Index 1 Getting Started ..........................4 Welcome to the CPE ....................4 Computer Configuration Requirements ..............4 Logging In to the Web Management Page ..............4 Overview ........................... 6 Viewing Current Connection ..................6 Viewing LTE Status ..................... 6 Viewing WAN Status ....................6 Statistics ............................
Page 3
5.6 VPN ............................37 5.7 IPv6 ............................38 Status ............................38 IPv6 WAN Settings ........................39 IPv6 LAN Settings ........................39 5.8 System ............................39 5.8.1 Maintenance ........................39 Reboot ..........................39 Reset ..........................40 Backup Configuration File ....................40 Upload Configuration File ....................
1 Getting Started 1.1 Welcome to the CPE In this document, the LTE (Long Term Evolution) CPE (customer premises equipment) will be replaced by the CPE. Carefully read the following safety symbols to help you use your CPE safely and correctly: Additional information Optional methods or shortcuts for an action Potential problems or conventions that need to be specified...
Page 5
Launch Internet Explorer, enter http://192.168.0.1 in the address bar, and press Enter. As shown in Figure 1-1. Figure 0-1 Enter the user name and password, and click Log In. You can log in to the web management page after the password is verified. As shown in Figure 1-2.
2 Overview 2.1 Viewing Current Connection To view the current connection, perform the following steps: Choose Overview; In the Current Connection area, view the connection status, such as DL/UL Data Rate and Online time. As shown in Figure 2-1. 2.2 Viewing LTE Status To view the LTE network status, perform the following steps: Choose Overview;...
Page 7
DNS Server and so on. As shown in Figure 2-4. Figure 2-4...
3 Statistics 3.1 Viewing CPU Usage To view the CPU usage, perform the following steps: Choose Statistics; In the CPU Usage area, view the CPU usage information, such as Current CPU usage, Max CPU usage, Min CPU usage. As shown in Figure 3-1. Figure 3-1 3.2 Viewing Memory Usage To view the memory usage, perform the following steps:...
Figure 3-2 3.3 Viewing APN List To view the APN list, perform the following steps: 1. Choose Statistics; In the APN List, view the information about APN information. As shown in Figure 3-3. Figure 3-3 3.4 Viewing Throughput Statistics To view the Throughput Statistics, perform the following steps: Choose Statistics;...
4 Update 4.1 Version Manager This function enables you to upgrade the software version of the CPE to the latest version. It is recommended that you upgrade the software because the new version, certain bugs have been fixed and the system stability is usually improved. Viewing Version Info To view the version info, perform the following steps: Choose Update>Version Manager.
Click Open. The dialog box choses. The save path and name of the target software version file are displayed in the Update file field. Click Submit. The software upgrade starts. After the upgrade, the CPE automatically restarts and runs the new software version.
5 Settings 5.1 Viewing the Device Information To view the System Information, perform the following steps: Choose Settings; In the System Information area, view the system status, such as Running time. As shown in Figure 5-1. Figure 5-1 Viewing the Version Information To view the Version Information, perform the following steps: Choose Settings;...
In the LAN Status area, view the LAN status, such as Mac address, IP address and Subnet mask. As shown in Figure 5-4. Figure 5-4 5.2 Viewing Network Network Mode To set the network mode, perform the following steps: Choose Network >WAN Settings; In the Network Mode area, select a mode between NAT and ROUTER;...
Page 16
Figure 5-7 Connect Method Setting To set the connect method, perform the following steps: Choose Network > LTE Settings; In the Setting area, Select a connect method between Auto and Manual. As shown in Figure 5-8. Figure 5-8 Auto Connect LTE Network To set the CPE automatically connect to the internet, perform the following steps: Choose Network >...
Page 17
Figure 5-9 Manual Connect Mobile Network To set the mobile network manual connect to the internet, perform the following steps: Choose Network > LTE Settings; In the Setting area, set the connect method as Manual, when the LTE network is ready, you can set the CPE connect to the LTE network or disconnect from the LTE network.
Scan Mode To set the lte network scan mode, perform the following steps: choose Network>Scan mode; You can choose full mode, a band the CPE supported Click Submit. Setting Frequency (Earfcn) To set the frequency, perform the following steps: 1 Choose Network>Scan Mode. 2 In the Scan Mode area, choose Frequency Lock.
Figure 5-12 PIN Management To manage the PIN, you can perform the following operations on the PIN Management page: Enable or disable the PIN verification. Verify the PIN. Change the PIN. Set automatic verification of the PIN. As shown in Figure 5-13 Figure 5-13 Viewing the Status of the USIM Card To view the status of the USIM card, perform the following steps:...
Page 20
1 Choose Network >PIN Management. 2 View the status of the USIM card in the USIM card status field. Enabling PIN Verification To enable PIN verification, perform the following steps: 1 Choose Network >PIN Management. 2 Set PIN verification to Enable. 3 Enter the PIN (4 to 8 digits) in the Enter PIN box.
Verifying the PUK If PIN verification is enabled and the PIN fails to be verified for three consecutive times, the PIN will be locked. In this case, you need to verify the PUK and change the PIN to unlock it. To verify the PUK, perform the following steps: Choose Network>...
LAN Setting Setting LAN Host Parameters By default, the IP address is 192.168.0.1 with a subnet mask of 255.255.255.0. You can change the host IP address to another individual IP address that is easy to remember. Make sure that IP address is unique on your network.
value. Click Submit. As shown in Figure 5-15. Figure 5-15 DMZ Settings If the demilitarized zone (DMZ) is enabled, the packets sent from the WAN are directly sent to a specified IP address on the LAN before being discarded by the firewall. To set DMZ, perform the following steps: Choose Network >...
Figure 5-18 Static Route Add Static Route To add a static route, perform the following steps: Choose Network Setting>Static Route. Click Add list. Set the Dest IP address and Subnet mask. Select an Interface from the drop-down list. If you select LAN as the interface, you need set a Gateway. Click Submit.
To modify an access restriction rule, perform the following steps: Choose Firewall>Static Route. Choose the item to be modified, and click Edit. Repeat steps 3 through 5 in the previous procedure. Click Submit. As shown in Figure 5-20. Figure 5-20 Delete Static Route To delete a static route, perform the following steps: Choose Firewall>Static Route.
Figure 5-30 If you choose enable the firewall, you can modify the configuration about firewall, such as Mac filter, IP filter, URL filter and so on. If you choose disable, you can’t modify any configurations about the firewall. MAC Filtering This page enables you to configure the MAC address filtering rules.
Page 27
Set Allow access network within the rules. Click Submit. As shown in Figure 5-33. Figure 5-43 Setting Deny access network within the rules To set deny access network within the rules, perform the following steps: Choose Firewall>MAC Filtering. Set Deny access network within the rules. Click Submit.
Page 28
Figure 5-36 Modifying MAC Filtering rule To modify a MAC address rule, perform the following steps: Choose Firewall>MAC Filtering. Choose the rule to be modified, and click Edit. Set MAC address. Click Submit. As shown in Figure 5-36. Figure 5-37 Deleting MAC Filtering rule To delete a MAC address filter rule, perform the following steps: Choose Firewall>MAC Filtering.
IP Filtering Data is filtered by IP address. This page enables you to configure the IP address filtering rules. Enabling IP Filtering To enable IP Filtering, perform the following steps: Choose Firewall>IP Filtering. Set IP Filtering Enable. Click Submit. As shown in Figure 5-38. Figure 5-39 Disabling IP Filtering To disable IP Filtering, perform the following steps:...
Page 30
Figure 5-11 Setting Deny access network outside the rules To set allow access network, perform the following steps: Choose Firewall>IP Filtering. Set Deny access network outside the rules. Click Submit. As shown in Figure 5-41. Figure 5-12 Adding IP Filtering rule Add an IP address filtering rule, perform the following steps: Choose Firewall>IP Filtering.
Page 31
Figure 5-13 Modifying IP Filtering rule To modify an IP filtering rule, perform the following steps: Choose Firewall > IP Filtering. Choose the rule to be modified, and click Edit. Repeat steps 3 through 9 in the previous procedure. Click Submit. As shown in Figure 5-43. Figure 5-14 Deleting IP Filtering rule To delete an IP address filtering rule, perform the following steps:...
Figure 5-15 URL Filtering Data is filtered by uniform resource locator (URL). This page enables you to configure URL filtering rules. Enabling URL Filtering To enable URL Filtering, perform the following steps: Choose Firewall>URL Filtering. Set URL Filtering to Enable. As shown in Figure 5-45.
Figure 5-18 Modify URL Filtering list To modify a URL filtering rule, perform the following steps: Choose Firewall>URL Filtering. Choose the rule to be modified, and click Edit. Set URL address. Click Submit. As shown in Figure 5-48. Figure 5-19 Deleting URL Filtering list To delete a URL list, perform the following steps: Choose Firewall>URL Filtering.
Page 34
To add a port forwarding rule, perform the following steps: Choose Firewall > Port Forwarding. Click Add list. Set Service. Set Protocol. Set Remote port range. The port number ranges from 1 to 65535. Set Local host. This IP address must be different from the IP address that is set on the LAN Host Settings page, but they must be on the same network segment.
Page 35
Figure 5-22 Deleting Port Forwarding rule To delete a port forwarding rule, perform the following steps: Choose Firewall > Port Forwarding. Choose the item to be deleted, and click Delete. As shown in Figure 5-52. Figure 5-23 Access Restriction Figure 5-53...
Add Access Restriction To add a access restriction rule, perform the following steps: Choose Security>Access Restriction. Click Add list. Set Access Restriction to Enable. Set Access Restriction Name. Set Device MAC address or IP address. Set Weekdays and time. Click Submit. Modify Access Restriction To modify a access restriction rule, perform the following steps: Choose Security>Access Restriction.
Figure 5-24 On this page, you can enable or disable the Denial of service (DoS) function. 1 Choose Firewall > DoS. 2 Set UPnP to Enable. 3 Click Submit. As shown in Figure 5-55. Figure 5-255 5.6 VPN This function enables you to connect the virtual private network (VPN). To connect the VPN, perform the following steps: Choose VPN.
Figure 5-55 5.7 IPv6 Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP). Every device on the Internet is assigned a unique IP address for identification and location definition. Status The status page shows IPv6 information. As shown in Figure 5-56. Figure 5-56...
IPv6 WAN Settings In this page, user can enable or disable IPv6 function. Meanwhile, user can set WAN Connection Type and the type of DNS.As shown in Figure 5-27 Figure 5-57 IPv6 LAN Settings In this page, user can chose the AutoConfiguration Type. As shown in Figure 5-58. Figure 5-58 5.8 System 5.8.1 Maintenance...
The CPE then restarts. Figure 5-59 Reset This function enables you to restore the CPE to its default settings. To restore the CPE, perform the following steps: Choose System>Maintenance. Click Factory Reset. As shown in Figure 5-60. The CPE is then restored to its default settings. Figure 5-60 Backup Configuration File You can download the existing configuration file to back it up.
Upload Configuration File You can upload a backed up configuration file to restore the CPE. To do so: Choose System>Maintenance. Click Browse on the Maintenance page. In the displayed dialog box, select the backed up configuration file. Click Open. The dialog box choses. In the box to be right of Configuration file, the save path and name of the backed up configuration file are displayed.
Figure 5-63 5.8.3 Date & Time You can set the system time manually or synchronize it with the network. If you select Sync from network, the CPE regularly synchronizes the time with the specified Network Time Protocol (NTP) server. If you enable daylight saving time (DST), the CPE also adjusts the system time for DST. To set the date and time, perform the following steps: 1.
Page 43
Figure 5-64 To synchronize the time with the network, perform the following steps: 1. Choose System > Date & Time. 2. Select Sync from network. 3. From the Primary NTP server drop-down list, select a server as the primary server for time synchronization.
Figure 5-66 The CPE will automatically provide the DST time based on the time zone. 5.8.4 DDNS Dynamic Domain Name Server (DDNS) service is used to map the user's dynamic IP address to a fixed DNS service. To configure DDNS settings, perform the following steps: 1.
Figure 5-67 5.8.5 Diagnosis If the CPE is not functioning correctly, you can use the diagnosis tools on the Diagnosis page to preliminarily identify the problem so that actions can be taken to solve it. Ping If the CPE fails to access the Internet, run the ping command to preliminarily identify the problem. To do so: Choose System>Diagnosis.
Figure 5-68 Traceroute If the CPE fails to access the Internet, run the Traceroute command to preliminarily identify the problem. To do so: Choose System>Diagnosis. In the Method area, select Traceroute. Enter the domain name in the Target IP or domain field. For example, www.google.com. Set Maximum hops ad Timeout.
Figure 5-69 5.8.6 Port Mirror Port mirroring is used on a network switch to send a copy of network packets seen on one switch port.To do so: Choose System>Port Mirror. Enable Port Mirror. Select the WAN Interface which you want a copy. Type the Monitor IP, where the copy will send to.
5.8.7 Syslog The syslog record user operations and key running events. Local To set the syslog to local, perform the following steps: Choose System>Syslog. In the Setting area, set the method to Local. In the Level drop-down list, select a log level. Click Submit.
In the Level drop-down list, select a log level. In the Forward IP address box, set a IP address. Click Submit. As shown in Figure 5-72. The syslog will transmit to some client to display through network. Figure 5-72 5.8.8 WEB Setting To configure the parameters of WEB, perform the following steps: Choose System>...
Figure 5-73 5.8.9 Account This function enables you to change the login password of the user. After the password changes, enter the new password the next time you login. To change the password, perform the following steps: Choose System>Account. Select the user name, if you want to change the password of normal user, you need to set Enable User enable.
Figure 5-74 5.8.10 Logout To logout the web management page, perform the following steps: Choose System and click Logout It will back to the login page.
6 FAQs The POWER indicator does not turn on. Make sure that the power cable is connected properly and the CPE is powered on. Make sure that the power adapter is compatible with the CPE. Fails to Log in to the web management page. ...
Page 53
FCC Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: 1) This device may not cause harmful interference, and 2) This device must accept any interference received, including interference that may cause undesired operation. Note: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules.
Need help?
Do you have a question about the CP880-B LTE CPE and is the answer not in the manual?
Questions and answers