all | frequencies |
|
|
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|---|---|
manuals | photos | label |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 |
|
UM | Users Manual | 2.74 MiB | / April 11 2011 | |||
1 |
|
User manual rev1 | Users Manual | 2.80 MiB | June 10 2011 / April 11 2011 | |||
1 |
|
Internal photo | Internal Photos | 673.29 KiB | June 10 2011 / April 11 2011 | |||
1 |
|
External photo | External Photos | 537.98 KiB | June 10 2011 / April 11 2011 | |||
1 |
|
Label sample & location | ID Label/Location Info | 116.19 KiB | June 10 2011 / April 11 2011 | |||
1 |
|
Confidentiality request | Cover Letter(s) | 77.59 KiB | June 10 2011 / April 11 2011 | |||
1 |
|
DL & UL declaration | Attestation Statements | 260.61 KiB | June 10 2011 / April 11 2011 | |||
1 | RF Exposure Info | June 10 2011 / April 11 2011 | ||||||
1 |
|
Power of Attorney Letter | Cover Letter(s) | 70.84 KiB | June 10 2011 / April 11 2011 | |||
1 | Test Report | June 10 2011 / April 11 2011 | ||||||
1 | Test Setup Photos | June 10 2011 / April 11 2011 | ||||||
1 |
|
Unrestricted protocal | Attestation Statements | 1.47 MiB | June 10 2011 / April 11 2011 | |||
1 |
|
declaration letter | Cover Letter(s) | 50.95 KiB | April 11 2011 |
1 | UM | Users Manual | 2.74 MiB | / April 11 2011 |
User Manual OX-350I WiMAX Outdoor CPE Version: 1.3 Date: Oct. 26, 2011 Page 1 of 91 OX-350I User Manual Rev1.3 Previous History Revision Date of Issue Scope 2011/08/31 2011/09/21 2011/10/04 2011/10/26 Initial document Add FCC Warning Wording Modify Important Notice content in page 4 Add a note for Max. Antenna Gain limitation in page 4 1.0 1.1 1.2 1.3 Author Alpha C. Tony Kao Tony Kao Tony Kao Page 2 of 91 OX-350I User Manual Rev1.3 Federal Communication Commission Interference Statement :
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
- Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
- Consult the dealer or an experienced radio/TV technician for help. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and
(2) this device must accept any interference received, including interference that may cause undesired operation. Page 3 of 91 OX-350I User Manual Rev1.3 FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 60cm between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. Due to the essential high output power natural of WiMAX device, use of this device with other transmitter at the same time may exceed the FCC RF exposure limit and such usage must be prohibited (unless such co-transmission has been approved by FCC in the future). IMPORTANT NOTE:
1. According to FCC regulation (FCC 05-56), in order for the device to safely operate in the 3.675~3.700 GHz range, the device shall be connected to a Base station which supports "listen mode" and can instruct this device accordingly. 2. The max. gain of antenna used in this product is limited to be under 17.04dBi. Page 4 of 91 OX-350I User Manual Rev1.3 Table of Contents Previous History ............................................................................................... 2 1. Introduction ............................................................................................. 16 1.1. Connect ........................................................................................ 16 1.2. Logout .......................................................................................... 17 2. Status ...................................................................................................... 18 2.1. WiMAX Status .............................................................................. 18 2.2. Network Status ............................................................................. 18 2.3. Device Status ............................................................................... 19 3. Personalization ....................................................................................... 20 3.1. Account ........................................................................................ 20 3.2. Date ............................................................................................. 21 3.2.1. Date ................................................................................... 22 3.2.2. Time Zone ......................................................................... 23 4. WiMAX .................................................................................................... 24 4.1. Scanner ........................................................................................ 24 4.2. Authentication .............................................................................. 26 4.3. Wide Scan .................................................................................... 29 5. Networking .............................................................................................. 31 5.1. Bridge/NAT mode ......................................................................... 31 Page 5 of 91 OX-350I User Manual Rev1.3 5.1.1. LAN ................................................................................... 31 5.1.2. WAN .................................................................................. 32 5.1.3. PPPoE ............................................................................... 34 5.1.4. GRE .................................................................................. 36 5.1.5. EtherIP .............................................................................. 37 5.1.6. VLAN ................................................................................. 37 5.1.7. QoS ................................................................................... 39 5.2. Firewall ......................................................................................... 40 5.2.1. HTTP ................................................................................. 40 5.2.2. TELNET ............................................................................ 41 5.2.3. SSH ................................................................................... 42 5.2.4. DMZ .................................................................................. 42 5.2.5. IP Filiter ............................................................................. 43 5.2.6. MAC Filiter......................................................................... 44 5.2.7. URL Filiter ......................................................................... 46 5.3. DHCP Server ............................................................................... 47 5.4. NAT ALG ...................................................................................... 50 5.5. Forwarding ................................................................................... 51 5.6. Trigger .......................................................................................... 52 5.7. DDNS ........................................................................................... 54 Page 6 of 91 OX-350I User Manual Rev1.3 5.8. UPnP ............................................................................................ 56 5.9. Ping .............................................................................................. 57 6. Management ........................................................................................... 58 6.1. TR-069 ......................................................................................... 58 6.2. OMA-DM ...................................................................................... 59 6.3. SNMP ........................................................................................... 61 6.4. Log ............................................................................................... 62 6.4.1. Log Setting ........................................................................ 62 6.4.2. Log Display ....................................................................... 63 6.5. Upgrade ....................................................................................... 64 6.5.1. Upgrade File ...................................................................... 64 6.5.2. Upgrade Link ..................................................................... 65 6.5.3. CWMP Upgrade ................................................................ 66 6.6. Recovery ...................................................................................... 66 6.6.1. Backup .............................................................................. 67 6.6.2. Restore .............................................................................. 69 6.6.3. Factory Defaults ................................................................ 70 7. VPN ........................................................................................................ 71 7.1. PPTP ............................................................................................ 71 7.1.1. PPTP Server ..................................................................... 71 Page 7 of 91 OX-350I User Manual Rev1.3 7.1.2. PPTP Client ....................................................................... 74 7.2. L2TP ............................................................................................ 75 7.2.1. L2TP Server ...................................................................... 76 7.2.2. L2TP Client ........................................................................ 79 7.3. IPsec ............................................................................................ 81 8. Quick Installation Guide ........................................... !
Page 8 of 91 OX-350I User Manual Rev1.3 List of Figures Figure 1 Login ............................................................................................ 17 Figure 2 Logout ......................................................................................... 17 Figure 3 Status>WiMAX Status .................................................................. 18 Figure 4 Status>Network Status ................................................................ 19 Figure 5 Status>Device Status................................................................... 19 Figure 6 Personalization>Account ............................................................. 20 Figure 7 Personalization>Date>Date ......................................................... 22 Figure 8 Personalization>Date>Time Zone ............................................... 23 Figure 9 Wireless Broadband Access ........................................................ 24 Figure 10 WiMAX>Scanner ..................................................................... 25 Figure 11 WiMAX>Authentication(No authentication) .............................. 26 Figure 12 WiMAX>Authentication(User authentication) ........................... 28 Figure 13 WiMAX>Wide Scan.................................................................. 30 Figure 14 Network Topology .................................................................... 31 Figure 15 Networking>Bridge/NAT mode>LAN ........................................ 31 Figure 16 Networking>Bridge/NAT mode>WAN ...................................... 32 Figure 17 Networking>Bridge/NAT mode>PPPoE ................................... 35 Figure 18 Networking>Bridge/NAT mode>GRE ....................................... 36 Figure 19 Networking>Bridge/NAT mode>EtherIP ................................... 37 Page 9 of 91 OX-350I User Manual Rev1.3 Figure 20 Networking>Bridge/NAT mode>VLAN ..................................... 38 Figure 21 Networking>Bridge/NAT mode>QoS........................................ 39 Figure 22 Networking>Firewall>HTTP ..................................................... 40 Figure 23 Networking>Firewall>TELNET ................................................. 41 Figure 24 Networking>Firewall>SSH ....................................................... 42 Figure 25 Networking>Firewall>DMZ ....................................................... 43 Figure 26 Networking>Firewall>IP Filter .................................................. 43 Figure 27 Networking>Firewall>MAC Filter .............................................. 45 Figure 28 Networking>Firewall>URL Filter .............................................. 46 Figure 29 Networking>DHCP Server ....................................................... 48 Figure 30 Networking>NAT ALG .............................................................. 50 Figure 31 Networking>Forwarding ........................................................... 51 Figure 32 Networking>Forwarding>Wizard .............................................. 51 Figure 33 Networking>Trigger .................................................................. 53 Figure 34 Networking>Trigger>Wizard .................................................... 53 Figure 35 Networking>DDNS ................................................................... 55 Figure 36 Networking>UPnP ................................................................... 56 Figure 37 Networking>Ping ...................................................................... 57 Figure 38 Management>TR-069 .............................................................. 58 Figure 39 Management>OMA-DM ........................................................... 60 Page 10 of 91 OX-350I User Manual Rev1.3 Figure 40 Management>SNMP................................................................ 61 Figure 41 Management>Log>Log Setting ................................................ 62 Figure 42 Management>Log>Log Display ............................................... 63 Figure 43 Management>Upgrade>Upgrade File ...................................... 64 Figure 44 Management>Upgrade>Upgrade Link ..................................... 65 Figure 45 Management>Upgrade>CWMP Upgrade ................................ 66 Figure 46 Management>Recovery>Backup ............................................. 67 Figure 47 File Download .......................................................................... 67 Figure 48 Save File As ............................................................................. 68 Figure 49 Management>Recovery>Restore ............................................ 69 Figure 50 Management>Recovery>Factory Defaults ............................... 70 Figure 51 Restore to factory reset warning .............................................. 70 Figure 52 VPN>PPTP>PPTP Server ....................................................... 72 Figure 53 VPN>PPTP>PPTP Client ......................................................... 74 Figure 54 VPN>PPTP>PPTP Client>Add ................................................ 74 Figure 55 VPN>L2TP>L2TP Server ......................................................... 77 Figure 56 VPN>L2TP>L2TP Client .......................................................... 79 Figure 57 VPN>L2TP>L2TP Client>Add .................................................. 80 Figure 58 VPN>IPsec Overview............................................................... 81 Figure 59 VPN>IPsec>Add ...................................................................... 83 Page 11 of 91 OX-350I User Manual Rev1.3 Figure 60 Mounting accessory list ................................................................. 87 Figure 61 Pole-Mount the Outdoor CPE Device ............................................ 89 Figure 62 Wall-Mount the Outdoor CPE Device ............................................ 90 Figure 63 Connect the ground wire ............................................................... 91 Page 12 of 91 OX-350I User Manual Rev1.3 List of Tables Table 1 Field definition for Personalization>Account ................................ 21 Table 2 Field definition for Personalization>Date>Date ........................... 23 Table 3 Field definition for Personalization>Date>Time Zone .................. 23 Table 4 Field definition for WiMAX>Scanner ............................................ 26 Table 5 Field definition for WiMAX>Authentication................................... 29 Table 6 Field definition for WiMAX>Wide Scan ........................................ 30 Table 7 Field definition for Networking>Bridge/NAT mode>LAN .............. 32 Table 8 Field definition for Networking>Bridge/NAT mode>WAN ............. 34 Table 9 Field definition for Networking>Bridge/NAT mode>PPPoE.......... 36 Table 10 Field definition for Networking>Bridge/NAT mode>GRE ............. 37 Table 11 Field definition for Networking>Bridge/NAT mode>EtherIP ......... 37 Table 12 Field definition for Networking>Bridge/NAT mode>VLAN ............ 39 Table 13 Field definition for Networking>Bridge/NAT mode>QoS .............. 40 Table 14 Field definition for Networking>Firewall>HTTP ........................... 41 Table 15 Field definition for Networking>Firewall>TELNET ....................... 42 Table 16 Field definition for Networking>Firewall>SSH ............................. 42 Table 17 Field definition for Networking>Firewall>IP Filter ......................... 44 Table 18 Field definition for Networking>Firewall>MAC Filter .................... 45 Table 19 Field definition for Networking>Firewall>URL Filter ..................... 46 Page 13 of 91 OX-350I User Manual Rev1.3 Table 20 Field definition for Networking>DHCP Server .............................. 50 Table 21 Field definition for Networking>Forwarding ................................. 52 Table 22 Field definition for Networking>Trigger ........................................ 54 Table 23 Field definition for Networking>DDNS ......................................... 56 Table 24 Field definition for Networking>UPnP .......................................... 57 Table 25 Field definition for Networking>Ping ............................................ 57 Table 26 Field definition for Management>TR-069 .................................... 59 Table 27 Field definition for Management>OMA-DM ................................. 61 Table 28 Field definition for Management>SNMP ...................................... 62 Table 29 Field definition for Management>Log>Log Setting ...................... 63 Table 30 Field definition for Management>Upgrade>Upgrade File ............ 65 Table 31 Field definition for Management>Upgrade>Upgrade Link ........... 66 Table 32 Field definition for Management>Upgrade>CWMP Upgrade ...... 66 Table 33 Field definition for Management>Recovery>Backup ................... 68 Table 34 Field definition for Management>Recovery>Restore................... 69 Table 35 Field definition for VPN>PPTP>PPTP Server.............................. 74 Table 36 Field definition for VPN>PPTP>PPTP Client ............................... 75 Table 37 Field definition for VPN>L2TP>L2TP Server ............................... 79 Table 38 Field definition for VPN>L2TP>L2TP Client ................................ 81 Table 39 Field definition for VPN>IPsec>Add ............................................ 86 Page 14 of 91 OX-350I User Manual Rev1.3 Page 15 of 91 OX-350I User Manual Rev1.3 1. Introduction The CPE Software platform comes with a Web-based Configuration Manager, which gives users the ability to manage, configure and analyze the platforms environment. The Connection Manager works with all versions of Windows after Windows 95. The supported browser version:
Internet Explorer Ver 8.06001 or later (Recommended)
FireFox Ver.3.6.3 and higher
Google Chrome Ver.5.0.375.125 and higher
Opera Ver.9.64 and higher
Safari Ver.4.05 and higher 1.1. Connect Users need to connect to the CPE platform. Its assumed that the user has a fully working CPE platform and properly connected. From the web browser connect to the device, entering the IP address of the device; it will prompt user to enter the username and password. The default IP address, usernames and passwords are as follows. Default IP Address
192.168.0.254 Username/Password
admin/admin
guest/guest Page 16 of 91 OX-350I User Manual Rev1.3 Figure 1 Login 1.2. Logout The Logout window allows users to disconnect from the device and exit the Web-based Configuration Manager. Figure 2 Logout Page 17 of 91 OX-350I User Manual Rev1.3 2. Status After user has established a connection, user will see the Status window. It gives user an initial overview of the current status of the device. 2.1. WiMAX Status This window shows the information of system status, WiMAX link status and service flow status. Figure 3 Status>WiMAX Status 2.2. Network Status This window shows the information of WAN status and LAN status. Page 18 of 91 OX-350I User Manual Rev1.3 Figure 4 Status>Network Status 2.3. Device Status This window shows the information of device status. Figure 5 Status>Device Status Page 19 of 91 OX-350I User Manual Rev1.3 3. Personalization 3.1. Account Note: The default usernames and passwords are admin/admin and guest/guest. The user with administrative privileges (belonging to the admin group) has access to all the features in the software. A user with guest privileges (belonging to the guest group) only has a subset of the features available to them. Note: There can only be one username in each of the groups (one to one relationship). Figure 6 Personalization>Account Name Description Change Password Page 20 of 91 Group OX-350I User Manual Rev1.3 Select which group the user belongs to that user would like to change the password for.
admin, if the user is part of the admin group, they have full access to all the features.
guest, if the user is part of the guest group, they have limited access to the features. Old Password Enter the old password. New Password Enter the new password. Retype Save Cancel Change Username Group Retype the new password. Commit the changes made and save to CPE, it will only commit the change made to the password. Reset fields to the last saved values. Select which group the user belongs to that user would like to change the username for.
admin, if the user is part of the admin group, they have full access to the features.
guest, if the user is part of the guest group, they have limited access to the features. Old Username Enter the username user wants to change. New Username Enter the new username. Password change. If user enter an incorrect or different password Enter the original password, the password will not Save Cancel the change will not be committed Commit the changes made and save to CPE, it will only commit the change made to the username. Reset fields to the last saved values. Table 1 Field definition for Personalization>Account 3.2. Date User can configure the date and time on the device. The user can manually configure the system time, or choose to get the date and time from a time server. The Save button will commit the configuration, and the Cancel button will clear Page 21 of 91 OX-350I User Manual Rev1.3 the fields. The Time Zone tab will allow user to set the time zone and set the starting and finish time for daylight saving period. User can also enable or disable Daylight Savings Time. Note: If user doesnt configure the time on the CPE it will use the default system starting time which is set to 1970/1/1 00:00:00 Figure 7 Personalization>Date>Date 3.2.1. Date Name Description Time and Date Setup Manual New Time New Date If user selects the Manual option, then user needs to enter the time and date manually. New time manually entered New date manually entered Get From Time Server If user selects this option it will get the local time from a time server automatically. Time Protocol Select the Time protocol Page 22 of 91 OX-350I User Manual Rev1.3 Name Description Time Server Address Enter the address of the time server. Save Cancel Commit the changes made and save to CPE Reset fields to the last saved values Table 2 Field definition for Personalization>Date>Date 3.2.2. Time Zone Figure 8 Personalization>Date>Time Zone Name Description Time Zone Setup Time Zone Enter the time zone of for the location Enable Savings Start Date End Date Save Cancel Daylight If user wants to enable Daylight Savings Time, user needs to check the box. Enter the beginning date for Daylight Savings time Enter the end date for Daylight Savings time. Commit the changes made and save to CPE Reset fields to the last saved values Table 3 Field definition for Personalization>Date>Time Zone Page 23 of 91 OX-350I User Manual Rev1.3 4. WiMAX This technology is based on the IEEE 802.16 standard, enabling the delivery of last mile wireless broadband access. Figure 9 Wireless Broadband Access 4.1. Scanner The user can set WiMAX standard settings, which include how to establish a connection and get frequency information. The frequency list window will display all the configured frequencies and their bandwidth. To set additional frequencies, click on the Add button. Page 24 of 91 OX-350I User Manual Rev1.3 Figure 10 WiMAX>Scanner Name Description Start/Stop Wimax Start Stop Click the Start button to connect to a BSID Click the Stop button to terminate the connection Connect Type Settings Search Click the Search button to scan the frequency Joint Wide Scan Yes means to append wide scan result to the frequency Result setting. Default Bandwidth Select the default bandwidth to be used in Frequency List
5 MHz Page 25 of 91 OX-350I User Manual Rev1.3 Name Description
7 MHz
10 MHz Valid Band Info using the valid band range, the frequency setting will be Valid band information. If the frequencies arent located Add OK Save Cancel rejected. The "Add" button will allow user to enter more frequency lists Click the "OK" button to exit table edit mode Commit the changes made and save to CPE Reset fields to the last saved values Table 4 Field definition for WiMAX>Scanner 4.2. Authentication Figure 11 WiMAX>Authentication(No authentication) Page 26 of 91 OX-350I User Manual Rev1.3 Page 27 of 91 Figure 12 WiMAX>Authentication(User authentication) OX-350I User Manual Rev1.3 Name Authentication Description The method used in authentication.
No Authentication Authentication Mode
User Authentication
Device Authentication
User and Device Authentication Data Encryption AES-CCM Data Encryption AES-CBC Enable MSs capability of encrypting/decrypting traffic by AES-CCM. Enable MS's capability of encrypting/decrypting traffic by AES-CBC. Key Encryption AES-key Enable MS's capability of decrypting TEK by wrap AES-Key wrap. Key Encryption AES-ECB EAP Supplicant Enable MS's capability of decrypting TEK by AES-ECB. EAP Mode The EAP method used in authentication Anonymous ID The identity encoded in EAP Identity Response message. User needs to fill the Outer ID at this field. Server Root CA Cert. File The root CA's X.509 certificate. Server Root CA Cert. Info The root CA's certificate information. MTK-Authorized Device Cert. File MTK-Authorized Device Cert. Info Device Private Key The MS's X.509 certificate. The root MS's certificate information. The MS's private key file corresponding to the public key enhanced in x.509 certificate Device Private Key Info The MS's private key information. Device Private Key Password Inner Mode The key used to decrypt the MSs private key file The EAP-TTLS inner method Page 28 of 91 OX-350I User Manual Rev1.3 Description The user name used in EAP-TTLS inner method The password used in EAP-TTLS inner method. Name User name Password Options Enable Auth Mode Decoration in EAP Outer ID Enable Service Mode puts {am=i} in EAP outer ID i = 1: user authentication i = 2: device authentication i = 3: user & device authentication Decoration in EAP Outer puts {sm=1} in EAP outer ID ID Random Outer ID the user name in the EAP Identity Response Enable MS to generate 16-bytes random number as Ignore Cert Verification Same EAP Outer ID in ReAuth message. MS skips to verify the BS's certificate received in the EAP-TLS or EAP-TTLS procedure. Use the same EAP outer ID when doing re-auth MAC address in EAP-TLS Add MAC address in outer ID when EAP mode is outer ID EAP-TLS Delete existed Root Certificate file Remove the files loaded from UI Delete existed Device Delete device certificate file which was uploaded in Certificate file the field MTK-authorized Device Certificate Delete existed Private Key Save Cancel Delete device private key which was uploaded in the field Device Private Key Commit the changes made and save to CPE Reset fields to the last saved values Table 5 Field definition for WiMAX>Authentication 4.3. Wide Scan The Wide Scan function is used for scanning BS based on scanning rule. User Page 29 of 91 OX-350I User Manual Rev1.3 can set the scan rule with defining start, stop frequency, step, and channel bandwidth, and CPE will base on this rule to scan the BS as shown in Figure 13. The definition for each field is shown on Table 6. Figure 13 WiMAX>Wide Scan Name Description Wide Scan Settings Auto Wide Scan Scan Wide Range Add OK Select Yes to do wide scan automatically when there are no available BS User can specify the wide scan range to reduce search time Click the "Add" button to create a new wide scan range Click the "OK" button will exit the table edit mode Wide Scan Result Search Clear Show the result of wide scan. Search button can trigger wide scan Clear button clear current search result Save/Cancel Save/Cancel current setting Table 6 Field definition for WiMAX>Wide Scan Page 30 of 91 OX-350I User Manual Rev1.3 5. Networking Refer to Figure 14 for proper network connection. Figure 14 Network Topology 5.1. Bridge/NAT mode 5.1.1. LAN From the Networking>Bridge/NAT mode>LAN window, user can update the LAN information as shown in Figure 15. The definition for each field is shown on Table 7. Figure 15 Networking>Bridge/NAT mode>LAN Name LAN TCP/IP Description Page 31 of 91 OX-350I User Manual Rev1.3 Name Description IP Address IP address of CPE IP Subnet Mask Subnet Mask of CPE Save Cancel Commits the changes made, and set the LAN IP information, some services will be reloaded. Reset the fields to the last saved values Table 7 Field definition for Networking>Bridge/NAT mode>LAN 5.1.2. WAN In Figure 16, it demonstrates how to configure WAN settings on CPE web page. The definition for each field is shown on Table 8. Figure 16 Networking>Bridge/NAT mode>WAN Page 32 of 91 OX-350I User Manual Rev1.3 Name WAN IP Description Operation Mode NAT Type WAN Protocol Bridging LAN ARP Select the WAN operation mode
Bridge
Routing
NAT Select the NAT Type
Symmetric,
Full cone,
Restricted cone,
Port-Restricted cone, Select the WAN encapsulation protocol
Ethernet
PPPoE
GRE Tunnel
EtherIP Tunnel Allow Bridging LAN ARP
Yes
No Select the IP method Get IP Method
From ISP
User The time the DHCP client waits to receive the IP address from the BS. If it doesnt get the IP, it will WAN IP Request timeout and the CPE will disconnect the WiMAX Timeout connection. The default value is 120 seconds. If user enters 0, it will wait to receive the IP address infinitely until its stopped by the user. If user chooses Static for IP Method, user should enter the WAN IP address If user chooses Static for IP Method, user should enter the WAN IP subnet mask. If user chooses Static for IP Method, user should enter IP gateway address Enter the MTU WAN IP Address WIN IP Subnet Mask Gateway IP Address MTU Page 33 of 91 OX-350I User Manual Rev1.3 Name WAN DNS Description First DNS Server User can specify three DNS servers and select how the DNS Server is assigned. There are three options for assigning the DNS server. Second DNS Server
From ISP
User Defined Third DNS Server If user selects User Define, user needs to enter a valid Save IP address for the DNS server. Commit the changes made and save to CPE, after clicking the Save button user will get a message asking if user wants to reboot the CPE. Reboot is necessary for the device to switch to a different profile. Cancel Reset field to the last saved values Table 8 Field definition for Networking>Bridge/NAT mode>WAN 5.1.3. PPPoE In Figure 17, it demonstrates how to configure PPPoE on CPE web page. The definition for each field is shown on Table 9. Page 34 of 91 OX-350I User Manual Rev1.3 Figure 17 Networking>Bridge/NAT mode>PPPoE Name PPPoE User Name Description The user name to connect PPPoE server via the selected Auth Protocol Password The password of the corresponding username Retype Password Type the Password again The authentication protocol of the peer required. Select which Authentication protocol to use. Auth Protocol
PAP
CHAP
MSCHAPv1
MSCHAPv2 Encryption Scheme
No Encryption
MPPE 40 bits: 40-bit encryption with MPPE
MPPE 128 bits: 128-bit encryption with MPPE
Auto: automatically selected Page 35 of 91 Name Idle Timeout AC Name DNS Overwrite MPPE_Stateful OX-350I User Manual Rev1.3 Description Disconnect if the link is idle for the assigned seconds The name of the access concentrator to connection to
Yes
No
Yes
No Connection Trigger
Always On
Manual Connection Timeout Save Time to attempt to connect, if connection attempt fails after that time it will halt attempting to connect Commit the changes made and save to CPE, after clicking the Save button user will get a message asking if user wants to reboot the CPE. Reboot is necessary for the device to switch to a different profile. Cancel Reset field to the last saved values Table 9 Field definition for Networking>Bridge/NAT mode>PPPoE 5.1.4. GRE In Figure 18, it demonstrates how to configure GRE on CPE web page. The definition for each field is shown on Table 9. Figure 18 Networking>Bridge/NAT mode>GRE Name GRE Peer Description Peer IP Address Enter the IP address of its GRE Peer Page 36 of 91 OX-350I User Manual Rev1.3 Name Save Cancel Description Commit the changes made and save to CPE Reset fields to the last saved values Table 10 Field definition for Networking>Bridge/NAT mode>GRE 5.1.5. EtherIP In Figure 19, it demonstrates how to configure EtherIP on CPE web page. The definition for each field is shown on Table 9. Figure 19 Networking>Bridge/NAT mode>EtherIP Name Description EtherIP Tunnel Bridge Peer IP Address Enter the IP address of its EtherIP Peer Save Cancel Commit the changes made and save to CPE Reset fields to the last saved values Table 11 Field definition for Networking>Bridge/NAT mode>EtherIP 5.1.6. VLAN In Figure 20Figure 17, it demonstrates how to configure VLAN on CPE web page. The definition for each field is shown on Table 12. Page 37 of 91 OX-350I User Manual Rev1.3 Figure 20 Networking>Bridge/NAT mode>VLAN Name VLAN Utility Enable VLAN Port Settings Description Set the WAN mode to Bridge to allow VLAN to be enabled, otherwise it will be disabled. Enter the number of interfaces displayed per page, if there are more than can be the number given, then you Display per page can use the navigation buttons to go to the next page. Number of allowed display per page are as follows: 10, 20, 30, 50, 80, 100. Edit Mode To edit any of the editable fields you need to click on the field you want to edit, all the available editable field for Page 38 of 91 OX-350I User Manual Rev1.3 Name Description OK Click the OK button to exit edit mode. that entry will be available for editing. Filter Setting Display per page Same as Port Settings Display per page. Edit Mode field you want to edit, all the available editable fields for To edit any of the editable fields you need to click on the Add OK Save Cancel that entry will be available for editing. Click the Add button to add a new entry. Click the OK button to exit edit mode. Commit the changes made and save to CPE. Reset field to the last saved values Table 12 Field definition for Networking>Bridge/NAT mode>VLAN 5.1.7. QoS In Figure 21, it demonstrates how to configure QoS on CPE web page. The definition for each field is shown on Table 13. Figure 21 Networking>Bridge/NAT mode>QoS Name Description Port Settings exit edit mode by clicking the OK button. Priority levels Click on any of the fields to enable edit mode. User can allowed are from 1-6. Page 39 of 91 OX-350I User Manual Rev1.3 Name OK Save Cancel Description Exit the edit mode. Commit the changes made and save to CPE, Reset field to the last saved values Table 13 Field definition for Networking>Bridge/NAT mode>QoS 5.2. Firewall In networking, firewalls are used to block un-wanted traffic. It will prevent unauthorized devices to enter a trusted network. 5.2.1. HTTP Figure 22 Networking>Firewall>HTTP Name HTTP Server Enable Description Check the box to allow http connections. Port Number Enter the http port number (default is port 80) Page 40 of 91 OX-350I User Manual Rev1.3 Name HTTPS Server Enable Description Check the box to allow https connections. Port Number Enter the https port number (default is port 443) HTTP and HTTPS Allow Connection from WAN Save Cancel Check the check-box to allow connections from WAN. Commit the changes made and save to CPE. Reset fields to the last saved values. Table 14 Field definition for Networking>Firewall>HTTP 5.2.2. TELNET Figure 23 Networking>Firewall>TELNET Name TELNET Server Enable Port Number Description Check the box to allow Telnet connections. Enter the Telnet port number (default is port 23) Allow Connection from Check the check-box to allow connections from WAN WAN. Allow Connection from Check the check-box to allow connections from LAN Save Cancel LAN. Commit the changes made and save to CPE. Reset fields to the last saved values. Page 41 of 91 Table 15 Field definition for Networking>Firewall>TELNET OX-350I User Manual Rev1.3 5.2.3. SSH Figure 24 Networking>Firewall>SSH Name SSH Server Enable Port Number Description Check the box to allow SSH connections. Enter the SSH port (default is port 22) Allow Connection from Check the check-box to allow connections from WAN WAN. Allow Connection from Check the check-box to allow connections from LAN Save Cancel LAN. Commit the changes made and save to CPE. Reset fields to the last saved values. Table 16 Field definition for Networking>Firewall>SSH 5.2.4. DMZ DMZ stands for Demilitarized Zone. It is a physical or logical sub-network that contains and exposes an organization's external services to a larger un-trusted network, usually the Internet. The term is normally referred to as a DMZ by IT professionals. It is sometimes referred to as a Perimeter Network. The purpose of a DMZ is to add an additional layer of security to an organization's LAN; an Page 42 of 91 OX-350I User Manual Rev1.3 external attacker only has access to equipment in the DMZ, rather than any other part of the network. The Networking>Firewall>DMZ tab allows user to configure a DMZ host IP address as shown in Figure 25. In DMZ Settings, user needs to enter the IP address of the DMZ host. The Save button will save the changes to CPE and the Cancel button will reset the field to last saved value. It will disable DMZ host when entering 0.0.0.0. Figure 25 Networking>Firewall>DMZ 5.2.5. IP Filiter The IP filter rules will drop or discard traffic that fits the filter criteria. User can define IP filter rules as shown in Figure 26. The definition for each field is shown on Table 17. Figure 26 Networking>Firewall>IP Filter Name Description IP Filter Rules Page 43 of 91 OX-350I User Manual Rev1.3 Name Add OK Active Description Click the "Add" button to create a new IP Filter rule Click the "OK" button will exit the table edit mode Check the box to activate the IP Filter rule Source IP Source IP to filter on. It can be in one of the following formats:
IP address (ex. 192.168.0.222) Subnet (ex. 192.168.1.0/24) IP range (ex. 192.168.0.150~192.168.0.160) 0.0.0.0/0 means any Source Port Source Port to filter on. It can be one of the following formats:
Port number (ex. 8080) Port Range (ex. 1024~2048) Destination IP Destination IP to filter on. It can be in one of the following formats:
IP address (ex. 192.168.0.222) Subnet (ex. 192.168.1.0/24) IP range (ex. 192.168.0.150~192.168.0.160) 0.0.0.0/0 means any Destination Port Destination port to filter on. It can be one of the following formats:
Port number (ex. 8080) Port Range (ex. 1024~2048) Protocol to filter on Delete the IP Filter rule Commit the changes made and save to CPE Reset fields to the last saved values Table 17 Field definition for Networking>Firewall>IP Filter Protocol Trash Save Cancel 5.2.6. MAC Filiter The MAC filter rules will drop or discard traffic that the filter criteria. User can define MAC filter rules as shown in Figure 27. The definition for each field is Page 44 of 91 shown on Table 18. OX-350I User Manual Rev1.3 Figure 27 Networking>Firewall>MAC Filter Name MAC List Description Blacklist/Whitelist Blacklist or Whitelist MAC Filter Rules Active Enable/Disable this rule Source MAC Source MAC address of filter rule Destination MAC Destination MAC address of filter rule Day of the Week What day to activate the rule Start Time End Time Trash Add OK Save Cancel What time to start Rule Activated period Delete the MAC Filter rule Click the "Add" button to create a new MAC Filter rule Click the "OK" button will exit the table edit mode Commit the changes made and save to CPE Reset fields to the last saved values Table 18 Field definition for Networking>Firewall>MAC Filter Page 45 of 91 OX-350I User Manual Rev1.3 5.2.7. URL Filiter Content Filter is used to filter WWW traffic by URL. Currently, the white/black list is maintained by OpenDNS (http://www.opendns.com). If user wants to use this function, an OpenDNS account should be applied first. Figure 28 Networking>Firewall>URL Filter Name URL List Description Enable Content Filter Check the check box to enable Content Filter Blacklist/Whitelist Select Blacklist or Whitelist URL Filter Rules Add Trash Save Cancel Add a new URL filter rule Delete a URL filter rule Commit the changes made and save to CPE Reset fields to the last saved values Table 19 Field definition for Networking>Firewall>URL Filter Page 46 of 91 OX-350I User Manual Rev1.3 5.3. DHCP Server Use the Networking> DHCP Server tab to configure the DHCP server information. The default DHCP Server setup is enabled, and user could disable this function from setup as shown in Figure 29. When user disables the DHCP server, it requires setting a static IP address on host PC for CPE to configure. Please be noted that without the static IP address set properly on the host PC, user can not open the CPE web page for configuration. When DHCP server is enabled, user needs to define the IP pool range for dynamically assigning the IP address. The advantage of using DHCP server is that the addresses which are no longer in use will be returned to the IP address pool so that the server can reallocate them to other machines in the network. There are three DNS servers the user can configure to assign an IP address. Static DHCP will assign an IP address on the LAN to a specific device based on its MAC address. The definition for each field is shown on Table 20. Page 47 of 91 OX-350I User Manual Rev1.3 Figure 29 Networking>DHCP Server Name Description DHCP Server DHCP Mode Select DHCP mode:
None: disable DHCP mode.
Server: enable DHCP server mode
Relay: enable DHCP relay mode DHCP start IP Starting IP address range address Page 48 of 91 OX-350I User Manual Rev1.3 Name Description DHCP end IP address Ending IP address range The lease time is a controlled time period, allowing the DHCP server to reclaim (and then reallocate) IP Lease Time addresses that are not renewed (dynamic re-use of IP addresses). Lease time is measured in minutes in the Configuration Manager. Relay IP Enter the IP address of DHCP relay. DNS Server assigned by DHCP Server User can specify three DNS servers and select how the DNS Server is assigned. There are three options for First DNS Server assigning the DNS server.
From ISP
User Defined
None Second DNS Server If user selects None, then the DHCP server will not give Third DNS Server Static DHCP Static DHCP Add OK DHCP Leased Hosts DHCP Leased Hosts Save Cancel clients the DNS server information. If all the three DNS servers setting are set to None, then the DHCP server will use the LAN IP address as the DNS server information for the clients. If the user chooses User Defined and leaves the IP address as 0.0.0.0 it will change the field to None. Enter MAC address and IP address for static DHCP addresses. Click on the Add button to enter a static leased IP address. Enter the MAC address of the Ethernet device and enter the IP address. Click the OK button to exit out of edit mode. List of Leased IP addresses. The Refresh button will display an updated list of leased addresses. Commit the changes made and save to CPE, some services will be reloaded. Reset fields to the last saved values. Page 49 of 91 Table 20 Field definition for Networking>DHCP Server OX-350I User Manual Rev1.3 5.4. NAT ALG There are some ALG settings that user can enable from Networking>NAT ALG. ALG allows legitimate application traffic to pass through the CPE that would have otherwise restricted. Without ALGs, some application may not work well because of NAT/firewall settings. User could click on the check box to enable ALGs. Note: If user is using any of these types of application protocols user needs to enable them in the ALG settings.
FTP ALG
H.323 ALG
IPsec ALG
L2TP ALG
PPTP ALG
RTSP ALG
SIP ALG
SIP Port
SIP ALG Set BSID Figure 30 Networking>NAT ALG Page 50 of 91 OX-350I User Manual Rev1.3 5.5. Forwarding Forwarding is the act of forwarding the data from WAN side to the particular port of the private IP. This function can allow remote computers to reach a port on a private IP address within a private LAN. In the following, it will introduce how to setup for Port Forward. First, user needs to click the Add button and then select which forward type, TCP or UDP or TCP/UDP, is preferred to trigger the special application as shown in Figure 31 and Figure 32. User needs to assign some specific port for the WAN IP to be forwarded to the defined LAN IP and port, and then click the Save button to add a Port Forward rule. The definition for each field is shown on Table 21. Figure 31 Networking>Forwarding Figure 32 Networking>Forwarding>Wizard Page 51 of 91 OX-350I User Manual Rev1.3 Name Description Port Forwarding Rules Active Name Protocol Incoming Port(s) Check the box to active the port forward rule Name of the port forward rule User needs to define the desired protocol for rule. Available options are: TCP, UDP, or TCP/UDP User needs to define incoming port range for port forwarding rule. Forward Port(s) translated for port forwarding rule. The packet will be User needs to define to which port range will be forwarded to one of these ports if it matches the rule. User needs to define which IP address will be translated Server IP to if it matches the Port Forwarding rule. The packet will Trash Wizard Add OK Save Cancel be forwarded to this IP address if it matches the rule. Delete the Port Forward rule Click the Wizard button to go to the Port Forward Rule Wizard Click the Add button to create a new Port Forward rule Click the OK button to exit table edit mode Commit the changes made and save to the CPE Reset field to the last saved values. Table 21 Field definition for Networking>Forwarding 5.6. Trigger The Networking>Trigger allows user to configure Port Trigger rules. Port Trigger is a way to automate port forwarding in which outbound traffic on predetermined ports (trigger port) causes inbound traffic to specific incoming ports to be dynamically forwarded to the initiating host, while the outbound ports are in use. This allows users behind CPE on the LAN to provide services that would normally require the computer to have IP address on the LAN. Port triggering triggers an open incoming port (open port) when a client on the local network makes an outgoing connection on a predetermined port or range of ports. The definition for each field is shown on Table 22. Page 52 of 91 OX-350I User Manual Rev1.3 Figure 33 Networking>Trigger Figure 34 Networking>Trigger>Wizard Name Description Port Triggering Rules Active Name Check the box to active the Port Trigger rule Name of the Port Trigger rule Trigger Protocol trigger the rule. Available options are TCP, UDP or It defines which protocol the outgoing packet used will TCP/UDP Trigger Port(s) trigger the rule. User needs to enter the starting and It defines which port range the outgoing packet will ending port range Open Protocol It defines which protocol will be opened if the rule had Page 53 of 91 OX-350I User Manual Rev1.3 Name Description been triggered. Available options are TCP, UDP or TCP/UDP Open Port(s) had been triggered. User needs to enter the starting and It defines which protocol port will be opened if the rule Trash Wizard Add OK Save Cancel ending port range Delete the Port Trigger rule Click the Wizard button to go to the Port Trigger Rule Wizard Click the Add button to enter a Port Trigger rule Click the OK button to exit, table edit mode. Commit the changes made and save to the CPE Reset fields to the last saved values Table 22 Field definition for Networking>Trigger 5.7. DDNS DDNS stands for Dynamic Domain Name Services. It provides a function to convert the domain name to the unique IP address. With DDNS, users is able to find and connect to CPE no matter what IP address CPE is currently using, that is, DDNS can map CPE's dynamic IP address to a static hostname. The best profit of this function allows user to access CPE from everywhere. In Figure 35, it demonstrates how to configure DDNS on CPE web page. The definition for each field is shown on Table 23. Page 54 of 91 OX-350I User Manual Rev1.3 Figure 35 Networking>DDNS Name Description DDNS Profile Enable Dynamic DNS Click the check box to enable dynamic DNS Service Provider Enter the URL of the Service Provider Enter the service type (DYNDNS only) Service Type*
Dynamic
Static
Custom Domain Name Enter the domain name Login Name Password Enter the username Enter the password IP Update Policy User Defined IP Select the Policy to be used
Auto Detect
WAN IP
User Defined If user selects User Defined as the IP policy, user has to enter the IP address. Wildcards*
Allow hostname to use wildcards such as *. It will allow Page 55 of 91 OX-350I User Manual Rev1.3 Name Description
*host.dyndns.org to be aliased to the same IP address MX*
Backup MX*
MX Host*
Save Cancel as host.hyndns.org Enable mail routing Enable Second mail routing Host that mail will be routed to Commit the changes made and save to CPE Reset fields to the last saved values Note: * Supported by DYNDNS service provider. Table 23 Field definition for Networking>DDNS 5.8. UPnP Two methods of simplifying the process of connecting a device to the network are available as shown in Figure 36. UPnP allows devices to connect seamlessly to networks in the home (data sharing, communications, and entertainment) and in corporate environments for simplified installation of computer components. NAT Port Mapping Protocol (NAP-PMP) allows a computer in a private network (behind a NAT router) to automatically configure the router to allow parties outside the private network to contact itself. The definition for each field of UPnP Setting is shown on Table 24. Figure 36 Networking>UPnP Name Description UPnP Service Enable UPnP Check the check box to enable UPnP Page 56 of 91 OX-350I User Manual Rev1.3 Name Description Enable NAT-PMP Check the check box to enable NAT-PMP Save Cancel Commit the changes made and save to CPE Reset fields to the last saved values Table 24 Field definition for Networking>UPnP 5.9. Ping Figure 37 Networking>Ping Name Ping Description IP Address The destination IP address for ping test. It can be in one of the following formats:
IP address (ex. 165.21.83.88)
Domain name (ex. www.google.com) Ping Commit the ping test request Table 25 Field definition for Networking>Ping Page 57 of 91 OX-350I User Manual Rev1.3 6. Management 6.1. TR-069 Using TR-069 the terminals can communicate with the Auto Configuration Servers
(ACS) and establish the configuration automatically. Its the current standard for activation of terminals in the DSL broadband market. Figure 38 Management>TR-069 Name Description Page 58 of 91 OX-350I User Manual Rev1.3 Name Description TR-069 Configuration Enable To enable or disable the TR-069 activity on the CPE. Fixed Client Port To specify fixed client port ACS Server URL The ACS URL for CPE to connect to. Bootstrap Enable Check the box to enable bootstrap. ACS Username ACS Password The username for the CPE when connected to ACS. The password for the CPE when connected to ACS. Periodical Inform Enable To enable or disable the periodical inform to ACS for CPE. Periodical Inform Interval The interval between two periodical inform. Connection Request Enter the username for the ACS to perform Username connection request to CPE. Connection Request Enter the password for the ACS to perform Password connection request to CPE. CA Certificate File of ACS when D-230 communicated ACS with HTTPS The CA certificate file is used to identify the certificate URL. CA Certificate Info Displays the subject field of the CA Certificate. Client Certificate File The CLIENT certificate file is used when CPE communicates with HTTPS URL. Client Certificate Info Displays the subject field of the CLIENT Certificate. Save Cancel Commit the changes made and save to CPE. Reset fields to the last saved values. Table 26 Field definition for Management>TR-069 6.2. OMA-DM Using OMA DM the terminals can communicate with the OMA DM Server and establish the configuration automatically. Its the current standard for activation of terminals in OMA (Open Mobile Alliance). Page 59 of 91 OX-350I User Manual Rev1.3 Figure 39 Management>OMA-DM Name Description OMA DM Configuration Enable To enable or disable the OMA-DM activity of CPE. Server URL The DM Server URL for CPE to connect to. Server Port The DM Server Port for CPE to connect to. Server Auth Type The DM Server authentication type. Server ID The Server ID for CPE when connected to DM Server. Server Password The Server password for CPE when connected to DM Server. Server Nonce Server nonce used in authentication credential calculation. Client Auth Type The DM Client authentication type. Client ID The Client ID for CPE when connected to DM Server. Client Password The Client password for CPE when connected to DM Server. Page 60 of 91 OX-350I User Manual Rev1.3 Name Description Client Nonce Client nonce used in authentication credential calculation. Periodical Client-
To enable or disable the periodical client-initiated session to initiated Enable DM server for CPE. Periodical Client-
initiated Interval Save Cancel The interval between two periodical client-initiated sessions. Commit the changes made and save to CPE. Reset fields to the last saved values. Table 27 Field definition for Management>OMA-DM 6.3. SNMP Figure 40 Management>SNMP Name Description SNMP Daemon Enable applications to query and set some of the SNMP Checking the enable button will allow SNMP variables. Location Contact Enter the Location SNMP string variable. Enter the Contact SNMP string variable. Read Community Enter Read community string to query SNMP data. Page 61 of 91 OX-350I User Manual Rev1.3 Name Description Write Community Trap Server Enter Write community string to query SNMP variables. Enter the IP Address of trap server where user wants trap notifications to be sent to. Enter the Trap community to act as a password for Trap community sending trap notifications to the target SNMP manager. Save Cancel Commit the changes made and save to CPE. Reset fields to the last saved values. Table 28 Field definition for Management>SNMP 6.4. Log 6.4.1. Log Setting The Management>Log>Log Setting allows user to set the remote log configure. The Refresh button will clear the log window and display the most current system log information. Figure 41 Management>Log>Log Setting Name Enable Log Log Level Description Check the box to enable the log feature. Select the log level. Page 62 of 91 OX-350I User Manual Rev1.3 Name Description Enable Remote Log Enable / Disable transfer log to remote syslog server. Remote Log Host Location of the remote syslog server. Remote Log Port What port to use for remote logging. Save Cancel Commit the changes made and save to CPE. Reset fields to the last saved values. Table 29 Field definition for Management>Log>Log Setting 6.4.2. Log Display The Management>Log>Log Display will display system log output. The Refresh button will clear the log window and display the most current system log information. Figure 42 Management>Log>Log Display Page 63 of 91 OX-350I User Manual Rev1.3 6.5. Upgrade The Upgrade window allows user to upgrade the firmware on the device. Users can choose to upgrade the firmware by entering the file path. Note: After pressing the Upgrade button. It will automatically reboot the CPE and upgrade the firmware with the specified file. User will be prompted to login to CPE after the upgrade is complete. 6.5.1. Upgrade File Figure 43 Management>Upgrade>Upgrade File Name Description Auto Upgrade Firmware Enable Auto FW Upgrade To enable or disable the Auto Upgrade Firmware of CPE. Upgrade Server Auto Firmware Update checking URL. Page 64 of 91 OX-350I User Manual Rev1.3 Name Description Upgrade Hour The service stating time. Upgrade The random period of sleep time before actually connection Random Time to server for checking and updating. The "Version File" in the URL.
"Version File" format :
Upgrade File 1st line : "firmware package version"
2nd line : "firmware package tar-ball" (in the same URL path) Save Cancel Commit the changes made and save to CPE. Reset fields to the last saved values. Upgrade Firmware Browse Enter the full path of the file user wants to upgrade. The browse button will help user to find the file on the server. Upgrade It will start upgrading the file Status The status bar will display which segment it's processing and what percentage of the upgrade has been completed. Table 30 Field definition for Management>Upgrade>Upgrade File 6.5.2. Upgrade Link Figure 44 Management>Upgrade>Upgrade Link Name Description Upgrade Firmware Upgrade Link Enter the complete URL path of the file that user wants to upgrade Upgrade It will start upgrading the file Page 65 of 91 OX-350I User Manual Rev1.3 Name Description Status processing and what percentage of the upgrade has The status bar will display which segment it's been completed. Table 31 Field definition for Management>Upgrade>Upgrade Link 6.5.3. CWMP Upgrade TR-069 technical specification entitled CPE WAN Management Protocol (CWMP). It defines an application layer protocol for remote management of end-user devices. Figure 45 Management>Upgrade>CWMP Upgrade Name Description Upgrade Firmware via CWMP Request Download Upgrade It will start upgrading Table 32 Field definition for Management>Upgrade>CWMP Upgrade 6.6. Recovery Recovery will set all the configurations back to factory defaults. Any configurations that user has made will be changed back to the factory default settings. After selecting Factory Default button, user will be prompted with a window to confirm or cancel the action. Warning: Restore factory defaults will clear any IP addresses and setting that may have been configured on the CPE. Page 66 of 91 6.6.1. Backup OX-350I User Manual Rev1.3 Figure 46 Management>Recovery>Backup Figure 47 File Download Page 67 of 91 OX-350I User Manual Rev1.3 Figure 48 Save File As Name Description Backup Configuration Backup Click the "Backup" button o save the current configuration on the CPE. After user clicks the
"Backup" button "File Download" window will pop-up and prompt user to save the file. In the "Save As"
window, enter the name and location, where user wishes to download the file to. Table 33 Field definition for Management>Recovery>Backup Page 68 of 91 6.6.2. Restore OX-350I User Manual Rev1.3 Figure 49 Management>Recovery>Restore Name Description Restore From File File Restore Enter the path of the configuration file user wants to restore. Click on the "Browse" button to help user to navigate through directories and search for the file. After user enters the complete file path, click the "File Restore" button. It will begin restoring the configuration from the file specified. Restore From URL Link URL Restore Enter the configuration URL path user wants to restore from. After entering the complete URL path, click the
"URL Restore" button. It will begin restoring the configuration from the URL location user specified. Table 34 Field definition for Management>Recovery>Restore Page 69 of 91 6.6.3. Factory Defaults OX-350I User Manual Rev1.3 Figure 50 Management>Recovery>Factory Defaults Figure 51 Restore to factory reset warning Page 70 of 91 OX-350I User Manual Rev1.3 7. VPN VPN (Virtual Private Network) is a network that is implemented in an additional software layer on top of an existing larger network for the purpose of providing a secure extension of a private network into an insecure network such as the Internet. The links between nodes of a VPN are formed over logical connections or virtual circuits between hosts of the larger network. VPNs are often installed by organizations to provide remote access to a secure organizational network. Generally, a VPN has a network topology more complex than a point-to-point connection. VPNs are also used to mask the IP address of individual computers within the Internet in order, for instance, to surf the World Wide Web anonymously or to access location restricted services, such as Internet television. Here, VPN Settings allow user to set rules for VPN, and it supports PPTP, L2TP, and IPsec. 7.1. PPTP The Point-to-Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks. PPTP does not provide confidentiality or encryption; it relies on the protocol being tunneled to provide privacy. 7.1.1. PPTP Server A PPTP Server (Point-To-Point Tunneling Protocol) allows user to connect securely from a place (such as the house) to a LAN located in another location, such as the office. This way user can use the services provided in the office at the comfort of the house. The definition for each field of PPTP Server is shown on Table 35. Page 71 of 91 OX-350I User Manual Rev1.3 Figure 52 VPN>PPTP>PPTP Server Name PPTP Server Enable Description Activate PPTP server. Server Name Offer a service name Auth Protocol Require the peer to authenticate itself before allowing network packets to be sent or received. We support the following protocol:
PAP: Password Authentication Protocol Page 72 of 91 Name Description OX-350I User Manual Rev1.3
CHAP: Challenge Handshake Authentication Protocol
MSCHAP: Microsoft Challenge Handshake Authentication Protocol
MSCHAPv2: Microsoft Challenge Handshake Authentication Protocol, Version 2 Encryption Scheme:
No Encryption
MPPE 40 bits: 40-bit encryption with MPPE
MPPE 128 bits: 128-bit encryption with MPPE
Auto: automatically select Local IP Address The IP of router Remote Start IP As sessions are established, IP addresses are assigned starting from Remote Start IP Idle Timeout Disconnect if the link is idle for the assigned seconds DNS Server 1 DNS Server 2 User Access List User name The primary DNS (Domain Name Server) addresses to clients The secondary DNS (Domain Name Server) addresses to clients User ID to connect PPTP server via the selected Auth Protocol Server Server protocol type Password Password to connect PPTP server via the selected Auth Protocol IP address IP address of the connected client Connection List User name The user name of the connection Remote IP address The peer address of the connection PPTP IP address The assigned IP address of PPTP Login Time Link Time(s) Save Cancel The time of the connection created Timer from the connected time Commit the changes made and save to the CPE Reset fields to the last saved values Page 73 of 91 Table 35 Field definition for VPN>PPTP>PPTP Server OX-350I User Manual Rev1.3 7.1.2. PPTP Client User could setup PPTP Client as shown in Figure 53 and Figure 54. The definition for each field of PPTP Client is shown on Table 36. Figure 53 VPN>PPTP>PPTP Client Figure 54 VPN>PPTP>PPTP Client>Add Name Description Page 74 of 91 Name PPTP Client Add Edit Edit PPTP Client Profile Name NAT Mode?
OX-350I User Manual Rev1.3 Description Add a new connection setting Edit the existed connection setting The name for this connection setting Enable or disable NAT when connected to PPTP server.
Yes: enable
No: disable The Authentication protocol of the peer required. Select which Authentication protocol to use. Auth Protocol
PAP
CHAP
MSCHAPv1
MSCHAPv2 Encryption Encryption scheme Server IP Address The IP address of PPTP server Username The user ID to connect PPTP server via the selected Auth Protocol Password Retype The password of the corresponding user ID Type the Password again Get IP automatically?
Obtain the dynamic IP address, assigned by the PPTP server Assign IP Address Assign the static IP address for this connection setting Idle Timeout Disconnect if the link is idle for the assigned seconds MPPE_Stateful Allow MPPE to use stateful mode. Stateless mode is still attempted first. The default is to disallow stateful mode. Save Cancel Commit the changes made and save to CPE Reset fields to the last saved values Table 36 Field definition for VPN>PPTP>PPTP Client 7.2. L2TP In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol Page 75 of 91 OX-350I User Manual Rev1.3 used to support virtual private networks (VPNs). It does not provide any encryption or confidentiality by itself. It relies on an encryption protocol that it passes within the tunnel to provide privacy. The entire L2TP packet, including payload and L2TP header, is sent within a UDP datagram. It is common to carry Point-to-Point Protocol (PPP) session within an L2TP tunnel. L2TP does not provide confidentiality or strong authentication by itself. IPsec is often used to secure L2TP packets by providing confidentiality, authentication and integrity. 7.2.1. L2TP Server User can setup CPE from web page as shown in Figure 55. The definition for each field of PPTP Server is shown on Table 37. Page 76 of 91 OX-350I User Manual Rev1.3 Figure 55 VPN>L2TP>L2TP Server Name L2TP Server Enable Description Check the check box to activate L2TP server. Server Name Enter a service name Support Version Protocol The supported protocol of L2TP messages
ALL: L2TPv2 and L2TPv3 Page 77 of 91 OX-350I User Manual Rev1.3 Name Description
2: L2TPv2 only
3: L2TPv3 only Auth Protocol Require the peer to authenticate itself before allowing network packets to be sent or received. The following protocols are supported:
PAP: Password Authentication Protocol
CHAP: Challenge Handshake Authentication protocol
MSCHAPv1: Microsoft Challenge Handshake Authentication Protocol
MSCHAPv2: Microsoft Challenge Handshake Authentication Protocol, Version 2 Encryption Scheme
No Encryption
MPPE 40 bits: 40-bit encryption with MPPE
MPPE 128 bits: 128-bit encryption with MPPE
Auto: automatically select Local IP Address The IP of router Remote Start IP As sessions are established, IP addresses are assigned starting from Remote Start IP Restrict Client IP?
To restrict client IP address range for the client Allow Client IP The IP address range for the client Idle Timeout DNS Server 1 DNS Server 2 User Access List User Name Disconnect if the link is idle for the given number of seconds The primary DNS (Domain Name Server) addresses to the clients The secondary DNS (Domain Name Server) addresses to the clients User ID to connect L2TP server via the selected Auth Protocol Server Server Protocol type Password Password to connect L2TP server via the selected Auth Protocol Page 78 of 91 OX-350I User Manual Rev1.3 Name Description IP Address IP address of the connected client Connection List User Name The user name of the connection Remote IP Address The peer address of the connection L2TP IP Address The assigned IP address of L2TP Login Time Link Time(s) Save Cancel The time of the connection created Elapsed time connected Commit the changes made and save to CPE Reset fields to the last saved values Table 37 Field definition for VPN>L2TP>L2TP Server 7.2.2. L2TP Client User could setup PPTP Client as shown in Figure 56 and Figure 57. The definition for each field of PPTP Client is shown on Table 38. Figure 56 VPN>L2TP>L2TP Client Page 79 of 91 OX-350I User Manual Rev1.3 Figure 57 VPN>L2TP>L2TP Client>Add Name L2TP Client Add Edit Edit L2TP Client Description Add a new connection setting Edit the existed connection setting Profile Name The name of this connection setting The message of L2TP protocol version for this L2TP Protocol Version connection setting
2: L2TPv2 only
3: L2TPv3 only Enable or disable NAT when connected to PPTP server NAT Mode?
Yes: enable
No: disable Auth Protocol The Authentication Protocol of the peer required. Select which Authentication protocol to use.
PAP
CHAP Page 80 of 91 OX-350I User Manual Rev1.3 Name Description
MSCHAPv1
MSCHAPv2 Encryption Encryption Scheme Server IP Address The IP address of L2TP server Username Password Retype Get IP Automatically?
The username to connect L2TP server via the selected Auth Protocol The password of the corresponding username Type the Password again Obtain the dynamic IP address, assigned by the L2TP server Assign IP Address Assign the static IP address for this connection setting Idle Timeout Disconnect if the link is idle for the assigned seconds MPPE_Stateful Allow MPPE to use stateful mode. Stateless mode is still attempted first. The default is to disallow stateful mode. Save Cancel Commit the changes made and save to CPE Reset fields to the last saved values Table 38 Field definition for VPN>L2TP>L2TP Client 7.3. IPsec Internet Protocol Security (IPsec) is an end-to-end security solution and operated at the IP Layer. It provides secure communication between pairs of hosts, pairs of security gateways or between security gateways and a host. Its based on a suite of protocols for securing IP traffic by authenticating and encrypting each IP packet of the data stream. Figure 58 VPN>IPsec Overview Page 81 of 91 OX-350I User Manual Rev1.3 Page 82 of 91 OX-350I User Manual Rev1.3 Figure 59 VPN>IPsec>Add Description Click the "Add" button to add an IPsec connection rule Enable IPsec connection. Name Add Property Enable Connection Name The name of the connection Connection Type Gateway Information Local Endpoint Interface Select the connection type
Initiator
On Demand
Responder The interface of the CPE public-network interface Local Endpoint IP The IP address or Domain Name of the CPE Address public-network interface Remote Endpoint IP Address Authentication Method Pre-Shared Key The IP address or Domain Name of the remote peer. The pre-share key that two security gateways use to authenticate States how the CPE should be identified for Local ID Type authentication IP: The CPE is identified by the assigned IP for authentication. The default value is 0.0.0.0. Content The IP address Remote ID Type Content IKE Phase 1 States how the remote peer should be identified for authentication IP: The remote peer is identified by the assigned IP for authentication. The default value is 0.0.0.0, and this means CPE will accept any IP. The IP address Page 83 of 91 OX-350I User Manual Rev1.3 Name Description Press the Add button to enter an Encryption and Authentication algorithm. Click the trash to remove the selected algorithm. Encryption Algorithm:
Proposal Add
DES
3DES
AES128
AES192
AES256 Authentication Algorithm:
MD5
SHA-1 Proposal OK Key Group Click the OK button to exit the table edit mode The DH group used to negotiate the IKE/ISAKMP SA. The period that the keying channel of a connection SA Life Time
(IKE/ISAKMP SA) should last before being renegotiated. Dead Peer Detection Enable or disable the Dead Peer Detection protocol
(DPD)
(RFC 3706) DPD Interval DPD Idle Try The time interval when R_U_THERE messages are sent to the peer. The retry counter for DPD. The timeout interval is "DPD interval" multiplied by "DPD Idle Try". After the timeout interval all connections to the peer are deleted if they are inactive. Local Network The private subnet behind the CPE. Single Address: The private subnet consisting of one IP Address Type address. Subnet address: The private subnet consisting within the subnet IP addresses. Start IP Address The only IP address allowed in the subnet Subnet Mask The netmask of the subnet (Subnet address) Local Port Restrict the traffic selector to a single protocol and/or port. Page 84 of 91 Name Description OX-350I User Manual Rev1.3
Any: No restriction
ICMP: Restrict the traffic selector to ICMP protocol.
TCP: Restrict the traffic selector to TCP protocol. If the port number is 0, all TCP port numbers are accepted.
UDP: Restrict the traffic selector to UDP protocol. If the port number is 0, all UDP port numbers are accepted. Remote Network The private subnet behind the remote peer. Address Type Single Address: The private subnet consisting of one IP address. Subnet address: The private subnet consisting of subnet IP addresses. Start IP Address The only IP address allowed in the subnet Subnet Mask The netmask of the subnet (Subnet address) Restrict the traffic selector to a single protocol and/or port.
Any: No restriction
ICMP: Restrict the traffic selector to ICMP protocol.
TCP: Restrict the traffic selector to TCP protocol. If the port number is 0, all TCP port numbers are accepted.
UDP: Restrict the traffic selector to UDP protocol. If the port number is 0, all UDP port numbers are accepted. The type of the connection:
Tunnel: signifying a host-to-host, host-to-subnet, or subnet-to subnet tunnel.
Transport: signifying host-to-host transport made. Whether authentication should be done as part of ESP encryption and/or separately using the AH protocol. Remote Port IPSec Proposal Encapsulation Mode Active Protocol Encryption Algorithm
NULL
AES128 Page 85 of 91 OX-350I User Manual Rev1.3 Name Authentication Algorithm Description
AES192
AES256
DES
3DES
MD5
SHA-1 SA Life Time set of encryption/authentication key for user packets) The time interval a particular instance of a connection (a should last, from successful negotiation to expiry. Perfect Forward Whether Perfect Forward Secrecy of keys is desired on Secrecy (PFS) the connection's keying channel. Save Cancel Commit the changes made and save to the CPE device Reset fields to the last saved values. Table 39 Field definition for VPN>IPsec>Add Page 86 of 91 8. Installation and Grounding OX-350I User Manual Rev1.3 Device Before installing the Outdoor CPE Device Before installing, it is important to comply with the precautions listed below.
It must be installed by qualified service personnel who are well-trained in the correct procedures for handling and installing the equipment.
Avoid installing or working on equipment in adverse weather conditions. Once it must be installed in adverse weather conditions, its necessary to well protect the equipment.
Do not install the device near overhead power lines or power circuits, or where the device can fall onto such power lines or circuits.
Do not disassemble the product. Opening or removing covers may expose you to electric shock. Warranty void if seal is broken.
Do not place or construct objects in close proximity to the device.
Be sure to check the supplied mounting accessory is correct as listed in Figure 60. Please be noted that the mounting kits should be used for the pole with diameter between 34 ~ 49 mm.
Under normal operating condition, it should be at least 60 cm away from the body of the user. Mounting Accessories:
Bracket with Tab: 1 pc Screws with length 35mm: 2 pcs Bracket W/L Tab: 1 pc Nuts: 3 pcs Arm Bracket: 1 pc Split Washers: 3 pcs Screws with length 60mm: 2 pcs Flat Washers: 3 pcs Lockwasher: 2 pcs Figure 60 Mounting accessory list Page 87 of 91 OX-350I User Manual Rev1.3 An Overview of the Outdoor CPE Device Installation Service personnel needs to follow the steps for installing Outdoor CPE Device 1. Pole-mounting or Wall-mounting the Outdoor CPE Device. 2. Grounding the Outdoor CPE Device 3. Connect the Outdoor CPE Device to PoE unit 4. Connect PC to PoE unit for configuring the Outdoor CPE Device 5. Connect the PoE unit to the power source to power up the Outdoor CPE Device 6. Use PC to configure the Outdoor CPE Device Pole-Mounting the Outdoor CPE Device In the following steps, it introduces how to pole-mounting the Outdoor CPE Device. 1. Assemble the mounting hardware brackets onto pole first: Take the Screws with 60mm length to pass through the Split washer and Flat washer in order, and then screw the Brackets together with nuts. 2. Use the Screw with 35mm length to attach the Outdoor CPE Device to the tab of the Bracket. Ensure the Lockwasher is located between the Brackets tab and the Outdoor CPE Devices tab. Be sure to orient the Outdoor CPE Device with the connector towards the bottom. Remember to orderly add the Split washer, Flat washer and Nuts as shown in Figure 61. Do not over-tighten before finishing the Outdoor CPE Device alignment. 3. Adjust the azimuth and elevation of the Outdoor CPE Device toward the direction of WiMAX Base Station location. 4. Tighten the screws to secure the Outdoor CPE Device tightly. It is not necessary to use Arm Bracket for pole-mounting. Arm Bracket is only used for wall-mounting. Page 88 of 91 Screw (35mm) Screw (60mm) Split washer Flat washer Bracket with Tab Bracket W/L Tab Nut OX-350I User Manual Rev1.3 Lockwasher Split washer Flat washer Nut Figure 61 Pole-Mount the Outdoor CPE Device Wall-Mounting the Outdoor CPE Device In the following steps, it introduces how to wall-mounting the Outdoor CPE Device. 1. Install the Bracket with tab on a wall by using two mounting screws appropriate for the walls construction material. The appropriate mounting hardware should be purchased directly from a local supplier. 2. Connect the Arm Bracket to Outdoor CPE Device with the 35mm length Screw, Lockwasher, Split washer, Flat washer, and Nut orderly as shown in Figure 62. Ensure the Lockwasher is located between the Brackets tab and the Outdoor CPE Devices tab. Do not over-tighten before finishing the Outdoor CPE Device alignment. 3. Secure the other side of Arm Bracket along with Lockwasher to the Brackets tab mounted on wall. Ensure that the bolt head is positioned in the socket of the Bracket. Do not over-tighten before finishing the Outdoor CPE Device alignment. 4. Adjust the azimuth and elevation of the Outdoor CPE Device toward the direction of WiMAX Base Station location. 5. Tighten the screws to secure the Outdoor CPE Device tightly. Page 89 of 91 OX-350I User Manual Rev1.3 Screw (35mm) Customer supplied screw Bracket with Tab Customer supplied screw Split washer Flat washer Nut Screw (35mm) Arm Bracket Lockwasher Split washer Flat washer Nut Lockwasher Figure 62 Wall-Mount the Outdoor CPE Device Grounding the Outdoor CPE Device Grounding the Outdoor CPE Device is essential to avoid serious injury to service personnel and damage to the Outdoor CPE Device. Please be noted that minimum #16 AWG wire with the color combination green-and-yellow should be used for the grounding. The following steps introduce how to ground the Outdoor CPE Device. 1. Remove the ground screw installed on the side of the Outdoor CPE Device, as shown in 2. Cut the required length of the grounFigure 63.d wire, and then strip the insulation from the ground wire by using either a wire cutter/stripper or utility knife. 3. Crimp the ground wire to the copper cable lug, and then connect the cable lug to the grounding connection on the side of the Outdoor CPE Device. Please be noted that the thickness of the cable lug should be less than 0.85mm. 4. Tighten the screw by using the appropriate size and type of screw driver to secure the copper cable lug to the Outdoor CPE Device. 5. Strip the other end of the ground wire and connect to the main ground Page 90 of 91 OX-350I User Manual Rev1.3 Copper Cable Lug Grounding Screw Ground Wire to Earth Figure 63 Connect the ground wire Page 91 of 91
1 | User manual rev1 | Users Manual | 2.80 MiB | June 10 2011 / April 11 2011 |
User Manual OX-350I WiMAX Outdoor CPE Version: 1.2 Date: Oct. 04, 2011 Page 1 of 91 OX-350I User Manual Rev1.2 Previous History Revision Date of Issue Scope 1.0 1.1 1.2 2011/08/31 2011/09/21 2011/10/04 Initial document Add FCC Warning Wording Modify Important Notice content in page 4 Author Alpha C. Tony Kao Tony Kao Page 2 of 91 OX-350I User Manual Rev1.2 Federal Communication Commission Interference Statement :
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
- Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
- Consult the dealer or an experienced radio/TV technician for help. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and
(2) this device must accept any interference received, including interference that may cause undesired operation. Page 3 of 91 OX-350I User Manual Rev1.2 FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 60cm between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. Due to the essential high output power natural of WiMAX device, use of this device with other transmitter at the same time may exceed the FCC RF exposure limit and such usage must be prohibited (unless such co-transmission has been approved by FCC in the future). IMPORTANT NOTE:
According to FCC regulation (FCC 05-56), in order for the device to safely operate in the 3.675~3.700 GHz range, the device shall be connected to a Base station which supports "listen mode" and can instruct this device accordingly. Page 4 of 91 OX-350I User Manual Rev1.2 Table of Contents Previous History ............................................................................................... 2 1. Introduction ............................................................................................. 16 1.1. Connect ........................................................................................ 16 1.2. Logout .......................................................................................... 17 2. Status ...................................................................................................... 18 2.1. WiMAX Status .............................................................................. 18 2.2. Network Status ............................................................................. 18 2.3. Device Status ............................................................................... 19 3. Personalization ....................................................................................... 20 3.1. Account ........................................................................................ 20 3.2. Date ............................................................................................. 21 3.2.1. Date ................................................................................... 22 3.2.2. Time Zone ......................................................................... 23 4. WiMAX .................................................................................................... 24 4.1. Scanner ........................................................................................ 24 4.2. Authentication .............................................................................. 26 4.3. Wide Scan .................................................................................... 29 5. Networking .............................................................................................. 31 5.1. Bridge/NAT mode ......................................................................... 31 Page 5 of 91 OX-350I User Manual Rev1.2 5.1.1. LAN ................................................................................... 31 5.1.2. WAN .................................................................................. 32 5.1.3. PPPoE ............................................................................... 34 5.1.4. GRE .................................................................................. 36 5.1.5. EtherIP .............................................................................. 37 5.1.6. VLAN ................................................................................. 37 5.1.7. QoS ................................................................................... 39 5.2. Firewall ......................................................................................... 40 5.2.1. HTTP ................................................................................. 40 5.2.2. TELNET ............................................................................ 41 5.2.3. SSH ................................................................................... 42 5.2.4. DMZ .................................................................................. 42 5.2.5. IP Filiter ............................................................................. 43 5.2.6. MAC Filiter......................................................................... 44 5.2.7. URL Filiter ......................................................................... 46 5.3. DHCP Server ............................................................................... 47 5.4. NAT ALG ...................................................................................... 50 5.5. Forwarding ................................................................................... 51 5.6. Trigger .......................................................................................... 52 5.7. DDNS ........................................................................................... 54 Page 6 of 91 OX-350I User Manual Rev1.2 5.8. UPnP ............................................................................................ 56 5.9. Ping .............................................................................................. 57 6. Management ........................................................................................... 58 6.1. TR-069 ......................................................................................... 58 6.2. OMA-DM ...................................................................................... 59 6.3. SNMP ........................................................................................... 61 6.4. Log ............................................................................................... 62 6.4.1. Log Setting ........................................................................ 62 6.4.2. Log Display ....................................................................... 63 6.5. Upgrade ....................................................................................... 64 6.5.1. Upgrade File ...................................................................... 64 6.5.2. Upgrade Link ..................................................................... 65 6.5.3. CWMP Upgrade ................................................................ 66 6.6. Recovery ...................................................................................... 66 6.6.1. Backup .............................................................................. 67 6.6.2. Restore .............................................................................. 69 6.6.3. Factory Defaults ................................................................ 70 7. VPN ........................................................................................................ 71 7.1. PPTP ............................................................................................ 71 7.1.1. PPTP Server ..................................................................... 71 Page 7 of 91 OX-350I User Manual Rev1.2 7.1.2. PPTP Client ....................................................................... 74 7.2. L2TP ............................................................................................ 75 7.2.1. L2TP Server ...................................................................... 76 7.2.2. L2TP Client ........................................................................ 79 7.3. IPsec ............................................................................................ 81 8. Quick Installation Guide ........................................... !
Page 8 of 91 OX-350I User Manual Rev1.2 List of Figures Figure 1 Login ............................................................................................ 17 Figure 2 Logout ......................................................................................... 17 Figure 3 Status>WiMAX Status .................................................................. 18 Figure 4 Status>Network Status ................................................................ 19 Figure 5 Status>Device Status................................................................... 19 Figure 6 Personalization>Account ............................................................. 20 Figure 7 Personalization>Date>Date ......................................................... 22 Figure 8 Personalization>Date>Time Zone ............................................... 23 Figure 9 Wireless Broadband Access ........................................................ 24 Figure 10 WiMAX>Scanner ..................................................................... 25 Figure 11 WiMAX>Authentication(No authentication) .............................. 26 Figure 12 WiMAX>Authentication(User authentication) ........................... 28 Figure 13 WiMAX>Wide Scan.................................................................. 30 Figure 14 Network Topology .................................................................... 31 Figure 15 Networking>Bridge/NAT mode>LAN ........................................ 31 Figure 16 Networking>Bridge/NAT mode>WAN ...................................... 32 Figure 17 Networking>Bridge/NAT mode>PPPoE ................................... 35 Figure 18 Networking>Bridge/NAT mode>GRE ....................................... 36 Figure 19 Networking>Bridge/NAT mode>EtherIP ................................... 37 Page 9 of 91 OX-350I User Manual Rev1.2 Figure 20 Networking>Bridge/NAT mode>VLAN ..................................... 38 Figure 21 Networking>Bridge/NAT mode>QoS........................................ 39 Figure 22 Networking>Firewall>HTTP ..................................................... 40 Figure 23 Networking>Firewall>TELNET ................................................. 41 Figure 24 Networking>Firewall>SSH ....................................................... 42 Figure 25 Networking>Firewall>DMZ ....................................................... 43 Figure 26 Networking>Firewall>IP Filter .................................................. 43 Figure 27 Networking>Firewall>MAC Filter .............................................. 45 Figure 28 Networking>Firewall>URL Filter .............................................. 46 Figure 29 Networking>DHCP Server ....................................................... 48 Figure 30 Networking>NAT ALG .............................................................. 50 Figure 31 Networking>Forwarding ........................................................... 51 Figure 32 Networking>Forwarding>Wizard .............................................. 51 Figure 33 Networking>Trigger .................................................................. 53 Figure 34 Networking>Trigger>Wizard .................................................... 53 Figure 35 Networking>DDNS ................................................................... 55 Figure 36 Networking>UPnP ................................................................... 56 Figure 37 Networking>Ping ...................................................................... 57 Figure 38 Management>TR-069 .............................................................. 58 Figure 39 Management>OMA-DM ........................................................... 60 Page 10 of 91 OX-350I User Manual Rev1.2 Figure 40 Management>SNMP................................................................ 61 Figure 41 Management>Log>Log Setting ................................................ 62 Figure 42 Management>Log>Log Display ............................................... 63 Figure 43 Management>Upgrade>Upgrade File ...................................... 64 Figure 44 Management>Upgrade>Upgrade Link ..................................... 65 Figure 45 Management>Upgrade>CWMP Upgrade ................................ 66 Figure 46 Management>Recovery>Backup ............................................. 67 Figure 47 File Download .......................................................................... 67 Figure 48 Save File As ............................................................................. 68 Figure 49 Management>Recovery>Restore ............................................ 69 Figure 50 Management>Recovery>Factory Defaults ............................... 70 Figure 51 Restore to factory reset warning .............................................. 70 Figure 52 VPN>PPTP>PPTP Server ....................................................... 72 Figure 53 VPN>PPTP>PPTP Client ......................................................... 74 Figure 54 VPN>PPTP>PPTP Client>Add ................................................ 74 Figure 55 VPN>L2TP>L2TP Server ......................................................... 77 Figure 56 VPN>L2TP>L2TP Client .......................................................... 79 Figure 57 VPN>L2TP>L2TP Client>Add .................................................. 80 Figure 58 VPN>IPsec Overview............................................................... 81 Figure 59 VPN>IPsec>Add ...................................................................... 83 Page 11 of 91 OX-350I User Manual Rev1.2 Figure 60 Mounting accessory list ................................................................. 87 Figure 61 Pole-Mount the Outdoor CPE Device ............................................ 89 Figure 62 Wall-Mount the Outdoor CPE Device ............................................ 90 Figure 63 Connect the ground wire ............................................................... 91 Page 12 of 91 OX-350I User Manual Rev1.2 List of Tables Table 1 Field definition for Personalization>Account ................................ 21 Table 2 Field definition for Personalization>Date>Date ........................... 23 Table 3 Field definition for Personalization>Date>Time Zone .................. 23 Table 4 Field definition for WiMAX>Scanner ............................................ 26 Table 5 Field definition for WiMAX>Authentication................................... 29 Table 6 Field definition for WiMAX>Wide Scan ........................................ 30 Table 7 Field definition for Networking>Bridge/NAT mode>LAN .............. 32 Table 8 Field definition for Networking>Bridge/NAT mode>WAN ............. 34 Table 9 Field definition for Networking>Bridge/NAT mode>PPPoE.......... 36 Table 10 Field definition for Networking>Bridge/NAT mode>GRE ............. 37 Table 11 Field definition for Networking>Bridge/NAT mode>EtherIP ......... 37 Table 12 Field definition for Networking>Bridge/NAT mode>VLAN ............ 39 Table 13 Field definition for Networking>Bridge/NAT mode>QoS .............. 40 Table 14 Field definition for Networking>Firewall>HTTP ........................... 41 Table 15 Field definition for Networking>Firewall>TELNET ....................... 42 Table 16 Field definition for Networking>Firewall>SSH ............................. 42 Table 17 Field definition for Networking>Firewall>IP Filter ......................... 44 Table 18 Field definition for Networking>Firewall>MAC Filter .................... 45 Table 19 Field definition for Networking>Firewall>URL Filter ..................... 46 Page 13 of 91 OX-350I User Manual Rev1.2 Table 20 Field definition for Networking>DHCP Server .............................. 50 Table 21 Field definition for Networking>Forwarding ................................. 52 Table 22 Field definition for Networking>Trigger ........................................ 54 Table 23 Field definition for Networking>DDNS ......................................... 56 Table 24 Field definition for Networking>UPnP .......................................... 57 Table 25 Field definition for Networking>Ping ............................................ 57 Table 26 Field definition for Management>TR-069 .................................... 59 Table 27 Field definition for Management>OMA-DM ................................. 61 Table 28 Field definition for Management>SNMP ...................................... 62 Table 29 Field definition for Management>Log>Log Setting ...................... 63 Table 30 Field definition for Management>Upgrade>Upgrade File ............ 65 Table 31 Field definition for Management>Upgrade>Upgrade Link ........... 66 Table 32 Field definition for Management>Upgrade>CWMP Upgrade ...... 66 Table 33 Field definition for Management>Recovery>Backup ................... 68 Table 34 Field definition for Management>Recovery>Restore................... 69 Table 35 Field definition for VPN>PPTP>PPTP Server.............................. 74 Table 36 Field definition for VPN>PPTP>PPTP Client ............................... 75 Table 37 Field definition for VPN>L2TP>L2TP Server ............................... 79 Table 38 Field definition for VPN>L2TP>L2TP Client ................................ 81 Table 39 Field definition for VPN>IPsec>Add ............................................ 86 Page 14 of 91 OX-350I User Manual Rev1.2 Page 15 of 91 OX-350I User Manual Rev1.2 1. Introduction The CPE Software platform comes with a Web-based Configuration Manager, which gives users the ability to manage, configure and analyze the platforms environment. The Connection Manager works with all versions of Windows after Windows 95. The supported browser version:
Internet Explorer Ver 8.06001 or later (Recommended)
FireFox Ver.3.6.3 and higher
Google Chrome Ver.5.0.375.125 and higher
Opera Ver.9.64 and higher
Safari Ver.4.05 and higher 1.1. Connect Users need to connect to the CPE platform. Its assumed that the user has a fully working CPE platform and properly connected. From the web browser connect to the device, entering the IP address of the device; it will prompt user to enter the username and password. The default IP address, usernames and passwords are as follows. Default IP Address
192.168.0.254 Username/Password
admin/admin
guest/guest Page 16 of 91 OX-350I User Manual Rev1.2 Figure 1 Login 1.2. Logout The Logout window allows users to disconnect from the device and exit the Web-based Configuration Manager. Figure 2 Logout Page 17 of 91 OX-350I User Manual Rev1.2 2. Status After user has established a connection, user will see the Status window. It gives user an initial overview of the current status of the device. 2.1. WiMAX Status This window shows the information of system status, WiMAX link status and service flow status. Figure 3 Status>WiMAX Status 2.2. Network Status This window shows the information of WAN status and LAN status. Page 18 of 91 OX-350I User Manual Rev1.2 Figure 4 Status>Network Status 2.3. Device Status This window shows the information of device status. Figure 5 Status>Device Status Page 19 of 91 OX-350I User Manual Rev1.2 3. Personalization 3.1. Account Note: The default usernames and passwords are admin/admin and guest/guest. The user with administrative privileges (belonging to the admin group) has access to all the features in the software. A user with guest privileges (belonging to the guest group) only has a subset of the features available to them. Note: There can only be one username in each of the groups (one to one relationship). Figure 6 Personalization>Account Name Description Change Password Page 20 of 91 Group OX-350I User Manual Rev1.2 Select which group the user belongs to that user would like to change the password for.
admin, if the user is part of the admin group, they have full access to all the features.
guest, if the user is part of the guest group, they have limited access to the features. Old Password Enter the old password. New Password Enter the new password. Retype Save Cancel Change Username Group Retype the new password. Commit the changes made and save to CPE, it will only commit the change made to the password. Reset fields to the last saved values. Select which group the user belongs to that user would like to change the username for.
admin, if the user is part of the admin group, they have full access to the features.
guest, if the user is part of the guest group, they have limited access to the features. Old Username Enter the username user wants to change. New Username Enter the new username. Password change. If user enter an incorrect or different password Enter the original password, the password will not Save Cancel the change will not be committed Commit the changes made and save to CPE, it will only commit the change made to the username. Reset fields to the last saved values. Table 1 Field definition for Personalization>Account 3.2. Date User can configure the date and time on the device. The user can manually configure the system time, or choose to get the date and time from a time server. The Save button will commit the configuration, and the Cancel button will clear Page 21 of 91 OX-350I User Manual Rev1.2 the fields. The Time Zone tab will allow user to set the time zone and set the starting and finish time for daylight saving period. User can also enable or disable Daylight Savings Time. Note: If user doesnt configure the time on the CPE it will use the default system starting time which is set to 1970/1/1 00:00:00 Figure 7 Personalization>Date>Date 3.2.1. Date Name Description Time and Date Setup Manual New Time New Date If user selects the Manual option, then user needs to enter the time and date manually. New time manually entered New date manually entered Get From Time Server If user selects this option it will get the local time from a time server automatically. Time Protocol Select the Time protocol Page 22 of 91 OX-350I User Manual Rev1.2 Name Description Time Server Address Enter the address of the time server. Save Cancel Commit the changes made and save to CPE Reset fields to the last saved values Table 2 Field definition for Personalization>Date>Date 3.2.2. Time Zone Figure 8 Personalization>Date>Time Zone Name Description Time Zone Setup Time Zone Enter the time zone of for the location Enable Savings Start Date End Date Save Cancel Daylight If user wants to enable Daylight Savings Time, user needs to check the box. Enter the beginning date for Daylight Savings time Enter the end date for Daylight Savings time. Commit the changes made and save to CPE Reset fields to the last saved values Table 3 Field definition for Personalization>Date>Time Zone Page 23 of 91 OX-350I User Manual Rev1.2 4. WiMAX This technology is based on the IEEE 802.16 standard, enabling the delivery of last mile wireless broadband access. Figure 9 Wireless Broadband Access 4.1. Scanner The user can set WiMAX standard settings, which include how to establish a connection and get frequency information. The frequency list window will display all the configured frequencies and their bandwidth. To set additional frequencies, click on the Add button. Page 24 of 91 OX-350I User Manual Rev1.2 Figure 10 WiMAX>Scanner Name Description Start/Stop Wimax Start Stop Click the Start button to connect to a BSID Click the Stop button to terminate the connection Connect Type Settings Search Click the Search button to scan the frequency Joint Wide Scan Yes means to append wide scan result to the frequency Result setting. Default Bandwidth Select the default bandwidth to be used in Frequency List
5 MHz Page 25 of 91 OX-350I User Manual Rev1.2 Name Description
7 MHz
10 MHz Valid Band Info using the valid band range, the frequency setting will be Valid band information. If the frequencies arent located Add OK Save Cancel rejected. The "Add" button will allow user to enter more frequency lists Click the "OK" button to exit table edit mode Commit the changes made and save to CPE Reset fields to the last saved values Table 4 Field definition for WiMAX>Scanner 4.2. Authentication Figure 11 WiMAX>Authentication(No authentication) Page 26 of 91 OX-350I User Manual Rev1.2 Page 27 of 91 Figure 12 WiMAX>Authentication(User authentication) OX-350I User Manual Rev1.2 Name Authentication Description The method used in authentication.
No Authentication Authentication Mode
User Authentication
Device Authentication
User and Device Authentication Data Encryption AES-CCM Data Encryption AES-CBC Enable MSs capability of encrypting/decrypting traffic by AES-CCM. Enable MS's capability of encrypting/decrypting traffic by AES-CBC. Key Encryption AES-key Enable MS's capability of decrypting TEK by wrap AES-Key wrap. Key Encryption AES-ECB EAP Supplicant Enable MS's capability of decrypting TEK by AES-ECB. EAP Mode The EAP method used in authentication Anonymous ID The identity encoded in EAP Identity Response message. User needs to fill the Outer ID at this field. Server Root CA Cert. File The root CA's X.509 certificate. Server Root CA Cert. Info The root CA's certificate information. MTK-Authorized Device Cert. File MTK-Authorized Device Cert. Info Device Private Key The MS's X.509 certificate. The root MS's certificate information. The MS's private key file corresponding to the public key enhanced in x.509 certificate Device Private Key Info The MS's private key information. Device Private Key Password Inner Mode The key used to decrypt the MSs private key file The EAP-TTLS inner method Page 28 of 91 OX-350I User Manual Rev1.2 Description The user name used in EAP-TTLS inner method The password used in EAP-TTLS inner method. Name User name Password Options Enable Auth Mode Decoration in EAP Outer ID Enable Service Mode puts {am=i} in EAP outer ID i = 1: user authentication i = 2: device authentication i = 3: user & device authentication Decoration in EAP Outer puts {sm=1} in EAP outer ID ID Random Outer ID the user name in the EAP Identity Response Enable MS to generate 16-bytes random number as Ignore Cert Verification Same EAP Outer ID in ReAuth message. MS skips to verify the BS's certificate received in the EAP-TLS or EAP-TTLS procedure. Use the same EAP outer ID when doing re-auth MAC address in EAP-TLS Add MAC address in outer ID when EAP mode is outer ID EAP-TLS Delete existed Root Certificate file Remove the files loaded from UI Delete existed Device Delete device certificate file which was uploaded in Certificate file the field MTK-authorized Device Certificate Delete existed Private Key Save Cancel Delete device private key which was uploaded in the field Device Private Key Commit the changes made and save to CPE Reset fields to the last saved values Table 5 Field definition for WiMAX>Authentication 4.3. Wide Scan The Wide Scan function is used for scanning BS based on scanning rule. User Page 29 of 91 OX-350I User Manual Rev1.2 can set the scan rule with defining start, stop frequency, step, and channel bandwidth, and CPE will base on this rule to scan the BS as shown in Figure 13. The definition for each field is shown on Table 6. Figure 13 WiMAX>Wide Scan Name Description Wide Scan Settings Auto Wide Scan Scan Wide Range Add OK Select Yes to do wide scan automatically when there are no available BS User can specify the wide scan range to reduce search time Click the "Add" button to create a new wide scan range Click the "OK" button will exit the table edit mode Wide Scan Result Search Clear Show the result of wide scan. Search button can trigger wide scan Clear button clear current search result Save/Cancel Save/Cancel current setting Table 6 Field definition for WiMAX>Wide Scan Page 30 of 91 OX-350I User Manual Rev1.2 5. Networking Refer to Figure 14 for proper network connection. Figure 14 Network Topology 5.1. Bridge/NAT mode 5.1.1. LAN From the Networking>Bridge/NAT mode>LAN window, user can update the LAN information as shown in Figure 15. The definition for each field is shown on Table 7. Figure 15 Networking>Bridge/NAT mode>LAN Name LAN TCP/IP Description Page 31 of 91 OX-350I User Manual Rev1.2 Name Description IP Address IP address of CPE IP Subnet Mask Subnet Mask of CPE Save Cancel Commits the changes made, and set the LAN IP information, some services will be reloaded. Reset the fields to the last saved values Table 7 Field definition for Networking>Bridge/NAT mode>LAN 5.1.2. WAN In Figure 16, it demonstrates how to configure WAN settings on CPE web page. The definition for each field is shown on Table 8. Figure 16 Networking>Bridge/NAT mode>WAN Page 32 of 91 OX-350I User Manual Rev1.2 Name WAN IP Description Operation Mode NAT Type WAN Protocol Bridging LAN ARP Select the WAN operation mode
Bridge
Routing
NAT Select the NAT Type
Symmetric,
Full cone,
Restricted cone,
Port-Restricted cone, Select the WAN encapsulation protocol
Ethernet
PPPoE
GRE Tunnel
EtherIP Tunnel Allow Bridging LAN ARP
Yes
No Select the IP method Get IP Method
From ISP
User The time the DHCP client waits to receive the IP address from the BS. If it doesnt get the IP, it will WAN IP Request timeout and the CPE will disconnect the WiMAX Timeout connection. The default value is 120 seconds. If user enters 0, it will wait to receive the IP address infinitely until its stopped by the user. If user chooses Static for IP Method, user should enter the WAN IP address If user chooses Static for IP Method, user should enter the WAN IP subnet mask. If user chooses Static for IP Method, user should enter IP gateway address Enter the MTU WAN IP Address WIN IP Subnet Mask Gateway IP Address MTU Page 33 of 91 OX-350I User Manual Rev1.2 Name WAN DNS Description First DNS Server User can specify three DNS servers and select how the DNS Server is assigned. There are three options for assigning the DNS server. Second DNS Server
From ISP
User Defined Third DNS Server If user selects User Define, user needs to enter a valid Save IP address for the DNS server. Commit the changes made and save to CPE, after clicking the Save button user will get a message asking if user wants to reboot the CPE. Reboot is necessary for the device to switch to a different profile. Cancel Reset field to the last saved values Table 8 Field definition for Networking>Bridge/NAT mode>WAN 5.1.3. PPPoE In Figure 17, it demonstrates how to configure PPPoE on CPE web page. The definition for each field is shown on Table 9. Page 34 of 91 OX-350I User Manual Rev1.2 Figure 17 Networking>Bridge/NAT mode>PPPoE Name PPPoE User Name Description The user name to connect PPPoE server via the selected Auth Protocol Password The password of the corresponding username Retype Password Type the Password again The authentication protocol of the peer required. Select which Authentication protocol to use. Auth Protocol
PAP
CHAP
MSCHAPv1
MSCHAPv2 Encryption Scheme
No Encryption
MPPE 40 bits: 40-bit encryption with MPPE
MPPE 128 bits: 128-bit encryption with MPPE
Auto: automatically selected Page 35 of 91 Name Idle Timeout AC Name DNS Overwrite MPPE_Stateful OX-350I User Manual Rev1.2 Description Disconnect if the link is idle for the assigned seconds The name of the access concentrator to connection to
Yes
No
Yes
No Connection Trigger
Always On
Manual Connection Timeout Save Time to attempt to connect, if connection attempt fails after that time it will halt attempting to connect Commit the changes made and save to CPE, after clicking the Save button user will get a message asking if user wants to reboot the CPE. Reboot is necessary for the device to switch to a different profile. Cancel Reset field to the last saved values Table 9 Field definition for Networking>Bridge/NAT mode>PPPoE 5.1.4. GRE In Figure 18, it demonstrates how to configure GRE on CPE web page. The definition for each field is shown on Table 9. Figure 18 Networking>Bridge/NAT mode>GRE Name GRE Peer Description Peer IP Address Enter the IP address of its GRE Peer Page 36 of 91 OX-350I User Manual Rev1.2 Name Save Cancel Description Commit the changes made and save to CPE Reset fields to the last saved values Table 10 Field definition for Networking>Bridge/NAT mode>GRE 5.1.5. EtherIP In Figure 19, it demonstrates how to configure EtherIP on CPE web page. The definition for each field is shown on Table 9. Figure 19 Networking>Bridge/NAT mode>EtherIP Name Description EtherIP Tunnel Bridge Peer IP Address Enter the IP address of its EtherIP Peer Save Cancel Commit the changes made and save to CPE Reset fields to the last saved values Table 11 Field definition for Networking>Bridge/NAT mode>EtherIP 5.1.6. VLAN In Figure 20Figure 17, it demonstrates how to configure VLAN on CPE web page. The definition for each field is shown on Table 12. Page 37 of 91 OX-350I User Manual Rev1.2 Figure 20 Networking>Bridge/NAT mode>VLAN Name VLAN Utility Enable VLAN Port Settings Description Set the WAN mode to Bridge to allow VLAN to be enabled, otherwise it will be disabled. Enter the number of interfaces displayed per page, if there are more than can be the number given, then you Display per page can use the navigation buttons to go to the next page. Number of allowed display per page are as follows: 10, 20, 30, 50, 80, 100. Edit Mode To edit any of the editable fields you need to click on the field you want to edit, all the available editable field for Page 38 of 91 OX-350I User Manual Rev1.2 Name Description OK Click the OK button to exit edit mode. that entry will be available for editing. Filter Setting Display per page Same as Port Settings Display per page. Edit Mode field you want to edit, all the available editable fields for To edit any of the editable fields you need to click on the Add OK Save Cancel that entry will be available for editing. Click the Add button to add a new entry. Click the OK button to exit edit mode. Commit the changes made and save to CPE. Reset field to the last saved values Table 12 Field definition for Networking>Bridge/NAT mode>VLAN 5.1.7. QoS In Figure 21, it demonstrates how to configure QoS on CPE web page. The definition for each field is shown on Table 13. Figure 21 Networking>Bridge/NAT mode>QoS Name Description Port Settings exit edit mode by clicking the OK button. Priority levels Click on any of the fields to enable edit mode. User can allowed are from 1-6. Page 39 of 91 OX-350I User Manual Rev1.2 Name OK Save Cancel Description Exit the edit mode. Commit the changes made and save to CPE, Reset field to the last saved values Table 13 Field definition for Networking>Bridge/NAT mode>QoS 5.2. Firewall In networking, firewalls are used to block un-wanted traffic. It will prevent unauthorized devices to enter a trusted network. 5.2.1. HTTP Figure 22 Networking>Firewall>HTTP Name HTTP Server Enable Description Check the box to allow http connections. Port Number Enter the http port number (default is port 80) Page 40 of 91 OX-350I User Manual Rev1.2 Name HTTPS Server Enable Description Check the box to allow https connections. Port Number Enter the https port number (default is port 443) HTTP and HTTPS Allow Connection from WAN Save Cancel Check the check-box to allow connections from WAN. Commit the changes made and save to CPE. Reset fields to the last saved values. Table 14 Field definition for Networking>Firewall>HTTP 5.2.2. TELNET Figure 23 Networking>Firewall>TELNET Name TELNET Server Enable Port Number Description Check the box to allow Telnet connections. Enter the Telnet port number (default is port 23) Allow Connection from Check the check-box to allow connections from WAN WAN. Allow Connection from Check the check-box to allow connections from LAN Save Cancel LAN. Commit the changes made and save to CPE. Reset fields to the last saved values. Page 41 of 91 Table 15 Field definition for Networking>Firewall>TELNET OX-350I User Manual Rev1.2 5.2.3. SSH Figure 24 Networking>Firewall>SSH Name SSH Server Enable Port Number Description Check the box to allow SSH connections. Enter the SSH port (default is port 22) Allow Connection from Check the check-box to allow connections from WAN WAN. Allow Connection from Check the check-box to allow connections from LAN Save Cancel LAN. Commit the changes made and save to CPE. Reset fields to the last saved values. Table 16 Field definition for Networking>Firewall>SSH 5.2.4. DMZ DMZ stands for Demilitarized Zone. It is a physical or logical sub-network that contains and exposes an organization's external services to a larger un-trusted network, usually the Internet. The term is normally referred to as a DMZ by IT professionals. It is sometimes referred to as a Perimeter Network. The purpose of a DMZ is to add an additional layer of security to an organization's LAN; an Page 42 of 91 OX-350I User Manual Rev1.2 external attacker only has access to equipment in the DMZ, rather than any other part of the network. The Networking>Firewall>DMZ tab allows user to configure a DMZ host IP address as shown in Figure 25. In DMZ Settings, user needs to enter the IP address of the DMZ host. The Save button will save the changes to CPE and the Cancel button will reset the field to last saved value. It will disable DMZ host when entering 0.0.0.0. Figure 25 Networking>Firewall>DMZ 5.2.5. IP Filiter The IP filter rules will drop or discard traffic that fits the filter criteria. User can define IP filter rules as shown in Figure 26. The definition for each field is shown on Table 17. Figure 26 Networking>Firewall>IP Filter Name Description IP Filter Rules Page 43 of 91 OX-350I User Manual Rev1.2 Name Add OK Active Description Click the "Add" button to create a new IP Filter rule Click the "OK" button will exit the table edit mode Check the box to activate the IP Filter rule Source IP Source IP to filter on. It can be in one of the following formats:
IP address (ex. 192.168.0.222) Subnet (ex. 192.168.1.0/24) IP range (ex. 192.168.0.150~192.168.0.160) 0.0.0.0/0 means any Source Port Source Port to filter on. It can be one of the following formats:
Port number (ex. 8080) Port Range (ex. 1024~2048) Destination IP Destination IP to filter on. It can be in one of the following formats:
IP address (ex. 192.168.0.222) Subnet (ex. 192.168.1.0/24) IP range (ex. 192.168.0.150~192.168.0.160) 0.0.0.0/0 means any Destination Port Destination port to filter on. It can be one of the following formats:
Port number (ex. 8080) Port Range (ex. 1024~2048) Protocol to filter on Delete the IP Filter rule Commit the changes made and save to CPE Reset fields to the last saved values Table 17 Field definition for Networking>Firewall>IP Filter Protocol Trash Save Cancel 5.2.6. MAC Filiter The MAC filter rules will drop or discard traffic that the filter criteria. User can define MAC filter rules as shown in Figure 27. The definition for each field is Page 44 of 91 shown on Table 18. OX-350I User Manual Rev1.2 Figure 27 Networking>Firewall>MAC Filter Name MAC List Description Blacklist/Whitelist Blacklist or Whitelist MAC Filter Rules Active Enable/Disable this rule Source MAC Source MAC address of filter rule Destination MAC Destination MAC address of filter rule Day of the Week What day to activate the rule Start Time End Time Trash Add OK Save Cancel What time to start Rule Activated period Delete the MAC Filter rule Click the "Add" button to create a new MAC Filter rule Click the "OK" button will exit the table edit mode Commit the changes made and save to CPE Reset fields to the last saved values Table 18 Field definition for Networking>Firewall>MAC Filter Page 45 of 91 OX-350I User Manual Rev1.2 5.2.7. URL Filiter Content Filter is used to filter WWW traffic by URL. Currently, the white/black list is maintained by OpenDNS (http://www.opendns.com). If user wants to use this function, an OpenDNS account should be applied first. Figure 28 Networking>Firewall>URL Filter Name URL List Description Enable Content Filter Check the check box to enable Content Filter Blacklist/Whitelist Select Blacklist or Whitelist URL Filter Rules Add Trash Save Cancel Add a new URL filter rule Delete a URL filter rule Commit the changes made and save to CPE Reset fields to the last saved values Table 19 Field definition for Networking>Firewall>URL Filter Page 46 of 91 OX-350I User Manual Rev1.2 5.3. DHCP Server Use the Networking> DHCP Server tab to configure the DHCP server information. The default DHCP Server setup is enabled, and user could disable this function from setup as shown in Figure 29. When user disables the DHCP server, it requires setting a static IP address on host PC for CPE to configure. Please be noted that without the static IP address set properly on the host PC, user can not open the CPE web page for configuration. When DHCP server is enabled, user needs to define the IP pool range for dynamically assigning the IP address. The advantage of using DHCP server is that the addresses which are no longer in use will be returned to the IP address pool so that the server can reallocate them to other machines in the network. There are three DNS servers the user can configure to assign an IP address. Static DHCP will assign an IP address on the LAN to a specific device based on its MAC address. The definition for each field is shown on Table 20. Page 47 of 91 OX-350I User Manual Rev1.2 Figure 29 Networking>DHCP Server Name Description DHCP Server DHCP Mode Select DHCP mode:
None: disable DHCP mode.
Server: enable DHCP server mode
Relay: enable DHCP relay mode DHCP start IP Starting IP address range address Page 48 of 91 OX-350I User Manual Rev1.2 Name Description DHCP end IP address Ending IP address range The lease time is a controlled time period, allowing the DHCP server to reclaim (and then reallocate) IP Lease Time addresses that are not renewed (dynamic re-use of IP addresses). Lease time is measured in minutes in the Configuration Manager. Relay IP Enter the IP address of DHCP relay. DNS Server assigned by DHCP Server User can specify three DNS servers and select how the DNS Server is assigned. There are three options for First DNS Server assigning the DNS server.
From ISP
User Defined
None Second DNS Server If user selects None, then the DHCP server will not give Third DNS Server Static DHCP Static DHCP Add OK DHCP Leased Hosts DHCP Leased Hosts Save Cancel clients the DNS server information. If all the three DNS servers setting are set to None, then the DHCP server will use the LAN IP address as the DNS server information for the clients. If the user chooses User Defined and leaves the IP address as 0.0.0.0 it will change the field to None. Enter MAC address and IP address for static DHCP addresses. Click on the Add button to enter a static leased IP address. Enter the MAC address of the Ethernet device and enter the IP address. Click the OK button to exit out of edit mode. List of Leased IP addresses. The Refresh button will display an updated list of leased addresses. Commit the changes made and save to CPE, some services will be reloaded. Reset fields to the last saved values. Page 49 of 91 Table 20 Field definition for Networking>DHCP Server OX-350I User Manual Rev1.2 5.4. NAT ALG There are some ALG settings that user can enable from Networking>NAT ALG. ALG allows legitimate application traffic to pass through the CPE that would have otherwise restricted. Without ALGs, some application may not work well because of NAT/firewall settings. User could click on the check box to enable ALGs. Note: If user is using any of these types of application protocols user needs to enable them in the ALG settings.
FTP ALG
H.323 ALG
IPsec ALG
L2TP ALG
PPTP ALG
RTSP ALG
SIP ALG
SIP Port
SIP ALG Set BSID Figure 30 Networking>NAT ALG Page 50 of 91 OX-350I User Manual Rev1.2 5.5. Forwarding Forwarding is the act of forwarding the data from WAN side to the particular port of the private IP. This function can allow remote computers to reach a port on a private IP address within a private LAN. In the following, it will introduce how to setup for Port Forward. First, user needs to click the Add button and then select which forward type, TCP or UDP or TCP/UDP, is preferred to trigger the special application as shown in Figure 31 and Figure 32. User needs to assign some specific port for the WAN IP to be forwarded to the defined LAN IP and port, and then click the Save button to add a Port Forward rule. The definition for each field is shown on Table 21. Figure 31 Networking>Forwarding Figure 32 Networking>Forwarding>Wizard Page 51 of 91 OX-350I User Manual Rev1.2 Name Description Port Forwarding Rules Active Name Protocol Incoming Port(s) Check the box to active the port forward rule Name of the port forward rule User needs to define the desired protocol for rule. Available options are: TCP, UDP, or TCP/UDP User needs to define incoming port range for port forwarding rule. Forward Port(s) translated for port forwarding rule. The packet will be User needs to define to which port range will be forwarded to one of these ports if it matches the rule. User needs to define which IP address will be translated Server IP to if it matches the Port Forwarding rule. The packet will Trash Wizard Add OK Save Cancel be forwarded to this IP address if it matches the rule. Delete the Port Forward rule Click the Wizard button to go to the Port Forward Rule Wizard Click the Add button to create a new Port Forward rule Click the OK button to exit table edit mode Commit the changes made and save to the CPE Reset field to the last saved values. Table 21 Field definition for Networking>Forwarding 5.6. Trigger The Networking>Trigger allows user to configure Port Trigger rules. Port Trigger is a way to automate port forwarding in which outbound traffic on predetermined ports (trigger port) causes inbound traffic to specific incoming ports to be dynamically forwarded to the initiating host, while the outbound ports are in use. This allows users behind CPE on the LAN to provide services that would normally require the computer to have IP address on the LAN. Port triggering triggers an open incoming port (open port) when a client on the local network makes an outgoing connection on a predetermined port or range of ports. The definition for each field is shown on Table 22. Page 52 of 91 OX-350I User Manual Rev1.2 Figure 33 Networking>Trigger Figure 34 Networking>Trigger>Wizard Name Description Port Triggering Rules Active Name Check the box to active the Port Trigger rule Name of the Port Trigger rule Trigger Protocol trigger the rule. Available options are TCP, UDP or It defines which protocol the outgoing packet used will TCP/UDP Trigger Port(s) trigger the rule. User needs to enter the starting and It defines which port range the outgoing packet will ending port range Open Protocol It defines which protocol will be opened if the rule had Page 53 of 91 OX-350I User Manual Rev1.2 Name Description been triggered. Available options are TCP, UDP or TCP/UDP Open Port(s) had been triggered. User needs to enter the starting and It defines which protocol port will be opened if the rule Trash Wizard Add OK Save Cancel ending port range Delete the Port Trigger rule Click the Wizard button to go to the Port Trigger Rule Wizard Click the Add button to enter a Port Trigger rule Click the OK button to exit, table edit mode. Commit the changes made and save to the CPE Reset fields to the last saved values Table 22 Field definition for Networking>Trigger 5.7. DDNS DDNS stands for Dynamic Domain Name Services. It provides a function to convert the domain name to the unique IP address. With DDNS, users is able to find and connect to CPE no matter what IP address CPE is currently using, that is, DDNS can map CPE's dynamic IP address to a static hostname. The best profit of this function allows user to access CPE from everywhere. In Figure 35, it demonstrates how to configure DDNS on CPE web page. The definition for each field is shown on Table 23. Page 54 of 91 OX-350I User Manual Rev1.2 Figure 35 Networking>DDNS Name Description DDNS Profile Enable Dynamic DNS Click the check box to enable dynamic DNS Service Provider Enter the URL of the Service Provider Enter the service type (DYNDNS only) Service Type*
Dynamic
Static
Custom Domain Name Enter the domain name Login Name Password Enter the username Enter the password IP Update Policy User Defined IP Select the Policy to be used
Auto Detect
WAN IP
User Defined If user selects User Defined as the IP policy, user has to enter the IP address. Wildcards*
Allow hostname to use wildcards such as *. It will allow Page 55 of 91 OX-350I User Manual Rev1.2 Name Description
*host.dyndns.org to be aliased to the same IP address MX*
Backup MX*
MX Host*
Save Cancel as host.hyndns.org Enable mail routing Enable Second mail routing Host that mail will be routed to Commit the changes made and save to CPE Reset fields to the last saved values Note: * Supported by DYNDNS service provider. Table 23 Field definition for Networking>DDNS 5.8. UPnP Two methods of simplifying the process of connecting a device to the network are available as shown in Figure 36. UPnP allows devices to connect seamlessly to networks in the home (data sharing, communications, and entertainment) and in corporate environments for simplified installation of computer components. NAT Port Mapping Protocol (NAP-PMP) allows a computer in a private network (behind a NAT router) to automatically configure the router to allow parties outside the private network to contact itself. The definition for each field of UPnP Setting is shown on Table 24. Figure 36 Networking>UPnP Name Description UPnP Service Enable UPnP Check the check box to enable UPnP Page 56 of 91 OX-350I User Manual Rev1.2 Name Description Enable NAT-PMP Check the check box to enable NAT-PMP Save Cancel Commit the changes made and save to CPE Reset fields to the last saved values Table 24 Field definition for Networking>UPnP 5.9. Ping Figure 37 Networking>Ping Name Ping Description IP Address The destination IP address for ping test. It can be in one of the following formats:
IP address (ex. 165.21.83.88)
Domain name (ex. www.google.com) Ping Commit the ping test request Table 25 Field definition for Networking>Ping Page 57 of 91 OX-350I User Manual Rev1.2 6. Management 6.1. TR-069 Using TR-069 the terminals can communicate with the Auto Configuration Servers
(ACS) and establish the configuration automatically. Its the current standard for activation of terminals in the DSL broadband market. Figure 38 Management>TR-069 Name Description Page 58 of 91 OX-350I User Manual Rev1.2 Name Description TR-069 Configuration Enable To enable or disable the TR-069 activity on the CPE. Fixed Client Port To specify fixed client port ACS Server URL The ACS URL for CPE to connect to. Bootstrap Enable Check the box to enable bootstrap. ACS Username ACS Password The username for the CPE when connected to ACS. The password for the CPE when connected to ACS. Periodical Inform Enable To enable or disable the periodical inform to ACS for CPE. Periodical Inform Interval The interval between two periodical inform. Connection Request Enter the username for the ACS to perform Username connection request to CPE. Connection Request Enter the password for the ACS to perform Password connection request to CPE. CA Certificate File of ACS when D-230 communicated ACS with HTTPS The CA certificate file is used to identify the certificate URL. CA Certificate Info Displays the subject field of the CA Certificate. Client Certificate File The CLIENT certificate file is used when CPE communicates with HTTPS URL. Client Certificate Info Displays the subject field of the CLIENT Certificate. Save Cancel Commit the changes made and save to CPE. Reset fields to the last saved values. Table 26 Field definition for Management>TR-069 6.2. OMA-DM Using OMA DM the terminals can communicate with the OMA DM Server and establish the configuration automatically. Its the current standard for activation of terminals in OMA (Open Mobile Alliance). Page 59 of 91 OX-350I User Manual Rev1.2 Figure 39 Management>OMA-DM Name Description OMA DM Configuration Enable To enable or disable the OMA-DM activity of CPE. Server URL The DM Server URL for CPE to connect to. Server Port The DM Server Port for CPE to connect to. Server Auth Type The DM Server authentication type. Server ID The Server ID for CPE when connected to DM Server. Server Password The Server password for CPE when connected to DM Server. Server Nonce Server nonce used in authentication credential calculation. Client Auth Type The DM Client authentication type. Client ID The Client ID for CPE when connected to DM Server. Client Password The Client password for CPE when connected to DM Server. Page 60 of 91 OX-350I User Manual Rev1.2 Name Description Client Nonce Client nonce used in authentication credential calculation. Periodical Client-
To enable or disable the periodical client-initiated session to initiated Enable DM server for CPE. Periodical Client-
initiated Interval Save Cancel The interval between two periodical client-initiated sessions. Commit the changes made and save to CPE. Reset fields to the last saved values. Table 27 Field definition for Management>OMA-DM 6.3. SNMP Figure 40 Management>SNMP Name Description SNMP Daemon Enable applications to query and set some of the SNMP Checking the enable button will allow SNMP variables. Location Contact Enter the Location SNMP string variable. Enter the Contact SNMP string variable. Read Community Enter Read community string to query SNMP data. Page 61 of 91 OX-350I User Manual Rev1.2 Name Description Write Community Trap Server Enter Write community string to query SNMP variables. Enter the IP Address of trap server where user wants trap notifications to be sent to. Enter the Trap community to act as a password for Trap community sending trap notifications to the target SNMP manager. Save Cancel Commit the changes made and save to CPE. Reset fields to the last saved values. Table 28 Field definition for Management>SNMP 6.4. Log 6.4.1. Log Setting The Management>Log>Log Setting allows user to set the remote log configure. The Refresh button will clear the log window and display the most current system log information. Figure 41 Management>Log>Log Setting Name Enable Log Log Level Description Check the box to enable the log feature. Select the log level. Page 62 of 91 OX-350I User Manual Rev1.2 Name Description Enable Remote Log Enable / Disable transfer log to remote syslog server. Remote Log Host Location of the remote syslog server. Remote Log Port What port to use for remote logging. Save Cancel Commit the changes made and save to CPE. Reset fields to the last saved values. Table 29 Field definition for Management>Log>Log Setting 6.4.2. Log Display The Management>Log>Log Display will display system log output. The Refresh button will clear the log window and display the most current system log information. Figure 42 Management>Log>Log Display Page 63 of 91 OX-350I User Manual Rev1.2 6.5. Upgrade The Upgrade window allows user to upgrade the firmware on the device. Users can choose to upgrade the firmware by entering the file path. Note: After pressing the Upgrade button. It will automatically reboot the CPE and upgrade the firmware with the specified file. User will be prompted to login to CPE after the upgrade is complete. 6.5.1. Upgrade File Figure 43 Management>Upgrade>Upgrade File Name Description Auto Upgrade Firmware Enable Auto FW Upgrade To enable or disable the Auto Upgrade Firmware of CPE. Upgrade Server Auto Firmware Update checking URL. Page 64 of 91 OX-350I User Manual Rev1.2 Name Description Upgrade Hour The service stating time. Upgrade The random period of sleep time before actually connection Random Time to server for checking and updating. The "Version File" in the URL.
"Version File" format :
Upgrade File 1st line : "firmware package version"
2nd line : "firmware package tar-ball" (in the same URL path) Save Cancel Commit the changes made and save to CPE. Reset fields to the last saved values. Upgrade Firmware Browse Enter the full path of the file user wants to upgrade. The browse button will help user to find the file on the server. Upgrade It will start upgrading the file Status The status bar will display which segment it's processing and what percentage of the upgrade has been completed. Table 30 Field definition for Management>Upgrade>Upgrade File 6.5.2. Upgrade Link Figure 44 Management>Upgrade>Upgrade Link Name Description Upgrade Firmware Upgrade Link Enter the complete URL path of the file that user wants to upgrade Upgrade It will start upgrading the file Page 65 of 91 OX-350I User Manual Rev1.2 Name Description Status processing and what percentage of the upgrade has The status bar will display which segment it's been completed. Table 31 Field definition for Management>Upgrade>Upgrade Link 6.5.3. CWMP Upgrade TR-069 technical specification entitled CPE WAN Management Protocol (CWMP). It defines an application layer protocol for remote management of end-user devices. Figure 45 Management>Upgrade>CWMP Upgrade Name Description Upgrade Firmware via CWMP Request Download Upgrade It will start upgrading Table 32 Field definition for Management>Upgrade>CWMP Upgrade 6.6. Recovery Recovery will set all the configurations back to factory defaults. Any configurations that user has made will be changed back to the factory default settings. After selecting Factory Default button, user will be prompted with a window to confirm or cancel the action. Warning: Restore factory defaults will clear any IP addresses and setting that may have been configured on the CPE. Page 66 of 91 6.6.1. Backup OX-350I User Manual Rev1.2 Figure 46 Management>Recovery>Backup Figure 47 File Download Page 67 of 91 OX-350I User Manual Rev1.2 Figure 48 Save File As Name Description Backup Configuration Backup Click the "Backup" button o save the current configuration on the CPE. After user clicks the
"Backup" button "File Download" window will pop-up and prompt user to save the file. In the "Save As"
window, enter the name and location, where user wishes to download the file to. Table 33 Field definition for Management>Recovery>Backup Page 68 of 91 6.6.2. Restore OX-350I User Manual Rev1.2 Figure 49 Management>Recovery>Restore Name Description Restore From File File Restore Enter the path of the configuration file user wants to restore. Click on the "Browse" button to help user to navigate through directories and search for the file. After user enters the complete file path, click the "File Restore" button. It will begin restoring the configuration from the file specified. Restore From URL Link URL Restore Enter the configuration URL path user wants to restore from. After entering the complete URL path, click the
"URL Restore" button. It will begin restoring the configuration from the URL location user specified. Table 34 Field definition for Management>Recovery>Restore Page 69 of 91 6.6.3. Factory Defaults OX-350I User Manual Rev1.2 Figure 50 Management>Recovery>Factory Defaults Figure 51 Restore to factory reset warning Page 70 of 91 OX-350I User Manual Rev1.2 7. VPN VPN (Virtual Private Network) is a network that is implemented in an additional software layer on top of an existing larger network for the purpose of providing a secure extension of a private network into an insecure network such as the Internet. The links between nodes of a VPN are formed over logical connections or virtual circuits between hosts of the larger network. VPNs are often installed by organizations to provide remote access to a secure organizational network. Generally, a VPN has a network topology more complex than a point-to-point connection. VPNs are also used to mask the IP address of individual computers within the Internet in order, for instance, to surf the World Wide Web anonymously or to access location restricted services, such as Internet television. Here, VPN Settings allow user to set rules for VPN, and it supports PPTP, L2TP, and IPsec. 7.1. PPTP The Point-to-Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks. PPTP does not provide confidentiality or encryption; it relies on the protocol being tunneled to provide privacy. 7.1.1. PPTP Server A PPTP Server (Point-To-Point Tunneling Protocol) allows user to connect securely from a place (such as the house) to a LAN located in another location, such as the office. This way user can use the services provided in the office at the comfort of the house. The definition for each field of PPTP Server is shown on Table 35. Page 71 of 91 OX-350I User Manual Rev1.2 Figure 52 VPN>PPTP>PPTP Server Name PPTP Server Enable Description Activate PPTP server. Server Name Offer a service name Auth Protocol Require the peer to authenticate itself before allowing network packets to be sent or received. We support the following protocol:
PAP: Password Authentication Protocol Page 72 of 91 Name Description OX-350I User Manual Rev1.2
CHAP: Challenge Handshake Authentication Protocol
MSCHAP: Microsoft Challenge Handshake Authentication Protocol
MSCHAPv2: Microsoft Challenge Handshake Authentication Protocol, Version 2 Encryption Scheme:
No Encryption
MPPE 40 bits: 40-bit encryption with MPPE
MPPE 128 bits: 128-bit encryption with MPPE
Auto: automatically select Local IP Address The IP of router Remote Start IP As sessions are established, IP addresses are assigned starting from Remote Start IP Idle Timeout Disconnect if the link is idle for the assigned seconds DNS Server 1 DNS Server 2 User Access List User name The primary DNS (Domain Name Server) addresses to clients The secondary DNS (Domain Name Server) addresses to clients User ID to connect PPTP server via the selected Auth Protocol Server Server protocol type Password Password to connect PPTP server via the selected Auth Protocol IP address IP address of the connected client Connection List User name The user name of the connection Remote IP address The peer address of the connection PPTP IP address The assigned IP address of PPTP Login Time Link Time(s) Save Cancel The time of the connection created Timer from the connected time Commit the changes made and save to the CPE Reset fields to the last saved values Page 73 of 91 Table 35 Field definition for VPN>PPTP>PPTP Server OX-350I User Manual Rev1.2 7.1.2. PPTP Client User could setup PPTP Client as shown in Figure 53 and Figure 54. The definition for each field of PPTP Client is shown on Table 36. Figure 53 VPN>PPTP>PPTP Client Figure 54 VPN>PPTP>PPTP Client>Add Name Description Page 74 of 91 Name PPTP Client Add Edit Edit PPTP Client Profile Name NAT Mode?
OX-350I User Manual Rev1.2 Description Add a new connection setting Edit the existed connection setting The name for this connection setting Enable or disable NAT when connected to PPTP server.
Yes: enable
No: disable The Authentication protocol of the peer required. Select which Authentication protocol to use. Auth Protocol
PAP
CHAP
MSCHAPv1
MSCHAPv2 Encryption Encryption scheme Server IP Address The IP address of PPTP server Username The user ID to connect PPTP server via the selected Auth Protocol Password Retype The password of the corresponding user ID Type the Password again Get IP automatically?
Obtain the dynamic IP address, assigned by the PPTP server Assign IP Address Assign the static IP address for this connection setting Idle Timeout Disconnect if the link is idle for the assigned seconds MPPE_Stateful Allow MPPE to use stateful mode. Stateless mode is still attempted first. The default is to disallow stateful mode. Save Cancel Commit the changes made and save to CPE Reset fields to the last saved values Table 36 Field definition for VPN>PPTP>PPTP Client 7.2. L2TP In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol Page 75 of 91 OX-350I User Manual Rev1.2 used to support virtual private networks (VPNs). It does not provide any encryption or confidentiality by itself. It relies on an encryption protocol that it passes within the tunnel to provide privacy. The entire L2TP packet, including payload and L2TP header, is sent within a UDP datagram. It is common to carry Point-to-Point Protocol (PPP) session within an L2TP tunnel. L2TP does not provide confidentiality or strong authentication by itself. IPsec is often used to secure L2TP packets by providing confidentiality, authentication and integrity. 7.2.1. L2TP Server User can setup CPE from web page as shown in Figure 55. The definition for each field of PPTP Server is shown on Table 37. Page 76 of 91 OX-350I User Manual Rev1.2 Figure 55 VPN>L2TP>L2TP Server Name L2TP Server Enable Description Check the check box to activate L2TP server. Server Name Enter a service name Support Version Protocol The supported protocol of L2TP messages
ALL: L2TPv2 and L2TPv3 Page 77 of 91 OX-350I User Manual Rev1.2 Name Description
2: L2TPv2 only
3: L2TPv3 only Auth Protocol Require the peer to authenticate itself before allowing network packets to be sent or received. The following protocols are supported:
PAP: Password Authentication Protocol
CHAP: Challenge Handshake Authentication protocol
MSCHAPv1: Microsoft Challenge Handshake Authentication Protocol
MSCHAPv2: Microsoft Challenge Handshake Authentication Protocol, Version 2 Encryption Scheme
No Encryption
MPPE 40 bits: 40-bit encryption with MPPE
MPPE 128 bits: 128-bit encryption with MPPE
Auto: automatically select Local IP Address The IP of router Remote Start IP As sessions are established, IP addresses are assigned starting from Remote Start IP Restrict Client IP?
To restrict client IP address range for the client Allow Client IP The IP address range for the client Idle Timeout DNS Server 1 DNS Server 2 User Access List User Name Disconnect if the link is idle for the given number of seconds The primary DNS (Domain Name Server) addresses to the clients The secondary DNS (Domain Name Server) addresses to the clients User ID to connect L2TP server via the selected Auth Protocol Server Server Protocol type Password Password to connect L2TP server via the selected Auth Protocol Page 78 of 91 OX-350I User Manual Rev1.2 Name Description IP Address IP address of the connected client Connection List User Name The user name of the connection Remote IP Address The peer address of the connection L2TP IP Address The assigned IP address of L2TP Login Time Link Time(s) Save Cancel The time of the connection created Elapsed time connected Commit the changes made and save to CPE Reset fields to the last saved values Table 37 Field definition for VPN>L2TP>L2TP Server 7.2.2. L2TP Client User could setup PPTP Client as shown in Figure 56 and Figure 57. The definition for each field of PPTP Client is shown on Table 38. Figure 56 VPN>L2TP>L2TP Client Page 79 of 91 OX-350I User Manual Rev1.2 Figure 57 VPN>L2TP>L2TP Client>Add Name L2TP Client Add Edit Edit L2TP Client Description Add a new connection setting Edit the existed connection setting Profile Name The name of this connection setting The message of L2TP protocol version for this L2TP Protocol Version connection setting
2: L2TPv2 only
3: L2TPv3 only Enable or disable NAT when connected to PPTP server NAT Mode?
Yes: enable
No: disable Auth Protocol The Authentication Protocol of the peer required. Select which Authentication protocol to use.
PAP
CHAP Page 80 of 91 OX-350I User Manual Rev1.2 Name Description
MSCHAPv1
MSCHAPv2 Encryption Encryption Scheme Server IP Address The IP address of L2TP server Username Password Retype Get IP Automatically?
The username to connect L2TP server via the selected Auth Protocol The password of the corresponding username Type the Password again Obtain the dynamic IP address, assigned by the L2TP server Assign IP Address Assign the static IP address for this connection setting Idle Timeout Disconnect if the link is idle for the assigned seconds MPPE_Stateful Allow MPPE to use stateful mode. Stateless mode is still attempted first. The default is to disallow stateful mode. Save Cancel Commit the changes made and save to CPE Reset fields to the last saved values Table 38 Field definition for VPN>L2TP>L2TP Client 7.3. IPsec Internet Protocol Security (IPsec) is an end-to-end security solution and operated at the IP Layer. It provides secure communication between pairs of hosts, pairs of security gateways or between security gateways and a host. Its based on a suite of protocols for securing IP traffic by authenticating and encrypting each IP packet of the data stream. Figure 58 VPN>IPsec Overview Page 81 of 91 OX-350I User Manual Rev1.2 Page 82 of 91 OX-350I User Manual Rev1.2 Figure 59 VPN>IPsec>Add Description Click the "Add" button to add an IPsec connection rule Enable IPsec connection. Name Add Property Enable Connection Name The name of the connection Connection Type Gateway Information Local Endpoint Interface Select the connection type
Initiator
On Demand
Responder The interface of the CPE public-network interface Local Endpoint IP The IP address or Domain Name of the CPE Address public-network interface Remote Endpoint IP Address Authentication Method Pre-Shared Key The IP address or Domain Name of the remote peer. The pre-share key that two security gateways use to authenticate States how the CPE should be identified for Local ID Type authentication IP: The CPE is identified by the assigned IP for authentication. The default value is 0.0.0.0. Content The IP address Remote ID Type Content IKE Phase 1 States how the remote peer should be identified for authentication IP: The remote peer is identified by the assigned IP for authentication. The default value is 0.0.0.0, and this means CPE will accept any IP. The IP address Page 83 of 91 OX-350I User Manual Rev1.2 Name Description Press the Add button to enter an Encryption and Authentication algorithm. Click the trash to remove the selected algorithm. Encryption Algorithm:
Proposal Add
DES
3DES
AES128
AES192
AES256 Authentication Algorithm:
MD5
SHA-1 Proposal OK Key Group Click the OK button to exit the table edit mode The DH group used to negotiate the IKE/ISAKMP SA. The period that the keying channel of a connection SA Life Time
(IKE/ISAKMP SA) should last before being renegotiated. Dead Peer Detection Enable or disable the Dead Peer Detection protocol
(DPD)
(RFC 3706) DPD Interval DPD Idle Try The time interval when R_U_THERE messages are sent to the peer. The retry counter for DPD. The timeout interval is "DPD interval" multiplied by "DPD Idle Try". After the timeout interval all connections to the peer are deleted if they are inactive. Local Network The private subnet behind the CPE. Single Address: The private subnet consisting of one IP Address Type address. Subnet address: The private subnet consisting within the subnet IP addresses. Start IP Address The only IP address allowed in the subnet Subnet Mask The netmask of the subnet (Subnet address) Local Port Restrict the traffic selector to a single protocol and/or port. Page 84 of 91 Name Description OX-350I User Manual Rev1.2
Any: No restriction
ICMP: Restrict the traffic selector to ICMP protocol.
TCP: Restrict the traffic selector to TCP protocol. If the port number is 0, all TCP port numbers are accepted.
UDP: Restrict the traffic selector to UDP protocol. If the port number is 0, all UDP port numbers are accepted. Remote Network The private subnet behind the remote peer. Address Type Single Address: The private subnet consisting of one IP address. Subnet address: The private subnet consisting of subnet IP addresses. Start IP Address The only IP address allowed in the subnet Subnet Mask The netmask of the subnet (Subnet address) Restrict the traffic selector to a single protocol and/or port.
Any: No restriction
ICMP: Restrict the traffic selector to ICMP protocol.
TCP: Restrict the traffic selector to TCP protocol. If the port number is 0, all TCP port numbers are accepted.
UDP: Restrict the traffic selector to UDP protocol. If the port number is 0, all UDP port numbers are accepted. The type of the connection:
Tunnel: signifying a host-to-host, host-to-subnet, or subnet-to subnet tunnel.
Transport: signifying host-to-host transport made. Whether authentication should be done as part of ESP encryption and/or separately using the AH protocol. Remote Port IPSec Proposal Encapsulation Mode Active Protocol Encryption Algorithm
NULL
AES128 Page 85 of 91 OX-350I User Manual Rev1.2 Name Authentication Algorithm Description
AES192
AES256
DES
3DES
MD5
SHA-1 SA Life Time set of encryption/authentication key for user packets) The time interval a particular instance of a connection (a should last, from successful negotiation to expiry. Perfect Forward Whether Perfect Forward Secrecy of keys is desired on Secrecy (PFS) the connection's keying channel. Save Cancel Commit the changes made and save to the CPE device Reset fields to the last saved values. Table 39 Field definition for VPN>IPsec>Add Page 86 of 91 8. Installation and Grounding OX-350I User Manual Rev1.2 Device Before installing the Outdoor CPE Device Before installing, it is important to comply with the precautions listed below.
It must be installed by qualified service personnel who are well-trained in the correct procedures for handling and installing the equipment.
Avoid installing or working on equipment in adverse weather conditions. Once it must be installed in adverse weather conditions, its necessary to well protect the equipment.
Do not install the device near overhead power lines or power circuits, or where the device can fall onto such power lines or circuits.
Do not disassemble the product. Opening or removing covers may expose you to electric shock. Warranty void if seal is broken.
Do not place or construct objects in close proximity to the device.
Be sure to check the supplied mounting accessory is correct as listed in Figure 60. Please be noted that the mounting kits should be used for the pole with diameter between 34 ~ 49 mm.
Under normal operating condition, it should be at least 60 cm away from the body of the user. Mounting Accessories:
Bracket with Tab: 1 pc Screws with length 35mm: 2 pcs Bracket W/L Tab: 1 pc Nuts: 3 pcs Arm Bracket: 1 pc Split Washers: 3 pcs Screws with length 60mm: 2 pcs Flat Washers: 3 pcs Lockwasher: 2 pcs Figure 60 Mounting accessory list Page 87 of 91 OX-350I User Manual Rev1.2 An Overview of the Outdoor CPE Device Installation Service personnel needs to follow the steps for installing Outdoor CPE Device 1. Pole-mounting or Wall-mounting the Outdoor CPE Device. 2. Grounding the Outdoor CPE Device 3. Connect the Outdoor CPE Device to PoE unit 4. Connect PC to PoE unit for configuring the Outdoor CPE Device 5. Connect the PoE unit to the power source to power up the Outdoor CPE Device 6. Use PC to configure the Outdoor CPE Device Pole-Mounting the Outdoor CPE Device In the following steps, it introduces how to pole-mounting the Outdoor CPE Device. 1. Assemble the mounting hardware brackets onto pole first: Take the Screws with 60mm length to pass through the Split washer and Flat washer in order, and then screw the Brackets together with nuts. 2. Use the Screw with 35mm length to attach the Outdoor CPE Device to the tab of the Bracket. Ensure the Lockwasher is located between the Brackets tab and the Outdoor CPE Devices tab. Be sure to orient the Outdoor CPE Device with the connector towards the bottom. Remember to orderly add the Split washer, Flat washer and Nuts as shown in Figure 61. Do not over-tighten before finishing the Outdoor CPE Device alignment. 3. Adjust the azimuth and elevation of the Outdoor CPE Device toward the direction of WiMAX Base Station location. 4. Tighten the screws to secure the Outdoor CPE Device tightly. It is not necessary to use Arm Bracket for pole-mounting. Arm Bracket is only used for wall-mounting. Page 88 of 91 Screw (35mm) Screw (60mm) Split washer Flat washer Bracket with Tab Bracket W/L Tab Nut OX-350I User Manual Rev1.2 Lockwasher Split washer Flat washer Nut Figure 61 Pole-Mount the Outdoor CPE Device Wall-Mounting the Outdoor CPE Device In the following steps, it introduces how to wall-mounting the Outdoor CPE Device. 1. Install the Bracket with tab on a wall by using two mounting screws appropriate for the walls construction material. The appropriate mounting hardware should be purchased directly from a local supplier. 2. Connect the Arm Bracket to Outdoor CPE Device with the 35mm length Screw, Lockwasher, Split washer, Flat washer, and Nut orderly as shown in Figure 62. Ensure the Lockwasher is located between the Brackets tab and the Outdoor CPE Devices tab. Do not over-tighten before finishing the Outdoor CPE Device alignment. 3. Secure the other side of Arm Bracket along with Lockwasher to the Brackets tab mounted on wall. Ensure that the bolt head is positioned in the socket of the Bracket. Do not over-tighten before finishing the Outdoor CPE Device alignment. 4. Adjust the azimuth and elevation of the Outdoor CPE Device toward the direction of WiMAX Base Station location. 5. Tighten the screws to secure the Outdoor CPE Device tightly. Page 89 of 91 OX-350I User Manual Rev1.2 Screw (35mm) Customer supplied screw Bracket with Tab Customer supplied screw Split washer Flat washer Nut Screw (35mm) Arm Bracket Lockwasher Split washer Flat washer Nut Lockwasher Figure 62 Wall-Mount the Outdoor CPE Device Grounding the Outdoor CPE Device Grounding the Outdoor CPE Device is essential to avoid serious injury to service personnel and damage to the Outdoor CPE Device. Please be noted that minimum #16 AWG wire with the color combination green-and-yellow should be used for the grounding. The following steps introduce how to ground the Outdoor CPE Device. 1. Remove the ground screw installed on the side of the Outdoor CPE Device, as shown in 2. Cut the required length of the grounFigure 63.d wire, and then strip the insulation from the ground wire by using either a wire cutter/stripper or utility knife. 3. Crimp the ground wire to the copper cable lug, and then connect the cable lug to the grounding connection on the side of the Outdoor CPE Device. Please be noted that the thickness of the cable lug should be less than 0.85mm. 4. Tighten the screw by using the appropriate size and type of screw driver to secure the copper cable lug to the Outdoor CPE Device. 5. Strip the other end of the ground wire and connect to the main ground Page 90 of 91 OX-350I User Manual Rev1.2 Copper Cable Lug Grounding Screw Ground Wire to Earth Figure 63 Connect the ground wire Page 91 of 91
1 | Label sample & location | ID Label/Location Info | 116.19 KiB | June 10 2011 / April 11 2011 |
MTI Group Proprietary Information Any unauthorized use, duplication, reproduction,or disclosure of this document may be considered as infringement of MTI Group's intellectual property rights. The infringer may be accused and liable for applicable legal penalties. OX-350I Series Label Drawing Rev.A03 Date: 21-Sep.-2011 Frequency Range : FCC 3650~3700MHz, CE 3300~3800MHz OX-350I W9V-OX350I-GP OX-350I W9V-OX350I-GP MTI Group CODE DWG TITLE SIZE A3 DWG NO. SCALE 1:1 WiMAX 3.5GHz Outdoor CPE Label Drawing OX-350I Label Drawing REV A03 SHEET 1 OF 1
1 | Unrestricted protocal | Attestation Statements | 1.47 MiB | June 10 2011 / April 11 2011 |
J)PureWave networks To FCC, 2660-C Marine Way
.Mountain View, CA 94043 pwnets.com Tel: (650) 528-5200 Fax: (650) 528-5222 This is with regard to Green Packet OX350I device (proposed FCC 10: W9V-OX350I-GP) for FCC grant of3675 3700MHz range. FCC contends that FCC may grant certification of 802.16e outdoor subscriber device in the 3675 3700MHz range only if it supports "Listen Mode" to minimize interference;
transmitters Umestricted Certification under Part 90Z (3650-3700 Band) ofFCC Publication 552295. in the region and thereby postpone or terminate transmission to avoid interference, in compliance with that is, unless it has the ability to detect other In fact, an 802.16e subscriber device will never make its own decisions about when to transmit. it is connected schedules those transmissions the FCC for Umestricted Operation in the 3650-3700 Band will schedule its own as well as subscriber device transmissions only when no competing transmissions Detailed descriptions used for the certification process are contained in Pure Wave Networks Contention Based Algorithm (attached). In simplified terms, a base station certified by and will for potentially interfering transmissions, are detected. in both frequency and time. The base station to which
'listen'
In other words, operation protocol will together perform in compliance with Umestricted Operation under Part 90Z (3650-3700 Band) of FCC Publication 552295. the combination of the standard 802.16e subscriber device with a base station running this umestricted transmit power and other RF parameters must additionally comply with the FCC regulations Of course, 3700MHz band. Assuming a subscriber device meets that criterion across the entire 3650-3700 band, we do not see any reason why it should not be FCC certifiable over that entire band. This is because a network legally operating from 3650 3700MHz must employ base station(s) that are FCC certified for Umestricted Operation. for the entire 3650 We hope this helps to clarifY things. in the 3650-3700 Band for our PureWave Quantum 6636 and 2236 Base Stations (FCC 10: XN3-QUANTUM6636). FCC administrative should complete within 3-4 weeks. approval and will provide an updated certificate which covers the 3650~3700 band very soon. review was completed on Aug 29 and it is now pending technical The existing certificate and datasheet are attached. We expect is in the fmal stages of certification for Umestricted Operation review, which in our experience Pure Wave Networks to be granted We look forward to being able to deploy our base stations in the entire 3650-3700MHz OX350I outdoor subscriber devices. band along with Greenpacket's g rdS,! .~!~
lcker, Ph.D.
:]st Chief Technical Officer, PureWave Networks 2660-C Marine Way Mountain View, CA 94043 Sep 1S\ 2011 PureWave Quantum Family Contention Based Algorithm 1) INTRODUCTION PureWave Networks develops high performance, compact outdoor base stations for the 4G marketplace. PureWave Networks is the only company that utilizes smart antenna technology to achieve the coverage and capacity of a macro base station in a small form factor that can be deployed anywhere. Our solutions are versatile enough to be deployed for small cell urban coverage or for macro base station rural coverage. PureWave Networks is submitting this document as part of the FCC certification for PureWave Quantum family of base stations. These base stations are sharing the same software and should all be certified together. Specifically the implementation will be used in the 3675-3700MHz band. 2) BACKGROUND FCC opened up the availability of a frequency range of 3.650 to 3.700 GHz in the United States as a semi-licensed band. Each User is required to register and specify the frequency, location of operation but any user is allowed to operate the spectrum. In order to allow a fair chance of operation of any user FCC defined the contention based mode of operation in order to give equal chance for any user to utilize the spectrum. 3) DEFINITION OF CONTENTION BASED PROTOCOL A protocol that allows multiple users to share the same spectrum by defining the events that must occur when two or more transmitters attempt to simultaneously access the same channel and establishing rules by which a transmitter provides reasonable opportunities for other transmitters to operate. Such a protocol may consist of procedures for initiating new transmissions, procedures for determining the state of the channel (available or unavailable), and procedures for managing retransmissions in the event of a busy channel. Contention-based protocols shall fall into one of two categories:
1 2 PUREWAVE QUANTUM FAMILY
(1) An unrestricted contention-based protocol is one which can avoid co-frequency interference with devices using all other types of contention-based protocols.
(2) A restricted contention-based protocol is one that does not qualify as unrestricted. WiMAX based products using a scheduled protocol fall under the restricted definition. Those are allowed to use only the lower end of the 3.65GHz spectrum and are given only 25 MHz of spectrum (3.650-3.675GHz). PureWave Quantum family was certified to support that area of the band. WiFi like products using a CSMA/CA contention based protocol are allowed to use the entire 50MHz (3.650-3.700GHz) band if they meet the criteria. The products need to conform to FCC part 90. 4) TYPE OF CONTENTION BASED PROTOCOL USED BY QUANTUM FAMILY OF PRODUCTS In order to enable the users to utilize the whole 50MHz of spectrum PureWave is implementing a Contention Based Mode of operation and re-certifying the product to extend the frequency range. In that mode the Base Station will use a CSMA/CA like implementation and performs Carrier Sense (Listen before Talk) method on top of the WiMAX standard protocol. PureWave Networks Quantum family of products allows the use of an unrestricted contention based protocol as it operates in a listen before transmit mode:
When the Quantum base station operates in the unrestricted contention based mode, it continuously measures the external noise across the operating channel bandwidth and when a signal received with energy level exceeding the user configured Carrier Sense threshold will stop transmission and perform a back-off. The back-off is comprised of transmit-off state followed by transmit-on state. During the transmit-off state the base station allows other spectrum users to utilize the spectrum. As other users of the spectrum are likely to be operating in TDD modes with differing frame lengths it is quite likely that they will not be transmitting when the Base Station checks for other signals prior to transmitting in the next scheduled timeslot a few milliseconds later. PureWave Networks, the PureWave Networks Logo, and PureWave Quantum are trademarks of PureWave Networks, Inc. Information in this document is subject to change without notice. PureWave Networks assumes no responsibility for any errors that may appear in this document. Copyright 2011 PureWave Networks, Inc. All rights reserved. 3 PUREWAVE QUANTUM FAMILY 5) IMPLEMENTATION SPECIFIC IMPLEMENTATION OF THE UPPER 25MHZ CONTENTION ALGORITHM The following is a written description of the algorithm:
Base station periodically (Parameter called Scan Interval) scans for noise on the Uplink channel. If noise is detected above the defined threshold, the Base station stops transmitting. After the expiry of the back-off timer, the base station transmits for very short time
(4/8 frames) to keep current CPEs connected. This is intended for control messages and DCD/UCD. This step is repeated continuously. During this period the Base station scans for noise on the Uplink channel every 2 frames. If the noise drops below the threshold, the Base station resumes full transmission. CONFIGURATION PARAMETERS:
Under Sector->1->Advanced->Radio:
Contention Based Mode Type: Boolean (checkmark), Range: Enable/Disable o Help: Set Contention based mode operation used when central frequency is set within 3.675-3700MHz range in US. Carrier Sense Threshold - Type: Signed Integer, Range: -96 to -64 o Help: Define the energy level used for carrier sense detection threshold. Units are in dbm per full channel bandwidth. NOTE: Set the appropriate value according to the configured channel bandwidth. Carrier Sense Back-off Frames Type: Unsigned Integer, Range: 2 to 65535 o Help: Define the amount of frames (5msec) for no transmit after an energy exceeding the CS threshold is detected. 65535 means stop transmission permanently until energy is not detected. Carrier Sense Resume Frames Type: Unsigned Integer, Range: 4 to 65535 o Help: Defines the amount of frames (5 msecs) to resume transmission after a CS back-off. After expiry of this period another back-off will be performed. HIDDEN CONFIGURATION:
The following fields are hidden from the user interface:
Slots to be allocated for the NI burst during scanning. How long to transmit after the back off. Scan interval during the back-off. PureWave Networks, the PureWave Networks Logo, and PureWave Quantum are trademarks of PureWave Networks, Inc. Information in this document is subject to change without notice. PureWave Networks assumes no responsibility for any errors that may appear in this document. Copyright 2011 PureWave Networks, Inc. All rights reserved. 4 PUREWAVE QUANTUM FAMILY 6) DEMONSTRATION OF COMPLIANCE OF THE LISTEN BEFORE TRANSMIT MODE CONTENTION BEHAVIOR DIAGRAM The following diagram demonstrates how the algorithm is implemented to prove that indeed the base station would be able to share the media with other base stations operating in the same band. This diagram demonstrates the implementation given is section 5. PureWave Networks, the PureWave Networks Logo, and PureWave Quantum are trademarks of PureWave Networks, Inc. Information in this document is subject to change without notice. PureWave Networks assumes no responsibility for any errors that may appear in this document. Copyright 2011 PureWave Networks, Inc. All rights reserved. 5 PUREWAVE QUANTUM FAMILY CONTENTION BEHAVIOR TABLE The following table demonstrates the results achieved with the algorithm are allowing the user to comply with the FCC requirements in the upper 25MHz of the 3650-3700 band. A signal was generated and given to the Equipment Under Test (EUT) with different values. The transmission disablement (Yes/No) was recorded in the last column. EUT Center Freq(MHz) EUT Channel Bandwidth
(MHz) EUT Carrier Detect turn-off level Interferer Frequency relative to EUT (MHz) Carrier Detect Level Tone Per Carrier Detect Level BW Full Tx Disabled 3680 3680 3680 3680 3687.5 3687.5 3687.5 3687.5 3687.5 3687.5 3695 3695 3680 3680 3687.5 3687.5 10 10 10 10 10 10 10 10 10 10 10 10 5 5 5 5
-60
-60
-80
-80
-60
-60
-80
-80
-80
-80
-80
-80
-60
-60
-80
-80 0 0
+5
+5 0 0
+5
+5
-5
-5
-5
-5 0 0
-5
+5
-89
-94
-109
-114
-89
-94
-109
-114
-109
-114
-109
-114
-86
-91
-76
-76
-60
-65
-80
-85
-60
-65
-80
-85
-80
-85
-80
-85
-60
-65
-50
-50 Yes No Yes No Yes No Yes no Yes no Yes no Yes no no no PureWave Networks, the PureWave Networks Logo, and PureWave Quantum are trademarks of PureWave Networks, Inc. Information in this document is subject to change without notice. PureWave Networks assumes no responsibility for any errors that may appear in this document. Copyright 2011 PureWave Networks, Inc. All rights reserved. PureWave Quantum 6636 High performance, all outdoor Mobile WiMAX base station The PureWave Quantum 6636TM series of Mobile WiMAX base stations offers operators unmatched range and capacity through the use of smart antenna technology. Each 6636 series base station uses up to six antennas operating in concert on both uplink and downlink, greatly improving link budgets, and enabling operators to deliver advanced broadband services over vast distances and in non-line-of-sight (NLOS) conditions. The 6636 series is ideally suited for rural broadband coverage, deployment in difficult terrain, utility and smart grid applications, military applications, and any other application which requires superior link budgets and coverage over the widest possible distances. The 6636 series is part of the PureWave Quantum family of advanced, compact Mobile WiMAX base stations. PureWave Quantum base stations come in a fully integrated, small, elegant, yet rugged package. They are designed to be deployed outdoors without the need for a shelter and can be easily mounted on utility poles, walls, rooftops, cell towers virtually anywhere without the need for expensive remote radio heads. PureWave Quantum base stations operate as part of an open, standards based eco-system that allows our customers to choose best-of-breed components; from standard Mobile WiMAX CPEs to ASN-GW. PureWave Quantum base stations are designed to support large mobile deployments but, uniquely, can also be deployed in stand alone mode without an ASN-GW, offering a simpler and more cost effective solution for operators that are interested in initially rolling-out fixed or nomadic services. The PureWave Software Defined Radio (SDR) architecture allows operators to upgrade their networks by means of remote software updates. As new features and functionality become available, operators are assured of long term investment protection. All PureWave Quantum base stations are compatible with the powerful PureView Network Management System. Making Mobile WiMAX Profitable PureWave Quantum base stations are a family of carrier grade, outdoor 802.16e compliant compact base stations that combine power and performance in a small package and at a great price. PureWave Networks 2011 SuPerior rAnge The 6 antenna system significantly improves uplink and downlink performance. eASy dePloyMent Field deployable by a single technician in well under 2 hours. ASn-gW oPtionAl Can operate in stand-alone mode, without an ASN-GW, making even small deployments affordable. greAter CAPACity Improved link performance increases throughput at any range. FleXible Mounting Can be deployed on towers, utility poles, walls, roof tops, etc. without the need for remote RF heads. CoMPletely WeAtherProoF No shelter required. SoFtWAre deFined rAdio Supports remote field upgrades of new functionalities and standards. PoWerFul MAnAgeMent oPtionS Fully supported by PureView NMS. Specifications radio Frequency bands 3.65 GHz Channel Size 3.5*, 5, 7, 10 MHz duplex Method TDD Capacity Active users 200 general Standards Compliance IEEE 802.16e-2005 backhaul interface options 2x Gig-E RJ-45, 2x Multi-Mode Optical Fiber, or 2x Single-Mode Optical Fiber, all with inter-sector daisy-chain support. inter-bS Synchronization Integrated GPS number of tx/rx Antennas 6x6 tx Power per Antenna 33dBm *** (RMS data power at maximum MCS level) Smart Antenna Capabilities MIMO Matrix A, MIMO Matrix B, Cyclic Delay Diversity, MRC, UL Collaborative Spatial Multiplexing*
Air link optimization HARQ, CTC, UL sub-channelization Service Flows per user 16 idle-Mode users 1000*
Modulation QPSK, 16QAM, 64QAM QoS BE, UGS, rtPS, ErtPS, nrtPS Convergence Sublayer IP-CS, Eth-CS, PHS*, IPv4, IPv6*, IPv6 Pass-Through Peak throughput/Sector Aggregate: Up to 53Mbps, DL: Up to 43Mbps, UL: Up to 20Mbps VoiP MoS up to 4.3 Security AES-128, EAP-TLS, EAP-TTLS, PKMv2 Management PureView EMS/NMS, Remote CLI, Web Interface, SNMP v2c & v3 Mechanical, electrical, and environmental dimensions 17.5 x 16.7 x 5.3
(44cm x 42cm x 13cm) Weight 32lbs (14.5kg) Power
-48 VDC or 110/220 VAC, 180 Watts Max temperature
-40C to +55C per ETSI EN 300 019-1.4 Class 4.1E**
humidity 5-100%
Altitude To 10,000 feet above sea level Weatherproofing IEC IP67 Vibration and dust Meets ETSI EN 300 019-1-4 requirements for Class 4.1E Wind loading 160km/hr operation, 200km/hr survival Surge Protection UL497B lightning Protection Min 10kA IEC 6100-4-5 Safety and ieC iP EN 300 019-2-2, GR487, IEC 60529 Connectors dC Power Weatherproof circular connector AC Power Circular plastic multi-pin connector grounding M5 ground stud to chassis Cat-5 backhaul Port 2x RJ-45, Weatherproof optical Fiber backhaul Port 2 x LC duplex rS-232 Maintenance Port RJ-45, Weatherproof gPS N-type Antenna 6x N-type Future software upgrade
** An available solar shield is required for ambient temperatures above +45C with full sun exposure
*** Transmit power subject to local rules and regulations Optional via external kit About PureWave networks PureWave Networks develops high performance, compact outdoor 4G LTE & WiMAX base stations. It is the only company that utilizes advanced beamforming technology to achieve the coverage and capacity of a macro base station in a small form factor that can be deployed anywhere. The PureWave Networks Quantum family of WiMAX base stations offer an open end-to-end solution that also allows customers to select components from the broad WiMAX ecosystem in building their networks. Our solutions are designed for any type of operator, from small WISPs to large mobile service providers. PureWave provides customers the lowest total cost of ownership in the industry through superior performance, ease of installation, dramatically lower equipment and operational cost, and minimal power consumption. PureWave Networks is headquartered in Mountain View, California. www.purewavenetworks.com PureWave Networks, Inc., 2660-C Marine Way Mountain View CA 94043, Tel. 650-528-5200, Fax. 650-528-5222, sales@purewavenetworks.com Follow us on Twitter: @PureWave PureWave Networks, the PureWave Networks Logo, and PureMAX are trademarks of PureWave Networks, Inc. Information in this document is subject to change without notice. PureWave Networks assumes no responsibility for any errors that may appear in this document. Copyright 2011 PureWave Networks, Inc. All rights reserved. 1 1
5 1 0 0
6 3 6 6 TCB GRANT OF EQUIPMENT AUTHORIZATION Certification Issued Under the Authority of the Federal Communications Commission By:
TCB Compliance Certification Services 47173 Benicia Street Fremont, CA 94538 Date of Grant: 09/29/2010 Application Dated: 09/17/2010 PureWave Networks 2660-C Marine Way Mountain View, CA 94043 Attention: Mark Mendonca , Director RF Engineering NOT TRANSFERABLE EQUIPMENT AUTHORIZATION is hereby issued to the named GRANTEE, and is VALID ONLY for the equipment identified hereon for use under the Commission's Rules and Regulations listed below. FCC IDENTIFIER: XN3-QUANTUM6636 Name of Grantee: PureWave Networks Equipment Class: Licensed Non-Broadcast Station Transmitter Notes:
6X6 MIMO WiMAX Base Station Frequency Range (MHZ) 3652.5 - 3672.5 3652.5 - 3672.5 3655.0 - 3670.0 3655.0 - 3670.0 FCC Rule Parts 90 90 90 90 Grant Notes BC BC BC BC The antenna(s) used for this transmitter must be fixed-mounted on outdoor permanent structures. RF exposure compliance is addressed at the time of licensing, as required by the responsible FCC Bureau(s), including antenna co-location requirements of 1.1307(b)(3). BC: The output power is continuously variable from the value listed in this entry to 5%-10% of the value listed. Output Watts 2.65 2.65 5.57 5.57 Frequency Tolerance 6910.0 Hz 6910.0 Hz 6910.0 Hz 6910.0 Hz Emission Designator 4M57G1D 4M56DID 9M14G1D 9M12D1D
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2011-11-04 | 3655 ~ 3695 | TNB - Licensed Non-Broadcast Station Transmitter | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 | Effective |
2011-11-04
|
||||
1 | Applicant's complete, legal business name |
Green Packet Berhad, Taiwan
|
||||
1 | FCC Registration Number (FRN) |
0018658757
|
||||
1 | Physical Address |
6F, NO.21, LANE 583 RUEIGUANG RD
|
||||
1 |
Taipei City, 11492
|
|||||
1 |
Taiwan
|
|||||
app s | TCB Information | |||||
n/a | ||||||
app s | FCC ID | |||||
1 | Grantee Code |
W9V
|
||||
1 | Equipment Product Code |
OX350I-GP
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 | Name |
F****** H******
|
||||
1 | Title |
VP
|
||||
1 | Telephone Number |
+886 ******** Extension:
|
||||
1 | Fax Number |
+886 ********
|
||||
1 |
f******@greenpacket.com
|
|||||
app s | Technical Contact | |||||
1 | Firm Name |
Bureau Veritas CPS (H.K.) Ltd. Taoyuan Branch
|
||||
1 | Name |
H**** C******
|
||||
1 | Physical Address |
81-1, Lu Laio Keng, 9th Ling, Wu Lung Tsuen, Chiun
|
||||
1 |
Hsinchu Hsien, 307
|
|||||
1 |
Taiwan
|
|||||
1 | Telephone Number |
886-3******** Extension:
|
||||
1 | Fax Number |
886-3********
|
||||
1 |
h******@tw.bureauveritas.com
|
|||||
app s | Non Technical Contact | |||||
1 | Firm Name |
Bureau Veritas CPS (H.K.) Ltd. Taoyuan Branch
|
||||
1 | Name |
N****** C********
|
||||
1 | Physical Address |
No. 19, Hwa Ya 2nd Rd., Kwei Shan Hsiang
|
||||
1 |
Taoyuan Hsien, 333
|
|||||
1 |
Taiwan
|
|||||
1 | Telephone Number |
886-3******** Extension:
|
||||
1 | Fax Number |
886-3********
|
||||
1 |
n******@tw.bureauveritas.com
|
|||||
app s | Confidentiality (long or short term) | |||||
1 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 | Equipment Class | TNB - Licensed Non-Broadcast Station Transmitter | ||||
1 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | WiMAX Outdoor CPE | ||||
1 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 | Modular Equipment Type | Does not apply | ||||
1 | Purpose / Application is for | Original Equipment | ||||
1 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 | Grant Comments | Maximum output power listed is EIRP. This device is an outdoor WiMAX client device; it can not be converted to provide master functions. Only the integral patch array antenna with up to 17.04 dBi gain presented in certification tests can be used and must be professionally fixed-mounted on indoor or outdoor permanent structure. For RF exposure safety compliance, the device should maintain at least 60 cm separation distance from all persons and must not be co-located with any other transmit antennas. | ||||
1 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 | Firm Name |
Bureau Veritas CPS (H.K.) Ltd. Taoyuan Branch
|
||||
1 | Name |
R******** C********
|
||||
1 | Telephone Number |
886-3******** Extension:
|
||||
1 | Fax Number |
886 3********
|
||||
1 |
r******@tw.bureauveritas.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 9 | 3652.5 | 3697.5 | 3.283 | 2.5 ppm | 4M96W7D | ||||||||||||||||||||||||||||||||||
1 | 2 | 9 | 3653.5 | 3696.5 | 4.583 | 2.5 ppm | 6M94W7D | ||||||||||||||||||||||||||||||||||
1 | 3 | 9 | 3655 | 3695 | 7.098 | 2.5 ppm | 9M85W7D |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC