3.1 LOGGING IN To log in to the GUI, perform the following steps: 1. Ensure the installation described in Chapter 2 is complete. Check that the CPE has power and that the signal strength is good. 2. Launch an Internet browser on the administrator’s PC. 3. Enter the default IP address 192.168.0.21 in the browser address field and press Enter.
4. Enter user name and password and click OK. Then CPE configuration homepage appears: NOTE: The CPE functions in Router or Bridge mode.
3.2 SYSTEM SETTINGS The System Settings is used to review, change and save all CPE system settings. Only the administrator can make changes to this screen. 3.2.1 CHANGING SYSTEM CONFIGURATION To change the CPE system configuration setting, perform the following steps: 1. Enter into the Admin Tab field. 2.
2. Enter into upgradeSw field in the left side of Browser. 3. Choose the Upgrade Changes as shown in the screen below. NOTE: Upgrade firmware need permission of system administrator to have successful upgrade. False Upgrade could damage the CPE.
If any of the configuration parameters are not correct, the system will use the default values for configurations. If the system can’t find a newer version or fails to find the specified version the system will keep running with the old SW version. Other functionalities you can do with Admin Tab of the CPE Wimax are the following: 1. Web Configuration for Bridge. 2.
3.2.3 CPE CONFIGURATION PARAMETERS Configuration Parameter name Description Default Value CPE_ETH_IP_ADDR The CPE Ethernet IP address 192.168.0.21 CPE_ETH_SUBNET_MASK The CPE Ethernet subnet mask 255.255.255.0 CPE_ETH_DEFULT_GATEWAY The CPE gateway CPE_WIMAX_IP_ADDR The CPE WiMAX IP address 172.25.25.
default SNMP manager WRITE_COMMUNITY The read community for the private default SNMP manager TRAP_SERVER_ADDR The address of the trap server IS_AUTO_UPGRADE_ENABLE D If true automatic upgrade is False enabled AUTO_UPGRADE_TIME The interval upgrades CUSTOMER_NAME The name of the customer CUSTOMER_NAME CONFIGURATION_FILE_NAME The configuration file name config.
EAP_MODE Defines which EAP is used TLS 1 -> TTLS or TTLS DEVICE_CERTIFICATE_FILE_P ATH The full path on the FTP server -> FTP root folder on which to upload/download SUPP_WORKAROUND Enables and disables the False supplicant workaround on the CPE Configuration Structure Configuration Parameter name Description Default Value Contains the different configuration parameters
Configuration Structure Configuration Parameter name Description ROUTER_CONFIG_ST RUCT Contains the configurations. is formed of which enables/ support and a mapping rules. Default Value NAT related The structure an argument disables NAT list of NAT natEnabled Enables/Disables NAT 0 support.
3.2.4 IP ADDRESS ASSIGNMENT AND CONFIGURATION FILE RETRIEVAL The system configuration parameters are maintained in the configuration file saved on flash.
3.2.5 CHANGING CONFIGURATION FILE AFTER INITIALIZATION To trigger the CPE to use a different configuration file other than the one retrieved in its initialization; the downloadConfigFile command must be used. Please refer to downloadConfigFile command for more information about changing the configuration file after initialization. 3.2.
3.2.9 AUTHENTICATION SUPPORT The CPE supports three modes of authentication: 1. Null authentication: This can be enforced by setting the PKM version to none on the BS. 2. Supplicant workaround flag: In which case the CPE is only involved in the authentication using dummy keys. It is not recommended to use this mode. 3. EAP Authentication using either TLS or TTLS.
CHAPTER F OUR: C LI C OMMANDS 4.1 LOADIMAGE loadImage Arguments Represents which image will be loaded. Possible values are: image (M) primary : loads the primary image secondary: loads the secondary image network: loads image from network Description Load the firmware.
4.2 UPGRADESW upgradeSw Arguments Represents which image will be upgraded. Possible values are: image (O) primary: upgrades the primary image secondary : upgrades the secondary image If not specified, system upgrades the nonactive String image representing the version which is used in the upgrade. The version consists of the major.minor.
Arguments Possible values are: primary : get the version of the primary image secondary: get the version of the secondary image type (O) hw: get the HW version If no argument is specified, display the version of images as well as the HW version and the operating image.
value 1 (O) The value of the first parameter to set paramName 2 (O) The name of the second parameter to set value 2 (O) The value of the second parameter to set ………….. Names and Values of the other parameters . paramName .
4.6 SAVESYSCONFIGURATION saveSysConfiguration Arguments None Description Save permanently on flash the current configuration parameters. Examples saveSysConfiguration 4.7 DOWNLOADCONFIGFILE downloadConfigFile Arguments filePath (O) The address of the TFTP server in which the configuration file exists. If not given, the default address is used.
4.8 UPLOADCONFIGFILE uploadConfigFile Arguments tftpAddr (M) filePath (M) The address of the TFTP server to which the configuration file is uploaded. The path and the file name of the configuration file. The specified file path should be on the TFTP root. Example: /uploads/config.
4.10 REMOVEFROMSCANLIST removeFromScanList Arguments frequency (M) The frequency to be removed Description Remove an element from the scan list. Examples removeFromScanList 3500 4.
4.12 REMOVEFROMPREFERREDNSPLIST removeFromPreferredNspList Arguments nspId (M) The NSP ID to be removed from the preferred to the preferred NSP list Description Removes an element to the preferred Network Service Provider (NSP) list. Examples removeFromPreferredNspList AA:BB:CC 4.
4.
4.
4.
4.
4.18 RESTOREFACTORYSETTINGS restoreFactorySettings Arguments None Description Triggers the factory reset. Examples restoreFactorySettings 4.19 DOWNLOADDEVICECERT downloadDeviceCert Arguments A descriptive name of which file to download. This name doesn’t match the name of the file on server.
4.20 UPLOADDEVICECERT uploadDeviceCert Arguments A descriptive name of which file to upload. This name doesn’t match the name of the file on server. It can take one of four values: name (M) rootCert: The CA certificate from which the device certificate is generated. deviceCert: The device certificate.
4.21 SHOWCURRENTNETWORKDEPLOYMENT showCurrentNetworkDeployment Arguments None Description Show the current network deployment topology working on CPE.
4.22 SETCURRENTNETWORKDEPLOYMENT setCurrentNetworkDeployment Arguments enableBridge (O) enableRouter (O) If true, activate bridge, else disable bridge. If not specified do nothing i.e if enabled leave it enabled. If true, activate router, else disable router. If not specified do nothing. enableDhcpClient (O) If true, activate DHCP client, else disable DHCP client.
4.23 CONFIGUREPPPOE ConfigurePPPoE Arguments mode (M) This parameter indicates whether PPP over Ethernet will be configured in client mode or proxy mode. Client: configure PPPoE client maxSessionsCount (O) authenticationMode (O) proxy: configure PPPoE proxy Maximum total number of PPPoE sessions allowed before incoming PPPoE packets are ignored.
4.24 CONFIGUREBRIDGE configureBridge Arguments broadcastIngressFiltering (O) Enable broadcast ingress filtering broadcastEgressFiltering (O) Enable broadcast egress filtering basicIngressFiltering (O) Description Configure Bridge on the CPE.
4.26 CONFIGUREVLAN configureVlan Arguments vlanName (M) The name of the VLAN. vlanId (M) The VLAN ID to use in the tags. Valid range is from 1 to 4094. netAddr (M) The vlan network address netMask(M) The vlan sub-net mask interface (O) The interface on which to configure VLAN support.
4.27 REMOVEVLANCONFIGURATION removeVlanConfiguration Arguments index(O) This parameter indicates the required index to be removed. Description Removes Vlan with specified index. If index is not specified the command will show all name of Vlans available with corresponding index.
CHAPTER F IVE: T YPICAL U SAGE SCENARIOS Network Deployment Setups as follow: 5.
5.2 ROUTER SETUP Figure 8: Router Setup 5.3 DHCP SERVER SETUP Figure 9: CPE with DHCP server setup The CPE can be acting in either Bridge or Router modes and will be able to offer DHCP leases to hosts on the Ethernet side such as User1 user 2.
GLOSSARY This section defines or identifies technical terms, abbreviations, and acronyms used throughout this document. 100BASE-TX IEEE 802.3u specification for 100 Mbps Fast Ethernet over two airs of Category 5 or better UTP cable. 10BASE-T IEEE 802.3 specification for 10 Mbps Ethernet over two pairs of Category 3 or better UTP cable.
CS Convergence Sublayer CSN Connectivity Service Network Demilitarized Zone A virtual zone in the router that is not protected by The Router's firewall. (DMZ) One computer can be placed in the DMZ. Domain Name System A system used for translating host names for network nodes into IP (DNS) addresses.
Protocol (EAP) An authentication protocol used to authenticate network clients. EAP is combined with IEEE 802.1X port authentication and a RADIUS authentication server to provide “mutual authentication” between a client, the access point, and the a RADIUS server File Transfer Protocol File Transfer Protocol: A TCP/IP protocol used for file transfer.
Local Area Network A LAN is a group of computers and devices connected together in a (LAN) relatively small area (such as a house or an office). A home network is considered a LAN. MAC Media Access Control: The lower of the two sub-layers of the data link layer defined by the IEEE.
PPPoE Point-to-Point Protocol over Ethernet. Point-to-Point Protocol is a method of secure data transmission originally created for dial-up connections; PPPoE is for Ethernet connections. PPTP Point-to-Point Tunneling Protocol.
layer protocol. TCP is connection-oriented and stream-oriented, and provides for reliable communication over packet-switched networks. TCP / IP Transmission Control Protocol over Internet Protocol. This is the standard protocol for data transmission over the Internet.
RF exposure warning This equipment must be installed and operated in accordance with provided instructions and the antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter.