Home

User Manual - 3G / 4G Router Store

image

Contents

1. IW BASIC SETTING LS FORWARDING RULES r Use Rule 0 Always UN Always UN Always 0 Always UO Always w 0 Always 0 Always W 0 Always 0 Always ae This product s NAT firewall filters out unrecognized packets to protect your Intranet so all hosts behind this product are invisible to the outside world If you wish you can make some of them accessible by enabling the Virtual Server Mapping A virtual server is defined as a Service Port and all requests to this port will be redirected to the computer specified by the Server IP Virtual Server can work with Scheduling Rules and give user more flexibility on Access control For Detail please refer to Scheduling Rule 38 For example if you have an FIP server port 21 at 192 168 123 1 a Web server port 80 at 192 168 123 2 and a VPN server at 192 168 123 6 then you need to specify the following virtual server mapping table 21 le 192 168 12 V 3 1 192 168 12 V 3 2 1723 192 168 12 V 3 6 Click on Save to store your setting or Undo to give up 2 Special AP ADMINISTRATOR S MAIN MENU 8 Status Vd Wizard Dm Advanced Logout IW Basic seTTING lt lt FORWARDING RULES 3 SECURITY SETTING fy ADVANCED SETTING SMS ii TOOLBOX Virtual Server Special AP Miscellaneous Incoming Ports C l l Es Bessi Ce eee C O Some applications require multiple conne
2. Please confirm the information below WAN Setting WAN Type 3G internet 99 Enable default12345 41 Auto Open Shared None C Do you want to proceed the network testing Start gt Password gt Time gt LAN WAN gt Wireless gt Summary gt Finish 21 Step 7 Click Finish to complete it Configuration is Completed Please click Finish to back to Status page Start gt Password gt Time gt LAN WAN gt Wireless gt Summary gt Finish 22 3 2 Advanced Setting 3 2 1 Basic Setting _ ADMINISTRATOR S MAIN MENU fl Status Nv TIL Advanced _Logou IW BASIC SETTING CG FORWARDING RULES 3 SECURITY SETTING wm ADVANCED SETTING SM3 ca TOOLBOX i Cen J z J e Network Setup Basic Setting e DHCP Server o Wireless Network Setup Ch SE Configure LAN IP and select WAN type DHCP Server The settings include Host Ip Subnet Mask Gateway DNS and WINS configurations Wireless Wireless settings allow you to configure the wireless configuration items Change Password Allow you to change system password 1 Network Setup i ADMINISTRATOR S MAIN Statu Wizard TAL Advanced rt Logout IW BASIC SETTING CG FORWARDING RULES Seer I P o Network Setup e DHCP Server s Wireless t LAN IP Address 192 168 123 254 Change Password t Subnet Mask 255 255 255 0 Intemet Setup HELP t WAN Interface Ethernet WAN ze Wi
3. Undo to give up 65 4 SNMP eu KE SECURITY SETTING MIr ADVANCED SETTING SMS is TOOLBOX Status System Log Dynamic DNS t Enable SNMP QoS t Get Community SNMP 7 t Set Community e Routing IP 1 s System Time t IP 2 gt Scheduling IPS IP 4 t SNMP Version vi Ovec EWAN Access IP Address In brief SNMP the Simple Network Management Protocol is a protocol designed to give a user the capability to remotely manage a computer network by polling and setting terminal values and monitoring network events Enable SNMP You must check Local Remote or both to enable SNMP function If Local is checked this device will response request from LAN If Remote is checked this device will response request from WAN Get Community Setting the community of GetRequest your device will response Set Community Setting the community of SetRequest your device will accept IP 1 IP 2 IP 3 IP 4 Input your SNMP Management PC s IP here User has to configure to where this device should send SNMP Trap message SNMP Version Please select proper SNMP Version that your SNMP Management software supports WAN Access IP Address If the user wants to limit to specific the IP address to access please input in the item The default 0 0 0 0 and means every IP of Internet can get some information of device with SNMP protocol Click on Save to store your setting or Undo to give
4. User Manual BDGS561AM WiFi HSPA VPN Router Copyright The contents of this publication may not be reproduced in any part or as a whole stored transcribed in an information retrieval system translated into any language or transmitted in any form or by any means mechanical magnetic electronic optical photocopying manual or otherwise without the prior written permission Trademarks All products company brand names are trademarks or registered trademarks of their respective companies They are used for identification purpose only Specifications are subject to be changed without prior notice FCC Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against radio interference in a commercial environment This equipment can generate use and radiate radio frequency energy and if not installed and used in accordance with the instructions in this manual may cause harmful interference to radio communications Operation of this equipment in a residential area is likely to cause interference in which case the user at his own expense will be required to take whatever measures are necessary to correct the interference CE Declaration of Conformity This equipment complies with the requirements relating to electromagnetic compatibility EN 55022 A1 Class B Table o
5. locations where cabling is not possible or inefficient to implement Mr ADVANCED SETTING SMS ka TOOLBOX SEA i L Va Lee Ge W 4 WDS Setting HELP a Wireless t Wireless Bridging Enable Disable Remote AP MAC 2 WPS Wi Fi Protection Setup WPS is Wi Fi Protection Setup which is similar to WCN NET and offers safe and easy way in Wireless Connection Default value is enable SS Sa gem IW Basic sertG 2 FORWARDING RU KS SECURITY SETTING Se em D ADVANCED SETTING SMS ac TOOLBOX Fe wesse se sre o E e oma OOO E t Config Method Push Button t WPS status NOUSED 36 Wireless Client List The list of wireless client is shows here 00 27 FB 68 2F 68 EEN a Ge t Reconfirm You can change Password here We strongly recommend you to change the system password for security reason Click on Save to store your setting or Undo to give up 37 sl e Virtual Server Allows others to access WWW FTP and other services on your LAN e Special Application This configuration allows some applications to connect and work with the NAT router e Miscellaneous IF Address of DMZ Host Allows a computer to be exposed to unrestricted 2 way communication Note that this feature should be used only when needed UPnP Setting If you enable UPnP function the router will work with UPnP devices softwares 1 Virtual Server
6. Server IP Address Name the IP address or URL of the PPTP server 4 L2TP Account and Password the account and password your ISP assigned to you If you don t want to change the password keep it empty 5 Maximum Idle Time the time of no activity to disconnect your L2TP session Set it to zero or enable Auto reconnect to disable this feature If Auto reconnect is enabled this product will connect with ISP automatically after system is restarted or connection is dropped 28 6 Connection Control There are 3 modes to select Connect on demand The device will link up with ISP when the clients send outgoing packets Auto Reconnect Always on The device will link with ISP until the connection is established Manually The device will not make the link until someone clicks the connect button in the Status page 7 Maximum Transmission Unit MTU Most ISP offers MTU value to users The default MTU value is O auto Or select Wireless WAN for 3G Setting re BASIC SETTING LN FORWARDING RULES SECURITY SETTING Ti ADVANCED SETTING SMS E TOOLBOX d i a S geg DW ge Mf Network Setup LAN Setup Wireless LAN IP Address 192 168 123 254 Change Password I t Subnet Mask 255 255 255 0 3 Intemet Setup HELP WAN Interface Wireless WAN i Wireless WAN H WAN Type Ethernet WAN 29 Al a SMS Zo TOOLBOX lis Je b WAN Int
7. When the process is done successfully the unit will be restarted automatically C Accept unofficial firmware You can upgrade firmware by clicking Upgrade button 4 SE os i Tie bin 192 168 SC 254 SESCH ws BASIC SETTING Le P Fd dr SMS EH TOOLBOX Sr Se BEE File Download Fa System Info SE deiere a program online to opan D EE f Name config bin rane Type Unknown File Type 586 bytes S From 192 168 123 254 Reset to Default Reboot i tically s Miscellaneous tw While files from the Internet can be useful some files can potentially Q harm your computer If you do not trust the source do not find a program to open this file or save this file What s the risk You can backup your settings by clicking the Backup Setting button and save it as a bin file Once you want to restore these settings please click Firmware Upgrade button and use the bin file you saved 74 Reset the settings of this device to the default values e Reboot Reboot this device You can also reboot this it by clicking the Reboot button 7 Miscellaneous 75 System Info unos EE SS t Domain Name or IF address for Ping Test Po Ping lt Reset to Default Miscellaneous Domain Name or IP address for Ping Test Allow you to configure an IP and ping the device You can ping a specific IP to test whether it is alive 76 Chapter 4 Troubleshooting Th
8. IP from Device and will see icon as below Click on Save to store your setting or Undo to give up 40 1 Packet Filters Allows you to control access to a network by analyzing the incoming and outgoing packets and letting them pass or halting them based on the IP address ofthe source and destination Domain Filters Let you prevent users under this device fram accessing specific URLs URL Blocking URL Blocking will block LAN computers to connect to pre defined websites MAC Address Control MAC Address Control allows you to assign different access right fordifferent users and to assign a specific IP address to a certain MAC address VPN VPN Settings are used to create virtual private tunnels to remote VPM gateways WPH L2TP Client In order to create virtual private connection via tunneling to remote VPM L2TP servers VPH L2TP Server Provide virtual private connection via tunneling from remote VPN L2TP clients VPH PPTP Client In order to create virtual private connection via tunneling to remote vn PIP servers VPH PPTP Server Provide virtual private connection via tunneling from remote VPN PPTP clients Miscellaneous Remote Administrator Host In general only Intranet user can browse the built in web pages to perform administration task This feature enables you to perform administration task from remote host Administrator Time out The amount of time of inactivity before the devicewil
9. Without Extended Authentication xAuth XAUTH Server Check this checkbox if the device behaves as a VPN server and will verify the legality of user information from VPN client The user information that is provided by VPN client needs to match to user information that is in local user database of VPN server You can press XAUTH Account button at IPSec Setting main page to edit local user database Please note that only VPN clients with XAUTH can establish VPN connection with the device if you have activated XAUTH function Set IKE Proposal Check this checkbox to enable IKE proposals Encryption There are five algorithms can be selected DES 3DES AES 128 AES 192 and AES 256 Authentication There are two algorithms can be selected SHA1 and MI DH Group There are three groups can be selected Group 1 MODP768 Group 2 MODP1024 and Group 5 MODP1536 Enable Check this checkbox to enable the IKE Proposal with this rule Set IPSec Proposal Check this checkbox to enable IPSec proposals 50 Encryption There are five algorithms can be selected DES 3DES AES 128 AES 192 and AES 256 But when the encapsulation protocol is set to AH you can choose Null without encryption Authentication There are two algorithms can be selected SHA1 and MD5 But none also can be selected here for IPSec proposal Enable Check this checkbox to enable IPSec Proposal with this rule Click on Save to store what you just select or
10. a tunnel as default gateway for WAN connection but it doesn t cover those subnet which exist in other activated GRE tunnel 2 Name Assign a name of certain tunnel 3 Tunnel IP Assign a virtual IP address of this tunnel 4 Peer IP Indicate IP address of remote host that you want to connect 5 Key Assign a password to establish GRE tunnel with remote host 6 TTL 46 Time To Live for packets The value is between 1 to 255 If a packet passes number of TTL routers and can t reach the destination and then this packet will be dropped 7 Subnet Indicate local subnet of remote host If a packet wants to go this subnet the GRE tunnel will be established automatically 8 Enable Check this box to activate this rule Click Save to store your setting or Undo to give up 6 VPN IPSEC 2 ADMINISTRATOR S MAIN MENU 8 Status W7 Wizard TAL Advanced Logout HE EE R n a a lS TD EE EEN Status Packet Filters Domain Filters e URL Blocking MAC Control e GRE Tunnel o VPNAPSEC VPH L2TP Client o VPN L2TP Server VPH PPTP Client VPN PPTP Server Miscellaneous VPN IPSec are settings that are used to create virtual private tunnels to remote VPN gateways The tunnel technology supports data confidentiality data origin authentication and data integrity network information by utilizing encapsulation protocols encryption algorithms and hashing algorithms 1 VPN IPSEC
11. or modify the software Also for each author s protection and ours we want to make certain that everyone understands that there is no warranty for this free software If the software is modified by someone else and passed on we want its recipients to know that what they have is not the original so that any problems introduced by others will not reflect on the original authors reputations Finally any free program is threatened constantly by software patents We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses in effect making the program proprietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow 83 GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION 0 This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License The Program below refers to any such program or work and a work based on the Program means either the Program or any derivative work under copyright law that is to say a work containing the Program or a portion of it either verbatim or with modifications and or translated into another language Hereinafter translation is included without limitation i
12. step will setup your basic wireless network settings Peel Next for continues Please assion the parameters to your wireless networking I you need more settings please login to the router s configuration page default 11 wi Ww WEP OE 12 Step 7 Auto Detect WAN Service Click Next for continue Click the button Let me select WAN service by myself to disable this function Note The Item supports to detect the Dynamic and PPPoE WAN Services only Example the Dynamic WAN type is detected G WiFi HSPA YPN Router Auto Detect WAN Service This step will automatically detect one suitable WAN service for Router Please make mre the WAN cable connection is working between your Router and broadband modera You can ignore the WAN cable connection but the WAN service will not be checked later You can set it manually if you know your WAN service type F WiFi HSPA TPH Router Auto Detect WAN Service This step will automatically detect one suitable WAN service for Router A dynamic IF service hat been found for your WAN The folowing setup steps will be based on thi tting If dynamic IF i not your expected WAN service please select the corect one manually 13 Step 8 Manual select WAN Sep HSPA FPN Router Service Select WAN Service In the manual mode Click the any icons This step lets you select WAN service by yourself for continues Please select the WAN
13. subnet mask Router and DNS settings are correctly entered for the network Vil If you are using other wireless device home security systems or ceiling fans lights in your home your wireless connection may degrade dramatically Keep your product away from electrical devices that generate RF noise such as microwaves monitors electric motors B What can do if my wireless client can not access the Internet l Out of range Put the router closer to your client Il Wrong SSID or Encryption Key Check the SSID or Encryption setting Ill Connect with wrong AP Ensure that the client is connected with the correct Access Point i Right click on the Local Area Connection icon in the taskbar li Select View Available Wireless Networks in Wireless Configure Ensure you have selected the correct available network iii Reset the 802 11n Wireless HSPA Router to default setting C Why does my wireless connection keep dropping l Antenna Orientation i Try different antenna orientations for the 802 11n Wireless HSPA Router ii Try to keep the antenna at least 6 inches away from the wall or other objects ll Try changing the channel on the 802 11n Wireless HSPA Router and your Access Point and Wireless adapter to a different channel to avoid interference III Keep your product away from electrical devices that generate RF noise like microwaves monitors electric motors etc 79 N ar A e What to do if forgot
14. those who receive copies directly or indirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program If any portion of this section is held invalid or unenforceable under any particular circumstance the balance of the section is intended to apply and the section as a whole is intended to apply 85 in other circumstances It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License 8 If the distribution and or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries so that distribution is permitted only
15. 160 characters for pure alphabetical or numeric Add for international format of the phone number You can create a new SMS message on this page After finishing content of message and filling with phone number of receiver s pressing send button to send this message out You can see Send OK if the new message has been sent successfully 70 2 Inbox ees Te IW BASIC SETTING a FORWARDING RULES SECURITY SETTING Mr ADVANCED SETTING SMS Create Message Inbox Eege ee ere MRENE Et FRR GSP GE 920011105 10 16 285 HAA 1724 RRE PER 20094 05 10 26 10 mech e Tresch AE 6S 75035 FS O20 G4 105 1050 33 URC Uns oli 1806575059706 Gh 20094 106 14 79 36 ERGSISOSIIOS C2000 106 15 30 09 Rapa Bel ee BRG5975035708 2009 4 WOE 13 31 08 eee Team HEESILLITISEO A3 20001 PIE 13 23 Se Ce LTE Received SU SI Hew SU SE Total Capa citp 30 SIT BRST L i EI TENH ikee rE Delete Rey Foward Retesh Modem isn t Ready Please check the SIM card inserted or not You can read delete reply and forward messages Just click on one from the SMS lists then you can view the whole content of it in the SMS window below Refresh You can press Refresh button to renew SMS lists Delete Reply Forward Messages After reading message you can check the checkbox on the left of each message to delete reply or forward this message 71 3 2 6 Tool Box 3 a ELS ERE WE E LL ei
16. AH or ESP AH PFS Group Configures Perfect Forward Secrecy for connections created with this IPSec transport profile by assigning a Diffie Hellman prime modulus group There are three groups can be selected Group 1 Group 2 Group 5 Disable No PFS group Group 1 768 bit Diffie Hellman prime modulus group Group 2 1024 bit Diffie Hellman prime modulus group Group 5 1536 bit Diffie Hellman prime modulus group Aggressive Mode Enabling this mode will accelerate establishing tunnel but the device will suffer from less security in the meanwhile Hosts in both ends of the tunnel must support this mode so as to establish the tunnel properly Preshare key The first key that supports IKE mechanism of both VPN gateway and VPN client host for negotiating further security keys The pre shared key must be same for both VPN gateways and clients Connecting Type There are three options for users to choose when the VPN tunnel will be established You can choose connect on demand always connect or connect manually Remote ID The Type and the Value are must same as the Type and the Value of the Local ID of the remote VPN gateway Local ID The Type and the Value are must same as the Type and the Value of the Remote ID of the remote VPN gateway Dead Peer Detection This feature will detect if remote VPN gateway still exists Indicate time of interval between every detection and assigns value of timeout XAUTH With xAuth feature the VPN c
17. CEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE PROGRAM AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU SHOULD THE PROGRAM PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 12 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES END OF TERMS AND CONDITIONS 86
18. HCP Server Rone neni t LAN IP Address 192 168 123 254 Change Password si t Subnet Mask 255 255 255 0 3 Internet Setup HELP WAN Interface Ethernet WAN t WAN Type t Activate WWAN for Auto F ailover Remote Host for keep alive t IP Mode Sib D DI ig Di EI CD Dynamic P address t My IP Address t My Subnet Mask t Gateway IP Server IP Address Name t PPTP Account t PPTP Password il t Connection ID optional 0 seconds t Maximum Idle Time Connect on Demand t Connection control t MTU i La Loy Di E P CH kl First please check your ISP assigned and select the IP Mode Static IP Address or Dynamic IP 26 Address For example Use Static the private IP address subnet mask and Router are your ISP assigned to you 1 Active WWAN for Auto Failover The WAN type will be change to wireless WAN automatically if the wired WAN is defunct My IP Address My Subnet Mask and WAN Router IP the private IP address subnet mask and Router IP your ISP assigned to you Server IP Address Name the IP address or URL of the PPTP server PPTP Account and Password the account and password your ISP assigned to you If you don t want to change the password keep it empty Connection ID optional Input the connection ID if your ISP requires it Maximum Idle Time the time of no activity to disconnect your PPTP session Set it to zero or enable Auto reconnect t
19. OLBOX e Status 3 PPTP Server o Packet Filters Setting Domain Filters k VPN PPTP Server E Enable URL Blocking PPIP Server Configuration GRE Tunnel gt Server virtual IP 132 168 0 1 e VPNAPSEC VPN L2TP Client se VPH L2TP Server e VPH PPTP Client VPN PPTP Server e Miscellaneous H IP Pool Start Address H IP Pool End Address E PAP E CHAP E MS CHAP E MS_CHAPv2 E Enable t Encryption Length 40 bits 56 bits 128 bits k Authentication Protocol t MPPE Encryption Mode 3 User Account mm mm User Name Password 5 Connection Status User Name No connection from remote The VPN gateway can behave as a PPTP server and allows remote hosts to access LAN servers after establishing PPTP connection with it The device can support three authentication methods PAP CHAP MSCHAP v1 and MSCHAP v2 Users can also enable MPPE encryption when using MSCHAP 1 VPN PPTP Server Enable or Disable PPTP server function 2 Server Virtual IP The IP address of PPTP server This IP address should be different from IP address of L2TP server and LAN subnet of VPN gateway 3 IP Pool Start Address This device will assign a IP address to remote PPTP client This values indicates the beginning of IP pool 4 IP Pool End Address This device will assign a IP address to remote PPTP client This values indicates the end of IP pool 5 Authentication Protocol Users can choose authentication prot
20. S Server you can contact to your ISP to get it Connection Control select your connection control Keep Alive you can diagnose your connection by tt 31 2 DHCP Server 2 ADMINISTRATOR S MAIN MENU status wizard St advanced gt Logout ra BASIC SETTING GN FORWARDING RULES lt amp SECURITY SETTING Hr ADVANCED SETTING SMS ks TOOLBOX Network Setup J DHCP Server HELP DHCP Server Rem Setting Wireless t DHCP Server Disable Enable Change Password IP Pool Starting Address t IF Pool Ending Address t Lease Time Press More gt gt 1 2 3 7 This function enables you to assign another Router to your PC when DHCP server offers an IP to your PC DHCP Server Choose either Disable or Enable Lease Time DHCP lease time to the DHCP client IP Pool Starting Ending Address Whenever there is a request the DHCP server will automatically allocate an unused IP address from the IP address pool to the requesting computer You must specify the starting ending address of the IP address pool Domain Name Optional this information will be passed to the client Primary DNS Secondary DNS Optional This feature allows you to assign a DNS Servers Primary WINS Secondary WINS Optional this feature allows you to assign a WINS Servers Route
21. Step 1 Set up your system password Old Password New Password gt Reconfirm Start gt Password gt Time gt LAN WAN gt Wireless gt Summary gt Finish Step 2 Select Time Zone GMT 08 00 Beijing Chongqing Hong Kong Urumai Start gt Password gt Time gt LAN WAN gt Wireless gt Summary gt Finish 19 Step 3 select Wan Type Auto Detecting or Setup Manually Auto Detecting WAN Type Setup WAN Type Manually Start gt Password gt Time gt LAN WAN gt Wireless gt Summary gt Finish Setup the LAN IP and WAN Type gt LAN IP Address 192 168 123 254 gt WAN Interface Wireless WAN gt WAN Type Start gt Password gt Time gt LAN WAN gt Wireless gt Summary gt Finish Step 4 Please fill in 3G service information which is provided by your ISP gt Dial Up Profile Auto Detection Manual gt PIN Code options Start gt Password gt Time gt LAN WAN gt Wireless gt Summary gt Finish 20 Step 5 Set up your Wireless gt Wireless Module Enable Disable gt Network ID SSID gt Channel Start gt Password gt Time gt LAN WAN gt Wireless gt Summary gt Finish Set up your Authentication and Encryption gt Authentication gt Encryption WEP Key 1 OWEP Key 2 OWEP Key 3 OWEP Key 4 Step 6 Then click Apply Setting And then the device will reboot
22. Undo to give up SI 6 2 IPSec IKE Setting CM Tunnel Name t Status IKE wel t Remote Gateway t Phase Key Life Time t Phase Key Life Time t Encapsulation Protocol PFS Group F Aggressive Mode Tunnel name Assign a name of this tunnel Y Enable r Interval 30 t Timeout 180 52 Status There are IKE and Manual two options Please choose IKE here Local subnet The subnet of LAN site of local VPN gateway It can be a host a partial subnet and the whole subnet of LAN site of local gateway Local Netmask Local netmask combined with local subnet to form a subnet domain Remote subnet The subnet of LAN site of remote VPN gateway It can be a host a partial subnet and the whole subnet of LAN site of remote gateway Remote Netmask Remote netmask combined with remote subnet to form a subnet domain Remote Gateway Indicate the IP address of remote VPN gateway Phase 1 Key Life Time The unit of life time is based on the value of Life Time Unit The value of unit is second the value of life time represents the life time of the key which is dedicated at Phase 1 between both end gateways Phase 2 Key Life Time The unit of life time is based on the value of Life Time Unit The value of unit is second the value of life time represents the life time of the key which is dedicated at Phase 2 between both end gateways Encapsulation Protocol There are three protocols can be selected ESP
23. a EYS View Log View the system logs Firmware Upgrade Prompt the administrator for a file and upgrade it to this device Backup Setting Save the settings ofthis device to a file Reset to Default Resetthe settings ofthis device to the default values Reboot Reboot this device Miscellaneous MAC Address for Wake on LAN Let you to power up another network device remotely Domain Name or IF address for Ping Test Allow you to configure an IP and ping the device You can ping a secific IP to test whether itis alive 1 System Info alt d A ee l System Info System Infomation SE Firmware Upgrade WAN Type Display time Thu 10 Dec 2009 21 59 54 0800 J System Log pppd 7518 sent FCP ConfReg id 0x2 addr 0 0 0 0 gt ms dns1 10 11 12 13 ms dns3 10 11 12 14 gt lt ms wins 10 11 12 13 gt ms wins 10 11 12 14 pppd r 518 rvd PCP Coniak id 0x2 ms dns1 10 11 12 13 gt ms dns3 10 11 12 14 lt ms wins 10 11 12 13 lt ms wins 10 11 12 14 gt pppd 7518 sent FCF ConfReg id 0x3 lt addr 0 0 0 0 gt ms dns1 10 11 12 13 gt ms dns3 10 11 12 14 lt ms wins 10 11 12 13 ms wins 10 11 12 14 pppd r 518 revd IPCP Coniak id 0x3 lt ms dns1 10 11 12 13 gt lt ms dns3 10 11 12 14 ms wins 10 11 12 13 gt ms wins 10 11 12 14 gt pppdi7518 sent FCF ConfReg id 0x4 lt addr 0 0 0 0 gt ms dns1 10 11 12 13 gt lt ms dns3 10 11 12 14 gt lt lt ms win
24. atically if the wired WAN is defunct 2 PPPoE Account and Password the account and password your ISP assigned to you For security this field appears blank If you don t want to change the password leave it empty 3 Primary DNS Secondary DNS This feature allows you to assign a Primary Secondary DNS Server contact to your ISP to get it 4 Connection Control There are 3 modes to select Connect on demand The device will link up with ISP when the clients send outgoing packets 25 Auto Reconnect Always on The device will link with ISP until the connection is established Manually The device will not make the link until someone clicks the connect button in the Status page 5 Maximum Idle Time the amount of time of inactivity before disconnecting your PPPoE session Set it to zero or enable Auto reconnect to disable this feature 6 PPPoE Service Name optional Input the service name if your ISP requires it Otherwise leave it blank Assigned IP address Optional Input the IP address you want Usually leave it blank Maximum Transmission Unit MTU Most ISP offers MTU value to users The default MTU value is O auto 9 NAT disable the option bridges data form WAN port to LAN port D PPTP ADMINISTRATOR S MAIN MENU EI Status VV Wizard Ml Advanced gt Lo i BASIC SETTING CG FORWARDING RULES En SECURITY SETTING ADVANCED SETTING SMS ica TOOLBOX LS Ke EEA Network Setup 3 LAN Setup o D
25. ation including ssid so that wireless clients can know how many AP devices by scanning function in the network Therefore this function is disabled the wireless clients can not find the device from beacons 4 Channel The radio channel number The permissible channels depend on the Regulatory Domain The factory setting is channel 11 5 Wireless Mode Choose B G Mixed B only G only N only G N Mixed or B G N mixed The factory default setting is B G N mixed 6 Authentication mode You may select from nine kinds of authentication to secure your wireless network Open Shared Auto WPA PSK WPA WPA2 PSK WPA2 WPA PSK WPA2 PSK WPA WPA2 Open Open system authentication simply consists of two communications The first is an authentication request by the client that contains the station ID typically the MAC address This is followed by an authentication response from the AP router containing a success or failure message An example of when a failure may occur is if the client s MAC 34 address is explicitly excluded in the AP router configuration Shared Shared key authentication relies on the fact that both stations taking part in the authentication process have the same shared key or passphrase The shared key is manually set on both the client station and the AP router Three types of shared key authentication are available today for home or small office WLAN environments Auto The AP will Select the Open or S
26. ave not signed it However nothing else grants you permission to modify or distribute the Program or its derivative works These actions are prohibited by law if you do not accept this License Therefore by modifying or distributing the Program or any work based on the Program you indicate your acceptance of this License to do so and all its terms and conditions for copying distributing or modifying the Program or works based on it 6 Each time you redistribute the Program or any work based on the Program the recipient automatically receives a license from the original licensor to copy distribute or modify the Program subject to these terms and conditions You may not impose any further restrictions on the recipients exercise of the rights granted herein You are not responsible for enforcing compliance by third parties to this License 7 lf as a consequence of a court judgment or allegation of patent infringement or for any other reason not limited to patent issues conditions are imposed on you whether by court order agreement or otherwise that contradict the conditions of this License they do not excuse you from the conditions of this License If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not distribute the Program at all For example if a patent license would not permit royalty free redistribution of the Program by all
27. ctions like Internet games Video conferencing Internet telephony etc Because of the firewall function these applications cannot work with a pure NAT router The Special Applications feature allows some of these applications to work with this product If the mechanism of Special Applications fails to make an application work try setting your computer as the DMZ host instead 1 Trigger the outbound port number issued by the application 39 2 Incoming Ports when the trigger packet is detected the inbound packets sent to the specified port numbers are allowed to pass through the firewall This product provides some predefined settings Select your application and Click Copy to to add the predefined setting to your list Click on Save to store your setting or Undo to give up 3 Miscellaneous Z ADMINISTRATOR S MAIN MENU Status NY voan Km Advanced e gt Logout ig BASIC SETTING Virtual Server Special AP Miscellaneous t UPnP setting 1 IP Address of DMZ Host DMZ Demilitarized Zone Host is a host without the protection of firewall It allows a computer to be exposed to unrestricted 2 way communication for Internet games Video conferencing Internet telephony and other special applications 2 UPnP Setting The device also supports this function If the OS supports this function enable it like Windows XP When the user gets
28. d allow different subnets to communicate with each other System Time Allow you to set device time manually or consult network time from NTP server Apply schedule rules to Packet Filters and Virtual Server 62 1 System Log ADMINISTRATOR S MAIN MENU A Status Y Wizard Ham Advanced gt Logout a nh eet Ss Lee IW Basic SETTING oe FORWARDING RULES EA SECURITY SETTING fj ADVANCED SETTING SMS is TOOLBOX Status J System Log HELP vm EE ch System Time e Scheduling o e E mail subject i Email Log Now This page support two methods to export system logs to specific destination by means of syslog UDP and SMTP TCP The items you have to setup including IP Address for Sys log Host IP of destination where sys log will be sent to Check Enable to enable this function Setting of E mail Alert Check if you want to enable Email alert send syslog via email SMTP Server IP and Port Input the SMTP server IP and port which are connected with If you do not specify port number the default value is 25 For example mail your_url com or 192 168 1 100 26 SMTP Username and Password Input a user account and password for the SMTP server E mail address The recipients who will receive these logs you can assign more than 1 recipient using or to separate these email addresses E mail Subject The subject o
29. equire user to input a keyword only In other words Domain filter can block specific website while URL Blocking can block hundreds of websites by simply a keyword 1 URL Blocking Enable Check if you want to enable URL Blocking 2 URL If any part of the Website s URL matches the pre defined word the connection will be blocked For example you can use pre defined word sex to block all websites if their URLs contain pre defined word sex 44 3 Enable Check to enable each rule Click on Save to store your setting or Undo to give up 4 MAC Control aa a J ADMINISTRATOR s MAIN MENU ll Status YY Wizard TIL Adwanced Logout W BASIC SETTING qah FORWARDING RULES e SECURITY SETTING Mio ADVANCED SETTING J as tu TOOLBOX Status J MAC Address Control HELP Packet Filters Domain Filters URL Blocking Wireless and wired clients with C checked can connect to this device and allow e MAC Control unspecified MAC addresses to connect GRE Tunnel Wireless dients with A checked can associate to the wireless LAN and VPN IPSEC allow e unspecified MAC to associate VPN L2TP Client VPH L2TP Server VPN PPTP Client VWPN PPTP Server Miscellaneous MAC Address Control allows you to assign different access right for different users and to assign a specific IP address to a certain MAC address 1 MAC Address Control Check Enable to enable the MAC Add
30. erface Wireless WAN P Es Dial Up Profile ae Auto Detection Manual t Telecom Chunghwa Telecom ze a Auto Reconnect always on cua Sam gess Gei Disable LCF Echo Request Interval 1 seconds t Max Failure Time 2 times Ping Remote Host HostiP Interval 5 For 3G WAN Networking The WAN fields may not be necessary for your connection The information on this page will only be used when your service provider requires you to enter a User Name and Password to connect with the 3G network Please refer to your documentation or service provider for additional information 1 Dial Up Profile select auto or manual to continue 2 Country select your country 3 Telecom select your telecom 30 ot Oe Ok oS 10 11 12 13 14 3G Network select the 3G Network APN Enter the APN for your PC card here Optional Pin Code Enter the Pin Code for your SIM card Optional Dial Number This field should not be altered except when required by your service provider Account Enter the new User Name for your PC card here you can contact to your ISP to get it Password Enter the new Password for your PC card here you can contact to your ISP to get it Authentication Choose your authentication Primary DNS This feature allows you to assign a Primary DNS Server contact to your ISP to get it Secondary DNS This feature allows you to assign a Secondary DN
31. ess you can define a single IP address 4 3 2 1 or a range of IP addresses 4 3 2 1 4 3 2 254 An empty implies all IP addresses 42 For source or destination port you can define a single port 80 or a range of ports 1000 1999 Add prefix T or U to specify TCP or UDP protocol For example T80 U53 U2000 2999 No prefix indicates both TCP and UDP are defined An empty implies all port addresses Packet Filter can work with Scheduling Rules and give user more flexibility on Access control For Detail please refer to Scheduling Rule Each rule can be enabled or disabled individually Click on Save to store your setting or Undo to give up 2 Domain Filters J ADMINISTRATOR s MAIN MENU Status Ve Wizard MI Advanced Logout Ig Basic SETTING lt lt FORWARDING RULES e SECURITY SETTING Din ADVANCED SETTING ei SMS RE TOOLBOX Status J Domain Filter HELF Packet Filters Domain Filters t Domain Filter E Enable MAC Control Privilege IP Addresses Range VPHAIPSEC Cl Drop E Leg E Drop E Leg YFPM L2TF Client VPH L2TP Server CT Drop CH Log VPH PPTP Client WPA PPTP Server Miscellaneous E Drop E Leg E Drop E Log E Drop E Log E trop E Leg BoB Ee 5 Dee LP Dees 1 Domain Filter Let you prevent users under this device from accessing specific URLs 2 Domain Filter Enable Check i
32. f Contents Bee e Lu E 2 FCC Interference Statement ENNEN 2 CHAPTER T JcINFRODUC ENEE Ee hee 4 a PACKAGE ENS ba sate seca cise dewutreieeutd nar otedeuas a 4 TZ Hardware Instala oM eerten eieae secs nacseven vous Nasen Eako a sevenevseeditatwawecssveuvcastnvenennaves 5 CHAPTER 2 GETTING eege ee 10 2 1 Easy Setup by Windows Utility EEN 10 CHAPTER3 MAKING CONFIGURATION csssssssssseeeeeeeeeeeeeeseeeseeeeeaaaaesssseneneeeeeesesseaeaas 18 Bile WED Wizard BE 18 3 2 Advanced SO UHING D 23 3 2 1 Basie SUING EE 23 32 2 PORW AGING bh ET 38 3 2 9 T SO LEING DE 41 3 2 4 AGVANCER Seling S serie A a E 62 EE 70 3 20 TOOLBOX EE 72 CHAPTER 4 TROUBLESHOOTING e egebeegerede getesselt eEeEe ENEE 77 APPENDIX A SPEC SUMMARY TABLE cccceeeeeeeeeceecceececessssesseneeeeeeeeeeeeseeeeooceesseseeneees 81 APPENDIX B LICENSING INFORMATION ccccccceeeeeeeeeeeeeeeeeeseeeeeeneeeeeeeeeseeeeeeeeaaaaaeeeenneeeeees 82 Chapter 1 Introduction Congratulations on your purchase of this outstanding BDG561AM 802 11n Wireless HSPA VPN Router The device is a WiFi supported HSPA router with built in HSUPA embedded module and supporting IPSec VPN It supports NAT routing firewall VPN pass through auto 3G dial up backup connection DHCP server and so on And is easy to configure and operate even for non technical users Instructions for installing and configuring this product can be found in this manual Before you install and use
33. f email alert this setting is optional View Log Reference the section Toolbox System Info Click on Save to store your setting or Undo to give up 63 2 Dynamic DNS ADMINISTRATOR S MAINMENU fit Status Kl wizard Call Advanced Logout a Se AEN E SS J IW BASIC SETTING ca FORWARDING RULES CA SECURITY SETTING Tm ADVANCED SETTING lt SMS La TOOLBOX Status 3 Dynamic DNS HELP gt Dynamic DNS t DDNS Disable Enable Qos t Provider DynDNS org Dynamic 2 gt Routing i t Username E mail System Time t Password Key gt Scheduling To host your server on a changing IP address you have to use dynamic domain name service DDNS So that anyone wishing to reach your host only needs to know the name of it Dynamic DNS will map the name of your host to your current IP address which changes each time you connect your Internet service provider Before you enable Dynamic DNS you need to register an account on one of these Dynamic DNS servers that we list in provider field To enable Dynamic DNS click the check box next to Enable in the DDNS field Next you can enter the appropriate information about your Dynamic DNS Server You have to define Provider Host Name Username E mail Password Key You will get this information when you register an account on a Dynamic DNS server Click on Save to store your setting or Undo to g
34. f you want to enable Domain Filter 3 Log DNS Query Check if you want to log the action when someone accesses the specific URLs 4 Privilege IP Address Range Setting a group of hosts and privilege these hosts to access network without restriction 5 Domain Suffix A suffix of URL can be restricted for example com 6 Action XXx com 43 When someone is accessing the URL met the domain suffix what kind of action you want Check drop to block the access Check log to log these access 7 Enable Check to enable each rule Click on Save to store your setting or Undo to give up 3 URL Blocking J3 ADMINISTRATOR s MAIN MENU Bl Status Ni Wizard MI Advanced t Logout gf Basic semne lt lt FORWARDING RULES e SECURITY SETTING Min ADVANCED SETTING 2 SMS ss TOOLBOX Status URL Blocking t Packet Filters SE t URL Blocking E Enable n e A URL Blocking 5 URL MAC Control GRE Tunnel YPN IP SEC VPN L2TP Client WPH L2TP Server VPN PPTP Client WPA PPTP Server Miscellaneous Sg a CO e ECH oO e CH URL Blocking will block LAN computers to connect with pre define Websites The major difference between Domain filter and URL Blocking is Domain filter require user to input suffix like com or org etc while URL Blocking r
35. hange free software to make sure the software is free for all its users This General Public License applies to most of the Free Software Foundation s software and to any other program whose authors commit to using it Some other Free Software Foundation software is covered by the GNU Library General Public License instead You can apply it to your programs too When we speak of free software we are referring to freedom not price Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software and charge for this service if you wish that you receive source code or can get it if you want it that you can change the software or use pieces of it in new free programs and that you know you can do these things To protect your rights we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights These restrictions translate to certain responsibilities for you if you distribute copies of the software or if you modify it For example if you distribute copies of such a program whether gratis or for a fee you must give the recipients all the rights that you have You must make sure that they too receive or can get the source code And you must show them these terms so they know their rights We protect your rights with two steps 1 copyright the software and 2 offer you this license which gives you legal permission to copy distribute and
36. hared by the client s request automatically WPA PSK Select Encryption and Pre share Key Mode If you select HEX you have to fill in 64 hexadecimal 0 1 2 8 9 A B F digits If you select ASCII the length of pre share key is from 8 to 63 Fill in the key Ex 12345678 WPA Check Box was used to switch the function of the WPA When the WPA function is enabled the Wireless user must authenticate to this router first to use the Network service RADIUS Server IP address or the 802 1X server s domain name Select Encryption and RADIUS Shared Key If you select HEX you have to fill in 64 hexadecimal 0 1 2 8 9 A B F digits If you select ASCII the length of pre share key is from 8 to 63 Key value shared by the RADIUS server and this router This key value is consistent with the key value in the RADIUS server WPA PSK2 WPA PSK2 user AES and TKIP for Same the encryption the others are same the WPA PSK WPA2 WPA2 add uses AES and TKIP for encryption the others are same the WPA WPA PSK WPA PSK2 Another encryption options for WPA PSK TKIP and WPA PSK2 AES the others are same the WPA PSK 35 WPA WPA2 Another encryption options for WPA TKIP and WPA2 AES the others are same the WPA WDS Wireless Distribution System Setting WDS operation as defined by the IEEE802 11 standard has been made available Using WDS it is possible to wirelessly connect Access Points and in doing so extend a wired infrastructure to
37. hole or in part contains or is derived from the Program or any part thereof to be licensed as a whole at no charge to all third parties under the terms of this License c Ifthe modified program normally reads commands interactively when run you must cause it when started running for such interactive use in the most ordinary way to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty or else saying that you provide a warranty and that users may redistribute the program under these conditions and telling the user how to view a copy of this License Exception if the Program itself is interactive but does not normally print such an announcement your work based on the Program is not required to print an announcement These requirements apply to the modified work as a whole If identifiable sections of that work are not derived from the Program and can be reasonably considered independent and separate works in themselves then this License and its terms do not apply to those sections when you distribute them as separate works But when you distribute the same sections as part of a whole which is a work based on the Program the distribution of the whole must be on the terms of this License whose permissions for other licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest
38. ime Scheduling Time Zone res NW Setting t Time Zone GMT 08 00 Beijing Chongqing Hong Kong Urumqi gt Auto Synchronization Jl Enable Time Server RFC 868 Auto Sync Result Sync with Time Server Sync with my PC Thursday December 10 2009 21 Select a time zone where this device locates Auto Synchronization Select the Enable item to enable this function Time Server Select a NTP time server to consult UTC time Sync with Time Server Select if you want to set Date and Time by NTP Protocol Sync with my PC Select if you want to set Date and Time using PC s Date and Time Click on Save to store your setting or Undo to give up 68 7 Scheduling Wis ZE Fan eer Iesst Aa New Rute You can set the schedule time to decide which service will be turned on or off Select the Enable item Press Add New Rule You can write a rule name and set which day and what time to schedule from Start Time to End Time The following example configure ftp time as everyday 14 10 to 16 20 Edit Schedule Rule t Name of Rule 1 Click on Save to store your setting 69 Create Message Allow you to create and send new SMS message Inbox Allow you to read new SMS message and deleteforward existed message 1 Create Message Ki CTRATOR t Text message The max length of a message is
39. in or among countries not thus excluded In such case this License incorporates the limitation as if written in the body of this License 9 The Free Software Foundation may publish revised and or new versions of the General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation If the Program does not specify a version number of this License you may choose any version ever published by the Free Software Foundation 10 If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different write to the author to ask for permission For software which is copyrighted by the Free Software Foundation write to the Free Software Foundation we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY 11 BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE PROGRAM TO THE EXTENT PERMITTED BY APPLICABLE LAW EX
40. is Chapter provides solutions to problems for the installation and operation of the 802 11n Wireless HSPA Router You can refer to the following if you are having problems 1 Why can t configure the router even the cable is plugged and the LED is lit Do a Ping test to make sure that the 802 11n Wireless HSPA Router Go to Start gt Run 1 Type cmd SS he 2 x Type the name of a program folder document or Internet resource and Windows will open it for you Open EE al en aoe Press OK Type ipconfig to get the IP of default Router 4 Type ping 192 168 123 254 Assure that you ping the correct IP Address assigned to the WiFi HSPA IAD It will show four replies if you ping correctly inging 192 168 123 254 with 32 bytes of data eply From 192 168 123 254 bytes 32 timetims TTL 64 eply From 192 168 123 254 bytes 32 timetims TTL 64 teply From 192 168 123 254 bytes 32 timet lt ims TTL 64 eply from 192 168 123 254 bhytes 32 timetims TTL 64 Ensure that your Ethernet Adapter is working and that all network drivers are installed properly Network adapter names will vary depending on your specific adapter The installation steps listed below are applicable for all network adapters Go to Start gt Right click on My Computer gt Properties Select the Hardware Tab Click Device Manager Double click on Network Adapters Right click on Wireless Card bus Adapter or your specific
41. is any unread SMS in the storage SMS LED WAN LED RJ45 cable is plugged Green in flash Pio cable is plugged LAN LED WiFi LED Green in fast flash Device is in WPS PBC mode How to operate Step 1 Attach the antenna 1 1 Remove the antenna from its plastic wrapper 1 2 Screw the antenna in a clockwise direction to the back panel of the unit 1 3 Once secured position the antenna upward at its connecting joint This will ensure optimal reception 1 4 And rip the USIM SIM amp PWR sign label from Pull tag D 1 Turn off the Power Switch first 2 DO NOT connect 802 11n Wireless HSPA Router to power before performing the installation steps below www 0 n Step 2 Insert SIM USIM to IAD NOTE 2 1 The 802 11n Wireless HSPA Router builds in a HSUPA 3G modem card Please refer to your service provider for detailed feature information 2 2 A3G SIM USIM Card with data services is MUST Step 3 Insert the Ethernet cable into LAN Port Insert the Ethernet patch cable into LAN port on the back panel of the 802 11n Wireless HSPA Router and an available Ethernet port on the network adapter in the computer you will use to configure the unit Step 4 Insert the Ethernet patch cable into Wired WAN port Insert the Ethernet patch cable into Wired WAN port on the back panel of the 802 11n Wireless HSPA Router NOTE The step does not need if you select the 3G Wireless WAN Step 5 Power o
42. is defunct Host Name optional required by some ISPs for example Home ISP register MAC address You can change the WAN port MAC address it is your ISP assigned to you 4 Connection Control There are 3 modes to select Connect on demand The device will link up with ISP when the clients send 24 outgoing packets Auto Reconnect Always on The device will link with ISP until the connection is established Manually The device will not make the link until someone clicks the connect button in the Status page 5 NAT disable the option bridges data form WAN port to LAN port C PPP over Ethernet ADMINISTRATOR S MAIN MENU status ZY wizard Call Advanced Logout sa pm IW BASIC SETTING coe FORWARDING RULES CA SECURITY SETTING Mr ADVANCED SETTING SMS aen TOOLBOX LA Network Setup 3 Internet Setup LHELP H WAN Interface Ethernet WAN se H WAN Type PPP over Ethernet ze Connection Control Connect on Demand t Maximum Idle Time 600 seconds i C Enable k Activate WWAN for Auto F ailover Remote Hostfor keep alive we PPPoE Service Name optional t Assigned IP Address optional t MTU 0 0 is auto NAT disable C Enabl gt PPPoE Accmnt mere mme zg gt conmecten Contes ComectorDemans 2 Nemum emme gt PPPoE Semeename mmer Im one 1 Active WWAN for Auto Failover The WAN type will be change to wireless WAN autom
43. ive up 64 3 QoS ADMINISTRATOR S MAIN MENU m vr Wizard M So 1199 out Status System Log Dynamic DNS Qos t Bandwidth of Upstream BH kbps Kilobits per second ican ID Local IP Ports Remote IP Ports Routing i Raided H High 0 Always e o System Time High 0 Always w Scheduling High 0 Always High RENE 0 Always High cl CO Tse 0 Always we High Jes 0 Always High 0 Always Wi Uu i i High 0 Always e E3 Provide different priority to different users or data flows or guarantee a certain level of performance Enable This Item enables QoS function or not Bandwidth of Upstream Set the limitation of upstream speed Local IP Define the Local IP address of packets here Local Ports Define the Local port of the packets in this field Remote IP Define the Remote IP address of packets here Remote Ports Define the Remote port of the packets in this field QoS Priority This defines the priority level of the current Policy Configuration Packets associated with this policy will be serviced based upon the priority level set For critical applications High or Normal levels are recommended For non critical applications select a Low level User Rule The QoS item can work with Scheduling Rule number Please reference the section Advanced setting schedule Rule Click on Save to store your setting or
44. l automatically close the Administrator session Set this to zero to disable it Discard PING from WAN side When this feature is enabled hosts on the WAN cannot ping the Device 41 ADMINISTRATOR S MAIN MENU Tl Status e Wizard MI Advanced _ n Logout gf Basic seming lt lt FORWARDING RULES S SECURITY SETTING ge ADVANCED SETTING E sms si TOOLBOX Status Packet Filters Domain Filters URL Blocking Allow all to pass except those match the following rules e MAC Control CH Deny all to pass except those match the following rules GRE Tunnel VPRIPSEC VPN L2TP Client VPN LOTP Server Miscellaneous o eE een O E Packet Filter includes both outbound filter and inbound filter And they have same way to setting Packet Filter enables you to control what packets are allowed to pass the router Outbound filter applies on all outbound packets However inbound filter applies on packets that destined to Virtual Servers or DMZ host only You can select one of the two filtering policies 1 Allow all to pass except those match the specified rules 2 Deny all to pass except those match the specified rules You can specify 8 rules for each direction inbound or outbound For each rule you can define the following e Source IP address e Source port e Destination IP address e Destination port e Protocol TCP or UDP or both e Use Rule For source or destination IP addr
45. lient or initiator needs to provide additional user information to remote VPN server or VPN gateway for extended authentication The VPN server would reject the connect request from VPN clients because of the unknown user even though the pre shared key is correct This function is suitable to remote mobile VPN clients You can not only configure a VPN rule with a pre shared key for all remote users using but you can also designate 53 only someone is permitted to establish VPN connection with VPN server XAUTH None Without Extended Authentication xAuth XAUTH Server Check this checkbox if the device behaves as a VPN server and will verify the legality of user information from VPN client The user information that is provided by VPN client needs to match to user information that is in local user database of VPN server You can press XAUTH Account button at IPSec Setting main page to edit local user database Please note that only VPN clients with XAUTH can establish VPN connection with the device if you have activated XAUTH function XAUTH Client Check this checkbox if the device behaves as a VPN server and will send user information to remote VPN server for extended authentication You need to input correct user name and password to pass authentication Please note that remote VPN server which is without xAuth will reject your connect request if you have checked this checkbox Set IKE Proposal Check this checkbox to enable IKE pro
46. mand VC Auto Ey Manual VPN L2TP Client Enable or Disable L2TP client function Name The name of this rule Peer IP Domain The IP address or Domain name of remote L2TP server User Name The user name which is provided by remote L2TP server Password The password which is provided by remote L2TP server Peer Subnet The LAN subnet of remote L2TP server Connect There are three options for users to choose when the L2TP tunnel will be established You can choose connect on demand Auto always connect or connect manually 8 Option Enable or disable MPPE and NAT function If you enable MPPE then this L2TP tunnel will be encrypted 9 Enable Check to enable this rule ee Pre oS ES Click on Save to store what you just select or Undo to give up 57 8 VPN L2TP Server _ od ADMINISTRATOR S MAIN MENU A Status NY wizard Hu Advanced Logout Fie ws BASIC SETTING CG FORWARDING RULES amp SECURITY SETTING Din ADVANCED SETTING SMS trey TOOLBOX e Status 3 L2TP Server Packet Filters Hem Setting SI e Domain Filters t VPN LOTP Sen E Enable URL Blocking 3 L2TP Server Configuration GRE Tunnel t Server virtual IP 192 168 10 1 e VPN IPSEC P IP Poot samades e VPH L2TP Client H IP Pool End Address 100 e VPH LOTP Semer Authentication Protocol E PAP E CHAP MS CHAP E MS_CHAPv2 e VPH PPTP Client t MPPE Encryption Mode E Enable es VPH PPTP Server t Encryp
47. my encryption key Go back to advanced setting to set up your Encryption key again Reset the 802 11n Wireless HSPA Router to default setting How to reset to default Ensure the 802 11n Wireless HSPA Router is powered on Find the Reset button on the right side Press the Reset button for 8 seconds and then release After the 802 11n Wireless HSPA Router reboots it has back to the factory default settings 80 Appendix A Spec Summary Table Device Interface BDG561AM Wireless WAN Built in HSUPA modem Built in HSUPA modem _ _ _ Ethernet WAN LAN 1 Antenna WPS Button Reset Button SET Status 3G signal Strength 2 XG 3 XG SMS WAN LED Indication ILAN Wiki Power Button Power ON OFF button Power Jack Power Jack DC 12V 1A 1 SIM Card Slot For SIM card that users get from Telecom Wireless LAN WiFi Standard IEEE 802 11b g n 2x2 compliance ae O SSID SSID broadcast or in stealth mode E Auto selection manually ee security WEP WPA PSK WPA2 PSK WPA WPA2 WPS WPS Wi Fi Protected Setup Functionality Wireless WAN PPP for HSUPA Ethernet WAN PPPoE DHCP client Static IP PPTP L2TP WAN Connection Auto reconnect dial on demand manually One to Many NAT Virtual server Special application DMZ SPI Firewall IP Service filter URL blocking MAC control DoS Protection DoS Deny of Service detection and protection Management SNMP UPnP IGD syslog Administration Web based UI remote login backup rest
48. n Key Authentication key is used by the authentication algorithm Its length is 16 bytes if authentication algorithm is MD5 or 20 bytes if SHA1 Certainly its length will be O if no authentication algorithm is chosen The key value should be set in hex formatted Click on Save to store what you just select or Undo to give up 6 4 XAUTH Account 7 ei _ re BASIC SETTING Sch FORWARDING RULES S SECURITY SETTING Sms ADVANCED SETTING SMS KE TOOLBOX Status Domain Filters URL Blocking MAC Control e GRE Tunnel VPH IPSEC VPN L2TP Client e VPH L2TP Server VPN PPTP Client VPH PPTP Server e Miscellaneous ID 1 is for Dynamic VPN tunnel only Save Undo Back You can edit user information with this configuration page This user information is for XAuth server mode use only Click on Save to store what you just select or Undo to give up 56 7 VPN L2TP Client a EE a a a a a a ae ee eee a FORWARDING RULES e RITY SE Q ADVANCED SETTING SMS fw TOOLBOX T BASIC SETTING SAA o Status L2TP Client Packet Filters Item URL Blocking a ee an eg MAC Control GRE Tunnel VPK IPSEC VPN L2TP Client VWPAH L2TP Server D On demand VP PTP Client en VPN PPTP Server Manual Miscellaneous On demand Mere i Auto S E MAT 7 Manual On demand 3 1 Auto E Manual A i On de
49. n the term modification Each licensee is addressed as you Activities other than copying distribution and modification are not covered by this License they are outside its scope The act of running the Program is not restricted and the output from the Program is covered only if its contents constitute a work based on the Program independent of having been made by running the Program Whether that is true depends on what the Program does 1 You may copy and distribute verbatim copies of the Program s source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and give any other recipients of the Program a copy of this License along with the Program You may charge a fee for the physical act of transferring a copy and you may at your option offer warranty protection in exchange for a fee 2 You may modify your copy or copies of the Program or any portion of it thus forming a work based on the Program and copy and distribute such modifications or work under the terms of Section 1 above provided that you also meet all of these conditions a You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change b You must cause any work that you distribute or publish that in w
50. n the Router 5 1 Connect the power adapter to the receptor on the back panel of your 802 11n Wireless HSPA Router 5 2 Then plug the other end of the power adapter into a wall outlet or power strip 5 3 Turn on the Power Switch A H gt es a Step 6 Complete the setup 6 1 All LEDs will transient illumination to indicate power has been applied 6 2 And then LEDs will flash ON and OFF as the 802 11n Wireless HSPA Router performs initialization and Internet connection processes This will take a few minutes 6 3 When complete the Status LED will flash Chapter 2 Getting start Insert the CD into CD reader on your PC The program AutoRun will be executed automatically And then you can click the Easy setup Icon for this utility Configure the settings by the following steps 2 1 Easy Setup by Windows Utility You can also use the Easy Setup Utility to configure it Step 1 Select your language E WiFi HSPA YPN Router Select Language then click Next for Welcome to the Easy Setup for WiFi continues HSPA VPN Router This wizard will guide you to simply and quickly configure the WiFi HSPA VEN Router Step 2 Setup mode Z WiFi HSPA FPN Router You can select Wizard mode to run soe ese the setu D ste p by step or run Thus step will let you to choose one of the setup modes advanced mode to diagnose the network settings of the router This s
51. nel gt Phase Key Life Time seconds VPHAPSEC i VPH L 2TP Client e VPH L2TP Server VPN PPTP Client errs Group t Preshare Key SE Miscellaneous Remote ID Type Usemame ID z mp Dead Peer Detection DPD E Enable gt Interval 30 Seconds Timeout 180 Second s t XAUTH None o e a LS oe a ee EER ee TR VPN gateway can ignore IP information of client when using Dynamic VPN so it is suitable for users to build VPN tunnel with VPN gateway from remote mobile host Tunnel name Assign a name of this tunnel Local subnet The subnet of LAN site of local VPN gateway It can be a host a partial subnet and the whole subnet of LAN site of local gateway Local Netmask Local netmask combined with local subnet to form a subnet domain Phase 1 Key Life Time The unit of life time is based on the value of Life Time Unit The value of unit is second the value of life time represents the life time of the key which is dedicated at Phase 49 1 between both end gateways Phase 2 Key Life Time The unit of life time is based on the value of Life Time Unit The value of unit is second the value of life time represents the life time of the key which is dedicated at Phase 2 between both end gateways Encapsulation Protocol There are three protocols can be selected ESP AH or ESP AH PFS Group Configures Perfect Forward Secrecy for connections created with this IPSec transport pr
52. network adapter Le lk EE Em Select Properties to ensure that all drivers are installed properly 77 T 8 Look under Device Status to see if the device is working properly Click OK 2 What can Ido if my Ethernet connection does not wor properly B C D Make sure the RJ45 cable connect with the router Ensure that the setting on your Network Interface Card adapter is Enabled If settings are correct ensure that you are not using a crossover Ethernet cable not all Network Interface Cards are MDI MDIX compatible and use a patch cable is recommended If the connection still doesn t work properly then you can reset it to default Problems with 3G connection A What can I do if the 3G connection is failed by Auto detection Maybe the device can t recognize your ISP automatically Please select Manual mode and filling in dial up settings manually B What can I do if my country and ISP are not in the list Please choose Others item from the list and filling in dial up settings manually C What can I do if my 3G connection is failed even the dongle is plugged Please check the following items l Make sure you have inserted a validated SIM card in the 3G data card and the subscription from ISP is still available II If you activate PIN code check feature in SIM card making sure the PIN code you fill in dial up page is correct Ill Checking with your ISP to see all dial up
53. o disable this feature If Auto reconnect is enabled this product will connect with ISP automatically after system is restarted or connection is dropped Connection Control There are 3 modes to select Connect on demand The device will link up with ISP when the clients send outgoing packets Auto Reconnect Always on The device will link with ISP until the connection is established Manually The device will not make the link until someone clicks the connect button in the Status page Maximum Transmission Unit MTU Most ISP offers MTU value to users The default MTU value is O auto 2a E L2TP d ADMINISTRATOR S MAIN MENU AM Status NY wizard All Advanced Logout EE WC BASIC SETTING lt 2 FORWARDING RULES g SECURITY SETTING Mr ADVANCED SETTING E sms re TOOLBOX Network Setup C Enable Remote Host for keep alive echt Lem El eeng EI EE E t Connection Control Connect on Demand t Activate WWAN for Auto Failover MTU DG 0 is auto First please check your ISP assigned and select the IP Mode Static IP Address or Dynamic IP Address For example Use Static the private IP address subnet mask and Router are your ISP assigned to you 1 Activate WWAN for Auto Failover The WAN type will be change to wireless WAN automatically if the wired WAN is defunct 2 IP Address Subnet Mask and WAN Router IP the private IP address subnet mask and Router IP your ISP assigned to you
54. ocol as PAP CHAP MSCHAP v1 or MSCHAP v2 6 MPPE Encryption Mode Check this checkbox to enable MPPE encryption Please note that MPPE needs to work with MSCHAP v1 or MSCHAP v2 authentication method 7 Encryption Length You can choose encryption length of MPPE encryption 60 8 9 11 Miscellaneous User Account You can input five different user accounts for PPTP server Connection Status Here you can see the PPTP connection which has been established Click on Save to store what you just select or Undo to give up _ ADMINISTRATOR S MAIN MENU IW BASIC SETTING 2 Status Packet Filters Domain Filters URL Blocking MAC Control GRE Tunnel VPHIPSEC VPH LATP Client VPH L2TP Server VPH PPTP Client VPH PPTP Server Miscellaneous ai Status ON wan Hm Advanced Logout oe ae en a FORWARDING RULES e SECURITY SETTING Mm ADVANCED SETTING J SMS sy TOOLBOX 3 Miscellaneous Items k Administrator Time out t Remote Administrator Host Port t Discard PING from WAN side Dos Attack Detection Save Undo Administrator Time out The time of no activity to logout automatically you may set it to zero to disable this feature Remote Administrator Host Port In general only Intranet user can browse the built in web pages to perform administration task This feature enables you to perform administration task from remote host If this feature is enabled only
55. of VPN protects network information from ill network inspectors But it greatly degrades network throughput Enable it when you really need a security tunnel It is disabled by default 2 Netbios over IPSEC Computers running Microsoft Windows can communicate with one another using NetBIOS Users can access remote network resources by browsing the Window Network Neighborhood 47 3 NAT Traversal Some NAT router will block IPSec packets if it doesn t support IPSec pass through If you connect to another NAT router which doesn t support IPSec pass through at WAN side you need to activate this option 4 Max number of tunnels Since VPN greatly degrades network throughput the allowable maximum number of tunnels is limited Be careful to set the value for allowing the number of tunnels can be created simultaneously Its value ranges from 1 to 5 5 Dynamic IP VPN Enable it when you need remote mobile hosts build security tunnel with the Gateway It is disabled by default Click Edit button to finish configuration 6 Tunnel Name Name for certain tunnel Click Edit button to finish configuration Click on Save to store what you just select or Undo to give up 48 6 1 Dynamic IP VPN WW Basic SETTING SG FORWARDING RULES B SECURITY SETTING Sm ADVANCED SETTING Status D VPN Dynamic IP Setting Packet Filters ame e URL Block SE ea Sue kg MAC Control a Local Netmask GRE Tun
56. ofile by assigning a Diffie Hellman prime modulus group There are three groups can be selected Group 1 Group 2 Group 5 Disable No PFS group Group 1 768 bit Diffie Hellman prime modulus group Group 2 1024 bit Diffie Hellman prime modulus group Group 5 1536 bit Diffie Hellman prime modulus group Preshare key The first key that supports IKE mechanism of both VPN gateway and VPN client host for negotiating further security keys The pre shared key must be same for both VPN gateways and clients Remote ID The Type and the Value are must same as the Type and the Value of the Local ID of the remote VPN gateway Local ID The Type and the Value are must same as the Type and the Value of the Remote ID of the remote VPN gateway Dead Peer Detection This feature will detect if remote VPN gateway still exists Indicate time of interval between every detection and assigns value of timeout XAUTH With xAuth feature the VPN client or initiator needs to provide additional user information to remote VPN server or VPN gateway for extended authentication The VPN server would reject the connect request from VPN clients because of the unknown user even though the pre shared key is correct This function is suitable to remote mobile VPN clients You can not only configure a VPN rule with a pre shared key for all remote users using but you can also designate only someone is permitted to establish VPN connection with VPN server XAUTH None
57. ore setting Environment amp Certification Package Information Operation Temp Storage Temp Temp 10 70 C Humidity 0 95 non condensing EMI Certification CE FCC RoHS RoHS compliance Specifications are subject to change without prior notice Device dimension mm 81 Appendix B Licensing information This product includes copyrighted third party software licensed under the terms of the GNU General Public License Please refer to the GNU General Public License below to check the detailed terms of this license The following parts of this product are subject to the GNU GPL and those software packages are copyright by their respective authors Linux 2 6 21 system kernel busybox_1_ 00 TC bridge utils 0 9 5 dhcpcd 1 3 ISC DHCP V2 P5 syslogd spread from busybox wireless tools ntpclient of NTP client implementation GNU Wget Availability of source code Please visit our web site or contact us to obtain more information 82 GNU GENERAL PUBLIC LICENSE Version 2 June 1991 Copyright C 1989 1991 Free Software Foundation Inc 59 Temple Place Suite 330 Boston MA 02111 1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document but changing it is not allowed Preamble The licenses for most software are designed to take away your freedom to share and change it By contrast the GNU General Public License is intended to guarantee your freedom to share and c
58. posals Encryption There are five algorithms can be selected DES 3DES AES 128 AES 192 and AES 256 Authentication There are two algorithms can be selected SHA1 and MI DH Group There are three groups can be selected Group 1 MODP768 Group 2 MODP1024 and Group 5 MODP1536 Enable Check this checkbox to enable the IKE Proposal with this rule Set IPSec Proposal Check this checkbox to enable IPSec proposals Encryption There are five algorithms can be selected DES 3DES AES 128 AES 192 and AES 256 But when the encapsulation protocol is set to AH you can choose Null without encryption Authentication There are two algorithms can be selected SHA1 and MD5 But none also can be selected here for IPSec proposal Enable Check this checkbox to enable IPSec Proposal with this rule Click on Save to store what you just select or Undo to give up 54 Status Packet Filters Domain Filters URL Blocking MAC Control GRE Tunnel VPNAPSEC VPN L2TP Client VPN L2TP Server VPN PPTP Client VPH PPTP Server Miscellaneous 6 3 IPSec Manual Setting 3 VPN Settings Tunnel 1 t Tunnel Name t Status t Local Subnet t Local Netmask t Remote Subnet t Remote Netmask t Remote Gateway t Encapsulation Protocoll t Outbound SPI t Inbound SPI t Encryption Algorithm SDES e SHAT e t Authentication Algorithm t Authentication Key Tunnel name Assign a name of this tunnel Sta
59. r Optional Router Address would be the IP address of an alternate Router Click on Save to store your setting or click Undo to give up 32 DHCP Clients List The list of DHCP clients shows here Kee SE DHCP Clients List Time 192 168 123 101 tstilin PC 00 22 F B 68 2F 66 245937 RH Fired Wapping DHCP Fixed Mapping The DHCP Server will reserve the special IP for special MAC address shows below EE GE SETTING KS BASIC SETTING lt rr Next gt gt J Save Undo Back 33 3 Wireless Settings J ADMINISTRATOR S MAM MENU i Status wizard 3 mm Advanced Logout Ig Basc serine CG FORWARDING RULES E SECURITY SETTING Mia ADVANCED SETTING SMS z s TOOLBOX s Network Setup 3J Wireless Setting HELP Change Password default i SR s DHCP Server them i H Authentication Encryption WDS Setting WPS Setup Wireless Client List Wireless settings allow you to set the wireless configuration items 1 Wireless Module The user can enable or disable wireless function 2 Network ID SSID Network ID is used for identifying the Wireless LAN WLAN Client stations can roam freely over this product and other Access Points that have the same Network ID The factory setting is default 3 SSID Broadcast The router will broadcast beacons that have some inform
60. reless WAN k WAN Type Ethernet WAN 1 LAP IP Address the local IP address of this device The computers on your network must use the LAN IP address of your product as their Default Router You can change it if necessary 2 Subnet Mask insert 255 255 255 0 3 WAN Interface Select Ethernet WAN or Wireless WAN to continue b WAN Type Static F Address K Static IP Address Dynamic IP Address h Activate WWAN forAuto Failover Leer over Ethemet DO O O ve b WAN IF Address 4 WAN Type WAN connection type of your ISP You can click WAN Type Combo button to choose a correct one from the following options A Static IP Address 23 se SEA SECURITY SETTING Yf ADVANCED SETTING a m m eege siet wm D LAN IP Address Subnet Mask 255 255 255 0 Q Internet Setup WAN Interface Ethernet WAN w WAN Type Static IP Address mW C Enable Activate WVAN for Auto F allower oO Remote Host for keep alive Ee El F WAN Gateway Secondary DNS save WAN IP Address Subnet Mask Router Primary and Secondary DNS enter the proper setting provided by your ISP B mnanaa 192 168 123 254 255 255 255 0 HELP E WAN Interface Ethernet WAN se EWAN Type Dynamic IP Address e LC Enable k Activate WVAN for Auto F ailover Remote Hostforkeepative 1 Active WWAN for Auto Failover The WAN type will be change to wireless WAN automatically if the wired WAN
61. ress Control All of the settings in this page will take effect only when Enable is checked 2 Connection control Check Connection control to enable the controlling of which wired and wireless clients can connect with this device If a client is denied to connect with this device it means the client can t access to the Internet either Choose allow or deny to allow or deny the clients whose MAC addresses are not in the Control table please see below to connect with this device 3 Association control Check Association control to enable the controlling of which wireless client can associate 45 to the wireless LAN If a client is denied to associate to the wireless LAN it means the client can t send or receive any data via this device Choose allow or deny to allow or deny the clients whose MAC addresses are not in the Control table to associate to the wireless LAN Click Save to store your setting or Undo to give up 5 GRE Tunnel J ADMINISTRATOR S MAIN MENU All Status Ve Wizard Wm Advanced Logout re BASIC SETTING FORWARDING RULES e SECURITY SETTING or ADVANCED SETTING Status Packet Filters Domain Filters URL Blocking o MAC Control GRE Tunnel o VPR IPSEC VPN L2TP Client e VPH L2TP Sener e VPN PPTP Client VPN PPTP Server o Miscellaneous GRE Tunnel allows you to establish GRE tunnel with remote host 1 Default Gateway You can choose
62. s 10 11 12 13 lt ms wins 10 11 12 14 commander STOP WANTYPE 36G Dec 10 21 04 07 pppd 7518 Terminating on signal 15 Page 1 54 Log Number 949 lt lt Previous First Page Last Page Clear logs You can view the System Information and System log and download clear the System log in this page 12 2 PIN Control ADMINISTRATOR S MAIN MENU _ Status 8 Vizard a Advanced Lt ed a o System Info e PIN Control Firmware Upgrade Backup Setting Reset to Default Reboot Miscellaneous Sh BASIC SETTING oak FORWARDING RULES gt SECURITY SETTING ADVANCED SETTING SPAS Tres TOOLBOX Ss ge i Sa 3 PIN CODE Request function P i e S i g ebe EN Disable Enable function t Input SIM PIN code Warning 3 more ties allowed PIN CODE Change function You can enable disable the PIN Code control function or change the PIN code 1 PIN Code request function Enable or Disable the PIN Code Request function 2 Input SIM PIN code Input the correct PIN code before the press the save button 3 PIN Code charge function change the PIN code on the SIM card Warring 1 The SIM Card will be lock if retry more than 3 times 2 The Page supports the Unlock SIM function too You must get the PUK code from ISP first a b s AA 73 3 AER ZUR Current firmware version is RO O3a3 Mote Do notinterruptthe process or power off the unit when itis being upgraded
63. service for stop PPPoE Example 3G WAN Service WiFi HSPA FPN Router Please fill in 3G service information WAN Setting which is provided by your ISP 3G Service Please input the WAN service information Dial Up profile O Auto Detection FIN Code APY Dialed Number Usemame Passvond 14 Step 9 Summary of the settings P WiFi HSPA YPN Router Click Next for continue Save Settings The sethngs will be saved to the Router SSID default Channel 11 Security WEP WAN Setting 3G Service APH PIH Code Dialed Humber Modify Setti Username Password Step 10 Reboot f WiFi HSPA FPN Router The 802 11n Wireless HSPA VPN Router is rebooted Save Settings savine tting to Kouter 15 Step 11 Applied the Settings F WiFi HSPA FPN Router Click Next for continue SE settings have been saved and oubalzed The next step will test Intemet connection Or you can choose to ignore the test Step 12 Test the Internet f WiFi HSPA FPN Router connection WAN Service Test Test WAN Networking service Click Next for continue Thie step will test Intemet commection to make mre you can surf Intemet You can ignore the by select the Ignore Test 16 Step 13 Setup Completed Sep HSPA FPN Router 1 The EzSetup is finish you can open the default web browser to configure advanced settings of the 802 11n Wireless HSPA VPN Router The Router is configured but the WAN ser
64. settings are correct IV Make sure 3G signal from your ISP is available in your environment What can do if my router can t recognize my 3G data card even it is plugged There might be compatibility issue with some certain 3G cards Please check the latest compatibility list to see if your 3G card is already supported What should I insert in APN PIN Code Account Password Primary DNS and Secondary DNS The device will show this information after you choose country and Telcom You can also check these values with your ISP Which 3G network should I select It depends on what service your ISP provide Please check your ISP to know this information Why my 3G connection is keep dropping Please check 3G signal strength from your ISP in your environment is above middle 78 level 4 Something wrong with the wireless connection A Can t setup a wireless connection l Ensure that the SSID and the encryption settings are exactly the same to the Clients II Move the 802 11n Wireless HSPA Router and the wireless client into the same room and then test the wireless connection lll Disable all security settings such as WEP and MAC Address Control IV Turn off the 802 11n Wireless HSPA Router and the client then restart it and then turn on the client again V Ensure that the LEDs are indicating normally If no make sure that the AC power and Ethernet cables are firmly connected VI Ensure that the IP Address
65. t select or Undo to give up VPN PPTP Client Status 3 PPTP Client Packet Filters Gel dl t VPN PPTP Client EC Enable GRE Tunnel On demand Sea E MPPE VPNAPSEC geng E NAT Manual VPN L2TP Client l W On demand Gen VPN L2TP Server 9 Eii E MPPE ay E NAT VPH PPTP Client Manual VPN PPTP Server On demand F NPPE Auto Miscellaneous Manual ENAT On demand ae E MPPE paii F NAT e Manual On demand O MPPE T E NAT k Ha 8 Manual 3 Connection Status DREES VPN PPTP Client Enable or Disable PPTP client function Name The name of this rule Peer IP Domain The IP address or Domain name of remote PPTP server User Name The user name which is provided by remote PPTP server Password The password which is provided by remote PP TP server Peer Subnet The LAN subnet of remote PPTP server Connect There are three options for users to choose when the PPTP tunnel will be established You can choose connect on demand Auto always connect or connect manually Option Enable or disable MPPE and NAT function If you enable MPPE then this PPTP tunnel will be encrypted Enable Check to enable this rule Click on Save to store what you just select or Undo to give up 59 10 VPN PPTP Server H ADMINISTRATOR S MAIN MENU fil Status NY wizard Dm Advanced gt Logout igs BASIC SETTING FORWARDING RULES EE SECURITY SETTING Wirt ADVANCED SETTING SMS ter TO
66. tep by step gvide will let you easily and quickly connect to Intemet Thi will provide a diagnostic of your network and the settings used by the Router Advanced 10 Step 3 Advanced mode Setup f WiFi HSPA FPN Router Check the PC Router or Internet EE icons for the Status of PC Router or Let you monitor and setup you network Internet You can select the item to monitor or to setup your network l Interet service is working Step 4 Wizard mode Prepare f WiFi HSPA FPN Router Setup Prepare Setup of 1 f Make sure the router iS powered Thi step will make sure connection can be established between your PC and Router bech On 2 Make sure your network adapter Please make sure the following items 1 Make sure the Router i don ce nected to the LAN port of 2 Make Se yonr EE E to the LAN port of the Router the router 3 Make sure your network adapter has an IP address 3 Make sure your network adapter has an IP address Click Next for continues Il Step 5 Wireless Setting f WiFi HSPA FPN Router fx Select Wireless Enable or Disable BE then click Next for continues This step will setup your basic wireless network settings rec This will provide you with a basic workable tting for your wireless You can also select to do it later Enable C Co not set at this time Step 6 Wireless Setting f WiFi HSPA FPN Router Key in the SSID Channel and ar Security options and then click This
67. the specified IP address can perform remote administration If the specified IP address is 0 0 0 0 any host can connect with this product to perform administration task You can use subnet mask bits nn notation to specified a group of trusted IP addresses for example 10 1 2 0 24 NOTE When Remote Administration is enabled the web server port will be shifted to 80 You can change web server port to other port too Discard PING from WAN side When this feature is enabled any host on the WAN cannot ping this product DoS Attack Detection When this feature is enabled the router will detect and log the DoS attack comes from the Internet Currently the router can detect the following DoS attack SYN Attack WinNuke Port Scan Ping of Death Land Attack etc Click on Save to store your setting or Undo to give up 61 Send system log to a dedicated host or email to specific receipts Dynamic DNS To host your server on a changing IP address you have to use dynamic domain name service DDNS Qos Rule Quality of Service can provide different priarity to different users or data flows or Quarantee a certain level of performance SNMP Gives a user the capability to remotely manage a computer network by polling and setting terminal values and monitoring network events Routing Ifyou have more than one routers and subnets you may want to enable routing table to allow packets to find proper routing path an
68. this product please read this manual carefully for fully exploiting the functions of this product 1 1 Package List 1 WiFi HSPA VPN Router CD Manual Power adapter 12V 1A BE Di 1 2 Hardware Installation USIM SIM Slot Auto MDI MDIX RJ 45 Ports Receptor for Automatically sense the types of WAN Power adapter and LAN when connecting to Ethernet Reset WAN LANI1 LAN4 WLAN WPS Button LED LEDs LED WPS Button Wifi HSPA VPN Router 3G Signal Strength Status 2G 2 5G 3G 3 5G SMS LED LED LED LED LEDs LED indicators Green in flash Device status is working 3G Signal Red in flash Disconnected Strength LED No SIM card signal or unverified PIN code Amber in flash Connected Signal strength in level one weak Red in Red in quick flash Red in quick flash Roaming alert and 3G signal is weak Amber Connected Signal strength in level two or three middle Amber in quick flash Roaming alert and 3G signal is middle Crech Connected Signal strength in level four or five strong Green in quick fash in Green in quick flash flash Roaming alert and 3G signalis strong alert and Roaming alert and 3G signalis strong signal is strong EDGE or GPRS connection is established 2G 2 5G LED Green in flash Data packet transferred via 2G 2 5G UMTS HSDPA HSUPA connection is 3G 3 5G LED Green established Green in flash Data packet transferred via 3G 3 5G Green in flash There
69. tion Length 40 bits __ 56 bits 126 bits Miscellaneous Password 3 Connection Status No connection fram remote Refresh The VPN gateway can behave as a L2TP server and allows remote hosts to access LAN servers after establishing L2TP connection with it The device can support three authentication methods PAP CHAP MSCHAP v1 and MSCHAP v2 Users can also enable MPPE encryption when using MSCHAP 1 VPN L2TP Server Enable or Disable L2TP server function 2 Server Virtual IP The IP address of L2TP server This IP address should be different from IP address of PPTP server and LAN subnet of VPN gateway 3 IP Pool Start Address This device will assign a IP address to remote L2TP client This values indicates the beginning of IP pool 4 IP Pool End Address This device will assign a IP address to remote L2TP client This values indicates the end of IP pool 5 Authentication Protocol Users can choose authentication protocol as PAP CHAP MSCHAP v1 or MSCHAP v2 6 MPPE Encryption Mode Check this checkbox to enable MPPE encryption Please note that MPPE needs to work with MSCHAP v1 or MSCHAP v2 authentication method 58 Cs H Se H pa E En Encryption Length You can choose encryption length of MPPE encryption User Account You can input five different user accounts for L2TP server Connection Status Here you can see the L2TP connection which has been established Click on Save to store what you jus
70. tus There are IKE and Manual two options Please choose Manual here Local subnet The subnet of LAN site of local VPN gateway It can be a host a partial subnet and the whole subnet of LAN site of local gateway Local Netmask Local netmask combined with local subnet to form a subnet domain Remote subnet The subnet of LAN site of remote VPN gateway It can be a host a partial subnet and the whole subnet of LAN site of remote gateway Remote Netmask Remote netmask combined with remote subnet to form a subnet domain Remote Gateway Indicate the IP address of remote VPN gateway Encapsulation Protocol There are two protocols can be selected ESP or AH Outbound SPI SPI is an important parameter during hashing Outbound SPI will be included in the outbound packet transmitted from local gateway The value of outbound SPI should be set in hex formatted Inbound SPI Inbound SPI will be included in the inbound packet transmitted from WAN site of remote gateway It will be used to de hash the coming packet and check its integrity The value of outbound SPI should be set in hex formatted Encryption There are two algorithms can be selected DES 3DES 55 Encryption Key Encryption key is used by the encryption algorithm Its length is 8 bytes if encryption algorithm is DES or 24 bytes if 3DES The key value should be set in hex formatted Authentication Algorithm There are two algorithms can be selected SHA1 and MI Authenticatio
71. ubsection b above The source code for a work means the preferred form of the work for making modifications to it For an executable work complete source code means all the source code for all modules it contains plus any associated interface definition files plus the scripts used to control compilation and installation of the executable However as a special exception the source code distributed need not include anything that is normally distributed in either source or binary form with the major components compiler kernel and so on of the operating system on which the executable runs unless that component itself accompanies the executable If distribution of executable or object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place counts as distribution of the source code even though third parties are not compelled to copy the source along with the object code 4 You may not copy modify sublicense or distribute the Program except as expressly provided under this License Any attempt otherwise to copy modify sublicense or distribute the Program is void and will automatically terminate your rights under this License However parties who have received copies or rights from you under this License will not have their licenses terminated so long as such parties remain in full compliance 5 You are not required to accept this License since you h
72. up 66 5 Routing ADMINISTRATOR S MAIN MENU i Status NV Wizard JAN Advanced a WC Basic SETTING lt A FORWARDING RULES SECURITY SETTING sye ADVANCED SETTING sms VS TOOLBOX Destination Gateway System Log SNMP Enable e Routing System Time e Scheduling II HM majaan a afa Routing Tables Allow you to determine which physical interface address to use for outgoing IP data grams If you have more than one routers and subnets you will need to enable routing table to allow packets to find proper routing path and allow different subnets to communicate with each other Routing Table settings are settings used to setup the functions of static and dynamic routing Dynamic Routing Routing Information Protocol RIP will exchange information about destinations for computing routes throughout the network Please select RIPv2 only if you have different subnet in your network Otherwise please select RIPv1 if you need this protocol Static Routing For static routing you can specify up to 8 routing rules You can enter the destination IP address subnet mask Router hop for each routing rule and then enable or disable the rule by checking or un checking the Enable checkbox Click on Save to store your setting or Undo to give up 67 6 System Time wet AU S R INH gf sasic SETTING i System Log Dynamic DNS e Qos SNMP Routing System T
73. vice functionality has not been checked Setup Completed 2 Click Finish to complete the installation 17 Chapter 3 Making Configuration 3 1 Web Wizard Type in the IP Address http 192 168 123 254 Type Password the default is admin and click login button Select your language Press Wizard for basic settings with simple way Welcome to AMIT Microsoft Internet Explorer fase app WACO AeA CAD BA O oO HAG mm xem ez a tb DD hitp 192 168 123 254 mywebsearch Ir Search e Leg aniey Central E Screensavers JEF art Design E en S cpu lppa Get More Hits Gls Harddisk 2 Get WiFi HSPA VPN Router R0 01a4 tatus 9 System Password default admin WiFi HSPA VPN Router R0 01a4 ADMINISTRATOR S MAIN MENU ee Taps as Modem does not exist Please check if SIM card is inserted J Please Select the Operations Wizard Advance Setup This screen reminds you to configure until the Wizard is finished 18 Press Next to start wizard Setup Wizard will guide you through a basic configuration procedure step by step Step 1 Setup Login Password gt Step 2 Setup Time Zone gt Step 3 WAN Setup gt Step 4 Wireless Setup Step 5 Summary gt Step 6 Finish lt Back Start gt Password gt Time gt LAN WAN gt Wireless gt Summary gt Finish wizard
74. your rights to work written entirely by you rather the intent is to exercise the right to control the distribution of derivative or collective works based on the Program In addition mere aggregation of another work not based on the Program with the Program or with a work based on the Program on a volume of a storage or distribution medium does not bring the other work under the scope of this License 84 3 You may copy and distribute the Program or a work based on it under Section 2 in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following a Accompany it with the complete corresponding machine readable source code which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange or b Accompany it with a written offer valid for at least three years to give any third party for a charge no more than your cost of physically performing source distribution a complete machine readable copy of the corresponding source code to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange Or c Accompany it with the information you received as to the offer to distribute corresponding source code This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with S

Download Pdf Manuals

image

Related Search

Related Contents

451 FU-BM DE  Hoover Powermax S3530 Bagged Canister Vacuum  Mai 2009 Le Liahona  F.T.FC1008, FC1012  M-Audio Cable Box User's Manual  Snom 870 User Manual  

Copyright © All rights reserved.
Failed to retrieve file