BTI WIRELESS CP880-A LTE Outdoor CPE User Manual
- June 5, 2024
- BTI WIRELESS
Table of Contents
CP880-A LTE CPE
User Manual
Getting Started
1.1 Welcome to the CPE
In this document, the LTE (Long Term Evolution) CPE (customer premises
equipment) will be replaced by the CPE. Carefully read the following safety
symbols to help you use your CPE safely and correctly:
| Additional information
---|---
| Optional methods or shortcuts for an action
| Potential problems or conventions that need to be specified
1.2 Computer Configuration Requirements
For optimum performance, make sure your computer meets the following
requirements.
Item | Requirement |
---|---|
CPU | Pentium 500 MHz or higher |
Memory | 128 MB RAM or higher |
Hard disk | 50 MB available space |
Operating system |
- Microsoft: Windows XP, Windows Vista, or Windows 7
- Mac: Mac OS X 10.5 or higher
Display resolution| 1024 x 768 pixels or higher
Browser|
- Internet Explorer 7.0 or later
- Firefox 3.6 or later
- Opera 10 or later
- Safari 5 or later
- Chrome 9 or later
1.3 Logging Into the Web Management Page
Use a browser to log in to the web management page to configure and manage the
CPE.
The following procedure describes how to use a computer running Windows XP and
Internet Explorer 7.0 to log in to the web management page of the CPE.
- Connect the CPE properly.
- Launch Internet Explorer, enter http://192.168.0.1 in the address bar, and press Enter. As shown in Figure 1-1.
- Enter the user name and password, and click Log In.
- You can log in to the web management page after the password is verified. As shown in Figures 1-2.
The default user name and password are both admins. If you want to view or
configure the CPE more, you should use the super account to log in to the web
management page.
The default super user name is super admin, and the password is admin.
To protect your CPE from unauthorized access, change the password after your
first login.
The CPE supports the diagnostic function. If you encounter problems, please
contact customer service for the specific using method.
To ensure your data safety, it is recommended that you turn on the firewall,
and conserve your login and FTP password carefully.
Overview
2.1 Viewing Current Connection
To view the current connection, perform the following steps:
Choose Overview;
In the Current Connection area, view the connection status, such as DL/UL Data
Rate and Online time. As shown in Figures 2-1.
2.2 Viewing LTE Status
To view the LTE network status, perform the following steps:
- Choose Overview;
- In the LTE Status area, view the information about Connect status, Mode, Cell ID, Signal quality, and so on. As shown in Figures 2-3.
2.3 Viewing WAN Status
To view the WAN status, perform the following steps:
- Choose Overview;
- In the WAN Status area, view the information about Connect Mode, IP, Subnet Mask, DNS Server, and so on. As shown in Figures 2-4.
Statistics
3.1 Viewing CPU Usage
To view the CPU usage, perform the following steps:
- Choose Statistics;
- In the CPU Usage area, view the CPU usage information, such as Current CPU usage, Max CPU usage, and Min CPU usage. As shown in Figure 3-1.
3.2 Viewing Memory Usage
To view the memory usage, perform the following steps:
- Choose Statistics;
- In the Memory Usage area, view the memory usage information, such as Total memory, Current memory usage, Max memory usage, and Min memory usage. As shown in Figures 3-2.
Figure 3-2
3.3 Viewing APN List
To view the APN list, perform the following steps:
- Choose Statistics;
- In the APN List, view the information about APNs information. As shown in Figure 3-3.
3.4 Viewing Throughput Statistics
To view the Throughput Statistics, perform the following steps:
- Choose Statistics;
- In the Throughput Statistics area, view the throughput statistics, such as APN throughput and LAN throughput.
- In this area, also you can choose and click the button Reset to empty the throughput statistics. As shown in Figures 3-4.
3.5 Viewing Device List
To view the device list, perform the following steps:
Choose Statistics;
In the Device List area, view the device information which connects to the
CPE, such as Device Name, Mac address, IP address, and Lease time. As shown in
Figures 3-5.
Figure 3-5
Update
4.1 Version Manager
This function enables you to upgrade the software version of the CPE to the
latest version. It is recommended that you upgrade the software because in the
new version, certain bugs have been fixed and the system stability is usually
improved.
Viewing Version Info
To view the version info, perform the following steps:
- Choose Update>Version Manager.
- In the Version Info area, you can view the product name and software version. As shown in Figure 4-1.
Version Upgrade
To perform an upgrade successfully, connect the CPE to your computer through a
network cable, save the upgrade file on the computer, and make sure the CPE is
not connected to anything other than a power adapter and the computer.
To perform an upgrade, perform the following steps:
- Choose Update>Version Manager.
- In the Version Upgrade area, click Browse. In the displayed dialog box, select the target software version file.
- Click Open. The dialog box is chosen. The save path and name of the target software version file are displayed in the Update file field.
- Click Submit.
- The software upgrade starts. After the upgrade, the CPE automatically restarts and runs the new software version. As shown in Figures 4-2.
During an upgrade, do not power off the CPE or disconnect it from the computer.
4.2 Auto upgrade
To perform an FTP auto-upgrade successfully, make sure the CPE is connected to
the Internet.
To perform a FTP auto-upgrade, perform the following steps:
Choose Update>Auto upgrade.
Enable auto-upgrade.
If you want to check new firmware after connecting to the Internet, you need
to enable the item of Check new firmware after connecting to the Internet.
Set an FTP address to the Upgrade folder box.
Set Version file.
Set User name and Password.
Set the Interval of checking new firmware.
Set Start time.
Set Random time.
Click Submit. As shown in Figures 4-3.
The CPE will automatically upgrade according to the setting. During an
upgrade, do not disconnect the power supply or operate the CPE.
Settings
5.1 Viewing the Device Information
To view the System Information, perform the following steps:
Choose Settings;
In the System Information area, view the system status, such as Running time.
As shown in Figure 5-1.
Viewing the Version Information
To view the Version Information, perform the following steps:
- Choose Settings;
- In the Device Information area, view the device information, such as Product Name, Product Model, Hardware Version, Software version, UBoot version, and CPE SN. As shown in Figures 5-2.
Viewing LAN Status
To view the LAN status, perform the following steps: Choose Settings;
In the LAN Status area, view the LAN status, such as Mac address, IP address, and Subnet mask. As shown in Figures 5-4.
5.2 Viewing Network
Network Mode
To set the network mode, perform the following steps:
Choose Network >WAN Settings;
In the Network Mode area, select a mode between NAT and ROUTER;
Click Submit. As shown in Figure 5-5.
LTE Settings
Settings
To set the LTE network, perform the following steps:
- Choose Network >LTE Settings;
- In the Settings area, you can set the configuration of the LTE network;
- In the Status area, you can view the LTE network connect status, such as Frequency, RSSI, RSRP, RSRQ, CINR, SINR, Cell ID, and so on. As shown in Figures 5-7.
Connect Method Setting
To set the connect method, perform the following steps:
- Choose Network > LTE Settings;
- In the Setting area, Select a connect method between Auto and Manual. As shown in Figures 5-8.
Auto Connect LTE Network
To set the CPE automatically connect to the internet, perform the following
steps:
- Choose Network > LTE Settings;
- In the Setting area, set the connect method as Auto, when the LTE network is ready, the CPE will be connected automatically. As shown in Figures 5-9.
Manual Connect Mobile Network
To set the mobile network manual to connect to the internet, perform the
following steps:
- Choose Network > LTE Settings;
- In the Setting area set the connect method as Manual, when the LTE network is ready, you can set the CPE to connect to the LTE network or disconnect from the LTE network. As shown in Figures 5-10.
Scan Mode
To set the LTE network scan mode, perform the following steps: choose
Network >Scan mode;
You can choose the full mode, a band the CPE supported
Click Submit.
Setting Frequency (Earfcn)
To set the frequency, perform the following steps:
- Choose Network >Scan Mode.
- In the Scan Mode area, choose Frequency Lock.
- In the Frequency Lock area, you can choose a band, then click Add list to choose Earfcn Number.
- Click Submit. As shown in Figures 5-11.
APN Management
To set and manage APN, perform the following steps:
Choose Network>APN Management.
In the APN Management area, you can set the APN.
Choose an APN number that you want to set.
In the APN Setting area, you can set the APN parameters, such as enable or
disable the app, name, username, password, and so on.
If you want to set an APN as the default gateway, you should check that is
enabled.
Click Submit. As shown in Figures 5-12.
PIN Management
To manage the PIN, you can perform the following operations on the PIN
Management page:
➢ Enable or disable the PIN verification.
➢ Verify the PIN.
➢ Change the PIN.
➢ Set automatic verification of the PIN. As shown in Figures 5-13
Viewing the Status of the USIM Card
To view the status of the USIM card, perform the following steps:
- Choose Network >PIN Management.
- View the status of the USIM card in the USIM card status field.
Enabling PIN Verification
To enable PIN verification, perform the following steps:
- Choose Network >PIN Management.
- Set PIN verification to Enable.
- Enter the PIN (4 to 8 digits) in the Enter PIN box.
- Click Submit.
Disabling PIN Verification
To disable PIN verification, perform the following steps:
- Choose Network >PIN Management.
- Set PIN verification to Disable.
- Enter the PIN (4 to 8 digits) in the Enter PIN box.
- Click Submit.
Verifying the PIN
If PIN verification is enabled but the PIN is not verified, verification is
required. To verify the
PIN, perform the following steps:
- Choose Network >PIN Management.
- Enter the PIN (4 to 8 digits) in the PIN box.
- Click Submit.
Changing the PIN
The PIN can be changed only when PIN verification is enabled and the PIN is
verified.
To change the PIN, perform the following steps:
- Choose Network>PIN Management.
- Set PIN verification to Enable.
- Set Change PIN to Enable.
- Enter the current PIN (4 to 8 digits) in the PIN box.
- Enter a new PIN (4 to 8 digits) in the New PIN box.
- Repeat the new PIN in the Confirm PIN box.
- Click Submit.
Setting Automatic Verification of the PIN
You can enable or disable automatic verification of the PIN. If automatic
verification is enabled, the CPE automatically verifies the PIN after
restarting. This function can be enabled only when PIN verification is enabled
and the PIN is verified.
To enable automatic verification of the PIN, perform the following steps:
- Choose Network > PIN Management.
- Set Pin verification to Enable.
- Set Remember my PIN to Enable.
- Click Submit.
Verifying the PUK
If PIN verification is enabled and the PIN fails to be verified for three
consecutive times, the PIN will be locked. In this case, you need to verify
the PUK and change the PIN to unlock it.
To verify the PUK, perform the following steps:
Choose Network> PIN Management.
Enter the PUK in the PUK box.
Enter a new PIN in the New PIN box.
Repeat the new PIN in the Confirm PIN box.
Click Submit.
SIM-Lock
If you want to connect to a specific network, and the CPE can’t connect to
another network, you can set a SIM lock.
To set the SIM lock, perform the following steps:
- Choose Network>SIM Lock.
- Enter the PLMN in the PLMN box.
- Click Submit. As shown in Figures 3-9.
LAN Setting
Setting LAN Host Parameter s
By default, the IP address is 192.168.0.1 with a subnet mask of 255.255.255.0.
You can change the host IP address to another individual IP address that is
easy to remember. Make sure that the IP address is unique on your network. If
you change the IP address of the CPE, you need to access the web management
page with the new IP address.
To change the IP address of the CPE, perform the following steps:
- Choose Network>LAN Settings.
- In the LAN Host Settings area, set the IP address and subnet mask.
- In the DHCP Setting area, set the DHCP server to Enable.
- Click Submit. As shown in Figures 5-14.
Configuration of the DHCP Server
DHCP enables individual clients to automatically obtain TCP/IP configuration
when the server powers on. You can configure the CPE as a DHCP server or
disable it. When configured as a DHCP server, the CPE automatically provides
the TCP/IP configuration for the LAN clients that support DHCP client
capabilities. If DHCP server services are disabled, you must have another DHCP
server on your LAN, or each client must be manually configured.
To configure DHCP settings, perform the following steps:
-
Choose Network Setting > LAN Settings.
-
Set the DHCP server to Enable.
-
Set Start IP address.
This IP address must be different from the IP address set on the LAN Host Settings area, but they must be on the same network segment. -
Set the End IP address.
This IP address must be different from the IP address set on the LAN Host Settings area, but they must be on the same network segment. -
Set Lease time.
The lease time can be set to 1 to 10,080 minutes. It is recommended to retain the default value. -
Click Submit. As shown in Figures 5-15.
DMZ Settings
If the demilitarized zone (DMZ) is enabled, the packets sent from the WAN are
directly sent to a specified IP address on the LAN before being discarded by
the firewall.
To set DMZ, perform the following steps:
-
Choose Network > DMZ Settings.
-
Set DMZ to Enable.
-
(Optional) Set ICMP Redirect to Enable.
-
Set Host address.
This IP address must be different from the IP address set on the LAN Host Settings page, but they must be on the same network segment. -
Click Submit. As shown in Figures 5-18.
Static Route
Add Static Route
To add a static route, perform the following steps:
Choose Network Setting>Static Route.
Click Add list.
Set the Dest IP address and Subnet mask.
Select an Interface from the drop-down list.
If you select LAN as the interface, you need to set a Gateway.
Click Submit. As shown in Figures 5-19.![BTI WIRELESS CP880 A LTE Outdoor CPE
- 31](https://manuals.plus/wp-content/uploads/2022/06/BTI-WIRELESS-CP880-A -LTE-Outdoor-CPE-31.png)
Modify Static Route
To modify an access restriction rule, perform the following steps:
- Choose Firewall>Static Route.
- Choose the item to be modified, and click Edit.
- Repeat steps 3 through 5 in the previous procedure.
- Click Submit. As shown in Figures 5-20.
Delete Static Route
To delete a static route, perform the following steps:
Choose Firewall >Static Route.
Choose the item to be deleted, and click Delete.
5.3 Firewall
Setting Firewall
This page describes how to set the firewall. If you enable or disable the
firewall, you can modify the configuration.
To set the firewall, perform the following steps:
Choose Firewall >Firewall Setting.
Choose Enable or Disable to modify the configuration.
Click Submit. As shown in Figures 5-30.
Figure 5-30
If you choose to enable the firewall, you can modify the configuration of the firewall, such as the Mac filter, IP filter, URL filter, and so on. If you choose to disable it, you can’t modify any configurations of the firewall.
MAC Filtering
This page enables you to configure the MAC address filtering rules.
Enabling MAC Filter
To enable the MAC address filter, perform the following steps:
- Choose Firewall>MAC Filtering
- Set MAC filtering to Enable.
- Click Submit. As shown in Figures 5-31.
Disabling MAC Filter
To disable the MAC address filter, perform the following steps:
- Choose Firewall>MAC Filtering
- Set MAC filtering to Disable.
- Click Submit. As shown in Figures 5-32.
Setting Allow access network within the rules
To set allow access network within the rules, perform the following steps:
-
Choose Firewall >MAC Filtering.
-
Set Allow access network within the rules.
-
Click Submit. As shown in Figures 5-33.
Setting Deny access network within the rules
To set deny access network within the rules, perform the following steps:
- Choose Firewall>MAC Filtering.
- Set Deny access network within the rules.
- Click Submit. As shown in Figures 5-34.
Adding MAC Filtering rule
To add a MAC filtering rule, perform the following steps:
Choose Firewall>MAC Filtering.
Click Add list.
Set MAC address.
Click Submit. As shown in Figures 5-35.![BTI WIRELESS CP880 A LTE Outdoor CPE
- 38](https://manuals.plus/wp-content/uploads/2022/06/BTI-WIRELESS-CP880-A -LTE-Outdoor-CPE-38.png)
Modifying the MAC Filtering rule
To modify a MAC address rule, perform the following steps:
- Choose Firewall>MAC Filtering.
- Choose the rule to be modified, and click Edit.
- Set MAC address.
- Click Submit. As shown in Figures 5-36.
Deleting the MAC Filtering rule
To delete a MAC address filter rule, perform the following steps:
Choose Firewall>MAC Filtering.
Choose the rule to be deleted, and click Delete. As shown in Figures
5-37.
IP Filtering
Data is filtered by IP address. This page enables you to configure the IP
address filtering rules.
Enabling IP Filtering
To enable IP Filtering, perform the following steps:
- Choose Firewall>IP Filtering.
- Set IP Filtering Enable.
- Click Submit. As shown in Figures 5-38.
Disabling IP Filtering
To disable IP Filtering, perform the following steps:
- Choose Firewall>IP Filtering.
- Set IP Filtering Disable.
- Click Submit. As shown in Figures 5-39.
Setting Allow access network outside the rules
To set allow access network, perform the following steps:
- Choose Firewall>IP Filtering.
- Set Allow access network outside the rules.
- Click Submit. As shown in Figures 5-40.
Setting Deny access network outside the rules
To set allow access network, perform the following steps:
- Choose Firewall>IP Filtering.
- Set Deny access network outside the rules.
- Click Submit. As shown in Figures 5-41.
Adding IP Filtering rule
Add an IP address filtering rule, and perform the following steps:
- Choose Firewall>IP Filtering.
- Click Add list.
- Set Service.
- Set Protocol.
- In the Source IP Address Range box, enter the source IP address or IP address segment to be filtered.
- In the Source port range box, enter the source port or port segment to be filtered.
- In the Destination IP Address Range box, enter the destination IP address or IP address segment to be filtered.
- In the Destination port Range box, enter the destination port or port segment to be filtered.
- In the Status box, choose a status the rule will be executed.
- Click Submit. As shown in Figures 5-42.
Modifying IP Filtering rule
To modify an IP filtering rule, perform the following steps:
- Choose Firewall > IP Filtering.
- Choose the rule to be modified, and click Edit.
- Repeat steps 3 through 9 in the previous procedure.
- Click Submit. As shown in Figure 5-43.
Deleting IP Filtering rule
To delete an IP address filtering rule, perform the following steps:
-
Choose Firewall > IP Filtering.
-
Choose the rule to be deleted, and click Delete. As shown in Figures 5-44. URL Filtering
Data is filtered by a uniform resource locator (URL). This page enables you to configure the URL filtering rules.
Enabling URL Filtering
To enable URL Filtering, perform the following steps: -
Choose Firewall>URL Filtering.
-
Set URL Filtering to Enable.
-
Click Submit. As shown in Figures 5-45.
Disabling URL Filtering
To disable URL Filtering, perform the following steps:
- Choose Firewall>URL Filtering.
- Set URL Filtering to Disable.
- Click Submit. As shown in Figures 5-46.
Adding URL Filtering list
To add a URL filtering list, perform the following steps:
Choose Firewall >URL Filtering.
Click Add list.
Set URL.
Click Submit. As shown in Figure 5-47.
Modify URL Filtering list
To modify a URL filtering rule, perform the following steps:
- Choose Firewall>URL Filtering.
- Choose the rule to be modified, and click Edit.
- Set URL address.
- Click Submit. As shown in Figures 5-48.
Deleting URL Filtering list
To delete a URL list, perform the following steps:
- Choose Firewall>URL Filtering.
- Choose the item to be deleted, and click Delete. As shown in Figure 5-49.
Port Forwarding
When network address translation (NAT) is enabled on the CPE, only the IP
address on the WAN side is open to the Internet. If a computer on the LAN is
enabled to provide services for the Internet (for example, work as an FTP
server), port forwarding is required so that all accesses to the external
server port from the Internet are redirected to the server on the LAN.
Adding Port Forwarding rule
To add a port forwarding rule, perform the following steps:
Choose Firewall > Port Forwarding.
Click Add list.
Set Service.
Set Protocol.
Set Remote port range.
The port number ranges from 1 to 65535.
Set Local host.
This IP address must be different from the IP address that is set on the LAN
Host Settings page, but they must be on the same network segment.
Set Local port.
The port number ranges from 1 to 65535.
Click Submit. As shown in Figure 5-50.
Modifying the Port Forwarding rule
To modify a port forwarding rule, perform the following steps:
- Choose Firewall > Port Forwarding.
- Choose the item to be modified, and click Edit.
- Repeat steps 3 through7 in the previous procedure.
- Click Submit. As shown in Figure 5-51.
Deleting Port Forwarding rule
To delete a port forwarding rule, perform the following steps:
Choose Firewall > Port Forwarding.
Choose the item to be deleted, and click Delete. As shown in Figures 5-52.
Access Restriction
Add Access Restriction
To add an access restriction rule, perform the following steps:
- Choose Security>Access Restriction.
- Click Add list.
- Set Access Restriction to Enable.
- Set Access Restriction Name.
- Set Device MAC address or IP address.
- Set Weekdays and times.
- Click Submit.
Modify Access Restriction
To modify an access restriction rule, perform the following steps:
- Choose Security>Access Restriction.
- Choose the item to be modified, and click Edit.
- Repeat steps 4 through 6 in the previous procedure.
- Click Submit.
Delete Access Restriction
To delete an access restriction rule, perform the following steps:
- Choose Security >Access Restriction.
- Choose the item to be deleted, and click Delete.
UPnP
On this page, you can enable or disable the Universal Plug and Play (UPnP)
function.
To enable UPnP, perform the following steps:
- Choose Firewall > UPnP.
- Set UPnP to Enable.
- Click Submit. As shown in Figures 5-54.
DoS
On this page, you can enable or disable the Denial of service (DoS) function.
- Choose Firewall > DoS.
- Set UPnP to Enable.
- Click Submit. As shown in Figures 5-55.
5.6 VPN
This function enables you to connect to the virtual private network (VPN).
To connect the VPN, perform the following steps: Choose VPN.
In the VPN Settings area, enable VPN.
Select a protocol from Protocol drop-down list.
Enter Username and Password.
Click Submit.
You can view the status in the VPN Status area. As shown in Figures 5-55.
5.7 IPv6
Internet Protocol version 6 (IPv6) is the most recent version of the Internet
Protocol (IP). Every device on the Internet is assigned a unique IP address
for identification and location definition.
Status
The status page shows IPv6 information. As shown in Figures 5-56.
IPv6 WAN Settings
On this page, users can enable or disable the IPv6 function. Meanwhile, the
user can set the WAN Connection Type and the type of DNS.As shown in Figure
5-27
IPv6 LAN Settings
On this page, the user can choose the AutoConfiguration Type. As shown in
Figures 5-58.
5.8 System
5.8.1 Maintenance
Reboot
This function enables you to restart the CPE. Settings take effect only after
the CPE restarts. To restart the CPE, and perform the following steps:
- Choose System>Maintenance.
- Click Reboot. As shown in Figures 5-59.
The CPE then restarts.
Reset
This function enables you to restore the CPE to its default settings.
To restore the CPE, perform the following steps:
- Choose System>Maintenance.
- Click Factory Reset. As shown in Figures 5-60.
The CPE is then restored to its default settings.
Backup Configuration File
You can download the existing configuration file to back it up. To do so:
- Choose System>Maintenance.
- Click Download on the Maintenance page.
- In the displayed dialog box, select the save path and name of the configuration file to be backed up.
- Click Save. As shown in Figure 5-61.
The procedure for file downloading may vary with the browser you are using.
Upload Configuration File
You can upload a backed-up configuration file to restore the CPE. To do so:
- Choose System >Maintenance.
- Click Browse on the Maintenance page.
- In the displayed dialog box, select the backed-up configuration file.
- Click Open.
- The dialog box is chosen. In the box to be right of the configuration file, the save path and name of the backed-up configuration file are displayed.
- Click Upload. As shown in Figures 5-62.
The CPE uploads the backed-up configuration file. The CPE then automatically restarts.
5.8.2 TR069
TR-069 is a standard for communication between CPEs and the auto-configuration
server (ACS). If your service provider uses the TR069 automatic service
provision function, the ACS automatically provides the CPE parameters. If you
set the ACS parameters on both the CPE and ACS, the network parameters on the
CPE are automatically set using the TR-069 function, and you do not need to
set other parameters on the CPE.
To configure the CPE to implement the TR-069 function, perform the following
steps:
-
Choose System>TR069.
-
Set acs URL source. There are two methods, such as URL and DHCP.
-
In the ACS URL box, enter the ACS URL address.
-
Enter the ACS user name and password for the CPE authentication.
To use the CPE to access the ACS, you must provide a user name and password for authentication. The user name and the password must be the same as those defined on the ACS. -
If you set Periodic to inform to Enable, set Periodic inform interval.
-
Set connection request user name and password.
-
Click Submit. As shown in Figures 7-5.
5.8.3 Date & Time
You can set the system time manually or synchronize it with the network. If
you select Sync from the network, the CPE regularly synchronizes the time with
the specified Network Time Protocol (NTP) server. If you enable daylight
saving time (DST), the CPE also adjusts the system time for DST.
To set the date and time, perform the following steps:
- Choose System > Date & Time.
- Select Set manually.
- Set Local time or click Sync to automatically fill in the current local system time.
- Click Submit. As shown in Figures 5-64.
Figure 5-64
To synchronize the time with the network, perform the following steps:
- Choose System > Date & Time.
- Select Sync from the network.
- From the Primary NTP server drop-down list, select a server as the primary server for time synchronization.
- From the Secondary NTP server drop-down list, select a server like the IP address of the secondary server for time synchronization.
- If you don’t want to use another NTP server, you need to enable the Optional NTP server and set a server IP address.
- Set Time zone.
- Click Submit. As shown in Figures 5-65.
To set DST, perform the following steps:
- Choose System>Date&Time.
- Set DST enable.
- Set Start Time and End Time.
- Click Submit. As shown in Figures 5-66.
The CPE will automatically provide the DST time based on the time zone.
5.8.4 DDNS
The dynamic Domain Name Server (DDNS) service is used to map the user’s
dynamic IP address to a fixed DNS service.
To configure DDNS settings, perform the following steps:
- Choose System > DDNS.
- Set DDNS to Enable.
- In-Service provider, choose DynDNS.org or oray.com.
- Enter Domain name and Hostname. For example, if the domain name provided by your service provider is test.customtest.dyndns.org, enter customtest.dyndns.org as the Domain name, and test as the Hostname.
- Enter your User name and Password.
- Click Submit. As shown in Figures 5-67.
5.8.5 Diagnosis
If the CPE is not functioning correctly, you can use the diagnosis tools on
the Diagnosis page to preliminarily identify the problem so that actions can
be taken to solve it.
Ping
If the CPE fails to access the Internet, run the ping command to preliminarily
identify the problem. To do so:
Choose System >Diagnosis.
In the Method area, select Ping.
Enter the domain name in the Target IP or domain field, for example,
www.google.com.
Set Packet size and Timeout.
Set Count.
Click Ping. As shown in Figures 5-68.
Wait until the ping command is executed. The execution results are displayed
in the Results box.
Traceroute
If the CPE fails to access the Internet, run the Traceroute command to
preliminarily identify the problem. To do so:
- Choose System >Diagnosis.
- In the Method area, select Traceroute.
- Enter the domain name in the Target IP or domain field. For example, www.google.com.
- Set Maximum hops ad Timeout.
- Click Traceroute. As shown in Figure 5-69
Wait until the traceroute command is executed. The execution results are displayed in the Results box.
5.8.6 Port Mirror
Port mirroring is used on a network switch to send a copy of network packets
seen on one switch port. To do so:
- Choose System >Port Mirror.
- Enable Port Mirror.
- Select the WAN Interface which you want a copy.
- Type the Monitor IP, which the copy will send to.
- Click Submit. As shown in Figures 5-70.
5.8.7 Syslog
The Syslog record user operations and key running events.
Local
To set the Syslog to local, perform the following steps:
- Choose System>Syslog.
- In the Setting area, set the method to Local.
- In the Level drop-down list, select a log level.
- Click Submit. As shown in Figure 5-71.
Viewing local Syslog
To view the local Syslog, perform the following steps:
In the Keyword box, set a keyword.
Click Pull, and the result box will display.
Network
To set the Syslog to network, perform the following steps:
- Choose System>Syslog.
- In the Setting area, set the method to Network.
- In the Level drop-down list, select a log level.
- In the Forward IP address box, set an IP address.
- Click Submit. As shown in Figures 5-72.
The Syslog will transmit to some clients to display through the network.
5.8.8 WEB Setting
To configure the parameters of WEB, perform the following steps:
- Choose System> WEB Setting.
- Set HTTP enable. If you set HTTP to disable, you will log in to the web management page with the HTTP protocol from the WAN side.
- Set HTTP port. If you want to change the login port, you can set a new port in the box, the default HTTP port is 80.
- Set HTTPS enable. If you want to log in to the web management page with the HTTPS protocol from the WAN side, you need to enable the HTTPS.
- If you want to log in to the web management page from the WAN, you need to Enable Allowing login from WAN.
- Set the HTTPS port.
- Click Submit. As shown in Figures 5-73.
5.8.9 Account
This function enables you to change the login password of the user. After the
password changes, enter the new password the next time you log in.
To change the password, perform the following steps:
- Choose System >Account.
- Select the user name, if you want to change the password of a normal user, you need to set Enable User to enable.
- Enter the current password, set a new password, and confirm the new password.
- New password and Confirm password must contain 5 to 15 characters.
- Click Submit. As shown in Figures 5-74.
5.8.10 Logout
To logout the web management page, perform the following steps:
Choose System and click Logout
It will back to the login page.
FAQs
The POWER indicator does not turn on.
- Make sure that the power cable is connected properly and the CPE is powered on.
- Make sure that the power adapter is compatible with the CPE.
Fails to Log in to the web management page.
- Make sure that the CPE is started.
- Verify that the CPE is correctly connected to the computer through a network cable. If the problem persists, contact authorized local service suppliers.
The CPE fails to search for the wireless network.
- Check that the power adapter is connected properly.
- Check that the CPE is placed in an open area that is far away from obstructions, such as concrete or wooden walls.
- Check that the CPE is placed far away from household electrical appliances that generate a strong electromagnetic field, such as microwave ovens, refrigerators, and satellite dishes.
If the problem persists, contact authorized local service suppliers.
The power adapter of the CPE is overheated.
The CPE will be overheated after being used for a long time. Therefore, power
off the CPE when you are not using it.
Check that the CPE is properly ventilated and shielded from direct sunlight.
The parameters are restored to default values.
If the CPE powers off unexpectedly while being configured, the parameters may
be restored to the default settings.
After configuring the parameters, download the configuration file to quickly
restore the CPE to the desired settings.
FCC Statement
This device complies with Part 15 of the FCC Rules. Operation is subject to
the following two conditions: 1) This device may not cause harmful
interference, and 2) This device must accept arty interference received,
including interference that may cause undesired operation.
Note: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not instated and used in accordance with the instructions, may cause harmful interference to radio communication. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
- Consult the dealer or an experienced radio/TV technician for help.
Caution: Changes or modifications not expressly approved by BTI could void the user s authority to operate the equipment.
FCC Radiation Exposure Statement
This equipment complies with FCC radiation exposure limits set forth for an
uncontrolled environment. This equipment should be installed and operated with
a minimum distance of 20cm between the radiator and your body. This
transmitter must not be co-located or operating in conjunction with any other
antenna or transmitter.
References
- AS Domain Registry
- My Dyn Account
- Computer network - Wikipedia
- Network switch - Wikipedia
- Network packet - Wikipedia
- Port (computer networking) - Wikipedia
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>