Manual de HITRON cgn2
Manual de HITRON cgn2
Use the Introduction (page 12) to see an overview of the topics covered in this
manual.
Use the Table of Contents (page 7), List of Figures (page 10) and List of Tables
(page 11) to quickly find information about a particular GUI screen or topic.
RELATED DOCUMENTATION
Quick Installation Guide: see this for information on getting your CGN2 up and
running right away. It includes information on system requirements, package
contents, the installation procedure, and basic troubleshooting tips.
Online Help: each screen in the CGN2’s Graphical User Interface (GUI)
contains a Help button. Click this button to see additional information about
configuring the screen.
DOCUMENT CONVENTIONS
This User’s Guide uses various typographic conventions and styles to indicate
content type:
Warnings provide information about actions that could harm you or your
device.
Product labels, field labels, field choices, etc. are in bold type. For example:
A mouse click in the Graphical User Interface (GUI) is denoted by a right angle
bracket ( > ). For example:
means that you should click Settings in the GUI, then Advanced settings.
A key stroke is denoted by square brackets and uppercase text. For example:
CUSTOMER SUPPORT
For technical assistance or other customer support issues, please consult your Hitron
representative.
3 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
DEFAULT CREDENTIALS
The CGN2’s default login credentials are as follows. For more information, see
Logging into the CGN2 on page 23.
Copyright 2012 Hitron Technologies. All rights reserved. All trademarks and
registered trademarks used are the properties of their respective owners.
DISCLAIMER: The information in this User’s Guide is accurate at the time of writing.
This User’s Guide is provided “as is” without express or implied warranty of any kind.
Neither Hitron Technologies nor its agents assume any liability for inaccuracies in this
User’s Guide, or losses incurred by use or misuse of the information in this User’s
Guide.
4 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
COMPLIANCES
FCC INTERFERENCE STATEMENT
This equipment has been tested and found to comply with the limits for a Class B
digital device pursuant to Part 15 of the FCC Rules. These limits are designed to
provide reasonable protection against radio interference in a commercial
environment.
This equipment can generate, use and radiate radio frequency energy and, if not
installed and used in accordance with the instructions in this manual, may cause
harmful interference to radio communications.
FCC Caution: Any changes or modifications not expressly approved by the party
responsible for compliance could void the user’s authority to operate this equipment.
IMPORTANT NOTE:
5 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
This equipment complies with FCC radiation exposure limits set forth for an
uncontrolled environment. This equipment should be installed and operated with
minimum distance 20cm between the radiator & your body.
This transmitter must not be co-located or operating in conjunction with any other
antenna or transmitter.
The availability of some specific channels and/or operational frequency bands are
country dependent and are firmware programmed at the factory to match the
intended destination. The firmware setting is not accessible by the end user.
Note to CATV System Installer - The cable distribution system should be grounded
(earthed) in accordance with ANSI/NFPA 70, the National Electrical Code (NEC), in
particular Section 820.93, Grounding of Outer Conductive Shield of a Coaxial Cable.
107 SMCD3G3-CCR 4-Port Gateway Administrator Manual
6 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
TABLE OF CONTENTS
About This User’s Guide ................................................................ 2
Compliances .................................................................................... 5
Introduction ................................................................................... 12
Status ............................................................................................. 26
WAN/LAN ....................................................................................... 45
Firewall ........................................................................................... 54
8 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
Wireless ......................................................................................... 83
9 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
LIST OF FIGURES
Figure 1: Application Overview ...........................................................................13
Figure 2: Hardware Connections ........................................................................15
Figure 3: Power Adaptor .....................................................................................18
Figure 4: LEDs ....................................................................................................19
Figure 5: Login ....................................................................................................23
Figure 6: GUI Overview ......................................................................................24
Figure 7: The Status > System Info Screen ........................................................34
Figure 8: The Status > Initialization Screen ........................................................37
Figure 9: The Status > CM Status Screen ..........................................................39
Figure 10: The Status > Password Screen .........................................................42
Figure 11: The Status > Capability Screen .........................................................43
Figure 12: The WAN/LAN > IP Screen ...............................................................48
Figure 13: The WAN/LAN > Shared Media Screen ............................................51
Figure 14: The WAN/LAN > Debug Screen ........................................................52
Figure 15: The WAN/LAN > Backup Screen .......................................................53
Figure 16: The Firewall > Firewall Options Screen .............................................57
Figure 17: The Firewall > Filter Setting Screen ..................................................59
Figure 18: The Firewall > Filter Settings > Add/Edit Screen ...............................63
Figure 19: The Firewall > Forwarding Screen .....................................................65
Figure 20: The Firewall > Forwarding > Add/Edit Screen ...................................67
Figure 21: The Firewall > Port Triggering Screen ...............................................69
Figure 22: The Firewall > Port Triggering > Add/Edit Screen .............................71
Figure 23: The Firewall > DMZ Screen ...............................................................73
Figure 24: The Parental Control > Web Site Blocking Screen ............................75
Figure 25: The Parental Control > Scheduling Screen .......................................78
Figure 26: The Parental Control > Email / Syslog Alert Screen ..........................79
Figure 27: Add Target Email Address .................................................................81
Figure 28: The Wireless > Setup Screen ............................................................87
Figure 29: WPS PIN ............................................................................................89
Figure 30: The Wireless > Access Control Screen .............................................93
Figure 31: The Wireless > Advanced Screen .....................................................96
Figure 32: The Wireless > Advanced > WMM Configuration Screen ...............103
LIST OF TABLES
Table 1: Default Credentials ................................................................................4
Table 2: Hardware Connections ........................................................................16
Table 3: LEDs ....................................................................................................19
Table 4: GUI Overview .......................................................................................24
Table 5: Private IP Address Ranges ..................................................................28
Table 6: IP Address: Decimal and Binary ..........................................................28
Table 7: Subnet Mask: Decimal and Binary .......................................................29
Table 8: The Status > System Info Screen ........................................................35
Table 9: The Status > CM Status Screen ..........................................................39
Table 10: The Status > Password Screen .........................................................42
Table 11: The Status > Capability Screen .........................................................43
Table 12: The WAN/LAN > IP Screen ...............................................................48
Table 13: The WAN/LAN > Shared Media Screen ............................................51
Table 14: The WAN/LAN > Debug Screen ........................................................52
Table 15: The LAN > Backup Screen ................................................................53
Table 16: The Firewall > Firewall Options Screen .............................................57
Table 17: The Firewall > Filter Setting Screen ...................................................60
Table 18: The Firewall > Filter Settings > Add/Edit Screen ...............................64
Table 19: The Firewall > Forwarding Screen .....................................................65
Table 20: The Firewall > Forwarding > Add/Edit Screen ...................................68
Table 21: The Firewall > Port Triggering Screen ...............................................69
Table 22: The Firewall > Port Triggering > Add/Edit Screen .............................71
Table 23: The Firewall > DMZ Screen ...............................................................73
Table 24: The Parental Control > Web Site Blocking Screen ............................76
Table 25: The Parental Control > Scheduling Screen .......................................78
Table 26: The Parental Control > Email / Syslog Alert Screen ..........................80
Table 27: The Wireless > Setup Screen ............................................................87
Table 28: The Wireless > Access Control Screen .............................................94
Table 29: The Wireless > Advanced Screen .....................................................97
Table 30: The Wireless > Advanced > WMM Configuration Screen ................103
1
INTRODUCTION
This chapter introduces the CGN2 and its GUI (Graphical User Interface). It contains
the following sections:
Computers with a wired connection to the CGN2 are on the Local Area Network
(LAN), computers with a wireless connection to the CGN2 are on the Wireless Local
Area Network (WLAN) and the CGN2 connects to the service provider over the Wide
Area Network (WAN).
Local Area Network connection via four 10/100/1000 Mbps (megabits per
second) Ethernet ports
13 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
14 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
15 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
16 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
17 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
1.3 LEDS
This section describes the CGN2’s LEDs (lights).
18 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
Figure 4: LEDs
Table 3: LEDs
LED STATUS DESCRIPTION
WIRELESS Off The wireless network is not enabled.
Green, steady The wireless network is enabled, and no data is
being transmitted or received over the wireless
network.
Green, blinking The wireless network is enabled, and data is being
transmitted or received over the wireless network.
Bi-color Wi-Fi Protected Setup (WPS) is in operation.
19 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
Table 3: LEDs
LAN 1~4 Off No device is connected to the relevant LAN port.
Green, blinking A device is connected to the relevant LAN port via a
Fast Ethernet (100Mbps) link, and is transmitting or
receiving data.
Green, steady A device is connected to the relevant LAN port via a
Fast Ethernet (100Mbps) link, but is not transmitting
or receiving data.
Blue, blinking A device is connected to the relevant LAN port via a
Gigabit Ethernet (1000Mbps) link, and is
transmitting or receiving data.
Blue, steady A device is connected to the relevant LAN port via a
Gigabit Ethernet (1000Mbps) link, but is not
transmitting or receiving data.
Status Blinking The CGN2’s cable modem is registering with the
service provider’s CMTS.
On The CGN2’s cable modem has successfully
registered with the service provider and is ready for
data transfer.
US Green, blinking The CGN2 is searching for an upstream frequency
on the CABLE connection.
Green, steady The CGN2 has successfully located and locked
onto an upstream frequency on the CABLE
connection.
Blue The CGN2 is engaged in channel bonding on the
upstream connection.
Off There is no upstream activity on the CABLE
connection.
DS Green, blinking The CGN2 is searching for a downstream
frequency on the CABLE connection.
Green, steady The CGN2 has successfully located and locked
onto a downstream frequency on the CABLE
connection.
Blue The CGN2 is engaged in channel bonding on the
downstream connection.
Off There is no downstream activity on the CABLE
connection.
Power On The CGN2 is receiving power.
Off The CGN2 is not receiving power.
20 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
When you turn on the CGN2, the LEDs light up in the following order:
Power
US
DS
Status
The ETH 1~4 LEDs light up as soon as there is activity on the relevant port, and
the WIRELESS LED lights up once the wireless network is ready.
The CGN2 has a built-in DHCP server that, when active, assigns IP addresses to
computers on the LAN. When the DHCP server is active, you can get an IP address
automatically. The DHCP server is active by default.
If the login screen displays, your computer is already configured correctly.
If the login screen does not display, either the CGN2’s DHCP server is not active
or your computer is not configured correctly. Follow the procedure in Manual IP
Address Setup on page 22 and set your computer to get an IP address
automatically. Try to log in again. If you cannot log in, follow the manual IP
address setup procedure again, and set a specific IP address as shown. Try to
log in again.
NOTE: If you still cannot see the login screen, your CGN2’s IP settings may have
been changed from their defaults. If you do not know the CGN2’s new
address, you should return it to its factory defaults. See Resetting the CGN2
on page 25. Bear in mind that ALL user-configured settings are lost.
21 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
NOTE: If your CGN2 DHCP server is active, set your computer to get an IP address
automatically in step 5. The CGN2 assigns an IP address to your computer.
The DHCP server is active by default.
Take the following steps to manually set up your computer’s IP address to connect to
the CGN2:
NOTE: This example uses Windows XP; the procedure for your operating system
may be different.
3 Right-click your network connection (usually Local Area Connection) and click
Properties.
4 In the General tab’s This connection uses the following items list, scroll
down and select Internet Protocol (TCP/IP). Click Properties.
NOTE: If your CGN2 is not using the default IP address, enter an IP address and
subnet mask that places your computer in the same subnet as the CGN2.
6 Click OK. The Internet Protocol (TCP/IP) window closes. In the Local Area
Connection Properties window, click OK.
22 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
Your computer now obtains an IP address from the CGN2, or uses the IP address
that you specified, and can communicate with the CGN2.
NOTE: You can log into the CGN2’s GUI via the wireless interface. However, it is
strongly recommended that you configure the CGN2 via a wired connection
on the LAN.
2 Enter the CGN2’s IP address (default 192.168.0.1) in the URL bar. The Login
screen displays.
Figure 5: Login
3 Enter the Username and Password. The default login username is cusadmin,
and the default password is password.
NOTE: The Username and Password are case-sensitive; “password” is not the same
as “Password”.
4 Click Login. The System Info screen displays (see The System Info Screen on
page 33).
23 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
Each item in the Primary Navigation Bar has its own chapter in this User's Guide;
items in the Secondary Navigation Bar have their own section within a chapter.
24 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
Press the RESET button on the CGN2, and hold it in for ten seconds or longer.
Click WAN/LAN > Backup. In the screen that displays, click the Factory Reset
button.
The CGN2 turns off and on again, using its factory default settings.
NOTE: Depending on your CGN2’s previous configuration, you may need to re-
configure your computer’s IP settings; see IP Address Setup on page 21.
25 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
2
STATUS
This chapter describes the screens that display when you click Status in the toolbar.
It contains the following sections:
2.1.1 DOCSIS
The Data Over Cable Service Interface Specification (DOCSIS) is a
telecommunications standard that defines the provision of data services) Internet
access) over a traditional cable TV (CATV) network.
An IP address carries two basic pieces of information: the “network number” (the
address of the network as a whole, analogous to a street name) and the “host ID”
(analogous to a house number) which identifies the specific computer (or other
network device).
The public network (Wide Area Network or WAN) is the link between the cable
connector and your Internet Service Provider. Your CGN2’s IP address on this
network is assigned by your service provider.
27 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
The private network (in routing mode - see Routing Mode on page 31) is your
Local Area Network (LAN) and Wireless Local Area Network (WLAN), if
enabled. You are free to assign IP addresses to computers on the LAN and
WLAN manually, or to allow the CGN2 to assign them automatically via DHCP
(Dynamic Host Configuration Protocol). IANA has reserved the following blocks
of IP addresses to be used for private networks only:
If you assign addresses manually, they must be within the CGN2’s LAN subnet.
2.1.2.3 SUBNETS
A subnet (short for sub-network) is, as the name suggests, a separate section of a
network, distinct from the main network of which it is a part. A subnet may contain all
of the computers at one corporate local office, for example, while the main network
includes several offices.
In order to define the extent of a subnet, and to differentiate it from the main network,
a subnet mask is used. This “masks” the part of the IP address that refers to the main
network, leaving the part of the IP address that refers to the sub-network.
Each subnet mask has 32 bits (binary digits), as does each IP address:
A binary value of 1 in the subnet mask indicates that the corresponding bit in the
IP address is part of the main network.
A binary value of 0 in the subnet mask indicates that the corresponding bit in the
IP address is part of the sub-network.
For example, the following table shows the IP address of a computer (192.168.1.1)
expressed in decimal and binary (each cell in the table indicates one octet):
28 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
The following table shows a subnet mask that “masks” the first twenty-four bits of the
IP address, in both its decimal and binary notation.
This shows that in this subnet, the first three octets (192.168.1, in the example IP
address) define the main network, and the final octet (1, in the example IP address)
defines the computer’s address on the subnet.
The decimal and binary notations give us the two common ways to write a subnet
mask:
Decimal: the subnet mask is written in the same fashion as the IP address:
255.255.255.0, for example.
Binary: the subnet mask is indicated after the IP address (preceded by a forward
slash), specifying the number of binary digits that it masks. The subnet mask
255.255.255.0 masks the first twenty-four bits of the IP address, so it would be
written as follows: 192.168.1.1/24.
2.1.3 DHCP
The Dynamic Host Configuration Protocol, or DHCP, defines the process by which IP
addresses can be assigned to computers and other networking devices
automatically, from another device on the network. This device is known as a DHCP
server, and provides addresses to all the DHCP client devices.
In order to receive an IP address via DHCP, a computer must first request one from
the DHCP server (this is a broadcast request, meaning that it is sent out to the whole
network, rather than just one IP address). The DHCP server hears the requests, and
responds by assigning an IP address to the computer that requested it.
By default, the CGN2 is a DHCP client on the WAN (the CATV connection). It
broadcasts an IP address over the cable network, and receives one from the service
provider. By default, the CGN2 is a DHCP server on the LAN; it provides IP
addresses to computers on the LAN which request them.
29 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
This is done to prevent IP addresses from being used up by computers that no longer
require them, since the pool of available IP addresses is finite.
MAC addresses are the most reliable way of identifying network devices, since IP
addresses tend to change over time (whether manually altered, or updated via
DHCP).
Each MAC address displays as six groups of two hexadecimal digits separated by
colons (or, occasionally, dashes) for example 00:AA:FF:1A:B5:74.
Bear in mind that a MAC address does not precisely represent a computer on your
network (or elsewhere), it represents a network device, which may be part of a
computer (or other device). For example, if a single computer has an Ethernet card
(to connect to your CGN2 via one of the LAN ports) and also has a wireless card (to
connect to your CGN2 over the wireless interface) the MAC addresses of the two
cards will be different. In the case of the CGN2, each internal module (cable modem
module, Ethernet module, wireless module, etc.) possesses its own MAC address.
30 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
NOTE: When DHCP is not active on the CGN2 in routing mode, each computer on
the LAN must be assigned an IP address in the CGN2’s subnet manually.
When the CGN2 is not in routing mode, the service provider assigns an IP address to
each computer connected to the CGN2 directly. The CGN2 does not perform any
routing operations, and traffic flows between the computers and the service provider.
The data traffic band is separate from the TV band, and each data channel is
separate from other data channels.
31 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
2.1.10 MODULATION
Transmissions over the cable network are based on a strong, high frequency periodic
waveform known as the “carrier wave.” This carrier wave is so called because it
“carries” the data signal. The data signal itself is defined by variations in the carrier
wave. The process of varying the carrier wave (in order to carry data signal
information) is known as “modulation.” The data signal is thus known as the
“modulating signal.”
NOTE: In modulated signals, each distinct modulated character (for example, each
audible tone produced by a modem for transmission over telephone lines) is
known as a symbol.
TDMA allows multiple users to share the same frequency channel by splitting
transmissions by time. Each user is allocated a number of time slots, and
transmits during those time slots.
FDMA allows multiple users to share the same frequency channel by assigning a
frequency band within the existing channel to each user.
32 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
SCDMA allows multiple users to share the same frequency channel by assigning
a unique orthogonal code to each user.
NOTE: Most of the information that displays in this screen is for troubleshooting
purposes only. However, you may need to use the MAC Address information
when setting up your network.
33 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
34 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
35 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
36 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
Use this screen for troubleshooting purposes to ensure that the CGN2 has
successfully connected to the Internet; if an error has occurred you can identify the
stage at which the failure occurred.
NOTE: This screen displays when you first log in to the CGN2.
37 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
The nature of the upstream and downstream connection between the CGN2 and
the device to which it is connected through the CABLE interface.
38 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
39 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
NOTE: The upstream signal is the signal transmitted from the CGN2.
Frequency (Hz) This displays the frequency in Herz (Hz) of each
upstream data channel to which the CGN2 is connected.
Bandwidth (KSym/ This displays the bandwidth of each upstream data
sec) channel to which the CGN2 is connected (in thousands
of symbols per second).
40 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
NOTE: If you forget your password, you will need to reset the CGN2 to its factory
defaults.
41 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
Disabling the residential gateway feature sets the unit to use bridge mode only. Use
this mode when your network is already using another router.
42 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
43 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
44 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
3
WAN/LAN
This chapter describes the screens that display when you click WAN/LAN in the
toolbar. It contains the following sections:
The LAN is a separate network from the Wide Area Network (WAN). In the case of
the CGN2, the WAN refers to all computers and other devices available on the cable
connection.
By default, computers on the WAN cannot identify individual computers on the LAN;
they can see only the CGN2. The CGN2 handles routing to and from individual
computers on the LAN.
For more information about IP addresses and subnets in general, see IP Addresses
and Subnets on page 27.
Similarly, the CGN2 allows you to define a Domain Suffix to the LAN. When you
enter the domain suffix into your browser, you can reach the CGN2 no matter what IP
address it has on the LAN.
Ping: this tool allows you to enter an IP address and see if a computer (or other
network device) responds with that address on the network. The name comes
from the pulse that submarine SONAR emits when scanning for underwater
objects, since the process is rather similar. You can use this tool to see if an IP
address is in use, or to discover if a device (whose IP address you know) is
working properly.
Traceroute: this tool allows you to see the route taken by data packets to get
from the CGN2 to the destination you specify. You can use this tool to solve
routing problems, or identify firewalls that may be blocking your access to a
computer or service.
46 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
47 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
48 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
49 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
NOTE: This screen is not available unless a logged-in MSO admin user previously
enabled the USB option in the Status > Capability screen; see The
Capability Screen on page 42 for more information.
50 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
51 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
52 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
53 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
4
FIREWALL
This chapter describes the screens that display when you click Firewall in the
toolbar. It contains the following sections:
4.1.1 FIREWALL
The term “firewall” comes from a construction technique designed to prevent the
spread of fire from one room to another. Similarly, your CGN2’s firewall prevents
intrusion attempts and other undesirable activity originating from the WAN, keeping
the computers on your LAN safe. You can also use filtering techniques to specify the
computers and other devices you want to allow on the LAN, and prevent certain traffic
from going from the LAN to the WAN.
4.1.3 PING
The CGN2 allows you to use the ping utility on the LAN (in the WAN/LAN > Debug
screen) and also on the WAN (in the Firewall > Firewall Options screen). For more
information, see Debugging (Ping and Traceroute) on page 46.
Deny the devices on the list access to the CGN2 and the network (in which case
all other devices can access the network)
or
Allow the devices on the list to access the network (in which case no other
devices can access the network)
4.1.5 IP FILTERING
IP filtering allows you to prevent computers on the LAN from sending certain types of
data to the WAN. You can use this to prevent unwanted outgoing communications.
Specify the IP address of the computer on the LAN from which you want to prevent
communications, and specify the port range of the communications you want to
prevent. The CGN2 discards outgoing data packets that match the criteria you
specified.
55 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
You can set up a port forwarding rule for each application for which you want to open
ports in the firewall. When the CGN2 receives incoming traffic from the WAN with a
destination port that matches a port forwarding rule, it forwards the traffic to the LAN
IP address and port number specified in the port forwarding rule.
NOTE: For information on the ports you need to open for a particular application,
consult that application’s documentation.
4.1.8 DMZ
In networking, the De-Militarized Zone (DMZ) is a part of your LAN that has been
isolated from the rest of the LAN, and opened up to the WAN. The term comes from
the military designation for a piece of territory, usually located between two opposing
forces, that is isolated from both and occupied by neither.
56 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
57 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
NOTE: To configure MAC address filtering on the wireless network, see The Access
Control Screen on page 93.
You can set the CGN2 to allow only certain devices to access the CGN2 and the
network, or to deny certain devices access.
NOTE: To see a list of all the computers connected to the CGN2 on the LAN, click
the Connected Computers button in the Firewall > IP Filtering,
Forwarding, Port Triggering or Firewall Options screens.
You can turn IP filtering on or off, and configure new and existing IP filtering rules.
58 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
59 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
60 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
61 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
62 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
To edit an existing IP filtering rule, select the rule’s radio button (
) in the
Firewall > Filter Setting screen’s IP Filtering Options section and click the
Edit button.
NOTE: Ensure that the Disabled checkbox is deselected in order to add or edit IP
filtering rules.
Figure 18: The Firewall > Filter Settings > Add/Edit Screen
63 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
Table 18: The Firewall > Filter Settings > Add/Edit Screen
Application Name Enter a name for the application that you want to block.
64 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
65 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
66 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
NOTE: Ensure that the Disabled checkbox is disabled in order to add or edit port
forwarding rules.
67 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
68 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
69 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
70 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
Figure 22: The Firewall > Port Triggering > Add/Edit Screen
Table 22: The Firewall > Port Triggering > Add/Edit Screen
Application Name Enter a name for the application for which you want to
create the rule.
71 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
Table 22: The Firewall > Port Triggering > Add/Edit Screen
Target Port Range Use these fields to specify the target ports. The CGN2
opens these ports in expectation of incoming traffic
whenever it detects activity on any of the Trigger ports.
The incoming traffic is forwarded to these ports on the
computer connected to the LAN.
Enter the start port number in the first field, and the end
port number in the second field.
To specify only a single port, enter its number in both
fields.
Protocol Use this field to specify whether the CGN2 should
activate this trigger when it detects activity via:
Transmission Control Protocol (TCP)
User Datagram Protocol (UDP)
Transmission Control Protocol and User Datagram
Protocol (Both)
72 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
73 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
5
PARENTAL CONTROL
This chapter describes the screens that display when you click Parent Control in the
toolbar. It contains the following sections:
You can also specify “trusted” computers, which should be exempted from website
blocking, and you can schedule website blocking so that it is only in effect at certain
times (evenings and weekends, for example).
NOTE: To apply the blocking filter only at certain times, use the Parental Control >
Scheduling screen.
Click Parental Control > Web Site Blocking. The following screen displays.
Figure 24: The Parental Control > Web Site Blocking Screen
75 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
Table 24: The Parental Control > Web Site Blocking Screen
Web Site Blocking Options
Enable Web Site Use this field to turn web site blocking on or off.
Blocking
Select the checkbox to enable web site blocking.
Deselect the checkbox to disable web site blocking.
New Key Word/URL Use these fields to configure the websites to which users
Blocking on the LAN are denied access:
Enter a URL (for example, “www.example.com”) to
block access to that website only.
Enter a keyword (for example, “example”) to block
access to all websites that contain the keyword in
their URL (for example, “www.example.com”,
“www.example.org”, “www.someotherwebsite.com/
example” and so forth).
Click Add to add the URL or keyword to the Blocked
Key Words/URLs list.
Blocked Key Words/ This displays the list of websites and keywords to which
URLs users on the LAN are denied access.
Select a URL or keyword and click Remove to delete
it from the list.
Click Clear List to delete all the URLs and keywords
from the list.
Trusted Computers
New Computer MAC Enter a computer’s Media Access Control (MAC)
Address address and click Add to include it in the trusted
computer list.
Trusted Computer This displays a list of the computers which are exempt
List from the website blocking filter, identified by their MAC
addresses.
Connected Click this to see a list of the computers that are currently
Computers connected to the CGN2. To add a computer to the New
Computer MAC Address field, select its Add checkbox
and click Apply in the screen that displays.
Remove Select a computer’s MAC address from the Connected
Computers list and click this to delete it from the list.
76 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
Table 24: The Parental Control > Web Site Blocking Screen (continued)
Clear List Click this to delete all the computers’ MAC addresses
from the list.
Apply Click this to save your changes to the fields in this
screen.
Cancel Click this to return the fields in this screen to their last-
saved values without saving your changes.
Help Click this to see information about the fields in this
screen.
NOTE: To configure the website blocking filter, use the Parent Control > Web Site
Blocking screen.
77 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
78 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
Click Parent Control > Email/Syslog Alert. The following screen displays.
Figure 26: The Parental Control > Email / Syslog Alert Screen
79 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
Table 26: The Parental Control > Email / Syslog Alert Screen
Mail Server Configuration Use this section to define the location of the transmitting
email server, and the email address from which admin
emails appear to originate.
SMTP Server Enter the address of the email server from which admin
Address emails should be sent.
Sender’s Email Enter the email address from which admin emails
Address should appear to originate.
Mail Server Use this section to enter the user credentials for the
Authentication defined email server.
User Name Enter the user name for your account on the defined
email server.
Password Enter the password associated with the above user
name.
80 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
Table 26: The Parental Control > Email / Syslog Alert Screen (continued)
Recipient List (up to 4 Use this section to define up to four target email address
items) to which admin emails will be sent.
To enter a new target email address, click Add.
Enter the target email address’s Name and
Recipient’s Address in the fields that display, then
click Apply to save your changes. Alternatively, click
Cancel to return to the previous screen without
saving your changes.
81 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
Table 26: The Parental Control > Email / Syslog Alert Screen (continued)
Cancel Click this to return the fields in this screen to their last-
saved values without saving your changes.
Help Click this to see information about the fields in this
screen.
82 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
6
WIRELESS
This chapter describes the screens that display when you click Wireless in the
toolbar. It contains the following sections:
6.1.2 ARCHITECTURE
The wireless network consists of two types of device: access points (APs) and
clients.
The access point controls the network, providing a wireless connection to each
client.
The wireless clients connect to the access point in order to receive a wireless
connection to the WAN and the wired LAN.
The CGN2 is the access point, and the computers you connect to the CGN2 are the
wireless clients.
IEEE 802.11b
IEEE 802.11g
IEEE 802.11n
Each Service Set is identified by a Service Set IDentifier (SSID). This is the name of
the network. Wireless clients must know the SSID in order to be able to connect to
the AP. You can configure the CGN2 to broadcast the SSID (in which case, any client
who scans the airwaves can discover the SSID), or to “hide” the SSID (in which case
it is not broadcast, and only users who already know the SSID can connect).
84 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
WEP (the Wired Equivalency Protocol): this protocol uses a series of “keys” or
data strings to authenticate the wireless client with the AP, and to encrypt data
sent over the wireless link. WEP is a deprecated protocol, and should only be
used when it is the only security standard supported by the wireless clients.
WEP provides only a nominal level of security, since widely-available software
exists that can break it in a matter of minutes.
6.1.5.1 WPS
WiFi-Protected Setup (WPS) is a standardized method of allowing wireless devices
to quickly and easily join wireless networks, while maintaining a good level of
security. The CGN2 provides two methods of WPS authentication:
85 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
Push-Button Configuration (PBC): when the user presses the PBC button on
the AP (either a physical button, or a virtual button in the GUI), any user of a
wireless client that supports WPS can press the corresponding PBC button on
the client within two minutes to join the network.
Once authenticated, devices that have joined a network via WPS use the WPA2
security standard.
6.1.6 WMM
WiFi MultiMedia (WMM) is a Quality of Service (QoS) enhancement that allows
prioritization of certain types of data over the wireless network. WMM provides four
data type classifications (in priority order; highest to lowest):
Voice
Video
Best effort
Background
If you wish to improve the performance of voice and video (at the expense of other,
less time-sensitive applications such as Internet browsing and FTP transfers), you
can enable WMM. You can also edit the WMM QoS parameters, but are disadvised
to do so unless you have an extremely good reason to make the changes.
86 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
87 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
88 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
WPS Current Status This displays whether or not the CGN2 is using Wifi
Protected Setup.
SSID Setting This displays an entry for each of the CGN2’s SSIDs.
89 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
NOTE: These fields are only configurable when you select WEP from the Security
Mode list.
90 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
91 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
NOTE: These fields display only when you select WPA-Personal from the Security
Mode list.
WPA Mode Select the type of WPA security that you want to use:
Select WPA-PSK to use Wifi Protected Access (Pre-
Shared Key) mode
Select WPA2-PSK to use Wifi Protected Access 2
(Pre-Shared Key) mode
Select Auto (WPA-PSK or WPA2-PSK) to allow
clients operating in either mode to connect to the
CGN2.
Cipher Type Select the type of encryption that you want to use:
Select TKIP to use the Temporal Key Integrity
Protocol.
Select AES to use the Advanced Encryption
Standard.
Select TKIP and AES to allow clients using either
encryption type to connect to the CGN2.
Group Key Update Enter the frequency (in seconds) with which you want
Interval the CGN2 to create new pre-shared keys, and issue
them to the wireless client.
Pre-Shared Key Enter the pre-shared key that you want to use for your
wireless network. You will need to enter this key into
your wireless clients in order to allow them to connect to
the network.
Pre-Authentication Use this field to allow pre-authentication (Enable) in
WPA2, or deny pre-authentication requests (Disable).
In preauthentication, a WPA2 wireless client can
perform authentication with other wireless access points
in its range when it is still connected to its current
wireless access point. This allows mobile wireless
clients to connect to new access points more quickly,
permitting more efficient roaming.
Apply Click this to save your changes to the fields in this
screen.
92 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
NOTE: To configure MAC address filtering on the wired LAN, see The Filter Setting
Screen on page 57.
You can set the CGN2 to allow only certain devices to access the CGN2 and the
network wirelessly, or to deny certain devices access.
93 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
94 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
95 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
96 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
97 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
98 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
99 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
100 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
101 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
102 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
Figure 32: The Wireless > Advanced > WMM Configuration Screen
NOTE: It is strongly recommended that you do not change the default values in this
screen unless you have a good reason to do so.
Table 30: The Wireless > Advanced > WMM Configuration Screen
WMM Parameters of Access Point
NOTE: This section controls the parameters of data transmitted from the CGN2 to
the wireless clients.
AC_BE This row controls the Best Effort (BE) Access Category
(AC)
103 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
Table 30: The Wireless > Advanced > WMM Configuration Screen
AC_BK This row controls the Background (BK) Access Category
(AC)
AC_VI This row controls the Video (VI) Access Category (AC)
AC_VO This row controls the Voice (VO) Access Category (AC)
AIFSN This column controls the Arbitration Inter-Frame Space
Number for each Access Category. WMM gives the
highest priority to the AC with the lowest AIFSN.
CWMin This column controls the Contention Window Minimum
for each Access Category. A smaller CWMin value
increases priority for data of the relevant type.
The contention window system is a mechanism for
providing priority to important data on the wireless
network. When a data collision occurs, each frame is
assigned a random time to wait before attempting
transmission again. This random time value is between
zero and the data’s CWMin value. If a collision occurs
again, the time value is doubled, and transmission is
attempted again. This continues until the time value
reaches the CWMax value.
CWMax This column controls the Contention Window Maximum
for each Access Category. A smaller CWMin value
decreases the access delay for data of the relevant
type, but can result in more data collisions.
TXOP This field defines the Transmission Opportunity (TXOP)
length for each Access Category. This is the length of
time during which the wireless device may to transmit
over the wireless network, once it receives a
transmission opportunity.
ACM This field specifies whether Admission Control is
Mandatory (ACM) for each Access Category. Select the
checkbox to have the CGN2 control ACM.
104 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
Table 30: The Wireless > Advanced > WMM Configuration Screen
AckPolicy WMM defines two ACK policies: NormalAck and NoAck.
NormalAck: the recipient of a transmission
acknowledges each received packet.
NoAck: the recipient of a transmission does not
acknowledge received packets. This can improve
data throughput in situations where signal quality is
excellent, but in other situations can cause a
significant increase in lost packets.
Select the checkbox to use the NoAck policy.
WMM Parameters of Station
NOTE: This section controls the parameters of data transmitted from the wireless
clients to the CGN2.
AC_BE This row controls the Best Effort (BE) Access Category
(AC)
AC_BK This row controls the Background (BK) Access Category
(AC)
AC_VI This row controls the Video (VI) Access Category (AC)
AC_VO This row controls the Voice (VO) Access Category (AC)
AIFSN This column controls the Arbitration Inter-Frame Space
Number for each Access Category. WMM gives the
highest priority to the AC with the lowest AIFSN.
CWMin This column controls the Contention Window Minimum
for each Access Category. A smaller CWMin value
increases priority for data of the relevant type.
The contention window system is a mechanism for
providing priority to important data on the wireless
network. When a data collision occurs, each frame is
assigned a random time to wait before attempting
transmission again. This random time value is between
zero and the data’s CWMin value. If a collision occurs
again, the time value is doubled, and transmission is
attempted again. This continues until the time value
reaches the CWMax value.
CWMax This column controls the Contention Window Maximum
for each Access Category. A smaller CWMin value
decreases the access delay for data of the relevant
type, but can result in more data collisions.
105 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
Table 30: The Wireless > Advanced > WMM Configuration Screen
TXOP This field defines the Transmission Opportunity (TXOP)
length for each Access Category. This is the length of
time during which the wireless device may to transmit
over the wireless network, once it receives a
transmission opportunity.
ACM This field specifies whether Admission Control is
Mandatory (ACM) for each Access Category. Select the
checkbox to have the wireless client control ACM.
106 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
7
TROUBLESHOOTING
Use this section to solve common problems with the CGN2 and your network.
The CGN2 is not receiving power, or there is a fault with the device.
Using a power adaptor other than the one that came with your CGN2 can
damage the CGN2.
2 Ensure that the power adaptor is connected to the CGN2 and the wall socket (or
other power source) correctly.
3 Ensure that the power source is functioning correctly. Replace any broken fuses
or reset any tripped circuit breakers.
4 Disconnect and re-connect the power adaptor to the power source and the
CGN2.
5 If none of the above steps solve the problem, consult your vendor.
1 Ensure that you understand the LED’s normal behavior (see LEDs on page 18).
2 Ensure that the CGN2’s hardware is connected correctly; see the Quick
Installation Guide.
4 If none of the above steps solve the problem, consult your vendor.
2 You can locate the CGN2’s GUI by entering the LAN domain suffix into your
browser’s address bar (on a computer connected to the LAN). The default LAN
domain suffix is displayed in the WAN/LAN > IP screen’s Domain Suffix field.
See The IP Screen on page 47 for more information.
3 Depending on your operating system and your network, you may be able to find
the CGN2’s IP address by looking up your computer’s default gateway. To do
this on (most) Windows machines, click Start > Run, enter “cmd”, and then
enter “ipconfig”. Get the IP address of the Default Gateway, and enter it in your
browser’s address bar.
4 If you still cannot access the CGN2, you need to reset the CGN2. See Resetting
the CGN2 on page 25. All user-configured data is lost, and the CGN2 is returned
to its default settings. If you previously backed-up a more recent version your
CGN2’s settings, you can now upload them to the CGN2; see The Backup
Screen on page 52.
2 If the default username and password do not work, you need to reset the CGN2.
See Resetting the CGN2 on page 25. All user-configured data is lost, and the
CGN2 is returned to its default settings. If you previously backed-up a more
recent version your CGN2’s settings, you can now upload them to the CGN2;
see The Backup Screen on page 52.
1 Ensure that you are using the correct IP address for the CGN2.
2 Check your network’s hardware connections, and that the CGN2’s LEDs display
correctly (see LEDs on page 18).
108 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
3 Make sure that your computer is on the same subnet as the CGN2; see IP
Address Setup on page 21.
4 If you are attempting to connect over the wireless network, there may be a
problem with the wireless connection. Connect via a LAN port instead.
5 If the above steps do not work, you need to reset the CGN2. See Resetting the
CGN2 on page 25. All user-configured data is lost, and the CGN2 is returned to
its default settings. If you previously backed-up a more recent version your
CGN2’s settings, you can now upload them to the CGN2; see The Backup
Screen on page 52.
Your service provider may have disabled your Internet access; check the Cable >
System Info screen’s Network Access field (see The System Info Screen on page
33).
1 Ensure that your wireless client device is functioning properly, and is configured
correctly. See the wireless client’s documentation if unsure.
2 Ensure that the wireless client is within the CGN2’s radio coverage area. Bear in
mind that physical obstructions (walls, floors, trees, etc.) and electrical
interference (other radio transmitters, microwave ovens, etc) reduce your
CGN2’s signal quality and coverage area.
3 Ensure that the CGN2 and the wireless client are set to use the same wireless
mode and SSID (see The Setup Screen on page 86) and security settings (see
The Access Control Screen on page 93).
5 If you are using WPS’s PBC (push-button configuration) feature, ensure that you
are pressing the button on the CGN2 and the button on the wireless client within
2 minutes of one another.
109 Version
Version2.0,
2.0,February
February2012.
2012.Copyright
Copyright 2012 Hitron Technologies
INDEX
access control 93
access logs 13
access point 12, 83
accounts, login 23 D
address, IP 21
address, IP, local 22 debugging 46, 50, 51
AP 12, 83 default 52
attached network devices 38 default IP address 22
authentication 91 default username and password 23
defaults 41, 42, 52
De-Militarized Zone 56
DHCP 13, 21, 22, 29, 49
B DHCP lease 30
diagnostics 46
DMZ 56
backup 52 DMZ De-Militarized Zone 13
backup and restore 13 DNS 46
bar, navigation 24 DOCSIS 26
BG protection mode 97 document conventions 2
buttons 14 Domain Name System 46
domain suffix 46
downstream transmission 31
DS 20
C
cable connection 12
cable connection status 37
E I
ETH 20 IANA 27
Ethernet 13 ICMP 56, 72
Ethernet cables 17 IEEE 802.11b/g/n 13, 84
Ethernet port 22 IGMP snooping 98
event logging 13 interface, user 12
intrusion detection 13, 55, 56, 72
IP address 21, 22, 27, 46, 108
IP address lease 30
IP address renewal 30
F IP address setup 21, 22
IP address, default 22
factory defaults 41, 42, 52 IP address, format 27
factory reset 16, 25 IP address, local 22
fast Ethernet 13 IP filtering 13, 55
FDMA 32 ISP 27
firewall 54
forwarding, port 13, 56, 65
frequencies, cable 31
F-type RF connector 13
K
keyword blocking 76
G
Graphical User Interface 12
graphical user interface 12
L
GUI 12, 24
GUI overview 24 LAN 12, 45, 83
LAN 1~4 17
LAN IP 47
LEDs 18, 107, 109
lights 18
H Local Area Network 12
local IP address 22
hardware 14 logging in 23
HNAP 43 login accounts 23
host ID 27 login screen 21
HT mode 98 logs, access 13
Q
N
QAM 32
QAM TCM 32
navigation 24 QoS 86
navigation bar 24 QPSK 32
network devices, attached 38
network diagnostics 46
network number 27
network, local 12
network, wide area 12
R
network, wireless 12
radio coverage 86
radio links 83
reboot 52
O reset 16, 25
restore and backup 13
RF connector 13
open system authentication 91 RJ45 connectors 17
overview, GUI 24 routing mode 28, 31, 45
rule, IP filtering 63
rule, port forwarding 67
P
parental control 13, 74 S
password 41, 42, 108
password and username 23 SCDMA 32
PBC configuration 85 scheduled website blocking 13
U X
upstream transmission 31 XP, Windows 22
URL blocking 76
US 20
user interface 12
username 108
username and password 23
W
WAN 12, 27
WAN connection 38