Billion M500 User Manual

Billion M500 User Manual

4g/lte industrial/in-vehicle multi-carrier router

Advertisement

Billion M500
4G/LTE Industrial/In-Vehicle Multi-Carrier Router
User Manual
Version release: 1.05.1.1
Last revised date: November 16, 2016

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the M500 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Billion M500

  • Page 1 Billion M500 4G/LTE Industrial/In-Vehicle Multi-Carrier Router User Manual Version release: 1.05.1.1 Last revised date: November 16, 2016...
  • Page 2: Table Of Contents

    Table of Contents Chapter 1: Introduction ..........................1 Introduction to your Router ........................1 Features & Specifications ........................3 Hardware Specifications ......................... 6 Application Diagram ..........................7 Chapter 2: Product Overview ........................8 Important Note for Using This Router...................... 8 Device Description ..........................
  • Page 3 Dual WAN ..............................70 General Setting ............................70 Outbound Load Balance .......................... 74 Protocol Binding ............................75 Hotspot ................................ 76 General Setting ............................77 Bult-in User Account ..........................79 Authorized of Client ..........................80 Walled Garden ............................81 Advertisement ............................82 Session Log ...............................
  • Page 4 Problem with LAN Interface ........................174 Recovery Procedures ..........................174 Appendix: Product Support & Contact ..................... 176...
  • Page 5: Chapter 1: Introduction

    Introduction to your Router Embedded Dual 4G/LTE Industrial Router M500, embedded Dual 4G/LTE Industrial LTE Router, is integrated with the 802.11n Wireless Access Point and Dual WAN interfaces featuring reliable connectivity and network expandability. This cutting-edge networking device provides multi-GNSS engine for GPS or GLONASS system for remotely tracking and monitoring vehicles.
  • Page 6 Extraordinary Connectivity with Solid Data Protection The Industrial LTE Router features a rugged, compact design with integrated dual 4G/LTE WAN ports, 4-port Gigabit Ethernet switch, 802.11n Wi-Fi Access Point with multiple SSID supports, and two USB 2.0 host interfaces for Storage/NAS. SPI firewall, and advanced VPN integration provide security needed to enhance the operations of Public Safety, Energy Wellhead and Gas Industry, Industrial M2M Segment, PoS/Kiosks/ATM, Fleet Management, and Smart Transportation/Bus.
  • Page 7: Features & Specifications

    Features & Specifications • Dual 4G/LTE broadband connectivity (3G Fallback optional) • Multi-WAN interfaces (Dual SIM/Dual Radio, EWAN, and Wireless Client) for network expandability and reliable connectivity • High performance antenna for increased coverage, signal reception and efficiency • Embedded GNSS option for real-time asset tracking and location data-based applications •...
  • Page 8 • Load Balancing Supported Frequency Bands • Primary WAN LTE: FDD and TDD (Bands depend on module configuration) • Secondary WAN LTE: Optional FDD and TDD (Bands depend on module configuration) Global Navigation Satellite System (GNSS) • Embedded multi-GNSS engine for GPS or GLONASS system Network Protocols and Features •...
  • Page 9 Wireless LAN • Compliant with IEEE 802.11 b/g/n standards • 2.4 GHz - 2.484GHz radio band for wireless • Up to 300 Mbps wireless operation rate • 64/128 bits WEP supported for encryption • WPS (Wi-Fi Protected Setup) for easy setup •...
  • Page 10: Hardware Specifications

    Hardware Specifications Physical interface • 4G/LTE module: 2 Embeded 4G/LTE modules • Ethernet: 4-port 10 / 100 / 1000Mbps auto-crossover (MDI / MDI-X) Switch • EWAN: Ethernet port #4 can be configured as an EWAN port for connecting to Cable/Fiber/xDSL modem for Broadband connectivity. •...
  • Page 11: Application Diagram

    Application Diagram The Industrial LTE Router is specifically designed to provide outstanding network efficiency and internet security for a wide range of applications and vertical M2M market segments.
  • Page 12: Chapter 2: Product Overview

    Chapter 2: Product Overview Important Note for Using This Router  Do not use the router in high humidity or high temperature.  Do not open or repair the case yourself. If the device becomes too hot, turn off the power immediately and have it repaired at a qualified service center.
  • Page 13: Device Description

    Device Description Index Item Description WiFi antenna Screw the supplied WiFi antennas onto the antenna connectors The single-colour LED behaves as follows: WiFi/WPS LED Green Wireless connection established Green blinking Data being transmitted / received By controlling the pressing time, users can achieve two different effects: WiFi On/Off (1) WiFi On/Off: Press &...
  • Page 14 Index Item Description Screw the supplied 4G/LTE antennas onto the antenna connectors for 4G/LTE module 4G/LTE 1 antenna Screw the supplied 4G/LTE antennas onto the antenna connectors for 4G/LTE module 4G/LTE 2 antenna GPS antenna Screw the supplied GPS antenna onto the antenna connectors. Power connector Connect the supplied Power cable to this connector.
  • Page 15 Index Item Description The Power dual-colour LED behaves as shown below. Power LED Green System is up and ready Boot failure The Internet dual-colar LED behaves as shown below. Internet LED Green IP connected and traffic is passing through the device. IP request failed or WAN connection not present.
  • Page 16: The Detail Instruction In Reset Button

    The detail instruction in Reset Button Recovery procedures for non-working devices (e.g. after a failed firmware upgrade flash): Please follow the steps, the router’s emergency-reflash web interface will then be accessible via http://192.168.1.1 where you can upload a firmware image to restore the router to a functional state. Please note that the router will only respond with its web interface at this address (192.168.1.1), and will not respond to ping request from your PC or other telnet operations.
  • Page 17: Chapter 3: Basic Installation

    Chapter 3: Basic Installation The router can be configured with your web browser. A web browser is included as a standard application in the following operating systems: Windows, Linux, Mac OS, etc. The product provides an easy and user-friendly interface for configuration. PCs must have an Ethernet interface installed properly and be connected to the router either directly or through an external repeater hub, and have TCP/IP installed and configured to obtain an IP address through a DHCP server or a fixed IP address that must be in the same subnet as the router.
  • Page 18: Installation Reference

    Installation Reference Insert the SIM card Please ensure that the Billion M500 is not connected to the power cable before proceeding. Turn to the panel with SIM card slot. Insert the SIM card with the gold contact facing up. Push the SIM card inwards to inject it. Use the SIM 1 first, use the SIM 2 for a secondary/back-up SIM.
  • Page 19 Case 2: Connect to a power source The power connector includes one input pin to meet “Ignition Sensing”. The pin is ESD protected to do “automatic ON and time-delay Off” if ACC input signal is connected to a vehicle’s ACC signal line. Ignition Sensing: In this mode the router will turn off after the input has been held at low for the timeout period.
  • Page 20 The wire colors shown are for the power/GPIO cable that comes with the Industrial LTE Router. (optional)
  • Page 21: Cabling

    Cabling One of the most common causes of problems is bad cabling. Make sure that all connected devices are turned on. On the front panel of the product is a bank of LEDs. Verify that the LAN Link and LEDs are lit.
  • Page 22: Default Settings

    Default Settings Before configuring the router, you need to know the following default settings. Web Interface: (Username and Password) Username: admin Password: admin The default username and password are “admin” and “admin” respectively. If you ever forget the username/password to login to the router, you may press the RESET button up to 6 seconds then release it to restore the factory default settings.
  • Page 23: Information From Your Isp

    Information from Your ISP Before configuring this device, you have to check with your ISP (Internet Service Provider) what kind of service is provided such as 4G/LTE, EWAN (Dynamic IP address, Static IP address, PPPoE Mode) or Wireless Client (Dynamic IP address, Static IP address).
  • Page 24: Chapter 4: Device Configuration

    Chapter 4: Device Configuration Login to your Device Open your web browser, enter the IP address of your router, which by default is 192.168.1.254, and click “Go”, a user name and password window prompt appears. The default username and password is “admin” and “admin” respectively for the Administrator. Congratulations! You have successfully logged on to your Industrial LTE Router !
  • Page 25 Once you have logged on to your Industrial LTE Router via your web browser, you can begin to set it up according to your requirements. On the configuration homepage, the left navigation pane links you directly to the setup page, which includes: Status(Device Info, System Log, 4G/LTE Status, GPS Status, Hardware Monitor, Hotspot Status, Statistics, DHCP Table, IPSec Status, PPTP Status, L2TP Status, GRE Status, OpenVPN Status, Disk Status, ARP Table)
  • Page 26: Status

    Status In this section, you can check the router working status, including Device Info, System Log, 4G/LTE Status, GPS Status, Hardware Monitor, Hotspot Status, Statistics, DHCP Table, IPSec Status, PPTP Status, L2TP Status, GRE Status, OpenVPN Status, Disk Status, ARP Table.
  • Page 27: Device Info

    Device Info It contains basic information of the device. Device Information Model Name: Show model name of the router Firmware Version: This is the Firmware version MAC Address: This is the MAC Address Date Time: The current date and time. System Up Time: The duration since system is up.
  • Page 28 Subnet Mask/Prefix Length: Subnet mask for IPv4 or Prefix length for IPv6 on LAN.. DHCP Server: LAN port DHCP information. Wireless Mode: The wireless mode in use. SSID: The SSID. Channel: The current channel. Security: The wireless security setting, authentication type.
  • Page 29: System Log

    System Log In system log, you can check the operations status and any glitches to the router. Refresh: Press this button to refresh the statistics. Backup: Back up the current system log file and save it to your computer.
  • Page 30: 4G/Lte Status

    4G/LTE Status This page contains 4G/LTE connection information. Status: The current status of the 4G/LTE connection. Signal Strength: The signal strength bar and dBm value indicates the current 4G/LTE signal strength. The front panel 4G/LTE Signal Strength LED indicates the signal strength as well. Signal Information: Shows important LTE signal parameters such as RSRP (Reference Signal Receiving Power), RSRQ (Reference Signal Receiving Quality), SINR (Signal to Interference plus Noise Ratio).
  • Page 31: Gps Status

    GPS Status In GPS status, you can check the UTC time, position of the router.
  • Page 32: Hardware Monitor

    Hardware Monitor In hardware monitor, you can check the voltage, current and temperature of system.
  • Page 33: Hotspot Status

    Hotspot Status The Hotspot status shows each hotspot client’s connection status/information. MAC Address: The MAC of the currently active client or the client attepting to connect in. IP Address: The IP assigned to the client. Authenticated: Show the client is authorized or not. User Name: The username of the logined client;...
  • Page 34: Statistics

    Statistics  4G/LTE Interface: List all available network interfaces in the router. You are currently checking on the physical status of 4G/LTE interface. Transmit Frames of Current Connection: This field displays the total number of 4G/LTE frames transmitted until the latest second for the current connection. Transmit Bytes of Current Connection: This field shows the total bytes transmitted till the latest second for the current connection for the current connection.
  • Page 35  EWAN Interface: List all available network interfaces in the router. You are currently checking on the physical status of the EWAN port. Transmit Frames: This field displays the total number of frames transmitted until the latest second. Transmit Multicast Frames: This field displays the total number of multicast frames transmitted till the latest second.
  • Page 36  Ethernet Interface: List all available network interfaces in the router. You are currently checking on the physical status of the Ethernet port. Transmit Frames: This field displays the number of frames transmitted until the latest second. Transmit Multicast Frames: This field displays the number of multicast frames transmitted until the latest second.
  • Page 37  Wireless Interface: List all available network interfaces in the router. You are currently checking on the physical status of the Wireless. Transmit Frames: This field displays the number of frames transmitted until the latest second. Transmit Error Frames: This field displays the number of error frames transmitted until the latest second.
  • Page 38: Dhcp Table

    DHCP Table DHCP table displays the devices connected to the router with clear information. Index: The index identifying the connected devices. Host Name: Show the hostname of the PC. IP Address: The IP allocated to the device. MAC Address: The MAC of the connected device. Expire Time: The total remaining interval since the IP assignment to the PC.
  • Page 39: Ipsec Status

    IPSec Status Index: The IPSec tunnel index number. Action: Connect or Drop the connection. Connection Name: User-defined IPSes VPN connection name. Active: Show if the tunnel is active for connection. Connection State: Show the IPSec phase 1 and phase 2 connecting status. Statistics: Display the upstream/downstream traffic per session in KB.
  • Page 40: Pptp Status

    PPTP Status  PPTP Server Index: The PPTP server tunnel index number. Connection Name: Show user-defined PPTP VPN connection name. Active: Show if the tunnel is active for connection. Connection State: Show the connecting status. Connection Type: Remote Access or LAN to LAN. Assigned IP Address: Show the IP assigned to the client by PPTP Server.
  • Page 41: L2Tp Status

    L2TP Status Index: The L2TP tunnel index number. Connection Name: Display the user-defined L2TP connection name. Active: Show if the tunnel is active for connection. Connection State: Show the connecting status. Connection Mode: The L2TP mode is dialin or dialout. Connection Type: Remote Access or LAN to LAN.
  • Page 42: Gre Status

    GRE Status Index: The GRE tunnel index number. Connection Name: Display the user-defined GRE connection name. Active: Show if the tunnel is active for connection. Remote Gateway IP: The IP of the remote GRE gateway. Remote Network: Display the remote network. Refresh: Click this button to refresh the connection status.
  • Page 43: Openvpn Status

    OpenVPN Status  OpenVPN Server Index: The index to identify the OpenVPN connection/rule. Connection Name: User-defined name to mark the connection/rule. Active: Yes or no to demosntrate the rule is active or not. Service Port: Show the service port/protocl. Tunnel Network: The virtual tunnel subnet of the server. Status: The status of the rule/ ...
  • Page 44: Disk Stauts

    Disk Stauts Partition: Display the USB storage partition. Disk Space (KB): Display the total storage space of the NAS in Kbytes unit. Free Space (KB): Display the available space in Kbytes unit.
  • Page 45: Arp Table

    ARP Table This section displays the router’s ARP (Address Resolution Protocol) Table, which shows the mapping of IP addresses to Ethernet MAC addresses. Index: The Index of the ARP rule item. IP Address: Shows the IP Address of the device that the MAC address maps to. MAC Address: Shows the MAC address that is corresponded to the IP address of the device it is mapped to.
  • Page 46: Quick Start

    Quick Start This is a useful and easy utility to help you to setup the router quickly and to connect to your ISP (Internet Service Provider) with only a few steps. It will guide you step by step to setup password, time zone, and WAN settings of your device.
  • Page 47 Step 4 – ISP Connection Type Set up your Internet connection. 4.1 Select an appropriate WAN connection protocol then click Next to continue. Input all relevant 3G/4G-LTE parameters from your ISP. 4.2 If selected EWAN If selected PPPoE, please enter PPPoE account information provided by your ISP. Click Next to continue.
  • Page 48 Step 5 – Quick Start Completed The Setup Wizard has completed. Click on Back to modify changes or mistakes. Click Next to save the current settings. Step 6 – Quick Start Completed...
  • Page 49: Configuration

    Configuration Click to access and configure the available features in the following: Interface Setup, Dual WAN, Hotspot, Advanced Setup, VPN, Access Management, and Maintenance. These functions are described in the following sections.
  • Page 50: Interface Setup

    Interface Setup Here are the features under Interface Setup: Internet, LAN, Wireless and Wireless MAC Filter.
  • Page 51: Internet

    Internet  4G/LTE Status: Choose Activated to enable the 3G/4G-LTE connection. Usage Allowance: to control 4G/LTE flow, click it to further configure about 4G/LTE flow control, refer to the following Usage Allowance for more information. IP Pass-Through Mode: When “enabled”, the device will gain a WAN IP via 4G/LTE dial-up and pass on to the PC connected to device, thus your PC gets a public WAN IP working on the internet.
  • Page 52 Username/Password: Enter the username and password provided by your service provider. The username and password are case sensitive. PIN: PIN stands for Personal Identification Number. A PIN code is a numeric value used in certain systems as a password to gain access, and authenticate. In mobile phones a PIN code locks the SIM card until you enter the correct code.
  • Page 53  EWAN...
  • Page 54 Status: Select whether to enable the service. IPv4/IPv6 IP Version: Choose IPv4, IPv4/IPv6, IPv6 based on your environment. If you don’t know which one to choose from, please choose IPv4/IPv6 instead. ISP Connection Type: ISP: Select the encapsulation type your ISP uses. ...
  • Page 55 your PC gets a public WAN IP working in the internet. But if your PC is connected to the router working as a DHCP client, in this mode, the device acts as a NAT router. Connection Setting Connection:  Always On: Click on Always On to establish a PPPoE session during start up and to automatically re-establish the PPPoE session when disconnected by the ISP.
  • Page 56  RIP Version: (Routing Information protocol) Select this option to specify the RIP version, including RIP-1, RIP-2.  RIP Direction: Select this option to specify the RIP direction. None is for disabling the RIP function. Both means the router will periodically send routing information and accept routing information then incorporate into routing table.
  • Page 57  Wireless Client When Wireless Client is selected, the router will act as an ordinary wireless client to connect to an AP to connect to the Internet. Status: Choose Activated to enable the Wireless Client connection. ISP Connection Type: ISP: Select the encapsulation type your ISP uses. ...
  • Page 58 Use "Scan" button to scan the available SSIDs in the air, find your desired on, type the encypytion key.
  • Page 59: Lan

    A Local Area Network (LAN) is a shared communication system to which many computers are attached and is limited to the immediate area, usually the same building or floor of a building.
  • Page 60 IPv4 Parameters IP Address: Enter the IP address of Router in dotted decimal notation, for example, 192.168.1.254 (factory default). IP Subnet Mask: The default is 255.255.255.0. User can change it to other such as 255.255.255.128. Alias IP Address: This is for local networks virtual IP interface. Specify an IP address on this virtual interface.
  • Page 61 DHCPv4 server. DNS Relay Select Automatically obtained or Manually set (if selected. Please set the exactly information). Primary DNS Server: Enter the IP addresses of the DNS servers. The DNS servers are passed to the DHCP clients along with the IP address and the subnet mask. Secondary DNS Server: Enter the IP addresses of the DNS servers.
  • Page 62 link, while hosts generate an "interface identifier" that uniquely identifies an interface on a subnet. An address is formed by combining the two. When using stateless configuration, you needn’t configure anything on the client. Stateful configuration, for example using DHCPv6 (which resembles its counterpart DHCP in IPv4.) In the stateful auto configuration model, hosts obtain interface addresses and/or configuration information and parameters from a DHCPv6 server.
  • Page 63: Wireless

    Wireless This section introduces the wireless LAN and some basic configurations. Wireless LANs can be as complex as a number of computers with wireless LAN cards communicating through access points which bridge network traffic to the wired LAN.
  • Page 64 Access Point Settings Access Point: Default setting is set to Activated. If you want to close the wireless interface, select Deactivated. AP MAC Address: The MAC address of wireless AP. Wireless Mode: The default setting is 802.11b+g+n (Mixed mode). If you do not know or have both 11g and 11b devices in your network, then keep the default in mixed mode.
  • Page 65 11n Settings Channel Bandwidth: Select either 20 MHz or 20/40 MHz for the channel bandwidth. The wider the Channel bandwidth the better the performance will be. Guard Interval: Select either 400nsec or 800nsec for the guard interval. The guard interval is here to ensure that data transmission do not interfere with each other.
  • Page 66 Use WPS: Enable this feature by choosing the ”YES” radiobutton. WPS State: Display whether the WPS is configured or unconfigured. WPS Mode: Select the mode which to start WPS, choose between PIN Code and PBC (Push Button). Selecting Pin Code mode will require you to know the enrollee PIN code. To future understand the two modes of configuration;...
  • Page 67  WPA-PSK, WPA2-PSK, Mixed WPA2/WPA-PSK WPA Algorithms: TKIP (Temporal Key Integrity Protocol) or AES (Advanced Encryption System) utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers. Pre-Shared key: The key for network authentication. The input format should be 8-63 ASKII characters or 64 hexadecimal characters Key Renewal Interval: The time interval for changing the security key automatically between wireless client and AP.
  • Page 68 Example: Wi-Fi Protected Setup (WPS) I: PIN Method: Configure AP as Registrar 1. Jot down the client’s Pin (e.g. 04640776). 2. Enter the Enrollee (Client) PIN code and then press Start WPS. 3. Launch the wireless client’s WPS utility (e.g. Ralink Utility). Set the Config Mode as Enrollee, press the WPS button on the top bar, select the AP (e.g.
  • Page 70 Example: Wi-Fi Protected Setup (WPS) II: PIN Method: Configure AP as Enrollee 1. Jot down the WPS PIN (e.g. 07966170). Press Start WPS. 2. Launch the wireless client’s WPS utility (e.g. Ralink Utility). Set the Config Mode as Registrar. Enter the PIN number in the PIN Code column then choose the correct AP (e.g.
  • Page 71 4. Now to make sure that the setup is correctly done, cross check to see if the SSID and the security setting of the registrar setting match with the parameters found on both Wireless Configuration and Wireless Security Configuration page.
  • Page 72 Example: Wi-Fi Protected Setup (WPS) III: PBC Method: 1. Press the PBC radio button, Then Start WPS. 2. Launch the wireless client’s WPS Utility (e.g. Ralink Utility). Set the Config Mode as Enrollee. Then press the WPS button and choose the correct AP (e.g. Billion_AP) from the WPS AP List section before pressing the PBC button to run the scan.
  • Page 73: Wireless Mac Filter

    Wireless MAC Filter The MAC filter screen allows you to configure the router to give exclusive access to up to 8 devices (Allow Association) or exclude up to 8 devices from accessing the router (Deny Association). Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:AA:BB:00:00:02.
  • Page 74: Dual Wan

    Dual WAN Dual WAN is specially designed to offer users failover/fallback. Auto failover/failback is to ensure an always-on internet connection. Users can set a WAN1 (main WAN) and WAN 2 (backup WAN), and when WAN1 fails, it will switch to WAN2, and when WAN1 restores, it will switch to WAN1 again.
  • Page 75  Failover & Failback WAN Port Service Detection Policy WAN1: Select “4G/LTE-1”, “4G/LTE 2” , “EWAN” or “Wireless Client” for WAN1 (The main WAN). WAN2: Select the “4G/LTE-2”, “EWAN” or “Wireless Client” for WAN2 as backup port if you select “4G/LTE-1”...
  • Page 76  Failover & Priority WAN Port Service Detection Policy WAN1: Select “4G/LTE-1”, “4G/LTE 2”, “EWAN” or “Wireless Client” for WAN1 (The main WAN). WAN2: Select the “4G/LTE-2”, “EWAN” or “Wireless Client” for WAN2 as backup port if you select “4G/LTE-1” as WAN1. Connectivity Decision: Set how many times of probing failure to switch to backup port.
  • Page 77  Load Balance WAN Port Service Detection Policy WAN1: Select “4G/LTE-1”, “4G/LTE-2”, “EWAN” or “Wireless Client” for WAN1. WAN2: Select the “4G/LTE-2”, “EWAN” or “Wireless Client” if you select “4G/LTE-1” as WAN1. Service Detection: Select if to keep detecte WAN interface connected. If enable the setting, the traffic will be automatically through another WAN if the WAN interface is disconnected.
  • Page 78: Outbound Load Balance

    Outbound Load Balance The connections are distributed over WAN1 and WAN2 so that it can utilize bandwidth of both WAN ports. With Outbound load balance, traffic may be routed to a faster link when one of the WAN is slower or congested so that user gains better throughput and less delay. User can distribute outbound traffic based on Session Mechanism or IP Hash Mechanism.
  • Page 79: Protocol Binding

    Protocol Binding Protocol Binding lets you direct specific traffic to go out from a specific WAN port. Policies determine how specific types of internet traffic are routed, for example, traffic from a particular IP(es) granted access to only one WAN port rather than using both of the WAN ports as with load balancing. Rule Index: The index marking the rule.
  • Page 80: Hotspot

    A hotspot is usually a public localtion(coffee shops, airports, etc) where people obtain internet access typically using WiFi technology. The Billion Industrial LTE Router HotSpot Gateway provides authentication for clients before access to public networks. It also allows users to access some web pages without authentication using Walled Garden feature.
  • Page 81: General Setting

    General Setting This section is to setup setup HotSpot server on a router and authentication medthods, session settings. General Setting: Hotsport: Activate or Deactivate Hotspot feature. Interface: Determine which SSID is configured as a Hotspot. Industrial LTE Router has 4 virtual SSIDs.
  • Page 82 Session Timeout: period of time after which if client hasn't been authorized itself with hotspot system, the client login attempt proves failed, another try needed. Idle Timeout: period of inactivity for each client. When there is no traffic from this client (literally client computer should be switched off), once the timeout is reached, the link disconnect automatically.
  • Page 83: Bult-In User Account

    Bult-in User Account This part is to configure the local valid user account database. Up to 16 accounts can be created. Rule Index: 0-15, the valid user identifier index. User Name/Password: Enter the username /password for each valid user.
  • Page 84: Authorized Of Client

    Authorized of Client It is for priority(trusted) client for whom authentication is not needed to internet access. Also they can enjoy unlimited Upload/Download Bandwidth. These privilegd clients can be added by MACs. Authorized of Client: Activate or Deactivate the feature. Rule Index: 0-15 trusted users can be added, each identified by a rule index.
  • Page 85: Walled Garden

    Walled Garden It allows users to access some web pages (listed in the Walled Garden List) without authentication. Rule Index: 0-15 different domain names or IP addresses can be added. Active: Select Yes to activate the rule. If activated, the domain name or IP will be open without authentication to access.
  • Page 86: Advertisement

    Advertisement This part is for propaganda purpose for some website after successfully logged in. Advertisement: Activate or deactivate the Advertisement feature. Mode: The mode the propaganda advertisement is shown in. Rule Index: The rule index identifying the URL, 0-15 URLs can be created. URL: The propaganda web URL.
  • Page 87: Session Log

    Session Log Session Log periodically records session information and mails it to hotspot manager helped by Mail Alert. How often to record the session log and to mail can be set here. Session Log: Activate session log or not. Log Session data every: Set how often to record the session log. By default, session log records every 1 minutes.
  • Page 88: Customization

    Customization Customization allows users to customize their desired authenticate page strings, if not, default settings are showed on the authentication page. Places where strings are to be shown are listed in the following screenshots in red rectangle, please check where to change.
  • Page 89 Hotspot server configuration on the router: 1. Login to the Industrial LTE Router and move to Configuration > Interface Setup > Wirelss to set the WLAN1(hotspot is running on WLAN1). Change SSID to ”M500-Hotspot” for test. Note: Before using hotspot, please connect to the SSID running hotspot first.
  • Page 91 Wireless Client Connection: 1. Connect to the SSID(M500-Hotspot) on the laptop. 2. Launch the web brower, the hotspot welcome and authentication page pops up. 3. Input correct Username and Password then loging successfull.
  • Page 92: Advanced Setup

    Advanced Setup Advanced Step provides advanced features including Firewall, Routing, Dynamic Routing, NAT, Static DNS, Time Schedule and Mail Alert for advanced users.
  • Page 93: Firewall

    Firewall Your router includes a firewall for helping to prevent attacks from hackers. In addition to this, when using NAT (Network Address Translation) the router acts as a “natural” Internet firewall, since all PCs on your LAN use private IP addresses that cannot be directly accessed from the Internet. Firewall: To automatically detect and block Denial of Service (DoS) attacks, such as Ping of Death, SYN Flood, Port Scan and Land Attack.
  • Page 94: Routing

    Routing This is static route feature. You are equipped with the capability to control the routing of all the traffic across your network. With each routing rule created, user can specifically assign the destination where the traffic will be routed to. Index: Item number Destination IP Address: IP address of the destination network Subnet Mask: The subnet mask of destination network.
  • Page 95: Dynamic Routing

    Dynamic Routing OSPF Open Shortest Path First (OSPF) is a most widely used interior gateway protocil (IGP) for Internet Protocol (IP) networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). OSPF allows collections of rotuers to be grouped together.
  • Page 96 Border Gateway Protocol (BGP) is a standardized exterior gateway protocol (an uniquely TCP basded inter-Autonomous System routing protocol) designed to allow setting up an inter-domain dynamic routing system that automatically updates routing tables of devices running BGP in case of network topology changes.
  • Page 97: Nat

    The NAT (Network Address Translation) feature transforms a private IP into a public IP, allowing multiple users to access the internet through a single IP account, sharing the single IP address. NAT break the originally envisioned model of IP end-to-end connectivity across the internet so NAT can cause problems where IPSec/ PPTP encryption is applied or some application layer protocols such as SIP phones are located behind a NAT.
  • Page 98 Note: This feature disables automatically if WAN connection is in BRIDGE mode. The DMZ Host is a local computer exposed to the Internet. When setting a particular internal IP address as the DMZ Host, all incoming packets will be checked by the Firewall and NAT algorithms then passed to the DMZ host, when a packet received does not use a port number used by any other Virtual Server entries.
  • Page 99 Virtual Server Note: This feature disables automatically if WAN connection is in BRIDGE mode. The device can be configured as a virtual server so that remote users accessing services such as Web or FTP services via the public (WAN) IP address can be automatically redirected to local servers in the LAN network.
  • Page 100 Examples of well-known and registered port numbers are shown below. For further information, please see IANA’s website at http://www.iana.org/assignments/port-numbers Well-known and Registered Ports Port Number Protocol Description FTP Control TCP & UDP SSH Remote Login Protocol Telnet SMTP (Simple Mail Transfer Protocol) TCP &...
  • Page 101 Example : How to setup Port Forwarding for port 21 (FTP server) If you have a FTP server in your LAN network and want others to access it through WAN. Step 1: Assign a static IP to your local computer that is hosting the FTP server. Step 2: Login to the Gateway and go to Configuration / Advanced Setup / NAT / Virtual Server.
  • Page 102: Static Dns

    Static DNS The Domain Name System (DNS) is a hierarchical naming system built on a distributed database for computers, services, or any resource connected to the Internet or a private network associates various information with domain names assigned to each of the participating entities. Most importantly, it translates domain names meaningful to humans into the numerical identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide.
  • Page 103: Time Schedule

    Time Schedule The Time Schedule supports up to 16 timeslots which helps you to manage your Internet connection. In each time profile, you may schedule specific day(s) i.e. Monday through Sunday to restrict or allowing the usage of the Internet by users or applications. This Time Schedule correlates closely with router’s time, since router does not have a real time clock on board;...
  • Page 104: Mail Alert

    Mail Alert Mail alert is designed to keep system administrator or other relevant personnel alerted of any unexpected events that might have occurred to the network computers or server for monitoring efficiency. With this alert system, appropriate solutions may be tackled to fix problems that may have arisen so that the server can be properly maintained.
  • Page 105: Vpn

    A Virtual Private Network (VPN) is a private network that interconnects remote (and often geographically separate) networks through primarily public communication infrastructures such as the Internet. VPNs provide security through tunneling protocols and security procedures such as encryption. For example, a VPN could be used to securely connect the branch offices of an organization to a head office network through the public Internet.
  • Page 106: Ipsec

    IPSec Internet Protocol Security (IPSec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. IPsec also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session.
  • Page 107 IPSec Connection Setting Connection Name: A given name for the connection (e.g. “connection to office”). Active: Select Yes to activate the tunnel. Interface: Select the set used interface for the IPSec connection, when you select 3G/4G-LTE interface, the IPSec tunnel would via this interface to connect to the remote peer. Remote Gateway IP: The WAN IP address of the remote VPN gateway that is to be connected, establishing a VPN tunnel.
  • Page 108  Subnet: The subnet of the local network, for establishing an IPSec tunnel between a pair of security gateways (network-to-network), If the remote peer is a network, select Subnet. IPSec Phase 1(IKE) IKE Mode: IKE, Internet Key Exchange, is the mechanism to negotiate and exchange parameters and keys between IPSec peers to establish security associations(SA).
  • Page 109 Use ESP for greater security so that data will be encrypted and the data origin be authenticated but using AH data origin will only be authenticated but not encrypted. Encryption Algorithm: Select the encryption algorithm from the drop-down menu. There are several options: DES and AES (128, 192 and 256).
  • Page 110 Please be noted, it must be enabled on the both sites. PING to the IP: It is able to IP Ping the remote PC with the specified IP address and alert when the connection fails. Once alter message is received, Router will drop this tunnel connection. Reestablish of this connection is required.
  • Page 111 Examples: How to establish an IPSec Tunnel 1. LAN-to-LAN connection Two VPN router want to setup a secure IPSec VPN tunnel Note: The IPSec Settings shall be consistent between the two routers.
  • Page 112 Head Office Side: Item Description Connection Name H-to-B Name for IPSec tunnel Remote Secure Gateway 69.121.1.30 IP address of the Branch office gateway Access Netork Local Access Range Subnet Head Office network Local Netwrok IP Address 192.168.1.0 Local Netwrok Netmask 255.255.255.0 Remote Access Range Subnet...
  • Page 113 Branch Office Side: Item Description Connection Name B-to-H Name for IPSec tunnel Remote Secure Gateway 69.121.1.3 IP address of the Branch office gateway Access Netork Local Access Range Subnet Head Office network Local Netwrok IP Address 192.168.0.0 Local Netwrok Netmask 255.255.255.0 Remote Access Range Subnet...
  • Page 114 2. Host to LAN Router servers as VPN server, and host should install the IPSec client to connect to head office through IPSec VPN.
  • Page 115 Head Office Side: Item Description Connection Name H-to-H Name for IPSec tunnel Remote Secure Gateway 69.121.1.30 IP address of the Branch office gateway Access Netork Local Access Range Subnet Head Office network Local Netwrok IP Address 192.168.1.0 Local Netwrok Netmask 255.255.255.0 Remote Access Range Signal IP...
  • Page 116: Pptp Server

    PPTP Server The Point-to-Point Tunneling Protocol (PPTP) is a Layer2 tunneling protocol for implementing virtual private networks through IP network. In the Microsoft implementation, the tunneled PPP traffic can be authenticated with PAP, CHAP, and Microsoft CHAP V1/V2 . The PPP payload is encrypted using Microsoft Point-to-Point Encryption (MPPE) when using MSCHAPv1/v2.
  • Page 117 Connection Type: Select Remote Access for single user, Select LAN to LAN for remote gateway. Private IP Address Assigned to Dial-in User: Specify the private IP address to be assigned to dialin clients, and the IP should be in the same subnet as local LAN, but not occupied. Remote Network IP Address: Please input the subnet IP for remote network.
  • Page 118: Pptp Client

    PPTP Client PPTP client can help you dial the PPTP server to establish PPTP tunnel over Internet. A total of 4 sessions can be created for PPTP client. Rule Index: The Index to mark the session. Connection Name: User-defined name for the PPTP connection. Active: Select Yes to activate the account.
  • Page 119 Example: PPTP LAN-to-LAN connection The branch office establishes a PPTP VPN tunnel with head office to connect two private networks over the Internet. The routers are installed in the head office and branch offices accordingly. Note: Both office LAN networks must be in different subnets with the LAN-LAN application.
  • Page 120 Configuring PPTP server in the head office The IP address 192.168.1.2 will be assigned to the router located in the branch office. Please make sure this IP is not used in the head office LAN. Item Description Connection Name HS-LL Give a name of PPTP conneciton Authentication Type MPPE 128bit...
  • Page 121 Configuring PPTP client in the branch office The IP address 69.121.1.33 is the public IP address of the router located in head office. Item Description Connection Name BC-LL Give a name of PPTP conneciton Authentication Type MPPE 128bit Authentication type Username test Dial in authenticate user name...
  • Page 122 Example: PPTP Remote Access Dial-in connection A remote worker establishes a PPTP VPN connection with the head office using Microsoft's VPN Adapter. The router is installed in the head office, connected to a couple of PCs and Servers.
  • Page 123 Configuring PPTP server(dial-in) in the office The input IP address 192.168.1.2 will be assigned to the remote worker. Please make sure this IP is not used in the office LAN. Item Description Connection Name HS-RA Give a name of L2TP conneciton Authentication Type MPPE 128bit Authentication type...
  • Page 124 Example: PPTP Remote Access Dial-out connection A company’s office establishes a PPTP VPN connection with a file server located at a separate location. The router is installed in the office, connected to a couple of PCs and Servers.
  • Page 125 Configuring PPTP client(dial-out) in the office The IP address 61.121.1.33 is the public IP address of the router located in head office. Item Description Connection Name HC-RA Give a name of PPTP conneciton Authentication Type MPPE 128bit Authentication type Username test Dial in authenticate user name Passwrod...
  • Page 126: L2Tp

    L2TP L2TP, Layer 2 Tunneling Protocol is a tunneling protocol used to support virtual private networks (VPNs). It does not provide any encryption or confidentiality by itself; it relies on an encryption protocol that it passes within the tunnel to provide. Note: 8 sessions for dial-in connections and 8 sessions for dial-out connections Rule Index: The Index to mark the session.
  • Page 127 server. The IP should be in the same subnet as local LAN, and should not be occupied. Connection Mode: Choose Dial Out if you want your router to operate as a client (connecting to a remote L2TP Server, e.g, your office server). Server IP Address: Enter the IP address of your VPN Server.
  • Page 128 Active as Default Route: Enabled to let the tunnel to be the default route for traffic, under this circumstance, all packets will be forwarded to this tunnel and routed to the next hop. L2TP over IPSec IPSec: This enables L2TP tunnel over IPSec IKE Mode: IKE, Internet Key Exchange, is the mechanism to negotiate and exchange parameters and keys between IPSec peers to establish security associations(SA).
  • Page 129 Example: L2TP LAN-to-LAN connection The branch office establishes a L2TP VPN tunnel with head office to connect two private networks over the Internet. The routers are installed in the head office and branch office accordingly. Note: Both office LAN networks must be in different subnets with the LAN-LAN application.
  • Page 130 Configuring L2TP Dial-in in the head office The IP address 192.168.1.200 will be assigned to the router located in the branch office. Please make sure this IP is not used in the head office LAN. Item Description Connection Name HS-LL Give a name of L2TP conneciton Connection Mode Dial in...
  • Page 131 Configuring L2TP Dial-out in the branch office The IP address 69.1.121.33 is the Public IP address of the router located in head office. Item Description Connection Name BC-LL Give a name of L2TP conneciton Connection Mode Dial out Operate as L2TP client Server IP 69.121.1.33 Dialed server IP...
  • Page 132 Examples: L2TP Remote Access Dial-in connection A remote worker establishes a L2TP VPN connection with the head office using Microsoft's VPN Adapter. The router is installed in the head office, connected to a couple of PCs and Servers.
  • Page 133 Configuring L2TP VPN Dial-in in the Office The input IP address 192.168.1.200 will be assigned to the remote worker. Please make sure this IP is not used in the Office LAN. Item Description Connection Name HS-RA Give a name of L2TP conneciton Connection Mode Dial in Operate as L2TP server...
  • Page 134 Examples: L2TP Remote Access Dial-out connection A company’s office establishes a L2TP VPN connection with a file server located at a separate location. The router is installed in the office, connected to a couple of PCs and Servers.
  • Page 135 Configuring L2TP VPN Dial-out in the office Item Description Connection Name HC-RA Give a name of L2TP conneciton Connection Mode Dial out Operate as L2TP client Server IP 61.121.1.33 Dialed server IP Authentication Type Chap/Pap Authentication type Username test Dial out authenticate user name Passwrod test Dial out authenticate user password...
  • Page 136: Gre Tunnel

    GRE Tunnel Generic Routing Encapsulation (GRE) is a tunneling protocol that can encapsulate a wide variety of network layer protocol packets inside virtual point-to-point links over an IP network. Note: up to 16 tunnels can be added. Rule Index: The Index to mark the session. Connection Name: User-defined name for the connection.
  • Page 137 Keepalive Interval: Set the keepalive Interval, unit in seconds. Default is 5 seconds. MTU: Maximum Transmission Unit. Active as Default Route: Select if to set the GRE tunnel as the default route. GRE over IPSec IPSec: This enables GRE tunnel over IPSec IKE Mode: IKE, Internet Key Exchange, is the mechanism to negotiate and exchange parameters and keys between IPSec peers to establish security associations(SA).
  • Page 138 Example: GRE VPN Connection The branch office establishes a GRE VPN tunnel with head office to connect two private networks over the Internet. The routers are installed in the head office and branch office accordingly. Note: Both office LAN networks must be in different subnets with the GRE VPN connection.
  • Page 139 Configuring GRE connection in the head office The IP address 69.1.121.30 is the Public IP address of the router located in branch office. Item Description Connection Name HS-LL Give a name of GRE conneciton Remote Gateway IP 69.121.1.30 Authentication type Tunnel Local IP Address The local virtual interface IP address for 192.168.100.11...
  • Page 140 Configuring GRE connection in the branch office The IP address 69.1.121.3 is the Public IP address of the router located in head office. Item Description Connection Name BC-LL Give a name of GRE conneciton Remote Gateway IP 69.121.1.3 Authentication type Tunnel Local IP Address The local virtual interface IP address for 192.168.100.10...
  • Page 141: Openvpn Server

    OpenVPN OpenVPN is an open source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It uses a custom security protocol that utilizes SSL/TLS for key exchange.
  • Page 142 Netmask: Set the tunnel virtual subnet mask. Local Access Range IP Address: Set the local network address. Netmask: Set the local subnet mask. Protocol: OpenVPN can run over User Datagram Protocol (UDP) or Transmission Control Protocol (TCP) transports. Select the protocol. Local Certificate Index: Select the local certificate.
  • Page 143: Openvpn Client

    OpenVPN Client The settings of the OpenVPN client should match what’s set on the server side. Note: up to 4 tunnels can be added. Rule Index: The index to identify the OpenVPN connection/rule. Connection Name: user-defined name to mark the connection/rule. Active: Select Yes to activate the rule.
  • Page 144 Cipher: OpenVPN uses all the ciphers available in the OpenSSL package to encrypt both the data and channels. Select the encryption method. Hash: To establish the integrity of the datagram and ensures it is not tampered with in transmission. There are options: Message Digest 5 (MD5) and Secure Hash Algorithm (SHA1, SHA256). SHA1 is more resistant to brute-force attacks than MD5.
  • Page 145 Example: OpenVPN VPN Connection The branch office establishes a OpenVPN tunnel with head office to connect two private networks over the Internet. The routers are installed in the head office and branch office accordingly. Note: Both office LAN networks must be in different subnets with the OpenVPN connection.
  • Page 146 Configuring OpenVPN server in the head office The IP address 69.1.121.30 is the Public IP address of the router located in branch office. The OpenVPN tunnel netwrok virtual interface is 192.168.100.0/24. Item Description Connection Name HS-LL Give a name of GRE conneciton Tunnel Network 192.168.100.0/ The network for tunnel virtual interface.
  • Page 147 Configuring OpenVPN client in the branch office The IP address 69.1.121.3 is the Public IP address of the router located in head office. Item Description Connection Name BC-LL Give a name of GRE conneciton Server IP Address 69.121.1.3 The IP address of OpenVPN server. 192.168.0.0/ Remote Subnet The remote network.
  • Page 148: Access Management

    Access Management Access Management equipments the users with the ability of maintaining the access management, including Device Management, SNMP, Remote System Log, Universal Plug & Play, Dynamic DNS, Access Control, Packet Filter, CWMP(TR-069), Parental Control and SAMBA & FTP Server.
  • Page 149: Device Management

    Device Management Device management offers users a way to change the embedded web server accessing port, default 80. User can change the http port to 8080 or something else here.
  • Page 150: Snmp

    SNMP Simple Network Management Protocol (SNMP) is a protocol used for exchanging management information between network devices. SNMP is a member of the TCP/IP protocol suite. M100 serves as a SNMP agent which allows a manager station to manage and monitor the router through the network.
  • Page 151: Remote System Log

    Remote System Log Remote System Log is designed to keep remote administrators informed of the system-operating information. Administrator can set up a remote system log server for receiving and monitoring the system information by enabling remote system log feature on the router. Remote System Log: Select whether to activate “Remote System Log”.
  • Page 152: Universal Plug & Play

    Universal Plug & Play UPnP offers peer-to-peer network connectivity for PCs and other network devices, along with control and data transfer between devices. UPnP offers many advantages for users running NAT routers through UPnP NAT Traversal, and on supported systems makes tasks such as port forwarding much easier by letting the application control the required settings, removing the need for the user to control advanced configuration of their device.
  • Page 153: Dynamic Dns

    Dynamic DNS The Dynamic DNS function allows you to alias a dynamic IP address to a static hostname, allowing users whose ISP does not assign them a static IP address to use a domain name. This is especially useful for hosting servers via your internet connection, so that anyone wishing to connect to you may use your domain name, rather than having to use your dynamic IP address, which changes from time to time.
  • Page 154 Example: How to register a DDNS account Note: First users have to go to the Dynamic DNS registration service provider to register an account. User test1 register a Dynamic Domain Names in DDNS provider http://www.dyndns.org/ DDNS: www.hometest.com using username/password test/test...
  • Page 155: Access Control

    Access Control Access Control Listing allows you to determine which services/protocols can access M100 interface from which computers. It is a management tool aimed to allow IPs (set in secure IP address) to access specified embedded applications (Web, etc, user can set) through some specified interface (LAN, WAN or both).
  • Page 156 By default, the “Access Control” has two default rules. Default Rule 1: (Index 0), a rule to allow only clients from LAN to have access to all embedded applications (Web, FTP, etc). Under this situation, clients from WAN cannot access the router even from Ping.
  • Page 157: Packet Filter

    Packet Filter You can filter the packages by MAC address, IP address, Protocol, Port number and Application or URL.  Packet Filter - IP & MAC Filter Packet Filter Filter Type: There are three types “IP & MAC Filter”, “Application Filter”, and “URL Filter” that user can select for this filter rule.
  • Page 158 Source Subnet Mask: Enter the subnet mask of the source network. Source Port Number: The source port number of packets to be monitored. 0 means “Don’t care”. Destination IP Address: The destination IP address of packets to be monitored. 0.0.0.0 means “Don’t care”.
  • Page 159  Packet Filter - URL Filter URL Filter: Select Activated to enable URL Filter. URL Filter Rule Index: This is item number. Individual Active: To give control to the specific URL access individually, for example, you want to prohibit access to www.yahoo.com, please first press Activated in “URL Filter” field, and also Yes in “Individual Active”...
  • Page 160: Cwmp (Tr-069)

    CWMP (TR-069) CWMP, short for CPE WAN Management Protocol, also called TR069 is a Broadband Forum technical specification entitled CPE WAN Management Protocol (CWMP). It defines an application layer protocol for remote management of end-user devices. It defines an application layer protocol for remote management of end-user devices.
  • Page 161 automatically. Interval(s): Specify the inform interval time (sec) which CPE used to periodically send inform message to automatically connect to ACS. When the inform interval time arrives, the CPE will send inform message to automatically connect to ACS.
  • Page 162: Parental Control

    Parental Control Parental Control provides Web content filtering offering safer and more reliable web surfing for users. Please get an account and configure at the selected Provider “www.opendns.com” in advance. If activated, the Parental Control has the top priority as DNS when accessing internet. Host Name, Username and Password: Enter your registered domain name and your username and password at the provider website www.opendns.com.
  • Page 163: Samba & Ftp Server

    SAMBA & FTP Server Samba and FTP are served as network sharing. SAMBA Server: Activated to enable SAMBA sharing. Work Group: The same mechanism like in Microsoft work group, please set the Work Group name. NetBIOS Name: The sharing NetBIOS name. FTP Server: Activated to enable FTP sharing.
  • Page 164: Maintenance

    Maintenance Maintenance equipments the users with the ability of maintaining the device as well as examining the connectivity of the WAN connections, including User Management, Certificate Management, Time Zone, Firmware & Configuration, System Restart, Auto Reboot, Diagnostic Tool and Ignition Sensing.
  • Page 165: User Management

    User Management User Management controls the Router Web GUI permission, FTP/SAMBA access to the specific account. In factory setting, the default accounts are admin/admin and user/user. The default root account admin has been authorized to web access of router, Samba access, and FTP access. user/user is equipment with limited access (specified by advanced users with admin account) to router web, and FTP/SAMBA .
  • Page 166  Admin / Admin admin/admin is the root account provided by our router. Login using the Administrator account, you will have the full accessibility to manage & control your gateway device and can also create user accounts for others to control some of the open configuration settings.
  • Page 167  User / User and/or Adding additonal user accounts user/user is the default user account username and password. User Setup Index: User account index. User Name: Users can create account(s) to give it (them) access to SAMBA and FTP. New Password: Type the password for the user account. Confirmed Password: Type password again for confirmation.
  • Page 168 Interface Setup: Enable to allowing access to Interface Setup with this account. Advanced Setup: Enable to allowing access to Advanced Setup with this account. Access Management: Enable to allowing access to Access Management with this account. Maintenance: Enable to allowing access to Maintenance with this account. When customers use the “user”...
  • Page 169: Certificate Management

    Certificate Management OpenVPN mutually authenticate each other based on Local Certificate and Trusted CA. Local Certificate Listing Edit certificate: Click , move to Local Certificate editing page. Index: To identify the local certificate. 2 certificates supported. Certificate Name: User-defined certificate name. PKCS12: Every certificate is accompanied by a private key.
  • Page 170 CA Certificate File: Browse to locate the target CA certificate file on PC before uploading it. Click Apply to save the settings.
  • Page 171: Time Zone

    Time Zone The router does not have a real time clock on board; instead, it uses the Simple Network Time Protocol (SNTP) to get the current time from an SNTP server outside your network. Choose your local time zone. After a successful connection to the Internet, the router will retrieve the correct local time from the SNTP server you have specified.
  • Page 172: Firmware & Configuration

    Firmware & Configuration Firmware is the software that controls the hardware and provides all functionalities which are available in the GUI. This software may be improved and/or modified; your M100 provides an easy way to update the code to take advantage of the changes. . To upgrade the firmware of M100, you should download or copy the firmware to your local environment first.
  • Page 173 DO NOT turn off / power off the device or interrupt the firmware upgrading while it is still in process. Improper operation could damage your Industrial LTE Router.
  • Page 174: System Restart

    System Restart Click System Restart with option Current Settings to reboot your router. If you wish to restart the router using the factory default settings (for example, after a firmware upgrade or if you have saved an incorrect configuration), select Factory Default Settings to restore to factory default settings.
  • Page 175: Auto Reboot

    Auto Reboot Auto reboot offers flexible rebooting service (reboot with the current configuration) of router for users in line with scheduled timetable settings Enable to set the time schedule for rebooting. For example, the router is scheduled to reboot at 22:00 every single weekday, and to reboot at 9:00 on Saturday and Sunday.
  • Page 176: Diagnostics Tool

    Diagnostics Tool The Diagnostic Test page shows the test results for the connectivity of the physical layer and protocol layer for both LAN and WAN sides. 4G/LTE: Click Start to begin to diagnose the connection. EWAN: WirelessClient:...
  • Page 177: Ignition Sensing

    Ignition Sensing Ignition sensing allows you to set the router to power on when the ignition key is turned to ACC/ON, and then power off after the ignition key is turned off with a designated time delay. For example, set your router to remain on for an hour after the vehicle is turned off and then shut off.
  • Page 178: Chapter 5: Troubleshooting

    Chapter 5: Troubleshooting If your M100 is not functioning properly, you can refer to this chapter for simple troubleshooting before contacting your service provider support. This can save you time and effort but if symptoms persist, consult your service provider. Problems with the Router Problem Suggested Action...
  • Page 179 - The front LEDs display incorrectly Before starting recovery process, please configure - Still cannot access to the router the IP address of the PC as 192.168.1.100 and management interface after pressing the proceed with the following step-by-step guide. RESET button. 1.
  • Page 180 Appendix: Product Support & Contact If you come across any problems please contact the dealer from where you have purchased the product. Contact Billion WORLDWIDE http://www.billion.com/ MAC OS is a registered Trademark of Apple Computer, Inc. Windows XP/ Vista/ 7/ 8/ 8.1/ 10 are registered Trademarks of Microsoft Corporation.
  • Page 181 Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.

Table of Contents