No part of this document may be reproduced or transmitted in any form or by any means without prior written
consent of Huawei Technologies Co., Ltd.
Trademarks and Permissions
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Huawei Technologies Co., Ltd.
Address:Huawei Industrial Base
Bantian, Longgang
Shenzhen 518129
People's Republic of China
Website:http://www.huawei.com
Email:support@huawei.com
Issue 02 (2015-04-10)Huawei Proprietary and Confidential
Data configuration for EG860 can be performed by using WebUI or by auto-configuration.
6 Maintenance
This chapter describes how to maintain an EG860.
7 Reference
This chapter describes how to use the Web network management system (NMS).
8 Alarm Reference
This chapter describes possible alarms related to EG860, and how to handle them.
9 Glossary
This table provides the related glossary for reference.
Conventions
Symbol Conventions
The symbols that may be found in this document are defined as follows.
SymbolDescription
Indicates an imminently hazardous situation which, if not
avoided, will result in death or serious injury.
Indicates a potentially hazardous situation which, if not
avoided, could result in death or serious injury.
Indicates a potentially hazardous situation which, if not
avoided, may result in minor or moderate injury.
Indicates a potentially hazardous situation which, if not
avoided, could result in equipment damage, data loss,
performance deterioration, or unanticipated results.
NOTICE is used to address practices not related to personal
injury.
Calls attention to important information, best practices and
tips.
NOTE is used to address information not related to personal
injury, equipment damage, and environment deterioration.
General Conventions
Issue 02 (2015-04-10)Huawei Proprietary and Confidential
2.4.2.2 OM Security...........................................................................................................................................................15
2.4.2.2.1 User Authentication and Access Control.............................................................................................................15
2.4.2.2.2 OM System Security............................................................................................................................................16
2.4.2.2.3 Digital Signature of Software..............................................................................................................................17
3.1.2 Front Panel.................................................................................................................................................................20
3.2.2 Power Cable...............................................................................................................................................................25
4.1 Site Preparations...........................................................................................................................................................29
4.3.1 Mounting an EG860 on a Pole..................................................................................................................................32
4.3.1.1 Mounting EG860 Equipment on a Pole..................................................................................................................34
Issue 02 (2015-04-10)Huawei Proprietary and Confidential
4.3.1.2 Connecting Cables to an EG860 Mounted on a Pole.............................................................................................39
4.3.2 Mounting an EG860 on a Wall..................................................................................................................................47
4.3.2.1 Mounting EG860 Equipment on a Wall.................................................................................................................48
4.3.2.2 Connecting Cables to an EG860 Mounted on a Wall.............................................................................................52
5.1.1 Log in to the WebUI..................................................................................................................................................65
6.1 Preparations for Site Maintenance................................................................................................................................77
6.2 Powering on/off an EG860...........................................................................................................................................77
7.2 General Settings............................................................................................................................................................82
7.2.2 Internet Settings.........................................................................................................................................................82
7.2.7 Internet MTU.............................................................................................................................................................87
7.3.2 MAC Filtering...........................................................................................................................................................92
7.3.3 IP Filtering.................................................................................................................................................................93
7.7.8 Date & Time............................................................................................................................................................101
7.7.12 Bandinfo Number Configuration...........................................................................................................................104
7.7.13 Work Frequency....................................................................................................................................................104
8.1 ALM-50001 Lan state................................................................................................................................................109
8.2 ALM-50002 High Temperature..................................................................................................................................110
This section describes functions, networking, and technical specifications of an EG860.
2.1 Product Functions
An EG860, as a data service device on the Internet of Things (IoT), is used in a long term
evolution (LTE) network to upload or download user data. It provides data service (in route
mode), security service (firewall/NAT), and equipment maintenance and management. NAT is
short for Network Address Translation.
2.2 Network Networking
An EG860 is a wireless broadband access terminal that serves as a major device in a wireless
Internet of Things (IoT) data private network. It can be installed indoors or outdoors.
2.3 Technical Specifications
The technical specifications of an EG860 cover mechanical, power, surge protection,
performance, antenna, and environment specifications.
2.4 Product Security
EG860 security includes network security and application security. Application security includes
wireless security and OM security.
2.5 Certification Information
This section describes the certification that EG860 has passed.
Issue 02 (2015-04-10)Huawei Proprietary and Confidential
An EG860, as a data service device on the Internet of Things (IoT), is used in a long term
evolution (LTE) network to upload or download user data. It provides data service (in route
mode), security service (firewall/NAT), and equipment maintenance and management. NAT is
short for Network Address Translation.
Background Information
A wireless data private network is an important part of IoT infrastructures. The wireless data
private network is based on the wired government private network and requires base stations
and access fibers as supplements. It provides secure and reliable channels for transmitting,
converging, processing, and distributing sensor messages of various IoT applications. The
wireless data private network uses unified standards for receiving sensor messages and is capable
of identity authentication and secure transmission to meet the requirements for operating security
and emergency management of a metro IoT.
2 Introduction
Functions
IoT is about to introduce a new wave in the information industry following computers, Internet,
and mobile communications.
A wireless data private network has the following attractions:
lProvides a unified, secure, omnipresent, and standard channel for transmitting sensor
messages applicable to service and emergency management of a city.
lAvoids repeated construction of sensor networks.
lReduces the cost of constructing IoT applications, fully utilizes limited frequency
virtual SIM card, physical SIM card, multicast, static routing, routing behind MS, L2TP
tunnel, QoS, data service encryption, and status management.
lConfiguration management: auto-configurable commissioning and configuration
management. The NMS manages an EG860 using the TR069 protocol, including
configuration delivery from the NMS to an EG860, software upgrade, status and
performance monitoring, log collection, alarm management, and health check.
lO&M: web-based local maintenance and performance statistics.
lFault management: alarm, connectivity diagnosis, and log management.
2.2 Network Networking
An EG860 is a wireless broadband access terminal that serves as a major device in a wireless
Internet of Things (IoT) data private network. It can be installed indoors or outdoors.
A government private network is a wired MAN that runs over existing optical cables and
SDH or MSTP networks at the physical layer and adopts MPLS VPN architecture at the IP
layer, to isolate different types of services that coexist over the same network.
Issue 02 (2015-04-10)Huawei Proprietary and Confidential
A government private network covers agencies, offices, and business units regardless of size
within a municipality. The integrated network is shown as Figure 2-1.
Figure 2-1 A government integrated network
The networking of wireless networks is shown as Figure 2-2.
Issue 02 (2015-04-10)Huawei Proprietary and Confidential
An EG860 operates on an LTE network. Data from a sensor travels through a FE port of the
EG860 and, after being encapsulated to IPv4 packets by the EG860, is transferred to backend
servers.
NOTE
Personal information will be anonymized to protect user privacy.
2.3 Technical Specifications
The technical specifications of an EG860 cover mechanical, power, surge protection,
performance, antenna, and environment specifications.
Mechanical specifications
Table 2-1 lists the mechanical specifications of an EG860.
Table 2-1 Mechanical specifications
DimensionWeight
240 mm (H) x 200 mm (W) x 61 mm (D)
≤ 2 kg
Electrical specifications
Table 2-2 lists the electrical specifications of an EG860.
Issue 02 (2015-04-10)Huawei Proprietary and Confidential
EG860 security includes network security and application security. Application security includes
wireless security and OM security.
2.4.1 Network Security
EG860 network security uses Secure Sockets Layer (SSL) and Hypertext Transfer Protocol
Secure (HTTPS).
SSL
-40℃~+70℃
1 ℃/min
≤ 55 m/s
HTTPS
The SSL protocol is a security connection technology for the server and client. It provides a
confidential, trusted, and identity-authenticating connection to two application layers. SSL is
regarded as a standard security measure and has been widely applied to web services.
lIdentity authentication
Identity authentication checks whether a communication individual is the expected object.
SSL authenticates servers and clients based on digital certificates and user/password.
Clients and servers have their own identifiers. The identifiers are numbered by the public
key. To verify that a user is legitimate, SSL requires digital authentication during data
exchange in the SSL handshake procedure.
lConnection confidentiality
Data is encrypted before transmission to prevent data from being hacked by malicious users.
SSL uses encryption algorithms to ensure the connection confidentiality.
lData integrity
Any tampering on data during transmission can be detected. SSL establishes a secure
channel between the client and the server so that all the SSL data can reach the destination
intact.
For the EG860, the OM TCP applications can use SSL. HTTP over SSL is generally called
HTTPS. HTTPS is used for connections between the NMS/WebUI and EG860. SSL also uses
the digital certificate mechanism.
Issue 02 (2015-04-10)Huawei Proprietary and Confidential
HTTPS provides secure HTTP channels. HTTPS is HTTP to which SSL is added, and SSL
ensures the security of HTTPS.
2.4.2 Application Security
EG860 application security includes wireless security and OM security.
2.4.2.1 Wireless Security
EG860 wireless security includes authentication, air-interface data encryption, and integrity
protection.
For details, see Security Feature Manual.
2.4.2.2 OM Security
OM security includes user authentication, access control, OM system security, and software
digital signature.
2 Introduction
2.4.2.2.1 User Authentication and Access Control
User authentication and access control are implemented for users to be served by the EG860.
The objective of authentication is to identify users and grant the users with proper permission.
The objective of access control is to specify and restrict the operations to be performed and the
resources to be accessed by the users.
User Account Management
Local user account management involves modification and query of local user accounts.
Information about a local user account includes user name and user description. To improve
system security, the following security requirements must be satisfied:
lPassword security policies
– The password must contain 8 to 32 characters
– The password must contain at least two character types and must not contain three or
more than three consecutively same characters
– The password must not contain the account name or its reversion
– Maximum number of failed password attempts
– Threshold of consecutive password modification failures
– Duration after which a locked password can be automatically unlocked
lPassword usage rules
– Users must enter passwords twice when changing passwords, and the passwords entered
cannot be copied.
– Users can change their own passwords. The old password must be verified when it is
changed.
– User accounts are locked when the number of consecutive password failures reaches a
specified threshold.
lPassword storage and transmission rules
Issue 02 (2015-04-10)Huawei Proprietary and Confidential
– By default, the admin user is able to perform all operations except for the functions
related to the TR069 protocol on the system. The acs user only can control the
authentication between eOMC910 and EG860.
lUser names and passwords
Table 2-10 describes the user names and default passwords for an EG860.
Table 2-10 User names and passwords
User NameDefault PasswordDescription
admin4GCPE@TDA user that accesses the
EG860 by using the Web
management interface.
acs4GCPE@TDAn eOMC910 user that
performs operations on the
EG860.
NOTICE
l To enhance system security, users need to change the passwords periodically,
preventing brute-force cracking.
l The password of the acs user must be changed on both the eOMC910 and the EG860.
User Login Management
The login types supported by NEs include local user login, and machine-machine authentication
and certificate authentication for NMS access. All login types must be authenticated before
communications. In addition, the following security requirements must be satisfied:
lIdentity check mechanism
– Identity check based on accounts and passwords
– Automatic logins by programs for machine-machine accounts
2.4.2.2.2 OM System Security
OM system security includes software integrity check.
In the original procedure for releasing and using the software, the software integrity is ensured
by using cyclic redundancy check (CRC). CRC can only prevent data loss during transmissions.
If data is tampered with during transmissions, a forged CRC value will be regarded as valid by
the CRC. Therefore, the receive end cannot rely on the CRC to ensure the consistency between
the received data and the original data, adversely affecting the reliability and security for the
software.
Software integrity protection implements the Hash algorithm or adds a digital signature to
software (including mediation layers and configuration files) when releasing software, and then
Issue 02 (2015-04-10)Huawei Proprietary and Confidential
uploads software to the target server or device. When a target device downloads, loads, or runs
software, the target device performs the Hash check or authenticates the digital signature. By
doing so, software integrity protection ensures end-to-end software reliability and integrity.
Software integrity protection helps detect viruses or malicious tampering in a timely manner,
preventing insecure or virus-infected software from running on the device.
2.4.2.2.3 Digital Signature of Software
A digital signature of software is used to identify the software source. It ensures the integrity
and reliability of software.
When software is released, its digital signature is delivered with the software package. After the
software package is downloaded to an NE, the NE verifies the digital signature of the software
package before using it. If the digital signature passes the verification, the software is intact and
reliable. If the verification fails, the software package is invalid and cannot be used. Figure
2-3 illustrates the principles of a software digital signature.
Figure 2-3 Digital signature of software
2 Introduction
lBefore a software package is released, all files in the software package are signed with
digital signatures. That is, after a message digest is calculated for all files in the software
package, the message digest is digitally signed using a private key.
lAfter a software package with a digital signature is loaded to an NE through a media such
as the software release platform, the NE first verifies the digital signature of the software
package. That is, the NE uses a public key to decrypt the digital signature and obtain the
original message digest. Then, the NE recalculates the message digest and compares the
new message digest with the original one.
– If the two message digests are the same, the software package passes the verification
and can be used.
Issue 02 (2015-04-10)Huawei Proprietary and Confidential
– If the two message digests are different, the software package fails the verification and
cannot be used.
The public key used to decrypt digital signatures is stored in the secure storage area of an NE
and cannot be queried or exported.
2.5 Certification Information
This section describes the certification that EG860 has passed.
Table 2-11 describes the certification that EG860 has passed.
Table 2-11 Certification that EG860 has passed
Certification NameDescription
Conformite Europende (CE)Products with the CE marking comply with
the electromagnetic compatibility directive
(89/336/EEC) and low voltage directive
(73/23/EEC) issued by European
Commission. The CE marking is a mandatory
conformity mark for products placed on the
European market.
Restriction of the use of certain hazardous
substances (RoHS)
RoHS restricts the use of certain hazardous
materials in the manufacturing of electronic
and electrical equipment, in consideration of
human health and environmental protection.
RoHS is enforced in each member state of the
European Union.
Issue 02 (2015-04-10)Huawei Proprietary and Confidential
This section describes the exterior, front panel, indicators, and ports of an EG860.
3.1.1 Appearance
The exterior of an EG860 provides you a fair idea of major components.
Figure 3-1 shows the exterior of an EG860.
Figure 3-1 EG860 exterior (unit: mm)
3 Hardware
3.1.2 Front Panel
An EG860 has an FE port, a power port, external antenna ports, subscriber identity module (SIM)
card window, indicators, a nameplate, and a ground screw on its front panel.
Figure 3-2 shows the front panel of an EG860.
Issue 02 (2015-04-10)Huawei Proprietary and Confidential