User station 
WB-2P-LR5 
User manual, Firmware version 2.4.6 

IP address:  http://192.168.1.1
Username: admin
Password: password



|| DeviceType | User station |
|| DeviceName | WB-2P-LR5 |
|| DocTitleAdditional | User manual |
|| fwversion | 2.4.6 |
|| issueDate | 06.2021 |
|| ipaddr | 192.168.1.1 |
|| username | admin |
|| password | password |



Introduction

Annotation

Modern tendencies of telecommunication development necessitate operators to search for the most optimal technologies, allowing you to satisfy drastically growing needs of subscribers, maintaining at the same time consistency of business processes, development flexibility and reduction of costs of various services provision. Wireless technologies are spinning up more and more and have paced a huge way for a short time from unstable low-speed communication networks of low radius to broadband networks equitable to speed of wired networks with high criteria for the quality of provided services.

WB-2P-LR5 is a user station designed for connection to Wi-Fi access network which might be constructed using base stations within long distances. The case of WB-2P-LR5 is sealed, that is allows to install the device outdoor with different climate conditions.

This manual specifies intended purpose, main technical parameters, design, installation procedure, safe operation rules and installation recommendations for WB-2P-LR5.

Symbols

Notes and warnings

Notes contain important information, tips or recommendations on device operation and setup.


Warnings are used to inform the user about harmful situations for the device and the user alike, which could cause malfunction or data loss.

Device description

Purpose

User station WB-2P-LR5 (herein after «the device») is designed for access provision to secure wireless network.

The device provides access to up-to-date interactive services: Internet, IPTV, VoIP.

WB-2P-LR5 connects to a base station via Wi-Fi technology and operates at 5 and 6 GHz (the frequency range – 5830-6150 MHz – is supported on WB-2P-LR5 rev.B and WB-2P-LR5 rev.C). The device is supposed to operate with WOP-2ac-LR5. WB-2P-LR5 might be also used for wireless bridge organization.

WB-2P-LR5 supports up-to-date requirements to service quality and allows transmitting  more important traffic in higher priorities queues. Prioritization is based on QoS technologies: CoS (special tags in VLAN packet field) and ToS (tags in IP packet field).

The device is capable to operate in wide temperature range and in high-humidity conditions (parks, factories, stadiums, etc.).

Power to the device is supplied via PoE technology 24V.

Device specification

Interfaces:

The power is supplied via PoE injector 24V connected to 220V network.

Do not use an injector with voltage different from 24V so as not to break down the device!

1For WB-2P-LR5 rev.C.

Network functions:

The figures below illustrate applications schemes of WB-2P-LR5.


 
Functional scheme of using WB-2P-LR5 without router



 
Functional scheme of using WB-2P-LR5 with router



Functional scheme of using WB-2P-LR5 for wireless bridge organization 

Technical features

Table 1 shows main specifications of the device.

Table 1 — Main specifications

LAN Ethernet interface parameters


Number of ports

1

Electrical connector

RJ-45

Data rate, Mbps

10/100/1000, auto-negotiation

Standards

BASE-T

Wireless interface parameters


Standards

802.11a/n/ac

Frequency range, MHz

5180–5825 MHz

5180-6150 MHz (for WB-2P-LR5 rev.B, WB-2P-LR5 rev.C)

Modulation

BPSK, QPSK, 16QAM, 64QAM, 256QAM

Speed of data transmission, Mbps

802.11a: up to 54 Mbps 
802.11n: up to 300 Mbps 
802.11ac: up to 867 Mbps

Maximum output power of the transmitter

5–6 GHz: 

24 dBm (for WB-2P-LR5, WB-2P-LR5 rev.B)

28 dBm (for WB-2P-LR5 rev.C)

Receiver sensitivity

5-6 GHz: -94 dBm 

Security

64/128/152- bit WEP encryption, WPA/WPA2,
centralized authorization via RADIUS server (WPA/WPA2 Enterprise)

Antenna's parameters


Gain

2x12 dBi

Polarization

dualpolarized antenna

Beam angle (horizontal polarization)

60°

Beam angle (horizontal polarization)

15°

SWR

2.0:1

Impedance

50 Ohm

Front to back ratio

> 20 dB

Control


Remote control

Web interface, Telnet, SSH, SNMP (monitoring), TR-069

Access restriction

by password

General parameters


Processor

Realtek RTL8197FS 1 GHz

RAM

128 MB

Flash

32 MB

Power supply

Passive PoE 24 V

Power consumption

no more than 8 W

range of operation temperatures

from -45 to +65°С

Operating humidity

up to 95%

Ingress Protection Marking

IP54

Dimensions

80x66x282 mm

Weight

0,35 kg

Design

WB-2P-LR5 housed in a plastic case, industrial version. The size of the device: 80x66x282 mm.

The layout of WB-2P-LR5 is shown in the figure below.

         

WB-2P-LR5 layout


LAN port 10/100/1000Base-T (RJ-45 connector) for local network connection and power supply via PoE, a grounding connector (for WB-2P-LR5 rev.C ) and the button for resetting to factory settings («Reset») are located on the bottom panel of the device.

WB-2P-LR5 bottom panel elements

Light indication

The light indication panel of  WB-2P-LR5 is shown below.

WB-2P-LR5 light indication panel

The current state of the device is shown with the help of light indicators located on the back panel of WB-2P-LR5. The list of indicators and their description is shown in the table below.

Table 2 – Description of rear panel LED indicators


Indicator

Indicator's state

Description



Power – power and operation status indicator

solid green

the device power supply is enabled, normal operation

solid orange

the device is loaded but IP address is not received via DHCP

solid red

the device is loading


LAN – LAN interface indicator

solid green (10, 100 Mbps)/
solid orange (1000 Mbps)

the channel between LAN interface of WB-2P-LR5 and connected device is active

flashes

packet data transmission between LAN interface of WB-2P-LR5 and connected device

WLAN – received signal strength indicator (RSSI)




solid red

the device is connected to a base station. The base station signal level is more than -94 dBm

solid orange

the device is connected to a base station. The base station signal level is more than -80 dBm

solid green

the device is connected to a base station. The base station signal level is more than -70 dBm

solid green

the device is connected to a base station. The base station signal level is more than -60 dBm


none of the indicators is on

the device is not connected to the base station

Reset to the default settings

There are two ways to reset the device to factory settings:

  1. Using «Reset» button on the device. When the device is loaded, press and hold «Reset» button located on the bottom panel (approximately 10–15 seconds) until «Power» indicator is flashing orange;
  2. Using PoE injector supplied with the device. When the device is loaded, press and hold «RST» button of the injector (approximately 10–15 seconds) until «Power» indicator of WB-2P-LR5 is flashing orange.

Device will be rebooted automatically. DHCP client will be launched by default. If the address is not received via DHCP the device will have IP address — 192.168.1.1, subnet mask — 255.255.255.0; User Name/Password to access via Web interface: admin/password.

Delivery package

The basic supply package of WB-2P-LR5 includes:

A bracket with horizontal and vertical adjustment might be included to the supply package upon a request.

Installation order

This section defines safety rules, installation recommendations, setup procedure and the device starting procedure.

Safety rules

  1. Do not open the device case. There are no user serviceable parts inside.
  2. Do not install the device during a thunderstorm. There is a risk of lightning stroke.
  3. You must follow requirements for voltage, current and frequency specified in the user manual.
  4. Measuring devices and computer must be grounded before connecting to the device. The electric potential differnce between devices' cases should not exceed 1 V.
  5. Make sure that all the cables are intact and they are reliably attached to connectors.
  6. You should satisfy established standards and requirements for working at height during the device installation on the high-rise constructions.
  7. The device exploitation should be performed by specially prepared engineering and technical personnel.
  8. Connect only to operational service equipment.

Installation recommendations

  1. Recommended location for device installation: communications mast/pole.
  2. Before you install and enable device, check the device for visible mechanical defects. If defects are observed, you should stop the device installation, draw up corresponding act and contact the supplier.
  3. Install the device vertically on communications mast or pole in the way that the LAN port is pointed down.
  4. In order to provide better receiving signal level, the sectoral antenna of a base station should be in line of sight of WB-2P-LR5. You may achive the highest signal level by antenna alignment with the help of RSSI indicators.
  5. The transmitting part of the device is located on the other side from brackets. This area should be directed to base station sectoral antenna.

After adjusting, make sure that level of the received signal from the base station should be no more than -65 ÷ -70 dBm. Decreasing this level up to -75 dBm is permitted if it does not involve the use of VoIP, streaming video and other traffic that is sensitive to losses in a wireless network.

Install the device on communications mast/pole so that the device is directed to base station sectoral antenna as much as possible. There must also be direct visibility to the base station.

WB-2P-LR5 mounting

Pre-tuning

Before installing, proceed pre-tuning of the device (see section Configuration example). For this, power on the device (paragraph 2-7, section Mounting algorithm) and follow the instructions given in the section Configuration example. Make sure that the user station connects required wireless network: RSSI indicators should be on.

Mounting algorithm

1. Install the device on communications mast/pole pointing LAN port down as it is shown on the figure below. Attach the device using clamps supplied in the device package. Comply the safety rules and recommendations given in Safety rules and Installation recommendations.

2. Remove the bottom cover which close LAN-port. Ground the device through a grounding connector (for WB-2P-LR-5 rev.C).

3. Connect Ethernet cable to LAN port.

4. Close the bottom cover.

5. Connect Ethernet cable connected to WB-2P-LR5 to PoE port of injector.

6. Connect Ethernet cable of your LAN network or PC to LAN port of PoE injector.

7. Connect PoE injector to 220V socket with the help of power line cord.

8. Align the position of the device for best signal level receiving. The level of received signal is shown by the indication located on the back panel of the device.

9. Fasten the clamps.

Switching on

  1. Plug the injector into 220 V outlet. Connect a PC to LAN port of the injector.
  2. WB-2P-LR5 loads in a minute after switching on. Connect to the web configurator of WB-2P-LR5 through a browser.

    IP address by default: 192.168.1.1. 
    Username: admin, password: password.


  3. Network configuration is described in The 'Network' menu section.

Wi-Fi antenna alignment

For ease of antenna alignment the Service Wi-Fi is implemented in the device (only for WB-2P-LR5 rev.C). It allows to connect the wireless client to the "EltexWiFi" SSID (2.4 GHz frequency band) and align antennas using data of monitoring of the connection parameters of the subscriber station WB-2P-LR5 with the base station in WEB interface.

  1. Connect the smartphone to a Wi-Fi network using the EltexWiFi SSID.
  2. Set the following connection settings on the smartphone: Static IP address – 192.0.2.X; netmask – 255.255.255.0; gateway – 192.0.2.1.
  3. Open the browser aand enter the address 192.0.2.1:8080. The alignment tab will be displayed, where the signal level from the station to which the WB-2P-LR5 is connected is displayed in real time:

4. Perform the alignment with maximum RSSI.

5. After alignment, you must disable the Service Wi-Fi.

Service Wi-Fi enable/disable through the device’s web configurator is described in the 'Advanced settings' submenu.


Device management via WEB configurator

Getting started

To start, you need to connect the device through a browser:

  1. Open a web browser (web-page explorer), for example, Firefox, Opera, Chrome.
  2. Enter IP-address of the device to the browser address line.

IP address by default: 192.168.1.1, subnet mask: 255.255.255.0. The device is capable to obtain an IP address via DHCP.

If connection is successful, request form with user name and password will be displayed on a browser window.

Factory settings: login: admin, password: password.

3. Enter your username into ‘Login’ and password into ‘Password’ field. Click the ‘Log in’ button. Device Web configurator home page will be opened in the browser window.

You may select languages on the top-right of the page. Russian and English languages are available.

Changing user

There are two user types for the device: admin and viewer:

When you click the «Logout» button, the current user session will be terminated; login window will be displayed:

To change the access, you should specify the corresponding username and password and click Log in button.

Applying configuration and discarding changes

  1. Applying configuration

    Press «Apply» to save configuration to flash memory and apply new settings. All the settings come into operation without device rebooting.

    The visual indication of the settings applying is realized in the web interface. 
    The visual indication of the settings applying:

    Image

    State description

    After pressing «Apply», the process of settings saving to device memory is launched. This is indicated by the  icon in the tab name and on the Apply button.

    If the setting are saved successfully, the  icon will be displayed next to the tab name and on «Apply» button.

    If any parameter value have been set incorrectly, the error notification with description will be displayed after pressing «Apply» button. The  mark will be displayed next to the tab name and on «Apply» button.

    The 'Apply' button in the menu .

  2. Discarding changes

    You can discard changes only before pressing «Apply» button. If you press «Apply» button, all the changed parameters will be applyed and saved to device memory. You will not be able to return to previous configuration after pressing «Apply».

    The button for discarding changes appears as follows: .

Test changes mode

The device has a test mode for a test configuration application.

To activate it, press the 'Test changes' button on the top panel of the web interface.

Test mode operating time is 300 seconds (5 minutes). During this time you can navigate through the web configurator tabs and make any changes by applying them on each page using the 'Apply' button.

After checking the required configuration, press the 'Exit from Test Mode' button and select the desired action:

If the administrator does not exit the test mode within 300 seconds, this will happen automatically along with a rollback of all changes that have been made in this mode. After the specified time, the configuration will be restored even if access to the device is lost as a result of the changes made.

Main elements of the WEB interface

The figure below shows navigation elements of the web configurator.

The user interface is divided into seven areas:

  1. Username, which was used to enter the system and «logout» button to finish the user session.
  2. Menu tabs which contain submenu tabs are divided into categories: Network, System.
  3. Submenu tabs manage the settings field below.
  4. Settings field, which is based on the user select. The field is dedicated to view device settings and setting configuration data.
  5. Configuration management buttons, the detailed description is given in section Applying configuration and discarding changes.
  6. Information field. The field contain information on firmware version and web interface version.

The «Monitoring» menu

To move to the system monitoring mode, select «Monitoring» on the left panel.

Some pages are not updated automatically. To obtain current state of the device, press   .

The «Internet» submenu

In the Internet submenu, you may view main network parameters of the device.

Internet Connection

Press «Refresh» button to update the page.

The «WDS» submenu

The «WDS» submenu is available only in the 'Wireless bridge' mode.

You may view radiointerface settings and wireless bridge state in WDS submenu.

Radio:

WDS:

The «Ethernet Ports» submenu

You can view Ethernet ports' state in the Ethernet Ports submenu.

State

To obtain current information on Ethernet ports states, press the «Refresh» button.

The «DHCP» submenu

The list of network devices connected to LAN interface of the device, whose IP addresses were assigned by local DHCP server, is given in the DHCP submenu. The expire time of address lease is shown in the table as well.

List of DHCP Clients

To obtain current information on DHCP clients, press the «Refresh» button.

The «ARP» submenu

You may view ARP table in ARP submenu. ARP table contain information on IP and MAC addresses mapping.

ARP Table

To get current information, click the 'Refresh' button.  

The «PPPoE Relay» submenu

The 'PPPoE Relay' submenu is only available in the 'Wi-Fi Client' device mode in the 'Bridge' operation mode.

You can also see information about the MAC address of the client and server.

The « PPPoE Client » submenu

The «PPPoE Client» submenu is available only in the «Router» mode

On the page you can see information about the MAC address and the IP address of the client and server. The 'Status' parameter displays the session state - whether session is active or inactive. 

The «Device Info» submenu

General information on the device is given in the Device Info submenu.

Device info

The «Conntrack» submenu

In the «Conntrack» submenu you can find the current active network connections of the device.

Active NAT Session

Connections List

To get current information, click the 'Refresh' button. 

The «Routes» submenu

In the «Routes» submenu you may view the device route table.

To get current information, click the 'Refresh' button.

The «Network» menu

You may implement main network settings in the «Network» menu.

The «Internet» submenu

In «Internet» submenu, you may configure parameters to connect to a base station via Wi-Fi and select connection mode.

Wi-Fi client mode

For example, if a channel 100L (5490-5530) with a 40 MHz band is set on the BS, then in the list of allowed channels should be selected all the channels in this frequency range: 98 - 106 channel inclusive. With this setting, the WB-2P-LR5 will only scan the frequency range of 5,490 - 5,530 MHz and successfully connect to the BS on the 100L/40 channel;

VLAN trunk in bridge mode

If the “Use Management VLAN” flag is checked and the Management VLAN is configured incorrectly, access to the device may be lost. When connected via Ethernet, the device will be available at 192.0.3.1.


VLAN trunk in router mode


If the “Use Management VLAN” flag is checked and the Management VLAN is configured incorrectly, access to the device may be lost. When connected via Ethernet, the device will be available at 192.0.3.1.


If PPPoE is selected as the Internet protocol, then you can specify the secondary access settings:


VLAN – virtual local area network. VLAN consists of a group of hosts combined into a single network regardless of their location. The devices grouped to a VLAN have the same VLAN-ID identifier.

Wireless bridge mode

WAN

WDS Settings

The «Radio» submenu

«Radio» submenu is available only in «Wireless bridge» mode.

In the 'Radio' submenu, you may configure the radiointerface to organize wireless bridge.

Basic settings:


Advanced settings:


For wireless bridge operation, radiointerface parameters should be configured identically on all the devices.

The «LAN» submenu

LAN settings are available only in router mode.

In LAN settings section you may configure local network, DHCP server, set static addresses bindings.

The device is capable to assign IP addresses and other parameters required to the Internet access to computers connected to LAN interface through DHCP (Dynamic Host Configuration Protocol). The use of DHCP allows to avoid manual configuration of TCP/IP.


LAN:

DHCP server settings:

To apply a new configuration and store settings into the non-volatile memory, click the 'Apply' button. To discard changes click the Cancel button.

When you try to change the starting address of the DHCP pool to an address from a different subnet with respect to the subnet of the LAN interface, the pool is automatically set in accordance with the specified local subnet.

Static leases

To add a new static binding, click the Add button and fill in the following fields:

Configuring of static leases is helpful when you need that the certain computer always obtains certain IP address.

Press «Apply» to add IP address to the list of static IP addresses for DHCP server. To discard changes click the Cancel button. 
To delete an address from the list, select the corresponding checkbox and press «Remove».

The «MAC address Management» submenu

In the MAC address Management submenu, you may set MAC address of the device's WAN interface.

Wireless transparent bridge

«Wireless transparent bridge» settings are available for Bridge mode of Wi-Fi station only.

When you enable Wireless transparent bridge, WB-2P-LR5 will not substitute client MAC addresses from LAN with own MAC address. The limit is 15 MAC addresses without substitution. When the value is exceeded client's MAC address will be substituted. The section of connected clients on a base station will include MAC addresses of client devices from LAN.

Set MAC address for WAN

To apply a new configuration and save setting to non-volatile memory, press «Apply». Press «Cancel» to discard the changes.

The «Local DNS» submenu

"Local DNS" submenu is available only in router mode.

You may configure local DNS server of the device by adding IP address and domain name in the "Local DNS" submenu.

Local DNS allows to obtain an IP address of the device using its domain name (host) in case of lack of DNS server in a network segment. To implemet this, you should know concordances between nodes names (hosts) and their IP addresses.

Nodes configuration

To add the address into the list, click Add button in the 'New domain name' window and fill in the following fields:

Click Apply to create 'IP address – domain name' pair. To discard changes click the Cancel button. To delete the record from the list, select the checkbox next to the respective record and click 'Delete'.

The «NAT and Port Forwarding» submenu

NAT and Port Forwarding submenu is available only for router mode.

You may configure Port Forwarding from WAN interface to LAN interface in NAT and Port Forwarding submenu.

NAT (Network Address Translation) mode allows to modify IP addresses and network ports of IP packets. Port forwarding is necessary when TCP/UDP connection with local PC (connected to LAN interface) is established via external network. The settings menu allows to set rules which permit packets transmission from external network to specified address in a local network, i.e. to establish connection. Port forwarding is also necessary when using torrent and p2p services. To implement the configuration, find TCP/UDP ports used by torrent or p2p clients in settings and set them for corresponding port forwarding rules to a PC IP address.

NAT rules

To add a new NAT rule, click Add button and fill in the following fields in the Add a new rule window:

Port forwarding rule will work as follows: a packet received via «Protocol» on a port defined in «Destination Ports of WAN» field and having source address defined in «WAN IP address» field (if the field is empty, source IP does not consider) undergoes address and Destination port substitute with the parameters defined in «LAN IP Address» and «Destination Ports of LAN» fields respectively.

Press «Apply» button to add a new rule. To discard changes click Cancel button.

To delete an entry from the list, select corresponding checkbox and press «Remove».

The «Firewall» submenu

In the Firewall submenu, you may set the rules for the incoming, outgoing, and transit traffic transmission. There is an opportunity to limit transmission of different types of traffic (incoming, outgoing, transit) depending on protocol type, source and destination IP, TCP/UDP source and destination ports, type of ICMP message.

Firewall rules configuration

To add a new NAT rule, click Add button and fill in the following fields in the Add a new rule window:

When TCP, UDP, TCP/UDP protocols are selected, the following settings will be available to configure:

When ICMP is selected, the following settings will be available for editting:

Press «Apply» button to add a new rule. Press «Cancel» to discard the changes. To delete a created rule, check the box next to the rule and press «Remove».

The «Routes» submenu

You may set static routes in the Routes submenu.

Press «Add» button to add a new route. Fill the following fields:

To apply a new configuration and store settings into the non-volatile memory, click the 'Apply' button. To discard changes click Cancel button

The «Dynamic DNS» submenu

Dynamic DNS submenu is available only in router mode.

In dynamic DNS submenu, you may configure the coresponding service.

Dynamic DNS is often used in local networks, where clients obtain IP addresses via DHCP, and then register their names on local DNS server.

To apply a new configuration and store settings into the non-volatile memory, click the 'Apply' button. To discard changes click the Cancel button.

The «SNMP» submenu

WB-2P-LR5 software allows monitoring of the device status and its sensors via SNMP. In SNMP submenu, you can configure settings of SNMP agent. The device supports SNMPv1, SNMPv2c.

The list of objects which are supported for reading and configuration via SNMP is given below:

where eltexLtd – 1.3.6.1.4.1.35265 is Eltex Enterprise identifier.

To apply a new configuration and save setting to non-volatile memory, press «Apply». Press «Cancel» to discard the changes.

The «IPTV» menu

The menu is available only in router mode.

The «IPTV» submenu

You may configure IPTV service in IPTV settings menu.

Renew subscription

Fast leave mode

HTTP Proxy Settings

For instance, if the device has the 192.168.0.1 address on the LAN interface, Proxy server's value is 1234 and you need to playback 227.50.50.100 channel broadcasted to UDP port 1234, set stream address for VLC programm in the form of: http://@192.168.0.1:1234/udp/227.50.50.100:9000.
To apply a new configuration and store settings into the non-volatile memory, click the 'Apply' button. To discard changes click the Cancel button.

The «System» menu

In the System menu, you may configure system parameters: time, access via different protocols, change password, update software.

The «Time» submenu

The configuration of time synchronization protocol (NTP) is implemented in the Time submenu.


Time settings

To apply a new configuration and store settings into the non-volatile memory, click the 'Apply' button. To discard changes click the Cancel button.

The «Access» submenu

In the Access submenu, you may configure access to the device via web interface, Telnet and SSH.

Access ports

In this section you may configure TCP ports for the access to the device via HTTP, HTTPS, Telnet, and SSH.

You may use Telnet and SSH protocols in order to access the command line (Linux console).

Access to Internet service

This section allows or denies access to the device with separate rules for local and external networks (router mode). For this you need to set the following permissions:

Web:

Telnet: 

Telnet – a protocol that allows you to establish mechanisms for remote control of the devices. It allows you to connect to the device via network for configuration and management purposes.
To enable the device access via Telnet protocol, select the corresponding checkbox.

SSH:

SSH – is a secure device remote control protocol. As opposed to Telnet, SSH encrypts all traffic being transferred including passwords.
To enable the device access via SSH protocol, select the corresponding checkbox.

To apply a new configuration and store settings into the non-volatile memory, click the 'Apply' button. To discard changes click the Cancel button.

The «Log» submenu

In Log submenu you may configure output for various debug messages intended for device troubleshooting. Debug information may be provided by the following device firmware modules:

Networkd Log

Select types of messages to be output in Networkd Log:

Configd Log

Select types of messages to be output in Configd Log:

Syslog settings

If there is at least a single log (Networkd Log or Configd Log) configured for Syslog output, you should enable Syslog agent that will intercept debug messages and send them to a remote server or save them to a local file in Syslog format.

According to Syslog agent mode, the following settings might be avaliable:

The «Passwords» submenu

In the 'Passwords' submenu you may define passwords for administrator and viewer access.

The set passwords are used for access to the device via web interface, Telnet and SSH.

When logging in via WEB interface administrator (default password: password) has the full access to the device: read/write any settings, full device status monitoring. A viewer (password by default: viewer) has rights to view configuration and device monitoring data. Viewer is not permitted to change settings.

Administrator login: admin  
Viewer login: viewer



To apply a new configuration and store settings into the non-volatile memory, click the 'Apply' button. To discard changes click the Cancel button.

The «Configuration management» submenu

In the «Configuration management» submenu you may save and update the current configuration.

Backup configuration

To save the current device configuration to a local PC, click «Download» button.

Restore Configuration

Note that all the passwords of configuration are encrypted with a key depending on device MAC address. Before loading a configuration from one device to another, you should change all passwords in configuration file.

To change the passwords open the configuration file in text editor and change passwords. Then save the changes in configuration archive. The example of password changing is shown below:

   Passwords:         
       AdminPassword: "encrypted:7C607178736B7465"
       ViewerPassword: "encrypted:7A68677C6176"
changes to
   Passwords:         
       AdminPassword: "password"
       ViewerPassword: "password"

Reset to Default Configuration

To reset all the settings to default values, press «Reset» button.

The «Firmware Upgrade» submenu

The Firmware Upgrade submenu is dedicated to update firmware version of the device.

WB-2P-LR5 firmware upgrade:

Firmware update check function requires access to the Internet.

You may update the device firmware manually by downloading the firmware file from the web site  https://eltex-co.ru/support/downloads/  and saving it on the computer. To do this, click the 'Select file' button in the 'Firmware update file' field, and specify path to firmware in the .tar.gz format file. 

To start the update process, you must click the 'Upload file' button. The process may take several minutes (its current status will be shown on the page). The device will be automatically rebooted when the update is completed

Do not switch off or reboot the device during the firmware update. When you update the device from 2.0.0 to 2.1.0 firmware version, you should reset the device to factory settings and configure it once again according your requirements, or preliminary set signal power in Network–>Internet submenu as no more than 16 dBm.

The «Reboot» submenu

In the «Reboot» submenu you may reboot the device.

Click the «Reboot» button to reboot the device. Device reboot process takes approximately 1 minute to complete.

The «Autoprovisioning» submenu

In the «Autoprovisioning» submenu you may configure DHCP-based autoprovisioning algorithm and subscriber device automatic configuration protocol TR-069.

DHCP-based Autoprovisioning:

tftp://<server address>/<full path to cfg file>
where < server address > – TFTP server address (domain name or IPv4),
< full path to cfg file > – full path to configuration file on the server;

tftp://<server address>/<full path to firmware file>
where< server address > – TFTP server address (domain name or IPv4),
< full path to firmware file > – full path to configuration file on the server.

More detailed information on the algorithm see in section An algorithm of automatic update based on DHCP

Autoprovisioning via TR-069:

Common:

ACS Connection Request:

Client Connection Request:

NAT Settings:

If there is modification of network addresses between client and ACS server (NAT – network address translation), ACS server might not have the opportunity to establish connection with the client if certain technologies are not used to avoid it. The techologies help the client to define so called public address (NAT addresses – an address of external gateway, behind which the client is located). When the public address is defined, the client inform the server. Then, the server uses the public address (not the local) to establish connection with the client.

When STUN mode is selected you should configure the following settings:

When Manual mode is selected, client address is set manually in NAT Address parameter (the address should be set in IPv4 format).

Through TR-069, you may implement main configuration of the device, firmware update and reading the data on the device (firmware version, model, serial number, etc.), uploading/downloading of configuration file, remote reboot (TR-069, TR-098 specifications are supported).
To apply a new configuration and store settings into the non-volatile memory, click the 'Apply' button. To discard changes click the Cancel button.

The «Advanced» submenu

Use this menu to set reserved VLAN ID, enable UPnP and enable/disable Service Wi-Fi.

UPnP

UPnP is used by some applications (e.g. DC clients such as FlylinkDC++) to create forwarding rules for TCP/UDP ports used by these applications on a higher router. It is recommneded to enable UPnP for operation of file exchange services on a network.

Reserved VLAN ID

Reserved VLAN ID – the list of service VLANs, which are used for for solving intrasystem tasks.

When «Use Management VLAN» is checked and Management VLAN configured incorrectly, there is a posiibility of losing access to the device. The device will be available when connecting via Ethernet by address 192.0.3.1.

Service Wi-Fi

To apply a new configuration and store settings into the non-volatile memory, click the 'Apply' button. To discard changes click the Cancel button.

To avoid unauthorized access to the device, after aligning Wi-Fi, you should disable the Technological Wi-Fi

Configuration Example

  1. Connect PC to LAN port of injector;
  2. Enter IP address of the device to URL bar of a browser (192.168.1.1 by default, if address was not obtain via DHCP). When connection is established successfully, the window with Login and password fields will be displayed. Fill the filds and press «Log in». (By default, login: admin, password: password). 

If the window is not displayed make sure that the PC and the device are in the same network.


Implement configuration on Internet tile. In Network Mode field, select the required mode: Bridge or Router. If static settings are used for connection to a provider network, choose «Static» value in «Protocol» field and fill the fields: «IP address», «Netmask», «Default gateway», «Primary DNS Server», «Secondary DNS Server» – the values are given by service provider. 
Configure conection to a base station. Specify SSID of the wireless network, you want to connect to, in the corresponding field. Select security mode through which authentication in the selected wireless network is implemented and specify the key if using an encrypted network. After clicking on the 'Apply' button, the subscriber station will search for the specified SSID on the air and, upon detection, will attempt to connect to the base station with the specified parameters. If the parameters are specified correctly and the signal level is sufficient, a successful connection will occur.

 Spectrum Analyzer

To use the embedded spectrum analyzer on the WB-2P-LR5, you need to login to the device via telnet or ssh. Enter the spectrum-analyzer  command to run it. The analysis time for all the radio channels in the range is approximately 5 minutes.

Please note that all clients will disconnect from the base station during spectrum analyzer operation. The subscriber stations will be connected again only when the spectrum analyzer finishes its work.

The result can be obtained using the spectrum-analyzer-result command. Information on the loading of each channel (in percent) will be displayed in the console:

root@WB-2P-LR5:~$ spectrum-analyzer
Spectrum analyzer scanning in progress
root@WB-2P-LR5:~$ 
root@WB-2P-LR5:~$ spectrum-analyzer-result 
================start dump config================
node: Monitoring.Network.SpectrumAnalyzer
		name: 36, value: 5
		name: 37, value: 5
		name: 38, value: 0
		name: 39, value: 3
		name: 40, value: 1
		name: 41, value: 3
		name: 42, value: 0
		name: 43, value: 3
		name: 44, value: 3
		name: 45, value: 3
		name: 46, value: 0
		name: 47, value: 4
		name: 48, value: 2
		...

Device automatic DHCP-based update algorithm

Device automatic update algorithm is defined by the «Parameters Priority from» value.

1.If the «Static settings» value is selected, then the full path (including access protocol and server address) to configuration file and firmware file will be defined by «Configuration file» and «Firmware file» Full path should be specified in URL format: 
<protocol>://<server address>/<path to file>, where

You may use the following macro in URL (reserved words substituted with the specific values):

For MAC address, serial number and model name, see «Device» section on the monitoring page.
URL examples:

tftp://download.server.loc/firmware.filehttp://192.168.25.34/configs/WB-2P-LR5//my.cfg ,

tftp://server.tftp/$PN/config/$SN.cfghttp://server.http/$PN/firmware/$MA.frm etc.

Some URL parameters might be omitted. For example, configuration file may be specified in the following format:

http://192.168.18.6 
or 
config_wb.cfg

If the system is unable to extract the necessary file downloading parameters (protocol, server address or path to file on server) from configuration file or firmware file URL, it will attempt to extract an unknown parameter from DHCP Option 43 (Vendor specific info) or 66 (TFTP server) and 67 (Boot file name), when address obtaining via DHCP is enabled for the Internet service (DHCP option format and analysis will be provided below). If the system is unable to extract missing parameter from DHCP options, default value will be used:

Thus, if the 'Configuration File' and 'Firmware File' fields are left empty, options 43 or 66, 67 with the location of these files will not be received via DHCP — the URL of the configuration file will look like:

tftp://update.local/wb-2p-lr5.cfg ,
and the firmware file URL: 
tftp://update.local/wb-2p-lr5.fw
.

2.If 'DHCP options' value is selected, configuration file and firmware file URLs will be extracted from DHCP Option 43 (Vendor specific info) or 66 (TFTP server) and 67 (Boot file name), thus, address obtaining via DHCP should be enabled for the Internet service (DHCP option format and analysis will be provided below). If URL parameters are not provided by DHCP options, default parameters values will be used:

Option 43 format (Vendor specific info)

1|<acs_url>|2|<pcode>|3|<username>|4|<password>|5|<server_url>|6|<config.file>|7|<firmware.file>|8|<vlan_tag>

1 – TR-069 autoconfiguration server address code;

2 – «Provisioning code» parameter specification code.

3 – code of the username for TR-069 server authorization;

4 – code of the password for TR-069 server authorization;

5 – server address code; server address is specified in URL format: tftp://address or http://address . The first version represents TFTP server address, the second version – HTTP server address;

6 – configuration file name code;

7 – firmware file name code;

8 – a code of VLAN tag for management;

«|» – mandatory separator used between codes and suboption values. 

Algorithm of identification for configuration file and firmware file URL parameters from DHCP Options 43 and 66, 67.

  1. DHCP exchange initialization
    Device initializes DHCP exchange after the startup.
  2. Option 43 analysis
    When Option 43 has been received, suboption 8 is analyzed (vlan_tag):

3. Option 66 analysis

If Option 43 is not received from DHCP server or it is received but the system fails to extract the server address, Option 66 will be searched. If the system fails to obtain the firmware file name, Option 67 will be searched. They are used for TFTP server address and the firmware file path extraction respectively. Then, configuration and firmware files will be downloaded from Option 66 address via TFTP.

Special aspects of configuration updates

Configuration file should be in .tar.gz format (this format is used when configuration is saved from the web interface in the «System» – «Configuration management» tab). Configuration downloaded from the server will be applied automatically and does not require device reboot.

Special aspects of firmware updates

Firmware file should be in .tar.gz format. When the firmware file is loaded, the device unpacks it and checks its version (using 'version' file in tar.gz archive). 

If the current firmware version matches the version of the file obtained via DHCP, firmware will not be updated. Update is performed only when firmware versions are mismatched. When the firmware image is written into the device flash memory, the Power indicator will flash green, orange and red in succession.

Do not power off or reboot the device, when the firmware image is written into the flash memory. These actions will interrupt the firmware update that will lead to the device boot partition corruption. The device will become inoperable. To restore the device operation, use the instruction provided in System recovering after firmware update failure.

System recovering after firmware update failure

If while the firmware update (through the web interface or through autoupdate mechanism based on DHCP) a failure occured (e.g. due to power cutoff) and the device does not operate (the «Power» indicator is constantly solid red), use the following algorithm to recover the device:

Appendix A. Launch user script when starting the system

Sometimes you need the device to implement certain actions when starting, which cannot be implemented through settings in configuration file. In this case you may configure a user script through a configuration file that will be launched when the system starting. You may set any needed commands sequence.

For user script launching, there is a settings section in the configuration file cfg.yaml:

UserScript: 
Enable: "0" 
URL: ""

Option «Enable» permits (if the value is 1) or forbids (if the value is 0) launch of the script, path to which is in URL parameter.

The userscript might be located on remote server as well as on the device. The script is loaded via HTTP or TFTP from remote server. Examples of configuration files for user script launching using different sources are given below:

  1. Launch from HTTP server
    To launch a script from HTTP server, enter the entire path to the file in HTTP-URL format to URL parameter: 
    URL: " http://192.168.0.250/user-script/script.sh "
    In this case, after the device started, file script.sh, which is kept in the catalogue having 192.168.0.250 address, will be automatically loaded via HTTP from the defined server. Then it will be launched.
  2. Launch from TFTP server
    To launch a script from TFTP server, enter the entire path to the file in TFTP-URL format to URL parameter: 
    URL: " tftp://192.168.0.250/user-script/script.sh "
    In this case, after the device started, file script.sh, which is kept in the catalogue having 192.168.0.250 address, will be automatically loaded via TFTP from the defined server. Then it will be launched.
  3. Local script launch
    Due to the peculiar properties of the file system, a local script should be stored in /etc/config catalogue as the content of the catalogue is saved after device reload. You may create script in /etc/config catalogue through vi editor or load it from TFTP server using tftp –gl sh <TFTP-server address> command. After creating a script, you should set rights for launching using the following command:
    chmod 777 /etc/config/user.sh
    In configuration file, URL for local script launching should be set as follows: 
    URL: "  File://etc/config/user.sh  " 

    A user script should start from the #!/bin/sh directive.

Appendix B. Antenna Patterns

The pattern of vertically polarized antenna in H-plane:

The pattern of vertically polarized antenna in E-plane:

The pattern of horizontally polarized antenna in H-plane:

The pattern of horizontally polarized antenna in E-plane:
 

The list of changes

Document version

Issue date

Revisions

Version 5.225.06.2021

Synchronization with firmware version 2.4.6

Version 5.122.12.2020

Synchronization with firmware version 2.4.1

Version 5.007.04.2020

Synchronization with firmware version 2.4.0

Added:
4.4 Test changes mode

Changes in sections:
5.2.1 The «Network/Internet» menu

Version 4.006.11.2019

Synchronization with firmware version 2.3.0

Changes in sections:

  • Technical features
  • Design
  • Mounting order
  • Antenna alignment
  • The Network/Internet menu
  • The LAN submenu
  • The Network/SNMP menu
  • The Monitoring menu
  • The PPPoE Relay submenu

Version 3.0

28.06.2019

Synchronization with firmware version 2.2.0

Added:

  • Wi-Fi antenna alignment
Version 2.031.10.2018

Added:

4.5.3 Wireless bridge

4.6.4 «WDS» submenu

4.6.5 «Radiointerface» submenu

4.7.2 «WDS» submenu

Changes in chapters:

2.2 Device specifications

4.6.3 «Internet» submenu

4.6.7 «MAC addresses confinuration» submenu»

Version 1.0

24.11.2017

First issue

Firmware version

 

2.4.6