Amit CDM530AM-002 User Manual

Amit CDM530AM-002 User Manual

Wifi mobile router

Advertisement

Quick Links

User Manual
CDM530AM-002
WiFi Mobile Router
1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CDM530AM-002 and is the answer not in the manual?

Questions and answers

Summary of Contents for Amit CDM530AM-002

  • Page 1 User Manual CDM530AM-002 WiFi Mobile Router...
  • Page 2: Copyright

    Copyright The contents of this publication may not be reproduced in any part or as a whole, stored, transcribed in an information retrieval system, translated into any language, or transmitted in any form or by any means, mechanical, magnetic, electronic, optical, photocopying, manual, or otherwise, without the prior written permission.
  • Page 3: Table Of Contents

    Table of contents COPYRIGHT ..........................2 FCC INTERFERENCE STATEMENT ..................2 CHAPTER 1 INTRODUCTION ..................... 4 1.1 PACKAGE LIST....................4 1.2 HARDWARE INSTALLATION................5 CHAPTER 2 GETTING STARTED WITH EASY SETUP UTILITY........9 2.1 EASY SETUP BY WINDOWS UTILITY............9 2.2 EASY SETUP BY CONFIGURING WEB PAGES..........
  • Page 4: Chapter 1 Introduction

    Chapter 1 Introduction Congratulations on your purchase of this outstanding product: CDM530AM-002 WiFi Mobile Router. This product is specifically designed for mobile user who needs to have the internet access beyond his home and office. It provides a complete solution for Internet surfing and broadband sharing.
  • Page 5: Hardware Installation

    1.2 Hardware Installation A. Hardware configuration *Check Wireless LED to know wifi status.
  • Page 6 B. LED indicators Power LED indicator: Power Source ON/OFF Switch LED Status Description Green in flash Device ON, and Battery is in use. Battery Only Device ON, and Battery is low. Device OFF Device ON, and Battery is fully Green charged.
  • Page 7 Step 2. Close the battery lid Step 3. Plug in power: Connect with the power adapter to the receptor on the back panel of it. Step 4. Start to Charge the Battery: Then plug the other end of the power adapter into a wall outlet.
  • Page 8 Step 7. Connect with Ethernet Cable Insert the Ethernet cable into RJ45 Ethernet Port on the back panel. And then plug the other end of RJ45 into the computer or Laptop computer. The Ethernet LED will show green color if the Ethernet connection is normally connected.
  • Page 9: Chapter 2 Getting Started With Easy Setup Utility

    Chapter 2 Getting Started with Easy Setup Utility There are two approaches for you to set up the WiFi Mobile Router quickly and easily. One is through executing the provided Windows Easy Setup Utility on your PC, and the other is through browsing the device web pages and configuration.
  • Page 10 Step 4: Click “Next” to continue. Step 5: Select Wireless Enable, and then click “Next” to continue. Step 6: Enter SSID, Channel and Security options, and then click “Next” to continue.
  • Page 11 Step 7: Select 3G Service by clicking 3G icon to continue. Step 8-1: Select “Auto-Detection”, and the Utility will try to detect and configure the required 3G service settings automatically. Click “Next” to continue. Step 8-2: Or you can select “Manual” and manually fill in the required 3G service settings provided by your ISP.
  • Page 12 Step 9: The WiFi Mobile Router is rebooted to make your entire configuration take effect. Step 10: Click “Next” to test the Internet connection or you can ignore test. Step 11: Click “Next” to test WAN Networking service.
  • Page 13: Easy Setup By Configuring Web

    Step 12: Setup is completed. 2.2 Easy Setup by Configuring Web Pages You can also browse web UI to configure the device. Browse to Activate the Setup Wizard Type in the IP Address (http://192.168.123.254) Type in the default password “admin” in the System Password and then click ‘login’...
  • Page 14 Select “Wizard” for basic settings with simple way. Press “Next” to start the Setup Wizard. Configure with the Setup Wizard Step 1 Change System Password. Set up your system password. (Default:admin)
  • Page 15 Step 2: Select Time Zone Step 3: Select Wan Type. If you want to use 3G service as the main internet access, please set the WAN interface as “Wireless WAN” and the WAN type as “3G”. Step 4: Set up 3G profile. Select “Auto Detection”.
  • Page 16 Step 6: Set up Wireless Security. Set up your Authentication and Encryption. Step 7: Apply your Setting. Then click Apply Setting. Step 8: Click Finish to complete it.
  • Page 17: Chapter 3 Making Configuration

    Chapter 3 Making Configuration Whenever you want to configure your network or this device, you can access the Configuration Menu by opening the web-browser and typing in the IP Address of the device. The default IP Address is: 192.168.123.254 Enter the default password “admin” in the System Password and then click ‘login’ button. Then, you can browse the “Advanced”...
  • Page 18 3.1.1. Network Setup Ethernet port Configuration: Off: Disable the Ethernet port. LAN: The Ethernet port is as LAN port. WAN: The Ethernet port is as LAN port. Auto: It will be WAN Port if a DHCP server can be detected on the Ethernet port. Otherwise, it will be LAN port.
  • Page 19 A. 3G This device supports different WAN types of connection for users to connect to remote wireless ISP, such as 3G (WCDMA, HSxPA, HSPA+, CDMA2000, EV-DO, TD-SCDMA), iBurst, or Wi-Fi Hotspot. Note. Users need to insert USB modem card for 3G and iBurst WAN connections. 3G WAN Types: The WAN fields may not be necessary for your connection.
  • Page 20 8. Account: Enter the new User Name for your PC card here, you can contact to your ISP to get it. 9. Password: Enter the new Password for your PC card here, you can contact to your ISP to get it. 10.
  • Page 21 B. Static IP Address: 1. Activate WWAN for Auto-Failover: With this function enabled, when the Ethernet WAN connection is broken, the device will automatically activate the WWAN connection and keep you connected to internet with the alternative WWAN broadband service. Meanwhile, if the device detected that the Ethernet WAN connection is recovered, your broadband connection will be switched to use the Ethernet WAN service.
  • Page 22 C. Dynamic IP Address: 1. Activate WWAN for Auto-Failover: With this function enabled, when the Ethernet WAN connection is broken, the device will automatically activate the WWAN connection and keep you connected to internet with the alternative WWAN broadband service. Meanwhile, if the device detected that the Ethernet WAN connection is recovered, your broadband connection will be switched to use the Ethernet WAN service 2.
  • Page 23 D. PPP over Ethernet 1. Activate WWAN for Auto-Failover: With this function enabled, when the Ethernet WAN connection is broken, the device will automatically activate the WWAN connection and keep you connected to internet with the alternative WWAN broadband service. Meanwhile, if the device detected that the Ethernet WAN connection is recovered, your broadband connection will be switched to use the Ethernet WAN service 2.
  • Page 24 E. PPTP 1. Activate WWAN for Auto-Failover: With this function enabled, when the Ethernet WAN connection is broken, the device will automatically activate the WWAN connection and keep you connected to internet with the alternative WWAN broadband service. Meanwhile, if the device detected that the Ethernet WAN connection is recovered, your broadband connection will be switched to use the Ethernet WAN service 2.
  • Page 25 Auto Reconnect (Always-on): The device will link with ISP until the connection is established. Manually: The device will not make the link until someone clicks the connect-button in the Status-page. 9. Maximum Transmission Unit (MTU): Most ISP offers MTU value to users. The default MTU value is 0 (auto).
  • Page 26 7. Maximum Idle Time: The time of no activity to disconnect your L2TP session. Set it to zero or enable “Auto-reconnect” to disable this feature. If Auto-reconnect is enabled, this device will connect with ISP automatically, after system is restarted or connection is dropped.
  • Page 27 3. Primary DNS/Secondary DNS: Optional, This feature allows you to assign a DNS Servers 4. Connection Control: There are 3 modes to select: Connect-on-demand: The device will link up with ISP when the clients send outgoing packets. Auto Reconnect (Always-on): The device will link with ISP until the connection is established.
  • Page 28 Step 2: After finish searching, it will list all available Wi-Fi APs in your environment. You can select one of the lists to start to connect, or press “Refresh” button to search again. Step 3: Click “Save” button to save settings after selecting. There will be a field here for you to input encryption key if remote Wi-Fi Hotspot or Wi-Fi AP requires.
  • Page 29 3.1.2. DHCP Server 1. DHCP Server: Choose either Disable or Enable. If you enable the DHCP Server function, the following settings will be effective. 2. IP Pool Starting/Ending Address: Whenever there is a request, the DHCP server will automatically allocate an unused IP address from the IP address pool to the requesting computer.
  • Page 30 Press “Fixed Mapping” and the DHCP Server will reserve the special IP for designated MAC address.
  • Page 31 3.1.3. Wireless Settings Wireless settings allow you to set the wireless configuration items. 1. Wireless Module: You can enable or disable wireless function. 2. Network ID (SSID): Network ID is used for identifying the Wireless LAN (WLAN). Client stations can roam freely over this device and other Access Points that have the same Network ID.
  • Page 32 Open Open system authentication simply consists of two communications. The first is an authentication request by the client that contains the station ID (typically the MAC address). This is followed by an authentication response from the AP/router containing a success or failure message. An example of when a failure may occur is if the client's MAC address is explicitly excluded in the AP/router configuration.
  • Page 33 WPA-PSK/WPA-PSK2 Another encryption options for WPA-PSK-TKIP and WPA-PSK2-AES, the others are same the WPA-PSK. WPA/WPA2 Another encryption options for WPA-TKIP and WPA2-AES, the others are same the WPA. By pressing “WPS Setup”, you can configure and enable the easy setup feature WPS (Wi-Fi Protection Setup) for your wireless network.
  • Page 34 3.1.4. Change Password You can change the System Password here. We strongly recommend you to change the system password for security reason. Click on “Save” to store your settings or click “Undo” to give up the changes.
  • Page 35: Forwarding Rules

    3.2 Forwarding Rules 3.2.1 Virtual Server This product’s NAT firewall filters out unrecognized packets to protect your Intranet, so all hosts behind this product are invisible to the outside world. If you wish, you can make some of them accessible by enabling the Virtual Server Mapping. A virtual server is defined as a Service Port, and all requests to this port will be redirected to the computer specified by the Server IP.
  • Page 36: Special Ap

    Service Port Server IP Enable 192.168.123.1 192.168.123.2 1723 192.168.123.6 Click on “Save” to store your settings or click “Undo” to give up the changes. 3.2.2 Special AP Some applications require multiple connections, like Internet games, Video conferencing, Internet telephony, etc. Because of the firewall function, these applications cannot work with a pure NAT router.
  • Page 37: Miscellaneous

    3.2.3 Miscellaneous 1. IP Address of DMZ Host DMZ (Demilitarized Zone) Host is a host without the protection of firewall. It allows a computer to be exposed to unrestricted 2-way communication for Internet games, Video conferencing, Internet telephony and other special applications. 2.
  • Page 38: Security Setting

    3.3 Security Setting 3.3.1 Packet Filters Packet Filter includes both outbound filter and inbound filter. And they have same way to setting. Packet Filter enables you to control what packets are allowed to pass the router. Outbound filter applies on all outbound packets. However, inbound filter applies on packets that destined to Virtual Servers or DMZ host only.
  • Page 39 You can specify 8 rules for each direction: inbound or outbound. For each rule, you can define the following: • Source IP address • Source port • Destination IP address • Destination port • Protocol: TCP or UDP or both. •...
  • Page 40 3.3.2 Domain Filters Domain Filter prevents users under this device from accessing specific URLs. 1. Domain Filter: Check if you want to enable Domain Filter. 2. Log DNS Query: Check if you want to log the action when someone accesses the specific URLs.
  • Page 41 3.3.3 URL Blocking URL Blocking will block LAN computers to connect with pre-define Websites. The major difference between “Domain filter” and “URL Blocking” is Domain filter require user to input suffix (like .com or .org, etc), while URL Blocking require user to input a keyword only. In other words, Domain filter can block specific website, while URL Blocking can block hundreds of websites by simply a keyword.
  • Page 42 3.3.4 MAC Control MAC Address Control allows you to assign different access right for different users and to assign a specific IP address to a certain MAC address. 1. MAC Address Control: Check “Enable” to enable the “MAC Address Control”. All of the settings in this page will take effect only when “Enable”...
  • Page 43 3.3.5 Miscellaneous 1. Administrator Time-out: The time of no activity to logout automatically, you may set it to zero to disable this feature. 2. Remote Administrator Host/Port In general, only Intranet user can browse the built-in web pages to perform administration task.
  • Page 44: Advanced Setting

    3.4 Advanced Setting 3.4.1 System Log This page support two methods to export system logs to specific destination by means of syslog (UDP) and SMTP(TCP). The items you have to setup including:...
  • Page 45 1. IP Address for Sys log: Host IP of destination where sys log will be sent to. Check Enable to enable this function. 2. E-mail Alert Enable: Check if you want to enable Email alert (send syslog via email). 3. SMTP Server IP and Port: Input the SMTP server IP and port, which are connected with ':'.
  • Page 46 3.4.3 QOS Provide different priority to different users or data flows, or guarantee a certain level of performance. 1. QOS Control: Check Enable to enable this function. 2. Bandwidth of Upstream: Set the limitation of upstream bandwidth 3. Local IP : Ports: Define the Local IP address and ports of packets 4.
  • Page 47 3.4.4 SNMP In brief, SNMP, the Simple Network Management Protocol, is a protocol designed to give a user the capability to remotely manage a computer network by polling and setting terminal values and monitoring network events. 1. Enable SNMP: You must check “Local”, “Remote” or both to enable SNMP function. If “Local”...
  • Page 48 3.4.5 Routing If you have more than one routers and subnets, you will need to enable routing table to allow packets to find proper routing path and allow different subnets to communicate with each other. The routing table allows you to determine which physical interface address to use for outgoing IP data grams.
  • Page 49 3.4.6 System Time 1. Time Zone: Select a time zone where this device locates. 2. Auto-Synchronization: Check the “Enable” checkbox to enable this function. Besides, you can select a NTP time server to consult UTC time. 3. Sync with Time Server: Click on the button if you want to set Date and Time by NTP Protocol manually.
  • Page 50 3.4.7 Scheduling You can set the schedule time to decide which service will be turned on or off. 1. Schedule: Check to enable the schedule rule settings. 2. Add New Rule: To create a schedule rule, click the “Add New Rule” button. You can edit the Name of Rule, Policy, and set the schedule time (Week day, Start Time, and End Time).
  • Page 51: Tool Box

    3.5 Tool Box 3.5.1 System Info You can view the System Information and System log, and download/clear the System log, in this page.
  • Page 52 3.5.2 Firmware Upgrade You can upgrade firmware by clicking “Upgrade” button. 3.5.3 Backup Setting You can backup your settings by clicking the “Backup Setting” function item and save it as a bin file. Once you want to restore these settings, please click Firmware Upgrade button and use the bin file you saved.
  • Page 53 3.5.5 Reboot You can also reboot this device by clicking the Reboot function item. 3.5.6 Miscellaneous Domain Name or IP address for Ping Test Allow you to configure an IP, and ping the device. You can ping a specific IP to test whether it is alive.
  • Page 54: Chapter 4 Troubleshooting

    Chapter 4 . Troubleshooting This Chapter provides solutions to problems for the installation and operation of the WiFi Mobile Router. You can refer to the following if you are having problems. 1 Why can’t I configure the router even the cable is plugged and the LED is lit? Do a Ping test to make sure that the WiFi Mobile It is recommended that you use...
  • Page 55 Select Properties to ensure that all drivers are installed properly. Look under Device Status to see if the device is working properly. Click “OK”. 2 What can I do if my Ethernet connection does not work properly? Make sure the RJ45 cable connect with the router. Ensure that the setting on your Network Interface Card adapter is “Enabled”.
  • Page 56 Why my 3G connection is keep dropping? Please check 3G signal strength from your ISP in your environment is above middle level. 4 Something wrong with the wireless connection? Can’t setup a wireless connection? Ensure that the SSID and the encryption settings are exactly the same to the Clients.
  • Page 57 5 What to do if I forgot my encryption key? 1. Go back to advanced setting to set up your Encryption key again. 2. Reset the WiFi Mobile Router to default setting 6 How to reset to default? 1. Ensure the WiFi Mobile Router is powered on 2.
  • Page 58: Appendix A. Spec Summary Table

    Appendix A. Spec Summary Table Device Interface CDM530AM-002 Wireless WAN USB 2.0 for external HSPA modem Ethernet WAN/LAN RJ-45 port, 10/100Mbps, WAN/LAN Configurable Antenna PIFA internal antenna WPS Button For WPS connection/ Wifi On-Off Reset Button Reset router setting to factory default...
  • Page 59: Appendix B. Licensing Information

    Appendix B. Licensing information This product includes copyrighted third-party software licensed under the terms of the GNU General Public License. Please refer to the GNU General Public License below to check the detailed terms of this license. The following parts of this product are subject to the GNU GPL, and those software packages are copyright by their respective authors.
  • Page 60 GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it.
  • Page 61 GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program"...
  • Page 62 a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange;...
  • Page 63 integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.

Table of Contents