ZTE WF821 LTE router User Manual

ZTE Corporation LTE router

User manual

Download: ZTE WF821 LTE router User Manual
Mirror Download [FCC.gov]ZTE WF821 LTE router User Manual
Document ID3367386
Application IDKmMM/sy4PuFeXyUKrH9/OA==
Document DescriptionUser manual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize146.28kB (1828511 bits)
Date Submitted2017-04-23 00:00:00
Date Available2017-04-23 00:00:00
Creation Date2017-01-18 15:53:34
Producing SoftwareAcrobat Distiller 11.0 (Windows)
Document Lastmod2017-03-03 20:06:05
Document TitleMicrosoft Word - WF821?LTE?Indoor?CPE?User?Guide.doc
Document CreatorPScript5.dll Version 5.2.2
Document Author: haijianshi

LTE Indoor CPE
User Guide
FCC ID: SRQ-WF821
Index
Getting Started .......................................................................................................................... 5
1.1
Welcome to the CPE .................................................................................................. 5
1.2
Computer Configuration Requirements .................................................................... 5
1.3
Logging In to the Web Management Page ................................................................ 5
Overview ................................................................................................................................... 7
2.1
Viewing the System Information ............................................................................... 7
2.2
Viewing the Version Information .............................................................................. 7
2.3
Viewing CPU Usage ................................................................................................... 8
2.4
Viewing Memory Usage ............................................................................................ 8
2.5
Viewing 4G Status ..................................................................................................... 8
2.6
Viewing LAN Status ................................................................................................... 9
2.7
Viewing Wi‐Fi Status ................................................................................................. 9
2.8
Viewing WAN Status ............................................................................................... 10
2.9
Viewing Throughput Statistics ................................................................................ 10
2.10
Viewing Device List ................................................................................................. 11
Network................................................................................................................................... 11
3.1
WAN Settings........................................................................................................... 11
3.1.1
WAN Interface ................................................................................................. 11
3.1.2
Network Mode ................................................................................................ 12
3.2
LTE Settings.............................................................................................................. 12
3.2.1
Viewing Module Information .......................................................................... 12
3.2.2
LTE Setting ....................................................................................................... 13
3.2.3
Connect Method Setting ................................................................................. 14
3.3
APN Management ................................................................................................... 17
3.3.1
APN Settings in NAT mode .............................................................................. 17
3.3.2
APN list ............................................................................................................ 18
3.4
PIN Management .................................................................................................... 19
3.4.1
Viewing the Status of the USIM Card .............................................................. 19
3.4.2
Enabling PIN Verification ................................................................................. 19
3.4.3
Disabling PIN Verification ................................................................................ 20
3.4.4
Verifying the PIN.............................................................................................. 20
3.4.5
Changing the PIN ............................................................................................. 20
3.4.6
Setting Automatic Verification of the PIN ....................................................... 20
3.4.7
Verifying the PUK ............................................................................................ 21
3.5
LAN Setting .............................................................................................................. 21
3.5.1
Setting LAN Host Parameters .......................................................................... 21
3.5.2
Configuration the DHCP Server ....................................................................... 22
3.5.3
Bundled Address List ....................................................................................... 22
3.6
DMZ Settings ........................................................................................................... 24
3.7
Static Route ............................................................................................................. 24
3.7.1
Add Static Route .............................................................................................. 24
3.7.2
Modify Static Route ......................................................................................... 25
4
3.7.3
Delete Static Route .......................................................................................... 25
Wi‐Fi ........................................................................................................................................ 26
4.1
WLAN Setting .......................................................................................................... 26
4.1.1
Setting General Parameters............................................................................. 26
4.1.2
WPS Settings ................................................................................................... 27
4.2
Setting SSID Profile .................................................................................................. 27
4.3
Access Management ............................................................................................... 29
4.3.1
Setting the Access Policy ................................................................................. 29
4.3.2
Managing the Wi‐Fi Access List ....................................................................... 29
4.4
WDS ......................................................................................................................... 30
Security ................................................................................................................................... 31
5.1
MAC Filtering .......................................................................................................... 31
5.1.1
Enabling MAC Filter ......................................................................................... 32
5.1.2
Disabling MAC Filter ........................................................................................ 32
5.1.3
Setting Allow access network within the rules ................................................ 32
5.1.4
Setting Deny access network within the rules ................................................ 33
5.1.5
Adding MAC Filtering rule ............................................................................... 33
5.1.6
Modifying MAC Filtering rule .......................................................................... 34
5.1.7
Deleting MAC Filtering rule ............................................................................. 34
5.2
IP Filtering ............................................................................................................... 35
5.2.1
Enabling IP Filtering......................................................................................... 35
5.2.2
Disabling IP Filtering ........................................................................................ 35
5.2.3
Setting Allow access network outside the rules .............................................. 36
5.2.4
Setting Deny access network outside the rules ............................................... 36
5.2.5
Adding IP Filtering rule .................................................................................... 36
5.2.6
Modifying IP Filtering rule ............................................................................... 37
5.2.7
Deleting IP Filtering rule.................................................................................. 38
5.3
URL Filtering ............................................................................................................ 38
5.3.1
Enabling URL Filtering ..................................................................................... 38
5.3.2
Disabling URL Filtering .................................................................................... 39
5.3.3
Adding URL Filtering list .................................................................................. 39
5.3.4
Modify URL Filtering list .................................................................................. 39
5.3.5
Deleting URL Filtering list ................................................................................ 40
5.4
Port Forwarding....................................................................................................... 40
5.4.1
Adding Port Forwarding rule ........................................................................... 40
5.4.2
Modifying Port Forwarding rule ...................................................................... 41
5.4.3
Deleting Port Forwarding rule ......................................................................... 42
5.5
UPnP ........................................................................................................................ 42
VPN Setting ............................................................................................................................. 43
VOIP......................................................................................................................................... 43
7.1
View VOIP Information ........................................................................................... 44
7.2
Configuring SIP Server ............................................................................................. 44
7.3
Configuring SIP Account .......................................................................................... 45
System ..................................................................................................................................... 46
8.1
Maintenance ........................................................................................................... 46
8.1.1
Reboot ............................................................................................................. 46
8.1.2
Reset ................................................................................................................ 47
8.1.3
Backup Configuration File ............................................................................... 47
8.1.4
Upload Configuration File ............................................................................... 47
8.2
Version Manager ..................................................................................................... 48
8.2.1
Viewing Version Info ....................................................................................... 48
8.2.2
Version Upgrade .............................................................................................. 48
8.3
TR069 ...................................................................................................................... 49
8.4
Date & Time ............................................................................................................ 50
8.5
DDNS ....................................................................................................................... 52
8.6
Diagnosis ................................................................................................................. 53
8.6.1
Ping .................................................................................................................. 53
8.6.2
Traceroute ....................................................................................................... 54
8.7
Syslog....................................................................................................................... 55
8.7.1
Local ................................................................................................................ 55
8.7.2
Network ........................................................................................................... 56
8.8
Account ................................................................................................................... 57
8.9
Remote WEB Access ................................................................................................ 58
8.10
Logout ..................................................................................................................... 59
FAQs ........................................................................................................................................ 59
1 Getting Started
1.1 Welcome to the CPE
In this document, the LTE (Long Term Evolution) Indoor CPE (customer premises equipment)
will be replaced by the CPE. Carefully read the following safety symbols to help you use your
CPE safely and correctly:
Additional information
Optional methods or shortcuts for an action
Potential problems or conventions that need to be specified
1.2 Computer Configuration Requirements
For optimum performance, make sure your computer meets the following requirements.
Item
Requirement
CPU
Pentium 500 MHz or higher
Memory
128 MB RAM or higher
Hard disk
50 MB available space
Operating system

Microsoft: Windows XP, Windows Vista, Windows 7 or higher

Mac: Mac OS X 10.5 or higher
Display resolution
1024 x 768 pixels or higher
Browser

Internet Explorer 7.0 or later

Firefox 3.6 or later

Opera 10 or later

Safari 5 or later

Chrome 9 or later
1.3 Logging In to the Web Management Page
Use a browser to log in to the web management page to configure and manage the CPE.
The following procedure describes how to use a computer running Windows XP and Internet
Explorer 7.0 to log in to the web management page of the CPE.
1.
Connect the CPE properly.
2.
Launch Internet Explorer, enter http://192.168.1.1 in the address bar, and press Enter. As
shown in Figure 1‐1.
Figure 1‐1
3.
Enter the user name and password, and click Log In.
You can log in to the web management page after the password is verified. As shown in Figure 1‐2.
Figure 1‐2
The default user name is admin and the default password is olo@peru.
To protect your CPE from unauthorized access, change the password after your
first login.
The CPE supports diagnostic function. If you encounter problems, please
contact customer service for the specific using method.
To ensure your data safety, it is recommended that you turn on the firewall, and
conserve your login and FTP password carefully.
2 Overview
2.1 Viewing the System Information
To view the System Information, perform the following steps:
1. Choose Overview;
2. In the System Information area, view the system status, such as Running time and Online
time. As shown in Figure 2‐1.
Figure 2‐1
2.2 Viewing the Version Information
To view the Version Information, perform the following steps:
1. Choose Overview;
2. In the Version Information area, view the version information, such as Product name,
Software version, UBoot version and so on. As shown in Figure 2‐2.
Figure 2‐2
2.3 Viewing CPU Usage
To view the CPU usage, perform the following steps:
1. Choose Overview;
2. In the CPU Usage area, view the CPU usage information, such as Current CPU usage, Max
CPU usage, Min CPU usage. As shown in Figure 2‐3.
Figure 2‐3
2.4 Viewing Memory Usage
To view the memory usage, perform the following steps:
1. Choose Overview;
2. In the Memory Usage area, view the memory usage information, such as Total memory,
Current memory usage, Max memory usage and Min memory usage. As shown in Figure
2‐4.
Figure 2‐4
2.5 Viewing 4G Status
To view the 4G status, perform the following steps:
1. Choose Overview;
2.
In the 4G Status area, view the information about USIM card status, Connect status,
Operator, Current Mobile Network, Signal quality and so on. As shown in Figure 2‐5.
Figure 2‐5
2.6 Viewing LAN Status
To view the LAN status, perform the following steps:
1. Choose Overview;
2. In the LAN Status area, view the LAN status, such as Mac address, IP address and Subnet
mask. As shown in Figure 2‐6.
Figure 2‐6
2.7 Viewing Wi‐Fi Status
To view the Wi‐Fi status, perform the following steps:
1. Choose Overview;
2. In the Wi‐Fi Status area, view the information about Wi‐Fi status, SSID, Chanel NO., MAC
address and WDS status. As shown in Figure 2‐7.
Figure 2‐7
2.8 Viewing WAN Status
To view the WAN status, perform the following steps:
1. Choose Overview;
2. In the WAN Status area, view the wan status, such as the DNS, Current data rate and the
APN status. As shown in Figure 2‐8.
Figure 2‐8
2.9 Viewing Throughput Statistics
To view the throughput statistics, perform the following steps:
1. Choose Overview;
2. In the Throughput Statistics area, view the throughput statistics, such as WAN throughput
and LAN throughput. As shown in Figure 2‐9.
Figure 2‐9
2.10Viewing Device List
To view the device list, perform the following steps:
1. Choose Overview;
2. In the Device List area, view the device information which connect to the CPE, such as
Device name, Mac address, IP address and Lease time. As shown in Figure 2‐10.
Figure 2‐10
3 Network
3.1 WAN Settings
3.1.1 WAN Interface
To set the WAN interface, perform the following steps:
1. Choose Network >WAN Settings;
2. In the Network Mode area, select an interface between LTE and Ethernet;
3. Click Submit. As shown in Figure 3‐1.
Figure 3‐1
3.1.2 Network Mode
To set the network mode, perform the following steps:
1. Choose Network >WAN Settings;
2. In the Network Mode area, select a mode between BRIDGE and NAT;
3. Click Submit. As shown in Figure 3‐2.
Figure 3‐2
3.2 LTE Settings
3.2.1 Viewing Module Information
To view the mobile module information, perform the following steps:
1. Choose Network > LTE Settings;
2. In the Module Information area, you can view the information about the module, such as
module model, module version, IMEI. As shown in Figure 3‐3.
Figure 3‐3
3.2.2 LTE Setting
To set the LTE network, perform the following steps:
1. Choose Network >LTE Settings;
2. In the Setting area, you can set the configuration of LTE network;
3. In the LTE Settings area, you can view the LTE network connect status, such as Frequency,
RSSI, RSRP, RSRQ, CINR, SINR, Cell ID and so on. As shown in Figure 3‐5.
Figure 3‐5
3.2.3 Connect Method Setting
To set the connect method, perform the following steps:
1. Choose Network > LTE Settings;
2. In the Setting area, Select a connect method between Auto and Manual. As shown in Figure
3‐6.
Figure 3‐6
3.2.3.1 Auto Connect LTE Network
To set the CPE automatically connect to the internet, perform the following steps:
1. Choose Network > LTE Settings;
2. In the Setting area, set the connect method as Auto, when the LTE network is ready, the CPE
will be connected automaticity. As shown in Figure 3‐7.
Figure 3‐7
3.2.3.2 Manual Connect Mobile Network
To set the mobile network manual connect to the internet, perform the following steps:
1. Choose Network > LTE Settings;
2. In the Setting area, set the connect method as Manual, when the LTE network is ready, you
can set the CPE connect to the LTE network or disconnect from the LTE network. As shown in
Figure 3‐8.
Figure 3‐8
3.3 APN Management
3.3.1 APN Settings in NAT mode
To set and manage APN in NAT mode, perform the following steps:
1. Choose Network>APN Management.
2. In the APN Management area, you can set the APN.
3. Choose a APN number which you want to set.
4. In the APN Setting area you can set the APN parameters, such as enable or disable the apn,
apn name, username, password and so on.
5. If you want set a APN as default gateway, you should check that is enabled.
6.
7.
Select a APN type from the drop‐down list, such as VoIP, TR069 or VoIP+TR069.
Click Submit. As shown in Figure 3‐9.
Figure 3‐9
3.3.2 APN list
To view the APN list, perform the following steps:
1. Choose Network>APN Management.
2. In the APN list area you can view the APN list. As shown in the figure 3‐11.
Figure 3‐11
3.4 PIN Management
To manage the PIN, you can perform the following operations on the PIN Management page:
1. Enable or disable the PIN verification.
2. Verify the PIN.
3. Change the PIN.
4. Set automatic verification of the PIN. As shown in Figure 3‐12.
Figure 3‐12
3.4.1 Viewing the Status of the USIM Card
To view the status of the USIM card, perform the following steps:
1. Choose Network >PIN Management.
2. View the status of the USIM card in the USIM card status field.
3.4.2 Enabling PIN Verification
To enable PIN verification, perform the following steps:
1. Choose Network >PIN Management.
2. Set PIN verification to Enable.
3. Enter the PIN (4 to 8 digits) in the Enter PIN box.
4. Click Submit.
3.4.3 Disabling PIN Verification
To disable PIN verification, perform the following steps:
1. Choose Network >PIN Management.
2. Set PIN verification to Disable.
3. Enter the PIN (4 to 8 digits) in the Enter PIN box.
4. Click Submit.
3.4.4 Verifying the PIN
If PIN verification is enabled but the PIN is not verified, the verification is required. To verify the
PIN, perform the following steps:
1. Choose Network >PIN Management.
2. Enter the PIN (4 to 8 digits) in the PIN box.
3. Click Submit.
3.4.5 Changing the PIN
The PIN can be changed only when PIN verification is enabled and the PIN is verified.
To change the PIN, perform the following steps:
1. Choose Network>PIN Management.
2. Set PIN verification to Enable.
3. Set Change PIN to Enable.
4. Enter the current PIN (4 to 8 digits) in the PIN box.
5. Enter a new PIN (4 to 8 digits) in the New PIN box.
6. Repeat the new PIN in the Confirm PIN box.
7. Click Submit.
3.4.6 Setting Automatic Verification of the PIN
You can enable or disable automatic verification of the PIN. If automatic verification is enabled,
the CPE automatically verifies the PIN after restarting. This function can be enabled only when
PIN verification is enabled and the PIN is verified.
To enable automatic verification of the PIN, perform the following steps:
1.
Choose Network > PIN Management.
2.
Set Pin verification to Enable.
3.
Set Remember my PIN to Enable.
4.
Click Submit.
3.4.7 Verifying the PUK
If PIN verification is enabled and the PIN fails to be verified for three consecutive times, the
PIN will be locked. In this case, you need to verify the PUK and change the PIN to unlock it.
To verify the PUK, perform the following steps:
1.
Choose Network> PIN Management.
2.
Enter the PUK in the PUK box.
3.
Enter a new PIN in the New PIN box.
4.
Repeat the new PIN in the Confirm PIN box.
5.
Click Submit.
3.5 LAN Setting
3.5.1 Setting LAN Host Parameters
By default, the IP address is 192.168.1.1 with a subnet mask of 255.255.255.0. You can change
the host IP address to another individual IP address that is easy to remember. Make sure that IP
address is unique on your network. If you change the IP address of the CPE, you need to access
the web management page with the new IP address.
To change the IP address of the CPE, perform the following steps:
1. Choose Network Setting>LAN Settings.
2. In the LAN Host Settings area, set IP address and subnet mask.
3. In the DHCP Setting area, set the DHCP server to Enable.
4. Click Submit. As shown in Figure 3‐13.
Figure 3‐13
3.5.2 Configuration the DHCP Server
DHCP enables individual clients to automatically obtain TCP/IP configuration when the server
powers on. You can configure the CPE as a DHCP server or disable it. When configured as a
DHCP server, the CPE automatically provides the TCP/IP configuration for the LAN clients that
support DHCP client capabilities. If DHCP server services are disabled, you must have another
DHCP server on your LAN, or each client must be manually configured.
To configure DHCP settings, perform the following steps:
1.
2.
3.
Choose Network Setting > LAN Settings.
Set the DHCP server to Enable.
Set Start IP address.
4.
This IP address must be different from the IP address set on the LAN Host Settings area,
but they must be on the same network segment.
Set End IP address.
5.
This IP address must be different from the IP address set on the LAN Host Settings area,
but they must be on the same network segment.
Set Lease time.
6.
Lease time can be set to 1 to 10,080 minutes. It is recommended to retain the
default value.
Click Submit. As shown in Figure 3‐14.
Figure 3‐14
3.5.3 Bundled Address List
You can bind an IP address to a device based on its MAC address. The device will receive the
same IP address each time it accesses the DHCP server. For example, you can bind an IP address
to an FTP server on the LAN.
To add an item to the setup list, perform the following steps:
1. Choose Network Setting > LAN Settings.
2. Click Add list.
3. Set the MAC address and IP Address.
4. Click Submit. As shown in Figure 3‐15.
Figure 3‐15
To modify an item in the setup list, perform the following steps:
1. Choose Network Setting > LAN Settings.
2. Choose the item to be modified, and click Edit.
3. Set the MAC address and IP Address.
4. Click Submit. As shown in Figure 3‐16.
Figure 3‐16
To delete an item in the setup list, perform the following steps:
1. Choose Network Setting > LAN Settings.
2. Choose the item to be deleted, and click Delete.
3.6 DMZ Settings
If the demilitarized zone (DMZ) is enabled, the packets sent from the WAN are directly sent to
a specified IP address on the LAN before being discarded by the firewall.
To set DMZ, perform the following steps:
1. Choose Network Setting > DMZ Settings.
2. Set DMZ to Enable.
3. (Optional) Set ICMP Redirect to Enable.
4. Set Host address.
This IP address must be different from the IP address set on the LAN Host
Settings page, but they must be on the same network segment.
5. Click Submit. As shown in Figure 3‐17.
Figure 3‐17
3.7 Static Route
3.7.1 Add Static Route
To add a static route, perform the following steps:
1.
2.
3.
4.
5.
6.
Choose Network Setting>Static Route.
Click Add list.
Set the Dest IP address and Subnet mask.
Select an Interface from the drop‐down list.
If you select LAN as the interface, you need set a Gateway.
Click Submit. As shown in Figure 3‐18.
Figure 3‐18
3.7.2 Modify Static Route
To modify an access restriction rule, perform the following steps:
1. Choose Security>Static Route.
2. Choose the item to be modified, and click Edit.
3. Repeat steps 3 through 5 in the previous procedure.
4. Click Submit. As shown in Figure 3‐19.
Figure 3‐19
3.7.3 Delete Static Route
To delete a static route, perform the following steps:
1. Choose Security>Static Route.
2. Choose the item to be deleted, and click Delete.
4 Wi‐Fi
4.1 WLAN Setting
This function enables you to configure the Wi‐Fi parameters.
4.1.1 Setting General Parameters
To configure the general Wi‐Fi settings, perform the following steps:
1. Choose Wi‐Fi > Wi‐Fi Settings.
2. In the General Settings area, set WLAN to Enable.
3. Set Mode to one of the values described in the following table:
Parameter Value
Description
802.11b/g/n
The Wi‐Fi client can connect to the CPE in
802.11b, 802.11g, or 802.11n mode. If the
client connects to the CPE in 802.11n mode,
the Advanced Encryption Standard (AES)
802.11b/g
802.11b
802.11g
4.
5.
Set the Channel No. from 1 to 11.
Click Submit. As shown in Figure 4‐1.
encryption mode is required.
The Wi‐Fi client can connect to the CPE in
802.11b or 802.11g mode.
The Wi‐Fi client can connect to the CPE in
802.11b mode.
The Wi‐Fi client can connect to the CPE in
802.11g mode.
Figure 4‐1
4.1.2 WPS Settings
Wi‐Fi Protected Setup (WPS) enables you to simply add a wireless client to the network
without needing to specifically configure the wireless settings, such as the SSID, security
mode and passphrase. You can use either the WPS button or PIN to add the wireless client.
To configure Wi‐Fi WPS settings, perform the following steps:
1. Choose Wi‐Fi > WPS Settings.
2. Set WPS to Enable.
3. Click Submit. As shown in Figure 4‐2.
Figure 4‐2
4.2 Setting SSID Profile
After you configure the CPE on the SSID Profile page, the Wi‐Fi client connects to the CPE
based on preset rules, improving access security.
To configure the CPE on the SSID Profile page, perform the following steps:
1. Choose Wi‐Fi > Wi‐Fi Settings.
2. Set SSID.
The SSID can contain 1 to 32 ASCII characters. It cannot be empty and the last character
cannot be a blank character. In addition, the SSID cannot contain the following special
characters: / ' = " \ &
The Wi‐Fi client connects to the CPE using the found SSID.
3. Set Maximum number of devices.
This parameter indicates the maximum number of Wi‐Fi clients that connect to the CPE.
A maximum of 32 clients can connect to the CPE.
4. Set Hide SSID broadcast to Enable.
If the SSID is hidden, the client cannot detect the CPE's Wi‐Fi information.
5. Set AP isolation to Enable.
The clients can connect to the CPE but cannot communicate with each other.
6. Set Security.
If Security is set to NONE (not recommended), Wi‐Fi clients directly connect to the CPE.
This security level is low.
If Security is set to WEP, Wi‐Fi clients connect to the CPE in web‐based encryption
mode.
If Security is set to WPA‐PSK, Wi‐Fi clients connect to the CPE in WPA‐PSK encryption
mode.
If Security is set to WPA2‐PSK, Wi‐Fi clients connect to the CPE in WPA2‐PSK encryption
mode. This mode is recommended because it has a high security level.
If Security is set to WPA‐PSK & WPA2‐PSK, Wi‐Fi clients connect to the CPE in
WPA‐PSK&WPA2‐PSK encryption mode.
7. Set the encryption mode.
If…
Sets to
Description
WEP
Authentication mode  Shared authentication: The client
connects to the CPE in shared
authentication mode.
 Open authentication: The client connects
to the CPE in open authentication mode.
 Both: The client connects to the CPE in
shared or open authentication mode.
Encryption password  128bit: Only 13 ASCII characters or 26 hex
length
characters can be entered in the Key 1 to
Key 4 boxes.
 64bit: Only 5 ASCII characters or 10 hex
characters can be entered in the Key 1 to
Key 4 boxes.
Current
This value can be set to 1, 2, 3, or 4. After a key
password index
index is selected, the corresponding key takes
effect.
WPA‐PSK
WPA‐PSK
Only 8 to 63 ASCII characters or 8 to 64 hex
characters can be entered.
WPA encryption
This value can be set to TKIP+AES, AES, or
TKIP.
WPA2‐PSK(reco WPA‐PSK
Only 8 to 63 ASCII characters or 8 to 64 hex
mmended)
characters can be entered.
WPA encryption
This value can be set to TKIP+AES, AES, or
TKIP.
WPA‐PSK &
WPA‐PSK
Only 8 to 63 ASCII characters or 8 to 64 hex
WPA2‐PSK
characters can be entered.
WPA encryption
This value can be set to TKIP+AES, AES, or
TKIP.
8. Click Submit. As shown in Figure 4‐3.
Figure 4‐3
4.3 Access Management
4.3.1 Setting the Access Policy
This function enables you to set access restriction policies for each SSID to manage access to
the CPE.
To configure Wi‐Fi MAC control settings, perform the following steps:
1. Choose Wi‐Fi > Access Management.
2. In the WLAN Access List Settings area, set Access Policy.
The access policy can be set to Disable, Blacklist or Whitelist.
 If SSID's MAC Access is set to Disable, access restrictions do not take effect.
 If SSID's MAC Access is set to Blacklist, only the devices that are not in the blacklist
can connect to the CPE.
 If SSID's MAC Access is set to Whitelist, only the devices in the whitelist can
connect to the CPE.
3. Click Submit. As shown in Figure 4‐4.
Figure 4‐4
4.3.2 Managing the Wi‐Fi Access List
This function enables you to set the SSID access policies based on MAC addresses.
To add an item to the Wi‐Fi access list, perform the following steps:
1. Choose Wi‐Fi > Access Management.
2. Click Add.
3. Set MAC address.
4. Click Submit. As shown in Figure 4‐5.
Figure 4‐5
To modify an item in the Wi‐Fi access list, perform the following steps:
1. Choose Wi‐Fi > Access Management.
2. Click Edit MAC List.
3. Choose the item to be modified, and click Edit.
4. Set MAC address.
5. Set one of the SSID to Enable to make the MAC address take effect for the SSID.
6. Click Submit. As shown in Figure 4‐6.
Figure 4‐6
To delete an item from the Wi‐Fi access list, perform the following steps:
1. Choose Wi‐Fi > Access Management.
2. Choose the item to be deleted, and click Delete. As shown in Figure 4‐7.
Figure 4‐7
4.4 WDS
The CPE supports the wireless distribution system (WDS). All Wi‐Fi devices in a WDS must be
configured to use the same radio channel, encryption mode, SSID, and encryption key. You
can set the WDS encryption mode to NONE or WPA/WPA2. If you set the WDS encryption
mode to NONE, the Wi‐Fi clients can use NONE or WEP encryption mode. If you set the WDS
encryption mode to WPA/WPA2‐PSK, the Wi‐Fi clients can use WPA/WPA2‐PSK encryption
mode. After WDS is enabled, disable DHCP on CPEs that are not directly connected to the
WAN port.
If WDS is enabled, the WPS function will not take effect. If the channel is set to Auto, you
need to set the channel.
To configure the WDS, perform the following steps:
1. Choose Wi‐Fi > WDS.
2. Set WDS to Enable.
3. Set WDS Mode as Repeater Mode;
4. Click Scan.
From the search results, choose the SSID of the networking device.
5. Set Security.
WPA‐PSK can contain 8 to 63 ASCII characters or 64 hex characters.
6. Click Submit. As shown in Figure 4‐8.
Figure 4‐8
5 Security
5.1 MAC Filtering
This page enables you to configure the MAC address filtering rules.
5.1.1 Enabling MAC Filter
To enable MAC address filter, perform the following steps:
1. Choose Security>MAC Filtering
2. Set MAC filtering to Enable.
3. Click Submit. As shown in Figure 5‐1.
Figure 5‐1
5.1.2 Disabling MAC Filter
To disable MAC address filter, perform the following steps:
1. Choose Security>MAC Filtering
2. Set MAC filtering to Disable.
3. Click Submit. As shown in Figure 5‐2.
Figure 5‐2
5.1.3 Setting Allow access network within the rules
To set allow access network within the rules, perform the following steps:
1. Choose Security>MAC Filtering.
2.
3.
Set Allow access network within the rules.
Click Submit. As shown in Figure 5‐3.
Figure 5‐3
5.1.4 Setting Deny access network within the rules
To set deny access network within the rules, perform the following steps:
1. Choose Security>MAC Filtering.
2. Set Deny access network within the rules.
3. Click Submit. As shown in Figure 5‐4.
Figure 5‐4
5.1.5 Adding MAC Filtering rule
To add a MAC filtering rule, perform the following steps:
1. Choose Security>MAC Filtering.
2. Click Add list.
3. Set MAC address.
4. Click Submit. As shown in Figure 5‐5.
Figure 5‐5
5.1.6 Modifying MAC Filtering rule
To modify a MAC address rule, perform the following steps:
1. Choose Security>MAC Filtering.
2. Choose the rule to be modified, and click Edit.
3. Set MAC address.
4.
Click Submit. As shown in Figure 5‐6.
Figure 5‐6
5.1.7 Deleting MAC Filtering rule
To delete a MAC address filter rule, perform the following steps:
1. Choose Security>MAC Filtering.
2. Choose the rule to be deleted, and click Delete. As shown in Figure 5‐7.
Figure 5‐7
5.2 IP Filtering
Data is filtered by IP address. This page enables you to configure the IP address filtering rules.
5.2.1 Enabling IP Filtering
To enable IP Filtering, perform the following steps:
1. Choose Security>IP Filtering.
2. Set IP Filtering Enable.
3.
Click Submit. As shown in Figure 5‐8.
Figure 5‐8
5.2.2 Disabling IP Filtering
To disable IP Filtering, perform the following steps:
1. Choose Security>IP Filtering.
2. Set IP Filtering Disable.
3. Click Submit. As shown in Figure 5‐9.
Figure 5‐9
5.2.3 Setting Allow access network outside the rules
To set allow access network, perform the following steps:
1. Choose Security>IP Filtering.
2. Set Allow access network outside the rules.
3. Click Submit. As shown in Figure 5‐10.
Figure 5‐10
5.2.4 Setting Deny access network outside the rules
To set allow access network, perform the following steps:
1. Choose Security>IP Filtering.
2. Set Deny access network outside the rules.
3.
Click Submit. As shown in Figure 5‐11.
Figure 5‐11
5.2.5 Adding IP Filtering rule
Add an IP address filtering rule, perform the following steps:
1. Choose Security>IP Filtering.
2.
3.
4.
5.
Click Add list.
Set Service.
Set Protocol.
In the Source IP Address Range box, enter the source IP address or IP address segment to
be filtered.
6. In the Source port range box, enter the source port or port segment to be filtered.
7. In the Destination IP Address Range box, enter the destination IP address or IP address
segment to be filtered.
8. In the Destination port Range box, enter the destination port or port segment to be
filtered.
9. In the Status box, choose a status the rule will be executed.
10. Click Submit. As shown in Figure 5‐12.
Figure 5‐12
5.2.6 Modifying IP Filtering rule
To modify an IP filtering rule, perform the following steps:
1. Choose Security > IP Filtering.
2. Choose the rule to be modified, and click Edit.
3. Repeat steps 3 through 9 in the previous procedure.
4. Click Submit. As shown in Figure 5‐13.
Figure 5‐13
5.2.7 Deleting IP Filtering rule
To delete an IP address filtering rule, perform the following steps:
1. Choose Security > IP Filtering.
2. Choose the rule to be deleted, and click Delete. As shown in Figure 5‐14.
Figure 5‐14
5.3 URL Filtering
Data is filtered by uniform resource locator (URL). This page enables you to configure URL filtering
rules.
5.3.1 Enabling URL Filtering
To enable URL Filtering, perform the following steps:
3. Choose Security>URL Filtering.
4. Set URL Filtering to Enable.
5. Click Submit. As shown in Figure 5‐15.
Figure 5‐15
5.3.2 Disabling URL Filtering
To disable URL Filtering, perform the following steps:
1. Choose Security>URL Filtering.
2. Set URL Filtering to Disable.
3. Click Submit. As shown in Figure 5‐16.
Figure 5‐16
5.3.3 Adding URL Filtering list
To add a URL filtering list, perform the following steps:
1. Choose Security>URL Filtering.
2. Click Add list.
3. Set URL.
4. Click Submit. As shown in Figure 5‐17.
Figure 5‐17
5.3.4 Modify URL Filtering list
To modify a URL filtering rule, perform the following steps:
1.
2.
3.
4.
Choose Security>URL Filtering.
Choose the rule to be modified, and click Edit.
Set URL address.
Click Submit. As shown in Figure 5‐18.
Figure 5‐18
5.3.5 Deleting URL Filtering list
To delete a URL list, perform the following steps:
1. Choose Security>URL Filtering.
2. Choose the item to be deleted, and click Delete. As shown in Figure 5‐19.
Figure 5‐19
5.4 Port Forwarding
When network address translation (NAT) is enabled on the CPE, only the IP address on the WAN
side is open to the Internet. If a computer on the LAN is enabled to provide services for the
Internet (for example, work as an FTP server), port forwarding is required so that all accesses to
the external server port from the Internet are redirected to the server on the LAN.
5.4.1 Adding Port Forwarding rule
To add a port forwarding rule, perform the following steps:
1.
Choose Security > Port Forwarding.
2.
Click Add list.
3.
Set Service.
4.
Set Protocol.
5.
Set Remote port range.
The port number ranges from 1 to 65535.
6.
Set Local host.
This IP address must be different from the IP address that is set on the
LAN Host Settings page, but they must be on the same network
segment.
7.
Set Local port.
The port number ranges from 1 to 65535.
8.
Click Submit. As shown in Figure 5‐20.
Figure 5‐20
5.4.2 Modifying Port Forwarding rule
To modify a port forwarding rule, perform the following steps:
1. Choose Security > Port Forwarding.
2. Choose the item to be modified, and click Edit.
3. Repeat steps 3 through7 in the previous procedure.
4. Click Submit. As shown in Figure 5‐21.
Figure 5‐21
5.4.3 Deleting Port Forwarding rule
To delete a port forwarding rule, perform the following steps:
1. Choose Security > Port Forwarding.
2. Choose the item to be deleted, and click Delete. As shown in Figure 5‐22.
Figure 5‐22
5.5 UPnP
On this page, you can enable or disable the Universal Plug and Play (UPnP) function.
To enable UPnP, perform the following steps:
1. Choose Security > UPnP.
2. Set UPnP to Enable.
3. Click Submit. As shown in Figure 5‐23.
Figure 5‐23
6 VPN Setting
This function enables you to connect the virtual private network (VPN).
To connect the VPN, perform the following steps:
1. Choose VPN Setting.
2. In the VPN Setting area, enable VPN.
3. Select a protocol from Protocol drop‐down list.
4. Enter Username and Password.
5. Click Submit.
6. You can view the status in VPN Status area. As shown in Figure 6‐1.
Figure 6‐1
7 VOIP
The CPE supports voice services based on the Session Initiation Protocol (SIP) and enables voice
service interworking between the Internet and Public Switched Telephone Networks (PSTNs).
7.1 View VOIP Information
To view VOIP information, perform the following steps:
1. Choose VOIP > VOIP Information;
2. View the VOIP information, such as the SIP account and status of the SIP registration server.
As shown in Figure 7‐1.
Figure 7‐1
7.2 Configuring SIP Server
To set the SIP server parameters, perform the following steps:
1. Choose VOIP > SIP Server;
2. In the User Agent port box, enter the port of the SIP account provided by your service
provider.
3. In the SIP server domain name box, enter the domain name of the SIP server.
4. In the Proxy server address box, enter the address of the proxy server provided by your
service provider, for example, 192.168.1.10.
5. In the Proxy server port box, enter the port of the proxy server provided by your service
provider, for example, 5060. The value ranges from 1 to 65535.
6. In the Registration server address box, enter the address of the registration server
provided by your service provider, for example, 192.168.1.11.
7. In the Registration server port box, enter the port of the registration server provided by
your service provider, for example, 5060. The value ranges from 1 to 65535.
8. Click Submit. As shown in Figure 7‐2.
Figure 7‐2
7.3 Configuring SIP Account
Before configuring SIP accounts, make sure that the registration server has been properly
configured.
To configure SIP account, perform the following steps:
1. Choose VoIP > SIP Account.
2. Set SIP Account Enable.
3. In the User name and Password boxes, enter the user name and password of the SIP
account provided by your service provider.
4. In the Phone Number box, enter the SIP Phone number provided by your service
provider.
5. In the Display Name box, enter the display name provided by your service provider.
6. In the Codec Priority area, set the codec priority.
7. Click Submit. As shown in Figure 7‐3.
Figure 7‐3
8 System
8.1 Maintenance
8.1.1 Reboot
This function enables you to reboot the CPE. Settings take effect only after the CPE reboot. To
reboot the CPE, perform the following steps:
1. Choose System>Maintenance.
2. Click Reboot. As shown in Figure 8‐1.
The CPE then restarts.
Figure 8‐1
8.1.2 Reset
This function enables you to restore the CPE to its default settings.
To restore the CPE, perform the following steps:
1. Choose System>Maintenance.
2. Click Reset. As shown in Figure 8‐2.
The CPE is then restored to its default settings.
Figure 8‐2
8.1.3 Backup Configuration File
You can download the existing configuration file to back it up. To do so:
1. Choose System>Maintenance.
2. Click Download on the Maintenance page.
3. In the displayed dialog box, select the save path and name of the configuration file to be
backed up.
4. Click Save. As shown in Figure 8‐3.
The procedure for file downloading may vary with the browser you are using.
Figure 8‐3
8.1.4 Upload Configuration File
You can upload a backed up configuration file to restore the CPE. To do so:
1. Choose System>Maintenance.
2. Click Browse on the Maintenance page.
3. In the displayed dialog box, select the backed up configuration file.
4. Click Open.
5. The dialog box choses. In the box to be right of Configuration file, the save path and name
of the backed up configuration file are displayed.
6. Click Upload. As shown in Figure 8‐4.
The CPE uploads the backed up configuration file. The CPE then automatically restarts.
Figure 8‐4
8.2 Version Manager
This function enables you to upgrade the software version of the CPE to the latest version. It is
recommended that you upgrade the software because the new version, certain bugs have been
fixed and the system stability is usually improved.
8.2.1 Viewing Version Info
To view the version info, perform the following steps:
1. Choose System>Version Manager.
2. In the Version Info area, you can view the product name and software version. As shown in
Figure 8‐5.
Figure 8‐5
8.2.2 Version Upgrade
To perform an upgrade successfully, connect the CPE to your computer through a network cable,
save the upgrade file on the computer, and make sure the CPE is not connected to anything other
than a power adapter and the computer.
To perform an upgrade, perform the following steps:
1. Choose System>Version Manager.
2. In the Version Upgrade area, click Browse. In the displayed dialog box, select the target
3.
4.
5.
software version file.
Click Open. The dialog box choses. The save path and name of the target software version
file are displayed in the Update file field.
Click Submit.
The software upgrade starts. After the upgrade, the CPE automatically restarts and runs the
new software version. As shown in Figure 8‐6.
During an upgrade, do not power off the CPE or disconnect it from the
computer.
Figure 8‐6
8.3 TR069
TR‐069 is a standard for communication between CPEs and the auto‐configuration server (ACS).
If your service provider uses the TR069 automatic service provision function, the ACS
automatically provides the CPE parameters. If you set the ACS parameters on both the CPE and
ACS, the network parameters on the CPE are automatically set using the TR‐069 function, and
you do not need to set other parameters on the CPE.
To configure the CPE to implement the TR‐069 function, perform the following steps:
1.
Choose System>TR‐069 Settings.
2.
Set acs URL source. There are two methods, such as URL and DHCP.
3.
In the ACS URL box, enter the ACS URL address.
4.
Enter ACS user name and password for the CPE authentication.
To use the CPE to access the ACS, you must provide a user name and
password for authentication. The user name and the password must be
the same as those defined on the ACS.
5.
If you set Periodic inform to Enable, set Periodic inform interval.
6.
Set connection request user name and password.
7.
Click Submit. As shown in Figure 8‐8.
Figure 8‐7
8.4 Date & Time
You can set the system time manually or synchronize it with the network. If you select Sync
from network, the CPE regularly synchronizes the time with the specified Network Time
Protocol (NTP) server. If you enable daylight saving time (DST), the CPE also adjusts the system
time for DST.
To set the date and time, perform the following steps:
1. Choose System > Date & Time.
2. Select Set manually.
3. Set Local time or click Sync to automatically fill in the current local system time.
4. Click Submit. As shown in Figure 8‐9.
Figure 8‐8
To synchronize the time with the network, perform the following steps:
1. Choose System > Date & Time.
2. Select Sync from network.
3. From the Primary NTP server drop‐down list, select a server as the primary server for time
synchronization.
4. From the Secondary NTP server drop‐down list, select a server as the IP address of the
secondary server for time synchronization.
5. If you don’t want to use other NTP server, you need to enable Optional ntp server, and set a
server IP address.
6. Set Time zone.
7. Click Submit. As shown in Figure 8‐10.
Figure 8‐9
8.5 DDNS
Dynamic Domain Name Server (DDNS) service is used to map the user's dynamic IP address to a
fixed DNS service.
To configure DDNS settings, perform the following steps:
1. Choose System > DDNS.
2. Set DDNS to Enable.
3. In Service provider, choose DynDNS.org or oray.com.
4. Enter Domain name and Host name. For example, if the domain name provided by your
service provider is test.customtest.dyndns.org, enter customtest.dyndns.org as Domain
name, and test as Host name.
5. Enter User name and Password.
6. Click Submit. As shown in Figure 8‐12.
Figure 8‐10
8.6 Diagnosis
If the CPE is not functioning correctly, you can use the diagnosis tools on the Diagnosis page to
preliminarily identify the problem so that actions can be taken to solve it.
8.6.1 Ping
If the CPE fails to access the Internet, run the ping command to preliminarily identify the
problem. To do so:
1.
Choose System>Diagnosis.
2.
In the Method area, select Ping.
3.
Enter the domain name in the Target IP or domain field, for example, www.google.com.
4.
Set Packet size and Timeout.
5.
Set Count.
6.
Click Ping. As shown in Figure 8‐13.
Wait until the ping command is executed. The execution results are displayed in the Results box.
Figure 8‐11
8.6.2 Traceroute
If the CPE fails to access the Internet, run the Traceroute command to preliminarily identify the
problem. To do so:
1.
Choose System>Diagnosis.
2.
In the Method area, select Traceroute.
3.
Enter the domain name in the Target IP or domain field. For example, www.google.com.
4.
Set Maximum hops ad Timeout.
5.
Click Traceroute. As shown in Figure 8‐14.
Wait until the traceroue command is executed. The execution results are displayed in the
Results box.
Figure 8‐12
8.7 Syslog
The syslog record user operations and key running events.
8.7.1 Local
To set the syslog to local, perform the following steps:
1.
Choose System>Syslog.
2.
In the Setting area, set the method to Local.
3.
In the Level drop‐down list, select a log level.
4.
Click Submit. As shown in Figure 8‐15.
Figure 8‐13
Viewing local syslog
To view the local syslog, perform the following steps:
1.
In the Keyword box, set a keyword.
2.
Click Pull, the result box will display.
8.7.2 Network
To set the syslog to network, perform the following steps:
1.
Choose System>Syslog.
2.
In the Setting area, set the method to Network.
3.
In the Level drop‐down list, select a log level.
4.
In the Forward IP address box, set a IP address.
5.
Click Submit. As shown in Figure 8‐16.
The syslog will transmit to some client to display through network.
Figure 8‐14
8.8 Account
This function enables you to change the login password of the user. After the password changes,
enter the new password the next time you login.
To change the password, perform the following steps:
1. Choose System>Account.
2. Select the user name, if you want to change the password of normal user, you need to set
Enable User enable.
3. Enter the current password, set a new password ,and confirm the new password.
4. New password and Confirm password must contain 5 to 15 characters.
5. Click Submit. As shown in Figure 8‐17.
Figure 8‐15
8.9 Remote WEB Access
To configure the parameters of WEB, perform the following steps:
1. Choose System> Remote WEB Access.
2. Set HTTP enable. If you set HTTP disable, you will can’t login the web management page
with the HTTP protocol from WAN side.
3. Set HTTP port. If you want to change the login port, you can set a new port in the box, the
default HTTP port is 80.
4. Set HTTPS enable. If you want to login the web management page with the HTTPS protocol
from WAN side, you need to enable the HTTPS.
5. If you want to login the web management page form the WAN, you need to Enable
Allowing login from WAN.
6. Set the HTTPS port.
7. Click Submit. As shown in Figure 8‐18.
Figure 8‐16
8.10Logout
To logout the web management page, perform the following steps:
1. Choose System and click Logout
2. It will back to the login page.
9 FAQs
The POWER indicator does not turn on.
 Make sure that the power cable is connected properly and the CPE is powered on.
 Make sure that the power adapter is compatible with the CPE.
Fails to Log in to the web management page.
 Make sure that the CPE is started.
 Verify that the CPE is correctly connected to the computer through a network cable. If the
problem persists, contact authorized local service suppliers.
The CPE fails to search for the wireless network.
 Check that the power adapter is connected properly.
 Check that the CPE is placed in an open area that is far away from obstructions, such as
concrete or wooden walls.

Check that the CPE is placed far away from household electrical appliances that generate
strong electromagnetic field, such as microwave ovens, refrigerators, and satellite dishes.
If the problem persists, contact authorized local service suppliers.
The power adapter of the CPE is overheated.
 The CPE will be overheated after being used for a long time. Therefore, power off the CPE
when you are not using it.
 Check that the CPE is properly ventilated and shielded from direct sunlight.
The parameters are restored to default values.
 If the CPE powers off unexpectedly while being configured, the parameters may be restored
to the default settings.
 After configuring the parameters, download the configuration file to quickly restore the CPE
to the desired settings.
FCC Regulations
 This device complies with part 15 of the FCC Rules. Operation is subject to the following
two conditions: (1) This device may not cause harmful interference, and (2) this device
must accept any interference received, including interference that may cause undesired
operation.
This equipment has been tested and found to comply with the limits for a Class B digital
device, pursuant to part 15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in a residential installation. This
equipment generates, uses and can radiate radio frequency energy and, if not installed
and used in accordance with the instructions, may cause harmful interference to radio
communications. However, there is no guarantee that interference will not occur in a
particular installation. If this equipment does cause harmful interference to radio or
television reception, which can be determined by turning the equipment off and on, the
user is encouraged to try to correct the interference by one or more of the following
measures:
—Reorient or relocate the receiving antenna.
—Increase the separation between the equipment and receiver.
—Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
—Consult the dealer or an experienced radio/ TV technician for help.
Caution :
Changes or modifications not expressly approved by the manufacturer could void the user’s
authority to operate the equipment.
This equipment complies with the FCC RF radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with a minimum distance of 20cm
between the radiator and any part of your body. The antennas must not be co‐located with other
transmitter antennas.
The device can only operate indoor, and can not operate in outdoor condition.

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.5
Linearized                      : No
Author                          : haijianshi
Create Date                     : 2017:01:18 15:53:34+08:00
Modify Date                     : 2017:03:03 20:06:05+08:00
Has XFA                         : No
XMP Toolkit                     : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:08:04
Producer                        : Acrobat Distiller 11.0 (Windows)
Creator Tool                    : PScript5.dll Version 5.2.2
Metadata Date                   : 2017:03:03 20:06:05+08:00
Format                          : application/pdf
Title                           : Microsoft Word - WF821?LTE?Indoor?CPE?User?Guide.doc
Creator                         : haijianshi
Document ID                     : uuid:08630aa0-bc10-4a9e-9b92-ba8f830ae48a
Instance ID                     : uuid:b8383058-364a-44aa-8e4b-8059209645c2
Page Count                      : 62
EXIF Metadata provided by EXIF.tools
FCC ID Filing: SRQ-WF821

Navigation menu