Beruflich Dokumente
Kultur Dokumente
Version 3.1
Version and description: Support Node for MIMO CPE Support Node for MIMO CPE Support Node for MIMO CPE 1/80
Contents
1. Introduction ........................................................................................................................ 4
1.1 1.2 Key Benefits of ZyXEL WiMAX CPE Products ............................... 4 Hardware Brief of Simple CPE ........................................... 4 NAT and Router Features ................................................ 6 Firewall Features ...................................................... 6 Network Management ..................................................... 7 Pre-Provisioning ....................................................... 7 Local Provisioning ..................................................... 7 Remote Provisioning .................................................... 8
Web Interface ....................................................................................................................................8 Telnet Interface ..................................................................................................................................8 SNMP .................................................................................................................................................9 TR-069 ...............................................................................................................................................9
2.
3.
4.
User Authentication......................................................................................................... 11
4.1 4.2 EAP-TTLS .............................................................. 11 EAP-TLS ............................................................... 12
5. 6.
Check Device Status ................................................... 19 Useful System CLI command ............................................. 22 Useful WiMAX CLI command .............................................. 24 Useful WiMAX Debug command ............................................ 26 Useful VoIP Debug command ............................................. 27 Useful TR069 Debug command ............................................ 27 Useful VPNT Command ................................................... 30
Use of Untagged Customer Interface in Bridge Mode .................................................................30 Use of Untagged & Tagged Customer Interface in Bridge Mode................................................32 Use of Untagged Customer Interface in Routing/NAT Mode......................................................37 GRE Tunnel via LAN Port to Bypass Radio Link Uncertainty ...................................................38 2/80
6.9
7.
Troubleshooting ............................................................................................................... 50
7.1 7.2 7.3 7.4 7.5 7.6 What can I do when struggling in the DL_SYN and Ranging process? ...... 50 What can I do when struggling in the Authentication process? .......... 53 What can I initiate the IDLE process? ................................. 56 What can I do the IDLE troubleshooting? ............................... 56 What can I do the handover troubleshooting? ........................... 57 What can I do the VOIP troubleshooting? ............................... 58
Use WireShark software to catch the VOIP trace log...................................................................58 Use ZyXEL console line to catch the VOIP trace log. .................................................................59
7.6.1 7.6.2
8.
Appendix ........................................................................................................................... 65
8.1 8.2 FAQ ................................................................... 65 TR-069 Parameters ..................................................... 65
WiMAX Specific TR-069 parameters ...........................................................................................65 InternetGatewayDevice parameter: ................................................................................................65 InternetGatewayDevice.Service.VoiceService parameters: .........................................................73 Vendor-Specific Parameter:............................................................................................................78 InternetGatewayDevice.X_WIMAXFORUM_OperatorProfile Parameter: ............................78
3/80
1. Introduction
This document is written for system operator to properly install the WiMAX MIMO CPE.
LAN
When the phone ports defined, SIP account for Solid Green outgoing call is registered. when voice port is off hooked Flashing Green (Slowly) When the phone ports defined SIP account for Solid Yellow outgoing call is registered. And there is voice message in the corresponding SIP account. When voice port is off hooked, and there is Flashing Yellow voice message in the corresponding SIP account. No Registered SIP accounts to this line, or OFF device power off. Both VoIP1/2 LED Solid Yellow WiMAX card in MFG mode (You can type wimax debug to see what mode is now.) Signal Strength: Green on: Show each of signal 3 LED bar : 0~3 indicates RSSI (Power level strength level reception) R < -90dBm = Level 0 (No LEDs ON) -90 < = R < -80dBm = Level 1 (One LED ON) -80 < = R < -70dBm = Level 2 (Two LEDs ON) -70 < = R = Level 3 (Three LEDs ON) LINK: Indication of connection status at WiMAX air interface level (network entry) - Searching for a channel - WiMAX network Entry in progress OFF: WiMAX card not ready Green slow blink (one second) Green fast blink (0.5 second) Solid Green: connected
WAN
* There is only one physical phone jack (PHONE 1) on the MAX-216M1 CPE and (SIP1 and SIP2) can be associated to (PHONE 1) for Incoming and Outgoing calls.
2. Networking Features
This chapter describes the networking features.
5/80
IP Management VPN Pass through DHCP DNS RIP IP Multicast IP Alias UPnP Traffic Redirect Any IP
3.1 Pre-Provisioning
Pre-provisioning is done at factory according to operator instructions. On fixed CPEs, all parameters are stored into the product HW. Provisioning consists then in loading during production process a configuration file defined with the operator. The usual way to build this configuration file is that the operator sets all parameters using Local Provisioning mechanisms (see below), and backup this configuration into a configuration file. Some specific parameters can also be applied during this phase. The usual way is to define, for each product, identified by its MAC address, the specific settings to be applied. The process of backup and restore configuration file All configurations in CPE are stored in a single file, called ROM file. You can use FTP to get this file, rom-0, from Simple CPE. This file can also be restored back to the CPE or duplicated to hundreds of Simple CPE and make their configuration all the same. ZyXEL can load specific ROM file during the factory process. ISP or operator can pre-configure the Simple CPE and retrieve the ROM file to ZyXEL. Comments: Process to be further confirmed & described. How do we manage the parameters that are not accessible to the end-user, but which are operator controlled only? How do we exactly manage the specific parameters, hiw are they agreed with the operator, is there a database with a specific format.
The user or operator can use FTP, Telnet and Web GUI to access the CPE for configuration. The activities can be done are listed as below. Activities FTP configuration file backup/restore FTP software upgrade Telnet and CLI command Interface LAN LAN LAN Limitations Password protected Password protected Password protected Can use hidden commands to configure parameters which you dont want end-user to change. The details of CLI commands are described in user manual. The Web GUI is designed for end users. Most configurable parameters are user specific. The operator doesnt need to control this. The Web GUI is described in users manual. Need a TFTP server running on PC Need some configuration and procedures to upgrade the 802.16e MAC firmware. The details are described in chapter 6. Need Sequans software running on PC. Need some configuration and procedures to configure the 802.16e parameters. The details are described in chapter 6.
Web GUI
LAN
LAN
LAN
Comments: what about operator specific parameters that the user has no right to change Admin password? In general, how to configure data so that they are read only for the end user but can be changed by the operator Telnet: Is there a manual? It consists in setting parameters using some telnet commands to be entered from a console. Local and/or remote use of telnet can be restricted by configuration. Command Line Interface (CLI): Is there a manual? Local and/or remote use of CLI can be restricted by configuration.
Note that activation of remote Telnet creates a security hole, as incoming UDP port 23 remains always open. Remote Telnet can be de-activated.
3.3.3 SNMP
The end-user device can be controlled by SNMP from the network, as soon as the IP address of the end-user device is known, and the feature has been enabled on the device. ZyXEL Fixed CPE support SNMPv1 and SNMPv2c with MIB II. WiMAX MIB (16d/16e) is not supported in current ZyXEL end-user device release. Note that in current WiMAX MIB definition, the most useful parameters on end-user device side are not settable through SNMP. Note that activation of SNMP creates a security hole, as incoming UDP port 61 remains always open. SNMP can be de-activated.
3.3.4 TR-069
ZyXEL Fixed CPE supports TR-069 protocol for CPE management. This feature is not available on PCMCIA. TR-069 allows Dynamic Services Provisioning, configuration file download / upload, firmware version identification, firmware download initiation and notification. The firmware upload itself is done through TFTP or HTTP(s). TR-069 relies on an Auto Configuration Server (ACS) implementation in the network. In the simplest case, ACS server address can simply be pre-configured in the CPE, together with ACS user credentials. The CPE is master, and establish first the contact with the TR-069 server. TR-069 is based on TCP/IP. ZyXEL supports SSL3.0 and TLS1.0 for confidentiality, data integrity, and certificate based authentication. End-user device certifies ACS by RSA certification whereas ACS certifies CPE by its username and password. The architecture is as following diagram. ZyXEL WiMAX CPE supports TR-069 protocol for CPE management. The architecture is as following diagram.
Scope of ACS Northbound CPE WAN Management Protocol: Interface ACS Southbound Interface
ACS
BRAS
LAN
ACS = Auto Configuration Server ZyXEL TR-069 feature is under IOP testing with Alcatel HDM5580. Other IOP test report will be available soon. Current support TR-069 features are as below. Features Description Auto Configuration Configuration file download / upload Dynamic Services Provisioning ACS Discovery Manual setting of ACS URL 9/80
Version identification File download initiation and notification Confidentiality, Data Integrity and Certificate based authentication
Following is brief description of each layer Layer RPC Methods Description The specific RPC methods that are defined by the CPE WAN Management Protocol. This includes the definition of the CPE Parameters accessible by an ACS via the Parameter-related RPC Methods. A standard XML-based syntax used here to encode remote procedure calls. HTTP 1.1 The standard Internet transport layer security protocols. Specifically, either SSL 3.0 (Secure Socket Layer), or TLS 1.0 (Transport Layer Security). Use of SSL/TLS is RECOMMENDED. Standard TCP/IP.
TCP/IP
Mutual Authentications CPE certifies ACS by RSA certification ACS certifies CPE by username and password
10/80
4. User Authentication
4.1 EAP-TTLS
The User can set the TTLS mode for Authentication.
11/80
4.2 EAP-TLS
The User can set the TLS mode for Authentication.
12/80
5. VoIP Features
This feature is only for Simple CPE and Multi-user CPE. Features SIP Protocol Standards Description SIP (RFC 3261) version 2 SDP (RFC 2327) RTP (RFC 1889) RTCP (RFC 1890) Echo Cancellation: G.168 VAD (Voice activity detection) Silence suppression CNG (Comfort noise generation) G.711 (PCM A-law or -law selectable), G.729a/b, G.723 SIP (RFC 3261) version 2 SDP (RFC 2327) RTP (RFC 1889) RTCP (RFC 1890) Echo Cancellation: G.168 VAD (Voice activity detection) Silence suppression CNG (Comfort noise generation) QoS Supports TOS or Diffserv Compression: G.711 (PCM A-law or -law selectable), G.729a/b, G.723 Loop Start and Ground Start Signaling Support DTMF Detection
13/80
6. Maintenance Guide
There are two kinds of software inside Simple CPE: 1. Software for Simple CPE itself, with Router, firewall, VoIP and Web GUI etc. During the early stage of WiMAX, there are many chances to upgrade the 802.16e MAC software and/or change the configuration. These are performed locally through Ethernet connection and some special tools running on PC are required. Section 6.1 will describe how to setup the Simple CPE, MAX-206M2/MAX216M1 and how to connect them. Section 6.2 will describe the procedures of configuration/provisioning. Section 6.3 will describe the procedures of software download of the built-in WiMAX MAC/BB/RF card (called WiMAX card in this document). For the remote software upgrade and configuration, they are described in other sections. Following table shows the difference of the WiMAX card built-in in ZyXEL MIMO CPE. Card Type Description WiMAX card 1. WiMAX MAC, Baseband and RF 2. Built-in in Simple CPE, MAX-206M2/MAX216M1 3. Maximum Tx Power 27 dBm
14/80
Step.1
Launch your web browser and connect to URL http://192.168.1.1. For first time, you can use the default User name (admin) and Password (1234) to login.
The following page displays if you have not yet changed your password. Clink Clear to keep using default one; alternatively enter a new password and click Apply to change it.
15/80
Click Apply in the next screen to create a certificate using MAX-2X6s MAC address that will be specific to this device. This certificate is used for authentication when using a secure HTTPS connection over the Internet.
16/80
6.1.2
Step.2
Start Network Entry Import Certificate for both device own and server side. Click TOOLS > Certificates > My Certificates in the navigation panel for import device own certificate.
Click TOOLS > Certificates > Trusted CAs in the navigation panel for import server side certificate.
17/80
Step.3
Configure the Username, Password, and authentication method by click ADVANCED > WAN Configuration > Internet Connection in navigation panel.
Step.4
Configure the frequency and channel bandwidth by click ADVANCED > WAN Configuration > WiMAX Frequency in navigation panel. Current setting is
Step.5
After configure ZyXEL MIMO CPE ready, please request AAA server
18/80
There are two MAC address on MAX-2X6; one is for LAN interface (on system board), the other is for WAN (on WiMAX card) Here the address shows on sys atsh page is the LAN interface MAC. LAN MAC + 1 is the WAN MAC address. Take an instance, this devices LAN MAC is 00:19:CB:46:10:FB; WAN MAC is 00:19:CB:46:10:FC.
19/80
20/80
21/80
6.3
Release and renew DHCP IP address ip dhcp enif1 client release ip dhcp enif1 client renew
After perform the command, you need to exit and re-login again. And then you will get the menu configuration page. Exit menu configuration page by select 24 -> 8 -> type sys smt off, then exit and re-login.
22/80
IPref test You need to set the NAT Setup by using Menu configuration. Use Menu 15 and Port Forwarding Setup to configure. Ipref command for example: Server: ipref u s t 9999 Client: ipref u c 10.10.10.1 l 1370 b 10m t 9999
Sometimes different H/W version will cause the LED behavior abnormal. When encounter this problem, you can perform this command to sync the boot code. sys atmb 1
23/80
Hardware reset WiMAX Card wimax iot resetwc Without reboot the system board, we can use this to reboot the WiMAX CARD.
Capture the Air packet wimax iot setaircopy2LAN [turn on/off] After use this command, you can use the ethereal tools to capture the packets which sent to WiMAX interface.
24/80
Configure Frequency setting wimax net setFre [0/1: show/clean and set] [DL frequency value] [bandwidth value]
25/80
Get current scan Frequency setting in the WiMAX Card wimax cli showscanner
Enable/Disable EAP debug log wimax eap debug <log (0:off, 1:on)> <level (0-4)>
Currently, the only way to disable the log is wimax eap debug 0 4.
[SOP for testing EAP module]: 1. wimax stop 2. wimax log 0 1 3. wimax eap debug 0 1 4. wimax iot setaircopy2LAN on 5. wimax cli enablelog PKMS 6. execute Wireshark on host system 7. wimax start 8. Collect logs from console and sniff packet using Wireshark. 26/80
"voice config fxs index 1" "voice config fxs cidpayload 1 0" "voice config fxs save 1"
[DNS SRV]:
You can use "voice config signal display 1" to see the setting of the DNS SRV (default is redundancy). If you want change it, use "voice config signal index 1" "voice config signal srvServerType 1 <0 or 1>" "voice config signal save 1"
yyyy-mm-ddThh:mm:ss Usage: An absolute PeriodicInformTime [yyyy-mm-ddThh:mm:ss] reset Trigger the inform to be sent getRPC Get the RPC methods of the ACS server [off:Disable/on:Enable] Usage: [off:Disable/on:Enable] [number: Level] debug Enable the function of debug mode [number: Level] [maxlength:15] Usage: username:xxx [maxlength:15] username The username and password used for connecting to the ACS. [maxlength:15] Usage: password:xxx [maxlength:15] password The username and password used for connecting to the ACS. [maxlength:15] Usage: username:xxx [maxlength:15] Username of the connection request requsername (The username and password used for authenticating ACS during a connection request.) [maxlength:15] Usage: username:xxx [maxlength:15] Password of the connection request reqpassword (The username and password used for authenticating ACS during a connection request.) Show the notification list saved in the flash (max. notification 64) informTime
For example ======================= Copyright (c) 1994 - 2008 ZyXEL Communications Corp. MAX-216M1> et tr di TR069 Active: No Auto-Configuration Server URL: PeriodicInformEnable: Disable PeriodicInformInterval: 0 PeriodicInformTime: 0000-00-00T00:00:00 Username: Password: ConnectionRequestUsername: ConnectionRequestPassword: TR069 Debug: Disable MAX-216M1> ether tr load MAX-216M1> ether tr active 1 MAX-216M1> ether tr acsUrl http://172.23.40.16/TR069 Auto-Configuration Server URL: http://172.23.40.16/TR069
28/80
MAX-216M1> ether tr periodicEnable 1 MAX-216M1> ether tr informInterval 30 TR069 Informinterval 30 MAX-216M1> ether tr informTime 2008-09-08T12:00:00 New InformTime: 2008-09-08T12:00:00 MAX-216M1> ether tr username wimax Username: wimax MAX-216M1> ether tr password wimax Password: wimax MAX-216M1> ether tr requsername wimax ConnectionRequestUserName: wimax MAX-216M1> ether tr reqpassword wimax ConnectionRequestPassword: wimax MAX-216M1> ether tr save MAX-216M1> et tr di TR069 Active: Yes Auto-Configuration URL: http://172.23.40.16/TR069 PeriodicInformEnable: Enabled PeriodicInformInterval: 30 PeriodicInformTime: 2008-09-08T12:00:00 Username: wimax Password: wimax ConnectionRequestUsername: wimax ConnectionRequestPassword: wimax TR069 Debug: Disable Server
29/80
In this test case, we bridge the untagged customer interface of ZyXEL MIMO CPE (A) with the untagged customer interface of ZyXEL MIMO CPE (B) by setting up an Ethernet pseudowire between the WAN ports of both MAX-206M2/MAX216M1s. The combination of the two MAX-206M2/MAX216M1s is equivalent to a two-port bridge.
Please follow the steps below to carry out this test. Prepare the network elements as depicted above. Make sure that the WAN links of both MAX-206M2/MAX216M1 A and MAX-206M2/MAX216M1 B are up and that each of the WAN interfaces acquires an IP address. Check the WAN status of a ZyXEL MIMO CPE. Log on to the ZyXEL MIMO CPE and go to Web > Status > Device Information . Turn off the firewall on each ZyXEL MIMO CPE before performing ping check to see if ZyXEL MIMO CPE A and ZyXEL MIMO CPE B can reach each other. By default the firewall blocks incoming ICMP packets. To turn off the
30/80
firewall, go to Web > Security > Firewall > General. Go to ZyXEL MIMO CPE As Command Interpreter, and execute the following CLI command to ping ZyXEL MIMO CPE Bs WAN IP address. MAX-216M1> ip ping < ZyXEL MIMO CPE Bs WAN IP address> If ZyXEL MIMO CPE A can reach ZyXEL MIMO CPE B, the console will display information such as follows; otherwise it means ZyXEL MIMO CPE B is unreachable. sent 1 2 3 rcvd rate 1 100 2 100 3 100 rtt 50 70 30 avg 50 53 50 mdev 0 5 10 max 50 70 70 min 50 50 30
Perform the same check on ZyXEL MIMO CPE B. If the results show that ZyXEL MIMO CPE A and ZyXEL MIMO CPE B can reach each other, continue to Step 6.1.5; otherwise go back to Step 6.1.2. You may turn on the Firewall now. To turn on the firewall, go to Web>Security>Firewall>General . Go to ZyXEL MIMO CPE As Command Interpreter and execute the following CLI command to set up the L2/L3 VPN Transport feature configuration necessary. MAX-216M1> vpnt load MAX-216M1> vpnt active on MAX-216M1> vpnt gre <MAX-206M2/MAX216M1 Bs IP address> MAX-216M1> vpnt pw config 0 on 100 5100 "Pseudowire X" MAX-216M1> vpnt cif config 0 on -1 B 0 000000 "Customer X" MAX-216M1> vpnt save To view and double-check the latest configuration, execute the following CLI commands. MAX-216M1> vpnt load MAX-216M1> vpnt gre MAX-216M1> vpnt pw list MAX-216M1> vpnt cif list Go to ZyXEL MIMO CPE Bs Command Interpreter and execute the following CLI command to set up the L2/L3 VPN Transport feature configuration necessary. MAX-216M1> vpnt load
31/80
MAX-216M1> vpnt active on MAX-216M1> vpnt gre <MAX-206M2/MAX216M1 As IP address> MAX-216M1> vpnt pw config 0 on 5100 100 "Pseudowire X" MAX-216M1> vpnt cif config 0 on -1 B 0 000000 "Customer X" MAX-216M1> vpnt save To view and double-check the latest configuration, execute the following CLI commands. MAX-216M1> vpnt load MAX-216M1> vpnt gre MAX-216M1> vpnt pw list MAX-216M1> vpnt cif list Check if the PC behind ZyXEL MIMO CPE A can acquire an IP address from the DHCP server behind ZyXEL MIMO CPE B. After the PC has acquired an IP address, check if the PC can access the Internet without any problem. Check out the traffic counters of each ZyXEL MIMO CPE by executing the following CLI commands. MAX-216M1> vpnt pw cnt display all MAX-216M1> vpnt cif cnt display all
In this test case, we bridge each of the sixteen customer interfaces of ZyXEL MIMO CPE A with one of the customer interfaces of ZyXEL MIMO CPE by setting up an Ethernet pseudowire between the WAN ports of both ZyXEL MIMO CPEs. The combination of the two ZyXEL MIMO CPEs and the two VLAN switches is equivalent to sixteen two-port bridges.
32/80
Please follow the steps below to carry out this test. Prepare the network elements as depicted above. Make sure that the WAN links of both ZyXEL MIMO CPE A and ZyXEL MIMO CPE B are up and that each of the WAN interfaces acquires an IP address. To check the WAN status of a ZyXEL MIMO CPE, log on to the ZyXEL MIMO CPE and go to Web>Status>Device Information. Turn off the firewall on each ZyXEL MIMO CPE before performing ping check to see if ZyXEL MIMO CPE A and ZyXEL MIMO CPE B can reach each other. By default the firewall blocks incoming ICMP packets. To turn off the firewall, go to Web>Security>Firewall>General. Go to ZyXEL MIMO CPE As Command Interpreter and execute the following CLI command to ping ZyXEL MIMO CPE Bs WAN IP address. MAX-216M1> ip ping < ZyXEL MIMO CPE Bs WAN IP address> If ZyXEL MIMO CPE A can reach ZyXEL MIMO CPE B, the console will display information such as follows; otherwise it means ZyXEL MIMO CPE B is unreachable. sent 1 2 rcvd rate 1 100 2 100 rtt 50 70
33/80
avg 50 53
mdev 0 5
max 50 70
min 50 50
3 100
30
50
10
70
30
Perform the same check from ZyXEL MIMO CPE B. If the results show that ZyXEL MIMO CPE A and ZyXEL MIMO CPE B can reach each other, continue to Step 6.2.5; otherwise go back to Step 6.2.2. You may turn on the Firewall now. To turn on the firewall, go to Web>Security>Firewall>General . Go to ZyXEL MIMO CPE As Command Interpreter Mode and execute the following CLI command to set up the L2/L3 VPNT feature configuration necessary. MAX-216M1> vpnt load MAX-216M1> vpnt active on MAX-216M1> vpnt gre <MAX-206M2/MAX216M1 Bs IP address> MAX-216M1> vpnt pw config 0 on 100 5100 "Pseudowirw 0" MAX-216M1> vpnt pw config 1 on 101 5101 "Pseudowirw 1" MAX-216M1> vpnt pw config 2 on 102 5102 "Pseudowirw 2" MAX-216M1> vpnt pw config 3 on 103 5103 "Pseudowirw 3" MAX-216M1> vpnt pw config 4 on 104 5104 "Pseudowirw 4" MAX-216M1> vpnt pw config 5 on 105 5105 "Pseudowirw 5" MAX-216M1> vpnt pw config 6 on 106 5106 "Pseudowirw 6" MAX-216M1> vpnt pw config 7 on 107 5107 "Pseudowirw 7" MAX-216M1> vpnt pw config 8 on 108 5108 "Pseudowirw 8" MAX-216M1> vpnt pw config 9 on 109 5109 "Pseudowirw 9" MAX-216M1> vpnt pw config 10 on 110 5110 "Pseudowirw 10" MAX-216M1> vpnt pw config 11 on 111 5111 "Pseudowirw 11" MAX-216M1> vpnt pw config 12 on 112 5112 "Pseudowirw 12" MAX-216M1> vpnt pw config 13 on 113 5113 "Pseudowirw 13" MAX-216M1> vpnt pw config 14 on 114 5114 "Pseudowirw 14" MAX-216M1> vpnt pw config 15 on 115 5115 "Pseudowirw 15" MAX-216M1> vpnt cif config 0 on -1 B 0 000000 "Customer 0" MAX-216M1vpnt cif config 1 on 2391 B 1 000000 "Customer 1" MAX-216M1> vpnt cif config 2 on 2392 B 2 001000 "Customer 2" MAX-216M1> vpnt cif config 3 on 2393 B 3 001010 "Customer 3" MAX-216M1> vpnt cif config 4 on 2394 B 4 001100 "Customer 4" MAX-216M1> vpnt cif config 5 on 2395 B 5 001110 "Customer 5" MAX-216M1> vpnt cif config 6 on 2396 B 6 010000 "Customer 6"
34/80
MAX-216M1> vpnt cif config 7 on 2397 B 7 010010 "Customer 7" MAX-216M1> vpnt cif config 8 on 2398 B 8 010100 "Customer 8" MAX-216M1> vpnt cif config 9 on 2399 B 9 010110 "Customer 9" MAX-216M1> vpnt cif config 10 on 2400 B 10 011000 "Customer 10" MAX-216M1> vpnt cif config 11 on 2401 B 11 011010 "Customer 11" MAX-216M1> vpnt cif config 12 on 2402 B 12 011110 "Customer 12" MAX-216M1> vpnt cif config 13 on 2403 B 13 100000 "Customer 13" MAX-216M1> vpnt cif config 14 on 2404 B 14 100010 "Customer 14" MAX-216M1> vpnt cif config 15 on 2405 B 15 100100 "Customer 15" MAX-216M1> vpnt save To view and double-check the latest configuration, execute the following CLI commands. MAX-216M1> vpnt load MAX-216M1> vpnt gre MAX-216M1> vpnt pw list MAX-216M1> vpnt cif list Go to ZyXEL MIMO CPE Bs Command Interpreter and execute the following CLI command to set up the L2/L3 VPNT feature configuration. MAX-216M1> vpnt load MAX-216M1> vpnt active on MAX-216M1> vpnt gre <ZyXEL MIMO CPE A's IP address> MAX-216M1> vpnt pw config 0 on 5100 100 "Pseudowirw 0" MAX-216M1> vpnt pw config 1 on 5101 101 "Pseudowirw 1" MAX-216M1> vpnt pw config 2 on 5102 102 "Pseudowirw 2" MAX-216M1> vpnt pw config 3 on 5103 103 "Pseudowirw 3" MAX-216M1> vpnt pw config 4 on 5104 104 "Pseudowirw 4" MAX-216M1> vpnt pw config 5 on 5105 105 "Pseudowirw 5" MAX-216M1> vpnt pw config 6 on 5106 106 "Pseudowirw 6" MAX-216M1> vpnt pw config 7 on 5107 107 "Pseudowirw 7" MAX-216M1> vpnt pw config 8 on 5108 108 "Pseudowirw 8" MAX-216M1> vpnt pw config 9 on 5109 109 "Pseudowirw 9" MAX-216M1> vpnt pw config 10 on 5110 110 "Pseudowirw 10" MAX-216M1> vpnt pw config 11 on 5111 111 "Pseudowirw 11" MAX-216M1> vpnt pw config 12 on 5112 112 "Pseudowirw 12" MAX-216M1> vpnt pw config 13 on 5113 113 "Pseudowirw 13"
35/80
MAX-216M1> vpnt pw config 14 on 5114 114 "Pseudowirw 14" MAX-216M1> vpnt pw config 15 on 5115 115 "Pseudowirw 15" MAX-216M1> vpnt cif config 0 on -1 B 0 000000 "Customer 0" MAX-216M1> vpnt cif config 1 on 2391 B 1 000000 "Customer 1" MAX-216M1> vpnt cif config 2 on 2392 B 2 001000 "Customer 2" MAX-216M1> vpnt cif config 3 on 2393 B 3 001010 "Customer 3" MAX-216M1> vpnt cif config 4 on 2394 B 4 001100 "Customer 4" MAX-216M1> vpnt cif config 5 on 2395 B 5 001110 "Customer 5" MAX-216M1> vpnt cif config 6 on 2396 B 6 010000 "Customer 6" MAX-216M1> vpnt cif config 7 on 2397 B 7 010010 "Customer 7" MAX-216M1> vpnt cif config 8 on 2398 B 8 010100 "Customer 8" MAX-216M1> vpnt cif config 9 on 2399 B 9 010110 "Customer 9" MAX-216M1> vpnt cif config 10 on 2400 B 10 011000 "Customer 10" MAX-216M1> vpnt cif config 11 on 2401 B 11 011010 "Customer 11" MAX-216M1> vpnt cif config 12 on 2402 B 12 011110 "Customer 12" MAX-216M1> vpnt cif config 13 on 2403 B 13 100000 "Customer 13" MAX-216M1> vpnt cif config 14 on 2404 B 14 100010 "Customer 14" MAX-216M1> vpnt cif config 15 on 2405 B 15 100100 "Customer 15" MAX-216M1> vpnt save To view and double-check the latest configuration, execute the following CLI commands. MAX-216M1> vpnt load MAX-216M1> vpnt gre MAX-216M1> vpnt pw list MAX-216M1> vpnt cif list Properly configure sixteen virtual LANs (including one untagged LAN) on each VLAN switch, and aggregate the traffic to a port connected to each ZyXEL MIMO CPEs LAN port. Check if the PC in each VLAN behind ZyXEL MIMO CPE A can acquire an IP address from the DHCP server in the corresponding VLAN behind ZyXEL MIMO CPE B. When the PC in each VLAN behind ZyXEL MIMO CPE A are acquiring an IP address from the DHCP server, the DSCP of each VLAN can be checked by monitoring the packets over the air. After the PC in each VLAN has acquired an IP address, check if the PC can
36/80
access the Internet without any problem. Check out the traffic counters of each ZyXEL MIMO CPE by executing the following CLI commands. MAX-216M1> vpnt pw cnt display all MAX-216M1> vpnt cif cnt display all
In this test case, we configure one of ZyXEL MIMO CPEs customer interfaces for Routing/NAT. The PC behind this customer interface can acquire an IP address from the ZyXEL MIMO CPEs DHCP server and then access the Internet.
Please follow the steps below to carry out this test. Prepare the network elements as depicted above. Make sure that the WAN link of ZyXEL MIMO CPE is up and its WAN interface has acquired an IP address. To check the WAN status of ZyXEL MIMO CPE, log on to ZyXEL MIMO CPE and go to Web>Status>Device Information . Go to ZyXEL MIMO CPEs Command Interpreter and execute the following CLI command to check its connectivity to the Internet. MAX-216M1> ip ping www.google.com If ZyXEL MIMO CPE can reach www.google.com, the console will display information such as follows; otherwise it means ZyXEL MIMO CPE has no
37/80
Internet connectivity. sent 1 2 3 rcvd rate 1 100 2 100 3 100 rtt 70 70 70 avg 70 70 70 mdev 0 0 0 max 70 70 70 min 70 70 70
If ZyXEL MIMO CPE has Internet connectivity, continue to Step 6.3.4; otherwise go back to Step 6.3.2. Go to ZyXEL MIMO CPEs Command Interpreter and execute the following CLI command to set up an untagged customer interface for Routing/NAT. MAX-216M1> vpnt load MAX-216M1> vpnt active on MAX-216M1> vpnt cif config 0 on -1 R "" "" "Customer X" MAX-216M1> vpnt save To view and double-check the latest configuration, execute the following CLI commands. MAX-216M1> vpnt load MAX-216M1> vpnt cif list Go to ZyXEL MIMO CPEs Web>Network>LAN>DHCP Setup and properly configure ZyXEL MIMO CPEs DHCP server. Connect a PC to the LAN port of ZyXEL MIMO CPE. Check if the PC can acquire an IP address from ZyXEL MIMO CPEs DHCP server. After the PC has acquired an IP address, check if the PC can access the Internet without any problem. Check out the traffic counters of ZyXEL MIMO CPE by executing the following CLI commands. MAX-216M1> vpnt cif cnt display all
6.8.4 GRE Tunnel via LAN Port to Bypass Radio Link Uncertainty
This test case is similar to Case 2, except that the GRE tunnel is established between the LAN ports of both ZyXEL MIMO CPEs, in order to bypass the uncertainty of radio link. Before a GRE tunnel can be established between the LAN ports of both ZyXEL MIMO CPE s, a customer interface on each ZyXEL MIMO CPE must first be configured for routing.
38/80
The establishment of a GRE tunnel between the LAN ports of two MAX-206M2/MAX216M1s
Please follow the steps below to carry out this test. Prepare the network elements as depicted above. Go to ZyXEL MIMO CPE As Web>Network>LAN>IP to configure its LAN interface IP address as 192.168.1.10. Go to ZyXEL MIMO CPE Bs Web>Network>LAN>IP to configure its LAN interface IP address as 192.168.1.11. Now ZyXEL MIMO CPE As LAN interface is on the same subnet as ZyXEL MIMO CPE Bs LAN interface. Go to ZyXEL MIMO CPE As Command Interpreter and execute the following CLI command to set up one untagged customer interface for routing/NAT. MAX-216M1> vpnt load MAX-216M1> vpnt active on MAX-216M1> vpnt cif config 0 on -1 R "" "" "for routing/NAT" MAX-216M1> vpnt save Go to ZyXEL MIMO CPE Bs Command Interpreter and execute the following CLI command to also set up one untagged customer interface for routing/NAT. MAX-216M1> vpnt load
39/80
MAX-216M1> vpnt active on MAX-216M1> vpnt cif config 0 on -1 R "" "" "for routing/NAT" MAX-216M1> vpnt save Properly configure one untagged virtual LAN on each VLAN switch, and forward the traffic to a port connected to each ZyXEL MIMO CPEs LAN port. Go to ZyXEL MIMO CPE As Command Interpreter and execute the following CLI command to ping ZyXEL MIMO CPE Bs LAN IP address. MAX-216M1> ip ping 192.168.1.11 If ZyXEL MIMO CPE A can reach ZyXEL MIMO CPE B, the console will display information such as follows; otherwise it means ZyXEL MIMO CPE B is unreachable. sent 1 2 3 rcvd rate 1 100 2 100 3 100 rtt 50 70 30 avg 50 53 50 mdev 0 5 10 max 50 70 70 min 50 50 30
Perform the same check from ZyXEL MIMO CPE B. If the results show that ZyXEL MIMO CPE A and ZyXEL MIMO CPE B can reach each. Go to ZyXEL MIMO CPE As Command Interpreter and execute the following CLI command to set up the L2/L3 VPNT feature configuration necessary. MAX-216M1> vpnt load MAX-216M1> vpnt active on MAX-216M1> vpnt gre 192.168.1.11 MAX-216M1> vpnt pw config 1 on 101 5101 "Pseudowirw 1" MAX-216M1> vpnt pw config 2 on 102 5102 "Pseudowirw 2" MAX-216M1> vpnt pw config 3 on 103 5103 "Pseudowirw 3" MAX-216M1> vpnt pw config 4 on 104 5104 "Pseudowirw 4" MAX-216M1> vpnt pw config 5 on 105 5105 "Pseudowirw 5" MAX-216M1> vpnt pw config 6 on 106 5106 "Pseudowirw 6" MAX-216M1> vpnt pw config 7 on 107 5107 "Pseudowirw 7" MAX-216M1> vpnt pw config 8 on 108 5108 "Pseudowirw 8" MAX-216M1> vpnt pw config 9 on 109 5109 "Pseudowirw 9" MAX-216M1> vpnt pw config 10 on 110 5110 "Pseudowirw 10" MAX-216M1> vpnt pw config 11 on 111 5111 "Pseudowirw 11"
40/80
MAX-216M1> vpnt pw config 12 on 112 5112 "Pseudowirw 12" MAX-216M1> vpnt pw config 13 on 113 5113 "Pseudowirw 13" MAX-216M1> vpnt pw config 14 on 114 5114 "Pseudowirw 14" MAX-216M1> vpnt pw config 15 on 115 5115 "Pseudowirw 15" MAX-216M1> vpnt cif config 1 on 2391 B 1 000000 "Customer 1" MAX-216M1> vpnt cif config 2 on 2392 B 2 001000 "Customer 2" MAX-216M1> vpnt cif config 3 on 2393 B 3 001010 "Customer 3" MAX-216M1> vpnt cif config 4 on 2394 B 4 001100 "Customer 4" MAX-216M1> vpnt cif config 5 on 2395 B 5 001110 "Customer 5" MAX-216M1> vpnt cif config 6 on 2396 B 6 010000 "Customer 6" MAX-216M1> vpnt cif config 7 on 2397 B 7 010010 "Customer 7" MAX-216M1> vpnt cif config 8 on 2398 B 8 010100 "Customer 8" MAX-216M1> vpnt cif config 9 on 2399 B 9 010110 "Customer 9" MAX-216M1> vpnt cif config 10 on 2400 B 10 011000 "Customer 10" MAX-216M1> vpnt cif config 11 on 2401 B 11 011010 "Customer 11" MAX-216M1> vpnt cif config 12 on 2402 B 12 011110 "Customer 12" MAX-216M1> vpnt cif config 13 on 2403 B 13 100000 "Customer 13" MAX-216M1> vpnt cif config 14 on 2404 B 14 100010 "Customer 14" MAX-216M1> vpnt cif config 15 on 2405 B 15 100100 "Customer 15" MAX-216M1> vpnt save To view and double-check the latest configuration, execute the following CLI commands. MAX-216M1> vpnt load MAX-216M1> vpnt gre MAX-216M1> vpnt pw list MAX-216M1> vpnt cif list Go to MAX-206M2/MAX216M1 Bs Command Interpreter and execute the following CLI command to set up the L2/L3 VPNT feature configuration. MAX216M1> vpnt load MAX216M1> vpnt active on MAX216M1> vpnt gre 192.168.1.10 MAX216M1> vpnt pw config 1 on 5101 101 "Pseudowirw 1" MAX216M1> vpnt pw config 2 on 5102 102 "Pseudowirw 2" MAX216M1> vpnt pw config 3 on 5103 103 "Pseudowirw 3" MAX216M1> vpnt pw config 4 on 5104 104 "Pseudowirw 4"
41/80
MAX216M1> vpnt pw config 5 on 5105 105 "Pseudowirw 5" MAX216M1> vpnt pw config 6 on 5106 106 "Pseudowirw 6" MAX216M1> vpnt pw config 7 on 5107 107 "Pseudowirw 7" MAX216M1> vpnt pw config 8 on 5108 108 "Pseudowirw 8" MAX216M1> vpnt pw config 9 on 5109 109 "Pseudowirw 9" MAX216M1> vpnt pw config 10 on 5110 110 "Pseudowirw 10" MAX216M1> vpnt pw config 11 on 5111 111 "Pseudowirw 11" MAX216M1> vpnt pw config 12 on 5112 112 "Pseudowirw 12" MAX216M1> vpnt pw config 13 on 5113 113 "Pseudowirw 13" MAX216M1> vpnt pw config 14 on 5114 114 "Pseudowirw 14" MAX216M1> vpnt pw config 15 on 5115 115 "Pseudowirw 15" MAX216M1> vpnt cif config 1 on 2391 B 1 000000 "Customer 1" MAX216M1> vpnt cif config 2 on 2392 B 2 001000 "Customer 2" MAX216M1> vpnt cif config 3 on 2393 B 3 001010 "Customer 3" MAX216M1> vpnt cif config 4 on 2394 B 4 001100 "Customer 4" MAX216M1> vpnt cif config 5 on 2395 B 5 001110 "Customer 5" MAX216M1> vpnt cif config 6 on 2396 B 6 010000 "Customer 6" MAX216M1> vpnt cif config 7 on 2397 B 7 010010 "Customer 7" MAX216M1> vpnt cif config 8 on 2398 B 8 010100 "Customer 8" MAX216M1> vpnt cif config 9 on 2399 B 9 010110 "Customer 9" MAX216M1> vpnt cif config 10 on 2400 B 10 011000 "Customer 10" MAX216M1> vpnt cif config 11 on 2401 B 11 011010 "Customer 11" MAX216M1> vpnt cif config 12 on 2402 B 12 011110 "Customer 12" MAX216M1> vpnt cif config 13 on 2403 B 13 100000 "Customer 13" MAX216M1> vpnt cif config 14 on 2404 B 14 100010 "Customer 14" MAX216M1> vpnt cif config 15 on 2405 B 15 100100 "Customer 15" MAX216M1> vpnt save To view and double-check the latest configuration, execute the following CLI commands. MAX216M1> vpnt load MAX216M1> vpnt gre MAX216M1> vpnt pw list MAX216M1> vpnt cif list Properly configure fifteen more virtual LANs (all untagged) on each VLAN switch, and aggregate the traffic to the port connected to each ZyXEL
42/80
MIMO CPEs LAN port. Check if the PC in each VLAN behind ZyXEL MIMO CPE A can acquire an IP address from the DHCP server in the corresponding VLAN behind ZyXEL MIMO CPE B. When the PC in each VLAN behind ZyXEL MIMO CPE A are acquiring an IP address from the DHCP server, the DSCP of each VLAN can be checked by monitoring the packets in the established GRE tunnel). After the PC in each VLAN has acquired an IP address, check if the PC can access the Internet without any problem. Check out the traffic counters of each ZyXEL MIMO CPE by executing the following CLI commands. MAX216M1> vpnt pw cnt display all MAX216M1> vpnt cif cnt display all
43/80
3.60BCC0b3_20080520.rtf is the release note. MAX206M2_readme.txt is the descript of the files. MAX206M2_b3_20080520(13506).zip is the major firmware which includes WiMAX CARD and SYSTEM BOARD firmware both. It is for the ONE STEP firmware upgrade and Web GUI firmware upgrade. This ONE STEP firmware upgrade only be supported after b4_20080724 version. MAX206M2_b3_20080520(13506)_SBFW.zip is the SYSTEM BOARD firmware only MAX206M2_b3_2008050(13506)_WCFW.zip is the WiMAX CARD firmware only.
Click the SYSTEM_BOARD_Upgrade.bat (If you change your CPE LAN IP and Admin Password, please edit the IP in the batch file to fit your option and fwupdate_max216m1.txt for the admin password. The firmware upgrade will start.
In the upgrading, all LED will flashing. After the flashing, the system will reboot and it means upgrade complete.
45/80
6.9.5.2 Reset by command Telnet into CPE. Type the cli sys
46/80
In the upgrading, all LED will flashing. After the flashing, the system will reboot and it means upgrade complete.
Click the MAX206M2_Upgrade.bat (If you change your CPE LAN IP and Admin Password, please edit the IP in the batch file to fit your option and wcfw.txt for the admin password. The firmware upgrade will start.
In the upgrading, all LED will flashing. After the flashing, the system will reboot and it means upgrade complete. 6.9.7.2 7.2 Upgrade by Web Login to Web. Into page Advance -> System configuration -> Firmware You can selection the file to upgrade the firmware.
Please select MAX206M2.wcwd During the FW/SW upgrading, the all LED will blinking until upgrade completed, system will reboot automatically after upgrade, just wait 4~5 minutes
47/80
48/80
49/80
7. Troubleshooting
When you do the IOT test, you may encounter some unexpected conditions in the network entry process; this chapter is to provide the troubleshooting steps in order to help you run the IOT test smoothly.
7.1 What can I do when struggling in the DL_SYN and Ranging process?
When you encounter the conditions as diagram, you can follow the steps to solve that problem. 1. The WiMAX indicator is blinking or no blink. 2. The trace log displayed the DL_SYNCHRONIZATION or RANGING.
Step1: Check the WiMAX card status. If the Power led is red, it indicates the WiMAX card is damaged, not ready or has become unseated from the main board. You can also perform the CLI command wimax debug to check the card is alive or not. If you use the command wimax debug 18 trying to reboot the wimax card, but it still is failed, you may send the card back to ZyXEL.
50/80
Step3: Check current frequency status in the WiMAX card. After you ran the step2, You have to check the frequency setting is using correctly in the wimax card.
51/80
Step4: Check signal quality in the WiMAX card. The ZyXEL MIMO CPE connection RSSI threshold value is about -90 dBi, if the RSSI value is less than -90, the ranging process might be failed.
Master stroke Send the trace log to ZyXEL After you followed the steps above, the CPE is still struggling in the DL_SYNCHRONIZATION or RANGING. Please follow the steps as diagram to send the trace log to ZyXEL.
52/80
Step1: Check the RSSI strength. If the RSSI is less than -90, it might be caused the authentication process failure.
Step2: Check the setting of EAP. You could have to check some EAP settings like username, password, authentication mode, inner authentication, anonymous ID and verify server certificate demand.
53/80
Step4: Check the Device certificate and date. If customer dont need this, we can skip this step.
54/80
Master stroke Send the trace log to ZyXEL After you followed the steps above, the CPE is still struggling in the Authentication process. Please follow the steps as diagram to send the trace log to ZyXEL.
PS: If you have console line, please also peform the command wimax eap debug 0 1 to dump more detail log.
55/80
Step3: Enable the wimax log and catch the trace log.
56/80
Step3: Enable the wimax log and catch the trace log.
57/80
Step2: Open the WireShark software to catch the VOIP trace log, type the filter rule sip to filter the VOIP packets.
58/80
7.6.2 Use ZyXEL console line to catch the VOIP trace log.
Step1: take off the device housing and plug in the console line to main board.
Step2: First make sure that the Internet is accessible from the device. Make a simple ping from CLI to do it. If the server address uses domain name, make sure the domain name can be properly resolved and SIP server is reachable.
Step3: To generate SIP signal trace log, please type voice sip tl (tl stands for trace log). 0 is default value and stands for none. 1 captures all logs (This mode is suggested to capture log for ZyXEL support.). 2 only capture the outgoing sip signaling. 3 only capture the incoming sip signaling. 4 only captures SIP TX and RX sip signaling. 5 only capture the state machines status. 6 only show error. 59/80
7 only show warning. If problem is encountered upon registration or signaling, we suggest to make a level 4 trace of SIP transmit and receive signal. This will make the log more readable due to its including only the TX and RX signal trace. Then access from console on the PCB, and in CLI mode. 1. Type voice sip tl h to show all the options. 2. Type voice sip tl<value> to set the trace log level. In this example, Option 4 is used. 3. Type exit to exit the CLI, but still with the console connected and terminal open.
Step4: For ZyXEL MIMO CPE ,if you want to do the test on CLI mode directly, please use CLI command voice sip sigreg <index> to enable the SIP1/SIP2 setting; voice sip sigunreg <index>to disable the SIP1/SIP2 setting.
60/80
Step5: After making a registration or call attempt, you should see the signal dump on the terminal. In it, you can check whether there are SIP error codes and check what the error is. You can have a configuration change to be on the error code which you received and try again.
Step6: In the above case, the registration failure is caused by failed authorization. Thus, error code 401 Unauthorized is received.
61/80
Step7: The registration is successful now. If a problem can not be resolved, capture the whole log dump from the starting of the registration or call until the problem was encountered and send it to the support for further analysis.
Step8: If all the attempts fail, use the this command voice fsm debug all 1 to capture a complete debug log. The procedure is as with the trace log command and dumps all the log from start until the problem occurred and sends it to us for analysis. Phone = fxs, fxo Debug Ccm = Call Control Management Sip = Sip Protocol Debug Ua = User Agent Debug Sip Tx = Sip Transition Debug Rtp = RTP Packet Debug
62/80
63/80
64/80
8. Appendix
8.1 FAQ
How MAC address is managed in Simple CPE? There are two MAC addresses reserved for each Simple CPE. One for LAN, the other for WiMAX. They are consecutive numbers. When Simple CPE powers up, it will check and write the MAC address in to PCMCIA card. This address will also be saved in PCMCIA cards flash ROM. If you try to swap several PCMCIA cards in a single Simple CPE, it might cause all cards share same MAC addresses. Remember not to use these cards separately in notebook. What version of EAP-TTLS is supported? Only support v0
WANDeviceNumberOfEntries InternetGatewayDevice.DeviceInfo. Manufacturer ManufacturerOUI ModelName Description ProductClass SerialNumber HardwareVersion SoftwareVersion ModemFirmwareVersion SpecVersion ProvisioningCode UpTime FirstUseDate DeviceLog
uint object string string string string string string string string string string string uint
W -
dateTim e string -
As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1
InternetGatewayDevice.ManagementServer. URL Username Password PeriodicInformEnable PeriodicInformInterval PeriodicInformTime ParameterKey ConnectionRequestURL 66/80
W W W
string string
W W
NTPServer3
string
NTPServer4
string
NTPServer5
string
boolean W
As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 ps. only support 1 NTPserver As defined in TR-098 Amendment 1 ps. only support 1 NTPserver As defined in TR-098 Amendment 1 ps. only support 1 NTPserver As defined in TR-098 Amendment 1 ps. only support 1 NTPserver As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 ps. only one WAN interface. As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 ps. Max instance number = 8 As defined in TR-098 Amendment 1
Status Type DestIPAddress DestSubnetMask GatewayIPAddress Interface ForwardingMetric InternetGatewayDevice.LANConfigSecurity. ConfigPassword InternetGatewayDevice.IPPingDiagnostics DiagnosticsState
W W W W -
string string
W W
uint [1:] W uint [1:] W uint W [1:6553 5] uint [0:63] uint uint uint uint uint W -
As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 ps. only support Default As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 ps. only one WAN interface. As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 ps. support Requested and Complete As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 ps. support value: 8 ~ 41836 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1
68/80
InternetGatewayDevice.LANDevice.{i}.LANHost object ConfigManagement. DHCPServerConfigurable boolean W DHCPServerEnable DHCPRelay MinAddress MaxAddress SubnetMask DNSServers DomainName IPRouters boolean W boolean string string string string string string W W W W W W
DHCPLeaseTime IPInterfaceNumberOfEntries
boolean -
W W W
As defined in TR-098 Amendment 1 ps. instance number = 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 ps. only support one Router address. As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 ps. instance number = 1 As defined in TR-098 Amendment 1 ps. cant disable the only one LAN interface As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1
69/80
As defined in TR-098 Amendment 1 ps. LAN interface can not be disable As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 ps. instance number = 1. As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 ps. instance number = 1. As defined in TR-098 Amendment 1
InternetGatewayDevice.LANDevice.{i}.LANEthe object rnetInterfaceConfig.{i}.Stats. BytesSent uint BytesReceived PacketsSent PacketsReceived InternetGatewayDevice.LANDevice.{i}.Hosts. HostNumberOfEntries uint uint uint object uint
InternetGatewayDevice.LANDevice.{i}.Hosts.H object ost.{i}. IPAddress AddressSource LeaseTimeRemaining MACAddress HostName InterfaceType Active InternetGatewayDevice.WANDevice.{i}. WANConnectionNumberOfEntries 70/80 string string
InternetGatewayDevice.WANDevice.{i}.WANCo object mmonInterfaceConfig. EnabledForInternet WANAccessType Layer1UpstreamMaxBitRate Layer1DownstreamMaxBitRate PhysicalLinkStatus TotalBytesSent TotalBytesReceived TotalPacketsSent TotalPacketsReceived MaximumActiveConnections NumberOfActiveConnections
As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 ps. instance number = 1. As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 ps. instance number = 1. As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 ps. support IP_Routed IP_Bridged As defined in TR-098 Amendment 1 ps. string length dont exceed 10 bytes As defined in TR-098 Amendment 1
boolean W string uint utin string uint uint uint uint uint uint -
Name
string
Uptime 71/80
uint
string uint
boolean W
PortMappingNumberOfEntries
uint
InternetGatewayDevice.WANDevice.{i}.WANCo object nnectionDevice.{i}.WANIPConnection.{i}.PortM apping.{i}. PortMappingEnabled PortMappingLeaseDuration RemoteHost ExternalPort InternalPort PortMappingProtocol 72/80
As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 ps. unable to disable DNS server As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 ps. only support AlwaysOn As defined in TR-098 Amendment 1 ps. support Off RIPv1 RIPv2 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 ps. max instance number = 11. As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1
InternalClient PortMappingDescription
string string
W W -
InternetGatewayDevice.WANDevice.{i}.WANCo object nnectionDevice.{i}.WANIPConnection.{i}.Stats. EthernetBytesSent uint EthernetBytesReceived EthernetPacketsSent EthernetPacketsReceived uint uint uint
As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1 As defined in TR-098 Amendment 1
8.2.3
InternetGatewayDevice.Service.VoiceService parameters:
Write 3 Description 4 As defined in TR-104 As defined in TR-104 As defined in TR-104 ps. instance number = 1. As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 ob uint object uint object uint uint uint uint string string
Support list of TR069 Objects and Parameters 1 Type 2 Services. VoiceServiceNumberOfEntries .VoiceService.{i}. VoiceProfileNumberOfEntries .VoiceService.{i}.Capabilities. MaxProfileCount MaxLineCount MaxSessionsPerLine MaxSessionCount SignalingProtocols Regions RTCP SRTP RTPRedundancy DSCPCoupled EthernetTaggingCoupled PSTNSoftSwitchOver FaxT38
73/80
FaxPassThrough ModemPassThrough ToneGeneration RingGeneration NumberingPlan ButtonMap .VoiceService.{i}.Capabilities.SIP. Role Extensions Transports URISchemes EventSubscription ResponseMap .VoiceService.{i}.Capabilities.Codecs.{i}. EntryID Codec BitRate PacketizationPeriod SilenceSuppression .VoiceService.{i}.VoiceProfile.{i}. Enable Reset NumberOfLines Name SignalingProtocol MaxSessions DTMFMethod .VoiceService.{i}.VoiceProfile.{i}.ServiceProvid erInfo. 74/80
boolean boolean boolean boolean boolean boolean object string string string string -
As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 ps. instance number = 4 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 ps. instance number = 2. As defined in TR-104 ps. support Disable Enable As defined in TR-104 As defined in TR-104
As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104
Name URL ContactPhoneNumber EmailAddress .VoiceService.{i}.VoiceProfile.{i}.SIP. ProxyServer ProxyServerPort ProxyServerTransport RegistrarServer RegistrarServerPort RegistrarServerTransport UserAgentDomain UserAgentPort UserAgentTransport OutboundProxy OutboundProxyPort RegistrationPeriod RegisterExpires RegisterRetryInterval UseCodecPriorityInSDPResponse .VoiceService.{i}.VoiceProfile.{i}.RTP. LocalPortMin LocalPortMax DSCPMark TelephoneEventPayloadType 75/80
W W W W
As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104
string
As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 ps. support value: 50000 ~ 65535 As defined in TR-104 ps. support value: 50000 ~ 65535 As defined in TR-104 As defined in TR-104
W uint [0:6553 5] uint [1:] W uint [1:] W uint [1:] W boolean object uint [0:6553 5] uint [0:6553 5] uint [0:63] uint W W W -
.VoiceService.{i}.VoiceProfile.{i}.Line.{i}. Enable DirectoryNumber Status CallState PhyReferenceList .VoiceService.{i}.VoiceProfile.{i}.Line.{i}.SIP. AuthUserName AuthPassword URI
object string string string string string object string string string
W W W W W W W W W
As defined in TR-104 ps. instance number = 1 As defined in TR-104 ps. support Disable Enable As defined in TR-104 ps. max string length = 127 As defined in TR-104 As defined in TR-104 As defined in TR-104 ps. the valid value: 0, 1, 2 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 ps. max string length = 127 As defined in TR-104 As defined in TR-104 ps. value range: [-13: 13] As defined in TR-104 ps. value range: [-13: 13] As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104
.VoiceService.{i}.VoiceProfile.{i}.Line.{i}.Callin object gFeatures. CallerIDName string .VoiceService.{i}.VoiceProfile.{i}.Line.{i}.Voice object Processing. TransmitGain int ReceiveGain EchoCancellationEnable EchoCancellationInUse EchoCancellationTail int
.VoiceService.{i}.VoiceProfile.{i}.Line.{i}.Code object c. TransmitCodec string ReceiveCodec TransmitBitRate ReceiveBitRate TransmitSilenceSuppression string uint uint
boolean -
76/80
boolean Support list of TR069 Objects and Parameters 1 InternetGatewayDevice.X_ZYXEL-COM-TW_WiMAX. CINRMean CINRDeviation RSSI ULDataRate DLDataRate TxPower Type 2 object string string string string string string -
The sub-root of vendor-specific parameters related to wimax. Mean CINR report (dB)
Standard deviation CINR report (dB) Mean RSSI report (dBm) Uplink Data Rate (bits/s) Downlink Data Rate (bits/s) Transmission Power (dBm)
InternetGatewayDevice.X_ZYXEL-COM-TW_WiMAX.Ea object p. Username string Password AuthenticationType InnerAuthenticationType string string string
W W W W
AuthMode
string
MyCertificate
string
AnonymousID Validcert
string string
W W W
the authentication setting of the device Username of device EAP configuration. ps. max string length = 63 Password of device EAP configuration. ps. max string length = 47 The Authentication type of devi EAP configuration. ps. valid value: <md5 | tls | ttls The Inner Authentication type o device EAP configuration. ps. valid value: <chap | pap | mschap | mschap > The Authentication mode of dev EAP configuration. ps. valid value: <0 | 1 | 2 | 6 > (0:none; 1:user-only; 2:device-only with Cert; 6:Cert and User Auth.) The name of using certificate generated from device itself. ps. the valid value is the name the certificates of My Certificat Anonymous ID of device EAP configuration. Username of device EAP configuration. ps. valid value: <0 | 1> The scanning Frequency list stor in the device (unit: kHz). The 1st Frequency setting store in the device (unit: kHz). valid range: 2.3G [0, 2300000 ~ 2500000] k 2.5G [0, 2500000 ~ 2700000] k 3.5G [0, 3400000 ~ 3600000] k The 2ed Frequency setting store in the device (unit: kHz). valid range: the as DLFrequency The 3rd Frequency setting store
TransmitPacketizationPeriod
uint
As defined in TR-104 As defined in TR-104 ps. instance number = 4 As defined in TR-104 As defined in TR-104 As defined in TR-104
.VoiceService.{i}.VoiceProfile.{i}.Line.{i}.Code object c.List.{i}. EntryID uint [1:] Codec BitRate PacketizationPeriod string uint string W
As defined in TR-104 ps. value range: for G.711: 10~30 for G.729 : 10~80 for G.723.1: only 30 As defined in TR-104 As defined in TR-104 As defined in TR-104 ps. value range: 1~3 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 As defined in TR-104 ps. instance number = 2 As defined in TR-104 As defined in TR-104 As defined in TR-104
.VoiceService.{i}.VoiceProfile.{i}.Line.{i}.Sessi object on.{i}. SessionStartTime dateTim e SessionDuration uint FarEndIPAddress FarEndUDPPort LocalUDPPort .VoiceService.{i}.PhyInterface.{i}. PhyPort InterfaceID Description string -
78/80
object object
As defined in NWG_Rel_1 5_OTA_Based_On_TR-069. doc As defined in NWG_Rel_1 5_OTA_Based_On_TR As defined in NWG_Rel_1 5_OTA_Based_On_TR As defined in NWG_Rel_1 5_OTA_Based_On_TR As defined in NWG_Rel_1 5_OTA_Based_On_TR valid range: 5000 (means 5M) 8750 (means 8.75M) 10000 (means 10M) or 3500, 4375, 7000. As defined in NWG_Rel_1 5_OTA_Based_On_TR ps. Valid according to Bandwidth As defined in NWG_Rel_1 5_OTA_Based_On_TR ps. Only support 1: TDD As defined in NWG_Rel_1 5_OTA_Based_On_TR As defined in NWG_Rel_1 5_OTA_Based_On_TR As defined in NWG_Rel_1 5_OTA_Based_On_TR valid range: 5000 (means 5M) 8750 (means 8.75M) 10000 (means 10M) or 3500, 4375, 7000. As defined in NWG_Rel_1 5_OTA_Based_On_TR As defined in NWG_Rel_1 5_OTA_Based_On_TR
FFTSize
int
DuplexMode
int
FFTSize DuplexMode
int int
79/80
FirstFrequency
int
LastFrequency
int
NextFrequencyStep Preambles
int
string(2 W 9)
As defined in NWG_Rel_1 5_OTA_Based_On_TR valid range: 2.3G [0, 2300000 ~ 2500000] kHz 2.5G [0, 2500000 ~ 2700000] kHz 3.5G [0, 3400000 ~ 3600000] kHz As defined in NWG_Rel_1 5_OTA_Based_On_TR valid range: 2.3G [0, 2300000 ~ 2500000] kHz 2.5G [0, 2500000 ~ 2700000] kHz 3.5G [0, 3400000 ~ 3600000] kHz As defined in NWG_Rel_1 5_OTA_Based_On_TR As defined in NWG_Rel_1 5_OTA_Based_On_TR
80/80