InHand FWA02 Series User Manual

InHand FWA02 Series User Manual

5g fwa
Hide thumbs Also See for FWA02 Series:

Advertisement

Quick Links

InHand Networks 5G FWA
FWA02 Series Product
User Manual
V1.0——2023.10
i

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the FWA02 Series and is the answer not in the manual?

Questions and answers

Summary of Contents for InHand FWA02 Series

  • Page 1 InHand Networks 5G FWA FWA02 Series Product User Manual V1.0——2023.10...
  • Page 2 The content of this user manual is protected by copyright laws, and the copyright belongs to InHand Networks and its licensors, reserving all rights. Without written permission, the content of this manual may not be used, copied, or distributed without...
  • Page 3 Conventions Indication Symbol Indicating a functional module or menu, for example: under the [Status] menu. “ ” Referring to a button label, for example: click the "Add" button. Multiple-level menus are separated by "〉". For example, 〉 "File〉New〉Folder" represents the "Folder" menu item under the "New"...
  • Page 4: Table Of Contents

    CONTENTS Overview ..........................1 Hardware ..........................2 Indicator Description ....................2 Restoring to Default Settings via the Reset Button ..........3 Default Settings ...................... 3 Safety Precautions......................4 Login and Access to the Internet ..................5 Connect via Ethernet Cable ..................5 Web Configuration ......................
  • Page 5 Local Network ...................... 17 Wi-Fi........................18 VPN ........................19 5.6.1 IPSec VPN ....................20 5.6.2 L2TP VPN ....................21 5.6.3 VXLAN VPN .................... 23 Security ......................... 24 5.7.1 Firewall ..................... 24 5.7.2 Policy-Based Routing ................27 5.7.3 Traffic Shaping ..................28 Service ........................
  • Page 6 5.9.7 Tools ......................38 5.9.8 Scheduled Reboot ..................40 5.9.9 Log Server ....................41 5.9.10 Other Settings .................... 41 Troubleshooting ....................... 44 Unable to connect to the cellular network ............44 Unable to connect to the WAN network ............... 44 Slow or unstable speeds ..................
  • Page 7: Overview

    The 5G cellular network greatly enhances network flexibility and convenience, enabling businesses to effortlessly establish a competitive next-generation 5G network for their digital business development. Our cloud-managed 5G FWA02 series provides a high-speed, secure, and user-friendly 5G network, empowering businesses for the future.
  • Page 8: Hardware

    2 Hardware 2.1 Indicator Description Indicator definitions Off --- Power off Steady in red--- Powering System Blink in --- System error Steady in green ---System working Blink in blue --- firmware updating Blink in --- Unable to access the cellular network Cellular Steady in blue...
  • Page 9: Restoring To Default Settings Via The Reset Button

    2.2 Restoring to Default Settings via the Reset Button 1. After powering on the device, press and hold the reset button for 5~10 seconds, and the System indicator is solid blue. 2. Release the key and the blue flashes. 3. Press and hold the reset button again, release the solid blue light and enter the system startup phase.
  • Page 10: Safety Precautions

    3 Safety Precautions 1. Please use the provided original power adapter to prevent any potential device damage resulting from using incompatible power adapters. 2. During installation, ensure the device is positioned away from areas with strong electromagnetic interference and maintains a safe distance from high-power equipment.
  • Page 11: Login And Access To The Internet

    4 Login and Access to the Internet Before Powering on the device, please follow the steps below: 1. Insert the SIM card and securely close the SIM card cover. Properly install the device's antennas and ensure that they are not loose. 2.
  • Page 12 Fig.4-1 Web login interface 4. Check the network in the “Dashboard〉Interface Status”. The device connects to the Internet successfully if the “Cellular” or “WAN” icon turns green. Click the corresponding icon to view interface information such as signal strength, IP address and traffic consumption.
  • Page 13: Web Configuration

    5 Web Configuration 5.1 Dashboard Click the [ Dashboard ] in the left menu, and you can check the device’s information, Interface Status, Traffic Statistics and Wi-Fi information of the device. Fig. 5-1 Dashboard interface Device Information 5.1.1 In the “Dashboard〉Device Information” interface, you can check the details about the device name, Model, S/N, Firmware Version and so on.
  • Page 14: Interface Status

    ⚫ Serial: A unique code that identifies the device, which can be used for indexing or adding to a platform account. ⚫ Internet Access: The upstream interface used for device connectivity. ⚫ License Status: Information about the license applied to the device, which may include the Small Star Cloud Manager Basic or Professional version.
  • Page 15: Wi-Fi Connections

    Fig. 5-1-3 Traffic statistics Wi-Fi Connections 5.1.4 In the "Dashboard > Wi-Fi Connections" feature, users can view the number of currently enabled SSIDs on the FWA02 and the number of clients connected per SSID. Fig. 5-1-4 Wi-Fi Connections panel 5.2 Status Click on "Status"...
  • Page 16: Link Monitor

    Fig. 5-2 Status interface Link Monitor 5.2.1 Users can monitor the health status of upstream links and access information such as throughput, latency, packet loss, signal strength, and more for each interface through the "Status > Link Monitoring" feature. Fig. 5-2-1 Link monitor panel Cellular Signal 5.2.2 Users can check the signal strength as well as parameters like RSSI, SINR, RSRP,...
  • Page 17: Clients

    Fig. 5-2-2 Cellular Signal panel Clients 5.2.3 Users can access detailed information about wired/wireless clients connected to the router, including details like name, IP address, MAC address, VLAN, connected subnet, traffic usage, online duration, and more through the "Status > Clients" feature. Fig.
  • Page 18: Events

    Events 5.2.5 This device will record event logs, including user login, configuration changes, link changes, reboot, and other events. You can check that information in the “Status〉 Events” interface. You can view specific events on a particular date by setting the start and end dates or choosing the event type.
  • Page 19: Internet

    Fig. 5.2.6 Logs interface ⚫ Download Logs: Download the device's operational logs. ⚫ Download Diagnostic Logs: Download the device's diagnostic logs, which include system operation logs, device information, and device configurations. ⚫ Clear Logs: Clear the device's operational logs; this does not clear the device's diagnostic logs.
  • Page 20: Uplink Table

    Uplink Table 5.3.1 Users can edit WAN1 and Cellular interfaces and add/edit/delete WAN2 and Wi- Fi (STA) interfaces in the "Internet > Uplink Table". You can drag the "Priority" icons to adjust the priority of each interface. Priorities are arranged from top to bottom, determining the current upstream interface used by the device.
  • Page 21 Fig. 5-3-1-c Set the static IP PPPoE: Users can set the PPPoE service on the WAN port and then this device can dial up to the Internet through the broadband service. Fig. 5-3-1-d Set the PPPoE service The Cellular interface supports three working modes of sim cards, you can configure the sim card working mode and other dial-up parameters in “Internet〉Uplink table〉Cellular”.
  • Page 22: Uplink Settings

    Fig. 5-3-1-e Configure the dial-up parameters Uplink Settings 5.3.2 Users can configure link detection-related settings in the "Internet > Uplink Setting" feature and configure the collaboration mode between various uplink interfaces.
  • Page 23: Local Network

    Fig. 5-3-2 Uplink settings “Link detection” is enabled by default. In the private network environment, please manually configure the address in “Test Connectivity to” or disable the link detection function to prevent the cellular interface from malfunctioning. Cautions: If the detection is disabled, it will not display latency, jitter, loss, or signal strength in [ Status ].
  • Page 24: Wi-Fi

    Fig. 5-4-b Configure the LAN network parameters 5.5 Wi-Fi Wi-Fi is a widely used wireless communication technology that allows computers, smartphones, tablets, and other devices to connect to the internet or a local network. Wi-Fi technology enables devices to transmit data within a certain range using wireless signals, providing the convenience of accessing networks without the need for physical connections.
  • Page 25: Vpn

    Fig. 5-5-2 Set the SSID’s parameters Notes: ⚫ The device comes with two default main SSIDs for 2.4GHz and 5GHz, and these main SSIDs cannot have their frequency bands modified or deleted. ⚫ Once an SSID is added, its frequency band cannot be modified, and the channel will automatically align with the channel of the corresponding main SSID.
  • Page 26: Ipsec Vpn

    IPSec VPN 5.6.1 IPsec (Internet Protocol Security) VPN is a protocol suite designed to enhance network communication security. Its primary purpose is to protect the transmission of data through encryption and authentication. It is widely used for establishing secure remote access, site-to-site connections, and virtual private networks (VPNs). You can create a new IPSec VPN item by “VPN〉IPSec VPN〉Add”, and the following parameters must be set correctly.
  • Page 27: L2Tp Vpn

    tunnel, and the tunnel mode and transmission mode are optional. ⚫ Local Subnet: Specify the IP address segment of the traffic to be sent out by the device through the IPSec VPN tunnel. ⚫ Peer Subnet: Specify the IP address segment used for communication on the remote client.
  • Page 28 Fig. 5-6-2-1 L2TP VPN interface Please configure the following parameters based on the actual network requirements. ◼ Name: The name of the L2TP server, which cannot be changed. ◼ Status: You can enable or disable this L2TP server by clicking the switch. ◼...
  • Page 29: Vxlan Vpn

    5.6.2.2 Client You can configure the L2TP client parameters to establish a tunnel with a remote L2TP server in “VPN〉L2TP VPN 〉Clients”. Fig. 5-6-2-2 L2TP VPN Client interface Please configure the following parameters based on the actual network requirements. ⚫ Name: Specify the local name of the L2TP client tunnel. ⚫...
  • Page 30: Security

    network devices. It achieves data transmission and forwarding by encapsulating user- side packets in a specific manner. Click the "Add" button under "VPN > VXLAN VPN" to create a new VXLAN VPN. Fig. 5-6-3 Add a VXLAN VPN ⚫ Name: Set the name for this VXLAN VPN network. ⚫...
  • Page 31 is experiencing a large volume of attack traffic from a specific source IP address, they can use inbound firewall rules to limit the traffic data from that IP address. Fig. 5-7-1-a Set the Inbound/Outbound Rules Fig. 5-7-1-b Add an Inbound Rule The following parameters must be configured properly.
  • Page 32 port on the router, the device forwards the data to the corresponding port on the internal client, enabling external access to servers within the router's network. For example, after setting port forwarding rules like below, when users from the public network try to access to device’s port 2000 on WAN, the system will transfer the request to 192.168.1.23:8080 in LAN.
  • Page 33: Policy-Based Routing

    MAC Address Filter: MAC address filtering refers to the practice of blocking or allowing devices to access the internet based on a list of MAC addresses. This means that you can control internet access requests from devices within your local network using the MAC address filtering feature on your router.
  • Page 34: Traffic Shaping

    Fig. 5-7-2-a Policy-Based Routing interface Fig. 5-7-2-b Add a Policy-Based Routing The following parameters must be set properly. ◼ Name: Set the local identifier of the rule. ◼ Status: You can enable or disable this rule by clicking the switch. ◼...
  • Page 35: Service

    Fig. 5-7-3-a Traffic Shaping interface Fig. 5-7-3-b Add a traffic-shaping rule Traffic shaping policies consist of a series of rules that are performed in order, which is similar to custom firewall rules. There are two main components to each rule: the type of traffic to be limited or shaped, and how that traffic should be limited or shaped.
  • Page 36: Dhcp Server

    Fig. 5-8-1-a Interface panel Fig. 5-8-1-b Edit the interface DHCP Server 5.8.2 The DHCP (Dynamic Host Configuration Protocol) service operates in a client/server communication mode, where clients request IP addresses from servers, and servers respond to these requests by assigning IP addresses dynamically to clients. Users can configure the DHCP server’s IP address pool using the "Services >...
  • Page 37: Dns Server

    DNS Server 5.8.3 DNS (Domain Name System) servers are a critical component of the network. They are responsible for translating human-readable domain names (e.g., www.example.com) into IP addresses that computers can understand (e.g., 192.168.1.1). DNS servers act as the internet's address book, helping computers and devices locate the whereabouts of other devices and ensuring that information can be correctly transmitted on the network.
  • Page 38: Static Routes

    ⚫ The addresses available for allocation must fall within the address range of the IP- mode local network, or else the configuration will not take effect. ⚫ When a local network is deleted, all fixed address allocation rules within the address range of that local network will also be deleted.
  • Page 39: Passthrough Settings

    Users can manually configure the Dynamic DNS server address under the "Services > Dynamic DNS" feature. Fig. 5-8-6 Set the Dynamic DNS Address ⚫ Service Provider: Provided by the dynamic DNS service provider, you can choose from dyndns, 3322, oray, no-IP, or customize (requires a URL). ⚫...
  • Page 40: System

    5.9.1 The InCloud Service (star.inhandcloud.com) is a cloud platform developed by InHand Networks to address the challenges faced by enterprise networks, such as slow deployment, complex operations, and poor user experiences. This platform is designed with a focus on user needs and integrates features like zero-touch deployment, intelligent operations and maintenance, security protection, and excellent user experience capabilities.
  • Page 41: System Clock

    Fig. 5-9-2 Configure the Remote Access Control ⚫ HTTPS: When enabled, users can access the router's web interface remotely by entering the public IP address and port of the upstream interface in a web browser. ⚫ SSH: When enabled, users can remotely log in to the router's backend by using remote tools like CRT, entering the public IP address and port of the device's upstream interface, along with a username and password.
  • Page 42: Configuration Management

    Fig. 6-9-4 Device Option Panel Cautions: ⚫ When locally upgrading firmware, please ensure that you obtain the firmware from a legitimate source to avoid rendering the device unusable due to incorrect firmware installation. ⚫ When a device is connected to the cloud platform, the platform will synchronize the previous configuration to the device again due to cloud-based configuration synchronization.
  • Page 43: Device Alarms

    Device Alarms 5.9.6 When users want to pay special attention to certain events that may occur on the device, they can check the corresponding alarm events and set the email address to receive alarm notifications in "System > Device Alarm." Once an alarm event occurs, the device will automatically send the corresponding email notification.
  • Page 44: Tools

    Fig. 5-9-6-b Set the e-mail address Tools 5.9.7 5.9.7.1 Ping Users can use ICMP (Internet Control Message Protocol) to check the device's external network connectivity. In the "Target" field, enter any domain name or IP address you want to test the device's connectivity to, and then click "Start" to check the connectivity status between the device and the specified target.
  • Page 45 Fig. 5-9-7-1 Ping 5.9.7.2 Traceroute Users can use the "System > Tools > Traceroute" function to check the routing connectivity from the device to a target host. They can input the target host's IP address or domain name, select the outbound interface for traffic, and click "Start" to trace the route from the device to the target IP, displaying each hop along the way.
  • Page 46: Scheduled Reboot

    Fig. 5-9-7-3 Capture 5.9.8 Scheduled Reboot Scheduled reboot is a strategy in network device management that allows administrators to automatically restart devices at specific times or under certain conditions to ensure their normal operation and performance. In practical use, users can set up device scheduled restart times in the "System > Scheduled Reboot"...
  • Page 47: Log Server

    Log Server 5.9.9 You can set a remote log server to receive the logs sent by this device through “System〉Log Server”. Fig. 5-9-9 Set the Log Server’s address 5.9.10 Other Settings Web Login Management 5.9.10.1 After a certain period of inactivity, when a user logs into the local interface of a device through a web interface, the system will automatically log them out or disconnect to ensure user privacy and security.
  • Page 48 After enabling this feature in "System > Other Settings > Accelerated Forwarding," the device's cellular speed will significantly improve. Fig. 5-9-10-2 Enable the accelerated forwarding Cautions: ⚫ Enabling this feature will disable the normal functioning of IPSec VPN, traffic shaping, and other related features. Automatically Restarts 5.9.10.3 Edge routers are specifically designed with an automatic restart mechanism to help...
  • Page 49 Fig. 5-9-10-4 Enable the SIP ALG Note: If the connected device needs to engage in VoIP (Voice over Internet Protocol) phone communication, it is recommended to disable this function.
  • Page 50: Troubleshooting

    6 Troubleshooting 6.1 Unable to connect to the cellular network 1. Ensure that the SIM card is properly installed and valid. 2. Check the cellular network signal strength and try moving the router to an area with better signal coverage. 3.
  • Page 51: Faq

    6. Factory Reset: Perform a factory reset on the router and then attempt to connect again. If you cannot resolve the issue using the above steps or encounter any other problems, please contact InHand Networks immediately for technical support. You can visit www.inhandnetworks.com. for more information. Is the cloud platform free of charge? InHand Networks has been committed to providing high-quality network services for small and medium-sized chain organizations.
  • Page 52: Is It Possible To Use The Device Without The Cloud Platform

    WAN, Connector, and more, you would need to combine local device settings with the cloud platform. If you are unable to resolve the issue using the above steps or encounter any other problems, please contact InHand Networks for technical support. You can visit www.inhandnetworks.com for more information.
  • Page 53: Hardware Specifications

    8 Hardware specifications 5G FWA 02 Hardware Throughput Up to 2Gbps Recommended Users 5G: 4.67Gbps (DL)/1.25Gbps (UL) Cellular 4G: 1.6Gbps (DL)/200Mbps (UL) 2*2.5 GbE RJ45 Ethernet Port WAN/LAN switchable, Dual-LAN 1* Type-C 1*eSIM 2*SIM, Nano 4FF SIM slot, Hot-plug RESET Reset button Power switch 1* button...

Table of Contents