Modem echolife manual




















Interesting knowledge, well done. Hi Im not sure what to do as im going to advanced and wan but its not giving me the options "new" and "delete". Maniek Created Apr 22, You need to log in to comment to the post Login Register. Should you have any questions, please contact e.

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following: Politically sensitive content Content concerning pornography, gambling, and drug abuse Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy Do not share your account and password with others.

All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement.

My Followers. Are you sure to block this user? Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages. Confirm Cancel. Please bind your phone number to obtain invitation bonus. Or, in most cases, users find a way to forget them! To manually set up a wireless connection, use either of the following methods: You can log in to the Web-based configuration utility by entering the default user name and password that are admin.

Remove and then insert the network cable or replace the network cable when necessary. Connecting One Telephone 2. The HG works in routing mode. Use the manuql provided by your network adapter For details, see the user guide of your network adapter. Page 3 Thus the descriptions herein may not exactly match the product or its accessories you purchase. WLAN It is used to enable or disable wireless network function quickly. Ensure that the network cable between the terminal and the computer is properly connected.

Of course, you can build a strong hash password with special character, numbers, greek and latin. Time for a bulletin on the fridge, folks! After the preceding operations, the current page jumps to the login page. Maintenance If the device is not used for a long time, power it off, and then remove all the cables connected to it.

Page 21 Step 1 Log in to the Web-based configuration utility. Enter text from picture: To enable the wireless network function, press and hold the WLAN button for over one second, and then release the button. Comments to this Manuals Your Name. Rebooting your Huawei EchoLife-HGb can fix Internet connection problems, improve slow moving connections and resolve wireless issues altogether.

Page of 29 Go. Enter your email on below! Got it, continue to print. In the pane on the right, you can view the status of the WAN interface, mode of obtaining an IP address, IP address, and subnet mask, as shown in Figure Then, in the pane on the right, you can query the information such as user status and call status. The SIP configuration page is slightly different from the H. In the pane on the right, you can view the duplex mode, speed, and status of the ETH port, as shown in Figure In the pane on the right, you can view the optical status, transmit optical power, receive optical power of the optical module, as shown in Figure In the pane on the right, you can view the connection status and available capacity of the external standby battery, as shown in Figure In the pane on the right, you can view the product name, hardware version, and software version, as shown in Figure In the right pane, view the remote management status and service application status, as shown in Figure In the pane on the right, click New.

In the dialog box that is displayed, set Mode to Route, as shown in Figure Click Apply. Table describes the parameters related to the WAN in route mode. It ranges from 1 to It ranges from 0 to 7. The binding options can be set only after the work mode or wireless SSID is successfully set. In the dialog box that is displayed, set Mode to Bridge, as shown in Figure Table describes the parameters related to the WAN in bridge mode.

The ONT does not obtain the IP address allocated by the upper-layer device and it does not allow manual configuration of a static IP address. After configuration is complete, the user-side IP address is obtained from the upper-layer device. In the pane on the right, determine whether the LAN port works in layer 3 mode, as shown in Figure By default, the check boxes corresponding to all LAN ports are deselected, that is, all LAN ports work in layer 2 mode.

LAN Host Configuration 1. In this way, you can access an ONT through the Web page and perform query and management. Table describes the parameters related to the DHCP server. If the check box is selected, you can set the primary DHCP server. Otherwise, the DHCP server fails to work normally. Otherwise, the DHCP server fails to work. Options: minute, hour, day, and week. If the check box is selected, you can set the secondary DHCP server.

WLAN Configuration 1. Table describes the basic Wi-Fi parameters. The following parameters can be set only when the wireless network is enabled. SSID Indicates the name of the wireless network. It is used to differentiate different wireless networks.

It consists of a maximum of 32 characters, without space or Tab character. In this way, any STA can search for the wireless network. The SSID can be obtained only through a request. After the function is enabled, the video and voice QoS can be improved. Authentication Mode Indicates the authentication mode for the STA to request access to the wireless network.

It is set to open by default, that is, the STA can access the network without authentication. The encryption mode and encryption parameters vary with the authentication mode. NOTE l Pin indicates the pin-based encryption. In the pane on the right, enable the IP address filter function. After selecting the filter mode, click New. Figure IP Filter Configuration 2. The IP address filter function is a security mechanism configured on the residential gateway.

It enables or disables all or partial ports in an Intranet IP address segment to communicate with all or partial ports in an Extranet IP address segment. The IP address filter configuration is used to limit communication between an Intranet device and an Extranet device. Table describes the parameters related to the IP address filter. Filter Mode Indicates the IP address filter rule of the blacklist or whitelist. The filter mode is global config mode.

Thus, the blacklist and whitelist mode cannot be used at the same time. MAC Filter Configuration 1. In the pane on the right, after enabling MAC filter and selecting the filter mode, click New. Configuring MAC filter rules enables the PCs that conform to the rules to access the Internet service or disables the PCs that do not conform to the rules to access the Internet service. Table describes the parameters related to the MAC filter.

URL Filter Configuration 1. In the pane on the right, after enabling URL filter and selecting the filter mode, click New. Click the Security tab and then choose DoS Configuration from the navigation tree.

In the pane on the right, determine whether to enable the DoS attack-preventive configuration, as shown in Figure Figure DoS Configuration 2. Denial of service DoS attack is a network-based attack that denies users from accessing the Internet. The DoS attack initiates a large number of network connections, making the server or the program running on the server break down or server resources exhaust or denying users to access the Internet service. As a result, the network service fails.

In the pane on the right, configure the rule of ONT access control, as shown in Figure Default Route Configuration 1. Click the Route tab and then choose Default Route Configuration from the navigation tree.

In the pane on the right, select or deselect the Default Route option button to enable or disable the default route of the system, as shown in Figure Therefore, the parameters of the WAN interface must be correctly set.

For details, see WAN Configuration. Static Route Configuration 1. Click the Route tab and then choose Static Route Configuration from the navigation tree. In the dialog box that is displayed, set the parameters related to the static route, as shown in Figure Table describes the parameters related to the static route.

Address Subnet Mask Indicates the subnet mask of the static route. Interface Indicates the WAN interface that the route travels through. DMZ Configuration 1. In the dialog box that is displayed, set the parameters related to the DMZ, as shown in Figure Figure DMZ Configuration 2.

The demilitarized zone DMZ is a technology that enables the ONT to forward all received packets through a specified internal server. The technology enables a computer in the LAN to be completely exposed to all users on the Internet or enables the mutual communication without restrictions between a host with a specified IP address and other users or other servers on the Internet. In this way, many applications can run on the host with the specified IP address. The host with the specified IP address receives all connections and files that can be identified.

Table describes the parameters related to the DMZ. Port Mapping Configuration 1. In the dialog box that is displayed, set the parameters related to port mapping, as shown in Figure Figure Port Mapping Configuration 2. Table describes the parameters related to port mapping. External Start Port Indicates the destination start port of the external data packet.

External End Port Indicates the destination end port of the external data packet. Internal Start Port Indicates the internal destination start port of the port mapping packet.

Internal End Port Indicates the internal destination end port of the port mapping packet. External Source Start Port Indicates the source start port of the external data packet. External Source End Port Indicates the source end port of the external data packet. Internal Host Indicates the IP address of the host to which the port is mapped. Address Mapping Name Indicates the name of the port mapping rule. Enable PortMapping Indicates whether to enable port mapping.

Port Trigger Configuration 1. In the dialog box that is displayed, set the parameters related to the port trigger, as shown in Figure The port trigger indicates that a specific Extranet port is automatically enabled when a corresponding Intranet port sends a packet and the packet is mapped to the Intranet port on the host. A specific mapping packet is sent from the ONT through the Intranet so that specific packets of the Extranet can be mapped to the corresponding host. A specified port on the gateway firewall is open to some applications for remote access.

The port trigger can dynamically enable the open port of the firewall. Table describes the parameters related to the port trigger.

Table Parameters related to the port trigger Parameter Description Interface Indicates the name of the WAN interface where the port trigger is enabled. Open Protocol Indicates the protocol type of the open data packet. Trigger Start Port Indicates the destination start port of the port trigger packet. Trigger End Port Indicates the destination end port of the port trigger packet. Open Start Port Indicates the destination start port of the open packet.

Open End Port Indicates the destination end port of the open packet. Enable Indicates whether to enable the port trigger. USB Application 1. Figure USB Application 2. Table describes the parameters related to the USB. It is set to 21 by default. Generally, the setting is not required.

If the FTP server supports anonymous login, the setting is not required. Password Indicates the password for connecting to the FTP server. If the path is not entered, the path specified in Download URL is used by default. ALG Configuration 1. Figure ALG Configuration 2. When the NAT function is enabled, the application level gateway ALG function needs to be enabled to ensure that some application software and hardware can be normally used.

UPnP Configuration 1. In the pane on the right, determine whether to enable the UPnP, as shown in Figure The UPnP supports zero configuration networking and automatic discovery of different network devices. If the UPnP is enabled, the UPnP-enabled device can be dynamically connected to the network to obtain the IP address, obtain the transfer performance, discover other devices, and learn the performance of the other devices.

The UPnP-enabled device can be automatically disconnected from the network, without affecting the device or other devices. After running application software on the PC, port mapping entries are automatically generated on the ONT through the UPnP protocol, thus improving the running speed. ARP Configuration 1. In the dialog box that is displayed, set the resolution rule between a MAC address and an IP address, as shown in Figure Figure ARP Configuration 2.

A static ARP never ages and can only be deleted manually. For example, the dynamic ARP entry learning is omitted during device communication and the static ARP entry prevents a device from learning an incorrect ARP entry in the case of malicious attacks.

Portal Configuration 1. Click the Network Application tab and then choose Portal Configuration from the navigation tree. If the type of the device that you use is not configured with a URL address or the device type cannot be identified, the system redirects to the default URL address upon the first access to the Internet.

DDNS Configuration 1. Figure DDNS configuration 2. That is, its IP address may change each time when server A initializes its connection to the Internet. The mapping between the domain name and IP address provided by the domain name service DNS server is static, and the mapping does not update when the IP address changes. Therefore, when the IP address of server A changes, users on the Internet cannot access server A with domain names.

With DDNS, which associates a static domain name with the dynamic IP address of its host, users on the Internet can access the server only with domain names.

IGMP Configuration 1. Figure IGMP configuration 2. Only when IGMP proxy is enabled in the gateway mode, parameters such as Robustness, General query interval, General query response time, Specific query number, Specific query interval, and Specific query response time.

QoS Configuration 1. Terminal Limit Configuration 1. Click the Network Application tab and then choose Terminal Limit Configuration from the navigation tree.

In the right pane, configure relative parameters, as shown in Figure Figure Terminal Limit Configuration 2. The following topics describe the Web pages after the H. In the pane on the right, parameters of a VoIP interface can be configured, including the IP addresses of the primary server and secondary server, and digitmap, as shown in Figure The ID ranges from 1 to and the default ID is General Home Domain Indicates the domain of the registration server of the VoIP terminal in network communications, such as softx Digitmap Indicates the voice digitmap.

If a user does not continue dialing digits, the system reports the number to the call proxy after the short timer times out; if the user continues dialing digits and the number matches the long digitmap, the system reports the number that matches the digitmap to the call proxy.

Region Indicates the country code. Table describes parameters used for configuring a VoIP interface based on the H. Register Format Indicates the MG registration format. It can be the MG domain name, IP address, or device name.

Region Settings Indicates the country code. In the pane on the right, you can configure the parameters, as shown in Figure Reboot Click the System Tools tab and then choose Reboot from the navigation tree. In the pane on the right, click Reboot to restart the device, as shown in Figure For details, see Configuration File. In the pane on the right, click the button as required, as shown in Figure This prevents data loss due to the restart of the device. In the dialog box that is displayed, click Save, specify the path of saving the configuration file, and then back up the file to the local disk.

In the dialog box that is displayed, select the configuration file to be uploaded. Click Upload Configuration File to upload the configuration file that is saved in the local disk. After the configuration file is successfully uploaded, the device automatically restarts and then the new configuration takes effect. CAUTION Before uploading the configuration file, choose the configuration file with the correct type and the name of the selected configuration file must not be the same as that of any file saved in the device.

Otherwise, the configuration file fails to be uploaded. In the pane on the right, the button as required, as shown in Figure Click the System Tools tab and then choose Firmware Upgrade from the navigation tree. In the pane on the right, click Browse. In the dialog box that is displayed, select the target software version of the device. Click Update Firmware to upgrade the software of the device, as shown in Figure Figure Firmware Upgrade 2. After the upgrade is successful, a message is displayed indicating that the device needs to be reset.

Click Reset. The configuration data takes effect after the device is reset. In the pane on the right, click Restore Default Configuration to restore the factory defaults, as shown in Figure Maintenance Click the System Tools tab and then choose Maintenance from the navigation tree. In the pane on the right, enter the destination IP address or host name for the ping test in the Target text box, and then click Start, as shown in Figure Log Click the System Tools tab and then choose Log from the navigation tree.

In the right pane, perform the required operations, as shown in Figure In the dialog box that is displayed, click Save, specify the path for saving the log file, and save the log file to the local disk. ONT Authentication 1. Figure ONT Authentication 2. Click the System Tools tab and then choose Time Setting from the navigation tree.

In the pane on the right, set the parameters related to the system time, including the SNTP server, time zone, and daylight saving time DST , as shown in Figure Figure Time Setting 2.

Table describes the parameters related to the system time. Time Zone Indicates the time zone. Click the System Tools tab and then choose TR from the navigation tree. In the pane on the right, set the parameters related to the interconnection between the ONT and the TR server, as shown in Figure Table describes the TR parameters. Advanced Power Management 1. In the pane on the right, you can start the ONT energy conservation mode and set the power saving mode, as shown in Figure Figure Advanced Power Management 2.

Modify Login Password 1. In the right pane, change the password of the root user, as shown in Figure The screen snapshots may vary with different N BMS versions but the configuration procedures are similar. For details, see the associated configuration manual. This topic describes how to perform configurations before configuring services on the ONT. Table lists the configuration methods supported by the Internet access service, voice service, and Wi-Fi access service.

Run the display traffic table ip command to query the existing traffic profiles in the system. If the traffic profiles existing in the system do not meet the requirements, run the traffic table ip command to add a traffic profile.



0コメント

  • 1000 / 1000