ericsson w25 administrator manual

172
Ericsson W25 Fixed Wireless Terminal for WCDMA/HSDPA Mobile Networks Administrator's Guide

Upload: infoferenda

Post on 15-Mar-2016

251 views

Category:

Documents


7 download

DESCRIPTION

Ericsson W25 Administrators Guide C

TRANSCRIPT

Page 1: Ericsson W25 Administrator Manual

Ericsson W25Fixed Wireless Terminal for WCDMA/HSDPA Mobile

Networks

Administrator's Guide

Page 2: Ericsson W25 Administrator Manual

Ericsson W25Fixed Wireless Terminal for WCDMA/HSDPA

Mobile Networks

Administrator's Guide.

ii 6/1551-CRH 102 167 Uen Rev C 2007-06-08

Copyright

© Ericsson AB 2007 - All Rights Reserved

Disclaimer

No part of this document may be reproduced in any form without the written permission of the copyright owner.

The contents of this document are subject to revision without notice due to continued progress in methodology, design and manufacturing. Ericsson shall have no liability for any error or damage of any kind resulting from the use of this document.

Trademark List Ericsson Ericsson is the trademark or registered trademark of

Telefonaktiebolaget LM Ericsson.

Windows Internet Explorer MSN Messenger

Windows, Internet Explorer and MSN Messenger are registered trademarks of Microsoft Corporation

Wi-Fi Wi-Fi is a registered trademark of the Wi-Fi Alliance.

TEMS TEMS is a trademark of Telefonaktiebolaget LM Ericsson.

Firefox Firefox is a registered trademark of Mozilla Foundation.

Opera Opera is a registered trademark of Opera Software ASA.

Safari Safari is a registered trademark of Apple Computer, Inc.

All other trademarks or registered trademarks mentioned herein are the property of their respective owners.

Page 3: Ericsson W25 Administrator Manual

.

6/1551-CRH 102 167 Uen Rev C 2007-06-08 iii

Contents

1 Introduction 1 1.1 Structure and Audience of this Guide 1 1.2 Typographic Conventions 2 1.3 Related Documents 2

2 Product Overview 4 2.1 General 4 2.2 Feature Summary 5

3 Configuration Overview 7 3.1 Configuration Tools 7 3.1.1 Command Line Interface 7 3.1.2 Web User Interface 7 3.2 Access Control 8

4 The Command Line Interface 9 4.1 Access the CLI 9 4.1.1 Local Access Using Telnet 9 4.1.2 Remote Access Using SSH2 10 4.2 Login to the System 12 4.2.1 Failed Login Attempts 13 4.2.2 Change Password 13 4.3 Logout of the System 14 4.4 Command Structure 14 4.4.1 Configuration Command (cf) 14 4.4.2 Status Command (st) 16 4.5 Command Navigation 16 4.5.1 Command Completion using <tab> 17 4.6 Get Help 17 4.7 Save the Configuration 18

Page 4: Ericsson W25 Administrator Manual

Contents

iv 6/1551-CRH 102 167 Uen Rev C 2007-06-08

4.8 Backup and Restore Configuration 18 4.9 Reset to Default Configuration 19 4.9.1 Create own Default Configuration File 19 4.10 List the Complete Running Configuration 20 4.10.1 List Part of the Running Configuration 23

5 Configure the Mobile Network 25 5.1 Preferred Roaming List (PRL) 25 5.1.1 Set PRL Region 25 5.2 RSCP Alarm Threshold 25 5.2.1 Set RSCP Alarm Threshold 26 5.3 UMTS (3G) Parameters 26 5.3.1 Enable/Disable the UMTS Network 26 5.3.2 Set 3G APN 26 5.3.3 Show UMTS Configuration 26 5.4 GSM/GRPS/EDGE (2G) Parameters 27 5.4.1 Enable/Disable the GSM/GPRS/EDGE Network 27 5.4.2 Set 2G APN 27 5.4.3 Show GSM/GPRS/EDGE Configuration 27 5.5 Set Time from Mobile Network 28 5.5.1 Display Current Date and Time 28 5.5.2 Enable/Disable Time Synchronization from Mobile Network 28 5.6 PIN Code 29 5.6.1 Set PIN Code 29 5.6.2 Enable/Disable PIN Lock 29 5.7 PDP Authentication Type 29 5.7.1 Change PDP Authentication Type 30 5.8 PPP Client 30 5.8.1 Enable/Disable PPP Service 30 5.8.2 Set PPP Username and Password 30 5.8.3 Show PPP Configuration 31 5.9 Virtual Operator Name 31 5.9.1 Set Virtual Operator Name 31

Page 5: Ericsson W25 Administrator Manual

Contents

6/1551-CRH 102 167 Uen Rev C 2007-06-08 v

5.9.2 Show Virtual Operator Name 31 5.10 Allowed Operators 31 5.10.1 Add Allowed Operators 32 5.10.2 Show Allowed Operators 32 5.10.3 Delete Allowed Operators 32

6 Configure Routing and IP Services 34 6.1 LAN IP Address and Hostname 34 6.1.1 Set LAN IP Address 34 6.1.2 Show LAN IP Configuration 34 6.1.3 Set Hostname 35 6.1.4 Show Hostname Configuration 35 6.2 IP Forwarding 35 6.2.1 Enable/Disable IP Forwarding 35 6.2.2 Show IP Forwarding Configuration 35 6.3 DNS 36 6.3.1 DNS Proxy 36 6.4 DHCP 36 6.4.1 Enable/Disable DHCP Server 36 6.4.2 Set DHCP Server IP Address Range 36 6.4.3 Set DHCP Default Lease Time 37 6.4.4 Show DHCP Configuration 37 6.5 SNTP 37 6.5.1 Display Current Date and Time 38 6.5.2 Enable/Disable SNTP Client 38 6.5.3 Specify SNTP Server(s) 38 6.5.4 Show SNTP Configuration 39 6.6 NAT 39 6.6.1 Enable/Disable NAT 39 6.6.2 NAT Port Forwarding 40 6.6.3 NAT ALGs 41 6.7 UPnP IGD 42 6.7.1 Enable/Disable UPnP IGD 42

Page 6: Ericsson W25 Administrator Manual

Contents

vi 6/1551-CRH 102 167 Uen Rev C 2007-06-08

6.7.2 Show UPnP IGD Configuration 42 6.8 IP Quality of Service 43 6.8.1 Enable/Disable IP QoS 43 6.8.2 Show IP QoS Configuration 43

7 Configure Telephony and Fax Services 44 7.1 POTS Line Interface Settings 44 7.1.1 IMS User Agent 45 7.1.2 Enable T.38 45 7.1.3 Local VoIP Port 45 7.1.4 Local Fax Port 46 7.1.5 Local SIP Port 46 7.1.6 VoIP Session Timeout 46 7.1.7 Preferred CODECs 47 7.2 General Fax Settings 48 7.2.1 IMS User Agent 48 7.2.2 IMS Call Server 49 7.2.3 IMS Media Codec 50 7.3 General Telephony Settings 53 7.3.1 Inter Digit Timer 53 7.3.2 Dial Tone Timeout 53 7.3.3 Congestion Tone Timeout 54 7.3.4 Local Ringing Timeout 54 7.3.5 DTMF Duration 55 7.3.6 Howler Tone 55 7.3.7 On/Off-hook Timeouts 56 7.3.8 Hook Flash Time 57 7.3.9 CLIP 57 7.3.10 On Hold Ring 59 7.3.11 Tones and Signals Profile 59 7.3.12 Analog Settings Profile 60 7.3.13 Port Gain 60 7.4 Dial Process 61

Page 7: Ericsson W25 Administrator Manual

Contents

6/1551-CRH 102 167 Uen Rev C 2007-06-08 vii

7.4.1 Add a Dial Plan Rule 61 7.4.2 Emergency Calls 65 7.5 Supplementary Services 66 7.5.1 Call Waiting 66 7.5.2 Call Management with R-codes. 67 7.5.3 CLIR 70 7.5.4 Call Return 71 7.5.5 Delayed Hotline 72 7.5.6 Call Forwarding Unconditional 73 7.5.7 Call Forwarding on Busy 75 7.5.8 Call Forwarding on No Reply 76 7.5.9 Call Forwarding Unreachable 77 7.5.10 Voice Mail 79

8 Configure the Wireless LAN 81 8.1 Enable/Disable the WLAN Interface 81 8.2 WLAN Transmit Power 81 8.3 Network Name (SSID) 82 8.3.1 Set SSID name 82 8.3.2 Hide SSID 82 8.4 Region 83 8.4.1 Set Region 83 8.5 Channel Selection 83 8.5.1 Manual Channel Selection 83 8.5.2 Automatic Channel Selection 84 8.6 Wireless Security 84 8.6.1 Set Security Mode 85 8.6.2 Whitelist 87

9 Configure USB Services 89 9.1 File Sharing 89 9.2 Printer Sharing 89 9.3 Workgroup 90

Page 8: Ericsson W25 Administrator Manual

Contents

viii 6/1551-CRH 102 167 Uen Rev C 2007-06-08

9.3.1 Show Workgroup Configuration 90 9.4 Sharename 90 9.4.1 Assign a Sharename to a Device 90 9.4.2 Show Sharename Configuration 91 9.4.3 Delete a Sharename 91

10 Management Tools 92 10.1 Software Update 92 10.1.1 Check the Current Software Version 92 10.1.2 Manual Software Update 92 10.1.3 Automatic Software Update 94 10.2 System Log 95 10.2.1 Set Log Level 96 10.2.2 Syslog Heartbeat 97 10.2.3 Set Persistent Logging 97 10.2.4 Define Remote Syslog Host 97 10.2.5 Show Syslog Configuration 98 10.2.6 Show Log Messages 99 10.3 Display Interface Status 99 10.3.1 Basic System Information 100 10.3.2 LAN Interface Status 100 10.3.3 WAN Interface Information 101 10.3.4 WAN Interface Statistics 102 10.3.5 WLAN Interface Information 103 10.3.6 USB Interface Status 104 10.3.7 NAT Statistics 104 10.3.8 Telephony Interface Status 105 10.3.9 Power Management Service Information 105 10.3.10 Interface Statistics 106 10.4 TEMS Investigation 106

11 Web User Interface 108 11.1 Access and Login to the WUI 108

Page 9: Ericsson W25 Administrator Manual

Contents

6/1551-CRH 102 167 Uen Rev C 2007-06-08 ix

11.1.1 Change Password 110 11.1.2 Alarms 111 11.1.3 Network Information 111 11.2 Configuration Wizard 112 11.2.1 Internet Access 113 11.2.2 Wireless LAN 115 11.2.3 Wizard Confirmation 119 11.3 Internet 121 11.3.1 Mobile Network Connection Details 121 11.3.2 Traffic Statistics 122 11.3.3 Authentication 123 11.3.4 Change PIN 123 11.3.5 Unblock SIM 123 11.4 LAN 124 11.4.1 LAN IP Address 124 11.4.2 DHCP Server 125 11.4.3 Traffic Statistics 125 11.4.4 LAN Port Status 125 11.5 Wireless LAN 126 11.5.1 Enable WLAN 126 11.5.2 Region 126 11.5.3 Radio Channel 126 11.5.4 Transmit Power [dBm] 127 11.5.5 Scan for Wireless Networks 127 11.5.6 Network Name (SSID) 127 11.5.7 Authentication 127 11.5.8 Connected Devices 128 11.5.9 Whitelist 128 11.6 NAT 129 11.6.1 UPnP IGD 129 11.6.2 ALGs 129 11.6.3 Port Forwarding 129 11.7 Sharing 131

Page 10: Ericsson W25 Administrator Manual

Contents

x 6/1551-CRH 102 167 Uen Rev C 2007-06-08

11.7.1 Shared Storage Devices 131 11.7.2 Shared Printer 132 11.8 System 133 11.8.1 Basic System Information 134 11.8.2 Configuration Backup and Restore 134 11.8.3 Restart 134 11.8.4 Software Update 134 11.8.5 Factory Reset 135 11.9 Event Log 136

12 SIM Authentication via Phone 137

Appendix A Technical Specifications 139

Appendix B Default Configuration File 146

Glossary 158

Page 11: Ericsson W25 Administrator Manual

Introduction

6/1551-CRH 102 167 Uen Rev C 2007-06-08 1

1 Introduction

This chapter defines the scope of this guide and its intended audience. It also describes the typographical conventions used and provides a list of reference documents.

1.1 Structure and Audience of this Guide This Administrator’s Guide contains information that is needed to configure and manage the Ericsson W25 mainly using the Command Line Interface (CLI). It is intended primarily for system administrators tasked with commissioning, operating and maintaining the Ericsson W25.

The following table describes the content and organization of this guide:

Table 1 Content and Organization

Chapter Description

2 Product Overview; gives a brief description of the main functionality of the Ericsson W25.

3 Configuration Overview; provides an overview of the available configuration tools and access control.

4 The Command Line Interface; describes how to access and use the CLI including some basic configuration such as login, logout, save changes, and getting help.

5 Configure the Mobile Network; describes the configuration parameters used to access the mobile network.

6 Configure Routing and IP Services; describes how to configure LAN IP address and hostname, IP forwarding, DNS, DHCP, SNTP, NAT, UPnP IGD and IP QoS.

7 Configure Telephony and Fax Services; describes how to configure analogue voice services and fax services provided via the telephony line interface.

8 Configure the Wireless LAN, describes how to configure the WLAN interface and settings for wireless security.

9 Configure USB Services; describes how to configure network storage or printer sharing for devices connected to the USB ports.

Page 12: Ericsson W25 Administrator Manual

Introduction

2 6/1551-CRH 102 167 Uen Rev C 2007-06-08

Chapter Description

10 Management Tools; describes how to perform software updates and show status and statistics information.

11 Web User Interface; introduces the Web User Interface which enables the end user to configure the Ericsson W25.

12 SIM Authentication via Phone; describes how to enter a PIN code from a phone connected to the Ericsson W25.

Appendix A Technical Specifications; provides a hardware and OS overview as well as some technical specifications for the Ericsson W25.

Appendix B Default Configuration File; lists the contents of the default configuration file.

1.2 Typographic Conventions The following conventions apply for text describing command input/output in the CLI (Command Line Interface).

Table 2 Typographic Conventions

Convention Example

Commands given to the CLI. cf commit

System printouts. Usage: cf <cmd>

Angle brackets mean that this part should be replaced with what is indicated within the brackets. It indicates a mandatory argument.

cf <cmd>

Alternatives in a command are separated by a pipe symbol.

true|false

Square brackets mean that this part is an optional argument.

[<arg0>]

1.3 Related Documents In the following documents, more information about the Ericsson W25 can be found:

• Ericsson W25, Quick Installation Guide, XX/LZT 108 9132, Ericsson AB 2006, 2007.

• Ericsson W25, User’s Guide, 5/1551-CRH 102 167, Ericsson AB 2006, 2007.

Page 13: Ericsson W25 Administrator Manual

Introduction

6/1551-CRH 102 167 Uen Rev C 2007-06-08 3

• Ericsson W25, Safety and Regulatory Information, 3/1551-CRH 102 167, Ericsson AB 2006, 2007.

• Ericsson W25, License Information, 4/1551-CRH 102 167, Ericsson AB 2006, 2007.

Page 14: Ericsson W25 Administrator Manual

Product Overview

4 6/1551-CRH 102 167 Uen Rev C 2007-06-08

2 Product Overview

This chapter briefly describes the main functionality of the Ericsson Fixed Wireless Terminal (FWT) W25.

2.1 General The Ericsson W25 is an advanced small office and home router with wireless WAN access. The product is a combination of a high-speed modem, a gateway and a wireless LAN (WLAN) access point. Additionally, the Ericsson W25 also includes voice capabilities over standard analog telephone interfaces.

With WCDMA/HSDPA radio access capability the Ericsson W25 is well suited to provide broadband data access with data speeds similar to fixed line xDSL services. The basic data rate is up to 3.6 Mbps and the peak up-link speed is 384 kbps.

Figure 1 - Ericsson W25 Interface Overview

Page 15: Ericsson W25 Administrator Manual

Product Overview

6/1551-CRH 102 167 Uen Rev C 2007-06-08 5

2.2 Feature Summary The Ericsson W25 features the latest technology, which makes it highly suitable for everyday broadband services:

• Multi mode broadband WAN connectivity through WCDMA/HSDPA as primary access and GSM/GPRS/EDGE as fall-back. Basic data rate is up to 3.6Mbps. For details see Table 22 - Data Transmission in Appendix A.

• Multi device data networking via both wired and wireless access for flexible and multiple local area networking amongst users:

- Four switched Ethernet 10/100BaseT ports for wired LAN connectivity, with rate auto-negotiation and MDI/MDIX auto-detection support.

- An integrated WLAN 802.11 b/g (data rates up to 11/54Mbps) access point for wireless LAN connectivity.

- Two USB ports (USB 2.0 Host Controller) for file and printer sharing.

• Flexible networking capabilities:

- Comprehensive set of networking and IP protocols such as bridging, routing, DNS, DHCP, SNTP, and NAT.

- VPN pass-through supporting VPN protocols for standard IPSec VPN applications.

- Wireless security features including standard WLAN WEP, WPA and WPA2 encryptions and MAC Association Control.

- QoS feature for outgoing IP traffic via the WAN interface.

• High quality analogue voice and fax services are provided via a telephony interface. A broad range of network related services such as Prepaid Subscription, CLI (Calling Line Identification), Call Waiting, Call Barring, Call Forwarding, and Multiparty Conference Calls are available.

• The Ericsson W25 can be powered from 10-28V DC sources. Alternate DC power sources (such as solar panels, car batteries etc.) can also be used. For voice back-up purposes, an optional rechargeable battery-pack can be fitted inside the unit.

• SIM-lock and PIN-lock functions prevent unauthorized use of the subscription, while a mechanical antitheft kit is available to physically secure the Ericsson W25 to the wall.

• Support of 850MHz, 1900MHz and 2100MHz WCDMA/HSDPA bands and 850MHz, 900MHz, 1800MHz and 1900MHz GSM/GPRS/EDGE bands. For details see Table 23 - Frequency Bands in Appendix A.

Page 16: Ericsson W25 Administrator Manual

Product Overview

6 6/1551-CRH 102 167 Uen Rev C 2007-06-08

• Local and remote administration and management with SSH (Secure Shell) support. Web-based user interface for configuration of the device with wizard support.

• Information system logging function.

• Dual software image feature to ensure reliability of the device. If a software update process should get interrupted, e.g. power failure during the update process, there is always a last known good software image to boot from.

• An update service allows the Ericsson W25 to check for new software releases automatically on a scheduled basis from a remote management server provided by Ericsson. Automatic downloads of new software releases for application fixes and functionality updates.

• The Ericsson W25 has support for TEMS™ Investigation, providing possibilities for the operator to perform real-time diagnostics check and log radio interface behaviors. Note: The TEMS product support is intended for the module used within this unit. Once it is supported, the Ericsson W25 software has been developed to support its function.

For more information about the Ericsson W25, see www.ericsson.com/fwt.

Page 17: Ericsson W25 Administrator Manual

Configuration Overview

6/1551-CRH 102 167 Uen Rev C 2007-06-08 7

3 Configuration Overview

This chapter gives an overview of the available configuration tools and access control.

3.1 Configuration Tools For configuration purpose, the Ericsson W25 includes a CLI (Command Line Interface) and a WUI (Web User Interface) which is accessible as illustrated in the figure below:

Figure 2 - Ericsson W25 Configuration Tools

3.1.1 Command Line Interface The CLI is primarily intended for operator service personnel handling such tasks as storing/exchanging configuration files and for maintenance purpose (i.e. fault location and tracing).

Remote access to the CLI is possible using SSH2 and local access to the CLI is provided through Telnet.

3.1.2 Web User Interface

The end-user configures the Ericsson W25 through the WUI that is accessible through the LAN and WLAN interfaces.

Page 18: Ericsson W25 Administrator Manual

Configuration Overview

8 6/1551-CRH 102 167 Uen Rev C 2007-06-08

The WUI also includes a Configuration Wizard for easy setup of the local Internet connection and wireless network.

3.2 Access Control Access control is applicable for all interfaces, i.e. CLI, WUI, and remote management.

By default there are three accounts available, where:

• The end-user (user-id user), using the WUI, is allowed to access functions and configuration parameters related to WAN authentication, LAN settings, NAT and port forwarding, WLAN access point and USB printer sharing. Note! This account can only be used when accessing the WUI and has no access rights to the CLI.

• The operator (user-id operator), using the CLI, in addition to the end-user privileges also is allowed to access additional WAN related configuration parameters, telephony service parameters and trouble shooting.

• An administrator account (user-id root), using the CLI, has full permissions.

Each configuration parameter has an access control specification determining what action (read or write) the user/group is allowed to perform.

Appendix B specifies all parameters in the default configuration file including information about default value, type, owner, group, and access rights.

Page 19: Ericsson W25 Administrator Manual

The Command Line Interface

6/1551-CRH 102 167 Uen Rev C 2007-06-08 9

4 The Command Line Interface

This chapter describes how to access the Command Line Interface (CLI), the command structure, and some basic configuration.

4.1 Access the CLI The CLI can be accessed remotely using the SSH2 protocol or locally using Telnet as described below.

4.1.1 Local Access Using Telnet

The Telnet server in the Ericsson W25 is enabled by default, allowing local connection to the unit through a Telnet session.

To use Telnet the connected PC must provide a Telnet client (Tera Term Pro, Windows telnet client, Linux telnet client, etc).

To access the CLI via Ethernet local LAN using the Windows telnet client, proceed as follows:

1 Connect a PC to one of the Ethernet ports (LAN1-LAN4) on the Ericsson W25.

2 Access the Windows command line, start the Telnet client and enter the following command: telnet <LAN IP address for the Ericsson W25>

Note: The default LAN IP address for the Ericsson W25 is 192.168.1.1 and the connected PC must be on the same subnet, for example the IP address set to 192.168.1.2.

The following example starts a Telnet session to the device at IP address 192.168.1.1:

telnet 192.168.1.1 FWT Login:

To logout from a Telnet session, use the following command:

Page 20: Ericsson W25 Administrator Manual

The Command Line Interface

10 6/1551-CRH 102 167 Uen Rev C 2007-06-08

$ exit Connection to host lost.

4.1.2 Remote Access Using SSH2

The Ericsson W25 includes a SSH server which enables secure remote access to ensure that network administrators can securely configure and monitor the Ericsson W25 over the Internet.

To use SSH the workstation must provide an SSH client. The SSH server on the unit must also be enabled.

Note: The SSH server is enabled in the initial unit configuration.

The SSH server is enabled/disabled by entering the following command:

$ cf set ssh.enabled true|false $ cf commit

To show the current status of the SSH server, enter:

$ cf get ssh.enabled true

4.1.2.1 Password Authentication

The SSH server supports both password and public key authentication.

This parameter is used to block password login via SSH. When disabled (set to false), it is not possible to login with a password, only with a correct key.

To enable/disable SSH password authentication the following command is used:

$ cf set ssh.password_authentication true|false $ cf commit

To show the current status of SSH password authentication, enter:

$ cf get ssh.password_authentication false

4.1.2.2 DSA Host Keys

The SSH server stores one set of DSA host keys (one public and one private) for data encryption on the file system. A randomly seeded algorithm generates

Page 21: Ericsson W25 Administrator Manual

The Command Line Interface

6/1551-CRH 102 167 Uen Rev C 2007-06-08 11

an initial set of host keys the first time the Ericsson W25 is booted. The SSH server uses this set of host keys to identify itself when an SSH client connects.

The preconfigured host keys can be changed using the following commands:

$ cf set ssh.hostdsakey <string> $ cf set ssh.hostdsakey_pub <string>

After a secure connection is established between the SSH server and a client the client attempts authentication. In order to use public key authentication, a file containing the public key of the SSH client needs to be added to the Ericsson W25 configuration database.

4.1.2.3 Public Key Authentication

The following example describes the steps needed for the initial setup and log in using SSH and public key authentication:

1 Create SSH keys on the Ericsson W25 (as root): # ssh-keygen –t dsa –b 1024 Generating public/private dsa key pair. Enter file in which to save the key (/root/.ssh/id_dsa): /rw/id_dsa Enter passphrase (empty for no passphrase): Enter same passphrase again: Your identification has been saved in /rw/id_dsa. Your public key has been saved in /rw/id_dsa.pub. The key fingerprint is: 08:4e:f3:db:39:98:3f:db:28:6a:93:52:75:9e:cd:4f root@FWT #

2 From you client PC, fetch the generated keys: user@computer:~$ scp root@FWT:/rw/id_dsa* ~/.ssh/ Both the file id_dsa och id_dsa.pub is now stored locally on the client computer.

3 Add the public key to the Ericsson W25 configuration database: # cf append users[1].ssh.authorized_keys "`cat ~/id_dsa.pub`" # cf commit The generated keys /rw/id_dsa and /rw/id_dsa.pub may now be deleted.

Page 22: Ericsson W25 Administrator Manual

The Command Line Interface

12 6/1551-CRH 102 167 Uen Rev C 2007-06-08

4 Log in to the Ericsson W25 using the public key: user@computer:~$ ssh operator@FWT Welcome to the Ericsson W25 Fixed Wireless Terminal $ If a passphrase has been specified when creating the SSH keys (as in step 1) a password will also be required when logging in. In this example, the passphrase request was left empty meaning there is no need for a password.

4.2 Login to the System All access to the Ericsson W25 requires entry of a valid user ID and password.

The factory default settings for the unit define three user IDs:

• root with initial password root.

• operator with initial password operator.

• user with initial password user. This user ID is only used by end users when logging in to the WUI. It cannot be used to log in to the CLI.

For security reasons, it is recommended that all passwords are changed on a regular basis.

To login to the system for the first time, at the Login prompt (FWT login:), enter operator as both the user name and password:

FWT login: operator Password:

Note: The password entry is not echoed back to the display so no characters appear as the password is typed.

If the correct password is entered, the unit responds with the following information and the prompt:

Welcome to the Ericsson W25 Fixed Wireless Terminal

$

Note: The prompt appears with different characters depending on which user account is used when logging in; when logged in with user

Page 23: Ericsson W25 Administrator Manual

The Command Line Interface

6/1551-CRH 102 167 Uen Rev C 2007-06-08 13

account operator the prompt shows $ and when logged in as root the prompt shows #.

4.2.1 Failed Login Attempts

When attempting to log in remotely via SSH or locally via Telnet, the user is given three login attempts and then the session is ended.

All invalid login attempts are recorded in the System Log. For more information, see section 10.2 - System Log.

4.2.2 Change Password

The administrator (that is, the user logged in with user ID root) can change the password for any user account using the following command:

# cf set users[<index>].password <new password>

Index specifies which user account to change where root has index [0], operator index [1] and user index [2].

While logged on, all other users can change their own passwords. For example, to change password for the user account operator, enter the following command:

$ cf set users[1].password password $ cf commit

To check the new configuration, enter:

$ cf show users

users[0].name "root" users[0].password <permission denied> .uid 0 .gid 0 users[0].ssh.authorized_keys <permission denied> [1].name "operator" .password "password" .uid 500 .gid 500 [2].name "user" users[2].password <permission denied> .uid 1000 .gid 1000 users[2].ssh.authorized_keys <permission denied>

Page 24: Ericsson W25 Administrator Manual

The Command Line Interface

14 6/1551-CRH 102 167 Uen Rev C 2007-06-08

4.3 Logout of the System To logout of the system, enter the command:

$ exit

The system logs out the current user and displays the login prompt:

FWT login:

4.4 Command Structure The Ericsson W25 CLI allows administrators to set up, configure and manage devices. It also allows non-privileged users to view the current status but not to make changes to the system.

All configuration data resides in a configuration database (CDB) which is an xml-file stored in /etc/running.cdb.

Note: Do not manually modify this file since it will corrupt the CDB. All configuration changes should be made using the cf command.

4.4.1 Configuration Command (cf) The cf command is used for viewing and modifying the Ericsson W25 configuration:

$ cf

Usage: cf <cmd> [ <arg0> ... ]

The commands included in cf are described in the table below:

Table 3 Description of cf commands

Command Description

commit Commit all pending changes.

rollback Discard all pending changes.

show [<path>] Display the configuration. If <path> is not supplied, the complete configuration is displayed.

del <path> Delete a node at <path>.

help [<path>] Displays help information. If <path> is supplied, context sensitive help for

Page 25: Ericsson W25 Administrator Manual

The Command Line Interface

6/1551-CRH 102 167 Uen Rev C 2007-06-08 15

Command Description commands available at that node is included.

backup <file> Store a backup of all accessible values in a local <file>

restore <file> Restore backup from <file>.

reset-to-default Resets the complete configuration to the default.

export-default <file> Exports the current default configuration to <file>.

import-default <file> Imports new default configuration into CDB from <file>.

get <vpath> Get value of boolean/integer/string at <vpath>.

set <vpath> <value> Set value of boolean/integer/string at <vpath> to <value>.

append <lpath> <value0> Append a node to a list at <lpath> to <value0>.

del <lpath> <index> Delete an element <index> from a list at <lpath>

clear <lpath> Delete all elements from a list at <lpath>

The configuration database (CDB) consists of a hierarchical tree structure of nodes. A node is an object in the tree and can be either a complex node (lists and records) or a value (integers, booleans and strings).

A path (value path or list path) is a string which points to a node in the tree structure. Each element (part of a list node) is either a field name or an index. Field names are prefixed by a ‘.’ (dot) and an index is prefixed by a ‘[‘ and followed by a ‘]’. An index specifies which element is being referred to (in a path, for example).

4.4.1.1 Value Types

To view the value type of a node, use the cf type command. Supported data types for the cf command are:

• Boolean – logical either/or values such as true or false.

• Integer – a numerical value (-2,147,483,648 to +2,147,483,647).

Page 26: Ericsson W25 Administrator Manual

The Command Line Interface

16 6/1551-CRH 102 167 Uen Rev C 2007-06-08

• String – any text alphanumeric string. Spaces are not valid unless they are enclosed in quotation marks (“ “).

• List – a list contains zero or more elements. Each element is accessed by giving its index in the list. The first element is at index 0 (zero).

The following shows examples of viewing the data types:

$ cf type ip.napt.enabled boolean

$ cf type wlan.SSID.name string

$ cf type syslog.remote.port integer

$ cf type sntp.servers list

Note: All CLI commands are case-sensitive. The command attributes must be typed exactly as they appear in the syntax otherwise the command fails and the CLI displays a syntax error message.

4.4.2 Status Command (st) For reading out status and statistic information, the st command is used:

$ st

Usage: /bin/st { usb | lan | wan | wlan | nat | natverbose | system | wan-stats | tel | pm }

See section 10.3 - Display Interface Status for further information.

4.5 Command Navigation The command tree can be navigated using the cf fields command, for example:

$ cf fields "" autoupdate cellular sim dhcpd ip wlan ppp ssh syslog smb tems upnp users groups sntp qos telephony ims

$ cf fields ip napt forward hostname lan static_routes

$ cf fields ip.napt enabled algs port_forwardings

Page 27: Ericsson W25 Administrator Manual

The Command Line Interface

6/1551-CRH 102 167 Uen Rev C 2007-06-08 17

The up and down arrow keys can be used to scroll through entered commands.

4.5.1 Command Completion using <tab>

To display possible completions of a command, type the partial command followed immediately by <tab>.

If the partially typed command uniquely identifies a command, the full command appears, for example:

$ cf set telephony.e<tab> results in

$ cf set telephony.enabled

A list of possible completions is displayed if there is more than one potential match for the issued command as shown in the example below:

$ cf set telephony.<tab> telephony.dialplan telephony.fxs telephony.supplementary telephony.enabled telephony.pots $ cf set telephony.

4.6 Get Help The command cf help can be used to get general or specific information about commands.

To get help information, enter

$ cf help [<path>]

For example;

$ cf help ip.napt.port_forwardings

Commands for path "ip.napt.port_forwardings":

append ip.napt.port_forwardings <protocol> <from.port> <to.address> <to.port> Append a port_forwarding record to the list.

del ip.napt.port_forwardings <index> Delete node at <index>.

clear ip.napt.port_forwardings Delete all nodes in list.

Page 28: Ericsson W25 Administrator Manual

The Command Line Interface

18 6/1551-CRH 102 167 Uen Rev C 2007-06-08

length ip.napt.port_forwardings Show the list length.

4.7 Save the Configuration The cf set commands operate on a temporary configuration structure. This configuration structure is not used as the running configuration until it is committed using the cf commit command.

When the cf set command is executed, the temporary configuration is validated and activated. The first cf set command issued obtains a lock on the configuration database. This eliminates two users modifying the configuration database simultaneously (inclusive of WUI users). This lock is removed when cf commit is executed, or a reboot of the system is done.

To validate and activate configuration changes enter:

$ cf commit

To discard all pending changes (that not has been confirmed by the cf commit command), enter the following command:

$ cf rollback

4.8 Backup and Restore Configuration To preserve the running configuration, a backup copy of all accessible values can be stored in a local file. In case of a system failure or a corrupted configuration, the system can be restored from this backup file.

The configuration can be saved to a file using the following command:

$ cf backup <filename>

A backup of all accessible values will be saved to the specified filename in the current directory.

Note: This file must not be modified. All configuration changes should be made using the cf command.

To transfer the file to a remote server, the SCP (Secure Copy) command can be used, for example:

$ scp <filename> user@somehost:<path>

Page 29: Ericsson W25 Administrator Manual

The Command Line Interface

6/1551-CRH 102 167 Uen Rev C 2007-06-08 19

4.9 Reset to Default Configuration The current running configuration can be reset to the default configuration.

Note: All configurable values will be reset to their factory default, including the login User name and Password.

When the CLI is accessible, the following command is used:

$ cf reset-to-default $ cf commit

If the CLI is not accessible, a reset to the default configuration can be done using the Reset button on the unit by following the steps below:

1. Disconnect the power cable from the Ericsson W25. If the battery is used as power supply, disconnect the battery cable

2. Press and hold the Reset button with the tip of a pen and then reconnect the power cable. Keep the button pressed for at least 20 seconds.

3. The Ericsson W25 will restart and come online with the factory default settings.

4.9.1 Create own Default Configuration File The administrator (the user logged in with user ID root) can save the current running configuration as a new default configuration file using the following command:

# cf export-default <file> # cf commit

To import a new default configuration into the CDB from a previously exported default file, enter the following command:

# cf import-default <file>

4.10 List the Complete Running Configuration To get a list of the complete running configuration, enter the cf show command. The display is similar to the following:

$ cf show

autoupdate.enabled false .server "https://update.ericsson.net/ESU/" .interval 168 .operator "" .time "04:00:00"

Page 30: Ericsson W25 Administrator Manual

The Command Line Interface

20 6/1551-CRH 102 167 Uen Rev C 2007-06-08

cellular.virtual_operator "" .prl_region 0 .3g.850 true .1900 true .2100 true .apn "" .2g.850 true .900 true .1800 true .1900 true .apn "" .celltime false .rscp_alarm_threshold -120 .pdp_authentication "chap" sim.pin "" .pin_lock false dhcpd.enabled true .default_lease_time 7200 .range.from "192.168.1.2" .to "192.168.1.100" ip.napt.enabled true .algs.ftp true .tftp true .forward true .hostname "FWT" .lan.address "192.168.1.1" .netmask "255.255.255.0" wlan.enabled false .SSID.enabled true .name "FWT" .country "EU" .power_dbm 20 .channel.auto true .number 1 .security.mode "NONE" .secret "" .whitelist.enabled false ppp.enabled true .user "" .password "" ssh.enabled true .hostdsakey "-----BEGIN DSA PRIVATE KEY----- MIIBuwIBAAKBgQC8P9GBTZr3/LVYoLxcdKUCCS00IbizBfTxVg+aeJhhYv01z5B1 kkYDn1DBSo2UrPBOFO9TXDJZkx1APK2aNM6FXJAJV/A7HDxrnJQzxK8jzLHKzVaG mbworEfW3AQpkUuWGVWiWboiXypeEVcNTTTWNSxxJ2np/zk8lDkJVoxJvwIVAId6 +qnaXVYrOWtsWcXulMmLIVoNAoGACF7vcHQs9QpxMNJc2byGtiklGRolxB6WmF9p o4exGF8/qNqbNSSo3uAw8kM3HZxAIVVmcgNNxFx++z2XIiZgD6vJXwOmYl3O8c5x 2+BQcgxplSrXQx5PXudHTNz8ZrOz1BdFduaXjtnHSLElaa5ESn8D/dYICuo4MZUw 09K4x58CgYEAtq8lRuf8wc9y0QKldfVsd0ZijeB1iWiw2d8TljaW5zA8HyuBgic9 NE3zJO9qAItmj4sNTrutha3jbOVn4z7MS4lD18VM0WtVE0CyKS8eSGh71534e4fI K2qCARnYT2bVcz8gLbDySUXkvTvw5S4RqXOD9Mx9xJ/lmudRAVxoGJoCFDqkzLIA npsRFtFiM5lAU8DvqXc5-----END DSA PRIVATE KEY-----" .hostdsakey_pub "ssh-dss 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 " .password_authentication true syslog.remote.enabled false .host "" .port 514 .filter_level "LOG_INFO" .persistent false .heartbeat 0 smb.workgroup "WORKGROUP" tems.enabled false upnp.enabled true users[0].name "root" users[0].password <permission denied>

Page 31: Ericsson W25 Administrator Manual

The Command Line Interface

6/1551-CRH 102 167 Uen Rev C 2007-06-08 21

.uid 0 .gid 0 users[0].ssh.authorized_keys <permission denied> [1].name "operator" .password "operator" .uid 500 .gid 500 [2].name "user" users[2].password <permission denied> .uid 1000 .gid 1000 users[2].ssh.authorized_keys <permission denied> groups[0].name "root" .gid 0 .members[0].uid 0 [1].name "operator" .gid 500 .members[0].uid 500 [2].name "user" .gid 1000 .members[0].uid 1000 sntp.enabled true .servers[0] "0.pool.ntp.org" [1] "1.pool.ntp.org" [2] "2.pool.ntp.org" qos.sfq false telephony.enabled true .fxs.inter_digit_timeout 4000 .dialtone_timeout 180000 .congestiontone_timeout 180000 .local_ringing_timeout 180000 .oob_dtmf_duration 100 .howler.enabled true .latency 60000 .timeout 60000 .hook.on_min_time 350 .off_min_time 40 .a_party_release_time 200 .b_party_release_time 90000 .flash.min_time 35 .max_time 145 .clip.enabled true .profile "au" .international_prefix "00" .onhold_ring true .tones_and_signals_profile "au" .analog_settings_profile "au" .ports[0].volume.rx 0 .tx 0 [1].volume.rx 0 .tx 0 .pots.line_interface[0].ims_user_agent_index 0 .enable_t38 true .local_voip_port 17000 .local_fax_port 18000 .local_sip_port 5060 .voip_session_timeout 60000 .codec.cs 0 .g711a 1 .g711u 2 [1].ims_user_agent_index 0 .enable_t38 false .local_voip_port 17000 .local_fax_port 18000 .local_sip_port 5060 .voip_session_timeout 0 .codec.cs 1 .g711a 0 .g711u 0 .dialplan.emergency.match "^(112|009)" .prefix_strip "" .prefix_append "" .suffix_strip ""

Page 32: Ericsson W25 Administrator Manual

The Command Line Interface

22 6/1551-CRH 102 167 Uen Rev C 2007-06-08

.suffix_append "" .rules[0].match "^[[:digit:]]+(#|T)$" .prefix_strip "^00" .prefix_append "+" .suffix_strip "#$" .suffix_append "" .supplementary.call_hold "^(f)$" .call_hold_toggle "f2" .release_inactive "f0" .release_active "f1" .multiparty "f3" .call_waiting.on "^\\*43#" .off "^#43#" .query "^\\*#43#" .voice_mail.enabled true .incoming_number "" .outgoing_number "" .fwd_all.on.match "^\\*21\\*+[\\+|0-9]+#" .prefix_strip \\*21\\* .prefix_append "" .suffix_strip "#" .suffix_append "" .off "^#21#" .query "^\\*#21#" .fwd_busy.on.match "^\\*+(24|67)+\\*+[\\+|0-9]+#" .prefix_strip "\\*+(24|67)+\\*" .prefix_append "" .suffix_strip "#" .suffix_append "" .off "^#+(24|67)+#" .query "^\\*#+(24|67)+#" .fwd_no_reply.on.match "^\\*61\\*+[\\+|0-9]+#" .prefix_strip "\\*61\\*" .prefix_append "" .suffix_strip "#" .suffix_append "" .off "^#61#" .query "^\\*#61#" .fwd_unreachable.on.match "^\\*62\\*+[\\+|0-9]+#" .prefix_strip "\\*62\\*" .prefix_append "" .suffix_strip "#" .suffix_append "" .off "^#62#" .query "^\\*#62#" .clir.on "^#31#" .off "^\\*31#" .query "^\\*#31#" .clir_default_restricted false .call_return "^\\*10#" .hotline.on.match "^\\*53[\\+|0-9]+#" .prefix_strip \\*53 .prefix_append "" .suffix_strip "#" .suffix_append "" .off "^#53#" .query "^\\*#53#" .delay 4000 ims.user_agent[0].auth_id [email protected] .user_id "userid" .user_password "secretpassword" .ims_callserver_index 0 .callserver[0].domain "server.com" .proxy[0].address "host.server.com" .port 5060 .outbound_proxy "" .local_ip_interface "ppp0" .media.codec.g711a.voice_activity_detection false .packet_time 20 .g711u.voice_activity_detection false .packet_time 20 .t38.forward_error_correction false .max_bit_rate 14400

Page 33: Ericsson W25 Administrator Manual

The Command Line Interface

6/1551-CRH 102 167 Uen Rev C 2007-06-08 23

.local_tcf false .fill_bit_removal false .transcoding_mmr false .transcoding_jbig false $

4.10.1 List Part of the Running Configuration

To list a specific part of the running configuration, include a <path> to the cf show command, for example:

$ cf show cellular

cellular.virtual_operator "" .prl_region 0 .3g.850 true .1900 true .2100 true .apn "" .2g.850 true .900 true .1800 true .1900 true .apn "" .celltime false .rscp_alarm_threshold -120 .pdp_authentication "chap"

Page 34: Ericsson W25 Administrator Manual

Configure the Mobile Network

24 6/1551-CRH 102 167 Uen Rev C 2007-06-08

5 Configure the Mobile Network

This chapter describes the configuration parameters used to access the mobile network.

5.1 Preferred Roaming List (PRL) The Preferred Roaming List (PRL) contains information regarding the allowed systems (GSM/UMTS) and bands. The PRL structure and coding is defined in TIA/EIA IS-683.

This information is used by the Ericsson W25 during the system selection and acquisition process, initially and when the Ericsson W25 is roaming.

5.1.1 Set PRL Region

To set a PRL region, the following command is used:

$ cf set cellular.prl_region <region> $ cf commit

The <region> is an integer in the interval 0 – 255 and current valid values are:

00 – no regional preference/no region defined 01 – Euro-centric; meaning it favors the European bands. 02 – NA-centric; meaning it favors the North American bands. 03 – Customer specific; meaning it favors specific needs for a customer.

To display the current configuration for PRL region, enter:

$ cf get cellular.prl_region 0

5.2 RSCP Alarm Threshold WAN performance can be displayed using the the st wan-stats command. See section 10.3.4 – WAN Interface Statistics.

For RSCP (Receive Signal Code Power) an alarm threshold can be set and if the current RSCP level is below the threshold value, an alarm is raised and sent to syslog and also available on the remote syslog.

Page 35: Ericsson W25 Administrator Manual

Configure the Mobile Network

6/1551-CRH 102 167 Uen Rev C 2007-06-08 25

5.2.1 Set RSCP Alarm Threshold

To set an alarm threshold value for RSCP, use the following command:

$ cf set cellular.rscp_alarm_threshold <value> $ cf commit

Valid values for the threshold are -60dBm to -120dBm.

To display the current configuration for the RSCP alarm threshold, enter:

$ cf get cellular.rscp_alarm_threshold -120

5.3 UMTS (3G) Parameters The Ericsson W25 connects to the UMTS (3G) network when it is available and, if enabled, uses the GSM/GPRS/EDGE (2G) network as fallback.

5.3.1 Enable/Disable the UMTS Network

It is possible to enable/disable different radio frequencies used for the connection to the UMTS network using the following commands:

$ cf set cellular.3g.850 true|false $ cf set cellular.3g.1900 true|false $ cf set cellular.3g.2100 true|false $ cf commit

5.3.2 Set 3G APN

The APN (Access Point Name) used for connection to the network can be entered/changed using the following command:

$ cf set cellular.3g.apn <apn> $ cf commit

An APN usually has the format <name.serviceprovider.country>, for example:

$ cf set cellular.3g.apn test.operator.se $ cf commit

5.3.3 Show UMTS Configuration To display the current configuration for the connection to the UMTS network, enter:

Page 36: Ericsson W25 Administrator Manual

Configure the Mobile Network

26 6/1551-CRH 102 167 Uen Rev C 2007-06-08

$ cf show cellular.3g

cellular.3g.850 true .1900 true .2100 true .apn "test.operator.se"

5.4 GSM/GRPS/EDGE (2G) Parameters The GSM/GPRS/EDGE (2G) network can be used by the Ericsson W25 as fallback when the UMTS (3G) is not available.

5.4.1 Enable/Disable the GSM/GPRS/EDGE Network

It is possible to enable/disable different radio frequencies used for the connection to the GSM/GPRS/EDGE network using the following commands:

$ cf set cellular.2g.850 true|false $ cf set cellular.2g.900 true|false $ cf set cellular.2g.1800 true|false $ cf set cellular.2g.1900 true|false $ cf commit

5.4.2 Set 2G APN The APN (Access Point Name) used for connection to the network can be entered/changed using the following command:

$ cf set cellular.2g.apn <apn> $ cf commit

An APN usually has the format <name.serviceprovider.country>, for example:

$ cf set cellular.2g.apn test.operator.se $ cf commit

5.4.3 Show GSM/GPRS/EDGE Configuration

To display the current configuration for the connection to the GSM/GPRS/EDGE network, enter:

$ cf show cellular.2g

cellular.2g.850 true .900 true .1800 true .1900 true .apn "test.operator.se"

Page 37: Ericsson W25 Administrator Manual

Configure the Mobile Network

6/1551-CRH 102 167 Uen Rev C 2007-06-08 27

5.5 Set Time from Mobile Network The Ericsson W25 system time and date can be set from the mobile network or by synchronizing with a remote NTP server (as described in section 6.5).

Note: This feature should not be enabled simultaneously with SNTP time synchronization. If this is done, an error message is displayed: Error while issuing commit command: Illegal conflict between SNTP and Cellular Network Time, both enabled.

5.5.1 Display Current Date and Time

To display the current date and time in the unit, enter the following command:

$ date Thu Mar 13 10:02:22 UTC 2007

Note: The internal clock is not a real time clock. The date and time will be reset every time the unit is restarted.

5.5.2 Enable/Disable Time Synchronization from Mobile Network

To enable time synchronization from the mobile network, use the following command:

$ cf set cellular.celltime true|false $ cf commit

When the celltime service is initially enabled it checks and updates the time every 2 minutes for the first 20 minutes. After the 20 minutes, the synchronization occurs every 15 minutes.

To display the current configuration, enter one of the following commands:

$ cf show cellular.celltime cellular.celltime false

$ cf get cellular.celltime false

5.6 PIN Code The PIN code is used for SIM authentication.

Page 38: Ericsson W25 Administrator Manual

Configure the Mobile Network

28 6/1551-CRH 102 167 Uen Rev C 2007-06-08

5.6.1 Set PIN Code

The PIN code can be set/changed using the following command:

$ cf set sim.pin <pincode> $ cf commit

To display the current configured PIN code, enter:

$ cf get sim.pin 4334

5.6.2 Enable/Disable PIN Lock

This feature locks the SIM card to a unique unit by changing the PIN code to a new randomly value. As a result, the SIM card cannot be used in another terminal unless the PUK code is known.

$ cf set sim.pin_lock true|false $ cf commit

To check the current status of the PIN lock feature, enter one of the following commands:

$ cf show sim.pin_lock sim.pin_lock false

$ cf get sim.pin_lock false

5.7 PDP Authentication Type This parameter determines with protocol (PAP or CHAP) that should be used for authentication against the cellular network when using a RADIUS server.

To display the current setting for authentication protocol, use the following command:

$ cf show cellular.pdp_authentication cellular.pdp_authentication "chap"

5.7.1 Change PDP Authentication Type If an operator has a RADIUS server in its network that only supports PAP (Password Authentication Protocol) and not the default configured CHAP (Challenge-Handshake Authentication Protocol), the Ericsson W25 must be configured to use PAP against the cellular network.

Page 39: Ericsson W25 Administrator Manual

Configure the Mobile Network

6/1551-CRH 102 167 Uen Rev C 2007-06-08 29

Use the following command to change authentication type:

$ cf set cellular.pdp_authentication pap|chap $ cf commit

5.8 PPP Client The Ericsson W25 includes a PPP client for WAN access.

Authentication towards the UMTS/GSM radio network can be achieved via PIN code or PPP user name and password.

5.8.1 Enable/Disable PPP Service

It is possible to enable/disable the PPP service using the following command:

$ cf set ppp.enabled true|false $ cf commit

To show the current state of the PPP service, enter:

$ cf show ppp.enabled ppp.enabled true

5.8.2 Set PPP Username and Password

To configure the PPP username and password, use the following commands:

$ cf set ppp.user <user-name> $ cf set ppp.password <password>

For example:

$ cf set ppp.user testuser $ cf set ppp.password A3bcWqR $ cf commit

5.8.3 Show PPP Configuration To display the current PPP settings, use the following command:

$ cf show ppp ppp.enabled true .user "testuser" .password "A3bcWqR"

Page 40: Ericsson W25 Administrator Manual

Configure the Mobile Network

30 6/1551-CRH 102 167 Uen Rev C 2007-06-08

5.9 Virtual Operator Name A virtual operator name can be configured. The virtual operator name will be shown in the WUI instead of the real name.

5.9.1 Set Virtual Operator Name

Use the following command to set a virtual operator name:

$ cf set cellular.virtual_operator <string> $ cf commit

If the virtual operator name includes spaces the string needs to be enclosed with double quotes. For example:

$ cf set cellular.virtual_operator "not the real operator" $ cf commit

5.9.2 Show Virtual Operator Name

To display the current configured virtual operator name, enter one of the following commands:

$ cf get cellular.virtual_operator not the real operator

$ cf show cellular.virtual_operator cellular.virtual_operator "not the real operator"

5.10 Allowed Operators This feature allows for the use of SIM cards in the terminal that meet specific criteria. This would normally be configured to allow only a specific operator or group of operators SIM cards to be used with the Ericsson W25.

The Ericsson W25 can be locked to only accept SIM cards based on one or more of the following:

• Mobile Country Code (MCC)

• Mobile Network Code (MNC)

MCCs are defined in ITU E.212 (“Land Mobile Numbering Plan”) for use in identifying mobile stations in wireless telephone networks. A MCC is often used in combination with a Mobile Network Code (MNC) in order to uniquely identify a network operator.

Page 41: Ericsson W25 Administrator Manual

Configure the Mobile Network

6/1551-CRH 102 167 Uen Rev C 2007-06-08 31

Both the MCC and MNC are part of the International Mobile Subscriber Identity (IMSI) number, which uniquely identifies a particular subscriber, and is stored on the SIM card.

5.10.1 Add Allowed Operators

The unit can be locked to one or many specific mobile network providers, using the following command:

$ cf append sim.allowed_operators <mcc> <mnc> $ cf commit

A MCC always consists of three numbers and a MNC can consist of two or three numbers. For example:

$ cf append sim.allowed_operators 262 99 $ cf commit

5.10.2 Show Allowed Operators

To display the current configured allowed operators, use the following command:

$ cf show sim.allowed_operators sim.allowed_operators[0].mcc "262" .mnc "99"

5.10.3 Delete Allowed Operators

To delete an allowed operator from the list, specify the index [x] of the operator to be deleted on the following command. For example:

$ cf del sim.allowed_operators[0] $ cf commit

To delete all configured allowed operators, use the following command:

$ cf clear sim.allowed_operators $ cf commit

Page 42: Ericsson W25 Administrator Manual

Configure Routing and IP Services

32 6/1551-CRH 102 167 Uen Rev C 2007-06-08

6 Configure Routing and IP Services

This chapter describes how to configure the routing and IP services in the Ericsson W25. The Internet services are based on the Internet Protocol version 4 (IPv4).

6.1 LAN IP Address and Hostname The Ericsson W25 LAN IP address and hostname are used for identification by clients on the local network, for example printer sharing using a USB port.

6.1.1 Set LAN IP Address The LAN IP interface must be configured with an IP address and a subnet mask. Together these define the range of addresses which can be reached via the interface without passing through any other routers.

Note: If the LAN IP address is changed, make sure that the new address is not included in the DHCP server IP address range (default 192.168.1.2 – 192.168.1.100). Also, if port forwarding rules have been created, they need to be changed to match the new LAN IP address.

To change the LAN IP address and subnet mask, use the following commands:

$ cf set ip.lan.address <new address> $ cf set ip.lan.netmask <new netmask> $ cf commit

Note: When the LAN IP address is changed, any active HTTP, Telnet or SSH session will be terminated.

6.1.2 Show LAN IP Configuration To show the current settings for the LAN interface, use the following command:

$ cf show ip.lan ip.lan.address "192.168.1.1" .netmask "255.255.255.0"

Page 43: Ericsson W25 Administrator Manual

Configure Routing and IP Services

6/1551-CRH 102 167 Uen Rev C 2007-06-08 33

6.1.3 Set Hostname

The hostname is used as an identifier of the Ericsson W25 on the local network.

To set (or change) the hostname, use the following command:

$ cf set ip.hostname <new hostname> $ cf commit

6.1.4 Show Hostname Configuration To display the current hostname for the Ericsson W25, enter:

$ cf get ip.hostname FWT

6.2 IP Forwarding The Ericsson W25 supports IP forwarding and employs ingress traffic filtering on both the LAN and the WAN interfaces.

6.2.1 Enable/Disable IP Forwarding

The IP forwarding feature can be enabled/disabled, using the following command:

$ cf set ip.forward true|false $ cf commit

Note: If IP forwarding is disabled (set to false) all traffic through the Ericsson W25 is stopped.

6.2.2 Show IP Forwarding Configuration

To show the current status of IP forwarding, enter one of the following commands:

$ cf show ip.forward ip.forward true

$ cf get ip.forward true

Page 44: Ericsson W25 Administrator Manual

Configure Routing and IP Services

34 6/1551-CRH 102 167 Uen Rev C 2007-06-08

6.3 DNS The Domain Name System (DNS) allows host and domain names to be translated into IP addresses and vice versa.

6.3.1 DNS Proxy

The Ericsson W25 includes a DNS proxy server which responds to DNS requests from the LAN/WLAN. It contains a small database of local host names and addresses supplied by client DHCP requests.

In addition it also caches requests to remote DNS servers.

6.4 DHCP The Ericsson W25 includes a DHCP server for LAN/WLAN interfaces.

As a DHCP server, the unit maintains a pool of IP addresses and distributes them to LAN/WLAN hosts whenever they are switched on. It also puts the hostname, supplied by the client DHCP request, in the local DNS proxy.

6.4.1 Enable/Disable DHCP Server To enable/disable the DHCP server, enter the following command:

$ cf set dhcpd.enabled true|false $ cf commit

To show the current status of the DHCP server, enter one of the following commands:

$ cf show dhcpd.enabled dhcpd.enabled true

$ cf get dhcpd.enabled true

6.4.2 Set DHCP Server IP Address Range

The range of IP addresses that the DHCP server distributes to LAN/WLAN hosts is configured using the following commands:

$ cf set dhcpd.range.from <ip address> $ cf set dhcpd.range.to <ip address> $ cf commit

Page 45: Ericsson W25 Administrator Manual

Configure Routing and IP Services

6/1551-CRH 102 167 Uen Rev C 2007-06-08 35

Note: The DHCP server IP address range must belong to the same subnet as the Ericsson W25 LAN IP (and any Port Forwarding rules). If not, an error message is displayed: Error while issuing commit command: The DHCP range and the LAN IP address must be on the same subnet.

To show the current configuration of the DHCP server IP address range, use the following command:

$ cf show dhcpd.range dhcpd.range.from "192.168.1.2" .to "192.168.1.100"

6.4.3 Set DHCP Default Lease Time

The default time that the DHCP server assigns an IP address to a lease (if a client does not request an expiry time) is 7200 seconds (2 hours). This value can be set/changed using the following command:

$ cf set dhcpd.default_lease_time <time> $ cf commit

To show the current lease time, use the following command:

$ cf get dhcpd.default_lease_time 7200

6.4.4 Show DHCP Configuration

To show the complete DHCP server configuration, enter:

$ cf show dhcpd dhcpd.enabled true .default_lease_time 7200 .range.from "192.168.1.2" .to "192.168.1.100"

6.5 SNTP The SNTP (Simple Network Time Protocol) feature provides a way to synchronize the device’s own time of day setting with a remote NTP server.

This can also be done from the mobile network as described in section 5.5 - Set Time from Mobile Network.

Note: SNTP time synchronization should not be enabled simultaneously with the mobile network synchronization. If this is done, an error message

Page 46: Ericsson W25 Administrator Manual

Configure Routing and IP Services

36 6/1551-CRH 102 167 Uen Rev C 2007-06-08

is displayed: Error while issuing commit command: Illegal conflict between SNTP and Cellular Network Time, both enabled.

6.5.1 Display Current Date and Time

To display the current date and time in the unit, enter the following command:

$ date Thu Mar 13 10:02:22 UTC 2007

Note: The internal clock is not a real time clock. The date and time will be reset every time the unit is restarted.

6.5.2 Enable/Disable SNTP Client

To enable/disable the SNTP client, use the command:

$ cf set sntp.enabled true|false $ cf commit

To check the current status of the SNTP client, enter one of the following commands:

$ cf show sntp.enabled sntp.enabled true

$ cf get sntp.enabled true

When the SNTP client is enabled the synchronization process starts automatically. If several servers are specified, the list is traversed until a synchronization request has been answered.

6.5.3 Specify SNTP Server(s) There are three NTP servers preconfigured which is the maximum number of NTP servers that can be configured. To display the preconfigured servers, enter:

$ cf show sntp.servers sntp.servers[0] "0.pool.ntp.org" [1] "1.pool.ntp.org" [2] "2.pool.ntp.org"

Page 47: Ericsson W25 Administrator Manual

Configure Routing and IP Services

6/1551-CRH 102 167 Uen Rev C 2007-06-08 37

To change the FQDN (Fully Qualified Domain Name) of one of the preconfigured NTP servers, specify the index [x] of the server to change on the following command. For example:

$ cf set sntp.servers[0] ntp.mydomain.org $ cf commit

$ cf show sntp.servers sntp.servers[0] "ntp.mydomain.org" [1] "1.pool.ntp.org" [2] "2.pool.ntp.org"

6.5.4 Show SNTP Configuration

To show the complete configuration of SNTP, enter:

$ cf show sntp sntp.enabled true .servers[0] "ntp.mydomain.org" [1] "1.pool.ntp.org" [2] "2.pool.ntp.org"

6.6 NAT Network Address Translation (NAT) provides security by hiding the internal addresses of the private network from the Internet: addresses and/or ports are translated from private IP address to public IP address, and vice versa.

The Ericsson W25 supports dynamic one-to-many NAT – also known as NAPT (Network Address Port Translation). NAPT translates the source IP address of the LAN to the public WAN IP address. It also changes the source port (UDP and TCP) or the ICMP for the WAN to LAN flow. Port translation allows several LAN devices to be connected to the WAN through one public IP address.

6.6.1 Enable/Disable NAT

The NAT service can be enabled/disabled using the following command:

$ cf set ip.napt.enabled true|false $ cf commit

Note: NAT can only be enabled/disabled through the CLI. The WUI does not support this feature.

To check the current status of the NAT service, enter one of the following commands:

Page 48: Ericsson W25 Administrator Manual

Configure Routing and IP Services

38 6/1551-CRH 102 167 Uen Rev C 2007-06-08

$ cf show ip.napt.enabled ip.napt.enabled true

$ cf get ip.napt.enabled true

6.6.2 NAT Port Forwarding The NAT Port Forwarding feature, sometimes referred to as Virtual Server, redirects traffic from the WAN interface to a server on the LAN side.

With NAT enabled, the entire local network appears as a single machine to the Internet. A typical situation can be that the user has local servers for various services and want to make them publicly accessible.

By specifying the port number, the unit can be instructed which services should be forwarded to which local IP address and port.

Note: Port Forwarding requires a public WAN IP address on the Ericsson W25.

6.6.2.1 Create Port Forwarding Entry

To create a port forwarding entry, the following command is used:

$ cf append ip.napt.port_forwardings <protocol> <from.port> <to.address> <to.port>

The table below describes the parameters:

Table 4 Port forwarding configuration parameters

Parameter Description

protocol The protocol type (TCP or UDP) to be used by the service that will be forwarded.

from.port The port number used by the service. The most often used port numbers are: 21 (FTP), 80 (HTTP), 23 (Telnet) and 25 (SMTP)

to.address The IP address of the internal server to which the packets are forwarded.

to.port The port number used for the internal server.

Page 49: Ericsson W25 Administrator Manual

Configure Routing and IP Services

6/1551-CRH 102 167 Uen Rev C 2007-06-08 39

The following example will redirect traffic hitting port 80 on the WAN interface to a server on the LAN (192.168.1.2) using port 8080:

$ cf append ip.napt.port_forwardings tcp 80 192.168.1.2 8080 $ cf commit

Note: All port forwarding entries defined must belong to the same subnet as the LAN IP and the DHCP server range.

To display the entries in the port forwarding list, use the following command:

$ cf show ip.napt.port_fowardings ip.napt.port_forwardings[0].protocol "tcp" .from.port 80 .to.address "192.168.1.2" .port 8080

To delete an entry in the port forwarding list, specify the index [x] of the entry to delete on the following command. For example:

$ cf del ip.napt.port_forwardings[0] $ cf commit

To delete all configured port forwarding entries, use the following command:

$ cf clear ip.napt.port_forwardings $ cf commit

6.6.3 NAT ALGs

There are certain difficult applications that a NAT configuration cannot manage. In many cases, Application Level Gateways (ALGs) are needed to translate and transport packets correctly.

An ALG enables the transfer of specific application streams through NAT. This is enabled by creating dynamic holes in NAT and changing IP addresses in network protocol headers, and if a secondary port is required, the ALG will open one.

The Ericsson W25 includes NAT ALGs for the following protocols:

• FTP

• TFTP

6.6.3.1 Enable/Disable NAT ALGs

The included ALGs do not require any additional configuration and they can be enabled/disabled individually.

Page 50: Ericsson W25 Administrator Manual

Configure Routing and IP Services

40 6/1551-CRH 102 167 Uen Rev C 2007-06-08

To enable/disable an ALG, use the following commands:

$ cf set ip.napt.algs.ftp true|false $ cf set ip.napt.algs.tftp true|false $ cf commit

6.6.3.2 Show NAT ALGs Configuration

To check the current status of an ALG, use the following command:

$ cf show ip.napt.algs ip.napt.algs.ftp true .tftp true

6.7 UPnP IGD The Ericsson W25 supports the Universal Plug and Play (UPnP) standard with respect to the Internet Gateway Device (IGD) profile, used by Microsoft Messenger (among others) to configure port forwarding in a NAT router.

6.7.1 Enable/Disable UPnP IGD

To enable/disable UPnP IGD, use the following command:

$ cf set upnp.enabled true|false $ cf commit

6.7.2 Show UPnP IGD Configuration

To display the current status of UPnP, enter one of the following commands:

$ cf show upnp upnp.enabled true

$ cf get upnp.enabled true

6.8 IP Quality of Service The Quality of Service (QoS) feature in the Ericsson W25 supports the Stochastic Fair Queuing (SFQ) scheduling algorithm which makes sure that no single session can dominate outgoing bandwidth.

Note: This feature applies for upstream traffic only.

Page 51: Ericsson W25 Administrator Manual

Configure Routing and IP Services

6/1551-CRH 102 167 Uen Rev C 2007-06-08 41

6.8.1 Enable/Disable IP QoS

To enable/disable the QoS feature, use the following command:

$ cf set qos.sfq true|false $ cf commit

6.8.2 Show IP QoS Configuration

To display the current setting, enter one of the following commands:

$ cf show qos qos.sfq false $ cf get qos.sfq false

Page 52: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

42 6/1551-CRH 102 167 Uen Rev C 2007-06-08

7 Configure Telephony and Fax Services

This chapter describes how to configure the analogue voice services and fax services provided via the telephony line interface.

The telephony (FXS) services can be enabled/disabled. If disabled, no calls can be made through the Ericsson W25.

To enable/disable the telephony services, use the following command:

$ cf set telephony.enabled true|false $ cf commit

To display the current status for the telephony services, enter one of the following commands:

$ cf show telephony.enabled telephony.enabled false

$ cf get telephony.enabled false

7.1 POTS Line Interface Settings The Ericsson W25 includes dual POTS interface (FxS); the physical ports marked “Phone” and “Phone/Fax”. The “Phone” port is the primary port to be used for making CS*-phone calls. The “Phone/Fax” port is intended for PS*-based telephony services. This support fax machines and complementary telephony services.

* CS = Circuit switch, the traditional way of supporting telephony services. * PS = Packet switch, the data-com way of supporting various communication services, including telephony (also called VoIP).

Each interface (port) can be configured for either CS- or PS-service with unique parameters for the type of calls that should be made.

To configure unique settings for the two POTS interfaces, use the following command:

$ cf set telephony.pots.line_interface[index] <ims_user_agent_index[x]> <enable_t38> <local_voip_port> <local_fax_port> <local_sip_port> <voip_session_timeout> <codec.cs> <codec.g711a> <codec.g711u>

Page 53: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

6/1551-CRH 102 167 Uen Rev C 2007-06-08 43

The [index] refers to which POTS port to configure. Index [0] refers to the physical port marked “Phone/Fax” and index [1] to the port marked “Phone”.

The parameters are described in the following subsections.

7.1.1 IMS User Agent

This index refers to which IMS User Agent configuration that should be used for login. See section 7.2.1.1 – Create IMS User Account Entry for details.

$ cf set telephony.pots.line_interface[index].ims_user_agent_index<index> $ cf commit

To show the current settings, use the following command:

$ cf get telephony.pots.line_interface[index].ims_user_agent_index 1

7.1.2 Enable T.38 If the port is configured to use PS-service, this parameter enables the fax-protocol T.38 in order to support fax-service.

Note: Fax-support can only be achieved when using PS-service.

$ cf set telephony.pots.line_interface[index].enable_t38 true|false $ cf commit

To show the current setting, use the following command:

$ cf get telephony.pots.line_interface[index].enable_t38 true

7.1.3 Local VoIP Port This parameter specifies which TCP- or UDP-port number that Ericsson W25 uses for media in a VoIP call. (A fax call is always started as a VoIP call and is then switched over to T.38).

$ cf set telephony.pots.line_interface[index].local_voip_port <port number> $ cf commit

Page 54: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

44 6/1551-CRH 102 167 Uen Rev C 2007-06-08

To show the current setting, use the following command:

$ cf get telephony.pots.line_interface[index].local_voip_port 17000

7.1.4 Local Fax Port

This parameter specifies which TCP- or UDP-port number that Ericsson W25 uses for media in a fax call.

$ cf set telephony.pots.line_interface[index].local_fax_port <port number> $ cf commit

To show the current setting, use the following command:

$ cf get telephony.pots.line_interface[index].local_fax_port 18000

7.1.5 Local SIP Port This parameter specifies which TCP- or UDP-port number that Ericsson W25 uses for SIP communication.

$ cf set telephony.pots.line_interface[index].local_sip_port <port number> $ cf commit

To show the current setting, use the following command:

$ cf get telephony.pots.line_interface[index].local_sip_port 5060

7.1.6 VoIP Session Timeout This setting determines the timeout (in milliseconds) when a call is disconnected if not being switched over to a fax call.

(A fax call is always started as a VoIP call and is then switched over to T.38).

If the parameter is set to 0 the call will never be disconnected.

$ cf set telephony.pots.line_interface[index].voip_session_timeout

Page 55: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

6/1551-CRH 102 167 Uen Rev C 2007-06-08 45

<ms> $ cf commit

To show the current setting, use the following command:

$ cf get telephony.pots.line_interface[index].voip_session_timeout 0

7.1.7 Preferred CODECs The Ericsson W25 supports the following CODECs:

• CS (not a CODEC but logically treated as one in the configuration)

• G.711a-law (using PS)

• G.711 u-law (using PS)

Note: CS- and PS-service cannot be used on the same POTS-port.

The following commands determine with which priorities the CODECs should be used and, indirect, if the POTS-port shall use CS or PS:

$ cf set telephony.pots.line_interface[index].codec.cs 0|1|2 $ cf set telephony.pots.line_interface[index].codec.g711a 0|1|2 $ cf set telephony.pots.line_interface[index].codec.g711u 0|1|2 $ cf commit

For example, if CS is not to be used and the G.711a is preferred over the G.711u CODEC, the configuration looks like this for the “Phone” port (with index 1):

$ cf set telephony.pots.line_interface[1].codec.cs 0 $ cf set telephony.pots.line_interface[1].codec.g711a 1 $ cf set telephony.pots.line_interface[1].codec.g711u 2 $ cf commit

To show the current configuration for CODECs on a specific port, use the following command:

$ cf show telephony.pots.line_interface[1].codec telephony.pots.line_interface[1].codec.cs 0 .g711a 1 .g711u 2

Page 56: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

46 6/1551-CRH 102 167 Uen Rev C 2007-06-08

7.2 General Fax Settings To enable Fax support over the WCDMA network, Ericsson W25 uses SIP (Session Initiation Protocol).

The Ericsson W25 acts as a fax gateway between the POTS interface and the IP network and uses the T.38 protocol as shown in the illustration below:

7.2.1 IMS User Agent

A SIP (IMS) User Agent is connected to the fax port (“Phone/Fax”) on the Ericsson W25. This integrated IMS (SIP) User Agent controls VoIP sessions for terminals (e.g. a fax machine) connected to the POTS port and manages and controls the media streams by using the SIP protocol towards the SIP Server and Media Gateway.

7.2.1.1 Create IMS User Account Entry

The IMS User Agent must include authentication information required by the SIP server for each account. To create an entry in the user account list, the following command is used:

$ cf append ims.user_agent <auth_id> <user_id> <user_password> <ims_callserver_index> $ cf commit

The table below describes the parameters:

Table 5 IMS User Agent configuration parameters

Parameter Description

auth_id The (private) user name used for authentication on

Page 57: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

6/1551-CRH 102 167 Uen Rev C 2007-06-08 47

Parameter Description the SIP proxy/server e.g. a host name.

user_id The public user ID of the SIP account on the SIP proxy/server e.g. a E.164 number

user_password The password connected to the user_id parameter.

ims_callserver_index

The number [index] of a specific Call Server configuration (see the next section) to be used for this account.

The following shows an example on how to create an entry in the user account list:

$ cf append ims.user_agent user.grp 54321 mysecret 1 $ cf commit

To display the entries in the user account list, use the following command:

$ cf show ims.user_agent ims.user_agent[0].auth_id "user.grp" .user_id "54321" .user_password "mysecret" .ims_callserver_index 1

To delete an entry in the list, specify the index [x] of the entry to delete on the following command. For example:

$ cf del ims.user_agent [0] $ cf commit

To delete all configured port forwarding entries, use the following command:

$ cf clear ims.user_agent $ cf commit

7.2.2 IMS Call Server The IMS User Agent requires access to one or more IMS Call servers (also called SIP proxy/servers). A list can be created with configuration details for different SIP server/proxy settings.

Note: This list must be created even if an “outbound_proxy” has been configured. The list MUST have at least one entry.

Page 58: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

48 6/1551-CRH 102 167 Uen Rev C 2007-06-08

7.2.2.1 Create IMS Call Server Entry

To create an entry in the IMS Call Server list, use the following command:

$ cf append ims.callserver <domain> <outbound_proxy> <local_ip_interface> $ cf commit

The table below describes the parameters:

Table 6 IMS Call Server configuration parameters

Parameter Description

domain The local domain name. Note: This parameter is currently not used.

outbound_proxy The IP address to an outbound proxy. Leave empty if not used.

local_ip_ interface

The network interface to be used. For the WAN interface, use ppp0.

To display the entries in the user account list, use the following command:

$ cf show ims.callserver ims.callserver[0].domain "server.com" .proxy[0].address "host.server.com" .port 5060 .outbound_proxy "" .local_ip_interface "ppp0"

To delete an entry in the list, specify the index [x] of the entry to delete on the following command. For example:

$ cf del ims.callserver[0] $ cf commit

To delete all configured call server entries, use the following command:

$ cf clear ims.callserver $ cf commit

7.2.3 IMS Media Codec The IMS Media Codec commands configures the settings for the supported CODECs; G.711 u-law, G.711 a-law and T.38.

Page 59: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

6/1551-CRH 102 167 Uen Rev C 2007-06-08 49

7.2.3.1 G.711 a-law Settings

The G.711 a-law CODEC is used for VoIP and the settings includes Voice Activity Detection (VAD) enable/disable (silence suppression) and the RTP payload size. (10, 20 or 30 ms)

To specify settings for the G.711 a-law CODEC, the following command is used:

$ cf set ims.media.codec.g711a.voice_activity_detection true|false $ cf set ims.media.codec.g711a.packet_time <packet time> $ cf commit

To show the current configuration for G.711 a-law CODEC, use the following command:

$ cf show ims.media.codec.g711a ims.media.codec.g711a.voice_activity_detection false .packet_time 20

7.2.3.2 G.711 u-law Settings

The G.711 u-law CODEC is used for VoIP and the settings includes Voice Activity Detection (VAD) enable/disable (silence suppression) and the RTP payload size (10, 20 or 30 ms).

To specify settings for the G.711 u-law CODEC, the following command is used:

$ cf set ims.media.codec.g711u.voice_activity_detection true|false $ cf set ims.media.codec.g711u.packet_time <packet time> $ cf commit

To show the current configuration for G.711 u-law CODEC, use the following command:

$ cf show ims.media.codec.g711u ims.media.codec.g711u.voice_activity_detection false .packet_time 20

7.2.3.3 T.38 Settings

The settings for T.38 CODEC are used for Fax. The following parameters can be configured:

Page 60: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

50 6/1551-CRH 102 167 Uen Rev C 2007-06-08

Table 7 T.38 CODEC configuration parameters

Parameter Description

forward_error_ correction

Specifies if FEC (Forward Error Detection) should be used.

max_bit_rate The MBR for fax transmission. Valid values are 2400, 4800, 7200, 9600, 12000 and 14400.

local_tcf The type of error correction code to be used. If set to true = FEC and if set to false = UDP redundancy.

fill_bit_ removal

Capability to remove and insert fill bits in Phase C, non-ECM data to reduce bandwidth in the packet network.

transcoding_mmr Specifies whether the ability to convert to/from MMR from/to the line format for increasing the compression of the data and saving bandwidth in the packet network.

transcoding_ jbig

Specifies whether the ability to convert to/from JBIG should be used, (reduces bandwidth).

To specify settings for the T.38 CODEC, the following commands are used:

$ cf set ims.media.codec.t38.forward_error_correction true|false $ cf set ims.media.codec.t38.max_bit_rate 2400|4800|7200|9600|12000|14400 $ cf set ims.media.codec.t38.local_tcf true|false $ cf set ims.media.codec.t38.fill_bit_removal true|false $ cf set ims.media.codec.t38.transcoding_mmr true|false $ cf set ims.media.codec.t38.transcoding_jbig true|false $ cf commit

To show the current configuration for T.38 CODEC, use the following command:

$ cf show ims.media.codec.t38 ims.media.codec.t38.forward_error_correction false .max_bit_rate 14400 .local_tcf false .fill_bit_removal false .transcoding_mmr false .transcoding_jbig false

Page 61: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

6/1551-CRH 102 167 Uen Rev C 2007-06-08 51

7.3 General Telephony Settings The following subsections describe commands used for customizing the telephony settings in the Ericsson W25.

7.3.1 Inter Digit Timer

The Inter Digit Timer (IDT) is used to check the dialing process.

With this command, the duration (in milliseconds) the Ericsson W25 waits to detect the next digit is defined. After this period, the Ericsson W25 expects no more digits to arrive and tries to establish the call.

7.3.1.1 Set Inter Digit Timer

To set the IDT timeout, enter the following command:

$ cf set telephony.fxs.inter_digit_timeout <milliseconds> $ cf commit

To show the current setting for the IDT, enter the following command:

$ cf get telephony.fxs.inter_digit_timeout 4000

7.3.2 Dial Tone Timeout

The dial tone is sent to the calling party to indicate that the network is ready to receive call information and inviting the user to start sending call or service related information.

The dial tone timeout (in milliseconds) specifies for how long the system will wait for the caller to input the first digit after going off-hook. When this timeout expires, the dial tone stops and optionally a busy tone is played (until its timeout expires) and finally, an optional Howler tone starts to play.

7.3.2.1 Set Dial Tone Timeout

To set the dial tone timeout, enter the following command:

$ cf set telephony.fxs.dialtone_timeout <milliseconds> $ cf commit

To see the current setting for the dial tone timeout, enter the following command:

Page 62: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

52 6/1551-CRH 102 167 Uen Rev C 2007-06-08

$ cf get telephony.fxs.dialtone_timeout 180000

7.3.3 Congestion Tone Timeout

The congestion tone is sent to the calling party to indicate that some part of the network required for setting up of the requested call or for the use of a specific service is temporarily unavailable.

The timeout setting determines for how long (in milliseconds) a congestion tone is to be played. When this timeout expires, the congestion tone stops to play. The value can be set to -1 indicating infinite time.

7.3.3.1 Set Congestion Tone Timeout

To set the timeout for the congestion tone, enter the following command:

$ cf set telephony.congestiontone_timeout <milliseconds> $ cf commit

To show the current setting for congestion tone timeout, enter the following command:

$ cf get telephony.fxs.congestiontone_timeout 180000

7.3.4 Local Ringing Timeout

This parameter specifies the maximum time (in milliseconds) a call will attempt to connect if the B-Party does not answer. When this timeout expires the call is disconnected.

7.3.4.1 Set Local Ringing Timeout

To set the local ringing timeout, enter the following command:

$ cf set telephony.fxs.local_ringing_timeout <milliseconds> $ cf commit

To see the current setting for local ringing timeout, enter the following command:

$ cf get telephony.fxs.local_ringing_timeout 180000

Page 63: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

6/1551-CRH 102 167 Uen Rev C 2007-06-08 53

7.3.5 DTMF Duration

This setting determines the DTMF digit signal duration (in milliseconds) for the regenerated DTMF signals from the network side towards the POTS-port.

7.3.5.1 Set DTMF Duration

To set the DTMF digit signal duration, enter the following command:

$ cf set telephony.fxs.oob_dtmf_duration <milliseconds> $ cf commit

To show the current setting for DTMF duration, enter the following command:

$ cf get telephony.fxs.oob_dtmf_duration 100

7.3.6 Howler Tone

The howler tone is a tone of increased intensity that is intended to alert telephone users of the fact that they have left the receiver off the hook.

7.3.6.1 Enable/Disable Howler Tone

The howler tone feature is enabled/disabled using the following command:

$ cf set telephony.fxs.howler.enabled true|false $ cf commit

To show the current configuration state for the howler tone, enter the following command:

$ cf get telephony.fxs.howler.enabled true

7.3.6.2 Set Howler Tone Timeout

The howler tone timeout setting determines for how long (in milliseconds) a howler tone is to be played. When this timeout expires, the howler tone stops to play. The value can be set to -1 indicating infinite time.

To set the timeout for the howler tone, enter the following command:

$ cf set telephony.fxs.howler.timeout <milliseconds> $ cf commit

To show the current setting for howler tone timeout, enter the following command:

Page 64: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

54 6/1551-CRH 102 167 Uen Rev C 2007-06-08

$ cf get telephony.fxs.howler.timeout 60000

7.3.7 On/Off-hook Timeouts

These settings determine the time needed for the Ericsson W25 to consider the phone to be on- or off-hook.

On-hook time is the time needed for the unit to consider the line state to be on-hook (in opposite to e.g. the short on-hook state occurring at hook flash). Hence this time setting must be greater than the corresponding hook flash time.

Off-hook time is the minimum time needed for the unit to consider the line seized. This prevents the line to be seized due to disturbances.

7.3.7.1 Set On/Off-hook Minimum Time

To set the minimum values for on-hook/off-hook time, use the following commands:

$ cf set telephony.fxs.hook.on_min_time <milliseconds> $ cf set telephony.fxs.hook.off_min_time <milliseconds> $ cf commit

7.3.7.2 Set Release Time

To set the delay between on-hook event and call release for when being the A-party, use the following commands:

$ cf set telephony.fxs.hook.a_party_release_time <milliseconds> $ cf commit

To set the delay between on-hook event and call release for when being the B-party, use the following commands:

$ cf set telephony.fxs.hook.b_party_release_time <milliseconds> $ cf commit

The latter is also called the SUSPEND/RESUME-timer. It allows the B-party to go on-hook and then off-hook again without tearing down the call (i.e. to change phone).

Page 65: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

6/1551-CRH 102 167 Uen Rev C 2007-06-08 55

7.3.7.3 Show On/Off-hook Timeouts

To show the current setting for on/off-hook timeouts, enter the following command:

$ cf show telephony.fxs.hook telephony.fxs.hook.on_min_time 350 .off_min_time 40 .a_party_release_time 200 .b_party_release_time 90000

7.3.8 Hook Flash Time This setting controls the “Hook Flash” feature which on most modern telephones is implemented as a button that simulates a quick off-hook/on-hook/off-hook cycle. This is the same function as quickly tapping at the hook on an old style phone, also called Register Recall (the R-button).

This setting determines the time-window in which the on-hook condition exists in order to be interpreted as a hook flash.

7.3.8.1 Set Hook Flash Minimum and Maximum Time

The following commands are used to set the hook flash minimum and maximum values (in milliseconds):

$ cf set telephony.fxs.flash_min_time <milliseconds> $ cf set telephony.fxs.flash_max_time <milliseconds> $ cf commit

7.3.8.2 Show Hook Flash Time Configuration

To show the current settings for hook flash, enter the following command:

$ cf show telephony.fxs.flash telephony.fxs.flash.min_time 35 .max_time 145

7.3.9 CLIP The Ericsson W25 supports CLIP (Calling Line Identification Presentation) service in both on-hook and off-hook states using the DTMF and FSK protocols, supporting both ETSI and Bellcore standards.

CLIP is a telephony intelligent network service that transmits the caller’s telephone number, or if supported, the caller’s name to the called party’s telephone equipment prior to the call is answered.

Page 66: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

56 6/1551-CRH 102 167 Uen Rev C 2007-06-08

7.3.9.1 Enable/Disable CLIP

To enable/disable the CLIP service, use the following command:

$ cf set telephony.fxs.clip.enabled true|false $ cf commit

To show the current configuration state for the CLIP service, enter the following command:

$ cf get telephony.fxs.clip.enabled true

7.3.9.2 Set CLIP Country Profile

Not all types of caller identification use the same modulation and not all "CallerID" devices are compatible from country to country or in the same country, even though the basic phone system are the same.

To set a country specific profile for the CLIP service, use the following command:

$ cf set telephony.fxs.clip.profile <profile> $ cf commit

To show the current configured country profile for the CLIP service, enter the following command:

$ cf get telephony.fxs.clip.profile au

7.3.9.3 Set CLIP International Prefix

This setting determines how a “+” character should be displayed (e.g. 00).

To set an international prefix for the CLIP service, use the following command:

$ cf set telephony.fxs.clip.international_prefix <string> $ cf commit

To show the current configured international prefix for the CLIP service, enter the following command:

$ cf get telephony.fxs.clip.international_prefix 00

Page 67: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

6/1551-CRH 102 167 Uen Rev C 2007-06-08 57

7.3.9.4 Show CLIP Settings

To show the current configuration for the CLIP service, enter the following command:

$ cf show telephony.fxs.clip telephony.fxs.clip.enabled true .profile "au" .international_prefix "00"

7.3.10 On Hold Ring This parameter specifies what will happen if the user goes on-hook with an active call placed on-hold.

7.3.10.1 Enable/Disable On Hold Ring

If enabled, the user will be notified about a remaining on-hold call with a ring signal. The length of the signal is determined by the “telephony.fxs.local_ringing_timeout” parameter (default 180000 ms).

If disabled, all calls will be disconnected when going on-hook.

To enable/disable on hold ring, enter the following command:

$ cf set telephony.fxs.onhold_ring true|false $ cf commit

To show the current setting for on hold ring, enter the following command:

$ cf get telephony.fxs.onhold_ring true

7.3.11 Tones and Signals Profile The tones and signals profile includes local settings for ringing signals and information tones generated by the Ericsson W25 (in opposite to the tones received by the network).

7.3.11.1 Set Tones and Signals Profile

To set a country specific profile for tones and signals use the following command:

$ cf set telephony.fxs.tones_and_signals_profile <profile> $ cf commit

Page 68: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

58 6/1551-CRH 102 167 Uen Rev C 2007-06-08

To show the current setting for tones and signals profile, enter the following command:

$ cf get telephony.fxs.tones_and_signals_profile au

7.3.12 Analog Settings Profile An analog settings profile includes physical settings for the FXS ports including impedance and nominal gain settings.

7.3.12.1 Set Analog Settings Profile

To set a country specific profile for analogue settings, use the following command:

$ cf set telephony.fxs.analog_settings_profile <profile> $ cf commit

To show the current setting for the analog settings profile, enter the following command:

$ cf get telephony.fxs.analog_settings_profile au

7.3.13 Port Gain

For each of the FXS ports (“Phone” and “Phone/Fax”), the receiving and transmitting gain can be adjusted, with respect to the nominal relative level.

7.3.13.1 Set Port Volume

To adjust the receiving and transmitting gain for the FXS port(s), enter the following commands:

$ cf set telephony.fxs.ports[index].volume_rx <value> $ cf set telephony.fxs.ports[index].volume_tx <value> $ cf commit

For example;

$ cf set telephony.fxs.ports[0].volume_rx 2 $ cf set telephony.fxs.ports[0].volume_tx 5 $ cf commit

The “value” is an offset from the nominal value in accordance with the profile set using the telephony.fxs.analog_settings_profile command. Valid range is -25 < volume < 25.

Page 69: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

6/1551-CRH 102 167 Uen Rev C 2007-06-08 59

7.3.13.2 Show Port Volume Configuration

To show the current settings for volume on the ports, enter the following command:

$ cf show telephony.fxs.ports telephony.fxs.ports[0].volume.rx 2 .tx 5 [1].volume.rx 0 .tx 0

7.4 Dial Process The Ericsson W25 supports E.164 numbering, an ITU-T recommendation defining the international public telecommunication numbering plan used in the PSTN. It also defines the format of telephone numbers. E.164 numbers can have a maximum of 15 digits and are usually written with a + prefix.

There are three ways to indicate that a dialled number sequence is complete:

• Dialing the End Of Number (EON) key (e.g. # or *).

• An Inter Digit Timer (IDT) is used to check the dialing process.

• A specified number of digits must be dialed before the call is placed.

7.4.1 Add a Dial Plan Rule A dial plan is a set of rules that determines how a telephone number is dialed. The dial plan consists of a regular expression (ref. POSIX 1003.2) to match dialed digits, and the ability to strip/append prefix and suffix digits.

The following command is used to add a new rule to the dial plan:

$ cf append telephony.dialplan.rules <match> <prefix_strip> <prefix_append> <suffix_strip> <suffix_append> $ cf commit

The table below describes the parameters:

Table 8 Dial plan rules parameters

Parameter Description

match A regular expression to match dialed digits.

prefix_strip Digit(s) matching this regular expression will be stripped in the beginning of the number.

Page 70: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

60 6/1551-CRH 102 167 Uen Rev C 2007-06-08

Parameter Description

prefix_append Digit(s) to be appended in the beginning of the number.

suffix_strip Digit(s) matching this regular expression will be stripped in the end of the number.

suffix_append Digit(s) to be appended in the end of the number.

Note: The string values must be enclosed in double quotes (“<string> “).

7.4.1.1 Regular Expressions

A regular expression is one or more non-empty branches, separated by “|”. It matches anything that matches one of the branches.

A branch is one or more pieces, concatenated. It matches a match for the first, followed by a match for the second, etc.

A piece is an atom possibly followed by a single “*”, “+”, “?” or bound “}”.

The following expressions are used when creating a matching string for a dial plan rule:

Table 9 Regular expressions

Expression Description

^ Indicates the beginning of a string.

$ Indicates the end of a string.

* An atom followed by “*” matches a sequence of 0 or more matches of the atom.

+ An atom followed by “+” matches a sequence of 1 or more matches of the atom.

? An atom followed by “?” matches a sequence of 0 or 1 matches of the atom.

\ A “\” followed by one of the characters ^ . [ $ ( ) | * + ? { \ matches that character taken as an ordinary character.

A “\” followed by any other character matches that character, as if the “\” had not been present.

Page 71: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

6/1551-CRH 102 167 Uen Rev C 2007-06-08 61

Expression Description

It is illegal to end a regular expression with “\”.

[ ] Indicates that one of the enclosed characters must occur. For example [1-9] specifies “all numbers not starting with 0”.

[[: :]] Used to enclose a character class and stands for the list of all characters belonging to that class. For example [[:digit:]].

{ } Specifies exactly how many times a sequence should occur {min,max}. If the max value is omitted, the sequence must occur at least the min value. For example {4,} specifies “all numbers longer than 4 digits”.

( | ) Used to group several expressions separated by a pipe symbol (|). For example (#|T) specifies “followed by “#” or IDT (T)”.

7.4.1.2 Dial Plan Matching Procedure

When a number is dialed, the following matching procedure is performed:

1. The caller dials a digit on the phone.

2. The digit is added to the string of already dialed digits.

3. The string is checked against all defined dial plans. If a match is found in any dial plan the following is performed:

− If the beginning of the string matches “prefix_strip” the matching part is deleted and “prefix_append” is added.

− If the end of the string matches “suffix_strip” the matching part is deleted and “suffix_append” is added.

− The resulting number is dialed.

If no match is found the next digit is awaited.

Note: If an IDT timeout occurs a “T” is temporarily added to the string of digits and the procedure above is run again. The “T” is only included when the matching step is done and is automatically deleted before any changes (deleting/adding matching parts) are done and before the next digit is received.

Page 72: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

62 6/1551-CRH 102 167 Uen Rev C 2007-06-08

7.4.1.3 Dial Plan Rules Examples

The following gives some dial plan rules examples using the command:

$ cf append telephony.dialplan.rules <match> <prefix_strip> <prefix_append> <suffix_strip> <suffix_append>

Note: If a parameter has no value, enter the string empty (enclosed with double quotes).

The following example specifies a dial plan that matches all numbers followed by an IDT or “#”. An ending “#” is removed:

$ cf append telephony.dialplan.rules "^[[:digit:]]+(T|#)$" "" "" "#$" "" $ cf commit

The following example specifies a dial plan that matches all numbers longer than 4 digits, followed by an IDT or “#”. An ending “#” is removed:

$ cf append telephony.dialplan.rules "^[[:digit:]]{4,}+(T|#)$" "" "" "#$" "" $ cf commit

The following example specifies a dial plan that appends a local area code (013) to all numbers not starting with “0”, followed by an IDT or “#”. An ending “#” is removed:

$ cf append telephony.dialplan.rules "^[1-9][[:digit:]]+(T|#)$" "" "013" "#$" "" $ cf commit

7.4.1.4 Show Dial Plan Rules

To show the current configured dial plan rules, enter the following command:

$ cf show telephony.dialplan.rules telephony.dialplan.rules[0].match "^[[:digit:]]+(#|T)$" .prefix_strip "" .prefix_append "" .suffix_strip "#$" .suffix_append "" [1].match "^[[:digit:]]{4,}+(T|#)$" .prefix_strip "" .prefix_append "" .suffix_strip "#$" .suffix_append "" [2].match "^[1-9][[:digit:]]+(T|#)$" .prefix_strip "" .prefix_append "013"

Page 73: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

6/1551-CRH 102 167 Uen Rev C 2007-06-08 63

.suffix_strip "#$"* .suffix_append ""

To delete an entry in the list, specify the index [x] for the rule to delete on the following command. For example:

$ cf del telephony.dialplan.rules[2] $ cf commit

7.4.2 Emergency Calls

It is possible to place an emergency call (i.e. 112 or 009) when the Ericsson W25 is correctly configured and connected to a mobile network. It is also possible to place emergency calls without having to enter a PIN code, when PIN lock feature is enabled, without a SIM card present in the unit, or if the device is locked to the network by a specific MCC and/or MNC.

This ensures emergency calls will always be established regardless of the configuration of the Ericsson W25.

The emergency telephone number may differ from country to country. It is typically a three-digit number so that it can be easily remembered and dialed quickly. Some countries have a different emergency number for each of the different emergency services; these often differ only by the last digit.

7.4.2.1 Show Emergency Calls Dial Plan

The current configured dial plan for emergency calls can be viewed using the following command:

$ cf show telephony.dialplan.emergency telephony.dialplan.emergency.match "^(112|009)" .prefix_strip "" .prefix_append "" .suffix_strip "" .suffix_append ""

Page 74: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

64 6/1551-CRH 102 167 Uen Rev C 2007-06-08

Emergency numbers are handled as follows:

• 112 and 009 are always available (hard coded) and do not depend on the defined dial plan as in the example above.

• If a SIM card is present, emergency number from the dial plan are also used.

• If no SIM card is present, the numbers 000, 08, 110, 999, 118 and 119 are also handled as emergency numbers.

7.4.2.2 Configure Emergency Calls Dial Plan

To change the current values, use the cf set command for each parameter to be changed:

$ cf set telephony.dialplan.emergency.match <string> $ cf set telephony.dialplan.emergency.prefix_strip <string> $ cf set telephony.dialplan.emergency.prefix_append <string> $ cf set telephony.dialplan.emergency.suffix_strip <string> $ cf set telephony.dialplan.emergency.suffix_append <string> $ cf commit

Note: The string values must be enclosed in double quotes (“<string>”).

7.5 Supplementary Services The UMTS/GSM supplementary service codes (e.g. #67# etc) can be configured with any service code in order to have the same service codes as in a fixed network.

In order to use the services, the operator network must support them.

Offered supplementary services can only be used with a DTMF telephone connected to the unit.

7.5.1 Call Waiting

This service enables the caller to be notified of an incoming call during a conversation. The subscriber can then answer, reject, or ignore the incoming call.

A caller uses the service codes as described in the example below (default configured service codes are used):

Page 75: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

6/1551-CRH 102 167 Uen Rev C 2007-06-08 65

• To activate the service: off-hook – dial tone - * 4 3 # - <confirmation tone> - on hook

• To deactivate the service: off-hook – dial tone - # 4 3 # - <confirmation tone> - on hook

• The check the status of the service: off-hook – dial tone - * # 4 3 # - <special tone for off or on> - on hook.

7.5.1.1 Show Call Waiting Service Codes

To show the current configured service codes for “Call Waiting”, use the following command:

$ cf show telephony.supplementary.call_waiting telephony.supplementary.call_waiting.on "^\\*43#" .off "^#43#" .query "^\\*#43#"

7.5.1.2 Set Call Waiting Service Codes

The service codes for “Call Waiting” are set (changed) using the following commands:

$ cf set telephony.supplementary.call_waiting.on <string> $ cf set telephony.supplementary.call_waiting.off <string> $ cf set telephony.supplementary.call_waiting.query <string> $ cf commit

Note: The string values must be enclosed in double quotes (“<string> “).

Note: To match an “*” the regular expression must be typed as \\\\*, for example "^\\\\*45#". This applies for all control characters (^ . [ $ ( ) | * + ? { \).

7.5.2 Call Management with R-codes.

This service enables the caller to interrupt an active call (placing the caller on hold), make a new call and then subsequently, switch between the old and new call. It is also possible to release either of the calls, putting all three in a conference call or “break up” a conference call into two separate calls again.

The appropriate R-codes are valid in Call Hold, Call Waiting or Conference scenarios.

Page 76: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

66 6/1551-CRH 102 167 Uen Rev C 2007-06-08

To place an ongoing call on hold, the active party can place a call on hold by pressing the “call hold” service code ( R as default).). Dial tone is then received and a new party can be called.

If the new party does not answer, the active party may stop the call attempt and return to the party on hold by pressing R again.

If the new party answer, the active party may switch between the old and new party by pressing the “call_hold_toggle” service code (R 2 as default).).

To continue with the active call and disconnect/release the call on hold (send a User Busy indication tone to the call on hold), the “release_inactive” code is used ( R 0 as default). This is also used to reject an incoming call when having “Call Waiting” active

To release the active call and continue with the call on hold, the “release_active” code is used ( R 1 as default).This is also used to reject the active call and answer the incoming call when having “Call Waiting” active.

The multiparty service enables a caller to establish a multiparty conversation - that is, a simultaneous conversation between three subscribers.

The caller places an active call on hold, makes a new call and then uses the service code (for example R 3 ) to establish the multiparty conversation.

7.5.2.1 Show/Set Call Hold Service Codes

To show the current configured service codes for “Call Hold”, use the following commands:

$ cf get telephony.supplementary.call_hold ^(f)$

$ cf show telephony.supplementary.call_hold_toggle f2

The service codes for “Call Hold” are set (changed) using the following commands:

$ cf set telephony.supplementary.call_hold <string> $ cf set telephony.supplementary.call_hold_toggle <string> $ cf commit

Note: The string values must be enclosed in double quotes (“<string>“).

For example:

Page 77: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

6/1551-CRH 102 167 Uen Rev C 2007-06-08 67

$ cf set telephony.supplementary.call_hold "^(f)$" $ cf set telephony.supplementary.call_hold_toggle "f2" $ cf commit

The f symbolizes a “Hook Flash” which on most modern telephones is implemented as a button (for example R ) that simulates a quick off-hook/on-hook cycle.

7.5.2.2 Show/Set Release Active/Inactive Service Codes

To show the current configured service codes for “Release active/inactive”, enter the following commands:

$ cf show telephony.supplementary.release_inactive f0

$ cf get telephony.supplementary.release_active f1

The service codes for “Release active/inactive” are set (changed) using the following commands:

$ cf set telephony.supplementary.release_inactive <string> $ cf set telephony.supplementary.release_active <string> $ cf commit

Note: The string values must be enclosed in double quotes (“<string> “).

For example:

$ cf set telephony.supplementary.release_inactive "f0" $ cf set telephony.supplementary.release_active "f1" $ cf commit

The f symbolizes a “Hook Flash” which on most modern telephones is implemented as a button (for example R ) that simulates a quick off-hook/on-hook cycle.

7.5.2.3 Show/Set Multiparty Service Code

To show the current configured service code for “Multiparty Service”, enter the following command:

$ cf get telephony.supplementary.multiparty f3

To set the service code for “Multiparty Service”, use the following command:

Page 78: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

68 6/1551-CRH 102 167 Uen Rev C 2007-06-08

$ cf set telephony.supplementary.multiparty <string> $ cf commit

Note: The string value must be enclosed in double quotes (“<string> “).

For example:

$ cf set telephony.supplementary.multiparty "f3" $ cf commit

7.5.3 CLIR The Calling Line Identification Restriction (CLIR) service enables a calling party to prevent presentation of his telephone number to the called party.

The network operator can configure the default CLIR service state for a specific subscriber to be either always restricted, temporary restricted or temporary allowed.

If always restricted, the A-number will never be presented at the B-party.

If temporary restricted, the A-subscriber can override the restriction by using the prefix * 3 1 # (the default configured prefix)

If temporary allowed, the A-subscriber can restrict the presentation by using the prefix # 3 1 # (the default configured prefix)

7.5.3.1 Show CLIR Service Codes

To show the current configured service codes for “CLIR”, enter the following command:

$ cf show telephony.supplementary.clir

telephony.supplementary.clir.on "^\\#31#" .off "^*31#" .query "^\\*#31#"

7.5.3.2 Set CLIR Service Codes

The service codes for “CLIR” are set (changed) using the following commands:

$ cf set telephony.supplementary.clir.on <string> $ cf set telephony.supplementary.clir.off <string> $ cf set telephony.supplementary.clir.query <string> $ cf commit

Page 79: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

6/1551-CRH 102 167 Uen Rev C 2007-06-08 69

Note: The string values must be enclosed in double quotes (“<string> “).

Note: To match an “*” the regular expression must be typed as \\\\*, for example "^\\\\*32#". This applies for all control characters (^ . [ $ ( ) | * + ? { \).

7.5.4 Call Return

The “Call return” supplementary service enables a user to call the last unanswered call by dialing a configured service code, for example:

off hook – dial tone - * 1 0 # <the last unanswered is dialed automatically>

Note: This service requires the calling subscriber to present his number, i.e. NOT having CLIR active. Nor will it work if the calling subscriber doesn’t present the correct calling number (calling through a PBX for example).

7.5.4.1 Show Call Return Service Code

To show the current configured service codes for “Call return”, enter the following command:

$ cf show telephony.call_return

telephony.supplementary.call_return "^\\*10#"

7.5.4.2 Set Call Return Service Code

The service code for “Call return” are set (changed) using the following command:

$ cf set telephony.supplementary.call_return <string> $ cf commit

Note: The string values must be enclosed in double quotes (“<string> “).

Note: To match an “*” the regular expression must be typed as \\\\*, for example "^\\\\*11#". This applies for all control characters (^ . [ $ ( ) | * + ? { \).

Page 80: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

70 6/1551-CRH 102 167 Uen Rev C 2007-06-08

7.5.5 Delayed Hotline

The “Delayed hotline” supplementary service enables a user to call a particular number (hotline number) by just lifting the handset and wait for a fixed period (delay).

The hotline number must be entered into the Ericsson W25 by the customer, prior to use. A prefix is added to the dialplan for the customer hotline number.

Note: Calls cannot be forwarded to emergency numbers.

A caller uses the service codes as described in the example below (default configured service codes used):

• To turn on the service and enter a hotline number: off hook – dial tone - * 5 3 <hotline number> # - on hook

• To deactivate the service: off hook – dial tone - # 5 3 # - <confirmation tone> - on hook

• To check the status of the service: off hook – dial tone - * # 5 3 # - <special tone for off or on> - on hook

7.5.5.1 Show Delayed Hotline Service Codes

To show the current configured service codes for “Call forwarding unconditional”, enter the following command:

$ cf show telephony.supplementary.fwd_all

telephony.supplementary.hotline.on.match "^\\*53[\\+|0-9]+#" .prefix_strip "\\*53" .prefix_append "" .suffix_strip "#" .suffix_append "" .off "^#53#" .query "^\\*#53#" .delay 4000

7.5.5.2 Set Delayed Hotline Service Codes

The service codes for “Delayed hotline” are set (changed) using the following commands:

$ cf set telephony.supplementary.hotline.on.match <string> $ cf set telephony.supplementary.hotline.on.prefix_strip <string> $ cf set telephony.supplementary.hotline.on.prefix_append

Page 81: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

6/1551-CRH 102 167 Uen Rev C 2007-06-08 71

<string> $ cf set telephony.supplementary.hotline.on.suffix_strip <string> $ cf set telephony.supplementary.hotline.on.suffix_append <string> $ cf set telephony.supplementary.hotline.off <string> $ cf set telephony.supplementary.hotline.query <string> $ cf set telephony.supplementary.hotline.delay <string> $ cf commit

Note: The string values must be enclosed in double quotes (“<string> “).

Note: To match an “*” the regular expression must be typed as \\\\*, for example "^\\\\*54#". This applies for all control characters (^ . [ $ ( ) | * + ? { \).

7.5.6 Call Forwarding Unconditional

The “Call forwarding unconditional” supplementary service enables a user to immediately have all incoming calls forwarded to another number.

When the CFU is active, the subscriber will hear a distinct dial tone when attempting to make a call. This is in order to notify the subscriber that CFU is active.

Note: Due to configuration in most networks, calls cannot be forwarded to emergency numbers or international numbers.

A caller uses the service codes as described in the example below (default configured service codes used):

• To activate the service: off hook – dial tone - * 2 1 * <phone number> # - on hook

• To deactivate the service: off hook – dial tone - # 2 1 # - <confirmation tone> - on hook

• To check the status of the service: off hook – dial tone - * # 2 1 # - <special tone for off or on> - on hook

7.5.6.1 Show Call Forwarding Unconditional Service Codes

To show the current configured service codes for “Call forwarding unconditional”, enter the following command:

$ cf show telephony.supplementary.fwd_all

Page 82: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

72 6/1551-CRH 102 167 Uen Rev C 2007-06-08

telephony.supplementary.fwd_all.on.match "^\\*21\\*+[\\+|0-9]+#" .prefix_strip "\\*21\\*" .prefix_append "" .suffix_strip "#" .suffix_append "" .off "^#21#" .query "^\\*#21#"

7.5.6.2 Set Call Forwarding Unconditional Service Codes

The service codes for “Call forwarding unconditional” are set (changed) using the following commands:

$ cf set telephony.supplementary.fwd_all.on.match <string> $ cf set telephony.supplementary.fwd_all.on.prefix_strip <string> $ cf set telephony.supplementary.fwd_all.on.prefix_append <string> $ cf set telephony.supplementary.fwd_all.on.suffix_strip <string> $ cf set telephony.supplementary.fwd_all.on.suffix_append <string> $ cf set telephony.supplementary.fwd_all.off <string> $ cf set telephony.supplementary.fwd_all.query <string> $ cf commit

Note: The string values must be enclosed in double quotes (“<string> “).

Note: To match an “*” the regular expression must be typed as \\\\*, for example "^\\\\*22#". This applies for all control characters (^ . [ $ ( ) | * + ? { \).

7.5.7 Call Forwarding on Busy

The “Call forwarding on busy” supplementary service enables a user to have all incoming calls, which meet with busy, forwarded to another number.

Note: Due to configuration in most networks, calls cannot be forwarded to emergency numbers or international numbers.

A caller uses the service codes as described in the example below (the default configured service code 24 is used):

• To activate the service: off hook – dial tone - * 2 4 * <phone number> # - on hook

• To deactivate the service: off hook – dial tone - # 2 4 # - <confirmation tone> - on hook

Page 83: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

6/1551-CRH 102 167 Uen Rev C 2007-06-08 73

• To check the status of the service: off hook – dial tone - * # 2 4 # - <special tone for off or on> - on hook.

7.5.7.1 Show Call Forwarding on Busy Service Codes

To show the current configured service codes for “Call forwarding on busy”, enter the following command:

$ cf show telephony.supplementary.fwd_busy

telephony.supplementary.fwd_busy.on.match "^\\*+(24|67)+\\*+[\\+|0-9]+#" .prefix_strip \\*+(24|67)+\\*" .prefix_append "" .suffix_strip "#" .suffix_append "" .off "^#+(24|67)+#" .query "^\\*#+(24|67)+#"

7.5.7.2 Set Call Forwarding on Busy Service Codes

The service codes for “Call forwarding on busy” are set (changed) using the following commands:

$ cf set telephony.supplementary.fwd_busy.on.match <string> $ cf set telephony.supplementary.fwd_busy.on.prefix_strip <string> $ cf set telephony.supplementary.fwd_busy.on.prefix_append <string> $ cf set telephony.supplementary.fwd_busy.on.suffix_strip <string> $ cf set telephony.supplementary.fwd_busy.on.suffix_append <string> $ cf set telephony.supplementary.fwd_busy.off <string> $ cf set telephony.supplementary.fwd_busy.query <string> $ cf commit

Note: The string values must be enclosed in double quotes (“<string> “).

Note: To match an “*” the regular expression must be typed as \\\\*, for example "^\\\\*25#". This applies for all control characters (^ . [ $ ( ) | * + ? { \).

Page 84: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

74 6/1551-CRH 102 167 Uen Rev C 2007-06-08

7.5.8 Call Forwarding on No Reply

The “Call forwarding on no reply” supplementary service enables a user to have all incoming calls, which meet with no reply, forwarded to another number.

Note: Due to configuration in most networks, calls cannot be forwarded to emergency numbers or international numbers.

A caller uses the service as described in the example below (the default configured service codes are used):

• To activate the service: off hook – dial tone - * 6 1 * <phone number> # - on hook

• To deactivate the service: off hook – dial tone - # 6 1 # - <confirmation tone> - on hook

• To check the status of the service: off hook – dial tone - * # 6 1 # - <special tone for off or on> - on hook.

7.5.8.1 Show Call Forwarding on No Reply Service Codes

To show the current configured service codes for Call forwarding on no reply, enter the following command:

$ cf show telephony.supplementary.fwd_no_reply

telephony.supplementary.fwd_no_reply.on.match "^\\*61\\*+[\\+|0-9]+#" .prefix_strip "\\*61\\*" .prefix_append "" .suffix_strip "#" .suffix_append "" .off "^#61#" .query "^\\*#61#"

7.5.8.2 Set Call Forwarding on No Reply Service Codes

The service codes for “Call forwarding on no reply” are set (changed) using the following commands:

$ cf set telephony.supplementary.fwd_no_reply.on.match <string> $ cf set telephony.supplementary.fwd_no_reply.on.prefix_strip <string>

Page 85: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

6/1551-CRH 102 167 Uen Rev C 2007-06-08 75

$ cf set telephony.supplementary.fwd_no_reply.on.prefix_append <string> $ cf set telephony.supplementary.fwd_no_reply.on.suffix_strip <string> $ cf set telephony.supplementary.fwd_no_reply.on.suffix_append <string> $ cf set telephony.supplementary.fwd_no_reply.off <string> $ cf set telephony.supplementary.fwd_no_reply.query <string> $ cf commit

Note: The string values must be enclosed in double quotes (“<string> “).

Note: To match an “*” the regular expression must be typed as \\\\*, for example "^\\\\*62#". This applies for all control characters (^ . [ $ ( ) | * + ? { \).

7.5.9 Call Forwarding Unreachable

The “Call forwarding unreachable” supplementary service enables a user to have all incoming calls, which meet with unreachable, forwarded to another number.

Note: Due to configuration in most networks, calls cannot be forwarded to emergency numbers or international numbers.

A caller uses the service codes as described in the example below (default configured service codes are used):

• To activate the service: off hook – dial tone - * 6 2 * <phone number> # - on hook

• To deactivate the service: off hook – dial tone - # 6 2 # - <confirmation tone> - on hook

• To check the status of the service: off hook – dial tone - * # 6 2 # - <special tone for off or on> - on hook.

7.5.9.1 Show Call Forwarding Unreachable Service Codes

To show the current configured service codes for “Call forwarding unreachable”, enter the following command:

Page 86: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

76 6/1551-CRH 102 167 Uen Rev C 2007-06-08

$ cf show telephony.supplementary.fwd_unreachable

telephony.supplementary.fwd_unreachable.on.match "^\\*62\\*+[\\+|0-9]+#" .prefix_strip "\\*62\\*" .prefix_append "" .suffix_strip "#" .suffix_append "" .off "^#62#" .query "^\\*#62#"

7.5.9.2 Set Call Forwarding Unreachable Service Codes

The service codes for “Call forwarding unreachable” are set (changed) using the following commands:

$ cf set telephony.supplementary.fwd_unreachable.on.match <string> $ cf set telephony.supplementary.fwd_unreachable.on.prefix_strip <string> $ cf set telephony.supplementary.fwd_unreachable.on.prefix_append <string> $ cf set telephony.supplementary.fwd_unreachable.on.suffix_strip <string> $ cf set telephony.supplementary.fwd_unreachable.on.suffix_append <string> $ cf set telephony.supplementary.fwd_unreachable.off <string> $ cf set telephony.supplementary.fwd_unreachable.query <string> $ cf commit

Note: The string values must be enclosed in double quotes (“<string> “).

Note: To match an “*” the regular expression must be typed as \\\\*, for example "^\\\\*67#". This applies for all control characters (^ . [ $ ( ) | * + ? { \).

7.5.10 Voice Mail

The Voice Mail service is a network based answering machine facility that can leave, take and play back messages.

The subscriber is alerted about new voice mail message(s) by the “Message Waiting” indicator on the Ericsson W25 and a special message waiting tone that plays when going off-hook.

Page 87: Ericsson W25 Administrator Manual

Configure Telephony and Fax Services

6/1551-CRH 102 167 Uen Rev C 2007-06-08 77

Both the “Message Waiting” indicator and the message waiting tone are deactivated as soon as the subscriber has called the service providers voicemail number.

7.5.10.1 Enable/Disable Voice Mail

To enable/disable the voice mail supplementary service, enter the following command:

$ cf set telephony.supplementary.voice_mail.enabled true|false

To check the current status of the service, enter:

$ cf get telephony.supplementary.voice_mail.enabled true

7.5.10.2 Set Voice Mail Numbers

To set the incoming and outgoing numbers for the voice mail service, use the following commands:

$ cf set telephony.supplementary.voice_mail.incoming_number <string> $ cf set telephony.supplementary.voice_mail.outgoing_number <string> $ cf commit

The parameter <incoming_number> specifies the number to the service providers’ voice mail system.

The parameter <outgoing_number> specifies the service providers voicemail number that a subscriber calls for listening to messages.

To show the complete configuration for the voice mail service, enter the following command:

$ cf show telephony.supplementary.voice_mail

telephony.supplementary.voice_mail.enabled true .incoming_number "" .outgoing_number ""

Page 88: Ericsson W25 Administrator Manual

Configure the Wireless LAN

78 6/1551-CRH 102 167 Uen Rev C 2007-06-08

8 Configure the Wireless LAN

This chapter describes how to configure the wireless LAN (WLAN) interface and wireless security options.

8.1 Enable/Disable the WLAN Interface The Ericsson W25 can be used as a wireless Ethernet router, connecting to wireless PCs via IEEE standard 802.11b/g.

Note: By default the WLAN interface is disabled.

To enable/disable the WLAN interface, use the following command:

$ cf set wlan.enabled true|false $ cf commit

To display the current status for the WLAN interface, enter one of the following commands:

$ cf show wlan.enabled wlan.enabled false

$ cf get wlan.enabled false

8.2 WLAN Transmit Power To avoid interference with other wireless networks, the transmit power level can be changed using the following command:

$ cf set wlan.power_dbm <value> $ cf commit

The valid <value> range is 0 – 20 and is the EIRP (Equivalent Isotropic Radiated Power) value expressed in dBm.

To display the current setting for transmit power, enter:

$ cf get wlan.power_dbm 20

Page 89: Ericsson W25 Administrator Manual

Configure the Wireless LAN

6/1551-CRH 102 167 Uen Rev C 2007-06-08 79

8.3 Network Name (SSID) The Ericsson W25 supports a single SSID. This SSID and a unique MAC address are broadcasted at regular intervals.

The SSID name is a unique identifier that wireless networking devices use to establish and maintain wireless connectivity. Multiple access points on a network or sub-network can use the same SSID.

To display the current SSID name, use the following command:

$ cf get wlan.SSID.name FWT

8.3.1 Set SSID name

To set (change) the SSID name, use the following command:

$ cf set wlan.SSID.name <name>

SSID names are case sensitive and can contain up to 32 alphanumeric characters (a-z, 0-9, -). For example:

$ cf set wlan.SSID.name MySSID $ cf commit

$ cf get wlan.SSID.name MySSID

8.3.2 Hide SSID It is possible to configure the SSID to be hidden. In this case the SSID will not be broadcasted and local wireless clients will not find the SSID when scanning the air.

When the SSID name is configured to be hidden, it has to be provided manually to every client.

To enable/disable the SSID to be hidden, use the following command:

$ cf set wlan.SSID.enabled true|false $ cf commit

To display if the SSID is configured to be hidden or not, enter the following command:

$ cf get wlan.SSID.enabled true

Page 90: Ericsson W25 Administrator Manual

Configure the Wireless LAN

80 6/1551-CRH 102 167 Uen Rev C 2007-06-08

8.4 Region To make sure that the Ericsson W25 transmits on correct radio frequencies according to national regulations, the region where the device is used must be stated.

The following regions are currently supported:

• EU (Europe)

• US (United States)

• CA (Canada)

• SA (South Africa)

• AU (Australia)

• NZ (New Zealand)

• MA (Malaysia)

• SI (Singapore)

8.4.1 Set Region

To change the region, enter the following command:

$ cf set wlan.country <EU|US|CA|SA|AU|NZ|MA|SI> $ cf commit

When a region is configured only channels that are allowed in that region can be selected (both when using manual and automatic channel selection). See the next section.

To display the current setting for region, use the following command:

$ cf get wlan.country EU

8.5 Channel Selection The channel number determines the channel used by the device to pass traffic to clients. The allowed channel depends on the configured region of the wireless card.

8.5.1 Manual Channel Selection

To manually set the channel number to a specific channel, use the following command:

Page 91: Ericsson W25 Administrator Manual

Configure the Wireless LAN

6/1551-CRH 102 167 Uen Rev C 2007-06-08 81

$ cf set wlan.channel.number <channel number> $ cf commit

Note: This setting is only valid if wlan.channel.auto is disabled (set to false).

Valid values for channel number are 1 – 13 except if region is set to US or Canada when valid channels are 1-11.

To display which channel that is currently configured, enter:

$ cf get wlan.channel.number 1

8.5.2 Automatic Channel Selection

By enabling the “Automatic Channel Selection” feature, the radio will scan each valid channel and select a channel with no activity. If there are no channels without activity then the one with lowest activity is selected (or random if lowest activity is equal). When “Automatic Channel Selection” is enabled, the Ericsson W25 will select the best channel upon every restart.

To enable the automatic channel selection, enter the following command:

$ cf set wlan.channel.auto true|false $ cf commit

To display the current setting for automatic channel selection, enter:

$ cf get wlan.channel.auto true

8.6 Wireless Security Authentication and data encryption are used to restrict access to the wireless network. The authentication and encryption method that will be used depends on what is supported by the connecting wireless device(s).

Wireless security can be configured to be either “open” (no authentication or encryption) or “closed” (meaning either WEP-64/WEP-128 or WPA/WPA2 security).

Note: WPA is supported as standard only in Windows XP SP2 and Vista.

To display the current settings for wireless security, use the following command:

Page 92: Ericsson W25 Administrator Manual

Configure the Wireless LAN

82 6/1551-CRH 102 167 Uen Rev C 2007-06-08

$ cf show wlan.security wlan.security.mode "NONE" .secret ""

8.6.1 Set Security Mode

To set a security mode, use the following command:

$ cf set wlan.security.mode <mode> $ cf commit

Valid choices for security mode are:

NONE WEP-64 WEP-128 WPA WPA2

Note: Each wireless device must be configured to use exactly the same security mode and key or they will not be able to connect.

If wireless security mode is configured to “NONE”, no client configuration is needed. Note that there will be no encryption when using “NONE”, meaning that anyone with a wireless PC can connect on the wireless LAN.

WEP-64/WEP-128 and WPA/WPA2 modes need additional configuration such as network key and pass phrase respectively. See the next subsections.

8.6.1.1 WEP

WEP (Wired Equivalent Privacy) enables wireless security using 64-bit or 128-bit data encryption. WEP encryption requires a private network key. Each device in the wireless network has to be manually configured with this key. WEP keys are entered according to the following:

• For 64-bit data encryption, the WEP key string contains of a 10 character (a-f, 0-9) hex network key.

• For 128-bit data encryption, the WEP key string contains of a 26 character (a-f, 0-9) hex network key.

To set the security mode to WEP 64-bit data encryption with a network key, use the following commands:

$ cf set wlan.security.mode WEP-64 $ cf set wlan.security.secret 0039a72f90 $ cf commit

Page 93: Ericsson W25 Administrator Manual

Configure the Wireless LAN

6/1551-CRH 102 167 Uen Rev C 2007-06-08 83

To show the configuration, use the following command:

$ cf show wlan.security wlan.security.mode "WEP-64" .secret "0039a72f90"

To set the security mode to WEP 128-bit data encryption with a network key, use the following command:

$ cf set wlan.security.mode WEP-128 $ cf set wlan.security.secret 11440a93882207c173645285e6 $ cf commit

To show the configuration, use the following command:

$ cf show wlan.security wlan.security.mode "WEP-128" .secret "11440a93882207c173645285e6"

8.6.1.2 WPA

WPA (Wi-Fi Protected Access) is a 256-bit data encryption method with keys that dynamically change over time. WPA and its successor WPA2 are considered to be the most reliable security options.

For user authentication, WPA/WPA2 runs a special, easy-to-set-up home mode called Pre-Shared Key (PSK) where keys and passphrases are manually entered.

WPA encryption uses the Temporal Key Integrity Protocol (TKIP) while WPA2 encryption follows the Advanced Encryption Standard (AES).

To set the security mode to either WPA or WPA2 the following command is used:

$ cf set wlan.security.mode WPA|WPA2 $ cf commit

WPA/WPA2 uses a pass phrase for authentication and encryption. Each device in the wireless network has to be manually configured with this pass phrase.

A passphrase consists of between 8 and 63 characters. It is recommended that the pass phrase contains at least 20 characters. Enclosing a passphrase value in double quotes allows for using spaces in between words.

To set the security mode to WPA with a pass phrase, use the following commands:

Page 94: Ericsson W25 Administrator Manual

Configure the Wireless LAN

84 6/1551-CRH 102 167 Uen Rev C 2007-06-08

$ cf set wlan.security.mode WPA $ cf set wlan.security.secret secretsecretsecretsecret $ cf commit

To show the configuration, use the following command:

$ cf show wlan.security wlan.security.mode "WPA" .secret "secretsecretsecretsecret"

8.6.2 Whitelist A common method of restricting WLAN network access is to specify the MAC address(es) in a “whitelist” for those computers to be granted access to the WLAN. This kind of whitelist is also known as “MAC Association” or “MAC Access list”.

Up to 20 MAC addresses for wireless clients can be added to the whitelist. Once the whitelist has been enabled, only clients with an associated MAC address are allowed to connect to the Ericsson W25 WLAN.

This feature does not require any configuration of the clients but does not encrypt the traffic like WEP/WPA.

8.6.2.1 Add/Remove Whitelist MAC Address(es)

To add a clients MAC address to the whitelist, enter the following command:

$ cf append wlan.whitelist.accepted <macaddress> $ cf commit

The MAC address for a WLAN adapter is normally found on the product label. For internal wireless PCI cards running on a Windows platform, the command ipconfig /all can be used to display the MAC address (displayed as the “Physical Address” against the network adapter).

MAC addresses are given in the form xx:xx:xx:xx:xx:xx where x is numbers 0-9 and/or letters a-f, for example:

$ cf append wlan.whitelist.accepted 02:44:ba:1a:83:09 $ cf commit

To show the whitelist, enter the following command:

$ cf show wlan.whitelist.accepted wlan.whitelist.accepted[0] "02:44:ba:1a:83:09"

To delete a MAC address from the list, specify the index [x] for the MAC address to be deleted on the following command. For example:

Page 95: Ericsson W25 Administrator Manual

Configure the Wireless LAN

6/1551-CRH 102 167 Uen Rev C 2007-06-08 85

$ cf del wlan.whitelist.accepted[0] $ cf commit

To delete all wireless clients from the list, use the following command:

$ cf clear wlan.whitelist.accepted $ cf commit

8.6.2.2 Enable/Disable Whitelist

To enable/disable the whitelist, use the following command:

$ cf set wlan.whitelist.enabled true|false $ cf commit

To show the status and of the whitelist and configured accepted MAC addresses, enter:

$ cf show wlan.whitelist wlan.whitelist.enabled true .accepted[0] "02:44:ba:1a:83:09" [1] "00:65:33:ca:01:20"

Page 96: Ericsson W25 Administrator Manual

Configure USB Services

86 6/1551-CRH 102 167 Uen Rev C 2007-06-08

9 Configure USB Services

The Ericsson W25 functions as a network storage device and network printer sharing for LAN/WLAN hosts using Windows File and Printer sharing (also known as SMB or CIFS).

9.1 File Sharing USB disk drives or memory sticks that are connected to the Ericsson W25 are automatically mounted and shared over the LAN (and WLAN, if enabled).

The included files are shared with all devices belonging to the same workgroup on the LAN/WLAN and all users have full read/write (incl. delete) access to the shared files.

Note: If a storage device contains more than one partition only the first partition is shared.

To check details of a connected USB network storage device, use the following command:

$ st usb Device Id: 09C0BA6150E0A938 Vendor: Verbatim Product: Store ´n´ Go Class: Mass Storage Speed: High Speed (480 Mbit/s) File System: Capacity: Used:

Note: Some fields may be blank depending on the capabilities of the connected USB device.

9.2 Printer Sharing A USB printer connected to the Ericsson W25 is automatically mounted and shared over the LAN (and WLAN, if enabled).

To check details of a connected USB printer, use the following command:

$ st usb Device Id: HU55W0412150912450 Vendor: EPSON

Page 97: Ericsson W25 Administrator Manual

Configure USB Services

6/1551-CRH 102 167 Uen Rev C 2007-06-08 87

Product: USB Printer Class: Printer Speed: Full Speed (12 Mbit/S)

Note: Some fields may be blank depending on the capabilities of the connected USB printer.

9.3 Workgroup All devices in the local network that want to access a USB connected device may belong to the same workgroup as the Ericsson W25. The default workgroup name is “WORKGROUP”.

Use the following command to change the default workgroup name, for example to fit an existing network:

$ cf set smb.workgroup <name> $ cf commit

9.3.1 Show Workgroup Configuration To display the current workgroup name, enter:

$ cf show smb smb.workgroup "WORKGROUP"

9.4 Sharename The USB connected device is configured with a specific share name that LAN/WLAN hosts uses when connecting to the devices.

The serial number of a specific device can be mapped to a share name that the Ericsson W25 will remember the next time the device is connected.

9.4.1 Assign a Sharename to a Device

The following command maps a share name with the serial number of a specific USB device:

$ cf append smb.shares <share_name> <serial> $ cf commit

The table below describes the parameters:

Page 98: Ericsson W25 Administrator Manual

Configure USB Services

88 6/1551-CRH 102 167 Uen Rev C 2007-06-08

Table 10 Mapping USB share name and serial number parameters

Parameter Description

share_name Share name of the USB connected device.

serial The serial number of the device.

For example;

$ cf append smb.shares ColorPrinter 654321 $ cf commit

9.4.2 Show Sharename Configuration

To display the current configured USB share names, enter:

$ cf show smb.shares smb.shares[0].share_name "ColorPrinter" .serial "123456"

9.4.3 Delete a Sharename

To delete a share name from the list, specify the index [x] of the share name to be deleted on the following command. For example:

$ cf del smb.shares[0] $ cf commit

To delete all configured share names, use the following command:

$ cf clear smb.shares $ cf commit

Page 99: Ericsson W25 Administrator Manual

Management Tools

6/1551-CRH 102 167 Uen Rev C 2007-06-08 89

10 Management Tools

This chapter describes how to perform software updates and show status and statistics information.

10.1 Software Update The Ericsson W25 runs Linux OS on an Intel hardware platform. The flash file system is formatted as two partitions, each capable of holding a complete software image. If a software update process should get interrupted, e.g. power failure during the update process, there is always a last known good firmware image to boot from.

Software updates can be performed either manually using the FTP or HTTP(s) protocols, or automatically using an update server provided by Ericsson.

10.1.1 Check the Current Software Version

The following command is used to see the software version(s) that is currently running:

$ st system Product: Ericsson W25 Data & Voice Terminal Product Type: W25 Product Id: KRC 101 1460 R1A Serial Number: T710111902 Boot Loader: CXC 172 1003 R3A (Nov 16 2006) Application Software: CXC 172 3158 R6A (April 24 2007) Ethernet MAC Address: 00:80:37:8D:81:90 WLAN MAC Address: 00:80:37:8D:81:91 IMEI: 352679010034366

10.1.2 Manual Software Update Manual software updates is supported from FTP or HTTP(s) servers. The command swinst is used to initiate a software update. This command downloads a software image file using standard TCP/IP protocols specified by the URL. Before the update process is started, the file is checked for inconsistencies. To further improve the validation, the MD5 checksum value can be supplied in the command.

The swinst command has the following syntax:

Page 100: Ericsson W25 Administrator Manual

Management Tools

90 6/1551-CRH 102 167 Uen Rev C 2007-06-08

$ swinst <sw-url> [<md5sum>]

The table below describes the parameters:

Table 11 swinst parameters

Parameter Description

sw-url The source URL; protocol and file to be downloaded. Supported protocols are FTP and HTTP(s).

md5sum Optionally add the content in the checksum file to verify the software image file is valid.

The following example shows an example using FTP and the contents in the MD5 checksum file:

$ swinst ftp://192.168.1.3/CXC1721560_R4A.img 10cac9653100f9b848b9ea78da6cac9d

Downloading ftp://192.168.1.3/CXC1721560_R4A.img to /tmp/sw.tar. --00:05:04-- ftp://192.168.1.3/CXC1721560_R4A.img => `/tmp/sw.tar' Connecting to 192.168.1.3:21... connected. Logging in as anonymous ... Logged in! ==> SYST ... done. ==> PWD ... done. ==> TYPE I ... done. ==> CWD not needed. ==> PORT ... done. ==> RETR CXC1721560_R4A.img ... done.

[ <=> ] 13,762,560 4.22M/s

00:05:06 (4.21 MB/s) - `/tmp/sw.tar' saved [13762560]

Completed. ############################################################# Do NOT TURN OFF CPE after this point. ############################################################# Verifying checksum. Checksum OK. ############################################################# FWT application update. ############################################################# /tmp/sw.tar is a valid FWT software archive. Erasing /dev/mtd3. Erasing 128 Kibyte @ 120000 -- 90 % complete. Writing zImage in /tmp/sw.tar to /dev/mtd3. Writing flash: ********** Write complete. Erasing /dev/mtd4.

Page 101: Ericsson W25 Administrator Manual

Management Tools

6/1551-CRH 102 167 Uen Rev C 2007-06-08 91

Erasing 128 Kibyte @ 5c0000 -- 97 % complete. Writing rootfs.squashfs in /tmp/sw.tar to /dev/mtd4. Writing flash: ********************************************** Write complete. ######################################################## Installation completed. The system will now reboot. ########################################################

10.1.2.1 Reboot the System

When a manual software update has been completed successfully, a reboot of the system is automatically executed.

When needed, the following command is used to reboot the system:

$ reboot

Information about the progress is displayed on the screen during the reboot.

10.1.3 Automatic Software Update

Automatic software updates from Ericsson’s update server are supported. In this case, the Ericsson W25 will at regular intervals poll the update server for updates. If there is an image available a download and upgrade process is initiated.

10.1.3.1 Enable/Disable Autoupdate

The following command is used to enable/disable the automatic software update feature:

$ cf set autoupdate.enabled true|false $ cf commit

To check the current status use the following command:

$ cf get autoupdate.enabled true

10.1.3.2 Define Update Server

The following commands are used when configuring the auto update feature:

$ cf set autoupdate.server <url> $ cf set autoupdate.interval <number of hours> $ cf set autoupdate.operator <name>

Page 102: Ericsson W25 Administrator Manual

Management Tools

92 6/1551-CRH 102 167 Uen Rev C 2007-06-08

$ cf set autoupdate.time <time of day> $ cf commit

A description of each parameter is given in the table below:

Table 12 Auto Update parameters

Parameter Description

server The URL or IP address of the server that provides the automatic update service.

interval Time interval (number of hours) between polling the update server. Default value is 168 hours (7 days). Note: The value must be n x 24 where n is number of days. n must be greater than or equal to 1.

operator Name of the operator (optional).

time The time of day (hh:mm:ss) when the polling is performed.

10.1.3.3 Show Autoupdate Configuration

To display the current configuration for the auto update server, enter the following command:

$ cf show autoupdate autoupdate.enabled false .server "https://update.ericsson.net/ESU/" .interval 168 .operator "Operator1" .time "04:00:00"

10.2 System Log The Ericsson W25 includes a system log accessible both from the CLI and WUI as a text file.

The system logging information is written to 5 files, /var/log/messages.0 - .5 and these files are rotated in a circular fashion. The files are limited to 200Kbytes each, totaling a maximum of 1 MB logging information. The files are not saved to flash and will be lost when rebooting or when power is disconnected.

When persistent logging is enabled, the log files are written to flash memory in the /var/log/messages.0 and /var/log/messages.1 files alternately.

Page 103: Ericsson W25 Administrator Manual

Management Tools

6/1551-CRH 102 167 Uen Rev C 2007-06-08 93

Note: Persistent logging should only be used for debugging purposes since it consumes flash memory.

10.2.1 Set Log Level

Different levels of logging can be set depending on how much information is desired.

Message types are specific to the logged information:

• Emergency, alert, critical and error messages report important operation errors, (e.g. a task crashed).

• Warning, notice and inform messages report important operation information, (e.g. system attack).

• Debug messages report operation details.

The default configured log level is LOG_INFO.

To set the log level, use the following command:

$ cf set syslog.filter_level <level> $ cf commit

Valid choices for filter level are:

LOG_EMERG LOG_ALERT LOG_CRIT LOG_ERR LOG_WARNING LOG_NOTICE LOG_INFO LOG_DEBUG

Note: The command (log level value) is case sensitive.

When a log level has been configured, only messages with this severity level or higher will be saved in the syslog. For example, if log level is set to LOG_CRIT, messages with severity level emergency, alert and critical will be saved.

The log levels LOG_EMERG, LOG-ALERT and LOG_CRIT correspond to the log level “Alarms only” that the end-user can select to display from the WUI.

Page 104: Ericsson W25 Administrator Manual

Management Tools

94 6/1551-CRH 102 167 Uen Rev C 2007-06-08

10.2.2 Syslog Heartbeat

A regular heartbeat message can be sent to the syslog with a configurable interval.

Note: The heartbeat messages will be classified as an alarm to simplify the forwarding of this message to a remote syslog.

To configure an interval for heartbeat messages to be sent to the syslog, use the following command:

$ cf set syslog.heartbeat <interval> $ cf commit

The heartbeat interval is configurable in steps of 15 minutes; 0 to 96 (where 96 x 15 minutes = 1 day). If the interval is set to 0 no heartbeat messages will be sent.

To check the current configured syslog heartbeat interval, enter:

$ cf get syslog.heartbeat 0

10.2.3 Set Persistent Logging To enable the persistent logging, use the following command:

$ cf set syslog.persistent true|false $ cf commit

Important: The persistent option should only be used for debugging purposes since it consumes flash memory.

To check the current status of persistent logging, enter:

$ cf get syslog.persistent false

10.2.4 Define Remote Syslog Host

The Ericsson W25 is able to distribute the system log to a remote host using the BSD Syslog message format on UDP.

The following commands are used for defining a remote syslog host:

$ cf set syslog.remote.host <URL|IP address|hostname> $ cf set syslog.remote.port <port number>

Page 105: Ericsson W25 Administrator Manual

Management Tools

6/1551-CRH 102 167 Uen Rev C 2007-06-08 95

$ cf set syslog.remote.enabled true|false $ cf commit

The parameters are described in the table below:

Table 13 Syslog remote host parameters

Parameter Description

host The URL or IP address/hostname of the remote syslog host.

port The port number to be used. Default value is 514.

enabled Whether the remote logging should be enabled or not.

The following example configures the Ericsson W25 to send “critical” syslog messages to a remote host:

$ cf set syslog.remote.host syslogserver $ cf set syslog.remote.port 514 $ cf set syslog.remote.enabled true $ cf set syslog.filter_level LOG_CRIT $ cf commit

In order to identify specific devices in a network, the product serial number is also retrieved and sent as a parameter when the syslogd daemon is initialized for remote logging.

10.2.5 Show Syslog Configuration To show the current syslog configuration, use the following command:

$ cf show syslog syslog.remote.enabled true .host "syslogserver" .port 514 .filter_level "LOG_CRIT" .persistent false .heartbeat 0

10.2.6 Show Log Messages

The logging information is the Linux system file /var/log/messages. To display the logging information, enter the following command:

$ tail –f /var/log/messages

The output is similar to the following:

Page 106: Ericsson W25 Administrator Manual

Management Tools

96 6/1551-CRH 102 167 Uen Rev C 2007-06-08

Oct 19 08:59:02 FWT user.info mctl: Handling message "+COPS: 0,0,"",2" from atd Oct 19 08:59:02 FWT user.debug mctl: Calling: 0x9ea0 Oct 19 08:59:02 FWT user.info mctl: Handling message "OK" from atd Oct 19 08:59:02 FWT user.debug mctl: Calling: 0x9864 Oct 19 08:59:02 FWT daemon.info ttyrelayd: Client disconnected. Oct 19 08:59:02 FWT user.notice root: Status for /sbin/service exited with exit code 0. Oct 19 08:59:02 FWT user.info mctl: Executing command at+creg? Oct 19 08:59:02 FWT daemon.info ttyrelayd: New client connected to /dev/modemctl. Oct 19 08:59:02 FWT user.info mctl: Handling message "+CREG: 0,5,0070,0003" from atd Oct 19 08:59:02 FWT user.debug mctl: Calling: 0x9ea0 Oct 19 08:59:02 FWT user.info mctl: Handling message "OK" from atd Oct 19 08:59:02 FWT user.debug mctl: Calling: 0x9864 Oct 19 08:59:02 FWT daemon.info ttyrelayd: Client disconnected. Oct 19 08:59:15 FWT daemon.info cddb: User uid=0 connected to UNIX socket. Oct 19 08:59:18 FWT daemon.warn cddb: cmap_syslog: "log_crit" is not a valid log level. Oct 19 08:59:37 FWT user.notice kernel: Kernel log daemon exiting. Oct 19 08:59:38 FWT syslog.info System log daemon exiting.

Use Ctrl-C to abort the tail –f command.

To specify a specific amount of messages to be displayed, the command can be entered as follows:

$ tail –30 /var/log/messages

In this example, the last 30 messages in the syslog will be displayed.

To display the complete logging information, use the following command:

$ cat /var/log/messages

10.3 Display Interface Status The st command is used for reading out status and statistics information for interfaces.

$ st help Usage: /bin/st { usb | lan | wan | wlan | nat | natverbose | system | wan-stats | tel | pm }

Commands: usb Print USB status lan Print LAN interface statistics wan Print WAN interface information wlan Print WLAN interface information nat Print number of sessions natverbose Print verbose information about sessions system Print basic system information wan-stats Print WAN interface statistics tel Print telephony information pm Print PM status

Page 107: Ericsson W25 Administrator Manual

Management Tools

6/1551-CRH 102 167 Uen Rev C 2007-06-08 97

The following subsections provide examples of the printouts from the above commands.

10.3.1 Basic System Information

To display basic system information, enter:

$ st system

The output is similar to the following example:

Product: Ericsson W25 Data & Voice Terminal Product Type: W25 Product Id: KRC 101 1460 R1A Serial Number: T710111902 Boot Loader: CXC 172 1003 R3A (Nov 16 2006) Application Software: CXC 172 3158 R6A (April 24 2007) Ethernet MAC Address: 00:80:37:8D:81:90 WLAN MAC Address: 00:80:37:8D:81:91 IMEI: 352679010034366

10.3.2 LAN Interface Status To read out link status of each physical LAN port as well as traffic counters for the LAN interface, enter the following command:

$ st lan

The output is similar to the following example:

Ethernet Switch Link Status Port 1 2 3 4 up down down down

LAN Interface MAC: 00:80:37:8D:81:90 IP: 192.168.1.1 Netmask: 255.255.255.0 Transmit: 1.9 MiB (16332 packets) Receive: 1.4 MiB (21508 packets)

10.3.3 WAN Interface Information To read out status and information for the WAN interface, enter the following command:

$ st wan The output is similar to the following example:

Page 108: Ericsson W25 Administrator Manual

Management Tools

98 6/1551-CRH 102 167 Uen Rev C 2007-06-08

WAN interface Connection: HSDPA Operator Name: MNC: 99 MCC: 262 Network Registration: Roaming Average CQI: 11 Strongest cells Signal Level: Ec/Io: RSCP: |*****| -3.0 dB -74 dBm |*****| -5.0 dB -87 dBm |**** | -10.0 dB -110 dBm

WAN IP: 172.17.2.240 Netmask: 255.255.255.255 DNS1: 172.16.5.2 DNS2: 172.16.5.3 Transmit: 1.6 KiB (46 packets) Receive: 4.0 KiB (45 packets) Errors: 0 packets Dropped: 0 packets Overruns: 0 packets

The “Average CQI” (Channel Quality Indicator) is only applicable when an HSDPA link is up and running (has downlink traffic).

The “Strongest cells” part shows signal information for the three strongest cells that the Ericsson W25 currently uses for connection.

Note: If the WAN connection is unacceptable slow or regularly dropping, an external antenna (indoor window or outdoor roof mounted) may improve reception. Such antennas are available as accessories for the Ericsson W25.

10.3.4 WAN Interface Statistics

To display statistics of the WAN interface, enter the following command:

$ st wan-stats

The output is similar to the following example:

RSCP values (dBm): -90 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -91 -85 -86 -88 -89 -88 -88 -83 -87 -90 -91 -92

Daily min: -65 -65 - Daily average:

Page 109: Ericsson W25 Administrator Manual

Management Tools

6/1551-CRH 102 167 Uen Rev C 2007-06-08 99

-65 -65 - Daily max: -65 -65 - Ec/Io values (dB): -6 -4 -4 -4 -8 -5 -3 -4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Daily min: -6 -6 - Daily average: -6 -6 - Daily max: -6 -6 -

Both the sections “RSCP values (dBm):” and “Ec/Io values (dB):” display a value for each 15 minutes interval for 24 hours (24 hour clock).

For each daily interval for 1 month (i.e. up to 31 days) the following is also displayed:

• “Daily min:” Minimum value (minimum 15 min value in the last 24 hour period).

• “Daily average:” Average value (sum of the last 15 minute values for the last 24 hour period/number of 15 minute values).

• “Daily max:” Maximum value (maximum 15 min value in the last 24 hour period).

Note: An RSCP threshold level can be configured (see section 5.2 - RSCP Alarm Threshold). When the current RSCP level is below the configured alarm threshold, an alarm is raised and sent to both syslog and remote syslog.

10.3.5 WLAN Interface Information

To display WLAN interface status and information, use the following command:

$ st wlan

Page 110: Ericsson W25 Administrator Manual

Management Tools

100 6/1551-CRH 102 167 Uen Rev C 2007-06-08

The output is similar to the following example:

WLAN Interface Enabled: true Region: Europe Radio Frequency Channel: Auto Selection Transmit Power (dbm): 20 Network Name (SSID): FWT SSID Broadcast Enabled: true Connected Devices - Security Authentication: Open Whitelist Enabled: true 02:44:ba:1a:83:09 00:65:33:ca:01:20

10.3.6 USB Interface Status

To display status of connected USB devices, enter the following command:

$ st usb

The output is similar to the following examples:

Device Id: 09C0BA6150E0A938 Vendor: Verbatim Product: Store ´n´ Go Class: Mass Storage Speed: High Speed (480 Mbit/s) File System: Capacity: Used:

Device Id: HU55W0412150912450 Vendor: EPSON Product: USB Printer Class: Printer Speed: Full Speed (12 Mbit/S)

Note: Some fields may be blank depending on the connected USB device(s) capabilities.

10.3.7 NAT Statistics To display NAT statistics regarding number of sessions, enter the following command:

$ st nat

Page 111: Ericsson W25 Administrator Manual

Management Tools

6/1551-CRH 102 167 Uen Rev C 2007-06-08 101

The output is similar to the following example:

Sessions Current number of session: 3 Maximum allowed number of sessions: 2048

To display NAT verbose information about sessions, enter the following command:

$ st natverbose

The output is similar to the following example:

Sessions Protocol Source Address Destination Address State udp 192.168.1.111:137 192.168.1.1:137 - udp 192.168.1.1:137 192.168.1.255:137 - Current number of tcp/udp sessions: 2 Current number of session: 2 Maximum allowed number of sessions: 2048

10.3.8 Telephony Interface Status To display status of the telephony interfaces (ports), enter the following command:

$ st tel

The output is similar to the following example:

Telephony Line Status Phone line: On-Hook Phone/Fax line: Off-Hook

The output shows the status of the telephony ports and can be:

• On-Hook – Line not looped (phone on hook)

• Off-Hook – Line looped (phone off hook)

10.3.9 Power Management Service Information

To display information about power management, enter the following command:

$ st pm

The output is similar to the following example:

Power failures: 0 times Battery runouts: 0 times Time on battery: 0s

Page 112: Ericsson W25 Administrator Manual

Management Tools

102 6/1551-CRH 102 167 Uen Rev C 2007-06-08

The “Power failures” value shows the number of times the Ericsson W25 has been operating on the standby battery.

The “Battery runouts” value shows the number of times the standby battery in the Ericsson W25 has run out.

The “Time on battery” value shows the time (in seconds) that the Ericsson W25 has been operating on the standby battery.

10.3.10 Interface Statistics To display status for all configured interfaces, enter the following command:

$ ifconfig

The output is similar to the following example:

br0 Link encap:Ethernet HWaddr 00:80:37:8D:64:5E inet addr:192.168.1.1 Bcast:192.168.1.255 mask:255.255.255.0 UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:150 errors:0 dropped:0 overruns:0 frame:0 TX packets:233 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:15411 (15.0 KiB) TX bytes:112202 (109.5 KiB)

ixp0 Link encap:Ethernet HWaddr 00:80:37:8D:64:5E UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:150 errors:0 dropped:0 overruns:0 frame:0 TX packets:212 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:256 RX bytes:17919 (17.4 KiB) TX bytes:109734 (107.1 KiB)

lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:23 errors:0 dropped:0 overruns:0 frame:0 TX packets:23 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:8776 (8.5 KiB) TX bytes:8776 (8.5 KiB)

ppp0 Link encap:Point-Point Protocol inet addr:172.17.2.240 P-t-P:192.168.200.10 Mask:255.255.255.255 UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1500 Metric:1 RX packets:45 errors:0 dropped:0 overruns:0 frame:0 TX packets:46 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:3 RX bytes:4173 (4.0 KiB) TX bytes:1688 (1.6 KiB)

wlan0 Link encap:Ethernet HWaddr 00:80:37:8D:64:5F UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:143 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) Interrupt:19

Page 113: Ericsson W25 Administrator Manual

Management Tools

6/1551-CRH 102 167 Uen Rev C 2007-06-08 103

10.4 TEMS Investigation The Ericsson W25 supports TEMS Investigation.

Note: The TEMS product support is intended for the module used within this unit. Once it is supported, the Ericsson W25 software has been developed to support its function.

TEMS Investigation is the industry-leading tool for troubleshooting, verification, optimization, and maintenance of mobile networks. Offering data collection, real-time analysis, and post-processing all in one, TEMS Investigation is a complete solution for all of a network operator’s daily network optimization tasks.

TEMS Investigation connects to the Ericsson W25 via a virtual serial port. The virtual serial port is tunneled over TCP port 1895 when enabled. The PC that runs the TEMS Investigation tool needs a virtual serial driver as well.

To enable/disable the TEMS investigation support, enter:

$ cf set tems.enabled true|false $ cf commit

To display the current status of TEMS investigation, use one of the following commands:

$ cf get tems.enabled false

$ cf show tems tems.enabled false

For further information about TEMS Investigation, visit the website http://www.ericsson.com/solutions/tems/.

Page 114: Ericsson W25 Administrator Manual

Web User Interface

104 6/1551-CRH 102 167 Uen Rev C 2007-06-08

11 Web User Interface

The web user interface (WUI) enables the end user to configure the Ericsson W25. This chapter describes the included web pages and configuration options available for the end user.

The WUI does not support all Ericsson W25 configurable features. For some settings it is necessary to use CLI commands (refer to the appropriate configuration section in previous chapters).

11.1 Access and Login to the WUI The WUI can only be accessed locally from a PC connected to either a physical LAN port or to the wireless interface.

The following web browsers are supported:

• Internet Explorer® 5.x or higher

• Safari® 1.3 or higher

• Firefox® 1.0 or higher

• Opera® 8 or higher.

From a web browser on the connected PC, the IP address (default 192.168.1.1) of the Ericsson W25 is entered. The User login page is displayed:

The default User name is user and the default Password is user. After a successful login, the Overview page is displayed:

Page 115: Ericsson W25 Administrator Manual

Web User Interface

6/1551-CRH 102 167 Uen Rev C 2007-06-08 105

The Overview page provides the following functions:

• The possibility to change password using the Change Password button in the upper right corner. See section 11.1.1 – Change Password.

• The Configuration Wizard… button which is the entrance to the step-by-step configuration wizard recommended to use for first time settings. See section 11.2 – Configuration Wizard.

• The “ALARMS” section where detected error conditions are specified. See section 11.1.2 – Alarms for more information. If an alarm occurs, the Alarm indicator (on the front of the Ericsson W25) is red.

• The left-hand menu that includes configuration topics for additional configuration.

• The “NETWORK INFORMATION” section where the most important connection status information is collected. This information (among others) is also found on the Internet and LAN web pages respectively.

Each page in the WUI also includes a Logout button (to the right in the upper banner).

Page 116: Ericsson W25 Administrator Manual

Web User Interface

106 6/1551-CRH 102 167 Uen Rev C 2007-06-08

The WUI has an inactivity timeout set to 15 minutes. Before this timeout expires, it is preceded by a notification (displayed on top of the page) one minute before the automatic logout:

When this timeout expires, the User login page is displayed with an information text about the automatic logout:

11.1.1 Change Password

To change the current password, click the Change Password button to display the Change Password page:

The current and new passwords are entered in the corresponding fields. A password can include up to eight (8) characters (letters and/or numbers).

Note: The password is case sensitive and must be entered exactly as specified here (distinguish between uppercase and lowercase letters).

The new password is confirmed by clicking the OK button.

Page 117: Ericsson W25 Administrator Manual

Web User Interface

6/1551-CRH 102 167 Uen Rev C 2007-06-08 107

11.1.2 Alarms

The “ALARMS” section includes detected active error conditions.

Events that generate an alarm are such that make it impossible to send or receive data, e.g. SIM card missing.

If there are no alarms currently detected the text “No alarms detected” is displayed. If an alarm is detected, the Alarm indicator on the Ericsson W25 front panel is lit (red), and the corresponding cause is displayed according to the table below:

Table 14 Alarm causes

Alarm indication Description

No SIM card detected There is no SIM card detected, or the SIM card has not been inserted correctly.

Invalid SIM card inserted The inserted SIM card is not valid.

No PIN code entered No PIN code has been entered to activate the Internet and voice services.

Incorrect PIN code entered The entered PIN code is not correct.

SIM card blocked The SIM card has been blocked (due to entering the wrong PIN code three times). The PUK is required to unblock the SIM card.

SIM card permanently blocked

The SIM card has been permanently blocked (due to entering the wrong PUK code ten times). A new SIM card is required.

Alarm detection not working

The alarm detection is currently not working.

Unknown alarm An alarm that cannot be identified has occurred.

11.1.3 Network Information

The “NETWORK INFORMATION” section includes a selection of the most important connection status information. This information (among others) is also found on the Internet and LAN web pages respectively described in separate sections ( 11.3 and 11.4).

Page 118: Ericsson W25 Administrator Manual

Web User Interface

108 6/1551-CRH 102 167 Uen Rev C 2007-06-08

Details about the following items are displayed:

Table 15 Network Information details

Text/Symbol Description

The mobile network (UMTS or GSM) signal quality available at the Ericson W25 location. The signal quality affects the performance of the unit. If two or more bars are green, the connection is usually acceptable.

IP address: The WAN IP address.

Connection: The mobile network currently used for the connection. Can be one of the following: HSDPA UMTS GPRS EDGE.

Service provider: The name of, or other reference to, the mobile network operator.

Network registration: The current state of the mobile network registration. Can be one of the following: Not registered, not searching Registered, home network Searching Registration denied Unknown Roaming Limited Service

LAN W25 IP address: The local IP address of the Ericsson W25.

11.2 Configuration Wizard The Configuration Wizard provides step-by-step instructions for basic configuration of WAN access and optionally for the WLAN access point.

In the Quick Installation Guide, the end-user is recommended to use this wizard for first time settings. The wizard can also be used for example if a reset to default configuration has been performed.

The wizard is started by clicking the Configuration Wizard… button on the Overview page.

Page 119: Ericsson W25 Administrator Manual

Web User Interface

6/1551-CRH 102 167 Uen Rev C 2007-06-08 109

11.2.1 Internet Access

The first part of the wizard includes settings for Internet access. Depending on the current service setup, the requests for authentication may differ and only details provided by the service provider should be entered, leaving other fields blank.

“SIM AUTHENTICATION” includes entering a PIN code associated to the provided SIM card.

Note: An emergency call (e.g. 112 or 009) can always be made even without a SIM card inserted or without having to enter a correct PIN code.

If the SIM card requires no PIN authentication, this is stated (as shown in the example below):

When “PIN required” is stated, the provided PIN code must be entered.

If “Remember my PIN” also is selected the SIM authentication will be executed automatically in the future (in case of a system restart).

Page 120: Ericsson W25 Administrator Manual

Web User Interface

110 6/1551-CRH 102 167 Uen Rev C 2007-06-08

The PIN code can also be entered using a phone connected to the Ericsson W25. See chapter 12 - SIM Authentication via Phone.

If an incorrect PIN code is entered three (3) times, the SIM card is blocked and the PUK code is needed to unblock the SIM card and to set a new PIN code. In this case, the button Unblock SIM is displayed.

When entering a PUK code, the end-user has ten (10) attempts to give a correct key. After that, the SIM card is permanently blocked and a new SIM card has to be supplied by the operator.

The APN (if needed) is provided by the service provider and separate APN’s can be entered for the 3G and 2G networks.

Page 121: Ericsson W25 Administrator Manual

Web User Interface

6/1551-CRH 102 167 Uen Rev C 2007-06-08 111

If the service provider uses PPP as authentication method for Internet access, the supplied user name and password should be entered.

11.2.2 Wireless LAN

The second part of the wizard includes settings for the wireless LAN:

The WLAN interface is disabled by default to comply with national regulatory requirements, since the country code must be set before enabling the radio. To enable the WLAN interface, check the “Enable WLAN” checkbox.

Note: The WLAN interface will not be activated until the complete configuration details are entered.

Page 122: Ericsson W25 Administrator Manual

Web User Interface

112 6/1551-CRH 102 167 Uen Rev C 2007-06-08

Wireless devices are thoroughly regulated and the countries have slightly different regulations. Therefore, the region where the Ericsson W25 is used must be stated to make sure the correct radio frequencies are used when transmitting data. The “Region” drop-down list includes the following regions: Australia, Canada, Europe, Malaysia, New Zeeland, Singapore, South Africa, and US.

The radio channel should be in accordance with the previous set region and only channels that are allowed in the configured region are available in the “Radio channel” drop-down list.

By selecting “Auto” the radio will scan each valid channel and choose the one with least interference.

Page 123: Ericsson W25 Administrator Manual

Web User Interface

6/1551-CRH 102 167 Uen Rev C 2007-06-08 113

The “Network Name (SSID)” is by default set to “FWT” but can be changed. SSID names are case sensitive and can contain up to 32 alphanumeric characters (a-z, 0-9, -).

If “Enable SSID Broadcast” is selected, the SSID will be broadcasted and answer to any wireless device(s) scanning the air. If the checkbox is cleared the SSID will be hidden and in this case the SSID has to be provided manually to every wireless client where access is to be granted.

Wireless security (authentication and data encryption) is used to restrict access to the wireless network. Which authentication and encryption method that should be used depends on what is supported by the connected wireless client(s).

The following authentication modes can be selected from the “Authentication” drop-down list: None, WEP (64 bit), WEP (128 bit), WPA and WPA2.

Note: WPA is supported as standard only in Windows XP SP2 and Vista.

If “None” is selected, no further configuration is needed and the wizard confirmation page is displayed (see section 11.2.3 – Wizard Confirmation).

For “WEP” and “WPA” modes additional configuration is needed, such as network key and pass phrase as shown in the following pictures:

Page 124: Ericsson W25 Administrator Manual

Web User Interface

114 6/1551-CRH 102 167 Uen Rev C 2007-06-08

For WEP a private network key is needed. A 64-bit data encryption key includes 10 characters. A 128-bit data encryption key includes 26 characters. Only the hexadecimal numbers 0-9 and letters a-f are allowed.

This network key must also be manually configured on each client in the wireless network.

Page 125: Ericsson W25 Administrator Manual

Web User Interface

6/1551-CRH 102 167 Uen Rev C 2007-06-08 115

For WPA and WPA2 modes a pass phrase is needed. This pass phrase is case sensitive and consists of between 8 and 63 optional characters. It is recommended that the pass phrase contains at least 20 characters.

The pass phrase entered here must also be configured on the wireless client(s).

11.2.3 Wizard Confirmation The last page in the Configuration Wizard displays a summary of the settings configured on previous pages:

Page 126: Ericsson W25 Administrator Manual

Web User Interface

116 6/1551-CRH 102 167 Uen Rev C 2007-06-08

The Previous button is used to return to previous pages and make changes. Cancel exits the wizard without saving any settings. The Finish button confirms the displayed settings and the Ericsson W25 automatically starts searching for a network.

Page 127: Ericsson W25 Administrator Manual

Web User Interface

6/1551-CRH 102 167 Uen Rev C 2007-06-08 117

11.3 Internet The Internet web page includes status information and settings for the connection to the mobile network:

11.3.1 Mobile Network Connection Details The Ericsson W25 connects to the UMTS (3G) network when it is available and uses the GSM/GPRS/EDGE (2G) network as fallback. The following information is displayed regarding the connection to the mobile network:

Table 16 Mobile network connection details

Text/Symbol Description

The mobile network (UMTS or GSM) signal quality available at the Ericson W25 location. The signal quality affects the performance of the unit. If two or more bars are green, the connection is usually acceptable.

Page 128: Ericsson W25 Administrator Manual

Web User Interface

118 6/1551-CRH 102 167 Uen Rev C 2007-06-08

Text/Symbol Description

Link status: The status of the link. Can be either Up or Down.

Mode: The protocol/mode used for the connection. Can be PPP (Point-to-Point Protocol).

Connection: The mobile network currently used for the connection. Can be one of the following: HSDPA UMTS GPRS EDGE.

Service provider: The name of, or other reference to, the mobile network operator.

Network registration: The current state of the mobile network registration. Can be one of the following: Not registered, not searching Registered, home network Searching Registration denied Unknown Roaming Limited Service

IP address: The WAN IP address (automatically assigned by the operator).

DNS 1: The IP address of the primary DNS server.

DNS 2: The IP address of the secondary DNS server.

11.3.2 Traffic Statistics

The “TRAFFIC STATISTICS” section includes the following information:

Table 17 Traffic Statistics information

Text Description

Transmitted packets: The total size (and number) of transmitted data packets.

Received packets: The total size (and number) of received data packets.

Error: The number of invalid data packets.

Overruns: The number of packets lost due to too many incoming data packets.

Page 129: Ericsson W25 Administrator Manual

Web User Interface

6/1551-CRH 102 167 Uen Rev C 2007-06-08 119

Text Description

Dropped: The number of dropped data packets.

Note: The data size and packet counters have the upper limits of 4 GiB and 232 packets (more than 4 billion packets). When these limits are reached, the counters wrap around to zero.

11.3.3 Authentication

The “AUTHENTICATION” section includes settings needed for authentication. These settings are also included in the Configuration Wizard.

Table 18 Authentication configuration details

Text Description

PIN: The PIN code used for SIM authentication. If “Remember my PIN” is selected the SIM authentication will be executed automatically in the future (in case of a system restart).

APN (3G): The 3G Access Point Name, which is a reference to the UMTS Internet access point.

APN (2G): The 2G Access Point Name, which is a reference to the GPRS/EDGE Internet access point.

PPP user name: The PPP User name when PPP is used for authentication.

PPP password: The PPP Password when PPP is used for authentication.

11.3.4 Change PIN If SIM authentication is verified, the PIN field cannot be edited. Instead the Change PIN button is used displaying a new page where old and new PIN codes can be entered.

11.3.5 Unblock SIM If three attempts have been made with an incorrect PIN, the SIM card is blocked and the Unblock SIM button is displayed. To unblock the SIM the PUK code and a new PIN code has to be entered on the Unblock SIM page.

Page 130: Ericsson W25 Administrator Manual

Web User Interface

120 6/1551-CRH 102 167 Uen Rev C 2007-06-08

11.4 LAN The LAN web page includes settings for the connection between the Ericsson W25 and other local devices as well as port status and traffic statistics for the LAN:

11.4.1 LAN IP Address The default LAN IP address and subnet mask can be changed.

Note: If the LAN IP address is changed, the connection will be closed and the web browser has to be redirected to the new IP address.

Page 131: Ericsson W25 Administrator Manual

Web User Interface

6/1551-CRH 102 167 Uen Rev C 2007-06-08 121

11.4.2 DHCP Server

The included DHCP server assigns dynamic IP addresses to local clients.

The DHCP server can be disabled if the user already has a DHCP server running in the local network.

The default IP address range (192.168-1.2 – 192.168.1.100) can be changed but must always be on the same subnet as the Ericsson W25 LAN IP address. The LAN IP address itself must not be included.

Note: The port forwarding rules on the NAT page must comply with these settings.

The maximum lease time can be changed from the default 7200 seconds (2 hours). A valid value must be within the interval 60 seconds (minimum) to 2147483647 seconds (maximum).

11.4.3 Traffic Statistics

The “TRAFFIC STATISTICS” section includes the following information for the LAN interface:

Table 19 LAN Traffic Statistics information

Text Description

Transmitted: The total size (and number) of transmitted data packets.

Received: The total size (and number) of received data packets.

11.4.4 LAN Port Status The “LAN PORT STATUS” section displays the link status of each physical LAN port (LAN 1-4). The status for each port is either green (Up) or red (Down).

Page 132: Ericsson W25 Administrator Manual

Web User Interface

122 6/1551-CRH 102 167 Uen Rev C 2007-06-08

11.5 Wireless LAN The Wireless LAN web page includes configuration settings for the WLAN interface and connected wireless devices:

11.5.1 Enable WLAN The wireless LAN is disabled by default and may be enabled from the Configuration Wizard or on this page by checking the “Enable WLAN” checkbox.

Note: The wireless setup requires configuration of both the Ericsson W25 and the wireless clients.

11.5.2 Region

To ensure the Ericsson W25 operates on correct radio frequencies according to local regulations, the region where the Ericsson W25 is used must be stated. The “Region” drop-down list includes the following regions: Australia, Canada, Europe, Malaysia, New Zeeland, Singapore, South Africa, and US.

11.5.3 Radio Channel

The radio channel should be in accordance with the previous set region and only channels allowed in the configured region are available in the “Radio channel” drop-down list.

Page 133: Ericsson W25 Administrator Manual

Web User Interface

6/1551-CRH 102 167 Uen Rev C 2007-06-08 123

By selecting “Auto” the radio will scan each valid channel and choose the one with least interference.

11.5.4 Transmit Power [dBm]

To avoid interference with other wireless networks, the transmit power level can be reduced. The “Transmit power [dBm]” drop-down list includes a range from 0 to 20 dBm.

11.5.5 Scan for Wireless Networks

To get information about adjacent wireless networks, the button Scan for wireless networks is used. When the scanning is finished, a list is presented showing information about wireless clients that are nearby:

For each found client, the list shows the MAC address used, the network name (SSID), which channel it uses and the RSSI. The RSSI is a link indication expressed in dBm to show the signal strength.

11.5.6 Network Name (SSID)

The default network name (SSID) can be changed to any combination of numbers (0-9), letters (a-z), and hyphens (-) with a maximum length of 32 characters.

If “Enable SSID broadcast” is selected, the local wireless clients will find the network name when scanning the air. If not, the name is hidden and has to be manually provided to wireless clients.

Note: The network name (SSID) is case sensitive.

11.5.7 Authentication

Authentication is used to restrict access to the wireless network and the following authentication methods can be selected from the “Authentication” drop-down list: None, WEP (64-bit), WEP (128-bit), WPA, and WPA2.

Page 134: Ericsson W25 Administrator Manual

Web User Interface

124 6/1551-CRH 102 167 Uen Rev C 2007-06-08

Note: It is important that the operating system and wireless LAN interface of the wireless client supports the selected authentication method.

If WEP (64-bit) or WEP (128-bit) is selected a key for encryption must be entered in the “Passphrase / Key” field. A 64-bit data encryption key includes 10 characters and a 128-bit encryption key includes 26 characters. Only the hexadecimal numbers 0-9 and letters a-f are allowed.

For WPA or WPA2, a passphrase for authentication and encryption must be entered in the “Passphrase / Key” field. The passphrase is case sensitive and consists of between 8 and 63 optional characters.

11.5.8 Connected Devices

The “CONNECTED DEVICES” list includes the MAC addresses of wireless devices currently connected to the Ericsson W25.

11.5.9 Whitelist

The whitelist includes the MAC addresses to wireless client(s) currently granted access to the Ericsson W25. Up to 20 clients can be added to the list.

To add a client to the list, a MAC address can be copied from the “Connected Devices” list or entered in the “Whitelist” field.

Page 135: Ericsson W25 Administrator Manual

Web User Interface

6/1551-CRH 102 167 Uen Rev C 2007-06-08 125

11.6 NAT The NAT web page includes settings for UPnP IGD, ALGs and Port Forwarding.

Note: NAT is enabled by default and cannot be disabled from the WUI.

11.6.1 UPnP IGD

The Ericsson W25 supports the UPnP IGD (Internet Gateway Device) standard which provides automatic port forwarding for certain Internet applications.

11.6.2 ALGs

The Ericsson W25 includes ALG support for FTP and TFTP. The supported ALGs can be enabled and disabled individually.

11.6.3 Port Forwarding

The “PORT FORWARDING” section displays the port forwarding instances currently configured and the buttons Delete and Edit for each of them.

Page 136: Ericsson W25 Administrator Manual

Web User Interface

126 6/1551-CRH 102 167 Uen Rev C 2007-06-08

To add a new instance to the list, the Add Instance button is used.

Note: The “Server IP” address must comply with the LAN IP address range previously defined.

If multiple ports or port ranges are required, a new port entry for each port or port range must be added.

Page 137: Ericsson W25 Administrator Manual

Web User Interface

6/1551-CRH 102 167 Uen Rev C 2007-06-08 127

11.7 Sharing The Sharing web page includes information about network sharing (available through the USB ports).

It is possible to have two USB storage devices or one storage device and a USB printer connected to the Ericsson W25 at the same time.

When an external hub is connected, the Ericsson W25 supports connection of up to two storage devices and one printer at the same time.

All devices in the local network that want to access a USB shared device or connected printer must belong to the same workgroup as the Ericsson W25.

11.7.1 Shared Storage Devices The “SHARED STORAGE DEVICES” section includes information about currently connected storage devices.

The included files are shared with all devices on the local network (LAN/WLAN) and local users have full access to the shared files.

Page 138: Ericsson W25 Administrator Manual

Web User Interface

128 6/1551-CRH 102 167 Uen Rev C 2007-06-08

Note: If a shared storage device contains more than one partition, only the first partition is shared.

The “Share name” is used to access the storage device from a PC on the LAN/WLAN. The name can be changed.

Note: If a “Share name” includes more than 12 characters or has embedded spaces, the share name will not be visible in Windows 95, 98 or ME clients.

11.7.2 Shared Printer

The “SHARED PRINTER” section displays information about a printer connected to one of the USB ports.

The “Share name” is used to access the printer from a PC on the LAN/WLAN. The name can be changed.

Note: If a Share name includes more than 12 characters or has embedded spaces, the share name will not be visible in Windows 95, 98 or ME clients.

Page 139: Ericsson W25 Administrator Manual

Web User Interface

6/1551-CRH 102 167 Uen Rev C 2007-06-08 129

11.8 System The System web page includes system information and management functions used to update and restore the Ericsson W25.

Page 140: Ericsson W25 Administrator Manual

Web User Interface

130 6/1551-CRH 102 167 Uen Rev C 2007-06-08

11.8.1 Basic System Information

The upper part of the page displays basic system information about the Ericsson W25.

11.8.2 Configuration Backup and Restore It is possible to save a backup copy of the current configuration and to restore a configuration from a previously stored backup file.

Note: The configuration file must not be modified. All configuration changes should be made on the web pages.

11.8.3 Restart

A restart of the Ericsson W25 can be done by clicking the Restart button. A restart does not result in any configuration changes.

11.8.4 Software Update

New Ericsson W25 software versions can be either automatically or manually installed.

11.8.4.1 Automatic Software Installation

When “Enable automatic software update” is checked, the Ericsson W25 will at regular intervals (set in the “Update poll interval [days]” field) poll the update server for updates. If there is a software image available for download the upgrade process is initiated.

Note: The update server configuration must be issued from the CLI.

To manually check for new software versions, click the Check button. If there is not a new software version available, the following information message “There were no available software updates” is displayed.

Otherwise, information is displayed about how to initiate the software update.

11.8.4.2 Installing new Software from File

To install new software from a local file, use the Browse… button to locate the file. The selected file will be displayed in the “Update the system with new software” field. The Software Update Initiated and Software Update Complete pages will be displayed.

Page 141: Ericsson W25 Administrator Manual

Web User Interface

6/1551-CRH 102 167 Uen Rev C 2007-06-08 131

11.8.5 Factory Reset

To reset the Ericsson W25 configuration to its factory default settings click the Reset button.

If the WUI is not accessible, a reset to the default configuration can be done using the Reset button on the unit by following the steps below:

1. Disconnect the power cable or from the Ericsson W25. If the battery is used as power supply, disconnect the battery cable.

2. Press and hold the Reset button with the tip of a pen and then reconnect the power cable. Keep the button pressed for at least 20 seconds.

3. The Ericsson W25 will restart and come online with the factory default settings.

Page 142: Ericsson W25 Administrator Manual

Web User Interface

132 6/1551-CRH 102 167 Uen Rev C 2007-06-08

11.9 Event Log The Event Log web page displays the Ericsson W25 system log:

Each row in the list displays the time and date when an alarm occurred, the type of alarm, and a brief statement indicating its cause.

Note: The internal clock is not a real time clock. The date and time will be reset every time the unit is restarted.

The Refresh button is used to update the list with new information. A filter level (Alarms only or All) can be selected to restrict the view to a selection of the logs. The Alarms only log level corresponds with the Alarm indicator on the Ericsson W25 unit and the information in the “Alarms” section on the Overview page.

If ”Persistent logging” is enabled, the logs will remain after a system restart.

Note: Persistent logging should only be used for debugging purposes since it consumes flash memory.

Page 143: Ericsson W25 Administrator Manual

SIM Authentication via Phone

6/1551-CRH 102 167 Uen Rev C 2007-06-08 133

12 SIM Authentication via Phone

Normally, a PIN code is needed to activate the Ericsson W25 Internet and voice services. In some cases however, authentication is not required and it is possible to use the services without entering any PIN.

Note: Emergency calls (i.e., 112 or 009) can always be made, even without a SIM card or the correct PIN code.

The following describes the steps to enter the PIN code via a phone connected to the Ericsson W25. The “PIN required” and “PUK required” tones are described in the table on the next page.

4. Pick up the telephone handset. If the normal dial tone is heard, no PIN code is needed. If the “PIN required” tone is heard the PIN code is needed.

5. Dial * <PIN> # If the PIN is correct, the normal dial tone sounds. This tone indicates that the voice service is activated and it is possible to make phone calls. If the PIN is incorrect, the “PIN required” tone is heard again.

Note: If three attempts have been made with the wrong PIN, the SIM card is blocked. In this case a new tone sounds indicating that the PUK is required to unblock the card.

To unblock the SIM card, dial the following sequence: * <PUK> * <new PIN> * <new PIN> #

If the PUK is correct and the new PIN codes agree, the dial tone sounds.

If the PUK is incorrect or the new PIN codes do not agree, the “PUK required” tone sounds again. Repeat the “unblock SIM card” sequence above.

Note: If ten attempts have been made with an incorrect PUK, the SIM card is permanently blocked and a new SIM card is required.

Page 144: Ericsson W25 Administrator Manual

SIM Authentication via Phone

134 6/1551-CRH 102 167 Uen Rev C 2007-06-08

Information Tones The Ericsson W25 generates information tones in the telephone handset, thus providing the same characteristics as the one given by the traditional fixed line network.

The following table describes the nature of the unique information tones for the Ericsson W25:

Name Nature Description

PIN required ––––– 50 ––––– 50 200 200

Repeating 200 ms tone at regular 50 ms intervals.

SIM authentication is required to enable the telephony service.

PUK required –– 50 –– 50 50 50

Repeating 50 ms tone at regular 50 ms intervals.

The SIM card is blocked. The PUK and a new PIN are required to unblock the SIM card.

Page 145: Ericsson W25 Administrator Manual

Appendix A Technical Specifications

6/1551-CRH 102 167 Uen Rev C 2007-06-08 135

Appendix A Technical Specifications

This appendix provides a hardware and OS overview as well as some technical specifications for the Ericsson W25.

Housing

The Ericsson W25 is mainly intended for wall mounting and all connectors are facing downwards to allow for easy access.

The unit has the following dimensions (H x W x D): 244x149x48 mm and weights 470 g.

Battery Backup The Ericsson W25 can be fitted with a rechargeable battery to provide redundancy in case of an AC Mains power failure. The battery is available as an accessory and is facilitated within the unit. Additionally there is an internal battery charger that can recharge the battery.

Page 146: Ericsson W25 Administrator Manual

Appendix A Technical Specifications

136 1366/1551-CRH 102 167 Uen Rev C 2007-06-08

Connectors

The table below provides a description of the connectors:

Table 20 Connectors

Label Description

10-28 VDC Power input for connecting the power supply adapter. Power adapter input: 100 – 240 VAC, 50-60 Hz. Power adapter output: 12 VDC. Power consumption data usage: 9.0 W (typical) and 16.2 W (maximum).

Reset Button used to restore the Ericsson W25 configuration to factory default settings.

USB USB connectors, for connecting USB devices to the unit.

Phone Telephone connector (RJ11), for connecting the Ericsson W25 to one or more phone.

Phone/Fax Telephone/Fax connector, for connecting the Ericsson W25 to a telefax or a phone.

LAN 1 - 4 Ethernet LAN connectors (RJ45), for connecting the Ericsson W25 to client PCs or an Ethernet switch/hub.

SIM Card The SIM card (standard USIM, 3V) goes into the top slot with its connectors facing the front of the unit and with the notch upwards.

Page 147: Ericsson W25 Administrator Manual

Appendix A Technical Specifications

6/1551-CRH 102 167 Uen Rev C 2007-06-08 137

LED Indicators The operational status of the Ericsson W25 can be determined with the help of the LED indicators on the front panel. A general description of each LED is provided in the table below:

Table 21 LED Indicators

Text Status Description

Power Green Red Unlit

Mains powered. Battery powered. (Batteries are available as an accessory to the Ericsson W25) Power is off.

Mobile Network Green Red Flashing Unlit

Connection to a UMTS network. Connection to a GSM network. Searching for a connection. No connection to the mobile network.

Internet Green Unlit

Connection to Internet established. No Internet connection.

Wireless LAN Green Unlit

The wireless LAN is active. The wireless LAN is inactive.

Message Waiting Green Unlit

New voice mail message(s) received. No new voice mail messages.

Alarm Red Unlit

Error. Various error conditions (specified on the Overview web page and as an “error” message in the syslog). No error.

Each Ethernet connector has two built-in indicators.

The left indicator shows the speed of data traffic between the Ericsson W25 and the connected client. If the speed is 100 Mbps, the indicator is green. When the indicator is unlit, the speed is 10 Mbps.

The indicator to the right is green when a LAN connection is established and flashes to show data traffic activity.

OS and File System The Ericsson W25 runs a Linux operating system (2.6 Kernel) on an ARM processor based hardware platform.

Software is stored in flash memory. The design has 16 MB of flash and 32 MB SDRAM.

Page 148: Ericsson W25 Administrator Manual

Appendix A Technical Specifications

138 1386/1551-CRH 102 167 Uen Rev C 2007-06-08

To ensure reliable operation the Ericsson W25 has dual software images stored in separate flash partitions. If a flash upgrade should be interrupted due to power failure, there is always a last known good firmware image to boot from.

UMTS/GSM Radio Interfaces

The Ericsson W25 supports UMTS and GSM/GPRS/EDGE radio interfaces where UMTS is the default interface and GSM/GPRS/EDGE is optional and used as fallback for UMTS connectivity.

Data Transmission The Ericsson W25 offers both circuit switched and packet switched of data transmission. The table below summarizes typical and theoretical data rates:

Packet data service

Theoreticalmax data rate

Typical data rate

Category/ Multislot class

Upload 384 kbps Over 300 kbps HSDPA

Download 3.6 Mbps 500-800 kbps

Category 1-6 and 11

Upload 384 kbps Over 300 kbps WCDMA

Download 384 kbps Over 300 kbps

Upload 118 kbps 50-60 kbps

EDGE Download 236 kbps

100-130 kbps (with bursts over 200 kbps)

Multislot class 10 MCS 1-9

Upload 43 kbps 20 kbps GPRS

Download 86 kbps 40 kbps

Multislot class 10 CS 1-4

Table 22 - Data Transmission

Page 149: Ericsson W25 Administrator Manual

Appendix A Technical Specifications

6/1551-CRH 102 167 Uen Rev C 2007-06-08 139

Frequency Bands The Ericsson W25 supports frequency bands as shown in the table below:

Band Frequencies (MHz)

Conducted Rx sensitivity (dBm)

Conducted Transmit Power (dBm)

Band I UMTS 2100

Tx: 1920-1980 Rx: 2110-2170 < -109 +23

Band II UMTS 1900

Tx: 1850-1910 Rx: 1930-1990 < -109 +23

Band V UMTS 850

Tx: 824-849 Rx: 869-894 < -110 +23

GSM850 Tx: 824-849 Rx: 869-894 < -106

EGSM 900 Tx: 880-915 Rx: 925-960 < -106

+32 (GMSK)

+27 (8PSK)

DCS 1800 Tx: 1710-1785 Rx: 1805-1880 < -106

PCS 1900 Tx: 1850-1910 Rx: 1930-1990 < -106

+29 (GMSK)

+26 (8PSK)

Table 23 - Frequency Bands

UMTS/GSM Antenna The UMTS/GSM antenna is of standard dipole type (omni-directional in the horizontal plane), with a gain of 2 dBi. The antenna is penta-band supporting the 800/900/1800/1900/2100 MHz frequency bands. It is attached directly to the Ericsson W25 via an SMA antenna connector.

Telephony Interface

The Ericsson W25 includes dual POTS interface (FxS). The port marked “Phone” is the primary port to be used for making phone calls and the other port (marked “Phone/Fax”) is intended for fax machines and complementary telephony services.

Page 150: Ericsson W25 Administrator Manual

Appendix A Technical Specifications

140 1406/1551-CRH 102 167 Uen Rev C 2007-06-08

The ports are intended for on premises phones and should typically be connected to devices within one building. Short loops (max 500 ohm) is supported.

The maximum ringing load for each port is 3 REN (corresponding to three (3) old fashioned phones with mechanical bells or twenty (20) modern phones with electronic ringing).

Characteristic impedance, gain, current etc of the ports are controlled by software. DTMF dialing are supported. The ports have protection to prevent the unit to be damaged by ESD (Electro Static Discharge).

Wireless LAN (WLAN) Interface

The Ericsson W25 acts as a wireless Access Point (AP) supporting IEEE 802.11b/g standards.

IEEE 802.11b operates in the unlicensed 2.4 GHz band and can theoretically achieve 11 Mb/s. Practical throughput, ranges from ~7 Mb/s (using UDP) to ~6 Mb/s (using TCP). IEEE 802.11g operates in the same band as 802.11b and has a theoretical top speed of 54 Mb/s. In practice, throughput around 25 Mb/s is more realistic.

For wireless security the Ericsson W25 supports WEP, WPA-PSK and WPA2-PSK.

Wireless Radio Channels The table below shows the IEEE 802.11 channels and their corresponding center frequencies:

Channel Number

Channel Frequency

Geographic Indoor Usage

1 2412 MHz US (United States), CA (Canada), ETSI (ETSI Countries), SI (Singapore), AS (Australia), NZ (New Zealand), SA (South Africa), MA (Malaysia)

2 2417 MHz US, CA, ETSI, SI, AS, NZ, SA, MA

3 2422 MHz US, CA, ETSI, SI, AS, NZ, SA, MA

4 2427 MHz US, CA, ETSI, SI, AS, NZ, SA, MA

5 2432 MHz US, CA, ETSI, SI, AS, NZ, SA, MA

6 2437 MHz US, CA, ETSI, SI, AS, NZ, SA, MA

7 2442 MHz US, CA, ETSI, SI, AS, NZ, SA, MA

8 2447 MHz US, CA, ETSI, SI, AS, NZ, SA, MA

Page 151: Ericsson W25 Administrator Manual

Appendix A Technical Specifications

6/1551-CRH 102 167 Uen Rev C 2007-06-08 141

9 2452 MHz US, CA, ETSI, SI, AS, NZ, SA, MA

10 2457 MHz US, CA, ETSI, SI, AS, NZ, SA, MA

11 2462 MHz US, CA, ETSI, SI, AS, NZ, SA, MA

12 2467 MHz ETSI, SI, AS, NZ, SA, MA

13 2472 MHz ETSI, SI, AS, NZ, SA, MA

Table 24 - 802.11 Channels and Frequencies

Radio scanning makes the Ericsson W25 capable of sensing other access points of the allowed channel.

Internal WLAN Antennas The Ericsson W25 has two internal WLAN antennas (omni-directional).

The antennas are mounted orthogonally for best performance.

Page 152: Ericsson W25 Administrator Manual

Appendix B Default Configuration File

142 1426/1551-CRH 102 167 Uen Rev C 2007-06-08

Appendix B Default Configuration File

This appendix lists the contents of the default configuration file.

Type indicates the data type of the parameter; list, boolean, integer or string.

Owner indicates the owner of the parameter; U (end user), O (operator) and R (root).

Group indicates which group the parameter belongs to; U (end user), O (Operator) and R (root).

Access rights: indicates read/write access to the parameter. The 2 first positions are for the owner, position 3 and 4 are for the group and the two last positions are for others.

Table 25 Default Configuration File

Parameter Default Value Type Owner Group Access Rights

autoupdate.enabled false boolean O O rwrwrw

autoupdate.server https://update. ericsson.net/ESU/

string O O rwr-r-

autoupdate.interval 168 (hours in multiple of 24)

integer O O rwrwrw

autoupdate.operator <empty> (Virtual operator name, normally empty)

string O O rwr-r-

autoupdate.time 04:00:00 string O O rwrwrw

cellular.virtual.operator <empty> string R R rwrwrw

cellular.prl_region 0 integer R R rwrwrw

cellular.3g.850 true boolean R R rwrwrw

cellular.3g.1900 true boolean R R rwrwrw

cellular.3g.2100 true boolean R R rwrwrw

cellular.3g.apn <empty> string R R rwrwrw

Page 153: Ericsson W25 Administrator Manual

Appendix B Default Configuration File

6/1551-CRH 102 167 Uen Rev C 2007-06-08 143

Parameter Default Value Type Owner Group Access Rights

cellular.2g.850 true boolean R R rwrwrw

cellular.2g.900 true boolean R R rwrwrw

cellular.2g.1800 true boolean R R rwrwrw

cellular.2g.1900 true boolean R R rwrwrw

cellular.2g.apn <empty> string R R rwrwrw

cellular.celltime false boolean O O rwr-r-

cellular.rscp_alarm_threshold -128 integer O O rwr-r-

cellular.pdp_authentication chap string R R rwrwrw

sim.pin <empty> string R R rwrwrw

sim.pin.lock false boolean O O rwr-r-

sim.allowed_operators[*] <empty> list O O rwr-r-

[0].mcc <empty>

[0].mnc <empty>

dhcpd.enabled true boolean R R rwrwrw

dhcpd.default_lease_time 7200 (seconds) integer R R rwrwrw

dhcpd.range.from 192.168.1.2 string R R rwrwrw

dhcpd.range.to 192.168.1.100 string R R rwrwrw

ip.napt.enabled true boolean O O rwr-r-

ip.napt.algs.ftp true boolean R R rwrwrw

ip.napt.algs.tftp true boolean R R rwrwrw

ip.napt.port_forwardings[*] <empty> list R R rwrwrw

[0].protocol <empty>

[0].from.port <empty>

[0].to.address <empty>

[0].to.port <empty>

ip.forward true boolean R R rwr-r-

Page 154: Ericsson W25 Administrator Manual

Appendix B Default Configuration File

144 1446/1551-CRH 102 167 Uen Rev C 2007-06-08

Parameter Default Value Type Owner Group Access Rights

ip.hostname FWT string R R rwrwrw

ip.lan.address 192.168.1.1 string R R rwrwrw

ip.lan.netmask 255.255.255.0 string R R rwrwrw

ip.static_routes[*] <empty> For future use. list R R rwrwrw

[0].net <empty>

[0].mask <empty>

[0].gateway <empty>

wlan.enabled false boolean R R rwrwrw

wlan.SSID.enabled true boolean R R rwrwrw

wlan.SSID.name FWT string R R rwrwrw

wlan.country EU string R R rwrwrw

wlan.power_dbm 20 integer R R rwrwrw

wlan.channel.auto true boolean R R rwrwrw

wlan.channel.number 1 integer R R rwrwrw

wlan.security.mode NONE string R R rwrwrw

wlan.security.secret <empty> string R R rwrwrw

wlan.whitelist.enabled false boolean R R rwrwrw

wlan.whitelist.accepted[*] <empty> list R R rwrwrw

[0].macaddress <empty>

ppp.enabled true boolean R R rwrwrw

ppp.user <empty> string R R rwrwrw

ppp.password <empty> string R R rwrwrw

ssh.enabled true boolean O O rwr-r-

ssh.hostdsakey <empty> string O O rw----

ssh.hostdsakey_pub <empty> string O O rwr-r-

ssh.password_authentication true boolean O O rwr-r-

Page 155: Ericsson W25 Administrator Manual

Appendix B Default Configuration File

6/1551-CRH 102 167 Uen Rev C 2007-06-08 145

Parameter Default Value Type Owner Group Access Rights

syslog.remote.enabled false boolean O O rwr-r-

syslog.remote.host <empty> string O O rwr-r-

syslog.remote.port 514 integer O O rwr-r-

syslog.filter_level LOG_INFO string R R rwrwrw

syslog.persistent false boolean R R rwrwrw

syslog.heartbeat 0 integer R R rwrwrw

smb.workgroup WORKGROUP string R R rwrwrw

smb.shares[*] <empty> list R R rwrwrw

[0].serial <empty> string U U rwrwrw

[0].share_name <empty> string U U rwrwrw

tems.enabled false boolean O O rwr-r-

upnp.enabled true boolean R R rwrwrw

users[*] list R R r-r-r-

[0].name root string R R r-r-r-

[0].password root string R R rw----

[0].uid 0 integer R R r-r-r-

[0].gid 0 integer R R r-r-r-

ssh.authorized_keys[*] <empty> list R R rw----

[1].name operator string O O r-r-r-

[1].password operator string O O rw----

[1].uid 500 integer O O r-r-r-

[1].gid 500 integer O O r-r-r-

ssh.authorized_keys[*] <empty> list O O rw----

[2].name user string U U r-r-r-

Page 156: Ericsson W25 Administrator Manual

Appendix B Default Configuration File

146 1466/1551-CRH 102 167 Uen Rev C 2007-06-08

Parameter Default Value Type Owner Group Access Rights

[2].password user string U U rw----

[2].uid 1000 integer U U r-r-r-

[2].gid 1000 integer U U r-r-r-

ssh.authorized_keys[*] <empty> list U U rw----

groups[*] list R R r-r-r-

[0].name root string R R r-r-r-

[0].gid 0 integer R R r-r-r-

members[*] list R R r-r-r-

[0].uid 0 integer R R r-r-r-

[1].name operator string O O r-r-r-

[1].gid 500 integer O O r-r-r-

members[*] list O O r-r-r-

[0].uid 500 integer O O r-r-r-

[2].name user string U U r-r-r-

[2].gid 1000 integer U U r-r-r-

members[*] list U U r-r-r-

[0].uid 1000 integer U U r-r-r-

sntp.enabled true boolean R R rwrwrw

sntp.servers[*] list R R rwrwrw

[0] 0.pool.ntp.org string O O rwrwrw

[1] 1.pool.ntp.org string O O rwrwrw

[2] 2.pool.ntp.org string O O rwrwrw

qos.sfq false boolean R R rwrwrw

telephony.enabled false boolean O O rwrwrw

telephony.fxs.inter_digit_ timeout

4000 (milliseconds) integer R R rwrwrw

Page 157: Ericsson W25 Administrator Manual

Appendix B Default Configuration File

6/1551-CRH 102 167 Uen Rev C 2007-06-08 147

Parameter Default Value Type Owner Group Access Rights

telephony.fxs.dialtone_timeout 180000 (milliseconds) integer R R rwrwrw

telephony.fxs.congestiontone_ timeout

180000 (milliseconds) integer R R rwrwrw

telephony.fxs.local_ringing_ timeout

180000 (milliseconds) integer R R rwrwrw

telephony.fxs.oob_dtmf_ duration

100 (milliseconds) integer R R rwrwrw

telephony.fxs.howler_enabled true boolean R R rwrwrw

telephony.fxs.howler_latency 60000 (milliseconds) integer R R rwrwrw

telephony.fxs.howler.timeout 60000 (milliseconds) integer R R rwrwrw

telephony.fxs.hook.on_min_ time

350 (milliseconds) integer R R rwrwrw

telephony.fxs.hook.off_min_ time

40 (milliseconds) integer R R rwrwrw

telephony.fxs.hook.a_party_ release_time

200 (milliseconds) integer R R rwrwrw

telephony.fxs.hook.b_party_ release_time

90000 (milliseconds) integer R R rwrwrw

telephony.fxs.flash_min_time 35 (milliseconds) integer R R rwrwrw

telephony.fxs.flash_max_time 145 (milliseconds) integer R R rwrwrw

telephony.fxs.clip.enabled true boolean R R rwrwrw

telephony.fxs.clip.profile au string R R rwrwrw

telephony.fxs.clip.international_prefix

00 string R R rwrwrw

telephony.fxs.onhold_ring true boolean R R rwrwrw

telephony.fxs.tones_and_ signals_profile

au string R R rwrwrw

telephony.fxs.analog_settings_profile

au string R R rwrwrw

telephony.fxs.ports[*] list R R rwrwrw

[0].volume_rx 0 integer R R rwrwrw

[0].volume_tx 0 integer R R rwrwrw

[1].volume_rx 0 integer R R rwrwrw

Page 158: Ericsson W25 Administrator Manual

Appendix B Default Configuration File

148 1486/1551-CRH 102 167 Uen Rev C 2007-06-08

Parameter Default Value Type Owner Group Access Rights

[1].volume_tx 0 integer R R rwrwrw

telephony.pots.line_interface[*] list R R rwrwrw

[0].ims_user_agent_index 0 integer R R rwrwrw

[0].enable_t38 true boolean R R rwrwrw

[0].local_voip_port 17000 integer R R rwrwrw

[0].local_fax_port 18000 integer R R rwrwrw

[0].local_sip_port 5060 integer R R rwrwrw

[0].voip_session_timeout 60000 integer R R rwrwrw

[0].codec.cs 0 integer R R rwrwrw

[0].codec.g711a 1 integer R R rwrwrw

[0].codec.g711u 2 integer R R rwrwrw

[1].ims_user_agent_index 0 integer R R rwrwrw

[1].enable_t38 true boolean R R rwrwrw

[1].local_voip_port 17000 integer R R rwrwrw

[1].local_fax_port 18000 integer R R rwrwrw

[1].local_sip_port 5060 integer R R rwrwrw

[1].voip_session_timeout 60000 integer R R rwrwrw

[1].codec.cs 0 integer R R rwrwrw

[1].codec.g711a 1 integer R R rwrwrw

[1].codec.g711u 2 integer R R rwrwrw

telephony.dialplan.emergency.match

^(112|009) string R R rwrwrw

telephony.dialplan.emergency.prefix_strip

<empty> string R R rwrwrw

telephony.dialplan.emergency.prefix_append

<empty> string R R rwrwrw

telephony.dialplan.emergency.suffix_strip

<empty> string R R rwrwrw

telephony.dialplan.emergency.suffix_append

<empty> string R R rwrwrw

telephony.dialplan.rules[*] list R R rwrwrw

Page 159: Ericsson W25 Administrator Manual

Appendix B Default Configuration File

6/1551-CRH 102 167 Uen Rev C 2007-06-08 149

Parameter Default Value Type Owner Group Access Rights

[0].match ^[[:digit:]]+(#|T)$ string R R rwrwrw

[0].prefix_strip ^00 string R R rwrwrw

[0].prefix_append + string R R rwrwrw

[0].suffix_strip #$ string R R rwrwrw

[0].suffix_append <empty> string R R rwrwrw

telephony.supplementary.call_hold

^(f)$ string R R rwrwrw

telephony.supplementary.call_hold_toggle

f2 string R R rwrwrw

telephony.supplementary. release_inactive

f0 string R R rwrwrw

telephony.supplementary. release_active

f1 string R R rwrwrw

telephony.supplementary. multiparty

f3 string R R rwrwrw

telephony.supplementary.call_waiting.on

^\\*43# string R R rwrwrw

telephony.supplementary.call_waiting.off

^#43# string R R rwrwrw

telephony.supplementary.call_waiting.query

^\\*#43# string R R rwrwrw

telephony.supplementary.voice_mail.enabled

true boolean R R rwrwrw

telephony.supplementary.voice_mail.incoming_number

<empty> string R R rwrwrw

telephony.supplementary.voice_mail.outgoing_number

<empty> string R R rwrwrw

telephony.supplementary.fwd_all.on.match

\\*21\\*+[\\+|0-9]+# string R R rwrwrw

telephony.supplementary.fwd_all.on.prefix_strip

\\*21\\* string R R rwrwrw

telephony.supplementary.fwd_all.on.prefix_append

<empty> string R R rwrwrw

telephony.supplementary.fwd_all.on.suffix_strip

# string R R rwrwrw

Page 160: Ericsson W25 Administrator Manual

Appendix B Default Configuration File

150 1506/1551-CRH 102 167 Uen Rev C 2007-06-08

Parameter Default Value Type Owner Group Access Rights

telephony.supplementary.fwd_all.on.suffix_append

<empty> string R R rwrwrw

telephony.supplementary.fwd_all.off

^#21# string R R rwrwrw

telephony.supplementary.fwd_all.query

^\\*#21# string R R rwrwrw

telephony.supplementary.fwd_busy.on.match

^\\*+(24|67)+\\*+[\\+|0-9]+#

string R R rwrwrw

telephony.supplementary.fwd_busy.on.prefix_strip

\\*+(24|67)+\\* string R R rwrwrw

telephony.supplementary.fwd_busy.on.prefix_append

<empty> string R R rwrwrw

telephony.supplementary.fwd_busy.on.suffix_strip

# string R R rwrwrw

telephony.supplementary.fwd_busy.on.suffix_append

<empty> string R R rwrwrw

telephony.supplementary.fwd_busy.off

^#+(24|67)+# string R R rwrwrw

telephony.supplementary.fwd_busy.query

^\\*#+(24|67)+# string R R rwrwrw

telephony.supplementary.fwd_no_reply.on.match

^\\*61\\*+[\\+|0-9]+# string R R rwrwrw

telephony.supplementary.fwd_no_reply.on.prefix_strip

\\*61\\* string R R rwrwrw

telephony.supplementary.fwd_no_reply.on.prefix_append

<empty> string R R rwrwrw

telephony.supplementary.fwd_no_reply.on.suffix_strip

# string R R rwrwrw

telephony.supplementary.fwd_no_reply.on.suffix_append

<empty> string R R rwrwrw

telephony.supplementary.fwd_no_reply.off

^#61# string R R rwrwrw

telephony.supplementary.fwd_no_reply.query

^\\*#61# string R R rwrwrw

telephony.supplementary.fwd_unreachable.on.match

^\\*62\\*+[\\+|0-9]+# string R R rwrwrw

telephony.supplementary.fwd_ ^\\*62\\* string R R rwrwrw

Page 161: Ericsson W25 Administrator Manual

Appendix B Default Configuration File

6/1551-CRH 102 167 Uen Rev C 2007-06-08 151

Parameter Default Value Type Owner Group Access Rights

unreachable.on.prefix_strip

telephony.supplementary.fwd_unreachable.on.prefix_append

<empty> string R R rwrwrw

telephony.supplementary.fwd_unreachable.on.suffix_strip

# string R R rwrwrw

telephony.supplementary.fwd_unreachable.on.suffix_append

<empty> string R R rwrwrw

telephony.supplementary.fwd_unreachable.off

^#62# string R R rwrwrw

telephony.supplementary.fwd_unreachable.query

\\*#62# string R R rwrwrw

telephony.supplementary.clir. on

^#31# string R R rwrwrw

telephony.supplementary.clir. off

^\\*31# string R R rwrwrw

telephony.supplementary.clir. query

^\\*#31# string R R rwrwrw

telephony.supplementary.clir_ default_restricted

false boolean R R rwrwrw

telephony.supplementary.call_ return

^\\*10# string R R rwrwrw

telephony.supplementary. hotline.on.match

^\\*53[\\+|0-9]+# string R R rwrwrw

telephony.supplementary. hotline.on.prefix_strip

^\\*53\\* string R R rwrwrw

telephony.supplementary. hotline.on.prefix_append

<empty> string R R rwrwrw

telephony.supplementary. hotline.on.suffix_strip

# string R R rwrwrw

telephony.supplementary. hotline.on.suffix_append

<empty> string R R rwrwrw

telephony.supplementary. hotline.off

^#53# string R R rwrwrw

telephony.supplementary. hotline.query

\\*#53# string R R rwrwrw

telephony.supplementary. hotline.delay

4000 integer R R rwrwrw

Page 162: Ericsson W25 Administrator Manual

Appendix B Default Configuration File

152 1526/1551-CRH 102 167 Uen Rev C 2007-06-08

Parameter Default Value Type Owner Group Access Rights

ims.user_agent[*] list R R rwrwrw

[0].auth_id [email protected] string R R rwrwrw

[0].user_id userid string R R rwrwrw

[0].user_password secretpassword string R R rwrwrw

[0].ims_callserver_index 0 integer R R rwrwrw

ims.callserver[*] list R R rwrwrw

[0].domain server.com string R R rwrwrw

[0].proxy[*] list R R rwrwrw

[0].address host.server.com string R R rwrwrw

[0].port 5060 integer R R rwrwrw

[0].outbound_proxy <empty> string R R rwrwrw

[0].local_ip_interface ppp0 string R R rwrwrw

ims.media.codec.g711a.voice_activity_detection

false boolean R R rwrwrw

ims.media.codec.g711a.packet_time

20 integer R R rwrwrw

ims.media.codec.g711u.voice_activity_detection

false boolean R R rwrwrw

ims.media.codec.g711u.packet_time

20 integer R R rwrwrw

ims.media.codec.t38.forward_error_correction

false boolean R R rwrwrw

ims.media.codec.t38.max_bit_ rate

14400 integer R R rwrwrw

ims.media.codec.t38.local_tcf false boolean R R rwrwrw

ims.media.codec.t38.fill_bit_ removal

false boolean R R rwrwrw

ims.media.codec.t38. transcoding_mmr

false boolean R R rwrwrw

ims.media.codec.t38. transcoding_jbig

false boolean R R rwrwrw

Page 163: Ericsson W25 Administrator Manual

Appendix B Default Configuration File

6/1551-CRH 102 167 Uen Rev C 2007-06-08 153

Page 164: Ericsson W25 Administrator Manual

Glossary

154 1546/1551-CRH 102 167 Uen Rev C 2007-06-08

Glossary

Page 165: Ericsson W25 Administrator Manual

Glossary

6/1551-CRH 102 167 Uen Rev C 2007-06-08 155

802.11b An IEEE standard for a wireless network that operates at 2.4 GHz with rates up to 11 Mbps.

802.11g An IEEE standard for a wireless network that operates at 2.4 GHz Wi-Fi with rates up to 54 Mbps.

3G – Third generation 3G is the third-generation wireless communications technology. 3G includes enhanced voice, data, and video capabilities, improved availability, bandwidth and high speed.

ALG – Application Layer Gateway An ALG provides a translation and transportation service for an Internet application.

AES – Advanced Encryption Standard An encryption algorithm that implements symmetric block data encryption technique. It is used in the implementation of WPA2.

AP - Access Point An internetworking device that seamlessly connects wired and wireless networks. Access points attached to a wired network, support the creation of multiple radio cells that enable roaming throughout a facility.

APN – Access Point Name A reference to the Internet access point of an service provider.

Association Describes the establishment and maintenance of a wireless link between devices. (If security is enabled, the devices cannot do anything but exchange security credentials with this link). See authentication.

Authentication The process that occurs after association to

verify the identify of the wireless device or end user and allow access to the network.

Authorization The process of determining what types of activities a user is permitted to undertake. Usually, authorization is in the context of authentication: once you have authenticated a user, they may be authorized for different types of access or activity.

Beacon A signal periodically transmitted from the access point that is used to identify the service set, and to maintain contact with wireless clients.

Broadcast To simultaneously send the same message to multiple recipients.

CDMA – Code Division Multiple Access General term describing mobile air interface technologies based on “spread spectrum” digital radio access methods, offering benefits including increased capacity, quality and security over second generation TDMA systems. The technology is fundamental to 3G mobile systems.

CHAP – Challenge-Hanshake Authentication Protocol CHAP is an authentication scheme used by PPP servers to validate the identity of remote clients. CHAP periodically verifies the identity of the client by using a three-way handshake. This happens at the time of establishing the initial link, and may happen again any time afterward. The verification is based on a shared secret (such as the client user’s password).

CLI – Command Line Interface

CLIP – Calling Line Identification Presentation A telephony intelligent network service that transmits the caller’s telephone number

Page 166: Ericsson W25 Administrator Manual

Glossary

156 1566/1551-CRH 102 167 Uen Rev C 2007-06-08

and/or, if supported, the caller's name to the called party’s telephone equipment during the ringing signal or when the call is being set up but before the call is answered.

CQI – Channel Quality Indicator

DHCP – Dynamic Host Configuration Protocol A protocol for assigning dynamic IP addresses to devices on a network.

DNS – Domain Name System (or Service) The distributed name/address mechanism used in the Internet. It comprises distributed online databases that contain mappings between human-readable names and IP addresses, and servers, which provide translation services to client applications.

DTMF – Dual-tone multi-frequency A signaling method used for telephone signaling over the line in the voice-frequency band to the call switching center. The version of DTMF used for telephone tone dialing is known by the trademarked term Touch-Tone.

EDGE – Enhanced Data rates for Global Evolution A technology that gives GSM the capacity to handle services for the third generation of mobile telephony. EDGE provides three times the data capacity of GPRS.

EIRP – Equivalent Isotropic Radiated Power

Encryption An effective way to achieve data security by translating data into a secret code.

EON – End of Number

FSK - Frequency-Shift Keying A form of frequency modulation in which the modulating signal shifts the output frequency between predetermined values.

FTP – File Transfer Protocol A protocol for exchanging files over the Internet. FTP is most commonly used to download/upload files from/to servers.

FWT – Fixed Wireless Terminal FXS – Foreign eXchange Station A telephone interface which provides battery power, sends dial tone, and generates ringing voltage. A standard telephone plugs into such an interface to receive telephone service.

Gateway A network point that acts as an entrance to another network.

GPRS – General Packet Radio Service Packet-based mobile communications system building on GSM. Advantages over standard GSM include higher data transmission speeds, more efficient use of radio resources and “continuous” connection to the network to facilitate more advanced non-voice services.

GSM – Global System for Mobile Communication Second generation mobile system originally developed in Europe, using a TDMA access radio interface combined with frequency division multiple access (FDMA). Oriented to voice and circuit mode data.

Hexadecimal A numbering system that uses 16 rather than 10 as the base for representing numbers. The hexadecimal system uses the digits 0 through 9 and the letters A through F (uppercase or lowercase) to represent the decimal numbers 0 through 15.

Host name The DNS name of a device on a network, used to simplify the process of locating computers on a network.

HSDPA – High Speed Downlink Packet Access

Page 167: Ericsson W25 Administrator Manual

Glossary

6/1551-CRH 102 167 Uen Rev C 2007-06-08 157

Specified by 3GPP as an enhancement to the UMTS Terrestrial Radio Access Network (UTRAN) with the goal of enabling packet data transmission in the downlink at theoretical speeds of up to 14,4 Mbps.

IDT – Inter Digit Timer

IEEE – Institute of Electrical and Electronics Engineers An international non-profit, professtion organization for the advancement of technology related to electricity.

IMEI – International Mobile Equipment Identity The IMEI is a 15 or 17 digit number which includes information on the origin, model, and serial number unique to every GSM and UMTS device. The IMEI number is used by the mobile network to identify valid devices.

IMSI – International Mobile Subscriber Identity A unique number that is associated with all GSM and UMTS network mobile device users. The number is stored in the SIM and is sent by the mobile devoce to the network. An IMSI number is usually fifteen digits long. The first three digits are the MCC and the next digits are the MNC. The MNC can be either two or three digits long. The remaining digits, up to the maximum length, are the unique subscriber number within the network’s customer base.

IP – Internet Protocol Part of suite of protocols that effectively defines the Internet as we know it. Specifies addressing and control information for routing data packets over networks.

LAN – Local Area Network A computer network that spans a relatively small area. There are many different types of LANs where Ethernet is being the most common for PCs.

MAC address – Media Access Control address The permanent hardware address of a device assigned by its manufacturer.

MCC – Mobile Country Code MCCs are defined in ITU E.212 (“Land Mobile Numbering Plan”) for use in identifying mobile stations in wireless telephone networks, particularly GSM and UMTS networks. A MCC is often used in combination with a MNC (Mobile Network Code) in order to uniquely identify a network operator. The MCC is part of the International Mobile Subscriber Identity (IMSI) number, which uniquely identifies a particular subscriber, and is stored on the SIM card.

MNC – Mobile Network Code A MNC is used in combination with a Mobile Country Code (MCC) to uniquely identify a mobile phone operator/carrier using the GSM and UMTS mobile networks. The MNC is part of the International Mobile Subscriber Identity (IMSI) number.

NAT – Network Address Translation An Internet standard that enables a LAN to use one set of IP addresses for internal traffic and a second set of addresses for external traffic.

Off-hook The condition that exists when a telephone is in use, i.e., during dialing.

On-hook The condition that exists when a telephone is not in use, i.e., when idle waiting for a call.

Open System A security option which broadcasts a beacon signal including the access point’s configured SSID. Wireless clients can read the SSID from the beacon, and automatically reset their SSID to allow immediate connection to the nearest access point.

Page 168: Ericsson W25 Administrator Manual

Glossary

158 1586/1551-CRH 102 167 Uen Rev C 2007-06-08

Passphrase An encryption password used with WPA/WPA2.

PAP – Password Authentication Protocol PAP is a simple authentication protocol used to authenticate a user to a remote access server or Internet Service Provider (ISP). PAP is underused by PPP and almost all network operating system remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore considered insecure, it is used as a last resort when the remote access server does not support a stronger authentication protocol, such as CHAP.

PIN – Personal Identification Number A secret code used for individual access to for example computer networks. Generally a PIN is made up of 4 to 10 digits.

POTS – Plain Old Telephone Service The standard telephone service that remains the basic form of residential and small business telephone service nearly everywhere in the world, and was the only basic telephone service known to most people until the introduction of mobile phones.

PPP – Point-to-Point Protocol PPP is a method of connecting a computer to the Internet providing error checking features

PRL – Preferred Roaming List The PRL provides roaming information to mobile stations (primarily CDMA services).

PSK – Pre-Shared Key A mechanism that allows the use of manually entered keys or passwords to initiate WPA/WPA2 security. The password also initiates the encryption process which, in WPA is Temporal Key Integrity Protocol (TKIP) and in WPA2 is Advanced Encryption Standard (AES).

PSTN – Public Switched Telephone Network The network of the world's public circuit-switched telephone networks. Originally a network of fixed-line analog telephone systems, the PSTN is now almost entirely digital, and now includes mobile as well as fixed telephones.

PUK – Personal Unblocking Key A secret code made up of 8 to 10 digits. It is used to reactivate a SIM card that has been blocked and to define a new PIN code.

QoS – Quality of Service Transmission system qualities measured in terms of reliability and availability.

RIP – Routing Information Protocol An interior gateway protocol that specifies how routers exchange routing table information. With RIP, routers periodically exchange entire tables.

RSCP – Received Signal Code Power

RSSI – Received Signal Strength Indicator An indicator of the strength (in dBm) of a received radio signal.

SCP – Secure Copy A Linux command for copying files.

SFQ – Stochastic Fair Queuing A QoS scheduling algorithm used in the Ericsson W25.

Shared Key A shared key can be used to authenticate each client attached to a wireless network. Shared key authentication must be used along with the 802.11 Wireless Equivalent Privacy (WEP) algorithm.

SIM – Subscriber Identity Module Synonymous with the “smart card” required by all mobile customers to operate their phone. Carries authentication, billing and other information about the individual

Page 169: Ericsson W25 Administrator Manual

Glossary

6/1551-CRH 102 167 Uen Rev C 2007-06-08 159

subscriber, as well as address book and other personalized information.

SNTP – Simple Network Timing Protocol SNTP allows a device to set its internal clock based on periodic updates from a Network Time Protocol (NTP) server. Updates can be requested from a specific NTP server, or can be received via broadcasts sent by NTP servers.

SSH – Secure Shell A program to log into another computer over a network. It provides strong authentication and secure communications over insecure channels.

SSID – Service Set Identifier A unique network name, or identifier, that differentiates one WLAN from another. All access points and clients attempting to connect to a specific WLAN must use the same SSID.

TCP – Transmission Control Protocol TCP is one of the main protocols in TCP/IP networks.

TCP/IP – Transmission Control Protocol / Internet Protocol The basic protocols used on the Internet. TCP is responsible for dividing data into packets for delivery and reassembling them at the destination. IP is responsible for delivering the packets from source to destination. When TCP and IP are bundled with higher-level applications such as HTTP, FTP, Telnet, etc, TCP/IP refers to this whole suite of protocols.

TEMS – TEst Mobile Station

TFTP – Trivial File Transfer Protocol A TCP/IP protocol commonly used for software downloads.

TKIP – Temporal Key Integrity Protocol The wireless security encryption mechanism used in WPA. TKIP uses a key hierarchy and

key management methodology by using keys that are dynamically generated and distributed. TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t been tampered with.

UDP – User Datagram Protocol A connection-less transport service that dispenses with the reliability services provided by TCP. UDP gives applications a direct interface with IP and the ability to address a particular application process running on a host via a port number, without setting up a connection session.

UPnP – Universal Plug and Play A networking architecture that provides compatibility among networking equipment, software, or between equipment and software.

UMTS – Universal Mobile Telecommunications Service A 3G wireless system that delivers high bandwidth data and voice services to mobile users. UMTS has an air interface based on WCDMA and a core network based on GPRS.

USB – Universal Serial Bus An interface for connecting peripherals such as storage devices and printers to a host.

WAN – Wide Area Network A computer network that spans a relatively large geographical area.

WCDMA – Wideband CDMA Also knows as CDMA DS (Direct Sequence). WCDMA is the radio access technology for one of the UMTS access modes and combines circuit mode and packet mode initially.

WEP – Wired Equivalent Privacy A security protocol for wireless LANs. Data is encrypted into blocks of either 64 or 128 bits

Page 170: Ericsson W25 Administrator Manual

Glossary

160 1606/1551-CRH 102 167 Uen Rev C 2007-06-08

length and wireless devices without a valid WEP key will be excluded from network traffic.

Wi-Fi – Wireless Fidelity A registered trademark of Wi-Fi Alliance. Products certified as Wi-Fi by Wi-Fi Alliance are interoperable with each other even if they are from different manufacturers.

WLAN – Wireless LAN A cellular computer network that transmits and receives data with radio signals instead of wires.

WPA – Wi-Fi Protected Access An improved security standard for wireless networks that provides strong data protection and network access control. WPA was

developed by the Wi-Fi Alliance and addresses all known WEP vulnerabilities. WPA runs in a special easy-to-set-up home mode; PSK, that allows the user to manually enter a pass phrase on all devices in the WLAN. Compared to WEP, WPA has improved data encryption through the Temporal Key Integrity Protocol (TKIP).

WPA2 An enhanced version of WPA. For data encryption is uses AES instead of TKIP.

WUI - Web User Interface A built-in web based configuration tool with wizard support.

Page 171: Ericsson W25 Administrator Manual
Page 172: Ericsson W25 Administrator Manual

Ericsson AB © Ericsson AB 2007 - All Rights Reserved

www.ericsson.com 6/1551-CRH 102 167 Uen Rev C 2007-06-08