User's Manual
Table Of Contents
- 1 Introduction and Scope
- Glossary
- 2 Product Features
- 3 Pepwave MAX Mobile Router Overview
- 4 Advanced Feature Summary
- 5 Installation
- 6 Mounting the Unit
- 7 Connecting to the Web Admin Interface
- 8 Configuring the LAN Interface(s)
- 9 Configuring the WAN Interface(s)
- 10 Advanced Wi-Fi Settings
- 11 ContentHub Configuration
- 12 MediaFast Configuration
- 13 Bandwidth Bonding SpeedFusionTM / PepVPN
- 14 IPsec VPN
- 15 Outbound Policy Management
- 16 Inbound Access
- 17 NAT Mappings
- 18 QoS
- 19 Firewall
- 22 Remote User Access
- 23 Miscellaneous Settings
- 24 AP - access point
- 26 AP Controller Status
- 27 Toolbox
- 28 System Settings
- 29 Tools
- 30 Status
- Appendix A: Restoration of Factory Defaults
- Appendix B: Declaration
https://www.peplink.com
Copyright @ 2021 Pepwave
The amount of matching traffic that is distributed to a WAN connection is proportional to the
weight of the WAN connection relative to the total weight. Use the sliders to change each WAN’s
weight.
For example, with the following weight settings:
● Ethernet WAN1: 10
● Ethernet WAN2: 10
● Wi-Fi WAN: 10
● Cellular 1: 10
● Cellular 2: 10
● USB: 10
Total weight is 60 = (10 +10 + 10 + 10 + 10 + 10).
Matching traffic distributed to Ethernet WAN1 is 16.7% = (10 / 60 x 100%.
Matching traffic distributed to Ethernet WAN2 is 16.7% = (10 / 60) x 100%.
Matching traffic distributed to Wi-Fi WAN is 16.7% = (10 / 60) x 100%.
Matching traffic distributed to Cellular 1 is 16.7% = (10 / 60) x 100%.
Matching traffic distributed to Cellular 2 is 16.7% = (10 / 60) x 100%.
Matching traffic distributed to USB is 16.7% = (10 / 60) x 100%.
15.2.2 Algorithm: Persistence
The configuration of persistent services is the solution to the few situations where link load
distribution for Internet services is undesirable. For example, for security reasons, many e-
banking and other secure websites terminate the session when the client computer’s Internet
IP address changes mid-session.
In general, different Internet IP addresses represent different computers. The security concern