle Timeout Disconnect if the link is idle for the given number of 49 WM5347N User Manual seconds. DNS Server 1 The primary DNS (Domain Name Server) addresses to the clients. DNS Server 2 The secondary DNS (Domain Name Server) addresses to the clients. User Access List User Name Username to connect L2TP server via the selected Auth Protocol. Server Server protocol type. Password Password to connect L2TP server via the selected Auth Protocol. IP Address IP address of the connected client. Connection List User Name The user name of the connection. Remote IP Address The peer address of the connection. L2TP IP Address The assigned IP address of L2TP. Login Time The time of the connection created. Link Time(s) Elapsed time connected. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. 50 WM5347N User Manual Figure 43. 7.2.2. VPN>L2TP Server L2TP Client “VPN>L2TP Client” Name Description L2TP Client Add Add a new connection setting. Edit Edit the existed connection setting. Edit L2TP Client Profile Name The name of this connection setting. Auth Protocol The authentication protocol of the peer required. Select which Authentication protocol to use. 51 WM5347N User Manual PAP CHAP MSCHAPv1 MSCHAPv2 Encryption Encryption Scheme: No MPPE 40 bits: 40-bit encryption with MPPE. MPPE 128 bits: 128-bit encryption with MPPE. Auto: automatically select. Server IP Address The IP address of L2TP server. User Name The username to connect L2TP server via the selected Auth Protocol. Password The password of the corresponding username. Retype Type the “Password” again. Get IP automatically? Obtain the dynamic IP address, assigned by the L2TP server. Assign IP Address Assign the static IP address for this connection setting. Idle Timeout Disconnect if the link is idle for the assigned seconds. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. Figure 44. VPN>L2TP Client 52 WM5347N User Manual Figure 45. 7.3. VPN>L2TP Client>Add IPsec Internet Protocol Security (IPsec) is an end-to-end security solution and operated at the IP Layer. It provides secure communication between pairs of hosts, pairs of security gateways or between security gateways and a host. It’s based on a suite of protocols for securing IP traffic by authenticating and encrypting each IP packet of the data stream. 7.3.1. Connection “VPN>IPsec>Connection” Name Description Configuration Add Click the “Add” button to add an IPsec connection rule. Property Enable Enable IPsec connection. Connection Name The name of the connection. Connection Type Select the connection type: Initiator On Demand Responder Gateway Information Local Endpoint Interface The interface of the CPE public-network interface. Local Endpoint IP The IP address or Domain Name of the CPE 53 WM5347N User Manual Address public-network interface. Remote End point IP The IP address or Domain Name of the remote peer. Address Authentication Method Pre-Shared Key The pre-shared key that two security gateways use to authenticate. Local ID Type States how the authentication. CPE should be identified for IP: The CPE is identified by the assigned IP for authentication. The default value is 0.0.0.0. Content The IP Address. Remote ID Type States how the remote peer should be identified for authentication. IP: The remote peer is identified by the assigned IP for authentication. The default value is 0.0.0.0; this means the CPE will accept any IP. Connect The IP Address. IKE Phase 1 Proposal Add Press the Add button to enter an Encryption and Authentication algorithm. Click the trash to remove the selected algorithm. Encryption Algorithm: DES 3DES AES128 AES192 AES256 Authentication Algorithm: MD5 SHA-1 Proposal OK Click the OK button to exit the table edit mode. Key Group The DH group used to negotiate the IKE/ISAKMP SA. SA Life Time The period that the keying channel of a connection (IKE/ISAKMP SA) should last before being renegotiated. Dead Peer Detection Enable or disable the Dead Peer Detection protocol. 54 WM5347N User Manual (DPD) (RFC 3706) DPD Interval The time interval when R_U_THERE messages are sent to the peer. DPD Idle Try The retry counter for DPD. The timeout interval is “DPD interval” multiplied by “DPD Idle Try”. After the timeout interval all connections to the peer are deleted if they are inactive. Local Network Address Type The private subnet behind the CPE. Single address: The private subnet consisting of one IP address. Subnet address: The private subnet consisting within the subnet IP addresses. Start IP Address The only IP address allowed in the subnet. Subnet Mask The net mask of the subnet. (Subnet address) Local Port Restrict the traffic selector to a single protocol and/or port. Any: No restriction ICMP: Restrict the traffic selector to ICMP protocol. TCP: Restrict the traffic selector to TCP protocol. If the port number is 0, all TCP port numbers are accepted. UDP: Restrict the traffic selector to UDP protocol. If the port number is 0, all UDP port numbers are accepted. Remote Network Address Type The private subnet behind the remote peer. Single address: The private subnet consisting of one IP address. Subnet address: The private subnet consisting of the subnet IP addresses. Start IP Address The only IP address allowed in the subnet. Subnet Mask The net mask of the subnet (Subnet address). Remote Port Restrict the traffic selector to a single protocol and/or port. Any: No restriction ICMP: Restrict the traffic selector to ICMP protocol. TCP: Restrict the traffic selector to TCP protocol. If the port number is 0, all TCP port numbers are accepted. 55 WM5347N User Manual UDP: Restrict the traffic selector to UDP protocol. If the port number is 0, all UDP port numbers are accepted. IPSec Proposal Encapsulation Mode The type of the connection: Tunnel: Signifying a host-to-host, host-to-subnet, or subnet-to-subnet tunnel. Transport: Signifying host-to-host transport mode. Activate Protocol Whether authentication should be done as part of ESP encryption and/or separately using the AH protocol. Encryption Algorithm NULL AES128 AES192 AES256 DES 3DES Authentication Algorithm MD5 SHA-1 SA Life Time The time interval a particular instance of a connection (a set of encryption/authentication keys for user packets) should last, from successful negotiation to expiry. Perfect Forward Secrecy (PFS) Whether Perfect Forward Secrecy of keys is desired on the connection’s keying channel. Save Commit the changes made and save to CPE device Cancel Reset fields to the last saved values Figure 46. VPN>IPsec>Connection Overview 56 WM5347N User Manual Figure 47. VPN>IPsec>Connection>Add 57 WM5347N User Manual Figure 48. VPN>IPsec>Connection>Add (Continued) 58 WM5347N User Manual 8. VoIP Phone 8.1. General Voice over Internet Protocol (VoIP) is a method of delivery of voice communication over the internet or packet-switched network. Internet telephony refers to communications services ― voice, facsimile, and/or voice-messaging applications ― that are transported via the Internet, rather than the public switched telephone network (PSTN). 8.1.1. System “VoIP Phone>General>System” Name Description Timer SIP T1 Interval A T1 timer defined in SIP protocol. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. Figure 49. 8.1.2. VoIP Phone>General>System Media “VoIP Phone>General>Media” Name Description Port Media Port Start RTP local start port number, (start~end) defined the RTP listen port range. Media Port End RTP local end port number. Dynamic Payload 59 WM5347N User Manual Type Setting G.726 16K Default is 96 G.726 24K Default is 97 G.726 32K Default is 98 G.726 40K Default is 99 iLBC Default is 104 Telephone-event Default is 101 Codec Packetization Time Settings G.711 Default is 20 G.723 Default is 30 G.726 Default is 20 G.729 Default is 20 iLBC Default is 30 Advanced Type There are “Dynamic” and “Static” type which can be selected in the voice jitter buffer type. Voice Jitter Buffer Voice Jitter Buffer Length. Voice Jitter Buffer Length Packet Loss Enable to mask the effects of packet loss. Concealment DVCC Enable Enable DVCC. T.38 Static Jitter T.38 Static Jitter Length. Length Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. 60 WM5347N User Manual Figure 50. 8.1.3. VoIP Phone>General>Media QoS QoS is the differentiation between types of traffic and types of services so that the different types of service and traffic can be treated different service. This way, one type can be favored over another. In VoIP, quality simply means being able to listen and speak in a clear and continuous voice, without unwanted noise. DiffServ is a QoS protocol for managing bandwidth application for internet media connections. “VoIP Phone>General>QoS” 61 WM5347N User Manual Name Description QoS Settings SIP ToS/DiffServ The SIP ToS rule will tag each SIP outgoing packet which will prioritize SIP traffic. RTP ToS/DiffServ The RTP ToS rule will tag each RTP outgoing packet which will prioritize RTP traffic. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. Figure 51. 8.1.4. VoIP Phone>General>QoS Provision Provision is a functionality to update the configuration by the FTP protocol. “VoIP Phone>General>Provision” Name Description Provision Settings Enable Enable or Disable. FTP Server FTP server address. File Path File path and file name. Logging User Name Login username. Logging Password Login password. Connection Timeout Connection timeout. Retry Count Retry count. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. 62 WM5347N User Manual Figure 52. 8.2. VoIP Phone>General>Provision Account NOTE: The following figures will apply for Account 1, Account 2, Account 3 and Account 4. 8.2.1. Status Show server information, account register status and call history. 63 WM5347N User Manual Figure 53. 8.2.2. VoIP Phone>Account 1-4>Status Server Configure the server information for Account 1 and Account 2. “VoIP Phone>Account>Server” Name Description Register Server Register Server A SIP registrar is a server in a Session Initiation Protocol (SIP) network that accepts and processes SIP REGISTER requests. Format is “x.x.x.x”. Port Number A registrar server port number, default is 5060. Register Period Time Register refresh time. Proxy Server Proxy Server A SIP proxy is a server in a Session Initiation Protocol 64 WM5347N User Manual (SIP) network that route sip message to a right place. Format is “x.x.x.x”. Port Number A proxy server port number, default is 5060. Outbound Server Outbound Server The outbound proxy is placed alongside the firewall and is the only way to let SIP traffic pass from the internal network to the internet. Format is “x.x.x.x”. Port Number An outbound server port number, default is 5060. NAT Traversal STUN Server Enter the IP address of the STUN server, it will send and receive STUN requests and responses. Simple Traversal of User Datagram Protocol (STUN) through NATs is a standards-based IP protocol used as one of the methods of NAT traversal in applications of real-time voice, video, messaging, and other interactive IP communications. Port Number A STUN server port number, default is 3478. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. Figure 54. VoIP Phone>Account 1-2>Server 65 WM5347N User Manual 8.2.3. User “VoIP Phone>Account>User” Name Description SIP Account Enable Enable or disable the SIP account. Subscriber Number Enter the subscriber number for Line. The number is a unique series of digits of VoIP subscriber. It’s used to interconnect with SIP server, for outgoing or incoming calls. Display Name The display name of the VoIP subscriber, shown when it makes outgoing calls. Maximum name size is 64 characters. Authentication Name A unique string of VoIP subscriber. It’s used to authenticate subscriber to get authorization to perform call setup privilege. Password Enter the password. Codec Settings See Table 3 for Codec options. st 1 Codec Subscriber prefers codec and it has 1st priority in codec negotiation. 2nd Codec Subscriber prefers codec and it has 2nd priority in codec negotiation. 3rd Codec Subscriber prefers codec and it has 3rd priority in codec negotiation. 4th Codec Subscriber prefers codec and it has 4th priority in codec negotiation. 5th Codec Subscriber prefers codec and it has 5th priority in codec negotiation. 6th Codec Subscriber prefers codec and it has 6th priority in codec negotiation. 7th Codec Subscriber prefers codec and it has 7th priority in codec negotiation. th 8 Codec Subscriber prefers codec and it has 8th priority in codec negotiation. 9th Codec Subscriber prefers codec and it has 9th priority in codec negotiation. 66 WM5347N User Manual G.723.1 Rates 5.3 kbps 6.3 kbps iLBC Rates 20 ms 30 ms Media SIP User Agent Name Indicates a specific name for SIP user in SIP message. SIP Port SIP local port, it responsible for the sip packet send and receive. Session Timer Flag Enable Enable session timer. Session Timer The SIP session timer periodical refreshes time. Min Session Timer The minimal SIP session timer periodical refreshes time. Timeout for Ring Ring back timeout. When ring back timeout judge the back action behavior, such as hang-up or busy forward and so on. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. 67 WM5347N User Manual Figure 55. VoIP Phone>Account 1-2>User 68 WM5347N User Manual Codec Settings Options 1. G.729 2. G.723.1 3. G.726 16K 4. G.726 24K 5. G.726 32K 6. G.726 40K 7. G.711 aLaw 8. G.711 mulaw 9. iLBC Table 3: Codec Setting Options 8.2.4. Feature “VoIP Phone>Account>Feature” Name Description Feature Settings Auto Decline Anonymous When VoIP subscriber receives an incoming call with privacy, with display name as “anonymous”. VoIP subscriber can REJECT it when the setting “Auto Decline Anonymous” is enabled. If it’s not enabled it will treat it as a normal incoming call and allow the phone device to ring. Do Not Disturb (DND) When it is enabled, it will reject all incoming call Hide User ID As “Calling Line Identification Restriction (CLIR)”, VoIP subscriber can enable this function to hide its identifier to others, when VoIP subscriber makes an outgoing call. MWI Message waiting indication. The LED on select telephones will light-up to notify the user that they have voicemail. Call Forwarding Setting All Call Forwarding (All CF) Enable/Disable, call forward feature Unconditional CF Enable/Disable unconditional call forward feature. 69 WM5347N User Manual Unconditional CF Target Unconditional call forwarding target number. Busy CF Enable/Disable, busy forward feature. Busy CF Target Busy forward target number. No Answer CF Enable/Disable, No Answer call forward feature. No Answer CF Target No answer call forward target number. Call Waiting Setting Call Waiting Enable/Disable Call waiting feature. Hotline setting Hotline Enable Hotline. Hotline Target The number of hotline target. Hotline Period Time Period time of hotline. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. 70 WM5347N User Manual Figure 56. 8.2.5. VoIP Phone>Account 1-2>Feature Dialing “VoIP Phone>Account>Dialing” Name Description General Dialing Settings 71 WM5347N User Manual Inter-digit Timeout The time period between each digit. First-digit Timeout The maximum time allowed between off-hook and entering the first digit. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. Figure 57. 8.2.6. VoIP Phone>Account 1-2>Dialing Speed Dial “VoIP Phone>Account>FAX” Name Description Speed Dial status Enable Enable Speed dial. Speed Dial Rules User make real number simplify to short number. 72 WM5347N User Manual Figure 58. 8.2.7. VoIP Phone>Account 1-2>Speed Dial FAX “VoIP Phone>Account>FAX” Name Description FAX Settings Options NONE G.711A Pass Through G.711U Pass Through T.38 FAX Relay T.38 FAX Only Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. Figure 59. 8.2.8. VoIP Phone>Account 1-2>FAX RTP “VoIP Phone>Account>RTP” Name Description RTP Setting RTP Detection Enable RTP Detection. Enable RTP Timeout The RTP timeout is used to judge the call is it still alive and do the right action. The range is from 10-300, 40 seconds is the default value. 73 WM5347N User Manual RTP Packet Loss Percentage You can specify the allowable RTP Packet Loss percentage and if it reaches the %, and do the right action. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. Figure 60. 8.3. VoIP Phone>Account 1-2>RTP Line NOTE: The following figures will apply for Line 1 and Line 2. The Line and Account is one-to-one mapping, that is, the Line 1 is mapping to Account 1, and Line 2 is mapping to Account 2. 8.3.1. Phone “VoIP Phone>Line>Phone” Name Description Phone Hook Flash Detect Upper Bound This parameter defines the upper bound of the quick on/off-hook cycle. Hook Flash Detect This parameter defines the lower bound of the quick Lower Bound on/off-hook cycle. Voice Tx Level The voice gain level that is heard by a telephone user. Voice Rx Level The voice gain level that is received by the device. Ring Impedance The impedance between tip and ring on the telephone line. Caller ID Caller ID Type This will allow you to enable and select the Called ID type for your area. You also have the choice to disable caller ID. Disable 74 WM5347N User Manual FSK Bellcore FSK ETSI Japan CLIP Caller ID Display This parameter configures when Caller ID will be displayed. Before Ring After Ring Caller ID Power Level The transmitting power level of caller ID to the telephone. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. Figure 61. 8.3.2. VoIP Phone>Line 1-2>Phone Voice “VoIP Phone>Line>Voice” Name Description VAD Voice Active You can enable and select which voice activity detection to 75 WM5347N User Manual Detector use. It can facilitate speech processing, and can also be used to deactivate some processes during non-speech segments: it can avoid unnecessary coding/transmission of silence packets in VoIP, saving on computation and on network bandwidth. There are 4 choices to select from. Disable Silence Suppression ― NO CNG Silence Suppression ― Only G.711 Annex II Type Silence Suppression ― Codec Specific CN (G.729 and G.732) LEC Line Echo Canceller Tail Length There are processing delays in IP networks that could cause an echo. This function is used to decrease the echo effect. We provide disable, 16ms, 32ms and 48ms echo tail length setting. DRC DRC Enable/Disable DRC. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. Figure 62. VoIP Phone>Line 1-2>Voice 76 WM5347N User Manual 8.3.3. Profile “VoIP Phone>Line>Profile” Name Description Country Profile For different countries, the tones may be different. This parameter is used to set the country name to change the tones. Figure 63. VoIP Phone>Line 1-2>Profile 77 WM5347N User Manual 9. WiMAX This technology is based on the IEEE 802.16 standard, enabling the delivery of last mile wireless broadband access. 9.1. Profile In the profile tab, the user can set WiMAX standard settings, which include how to establish a connection, frequency information and how to authenticate. 9.1.1. Connect Settings “WiMAX>Profile>Connect Settings” Name Description Auto Reconnect Indicate the interval in second to “auto reconnect”. 0 means disabled. Auto connect Mode Connecting base on CINR or RSSI to connect the best signal. NDS Mode Enable NDS mode. NDS Network Parameters File Upload NDS Network Parameters File. Enable Handover Enable Handover. Enable Idle Mode Enable Idle mode. Idle Mode Interval The time interval of idle mode. CINR & RSSI Refresh time interval of CINR & RSSI. Refresh Interval LDRP Time LDRP (Low Data Rate Protection). When it’s enabled, if the uplink/downlink data rate is smaller than the LDRP time, the CPE will send disconnect command to BS. LDRP TX/RX Rate LDRP uplink/downlink data rate. Search Click on the search button to search for available BSIDs. Connect Mode Select a connect mode Auto Connect Mode: It will connect to one of the BSIDs in the list, indiscriminately. Network Search Mode: User needs to select one of the BSIDs from the list, it will use that BSID to connect to WiMAX after device is reboot. 78 WM5347N User Manual Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. Figure 64. 9.1.2. WiMAX>Profile>Connect Settings Frequency Settings The frequency list window will display all the configured frequencies and their bandwidth. To set additional frequencies, click on the “Add” button. “WiMAX>Profile>Frequency Settings” Name Description Setting Type There are two display types you can select. You can choose to display the data by List. If you select 79 WM5347N User Manual “By List” you also have the option to add more frequencies. “By Range” will display the frequency by range and the incremental value. See Figure “Frequency By Range”. Joint Wide Scan Result Yes means to append wide scan result to the frequency setting. Only valid when setting type is “By List”. Valid Band Info Valid band information. If the frequencies aren’t located using the valid band range, the frequency setting will be rejected. Add The “Add” button will aloe you to enter more frequency lists. OK Click the “OK” button to exit the table edit mode. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. Figure 65. WiMAX>Profile>Frequency Settings (By List) 80 WM5347N User Manual Figure 66. 9.1.3. WiMAX>Profile>Frequency Settings (By Range) Authentication Settings “WiMAX>Profile>Authentication Settings” Name Description Authentication Authentication Mode The method used in authentication. Date Encryption AES-CCM Enable the MS’s capability of encrypting/decrypting the traffic by AES-CCM. Data Encryption AES-CBC Enable the MS’s capability of encrypting/decrypting the traffic by AES-CBC. Key Encryption Enable the MS’s capability of decrypting TEK by AES-Key AES-key wrap wrap. Key Encryption Enable the MS’s capability of decrypting TEK by AES-ECB AES-ECB. EAP Supplicant EAP Mode The EAP method used in authentication. Anonymous ID The identity encoded in EAP Identity Response message. Server Root CA Certificate The root CA’s X.509 certificate. MTK-Authorized Device Certificate The MS’s X.509 certificate. 81 WM5347N User Manual Device Private Key The MS’s private key file corresponding to the public key encoded in X.509 certificate. Device Private Key Password The key used to decrypt the MS’s private key file. Inner Mode The EAP-TTLS inner method. User name The user name used in EAP-TTLS inner method. Password The password used in EAP-TTLS inner method. Options Auto Prepend Auth Mode Enable the MS to automatically decorate “{am=i}” in the EAP Identity Response message. The value of “i” depends on Authentication Mode field. Random Outer ID Enable the MS to generate 16-bytes random number as the user name in the EAP Identity Response message. Ignore Cert MS skips to verify the BS’s certificate received in the Verification EAP-TLS or EAP-TTLS procedure. Same EAP outerID Use the same EAP outer id when doing re-auth. in ReAuth MAC address in EAP-TLS outer ID Add MAC address in outer id when EAP mode is EAP-TLS. Delete existed Delete device certificate file which was uploaded in the Device Certificate file filed “MTK-authorized Device Certificate” Delete existed Private Key Delete device private key which was uploaded in the filed “Device Private Key” Save Commit the changes made and save to CPE device Cancel Reset fields to the last saved values 82 WM5347N User Manual Figure 67. WiMAX>Profile>Authentication Settings 83 WM5347N User Manual 9.2. Connect “WiMAX>Connect>Connect” Name Description Disconnect Click the disconnect button to terminate the connection. Connect Click the connect button to connect to a BSID. Connect Mode Select a connect mode. Auto Connect Mode: It will connect to one of the BSIDs in the list, indiscriminately. Network Search Mode: User needs to select one of the BSIDs from the list, it will use that BSID to connect to WiMAX after device is reboot. Search Click the search button to scan the frequency. 84 WM5347N User Manual Figure 68. 9.3. WiMAX>Connect Wide Scan “WiMAX>Wide Scan” Name Description Wide Scan Settings Auto Wide Scan Select “Yes” to do “wide scan” automatically when there are no available BS. Wide Scan Range Add/OK You can specify the wide scan range to reduce search time. 85 WM5347N User Manual Wide Scan Result Search Show the result of wide scan. Search button can trigger wide scan. Clear Clear button clear current search result. Save/ Cancel Save/ Cancel current setting. Figure 69. 9.4. WiMAX>Wide Scan Link Status “WiMAX>Link Status>Link Status” The “Link Status” menu item shows a brief profile of the current WiMAX link. 86 WM5347N User Manual Figure 70. 9.5. WiMAX Link Status Link Statistics “WiMAX>Link Statistics> Link Statistics” The “Link Statistics” menu item will display statistical information in the WiMAX link. 87 WM5347N User Manual Figure 71. 9.6. WiMAX Link Statistics Connection Info “WiMAX>Connection Info>Connection Info” The connection info window will show the connection ID and its connection type. 88 WM5347N User Manual Figure 72. 9.7. WiMAX Connection Info Service Flow “WiMAX>Service Flow>Service Flow” The WiMAX service flow window will show the status and direction of each service flow ID. Figure 73. WiMAX Service Flow 89 WM5347N User Manual 10. WiFi Based on the IEEE 802.11 set of standards, WiFi provides wireless networking capabilities. 10.1. WLAN “WiFi>WLAN” Name Description WLAN Settings Enable WLAN This will enable the CPE to function as a WiFi Access Point. WLAN Mode Select the WLAN protocol. WLAN Channel Select the WLAN channel. See Table 4 for Channel description. “Auto” will allow CPE to choose the best channel automatically. WLAN Maximum STA number The maximum STA number of WLAN. It will control the number user via WLAN to access internet. WLAN TxPower This will control transmit power of WLAN. WLAN TxRate This will limit transmit rate of WLAN. WLAN Beacon Interval The time interval of WAN beacon. WLAN DTIM period The period of WLAN DTIM. WLAN RTS Threshold Default is 2347. WLAN Fragmentation Threshold Default is 2346. Enable WPS Enabling the Wi-Fi Protected Setup (WPS) will allow you to easily configure security on your wireless network. WPS PIN When using WPS PIN mode, input the PIN (Personal Identification Number) code read from the new wireless client. Multiple BSSID number Select how many BSSID will be created. Configure SSID Select which BBSID to be configured. 90 WM5347N User Manual WLAN SSID Service Set Identifier. The network name used to identify the WLAN. All the WiFi devices on the WLAN must use the same SSID to connect to the CPE. Hide SSID Check the box to prevent the CPE from broadcasting its SSID. Encryption Type Select the encryption type. You will see further encryption setting for the selected encryption type. For instance, if you select WEP, then you will see WEP settings. NONE WEP WPA Personal WPA Enterprise WEP Settings If “WEP” is selected as the encryption type, you will see the following setting. Authentication Method Two types of authentication: OPEN SYSTEM: Open system authentication. All clients that request access to the CPE are accepted without actual authentication. SHARED KEY: Shared Key authentication require the exchange of an authentication key shared among the CPE and clients in the network. WEP Encryption Length Length of the WEP encryption key: 64-bit 128-bit Key 1 Set the WEP key 1. If the WEP encryption length is set to 64-bit, then use 10 hexadecimal or 5 ASCII characters as the key. If the WEP encryption length is set to 128-bit, then use 26 hexadecimal or 13 ASCII characters as the key. Key 2 Set the WEP key 2. Refer to Key 1 for details. Key 3 Set the WEP key 3. Refer to Key 1 for details. Key 4 Set the WEP key 4. Refer to Key 1 for details. WPA Settings If you select “WPA personal” or “WPA Enterprise” as the encryption type, you will see following settings. WPA mode Select the WPA encryption mode. 91 WM5347N User Manual WPA WPA2 Auto (WPA or WPA2) Cipher Type Select the Cipher algorithm. TKIP AES TKIP and AES Pre-shared Key The pass-phrase used by WPA personal encryption mode. The length is between 8 to 63 characters. This field is disabled when “WPA Enterprise” is selected as the encryption mode. EAP (802.1X ) If “WPA Enterprise” is selected as the encryption mode, Settings you will see the following settings. RADIUS Server IP Address The IP address of the RADIUS server. RADIUS Server Port The RADIUS server port number. RADIUS Server Shared Secret case-sensitive password used to validate communications between a RADIUS server and CPE. Save & Start WPS PIN Save the configuration and then start the WPS PIN process (need to input WPS PIN field first). Save & Start WPS PBC Save the configuration and then start the WPS PBC process. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. NOTE: When WPS is selected, you will have 3 Save options. If you click “Save” button, it will save the configuration without starting the WPS process. If you select the “Save & Start WPS PIN” or “Save & Start WPS PBC”, it will save the configuration and start the WPS process selected at that time. Frequency(GHZ) Channel Auto Auto select the best channel 2.452 Channel 9 2.457 Channel 10 2.462 Channel 11 2.467 Channel 12 92 WM5347N User Manual 2.472 Channel 13 Table 4: WLAN Channel Figure 74. WiFi>WLAN NONE 93 WM5347N User Manual Figure 75. Figure 76. WiFi>WLAN WEP WiFi>WLAN Personal 94 WM5347N User Manual Figure 77. WiFi>WLAN Enterprise 10.2. MAC Address Filter “WiFi>MAC Address Filter” Name Description MAC Filter Setup Enable MAC Check the box to enable MAC address filter address Filter Mode Deny listed stations: Deny WiFi access from the stations listed in MAC Filter Rules. Allow listed stations: Allow WiFi access from the stations listed in MAC Filter Rules. MAC Filter Rules Add Click this button to create a MAC filter rule. Enter the MAC address in the following format. 00:00:00:00:00:00 xx:xx:xx:xx:xx:xx OK Click this button to finish edition for table entries. 95 WM5347N User Manual Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. Figure 78. WiFi>MAC Address Filter 10.3. STA List “WiFi>STA List” Name Description STA List This list observe MAC address of the user who access WLAN. Figure 79. WiFi>STA List 96 WM5347N User Manual 97 WM5347N User Manual 11. Administrator 11.1. Remote Control Remote access is the ability to get access to CPE from a remote computer or network. CPE supports six different types of remote access protocols. HTTP allows you to set the port and configure both HTTP and HTTPS protocols TELNET typically provides access to a command-line interface on a remote machine SSH Secure Shell (SSH) is a network protocol used to allow remote connections between two devices using a secure channel. It uses public-key cryptography to authenticate the remote entity. An SSH server, by default, listens on the standard TCP port 22. SNMP is typically used for network management to monitor network-attached devices for conditions that warrant administrative assistance or to view and retrieve network statistical information. TR-069 Using TR-069 the terminals can communicate with the Auto Configuration Servers (ACS) and establish the configuration automatically. OMA-DM Using OMA-DM the terminals can communicate with the OMA-DM Server and establish the configuration automatically. 11.1.1. HTTP “Administration>Remote Control>HTTP” Name Description HTTP Server Enable Check the box to allow http connections. Port Number Enter the http port number (default is port 80). HTTPS Server Enable Check the box to allow https connections. Port Number Enter the https port number (default is port 443). HTTP and HTTPS Allow Connection Check the check-box to allow connections from WAN. from WAN Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. 98 WM5347N User Manual Figure 80. 11.1.2. Administration>Remote Control>HTTP TELNET “Administration>Remote Control>TELNET” Name Description TELNET Server Enable Check the box to allow Telnet connections. Port Number Enter the Telnet port number (default is port 23). Allow Connection from WAN Check the check-box to allow connections from WAN. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. 99 WM5347N User Manual Figure 81. 11.1.3. Administration>Remote Control>TELNET SSH “Administration>Remote Control>SSH” Name Description SSH Server Enable Check the box to allow SSH connections. Port Number Enter the SSH port number (default is port 22). Allow Connection Check the check-box to allow connections from WAN. from WAN Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. Figure 82. Administration>Remote Control>SSH 100 WM5347N User Manual 11.1.4. SNMP “Administration>Remote Control>SNMP” Name Description SNMP Daemon Enable Checking the enable button will allow SNMP applications to query and set some of the SNMP variables. Location Enter the Location SNMP string variable. Contact Enter the Contact SNMP string variable. Read Community Enter the Read community string to query SNMP data. Write Community Enter the Write community string to set SNMP variables. Trap server Enter the IP Address of trap server where you want trap notifications to be sent to. Trap Community Enter the Trap community to act as a password for sending trap notifications to the target SNMP manager. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. Figure 83. Administration>Remote Control>SNMP 101 WM5347N User Manual 11.1.5. TR-069 Using TR-069 the terminals can communicate with the Auto Configuration Servers (ACS) and establish the configuration automatically. It’s the current standard for activation of terminals in the DSL broadband market. “Administration>Remote Control>TR-069” Name Description TR-069 Configuration Enable To enable or disable the TR-069 on the CPE. ACS Server URL The ACS URL for the CPE to connect to. ACS Username The username for the CPE when connected to ACS. ACS Password The password for CPE when connected to ACS. Periodical inform Enable To enable or disable the periodical inform to ACS for the CPE. Periodical inform Interval The interval between two periodical inform. Connection Request Username Enter the username for the ACS to perform connection request to the CPE. Connection Request Password Enter the password for the ACS to perform connection request to the CPE. CA Certificate File The CA certificate file is used to identify the certificate of ACS when CPE communicated ACS with HTTPS URL. CA Certificate Info Displays the subject field of the CA Certificate. CLIENT Certificate File The CLIENT certificate file is used when CPE communicates with HTTPS URL. CLIENT Certificate Into Displays the subject field of the CLIENT Certificate. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. 102 WM5347N User Manual Figure 84. 11.1.6. Administration>Remote Control>TR-069 OMA-DM Using OMA-DM the terminals can communicate with the OMA-DM Server and establish the configuration automatically. It’s the current standard for activation of terminals in OMA (Open Mobile Alliance). “Administration>Remote Control>OMA-DM” Name Description OMA DM Configuration Enable To enable or disable the OMA-DM activity of the CPE. Server URL The DM Server URL for the CPE to connect to. Server Port The DM Server Port for the CPE to connect to. Server Auth Type The DM Server authentication type. Server ID The server ID for the CPE when connected to the DM 103 WM5347N User Manual Server. Server Password The server password for the CPE when connected to the DM Server. Client Auth Type The DM Client authentication type. Client ID The client ID for the CPE when connected to the DM Server. Client Password The client password for the CPE when connected to the DM Server. Periodical To enable or disable the periodical client-initialed session Client-initiated Enable to DM Server for the CPE. Periodical The Client-initiated Interval sessions. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. Figure 85. interval between two periodical Administration>Remote Control>OMA-DM 104 client-initiated WM5347N User Manual 11.2. Password NOTE: The default usernames and passwords are admin/admin and guest/guest. The user with administrative privileges (belonging to the “admin” group) has access to all the features in the software. A user with “guest” privileges (belonging to the “guest” group) only has a subset of the features available to them. “Administration>Password>Password” NOTE: There can only be one username in each of the groups (one to one relationship). Name Description Change Password Group Select which group the user belongs to that you would like to change the password for. admin, if the user is part of the admin group, they have full access to all the feature. guest, if the user is part of the guest group, they have limited access to the features. Old Password Enter the old password. New Password Enter the new password. Retype Retype the new password. Save Commit the changes made and save to CPE device, it will only commit the change made to the password. Cancel Reset fields to the last saved values. Change Username Group Select which group the user belongs to that you would like to change the username for. admin, if the user is part of the admin group, they have full access to all the feature. guest, if the user is part of the guest group, they have limited access to the features. Old Username Enter the username you want to change New Username Enter the new username Password Enter the original password, the password will not change. If you enter an incorrect or different password, the change will not be committed. 105 WM5347N User Manual Save Commit the changes made and save to the CPE device, it will only commit the change made to the username. Cancel Reset fields to the last saved values. Figure 86. Administration>Password 106 WM5347N User Manual 12. System 12.1. Date and Time You can configure the date and time on the device. The user can manually configure the system time, or choose to get the date and time from a time server. The “Save” button will commit the configuration, and the “Cancel” button will clear the fields. The “Time Zone” tab will allow you to set the time zone and set the starting and finish time for daylight saving period. You can also enable or disable “Daylight Savings Time”. NOTE: If you don’t configure the time on the CPE it will use the default system starting time. The default starting time is set to 1970/1/1 00:00:00. 12.1.1. Date “System>Date/Time>Date” Name Description Time and Date Setup Manual If you select the Manual option, then you are to enter the time and date manually. New Time New time manually entered. New Date New date manually entered. Get From Time Server If you select this option it will get the local time from a time server automatically. Time Protocol Select the Time protocol. Time Server Address Enter the address of the time server. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. 107 WM5347N User Manual Figure 87. 12.1.2. System>Date/Time>Date Time Zone “System>Date/Time>Time Zone” Name Description Time Zone Setup Time Zone Enter the time zone of for your location. Enable Daylight Savings If you want to enable Daylight Savings Time, check the box. Start Date Enter the beginning date for Daylight Savings time. End Date Enter the end date for Daylight Savings time. Save Commit the changes made and save to CPE device. Cancel Reset fields to the last saved values. 108 WM5347N User Manual Figure 88. System>Date/Time>Time Zone 12.2. Upgrade Firmware The “Upgrade” window allows you to upgrade the firmware on you device. Users can choose to upgrade the firmware by entering the file path or entering the URL of the upgrade file. NOTE: After pressing the “Upgrade” button, it will automatically reboot the CPE and upgrade the firmware with the specified file. You will be prompted to login to the CPE after the upgrade is complete. 12.2.1. Upgrade File “System>Upgrade Firmware>Upgrade File” Name Description Upgrade Firmware Browse Enter the full path of the file you want to upgrade. The “browse” button will help you find on your server. Upgrade It will start upgrading the file. Status The status bar will display which segment it’s processing and what percentage of the upgrade has been completed. 109 WM5347N User Manual Figure 89. 12.2.2. System>Upgrade Firmware>Upgrade File Upgrade Link “System>Upgrade Firmware>Upgrade Link” Name Description Upgrade Firmware Upgrade Link Enter the complete URL path of the file you want to upgrade. Upgrade It will start upgrading the file. Status The status window will display which segment it’s processing and what percentage of the upgrade has been completed. Figure 90. System>Upgrade Firmware>Upgrade Link 110 WM5347N User Manual 12.2.3. “System>Upgrade Firmware>CWMP Upgrade” Press “Upgrade” button to upgrade firmware. Figure 91. System>Upgrade Firmware>CWMP Upgrade 12.3. Log The “System>Log” will display system log output. The “Refresh” button will clear the log window and display the most current system log information. Figure 92. System>Log 111 WM5347N User Manual 12.4. Backup/Restore The Backup/Restore tab will allow you to save and restore your configuration on the CPE. You can also reset the CPE to factory defaults from the “Factory Defaults” tab. 12.4.1. Configuration Backup “System>Backup/Restore>Backup” Name Description Backup Configuration Backup Click the “Backup” button to save the current configuration on the CPE. After you click the “Backup” button “File Download” window will pop-up and prompt you to save the file. In the “Save As” window, enter the name and location, where you wish to download the file to. Figure 93. System>Backup/Restore>Backup 112 WM5347N User Manual Figure 94. Figure 95. File Download Save File As 113 WM5347N User Manual 12.4.2. Configuration Restore “System>Backup/Restore>Restore” Name Description Restore From File File Restore Enter the path of the configuration file you wish to restore. Click on the “Browse” button to help you navigate through directories and search for the file. After you enter the complete file path, click the “File Restore” button, It will begin restoring the configuration from the file specified. Restore From URL Link URL Restore Enter the configuration URL path you wish to restore from. After you enter the complete URL path, click the “URL Restore” button. It will begin restoring the configuration from the URL location you specified. Figure 96. System>Backup/Restore>Restore 114 WM5347N User Manual 12.4.3. Factory Defaults “System>Backup/Restore>Factory Defaults” Factory default will set all the configurations back to factory defaults. Any configurations that you have made will be changed back to the factory default settings. After selecting “Reset” button, you will be prompted with a window to confirm or cancel the action. Restore factory defaults will clear any IP addresses and setting you may have configured on the CPE. WARNING Figure 97. System>Backup/Restore>Factory Defaults Figure 98. Restore to Factory Default Warning 115
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.4 Linearized : No Page Count : 123 XMP Toolkit : XMP toolkit 2.9.1-13, framework 1.6 About : 9a367012-01cc-11e1-0000-d0290307e8a0 Producer : GPL Ghostscript 9.02 Keywords : () Modify Date : 2011:10:26 09:21:37+08:00 Create Date : 2011:10:26 09:21:37+08:00 Creator Tool : PDFCreator Version 1.2.1 Document ID : 9a367012-01cc-11e1-0000-d0290307e8a0 Format : application/pdf Title : WM5347N User Manual v1.3b_nc_ Creator : XP Description : () Author : XP Subject :EXIF Metadata provided by EXIF.tools