DMINISTRATION>REMOTE CONTROL
DMINISTRATION>REMOTE CONTROL
DMINISTRATION>REMOTE CONTROL
DMINISTRATION>REMOTE CONTROL
DMINISTRATION>PASSWORD
YSTEM>DATE/TIME>DATE
YSTEM>DATE/TIME>TIME ZONE
YSTEM>UPGRADE FIRMWARE>UPGRADE FILE
YSTEM>UPGRADE FIRMWARE>UPGRADE LINK
YSTEM>UPGRADE FIRMWARE
YSTEM>LOG
YSTEM>BACKUP/RESTORE>BACKUP
ILE DOWNLOAD
AVE FILE AS
YSTEM>BACKUP/RESTORE>RESTORE
This chapter provides an overview of the WiMAX modem and describes its features and system
requirements.
This chapter contains the following topics:
Introduction
Features
System Requirements
Introduction
Congratulations on becoming the owner of the WiMAX modem. You will now be able to access the
Internet using high-speed WiMAX connection. This user manual will show the User how to install and
set up this device.
Features
WiMAX Module for high-speed internet access Features
10/100Base-T Ethernet to provide Internet connectivity for all computers on User LAN
Supports 802.16e WAN
Access configuration program via a HTML browser
System Requirements
In order to use this WiMAX modem, User must have the following:
Up and running ISP service on User WiMAX network
A web browser such as Internet Explorer v5.0, Netscape v4.7 or later- For system configuration,
using the supplied web-based program.
1
Page 10
WM5347N User Manual
2. Installation
2.1. In The Box
In addition to this document, the WiMAX modem should come with the following:
1. Warranty Card x 1
2. Quick Installation Guide x 1
3. CD-ROM x 1
4. WM5347N x 1
5. Power Adaptor x 1
6. Ethernet Cable x 1
01
02
03
04
05
06
Figure 1. Device Installation
2
Page 11
WM5347N User Manual
2.2. Indicators
LEDs on the front panel indicate the status of WiMAX modem (see Figure 2).
Figure 2. Device Front Panel
Label Color Function
Power Green On: Unit is powered on
Off: Unit is powered off
WiMAX Orange On: WAN is active
Off: No WAN link
WLAN Green On: WIFI is enabled
Off: WIFI is disabled
3
Page 12
Green Signal strength of the WiMAX
VoIP1 / VoIP2 Green On: Registered on server
Off: Non-register
LAN1 / LAN2 Green On: LAN connected
Blinking: Data transfer
Off: No connection
Note: LAN LED’s are on RJ-45 connectors.
WM5347N User Manual
Table 1. Illustration of WM5047 Front Panel
2.3. Connectors
Ports on the rear panel for WiMAX modem are for data and power connections (see Figure 3).
Figure 3. Device Pear Panel
4
Page 13
WM5347N User Manual
Label Function
LAN1, LAN2 RJ-45 connector: Connect device to PC’s Ethernet port, or to
the uplink port on LAN hub, using the cable provided.
PHONE1,
PHONE2
RJ-11 connector: Connect device to telephone port using the
cable provided.
RESET Press 5 seconds to return device to Factory Default Setting.
ON / OFF Power ON / OFF the modem.
POWER Connect to the supplied power adapter cable.
Table 2. Illustration of Device Rear Panel
Before you start, switch off all
devices.
WARNING
These include the User computer(s),
User LAN hub /switch (if applicable),
and WiMAX modem.
5
Page 14
WM5347N User Manual
2.4. Network Connection
Figure 4 illustrates the hardware connections. The layout of the parts on the device may differ from
the layout shown. Refer to the steps below for specific instructions.
Figure 4. Overview of Hardware Connections
Step 1. Connect Ethernet cable.
If user is connecting WiMAX modem to LAN, attach one end of the Ethernet cable to a regular hub
port or PC, and the other to the Ethernet port on WiMAX modem.
Step 2. Attach power connector.
Connect AC power adapter plug to DC 12V connector on the back of the WiMAX modem and plug
power adapter into a wall outlet or power strip.
Step 3. Turn the power switch to ON.
Turn the power switch to ON.
6
Page 15
WM5347N User Manual
Step 4. Configure WiMAX modem through WEB interface
The detail for Step 4 will be described in Chapter 3. It will help user to configure the WiMAX modem
based on user needs.
Step 5. Save the configurations and Reboot.
All the settings that user makes on the WiMAX modem will take effect after rebooting.
7
Page 16
WM5347N User Manual
3. Introduction
The CPE Software platform comes from with a Web-based Configuration Manager, which gives
users the ability to manage, configure and analyze the platforms environment. The Connection
Manager works with all versions of Windows after Windows 95.
The supported browser version:
Internet Explorer 6.0 or later (Recommended)
Netscape 7.1 and higher
Firefox 1.0 and higher
Mozilla 1.5 and higher
3.1. Connect
User need to connect to the CPE platform properly. It’s assumed that the user has a fully working
CPE platform and properly connected. From the web browser, connect to the device by entering the
IP address of the device; it will prompt you to enter your username and password. The default
usernames and passwords are as follows:
Username/password
admin/admin
guest/guest
Figure 5. Login
8
Page 17
WM5347N User Manual
3.2. Logout
The “Logout” window allows users to disconnect from the device and exit the Web-based
Configuration Manager.
Figure 6. Logout
3.3. Home
After you’ve established a connection, you will see the “Home” window. This window shows all the
settings as they currently are configured and system information. It gives you an initial overview of
the current status of your device.
Figure 7. Home
9
Page 18
WM5347N User Manual
3.4. About
The “About” window will show you pertinent version information on the CPE.
Figure 8. About CPE Configuration Manager
10
Page 19
WM5347N User Manual
4. Wizard
The wizard will allow you to quickly configure the basic networking settings on the CPE. Click the
“Wizard” menu item to enter the wizard. The first page will display all the steps necessary to
complete the wizard settings. Click the “Next” button to continue to the next step.
Name Description
Next Continue to the next step.
Back Return to the previous step.
Save Commit the changes mad and save to CPE device.
Step 1: LAN Settings. In this step you can configure both IP and DHCP configuration
parameters.
Figure 9. Wizard LAN Settings
11
Page 20
WM5347N User Manual
Step 2: WiMAX Frequency Settings. This step will quickly configure the WiMAX
frequencies. You have two forms of configuring the frequency. You can configure it
through simply entering a frequency list or by setting a range, by giving a starting and
ending frequency value and a step size to traverse the range.
Figure 10. Wizard WiMAX Frequency (By List)
Figure 11. Wizard WiMAX Frequency (By Range)
Step 3: WiMAX Authentication Settings. This will configure WiMAX Authentication
settings. There are 4 possible options for “Authentication Mode”. Depending on which
mode you select, you will have different EAP settings to configure.
12
Page 21
WM5347N User Manual
Figure 12. Wizard WiMAX Authentication Settings
Step 4: VoIP Settings. This step will configure VoIP.
Figure 13. Wizard VoIP Settings
13
Page 22
WM5347N User Manual
Step 5: Configures WLAN settings. See section WiFi WLAN for complete details on
WLAN setting parameters. Depending on which encryption type you select, you will get
corresponding attributes to configure for that encryption type.
Figure 14. Wizard WLAN Settings
Once you’ve completed all the steps, you need to click on the “Save” button to save the settings, or
click on “Back” to return to the previous step. It will reload some services and return to the “Home”
window.
14
Page 23
WM5347N User Manual
Figure 15. Wizard Save
15
Page 24
5. Network
Refer to Figure 12, for proper network connection.
WM5347N User Manual
Figure 16. Network Topology
5.1. LAN
5.1.1. IP
From the “Network>LAN>IP” window, you can update the LAN information.
Name Description
IP Address IP address of the CPE device.
IP Subnet Mask Subnet Mask of the CPE device.
Save Commit the changes made, and set the LAN IP information,
some services will be reloaded.
Cancel Reset fields to the last saved values.
16
Page 25
WM5347N User Manual
Figure 17. Network>LAN>IP
5.1.2. DHCP
Use the “Network>LAN>DHCP” tab to configure the DHCP server information. There are three DNS
servers the user can configure to assign an IP address. Static DHCP will assign an IP address on
the LAN to a specific device based on its MAC address.
“Network>LAN>DHCP”
Name Description
DHCP Server
DHCP Mode None
Server
Relay
When Server mode is selected, the DHCP server will
assign IP address to its client with the specified IP
address range.
When Relay IP mode is selected, you need to assign a
DHCP relay agent in “Relay IP” column.
Start IP Starting IP address range.
End IP Ending IP address range.
Lease Time The lease time is a controlled time period, allowing the
DHCP server to reclaim (and then reallocate) IP
addresses that are not renewed (dynamic re-use of IP
addresses) Lease time is measured in minutes in the
Configuration Manager.
Relay IP User needs to assign a DHCP relay agent IP address,
when “Relay mode” selected.
DNS Server assigned
First DNS Server You can specify three DNS server and select how the
17
Page 26
WM5347N User Manual
Second DNS Server
Third DNS Server
DNS Server is assigned. There are three options for
assigning the DNS server:
From ISP
User Defined
None
If User selects “None”, then the DHCP server will not give
clients the DNS server information. If all the three DNS
servers setting are set to “None”, then the DHCP server
will use the LAN IP address as the DNS server
information for the clients. If the user chooses “User
Defined” and leaves the IP address as “0.0.0.0” it will
change the field to “None”.
Static DHCP
Add Click on the “Add” button, to enter a static leased IP
address. Enter the MAC address of the Ethernet device
and enter the IP address.
OK Click the “OK” button to exit the table edit mode.
DHCP Leased Hosts
Refresh Click the “Refresh” button to refresh DHCP leased hosts
information.
Save Commit the changes made, and save to CPE device,
some services will be reloaded.
Cancel Reset fields to the last saved values.
18
Page 27
WM5347N User Manual
Figure 18. Network>LAN>DHCP
5.2. WAN
The wide area network is another network that you can connect to the internet with the CPE device.
5.2.1. WAN
“Network>WAN>WAN”
Name Description
WAN IP
Operation Mode Here provides three operation modes:
Bridge
19
Page 28
WM5347N User Manual
Router
NAT
WAN Protocol Please base on ISP provides connection method to select
one protocol for network connection.
Ethernet
PPPoE
GRE Tunnel
EtherIP Tunnel
Bridging LAN ARP Bridging LAN ARP:
Yes
No
Get IP Method Enter the IP gotten method:
From ISP
User
WAN IP Request
Timeout
The time the DHCP client waits to receive the IP address
from the BS. If it doesn’t get the IP it will timeout and the
CPE will disconnect the WiMAX connection. The default
value is 120 seconds. If you enter 0, will wait to receive the
IP address infinitely until it’s stopped by the user.
WAN IP Address If you chose “User” for IP Method, enter the WAN IP
address.
WAN IP Subnet
Mask
If you chose “User” for IP Method, enter the WAN IP
subnet Mask.
Gateway IP Address If you chose “User” for IP Method, enter the IP gateway
address.
MTU Enter the MTU.
Clone MAC Address Clone MAC address of WAN port.
WAN DNS
First DNS Server Enter the WAN DNS information.
User Defined
From ISP
If you select “User Defined”, you need to enter a valid IP
address for the DNS server.
Second DNS Server See First DNS Server.
Third DNS Server See First DNS Server.
Save Commit the changes made, and save to CPE device, after
clicking the Save button you will get a message asking if
you want to reboot the CPE. Reboot is required so the
20
Page 29
WM5347N User Manual
device can switch to a different profile.
Cancel Reset fields to the last saved values.
Figure 19. Network>WAN>WAN
5.2.2. PPPoE
Before you configure PPPoE, you need to set “WAN” Protocol to “PPPoE” in WAN page.
“Network>WAN>PPPoE”
Name Description
User Name Enter the username.
Password Enter the password.
Retype Password Enter the password again.
Auth Protocol Require the peer to authenticate itself before allowing network
packets to be sent or received. We support the following
protocol:
Protocol.
MSCHAPv2: Microsoft Challenge Handshake Authentication
Protocol, Version2.
Encryption Encryption Scheme:
None:
MPPE 40 bits: 40-bit encryption with MPPE.
MPPE 128 bits: 128-bit encryption with MPPE.
Auto: automatically select encryption scheme.
Idle Timeout Disconnect if the link is idle for the assigned seconds.
AC Name AC name.
DNS overwrite DNS overwrite.
MPPE_Stateful MPPE Stateful.
Connection
Trigger
Timeout
PPPoE Connect Click this button to connect network.
PPPoE
Click this button to disconnect network.
Disconnect
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
22
Page 31
WM5347N User Manual
Figure 20. Network>WAN>PPPoE
5.2.3. GRE
Before you configure GRE, you need to set “WAN Protocol” to “GRE Tunnel” in WAN page.
“Network>WAN>GRE”
Name Description
Peer IP Address Enter IP address.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
23
Page 32
WM5347N User Manual
Figure 21. Network>WAN>GRE
5.2.4. EtherIP
Before you configure EtherIP, you should set “WAN Protocol” to “EtherIP Tunnel” in WAN tag.
“Network>WAN>EtherIP”
Name Description
Peer IP Address Enter IP address.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
Figure 22. Network>WAN>EtherIP
24
Page 33
5.3. VLAN
“Network>VLAN”
Name Description
Management VLAN
VLAN ID Setting the management VLAN ID.
Priority Setting the management Priority.
Port Settings
PVID Group Select the VLAN group as the PVID
Priority Setting the port Priority.
VLAN Rules
VID Setting the VID of this group.
WM5347N User Manual
Join Add this port into this group.
Tag Mark the out-going packets of this port in this VLAN as
tagged or untagged.
Save Commit the changes made and save to CPE device
Cancel Reset fields to the last saved values
25
Page 34
WM5347N User Manual
Figure 23. Network>VLAN
26
Page 35
5.4. DDNS
“Network>DDNS”
Name Description
Enable Dynamic DNS Click the check box to enable dynamic DNS.
Service Provider Enter the URL of the service provider.
Service Type* Enter the service type (DYNDNS only)
Domain Name Enter the domain name.
Login Name Enter the username.
Password Enter the password.
WM5347N User Manual
Dynamic
Static
Custom
IP Update Policy Select the Policy to be used:
Auto Detect
WAN IP
User Defined
User Defined IP If you selected “User Defined” ad the IP policy, then enter
the IP address.
Wildcards* Allows hostname to use wildcards such as “*”. It will allow
“*hos.dyndns.org” to be aliased to the same IP address
as “host.hyndns.org”.
MX* Enable mail routing.
Backup MX* Enable Second mail routing.
MX Host* Host where mail will be routed to.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
NOTE: * Supported by DYNDNS service provider
27
Page 36
WM5347N User Manual
Figure 24. Network>DDNS
28
Page 37
WM5347N User Manual
6. Advanced Setting
The “Advanced Settings” window will allow you to set rules for incoming and outgoing traffic.
6.1. NAT
Network Address Translation (NAT) is the process of modifying the network address information
of the host in a packet while in transit, so that it can be remapped to a given address space in
another network. For example, the source address of a packet in a network is changed to a different
IP address known within another network.
6.1.1. Port Forward
The “Advanced>NAT>Port Forward” tab is used to create “Port Forward” rules based on protocol
port. Click the “Add” button to add a Port Forward rule.
“Advanced>NAT>Port Forward”
Name Description
Activate Check the box to activate the “Port Forward” rule.
Name Name of the Port Forward rule.
Protocol Which Protocol to be matched by the rule? Available
Incoming Port(s) Which port range to be matched by the Port Forward rule?
Forward Ports(s) Which port range will be translated to if it matches the rule?
Server IP Which IP address will be translated to if it matched the
Trash Delete the Port Forward rule.
options are: TCP, UDP, or TCP/UDP.
Enter the starting and ending port range.
The packet will be forwarded to one of these ports if it
matches the rule. Enter the starting and ending port range.
rule? The packet will be forwarded to this IP address if it
matched the rule.
Add Click the “Add” button to create a new Port Forward rule.
Wizard The wizard will allow you to quickly configure Port Forward
rule.
OK Click the “OK” button to exit the table edit mode.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
29
Page 38
Figure 25. Advanced>NAT>Port Forward
“Advanced>NAT>Port Forward>Wizard”
WM5347N User Manual
Name Description
Port Forward Rule Select one protocol for Port Forward Rule:
Dynamic Name Server (DNS)
FTP Server
IPSEC
Mail(POP3)
Mail(SMTP)
PPTP
RealPlayer 8 Plus
SSH
SNMP
SNMP Trap
Telnet Server
TFTP
Rule Name Name of the Port Forward rule.
Protocol Which Protocol to be matched by the rule? Available
options are: TCP, UDP, or TCP/UDP.
Incoming Start and
End Port(s)
Forwarding Start and
End Ports(s)
Which port range to be matched by the Port Forward rule?
Enter the starting and ending port range.
Which port range will be translated to if it matches the rule?
The packet will be forwarded to one of these ports if it
matches the rule. Enter the starting and ending port range.
30
Page 39
WM5347N User Manual
Server IP Which IP address will be translated to if it matched the
rule? The packet will be forwarded to this IP address if it
matched the rule.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
Figure 26. Advanced>NAT>Port Forward>Wizard
6.1.2. Port Trigger
The “Advanced>NAT>Port Trigger” tab allows you to configure Port Trigger rules. Port Trigger is a
way to automate port forwarding in which outbound traffic on predetermined ports (“trigger port”)
causes inbound traffic to specific incoming ports to be dynamically forwarded to the initiating host,
while the outbound ports are in use. This allows users behind CPE on the LAN to provide services
that would normally require the computer to have IP address on the LAN. Port triggering triggers an
open incoming port (‘open port’) when a client on the local network makes an outgoing connection
on a predetermined port or range of ports.
“Advanced>NAT>Port Trigger”
Name Description
Activate Check the box to activate the “Port Trigger” rule.
Name Name of the Port Trigger rule.
Protocol Which Protocol the outgoing packet used will trigger the
rule? Available options are: TCP, UDP, or TCP/UDP.
Trigger Port(s) Which ports range the outgoing packet will trigger the rule?
31
Page 40
WM5347N User Manual
Enter the starting and ending port range.
Open protocol Which protocol will be opened if the rule had been
triggered? Available options are: TCP, UDP or TCP/UDP.
Trash Delete the Port Trigger rule.
Wizard The wizard will allow you to quickly configure Port Forward
rule.
Add Click the “Add” button to create a new Port Trigger rule.
OK Click the “OK” button to exit the table edit mode.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
Figure 27. Advanced>NAT>Port Trigger
“Advanced>NAT>Port Trigger>Wizard”
Name Description
Port Trigger Rule Select one application for Port Trigger Rule:
Aim Talk
Asheron’s Call
Calista IP Phone
Net2Phone
RainboxSix/Rogue Spea
Rule Name Name of the Port Trigger rule.
Trigger Protocol Which Protocol the outgoing packet used will trigger the
rule? Available options are: TCP, UDP, or TCP/UDP.
Trigger Start and Which ports range the outgoing packet will trigger the rule?
32
Page 41
WM5347N User Manual
End Port Enter the starting and ending port range.
Open protocol Which protocol will be opened if the rule had been
triggered? Available options are: TCP, UDP or TCP/UDP.
Open Start and End
Port
Which ports range of the protocol will trigger the rule?
Enter the starting and ending port range.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
Figure 28. Advanced>NAT>Port Trigger>Wizard
6.1.3. DMZ
The “Advanced>NAT>DMZ” tab allows you to configure a DMZ (Demilitarized Zone) host IP
address. Enter the IP address of the DMZ host. The “Save” button will save the changes to CPE
device and the “Cancel” button will reset the field to last saved value. Enter “0.0.0.0” to disable DMZ
host.
33
Page 42
WM5347N User Manual
Figure 29. Advanced>NAT>DMZ
6.1.4. ALG
There are three ALGs you can enable from “Advanced>NAT>ALG” tab. ALG allows legitimate
application traffic to pass through the CPE device that would have otherwise been restricted. Without
ALGs, some application may not work well because of NAT/firewall settings. Click on the check box
to enable ALGs.
NOTE: If you are using any of these types of application protocols you need to enable them in the
ALG settings.
In networking, firewalls are used to block un-wanted traffic or prevent from DDoS attacks. It will
prevent unauthorized devices to enter a trusted network.
6.2.1. IP Filter
The IP filter rules will drop or discard traffic that fits the filter criteria.
“Advanced>Firewall>IP Filter”
Name Description
Activate Check the box to activate the “IP Filter” rule.
Source IP/Mask Source IP to filter on and mask.
Source Port Source port to filter on.
Destination IP/Mask Destination IP to filter on and mask.
Destination Port Destination port to filter on.
Protocol Protocol to filter on.
Trash Delete the IP Filter rule.
Add Click the “Add” button to create a new IP Filter rule.
35
Page 44
WM5347N User Manual
OK Click the “OK” button to exit the table edit mode.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
Figure 31. Advanced>Firewall>IP Filter
6.2.2. MAC Filter
“Advanced>Firewall>MAC Filter”
Name Description
MAC List
Blacklist/Whitelist Select Blacklist or Whitelist.
MAC Filter Rules
Activate Check the box to activate the “MAC Filter” rule.
Source MAC Source MAC to filter on and mask.
Destination MAC Destination MAC to filter on and mask.
Mon ~ Sun
Start Time ~ End Time
Add Add a new MAC filter rule.
You can select days of week, and setup the “Start Time”
and “End Time” for MAC filter.
OK Click the “OK” button to exit the table edit mode.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
36
Page 45
WM5347N User Manual
Figure 32. Advanced>Firewall>MAC Filter
6.2.3. DDOS
“Advanced>Firewall>DDOS”
Name Description
TCP SYN Flood It will prevent SYN flood from WAN or LAN.
UDP Flood It will prevent UDP flood to CPE device.
ICMP Flood It will prevent ICMP flood from WAN or LAN.
Port Scan It will prevent port scanning from WAN and issue an alarm
LAND Attack It will prevent LAND attack.
IP Spoof It will prevent IP spoof attack.
ICMP redirect It will prevent ICMP redirect attack.
PING of Death It will prevent ping of death attack.
PING from WAN It will ping from WAN.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
entry in the system log.
37
Page 46
WM5347N User Manual
Figure 33. Advanced>Firewall>DDOS
6.3. Route
A route is a path in the network, which can direct the flow of network traffic.
6.3.1. Static Route
The static route is a hard coded path in the router that specifies how it will get to a certain subnet by
using a defined path.
“Advanced>Route>Static Route”
Name Description
Destination IP Enter the Destination IP address you would like to reach.
Subnet Mask Enter the subnet mask.
Next Hop Select where the next hop will be.
WAN or LAN interface directly
IP Address
Metric Enter the metric value, “cost” of transmission for routing
purposes.
Trash Will remove the selected route.
Add Will enter in edit mode to add a static route.
38
Page 47
WM5347N User Manual
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
Figure 34. Advanced>Route>Static Route
Figure 35. Advanced>Route>Static Route>Add
6.3.2. RIP
The Routing Information Protocol (RIP) is a dynamic routing protocol used in local area networks.
It allows a router to exchange routing information with other routers.
“Advanced>Route>RIP”
Name Description
General Setup
Enable Click the enable check box will activate the RIP routing
rule.
Redistribute
Edit Click “Edit” button to activate the static route or change the
metric value. The static route refers to the static routes
39
Page 48
WM5347N User Manual
defined in Advanced>Route>Static Route window.
OK Click the “OK” button to exit edit table mode.
LAN
Direction None
RX
TX
RX/TX
Version If you select “RX, TX or RX/TX” for Direction you will get
the following RIP version options available.
RIP-1
RIP-2B
RIP-2M
Authentication If you select “RIP-2B or RIP-2M” for Version, you will get
the following Authentication options.
None
Text
MD5
Authentication ID If you select “MD5” for Authentication type, you can enter
the authentication ID and Key.
Authentication Key If you select “Text” for Authentication you can enter a text
authentication key. If you select “MD5” for Authentication
type, you also need to enter an Authentication ID and Key.
WAN
Direction None
RX
TX
RX/TX
Version If you select “RX, TX or RX/TX” for Direction you will get
the following RIP version options available.
RIP-1
RIP-2B
RIP-2M
Authentication If you select “RIP-2B or RIP-2M” for Version, you will get
the following Authentication options.
None
Text
MD5
Authentication ID If you select “MD5” for Authentication type, you can enter
40
Page 49
WM5347N User Manual
the authentication ID and Key.
Authentication Key If you select “Text” for Authentication you can enter a text
authentication key. If you select “MD5” for Authentication
type, you also need to enter an Authentication ID and Key.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
Figure 36. Advanced>Route>RIP
41
Page 50
WM5347N User Manual
6.4. UPnP
Two methods of simplifying the process of connecting a device to the network are available. UPnP
allows devices to connect seamlessly to networks in the home (data sharing, communications, and
entertainment) and in corporate environments for simplified installation of computer components.
NAT Port Mapping Protocol (NAT-PMP) allows a computer in a private network (behind a NAT router)
to automatically configure the router to allow parties outside the private network to contact itself.
6.4.1. UPnP Setting
“Advanced>UPnP”
Name Description
Enable UPnP Check the check box to enable UPnP.
Enable NAT-PMP Check the check box to enable NAT-PMP.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
Figure 37. Advanced>UPnP
6.5. IGMP Proxy
IGMP proxy enables the system to issue IGMP host messages on behalf of hosts that the system
discovered through standard IGMP interfaces. The system acts as a proxy for its hosts.
6.5.1. IGMP Proxy Setting
“Advanced>IGMP Proxy”
Name Description
Enable IGMP Proxy Check the check box to enable IGMP Proxy.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
42
Page 51
Figure 38. Advanced>IGMP Proxy
6.6. Content Filter
“Advanced>Content Filter”
WM5347N User Manual
Name Description
URL List
Enable URL Filter Check the check box to enable URL Filter
Blacklist/Whitelist Select Blacklist or Whitelist:
Blacklist : The URL list in “URL Filter Rules” wouldn’t be
allowed to access.
Whitelist : Only allow to access the URL list in “URL
Filter Rules”.
URL Filter Rules
Active Check the box to activate the “URL Filter” rule.
URL Enter the URL.
Add Add a new URL filter rule.
OK Click the “OK” button to exit edit table mode
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
43
Page 52
WM5347N User Manual
Figure 39. Advanced>Content Filter
44
Page 53
WM5347N User Manual
7. VPN Setting
The “VPN Settings” window will allow you to set rules for VPN.
7.1. PPTP
The Point-to-Point Tunneling Protocol (PPTP) is a method for implementing virtual private
networks. PPTP does not provide confidentiality or encryption; it relies on the protocol being
tunneled to provide privacy.
7.1.1. PPTP Server
“VPN>PPTP Server”
Name Description
PPTP Server
Enable Activate PPTP server.
Server Name Offer a server name.
Auth Protocol Require the peer to authenticate itself before allowing
network packets to be sent or received. We support the
following protocol:
Local IP Address The IP of router.
Remote Start IP As sessions are established, IP addresses are assigned
starting from “Remote Start IP”.
Idle Timeout Disconnect if the link is idle for the assigned seconds.
DNS Server 1 The primary DNS (Domain Name Server) addresses to the
45
Page 54
WM5347N User Manual
clients.
DNS Server 2 The secondary DNS (Domain Name Server) addresses to
the clients.
User Access List
User Name Username to connect PPTP server via the selected Auth
Protocol.
Server Server protocol type.
Password Password to connect PPTP server via the selected Auth
Protocol.
IP Address IP address of the connected client.
Connection List
User Name The user name of the connection.
Remote IP Address The peer address of the connection.
PPTP IP Address The assigned IP address of PPTP.
Login Time The time of the connection created.
Link Time(s) Timer from the connected time.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
46
Page 55
WM5347N User Manual
Figure 40. VPN>PPTP Server
7.1.2. PPTP Client
“VPN>PPTP Client”
Name Description
PPTP Client
Add Add a new connection setting.
Edit Edit the existed connection setting.
Edit PPTP Client
Profile Name The name of this connection setting.
Auth Protocol The authentication protocol of the peer required.
Encryption Encryption Scheme.
Server IP Address The IP address of PPTP server.
User Name The username to connect PPTP server via the selected
47
Page 56
WM5347N User Manual
Auth Protocol.
Password The password of the corresponding username.
Retype Type the “Password” again.
Get IP automatically? Obtain the dynamic IP address, assigned by the PPTP
server.
Assign IP Address Assign the static IP address for this connection setting.
Idle Timeout Disconnect if the link is idle for the assigned seconds.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
Figure 41. VPN>PPTP Client
Figure 42. VPN>PPTP Client>Add
48
Page 57
WM5347N User Manual
7.2. L2TP
In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support
Virtual Private Networks (VPNs). It dies not provide any encryption or confidentiality by itself; It relies
on an encryption protocol that it passes within the tunnel to provide privacy. The entire L2TP packet,
including payload and L2TP header, is sent within a UDP datagram. It is common to carry
Point-to-Point Protocol (PPP) sessions within an L2TP tunnel. L2TP does not provide confidentiality
or strong authentication by itself. IPsec is often used to secure L2TP packets by providing
confidentiality, authentication and integrity.
http://en.wikipedia.org/wiki/L2TP#cite_note-0
7.2.1. L2TP Server
“VPN>L2TP Server”
Name Description
L2TP Server
Enable Check the box to activate L2TP server.
Server Name Enter a server name.
Auth Protocol Require the peer to authenticate itself before allowing
network packets to be sent or received. The following
protocol are supported:
No
MPPE 40 bits: 40-bit encryption with MPPE.
MPPE 128 bits: 128-bit encryption with MPPE.
Auto: automatically select.
Local IP Address The IP of router.
Remote Start IP As sessions are established, IP addresses are assigned
starting from “Remote Start IP”.
Restrict Client IP? To restrict IP address range for the client.
Allow Client IP The IP address range for the client.
Idle Timeout Disconnect if the link is idle for the given number of
49
Page 58
WM5347N User Manual
seconds.
DNS Server 1 The primary DNS (Domain Name Server) addresses to the
clients.
DNS Server 2 The secondary DNS (Domain Name Server) addresses to
the clients.
User Access List
User Name Username to connect L2TP server via the selected Auth
Protocol.
Server Server protocol type.
Password Password to connect L2TP server via the selected Auth
Protocol.
IP Address IP address of the connected client.
Connection List
User Name The user name of the connection.
Remote IP Address The peer address of the connection.
L2TP IP Address The assigned IP address of L2TP.
Login Time The time of the connection created.
Link Time(s) Elapsed time connected.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
50
Page 59
WM5347N User Manual
7.2.2. L2TP Client
“VPN>L2TP Client”
Name Description
L2TP Client
Add Add a new connection setting.
Edit Edit the existed connection setting.
Edit L2TP Client
Profile Name The name of this connection setting.
Auth Protocol The authentication protocol of the peer required. Select
Figure 43. VPN>L2TP Server
which Authentication protocol to use.
51
Page 60
WM5347N User Manual
PAP
CHAP
MSCHAPv1
MSCHAPv2
Encryption Encryption Scheme:
No
MPPE 40 bits: 40-bit encryption with MPPE.
MPPE 128 bits: 128-bit encryption with MPPE.
Auto: automatically select.
Server IP Address The IP address of L2TP server.
User Name The username to connect L2TP server via the selected
Auth Protocol.
Password The password of the corresponding username.
Retype Type the “Password” again.
Get IP automatically? Obtain the dynamic IP address, assigned by the L2TP
server.
Assign IP Address Assign the static IP address for this connection setting.
Idle Timeout Disconnect if the link is idle for the assigned seconds.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
Figure 44. VPN>L2TP Client
52
Page 61
WM5347N User Manual
Figure 45. VPN>L2TP Client>Add
7.3. IPsec
Internet Protocol Security (IPsec) is an end-to-end security solution and operated at the IP Layer.
It provides secure communication between pairs of hosts, pairs of security gateways or between
security gateways and a host. It’s based on a suite of protocols for securing IP traffic by
authenticating and encrypting each IP packet of the data stream.
7.3.1. Connection
“VPN>IPsec>Connection”
Name Description
Configuration
Add Click the “Add” button to add an IPsec connection rule.
Property
Enable Enable IPsec connection.
Connection Name The name of the connection.
Connection Type Select the connection type:
Initiator
On Demand
Responder
Gateway Information
Local Endpoint Interface The interface of the CPE public-network interface.
Local Endpoint IP The IP address or Domain Name of the CPE
53
Page 62
WM5347N User Manual
Address public-network interface.
Remote End point IP
The IP address or Domain Name of the remote peer.
Address
Authentication Method
Pre-Shared Key The pre-shared key that two security gateways use to
authenticate.
Local ID Type States how the CPE should be identified for
authentication.
IP: The CPE is identified by the assigned IP for
authentication. The default value is 0.0.0.0.
Content The IP Address.
Remote ID Type States how the remote peer should be identified for
authentication.
IP: The remote peer is identified by the assigned IP
for authentication. The default value is 0.0.0.0; this
means the CPE will accept any IP.
Connect The IP Address.
IKE Phase 1
Proposal Add Press the Add button to enter an Encryption and
Authentication algorithm. Click the trash to remove the
selected algorithm.
Encryption Algorithm:
DES
3DES
AES128
AES192
AES256
Authentication Algorithm:
MD5
SHA-1
Proposal OK Click the OK button to exit the table edit mode.
Key Group The DH group used to negotiate the IKE/ISAKMP SA.
SA Life Time The period that the keying channel of a connection
(IKE/ISAKMP SA) should last before being
renegotiated.
Dead Peer Detection Enable or disable the Dead Peer Detection protocol.
54
Page 63
WM5347N User Manual
(DPD) (RFC 3706)
DPD Interval The time interval when R_U_THERE messages are
sent to the peer.
DPD Idle Try The retry counter for DPD. The timeout interval is “DPD
interval” multiplied by “DPD Idle Try”. After the timeout
interval all connections to the peer are deleted if they
are inactive.
Local Network The private subnet behind the CPE.
Address Type Single address: The private subnet consisting of
one IP address.
Subnet address: The private subnet consisting
within the subnet IP addresses.
Start IP Address The only IP address allowed in the subnet.
Subnet Mask The net mask of the subnet. (Subnet address)
Local Port Restrict the traffic selector to a single protocol and/or
port.
Any: No restriction
ICMP: Restrict the traffic selector to ICMP protocol.
TCP: Restrict the traffic selector to TCP protocol. If
the port number is 0, all TCP port numbers are
accepted.
UDP: Restrict the traffic selector to UDP protocol. If
the port number is 0, all UDP port numbers are
accepted.
Remote Network The private subnet behind the remote peer.
Address Type Single address: The private subnet consisting of
one IP address.
Subnet address: The private subnet consisting of
the subnet IP addresses.
Start IP Address The only IP address allowed in the subnet.
Subnet Mask The net mask of the subnet (Subnet address).
Remote Port Restrict the traffic selector to a single protocol and/or
port.
Any: No restriction
ICMP: Restrict the traffic selector to ICMP protocol.
TCP: Restrict the traffic selector to TCP protocol. If
the port number is 0, all TCP port numbers are
accepted.
55
Page 64
WM5347N User Manual
UDP: Restrict the traffic selector to UDP protocol. If
the port number is 0, all UDP port numbers are
accepted.
IPSec Proposal
Encapsulation Mode The type of the connection:
Tunnel: Signifying a host-to-host, host-to-subnet, or
subnet-to-subnet tunnel.
Transport: Signifying host-to-host transport mode.
Activate Protocol Whether authentication should be done as part of ESP
encryption and/or separately using the AH protocol.
Encryption Algorithm NULL
AES128
AES192
AES256
DES
3DES
Authentication Algorithm MD5
SHA-1
SA Life Time The time interval a particular instance of a connection
(a set of encryption/authentication keys for user
packets) should last, from successful negotiation to
expiry.
Perfect Forward
Secrecy (PFS)
Whether Perfect Forward Secrecy of keys is desired on
the connection’s keying channel.
Save Commit the changes made and save to CPE device
Cancel Reset fields to the last saved values
Figure 46. VPN>IPsec>Connection Overview
56
Page 65
WM5347N User Manual
Figure 47. VPN>IPsec>Connection>Add
57
Page 66
WM5347N User Manual
Figure 48. VPN>IPsec>Connection>Add (Continued)
58
Page 67
WM5347N User Manual
8. VoIP Phone
8.1. General
Voice over Internet Protocol (VoIP) is a method of delivery of voice communication over the
internet or packet-switched network. Internet telephony refers to communications services ― voice,
facsimile, and/or voice-messaging applications ― that are transported via the Internet, rather than
the public switched telephone network (PSTN).
8.1.1. System
“VoIP Phone>General>System”
Name Description
Timer
SIP T1 Interval A T1 timer defined in SIP protocol.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
Figure 49. VoIP Phone>General>System
8.1.2. Media
“VoIP Phone>General>Media”
Name Description
Port
Media Port Start RTP local start port number, (start~end) defined the RTP
listen port range.
Media Port End RTP local end port number.
Dynamic Payload
59
Page 68
WM5347N User Manual
Type Setting
G.726 16K Default is 96
G.726 24K Default is 97
G.726 32K Default is 98
G.726 40K Default is 99
iLBC Default is 104
Telephone-event Default is 101
Codec
Packetization Time
Settings
G.711
G.723
G.726
G.729
iLBC
Advanced
Voice Jitter Buffer
Type
Voice Jitter Buffer
Length
Packet Loss
Concealment
DVCC Enable
Default is 20
Default is 30
Default is 20
Default is 20
Default is 30
There are “Dynamic” and “Static” type which can be
selected in the voice jitter buffer type.
Voice Jitter Buffer Length.
Enable to mask the effects of packet loss.
Enable DVCC.
T.38 Static Jitter
Length
T.38 Static Jitter Length.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
60
Page 69
WM5347N User Manual
Figure 50. VoIP Phone>General>Media
8.1.3. QoS
QoS is the differentiation between types of traffic and types of services so that the different types of
service and traffic can be treated different service. This way, one type can be favored over another.
In VoIP, quality simply means being able to listen and speak in a clear and continuous voice, without
unwanted noise. DiffServ is a QoS protocol for managing bandwidth application for internet media
connections.
“VoIP Phone>General>QoS”
61
Page 70
WM5347N User Manual
Name Description
QoS Settings
SIP ToS/DiffServ The SIP ToS rule will tag each SIP outgoing packet which
will prioritize SIP traffic.
RTP ToS/DiffServ The RTP ToS rule will tag each RTP outgoing packet
which will prioritize RTP traffic.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
Figure 51. VoIP Phone>General>QoS
8.1.4. Provision
Provision is a functionality to update the configuration by the FTP protocol.
“VoIP Phone>General>Provision”
Name Description
Provision Settings
Enable Enable or Disable.
FTP Server FTP server address.
File Path File path and file name.
Logging User Name Login username.
Logging Password Login password.
Connection Timeout Connection timeout.
Retry Count Retry count.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
62
Page 71
WM5347N User Manual
Figure 52. VoIP Phone>General>Provision
8.2. Account
NOTE: The following figures will apply for Account 1, Account 2, Account 3 and Account 4.
8.2.1. Status
Show server information, account register status and call history.
63
Page 72
WM5347N User Manual
Figure 53. VoIP Phone>Account 1-4>Status
8.2.2. Server
Configure the server information for Account 1 and Account 2.
“VoIP Phone>Account>Server”
Name Description
Register Server
Register Server A SIP registrar is a server in a Session Initiation Protocol
(SIP) network that accepts and processes SIP REGISTER
requests. Format is “x.x.x.x”.
Port Number A registrar server port number, default is 5060.
Register Period Time Register refresh time.
Proxy Server
Proxy Server A SIP proxy is a server in a Session Initiation Protocol
64
Page 73
WM5347N User Manual
(SIP) network that route sip message to a right place.
Format is “x.x.x.x”.
Port Number A proxy server port number, default is 5060.
Outbound Server
Outbound Server The outbound proxy is placed alongside the firewall and is
the only way to let SIP traffic pass from the internal
network to the internet. Format is “x.x.x.x”.
Port Number An outbound server port number, default is 5060.
NAT Traversal
STUN Server Enter the IP address of the STUN server, it will send and
receive STUN requests and responses. Simple Traversal
of User Datagram Protocol (STUN) through NATs is a
standards-based IP protocol used as one of the methods
of NAT traversal in applications of real-time voice, video,
messaging, and other interactive IP communications.
Port Number A STUN server port number, default is 3478.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
Figure 54. VoIP Phone>Account 1-2>Server
65
Page 74
8.2.3. User
“VoIP Phone>Account>User”
Name Description
SIP Account
Enable Enable or disable the SIP account.
Subscriber Number Enter the subscriber number for Line. The number is a
Display Name The display name of the VoIP subscriber, shown when it
WM5347N User Manual
unique series of digits of VoIP subscriber. It’s used to
interconnect with SIP server, for outgoing or incoming
calls.
makes outgoing calls. Maximum name size is 64
characters.
Authentication Name A unique string of VoIP subscriber. It’s used to
authenticate subscriber to get authorization to perform call
setup privilege.
Password Enter the password.
Codec Settings See Table 3 for Codec options.
1st Codec Subscriber prefers codec and it has 1st priority in codec
negotiation.
2nd Codec Subscriber prefers codec and it has 2nd priority in codec
negotiation.
3rd Codec Subscriber prefers codec and it has 3rd priority in codec
negotiation.
4th Codec Subscriber prefers codec and it has 4th priority in codec
negotiation.
5th Codec Subscriber prefers codec and it has 5th priority in codec
negotiation.
6th Codec Subscriber prefers codec and it has 6th priority in codec
negotiation.
7th Codec Subscriber prefers codec and it has 7th priority in codec
negotiation.
8th Codec Subscriber prefers codec and it has 8th priority in codec
negotiation.
9th Codec Subscriber prefers codec and it has 9th priority in codec
negotiation.
66
Page 75
WM5347N User Manual
G.723.1 Rates 5.3 kbps
6.3 kbps iLBC Rates 20 ms
30 ms
Media
SIP User Agent
Indicates a specific name for SIP user in SIP message.
Name
SIP Port SIP local port, it responsible for the sip packet send and
receive.
Session Timer Flag
Enable session timer.
Enable
Session Timer The SIP session timer periodical refreshes time.
Min Session Timer The minimal SIP session timer periodical refreshes time.
Timeout for Ring
back
Ring back timeout. When ring back timeout judge the
action behavior, such as hang-up or busy forward and so
on.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
67
Page 76
WM5347N User Manual
Figure 55. VoIP Phone>Account 1-2>User
68
Page 77
WM5347N User Manual
Codec Settings Options
1. G.729
2. G.723.1
3. G.726 16K
4. G.726 24K
5. G.726 32K
6. G.726 40K
7. G.711 aLaw
8. G.711 mulaw
9. iLBC
Table 3: Codec Setting Options
8.2.4. Feature
“VoIP Phone>Account>Feature”
Name Description
Feature Settings
Auto Decline Anonymous When VoIP subscriber receives an incoming call with
Do Not Disturb (DND) When it is enabled, it will reject all incoming call
Hide User ID As “Calling Line Identification Restriction (CLIR)”,
privacy, with display name as “anonymous”. VoIP
subscriber can REJECT it when the setting “Auto
Decline Anonymous” is enabled. If it’s not enabled it
will treat it as a normal incoming call and allow the
phone device to ring.
VoIP subscriber can enable this function to hide its
identifier to others, when VoIP subscriber makes an
outgoing call.
MWI Message waiting indication. The LED on select
telephones will light-up to notify the user that they
have voicemail.
Call Forwarding Setting
All Call Forwarding (All
Unconditional CF Target Unconditional call forwarding target number.
Busy CF Enable/Disable, busy forward feature.
Busy CF Target Busy forward target number.
No Answer CF Enable/Disable, No Answer call forward feature.
No Answer CF Target No answer call forward target number.
Call Waiting Setting
Call Waiting Enable/Disable Call waiting feature.
Hotline setting
Hotline Enable Hotline.
Hotline Target The number of hotline target.
Hotline Period Time Period time of hotline.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
70
Page 79
WM5347N User Manual
Figure 56. VoIP Phone>Account 1-2>Feature
8.2.5. Dialing
“VoIP Phone>Account>Dialing”
Name Description
General Dialing
Settings
71
Page 80
WM5347N User Manual
Inter-digit Timeout The time period between each digit.
First-digit Timeout The maximum time allowed between off-hook and entering
the first digit.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
Figure 57. VoIP Phone>Account 1-2>Dialing
8.2.6. Speed Dial
“VoIP Phone>Account>FAX”
Name Description
Speed Dial status
Enable Enable Speed dial.
Speed Dial Rules User make real number simplify to short number.
72
Page 81
Figure 58. VoIP Phone>Account 1-2>Speed Dial
8.2.7. FAX
“VoIP Phone>Account>FAX”
Name Description
FAX Settings
Options NONE
Save Commit the changes made and save to CPE device.
WM5347N User Manual
G.711A Pass Through
G.711U Pass Through
T.38 FAX Relay
T.38 FAX Only
Cancel Reset fields to the last saved values.
Figure 59. VoIP Phone>Account 1-2>FAX
8.2.8. RTP
“VoIP Phone>Account>RTP”
Name Description
RTP Setting
RTP Detection
Enable RTP Detection.
Enable
RTP Timeout The RTP timeout is used to judge the call is it still alive and
do the right action. The range is from 10-300, 40 seconds
is the default value.
73
Page 82
WM5347N User Manual
RTP Packet Loss
Percentage
You can specify the allowable RTP Packet Loss
percentage and if it reaches the %, and do the right action.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
Figure 60. VoIP Phone>Account 1-2>RTP
8.3. Line
NOTE: The following figures will apply for Line 1 and Line 2. The Line and Account is one-to-one
mapping, that is, the Line 1 is mapping to Account 1, and Line 2 is mapping to Account 2.
8.3.1. Phone
“VoIP Phone>Line>Phone”
Name Description
Phone
Hook Flash Detect
Upper Bound
Hook Flash Detect
Lower Bound
Voice Tx Level The voice gain level that is heard by a telephone user.
Voice Rx Level The voice gain level that is received by the device.
Ring Impedance The impedance between tip and ring on the telephone line.
This parameter defines the upper bound of the quick
on/off-hook cycle.
This parameter defines the lower bound of the quick
on/off-hook cycle.
Caller ID
Caller ID Type This will allow you to enable and select the Called ID type
for your area. You also have the choice to disable caller ID.
Disable
74
Page 83
WM5347N User Manual
FSK Bellcore
FSK ETSI
Japan CLIP
Caller ID Display This parameter configures when Caller ID will be
displayed.
Before Ring
After Ring
Caller ID Power
The transmitting power level of caller ID to the telephone.
Level
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
Figure 61. VoIP Phone>Line 1-2>Phone
8.3.2. Voice
“VoIP Phone>Line>Voice”
Name Description
VAD
Voice Active You can enable and select which voice activity detection to
75
Page 84
WM5347N User Manual
Detector use. It can facilitate speech processing, and can also be
used to deactivate some processes during non-speech
segments: it can avoid unnecessary coding/transmission
of silence packets in VoIP, saving on computation and on
network bandwidth. There are 4 choices to select from.
Disable
Silence Suppression ― NO CNG
Silence Suppression ― Only G.711 Annex II Type
Silence Suppression ― Codec Specific CN (G.729 and
G.732)
LEC
Line Echo Canceller
Tail Length
There are processing delays in IP networks that could
cause an echo. This function is used to decrease the echo
effect.
We provide disable, 16ms, 32ms and 48ms echo tail length
setting.
DRC
DRC Enable/Disable DRC.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
Figure 62. VoIP Phone>Line 1-2>Voice
76
Page 85
8.3.3. Profile
“VoIP Phone>Line>Profile”
Name Description
Country Profile
For different countries, the tones may be different. This
WM5347N User Manual
parameter is used to set the country name to change the
tones.
Figure 63. VoIP Phone>Line 1-2>Profile
77
Page 86
WM5347N User Manual
9. WiMAX
This technology is based on the IEEE 802.16 standard, enabling the delivery of last mile wireless
broadband access.
9.1. Profile
In the profile tab, the user can set WiMAX standard settings, which include how to establish a
connection, frequency information and how to authenticate.
9.1.1. Connect Settings
“WiMAX>Profile>Connect Settings”
Name Description
Auto Reconnect Indicate the interval in second to “auto reconnect”. 0
means disabled.
Auto connect Mode Connecting base on CINR or RSSI to connect the best
signal.
NDS Mode Enable NDS mode.
NDS Network
Upload NDS Network Parameters File.
Parameters File
Enable Handover Enable Handover.
Enable Idle Mode Enable Idle mode.
Idle Mode Interval The time interval of idle mode.
CINR & RSSI
Refresh time interval of CINR & RSSI.
Refresh Interval
LDRP Time LDRP (Low Data Rate Protection). When it’s enabled, if
the uplink/downlink data rate is smaller than the LDRP
time, the CPE will send disconnect command to BS.
LDRP TX/RX Rate LDRP uplink/downlink data rate.
Search Click on the search button to search for available BSIDs.
Connect Mode Select a connect mode
Auto Connect Mode: It will connect to one of the BSIDs
in the list, indiscriminately.
Network Search Mode: User needs to select one of the
BSIDs from the list, it will use that BSID to connect to
WiMAX after device is reboot.
78
Page 87
WM5347N User Manual
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
Figure 64. WiMAX>Profile>Connect Settings
9.1.2. Frequency Settings
The frequency list window will display all the configured frequencies and their bandwidth. To set
additional frequencies, click on the “Add” button.
“WiMAX>Profile>Frequency Settings”
Name Description
Setting Type There are two display types you can select.
You can choose to display the data by List. If you select
79
Page 88
WM5347N User Manual
“By List” you also have the option to add more
frequencies.
“By Range” will display the frequency by range and the
incremental value. See Figure “Frequency By Range”.
Joint Wide Scan
Result
Yes means to append wide scan result to the frequency
setting. Only valid when setting type is “By List”.
Valid Band Info Valid band information. If the frequencies aren’t located
using the valid band range, the frequency setting will be
rejected.
Add The “Add” button will aloe you to enter more frequency
lists.
OK Click the “OK” button to exit the table edit mode.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
Authentication Mode The method used in authentication.
Date Encryption
AES-CCM
Data Encryption
AES-CBC
Key Encryption
AES-key wrap
Key Encryption
AES-ECB
EAP Supplicant
Enable the MS’s capability of encrypting/decrypting the
traffic by AES-CCM.
Enable the MS’s capability of encrypting/decrypting the
traffic by AES-CBC.
Enable the MS’s capability of decrypting TEK by AES-Key
wrap.
Enable the MS’s capability of decrypting TEK by
AES-ECB.
EAP Mode The EAP method used in authentication.
Anonymous ID The identity encoded in EAP Identity Response message.
Server Root CA
The root CA’s X.509 certificate.
Certificate
MTK-Authorized
The MS’s X.509 certificate.
Device Certificate
81
Page 90
WM5347N User Manual
Device Private Key The MS’s private key file corresponding to the public key
encoded in X.509 certificate.
Device Private Key
The key used to decrypt the MS’s private key file.
Password
Inner Mode The EAP-TTLS inner method.
User name The user name used in EAP-TTLS inner method.
Password The password used in EAP-TTLS inner method.
Options
Auto Prepend Auth
Mode
Enable the MS to automatically decorate “{am=i}” in the
EAP Identity Response message. The value of “i” depends
on Authentication Mode field.
Random Outer ID Enable the MS to generate 16-bytes random number as
the user name in the EAP Identity Response message.
Ignore Cert
Verification
Same EAP outerID
MS skips to verify the BS’s certificate received in the
EAP-TLS or EAP-TTLS procedure.
Use the same EAP outer id when doing re-auth.
in ReAuth
MAC address in
Add MAC address in outer id when EAP mode is
EAP-TLS outer ID
Delete existed
Device Certificate file
Delete existed
Private Key
EAP-TLS.
Delete device certificate file which was uploaded in the
filed “MTK-authorized Device Certificate”
Delete device private key which was uploaded in the filed
“Device Private Key”
Save Commit the changes made and save to CPE device
Cancel Reset fields to the last saved values
82
Page 91
WM5347N User Manual
Figure 67. WiMAX>Profile>Authentication Settings
83
Page 92
9.2. Connect
“WiMAX>Connect>Connect”
Name Description
Disconnect Click the disconnect button to terminate the connection.
Connect Click the connect button to connect to a BSID.
Connect Mode Select a connect mode.
Search Click the search button to scan the frequency.
WM5347N User Manual
Auto Connect Mode: It will connect to one of the BSIDs
in the list, indiscriminately.
Network Search Mode: User needs to select one of the
BSIDs from the list, it will use that BSID to connect to
WiMAX after device is reboot.
84
Page 93
WM5347N User Manual
9.3. Wide Scan
“WiMAX>Wide Scan”
Name Description
Wide Scan Settings
Auto Wide Scan Select “Yes” to do “wide scan” automatically when there
Wide Scan Range
Add/OK You can specify the wide scan range to reduce search
Figure 68. WiMAX>Connect
are no available BS.
time.
85
Page 94
WM5347N User Manual
Wide Scan Result
Search Show the result of wide scan. Search button can trigger
wide scan.
Clear Clear button clear current search result.
Save/ Cancel Save/ Cancel current setting.
Figure 69. WiMAX>Wide Scan
9.4. Link Status
“WiMAX>Link Status>Link Status”
The “Link Status” menu item shows a brief profile of the current WiMAX link.
86
Page 95
WM5347N User Manual
Figure 70. WiMAX Link Status
9.5. Link Statistics
“WiMAX>Link Statistics> Link Statistics”
The “Link Statistics” menu item will display statistical information in the WiMAX link.
87
Page 96
WM5347N User Manual
Figure 71. WiMAX Link Statistics
9.6. Connection Info
“WiMAX>Connection Info>Connection Info”
The connection info window will show the connection ID and its connection type.
88
Page 97
Figure 72. WiMAX Connection Info
9.7. Service Flow
“WiMAX>Service Flow>Service Flow”
WM5347N User Manual
The WiMAX service flow window will show the status and direction of each service flow ID.
Figure 73. WiMAX Service Flow
89
Page 98
WM5347N User Manual
10. WiFi
Based on the IEEE 802.11 set of standards, WiFi provides wireless networking capabilities.
10.1. WLAN
“WiFi>WLAN”
Name Description
WLAN Settings
Enable WLAN This will enable the CPE to function as a WiFi Access
Point.
WLAN Mode Select the WLAN protocol.
WLAN Channel Select the WLAN channel. See Table 4 for Channel
description. “Auto” will allow CPE to choose the best
channel automatically.
WLAN Maximum
STA number
The maximum STA number of WLAN. It will control the
number user via WLAN to access internet.
WLAN TxPower This will control transmit power of WLAN.
WLAN TxRate This will limit transmit rate of WLAN.
WLAN Beacon
The time interval of WAN beacon.
Interval
WLAN DTIM period The period of WLAN DTIM.
WLAN RTS
Default is 2347.
Threshold
WLAN
Default is 2346.
Fragmentation
Threshold
Enable WPS Enabling the Wi-Fi Protected Setup (WPS) will allow you to
easily configure security on your wireless network.
WPS PIN When using WPS PIN mode, input the PIN (Personal
Identification Number) code read from the new wireless
client.
Multiple BSSID
Select how many BSSID will be created.
number
Configure SSID Select which BBSID to be configured.
90
Page 99
WM5347N User Manual
WLAN SSID Service Set Identifier. The network name used to identify
the WLAN. All the WiFi devices on the WLAN must use the
same SSID to connect to the CPE.
Hide SSID Check the box to prevent the CPE from broadcasting its
SSID.
Encryption Type Select the encryption type. You will see further encryption
setting for the selected encryption type. For instance, if you
select WEP, then you will see WEP settings.
NONE
WEP
WPA Personal
WPA Enterprise
WEP Settings If “WEP” is selected as the encryption type, you will see the
following setting.
Authentication
Method
Two types of authentication:
OPEN SYSTEM: Open system authentication. All
clients that request access to the CPE are accepted
without actual authentication.
SHARED KEY: Shared Key authentication require the
exchange of an authentication key shared among the
CPE and clients in the network.
WEP Encryption
Length
Length of the WEP encryption key:
64-bit
128-bit
Key 1 Set the WEP key 1.
If the WEP encryption length is set to 64-bit, then use 10
hexadecimal or 5 ASCII characters as the key.
If the WEP encryption length is set to 128-bit, then use 26
hexadecimal or 13 ASCII characters as the key.
Key 2 Set the WEP key 2.
Refer to Key 1 for details.
Key 3 Set the WEP key 3.
Refer to Key 1 for details.
Key 4 Set the WEP key 4.
Refer to Key 1 for details.
WPA Settings If you select “WPA personal” or “WPA Enterprise” as the
encryption type, you will see following settings.
WPA mode Select the WPA encryption mode.
91
Page 100
WM5347N User Manual
WPA
WPA2
Auto (WPA or WPA2)
Cipher Type Select the Cipher algorithm.
TKIP
AES
TKIP and AES
Pre-shared Key The pass-phrase used by WPA personal encryption mode.
The length is between 8 to 63 characters. This field is
disabled when “WPA Enterprise” is selected as the
encryption mode.
EAP (802.1X )
Settings
RADIUS Server IP
If “WPA Enterprise” is selected as the encryption mode,
you will see the following settings.
The IP address of the RADIUS server.
Address
RADIUS Server Port The RADIUS server port number.
RADIUS Server
Shared Secret
Save & Start WPS
PIN
Save & Start WPS
PBC
A case-sensitive password used to validate
communications between a RADIUS server and CPE.
Save the configuration and then start the WPS PIN
process (need to input WPS PIN field first).
Save the configuration and then start the WPS PBC
process.
Save Commit the changes made and save to CPE device.
Cancel Reset fields to the last saved values.
NOTE: When WPS is selected, you will have 3 Save options. If you click “Save” button, it will save
the configuration without starting the WPS process. If you select the “Save & Start WPS PIN” or
“Save & Start WPS PBC”, it will save the configuration and start the WPS process selected at that
time.
Frequency(GHZ) Channel
Auto Auto select the best channel
2.452 Channel 9
2.457 Channel 10
2.462 Channel 11
2.467 Channel 12
92
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.