background image

 

 

2-24 

2.16.  TR-069 

Management 

 TR-069 (can only be accessed by administrator) 

TR-069  client  will  automatically  start  up  when  the  CPE  is  operational  if  the 

“TR-069  Active  Flag”  is  enabled.  The  “ACS  Server  URL”  is  the  URL  used  by 

TR-069  client  to  connect  to  the  ACS  server,  and  TR-069  client  uses  the  “ACS 

Username” and “ACS Password” to login the ACS Server. When the “Inform Enable” 

is  enabled,  TR-069  client  will  periodically  query  the  ACS  server  according  to  the 

“Inform Interval”. The ACS server can also use the “Connection Request Username” 

and “Connection Request Password” to connect to the CPE and get/set parameter via 

connection  request  mechanism.  Nevertheless,  all  of  the  above  parameters  will  be 

overwritten if Option-43 is activated. However, the parameters changed by Option-43 

will  not  be  saved  into  the  CPE.  In  other  words,  all  of  the  above  parameters  will  be 

restored when the CPE reboots. TR-069 certificates required for HTTPS protocol can 

be  uploaded  in  the  “TR-069  Certificate  File  Upload”  section.  Note  that  the  only 

certificate  format  supported  is  PEM  (Privacy  Enhanced  Mail,  Base64  encoded  DER 

certificate).  Please  confirm  the  format  before  uploading.  Please  refer  to  Figure  2-24 

and Figure 2-25 for more details. After setting the configurations of these fields, press 

the “Apply” button to write the new configurations into the CPE. If only the “Inform 

Enable” and/or “Inform Interval” have been changed, then do nothing and the change 

will  take  effect  in  the  next  inform  interval;  otherwise  press  “Reboot”  as  shown  in 

Figure 2-34, to reboot the system in order for the new configurations to take effect. 

Summary of Contents for ASMAX2300

Page 1: ...User Manual WiMAX Modem Manual Version 1 3 Manual Date Feb 20 2009 Software Version R4 6 0 0 17743 v5 7 0 Software Date Feb 20 2009 ...

Page 2: ... 6 2 3 Account 2 7 2 4 Date 2 8 2 5 Language 2 9 2 6 Scanner 2 10 2 7 Authentication 2 11 2 8 Bridge Mode 2 13 2 9 NAT Mode 2 14 2 10 Firewall 2 15 2 11 DHCP Server 2 17 2 12 NAT ALG 2 19 2 13 Port Forwarding 2 20 2 14 Port Trigger 2 21 2 15 DDNS 2 22 2 16 TR 069 2 24 2 17 SNMP 2 26 2 18 Log 2 27 2 19 Upgrade 2 28 2 20 Recovery 2 30 2 21 Reboot 2 31 ...

Page 3: ...tes 2 12 Figure 2 13 Bridge Mode 2 13 Figure 2 14 NAT Mode 2 14 Figure 2 15 Firewall 2 15 Figure 2 16 Firewall Filter 2 16 Figure 2 17 DHCP Server Enabled 2 17 Figure 2 18 DHCP Server Disabled 2 18 Figure 2 19 NAT ALG 2 19 Figure 2 20 Port Forwarding 2 20 Figure 2 21 Port Trigger 2 21 Figure 2 22 DDNS Enabled 2 22 Figure 2 23 DDNS Disabled 2 23 Figure 2 24 TR 069 2 25 Figure 2 25 TR 069 Certificat...

Page 4: ...iii Figure 2 34 Reboot Confirmation 2 32 ...

Page 5: ...ndicates the CPE states as follow Only Red LED is Blinking synchronization Only Yellow LED is Blinking authentication Only Green LED is Blinking DHCP client negotiation After the CPE has connected to the base station the signal strength LED are defined as follow Only Red LED is ON the signal is weak CINR 8dB Yellow LED is ON the signal strength is medium 8dB CINR 15dB Green LED is ON the signal st...

Page 6: ...Panel Power jack DC 12V 1 5A LAN port 10 100Base TX Reset button To reboot the CPE 1 2 Outdoor CPE Power Injector Power Over Ethernet 802 3af compliant LAN port 10 100Base TX Figure 1 2 Outdoor CPE installation ...

Page 7: ...E If you disable CPE s DHCP server by yourself set the IP address net mask and gateway as following IP address 10 1 1 x 1 x 253 Netmask 255 255 255 0 Gateway 10 1 1 254 Connect to http 10 1 1 254 with a browser and you will see a webpage such as the one shown in Figure 2 1 The administrator username and password are as shown below Username admin Password admin WiMAX CPE also support multi level us...

Page 8: ...error the user can login into the Status Page and WiMAX Status Network Status and Device Status are as shown in Figure 2 2 Figure 2 3 Figure 2 4 and Figure 2 5 Figure 2 2 WiMAX Status Figure 2 3 WiMAX Status Service Flow ...

Page 9: ...2 5 Figure 2 4 Network Status Figure 2 5 Device Status ...

Page 10: ...2 6 2 2 System Logout Press the Logout button as shown in Figure 2 6 to logout of the system and go back to the Login page as shown in Figure 2 1 Figure 2 6 Logout ...

Page 11: ...ge is for changing the password of the WEB UI account as shown in Figure 2 7 After setting the configurations of these fields press the Apply button to write the new configurations into the CPE and the new configurations will take effect Figure 2 7 Account ...

Page 12: ... a CPE can also be automatically updated by synchronizing time with an NTP server assigned manually by the user or from the DHCP server The selection of different time zone and daylight saving option are available as well for different regions Please refer to Figure 2 8 for more detail After setting the configurations of these fields press the Apply button to write the new configurations into the ...

Page 13: ...nguage page allows users to select one of the languages in the drop down list for viewing the WEB GUI as shown in Figure 2 9 After selecting the desired language press the Apply button to view the WEB GUI in the selected language Figure 2 9 Language ...

Page 14: ...le press the Apply button to write the new configurations into the CPE If the Bandwidth range of the channel table is changed then press Reboot as shown in Figure 2 34 to reboot the system in order for the new configurations to take effect otherwise just simply restart the system by using the start and stop button in the Start Stop WiMAX section Please note that when the CPE is connected to a BS a...

Page 15: ...tton to write the new configurations into the CPE and press Reboot as shown in Figure 2 34 to reboot the system in order for the new configurations to take effect Certificates required for authentication can be uploaded in the Certificate File Upload section Contents of the certificates that are currently in the CPE can be viewed in details by clicking View CA Certificate as shown in Figure 2 12 N...

Page 16: ...2 12 Figure 2 12 Authentication View Certificates ...

Page 17: ...ddress and netmask The IP address and netmask can also be automatically assigned by the DHCP server by selecting DHCP IP type After setting the configurations of these fields press the Apply button to write the new configurations into the CPE and go to Management Reboot as shown in Figure 2 34 to reboot the system in order for the new configurations to take effect Figure 2 13 Bridge Mode ...

Page 18: ...nd WAN gateway can also be automatically assigned by the DHCP server by selecting DHCP WAN IP type Users can also configure LAN IP address LAN netmask and MTU which should be between 68 and 1500 After setting the configurations of these fields press the Apply button to write the new configurations into the CPE and go to Management Reboot as shown in Figure 2 34 to reboot the system in order for th...

Page 19: ... the CPE s back end Furthermore the redirection of ICMP can also be enabled The Firewall Filter section of this page is used to filter incoming network traffic based on MAC IP protocol TCP UDP port and interface Please refer to Figure 2 15 and Figure 2 16 for more details After setting the configurations of these fields press the Apply button to write the new configurations into the CPE and press ...

Page 20: ...2 16 Figure 2 16 Firewall Filter ...

Page 21: ...are required for DHCP server settings and Max lease time seconds is between 1 and 99999999 Specific IP address can also be assigned to a specific MAC address in Permanent Host Configuration as shown in Figure 2 17 Please note that DHCP server is only applicable when the CPE is in NAT mode After setting the configurations of these fields press the Apply button to write the new configurations into t...

Page 22: ...2 18 Figure 2 18 DHCP Server Disabled ...

Page 23: ... it enabled BSID can be used in SIP authentication to decide if the ATA is within the service area Please note that NAT ALG is only applicable when the CPE is in NAT mode After changing the configuration press the Apply button to write the new configuration into the CPE and press Reboot as shown in Figure 2 34 to reboot the system in order for the new configurations to take effect Figure 2 19 NAT ...

Page 24: ...ve edit enable and disable port forwarding rules here as shown in Figure 2 20 Please note that port forwarding is only applicable when the CPE is in NAT mode After setting the configurations of these fields press the Apply button to write the new configurations into the CPE and press Reboot as shown in Figure 2 34 to reboot the system in order for the new configurations to take effect Figure 2 20 ...

Page 25: ...ined Trigger Port range Users are allowed to add remove edit enable and disable port trigger mappings here as shown in Figure 2 21 Please note that port trigger is only applicable when the CPE is in NAT mode After setting the configurations of these fields press the Apply button to write the new configurations into the CPE and press Reboot as shown in Figure 2 34 to reboot the system in order for ...

Page 26: ... the Sign Up hyperlink and following the procedures Enter the hostname username and password you have registered with the service provider and press the Apply button to save the changes into the CPE The CPE will be able to notify the selected domain name server to change the active DNS configuration of its configured hostnames and addresses in real time by using the Internet Protocol Suite after p...

Page 27: ...2 23 Figure 2 23 DDNS Disabled ...

Page 28: ...itten if Option 43 is activated However the parameters changed by Option 43 will not be saved into the CPE In other words all of the above parameters will be restored when the CPE reboots TR 069 certificates required for HTTPS protocol can be uploaded in the TR 069 Certificate File Upload section Note that the only certificate format supported is PEM Privacy Enhanced Mail Base64 encoded DER certif...

Page 29: ...2 25 Figure 2 24 TR 069 Figure 2 25 TR 069 Certificate File Upload ...

Page 30: ... When SNMP is enabled the community string of the SNMP server can be changed After setting the configurations of these fields press the Apply button to write the new configurations into the CPE and press Reboot as shown in Figure 2 34 to reboot the system in order for the new configurations to take effect Figure 2 26 SNMP enabled Figure 2 27 SNMP disabled ...

Page 31: ...2 27 2 18 Log Management Log can only be accessed by administrator This page displays the system message log as shown in Figure 2 28 Figure 2 28 Log ...

Page 32: ...tomatically To perform FTP upgrade input the FTP server IP address FTP username and password firmware file path and firmware file name Press the Upgrade button in the FTP Upgrade section and the CPE will start to download the firmware from the FTP server and upgrade The CPE will automatically reboot itself afterwards Please refer to Figure 2 29 for more details To perform TFTP upgrade input the TF...

Page 33: ...2 29 Figure 2 30 Web Upgrade Summary Figure 2 31 TFTP Upgrade ...

Page 34: ...lback can be performed by pressing the Rollback button Device configuration file that includes files such as configdb and ddns conf can be uploaded from PC to CPE as well as downloaded from CPE to PC To restore a CPE back to factory default settings just press the Factory Default button in the Factory Default Settings section Please refer to Figure 2 32 for more details Figure 2 32 Recovery ...

Page 35: ...2 31 2 21 Reboot Press the Reboot and Yes buttons to reboot the system Please refer to Figure 2 34 and Figure 2 34 for more details Figure 2 33 Reboot Button ...

Page 36: ...harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation IMPORTANT NOTE Radiation Exposure Statement This equipment complies with Canada radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance 50 cm between the radiator your body Radio Freq...

Page 37: ...rference Statement This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instruct...

Page 38: ...n the radiator your body This transmitter must not be co located or operating in conjunction with any other antenna or transmitter The availability of some specific channels and or operational frequency bands are country dependent and are firmware programmed at the factory to match the intended destination The firmware setting is not accessible by the end user Due to the essential high output powe...

Reviews: