User Manual OX-250 WiMAX Outdoor CPE Version 0.5 Nov. 8 , 2010 This Document may be subject to change, please contact with us for the latest version.
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
History Revision Date of Issue Scope Author 0.1 2010-10-14 First draft IChia Lin. 0.2 2010-10-18 Add specification IChia Lin Change min.30cm distance to 35cm,add install and ground guide IChia Lin 0.3 2010/1 0/26 0.4 2010/11/4 Update figure 70 IChia Lin 0.5 2010/11/8 Change min.
Table of Contents History ...................................................................................................................................... 3 Table of Contents..................................................................................................................... 4 List of Figures .......................................................................................................................... 6 List of Tables.........................................................
Frequency Settings............................................................................. 67 4.1.2. 4.1.3. Authentication Settings ..................................................................... 69 4.2. Connect............................................................................................................. 72 4.3. Wide Scan......................................................................................................... 73 4.4. Link Status......................................
List of Figures Figure 1 Login page....................................................................................................... 12 Figure 2 Logout.............................................................................................................. 12 Figure 3 Status window ................................................................................................. 13 Figure 4 Device status........................................................................................
Figure 25 Advanced>Route>Static Route>Add ............................................................ 41 Figure 26 Advanced>Route>RIP .................................................................................... 43 Figure 27 Advanced UPnP .............................................................................................. 46 Figure 28 Advanced>IGMP Proxy .................................................................................. 47 Figure 29 VPN>PPTP>Server.................
Figure 52 Administration>Remote Control>SNMP....................................................... 81 Figure 53 Administration>Remote Control>TR-069 ..................................................... 82 Figure 54 Administration>Remote Control>OMA-DM.................................................. 84 Figure 55 Administrator>Password ............................................................................... 86 Figure 56 System>Date/Time>Date.................................................
List of Tables Table 1 Button definition shown on Setup Wizard ................................................... 15 Table 2 Field definition for Network>LAN>IP ............................................................ 21 Table 3 Field definition for Network>LAN>DHCP ..................................................... 23 Table 4 Field definition for Network>WAN>WAN ...................................................... 26 Table 5 Field definition for Network>WAN>DNS...........................
Table 27 Field definition for Administration>Remote Control>Telnet ...................... 79 Table 28 Field definition for Administration>Remote Control>SSH ......................... 80 Table 29 Field definition for Administration>Remote Control>SNMP ...................... 81 Table 30 Field definition for Administration>Remote Control>TR-069..................... 83 Table 31 Field definition for Administration>Remote Control>OMA-DM .................
1. Introduction The WiMAX Outdoor CPE Software platform comes with a Web-based Configuration Manager, which gives users the ability to manage, configure and analyze the platforms environment. The Connection Manager works with all versions of Windows after Windows 95. The supported browser version: Internet Explorer 6.0 or later (Recommended) Netscape 7.1 and higher Firefox 1.0 and higher Mozilla 1.5 and higher 1.1. Connect Users need to connect to the WiMAX Outdoor CPE platform.
Figure 1 Login page 1.2. Logout The “Log out” wind ow allows users to disconnect from the d evice and exit the W eb-based Configuration Manager.
1.3. Status After user has established a connection, user will see the “Status” window. This window shows all the st atus and system information. It gives us er an initial overview of the current st atus of the device. Figure 3 Status window 1.4. Device Status The “Device status” wi ndow displ ays firmwa re versi on informatio n of the WiMAX Out door CPE.
Figure 4 Device status 14
1.5. Setup Wizard The setup wizard will allow user to quickly configure the basic networking settings on the CPE. Click the “Setup Wizard” menu item to enter the wizard. The first page will display all the steps necessary to complete the wizard settings as shown in Figure 5. Later, click the “Next” button to continue the next steps. The definition of each button shown on web page is defined in the Table 1.
Step 1: LAN Settings. In this step user can configure both IP and DHCP configuration parameters as shown in Figure 6.
Step2: WiMAX Frequency Settings. This step will qui ckly configure the WiMAX frequencies. There are two types of configuring the frequencies. User can configure it through simply entering a frequ ency in the frequen cy list as shown in Fig ure 7 or by gi ving a st arting and ending frequency value and a step size to traverse the range as shown in Figure 8.
Step 3: WiMAX Authen tication Settings. Thi s will config ure WiMAX Auth entication settings. The re a re 4 possible options for “Aut hentication Mode” as No authentication, User authentication, Device au thentication, and Us er an d device aut hentication. Dep ending o n which mode user selects, and it will appear different EAP settings for configuration. Except “No authentication” is selected, user needs to define the EAP supplicant as shown in Figure 9.
Figure 10 Wizard Save 19
2. Network Refer to Figure 101, for proper network connection. Figure 11 Network Topology 2.1. LAN 2.1.1. IP From the “Network>LAN>IP” window, user can update the LAN information as shown in Figure 12. The definition for each field is shown on Table 2.
Name Description IP Address IP address of the WiMAX outdoor CPE IP Subnet Mask Subnet Mask of the WiMAX outdoor CPE Save Cancel Commits the chan ges m ade, and set the LAN IP information , some services will be reloaded. Reset the fields to the last saved values Table 2 Field definition for Network>LAN>IP 2.1.2. DHCP Use the “Net work>LAN>DHCP” t ab to configure the DHCP serve r inform ation.
Figure 13 Network>LAN>DHCP 22
Name Description If the enable box is ch ecked for D HCP server, the DHCP server Enable will assig n IP addre ss to it s clie nt with the sp ecified IP addre ss range. Start IP Starting IP address range End IP Ending IP address range The lea se time is a cont rolled time p eriod, allo wing the DHCP Lease Time server to reclaim (and then reallocate) IP addresses that are not renewed (dynamic re -use of IP ad dresses). Le ase tim e i s measured in minutes in the Configuration Manager.
WiMAX outdoor CPE. 2.2.1. WAN In Figure 14, it demonstrates ho w to co nfigure WAN IP on CPE web p age. The definition for each field is shown on Table 4.
Name Description Select the WAN operation mode Operation Mode Bridge Routin NA g T Select the WAN encapsulation protocol WAN Protocol Ethernet PPPoE Enter the IP method Get IP Method From Us ISP er The time the DHCP client waits to re ceive the IP address from the BS. If it doesn’t get the IP , it will timeout and the CPE will WAN IP Request Timeout disconnect the WiMAX conne ction. T he default value is 12 0 seconds.
Encryption Scheme No Encryption MPPE 40 bits: 40-bit encryption with MPPE MPPE 128 bits: 128-bit encryption with MPPE Auto: automatically selected Idle Timeout Disconnect if the link is idle for the assigned seconds AC Name The name of the access concentrator to connection to Commit the changes ma de and save to WiMAX ou tdoor CPE, Save after clicking the Save button user will get a message aski ng if user want s t o reb oot the CPE.
Name Description Enter the WAN DNS information. First DNS Server User Defined From ISP If user sele cts “User Define”, u ser n eeds to ente r a valid IP address for the DNS server.
2.3. VLAN In Figure 16, it demonstrates how to configure VLAN setting on CPE web page. The definition for each field is shown on Table 6.
Name Description Management VLAN VLAN ID Setting the management VLAN ID Priority Setting the management Priority Port Settings PVID Group Select the VLAN group as the PVID Priority Setting the port priority VLAN Rule VID Setting the VID of this group Join Add this port into this group Tag Mark the out-going packets of this port i n this VLAN as tagged or untagged Save Commit the changes made and save to the CPE device Cancel Reset fields to the last saved values Table 6 Field definition
Figure 17 Network>DDNS 30
Name Description Enable Dynamic DNS Click the check box to enable dynamic DNS Service Provider Enter the URL of the Service Provider Enter the service type (DYNDNS only) Service Type* Dynami St c atic Cu stom Domain Name Enter the domain name Login Name Enter the username Password Enter the password Select the Policy to be used IP Update Policy Auto WA N IP User User Defined IP Detect Defined If user sele cts “User Defined” as the IP policy, user has to ente r the IP addre
3. Advanced Setting The “Advanced Settings” window will allow user to set rules for incoming and outgoing traffic. 3.1. NAT Network Add ress Translation (NA T) i s the process of modif ying the net work address information o f the host in a p acket whil e in transit, so that it ca n be rem apped to a given address space in another network. For example, the source address of a packet in a network is changed to a different IP address known within another network. 3.1.1.
Figure 18 Advanced>NAT>Port Forward Name Description Activate Check the box to activate the “Port Forward” rule Name Name of the Port Forward rule User ne eds to define the desired Protocol protocol for rul e. A vailable options are: TCP, UDP, or TCP/UDP User nee ds to define inco ming port ra nge for Port Forwardin g Incoming Port(s) rule. User needs to define to which port range will be translated for Port Forward Port(s) Forwarding rule.
3.1.2. Port Trigger The “Advanced>NAT>Port Trigger” tab allows user to configure Port Trigger rules. Port Trigger is a way to automate port forwarding in which outbound traffic on predetermined ports (‘trigger port’) causes inboun d traf fic to spe cific incomi ng po rts to be dyn amically forwarde d to the initiating host, while the outbound ports are in use.
Name Description Activate Check the box to activate the Port Trigger rule Name Name of the Port Trigger rule It defines which protocol the outgoing packet used will trigger th e Protocol rule. Available options are TCP, UDP or TCP/UDP It defines which port range the outgoing packet will trigger the rule. Trigger Port(s) User needs to enter the starting and ending port range It defines wh ich protocol will be open Open Protocol ed if the rule had bee n triggered.
3.1.3. DMZ DMZ stands for Demilitarized Zone. It is a phy sical or logi cal sub-network that contains and exposes an organization's external services to a larger un-trusted network, usually the Internet. The term is normally referred to as a DMZ by IT professionals. It is sometimes referred to as a Perimeter Ne twork.
3.1.4. ALG There a re th ree AL Gs th at use r can enable from “Advanced>NAT>ALG” t ab. ALG allo ws legitimate ap plication traf fic to p ass throu gh the WiMAX out door CPE that would have otherwise re stricted. Wit hout ALG s, some application may n ot work well beca use of NAT/firewall settings. User could click on the check box to enable ALGs. Note: If user is using any of these types of application protocols user needs to enable them in the ALG settings. FTP ALG H.
3.2. Firewall In networking, firewalls a re used to blo ck un-wanted traffic or prevent fr om DDOS att acks. It will prevent unauthorized devices to enter a trusted network. 3.2.1. IP Filter The IP filter rules will drop or discard traffic that the filter criteria. User can define IP filter rules as shown in Figure 22. The definition for each field is shown on Table 10.
Name Description Add Click the "Add" button to create a new IP Filter rule OK Click the "OK" button will exit the table edit mode Active Check the box to activate the IP Filter rule Source IP Source IP to filter on. It can be in one of the following formats: IP address (ex. 192.168.0.222) Subnet (ex. 192.168.1.0/24) IP range (ex. 192.168.0.150~192.168.0.160) 0.0.0.0/0 means any Source Port Source Port to filter on. It can be one of the following formats: Port number (ex. 8080) Port Range (ex.
3.2.2. DOS Before taking about the DDOS service, it will introduce DDOS Attack first. DDOS attack stands for denial-of-service attack (DoS attack) or distributed denial-of-service attack. It is an attempt to make a computer resource unavailable to its intended users. One common method of attack involves saturating the targeted machine with extern al communications requests, such that it cannot re spond to legitim ate traf fic, or res ponds so slo wly as to be ren dered ef fectively unavailable.
3.3. Route A route is a path in a network, which can direct the flow of network traffic. 3.3.1. Static Route The static route is a ha rd coded p ath i n the router that sp ecifies how it will get to a cert ain subnet by using a defined path. User could manually add routes to routing table as shown in Figure 24 and Figure 25. The definition for each field is shown on Table 12.
Name Description Destination IP Enter the Destination IP address user would like to reach Subnet Mask Enter the subnet mask. Select where the next hop will be.
3.3.2. RIP The Ro uting Information Protocol (RI P) is a dy namic ro uting protocol u sed in local a rea networks. It allows a router to exchan ge ro uting inf ormation with other route rs. User could setup the RIP routing rul e as shown i n Figure 26. The definitio n for each fiel d is sho wn on Table 13.
Name Description General Setup | Enable Clicking the enable check box will activate the RIP routing rule Click the “Edit” button to activate the st atic ro ute or chan ge the Redistribute Edit metric value.
Name Description If user select s RIP-2B or RIP-2M for V ersion, user will get the following Authentication options. Authentication Non Te e xt MD5 Authentication ID If user sele cts “MD5” for Authentication type, user can ente r the authentication ID and Key If user enters “text” for Authentication Key Authentication, user ca n enter a text authentication key. If user enters “MD5” for Authenti cation type, user also needs to enter an Authentication ID and Key.
3.4. UPnP Two methods of simplifying the process of connecting a device to the network are available as shown in Figure 27. UPnP allows devices to connect seamlessly to networks in the home (data sharing, communications, and e ntertainment) a nd in co rporate e nvironments for sim plified installation o f compute r components.
3.5. IGMP Proxy IGMP proxy enabl es the system to issue IGMP ho st message s on beh alf of host s that th e system discovered through standard IGMP interface. The system acts as a proxy for its hosts. 3.5.1. IGMP Proxy Setting Internet Gro up Mana gement Protocol (IGMP) proxy can be used to imple ment multica st routing. It works by IGMP frame forwarding, and commonly is used when the re is no need to use more advanced protocol, for exam ple PIM.
3.5.2. VPN Setting VPN (Virtual Private Network) is a network that is implemented in an additional software layer on top of an existing larger network for the purpose of providing a secure extension of a private network into an insecure network such as the Internet. The links between nodes of a VPN are formed over logical connections or virtual circuits between hosts of the larger network. VPNs are often installed by organizations to provide remote access to a secure organizational network.
Figure 29 VPN>PPTP>Server 49
Name Description PPTP Server Enable Activate PPTP server. Server Name Offer a service name Require the peer to auth enticate itself before allowing netwo rk packets to be sent or received.
Table 16 Field definition for VPN>PPTP>Server 3.6.2. PPTP Client User could setup PPTP Client as sh own in Fi gure 30 and Figu re 31. The definition for each field of PPTP Client is shown on Table 17.
Name Description PPTP Client Add Add a new connection setting Edit Edit the existed connection setting Edit PPTP Client Profile Name The name for this connection setting The Authe ntication protocol of t he p eer requi red. Select which Authentication protocol to use.
3.6.3. L2TP In com puter networking, L ayer 2 Tunneling Prot ocol (L2TP) is a tunneli ng p rotocol used to support virtual private networks (VPNs). It does not provide any encryption or confidentiality by itself. It relies on an encryption protocol that it passes within the tunnel to provide privacy. The entire L2TP packet, including payload and L2TP header, is sent within a UDP datagram. It is common to carry Point-to-Point Protocol (PPP) session within an L2TP tunnel.
Figure 32 VPN>L2TP>Server 54
Name Description L2TP Server Enable Check the check box to activate L2TP server. Server Name Enter a service name Support Protocol The supported protocol of L2TP messages Version ALL: L2TPv2 and L2TPv3 2: L2TPv2 only 3: L2TPv3 only Require the peer to auth enticate itself before allowing netwo rk packets to b e se nt or received.
Name Description Connection List User Name The user name of the connection Remote IP Address The peer address of the connection PPTP IP Address The assigned IP address of L2TP Login Time The time of the connection created Link Time(s) Elapsed time connected Save Commit the changes made and save to WiMAX outdoor CPE Cancel Reset fields to the last saved values Table 18 Field definition for VPN>L2TP>Server 56
3.6.5. L2TP Client User could setup PPTP Client as sh own in Fi gure 33 and Figu re 34. The definition for each field of PPTP Client is shown on Table 19.
Name Description L2TP Client Add Add a new connection setting Edit Edit the existed connection setting Edit L2TP Client Profile Name The name of this connection setting The me ssage of L2TP p rotocol versi on for thi s connection L2TP Protocol Version setting 2 3 Enable or disable NAT when connected to PPTP server NAT Mode Y es: enable No: disable The Authentication Protocol of the peer required. Select which Authentication protocol to use.
3.7. IPSec Internet Protocol Security (IPsec) is a n end- to-end secu rity solu tion and operated at the IP Layer. It provides secure communication between pairs of hosts, pairs of security gateways or between security gateways and a host. It’s based on a suite of protocols for securing IP traffic by authenticating and encrypting each IP packet of the data stream. 3.7.1.
Figure 36 VPN>IPsec>Add 60
Name Description Add Click the "Add" button to add an IPsec connection rule Property Enable Enable IPsec connection.
Name Description Press the A dd button to enter an Encryption a nd Authentication algorithm Cli ck th e tra sh t o rem ove the sele cted algorithm. En cryption Algorithm: DES 3DES Proposal Add AES128 AES192 AES256 Authentication Algorithm: MD5 SHA-1 Proposal OK Click the OK button to exit the table edit mode Key Group The DH group used to negotiate the IKE/ISAKMP SA.
Name Description Start IP Address The only IP address allowed in the subnet Subnet Mask The netmask of the subnet (Subnet address) Restrict the traffic selector to a single protocol and/or port. Remote Port Any: No restriction ICMP: Restrict the traffic selector to ICMP protocol. TCP: Restrict the traffic selector to TCP protocol. If the port number is 0, all TCP port numbers are accepted. UDP: Re strict t he t raffic selector to UDP protoco l.
4. WiMAX This technolo gy is based on the IEEE 802.16 st andard, ena bling the delivery of last mile wireless broadband access. Figure 37 Wireless Broadband Access 4.1. Profile In the profile tab, the user can set WiMAX standard settings, which include how to establish a connection, frequency information and how to authenticate.
4.1.1.
Name Description Connect Options Settings Auto Reconnect Indicate th e interval in second to “a uto re connect”. 0 mean s disabled. Use CINR or RSSI as the crite rion of “Auto Connect Mode”. Note Auto Reconnect Mode that “Auto Connect Mode” refer to following “Auto Connect Mode” in “Connect Mode”. NDS Mode Enable NDS mode or not.
Search Click on the search button to search for available BSID's Select a connect mode. Auto Connect Mode: It will connect to o ne of the BSI D's in the list, indiscriminately Connect Mode Network Search Mo de: User ne eds to select one of the BSID's from the list, it wi ll us e that BSID to conn ect to WiMAX after device is reboot.
Figure 40 WiMAX>Profile>Frequency Settings>By Range 68
Name Description There are two display types user can select. User can choose to display the data by List. If user selects "By List", user also has the option to add more frequencies. Setting Type "By Range" will display the freq uency by rang e a nd the incremental value. See Figure "Frequency By Range" for more detail. Joint Wide Scan Result Yes me ans to app end wide sca n resu lt to the freq uency setting . Only valid when setting type is “By List”.
Figure 42 WiMAX>ProfiIe>Authenticaton Settings (User Authentication) 70
Name Description Authentication Authentication Mode Data Encryption AES-CCM Data Encryption AES-CBC The method used in authentication. Enable MS’ s cap ability of encryptin g/decrypting traf fic by AES-CCM. Enable MS' s ca pability of encry pting/decrypting traf fic by AES-CBC. Key Encryption AES-key wrap Enable MS's capability of decrypting TEK by AES-Key wrap. Key Encryption AES-ECB Enable MS's capability of decrypting TEK by AES-ECB.
Save Commit the changes made and save to CPE Cancel Reset fields to the last saved values Table 23 Field definition for WiMAX>ProfiIe>Authentication Settings 4.2.
Name Description Disconnect Click the disconnect button to terminate the connection Connect Click the connect button to connect to a BSID Select a connect mode. Auto Connect Mode: It will connect to o ne of the BSI D's in the list indiscriminately Connect Mode Network Search Mo de: User ne eds to select one of the BSID's from the list, it wi ll us e that BSID to conn ect to WiMAX after device is reboot.
Name Description Auto Wide Scan Select “Yes” to do “wide scan” automatically when there are no available BS. Wide Scan Range Add/Ok User can specify the wide scan range to reduce search time Wide Scan Result Search Show the result of wide scan. Search button can trigger wide scan Clear Clear button clear current search result Save/Cancel Save/Can cel current setting Table 25 Field definition for WiMAX>Wide Scan 4.4.
4.5. Link Statistics Wimax>Link Statistics The“Link Statistics”menu item will display statistical information in the WiMAX link.
4.6. Connection Info The connection info window will show the connection ID and its connection type. Figure 47 WiMAX Connection Info 4.7. Service Flow The WiMAX service flow window will show the status and direction of each service flow ID.
5. Administrator 5.1. Remote Control Remote access is the ability to get access to WiMAX outdoor CPE from a remote computer or network. WiMAX outdoor CPE supports five different types of remote access protocols. HTTP allows user to set the port and configure both HTTP and HTTPS protocols. Telnet typically provides access to a command-line interface on a remote machine.
5.1.1. HTTP Figure 49 Administration>Remote Control>HTTP Name Description HTTP Server Enable Check the box to allow http connections. Port Number Enter the http port number (default is port 80) HTTPS Server Enable Check the box to allow https connections. Port Number Enter the https port number (default is port 443) HTTP and HTTPS Allow Connection from WAN Check the check-box to allow connections from WAN. Save Commit the changes made and save to WiMAX outdoor CPE.
5.1.2. TELNET Figure 50 Administration>Remote Control>Telnet Name Description Enable Check the box to allow Telnet connections. Port Number Enter the Telent port number (default is port 23) Allow Connection from WAN Check the check-box to allow connections from WAN. Commit the changes ma de and save to WiMAX outdoo r Save CPE. Cancel Reset fields to the last saved values.
5.1.3. SSH Figure 51 Administration>Remote Control>SSH Name Description Enable Check the box to allow SSH connections. Port Number Enter the SSH port (default is port 22) Allow Connection from WAN Check the check-box to allow connections from WAN. Commit the changes ma de and save to WiMAX outdoo r Save CPE. Cancel Reset fields to the last saved values.
5.1.4. SNMP Figure 52 Administration>Remote Control>SNMP Name Description Checking the enable button will allow SNMP applications to query Enable and set some of the SNMP variables. Location Enter the Location SNMP string variable. Contact Enter the Contact SNMP string variable. Read Community Enter Read community string to query SNMP data. Write Community Enter Write community string to query SNMP variables.
5.1.5. TR-069 Using TR-069 the terminals can communicate with the Auto Configuration Servers (ACS) and establish the configuration automatically. It’s the current standard for activation of terminals in the DSL broadband market.
Name Description To ena ble or disabl e the TR- 069 a ctivity on the WiMAX outdoo r Enable CPE. ACS Server URL The ACS URL for the WiMAX outdoor CPE to connect to. The usernam e for the Wi MAX outdoor CPE when connected to ACS Username ACS. The pa ssword for the Wi MAX outdoor CPE when connected to ACS Password ACS. Periodical Inform Enable To enable or disable the periodical inform to ACS for the WiMAX outdoor CPE. Periodical Inform Interval The interval between two periodical inform.
5.1.6. OMA-DM Using OMA DM the termi nals can communicate with the OMA DM Server a nd establish the configuration automatically. It’s the curre nt standard for activation of terminals in OMA (Open Mobile Alliance).
Name Description To enable or disable the OMA-DM activity of the WiMAX outdoor Enable CPE. Server URL The DM Server URL for the WiMAX outdoor CPE to connect to. Server Port The DM Server Port for the WiMAX outdoor CPE to connect to. Server Auth Type The DM Server authentication type. The Server ID for the WiMAX outdoor CPE when con Server ID nected to DM Server. Server Password Client Auth Type The Server passwo rd for the WiMAX outdoor CPE whe n connected to DM Server.
5.2. Password Note: The default usernames and passwords admin/admin and guest/guest. The user with administrative privileges (belonging to the “ad min” group) has access to all the features in the software. A user with “guest” privileges (belonging to the “guest” group)only has a subset of the features available to them. Note: There can only be one username in each of the groups (one to one relationship).
Name Description Change Password Select which grou p the u ser belongs t o that you would like to change the password for. Group admin, if the user is p art of the admin g roup, they have full access to tall the features. guest, if the user is part of the guest group, they have limited access to the features. Old Password Enter the old password. New Password Enter the new password. Retype Retype the new password.
6. System 6.1. Date and Time User can co nfigure the d ate and time on the device. The use r can ma nually configu re the system time, or ch oose to get the date and time fro m a time server . The “Sa ve” button will commit the configuration, and the “Cancel” button will clear the fields. The “Time Zone” tab will allow you to set the time zone and set the st arting and finish time for d aylight saving period. User can also enable or disable “Daylight Savings Time”.
6.1.1. Date Name Description If user selects the Manual option, then use need to enter the time Manual and date manually. New Time New time manually entered New Date New date manually entered Get From Time Server If user select s this option it will get th e local time from a time server automatically. Time Protocol Select the Time protocol Time Server Address Enter the address of the time server.
Name Description Time Zone Enter the time zone of for the location Enable Daylight Savings If user wants to ena ble Daylight Savi ngs Ti me, u ser needs to check the box. Start Date Enter the beginning date for Daylight Savings time End Date Enter the end date for Daylight Savings time. Save Commit the changes made and save to WiMAX outdoor CPE Cancel Reset fields to the last saved values Table 34 Field definition for System>Date/Time>Time Zone 6.2.
Name Description Enter the full path of the file you want to upgrad e. The "browse" Browse button will help user to find the file on the server. Upgrade It will start upgrading the file The status bar will display whic h segment it's processi ng and Status what percentage of the upgrade has been completed. Table 35 Field definition for System>Upgrade Firmware>Upgrade File 6.2.2.
6.3. Log The “Sy stem>Log” will di splay system log out put. The “Ref resh” button will clear the l og window and display the most current system log information. Figure 60 System Log 6.4. Backup/Restore The Backup/Restore tab will allow user to save and restore the configuration on the WiMAX outdoor CPE . User can a lso re set the WiM AX out door CPE to factory defa ults from the “Factory Defaults” tab. 6.4.1.
Figure 62 File Download Figure 63 Save File As 93
Name Description Click the "Backup" button o save the current configuration on the WiMAX outdoor CPE. After user clicks the "Backup" button "File Download" window will pop-up and prompt user to sav e the file. Backup In the "Save As" windo w, enter the na me and location, where user wishs to download the file to. Table 37 Field definition for System>Backup/Restore>Backup 6.4.2.
Name Description Enter the path of the configuration file user wants to restore. Click on the "Bro wse" button to help u File Restore ser to navig ate throu gh directories and search for the file. After user enters the complete file path, click the "File Re store" button. It will begin restoring the configuration from the file specified. Enter the configuration URL path user wants to restore from. After URL Restore entering the complete URL path, click the "URL Restore" button.
Figure 66 Restore to factory reset warning 96
7. Installing and grounding device Before installing the Outdoor CPE Device Before installing, it is important to comply with the precautions listed below. It must be install ed by qua lified ser vice personn el who ar e w ell-trained in the correct proce dures for handling an d installing the Avoid in stalling or working o n equ ipment in ad verse weather conditions.
4. Tighten the screws to secure the Outdoor CPE Device tightly. It is not necessary to use Arm Bracket for pole-mounting. Arm Bracket is only used for wall-mounting. Screw (35mm) Screw (60mm) Lockwasher Split washer Split washer Flat washer Flat washer Bracket with Tab Nut Bracket W/L Tab Nut Figure 68 Pole-Mount the Outdoor CPE Device Wall-Mounting the Outdoor CPE Device In the following steps, it introduces how to wall-mounting the Outdoor CPE Device. 1.
Copper Cable Lug Grounding Screw Ground Wire to Earth Figure 70 Connect the ground wire 99
Specification Physical Standard General Standard Description XS-618-25MM PoE Standard- IEEE802.3af Compliant ● Wireless Standard - IEEE802.
VPN PPTP Server /Client, L2TP Server /Client VPN Pass Through-IPSec, PPTP, and L2TP ● Authentication User /Device Authentication ● Security AES-CCM /CBC /ECB /Key Wrap PKM v2, EAP TLS /TTLS / MSCHAPv2 /MS-CHAP /CHAP /MD5 /PAP X.