Huawei Technologies Co., Ltd. provides customers with comprehensive technical
support and service. For any assistance, please contact our local office or company
headquarters.
No part of this document may be reproduced or transmitted in any form or by any
means without prior written consent of Huawei Technologies Co., Ltd.
The product described in this manual may include copyrighted software of Huawei
Technolog
reproduce, distribute, modify, decompile, disassemble, decrypt, extract, reverse
engineer, lease, assign, or sublicense the said software, unless such restrictions are
prohibited by applicable laws or such actions are approved by respective copyright
holders under licenses.
ies Co., Ltd and possible licensors. Customers shall not in any manner
Trademarks and Permissions
, , and
Technologies Co., Ltd.
Other trademarks, product, service and company names mentioned are the property
of their respective owners.
are trademarks or registered trademarks of Huawei
Notice
Some features of the product and its accessories described herein rely on the
software installed, capacities and settings of local network, and may not be activated
or may be limited by local network operators or network service providers. Thus the
descriptions herein may not exactly match the product or its accessories you
purchase.
Huawei Technologies Co., Ltd reserves the right to change or modify any information
or specifications
contained in this manual without prior notice or obligation.
NO WARRANTY
THE CONTENTS OF THIS MANUAL ARE PROVIDED “AS IS”. EXCEPT AS
REQUIRED BY APPLICABLE LAWS, NO WARRANTIES OF ANY KIND, EITHER
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE, ARE MADE IN RELATION TO THE ACCURACY, RELIABILITY OR
CONTENTS OF THIS MANUAL.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO CASE
SHALL HUAWEI TECHNOLOGIES CO., LTD BE LIABLE FOR ANY SPECIAL,
INCIDENTAL, INDIRECT, OR CONSEQUENTIAL DAMAGES, OR LOST PROFITS,
BUSINESS, REVENUE, DATA, GOODWILL OR ANTICIPATED SAVINGS.
Import and Export Regulations
Customers shall comply with all applicable export or import laws and regulations and
will obtain all necessary governmental permits and licenses in order to export,
re-export or import the product mentioned in this manual including the software and
technical data therein.
This document describes the functions, features, and configuration methods of the
EchoLife HG556a Home Gateway (hereinafter referred to as the terminal).
By reading this document, you can understand the functions and f
terminal and the procedures for installing and configuring the terminal.
Related Versions
The following table lists the product versions related to this document.
The safety precautions to be followed during the use
of the term
The functions and features of the terminal, the
functional di
terminal, and the indicator definitions and interface
functions of the terminal.
inal.
fferences between different models of the
1
About This Document
Chapter Describes
3 Quick Start
4 Configuration of Internet
Access Parameters
5 Configuration of WLANThe methods for setting up a wireless connection.
6 Configuration Frequently
Used Functions
7 Maintenance Guide
8 FAQs
A Technical SpecificationsThe technical specifications of the terminal.
B Default Settings The default settings of the terminal.
C Acronyms and
Abbreviations
EchoLife HG556a
Service Manual
The methods for connecting the terminal, powering
on the terminal, and logging in
to the Web-based
configuration utility of the terminal.
The methods for configuring the Internet access
parameters of the terminal.
The methods for using some frequent functions of the
terminal.
Some maintenance operations related to the terminal,
such as login
account management, software upgrade,
and network status diagnosis.
Some common questions about the use of the terminal
and the re
lated solutions.
The acronyms and abbreviations involved in this
document.
Conventions
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
2
Indicates a hazard with a high level of risk, which if
not avoided
, will result in death or serious injury.
Indicates a hazard with a medium or low level of risk,
which if not avoided, could result in minor or
moderate injury.
Indicates a potentially hazardous situation, which if
not avoided, could result in equipment damage, data
loss, performance degradation, or unexpected results.
Indicates a tip that may help you solve a problem or
save ti
me.
Provides additional information to emphasize or
supplement important points of the main text.
To use the device properly and safely, read these warnings and precautions carefully and
observe them during operation. strictly
Unless otherwi
i
Bas c Requirements
z
During storage, , and operation of the device, keep it dry and prevent it from
colliding with other objects.
z
Do not disevice. In case of any fault, contact an authorized service center for
mantl
assistance or repair.
z
Without au or individual can change the mechanical, safety, or
thorization,
performance design of the device.
z
When using the all applicable laws and regulations and respect the legal
rights of other people.
se specified, the device includes the device and its accessories.
transportation
e the d
no organization
device, observe
Environmental Requirements for Using the Device
z
Bn disconnect it
efore connecting and disconnecting cables, stop using the device, and the
from the power supply. Ensure that your hands are dry during operation.
z
Keep the device far from sources of heat and fire, such as a heater or a candle.
z
Kenerate strong magnetic or electric
eep the device far from electronic appliances that g
fields, such as a microwave oven or
z
Place the device on a stable surface.
z
Place th direct
e device in a cool and well-ventilated indoor area. Do not expose the device to
sunlight. Use the device in an area with a temperature ranging from 0°C to 40°C.
z
o not bloc
D any object. Reserve a minimum space of 10 cm
k the openings on the device with
around the device for heat dissipation.
z
D
o not place any object (su
ch as a candle or a water container) on the device. If any foreign
object or liquid enters the device, stop using the device immediately, power it off, r
all the cables connected to it, and then contact an authorized service center.
During thunderstorms, power off the device, and then remove all the cables connected to it to
prevent it from getting damaged due to lightning strikes.
Precautions for Using Wireless Devices
z
The antenna(s) used for this transmitter must be installed to provide a separation distance of
at least 20 cm from all persons.
z
Do not use the device where using wireless devices is prohibited or may cause interference
or danger.
z
The radio waves generated by the device may interfere with the operation of electronic
medical devices. If you are using any electrical medical device, contact its manufacturer for
the restrictions on the use of the device.
z
Do not take the device into operating rooms, intensive care units (ICUs), or coronary care
units (CCUs).
Areas with Inflammables and Explosives
z
Do not use the device where inflammables or explosives are stored, for example, in a gas
station, oil depot, or chemical plant. Otherwise, explosions or fires may occur. In addition,
follow the instructions indicated in text or symbols.
z
Do not store or transport the device in the same box as inflammable liquids, gases, or
explosives.
Accessory Requirements
z
Use only the accessories supplied or authorized by the device manufacturer. Otherwise, the
performance of the device may get affected, the warranty for the device or the laws and
regulations related to telecommunications terminals may become null and void, or an injury
may occur.
z
Do not use the power adapter if its cable is damaged. Otherwise, electric shocks or fires may
occur.
z
Ensure that the power adapter meets the specifications indicated on the device nameplate.
z
Ensure that the power adapter meets the requirements of Clause 2.5 in
IEC60950-1/EN60950-1 and it is tested and approved according to national or local
standards.
Safety of Children
Keep the device and its accessories out of the reach of children. Otherwise, they may
damage the device and its accessories by mistake, or they may swallow the small
components of the device, causing suffocation or other dangerous situations.
If the device is not used for a long time, power it off, and then remove all the cables
connected to it.
z
If any exception occurs, for example, if the device emits any smoke or unusual sound or
smell, stop using the device immediately, power it off, remove all the cables connected to it,
and then contact an authorized service center.
z
Do not trample, pull, or overbend any cable. Otherwise, the cable may get damaged, causing
malfunction of the device.
z
Before cleaning the device, stop using it, power it off, and then remove all the cables
connected to it.
z
Use a clean, soft, and dry cloth to clean the device shell. Do not use any cleaning agent or
spray to clean the device shell.
Disposal and Recycling Information
This symbol on the device (and any included batteries) indicates that the
device (and any included batteries) should not be disposed of as normal
household garbage. Do not dispose of your device or batteries as unsorted
municipal waste. The device (and any batteries) should be handed over to a
certified collection point for recycling or proper disposal at the end of its
life.
For more detailed information about the recycling of the device or batteries, contact your
local city office, the household waste disposal service, or the retail store where you
purchased this device.
The disposal of this device is subject to th
Equipment (WEEE) Directive of the European Union. The purpose for separating
WEEE and batteries from other waste is to minimize any environmental impact and
health hazard due to the presence of hazardous substances.
e Waste from Electrical and Electronic
Reduction of Hazardous Substances
This device is compliant with the EU Registration, Evaluation, Authorisation and
Restriction of Chemicals (REACH) Regulation (Regulation No 1907/2006/EC of the
European Parliament and of the Council) and the EU Restriction of Hazardous
Substances (RoHS) Directive (Directive 2002/95/EC of the European Parliament and of
the Council). For more information about the REACH compliance of the device, visit the
Web site www.huaweidevice.com/certification. You are recommended to visit the Web
site regularly for up-to-date information.
EU Regulatory Conformance
The antenna(s) used for this transmitter must be installed to provide a separation distance
of at least 20 cm from all persons.
Български: С настоящето Huawei Technologies Co., Ltd. декларира, четозиуред
съответства на основните изисквания и другите разпоредби на Директива
1999/5/EC.
Česky: Huawei
základními požadavky a dalšími souvisejícími opatřeními směrnice 1999/5/EC.
Dansk: Huawei Technologies Co., Ltd. erklærer hermed at denne enhed er i
overensstemmelse med de obligatoriske krav og andre relevante bestemmelser i direktiv
1999/5/EF.
Nederlands: Hierbij verklaart Huawei Technologies Co., Ltd. dat dit app
overeenstemming is met de essentiële eisen en de andere relevante bepalingen van
richtlijn 1999/5/EC.
English: Hereby
compliance with the essential requirements and other relevant provisions of Directive
1999/5/EC.
Eesti: Käesolevaga kinnitab Huawei Technologies Co., Ltd., et see seade vastab
Direktiiv
Suomi: Huawei Technologies Co., Ltd. vakuuttaa täten, että tämä laite on
yhdenmukainen direktiivin 1999/5/EY olennaisten vaatimusten ja direktiivin muiden
asiaankuuluvien lausumien kanssa.
Français (Européen) : Le fabricant d
essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE.
Deutsch: Huawei Technologies Co., Ltd. erklärt hiermit, dass dieses Produkt die
erforderlichen Bestimmungen und andere relevante Verordnungen der Richtlinie
1999/5/EG einhält.
Ελληνικά: Δια τηςπαρούσης η Huawei
συσκευή συμμορφώνεται με τις βασικές απαιτήσεις και άλλες σχετικές διατάξεις της
οδηγίας 1999/5/Ε.Κ.
Magyar: Jelen n
a készülék megfelel az EC/5/1999 Irányelv összes lényeges követelményének és
vonatkozó előírásának.
Gaeilge: Fograíonn Huawei Technologies Co., Ltd leis seo go bh
gcomhlíonadh leis na fíor-riachtanais agus na forálacha eile maidir le Treoir 1999/5/AE.
Italiano: Col pr
dispositivo è conforme ai requisiti essenziali e alle altre disposizioni applicabili della
Direttiva 1999/5/CE.
Latviski: Ar šo Huawei Technologies Co., Ltd. paziņ
1999/5/EC pamatprasībām un piemērojamajiem nosacījumiem.
Lietuviškai: Ši
Direktyvos 1999/5/EC pagrindinius reikalavimus ir taikomas sąlygas.
Malti: Hawnhekk, Huawei Technologies Co., Ltd. tiddikjara li dan it-tagħmir hu
konformi mal-ħtiġijiet essenzjali u provvedimenti rilevanti oħrajn ta’ Direttiva
1999/5/KE.
Technologies Co., Ltd., tímto prohlašuje, že toto zařízení je ve shodě se
araat in
, Huawei Technologies Co., Ltd. declares that this device is in
i 1999/5/EÜ põhinõudmistele ja teistele asjakohastele määrustele.
éclare que ce produit est conforme aux exigences
Technologies Co., Ltd. δηλώνει ότι αυτή η
yilatkozaton keresztül a Huawei Technologies Co., Ltd. kijelenti, hogy
fuil an fheiste seo i
esente documento, Huawei Technologies Co., Ltd. dichiara che questo
o, ka šī ierīce atbilst Direktīvas
uo Huawei Technologies Co., Ltd. praneša, kad šis įtaisas atitinka
Polski: Wymieniona w tym dokumencie firma Huawei Technologies Co., Ltd. deklaruje,
że niniejsze urządzenie spełnia zasadnicze wymagania w zakresie zgodności oraz inne
odnośne postanowienia Dyrektywy 1999/5/EC.
Português (Europeu) : Deste modo, a Huawei T
dispositivo está em conformidade com os requisitos essenciais e outras provisões
relevantes da Directiva 1999/5/CE.
Română: Prin p
conform cu cerinţele esenţiale şi alte prevederi relevante ale directivei 1999/5/CE.
Slovenčina: Huawei Technologies Co., Ltd. týmto vyhlasuje, že zariadenie je v súlade so
základnými požiadavkami a inými relevantnými predpismi Smernice 1999/5/ES.
Slovenščina: Huawei
bistvenimi zahtevami in drugimi ustreznimi določbami Direktive 1999/5/ES.
Español (Europeo) : Con el presente documento, Huawei Technologies Co., Ltd.
declara que este dispositivo cumple con los requisitos esenciales y con las demás
disposiciones correspondientes de la Directiva 1999/5/CE.
Svenska: Huawei Technologies Co., Ltd. förk
överensstämmer med de grundläggande kraven och andra relevanta föreskrifter i direktiv
1999/5/EG.
For the declaration of conformity, visit th
www.huaweidevice.com/certification.
rezenta Huawei Technologies Co., Ltd. declară că acest dispozitiv este
Technologies Co., Ltd. izjavlja, da je ta naprava v skladu z
echnologies Co., Ltd. declara que este
larar härmed att denna produkt
e Web site
0
Notice: This device can be operated in all European countries.
France: Outdoor use limited to 10 mW e.i.r.
Italy: For private use, a general authorisation is r
outside own premises. For public use, a general authorisation is required.
Luxembourg: General authorisation required for
Norway: This subsection does not apply for the ge
The EchoLife HG556a Home Gateway (hereinafter referred to as the terminal) is a home
gateway using the Asymmetric Digital Subscriber
supports high-speed wireless uplink through HSPA stick.
The Home Gateway is the core component of the digital home. In addition to the
high-speed WAN interface, the terminal also provides abundant LAN interfaces to
facilitate flexible LAN networking of business terminals and interworking between
household terminals. The terminal can function as a print server when connected to a
printer through the USB 2.0 host interface. It also supports multiple USB devices, such
as the USB stick, USB hard disk, and USB card reader.
2.2 Hardware
2.2.1 In
dicators
Table 2-1 he terminal.
Ticthe
able 2-1 Ind ators of terminal
Indicator Color Status Meaning
Mgeessa
HSPA
describes the indicators of t
Line (ADSL) technology. It also
- Off There is no message.
Red On There is an incoming message.
- Off The HSPA module is not connected or used.
Red
Red
Red On
Blinking
slowly
Blin
quic
The HSPA conn
connection is being established.
king
kly
connection is being established.
The connected HSPA module works
T1 lists the PC settings requi Web-based configuration utility of
able 3-red to log in to the
t
he terminal.
Tttings required to l
able 3-1 PC seog in to the Web-based configuration utility
provides simple and easy Web-based configuration utility, through
ew or configure the working parameters of the terminal.
Item Requirement
Network protocol Enable TCP/IP.
PC IP address
Set the IP address of the PC t
o the same network
segment as the IP address of the LAN interface of
the terminal.
By default, the IP address of the LAN
interface of
the terminal is 192.168.1.1.
By default, the DHCP function is enabled on the
terminal. Therefore, you can configure the PC to
obtain an IP address automatically.
Internet Explorer Do not use the proxy server.
To log in to the Web-based configuration utility, perform the following steps:
Stae
rt the Internet Explorer on the PC and ensure that the Internet Explorer does not us
Step 1
any
proxy server.
ak
Internet
T
e
use
any proxy server, perform the following steps:
1.
Start the Internet Explorer. Choose Tools > Internet Options on the menu bar.
2. tab in the Internet Options dialog box, and then click LAN
Click the Connect
Explorer 6.0 as an example. To check that the Internet Explorer does not
Settings.
3. In th
e Proxy Server area, ensure that Use the proxy server for LAN is cleared. If
Use the proxy server for LAN is select
ed, clear Use the proxy server for LA
and then click OK.
Step 2
Step 3
Enter
Enter
Enter the administrator account (User name is admin and password is
default) in th
----E
p://192.168.1.1
htt
.
e
nd
Login
in the address bar of the Internet Explorer, and then press
VF-IRhg556
dialog box, and then click OK.
N,
by
By default, the IP address of the LAN interface of the terminal is 192.168.1.1. You can change
this IP address. After changing this IP address, ensure that the IP address of the PC is in the
same network segment as the IP address of the LAN interface of the terminal.
lists the information to be collected before configuring
Parameter Description
VPI/VCI
It specifies the VPI and VCI of the PVC. The value is set as 8/35 by
default.
The VPI and VC
with those of the PVC of the devices on operator networks so that
the connection between the terminal and the devices can be set up
through the PVC.
Service
Category
Connection
It specifies the traffic management ty
z
z
z
z
z
It specifies the protocol used by the PVC. You should select the
protocol that meets the requirements of the DSLAM. The option
protocols va
Encapsulation
Mode
It specifies the packet encapsulation mode. It is ass
Internet Service Provider.
Enable 802.1qIt specifies whether to enable the VLAN function.
I of the PVC of the terminal should be consistent
pe used by the PVC.
UBR Without PCR: It refers to an unspecified bit rate without a
peak cell rate. Since the transmission rate is not specified, the
ATM network tries its best to transmit UBR user information,
which is called the best effort. In this case, however, the
transmission quality cannot be ensured. For example, the cell
loss and the delay and jitter of cell transmission may occur. This
type is applicable when an end-to-end fault tolerance mechanism
or protocol exists at an upper layer and when no stringent
requirement is imposed on the n
etwork transmission capability.
UBR With PCR: It refers to an unspecified bit rate with a peak
cell rate.
CBR: It refers to a constant bit rate. Fixed requirements are
imposed on the bandwidth (rate). This type is applicable to
real-time tr
ansmission of audio and video signals.
Non Realtime VBR: It refers to a non-real-time variable bit rate.
No stringent requirement is imposed on the cell delay. For
example, when a user retrieves the MPEG-2 video from the
video server through the ATM network, seconds of network
delay does not affect the video quality. You should set
transmission rates, such as the PCR and the SCR, on the
network, thus reducing the cell loss
Realtime VBR: It refers to a real-time variable bit rate. The ce
rate.
ll
delay is restricted stringently. This type is mainly used for
real-time services, such as the video output by a va
riable rate
encoder, video monitoring, and compressed voice
communication.
5.1 Setting Up a Wireless Connection by the Wi-Fi
Butto
Step 1
Step 2
Step 3
n
The terminal supports the WPS function. If your network adapter also supports the WPS
function, you can use the WPS function to set up
and the terminal quickly. To set up a wireless connection, do as follows:
Press the Wi-Fi
the WPS negotiation state. The Wi-Fi indicator starts to blink slowly in a few seconds.
z B. Press the Wi-Fi button on the side
z Iink, it indicates that the WPS function cannot be enabled.
Access the WLAN through the wireless network adapter on your PC.
After you install a wireless network adapter on your PC and e
function, the wireless network adapter automatically searches for an available wireless
network and connect to the wireless network automatically.
Wait for
of the tas
----End
button on the side panel and hold it for more than four seconds to enter
y default, the Wi-Fi function of the terminal is enabled
panel and hold it for less than four seconds to disable the Wi-Fi function, and hold it for
more than four seconds to enable the WPS function.
f the Wi-Fi indicator does not bl
Note that the WPS function can be used only when the security m
to WPA-PSK or WPA2-PSK.
a few seconds, and then you can see the wireless icon on the corner to the right
k bar of the PC.
a wireless connection between your PC
ode
of the WLAN is set
nable the WPS negotiation
5.2 Se
Huawei Proprietary and Confidential
tting Up a Wireless Connection Manually
If your network adapter does not support the WPS function, you can set up a wireless
connection between your PC and the terminal manua
connection, use either
z
Use the tool provided by your network adapter.
For details, see the user guide of your network adapter.
z
Use the wireless configuration software provided by the operating system of your
PC.
6.1 Configuring Multiple PCs to Access the Internet
Functio
Config
Step 1
Step 2
Step 3
Step 4
n Overview
The terminal provides four Ethernet interfaces and the WLAN function. Thus, you
connect multiple PCs to the terminal wirelessly or through the Ethernet interfaces.
the PCs can access the Internet simultaneously through the routing function of the
terminal.
can
Then
uration Example
For example, you have two desktop computers and a new laptop with a wireless network
adapter installed. You can configure the desktop computers and the laptop to access the
Internet simultaneously. In this example, the laptop is configured to access the Interne
wirelessly.
Most configurations of the terminal are completed before delivery. You only need to
connect the desktop computers and the laptop to the terminal and
acc ss parameters of the terminal as follows: e
Connect the two desktop computers to the
details, see section 3.1 "Connecting Cables."
For
Connect the laptop to the terminal wirelessly
For details, see chapter 5 "Configuration
Set the Internet access parameters of the terminal to connect t
For details, see chapter 4
e network connections on the desktoConfigur
PC
----End
obtain IP addresses automatically.
s can
"Configuring th
terminal
of WLAN."
e WAN Interface."
by using network cables.
by config
p computers and the laptop so that these
uring the laptop.
he terminal to the Internet.
set certain In
ternet
t
If the desktop computers and the laptop cannot access the Internet after the preceding
configuration, the Internet Service Provider might have bound your Internet access account to
dia Access Control (MAC) address of the network adapter of your old desktop
the Me
computer. To remove the restriction, consult the Internet Service Provider.
The terminal supports enabling or disabling the WLAN function. Thus, you can enable
or disable the WLAN function as required.
Configuration Example
To disable the WLAN function, do as follows:
Step 1
Step 2
Step 3
Log in to
Choose
The WLAN configuration page is displayed.
Clear
----End
the Web-based configuration utility.
Wireless
En
You can also use the Wi-Fi button on the side panel of the term
WLAN function. More details, see 5.1 "Setting Up a Wireless Connection by the Wi-Fi
Button."
The terminal supports the home storage function. Portable storage devices, such as USB
flash drives and portable hard disks, can be connected to the USB port on the terminal. If
your portable storage device is a card reader, insert the storage card (for example CF, SD,
and MMC card) in the card reader, and then connect the card reader to the USB interface
of the terminal. The hard disks of the NTFS format support read only, cannot write.
Configuration Example
To access a portable storage device, do as follows:
Step 1
Step 2
Enable th
1.
2.
3.
4.
5.
Connect a portable stor
method, see the following figure.
e FTP server. To configure parameters of the FTP server, do as follows:
Log in to the Web-based configuration utility.
Choose Advanced Setup > FTP
Select Enabled.
Enter the name and password of the FTP in the UserName and Password text boxes.
Enter the password again in the Confirm Password text box.
Click Save/Apply to save the settings.
age device to the USB port on the terminal. For the connection
the navigation tree.
in
Figure 6-1
After connecting the cables, you can access the portable stor
methods as follows.
The signals of a WLAN are transmitted in the air. Therefore, unauthorized persons can
receive the wireless signals easily. If the wireless signals are not encrypted, unauthorized
persons may use your WLAN or obtain the data transmitted on the WLAN. To ensure the
security of the data transmitted on the WLAN, the terminal provides multiple
security-related settings for the WLAN function. You can change these settings as
required to protect your WLAN from unauthorized access.
6.5.1 Hiding the Name of a WLAN
Function Overview
When accessing a WLAN, the user of a wireless client needs to enter the correct name of
the WLAN, that is, the service set identifier (SSID) of the WLAN. Generally, the
wireless signals transmitted from a wireless terminal carries the SSID. The wireless
adapter of a PC can find and display the SSID for selection and confirmation. Thus,
manual operations for selecting and configuring the WLAN can be simplified. The
SSID, however, is not encrypted. Therefore, anyone can find the
the SSID, and the security of the WLAN is reduced.
The terminal provides the function of hiding the SSID. After this function is enabled, the
wireless signals transmitted from the terminal do not carry the SSID. Thus, it is not
possible for unauthorized people to obtain the SSID from the wireless signals. In
addition, the user of a PC needs to enter the correct SSID manually to add the PC to the
WLAN. Thus, the security of the WLAN is increased.
The terminal also provides the multi-SSID function. You can configure 4 SSIDs, and
then enabl
e one or multiple of them.
WLAN, and then view
Through the multi-SSID function, multiple virtual acces
established. For a wireless client, each virtual access point can be used as a physical access
point. In addition, each virtual access point has its SSID.
You can disable the SSIDs that are not required. After an SSID is disabled, a wireless
client cannot connect to the WLAN that is indicated by this SSID. Note that all the
external connection channels of a WLAN are closed if all the SSIDs of the WLAN are
disabled. To use the WLAN, you need to enable the WLAN function and at least one
SSID. In addition, to use the WPS function, you should enable SSID1.
Configuration Example
To use and hide SSID1 and disable the other SSIDs (so that the WLAN cannot be found
>
Basic
SSID
in
the navigation tree.
text box.
by others), do as follows:
Log in to the Web-based configuration utility.
If you consider the use of a WLAN is inconvenient after the SSID of the WLAN is hidden,
you can r
Enable. Then click Save/Apply.
option text box. Then click
estore the function of broadcasting the SSID as follows: For Hide Broadcast, clear
option text box.
option text box, and then click
Function Overview
If the terminal has hidden the SSID of a WLAN, you need to enter the SSID of the
WLAN manually when you use a PC to access the WLAN. If you enter a wrong SSID,
the PC cannot connect to the WLAN. Therefore, the security of the WLAN can be
improved if the SSID is difficult to be predicted.
An SSID consists of 1-32 American Standard Code for Information Interchange (ASCII)
characters. When the terminal is delivered, the SSID is preset. You can find this preset
SSID on the label on the real panel of the terminal. In addition, the terminal supports the
change of the SSID. You can change the SSID as required.
area, enter
Save/Apply
Save/Apply
in the
SSID2
.
.
SSID
text box.
Configuration Example
If your current SSID index is SSID1 and if you have used this SSID for a certain period,
to change this SSID to MyNewSSID, do as follows:
Log in to the Web-based configuration utility.
Step 1
Choose
Step 2
Step 3
Step 4
6.5.3
Using Secure Encryption
Wireless
The WLAN configuration page is displayed.
Clear
SSID1
Click
Save/Apply
----End
in
>
SSID
.
the navigation tree.
in
Basic
text box, and enter
NewSSID
My
Function Overview
To ensure the security of a WLAN, an important solution is to select an optimum security
mode for the WLAN. After this security mode is used, a wireless client should provide
the corresponding password when connecting to the WLAN and data is being
transmitted after secure encryption. Thus, only authorized persons can use the WLAN
and the data transmitted on the WLAN is protected against unauthorized access.
The terminal supports WEP encryption and multiple security modes, such as WPA-PSK
and WPA2-PSK, thus meeting security requirements in diversified network
environments.
It is recommended that you set the security mode to WPA-PSK/WP
A2-PSK and the
encryption mode to AES. Thus, the WLAN works efficiently and the security of the
WLAN is ensured. In addition, if a wireless adapter does not support a certain security
mode, it cannot be connected to the WLAN in this security mode. If you use the
recommended security and encryption modes, this problem can be avoided.
zThe WPS function can be used only when the security mode is set to WPA-PSK or
WPA2-PSK.
z AES = Advanced Encryption Standard
Table 6-1 lists the rules for setting the password used for accessing a WLAN in different
security modes.
Table 6-1 Rules for setting
Security
Password Setting Rule
Mode
WEP
z
encryption
z
WPA-PSK
or
The password consists of 8–63 visible ASCII characters entered
through a keyboard or 64 hexadecimal characters.
WPA2-PSK
Configuration Example
If you use the terminal at home, to select an optimum security mode, plan the parameters
as follows:
z
Set the security mode to WPA-PSK/WPA2-PSK.
z
Set the encryption mode to AES.
z
Set the password used for accessing the WLAN to MyPassword.
To set the preceding parameters, do as follows:
Log in to the Web-based configuration utility.
Step 1
Step 2
Choose
Wireless
>
the password used for accessing a WLAN
It uses 64-bit encryption (also referred to as 40-bit encryption).
The password consists of five visible ASCII characters entered
through a keyboard or 10 hexadecimal characters.
It uses 128-bit encryption (also referred to as 104-bit encryption).
The password consists of 13 visible ASCII characters entered
through a keyboard or 26 hexadecimal characters.
After the password used for accessing a WLAN is change
password when connecting a PC to the WLAN.
d, you need to enter the new
6.5.4 Allowing Only Specified PCs to Be Connected to a WLAN
Function Overview
After the SSID is hidden and an optimum security mode is used, your WLAN is in a
secure state. You can prohibit certain PCs from being connected to the WLAN or allow
only specified PCs to be connected to the WLAN, thus preventing unauthorized users
from accessing the WLAN.
Through the wireless MAC filtering function of the terminal, the preceding functions can
be used after
The wireless MAC filtering function can be implemented in the following modes:
z
Blacklist: The PCs whose MAC addresses are listed in the filtering list are prohibited
from being connected to the WLAN.
z
Whitelist: The PCs whose MAC addresses are listed in the filtering list are allowed
to be connected to the WLAN.
You can select either of the preceding modes for the wireless MAC filtering function.
you enter the MAC addresses of the PCs to be controlled.
The wireless MAC filtering function controls the option of allowing a PC t
the terminal through a WLAN. The MAC address filtering function described in section 6.6
"Controlling the Internet Access Rights of PCs" controls the option of allowing a PC
connected to the term
You can set the maximum number of the devices that are
thus increasing the security of the
example, you have only one laptop that needs to be connected to the WLAN. You can set this
maximum number to 1. After your laptop is connected to the WLAN, other PCs cannot be
connected to the WLAN.
inal to access the Internet.
WLAN. This maximum number ranges from 1 to 32. For
Configuration Example
For example, you have a desktop computer and a laptop at home. The SSID of your
WLAN is MyNewSSID. The desktop computer is connected to the terminal through a
network cable. A wireless network adapter is installed on the laptop. To allow only the
laptop to be connected to the WLAN and prohibit other unauthorized users from
accessing the WLAN, you can use the whitelist mode of the wireless MAC filtering
function. To create a whitelist and allow only your laptop to be connected to the WLAN,
do as follows:
Step 1
View and record
the MAC address of the laptop.
Take the Windows XP operating system as an example. To view the MAC address of a
PC, do as follow
1.
Choose Start > Run.
2.
In Open, ente
3.
In the displayed command line window, enter ipco
s:
r cmd. Then press Enter.
nfig/all. Then press Enter.
Multiple lines of information is displayed. You can find a line of information that is
e navigation tree.
The WLAN configuration page is displayed.
S
Step 4
Step 5
Step 6
Step 7
Select
Click
In
MAC ad
MyNewSSID
Allow
.
Add
d
elect
For example, the MAC address is 00:11:09:1
in the
Select SSID
drop-down list box.
.
text box, enter the MAC address of the laptop.
ress
1:04:DD.
The format of the MAC address entered in Source MAC address is differ
MAC address displayed in the command line window of a Windows XP operating system.
The colons (:) replace the hyphens (-).
You can prohibit certain PCs from accessing the Internet or allow only certain PCs to
access the Internet. In addition, you can set the period during which certain computers
are not allowed to access the Internet.
Through the MAC address filtering function of the terminal, the preceding requirements
can be
met after you enter the MAC addresses of the PCs to be controlled.
The MAC address filtering function can be implemented in the following modes:
z
Blacklist: The PCs whose MAC addresses are listed in the filtering list are prohibited
from accessing the Internet.
z
Whitelist: The PCs whose MAC addresses are listed in the filtering list are allowed
to access the Internet.
You can select either of the preceding modes for the MAC address filtering function.
The MAC address filtering function controls the option of allowing a PC connected to the
term
inal to access the Internet. The wireless MAC filtering function controls the option of
allowing a PC to be connected to the terminal through a wireless network.
Configuration Example
For example, you have bought a PC for your child who is in a primary school. To restrict
the Internet access period of the child to from 19:00 to 20:00 in each evening and to
protect your PC from being restricted, you can use the blacklist mode of the MAC
address filtering function.
Suppose the MAC address of the PC of your child is 00:11:09:11:04:DD.
After the function of automatically synchronizing the time of the terminal with the
Step 1
Step 2
Step 3
Step 4
network time is enabled,
z
Rule 1: From 00:00 to 18:59 each day, prohibit the PC whose MAC address is
00:11:09:11:04:DD from accessing the Internet. The name of this rule is Internet
access before 19:00 in the evening.
z
Rule 2: From 19:59 to 23:59 each day, prohibit the PC whose MAC address is
00:11:09:11:04:DD from accessing the Internet. The name of this rule is Internet
access after 20:00 in the evening.
The configuration procedure is as follows:
Log in to the Web-based configuration utility.
In the naviga
Click
Set the followin
z
User Name: Internet access before 19:00 in the evening
z
Other MAC Address: 00:11:09:11:04:DD
tion tree, choose
.
Add
g parameters based on rule 1.
you need to create the following two filtering rules:
You can configure all the parameters of the terminal through the Web-based
configuration utility. To prevent unauthorized personnel from changing these param
you need to use the administrator name and password to log in to the Web-based
configuration utility.
After logging in
password.
If you cannot remember the password that has been changed, you can restore the default
settings of the terminal by pressing and holding the RESET button for more than 3s. In this
case, the login passwo
When the default settings are restored, your customized data is lost. Therefore, use the RESET
button with caution
to the Web-based configuration utility, you can change the administrator
rd of the Web-based configuration utility is restored
.
to VF-IRhg556.
uration Example
The administrator password is VF-IRhg556. Fo
MyWebPassword, do as follows:
Log in to the Web-based configuration utility.
Choose
Crameters-1. Generally keep the default settings is OK.
hange the pa refer to Table 7
Tameters f
able 7-1 Paror the Local Area Network (LAN) Setup page
Parameter Description
IP Address
Subnet Mask It specifies the subnet mask of the LAN interface.
LAN Domain
LAN
MTU:[296-1500]
Enable IGMP
Snooping
Enable/Disab
DHCP Se
le
rver
Start/End IP
Address
Leased Time
(hour)
Click
Save
to save th
configuration and reboot the terminal to make the new configuration effective.
----End
>
in the navigation tree.
LAN
It specifies the IP address of the LAN interface of the terminal.
You can access the Web-based configuration
terminal by
using this IP address. If the DHCP function of the
terminal is enabled, the terminal assigns an IP address that is in
the same n
etwork segment as that of this interface to a
computer.
If the IP address of the LAN interface is changed, ensure that
the IP address of the
computer and the IP address of the LAN
interface of the terminal are in the same network se
this case, you need to enter the new IP address in the
bar of an explorer.
It specifies the domain to enter the web Web-based
configuration utility
Vodafone.DSLRouter
configuration uti
. The default LAN domain is
. In this c
lity, you need to enter
in the address bar of InternetExplorer.
length of the tran
LAN interface.
enable the IGMP Snooping functio
the terminal
.
An IP address pool contains multiple consecutive IP a
that can be assigned to the computers on the LAN. This
parameter specifies the start IP address of the IP address pool
It specifies the period during which a computer on the LAN
can use an assigned IP address.
e LAN configuration. Click
Save/Reboot
utility of the
gment. In
address
ase, to access the Web-bas
Vodafone.DSLRouter
sported IP package of the The maximum
ddresses
the IP address pool. It specifies the end IP address of
By using the parameter
of the terminal to a PC. If the configuration file o
you can import the backup file to the terminal.
backup function, you can save a backup of the configuration file
f the terminal is modified by mista
ke,
Config
Step 1
Step 2
Step 3
Step 4
Step 1
Step 2
Step 3
Step 4
Step 5
7.4 Re
uration Example
For example, you have modifi
requirements; and you need to modify the para
a network access failure due to mis-operations,
the terminal. Once the modification of the parameters fails, you can
terminal to the normal state.
To back up the configuration file, do as follows:
Log in to the We
Choose
Management
Click
Backup Settings
In the displayed dialog box, set the name and sto
c
Then cli
----End
To update the configuration file, do as follows:
Log in to
Choose
Management
Click
Br
In the displayed dialog box, select the updated configuration file. Then click OK.
Click
Update
----End
b-based configuration utility.
k OK.
the Web-based
.
owse
Settings
ed multiple advanced parameters according to actual
mete
rs again for some reasons. To prevent
you can back up the configuration file of
>
Settings > Backup
.
igur
conf
>
Settings > Update
.
ation utility.
in the navigation tree.
rage location of the configuration file.
in the navigation tree.
quickly restore the
storing Default Settings
Functio
Huawei Proprietary and Confidential
n Overview
The terminal provides powerful functions and rich parameters. Many parameters are set
ult when the terminal is manufactured. Those parameters enable the terminal to
by defa
work in most of network environments. In the following cases, you can restore
default settings of the terminal: Y
the parameters or you have forgotten the login
utili
ault settings by using either of the following methods:
ou cannot access the network after you have changed
the
p
assword of the Web-based configuration
7-3
7 Maintenance Guide
z
Pressing the RESET button
z
Using the Web-based configuration utility
Config
Step 1
Step 2
p 3
Ste
7.5 Re
Functio
uration Example
For example, you have changed the login password of the Web-based configuration
utility and
quickly restore the default settings of the terminal.
When the terminal is powered on, press and hold the RESET button for more than 3s,
and then release it. Then the terminal automatically restarts and the default settings a
restored.
If your operations fail after multiple configurations and if you need to cancel
preceding configurations, you can use the Web-based configuration utility to
default settings. To restore the def
utility, do
Log in to the Web-based configuration utility.
Choose
Click
----End
you have forgotten the login password. You can press the RESET button to
ault settings through the web-based configuration
as follows:
Management
Restore Default Settings
>
Settings > Rest
ore Default
.
in the navigation tree.
all the
restore the
starting the Terminal
n Overview
The terminal provides restart function.
You can restart the term
z
Pressing the RESTART button
z
Using the Web-based configuration utility
inal by using either of the following methods:
re
Config
Step 1
Step 2
Ste
uration Example
For example, you have changed the login passw
utility and you wish to make it effective, you can press the RES
use the new password
To restar
Log in to the Web-based configuration utility.
Choose
Click
p 3
----End
7-4 Huawei Proprietary and Confidential
t the terminal through the web-based configuration utility, do as follows:
Question 1: Can I use the terminal as a DHCP server?
Yes, you can. The terminal incorporates the DHCP server software.
Question 2:
Question 3: What can I do if I cannot access the terminal configuration page?
Step 1
Step 2
Step 3
Question 4:
How can I
To restore the default settings of the terminal, power on the terminal, press and hold the
RESET button for a minimum of five seconds, and then release the RESET button.
the IP
Check address of your computer and ensure that this IP address is in the same
network segment as
Ensure that your Web browser does not use a proxy serve
Ensure that
accessing the terminal configuration page.
If the problem persists, restore
----End
quickly restore the default settings of the terminal?
the LAN IP address of the terminal.
r.
you have entered the correct user name and user
the default se
ttings of the terminal.
password that are used for
What can I do if Web pages often cannot be displayed during
Web page browsing and can be displayed after the terminal is
restarted?
sure that the te
Enrminal and other devices such as telephones or fax machines are
Step 1
Step 2
Step 3
connected to the telephone cable through
For details about how to install a splitter, see the rela
Ensure that telephone cables
If the telephone
is affected.
Check the po
electric appliances such as microwave ovens, refrigerators, or cordless telephones that
generate strong magnetic or electric fields.
If the problem persists, contact your service
----End
cables are improperly connected, the s
sitions of your terminal and computer. Ensure that they are far from the
Question 5: What can I do if noises exist during telephone calls?
Ensure that a splitter is installed.
Step 1
A splitter helps to protect the call quality of th
e asymmetric digital subscriber line
(ADSL) from being affected due to the interference of other type of signals.
Ensure that telephone cables are properly connected. Especially ensure that the
Step 2
telephone cable connecting to the splitter is properly connected.
Step 3
Step 4
Replace telepho
Check the pos
ne cables and ensure that the telephone cables are not faulty.
itions of your terminal and computer. Ensure that they are far from the
electric appliances such as microwave ovens, refrigerators, or cordless telephones that
generate strong magnetic or electric fields.
----End
Question 6:
Ensure that the power cables and telephone cables of the terminal are properly
Step 1
connected.
Check whether the Wi-Fi indicator of the terminal is on.
Step 2
If the Wi-Fi indicator is off, you can infer that the wireless local area network (WLAN)
function of th
For details about how to enable the WLAN function, see the manual of the terminal.
See the
Step 3
check whether the wireless network adapter supports the 802.11b, 802.11g and 802.11n
protocols.
If the wireless network adapter does not support the 802.11b, 802.11g and 802.11n
protocols, replace it with the network adapter
Check whether the driv
Step 4
computer.
If the driver is improperly installed, install it properly.
Check whet
Step 5
Take a computer that runs Windows XP as an example. To check whether the computer
can re
1.
2.
If the computer cannot detect a WLAN, place the computer close to the terminal and
ensure that no obstacles such as cement or wooden walls are present between the
wireless client and the terminal.
Check whet
Step 6
What can I do if the terminal cannot access the Internet through
a wireless network adapter?
e terminal is disabled. In this case, enable the WLAN function.
description of the wireless network adapter that is installed on the computer and
that supports the protocols.
er for the wireless network adapter is properly installed on the
her the computer can receive the signals of a WLAN.
ceive the signals of a WLAN, do as follows:
In the Control Panel window, double-click Network Connections to display the
Network Connections window.
In the Network Connections window, right-click Wireless Network Connection
and choose View Available Wireless Network.
her the computer accesses the WLAN of the terminal successfully.
Check the list of wireless network connections and ensure that the terminal is connected
to the WLAN.
Ensure that the PPP dialing software is properly installed and that the parameters of the
Step 7
software are correctly configured.
Check whether you can use the PPP dialing software to dial successfully.
Step 8
Try to
Step 9
access multiple Web sites to check whether the terminal can access other Web
sites.
If the terminal cannot access othe
terminal. If the problem persists, contact your Internet Service Provider.
----End
r Web sites either, restore the default settings of the
Question 7:
Check the positions of your terminal and computer. Ensure that they are far from the
Step 1
electric appliances such as microwave ovens, refrigerators, or cordless telephones that
generate strong magnetic or electric fields.
Place y
Step 2
Although radio signals can pass through obstacles, th
radio signals are affected if radio signals pass through too many obstacles such as cement
or wooden walls.
Place
Step 3
If your computer is far from your terminal, the effects of the WLAN are affected.
P
Step 4
Do not use y
Step 5
----End
Question 8:
Delete the settings of wireless network connections from your computer.
Step 1
Take a computer that runs Windows XP as an example. To delete the settings of wireless
network connections, do
1.
2.
3.
What can I do if sometimes the terminal cannot access the
Internet through a wireless network adapter or if the WLAN
connection is unsteady?
our terminal in an open position.
e transmission effects of WLAN
your computer close to your terminal.
your terminal and computer in another direction.
lace
our terminal to access a WLAN during thunderstorms.
What can I do if the WLAN of the terminal is not encrypted and
the computer cannot access the WLAN?
as follows:
In the ControNetwork Connections window.
In the Network Connections window, right-click Wireless Network Connection
and choose Properties.
In the Wireless Network Connection Properties dialog box, click the Wireless
Networks tab.
l Panel window, double-click Network Connections to display the