background image

ADMIN

Version 1.0, 02/2015. Copyright   2012 Hitron Technologies

95

Version 1.0, 02/2015. Copyright   2014 Hitron Technologies

95

Hitron CGNVM User’s Guide



Traceroute: this tool allows you to see the route taken by data packets to get 

from the CGNVM to the destination you specify. You can use this tool to solve 
routing problems, or identify firewalls that may be blocking your access to a 
computer or service.

5.2 

The Admin: Management Screen

Use this screen to make changes to the CGNVM’s login credentials (username and 
password) and inactivity idle time.

NOTE:  

If you forget your password, you will need to reset the CGNVM to its factory 

defaults.

Click 

Admin 

>

 Management

. The following screen displays.

Figure 37:   

The Admin: Management Screen

The following table describes the labels in this screen.

Table 28:   

The Admin: Management Screen

 

Username

If your CGNVM supports multiple user accounts, select 
the account you want to modify from the list.

Old Password

Enter the password with which you currently log into the 
CGNVM for this account.

Summary of Contents for CGNVM

Page 1: ...CGNVM DOCSIS 3 0 eMTA WiFi Gateway User s Guide Version 1 0 02 2015 SW Version CGNVM_4 5 10 10T3 MGCP 150429 ...

Page 2: ...duction on page 14 to see an overview of the topics covered in this manual Use the Table of Contents page 6 List of Figures page 10 and List of Tables page 12 to quickly find information about a particular GUI screen or topic Use the Index page 124 to find information on a specific keyword Use the rest of this User s Guide to see in depth descriptions of the CGNVM s features Related Documentation ...

Page 3: ...ragraphs are used to list items and to indicate options 1 Numbered paragraphs indicate procedural steps NOTE Notes provide additional information on a subject Warnings provide information about actions that could harm you or your device Product labels field labels field choices etc are in bold type For example A mouse click in the Graphical User Interface GUI is denoted by a right angle bracket Fo...

Page 4: ... s Guide Customer Support For technical assistance or other customer support issues please consult your Hitron representative Default Login Details The CGNVM s default IP address and login credentials are as follows For more information see Login to the CGNVM on page 25 Table 1 Default Credentials IP Address 192 168 0 1 Username cusadmin Password password ...

Page 5: ...emarks and registered trademarks used are the properties of their respective owners DISCLAIMER The information in this User s Guide is accurate at the time of writing This User s Guide is provided as is without express or implied warranty of any kind Neither Hitron Technologies nor its agents assume any liability for inaccuracies in this User s Guide or losses incurred by use or misuse of the info...

Page 6: ...res 15 1 2 Hardware Connections 15 1 3 Battery Installation optional 19 1 4 LEDs 20 1 5 IP Address Setup 24 1 5 1 Manual IP Address Setup 24 1 6 Login to the CGNVM 25 1 7 GUI Overview 26 1 8 Resetting the CGNVM 28 Status 29 2 1 Status Overview 29 2 1 1 DOCSIS 29 2 1 2 IP Addresses and Subnets 30 2 1 2 1 IP Address Format 30 2 1 2 2 IP Address Assignment 30 2 1 2 3 Subnets 31 2 1 3 DHCP 32 2 1 4 DH...

Page 7: ...reen 41 2 4 The Status DOCSIS Provisioning Screen 43 2 5 The Status DOCSIS WAN Screen 44 2 6 The Status DOCSIS Event Screen 47 2 7 The Status Wireless Screen 49 2 8 The Status MoCA Screen 52 Basic 54 3 1 Basic Overview 54 3 1 1 The Domain Name System 54 3 1 2 Port Forwarding 55 3 1 3 Port Triggering 55 3 1 4 DMZ 55 3 1 5 Routing Mode 55 3 2 The Basic LAN Setup Screen 56 3 3 The Basic Gateway Funct...

Page 8: ...sic Settings Guest Screen 90 4 3 The Wireless Access Control Screen 91 Admin 94 5 1 Admin Overview 94 5 1 1 Debugging Ping and Traceroute 94 5 2 The Admin Management Screen 95 5 3 The Admin Remote Management Screen 96 5 4 The Admin Diagnostics Screen 97 5 5 The Admin Backup Screen 98 5 6 The USB Storage Screen 99 5 7 The Admin Device Reset Screen 100 Security 102 6 1 Security Overview 102 6 1 1 Fi...

Page 9: ...2 2015 Copyright 2014 Hitron Technologies 9 Hitron CGNVM User s Guide 6 4 1 Adding or Editing a Managed Device 113 6 5 The Security Keyword Filter Screen 115 6 5 1 Adding or Editing a Keyword Filter Trusted Device Rule 117 MTA 119 7 1 The MTA Status Screen 119 Troubleshooting 121 Index 124 ...

Page 10: ...on Screen 42 Figure 14 The Status DOCSIS Provisioning Screen 44 Figure 15 The Status DOCSIS WAN Screen 45 Figure 16 The Status DOCSIS Event Screen 48 Figure 17 The Status Wireless Screen 50 Figure 18 The Status MoCA Screen 53 Figure 19 The Basic LAN Setup Screen 57 Figure 20 The Basic Gateway Function Screen 59 Figure 21 The Basic Port Forwarding Screen 60 Figure 22 The Basic Port Forwarding Add E...

Page 11: ...0 The Admin Backup Screen 99 Figure 41 The Admin USB Storage Screen 100 Figure 42 The Admin Device Reset Screen 101 Figure 43 The Security Firewall Screen 104 Figure 44 The Security Service Filter Screen 106 Figure 45 The Security Service Filter Add Edit Screen 108 Figure 46 Additional Service Filtering Options 109 Figure 47 The Security Service Filter Trusted Device Add Edit Screen 110 Figure 48 ...

Page 12: ...creen 57 Table 15 The Basic Gateway Function Screen 59 Table 16 The Basic Port Forwarding Screen 60 Table 17 The Basic Port Forwarding Add Edit Screen 62 Table 18 The Basic Port Triggering Screen 64 Table 19 The Basic Port Triggering Add Edit Screen 66 Table 20 The Basic DMZ Screen 68 Table 21 The Basic DNS Screen 69 Table 22 The Basic MoCA Screen 72 Table 23 The Wireless Basic Settings 2 4G Scree...

Page 13: ... 104 Table 35 The Security Service Filter Screen 106 Table 36 The Security Service Filter Add Edit Screen 108 Table 37 The Security Service Filter Trusted Device Add Edit Screen 110 Table 38 The Security Device Filter Screen 111 Table 39 The Security Device Filter Add Edit Screen 114 Table 40 The Security Keyword Filter Screen 116 Table 41 The Security Keyword Filter Trusted Device Add Edit Screen...

Page 14: ...pter introduces the CGNVM and its GUI Graphical User Interface 1 1 CGNVM Overview Your CGNVM is a DOCSIS cable modem router embedded Multimedia Terminal Adapter eMTA and wireless access point that allows you to connect your cabled Ethernet wireless devices and analog telephones to one another and to the Internet via your building s cable connection Figure 1 Application Overview ...

Page 15: ...fiers SSIDS 8 SSIDs per radio Individual configuration for each SSID including security bridging routing firewall and WiFi parameters Integrated DLNA media server with support for video audio and image serving Well defined LEDs that clearly display device and network status Enhanced management and stability for low total cost of ownership 2 FXS ports for telephony using SIP or MGCP MoCA 2 0 connec...

Page 16: ...INTRODUCTION Version 1 0 02 2015 Copyright 2012 Hitron Technologies 16 Version 1 0 02 2015 Copyright 2014 Hitron Technologies 16 Hitron CGNVM User s Guide Figure 2 Hardware Connections ...

Page 17: ... connection status as follows Bi color blinking the WPS connection is processing Green steady the WPS connection has been successful Red steady the WPS connection has failed or an error has occurred Off WPS is not active See WPS on page 78 for more information USB The CGNVM provides two USB 2 0 host ports allowing you to plug in USB flash disks for mounting and sharing through the LAN interfaces v...

Page 18: ...the CGNVM restarts using its factory default settings LINE 1 Use these ports to connect your analog phones for VoIP services using cables with RJ11 connectors LINE 2 LAN1 Use these ports to connect your computers and other network devices using Category 5 or 6 Ethernet cables with RJ45 connectors LAN2 LAN3 LAN4 CABLE Use this to connect to the Internet via an F type RF cable POWER Use the POWER po...

Page 19: ...CGNVM s battery without disconnecting the power cable NOTE The CGNVM battery is intended for use as a backup to the main power source not as a replacement for it For optimal power performance you should use the battery in conjunction with the main power source For safety and regulatory reasons batteries are shipped separately to the CGNVM and must be manually installed To install the battery 1 The...

Page 20: ...User s Guide Figure 5 Battery optional NOTE Your battery may look somewhat different from the battery depicted depending on the number of cells it contains 3 Insert the battery into the battery compartment 4 Replace the battery compartment door and return the CGNVM to an upright position 1 4 LEDs This section describes the CGNVM s LEDs lights ...

Page 21: ...NTRODUCTION Version 1 0 02 2015 Copyright 2012 Hitron Technologies 21 Version 1 0 02 2015 Copyright 2014 Hitron Technologies 21 Hitron CGNVM User s Guide Figure 6 LEDs Table 3 LEDs LED STATUS DESCRIPTION ...

Page 22: ...S Green blinking The CGNVM is searching for an upstream frequency on the CABLE connection Green steady The CGNVM has successfully located and locked onto a single upstream frequency on the CABLE connection Blue steady The CGNVM is successfully engaged in channel bonding on the upstream connection Off There is no upstream activity on the CABLE connection Online Green blinking The CGNVM s cable mode...

Page 23: ...less network Green blinking The 5GHz wireless network is enabled and data is being transmitted or received over the 5GHz wireless network Line 1 Line 2 Off No telephone is connected to the relevant Line port Green blinking A telephone is connected to the relevant Line port and is off hook Green steady A telephone is connected to the relevant Line port and is on hook BATTERY optional Off The CGNVM ...

Page 24: ...your CGNVM s IP settings may have been changed from their defaults If you do not know the CGNVM s new address you should return it to its factory defaults See Resetting the CGNVM on page 28 Bear in mind that ALL user configured settings are lost 1 5 1 Manual IP Address Setup By default your CGNVM s local IP address is 192 168 0 1 If your CGNVM is using the default IP address you should set your co...

Page 25: ...lt IP address enter an IP address and subnet mask that places your computer in the same subnet as the CGNVM 6 Click OK The Internet Protocol TCP IP window closes In the Local Area Connection Properties window click OK Your computer now obtains an IP address from the CGNVM or uses the IP address that you specified and can communicate with the CGNVM 1 6 Login to the CGNVM Take the following steps to...

Page 26: ...ide Figure 7 Login 3 Enter the Username and Password The default login username is cusadmin and the default password is password NOTE The Username and Password are case sensitive Password is not the same as password 4 Click Login The Status Overview screen displays see Status Overview on page 29 1 7 GUI Overview This section describes the CGNVM s GUI ...

Page 27: ... CGNVM User s Guide Figure 8 GUI Overview Table 4 GUI Overview Primary Navigation Use this section to move from one part of the GUI to another Secondary Navigation Use this section to move from one related screen to another Main Window Use this section to read information about your CGNVM s configuration and make configuration changes ...

Page 28: ...defaults all user configured settings are lost and the CGNVM is returned to its initial configuration state To reset the CGNVM click Admin Device Reset In the screen that displays click the Factory Reset button The CGNVM turns off and on again using its factory default settings NOTE Depending on your CGNVM s previous configuration you may need to re configure your computer s IP settings see IP Add...

Page 29: ...rmation Screen on page 41 The Status DOCSIS Provisioning Screen on page 43 The Status DOCSIS WAN Screen on page 44 The Status DOCSIS Event Screen on page 47 The Status Wireless Screen on page 49 The Status MoCA Screen on page 52 2 1 Status Overview This section describes some of the concepts related to the Status screens 2 1 1 DOCSIS The Data Over Cable Service Interface Specification DOCSIS is a ...

Page 30: ...value of 255 An IP address carries two basic pieces of information the network number the address of the network as a whole analogous to a street name and the host ID analogous to a house number which identifies the specific computer or other network device 2 1 2 2 IP Address Assignment IP addresses can come from three places The Internet Assigned Numbers Agency IANA Your Internet Service Provider...

Page 31: ...orporate local office for example while the main network includes several offices In order to define the extent of a subnet and to differentiate it from the main network a subnet mask is used This masks the part of the IP address that refers to the main network leaving the part of the IP address that refers to the sub network Each subnet mask has 32 bits binary digits as does each IP address A bin...

Page 32: ...guration Protocol or DHCP defines the process by which IP addresses can be assigned to computers and other networking devices automatically from another device on the network This device is known as a DHCP server and provides addresses to all the DHCP client devices In order to receive an IP address via DHCP a computer must first request one from the DHCP server this is a broadcast request meaning...

Page 33: ...nnot be changed although some devices are capable of MAC spoofing where they impersonate another device s MAC address MAC addresses are the most reliable way of identifying network devices since IP addresses tend to change over time whether manually altered or updated via DHCP Each MAC address displays as six groups of two hexadecimal digits separated by colons or occasionally dashes for example 0...

Page 34: ...he service provider Routing mode is not user configurable it is specified by the service provider in the CGNVM s configuration file 2 1 7 Configuration Files The CGNVM s configuration or config file is a document that the CGNVM obtains automatically over the Internet from the service provider s server which specifies the settings that the CGNVM should use It contains a variety of settings that are...

Page 35: ...drature Amplitude Modulation In many cases a number precedes the modulation type for example 16 QAM This number refers to the complexity of modulation The higher the number the more data can be encoded in each symbol NOTE In modulated signals each distinct modulated character for example each audible tone produced by a modem for transmission over telephone lines is known as a symbol Since more inf...

Page 36: ...from a TV antenna satellite or cable box to individual televisions around the building MoCA devices allow you use the coax cable network as an extension of your building s existing IP network which includes both wired Ethernet and wireless WiFi traffic Because they bridge the two networks they are known as Ethernet to Coax Bridges or ECBs Figure 9 Bridging the Gap Between IP and Coaxial Networks M...

Page 37: ... to outlet Each MoCA network uses a Network Controller NC to manage the network s communications but any ECB on the network is capable of acting as the NC By default the NC is chosen by negotiation between all ECBs on the network based on factors such as signal strength Outlet to outlet communications are also known as splitter jumping Traditional cable networking commonly utilized splitters to sp...

Page 38: ...ure 10 Traditional Vertical CATV vs Horizontal MoCA Networking 2 1 12 2 Example MoCA Mesh Network MoCA devices form a full mesh or peer to peer network where all devices communicate directly with one another In the following example four MoCA devices connect directly to and from one another via ECBs forming 12 unique MoCA links or 6 bidirectional links ...

Page 39: ...on Technologies 39 Version 1 0 02 2015 Copyright 2014 Hitron Technologies 39 Hitron CGNVM User s Guide Figure 11 Example MoCA Peer to Peer Network 2 2 The Status Overview Screen Use this screen to Click Status Overview The following screen displays ...

Page 40: ...STATUS Version 1 0 02 2015 Copyright 2012 Hitron Technologies 40 Version 1 0 02 2015 Copyright 2014 Hitron Technologies 40 Hitron CGNVM User s Guide Figure 12 The Status Overview Screen ...

Page 41: ...screen to see general information about your CGNVM s hardware its software and its connection to the Internet Click Status System Information The following screen displays Table 8 The Status Overview Screen Save Changes Click this to save your changes to the fields in this screen Cancel Click this to return the fields in this screen to their last saved values without saving your changes Help Click...

Page 42: ...lays a number that uniquely identifies the device HFC MAC Address This displays the Media Access Control MAC address of the CGNVM s Hybrid Fiber Coax HFC module This is the module that connects to the Internet through the CATV connection System Time This displays the current date and time Time Zone This displays the time zone in which the CGNVM is located LAN Up Time This displays the amount of ti...

Page 43: ... Provisioning The following screen displays Click Status DOCSIS Provisioning The following screen displays WAN Sending This displays the amount of data transmitted over the WAN connection since the device was last started Private LAN IP Address This displays the CGNVM s LAN subnet s IP information LAN Receiving This displays the amount of data received over the LAN connection since the device was ...

Page 44: ...mplete a connection step Success displays when the CGNVM has completed a connection step Disable displays when the relevant feature has been turned off 2 5 The Status DOCSIS WAN Screen Use this screen to discover information about The nature of the upstream and downstream connection between the CGNVM and the device to which it is connected through the CABLE interface IP details of the CGNVM s WAN ...

Page 45: ...STATUS Version 1 0 02 2015 Copyright 2012 Hitron Technologies 45 Version 1 0 02 2015 Copyright 2014 Hitron Technologies 45 Hitron CGNVM User s Guide Figure 15 The Status DOCSIS WAN Screen ...

Page 46: ...n the WAN DHCP Lease Time This displays the time that elapses before your device s IP address lease expires and a new IP address is assigned to it by the DHCP server Downstream Overview NOTE The downstream signal is the signal transmitted to the CGNVM Port ID This displays the ID number of the downstream connection s port Frequency Hz This displays the actual frequency in Hertz Hz of each downstre...

Page 47: ...ds and Uncorrectables Upstream Overview NOTE The upstream signal is the signal transmitted from the CGNVM Port ID This displays the ID number of the upstream connection s port Frequency Hz This displays the actual frequency in Hertz Hz of each upstream data channel to which the CGNVM is connected Modulation This displays the type of modulation that each upstream channel uses SNR dB This displays t...

Page 48: ...STATUS Version 1 0 02 2015 Copyright 2012 Hitron Technologies 48 Version 1 0 02 2015 Copyright 2014 Hitron Technologies 48 Hitron CGNVM User s Guide Figure 16 The Status DOCSIS Event Screen ...

Page 49: ...about the CGNVM s wireless network Click Status Wireless The following screen displays Table 11 The Status DOCSIS Event Screen No This displays the arbitrary incremental index number assigned to the event Time This displays the date and time at which the event occurred Type This displays the nature of the event Priority This displays the severity of the event Event This displays a description of t...

Page 50: ...STATUS Version 1 0 02 2015 Copyright 2012 Hitron Technologies 50 Version 1 0 02 2015 Copyright 2014 Hitron Technologies 50 Hitron CGNVM User s Guide Figure 17 The Status Wireless Screen ...

Page 51: ...eless network that the CGNVM s 5GHz network is using Wireless Channel 5GHz This displays the wireless channel on which the CGNVM s 5GHz wireless network is transmitting and receiving SSID Overview 2 4GHz SSID This displays the SSID Service Set IDentifier of the CGNVM s 2 4GHz wireless network and whether or not it is currently active Broadcast SSID This displays whether the CGNVM s 2 4GHz wireless...

Page 52: ...ork SSID is visible to client devices Enabled or not Disabled WMM This displays whether Wi Fi Multimedia is active Enabled or inactive Disabled on the CGNVM s 5GHz wireless network Security Mode This displays the type of security and encryption method currently enabled on the CGNVM s 5GHz wireless network Security Key This displays the wireless security password for the CGNVM s 5GHz wireless netwo...

Page 53: ... the strength of the signal that the CGNVM is receiving RX on the cable network from 0 extremely weak to 10 extremely strong Channel This displays the radio frequency RF channel on which the CGNVM is transmitting and receiving over the cable network Current Channel Frequency This displays the frequency in megahertz of the the radio frequency RF channel on which the CGNVM is transmitting and receiv...

Page 54: ... on page 60 The Basic Port Triggering Screen on page 64 The Basic DMZ Screen on page 67 The Basic DNS Screen on page 68 The Basic MoCA Screen on page 70 3 1 Basic Overview This section describes some of the concepts related to the Basic screens 3 1 1 The Domain Name System A domain is a location on a network for instance example com On the Internet domain names are mapped to the IP addresses to wh...

Page 55: ... automating port forwarding The CGNVM scans outgoing traffic from the LAN to the WAN to see if any of the traffic s destination ports match those specified in the port triggering rules you configure If any of the ports match the CGNVM automatically opens the incoming ports specified in the rule in anticipation of incoming traffic 3 1 4 DMZ In networking the De Militarized Zone DMZ is a part of you...

Page 56: ...e CGNVM directly The CGNVM does not perform any routing operations and traffic flows between the computers and the service provider 3 2 The Basic LAN Setup Screen Use this screen to View information about the CGNVM s connection to the WAN Configure the CGNVM s internal DHCP server Define how the CGNVM assigns IP addresses on the LAN See information about the network devices connected to the CGNVM ...

Page 57: ...ide Figure 19 The Basic LAN Setup Screen The following table describes the labels in this screen Table 14 The Basic LAN Setup Screen Private LAN Setting Private LAN IP Address Use this field to define the IP address of the CGNVM on the LAN Subnet Mask Use this field to define the LAN subnet Use dotted decimal notation for example 255 255 255 0 ...

Page 58: ... LAN when DHCP is enabled NOTE Devices requesting IP addresses once the DHCP pool is exhausted are not assigned an IP address Save Changes Click this to save your changes to the fields in this screen Cancel Click this to return the fields in this screen to their last saved values without saving your changes Help Click this to see information about the fields in this screen Connected Computers Host...

Page 59: ... Gateway Function The following screen displays Figure 20 The Basic Gateway Function Screen The following table describes the labels in this screen Status This displays Active when the connected computer is online and Inactive when the connected computer is offline Renew Click this to refresh the information in this section Table 15 The Basic Gateway Function Screen Residential Gateway function Se...

Page 60: ...en displays Figure 21 The Basic Port Forwarding Screen The following table describes the labels in this screen Save Changes Click this to save your changes to the fields in this screen Help Click this to see information about the fields in this screen Table 16 The Basic Port Forwarding Screen All Port Forwarding Rules Use this field to turn port forwarding on or off Select Enabled to turn port for...

Page 61: ...SP Local IP Address This displays the IP address of the computer on the LAN to which traffic conforming to the Public Port Range and Protocol conditions is forwarded Remote IP Address This displays the IP address of the computer on the WAN from which traffic conforming to the Public Port Range and Protocol conditions is forwarded to the Local IP Address Status Use this to turn the port forwarding ...

Page 62: ...it button NOTE Ensure that Enabled is selected in the Basic Port Forwarding screen in order to add or edit port forwarding rules The following screen displays Figure 22 The Basic Port Forwarding Add Edit Screen The following table describes the labels in this screen Table 17 The Basic Port Forwarding Add Edit Screen Common Application Use this field to select the application for which you want to ...

Page 63: ...r in the first field and the end port number in the second field To specify only a single port enter its number in both fields Private Port Range Use these fields to specify the ports to which the received traffic should be forwarded Enter the start port number in the first field The number of ports must match that specified in the Public Port Range so the CGNVM completes the second field automati...

Page 64: ... this screen Table 18 The Basic Port Triggering Screen All Port Triggering Rules Use this field to turn port triggering on or off Select Enabled to turn port triggering on Select Disabled to turn port triggering off Port Triggering Rules Application Name This displays the name you assigned to the rule when you created it Trigger This displays the range of outgoing ports When the CGNVM detects acti...

Page 65: ... of the port triggering rule TCP UDP or Both Timeout ms This displays the time in milliseconds after the CGNVM opens the Target ports that it should close them Twoway Status Usually a port triggering rule works for two IP addresses when a rule is enabled other IPs will also be allowed to use the rule as a trigger Status Use this field to turn the rule On or Off Manage Click this to make changes to...

Page 66: ... the CGNVM detects activity on any of these ports originating from a computer on the LAN it automatically opens the Target ports in expectation of incoming traffic Enter the start port number in the first field and the end port number in the second field To specify only a single port enter its number in both fields Target Port Range Use these fields to specify the target ports The CGNVM opens thes...

Page 67: ...e CGNVM should activate this trigger when it detects activity via Transmission Control Protocol TCP User Datagram Protocol UDP Transmission Control Protocol and User Datagram Protocol Both NOTE If in doubt leave this field at its default Both Timeout ms Enter the time in milliseconds after the CGNVM opens the Target ports that it should close them Apply Click this to save your changes to the field...

Page 68: ...reen Enable DMZ Use this field to turn the DMZ on or off Select Enabled to turn the DMZ on Select Disabled to turn the DMZ off Computers that were previously in the DMZ are now on the LAN DMZ Host Enter the IP address of the computer that you want to add to the DMZ Connected Devices Click this to see a list of the computers currently connected to the CGNVM on the LAN Save Changes Click this to sav...

Page 69: ...Use this to select whether to obtain DNS information automatically over the network or to define it manually Select Auto to obtain DNS information automatically Select Manual to obtain DNS information manually LAN DNS Proxy Status Use this to turn DNS proxy on or off on the LAN When DNS proxy is turned on default the DHCP server provides the CGNVM s LAN IP address as the DNS server for name resolu...

Page 70: ...uggested that you make a note of your device s Domain Suffix in case you ever need to access the CGNVM s GUI without knowledge of its IP address Proxy Hostname 1 When LAN DNS Obtain is set to Manual enter the IP addresses of up to two computers for which you want to manually add to the DNS Proxy Hostname 2 Save Changes Click this to save your changes to the fields in this screen Cancel Click this ...

Page 71: ...BASIC Version 1 0 02 2015 Copyright 2012 Hitron Technologies 71 Version 1 0 02 2015 Copyright 2014 Hitron Technologies 71 Hitron CGNVM User s Guide Figure 27 The Basic MoCA Screen ...

Page 72: ...for communication on the cable network see The Multimedia over Coax Alliance on page 36 This field allows you to select the channel plan that you want the CGNVM to use Select the channel plan that you wish to use from the dropdown list Figure 28 Channel Plan Options Channel Use this field to define the channel on which you want the CGNVM to communicate on the cable network dependent on the Channel...

Page 73: ...an Range Start Scan Range End If you selected SCAN in the Channel field use this field to select a channel at which the CGNVM should stop scanning for a connection on the cable network Figure 31 Scan Range End TxPower Use this field to set the power at which the CGNVM transmits TX over the cable network from 0 to 10 Beacon Pwr Level Use this field to set the CGNVM s beacon power on the cable netwo...

Page 74: ...ferred NC it will be the NC whenever it is available on the network if multiple devices are preferred the most suitable one will be chosen Select Preferred to add the CGNVM to the preferred group Security Select Enabled to turn MoCA security on Only MoCA devices configured to use the Password you define can access the network Select Disabled to turn MoCA security off Any MoCA device can access the...

Page 75: ...w This section describes some of the concepts related to the Wireless screens 4 1 1 Wireless Networking Basics Your CGNVM s wireless network is part of the Local Area Network LAN known as the Wireless LAN WLAN The WLAN is a network of radio links between the CGNVM and the other computers and devices that connect to it 4 1 2 Architecture The wireless network consists of two types of device access p...

Page 76: ...a transfer speeds low to high IEEE 802 11a IEEE 802 11b IEEE 802 11g IEEE 802 11n IEEE 802 11ac 4 1 4 Service Sets and SSIDs Each wireless network including all the devices that comprise it is known as a Service Set NOTE Depending on its capabilities and configuration a single wireless access point may control multiple Service Sets this is often done to provide different service or security levels...

Page 77: ...ed WPA PSK WiFi Protected Access Pre Shared Key WPA was created to solve the inadequacies of WEP There are two types of WPA the enterprise version known simply as WPA requires the use of a central authentication database server whereas the personal version supported by the CGNVM allows users to authenticate using a pre shared key or password instead While WPA provides good security it is still vul...

Page 78: ... printed on a sticker on the device s housing When you configure another device to use the same PIN the two devices authenticate with one another Once authenticated devices that have joined a network via WPS use the WPA2 security standard 4 1 6 WMM WiFi MultiMedia WMM is a Quality of Service QoS enhancement that allows prioritization of certain types of data over the wireless network WMM provides ...

Page 79: ...M See The Wireless Basic Settings 5G Screen on page 84 Use the WPS screen to enable WPS capable wireless clients to connect to the CGNVM via a simple push button or by entering a password See The Wireless Basic Settings WPS Screen on page 88 Use the Guest Network screen to enable wireless clients to connect to the CGNVM with reduced privileges See The Wireless Basic Settings Guest Screen on page 9...

Page 80: ...gies 80 Hitron CGNVM User s Guide Figure 32 The Wireless Basic Settings 2 4G Screen The following table describes the labels in this screen Table 23 The Wireless Basic Settings 2 4G Screen Basic Settings Wireless Enabled Select On to enable the 2 4GHz wireless network Select Off to disable the 2 4GHz wireless network ...

Page 81: ...ess Channel Select the 2 4GHz wireless channel that you want to use or select Auto to have the CGNVM select the optimum channel to use NOTE Use the Auto setting unless you have a specific reason to do otherwise WPS Enabled Use this field to turn Wifi Protected Setup WPS on or off on the 2 4GHz network Select ON to enable WPS Select OFF to disable WPS Multiple SSID Settings Network Name SSID Enter ...

Page 82: ...SSID WMM QoS This field displays whether Wifi MultiMedia WMM Quality of Service QoS settings are Enabled or Disabled on this SSID Security Mode Select the mode of security that you want to use on the 2 4GHz network Select None to use no security Anyone in the coverage area can enter your network Select WEP to use the Wired Equivalent Privacy security protocol Select WPA Personal to use the WiFi Pr...

Page 83: ...The options that display depend on the options you selected in the other fields in this screen WEP Select WEP64 to use a ten digit security key Select WEP128 to use a twenty six digit security key WPA PSK WPA2 PSK and Auto Select TKIP to use the Temporal Key Integrity Protocol Select AES to use the Advanced Encryption Standard Select TKIP AES to allow clients using either encryption type to connec...

Page 84: ...work screen to enable 5GHz wireless clients to connect to the CGNVM Click Wireless Basic Settings 5G The following screen displays Figure 33 The Wireless Basic Settings 5G Screen Cancel Click this to return the fields in this screen to their last saved values without saving your changes Help Click this to see information about the fields in this screen Table 23 The Wireless Basic Settings 2 4G Scr...

Page 85: ...ow clients using both IEEE 802 11a and IEEE 802 11n to access the network 802 11ac use IEEE 802 11ac 802 11n ac Mixed default allow clients using both IEEE 802 11n and IEEE 802 11ac to access the network NOTE Only wireless clients that support the network protocol you select can connect to the wireless network If in doubt use 802 11n ac Mixed default Wireless Channel Select the 5GHz wireless chann...

Page 86: ... SSID Select OFF to disable the SSID Broadcast SSID Use this field to make this SSID visible or invisible to other wireless devices Select ON if you want your network name SSID to be public Anyone with a wireless device in the coverage area can discover the SSID and attempt to connect to the network Select OFF if you do not want the CGNVM to broadcast the network name SSID to all wireless devices ...

Page 87: ...uggested that you use WEP only if it is the only security protocol your wireless clients support Under almost all circumstances you should use the WPA option Additionally use of WEP limits the wireless network speed to 54Mbps 802 11a speed Auth Mode Select the mode of authentication that you want to use Select WPA PSK to use the WiFi Protected Access Personal security protocol Select WPA2 PSK to u...

Page 88: ...t WEP128 to use a twenty six digit security key WPA PSK WPA2 PSK and Auto Select TKIP to use the Temporal Key Integrity Protocol Select AES to use the Advanced Encryption Standard Select TKIP AES to allow clients using either encryption type to connect to the CGNVM NOTE Use of the TKIP encryption standard limits the wireless network speed to 54Mbps 802 11a speed Passphrase Enter the security key o...

Page 89: ... begin the Push Button Configuration process You must then press the PBC button on your client wireless devices within two minutes in order to register them on your wireless network Click the PIN button to begin the PIN configuration process In the screen that displays enter the WPS PIN that you want to use for the CGNVM or the WPS PIN of the client device you want to add to the network WPS Status...

Page 90: ...en on page 90 Click Wireless Basic Settings Guest The following screen displays Figure 35 The Wireless Basic Settings Guest Screen The following table describes the labels in this screen Table 26 The Wireless Basic Settings Guest Screen Enable Guest Network Use this field to enable or disable the guest network Select ON to enable the guest network Select OFF to disable the guest network Guest Netw...

Page 91: ...ess Access Control Screen Guest Network Password Enter the password that wireless clients must be configured to use to connect to either the 2 4GHz or the 5GHz wireless guest network Max Guest Allowed Select the maximum number of wireless clients that may concurrently connect to the wireless guest network Save Changes Click this to save your changes to the fields in this screen Cancel Click this t...

Page 92: ... relevant device is connected Status This displays whether or not the connected device is active Action Click Manage to make changes to the device s filtering status see Adding or Editing a Managed Device on page 113 for information on the screen that displays Managed Devices Block Rules Use these buttons to control the action to be taken for the devices listed Select Allow All to ignore the Manag...

Page 93: ...aged Device on page 113 Add Managed Device Click this to add a new managed device rule see Adding or Editing a Managed Device on page 113 Save Changes Click this to save your changes to the fields in this screen Cancel Click this to return the fields in this screen to their last saved values without saving your changes Help Click this to see information about the fields in this screen Table 27 The...

Page 94: ...98 The Admin Device Reset Screen on page 100 5 1 Admin Overview This section describes some of the concepts related to the Admin screens 5 1 1 Debugging Ping and Traceroute The CGNVM provides a couple of tools to allow you to perform network diagnostics on the LAN Ping this tool allows you to enter an IP address and see if a computer or other network device responds with that address on the networ...

Page 95: ...Admin Management Screen Use this screen to make changes to the CGNVM s login credentials username and password and inactivity idle time NOTE If you forget your password you will need to reset the CGNVM to its factory defaults Click Admin Management The following screen displays Figure 37 The Admin Management Screen The following table describes the labels in this screen Table 28 The Admin Manageme...

Page 96: ...te Management Screen New Password Enter and re enter the password you want to use to log into the CGNVM for this account Confirm New Password Idle Time Select the time interval after which an inactive user should be logged out of the CGNVM s admin interface Save Changes Click this to save your changes to the fields in this screen Cancel Click this to return the fields in this screen to their last ...

Page 97: ... permit or forbid remote management via the relevant protocol ON OFF Select On to permit remote management via the Select Off to forbid remote management via the relevant protocol Remote IP Range Select Enabled to permit remote management for all protocols from computers with IP addresses in the range specified Select Disabled to allow computers with any IP address to manage the CGNVM remotely Sav...

Page 98: ...en to back up your CGNVM s settings to your computer or load settings from a backup you created earlier Click Admin Backup The following screen displays Table 30 The Admin Diagnostics Screen Destination IP or Domain Enter the IP address or URL that you want to test Ping Select the type of test that you want to run on the Destination that you specified Traceroute Result This field displays a report...

Page 99: ...nfigure your CGNVM s USB settings Click Admin USB Storage The following screen displays Table 31 The Admin Backup Screen Back Up Your Settings Locally Click this to create a backup of all your CGNVM s settings on your computer Restore Settings From a Local File Use these fields to return your CGNVM s settings to those specified in a backup that you created earlier Click Choose File to select a bac...

Page 100: ...min USB Storage Screen Shared Status Use this field to select whether the shared status of USB be active or not Select Enabled to activate the shared status Select Disabled to deactivate the shared status No This displays the arbitrary identification number assigned to the shared disk Disk This displays the network path of the shared disk Action Click Eject to remove the shared disk Save Changes C...

Page 101: ...e 42 The Admin Device Reset Screen The following table describes the labels in this screen Table 33 The Admin Device Reset Screen Reboot Device Click this to restart your CGNVM Restore Factory Default Settings Click this to return your CGNVM to its factory default settings When you do this all your user configured settings are lost and cannot be retrieved ...

Page 102: ...ter Screen on page 111 The Security Keyword Filter Screen on page 115 6 1 Security Overview This section describes some of the concepts related to the Security screens 6 1 1 Firewall The term firewall comes from a construction technique designed to prevent the spread of fire from one room to another Similarly your CGNVM s firewall prevents intrusion attempts and other undesirable activity originat...

Page 103: ... devices on the list access to the CGNVM and the network in which case all other devices can access the network or Allow the devices on the list to access the network in which case no other devices can access the network 6 1 4 Service Filtering Service filtering is a way of preventing users on the LAN from connecting with devices on the WAN via specific services protocols or applications It achiev...

Page 104: ...level of firewall protection that you want to apply to your LAN Details about the protection level display beneath the buttons Security Level These fields describe the specific protocols and applications that are permitted or denied by the firewall security level you select When you select Custom in the Firewall Level field additional fields display that allow you to toggle specific features on or...

Page 105: ...e not applied Click Security Service Filter The following screen displays Ping from WAN Use this field to permit or prohibit Internet Control Message Protocol ICMP echo requests from the WAN to the LAN Select Allow to permit pinging from the WAN Select Deny to prohibit pinging from the WAN Echo requests from the WAN to the LAN are silently ignored Save Changes Click this to save your changes to th...

Page 106: ...s field to turn service filtering on or off Select Enabled to turn service filtering on Select Disabled to turn service filtering off App Name This displays the name you assigned to the filtering rule when you created it Protocol This field displays the protocol or protocols to which this filtering rule applies Transmission Control Protocol TCP User Datagram Protocol UDP Port Range This displays t...

Page 107: ...s displays the arbitrary name of each trusted PC you configured MAC Address This displays the Media Access Control MAC address of each trusted PC Every network device has a MAC address that uniquely identifies it Status This displays whether the device is currently trusted Enabled or untrusted Disabled Manage Click Manage to make changes to the trusted device rule See Adding or Editing a Service F...

Page 108: ...it Screen Application Name Enter a name for the application for which you want to create the rule NOTE This name is arbitrary and does not affect functionality in any way Protocol Use this field to specify whether the CGNVM should filter via Transmission Control Protocol TCP User Datagram Protocol UDP NOTE If in doubt leave this field at its default TCP Port Range Use these fields to specify the s...

Page 109: ... display allowing you to specify the times at which the rule should be applied Figure 46 Additional Service Filtering Options Use the Managed Weekdays fields to specify the days on which the rule should be applied A red background indicates that the rule will be applied traffic will be blocked and a green background indicates that the rule will not be applied traffic will not be blocked Click a da...

Page 110: ...re 47 The Security Service Filter Trusted Device Add Edit Screen The following table describes the labels in this screen Table 37 The Security Service Filter Trusted Device Add Edit Screen Host Name Enter a name to identify the device MAC Address Enter the Media Access Control MAC address of the device Rule Status Use this field to define whether the trusted device rule should be active or not Sel...

Page 111: ...ireless network see The Wireless Access Control Screen on page 91 Click Security Device Filter The following screen displays Figure 48 The Security Device Filter Screen The following table describes the labels in this screen Table 38 The Security Device Filter Screen Connected Devices Host Name This displays the name of each network device connected on the LAN IP Address This displays the IP addre...

Page 112: ... to the CGNVM Select Allow Listed to permit only devices you added to the Managed Devices list to access the CGNVM and the network All other devices are denied access Select Deny to permit all devices except those you added to the Managed Devices list to access the CGNVM and the network The specified devices are denied access Host Name This displays the name of each network device in the list MAC ...

Page 113: ...d click its Manage button To add a new managed wireless network device click Add Managed Device in the Wireless Access Control screen To edit an existing managed wireless network device locate the device in the Wireless Access Control screen and click its Manage button The following screen displays Figure 49 The Security Device Filter Add Edit Screen Add Managed Device Click this to add a new mana...

Page 114: ...ted via the LAN you can enter its name here if you know it MAC Address If you are managing a device that already connected via the LAN this field displays the device s MAC Media Access Control address Alternatively if you are managing a device that is not connected via the LAN you can enter its MAC address here if you know it Device Managed Use this field to define whether the device should have i...

Page 115: ...at all times Select NO to managed the device only at certain times Additional fields display allowing you to specify the times at which the device should be managed Figure 50 Additional Service Filtering Options Use the Managed Weekdays fields to specify the days on which the device should be managed A red background indicates that the device will be managed access will be blocked and a green back...

Page 116: ...eld to turn keyword filtering on or off Select Enabled to turn keyword filtering on Select Disabled to turn keyword filtering off Keyword Enter the keyword that you want to block The CGNVM examines both the page s URL Internet address and its page content text Blocked Weekdays Use these fields to specify the times at which the keyword should be blocked A red background indicates that the rule will...

Page 117: ...ry name of each trusted PC you configured MAC Address This displays the Media Access Control MAC address of each trusted PC Every network device has a MAC address that uniquely identifies it Status This displays whether the device is currently trusted Enabled or untrusted Disabled Manage Click Manage to make changes to the trusted device rule See Adding or Editing a Keyword Filter Trusted Device R...

Page 118: ...lter Trusted Device Add Edit Screen Host Name Enter a name to identify the device MAC Address Enter the Media Access Control MAC address of the device Rule Status Use this field to define whether the trusted device rule should be active or not Select Enabled to activate the trusted device rule Select Disabled to deactivate the trusted device rule Apply Click this to save your changes to the fields...

Page 119: ... chapter describes the screens that display when you click MTA in the toolbar It contains the following sections The MTA Status Screen on page 119 7 1 The MTA Status Screen Use this screen to see general information about the CVE 30360 s embedded Multimedia Terminal Adapter module Click MTA Status The following screen displays Figure 53 The MTA Status Screen ...

Page 120: ...ioning Procedure DHCP This field displays the status of the remote telephony DHCP server Provisioning Flow Type This displays the type of security used for voice calls through the CGNV4 TFTP Configuration This field displays the status of the remote telephony TFTP server Registration This field displays the overall status of voice call registration Line Status Line 1 These fields display the curre...

Page 121: ... page 122 I Cannot Access the CGNVM or the Internet on page 122 I Cannot Connect My Wireless Device on page 123 Problem None of the LEDs Turn On The CGNVM is not receiving power or there is a fault with the device 1 Ensure that you are using the correct power cable battery Using a power source other than the one that came with your CGNVM can damage the CGNVM 2 If using the power cable ensure that ...

Page 122: ... operating system and your network you may be able to find the CGNVM s IP address by looking up your computer s default gateway To do this on most Windows machines click Start Run enter cmd and then enter ipconfig Get the IP address of the Default Gateway and enter it in your browser s address bar Problem I Forgot the CGNVM s Admin Username or Password The default username is admin and the default...

Page 123: ... client device is functioning properly and is configured correctly See the wireless client s documentation if unsure 2 Ensure that the wireless client is within the CGNVM s radio coverage area Bear in mind that physical obstructions walls floors trees etc and electrical interference other radio transmitters microwave ovens etc reduce your CGNVM s signal quality and coverage area 3 Ensure that the ...

Page 124: ...ection 14 cable connection status 43 cable modem 14 CATV 29 30 channel 72 channel plan 72 clients wireless 75 configuration file 34 connection status cable 43 conventions document 3 customer support 4 D debugging 94 97 default 98 default IP address 24 default username and password 26 defaults 98 De Militarized Zone 55 DHCP 24 32 DHCP lease 33 diagnostics 94 97 Digital Video Recording 36 DMZ 55 DNS...

Page 125: ...user 14 Internet video 36 intrusion detection 103 IP address 24 30 122 IP address lease 33 IP address renewal 33 IP address setup 24 IP address default 24 IP address format 30 IP address local 24 ISP 30 L LAN 29 54 75 94 102 LAN 1 4 18 LAN gaming 36 LAN setup 56 LEDs 20 121 123 lights 20 Line 1 2 23 local IP address 24 logging in 25 login accounts 26 login screen 24 M MAC address 33 MAC filtering ...

Page 126: ... PIN configuration 15 78 ping 94 97 port forwarding 55 60 64 port Ethernet 24 ports 15 private IP address 31 push button configuration 15 Q QAM 35 QAM TCM 35 QoS 78 QPSK 35 R radio links 75 reboot 98 reset 28 RJ45 connectors 18 routing mode 31 34 55 rule port forwarding 62 S scan range 73 SCDMA 35 security wireless 15 service filter 105 service set 76 splitter 37 splitter jumping 37 SSID 76 Status...

Page 127: ...2 username and password 26 V video 36 Video on Demand 36 videoconferencing 36 VoD 36 W WAN 30 WAN connection 44 WEP 15 77 Wifi MultiMedia 78 Wifi Protected Setup 15 78 window main 27 Windows XP 24 wireless access point 14 wireless clients 75 wireless connection 123 wireless networking standards 76 wireless security 15 77 wireless status 49 WLAN 75 WMM 78 WPA2 78 WPA2 PSK 15 77 WPA PSK 15 77 WPS 15...

Page 128: ...INDEX Version 1 0 02 2015 Copyright 2012 Hitron Technologies 128 Version 1 0 02 2015 Copyright 2014 Hitron Technologies 128 Hitron CGNVM User s Guide X XP Windows 24 ...

Reviews: