Table of Contents Chapter 1: Introduction ..........................1 Introduction to your Router ........................1 Features & Specifications ........................3 Hardware Specifications ......................... 6 Application Diagram ..........................7 Chapter 2: Product Overview ........................8 Important Note for Using This Router...................... 8 Device Description ..........................
Page 3
Wireless 5G ............................. 70 Wireless 5G MAC Filter ........................... 74 Loopback ..............................75 Dual WAN ..............................76 General Setting ............................76 Outbound Load Balance .......................... 79 Protocol Binding ............................80 Hotspot ................................ 81 General Setting ............................82 Bult-in User Account ..........................84 Authorized of Client ..........................
Page 4
Problems with the Router ......................... 182 Problem with LAN Interface ........................182 Recovery Procedures ..........................182 Appendix: Product Support & Contact ..................... 184...
High Availability BiPAC 4700AZ supports either Giga EWAN or 4G/LTE as the main WAN interface or backup WAN interface. Automatic failover between Giga EWAN and/or 4G/LTE is implemented to assure the always on internet connectivity.
Page 6
it in IPv6 environment no need to change device. The dual-stack protocol implementation in an operating system is a fundamental IPv4-to-IPv6 transition technology. It implements IPv4 and IPv6 protocol stacks either independently or in a hybrid form. The hybrid form is commonly implemented in modern operating systems supporting IPv6.
Features & Specifications • 4G/LTE for high speed mobile broadband connectivity • High performance antenna for increased coverage, signal reception and efficiency • Gigabit Ethernet WAN for Cable/Fiber/xDSL high WAN throughput • Gigabit Ethernet LAN (PoE) • IPv6 ready (IPv4/IPv6 dual stack) •...
Page 8
• DHCPv4/v6 • Universal Plug and Play(UPnP) Compliant • Dynamic Domain Name System(DDNS) • SNTP, DNS proxy • IGMP snooping and IGMP proxy • MLD snooping and MLD proxy • VRRP(Virtual Router Redundancy Protocol) Firewall • Built-in NAT Firewall • Stateful Packet Inspection (SPI) •...
Page 9
Hotspot • Captive Portal: External UAM or Built-in • Authentication: External RADIUS or Built-in Management • Quick Installation wizard • Web-based GUI for remote and local management • Firmware upgrades and configuration data upload and download via web-based GUI • Supports DHCP server / client / relay •...
Hardware Specifications Physical interface • One(1) Embeded 4G/LTE module • One(1) mini-SIM(2FF) card slot • One(1) Gigabit Ethernet WAN for Cable/Fiber/xDSL high WAN throughput • One(1) Gigabit Ethernet LAN with PoE, can obtain power via 802.3at PoE - equipped switch or power injector.
Chapter 2: Product Overview Important Note for Using This Router Do not use the router in high humidity or high temperature. Do not open or repair the case yourself. If the device becomes too hot, turn off the power immediately and have it repaired at a qualified service center.
Device Description Index Item Description WiFi Antenna Manually screw the two supplied wireless antennas (2.4G) tight to the connectors for the 802.11n(2.4GHz). Connectors for 2.4GHz After the device is powered on, press it 6 seconds or above: to restore to factory default settings (this is used when you cannot login to the router, e.g.
Page 14
Insert the mini SIM card (2FF) with the gold contact facing down. Push the mini SIM card (2FF) inwards to eject it SIM Card Slot Warning: Before inserting or removing the SIM card, you must disconnect the router from the power adapter. The single-colour LED behaves as follows: Green Wireless connection established...
Page 15
Index Item Description WiFi Antenna Manually screw the two supplied wireless antennas (5G) tight to the connectors for the 802.11ac(5GHz). Connectors for 5GHz...
The detail instruction in Reset Button Recovery procedures for non-working devices (e.g. after a failed firmware upgrade flash): Please follow the steps, the router’s emergency-reflash web interface will then be accessible via http://192.168.1.1 where you can upload a firmware image to restore the router to a functional state. Please note that the router will only respond with its web interface at this address (192.168.1.1), and will not respond to ping request from your PC or other telnet operations.
Chapter 3: Basic Installation The router can be configured with your web browser. A web browser is included as a standard application in the following operating systems: Windows, Linux, Mac OS, etc. The product provides an easy and user-friendly interface for configuration. PCs must have an Ethernet interface installed properly and be connected to the router either directly or through an external repeater hub, and have TCP/IP installed and configured to obtain an IP address through a DHCP server or a fixed IP address that must be in the same subnet as the router.
Installation Reference IMPORTANT: It is recommended to put the Gigabit PoE Injector on an UPS or Surge Protector. Use the supplied grounding wire to ground your BiPAC 4700ZU/ 4700ZUL ODU is REQUIRED! I. Grounding the BiPAC 4700AZ...
Page 19
II. Insert SIM card 1. Unscrew the cap of SIM card slot. 2. Slide the SIM card with the mental contacts (gold plate) facing down to the SIM slot then push it all the way in until you hear the clicking sound. 3.
Page 20
III. Power on BiPAC 4700AZ Step 1: Assemble M25 cable gland Step 2: Unscrew the LAN (PoE) port and insert the supplied outdoor Ethernet cable (RJ-45) through material A-D, and then connect the RJ-45 Ethernet cable into the LAN (PoE) port.
Cabling One of the most common causes of problems is bad cabling. Make sure that all connected devices are turned on. On the front panel of the product is a bank of LEDs. Verify that the LAN Link and LEDs are lit.
Default Settings Before configuring the router, you need to know the following default settings. Web Interface: (Username and Password) Username: admin Password: admin The default username and password are admin and admin respectively. If you ever forget the username/password to login to the router, you may press the RESET button up to 6 seconds then release it to restore the factory default settings.
Information from Your ISP Before configuring this device, you have to check with your ISP (Internet Service Provider) what kind of service is provided such as 4G/LTE or EWAN(Dynamic IP address, Static IP address, PPPoE Mode).
Chapter 4: Device Configuration Login to your Device Open your web browser, enter the IP address of your router, which by default is 192.168.1.254, and click Go, a user name and password window prompt appears. The default username and password is admin and admin respectively for the Administrator. Congratulations! You have successfully logged on to your Industrial LTE Router !
Page 25
Once you have logged on to your Industrial LTE Router via your web browser, you can begin to set it up according to your requirements. On the configuration homepage, the left navigation pane links you directly to the setup page, which includes: Status(Device Info, System Status, System Log, 4G/LTE Status, Wireless Status, Hotspot Status, Statistics, DHCP Table, IPSec Status, PPTP Status, L2TP Status, GRE Status, OpenVPN Status, ARP Table, VRRP Status)
Status In this section, you can check the router working status, including Device Info, System Status, System Log, 4G/LTE Status, Wireless Status, Hotspot Status, Statistics, DHCP Table, IPSec Status, PPTP Status, L2TP Status, GRE Status, OpenVPN Status, ARP Table, VRRP Status.
Device Info It contains basic information of the device. Device Information Model Name: Show model name of the router Firmware Version: This is the Firmware version MAC Address: This is the MAC Address Date Time: The current date and time. System Up Time: The duration since system is up.
Page 28
IP Address: LAN IP address. Subnet Mask/Prefix Length: Subnet mask for IPv4 or Prefix length for IPv6 on LAN.. DHCP Server: LAN port DHCP information. Wireless 2.4G/ Wireless 5G Mode: The wireless mode in use. SSID: The SSID. Channel: The current channel. Security: The wireless security setting, authentication type.
System Status System status displays the current system (CPU and Memory) loading. CPU Usage: To show the current CPU Usage. Memory Total: To show the total memory of the system in KB. Memory Free: To show the current free memory or avalavle memory in KB. Memory Cached: To show the cache memory in KB.
System Log In system log, you can check the operations status and any glitches to the router. Refresh: Press this button to refresh the statistics. Backup: Back up the current system log file and save it to your computer.
4G/LTE Status This page contains 4G/LTE connection information. Status: The current status of the 4G/LTE connection. Signal Strength: The signal strength bar and dBm value indicates the current 4G/LTE signal strength. The front panel 4G/LTE Signal Strength LED indicates the signal strength as well. Signal Information: Shows important LTE signal parameters such as RSRP (Reference Signal Receiving Power), RSRQ (Reference Signal Receiving Quality), SINR (Signal to Interference plus Noise Ratio).
Page 32
Billing period: The lasting days since the biling begins each month(the beginning day counted). Clean: To clear the usage statistics. Save: Press to save the usage statistics to FLASH, else the usage will be cleared after reboot. Refresh: Press this button to refresh the statistics.
Wireless Status This page contains wireless connection information. MAC: The MAC address of wireless client. SSID Index: The SSID index which wireless client connects to. RSSI: The received signal strength indication. Connected Time: Connection time of wireless client connects to router.
Hotspot Status The Hotspot status shows each hotspot client’s connection status/information. MAC Address: The MAC of the currently active client or the client attepting to connect in. IP Address: The IP assigned to the client. Authenticated: Show the client is authorized or not. User Name: The username of the logined client;...
Statistics 4G/LTE Interface: List all available network interfaces in the router. You are currently checking on the physical status of 4G/LTE interface. Transmit Frames of Current Connection: This field displays the total number of 4G/LTE frames transmitted until the latest second for the current connection. Transmit Bytes of Current Connection: This field shows the total bytes transmitted till the latest second for the current connection for the current connection.
Page 36
EWAN Interface: List all available network interfaces in the router. You are currently checking on the physical status of the EWAN port. Transmit Frames: This field displays the total number of frames transmitted until the latest second. Transmit Multicast Frames: This field displays the total number of multicast frames transmitted till the latest second.
Page 37
Ethernet Interface: List all available network interfaces in the router. You are currently checking on the physical status of the Ethernet port. Transmit Frames: This field displays the number of frames transmitted until the latest second. Transmit Multicast Frames: This field displays the number of multicast frames transmitted until the latest second.
Page 38
Wireless 2.4G Interface: List all available network interfaces in the router. You are currently checking on the physical status of the Wireless. Transmit Frames: This field displays the number of frames transmitted until the latest second. Transmit Error Frames: This field displays the number of error frames transmitted until the latest second.
Page 39
Wireless 5G Interface: List all available network interfaces in the router. You are currently checking on the physical status of the Wireless. Transmit Frames: This field displays the number of frames transmitted until the latest second. Transmit Error Frames: This field displays the number of error frames transmitted until the latest second.
DHCP Table DHCP table displays the devices connected to the router with clear information. Index: The index identifying the connected devices. Host Name: Show the hostname of the PC. IP Address: The IP allocated to the device. MAC Address: The MAC of the connected device. Expire Time: The total remaining interval since the IP assignment to the PC.
IPSec Status Index: The IPSec tunnel index number. Action: Connect or Drop the connection. Connection Name: User-defined IPSes VPN connection name. Active: Show if the tunnel is active for connection. Connection State: Show the IPSec phase 1 and phase 2 connecting status. Statistics: Display the upstream/downstream traffic per session in KB.
PPTP Status Index: The PPTP server tunnel index number. Connection Name: Show user-defined PPTP VPN connection name. Active: Show if the tunnel is active for connection. Connection State: Show the connecting status. Connection Type: Remote Access or LAN to LAN. Assigned IP Address: Show the IP assigned to the client by PPTP Server.
L2TP Status Index: The L2TP tunnel index number. Connection Name: Display the user-defined L2TP connection name. Active: Show if the tunnel is active for connection. Connection State: Show the connecting status. Connection Mode: The L2TP mode is dialin or dialout. Connection Type: Remote Access or LAN to LAN.
GRE Status Index: The GRE tunnel index number. Connection Name: Display the user-defined GRE connection name. Active: Show if the tunnel is active for connection. Remote Gateway IP: The IP of the remote GRE gateway. Remote Network: Display the remote network. Refresh: Click this button to refresh the connection status.
OpenVPN Status Index: The index to identify the OpenVPN connection/rule. Connection Name: User-defined name to mark the connection/rule. Active: Yes or no to demosntrate the rule is active or not. Service Port: Show the service port/protocl. Tunnel Network: The virtual tunnel subnet of the server. Status: The status of the rule.
ARP Table This section displays the router’s ARP (Address Resolution Protocol) Table, which shows the mapping of IP addresses to Ethernet MAC addresses. Index: The Index of the ARP rule item. IP Address: Shows the IP Address of the device that the MAC address maps to. MAC Address: Shows the MAC address that is corresponded to the IP address of the device it is mapped to.
Quick Start This is a useful and easy utility to help you to setup the router quickly and to connect to your ISP (Internet Service Provider) with only a few steps. It will guide you step by step to setup password, time zone, and WAN settings of your device.
Page 49
Step 4 – ISP Connection Type Set up your Internet connection. 4.1 Select an appropriate WAN connection protocol then click Next to continue. Input all relevant 3G/4G-LTE parameters from your ISP. 4.2 If selected EWAN If selected PPPoE, please enter PPPoE account information provided by your ISP. Click Next to continue.
Page 50
Step 5 – Quick Start Completed The Setup Wizard has completed. Click on Back to modify changes or mistakes. Click Next to save the current settings. Step 6 – Quick Start Completed...
Configuration Click to access and configure the available features in the following: Interface Setup, Dual WAN, Hotspot, Advanced Setup, VPN, Access Management, and Maintenance. These functions are described in the following sections.
Internet 4G/LTE Status: Choose Activated to enable the 3G/4G-LTE connection. Usage Allowance: to control 4G/LTE flow, click it to further configure about 4G/LTE flow control, refer to the following Usage Allowance for more information. LTE PCI Lock: Choose whether to lock to a specified PCI(Physical Cell Identifier). Users must know the target PCI or else ignore this setting.
Page 54
APNs varies between different service providers. Most service providers have an internet portal which they use to connect to a DHCP Server, thus giving you access to the internet i.e. some 3G operators use the APN ‘internet’ for their portal. The default value is internet. PDN Type: Select the supported IP version, IPv4, Both IPv4/IPv6 or IPv6 only.
Page 55
LTE PCI Lock: If an advanced user wants to lock to a designated PCI, please set the physical cell ID here. PLMN Selection: PLMN(Public Land Mobile Network) is a network that is established and operated by a mobile service provider. Each operator providing mobile services has its own PLMN identified by PLMN ID( MCC / MNC, digital sequence, no more than 6 digits) which is made up of MCC(Mobile Country Code) and MNC(Mobile Network Code).
Page 57
Status: Select whether to enable the service. IPv4/IPv6 IP Version: Choose IPv4, IPv4/IPv6, IPv6 based on your environment. If you don’t know which one to choose from, please choose IPv4/IPv6 instead. ISP Connection Type: ISP: Select the encapsulation type your ISP uses. ...
Page 58
your PC gets a public WAN IP working in the internet. But if your PC is connected to the router working as a DHCP client, in this mode, the device acts as a NAT router. Connection Setting Connection: Always On: Click on Always On to establish a PPPoE session during start up and to automatically re-establish the PPPoE session when disconnected by the ISP.
Page 59
RIP Version: (Routing Information protocol) Select this option to specify the RIP version, including RIP-1, RIP-2. RIP Direction: Select this option to specify the RIP direction. None is for disabling the RIP function. Both means the router will periodically send routing information and accept routing information then incorporate into routing table.
A Local Area Network (LAN) is a shared communication system to which many computers are attached and is limited to the immediate area, usually the same building or floor of a building.
Page 61
IPv4 Parameters IP Address: Enter the IP address of Router in dotted decimal notation, for example, 192.168.1.254 (factory default). IP Subnet Mask: The default is 255.255.255.0. User can change it to other such as 255.255.255.128. Alias IP Address: This is for local networks virtual IP interface. Specify an IP address on this virtual interface.
Page 62
Physical Ports: To determine which port(s) is/are subject to the DHCP address assignment by DHCPv4 server. DNS Relay Select Automatically obtained or Manually set (if selected. Please set the exactly information). Primary DNS Server: Enter the IP addresses of the DNS servers. The DNS servers are passed to the DHCP clients along with the IP address and the subnet mask.
Page 63
link, while hosts generate an interface identifier that uniquely identifies an interface on a subnet. An address is formed by combining the two. When using stateless configuration, you needn’t configure anything on the client. Stateful configuration, for example using DHCPv6 (which resembles its counterpart DHCP in IPv4.) In the stateful auto configuration model, hosts obtain interface addresses and/or configuration information and parameters from a DHCPv6 server.
Wireless 2.4G This section introduces the wireless LAN and some basic configurations. Wireless LANs can be as complex as a number of computers with wireless LAN cards communicating through access points which bridge network traffic to the wired LAN.
Page 65
Access Point Settings Access Point: Default setting is set to Activated. If you want to close the wireless interface, select Deactivated. AP MAC Address: The MAC address of wireless AP. Wireless Mode: The default setting is 802.11b+g+n (Mixed mode). If you do not know or have both 11g and 11b devices in your network, then keep the default in mixed mode.
Page 66
11n Settings Channel Bandwidth: Select either 20 MHz or 20/40 MHz for the channel bandwidth. The wider the Channel bandwidth the better the performance will be. Guard Interval: Select either 400nsec or 800nsec for the guard interval. The guard interval is here to ensure that data transmission do not interfere with each other.
Page 67
greatly simplifies the steps needed to create a Wi-Fi network for a residential or an office setting. WPS supports 2 types of configuration methods which are commonly known among consumers: Method & Method. Use WPS: Enable this feature by choosing the YES radiobutton. WPS State: Display whether the WPS is configured or unconfigured.
Page 68
WPA-PSK, WPA2-PSK, Mixed WPA2/WPA-PSK WPA Algorithms: TKIP (Temporal Key Integrity Protocol) or AES (Advanced Encryption System) utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers. Pre-Shared key: The key for network authentication. The input format should be 8-63 ASKII characters or 64 hexadecimal characters Key Renewal Interval: The time interval for changing the security key automatically between wireless client and AP.
Page 69
Example: Wi-Fi Protected Setup (WPS) I: PIN Method: Configure AP as Registrar 1. Jot down the client’s Pin (e.g. 04640776). 2. Enter the Enrollee (Client) PIN code and then press Start WPS. 3. Launch the wireless client’s WPS utility. Set the Config Mode as Enrollee, press the WPS button on the top bar, select the AP (e.g.
Page 71
Example: Wi-Fi Protected Setup (WPS) II: PIN Method: Configure AP as Enrollee 1. Jot down the WPS PIN (e.g. 07966170). Press Start WPS. 2. Launch the wireless client’s WPS utility. Set the Config Mode as Registrar. Enter the PIN number in the PIN Code column then choose the correct AP (e.g.
Page 72
4. Now to make sure that the setup is correctly done, cross check to see if the SSID and the security setting of the registrar setting match with the parameters found on both Wireless Configuration and Wireless Security Configuration page.
Wireless 2.4G MAC Filter The MAC filter screen allows you to configure the router to give exclusive access to up to 8 devices (Allow Association) or exclude up to 8 devices from accessing the router (Deny Association). Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:AA:BB:00:00:02.
Wireless 5G BiPAC 4700AZ is a simultaneous dual-band (2.4G and 5G) wireless router support 11b/g/n/a/ac wireless standards. It allows multiple wireless users on 2.4G and 5G radio bands to surf the Internet. You can choose the optimum radio band wireless connection base on your environment.
Page 75
Access Point Settings Access Point: Default setting is set to Activated. If you want to close the wireless interface, select Deactivated. AP MAC Address: The MAC address of wireless AP. Channel: The range of radio frequencies used by IEEE 802.11b/g/n wireless devices is called a channel.
Page 76
WPS (Wi-Fi Protected Setup) feature is a standard protocol created by Wi-Fi Alliance. This feature greatly simplifies the steps needed to create a Wi-Fi network for a residential or an office setting. WPS supports 2 types of configuration methods which are commonly known among consumers: Method &...
Page 77
WDS (Wireless distributed system) is a wireless access point mode that enables wireless link and communication with other access point. It is easy to be installed, just define the peer’s MAC of the connected AP. WDS Mode: select Activated to enable WDS feature and Deactivated to disable this feature. MAC Address: Enter the AP MAC addresses (in XX:XX:XX:XX:XX:XX format) of the peer connected...
Wireless 5G MAC Filter The MAC filter screen allows you to configure the router to give exclusive access to up to 8 devices (Allow Association) or exclude up to 8 devices from accessing the router (Deny Association). Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:AA:BB:00:00:02.
Loopback Lookback interface is a widely known virtual interface on routers which is highly robust and always up, not like physical interfaces which disconnect every now and then. The lookback interface can have its own IP and subnet mask. It is often used for router management as Telnet management IP and involved in BGP as BGP Update-Source, involved in OSPF as Router ID.
Dual WAN Dual WAN is specially designed to offer users failover/fallback. Auto failover/failback is to ensure an always-on internet connection. Users can set a WAN1 (main WAN) and WAN 2 (backup WAN), and when WAN1 fails, it will switch to WAN2, and when WAN1 restores, it will switch to WAN1 again.
Page 81
Failover & Failback WAN Port Service Detection Policy WAN1: Select EWAN or 4G/LTE for WAN1 (The main WAN). WAN2: Select the 4G/LTE for WAN2 as backup port if you select EWAN as WAN1. Keep Backup Interface Connected: Select if to keep backup WAN interface connected to the internet.
Page 82
Load Balance WAN Port Service Detection Policy WAN1: Select 4G/LTE or EWAN for WAN1. WAN2: Select the EWAN if you select 4G/LTE as WAN1. Service Detection: Select if to keep detecte WAN interface connected. If enable the setting, the traffic will be automatically through another WAN if the WAN interface is disconnected.
Outbound Load Balance The connections are distributed over WAN1 and WAN2 so that it can utilize bandwidth of both WAN ports. With Outbound load balance, traffic may be routed to a faster link when one of the WAN is slower or congested so that user gains better throughput and less delay. User can distribute outbound traffic based on Session Mechanism or IP Hash Mechanism.
Protocol Binding Protocol Binding lets you direct specific traffic to go out from a specific WAN port. Policies determine how specific types of internet traffic are routed, for example, traffic from a particular IP(es) granted access to only one WAN port rather than using both of the WAN ports as with load balancing. Rule Index: The index marking the rule.
A hotspot is usually a public localtion(coffee shops, airports, etc) where people obtain internet access typically using WiFi technology. The Billion Industrial LTE Router HotSpot Gateway provides authentication for clients before access to public networks. It also allows users to access some web pages without authentication using Walled Garden feature.
General Setting This section is to setup setup HotSpot server on a router and authentication medthods, session settings. General Setting: Hotsport: Activate or Deactivate Hotspot feature. Interface: Determine which SSID is configured as a Hotspot. Industrial LTE Router has 4 virtual SSIDs.
Page 87
internet. Agreement: when ageeemnt is selected, client doesn’t need an account to access internet. Open your brower, the hotspot guide page directly appears. Redirection on successful authentication to: Set the URL to be redirected to. Capitive Portal: Captive Portal is primarily used in open networks like hotspots, and is commonly a landing or log-in page displayed to newly connected users informing them of the conditions (typically his username and password) of access as to control and manage user access.
Bult-in User Account This part is to configure the account database for Built-in UAM Server. Up to 16 accounts can be created. Rule Index: 1-16, the valid user identifier index. User Name/Password: Enter the username /password for each valid user.
Authorized of Client It is for priority(trusted) client for whom authentication is not needed to internet access. Also they can enjoy unlimited Upload/Download Bandwidth. These privilegd clients can be added by MACs. Authorized of Client: Activate or Deactivate the feature. Rule Index: 1-16 trusted users can be added, each identified by a rule index.
Walled Garden It allows users to access some web pages (listed in the Walled Garden List) without authentication. Rule Index: 1-48 different domain names or IP addresses can be added. Active: Select Yes to activate the rule. If activated, the domain name or IP will be open without authentication to access.
Advertisement This part is for propaganda purpose for some website after successfully logged in. Advertisement: Activate or deactivate the Advertisement feature. Mode: The mode the propaganda advertisement is shown in. Rule Index: The rule index identifying the URL, 1-15 URLs can be created. Active: Select Yes to activate the rule.
Session Log Session Log periodically records session information and mails it to hotspot manager helped by Mail Alert. How often to record the session log and to mail can be set here. Session Log: Activate session log or not. Log Session data every: Set how often to record the session log. By default, session log records every 1 minutes.
Customization Customization allows users to customize their desired authenticate page strings, if not, default settings are showed on the authentication page. Places where strings are to be shown are listed in the following screenshots in red rectangle, please check where to change.
Page 94
Using Built-in UAM server 1. Login to the LTE Router and move to Configuration > Interface Setup > Wirelss to set the SSID1(hotspot is running on SSID1(WLAN1)). Change SSID to Billion-Hotspot and set Security Type to Open. 2. Move to Configuration > Hotspot > General Setting to set Hotspot Interface, Captive Portal, Authentication and Session Control Setting.
Page 95
If the Authentication Method is Built-in User Account for authtication, create a valid client account. Wireless Client Connection: 1. Connect to the SSID(M500-Hotspot) on the laptop. 2. Launch the web brower, the hotspot welcome and authentication page pops up. 3. Input correct Username and Password then loging successfull.
Page 97
(e.g. Socifi - http://www.socifi.com/) 1. Login to the LTE Router and move to Configuration > Interface Setup > Wirelss to set the SSID1(hotspot is running on SSID1(WLAN1)). Change SSID to Billion-Hotspot and set Security Type to Open. 2. Move to Configuration > Hotspot > General Setting to set Hotspot Interface, Captive Portal, Authentication and Session Control Setting.
Page 98
4. Add a new hotspot to SOCIFI dashboard. (https://socifi-doc.atlassian.net/wiki/display/SC/Billion+M500+4G+LTE)
Page 99
Wireless Client Connection: 1. Connect to the SSID(Billion-Hotspot) on the smart phone. 2. Launch the web browser, the hotspot welcome and authentication page pops up.
Advanced Setup Advanced Step provides advanced features including Firewall, Routing, Dynamic Routing, NAT, VRRP, Static DNS, Time Schedule and Mail Alert for advanced users.
Firewall Your router includes a firewall for helping to prevent attacks from hackers. In addition to this, when using NAT (Network Address Translation) the router acts as a natural Internet firewall, since all PCs on your LAN use private IP addresses that cannot be directly accessed from the Internet. Firewall: To automatically detect and block Denial of Service (DoS) attacks, such as Ping of Death, SYN Flood, Port Scan and Land Attack.
Routing This is static route feature. You are equipped with the capability to control the routing of all the traffic across your network. With each routing rule created, user can specifically assign the destination where the traffic will be routed to. Index: Item number Destination IP Address: IP address of the destination network Subnet Mask: The subnet mask of destination network.
Dynamic Routing OSPF Open Shortest Path First (OSPF) is a most widely used interior gateway protocil (IGP) for Internet Protocol (IP) networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). OSPF allows collections of rotuers to be grouped together.
Page 105
Border Gateway Protocol (BGP) is a standardized exterior gateway protocol (an uniquely TCP basded inter-Autonomous System routing protocol) designed to allow setting up an inter-domain dynamic routing system that automatically updates routing tables of devices running BGP in case of network topology changes.
The NAT (Network Address Translation) feature transforms a private IP into a public IP, allowing multiple users to access the internet through a single IP account, sharing the single IP address. NAT break the originally envisioned model of IP end-to-end connectivity across the internet so NAT can cause problems where IPSec/ PPTP encryption is applied or some application layer protocols such as SIP phones are located behind a NAT.
Page 107
Note: This feature disables automatically if WAN connection is in BRIDGE mode. The DMZ Host is a local computer exposed to the Internet. When setting a particular internal IP address as the DMZ Host, all incoming packets will be checked by the Firewall and NAT algorithms then passed to the DMZ host, when a packet received does not use a port number used by any other Virtual Server entries.
Page 108
Virtual Server Note: This feature disables automatically if WAN connection is in BRIDGE mode. The device can be configured as a virtual server so that remote users accessing services such as Web or FTP services via the public (WAN) IP address can be automatically redirected to local servers in the LAN network.
Page 109
Examples of well-known and registered port numbers are shown below. For further information, please see IANA’s website at http://www.iana.org/assignments/port-numbers Well-known and Registered Ports Port Number Protocol Description FTP Control TCP & UDP SSH Remote Login Protocol Telnet SMTP (Simple Mail Transfer Protocol) TCP &...
Page 110
Example: How to setup Port Forwarding for port 21 (FTP server) If you have a FTP server in your LAN network and want others to access it through WAN. Step 1: Assign a static IP to your local computer that is hosting the FTP server. Step 2: Login to the Gateway and go to Configuration / Advanced Setup / NAT / Virtual Server.
Static DNS The Domain Name System (DNS) is a hierarchical naming system built on a distributed database for computers, services, or any resource connected to the Internet or a private network associates various information with domain names assigned to each of the participating entities. Most importantly, it translates domain names meaningful to humans into the numerical identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide.
Time Schedule The Time Schedule supports up to 16 timeslots which helps you to manage your Internet connection. In each time profile, you may schedule specific day(s) i.e. Monday through Sunday to restrict or allowing the usage of the Internet by users or applications. This Time Schedule correlates closely with router’s time, since router does not have a real time clock on board;...
Mail Alert Mail alert is designed to keep system administrator or other relevant personnel alerted of any unexpected events that might have occurred to the network computers or server for monitoring efficiency. With this alert system, appropriate solutions may be tackled to fix problems that may have arisen so that the server can be properly maintained.
Internet. VPNs provide security through tunneling protocols and security procedures such as encryption. For example, a VPN could be used to securely connect the branch offices of an organization to a head office network through the public Internet. BiPAC 4700AZ supports IPSec, PPTP, L2TP, GRE, OpenVPN for enterprise users.
IPSec Internet Protocol Security (IPSec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. IPsec also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session.
Page 116
IPSec Connection Setting Connection Name: A given name for the connection (e.g. connection to office). Active: Select Yes to activate the tunnel. Interface: Select the set used interface for the IPSec connection, when you select 3G/4G-LTE interface, the IPSec tunnel would via this interface to connect to the remote peer. Remote Gateway IP: The WAN IP address of the remote VPN gateway that is to be connected, establishing a VPN tunnel.
Page 117
Subnet: The subnet of the local network, for establishing an IPSec tunnel between a pair of security gateways (network-to-network), If the remote peer is a network, select Subnet. IPSec Phase 1(IKE) IKE Mode: IKE, Internet Key Exchange, is the mechanism to negotiate and exchange parameters and keys between IPSec peers to establish security associations(SA).
Page 118
Use ESP for greater security so that data will be encrypted and the data origin be authenticated but using AH data origin will only be authenticated but not encrypted. Encryption Algorithm: Select the encryption algorithm from the drop-down menu. There are several options: DES and AES (128, 192 and 256).
Page 119
Please be noted, it must be enabled on the both sites. PING to the IP: It is able to IP Ping the remote PC with the specified IP address and alert when the connection fails. Once alter message is received, Router will drop this tunnel connection. Reestablish of this connection is required.
Page 120
Example: How to establish an IPSec Tunnel 1. LAN-to-LAN connection Two VPN router want to setup a secure IPSec VPN tunnel Note: The IPSec Settings shall be consistent between the two routers.
Page 121
Head Office Side: Item Description Connection Name H-to-B Name for IPSec tunnel Remote Secure Gateway 69.121.1.30 IP address of the Branch office gateway Access Netork Local Access Range Subnet Head Office network Local Netwrok IP Address 192.168.1.0 Local Netwrok Netmask 255.255.255.0 Remote Access Range Subnet...
Page 122
Branch Office Side: Item Description Connection Name B-to-H Name for IPSec tunnel Remote Secure Gateway 69.121.1.3 IP address of the Branch office gateway Access Netork Local Access Range Subnet Head Office network Local Netwrok IP Address 192.168.0.0 Local Netwrok Netmask 255.255.255.0 Remote Access Range Subnet...
Page 123
2. Host to LAN Router servers as VPN server, and host should install the IPSec client to connect to head office through IPSec VPN.
Page 124
Head Office Side: Item Description Connection Name H-to-H Name for IPSec tunnel Remote Secure Gateway 69.121.1.30 IP address of the Branch office gateway Access Netork Local Access Range Subnet Head Office network Local Netwrok IP Address 192.168.1.0 Local Netwrok Netmask 255.255.255.0 Remote Access Range Signal IP...
PPTP Server The Point-to-Point Tunneling Protocol (PPTP) is a Layer2 tunneling protocol for implementing virtual private networks through IP network. In the Microsoft implementation, the tunneled PPP traffic can be authenticated with PAP, CHAP, and Microsoft CHAP V1/V2 . The PPP payload is encrypted using Microsoft Point-to-Point Encryption (MPPE) when using MSCHAPv1/v2.
Page 126
Username: Please input the username for this account. Password: Please input the password for this account. Connection Type: Select Remote Access for single user, Select LAN to LAN for remote gateway. Private IP Address Assigned to Dial-in User: Specify the private IP address to be assigned to dialin clients, and the IP should be in the same subnet as local LAN, but not occupied.
PPTP Client PPTP client can help you dial the PPTP server to establish PPTP tunnel over Internet. A total of 4 sessions can be created for PPTP client. Rule Index: The Index to mark the session. Connection Name: User-defined name for the PPTP connection. Active: Select Yes to activate the account.
Page 128
Active as Default Route: Check to select the tunnel as the default route for traffic. If selected, all outgoing traffic will be forwarded to this tunnel and routed to the next hop. Click Save button to save your changes.
Page 129
Example: PPTP LAN-to-LAN connection The branch office establishes a PPTP VPN tunnel with head office to connect two private networks over the Internet. The routers are installed in the head office and branch offices accordingly. Note: Both office LAN networks must be in different subnets with the LAN-LAN application.
Page 130
Configuring PPTP server in the head office The IP address 192.168.1.2 will be assigned to the router located in the branch office. Please make sure this IP is not used in the head office LAN. Item Description Connection Name HS-LL Give a name of PPTP conneciton Authentication Type MPPE 128bit...
Page 131
Configuring PPTP client in the branch office The IP address 69.121.1.33 is the public IP address of the router located in head office. Item Description Connection Name BC-LL Give a name of PPTP conneciton Authentication Type MPPE 128bit Authentication type Username test Dial in authenticate user name...
Page 132
Example: PPTP Remote Access Dial-in connection A remote worker establishes a PPTP VPN connection with the head office using Microsoft's VPN Adapter. The router is installed in the head office, connected to a couple of PCs and Servers.
Page 133
Configuring PPTP server(dial-in) in the office The input IP address 192.168.1.2 will be assigned to the remote worker. Please make sure this IP is not used in the office LAN. Item Description Connection Name HS-RA Give a name of L2TP conneciton Authentication Type MPPE 128bit Authentication type...
Page 134
Example: PPTP Remote Access Dial-out connection A company’s office establishes a PPTP VPN connection with a file server located at a separate location. The router is installed in the office, connected to a couple of PCs and Servers.
Page 135
Configuring PPTP client(dial-out) in the office The IP address 61.121.1.33 is the public IP address of the router located in head office. Item Description Connection Name HC-RA Give a name of PPTP conneciton Authentication Type MPPE 128bit Authentication type Username test Dial in authenticate user name Passwrod...
L2TP L2TP, Layer 2 Tunneling Protocol is a tunneling protocol used to support virtual private networks (VPNs). It does not provide any encryption or confidentiality by itself; it relies on an encryption protocol that it passes within the tunnel to provide. Note: 8 sessions for dial-in connections and 8 sessions for dial-out connections Rule Index: The Index to mark the session.
Page 137
server. The IP should be in the same subnet as local LAN, and should not be occupied. Connection Mode: Choose Dial Out if you want your router to operate as a client (connecting to a remote L2TP Server, e.g, your office server). Server IP Address: Enter the IP address of your VPN Server.
Page 138
Active as Default Route: Enabled to let the tunnel to be the default route for traffic, under this circumstance, all packets will be forwarded to this tunnel and routed to the next hop. L2TP over IPSec IPSec: This enables L2TP tunnel over IPSec IKE Mode: IKE, Internet Key Exchange, is the mechanism to negotiate and exchange parameters and keys between IPSec peers to establish security associations(SA).
Page 139
Example: L2TP LAN-to-LAN connection The branch office establishes a L2TP VPN tunnel with head office to connect two private networks over the Internet. The routers are installed in the head office and branch office accordingly. Note: Both office LAN networks must be in different subnets with the LAN-LAN application.
Page 140
Configuring L2TP Dial-in in the head office The IP address 192.168.1.200 will be assigned to the router located in the branch office. Please make sure this IP is not used in the head office LAN. Item Description Connection Name HS-LL Give a name of L2TP conneciton Connection Mode Dial in...
Page 141
Configuring L2TP Dial-out in the branch office The IP address 69.1.121.33 is the Public IP address of the router located in head office. Item Description Connection Name BC-LL Give a name of L2TP conneciton Connection Mode Dial out Operate as L2TP client Server IP 69.121.1.33 Dialed server IP...
Page 142
Example: L2TP Remote Access Dial-in connection A remote worker establishes a L2TP VPN connection with the head office using Microsoft's VPN Adapter. The router is installed in the head office, connected to a couple of PCs and Servers.
Page 143
Configuring L2TP VPN Dial-in in the Office The input IP address 192.168.1.200 will be assigned to the remote worker. Please make sure this IP is not used in the Office LAN. Item Description Connection Name HS-RA Give a name of L2TP conneciton Connection Mode Dial in Operate as L2TP server...
Page 144
Example: L2TP Remote Access Dial-out connection A company’s office establishes a L2TP VPN connection with a file server located at a separate location. The router is installed in the office, connected to a couple of PCs and Servers.
Page 145
Configuring L2TP VPN Dial-out in the office Item Description Connection Name HC-RA Give a name of L2TP conneciton Connection Mode Dial out Operate as L2TP client Server IP 61.121.1.33 Dialed server IP Authentication Type Chap/Pap Authentication type Username test Dial out authenticate user name Passwrod test Dial out authenticate user password...
GRE Tunnel Generic Routing Encapsulation (GRE) is a tunneling protocol that can encapsulate a wide variety of network layer protocol packets inside virtual point-to-point links over an IP network. Note: up to 16 tunnels can be added. Rule Index: The Index to mark the session. Connection Name: User-defined name for the connection.
Page 147
Keepalive Interval: Set the keepalive Interval, unit in seconds. Default is 5 seconds. MTU: Maximum Transmission Unit. Active as Default Route: Select if to set the GRE tunnel as the default route. GRE over IPSec IPSec: This enables GRE tunnel over IPSec IKE Mode: IKE, Internet Key Exchange, is the mechanism to negotiate and exchange parameters and keys between IPSec peers to establish security associations(SA).
Page 148
Example: GRE VPN Connection The branch office establishes a GRE VPN tunnel with head office to connect two private networks over the Internet. The routers are installed in the head office and branch office accordingly. Note: Both office LAN networks must be in different subnets with the GRE VPN connection.
Page 149
Configuring GRE connection in the head office The IP address 69.1.121.30 is the Public IP address of the router located in branch office. Item Description Connection Name HS-LL Give a name of GRE conneciton Remote Gateway IP 69.121.1.30 Authentication type Tunnel Local IP Address The local virtual interface IP address for 192.168.100.11...
Page 150
Configuring GRE connection in the branch office The IP address 69.1.121.3 is the Public IP address of the router located in head office. Item Description Connection Name BC-LL Give a name of GRE conneciton Remote Gateway IP 69.121.1.3 Authentication type Tunnel Local IP Address The local virtual interface IP address for 192.168.100.10...
OpenVPN OpenVPN is an open source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It uses a custom security protocol that utilizes SSL/TLS for key exchange.
Page 152
Netmask: Set the tunnel virtual subnet mask. Local Access Range IP Address: Set the local network address. Netmask: Set the local subnet mask. Protocol: OpenVPN can run over User Datagram Protocol (UDP) or Transmission Control Protocol (TCP) transports. Select the protocol. Local Certificate Index: Select the local certificate.
OpenVPN Client The settings of the OpenVPN client should match what’s set on the server side. Note: up to 4 tunnels can be added. Rule Index: The index to identify the OpenVPN connection/rule. Connection Name: user-defined name to mark the connection/rule. Active: Select Yes to activate the rule.
Page 154
Cipher: OpenVPN uses all the ciphers available in the OpenSSL package to encrypt both the data and channels. Select the encryption method. Hash: To establish the integrity of the datagram and ensures it is not tampered with in transmission. There are options: Message Digest 5 (MD5) and Secure Hash Algorithm (SHA1, SHA256). SHA1 is more resistant to brute-force attacks than MD5.
Page 155
Example: OpenVPN VPN Connection The branch office establishes a OpenVPN tunnel with head office to connect two private networks over the Internet. The routers are installed in the head office and branch office accordingly. Note: Both office LAN networks must be in different subnets with the OpenVPN connection.
Page 156
Configuring OpenVPN server in the head office The IP address 69.1.121.30 is the Public IP address of the router located in branch office. The OpenVPN tunnel netwrok virtual interface is 192.168.100.0/24. Item Description Connection Name HS-LL Give a name of GRE conneciton Tunnel Network 192.168.100.0/ The network for tunnel virtual interface.
Page 157
Configuring OpenVPN client in the branch office The IP address 69.1.121.3 is the Public IP address of the router located in head office. Item Description Connection Name BC-LL Give a name of GRE conneciton Server IP Address 69.121.1.3 The IP address of OpenVPN server. 192.168.0.0/ Remote Subnet The remote network.
Access Management Access Management equipments the users with the ability of maintaining the access management, including Device Management, SNMP, Remote Syslog, Universal Plug & Play, Dynamic DNS, Access Control, Packet Filter, CWMP(TR-069) and Parental Control.
Device Management Device Host Name: Host Name: Set the hostname for the device. Embedded Web Server: HTTP Port: The HTTP Port number, change if needed. HTTPS Port: The HTTPS Port number, change if needed. HTTPS Server Certificate Index: Choose the server security certificate. Users need to upload the certificate for the https server.
SNMP Simple Network Management Protocol (SNMP) is a protocol used for exchanging management information between network devices. SNMP is a member of the TCP/IP protocol suite. M100 serves as a SNMP agent which allows a manager station to manage and monitor the router through the network.
Remote Syslog Remote System Log is designed to keep remote administrators informed of the system-operating information. Administrator can set up a remote system log server for receiving and monitoring the system information by enabling remote system log feature on the router. Remote System Log: Select whether to activate Remote System Log.
Universal Plug & Play UPnP offers peer-to-peer network connectivity for PCs and other network devices, along with control and data transfer between devices. UPnP offers many advantages for users running NAT routers through UPnP NAT Traversal, and on supported systems makes tasks such as port forwarding much easier by letting the application control the required settings, removing the need for the user to control advanced configuration of their device.
Dynamic DNS The Dynamic DNS function allows you to alias a dynamic IP address to a static hostname, allowing users whose ISP does not assign them a static IP address to use a domain name. This is especially useful for hosting servers via your internet connection, so that anyone wishing to connect to you may use your domain name, rather than having to use your dynamic IP address, which changes from time to time.
Page 164
Example: How to register a DDNS account Note: First users have to go to the Dynamic DNS registration service provider to register an account. User test1 register a Dynamic Domain Names in DDNS provider http://www.dyndns.org/ DDNS: www.hometest.com using username/password test/test...
Access Control Access Control Listing allows you to determine which services/protocols can access M100 interface from which computers. It is a management tool aimed to allow IPs (set in secure IP address) to access specified embedded applications (Web, etc, user can set) through some specified interface (LAN, WAN or both).
Page 166
By default, the Access Control has two default rules. Default Rule 1: (Index 0), a rule to allow only clients from LAN to have access to all embedded applications (Web, FTP, etc). Under this situation, clients from WAN cannot access the router even from Ping.
Packet Filter You can filter the packages by MAC address, IP address, Protocol, Port number and Application or URL. Packet Filter - IP & MAC Filter Packet Filter Filter Type: There are three types IP & MAC Filter and URL Filter that user can select for this filter rule.
Page 168
Source Subnet Mask: Enter the subnet mask of the source network. Source Port Number: The source port number of packets to be monitored. 0 means Don’t care. Destination IP Address: The destination IP address of packets to be monitored. 0.0.0.0 means Don’t care.
Page 169
Packet Filter - URL Filter URL Filter: Select Activated to enable URL Filter. URL Filter Rule Index: This is item number. Individual Active: To give control to the specific URL access individually, for example, you want to prohibit access to www.yahoo.com, please first press Activated in URL Filter field, and also Yes in Individual Active field;...
CWMP (TR-069) CWMP, short for CPE WAN Management Protocol, also called TR069 is a Broadband Forum technical specification entitled CPE WAN Management Protocol (CWMP). It defines an application layer protocol for remote management of end-user devices. It defines an application layer protocol for remote management of end-user devices.
Page 171
Periodic Inform Config Periodic Inform: Select Activated to authorize the router to send an Inform message to the ACS automatically. Interval(s): Specify the inform interval time (sec) which CPE used to periodically send inform message to automatically connect to ACS. When the inform interval time arrives, the CPE will send inform message to automatically connect to ACS.
Parental Control Parental Control provides Web content filtering offering safer and more reliable web surfing for users. Please get an account and configure at the selected Provider “www.opendns.com” in advance. If activated, the Parental Control has the top priority as DNS when accessing internet. Host Name, Username and Password: Enter your registered domain name and your username and password at the provider website www.opendns.com.
Maintenance Maintenance equipments the users with the ability of maintaining the device as well as examining the connectivity of the WAN connections, including User Management, Certificate Management, Time Zone, Firmware & Configuration, System Restart, Auto Reboot and Diagnostic Tool.
User Management User Management controls the Router Web GUI permission to the specific account. In factory setting, the default accounts are admin/admin. The default root account admin has been authorized to web access of router.
Page 175
Admin / Admin admin/admin is the root account provided by our router. Login using the Administrator account, you will have the full accessibility to manage & control your gateway device and can also create user accounts for others to control some of the open configuration settings.
Page 176
Adding additonal user accounts User Setup Index: User account index. User Name: Users can create account(s) to give it (them) access to router. New Password: Type the password for the user account. Confirmed Password: Type password again for confirmation. Web GUI Permission Guest Account: A pre-set guest account setting granted with Interface Setup, Advanced Setup, Access Management and Maintenance access.
Certificate Management OpenVPN mutually authenticate each other based on Local Certificate and Trusted CA. Local Certificate Listing Edit certificate: Click , move to Local Certificate editing page. Index: To identify the local certificate. 2 certificates supported. Certificate Name: User-defined certificate name. PKCS12: Every certificate is accompanied by a private key.
Page 178
(Upload the certificate file.) Certificate File: Browse to locate the target certificate file on PC before uploading it. (Upload the private key file.) Private Key File: Browse to locate the target file on PC before uploading it. Click Save to submit the settings. Trusted CA Listing Edit certificate: Click , move to Trusted CA editing page.
Time Zone The router does not have a real time clock on board; instead, it uses the Simple Network Time Protocol (SNTP) to get the current time from an SNTP server outside your network. Choose your local time zone. After a successful connection to the Internet, the router will retrieve the correct local time from the SNTP server you have specified.
Firmware & Configuration Firmware is the software that controls the hardware and provides all functionalities which are available in the GUI. This software may be improved and/or modified; your M100 provides an easy way to update the code to take advantage of the changes. . To upgrade the firmware of M100, you should download or copy the firmware to your local environment first.
Page 181
DO NOT turn off / power off the device or interrupt the firmware upgrading while it is still in process. Improper operation could damage your Industrial LTE Router.
System Restart Click System Restart with option Current Settings to reboot your router. If you wish to restart the router using the factory default settings (for example, after a firmware upgrade or if you have saved an incorrect configuration), select Factory Default Settings to restore to factory default settings.
Auto Reboot Auto reboot offers flexible rebooting service (reboot with the current configuration) of router for users in line with scheduled timetable settings Enable to set the time schedule for rebooting. For example, the router is scheduled to reboot at 22:00 every single weekday, and to reboot at 9:00 on Saturday and Sunday.
Diagnostics Tool The Diagnostic Test page shows the test results for the connectivity of the physical layer and protocol layer for both LAN and WAN sides. 4G/LTE: Click Start to begin to diagnose the connection. Click Start Trace Route to begin to trace routing path.
Chapter 5: Troubleshooting If your M100 is not functioning properly, you can refer to this chapter for simple troubleshooting before contacting your service provider support. This can save you time and effort but if symptoms persist, consult your service provider. Problems with the Router Problem Suggested Action...
Page 187
- The front LEDs display incorrectly Before starting recovery process, please configure - Still cannot access to the router the IP address of the PC as 192.168.1.100 and management interface after pressing the proceed with the following step-by-step guide. RESET button. 1.
Page 188
Appendix: Product Support & Contact If you come across any problems please contact the dealer from where you have purchased the product. Contact Billion WORLDWIDE http://www.billion.com/ MAC OS is a registered Trademark of Apple Computer, Inc. Windows XP/ Vista/ 7/ 8/ 8.1/ 10 are registered Trademarks of Microsoft Corporation.
Page 189
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
Need help?
Do you have a question about the BiPAC 4700AZ and is the answer not in the manual?
Questions and answers