Page 2
Council Directive 89/336/EEC on the approximation of the laws of the Member States relating to electromagnetic compatibility. CE Marking Warning Hereby, Digital Data Communications, declares that this product is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC. The CE-Declaration of Conformity can be downloaded at: http://www.levelone.eu/support.php...
If you would like a copy of the GPL or other open source code in this software on a physical CD medium, LevelOne (Digital Data Communications) offers to mail this CD to you upon request, for a price of US$9.99 plus the cost of shipping.
Chapter 1 Introduction Congratulations on your purchase of this outstanding product: WBR-6803 WiFi Mobile Router. This product is specifically designed for mobile user who needs to have the internet access beyond his home and office. It provides a complete solution for Internet surfing and broadband sharing.
Page 6
B. LED indicators Power LED indicator: Power Source ON/OFF Switch LED Status Description Green in flash Device ON, and Battery is in use. Battery Only Device ON, and Battery is low. Device OFF Device ON, and Battery is fully Green charged.
Page 7
Step 3. Plug in power: Connect with the power adapter to the receptor on the back panel of it. Step 4. Start to Charge the Battery: Then plug the other end of the power adapter into a wall outlet. If it is the first time to put the battery in, the power LED will show amber which means the battery is been charging.
Page 8
Step 7. Connect with Ethernet Cable Insert the Ethernet cable into RJ45 Ethernet Port on the back panel. And then plug the other end of RJ45 into the computer or Laptop computer. The Ethernet LED will show green color if the Ethernet connection is normally connected.
Chapter 2 Getting Started with Easy Setup Utility There are two approaches for you to set up the WiFi Mobile Router quickly and easily. One is through executing the provided Windows Easy Setup Utility on your PC, and the other is through browsing the device web pages and configuration.
Page 10
Step 4: Click “Next” to continue. Step 5: Select SSID, Chanel, Security, and then click “Next” to continue.
Page 11
Step 6: Enter SSID, Channel and Security options, and then click “Next” to continue. Step 7: Select 3G Service by clicking 3G icon to continue.
Page 12
Step 8-1: Select “Auto-Detection”, and the Utility will try to detect and configure the required 3G service settings automatically. Click “Next” to continue. Step 8-2: Or you can select “Manual” and manually fill in the required 3G service settings provided by your ISP. Click “Next”...
Step 9: The WiFi Mobile Router is rebooted to make your entire configuration take effect. Step 10: Setup is completed. 2.2 Easy Setup by Configuring Web Pages You can also browse web UI to configure the device. Browse to Activate the Setup Wizard Type in the IP Address (http://192.168.1.1)
Page 14
Type in the default password “admin” in the System Password and then click ‘login’ button. Select your language. Select “Wizard” for basic settings with simple way. Press “Next” to start the Setup Wizard.
Page 15
Configure with the Setup Wizard Step 1 Change System Password. Set up your system password. (Default:admin) Step 2: Select Time Zone Step 3: Select Wan Type. If you want to use 3G service as the main internet access, please set the WAN interface as “Wireless WAN”...
Page 16
Step 4: Set up 3G profile. Select “Auto Detection”. Step 5: Set up your Wireless Network. Set up your SSID. Step 6: Set up Wireless Security. Set up your Authentication and Encryption.
Page 17
Step 7: Apply your Setting. Then click Apply Setting. Step 8: Click Finish to complete it.
Chapter 3 Making Configuration Whenever you want to configure your network or this device, you can access the Configuration Menu by opening the web-browser and typing in the IP Address of the device. The default IP Address is: 192.168.1.1 Enter the default password “admin” in the System Password and then click ‘login’ button. Then, you can browse the “Advanced”...
3.1.1. Network Setup Ethernet port Configuration: Off: Disable the Ethernet port. LAN: The Ethernet port is as LAN port. WAN: The Ethernet port is as LAN port. Auto: It will be WAN Port if a DHCP server can be detected on the Ethernet port. Otherwise, it will be LAN port.
Page 21
For 3G WAN Networking. The WAN fields may not be necessary for your connection. The information on this page will only be used when your service provider requires you to enter a User Name and Password to connect with the 3G network. Please refer to your documentation or service provider for additional information.
Page 22
B. Static IP Address: 1. Activate WWAN for Auto-Failover: With this function enabled, when the Ethernet WAN connection is broken, the device will automatically activate the WWAN connection and keep you connected to internet with the alternative WWAN broadband service. Meanwhile, if the device detected that the Ethernet WAN connection is recovered, your broadband connection will be switched to use the Ethernet WAN service.
Page 23
C. Dynamic IP Address: 1. Activate WWAN for Auto-Failover: With this function enabled, when the Ethernet WAN connection is broken, the device will automatically activate the WWAN connection and keep you connected to internet with the alternative WWAN broadband service. Meanwhile, if the device detected that the Ethernet WAN connection is recovered, your broadband connection will be switched to use the Ethernet WAN service 2.
Page 24
D. PPP over Ethernet 1. Activate WWAN for Auto-Failover: With this function enabled, when the Ethernet WAN connection is broken, the device will automatically activate the WWAN connection and keep you connected to internet with the alternative WWAN broadband service. Meanwhile, if the device detected that the Ethernet WAN connection is recovered, your broadband connection will be switched to use the Ethernet WAN service 2.
Page 25
leave it blank. 6. Maximum Transmission Unit (MTU): Most ISP offers MTU value to users. The default MTU value is 0 (auto). E. PPTP 1. Activate WWAN for Auto-Failover: With this function enabled, when the Ethernet WAN connection is broken, the device will automatically activate the WWAN connection and keep you connected to internet with the alternative WWAN broadband service.
Page 26
6. Connection ID: Optional. Input the connection ID if your ISP requires it. 7. Maximum Idle Time: the time of no activity to disconnect your PPTP session. Set it to zero or enable “Auto-reconnect” to disable this feature. If Auto-reconnect is enabled, this device will connect with ISP automatically after system is restarted or connection is dropped.
if the device detected that the Ethernet WAN connection is recovered, your broadband connection will be switched to use the Ethernet WAN service 2. IP Mode: Please check the IP mode your ISP assigned, and select “Static IP Address” or “Dynamic IP Address”.
Page 28
2. IP Pool Starting/Ending Address: Whenever there is a request, the DHCP server will automatically allocate an unused IP address from the IP address pool to the requesting computer. You must specify the starting / ending address of the IP address pool. 3.
3.1.3. Wireless Settings Wireless settings allow you to set the wireless configuration items. 1. Wireless Module: You can enable or disable wireless function. 2. Network ID (SSID): Network ID is used for identifying the Wireless LAN (WLAN). Client stations can roam freely over this device and other Access Points that have the same Network ID.
Page 31
Open Open system authentication simply consists of two communications. The first is an authentication request by the client that contains the station ID (typically the MAC address). This is followed by an authentication response from the AP/router containing a success or failure message. An example of when a failure may occur is if the client's MAC address is explicitly excluded in the AP/router configuration.
Page 32
WPA-PSK/WPA-PSK2 Another encryption options for WPA-PSK-TKIP and WPA-PSK2-AES, the others are same the WPA-PSK. WPA/WPA2 Another encryption options for WPA-TKIP and WPA2-AES, the others are same the WPA. By pressing “WPS Setup”, you can configure and enable the easy setup feature WPS (Wi-Fi Protection Setup) for your wireless network.
3.1.4. Change Password You can change the System Password here. We strongly recommend you to change the system password for security reason. Click on “Save” to store your settings or click “Undo” to give up the changes.
3.2 Forwarding Rules 3.2.1 Virtual Server This product’s NAT firewall filters out unrecognized packets to protect your Intranet, so all hosts behind this product are invisible to the outside world. If you wish, you can make some of them accessible by enabling the Virtual Server Mapping. A virtual server is defined as a Service Port, and all requests to this port will be redirected to the computer specified by the Server IP.
Page 35
For example, if you have an FTP server (port 21) at 192.168.1.2, a Web server (port 80) at 192.168.1.4, and a VPN server at 192.168.1.6, then you need to specify the following virtual server mapping table:...
Service Port Server IP Enable 192.168.1.2 192.168.1.4 1723 192.168.1.6 Click on “Save” to store your settings or click “Undo” to give up the changes. 3.2.2 Special AP Some applications require multiple connections, like Internet games, Video conferencing, Internet telephony, etc. Because of the firewall function, these applications cannot work with a pure NAT router.
Click on “Save” to store your settings or click “Undo” to give up the changes. 3.2.3 Miscellaneous 1. IP Address of DMZ Host DMZ (Demilitarized Zone) Host is a host without the protection of firewall. It allows a computer to be exposed to unrestricted 2-way communication for Internet games, Video conferencing, Internet telephony and other special applications.
3.3 Security Setting 3.3.1 Packet Filters Packet Filter includes both outbound filter and inbound filter. And they have same way to setting. Packet Filter enables you to control what packets are allowed to pass the router. Outbound filter applies on all outbound packets. However, inbound filter applies on packets that destined to Virtual Servers or DMZ host only.
You can specify 8 rules for each direction: inbound or outbound. For each rule, you can define the following: • Source IP address • Source port • Destination IP address • Destination port • Protocol: TCP or UDP or both. •...
3.3.2 Domain Filters Domain Filter prevents users under this device from accessing specific URLs. 1. Domain Filter: Check if you want to enable Domain Filter. 2. Log DNS Query: Check if you want to log the action when someone accesses the specific URLs.
Page 41
3.3.3 URL Blocking URL Blocking will block LAN computers to connect with pre-define Websites. The major difference between “Domain filter” and “URL Blocking” is Domain filter require user to input suffix (like .com or .org, etc), while URL Blocking require user to input a keyword only. In other words, Domain filter can block specific website, while URL Blocking can block hundreds of websites by simply a keyword.
3.3.4 MAC Control MAC Address Control allows you to assign different access right for different users and to assign a specific IP address to a certain MAC address. 1. MAC Address Control: Check “Enable” to enable the “MAC Address Control”. All of the settings in this page will take effect only when “Enable”...
Page 43
3.3.5 Miscellaneous 1. Administrator Time-out: The time of no activity to logout automatically, you may set it to zero to disable this feature. 2. Remote Administrator Host/Port In general, only Intranet user can browse the built-in web pages to perform administration task.
3.4.1 System Log This page support two methods to export system logs to specific destination by means of syslog (UDP) and SMTP(TCP). The items you have to setup including: 1. IP Address for Sys log: Host IP of destination where sys log will be sent to. Check Enable to enable this function.
Page 46
DNS servers that we list in Provider field. To enable Dynamic DNS click the check box next to Enable in the DDNS field. Next you have to enter the appropriate information about your Dynamic DNS Serve .Provider, Host Name, Username/E-mail, and Password/Key. You can get this information when you register an account on a Dynamic DNS server.
Page 47
Provide different priority to different users or data flows, or guarantee a certain level of performance. 1. QOS Control: Check Enable to enable this function. 2. Bandwidth of Upstream: Set the limitation of upstream bandwidth 3. Local IP : Ports: Define the Local IP address and ports of packets 4.
Page 48
3.4.4 SNMP In brief, SNMP, the Simple Network Management Protocol, is a protocol designed to give a user the capability to remotely manage a computer network by polling and setting terminal values and monitoring network events. 1. Enable SNMP: You must check “Local”, “Remote” or both to enable SNMP function. If “Local”...
Page 49
3.4.5 Routing If you have more than one routers and subnets, you will need to enable routing table to allow packets to find proper routing path and allow different subnets to communicate with each other. The routing table allows you to determine which physical interface address to use for outgoing IP data grams.
3.4.6 System Time 1. Time Zone: Select a time zone where this device locates. 2. Auto-Synchronization: Check the “Enable” checkbox to enable this function. Besides, you can select a NTP time server to consult UTC time. 3. Sync with Time Server: Click on the button if you want to set Date and Time by NTP Protocol manually.
Page 51
3.4.7 Scheduling You can set the schedule time to decide which service will be turned on or off. 1. Schedule: Check to enable the schedule rule settings. 2. Add New Rule: To create a schedule rule, click the “Add New Rule” button. You can edit the Name of Rule, Policy, and set the schedule time (Week day, Start Time, and End Time).
Page 52
Click on “Save” to store your settings or click “Undo” to give up the changes.
Page 54
3.5.1 System Info You can view the System Information and System log, and download/clear the System log, in this page. 3.5.2 Firmware Upgrade You can upgrade firmware by clicking “Upgrade” button.
3.5.3 Backup Setting You can backup your settings by clicking the “Backup Setting” function item and save it as a bin file. Once you want to restore these settings, please click Firmware Upgrade button and use the bin file you saved. 3.5.4 Reset to Default You can also reset this device to factory default settings by clicking the Reset to default function item.
Page 56
3.5.5 Reboot You can also reboot this device by clicking the Reboot function item. 3.5.6 Miscellaneous 1. Domain Name or IP address for Ping Test: Allow you to configure an IP, and ping the device. You can ping a specific IP to test whether it is alive. Click on “Save”...
Chapter 4 . Troubleshooting This Chapter provides solutions to problems for the installation and operation of the WiFi Mobile Router. You can refer to the following if you are having problems. 1 Why can’t I configure the router even the cable is plugged and the LED is lit? Do a Ping test to make sure that the WiFi Mobile Note:...
Page 58
Look under Device Status to see if the device is working properly. Click “OK”. 2 What can I do if my Ethernet connection does not work properly? Make sure the RJ45 cable connect with the router. Ensure that the setting on your Network Interface Card adapter is “Enabled”. If settings are correct, ensure that you are not using a crossover Ethernet cable, not all Network Interface Cards are MDI/MDIX compatible, and use a patch cable is recommended.
Page 59
Please check 3G signal strength from your ISP in your environment is above middle level. 4 Something wrong with the wireless connection? Can’t setup a wireless connection? Ensure that the SSID and the encryption settings are exactly the same to the Clients.
Page 60
1. Go back to advanced setting to set up your Encryption key again. 2. Reset the WiFi Mobile Router to default setting 6 How to reset to default? 1. Ensure the WiFi Mobile Router is powered on 2. Find the Reset button on the right side 3.
Appendix B. Licensing information This product includes copyrighted third-party software licensed under the terms of the GNU General Public License. Please refer to the GNU General Public License below to check the detailed terms of this license. The following parts of this product are subject to the GNU GPL, and those software packages are copyright by their respective authors.
GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it.
Page 64
GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program"...
Page 65
a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange;...
Page 66
integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.