Hitron CDE 30364 Users Guide
Hitron CDE 30364 Users Guide
Hitron CDE 30364 Users Guide
Hitron CDE-30364
VERSION 1.0
APRIL 2011
192.168.1.1
Username
admin
Password
admin
Use the Introduction (page 15) to see an overview of the topics covered in this
manual.
Use the Table of Contents (page 7), List of Figures (page 11) and List of Tables
(page 13) to quickly find information about a particular GUI screen or topic.
RELATED DOCUMENTATION
Quick Installation Guide: see this for information on getting your CDE-30364
up and running right away. It includes information on system requirements,
package contents, the installation procedure, and basic troubleshooting tips.
Online Help: each screen in the CDE-30364s Graphical User Interface (GUI)
contains a Help button. Click this button to see additional information about
configuring the screen.
DOCUMENT CONVENTIONS
This Users Guide uses various typographic conventions and styles to indicate
content type:
CUSTOMER SUPPORT
For technical assistance or other customer support issues, please consult your Hitron
representative.
TABLE OF CONTENTS
About This Users Guide .................................................................. 3
Table of Contents.............................................................................. 7
List of Figures ................................................................................. 11
List of Tables................................................................................... 13
Introduction ..................................................................................... 15
1.1 CDE-30364 Overview ........................................................................15
1.1.1 Key Features .............................................................................15
1.2 Hardware Connections .......................................................................16
1.3 LEDs ..................................................................................................18
1.4 IP Address Setup ...............................................................................20
1.4.1 Manual IP Address Setup ..........................................................20
1.5 Logging into the CDE-30364 ..............................................................21
1.6 GUI Overview .....................................................................................22
1.7 Resetting the CDE-30364 ..................................................................23
Cable ................................................................................................ 25
2.1 Cable Overview ..................................................................................25
2.1.1 DOCSIS .....................................................................................25
2.1.2 IP Addresses and Subnets ........................................................25
2.1.2.1 IP Address Format ............................................................25
2.1.2.2 IP Address Assignment .....................................................25
2.1.2.3 Subnets .............................................................................26
2.1.3 DHCP .........................................................................................27
2.1.4 DHCP Lease ..............................................................................28
2.1.5 MAC Addresses .........................................................................28
TABLE OF CONTENTS
LAN .................................................................................................. 39
3.1 LAN Overview .................................................................................... 39
3.1.1 Local Area Networks ................................................................. 39
3.1.2 LAN IP Addresses and Subnets ................................................ 39
3.1.3 Domain Suffix ............................................................................ 40
3.1.4 Debugging (Ping and Traceroute) ............................................. 40
3.2 The LAN IP Screen ............................................................................ 40
3.3 The Switch Setup Screen .................................................................. 42
3.4 The Debug Screen ............................................................................. 43
3.5 The Backup Screen ........................................................................... 44
Firewall ............................................................................................ 47
4.1 Firewall Overview .............................................................................. 47
4.1.1 Firewall ...................................................................................... 47
4.1.2 Intrusion detection system ......................................................... 47
4.1.3 Ping ........................................................................................... 47
4.1.4 MAC Filtering ............................................................................. 47
4.1.5 IP Filtering ................................................................................. 48
4.1.6 Port Forwarding ......................................................................... 48
4.1.7 Port Triggering ........................................................................... 48
4.1.8 DMZ ........................................................................................... 48
4.2 The Firewall Options Screen ............................................................. 49
4.3 The MAC Filtering Screen ................................................................. 50
4.4 The IP Filtering Screen ...................................................................... 53
4.4.1 Adding or Editing an IP Filtering Rule ....................................... 54
4.5 The Forwarding Screen ..................................................................... 56
4.5.1 Adding or Editing a Port Forwarding Rule ................................. 58
4.6 The Port Triggering Screen ............................................................... 59
TABLE OF CONTENTS
Wireless ........................................................................................... 71
6.1 Wireless Overview .............................................................................71
6.1.1 Wireless Networking Basics ......................................................71
6.1.2 Architecture ................................................................................71
6.1.3 Wireless Standards ....................................................................71
6.1.4 Service Sets and SSIDs ............................................................72
6.1.5 Wireless Security .......................................................................72
6.1.5.1 WPS ..................................................................................73
6.1.6 WMM .........................................................................................73
6.2 The Basic Screen ...............................................................................73
6.3 The Security Screen ...........................................................................76
6.4 The Access Control Screen ...............................................................79
6.5 The Advanced Screen ........................................................................81
6.5.1 Configuring WMM Parameters ..................................................87
6.6 The WiFi Site Survey Screen .............................................................90
Troubleshooting.............................................................................. 93
Index................................................................................................. 97
TABLE OF CONTENTS
10
TABLE OF CONTENTS
11
LIST OF FIGURES
FIGURE 1: Application Overview ........................................................................15
FIGURE 2: Hardware Connections .....................................................................17
FIGURE 3: LEDs .................................................................................................19
FIGURE 4: Login .................................................................................................22
FIGURE 5: GUI Overview ...................................................................................22
FIGURE 6: The Cable > System Info Screen .....................................................31
FIGURE 7: The Cable > Initialization Screen .....................................................33
FIGURE 8: The Cable > Status Screen ..............................................................34
FIGURE 9: The Cable > Event Log Screen ........................................................36
FIGURE 10: The Cable > Password Screen ......................................................37
FIGURE 11: The LAN > LAN IP Screen .............................................................41
FIGURE 12: The LAN > Switch Setup Screen ....................................................43
FIGURE 13: The LAN > Debug Screen ..............................................................44
FIGURE 14: The LAN > Backup Screen .............................................................44
FIGURE 15: The Firewall > Firewall Options Screen .........................................49
FIGURE 16: The Firewall > MAC Filtering Screen .............................................51
FIGURE 17: The Firewall > IP Filtering Screen ..................................................53
FIGURE 18: The Firewall > IP Filtering > Add/Edit Screen ................................55
FIGURE 19: The Firewall > Forwarding Screen .................................................56
FIGURE 20: The Firewall > Forwarding > Add/Edit Screen ................................58
FIGURE 21: The Firewall > Port Triggering Screen ...........................................60
FIGURE 22: The Firewall > Port Triggering > Add/Edit Screen ..........................61
FIGURE 23: The Firewall > Local Logs Screen ..................................................63
FIGURE 24: The Parent Control > Web Site Blocking Screen ...........................66
FIGURE 25: The Parent Control > Scheduling Screen .......................................68
FIGURE 26: The Parent Control > Local Logs Screen .......................................69
FIGURE 27: The Wireless > Basic Screen .........................................................74
FIGURE 28: WPS PIN ........................................................................................75
FIGURE 29: The Wireless > Security Screen .....................................................76
FIGURE 30: The Wireless > Access Control ......................................................80
FIGURE 31: The Wireless > Advanced Screen ..................................................82
LIST OF FIGURES
12
LIST OF FIGURES
13
LIST OF TABLES
TABLE 1: Hardware Connections ......................................................................17
TABLE 2: LEDs ..................................................................................................19
TABLE 3: GUI Overview ....................................................................................23
TABLE 4: Private IP Address Ranges ...............................................................26
TABLE 5: IP Address: Decimal and Binary ........................................................27
TABLE 6: Subnet Mask: Decimal and Binary ....................................................27
TABLE 7: The Cable > System Info Screen ......................................................31
TABLE 8: The Cable > Status Screen ...............................................................34
TABLE 9: The Cable > Event Log Screen .........................................................36
TABLE 10: The Cable > Password Screen ........................................................37
TABLE 11: The LAN > LAN IP Screen ..............................................................41
TABLE 12: The LAN > Switch Setup Screen .....................................................43
TABLE 13: The LAN > Debug Screen ...............................................................44
TABLE 14: The LAN > Backup Screen ..............................................................45
TABLE 15: The Firewall > Firewall Options Screen ...........................................49
TABLE 16: The Firewall > MAC Filtering Screen ...............................................51
TABLE 17: The Firewall > IP Filtering Screen ...................................................53
TABLE 18: The Firewall > IP Filtering > Add/Edit Screen ..................................55
TABLE 19: The Firewall > Forwarding Screen ..................................................56
TABLE 20: The Firewall > Forwarding > Add/Edit Screen .................................58
TABLE 21: The Firewall > Port Triggering Screen .............................................60
TABLE 22: The Firewall > Port Triggering > Add/Edit Screen ...........................62
TABLE 23: The Firewall > Local Logs Screen ...................................................63
TABLE 24: The Parent Control > Web Site Blocking Screen ............................66
TABLE 25: The Parent Control > Scheduling Screen ........................................68
TABLE 26: The Parental Control > Local Logs Screen .....................................69
TABLE 27: The Wireless > Basic Screen ..........................................................74
TABLE 28: The Wireless > Security Screen ......................................................77
TABLE 29: The Wireless > Access Control Screen ...........................................80
TABLE 30: The Wireless > Advanced Screen ...................................................83
TABLE 31: The Wireless > Advanced > WMM Configuration Screen ...............88
LIST OF TABLES
14
LIST OF TABLES
1
INTRODUCTION
This chapter introduces the CDE-30364 and its GUI (Graphical User Interface).
INTRODUCTION
15
16
Local Area Network connection via four 10/100/1000 Mbps (megabits per
second) Ethernet ports
Wired security: stateful inspection firewall with intrusion detection system, IP and
MAC filtering, port forwarding and port triggering, De-Militarized Zone (DMZ)
and event logging
INTRODUCTION
17
INTRODUCTION
18
USB
LAN1
LAN2
LAN3
LAN4
CATV
12VDC
1.3 LEDS
This section describes the CDE-30364s LEDs (lights).
INTRODUCTION
19
TABLE 2: LEDs
LED
STATUS
WIRELESS Off
ETH 1~4
Status
US
DESCRIPTION
No data is being transmitted or received over the
wireless network.
Blinking
Off
Blinking
On
Blinking
On
Blinking
On
INTRODUCTION
20
Power
On
On
Off
If the login screen displays, your computer is already configured correctly.
If the login screen does not display, either the CDE-30364s DHCP server is not
NOTE: If you still cannot see the login screen, your CDE-30364s IP settings may
have been changed from their defaults. If you do not know the CDE-30364s
new address, you should return it to its factory defaults. See Resetting the
CDE-30364 on page 23. Bear in mind that ALL user-configured settings are
lost.
INTRODUCTION
21
3
4
5
Right-click your network connection (usually Local Area Connection) and click
Properties.
In the General tabs This connection uses the following items list, scroll
down and select Internet Protocol (TCP/IP). Click Properties.
You can get an IP address automatically, or specify one manually:
automatically.
If your CDE-30364s DHCP server is active, select Use the following IP
address. In the IP address field, enter a value between 192.168.1.2 and
192.168.1.254 (default). In the Subnet mask field, enter 255.255.255.0
(default).
NOTE: If your CDE-30364 is not using the default IP address, enter an IP address
and subnet mask that places your computer in the same subnet as the CDE30364.
Click OK. The Internet Protocol (TCP/IP) window closes. In the Local Area
Connection Properties window, click OK.
Your computer now obtains an IP address from the CDE-30364, or uses the IP
address that you specified, and can communicate with the CDE-30364.
1
2
INTRODUCTION
22
Enter the Username and Password. The default login username is admin, and
the default password is admin.
NOTE: The Username and Password are case-sensitive; admin is not the same as
Admin.
Click Login. The System Info screen displays (see The System Info Screen on
page 30).
INTRODUCTION
23
Main Window
Press the RESET button on the CDE-30364, and hold it in for ten seconds or
longer.
Click LAN > Backup. In the screen that displays, click the Factory Reset
button.
The CDE-30364 turns off and on again, using its factory default settings.
NOTE: Depending on your CDE-30364s previous configuration, you may need to reconfigure your computers IP settings; see IP Address Setup on page 20.
INTRODUCTION
24
INTRODUCTION
2
CABLE
This chapter describes the screens that display when you click Cable in the toolbar.
2.1.1 DOCSIS
The Data Over Cable Service Interface Specification (DOCSIS) is a
telecommunications standard that defines the provision of data services) Internet
access) over a traditional cable TV (CATV) network.
Your CDE-30364 supports DOCSIS version 3.0.
25
26
The public network (Wide Area Network or WAN) is the link between the cable
(CATV) connector and your Internet Service Provider. Your CDE-30364s IP
address on this network is assigned by your service provider.
The private network (in routing mode - see Routing Mode on page 28) is your
Local Area Network (LAN) and Wireless Local Area Network (WLAN), if
enabled. You are free to assign IP addresses to computers on the LAN and
WLAN manually, or to allow the CDE-30364 to assign them automatically via
DHCP (Dynamic Host Configuration Protocol). IANA has reserved the following
blocks of IP addresses to be used for private networks only:
10.255.255.255
172.16.0.0
172.31.255.255
192.168.0.0
192.168.255.255
If you assign addresses manually, they must be within the CDE-30364s LAN
subnet.
2.1.2.3 SUBNETS
A subnet (short for sub-network) is, as the name suggests, a separate section of a
network, distinct from the main network of which it is a part. A subnet may contain all
of the computers at one corporate local office, for example, while the main network
includes several offices.
In order to define the extent of a subnet, and to differentiate it from the main network,
a subnet mask is used. This masks the part of the IP address that refers to the main
network, leaving the part of the IP address that refers to the sub-network.
Each subnet mask has 32 bits (binary digits), as does each IP address:
A binary value of 1 in the subnet mask indicates that the corresponding bit in the
IP address is part of the main network.
A binary value of 0 in the subnet mask indicates that the corresponding bit in the
IP address is part of the sub-network.
CABLE
27
10101000
00000000
1
00000001
The following table shows a subnet mask that masks the first twenty-four bits of the
IP address, in both its decimal and binary notation.
TABLE 6: Subnet Mask: Decimal and Binary
255
255
255
11111111
11111111
11111111
0
00000000
This shows that in this subnet, the first three octets (192.168.1, in the example IP
address) define the main network, and the final octet (1, in the example IP address)
defines the computers address on the subnet.
The decimal and binary notations give us the two common ways to write a subnet
mask:
Decimal: the subnet mask is written in the same fashion as the IP address:
255.255.255.0, for example.
Binary: the subnet mask is indicated after the IP address (preceded by a forward
slash), specifying the number of binary digits that it masks. The subnet mask
255.255.255.0 masks the first twenty-four bits of the IP address, so it would be
written as follows: 192.168.1.1/24.
2.1.3 DHCP
The Dynamic Host Configuration Protocol, or DHCP, defines the process by which IP
addresses can be assigned to computers and other networking devices
automatically, from another device on the network. This device is known as a DHCP
server, and provides addresses to all the DHCP client devices.
In order to receive an IP address via DHCP, a computer must first request one from
the DHCP server (this is a broadcast request, meaning that it is sent out to the whole
network, rather than just one IP address). The DHCP server hears the requests, and
responds by assigning an IP address to the computer that requested it.
If a computer is not configured to request an IP address via DHCP, you must
configure an IP address manually if you want to access other computers and devices
on the network. See IP Address Setup on page 20 for more information.
By default, the CDE-30364 is a DHCP client on the WAN (the CATV connection). It
broadcasts an IP address over the cable network, and receives one from the service
provider. By default, the CDE-30364 is a DHCP server on the LAN; it provides IP
addresses to computers on the LAN which request them.
CABLE
28
CABLE
29
2.1.10 MODULATION
Transmissions over the cable network are based on a strong, high frequency periodic
waveform known as the carrier wave. This carrier wave is so called because it
carries the data signal. The data signal itself is defined by variations in the carrier
wave. The process of varying the carrier wave (in order to carry data signal
information) is known as modulation. The data signal is thus known as the
modulating signal.
Cable transmissions use a variety of methods to perform modulation (and the
decoding of the received signal, or demodulation). The modulation methods
defined in DOCSIS 3 are as follows:
CABLE
30
TDMA allows multiple users to share the same frequency channel by splitting
transmissions by time. Each user is allocated a number of time slots, and
transmits during those time slots.
FDMA allows multiple users to share the same frequency channel by assigning a
frequency band within the existing channel to each user.
SCDMA allows multiple users to share the same frequency channel by assigning
a unique orthogonal code to each user.
CABLE
31
Model Name
DOCSIS Mode
HW Version
SW Version
MAC Address
RF MAC Address
Ethernet MAC
Address
WAN MAC Address This displays the Media Access Control (MAC) address of
(in Routing Mode
the module that connects to the Internet through the CATV
connection when the CDE-30364 is in routing mode.
CABLE
32
System Uptime
Network Access
CABLE
33
The nature of the upstream and downstream connection between the CDE30364 and the device to which it is connected through the CATV interface.
CABLE
34
CABLE
35
Channel Frequency
Modulation
Signal Strength
Upstream
NOTE: The upstream signal is the signal transmitted from the CDE-30364.
Channel ID
Upstream Frequency
Upstream Bandwidth
SCDMA Mode
Transmission Signal
Strength
Subnet Mask
CABLE
36
System Time
This displays the date and time at which the event that
triggered the log entry occurred.
ID
Level
Error
Warning
Critical
Text
CABLE
37
Apply
Cancel
Click this to return the fields in this screen to their lastsaved values without saving your changes.
Help
CABLE
38
CABLE
3
LAN
This chapter describes the screens that display when you click LAN in the toolbar.
LAN
39
40
Ping: this tool allows you to enter an IP address and see if a computer (or other
network device) responds with that address on the network. The name comes
from the pulse that submarine SONAR emits when scanning for underwater
objects, since the process is rather similar. You can use this tool to see if an IP
address is in use, or to discover if a device (whose IP address you know) is
working properly.
Traceroute: this tool allows you to see the route taken by data packets to get
from the CDE-30364 to the destination you specify. You can use this tool to
solve routing problems, or identify firewalls that may be blocking your access to
a computer or service.
Configure the CDE-30364s LAN IP address, subnet mask and domain suffix
Configure the CDE-30364s internal DHCP server
See information about the network devices connected to the CDE-30364 on the
LAN.
LAN
41
Subnet Mask
Gateway Address
DNS Server
Subnet Mask
LAN
42
Lease Time
Use this field to define the time after which the CDE-30364
renews the IP addresses of all the network devices
connected to the CDE-30364 on the LAN (when DHCP is
enabled).
DHCP Start IP
Use this field to specify the IP address at which the CDE30364 begins assigning IP addresses to devices on the
LAN (when DHCP is enabled).
DHCP End IP
Use this field to specify the IP address at which the CDE30364 stops assigning IP addresses to devices on the
LAN (when DHCP is enabled).
NOTE: Devices requesting IP addresses once the DHCP
pool is exhausted are not assigned an IP address.
Host Name
IP Address
MAC Address
Type
Interface
Apply
Cancel
Click this to return the fields in this screen to their lastsaved values without saving your changes.
Help
LAN
43
Duplex
Active
Apply
Cancel
Click this to return the fields in this screen to their lastsaved values without saving your changes.
Help
LAN
44
Select the type of test that you want to run on the IP/
URL that you specified.
Run
Help
LAN
45
Restore Settings
Locally
Reboot/Factory Reset
Reboot
Factory Reset
Help
LAN
46
LAN
4
FIREWALL
This chapter describes the screens that display when you click Firewall in the
toolbar.
4.1.1 FIREWALL
The term firewall comes from a construction technique designed to prevent the
spread of fire from one room to another. Similarly, your CDE-30364s firewall
prevents intrusion attempts and other undesirable activity originating from the WAN,
keeping the computers on your LAN safe. You can also use filtering techniques to
specify the computers and other devices you want to allow on the LAN, and prevent
certain traffic from going from the LAN to the WAN.
4.1.3 PING
The CDE-30364 allows you to use the ping utility on the LAN (in the LAN > Debug
screen) and also on the WAN (in the Firewall > Firewall Options screen). For more
information, see Debugging (Ping and Traceroute) on page 40.
FIREWALL
47
48
Deny the devices on the list access to the CDE-30364 and the network (in which
case all other devices can access the network)
or
Allow the devices on the list to access the network (in which case no other
devices can access the network)
4.1.5 IP FILTERING
IP filtering allows you to prevent computers on the LAN from sending certain types of
data to the WAN. You can use this to prevent unwanted outgoing communications.
Specify the IP address of the computer on the LAN from which you want to prevent
communications, and specify the port range of the communications you want to
prevent. The CDE-30364 discards outgoing data packets that match the criteria you
specified.
4.1.8 DMZ
In networking, the De-Militarized Zone (DMZ) is a part of your LAN that has been
isolated from the rest of the LAN, and opened up to the WAN. The term comes from
the military designation for a piece of territory, usually located between two opposing
forces, that is isolated from both and occupied by neither.
FIREWALL
49
Connected Computers
FIREWALL
50
Cancel
Click this to return the fields in this screen to their lastsaved values without saving your changes.
Help
FIREWALL
51
FIREWALL
52
MAC Address
Delete
MAC Address
Delete
MAC Address
Type
Use this field to specify the list to which you want to add
the device.
MAC Address
Type
Use this field to specify the list to which you want to add
the device.
FIREWALL
53
Apply
Cancel
Click this to return the fields in this screen to their lastsaved values without saving your changes.
Help
) before
FIREWALL
54
Protocol
IP Address Range
Enable
Edit
Delete
Apply
Cancel
Click this to return the fields in this screen to their lastsaved values without saving your changes.
Help
To add a new IP filtering rule, click Add in the Firewall > IP Filtering screen.
To edit an existing IP filtering rule, select the rules radio button ( ) in the
Firewall > IP Filtering screen and click the Edit button.
The following screen displays.
FIREWALL
55
Protocol
Connected Computers
Back
Apply
FIREWALL
56
Application Name
FIREWALL
) before
57
Protocol
Enable
Add New
Edit
Delete
Apply
Cancel
Click this to return the fields in this screen to their lastsaved values without saving your changes.
Help
FIREWALL
58
To add a new port forwarding rule, click Add in the Firewall > Forwarding
screen.
To edit an existing port forwarding rule, select the rules radio button (
Firewall > Forwarding screen and click the Edit button.
The following screen displays.
) in the
FIREWALL
59
Connected Computers
Back
Apply
Cancel
Click this to return the fields in this screen to their lastsaved values without saving your changes.
Help
FIREWALL
60
) before
Application Name
Port Range
Protocol
Timeout (ms)
This displays the time (in milliseconds) after the CDE30364 opens the Target ports that it should close them.
Enable
FIREWALL
61
Delete
Apply
Cancel
Click this to return the fields in this screen to their lastsaved values without saving your changes.
Help
To add a new port triggering rule, click Add in the Firewall > Port Triggering
screen.
To edit an existing port triggering rule, select the rules radio button (
Firewall > Port Triggering screen and click the Edit button.
The following screen displays.
) in the
FIGURE 22: The Firewall > Port Triggering > Add/Edit Screen
FIREWALL
62
Use these fields to specify the target ports. The CDE30364 opens these ports in expectation of incoming
traffic whenever it detects activity on any of the Trigger
ports. The incoming traffic is forwarded to these ports on
the computer connected to the LAN.
Enter the start port number in the first field, and the end
port number in the second field.
To specify only a single port, enter its number in both
fields.
Protocol
Connected Computers
Back
Apply
Cancel
Click this to return the fields in this screen to their lastsaved values without saving your changes.
Help
FIREWALL
63
Date (DD/MM/YY)
Time (HH:MM:SS)
IP Address
Event type
Clear
Refresh Logs
FIREWALL
64
FIREWALL
5
PARENTAL CONTROL
This chapter describes the screens that display when you click Parent Control in the
toolbar.
PARENTAL CONTROL
65
66
PARENTAL CONTROL
67
Trusted Computers
New Computer MAC
Address
Trusted Computer
List
Connected
Computers
Remove
Clear List
Apply
Cancel
Click this to return the fields in this screen to their lastsaved values without saving your changes.
Help
PARENTAL CONTROL
68
Apply
Cancel
Click this to return the fields in this screen to their lastsaved values without saving your changes.
Help
PARENTAL CONTROL
69
Date (DD/MM/YY)
Time (HH:MM:SS)
IP Address
Event type
Clear
Refresh Logs
PARENTAL CONTROL
70
PARENTAL CONTROL
6
WIRELESS
This chapter describes the screens that display when you click Wireless in the
toolbar.
6.1.2 ARCHITECTURE
The wireless network consists of two types of device: access points (APs) and
clients.
The access point controls the network, providing a wireless connection to each
client.
The wireless clients connect to the access point in order to receive a wireless
connection to the WAN and the wired LAN.
The CDE-30364 is the access point, and the computers you connect to the CDE30364 are the wireless clients.
IEEE 802.11b
IEEE 802.11g
WIRELESS
71
72
IEEE 802.11n
6.1.4 SERVICE SETS AND SSIDS
Each wireless network, including all the devices that comprise it, is known as a
Service Set.
NOTE: Depending on its capabilities and configuration, a single wireless access point
may control multiple Service Sets; this is often done to provide different
service or security levels to different clients.
Each Service Set is identified by a Service Set IDentifier (SSID). This is the name of
the network. Wireless clients must know the SSID in order to be able to connect to
the AP. You can configure the CDE-30364 to broadcast the SSID (in which case, any
client who scans the airwaves can discover the SSID), or to hide the SSID (in which
case it is not broadcast, and only users who already know the SSID can connect).
WEP (the Wired Equivalency Protocol): this protocol uses a series of keys or
data strings to authenticate the wireless client with the AP, and to encrypt data
sent over the wireless link. WEP is a deprecated protocol, and should only be
used when it is the only security standard supported by the wireless clients.
WEP provides only a nominal level of security, since widely-available software
exists that can break it in a matter of minutes.
solve the inadequacies of WEP. There are two types of WPA: the enterprise
version (known simply as WPA) requires the use of a central authentication
database server, whereas the personal version (supported by the CDE-30364)
allows users to authenticate using a pre-shared key or password instead.
While WPA provides good security, it is still vulnerable to brute force
password-guessing attempts (in which an attacker simply barrages the AP with
join requests using different passwords), so for optimal security it is advised that
you use a random password of thirteen characters or more, containing no
dictionary words.
WPA uses the Temporal Key Integrity Protocol (TKIP) encryption standard
(which has been shown to have certain possible weaknesses), whereas WPA2
uses the stronger Advanced Encryption Standard (AES) in the Counter mode
with Cipher block chaining Message authentication code Protocol (CCMP),
WIRELESS
73
6.1.5.1 WPS
WiFi-Protected Setup (WPS) is a standardized method of allowing wireless devices
to quickly and easily join wireless networks, while maintaining a good level of
security. The CDE-30364 provides two methods of WPS authentication:
Push-Button Configuration (PBC): when the user presses the PBC button on
the AP (either a physical button, or a virtual button in the GUI), any user of a
wireless client that supports WPS can press the corresponding PBC button on
the client within two minutes to join the network.
Once authenticated, devices that have joined a network via WPS use the WPA2
security standard.
6.1.6 WMM
WiFi MultiMedia (WMM) is a Quality of Service (QoS) enhancement that allows
prioritization of certain types of data over the wireless network. WMM provides four
data type classifications (in priority order; highest to lowest):
Voice
Video
Best effort
Background
If you wish to improve the performance of voice and video (at the expense of other,
less time-sensitive applications such as Internet browsing and FTP transfers), you
can enable WMM. You can also edit the WMM QoS parameters, but are disadvised
to do so unless you have an extremely good reason to make the changes.
WIRELESS
74
WIRELESS
75
SSID Setting
SSID Name
Enter the name that you want to use for your wireless
network. This is the name that identifies your network,
and to which wireless clients connect.
NOTE: It is suggested that you change the SSID from its
default, for security reasons.
Hidden
WIRELESS
76
WIRELESS
77
Security Mode
Select the number of the security key that you want the
CDE-30364 to use as its default authentication key for
transmissions.
WIRELESS
78
WPA_Personal
NOTE: These fields are only configurable when you select WPA-Personal from the
Security Mode list.
WPA Mode
Cipher Type
WIRELESS
79
Apply
Cancel
Click this to return the fields in this screen to their lastsaved values without saving your changes.
Help
WIRELESS
80
Apply
WIRELESS
81
Device Name
MAC Address
Delete
MAC Address
MAC Address
Add
Cancel
Click this to return the fields in this screen to their lastsaved values without saving your changes.
Help
WIRELESS
82
WIRELESS
83
WIRELESS
84
Channel Bandwidth
WIRELESS
85
MCS
Reverse Direction
Grant (RDG)
WIRELESS
86
WIRELESS
87
HT RxStream
Apply
Cancel
Click this to return the fields in this screen to their lastsaved values without saving your changes.
Help
NOTE: It is strongly recommended that you do not change the default values in this
screen unless you have a good reason to do so.
WIRELESS
88
AC_BK
AC_VI
AC_VO
AIFSN
CWMin
CWMax
TXOP
ACM
WIRELESS
89
AC_BK
AC_VI
AC_VO
AIFSN
CWMin
CWMax
WIRELESS
90
SSID
BSSID
Security
Signal (%)
WIRELESS
91
WIRELESS
92
WIRELESS
7
TROUBLESHOOTING
Use this section to solve common problems with the CDE-30364 and your network.
Using a power adaptor other than the one that came with your
CDE-30364 can damage the CDE-30364.
2
3
4
5
Ensure that the power adaptor is connected to the CDE-30364 and the wall
socket (or other power source) correctly.
Ensure that the power source is functioning correctly. Replace any broken fuses
or reset any tripped circuit breakers.
Disconnect and re-connect the power adaptor to the power source and the
CDE-30364.
If none of the above steps solve the problem, consult your vendor.
1
2
Ensure that you understand the LEDs normal behavior (see LEDs on page 18).
Ensure that the CDE-30364s hardware is connected correctly; see the Quick
Installation Guide.
If none of the above steps solve the problem, consult your vendor.
TROUBLESHOOTING
93
94
1
2
1
2
1
2
3
4
5
Ensure that you are using the correct IP address for the CDE-30364.
Check your networks hardware connections, and that the CDE-30364s LEDs
display correctly (see LEDs on page 18).
Make sure that your computer is on the same subnet as the CDE-30364; see IP
Address Setup on page 20.
If you are attempting to connect over the wireless network, there may be a
problem with the wireless connection. Connect via a LAN port instead.
If the above steps do not work, you need to reset the CDE-30364. See Resetting
the CDE-30364 on page 23. All user-configured data is lost, and the CDE-30364
is returned to its default settings. If you previously backed-up a more recent
TROUBLESHOOTING
95
1
2
3
4
5
Ensure that your wireless client device is functioning properly, and is configured
correctly. See the wireless clients documentation if unsure.
Ensure that the wireless client is within the CDE-30364s radio coverage area.
Bear in mind that physical obstructions (walls, floors, trees, etc.) and electrical
interference (other radio transmitters, microwave ovens, etc) reduce your CDE30364s signal quality and coverage area.
Ensure that the CDE-30364 and the wireless client are set to use the same
wireless mode and SSID (see The Basic Screen on page 73) and security
settings (see The Security Screen on page 76).
Re-enter any security credentials (WEP keys, WPA(2)-PSK password, or WPS
PIN).
If you are using WPSs PBC (push-button configuration) feature, ensure that you
are pressing the button on the CDE-30364 and the button on the wireless client
within 2 minutes of one another.
TROUBLESHOOTING
96
TROUBLESHOOTING
97
INDEX
Numbers
cable connection 15
cable connection status 32
cable modem 15
CATV 16, 18, 25, 26
cipher type 78
clients, wireless 71
configuration file 29, 34
connection process 33
connection status, cable 32
conventions, document 3
customer support 4
A
access control 79
access logs 16
access point 15, 71
accounts, login 22
address, IP 20
address, IP, local 20
AP 15, 71
attached network devices 33
authentication 78
B
backup 44
backup and restore 16
bar, navigation 23
BG protection mode 83
buttons 16
D
debugging 40, 43
default 44
default IP address 20
default username and password 22
defaults 37, 44
De-Militarized Zone 48, 63
DHCP 16, 20, 27, 42
DHCP lease 28
diagnostics 40
DMZ 48, 63
DMZ De-Militarized Zone 16
DNS 40
DOCSIS 25
document conventions 3
Domain Name System 40
domain suffix 40
downstream transmission 29
DS 20
INDEX
98
ETH 19
Ethernet 16
Ethernet cables 18
Ethernet port 20
event log 36
event logging 16
IANA 25
ICMP 49
IEEE 802.11b/g/n 16, 71
IGMP 16
IGMP snooping 83
interface, user 15
intrusion detection 16, 47, 49
IP address 20, 25, 39, 94
IP address lease 28
IP address renewal 28
IP address setup 20, 21
IP address, default 20
IP address, format 25
IP address, local 20
IP filtering 16, 48, 53
ISP 26
F
factory defaults 37, 44
factory reset 18, 23
fast Ethernet 16
FDMA 30
firewall 47
forwarding, port 16, 48, 56
frequencies, cable 29
F-type RF connector 16, 18
K
keyword blocking 66
G
Graphical User Interface 15
graphical user interface 15
GUI 15, 22
GUI overview 22
H
hardware 16
host ID 25
HT mode 84
INDEX
L
LAN 15, 39, 71
LAN 1~4 18
LAN IP 40
LEDs 18, 93, 95
lights 18
Local Area Network 15
local IP address 20
local logs 63, 69
log 36
logging in 21
login accounts 22
login screen 20
logs, access 16
99
M
MAC address 28
MAC address filtering 79
MAC filtering 16, 47, 50
main window 23
Media Access Control address 28
MIMO 16
modem 15
modulation 29
Multiple-In, Multiple-Out 16
N
navigation 23
navigation bar 23
network devices, attached 33
network diagnostics 40
network number 25
network, local 15
network, wide area 15
network, wireless 15
P
parental control 16, 65
password 37, 94
password and username 22
PBC configuration 73
PIN configuration 16, 73
ping 16, 40, 43, 47, 49
port forwarding 16, 48, 56
port triggering 16, 59
port, Ethernet 20
ports 16
Power 18
pre-authentication 79
pre-shared key 79
private IP address 26
push-button configuration 16
Q
QAM 29
QAM TCM 29
QoS 16, 73
QPSK 29
Quality of Service 16
R
O
open system authentication 78
overview, GUI 22
radio coverage 76
radio links 71
reboot 44
reset 18, 23
restore and backup 16
RF connector 16, 18
RJ45 connectors 18
routing mode 26, 28, 39
rule, IP filtering 54
rule, port forwarding 58
INDEX
100
SCDMA 30
scheduled website blocking 16
scheduling 67
security 76, 77
security, wireless 16
service set 72
settings backup and restore 16
shared key authentication 78
SSID 72, 73
Status 20
status 33
status, cable connection 32
subnet 20, 25, 39
subnet, IP 20
support, customer 4
switch setup 42
WAN 15, 26
WAN connection 33
website blocking 65
website blocking, scheduled 16
WEP 16, 72
Wide Area Network 15
Wifi MultiMedia 16, 73
Wifi Protected Setup 16, 73
window, main 23
Windows XP 21
wired security 16
wireless 71
wireless access point 15
wireless clients 71
wireless connection 95
Wireless Local Area Network 15
wireless networking standards 71
wireless security 16, 72, 76, 77
wireless settings, basic 73
WLAN 15, 71
WMM 16, 73, 84, 87
WPA2 73
WPA2-PSK 16, 72
WPA-PSK 16, 72
WPS 16, 73, 77
WPS PBC 17
T
TCP/IP 21
TDMA 30
traceroute 16, 40, 43
triggering, port 16, 59
trusted computers 65
X
U
upstream transmission 29
URL blocking 66
US 20
user interface 15
username 94
username and password 22
INDEX
XP, Windows 21
101
INDEX
102
INDEX
103
INDEX
104
INDEX
105
INDEX
106
INDEX
107
INDEX
108
INDEX
109
INDEX
110
INDEX
111
INDEX
112
INDEX