ZTE WF821 LTE router User Manual

ZTE Corporation LTE router

User manual

      LTE Indoor CPE User Guide FCC ID: SRQ-WF821
  Index1GettingStarted..........................................................................................................................51.1WelcometotheCPE..................................................................................................51.2ComputerConfigurationRequirements....................................................................51.3LoggingIntotheWebManagementPage................................................................52Overview...................................................................................................................................72.1ViewingtheSystemInformation...............................................................................72.2ViewingtheVersionInformation..............................................................................72.3ViewingCPUUsage...................................................................................................82.4ViewingMemoryUsage............................................................................................82.5Viewing4GStatus.....................................................................................................82.6ViewingLANStatus...................................................................................................92.7ViewingWi‐FiStatus.................................................................................................92.8ViewingWANStatus...............................................................................................102.9ViewingThroughputStatistics................................................................................102.10ViewingDeviceList.................................................................................................113Network...................................................................................................................................113.1WANSettings...........................................................................................................113.1.1WANInterface.................................................................................................113.1.2NetworkMode................................................................................................123.2LTESettings..............................................................................................................123.2.1ViewingModuleInformation..........................................................................123.2.2LTESetting.......................................................................................................133.2.3ConnectMethodSetting.................................................................................143.3APNManagement...................................................................................................173.3.1APNSettingsinNATmode..............................................................................173.3.2APNlist............................................................................................................183.4PINManagement....................................................................................................193.4.1ViewingtheStatusoftheUSIMCard..............................................................193.4.2EnablingPINVerification.................................................................................193.4.3DisablingPINVerification................................................................................203.4.4VerifyingthePIN..............................................................................................203.4.5ChangingthePIN.............................................................................................203.4.6SettingAutomaticVerificationofthePIN.......................................................203.4.7VerifyingthePUK............................................................................................213.5LANSetting..............................................................................................................213.5.1SettingLANHostParameters..........................................................................213.5.2ConfigurationtheDHCPServer.......................................................................223.5.3BundledAddressList.......................................................................................223.6DMZSettings...........................................................................................................243.7StaticRoute.............................................................................................................243.7.1AddStaticRoute..............................................................................................243.7.2ModifyStaticRoute.........................................................................................25
  3.7.3DeleteStaticRoute..........................................................................................254Wi‐Fi........................................................................................................................................264.1WLANSetting..........................................................................................................264.1.1SettingGeneralParameters.............................................................................264.1.2WPSSettings...................................................................................................274.2SettingSSIDProfile..................................................................................................274.3AccessManagement...............................................................................................294.3.1SettingtheAccessPolicy.................................................................................294.3.2ManagingtheWi‐FiAccessList.......................................................................294.4WDS.........................................................................................................................305Security...................................................................................................................................315.1MACFiltering..........................................................................................................315.1.1EnablingMACFilter.........................................................................................325.1.2DisablingMACFilter........................................................................................325.1.3SettingAllowaccessnetworkwithintherules................................................325.1.4SettingDenyaccessnetworkwithintherules................................................335.1.5AddingMACFilteringrule...............................................................................335.1.6ModifyingMACFilteringrule..........................................................................345.1.7DeletingMACFilteringrule.............................................................................345.2IPFiltering...............................................................................................................355.2.1EnablingIPFiltering.........................................................................................355.2.2DisablingIPFiltering........................................................................................355.2.3SettingAllowaccessnetworkoutsidetherules..............................................365.2.4SettingDenyaccessnetworkoutsidetherules...............................................365.2.5AddingIPFilteringrule....................................................................................365.2.6ModifyingIPFilteringrule...............................................................................375.2.7DeletingIPFilteringrule..................................................................................385.3URLFiltering............................................................................................................385.3.1EnablingURLFiltering.....................................................................................385.3.2DisablingURLFiltering....................................................................................395.3.3AddingURLFilteringlist..................................................................................395.3.4ModifyURLFilteringlist..................................................................................395.3.5DeletingURLFilteringlist................................................................................405.4PortForwarding.......................................................................................................405.4.1AddingPortForwardingrule...........................................................................405.4.2ModifyingPortForwardingrule......................................................................415.4.3DeletingPortForwardingrule.........................................................................425.5UPnP........................................................................................................................426VPNSetting.............................................................................................................................437VOIP.........................................................................................................................................437.1ViewVOIPInformation...........................................................................................447.2ConfiguringSIPServer.............................................................................................447.3ConfiguringSIPAccount..........................................................................................458System.....................................................................................................................................46
  8.1Maintenance...........................................................................................................468.1.1Reboot.............................................................................................................468.1.2Reset................................................................................................................478.1.3BackupConfigurationFile...............................................................................478.1.4UploadConfigurationFile...............................................................................478.2VersionManager.....................................................................................................488.2.1ViewingVersionInfo.......................................................................................488.2.2VersionUpgrade..............................................................................................488.3TR069......................................................................................................................498.4Date&Time............................................................................................................508.5DDNS.......................................................................................................................528.6Diagnosis.................................................................................................................538.6.1Ping..................................................................................................................538.6.2Traceroute.......................................................................................................548.7Syslog.......................................................................................................................558.7.1Local................................................................................................................558.7.2Network...........................................................................................................568.8Account...................................................................................................................578.9RemoteWEBAccess................................................................................................588.10Logout.....................................................................................................................599FAQs........................................................................................................................................59
  1 GettingStarted1.1 WelcometotheCPEInthisdocument,theLTE(LongTermEvolution)IndoorCPE(customerpremisesequipment)willbereplacedbytheCPE.CarefullyreadthefollowingsafetysymbolstohelpyouuseyourCPEsafelyandcorrectly:AdditionalinformationOptionalmethodsorshortcutsforanactionPotentialproblemsorconventionsthatneedtobespecified1.2 ComputerConfigurationRequirementsForoptimumperformance,makesureyourcomputermeetsthefollowingrequirements.ItemRequirementCPUPentium500MHzorhigherMemory128MBRAMorhigherHarddisk50MBavailablespaceOperatingsystem Microsoft:WindowsXP,WindowsVista,Windows7orhigher Mac: Mac OS X10.5 or higherDisplayresolution1024x768pixelsorhigherBrowser InternetExplorer7.0orlater Firefox3.6orlater Opera10orlater Safari5orlater Chrome9orlater1.3 LoggingIntotheWebManagementPageUseabrowsertologintothewebmanagementpagetoconfigureandmanagetheCPE.ThefollowingproceduredescribeshowtouseacomputerrunningWindowsXPandInternetExplorer7.0tologintothewebmanagementpageoftheCPE.1. ConnecttheCPEproperly.
  2. LaunchInternetExplorer,enterhttp://192.168.1.1intheaddressbar,andpressEnter.AsshowninFigure1‐1. Figure1‐13. Entertheusernameandpassword,andclickLogIn.Youcanlogintothewebmanagementpageafterthepasswordisverified.AsshowninFigure1‐2. Figure1‐2Thedefaultusernameisadminandthedefaultpasswordisolo@peru.ToprotectyourCPEfromunauthorizedaccess,changethepasswordafteryourfirstlogin.TheCPEsupportsdiagnosticfunction.Ifyouencounterproblems,pleasecontactcustomerserviceforthespecificusingmethod.Toensureyourdatasafety,itisrecommendedthatyouturnonthefirewall,andconserveyourloginandFTPpasswordcarefully.
  2 Overview2.1 ViewingtheSystemInformationToviewtheSystemInformation,performthefollowingsteps:1. ChooseOverview;2. IntheSystemInformationarea,viewthesystemstatus,suchasRunningtimeandOnlinetime.AsshowninFigure2‐1. Figure2‐12.2 ViewingtheVersionInformationToviewtheVersionInformation,performthefollowingsteps:1. ChooseOverview;2. IntheVersionInformationarea,viewtheversioninformation,suchasProductname,Softwareversion,UBootversionandsoon.AsshowninFigure2‐2. Figure2‐2
  2.3 ViewingCPUUsageToviewtheCPUusage,performthefollowingsteps:1. ChooseOverview;2. IntheCPUUsagearea,viewtheCPUusageinformation,suchasCurrentCPUusage,MaxCPUusage,MinCPUusage.AsshowninFigure2‐3. Figure2‐32.4 ViewingMemoryUsageToviewthememoryusage,performthefollowingsteps:1. ChooseOverview;2. IntheMemoryUsagearea,viewthememoryusageinformation,suchasTotalmemory,Currentmemoryusage,MaxmemoryusageandMinmemoryusage.AsshowninFigure2‐4. Figure2‐42.5 Viewing4GStatusToviewthe4Gstatus,performthefollowingsteps:1. ChooseOverview;
  2. Inthe4GStatusarea,viewtheinformationaboutUSIMcardstatus,Connectstatus,Operator,CurrentMobileNetwork,Signalqualityandsoon.AsshowninFigure2‐5.  Figure2‐52.6 ViewingLANStatusToviewtheLANstatus,performthefollowingsteps:1. ChooseOverview;2. IntheLANStatusarea,viewtheLANstatus,suchasMacaddress,IPaddressandSubnetmask.AsshowninFigure2‐6. Figure2‐62.7 ViewingWi‐FiStatusToviewtheWi‐Fistatus,performthefollowingsteps:1. ChooseOverview;
  2. IntheWi‐FiStatusarea,viewtheinformationaboutWi‐Fistatus,SSID,ChanelNO.,MACaddressandWDSstatus.AsshowninFigure2‐7.Figure2‐72.8 ViewingWANStatusToviewtheWANstatus,performthefollowingsteps:1. ChooseOverview;2. IntheWANStatusarea,viewthewanstatus,suchastheDNS,CurrentdatarateandtheAPNstatus.AsshowninFigure2‐8.Figure2‐82.9 ViewingThroughputStatisticsToviewthethroughputstatistics,performthefollowingsteps:1. ChooseOverview;2. IntheThroughputStatisticsarea,viewthethroughputstatistics,suchasWANthroughputandLANthroughput.AsshowninFigure2‐9.
  Figure2‐92.10 ViewingDeviceListToviewthedevicelist,performthefollowingsteps:1. ChooseOverview;2. IntheDeviceListarea,viewthedeviceinformationwhichconnecttotheCPE,suchasDevicename,Macaddress,IPaddressandLeasetime.AsshowninFigure2‐10. Figure2‐103 Network3.1 WANSettings3.1.1 WANInterfaceTosettheWANinterface,performthefollowingsteps:1. ChooseNetwork>WANSettings;2. IntheNetworkModearea,selectaninterfacebetweenLTEandEthernet;3. ClickSubmit.AsshowninFigure3‐1.
   Figure3‐13.1.2 NetworkModeTosetthenetworkmode,performthefollowingsteps:1. ChooseNetwork>WANSettings;2. IntheNetworkModearea,selectamodebetweenBRIDGEandNAT;3. ClickSubmit.AsshowninFigure3‐2.Figure3‐23.2 LT E Settings3.2.1 ViewingModuleInformationToviewthemobilemoduleinformation,performthefollowingsteps:1. ChooseNetwork>LTESettings;2. IntheModuleInformationarea,youcanviewtheinformationaboutthemodule,suchasmodulemodel,moduleversion,IMEI.AsshowninFigure3‐3.
  Figure3‐33.2.2 LTESettingTosettheLTEnetwork,performthefollowingsteps:1. ChooseNetwork>LTESettings;2. IntheSettingarea,youcansettheconfigurationofLTEnetwork;3. IntheLTESettingsarea,youcanviewtheLTEnetworkconnectstatus,suchasFrequency,RSSI,RSRP,RSRQ,CINR,SINR,CellIDandsoon.AsshowninFigure3‐5.
   Figure3‐53.2.3 ConnectMethodSettingTosettheconnectmethod,performthefollowingsteps:1. ChooseNetwork>LTESettings;2. IntheSettingarea,SelectaconnectmethodbetweenAutoandManual.AsshowninFigure3‐6.
  Figure3‐63.2.3.1 Auto Connect LTE Network TosettheCPEautomaticallyconnecttotheinternet,performthefollowingsteps:1. ChooseNetwork>LTESettings;2. IntheSettingarea,settheconnectmethodasAuto,whentheLTEnetworkisready,theCPEwillbeconnectedautomaticity.AsshowninFigure3‐7.
  Figure3‐73.2.3.2 Manual Connect Mobile Network Tosetthemobilenetworkmanualconnecttotheinternet,performthefollowingsteps:1. ChooseNetwork>LTESettings;2. IntheSettingarea,settheconnectmethodasManual,whentheLTEnetworkisready,youcansettheCPEconnecttotheLTEnetworkordisconnectfromtheLTEnetwork.AsshowninFigure3‐8.
  Figure3‐83.3 APNManagement3.3.1 APNSettingsinNATmodeTosetandmanageAPNinNATmode,performthefollowingsteps:1. ChooseNetwork>APNManagement.2. IntheAPNManagementarea,youcansettheAPN.3. ChooseaAPNnumberwhichyouwanttoset.4. IntheAPNSettingareayoucansettheAPNparameters,suchasenableordisabletheapn,apnname,username,passwordandsoon.5. IfyouwantsetaAPNasdefaultgateway,youshouldcheckthatisenabled.
  6. SelectaAPNtypefromthedrop‐downlist,suchasVoIP,TR069orVoIP+TR069.7. ClickSubmit.AsshowninFigure3‐9. Figure3‐93.3.2 APNlistToviewtheAPNlist,performthefollowingsteps:1. ChooseNetwork>APNManagement.2. IntheAPNlistareayoucanviewtheAPNlist.Asshowninthefigure3‐11.Figure3‐11
  3.4 PINManagementTomanagethePIN,youcanperformthefollowingoperationsonthePINManagementpage:1. EnableordisablethePINverification.2. VerifythePIN.3. ChangethePIN.4. SetautomaticverificationofthePIN.AsshowninFigure3‐12. Figure3‐123.4.1 ViewingtheStatusoftheUSIMCardToviewthestatusoftheUSIMcard,performthefollowingsteps:1. ChooseNetwork>PINManagement.2. ViewthestatusoftheUSIMcardintheUSIMcardstatusfield.3.4.2 EnablingPINVerificationToenablePINverification,performthefollowingsteps:1. ChooseNetwork>PINManagement.2. SetPINverificationtoEnable.3. EnterthePIN(4to8digits)intheEnterPINbox.4. ClickSubmit.
  3.4.3 DisablingPINVerificationTodisablePINverification,performthefollowingsteps:1. ChooseNetwork>PINManagement.2. SetPINverificationtoDisable.3. EnterthePIN(4to8digits)intheEnterPINbox.4. ClickSubmit.3.4.4 VerifyingthePINIfPINverificationisenabledbutthePINisnotverified,theverificationisrequired.ToverifythePIN,performthefollowingsteps:1. ChooseNetwork>PINManagement.2. EnterthePIN(4to8digits)inthePINbox.3. ClickSubmit.3.4.5 ChangingthePINThePINcanbechangedonlywhenPINverificationisenabledandthePINisverified.TochangethePIN,performthefollowingsteps:1. ChooseNetwork>PINManagement.2. SetPINverificationtoEnable.3. SetChangePINtoEnable.4. EnterthecurrentPIN(4to8digits)inthePINbox.5. EnteranewPIN(4to8digits)intheNewPINbox.6. RepeatthenewPINintheConfirmPINbox.7. ClickSubmit.3.4.6 SettingAutomaticVerificationofthePINYoucanenableordisableautomaticverificationofthePIN.Ifautomaticverificationisenabled,theCPEautomaticallyverifiesthePINafterrestarting.ThisfunctioncanbeenabledonlywhenPINverificationisenabledandthePINisverified.ToenableautomaticverificationofthePIN,performthefollowingsteps:1. ChooseNetwork>PINManagement.2. SetPinverificationtoEnable.3. SetRemembermyPINtoEnable.4. ClickSubmit.
  3.4.7 VerifyingthePUKIfPINverificationisenabledandthePINfailstobeverifiedforthreeconsecutivetimes,thePINwillbelocked.Inthiscase,youneedtoverifythePUKandchangethePINtounlockit.ToverifythePUK,performthefollowingsteps:1. ChooseNetwork>PINManagement.2. EnterthePUKinthePUKbox.3. EnteranewPINintheNewPINbox.4. RepeatthenewPINintheConfirmPINbox.5. ClickSubmit.3.5 LANSetting3.5.1 SettingLANHostParametersBydefault,theIPaddressis192.168.1.1withasubnetmaskof255.255.255.0.YoucanchangethehostIPaddresstoanotherindividualIPaddressthatiseasytoremember.MakesurethatIPaddressisuniqueonyournetwork.IfyouchangetheIPaddressoftheCPE,youneedtoaccessthewebmanagementpagewiththenewIPaddress.TochangetheIPaddressoftheCPE,performthefollowingsteps:1. ChooseNetworkSetting>LANSettings.2. IntheLANHostSettingsarea,setIPaddressandsubnetmask.3. IntheDHCPSettingarea,settheDHCPservertoEnable.4. ClickSubmit.AsshowninFigure3‐13. Figure3‐13
  3.5.2 ConfigurationtheDHCPServerDHCPenablesindividualclientstoautomaticallyobtainTCP/IPconfigurationwhentheserverpowerson.YoucanconfiguretheCPEasaDHCPserverordisableit.WhenconfiguredasaDHCPserver,theCPEautomaticallyprovidestheTCP/IPconfigurationfortheLANclientsthatsupportDHCPclientcapabilities.IfDHCPserverservicesaredisabled,youmusthaveanotherDHCPserveronyourLAN,oreachclientmustbemanuallyconfigured.ToconfigureDHCPsettings,performthefollowingsteps:1. ChooseNetworkSetting>LANSettings.2. SettheDHCPservertoEnable.3. SetStartIPaddress.ThisIPaddressmustbedifferentfromtheIPaddresssetontheLANHostSettingsarea,buttheymustbeonthesamenetworksegment.4. SetEndIPaddress.ThisIPaddressmustbedifferentfromtheIPaddresssetontheLANHostSettingsarea,buttheymustbeonthesamenetworksegment.5. SetLeasetime.Leasetimecanbesetto1to10,080minutes.Itisrecommendedtoretainthedefaultvalue.6. ClickSubmit.AsshowninFigure3‐14. Figure3‐143.5.3 BundledAddressListYoucanbindanIPaddresstoadevicebasedonitsMACaddress.Thedevicewillreceivethe
  sameIPaddresseachtimeitaccessestheDHCPserver.Forexample,youcanbindanIPaddresstoanFTPserverontheLAN.Toaddanitemtothesetuplist,performthefollowingsteps:1. ChooseNetworkSetting>LANSettings.2. ClickAddlist.3. SettheMACaddressandIPAddress.4. ClickSubmit.AsshowninFigure3‐15. Figure3‐15Tomodifyaniteminthesetuplist,performthefollowingsteps:1. ChooseNetworkSetting>LANSettings.2. Choosetheitemtobemodified,andclickEdit.3. SettheMACaddressandIPAddress.4. ClickSubmit.AsshowninFigure3‐16. Figure3‐16Todeleteaniteminthesetuplist,performthefollowingsteps:1. ChooseNetworkSetting>LANSettings.2. Choosetheitemtobedeleted,andclickDelete.
  3.6 DMZSettingsIfthedemilitarizedzone(DMZ)isenabled,thepacketssentfromtheWANaredirectlysenttoaspecifiedIPaddressontheLANbeforebeingdiscardedbythefirewall.TosetDMZ,performthefollowingsteps:1. ChooseNetworkSetting>DMZSettings.2. SetDMZtoEnable.3. (Optional)SetICMPRedirecttoEnable.4. SetHostaddress.ThisIPaddressmustbedifferentfromtheIPaddresssetontheLANHostSettingspage,buttheymustbeonthesamenetworksegment.5. ClickSubmit.AsshowninFigure3‐17. Figure3‐173.7 StaticRoute3.7.1 AddStaticRouteToaddastaticroute,performthefollowingsteps:1. ChooseNetworkSetting>StaticRoute.2. ClickAddlist.3. SettheDestIPaddressandSubnetmask.4. SelectanInterfacefromthedrop‐downlist.5. IfyouselectLANastheinterface,youneedsetaGateway.6. ClickSubmit.AsshowninFigure3‐18.
   Figure3‐183.7.2 ModifyStaticRouteTomodifyanaccessrestrictionrule,performthefollowingsteps:1. ChooseSecurity>StaticRoute.2. Choosetheitemtobemodified,andclickEdit.3. Repeatsteps3through5inthepreviousprocedure.4. ClickSubmit.AsshowninFigure3‐19. Figure3‐193.7.3 DeleteStaticRouteTodeleteastaticroute,performthefollowingsteps:1. ChooseSecurity>StaticRoute.2. Choosetheitemtobedeleted,andclickDelete.
  4 Wi‐Fi4.1 WLANSettingThisfunctionenablesyoutoconfiguretheWi‐Fiparameters.4.1.1 SettingGeneralParametersToconfigurethegeneralWi‐Fisettings,performthefollowingsteps:1. ChooseWi‐Fi>Wi‐FiSettings.2. IntheGeneralSettingsarea,setWLANtoEnable.3. SetModetooneofthevaluesdescribedinthefollowingtable:ParameterValueDescription802.11b/g/nTheWi‐FiclientcanconnecttotheCPEin802.11b,802.11g,or802.11nmode.IftheclientconnectstotheCPEin802.11nmode,theAdvancedEncryptionStandard(AES) encryption mode is required.802.11b/gTheWi‐FiclientcanconnecttotheCPEin802.11bor802.11gmode.802.11bTheWi‐FiclientcanconnecttotheCPEin802.11bmode.802.11gTheWi‐FiclientcanconnecttotheCPEin802.11gmode.4. SettheChannelNo.from1to11.5. ClickSubmit.AsshowninFigure4‐1.
  Figure4‐14.1.2 WPSSettingsWi‐FiProtectedSetup(WPS)enablesyoutosimplyaddawirelessclienttothenetworkwithoutneedingtospecificallyconfigurethewirelesssettings,suchastheSSID,securitymodeandpassphrase.YoucanuseeithertheWPSbuttonorPINtoaddthewirelessclient.ToconfigureWi‐FiWPSsettings,performthefollowingsteps:1. ChooseWi‐Fi>WPSSettings.2. SetWPStoEnable.3. ClickSubmit.AsshowninFigure4‐2.Figure4‐24.2 SettingSSIDProfileAfteryouconfiguretheCPEontheSSIDProfilepage,theWi‐FiclientconnectstotheCPEbasedonpresetrules,improvingaccesssecurity.ToconfiguretheCPEontheSSIDProfilepage,performthefollowingsteps:1. ChooseWi‐Fi>Wi‐FiSettings.2. SetSSID.TheSSIDcancontain1to32ASCIIcharacters.Itcannotbeemptyandthelastcharactercannotbeablankcharacter.Inaddition,theSSIDcannotcontainthefollowingspecialcharacters:/'="\&TheWi‐FiclientconnectstotheCPEusingthefoundSSID.3. SetMaximumnumberofdevices.ThisparameterindicatesthemaximumnumberofWi‐FiclientsthatconnecttotheCPE.Amaximumof32clientscanconnecttotheCPE.4. SetHideSSIDbroadcasttoEnable.IftheSSIDishidden,theclientcannotdetecttheCPE'sWi‐Fiinformation.5. SetAPisolationtoEnable.TheclientscanconnecttotheCPEbutcannotcommunicatewitheachother.6. SetSecurity.IfSecurityissettoNONE(notrecommended),Wi‐FiclientsdirectlyconnecttotheCPE.Thissecuritylevelislow.IfSecurityissettoWEP,Wi‐FiclientsconnecttotheCPEinweb‐basedencryptionmode.IfSecurityissettoWPA‐PSK,Wi‐FiclientsconnecttotheCPEinWPA‐PSKencryptionmode.IfSecurityissettoWPA2‐PSK,Wi‐FiclientsconnecttotheCPEinWPA2‐PSKencryption
  mode.Thismodeisrecommendedbecauseithasahighsecuritylevel.IfSecurityissettoWPA‐PSK&WPA2‐PSK,Wi‐FiclientsconnecttotheCPEinWPA‐PSK&WPA2‐PSKencryptionmode.7. Settheencryptionmode.If…SetstoDescriptionWEPAuthenticationmode  Sharedauthentication:TheclientconnectstotheCPEinsharedauthenticationmode. Openauthentication:TheclientconnectstotheCPEinopenauthenticationmode. Both:TheclientconnectstotheCPEinsharedoropenauthenticationmode.Encryptionpasswordlength 128bit:Only13ASCIIcharactersor26hexcharacterscanbeenteredintheKey1toKey4boxes. 64bit:Only5ASCIIcharactersor10hexcharacterscanbeenteredintheKey1toKey4boxes.CurrentpasswordindexThisvaluecanbesetto1,2,3,or4.Afterakeyindexisselected,thecorrespondingkeytakeseffect.WPA‐PSKWPA‐PSKOnly8to63ASCIIcharactersor8to64hexcharacterscanbeentered.WPAencryptionThisvaluecanbesettoTKIP+AES,AES,orTKIP.WPA2‐PSK(recommended)WPA‐PSKOnly8to63ASCIIcharactersor8to64hexcharacterscanbeentered.WPAencryptionThisvaluecanbesettoTKIP+AES,AES,orTKIP.WPA‐PSK&WPA2‐PSKWPA‐PSKOnly8to63ASCIIcharactersor8to64hexcharacterscanbeentered.WPAencryptionThisvaluecanbesettoTKIP+AES,AES,orTKIP.8. ClickSubmit.AsshowninFigure4‐3.
  Figure4‐34.3 AccessManagement4.3.1 SettingtheAccessPolicyThisfunctionenablesyoutosetaccessrestrictionpoliciesforeachSSIDtomanageaccesstotheCPE.ToconfigureWi‐FiMACcontrolsettings,performthefollowingsteps:1. ChooseWi‐Fi>AccessManagement.2. IntheWLANAccessListSettingsarea,setAccessPolicy.TheaccesspolicycanbesettoDisable,BlacklistorWhitelist. IfSSID'sMACAccessissettoDisable,accessrestrictionsdonottakeeffect. IfSSID'sMACAccessissettoBlacklist,onlythedevicesthatarenotintheblacklistcanconnecttotheCPE. IfSSID'sMACAccessissettoWhitelist,onlythedevicesinthewhitelistcanconnecttotheCPE.3. ClickSubmit.AsshowninFigure4‐4.Figure4‐44.3.2 ManagingtheWi‐FiAccessListThisfunctionenablesyoutosettheSSIDaccesspoliciesbasedonMACaddresses.
  ToaddanitemtotheWi‐Fiaccesslist,performthefollowingsteps:1. ChooseWi‐Fi>AccessManagement.2. ClickAdd.3. SetMACaddress.4. ClickSubmit.AsshowninFigure4‐5.Figure4‐5TomodifyanitemintheWi‐Fiaccesslist,performthefollowingsteps:1. ChooseWi‐Fi>AccessManagement.2. ClickEditMACList.3. Choosetheitemtobemodified,andclickEdit.4. SetMACaddress.5. SetoneoftheSSIDtoEnabletomaketheMACaddresstakeeffectfortheSSID.6. ClickSubmit.AsshowninFigure4‐6.Figure4‐6TodeleteanitemfromtheWi‐Fiaccesslist,performthefollowingsteps:1. ChooseWi‐Fi>AccessManagement.2. Choosetheitemtobedeleted,andclickDelete.AsshowninFigure4‐7.Figure4‐74.4 WDSTheCPEsupportsthewirelessdistributionsystem(WDS).AllWi‐FidevicesinaWDSmustbeconfiguredtousethesameradiochannel,encryptionmode,SSID,andencryptionkey.YoucansettheWDSencryptionmodetoNONEorWPA/WPA2.IfyousettheWDSencryptionmodetoNONE,theWi‐FiclientscanuseNONEorWEPencryptionmode.IfyousettheWDS
  encryptionmodetoWPA/WPA2‐PSK,theWi‐FiclientscanuseWPA/WPA2‐PSKencryptionmode.AfterWDSisenabled,disableDHCPonCPEsthatarenotdirectlyconnectedtotheWANport.IfWDSisenabled,theWPSfunctionwillnottakeeffect.IfthechannelissettoAuto,youneedtosetthechannel.ToconfiguretheWDS,performthefollowingsteps:1. ChooseWi‐Fi>WDS.2. SetWDStoEnable.3. SetWDSModeasRepeaterMode;4. ClickScan.Fromthesearchresults,choosetheSSIDofthenetworkingdevice.5. SetSecurity.WPA‐PSKcancontain8to63ASCIIcharactersor64hexcharacters.6. ClickSubmit.AsshowninFigure4‐8.Figure4‐85 Security5.1 MACFilteringThispageenablesyoutoconfiguretheMACaddressfilteringrules.
  5.1.1 EnablingMACFilterToenableMACaddressfilter,performthefollowingsteps:1. ChooseSecurity>MACFiltering2. SetMACfilteringtoEnable.3. ClickSubmit.AsshowninFigure5‐1. Figure5‐15.1.2 DisablingMACFilterTodisableMACaddressfilter,performthefollowingsteps:1. ChooseSecurity>MACFiltering2. SetMACfilteringtoDisable.3. ClickSubmit.AsshowninFigure5‐2. Figure5‐25.1.3 SettingAllowaccessnetworkwithintherulesTosetallowaccessnetworkwithintherules,performthefollowingsteps:1. ChooseSecurity>MACFiltering.
  2. SetAllowaccessnetworkwithintherules.3. ClickSubmit.AsshowninFigure5‐3. Figure5‐35.1.4 SettingDenyaccessnetworkwithintherulesTosetdenyaccessnetworkwithintherules,performthefollowingsteps:1. ChooseSecurity>MACFiltering.2. SetDenyaccessnetworkwithintherules.3. ClickSubmit.AsshowninFigure5‐4. Figure5‐45.1.5 AddingMACFilteringruleToaddaMACfilteringrule,performthefollowingsteps:1. ChooseSecurity>MACFiltering.2. ClickAddlist.3. SetMACaddress.4. ClickSubmit.AsshowninFigure5‐5.
   Figure5‐55.1.6 ModifyingMACFilteringruleTomodifyaMACaddressrule,performthefollowingsteps:1. ChooseSecurity>MACFiltering.2. Choosetheruletobemodified,andclickEdit.3. SetMACaddress.4. ClickSubmit.AsshowninFigure5‐6.  Figure5‐65.1.7 DeletingMACFilteringruleTodeleteaMACaddressfilterrule,performthefollowingsteps:1. ChooseSecurity>MACFiltering.2. Choosetheruletobedeleted,andclickDelete.AsshowninFigure5‐7. Figure5‐7
  5.2 IPFilteringDataisfilteredbyIPaddress.ThispageenablesyoutoconfiguretheIPaddressfilteringrules.5.2.1 EnablingIPFilteringToenableIPFiltering,performthefollowingsteps:1. ChooseSecurity>IPFiltering.2. SetIPFilteringEnable.3. ClickSubmit.AsshowninFigure5‐8.  Figure5‐85.2.2 DisablingIPFilteringTodisableIPFiltering,performthefollowingsteps:1. ChooseSecurity>IPFiltering.2. SetIPFilteringDisable.3. ClickSubmit.AsshowninFigure5‐9. Figure5‐9
  5.2.3 SettingAllowaccessnetworkoutsidetherulesTosetallowaccessnetwork,performthefollowingsteps:1. ChooseSecurity>IPFiltering.2. SetAllowaccessnetworkoutsidetherules.3. ClickSubmit.AsshowninFigure5‐10. Figure5‐105.2.4 SettingDenyaccessnetworkoutsidetherulesTosetallowaccessnetwork,performthefollowingsteps:1. ChooseSecurity>IPFiltering.2. SetDenyaccessnetworkoutsidetherules.3. ClickSubmit.AsshowninFigure5‐11.  Figure5‐115.2.5 AddingIPFilteringruleAddanIPaddressfilteringrule,performthefollowingsteps:1. ChooseSecurity>IPFiltering.
  2. ClickAddlist.3. SetService.4. SetProtocol.5. IntheSourceIPAddressRangebox,enterthesourceIPaddressorIPaddresssegmenttobefiltered.6. IntheSourceportrangebox,enterthesourceportorportsegmenttobefiltered.7. IntheDestinationIPAddressRangebox,enterthedestinationIPaddressorIPaddresssegmenttobefiltered.8. IntheDestinationportRangebox,enterthedestinationportorportsegmenttobefiltered.9. IntheStatusbox,chooseastatustherulewillbeexecuted.10. ClickSubmit.AsshowninFigure5‐12. Figure5‐125.2.6 ModifyingIPFilteringruleTomodifyanIPfilteringrule,performthefollowingsteps:1. ChooseSecurity>IPFiltering.2. Choosetheruletobemodified,andclickEdit.3. Repeatsteps3through9inthepreviousprocedure.4. ClickSubmit.AsshowninFigure5‐13.
   Figure5‐135.2.7 DeletingIPFilteringruleTodeleteanIPaddressfilteringrule,performthefollowingsteps:1. ChooseSecurity>IPFiltering.2. Choosetheruletobedeleted,andclickDelete.AsshowninFigure5‐14. Figure5‐145.3 URLFilteringDataisfilteredbyuniformresourcelocator(URL).ThispageenablesyoutoconfigureURLfilteringrules.5.3.1 EnablingURLFilteringToenableURLFiltering,performthefollowingsteps:3. ChooseSecurity>URLFiltering.4. SetURLFilteringtoEnable.5. ClickSubmit.AsshowninFigure5‐15.
   Figure5‐155.3.2 DisablingURLFilteringTodisableURLFiltering,performthefollowingsteps:1. ChooseSecurity>URLFiltering.2. SetURLFilteringtoDisable.3. ClickSubmit.AsshowninFigure5‐16. Figure5‐165.3.3 AddingURLFilteringlistToaddaURLfilteringlist,performthefollowingsteps:1. ChooseSecurity>URLFiltering.2. ClickAddlist.3. SetURL.4. ClickSubmit.AsshowninFigure5‐17.  Figure5‐175.3.4 ModifyURLFilteringlistTomodifyaURLfilteringrule,performthefollowingsteps:
  1. ChooseSecurity>URLFiltering.2. Choosetheruletobemodified,andclickEdit.3. SetURLaddress.4. ClickSubmit.AsshowninFigure5‐18.  Figure5‐185.3.5 DeletingURLFilteringlistTodeleteaURLlist,performthefollowingsteps:1. ChooseSecurity>URLFiltering.2. Choosetheitemtobedeleted,andclickDelete.AsshowninFigure5‐19. Figure5‐195.4 PortForwardingWhennetworkaddresstranslation(NAT)isenabledontheCPE,onlytheIPaddressontheWANsideisopentotheInternet.IfacomputerontheLANisenabledtoprovideservicesfortheInternet(forexample,workasanFTPserver),portforwardingisrequiredsothatallaccessestotheexternalserverportfromtheInternetareredirectedtotheserverontheLAN.5.4.1 AddingPortForwardingruleToaddaportforwardingrule,performthefollowingsteps:1. ChooseSecurity>PortForwarding.2. ClickAddlist.3. SetService.4. SetProtocol.5. SetRemoteportrange.Theportnumberrangesfrom1to65535.
  6. SetLocalhost.ThisIPaddressmustbedifferentfromtheIPaddressthatissetontheLANHostSettingspage,buttheymustbeonthesamenetworksegment.7. SetLocalport.Theportnumberrangesfrom1to65535.8. ClickSubmit.AsshowninFigure5‐20. Figure5‐205.4.2 ModifyingPortForwardingruleTomodifyaportforwardingrule,performthefollowingsteps:1. ChooseSecurity>PortForwarding.2. Choosetheitemtobemodified,andclickEdit.3. Repeatsteps3through7inthepreviousprocedure.4. ClickSubmit.AsshowninFigure5‐21.
   Figure5‐215.4.3 DeletingPortForwardingruleTodeleteaportforwardingrule,performthefollowingsteps:1. ChooseSecurity>PortForwarding.2. Choosetheitemtobedeleted,andclickDelete.AsshowninFigure5‐22. Figure5‐225.5 UPnPOnthispage,youcanenableordisabletheUniversalPlugandPlay(UPnP)function.ToenableUPnP,performthefollowingsteps:1. ChooseSecurity>UPnP.2. SetUPnPtoEnable.3. ClickSubmit.AsshowninFigure5‐23.
   Figure5‐236 VPNSettingThisfunctionenablesyoutoconnectthevirtualprivatenetwork(VPN).ToconnecttheVPN,performthefollowingsteps:1. ChooseVPNSetting.2. IntheVPNSettingarea,enableVPN.3. SelectaprotocolfromProtocoldrop‐downlist.4. EnterUsernameandPassword.5. ClickSubmit.6. YoucanviewthestatusinVPNStatusarea.AsshowninFigure6‐1. Figure6‐17 VOIPTheCPEsupportsvoiceservicesbasedontheSessionInitiationProtocol(SIP)andenablesvoiceserviceinterworkingbetweentheInternetandPublicSwitchedTelephoneNetworks(PSTNs).
  7.1 ViewVOIPInformationToviewVOIPinformation,performthefollowingsteps:1. ChooseVOIP>VOIPInformation;2. ViewtheVOIPinformation,suchastheSIPaccountandstatusoftheSIPregistrationserver.AsshowninFigure7‐1.Figure7‐17.2 ConfiguringSIPServerTosettheSIPserverparameters,performthefollowingsteps:1. ChooseVOIP>SIPServer;2. IntheUserAgentportbox,entertheportoftheSIPaccountprovidedbyyourserviceprovider.3. IntheSIPserverdomainnamebox,enterthedomainnameoftheSIPserver.4. IntheProxyserveraddressbox,entertheaddressoftheproxyserverprovidedbyyourserviceprovider,forexample,192.168.1.10.5. IntheProxyserverportbox,entertheportoftheproxyserverprovidedbyyourserviceprovider,forexample,5060.Thevaluerangesfrom1to65535.6. IntheRegistrationserveraddressbox,entertheaddressoftheregistrationserverprovidedbyyourserviceprovider,forexample,192.168.1.11.7. IntheRegistrationserverportbox,entertheportoftheregistrationserverprovidedbyyourserviceprovider,forexample,5060.Thevaluerangesfrom1to65535.8. ClickSubmit.AsshowninFigure7‐2.
  Figure7‐27.3 ConfiguringSIPAccountBeforeconfiguringSIPaccounts,makesurethattheregistrationserverhasbeenproperlyconfigured.ToconfigureSIPaccount,performthefollowingsteps:1. ChooseVoIP>SIPAccount.2. SetSIPAccountEnable.3. IntheUsernameandPasswordboxes,entertheusernameandpasswordoftheSIPaccountprovidedbyyourserviceprovider.4. InthePhoneNumberbox,entertheSIPPhonenumberprovidedbyyourserviceprovider.5. IntheDisplayNamebox,enterthedisplaynameprovidedbyyourserviceprovider.6. IntheCodecPriorityarea,setthecodecpriority.7. ClickSubmit.AsshowninFigure7‐3.
  Figure7‐38 System8.1 Maintenance8.1.1 RebootThisfunctionenablesyoutoreboottheCPE.SettingstakeeffectonlyaftertheCPEreboot.ToreboottheCPE,performthefollowingsteps:1. ChooseSystem>Maintenance.2. ClickReboot.AsshowninFigure8‐1.TheCPEthenrestarts.Figure8‐1
  8.1.2 ResetThisfunctionenablesyoutorestoretheCPEtoitsdefaultsettings.TorestoretheCPE,performthefollowingsteps:1. ChooseSystem>Maintenance.2. ClickReset.AsshowninFigure8‐2.TheCPEisthenrestoredtoitsdefaultsettings.Figure8‐28.1.3 BackupConfigurationFileYoucandownloadtheexistingconfigurationfiletobackitup.Todoso:1. ChooseSystem>Maintenance.2. ClickDownloadontheMaintenancepage.3. Inthedisplayeddialogbox,selectthesavepathandnameoftheconfigurationfiletobebackedup.4. ClickSave.AsshowninFigure8‐3.Theprocedureforfiledownloadingmayvarywiththebrowseryouareusing.Figure8‐38.1.4 UploadConfigurationFileYoucanuploadabackedupconfigurationfiletorestoretheCPE.Todoso:1. ChooseSystem>Maintenance.2. ClickBrowseontheMaintenancepage.3. Inthedisplayeddialogbox,selectthebackedupconfigurationfile.4. ClickOpen.5. Thedialogboxchoses.IntheboxtoberightofConfigurationfile,thesavepathandnameofthebackedupconfigurationfilearedisplayed.6. ClickUpload.AsshowninFigure8‐4.
  TheCPEuploadsthebackedupconfigurationfile.TheCPEthenautomaticallyrestarts.Figure8‐48.2 VersionManagerThisfunctionenablesyoutoupgradethesoftwareversionoftheCPEtothelatestversion.Itisrecommendedthatyouupgradethesoftwarebecausethenewversion,certainbugshavebeenfixedandthesystemstabilityisusuallyimproved.8.2.1 ViewingVersionInfoToviewtheversioninfo,performthefollowingsteps:1. ChooseSystem>VersionManager.2. IntheVersionInfoarea,youcanviewtheproductnameandsoftwareversion.AsshowninFigure8‐5. Figure8‐58.2.2 VersionUpgradeToperformanupgradesuccessfully,connecttheCPEtoyourcomputerthroughanetworkcable,savetheupgradefileonthecomputer,andmakesuretheCPEisnotconnectedtoanythingotherthanapoweradapterandthecomputer.Toperformanupgrade,performthefollowingsteps:1. ChooseSystem>VersionManager.2. IntheVersionUpgradearea,clickBrowse.Inthedisplayeddialogbox,selectthetarget
  softwareversionfile.3. ClickOpen.Thedialogboxchoses.ThesavepathandnameofthetargetsoftwareversionfilearedisplayedintheUpdatefilefield.4. ClickSubmit.5. Thesoftwareupgradestarts.Aftertheupgrade,theCPEautomaticallyrestartsandrunsthenewsoftwareversion.AsshowninFigure8‐6.Duringanupgrade,donotpowerofftheCPEordisconnectitfromthecomputer. Figure8‐68.3 TR069TR‐069isastandardforcommunicationbetweenCPEsandtheauto‐configurationserver(ACS).IfyourserviceproviderusestheTR069automaticserviceprovisionfunction,theACSautomaticallyprovidestheCPEparameters.IfyousettheACSparametersonboththeCPEandACS,thenetworkparametersontheCPEareautomaticallysetusingtheTR‐069function,andyoudonotneedtosetotherparametersontheCPE.ToconfiguretheCPEtoimplementtheTR‐069function,performthefollowingsteps:1. ChooseSystem>TR‐069Settings.2. SetacsURLsource.Therearetwomethods,suchasURLandDHCP.3. IntheACSURLbox,entertheACSURLaddress.4. EnterACSusernameandpasswordfortheCPEauthentication.TousetheCPEtoaccesstheACS,youmustprovideausernameandpasswordforauthentication.TheusernameandthepasswordmustbethesameasthosedefinedontheACS.5. IfyousetPeriodicinformtoEnable,setPeriodicinforminterval.
  6. Setconnectionrequestusernameandpassword.7. ClickSubmit.AsshowninFigure8‐8. Figure8‐78.4 Date&TimeYoucansetthesystemtimemanuallyorsynchronizeitwiththenetwork.IfyouselectSyncfromnetwork,theCPEregularlysynchronizesthetimewiththespecifiedNetworkTimeProtocol(NTP)server.Ifyouenabledaylightsavingtime(DST),theCPEalsoadjuststhesystemtimeforDST.Tosetthedateandtime,performthefollowingsteps:1. ChooseSystem>Date&Time.2. SelectSetmanually.3. SetLocaltimeorclickSynctoautomaticallyfillinthecurrentlocalsystemtime.4. ClickSubmit.AsshowninFigure8‐9.
   Figure8‐8Tosynchronizethetimewiththenetwork,performthefollowingsteps:1. ChooseSystem>Date&Time.2. SelectSyncfromnetwork.3. FromthePrimaryNTPserverdrop‐downlist,selectaserverastheprimaryserverfortimesynchronization.4. FromtheSecondaryNTPserverdrop‐downlist,selectaserverastheIPaddressofthesecondaryserverfortimesynchronization.5. Ifyoudon’twanttouseotherNTPserver,youneedtoenableOptionalntpserver,andsetaserverIPaddress.6. SetTimezone.7. ClickSubmit.AsshowninFigure8‐10. Figure8‐9
  8.5 DDNSDynamicDomainNameServer(DDNS)serviceisusedtomaptheuser'sdynamicIPaddresstoafixedDNSservice.ToconfigureDDNSsettings,performthefollowingsteps:1. ChooseSystem>DDNS.2. SetDDNStoEnable.3. InServiceprovider,chooseDynDNS.orgororay.com.4. EnterDomainnameandHostname.Forexample,ifthedomainnameprovidedbyyourserviceprovideristest.customtest.dyndns.org,entercustomtest.dyndns.orgasDomainname,andtestasHostname.5. EnterUsernameandPassword.6. ClickSubmit.AsshowninFigure8‐12. Figure8‐10
  8.6 DiagnosisIftheCPEisnotfunctioningcorrectly,youcanusethediagnosistoolsontheDiagnosispagetopreliminarilyidentifytheproblemsothatactionscanbetakentosolveit.8.6.1 PingIftheCPEfailstoaccesstheInternet,runthepingcommandtopreliminarilyidentifytheproblem.Todoso:1. ChooseSystem>Diagnosis.2. IntheMethodarea,selectPing.3. EnterthedomainnameintheTargetIPordomainfield,forexample,www.google.com.4. SetPacketsizeandTimeout.5. SetCount.6. ClickPing.AsshowninFigure8‐13.Waituntilthepingcommandisexecuted.TheexecutionresultsaredisplayedintheResultsbox.
   Figure8‐118.6.2 TracerouteIftheCPEfailstoaccesstheInternet,runtheTraceroutecommandtopreliminarilyidentifytheproblem.Todoso:1. ChooseSystem>Diagnosis.2. IntheMethodarea,selectTraceroute.3. EnterthedomainnameintheTargetIPordomainfield.Forexample,www.google.com.4. SetMaximumhopsadTimeout.5. ClickTraceroute.AsshowninFigure8‐14.Waituntilthetracerouecommandisexecuted.TheexecutionresultsaredisplayedintheResultsbox.
   Figure8‐128.7 SyslogThesyslogrecorduseroperationsandkeyrunningevents.8.7.1 LocalTosetthesyslogtolocal,performthefollowingsteps:1. ChooseSystem>Syslog.2. IntheSettingarea,setthemethodtoLocal.3. IntheLeveldrop‐downlist,selectaloglevel.4. ClickSubmit.AsshowninFigure8‐15.
   Figure8‐13ViewinglocalsyslogToviewthelocalsyslog,performthefollowingsteps:1. IntheKeywordbox,setakeyword.2. ClickPull,theresultboxwilldisplay.8.7.2 NetworkTosetthesyslogtonetwork,performthefollowingsteps:1. ChooseSystem>Syslog.2. IntheSettingarea,setthemethodtoNetwork.3. IntheLeveldrop‐downlist,selectaloglevel.4. IntheForwardIPaddressbox,setaIPaddress.5. ClickSubmit.AsshowninFigure8‐16.Thesyslogwilltransmittosomeclienttodisplaythroughnetwork.
   Figure8‐148.8 AccountThisfunctionenablesyoutochangetheloginpasswordoftheuser.Afterthepasswordchanges,enterthenewpasswordthenexttimeyoulogin.Tochangethepassword,performthefollowingsteps:1. ChooseSystem>Account.2. Selecttheusername,ifyouwanttochangethepasswordofnormaluser,youneedtosetEnableUserenable.3. Enterthecurrentpassword,setanewpassword,andconfirmthenewpassword.4. NewpasswordandConfirmpasswordmustcontain5to15characters.5. ClickSubmit.AsshowninFigure8‐17.
   Figure8‐158.9 RemoteWEBAccessToconfiguretheparametersofWEB,performthefollowingsteps:1. ChooseSystem>RemoteWEBAccess.2. SetHTTPenable.IfyousetHTTPdisable,youwillcan’tloginthewebmanagementpagewiththeHTTPprotocolfromWANside.3. SetHTTPport.Ifyouwanttochangetheloginport,youcansetanewportinthebox,thedefaultHTTPportis80.4. SetHTTPSenable.IfyouwanttologinthewebmanagementpagewiththeHTTPSprotocolfromWANside,youneedtoenabletheHTTPS.5. IfyouwanttologinthewebmanagementpageformtheWAN,youneedtoEnableAllowingloginfromWAN.6. SettheHTTPSport.7. ClickSubmit.AsshowninFigure8‐18.
   Figure8‐168.10 LogoutTologoutthewebmanagementpage,performthefollowingsteps:1. ChooseSystemandclickLogout2. Itwillbacktotheloginpage.9 FAQsThePOWERindicatordoesnotturnon. MakesurethatthepowercableisconnectedproperlyandtheCPEispoweredon. MakesurethatthepoweradapteriscompatiblewiththeCPE.FailstoLogintothewebmanagementpage. MakesurethattheCPEisstarted. VerifythattheCPEiscorrectlyconnectedtothecomputerthroughanetworkcable.Iftheproblempersists,contactauthorizedlocalservicesuppliers.TheCPEfailstosearchforthewirelessnetwork. Checkthatthepoweradapterisconnectedproperly. CheckthattheCPEisplacedinanopenareathatisfarawayfromobstructions,suchasconcreteorwoodenwalls.
   CheckthattheCPEisplacedfarawayfromhouseholdelectricalappliancesthatgeneratestrongelectromagneticfield,suchasmicrowaveovens,refrigerators,andsatellitedishes.Iftheproblempersists,contactauthorizedlocalservicesuppliers.ThepoweradapteroftheCPEisoverheated. TheCPEwillbeoverheatedafterbeingusedforalongtime.Therefore,powerofftheCPEwhenyouarenotusingit. CheckthattheCPEisproperlyventilatedandshieldedfromdirectsunlight.Theparametersarerestoredtodefaultvalues. IftheCPEpowersoffunexpectedlywhilebeingconfigured,theparametersmayberestoredtothedefaultsettings. Afterconfiguringtheparameters,downloadtheconfigurationfiletoquicklyrestoretheCPEtothedesiredsettings.
  FCC RegulationsThisdevicecomplieswithpart15oftheFCCRules.Operationissubjecttothefollowingtwoconditions:(1)Thisdevicemaynotcauseharmfulinterference,and(2)thisdevicemustacceptanyinterferencereceived,includinginterferencethatmaycauseundesiredoperation.ThisequipmenthasbeentestedandfoundtocomplywiththelimitsforaClassBdigitaldevice,pursuanttopart15oftheFCCRules.Theselimitsaredesignedtoprovidereasonableprotectionagainstharmfulinterferenceinaresidentialinstallation.Thisequipmentgenerates,usesandcanradiateradiofrequencyenergyand,ifnotinstalledandusedinaccordancewiththeinstructions,maycauseharmfulinterferencetoradiocommunications.However,thereisnoguaranteethatinterferencewillnotoccurinaparticularinstallation.Ifthisequipmentdoescauseharmfulinterferencetoradioortelevisionreception,whichcanbedeterminedbyturningtheequipmentoffandon,theuserisencouragedtotrytocorrecttheinterferencebyoneormoreofthefollowingmeasures:—Reorientorrelocatethereceivingantenna.—Increasetheseparationbetweentheequipmentandreceiver.—Connecttheequipmentintoanoutletonacircuitdifferentfromthattowhichthereceiverisconnected.—Consultthedealeroranexperiencedradio/TVtechnicianforhelp.Caution:Changesormodificationsnotexpresslyapprovedbythemanufacturercouldvoidtheuser’sauthoritytooperatetheequipment.ThisequipmentcomplieswiththeFCCRFradiationexposurelimitssetforthforanuncontrolled
  environment.Thisequipmentshouldbeinstalledandoperatedwithaminimumdistanceof20cmbetweentheradiatorandanypartofyourbody.Theantennasmustnotbeco‐locatedwithothertransmitterantennas.Thedevicecanonlyoperateindoor,andcannotoperateinoutdoorcondition.

Navigation menu