USER’ S GUIDE CVE-30360 VERSION 1. 1 AUGUST 2011 DEFAULT LOGIN DETAILS IP Address 192. 168. 0.
ABOUT THIS USER’S GUIDE INTENDED AUDIENCE This manual is intended for people who want to configure the CVE-30360’s features via its Graphical User Interface (GUI). HOW TO USE THIS USER’ S GUIDE This manual contains information on each the CVE-30360’s GUI screens, and describes how to use its various features. Use the Introduction (page 15) to see an overview of the topics covered in this manual.
HITRON CVE-30360 USER’S GUIDE Bulleted paragraphs are used to list items, and to indicate options. 1 Numbered paragraphs indicate procedural steps. NOTE: Notes provide additional information on a subject. Warnings provide information about actions that could harm you or your device. Product labels, field labels, field choices, etc. are in bold type. For example: Select UDP to use the User Datagram Protocol.
HITRON CVE-30360 USER’S GUIDE Copyright 2011 Hitron Technologies. All rights reserved. All trademarks and registered trademarks used are the properties of their respective owners. DISCLAIMER: The information in this User’s Guide is accurate at the time of writing. This User’s Guide is provided “as is” without express or implied warranty of any kind.
HITRON CVE-30360 USER’S GUIDE ABOUT THIS USER’S GUIDE
TABLE OF CONTENTS About This User’s Guide .................................................................. 3 Table of Contents.............................................................................. 7 List of Figures ................................................................................. 11 List of Tables................................................................................... 13 Introduction .....................................................................................
HITRON CVE-30360 USER’S GUIDE 2.1.6 Routing Mode ............................................................................ 28 2.1.7 Configuration Files .................................................................... 29 2.1.8 Downstream and Upstream Transmissions .............................. 29 2.1.9 Cable Frequencies .................................................................... 29 2.1.10 Modulation ............................................................................... 29 2.1.
HITRON CVE-30360 USER’S GUIDE Parental Control .............................................................................. 63 5.1 Parental Control Overview .................................................................63 5.1.1 Website Blocking .......................................................................63 5.2 The Web Site Blocking Screen ..........................................................63 5.3 The Scheduling Screen ................................................................
HITRON CVE-30360 USER’S GUIDE TABLE OF CONTENTS
LIST OF FIGURES FIGURE 1: Application Overview ........................................................................15 FIGURE 2: Hardware Connections .....................................................................17 FIGURE 3: LEDs .................................................................................................19 FIGURE 4: Login .................................................................................................22 FIGURE 5: GUI Overview .............................
HITRON CVE-30360 USER’S GUIDE FIGURE 32: The EMTA > DHCP Screen ...........................................................
LIST OF TABLES TABLE 1: Hardware Connections ......................................................................17 TABLE 2: LEDs ..................................................................................................19 TABLE 3: GUI Overview ....................................................................................23 TABLE 4: Private IP Address Ranges ...............................................................26 TABLE 5: IP Address: Decimal and Binary .........................
HITRON CVE-30360 USER’S GUIDE LIST OF TABLES
1 INT RODUCT ION This chapter introduces the CVE-30360 and its GUI (Graphical User Interface). 1. 1 CVE-30360 OVERVIEW Your CVE-30360 is a voice-enabled cable modem and wireless access point that allows you to connect your computers, analog telephones, wireless devices, and other network devices to one another, and to the Internet via the cable connection.
HIT RON CVE-30360 USER’ S GUIDE 1. 1. 1 KEY FEATURES The CVE-30360 provides: Internet connection to cable modem service via CATV port (F-type RF connector) Voice over IP (VoIP) connection to your voice service provider. Local Area Network connection via four 10/100/1000 Mbps (megabits per second) Ethernet ports Dynamic Host Configuration Protocol (DHCP) for devices on the LAN LAN troubleshooting tools (Ping and Traceroute) IEEE 802.
HIT RON CVE-30360 USER’ S GUIDE FIGURE 2: Hardware Connections TABLE 1: Hardware Connections WIFI Use this button to turn the wireless network on or off, and to begin the WiFi Protected Setup (WPS) PushButton Configuration (PBC) procedure (see WPS on page 75 for more information.) To turn the wireless network on or off, press the button for between one and five seconds. To begin the WPS PBC connection procedure, press and hold the button for between five and ten seconds.
HIT RON CVE-30360 USER’ S GUIDE TABLE 1: Hardware Connections LAN1 Use these ports to connect your computers and other network devices, using Category 5 or 6 Ethernet cables LAN2 with RJ45 connectors. LAN3 LAN4 LINE 1 LINE 2 Use these ports to connect your analog phones for VoIP services, using cables with RJ11 connectors. CABLE Use this to connect to the Internet via an F-type RF cable. POWER Use this to connect to the 12v/2A power adapter that came with your CVE-30360.
HIT RON CVE-30360 USER’ S GUIDE FIGURE 3: LEDs TABLE 2: LEDs LED STATUS LINE 1 LINE 2 Off DESCRIPTION Your service plan does not include voice service. NOTE: The number of LINE LEDs that light up depends on your voice service plan. Blinking A telephone is connected to the relevant Line port, and is off-hook. On Your service plan includes voice service. NOTE: The number of LINE LEDs that light up depends on your voice service plan.
HIT RON CVE-30360 USER’ S GUIDE TABLE 2: LEDs ETH Off Status US DS Power No device is connected to any LAN port. Blinking A device is connected to a LAN port via a fast Ethernet link, and is transmitting or receiving data. On A device is connected to a LAN port via a fast ethernet link, but is not transmitting or receiving data. Blinking The CVE-30360’s cable modem is registering with the service provider.
HIT RON CVE-30360 USER’ S GUIDE The CVE-30360 has a built-in DHCP server that, when active, assigns IP addresses to computers on the LAN. When the DHCP server is active, you can get an IP address automatically. The DHCP server is active by default. If your computer is configured to get an IP address automatically, or if you are not sure, try to log in to the CVE-30360 (see Logging into the CVE-30360 on page 13). If the login screen displays, your computer is already configured correctly.
HIT RON CVE-30360 USER’ S GUIDE If your CVE-30360’s DHCP server is active, select Get an IP address automatically. If your CVE-30360’s DHCP server is not active, select Use the following IP address. In the IP address field, enter a value between 192.168.0.2 and 192.168.0.254 (default). In the Subnet mask field, enter 255.255.255.0 (default). NOTE: If your CVE-30360 is not using the default IP address, enter an IP address and subnet mask that places your computer in the same subnet as the CVE30360.
HIT RON CVE-30360 USER’ S GUIDE NOTE: The Username and Password are case-sensitive; “admin” is not the same as “Admin”. 4 Click Login. The System Info screen displays (see The System Info Screen on page 30). 1. 6 GUI OVERVIEW This section describes the CVE-30360’s GUI. FIGURE 5: GUI Overview TABLE 3: GUI Overview Primary Use this section to move from one part of the GUI to another. Navigation Bar Secondary Navigation Bar Use this section to move from one related screen to another.
HIT RON CVE-30360 USER’ S GUIDE Press the RESET button on the CVE-30360, and hold it in for ten seconds or longer. Click LAN > Backup. In the screen that displays, click the Factory Reset button. The CVE-30360 turns off and on again, using its factory default settings. NOTE: Depending on your CVE-30360’s previous configuration, you may need to reconfigure your computer’s IP settings; see IP Address Setup on page 11.
2 CABLE This chapter describes the screens that display when you click Cable in the toolbar. 2.1 CABLE OVERVIEW This section describes some of the concepts related to the Cable screens. 2.1.1 DOCSIS The Data Over Cable Service Interface Specification (DOCSIS) is a telecommunications standard that defines the provision of data services) Internet access) over a traditional cable TV (CATV) network. Your CVE-30360 supports DOCSIS version 3.0. 2.1.
HITRON CVE-30360 USER’S GUIDE Your Internet Service Provider You (or your network devices) IANA is responsible for IP address allocation on a global scale, and your ISP assigns IP addresses to its customers. You should never attempt to define your own IP addresses on a public network, but you are free to do so on a private network. In the case of the CVE-30360: The public network (Wide Area Network or WAN) is the link between the cable (CATV) connector and your Internet Service Provider.
HITRON CVE-30360 USER’S GUIDE For example, the following table shows the IP address of a computer (192.168.1.1) expressed in decimal and binary (each cell in the table indicates one octet): TABLE 5: IP Address: Decimal and Binary 192 168 0 11000000 10101000 00000000 1 00000001 The following table shows a subnet mask that “masks” the first twenty-four bits of the IP address, in both its decimal and binary notation.
HITRON CVE-30360 USER’S GUIDE 2.1.4 DHCP LEASE “DHCP lease” refers to the length of time for which a DHCP server allows a DHCP client to use an IP address. Usually, a DHCP client will request a DHCP lease renewal before the lease time is up, and can continue to use the IP address for an additional period. However, if the client does not request a renewal, the DHCP server stops allowing the client to use the IP address.
HITRON CVE-30360 USER’S GUIDE When the CVE-30360 is not in routing mode, the service provider assigns an IP address to each computer connected to the CVE-30360 directly. The CVE-30360 does not perform any routing operations, and traffic flows between the computers and the service provider. Routing mode is not user-configurable; it is specified by the service provider in the CVE-30360’s configuration file. 2.1.
HITRON CVE-30360 USER’S GUIDE In many cases, a number precedes the modulation type (for example 16 QAM). This number refers to the complexity of modulation. The higher the number, the more data can be encoded in each symbol. NOTE: In modulated signals, each distinct modulated character (for example, each audible tone produced by a modem for transmission over telephone lines) is known as a symbol.
HITRON CVE-30360 USER’S GUIDE FIGURE 6: The Cable > System Info Screen The following table describes the labels in this screen. TABLE 7: The Cable > System Info Screen General Information Vendor Identification This displays the name of the company that supplied the CVE-30360. Model Name This displays the device’s model name (CVE-30360). DOCSIS Mode This displays the version of the Data Over Cable Service Interface Specification (DOCSIS) standard to which the CVE-30360 complies.
HITRON CVE-30360 USER’S GUIDE TABLE 7: The Cable > System Info Screen (continued) Primary BSSID This displays the Media Access Control (MAC) address of MAC Address the CVE-30360’s Basic Service Set IDentifier (BSSID). This is the MAC address of the wireless module to which wireless clients connect. NOTE: You may have additional BSSIDs, depending on your contract with your service provider. System Time This displays the current date and time.
HITRON CVE-30360 USER’S GUIDE FIGURE 7: The Cable > Initialization Screen For each step: Process displays when the CVE-30360 is attempting to complete a connection step. Success displays when the CVE-30360 has completed a connection step. 2.4 THE STATUS SCREEN Use this screen to discover information about: The nature of the upstream and downstream connection between the CVE30360 and the device to which it is connected through the CATV interface. IP details of the CVE-30360’s WAN connection.
HITRON CVE-30360 USER’S GUIDE FIGURE 8: The Cable > Status Screen The following table describes the labels in this screen. TABLE 8: The Cable > Status Screen Network Access This displays whether or not your service provider allows you to access the Internet over the CATV connection. Permitted displays if you can access the Internet. Denied displays if you cannot access the Internet. Downstream NOTE: The downstream signal is the signal transmitted to the CVE-30360.
HITRON CVE-30360 USER’S GUIDE TABLE 8: The Cable > Status Screen (continued) Frequency to Tune to This displays the current center frequency in Hertz (Hz) over which data is transmitted to the CVE-30360 over the CATV interface. This is the frequency to which the CVE-30360 is locked in; it will only scan for another frequency if this frequency becomes unavailable. If you want the CVE-30360 to attempt to connect at a different frequency, enter it in the field and click Apply.
HITRON CVE-30360 USER’S GUIDE TABLE 8: The Cable > Status Screen (continued) Gateway IP This displays the IP address of the device to which the CVE-30360 is connected over the CATV interface. DHCP Lease Time This displays the time that elapses before your device’s IP address lease expires, and a new IP address is assigned to it by the DHCP server. System Time This displays the current date and time. 2.
HITRON CVE-30360 USER’S GUIDE TABLE 9: The Cable > Password Screen (continued) Cancel Click this to return the fields in this screen to their lastsaved values without saving your changes. Help Click this to see information about the fields in this screen.
HITRON CVE-30360 USER’S GUIDE CABLE
3 LAN This chapter describes the screens that display when you click LAN in the toolbar. 3.1 LAN OVERVIEW This section describes some of the concepts related to the LAN screens. 3.1.1 LOCAL AREA NETWORKS A Local Area Network (LAN) is a network of computers and other devices that usually occupies a small physical area (a single building, for example). Your CVE-30360’s LAN consists of all the computers and other networking devices connected to the LAN 1~4 ports.
HITRON CVE-30360 USER’S GUIDE 3.1.3 DOMAIN SUFFIX A domain is a location on a network, for instance example.com. On the Internet, domain names are mapped to the IP addresses to which they should refer by the Domain Name System. This allows you to enter “www.example.com” into your browser and reach the correct place on the Internet even if the IP address of the website’s server has changed. Similarly, the CVE-30360 allows you to define a Domain Suffix to the LAN.
HITRON CVE-30360 USER’S GUIDE FIGURE 10: The LAN > LAN IP Screen The following table describes the labels in this screen. TABLE 10: The LAN > LAN IP Screen WAN Information WAN Address This field displays the CVE-30360’s IP address on the WAN (Wide Area Network) interface. Subnet Mask This field displays the CVE-30360’s WAN subnet mask. Gateway Address This field displays the address of the device on the WAN to which the CVE-30360 is connected.
HITRON CVE-30360 USER’S GUIDE TABLE 10: The LAN > LAN IP Screen (continued) Domain Suffix Use this field to define the domain that you can enter into a Web browser (instead of an IP address) to reach the CVE30360 on the LAN. NOTE: The Domain Suffix is hitronhub.home by default. Private LAN DHCP Setting Enable LAN DHCP Select this if you want the CVE-30360 to provide IP addresses to network devices on the LAN automatically.
HITRON CVE-30360 USER’S GUIDE Click LAN > Switch Setup. The following screen displays. FIGURE 11: The LAN > Switch Setup Screen The following table describes the labels in this screen. TABLE 11: The LAN > Switch Setup Screen Port This displays the LAN port number. Speed Duplex This displays the maximum achievable data speed in megabits per second (MBPS). This displays Full when data can flow inbetween the CVE-30360 and the connected device in both directions simultaneously.
HITRON CVE-30360 USER’S GUIDE FIGURE 12: The LAN > Debug Screen The following table describes the labels in this screen. TABLE 12: The LAN > Debug Screen IP/URL Enter the IP address or URL that you want to test. Method Select the type of test that you want to run on the IP/ URL that you specified. Run Click this to perform the test. Help Click this to see information about the fields in this screen. 3.
HITRON CVE-30360 USER’S GUIDE The following table describes the labels in this screen. TABLE 13: The LAN > Backup Screen Backup/Restore Setting Backup Settings Locally Click this to create a backup of all your CVE-30360’s settings on your computer. Restore Settings Locally Use these fields to return your CVE-30360’s settings to those specified in a backup that you created earlier. Click Choose to select a backup, then click Restore to return your CVE-30360’s settings to those specified in the backup.
HITRON CVE-30360 USER’S GUIDE LAN
4 FIREWALL This chapter describes the screens that display when you click Firewall in the toolbar. 4.1 FIREWALL OVERVIEW This section describes some of the concepts related to the Firewall screens. 4.1.1 FIREWALL The term “firewall” comes from a construction technique designed to prevent the spread of fire from one room to another. Similarly, your CVE-30360’s firewall prevents intrusion attempts and other undesirable activity originating from the WAN, keeping the computers on your LAN safe.
HITRON CVE-30360 USER’S GUIDE Deny the devices on the list access to the CVE-30360 and the network (in which case all other devices can access the network) or Allow the devices on the list to access the network (in which case no other devices can access the network) 4.1.5 IP FILTERING IP filtering allows you to prevent computers on the LAN from sending certain types of data to the WAN. You can use this to prevent unwanted outgoing communications.
HITRON CVE-30360 USER’S GUIDE 4.1.8 DMZ In networking, the De-Militarized Zone (DMZ) is a part of your LAN that has been isolated from the rest of the LAN, and opened up to the WAN. The term comes from the military designation for a piece of territory, usually located between two opposing forces, that is isolated from both and occupied by neither. NOTE: This feature is not available when the DS-lite function is enabled. 4.
HITRON CVE-30360 USER’S GUIDE The following table describes the labels in this screen. TABLE 14: The Firewall > Firewall Options Screen Intrusion Detection Select this to turn the intrusion detection system off. System Deselect this to turn the intrusion detection system on. Ping on WAN Interface Select this to prevent responses to ICMP requests originating from the WAN. Select this to allow responses to ICMP requests originating from the WAN.
HITRON CVE-30360 USER’S GUIDE FIGURE 15: The Firewall > MAC Filtering Screen The following table describes the labels in this screen. TABLE 15: The Firewall > MAC Filtering Screen MAC Filter Options MAC Filter Options Use this field to control whether the CVE-30360 performs MAC filtering. Select Allow-All to turn MAC filtering off. All devices may access the CVE-30360 and the network.
HITRON CVE-30360 USER’S GUIDE TABLE 15: The Firewall > MAC Filtering Screen (continued) # This displays the index number assigned to the permitted device. Device Name This displays the name you gave to the permitted device. MAC Address This displays the MAC address of the permitted device. Delete Select a permitted device’s radio button ( ) and click this to remove the device from the list. The device may no longer access the CVE-30360 and the network.
HITRON CVE-30360 USER’S GUIDE TABLE 15: The Firewall > MAC Filtering Screen (continued) Add Click this to add the device to the list you specified. Cancel Click this to clear the Manually-Added LAN Devices fields. Apply Click this to save your changes to the fields in this screen. Cancel Click this to return the fields in this screen to their lastsaved values without saving your changes. Help Click this to see information about the fields in this screen. 4.
HITRON CVE-30360 USER’S GUIDE TABLE 16: The Firewall > IP Filtering Screen (continued) Port Range This displays the start and end values of the ports to which communications from the specified IP addresses is not permitted. Protocol This displays the type of communications that are not permitted: TCP displays if communications via the Transmission Control Protocol are not permitted. UDP displays if communications via the User Datagram Protocol are not permitted.
HITRON CVE-30360 USER’S GUIDE FIGURE 17: The Firewall > IP Filtering > Add/Edit Screen The following table describes the labels in this screen. TABLE 17: The Firewall > IP Filtering > Add/Edit Screen Application Name Enter a name for the application that you want to block. NOTE: This name is arbitrary, and does not affect functionality in any way. Port Range Use these fields to specify the target port range to which communication should be blocked.
HITRON CVE-30360 USER’S GUIDE TABLE 17: The Firewall > IP Filtering > Add/Edit Screen Cancel Click this to return the fields in this screen to their lastsaved values without saving your changes. Help Click this to see information about the fields in this screen. 4.5 THE FORWARDING SCREEN Use this screen to configure port forwarding between computers on the WAN and computers on the LAN. You can turn port forwarding on or off and configure new and existing port forwarding rules.
HITRON CVE-30360 USER’S GUIDE TABLE 18: The Firewall > Forwarding Screen (continued) Port Range These fields display the ports to which the rule applies: The Public field displays the incoming port range. These are the ports on which the CVE-30360 received traffic from the originating host on the WAN. The Private field displays the port range to which the CVE-30360 forwards traffic to the device on the LAN.
HITRON CVE-30360 USER’S GUIDE 4.5.1 ADDING OR EDITING A PORT FORWARDING RULE To add a new port forwarding rule, click Add in the Firewall > Forwarding screen. To edit an existing port forwarding rule, select the rule’s radio button ( ) in the Firewall > Forwarding screen and click the Edit button. The following screen displays. FIGURE 19: The Firewall > Forwarding > Add/Edit Screen The following table describes the labels in this screen.
HITRON CVE-30360 USER’S GUIDE TABLE 19: The Firewall > Forwarding > Add/Edit Screen Protocol Use this field to specify whether the CVE-30360 should forward traffic via: Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Transmission Control Protocol and User Datagram Protocol (TCP/UDP) Generic Routing Encapsulation (GRE) Encapsulating Security Protocol (ESP) NOTE: If in doubt, leave this field at its default (TCP/ UDP).
HITRON CVE-30360 USER’S GUIDE FIGURE 20: The Firewall > Port Triggering Screen The following table describes the labels in this screen. TABLE 20: The Firewall > Port Triggering Screen All Port Triggering Rules Use this field to turn port triggering on or off. Select the checkbox to enable port triggering. Deselect the checkbox to disable port triggering. Select Select a port triggering rule’s radio button ( clicking Edit or Delete.
HITRON CVE-30360 USER’S GUIDE TABLE 20: The Firewall > Port Triggering Screen Add New Click this to define a new port triggering rule. See Adding or Editing a Port Triggering Rule on page 61 for information on the screen that displays. Edit Select a port triggering rule’s radio button ( ) and click this to make changes to the rule. See Adding or Editing a Port Triggering Rule on page 61 for information on the screen that displays.
HITRON CVE-30360 USER’S GUIDE The following table describes the labels in this screen. TABLE 21: The Firewall > Port Triggering > Add/Edit Screen Application Name Enter a name for the application for which you want to create the rule. NOTE: This name is arbitrary, and does not affect functionality in any way. Trigger Port Range Use these fields to specify the trigger ports.
5 PARENTAL CONTROL This chapter describes the screens that display when you click Parent Control in the toolbar. 5.1 PARENTAL CONTROL OVERVIEW This section describes some of the concepts related to the Parent Control screens. 5.1.1 WEBSITE BLOCKING The Parent Control screens allow you to block access from computers on the LAN to certain websites, or websites whose URLs (website addresses) contain the keywords you specify.
HITRON CVE-30360 USER’S GUIDE FIGURE 22: The Parent Control > Web Site Blocking Screen The following table describes the labels in this screen. TABLE 22: The Parent Control > Web Site Blocking Screen Web Site Blocking Options Enable Web Site Blocking Use this field to turn web site blocking on or off. New Key Word/URL Blocking Use these fields to configure the websites to which users on the LAN are denied access: Select the checkbox to enable web site blocking.
HITRON CVE-30360 USER’S GUIDE TABLE 22: The Parent Control > Web Site Blocking Screen (continued) Blocked Key Words/ This displays the list of websites and keywords to which URLs users on the LAN are denied access. Select a URL or keyword and click Remove to delete it from the list. Click Clear List to delete all the URLs and keywords from the list.
HITRON CVE-30360 USER’S GUIDE FIGURE 23: The Parent Control > Scheduling Screen The following table describes the labels in this screen. TABLE 23: The Parent Control > Scheduling Screen Days of the Week Select the days of the week on which you want the website blocking filter to be in effect. Time of Day Use these fields to control the time that the website blocking filter should be in effect: Select All Day to apply the website blocking filter at all times.
HITRON CVE-30360 USER’S GUIDE 5.4 THE LOCAL LOGS SCREEN Use this screen to see information about events that have triggered the website blocking filter. Click Parent Control > Local Logs. The following screen displays. FIGURE 24: The Parent Control > Local Logs Screen The following table describes the labels in this screen.
HITRON CVE-30360 USER’S GUIDE PARENTAL CONTROL
6 WIRELESS This chapter provides an introduction to wireless networking, describes some common wireless network setup procedures, and documents the screens that display when you click Wireless in the toolbar. It contains the following sections: Wireless Basics on page 69: this section describes how wireless networks work and are secured. Wireless Tutorials on page 71: this section describes how to perform some common wireless network configuration tasks using your CVE-30360.
HITRON CVE-30360 USER’S GUIDE FIGURE 25: Example Wireless Network 6.1.1 WIRELESS STANDARDS The way in which wireless devices communicate with one another is standardized by the Institute of Electrical and Electronics Engineers (IEEE). The IEEE standards pertaining to wireless LANs are identified by their 802.11 designation. There are a variety of WLAN standards, but the CVE-30360 supports the following (in order of adoption - old to new - and data transfer speeds - low to high): IEEE 802.
HITRON CVE-30360 USER’S GUIDE 6.1.3 BASIC WIRELESS SECURITY Radio is inherently an insecure medium, since it can be intercepted by anybody in the coverage area with a radio receiver. Therefore, a variety of techniques exist in an attempt to secure it. These techniques control authentication (identifying who should be allowed to join the network) and encryption (signal scrambling so that only authenticated users can decode the transmitted data).
HITRON CVE-30360 USER’S GUIDE You should choose the best security method available; see Basic Wireless Security on page 71 for a list of methods the CVE-30360 supports, in order of effectiveness. In order to find out which security methods your other wireless devices support, you can: Look at the wireless device and see if it has a label listing the methods supported. Look at any documentation or packaging that came with the device.
HITRON CVE-30360 USER’S GUIDE If you are using the WPS PIN security, where you have a WPS password that you enter into each device on the network, go to the Wireless > Basic screen and click the PIN button. In the screen that displays, enter the WPS PIN that you want to use for the CVE-30360, or the WPS PIN of the client device you want to add to the network. If you are using WEP, go to the Wireless > Security screen. Use the WEP Settings section to define the key(s) you want to use.
HITRON CVE-30360 USER’S GUIDE 1 Interference from physical objects 2 Radio Frequency (RF) interference To minimize interference from physical objects: Move the CVE-30360 away from walls, heavy furniture, other massive or metallic objects like refrigerators, and so forth. Install the CVE-30360 in a higher location. To minimize RF interference: Move the CVE-30360 away from sources of RF energy such as wireless telephone base stations, microwaves, and so forth.
HITRON CVE-30360 USER’S GUIDE WEP (the Wired Equivalency Protocol): this protocol uses a series of “keys” or data strings to authenticate the wireless client with the AP, and to encrypt data sent over the wireless link. WEP is a deprecated protocol, and should only be used when it is the only security standard supported by the wireless clients. WEP provides only a nominal level of security, since widely-available software exists that can break it in a matter of minutes.
HITRON CVE-30360 USER’S GUIDE 6.3.2.2 WMM WiFi MultiMedia (WMM) is a Quality of Service (QoS) enhancement that allows prioritization of certain types of data over the wireless network. WMM provides four data type classifications (in priority order; highest to lowest): Voice Video Best effort Background If you wish to improve the performance of voice and video (at the expense of other, less time-sensitive applications such as Internet browsing and FTP transfers), you can enable WMM.
HITRON CVE-30360 USER’S GUIDE The following table describes the labels in this screen. TABLE 25: The Wireless > Basic Screen Wireless Basic Settings Wireless ON/OFF Use this field to turn the wireless network on or off. Select ENABLE to turn the wireless network on. Deselect DISABLE to turn the wireless network off. Wireless Mode Select the type of wireless network that you want to use: 11B/G Mixed: use IEEE 802.11b and 802.11n 11B Only: use IEEE 802.11b 11G Only: use IEEE 802.
HITRON CVE-30360 USER’S GUIDE TABLE 25: The Wireless > Basic Screen (continued) SSID Setting This displays Primary SSID. NOTE: You may have additional BSSIDs, depending on your contract with your service provider. SSID Name Enter the name that you want to use for your wireless network. This is the name that identifies your network, and to which wireless clients connect. NOTE: It is suggested that you change the SSID from its default, for security reasons.
HITRON CVE-30360 USER’S GUIDE FIGURE 28: The Wireless > Security Screen The following table describes the labels in this screen. TABLE 26: The Wireless > Security Screen Wireless Security SSID Select the SSID for which you want to configure security. NOTE: At the time of writing, only one SSID is available. Security Mode Select the type of security that you want to use. Select None to use no security. Anyone in the coverage area can enter your network.
HITRON CVE-30360 USER’S GUIDE TABLE 26: The Wireless > Security Screen (continued) WEP Settings NOTE: These fields are only configurable when you select WEP from the Security Mode list. WEP Key Length Use this field to specify the length of the security key used to allow wireless devices to join the network. The longer the key, the more secure it is. Select 64-bit to use a ten-digit security key. Select 128-bit to use a twenty-six-digit security key.
HITRON CVE-30360 USER’S GUIDE TABLE 26: The Wireless > Security Screen (continued) WPA_Personal NOTE: These fields are only configurable when you select WPA-Personal from the Security Mode list. WPA Mode Select the type of WPA security that you want to use: Select WPA-PSK to use Wifi Protected Access (PreShared Key) mode Select WPA2-PSK to use Wifi Protected Access 2 (Pre-Shared Key) mode Select Auto (WPA-PSK or WPA2-PSK) to allow clients operating in either mode to connect to the CVE-30360.
HITRON CVE-30360 USER’S GUIDE 6.4.3 THE ACCESS CONTROL SCREEN Use this screen to configure Media Access Control (MAC) address filtering on the wireless network. NOTE: To configure MAC address filtering on the wired LAN, see The MAC Filtering Screen on page 50. You can set the CVE-30360 to allow only certain devices to access the CVE-30360 and the network wirelessly, or to deny certain devices access. Click Wireless > Access Control. The following screen displays.
HITRON CVE-30360 USER’S GUIDE TABLE 27: The Wireless > Access Control Screen (continued) MAC Filtering Mode Use this field to control whether the CVE-30360 performs MAC filtering on the wireless network. Select Allow-All to turn MAC filtering off. All devices may access the CVE-30360 and the network wirelessly. Select Allow to permit only devices with the MAC addresses you set up in the Wireless Control List to access the CVE-30360 and the network wirelessly. All other devices are denied access.
HITRON CVE-30360 USER’S GUIDE TABLE 27: The Wireless > Access Control Screen (continued) Add Click this to save your changes to the fields in this screen. Cancel Click this to return the fields in this screen to their lastsaved values without saving your changes. Help Click this to see information about the fields in this screen. 6.4.4 THE WIFI SITE SURVEY SCREEN Use this screen to view information about the wireless networks within the CVE30360’s coverage area. Click Wireless > WiFi Site Survey.
HITRON CVE-30360 USER’S GUIDE TABLE 28: The Wireless > WiFi Site Survey Screen (continued) ExtCH For IEEE 802.11n networks that support 40MHz wireless transmissions, this field displays whether the network uses channel bonding, and specifies whether the extension channel is above or below the primary control channel. NOTE: Channel bonding allows an access point to increase data throughput by using two wireless channels simultaneously, instead of a single channel.
HITRON CVE-30360 USER’S GUIDE WIRELESS
7 EMTA This chapter describes the screens that display when you click EMTA in the toolbar. These screens display information about the CVE-30360’s embedded Multimedia Terminal Adapter module. NOTE: The fields in these screens are read-only, and are provided for troubleshooting purposes only. 7.1 THE STATUS SCREEN Use this screen to see general information about the eMTA module. Click EMTA > Status. The following screen displays.
HITRON CVE-30360 USER’S GUIDE TABLE 29: The EMTA > Status Screen (continued) Telephony TFTP This field displays the status of the remote telephony TFTP server. Telephony Call Server Registration This field displays the status of the connection between each of the CVE-30360’s phone lines and the remote call server. Telephony Registration Complete This field displays the overall status of voice call registration.
HITRON CVE-30360 USER’S GUIDE FIGURE 32: The EMTA > DHCP Screen The following table describes the labels in this screen. TABLE 30: The EMTA > DHCP Screen Address Information MTA MAC Address This field displays the Media Access Control (MAC) address of the Media Terminal Adapter (MTA) module. MTA IP Address This field displays the IP address of the MTA module.
HITRON CVE-30360 USER’S GUIDE TABLE 30: The EMTA > DHCP Screen (continued) Lease Time This displays the amount of time for which the MTA Remaining module’s current DHCP lease is valid. Rebind Time Remaining This displays the amount of time until the MTA module attempts to obtain another IP address from another DHCP server, should lease renewal fail. Renew Time Remaining This displays the amount of time until the MTA module attempts to renew its DHCP lease with the current DHCP server.
8 TROUBLESHOOTING Use this section to solve common problems with the CVE-30360 and your network. Problem: None of the LEDs Turn On The CVE-30360 is not receiving power, or there is a fault with the device. 1 Ensure that you are using the correct power adaptor. Using a power adaptor other than the one that came with your CVE-30360 can damage the CVE-30360. 2 Ensure that the power adaptor is connected to the CVE-30360 and the wall socket (or other power source) correctly.
HITRON CVE-30360 USER’S GUIDE Problem: I Forgot the CVE-30360’s IP Address 1 The CVE-30360’s default LAN IP address is 192.168.0.1. 2 You can locate the CVE-30360’s GUI by entering the LAN domain suffix into your browser’s address bar (on a computer connected to the LAN). The default LAN domain suffix is hitronhub.home. See The LAN IP Screen on page 40 for more information.
HITRON CVE-30360 USER’S GUIDE version your CVE-30360’s settings, you can now upload them to the CVE30360; see The Backup Screen on page 44. 6 If the problem persists, contact your vendor. Problem: I Cannot Access the Internet and the DS and US LEDs Keep Blinking Your service provider may have disabled your Internet access; check the Cable > System Info screen’s Network Access field (see The System Info Screen on page 30).
HITRON CVE-30360 USER’S GUIDE FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
HITRON CVE-30360 USER’S GUIDE INDEX Numbers 802.
HITRON CVE-30360 USER’S GUIDE E I eMTA 87 ETH 19 Ethernet 16 Ethernet cables 18 Ethernet port 21 IANA 25 ICMP 49 IEEE 802.
HITRON CVE-30360 USER’S GUIDE M MAC address 28 MAC address filtering 82 MAC filtering 16, 47, 50 main window 23 Media Access Control address 28 MIMO 16 modem 15 modulation 29 Multiple-In, Multiple-Out 16 N navigation 23 navigation bar 23 network devices, attached 33 network diagnostics 40 network number 25 network, local 15 network, wide area 15 network, wireless 15 O open system authentication 80 overview, GUI 23 PBC configuration 75 PIN configuration 16, 75 ping 16, 40, 43, 47, 49 port forwarding
HITRON CVE-30360 USER’S GUIDE S V SCDMA 30 scheduled website blocking 16 scheduling 65 security 78, 79 security, wireless 16 service set 70 settings backup and restore 16 shared key authentication 80 SSID 70, 76 Status 20 status 33 status, cable connection 32 subnet 20, 21, 25, 39 subnet, IP 20 support, customer 4 switch setup 42 voice-enabled cable modem 15 VoIP (Voice over IP) 16 T TCP/IP 21 TDMA 30 traceroute 16, 40, 43 triggering, port 16, 59 trusted computers 63 U upstream transmission 29 URL