IR615-S-FS39 Industrial Cellular Router User Manual Issue: V2.
Declaration Thank you for choosing our product. Before using the product, read this manual carefully. The contents of this manual cannot be copied or reproduced in any form without the written permission of InHand. Due to continuous updating, InHand cannot promise that the contents are consistent with the actual product information, and does not assume any disputes caused by the inconsistency of technical parameters. The information in this document is subject to change without notice.
UL MARKINGS: 1.UL File: E364742、E509340. 2. Electrical ratings:Input: 9-26 Vdc, 0.6-0.2A. (Optional) 3.Model number:IR615-S-x-y-z 5.Ambient temperature range:-20 C to +50 C 6. Temperature class:T-5 7.Class I, Division 2, Groups A, B, C and D Hazardous Locations UL INSTALLATION AND OPERATING INSTRUCTIONS: 1. These devices are open-type devices that are to be installed in an enclosure suitable for the environment and where the internal compartment is only accessible by the use of tool. 2.
Contents I. INTRODUCTION TO IR615-S-FS39 ............................................................................................................ 1 1.1 Overview .................................................................................................................................... 1 1. 3 LED Indication ............................................................................................................................ 1 1.3.1 Signal Status .............................................
3.2.2 WAN .................................................................................................................................................. 15 3.2.3 Link Backup ....................................................................................................................................... 17 3.2.4 LAN .................................................................................................................................................... 18 3.2.5 Switch of WLAN Mode .......
3.5.2 IP Bandwidth Limit ............................................................................................................................ 37 3.6 VPN ........................................................................................................................................... 38 3.6.1 IPSec Settings .................................................................................................................................... 39 3.6.2 IPSec Tunnels ..............................
I. Introduction to IR615-S-FS39 1.1 Overview Integrating 2G/3G/4G LTE and advanced security, the IR615-S-FS39 is the next generation of InRouter600 series cellular router. With embedded hardware watchdog, link detection, auto-recovery and auto-reboot, the IR615-S-FS39 provides reliable communications to unattended sites. Reliable VPN technology secures sensitive data.
1.3.2 Applicable to IR615-S-FS39 POWER STATUS WARN ERROR (Red) (Green) (Yellow) (Red) On Off Off Off Powered On On Blinking On Off Powered on succeed On Blinking On Off Dialing On Blinking Off Off Dialing succeed On Blinking Blinking Blinking Upgrading On Blinking On Blinking Reset Succeed Description WLAN LED and description: WLAN Green LED Description On Enable WLAN Off Disable WLAN Blinking Reset Succeed 1.3.
II. Installation 2.1 Preparations Precautions: Please be sure there is 3G/4G network coverage and there is no shield on site. 9~26VDC shall be provided on site. First installation shall be done under direction of the engineer recognized by InHand Networks. 1 PC OS: Windows XP, Windows 7, Windows 10 CPU: PII 233 higher Memory: 32M higher Hard disk: 6.4G higher Serial port: At least one Ethernet port: At least one (10M/100M) IE version: 10.
2.2 Installation 2.2.1 SIM/UIM Card IR615-S-FS39 uses pop-up card holder. Press the yellow button on the right of the card holder and the card holder will pop up. Then, install the SIM/UIM card and press the card holder back to the card slot. 2.2.2 Antenna Slightly rotate the movable part of metal SMA-J interface until it cannot be rotated (at this time, external thread of antenna cable cannot be seen). Do not forcibly screw the antenna by holding black rubber lining. 2.2.
2.3 Login Router Upon installation of hardware, be sure the Ethernet card has been mounted in the supervisory PC prior to logging in the page of Web settings of the router. I. Automatic Acquisition of IP Address (Recommended) Please set the supervisory computer to "automatic acquisition of IP address" and "automatic acquisition of DNS server address" (default configuration of computer system) to let the device automatically assign IP address for supervisory computer. II.
III. Web Configuration Prior to use, the device shall be effectively configured. This chapter will introduce how to configure your router via Web. 3. 1 System The system configuration process involves ten steps, including basic setup, system time, serial port, admin access, system Log, configuration management, task schedule, update, reboot and logout.
as to provide multiple applications based on synced time. From the navigation tree, select System >> Time, then enter the “Time” webpage, as shown below. Click to synchronize the time of the gateway with the system time of the host. Table 3-1-2 Parameters of System Time System Time Function description: Set local time zone and automatic updating time of NTP.
3.1.4 Admin Access Admin services include HTTP, HTTPS, TELNET, SSHD and console. HTTP HTTP (Hypertext Transfer Protocol) is used for transferring web pages on Internet. After enabling HTTP service on device, users can log on via HTTP and access and control the device using a web browser. HTTPS HTTPS (Secure Hypertext Transfer Protocol) is the secure version of hypertext transfer protocol. As a HTTP protocol which supports SSL protocol, it is more secure.
Password Confirm New Password Reconfirm the new password N/A Admin functions Service Port Local Access Remote Access Allowed Access from WAN (Optional) Description Service port of HTTP/HTTPS/TELNET/SSHD/Console 80/443/23/22 Enable - Allow local LAN to administrate the router with corresponding service (e.g. HTTP) Disable - Local LAN cannot administrate the router with corresponding service (e.g. HTTP) Enable - Allow remote host to administrate the router with corresponding service (e.g.
3.1.5 System Log A remote log server can be set through “System Log Settings,” and all system logs will be uploaded to the remote log server through the gateway. This makes remote log software, such as Kiwi Sys log Daemon, a necessity on the host. Kiwi Sys log Daemon is free log server software for Windows. It can receive, record and display logs from host (such as gateway, exchange board and Unix host).
program Network (ISP) Provider For configuring APN, username, password and other parameters of the network providers across the world N/A Validity and order of imported configurations should be ensured. The good con figs will later be serially executed in order after system reboot. If the configuration files didn’t be arranged according to effective order, the system won’t enter the desired state.
3.1.9 Reboot Please save the configurations before reboot, otherwise the configurations that are not saved will be lost after reboot. To reboot the system, please click the System>>Reboot, then click . 3.1.10 Logout To logout, click System >> Logout, and then click .
3. 2 Network Network settings include Dialup/Cellular, WAN Port, WAN (STA Port), Link Backup, LAN Port, WLAN Mode Switch, WLAN, DNS, DDNS and Static Routes. 3.2.1 Dialup/Cellular Connection Insert SIM card and dial to achieve the wireless network connection function of router. Click the “Network>>Dial Interface” menu in the navigation tree to enter the “Dial Interface”. Table3-2-1-1 Parameters of Dialup/Cellular Dialup/Cellular Connection Function description: Configure parameters of PPP dialup.
Telecom) Network Type Auto, 2G Only, 3G Only, 4G Only Auto Connection Mode Optional always online, dial on demand, manual dialing Always Online Redial Interval Set the redialing time when login fails. 30 s Show Advanced Options Initial Commands Set initial commands AT PIN Code For setting PIN code N/A MTU Set max.
Name of Schedule schedule 1 schedule1 Sunday ~ Saturday Click to enable Time Range 1 Set time range 1 9:00-12:00 Time Range 2 Set time range 2 14::00-18:00 Time Range 3 Set time range 3 0:00-0:00 Description Set description content N/A 3.2.2 WAN WAN supports three types of wired access including static IP, dynamic address (DHCP) and ADSL (PPPoE) dialing. DHCP adopts Client/Server communication mode.
Subnet mask Set subnet mask of WAN 255. 0 255. Gateway Set gateway of WAN 192. 168. 1. 1 MTU Max. transmission unit, default/manual settings default (1500) 255.
Default route Enable default route Enable MAC Address MAC Address of the device 00:18:05:08:07:3D (provided by InHand Networks), provided for device manufacturer MTU Max.
ICMP Detection Server Set ICMP detection server N/A ICMP Detection Interval Set ICMP Detection Interval 10 s ICMP Detection Timeout Set ICMP detection timeout 3s ICMP Detection Retries Set ICMP detection max. retries 3 Backup Link Optional dialup/cellular or WAN Dialup/Cellular Connection Backup mode Optional hot or cold backup Hot backup Table 3-2-3-2 Parameters of Link Backup - Backup Mode Link Backup - Backup Mode Function description: Select the way of link backup.
IP Address Set additional IP address of LAN N/A Subnet mask Set subnet mask N/A Description For recording significance of additional IP address (not support Chinese characters) N/A 3.2.5 Switch of WLAN Mode WLAN refers to Wireless Local Area Network. WLAN has two types of interfaces, the Access point and the Client. Click the “Network>>Switch of WLAN Mode” menu in the navigation tree to switch WLAN mode. 3.2.
Scan Click “Scan” to scan the available AP nearby Auth Mode Open type, shared type, WPA-PSK, WPA2-PSK Open type Encryption Method Support NONE, WEP None 3.2.7 WLAN Client (STA Mode) When working in STA mode, the router can access the Internet by connecting to the device as access point. Click the “Network>>WLAN Client” menu in the navigation tree to enter the “WLAN” interface. Select “Client” for the interface type and configure relevant parameters.
IP is used on the WAN port. Click the “Network>>Domain Name Service” menu in the navigation tree to enter the “Domain Name Service” interface. Table 3-2-8 DNS Parameters DNS (DNS Settings) Function description: Configure parameters of DNS. Parameters Description Default Primary DNS Set Primary DNS 0. 0. 0. 0 Secondary DNS Set Secondary DNS 0. 0. 0. 0 3.2.9 Dynamic Domain Name DDNS maps user's dynamic IP address to a fixed DNS service.
Table 3-2-9-2 Main Parameters of Dynamic Domain Name Enable function of dynamic domain name Function description: Set dynamic domain name binding. (Explain with the configuration of QDNS service type) Parameters Description Default Service Type QDNS (3322)-Dynamic Disable URL http://www. 3322. org/ http://www.3322.
3.3 Service Service settings include DHCP service, DNS relay, hot backup (VRRP), device manager, DTU and SMS. 3.3.1 DHCP service DHCP adopts Client/Server communication mode. Client sends configuration request to Server which feeds back corresponding configuration information, including distributed IP address to the Client to achieve the dynamic configuration of IP address and other information.
MAC Address Set a statically specified DHCP’s MAC address (different from other MACs to avoid confliction) N/A IP Address Set a statically specified IP address 192. 168. 2. 2 Host Set the hostname. N/A 3.3.2 DNS Relay The device, as a DNS Agent, relays DNS request and response message between DNS Client and DNS Server to carry out domain name resolution in lieu of DNS Client. From navigation tree, select "Network >>DNS Relay" menu, then enter “DNS Relay” page.
which router to undertake the forwarding task and the host in LAN is only required to configure the default gateway for the virtual router. VRRP will bring together a set of routers in LAN. It consists of multiple routers and is similar to a virtual router in respect of function. According to the VLAN interface IP of different network segments, it can be virtualized into multiple virtual routers. Each virtual router has an ID number and up to 255 can be virtualized.
Interval Virtual IP Set a virtual IP N/A Authentication method Select "None" or Password type None (a password is needed when password type is selected) Monitor Set monitor N/A VRRP-II Set as above Disable 3.3.4 Device Manager Device Manager is a software platform to manage devices. The device can be managed and operated via software platform.
Time Packet Timeout Receiving Set the timeout for dropped packets. 30 s Packet Transmit Retries Set packet transmit retries. 3 Query SMS Interval Set how long to check SMS. 24 h Trust Phone List Set trusted phone numbers and use comma to separate multiple numbers N/A 3.3.5 SNMP Network devices are usually sparsely-located on a network. It is time-consuming for the administrator to configure and manage these network devices on site.
The agents can promptly report the current status and faults of managed devices to the NMS. Currently, the SNMP agents support SNMPv1, SNMPv2c and SNMPv3. SNMPv1 and SNMPv2c use community names for authentication; SNMPv3 uses user names and passwords for authentication. Table 3-26 SNMPv1 and SNMPv2c Parameters Parameters Description Default Enable Enable/disable the SNMP function. Disabled Version Set the version of the SNMP protocol used to manage the router.
Table 3-17 SNMPv3 Parameters Parameters Description Default User Group Management Groupname User-defined user group name. The length is 1 to 32 characters. None Security Level Select a security level for the group. The values include NoAuth/NoPriv, Auth/NoPriv, and Auth/Priv. NoAuth/NoPriv Read-only View Select the SNMP read-only view. Only the default view is supported currently. defaultView Read-write View Select the SNMP read-write view. Only the default view is supported currently.
Table 3-28 SNMP Trap Configuration Parameters Parameters Description Default Trap SigLevel Set the trap signal threshold. When this threshold is reached, the agent outputs logs to the NMS. 10 Destination Address Fill in the IP address of the NMS. None Security Name Fill in the community name for SNMPv1 or SNMPv2c, and fill in the user name for SNMPv3. The length is 1 to 32 characters. None UDP Port Fill in the UDP port number, ranging from 1 to 65535. 162 3.3.
custom connection or disconnection command to redial or disconnect the device. From navigation tree, select "Service>>SMS" menu, then enter “SMS” page. Table 3-3-6 SMS Parameters Short message Function description: Configuration SMS function to manage the router in the form of SMS. Parameters Description Default Enable Click to enable backup DTU function Disable Status Query Users define the English query instruction to inquire current working status of the router.
Based on types, the alarms are classified into system alarms and port alarms. System alarm: reported when a system or environment error occurs. Port alarm: reported when a network port error occurs. In the Alarm Manager interface, you can perform the following operations: Select your interested alarm types in the "Alarm Input" area. Set the alarm notification method of the console in the "Alarm Output" area. The default output method is log recording.
3.4 Firewall The firewall function of the router implements corresponding control to data flow at entry direction (from Internet to local area network) and exit direction (from local area network to Internet) according to the content features of message (such as: protocol style, source/destination IP address, etc. ) and ensures safe operation of router and host in local area network.
Table 3-4-2 AC Parameters Access Control of Firewall Function description: Control the protocol, source/destination address and source/destination port passing through network packet of the router to provide a safe intranet. Parameters Description Default Enable Check to enable filtering. Enable Protocol Select all/TCP/UDP/ICMP ALL Source address Set source address of access control 0. 0.
to access to specific port of host corresponding to IP address of intranet. To configure port mapping, go into the navigation tree, select "Firewall >> Port Mapping", then enter “Port Mapping” page. Table 3-4-4 Firewall - Port Mapping Parameters Port Mapping (at most 50 port mappings can be set) Function description: Configure parameters of port mapping. Parameters Description Default Enable Check to enable port mapping.
Description For recording significance of each virtual IP address rule N/A 3.4.6 DMZ After mapping all ports, extranet PC can access to all ports of internal device by DMZ settings. From the navigation tree, select Firewall >> DMZ, then enter the “DMZ” page. Table 3-4-6-1 Firewall - DMZ Parameters DMZ Function description: Configure DMZ settings. Parameters Description Default Enable DMZ Check to enable the DMZ.
can limit the flow of specified host on local network. QoS provides users with dedicated bandwidth and different service quality for different applications, greatly improving the network service capabilities. Users can meet various requirements of different applications. QoS includes bandwidth control and IP bandwidth limits. 3.5.1 Bandwidth Control Bandwidth control sets a limit on the upload and download speeds when accessing external networks.
Enable Click to enable Enable IP Address Set IP address N/A Guaranteed Rate (kbit/s) Set rate 1000kbit/s Priority Select priority Medium Description Describe IP bandwidth limit N/A 3.6 VPN VPN is for building a private dedicated network on a public network via the Internet. 'Virtuality" is a logical network.
technology and to establish a private data transmission channel utilizing VPN Backbone so as to realize the transparent message transmission. Tunneling technology encloses the other protocol message with one protocol. Also, encapsulation protocol itself can be enclosed or carried by other encapsulation protocols. To the users, tunnel is logical extension of PSTN/link of ISDN, which is similar to the operation of actual physical link.
Enable NAT-Traversal (NATT) Click to enable NAT-Traversal Enable Keep alive time interval of NAT Set alive time interval of NAT 60 s Enable Compression Click to enable compression Enable Force NATT Click to enable force NATT Disable Dynamic NATT Port Click to enable dynamic NATT port Disable 3.6.2 IPSec Tunnels From navigation tree, select VPN>>IPSec Tunnels, enter "IPSec Tunnels" and click .
IKE Life Cycle Set IKE life cycle 86400 s Local ID Type Select IP address/User FQDN/FQDN Fill in the ID according to the ID type (USERFQDN is standard email format) IP Address Peer ID Type Select IP FQDN/FQDN IP Address Authentication method Select shared certificate Key Set IPSec VPN key address/User key/digital Shared key N/A XAUTH Parameters (Advanced Option) XAUTH Mode Click to enable XAUTH mode Disable XATUTH username User defines username XATUTH N/A XATUTH password User defines
3.6.3 GRE Tunnels Generic Route Encapsulation (GRE) defines the encapsulation of any other network layer protocol on a network layer protocol. GRE could be used as the L3TP of VPN to provide a transparent transmission channel for VPN data. In simple terms, GRE is a tunneling technology which provides a channel through which encapsulated data message could be transmitted and encapsulation and decapsulation could be realized at both ends.
Enterprise Intranet Telecommuting IP Multicast Streams From navigation tree, select VPN>>GRE Tunnels and enter "GRE Tunnels". Table 3-6-3 Parameters of GRE Tunnels 2 GRE Tunnels Function description: Configure GRE tunnels Parameters Description Default Enable Click to enable GRE Enable Name User defines name of GRE tunnel tun0 Local visual IP Set local virtual IP 0. 0. 0. 0 Destination Address Set remote IP address 0. 0. 0. 0 Peer visual IP Set peer virtual IP 0. 0. 0.
Main Purpose: branches in other places and employees on a business trip could access to the network of enterprise headquarter through a virtual tunnel by public network remotely. Typical L2TP network diagram is shown below: RADIUS Server RADIUS Server Enterprise Branch Enterprise Headquarter L2TP Tunnel Dialling User L2TP Tunnel Mobile Office Staff (L2TP Dialling Software) From navigation tree, select VPN>>L2TP Client, enter "L2TP Client" and click .
Max. Retries Detection for Link Set the max. number of retries 5 Enable NAT Click to enable NAT Disable MTU Set max. transmission unit 1500 MRU Set max. receiving unit 1500 Enable Debug Enable debug mode. Disable Set expert option, not recommended N/A Expert Option recommended) (not 3.6.5 PPTP Client From navigation tree, select VPN>>PPTP Client, enter "PPTP Client" and click .
3.6.6 OpenVPN Single point participating in the establishment of VPN is allowed to carry out ID verification by preset private key, third-party certificate or username/password. OpenSSL encryption library and SSLv3/TLSv1 protocol are massively used. In OpenVPN, if a user needs to access to a remote virtual address (address family matching virtual network card), then OS will send the data packet (TUN mode) or data frame (TAP mode) to the visual network card through routing mechanism.
/AES(192)/AES(256) MTU Set max. transmission unit 1500 Max. Fragment Size Set max. fragment size N/A Debug Level Error/warning/information/debug Warning Interface Type TUN/TAP TUN Set expert option, not recommended N/A Expert Option recommended) (not 3.6.7 OpenVPN Advanced From navigation tree, select "VPN>>OpenVPN Advanced" and enter "OpenVPN Advanced" interface.
Protect Key Set protect key N/A Protect Key Confirm Confirm protect key N/A Enable SCEP (Simple Certificate Enrollment Protocol) Force to Re-enroll Click to enable force to re-enroll Disable Request Status The system is "ready to refile an enrollment", cannot be changed Ready to refile an enrollment Server URL Set server URL N/A Common Name Set common name N/A FQDN Set FQDN N/A Unit 1 Set unit 1 N/A Unit 2 Set unit 2 N/A Domain Set domain N/A Serial Number Set serial number N
3.7 Tools The tools include PING detection, traceroute and link speed test. 3.7.1 PING Detection To do a ping, enter the navigation tree, select Tools>>Ping Detection, then enter the “Ping Detection” page. Table 3-7-1 PING Detection Parameters 1 PING Detection Function description: PING outside network. Parameters Description Default Host Address of the destination host of PING detection is required.
3.7.3 Link Speed Test Enter the navigation tree, select Tools>>Link Speed Test, then enter the “Link Speed Test” page. 3.8 Status The status includes system, modem, network connections, routing table, device List and log. 3.8.1 System From navigation tree, select Status >> System, then enter the “System” page. This page displays system statistics, including name, model, serial number, description, current version, current Bootloader version, router time, PC time, UP time, CPU load and memory consumption.
3.8.4 Alarm Status Choose Status >> Alarm to go to the "Alarm" page to view all alarms generated in the system since power-on. You can clear or confirm the alarms. The alarms have the following states: Raise: indicates that the alarm has been generated but not been confirmed. Confirm: indicates that the alarm cannot be solved currently. All: indicates all generated alarms.
time. LAN includes connection type, MAC address, IP address, netmask, gateway, MTU and DNS. 3.8.7 Route Table From navigation tree, select Status >> Route Table, then enter “Route Table” page to see router status. This page displays the active route table, including destination, netmask, gateway, metric and interface. 3.8.8 Device List From navigation tree, select Status >> Device List, then enter “Device List” page to inquire the device list.
Appendix A FAQ 1. InRouter is powered on, but can't access Internet through it? Please first check: Whether the InRouter is inserted with a SIM card. Whether the SIM card is enabled with data service, whether the service of the SIM card is suspended because of an overdue charge. Whether the dialup parameters, e.g. APN, dialup number, username and password are correctly configured.
server, but the center can't connect to your PC under InRouter? Please make sure the firewall of your computer is disabled. 7. After InRouter establishes VPN with the VPN server, your PC under InRouter can't connect to the server ping? Please make sure “Shared Connection” on “Network=>WAN” or “Network=>Dialup” is enabled in the configuration of InRouter. 8. InRouter is powered on, but the Power LED is not on? Check if the protective tube is burn out.
Appendix B Instruction of Command Line 1 Help Command Help command can be obtained after entering help or “?” into console, “?” can be entered at any time during the process of command input to obtain the current command or help from command parameters, and command or parameters can be automatically complemented in case of only command or command parameter. 1.1 Help [Command] Help [] [Function] Get help from command.
[View] Super user view, configure view [Parameter] No [Example] Enter in super user view: disable Return to ordinary user view. 2. 3 End and ! [Command] End or ! [Function] Exit the current view and return to the last view. [View] Configure view. [Parameter] No [Example] Enter in configured view: end Return to super user view. 2.
Display the following information: Type : display the current factory type of equipment Serial number : display the current factory serial number of equipment Description : www.inhand.com.cn Current version : display the current version of equipment Current version of Bootloader: display the current version of equipment 3.
manufacturer Product name signal level register state IMSI number Network Type 3. 5 Show log [Command] Show log [lines ] [Function] Display the log of router system and display the latest 100 logs in default. [View] All views [Parameter] Lines limits the log numbers displayed, wherein, n indicates the latest n logs in case that it is positive integer and indicates the earliest n logs in case that it is negative integer and indicates all the logs in case that it is 0.
[Example] Enter: show startup-config Display the starting configuration of system. 3. 8 Show running-config [Command] Show running-config [Function] Display the operational configuration of router [View] Super user view and configuration view [Parameter] No [Example] Enter: show startup-config Display the operational configuration of system. 4 Check Network Status Command 4.
[Example] enter: show route Display the routing list of system 4. 4 Show arp [Command] Show arp [Function] Display the ARP list of router [View] All views [Parameter] No [Example] Enter: show arp Display the ARP list of system 5 Internet Testing Command Router has provided ping , telnet and traceroute for Internet testing. 5. 1 Ping [Command] Ping [count ] [size ] [source ] [Function] Apply ICMP testing for appointed mainframe.
Enter: telnet 192.168.2.2 telnet logs in 192. 168. 2. 2 5. 3 Traceroute [Command] Traceroute [maxhops ] [timeout ] [Function] Test the acting routing of appointed mainframe. [View] All views [Parameter] tests the address or domain name of mainframe. maxhops tests the maximum routing jumps timeout timeout of each jumping testing (sec) [Example] Enter: traceroute www.g.cn Apply the routing of www. g. cn and display the testing results.
[Example] Enter in configured view: hostname Display the mainframe name of router. Enter in configured view: hostname MyRouter Set the mainframe name of router MyRouter. Enter in configured view: defaulthostname Recover the mainframe name of router to the factory setting. 6. 3 Clock timezone [Command] Clock timezone default clock timezone [Function] Set the time zone information of the router. [View] Configure view.
Set the address of Internet time server pool. ntp. org. Enter in configured view: no ntp server Disable the router to get system time via network. Enter in configured view: default ntp server Recover the network time server of router to the factory setting. 6.5 Config export [Command] Config export [Function] Export config [View] Configure view. [Parameter] No [Example] Enter in configured view: config export The current config. is exported. 6.
[Function] Modify the username of super user. [View] Configure view. [Parameter] new super user username [Example] Enter in configured view: enable username admin The username of super user is changed to admin. 7.3 Enable password [Command] Enable password [] [Function] Modify the password of super user. [View] Configure view. [Parameter] new super user password [Example] Enter in configured view: enable password Enter password according to the hint. 7.
FCC Warning Note: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
capability to access information in that form. FCC RF Exposure Statement This equipment must be installed and operated in accordance with provide instructions and the antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operation in conjunction with any other antenna or transmitter.
ISED RF Exposure Statement This equipment must be installed and operated in accordance with provide instructions and the antenna used for this transmitter must be installed to provide a separation distance of at least 30 cm from all persons and must not be co-located or operation in conjunction with any other antenna or transmitter. End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance.
Antenna Information: Antenna Manufacturer Antenna Gain Impedance Antenna Antenna (Max) (Ohm) Connector Type 3.0dBi 50 Model Number SHENZHEN GUYOU Reverse SMA Wi-Fi Ant. 1 TECHNOLOGY GY-XPF-BCL2.5-GJG22 Monopole male CO.LTD SHENZHEN GUYOU Reverse SMA Wi-Fi Ant. 2 TECHNOLOGY GY-XPF-BCL2.5-GJG22 3.0dBi 50 Monopole male CO.LTD SHENZHEN GUYOU LTE Ant. TECHNOLOGY GY-XPL-BDL2-AJG30 2.5dBi CO.