Hitron CGNV2 User Manual Download Page 1

USER’S GUIDE

DEFAULT LOGIN DETAILS

IP Address

192.168.0.1

Username

cusadmin

Password

password

CGNV2

VERSION 1.0
MAY 2014

Summary of Contents for CGNV2

Page 1: ...USER S GUIDE DEFAULT LOGIN DETAILS IP Address 192 168 0 1 Username cusadmin Password password CGNV2 VERSION 1 0 MAY 2014...

Page 2: ......

Page 3: ...ion about a particular GUI screen or topic Use the Index page 113 to find information on a specific keyword Use the rest of this User s Guide to see in depth descriptions of the CGNV2 s features RELAT...

Page 4: ...ld labels field choices etc are in bold type For example A mouse click in the Graphical User Interface GUI is denoted by a right angle bracket For example means that you should click Settings in the G...

Page 5: ...of their respective owners DISCLAIMER The information in this User s Guide is accurate at the time of writing This User s Guide is provided as is without express or implied warranty of any kind Neithe...

Page 6: ...6 HITRON CGNV2 USER S GUIDE ABOUT THIS USER S GUIDE...

Page 7: ...1 2 Hardware Connections 16 1 3 LEDs 18 1 4 IP Address Setup 20 1 4 1 Manual IP Address Setup 21 1 5 Login to the CGNV2 22 1 6 GUI Overview 22 1 7 Resetting the CGNV2 23 Cable 25 2 1 Cable Overview 2...

Page 8: ...tworks 39 3 1 2 WAN LAN IP Addresses and Subnets 39 3 1 3 DNS 40 3 1 4 Domain Suffix 40 3 1 5 MTU 40 3 1 6 Debugging Ping and Traceroute 40 3 2 The LAN IP Screen 40 3 2 1 Adding or Editing a Reserved...

Page 9: ...Sets and SSIDs 74 6 1 3 Basic Wireless Security 75 6 2 Wireless Tutorials 75 6 2 1 Choosing a Security Method 75 6 2 2 Changing the Wireless Password 76 6 2 3 Changing the Network Name SSID 77 6 2 4...

Page 10: ...1 1 Framework Protocols 97 8 1 1 2 IKE 98 8 1 1 3 Encryption Algorithms 98 8 1 1 4 Cryptographic Hash Function 98 8 1 2 PPTP 99 8 1 3 L2TP 99 8 2 The PASSTHROUGH Screen 99 8 3 The IP Sec Screen 100 8...

Page 11: ...ns Screen 51 FIGURE 16 The Firewall MAC Filtering Screen 53 FIGURE 17 The Firewall IP Filtering Screen 56 FIGURE 18 The Firewall IP Filtering Add Edit Screen 58 FIGURE 19 The Firewall Forwarding Scree...

Page 12: ...Wireless Connection List Screen 91 FIGURE 33 The eMTA Status Screen 93 FIGURE 34 The eMTA DHCP Screen 94 FIGURE 35 The VPN PassThrough Screen 99 FIGURE 36 The VPN IPsec Screen 101 FIGURE 37 The VPN I...

Page 13: ...ns Screen 52 TABLE 16 The Firewall MAC Filtering Screen 54 TABLE 17 The Firewall IP Filtering Screen 56 TABLE 18 The Firewall IP Filtering Add Edit Screen 58 TABLE 19 The Firewall Forwarding Screen 60...

Page 14: ...V2 USER S GUIDE LIST OF TABLES TABLE 32 The eMTA DHCP Screen 95 TABLE 33 The VPN PassThrough Screen 99 TABLE 34 The VPN IPsec Screen 101 TABLE 35 The VPN IPsec Add Edit Screen 103 TABLE 36 The VPN PPT...

Page 15: ...our computers analog telephones wireless devices and other network devices to one another and to the Internet via the cable connection Computers with a wired connection to the CGNV2 are on the Local A...

Page 16: ...EE 802 11b g n wireless MIMO Multiple In Multiple Out networking allowing speeds of up to 300Mbps Wireless security WEP WPA PSK and WPA2 PSK encryption WiFi Protected Setup WPS push button and PIN con...

Page 17: ...econds To begin the WPS PBC connection procedure press and hold the button for between five and ten seconds Press the PBC button on your wireless clients in the coverage area within two minutes to ena...

Page 18: ...thernet cables with RJ45 connectors LAN2 LINE Use this port to connect your analog phones for VoIP services using cables with RJ11 connector CABLE Use this to connect to the Internet via an F type RF...

Page 19: ...is connected to the relevant Line port and is off hook On Your service plan includes voice service ETH Off No device is connected to any LAN port Blinking A device is connected to a LAN port via a fa...

Page 20: ...an IP address automatically or if you are not sure try to log in to the CGNV2 see Login to the CGNV2 on page 22 If the login screen displays your computer is already configured correctly If the login...

Page 21: ...ng system may be different 1 Click Start then click Control Panel 2 In the window that displays double click Network Connections 3 Right click your network connection usually Local Area Connection and...

Page 22: ...he LAN 1 Open a browser window 2 Enter the CGNV2 s IP address default 192 168 0 1 in the URL bar The Login screen displays FIGURE 4 Login 3 Enter the Username and Password The default login username i...

Page 23: ...CGNV2 Press the RESET button on the CGNV2 and hold it in for ten seconds or longer Click WAN LAN Backup In the screen that displays click the Factory Reset button TABLE 3 GUI Overview Primary Navigat...

Page 24: ...DE INTRODUCTION The CGNV2 turns off and on again using its factory default settings NOTE Depending on your CGNV2 s previous configuration you may need to re configure your computer s IP settings see I...

Page 25: ...like a street address in that it identifies a specific location to which information is transmitted No two computers on a network can have the same IP address 2 1 2 1 IP ADDRESS FORMAT IP addresses c...

Page 26: ...ing blocks of IP addresses to be used for private networks only If you assign addresses manually they must be within the CGNV2 s LAN subnet 2 1 2 3 SUBNETS A subnet short for sub network is as the nam...

Page 27: ...P defines the process by which IP addresses can be assigned to computers and other networking devices automatically from another device on the network This device is known as a DHCP server and provide...

Page 28: ...two hexadecimal digits separated by colons or occasionally dashes for example 00 AA FF 1A B5 74 NOTE Each group of two hexadecimal digits is known as an octet since it represents eight bits Bear in m...

Page 29: ...efers to traffic from the service provider to the CGNV2 and upstream refers to traffic from the CGNV2 to the service provider 2 1 10 CABLE FREQUENCIES Just like radio transmissions data transmissions...

Page 30: ...methods that allow multiple users to share the same frequency channel TDMA allows multiple users to share the same frequency channel by splitting transmissions by time Each user is allocated a number...

Page 31: ...ber of the CGNV2 s physical hardware SW Version This displays the version number of the software that controls the CGNV2 Boot ROM Version This displays the version number of the program that controls...

Page 32: ...of the wireless module to which wireless clients connect NOTE You may have additional BSSIDs depending on your contract with your service provider WAN MAC Address This displays the Media Access Contr...

Page 33: ...NV2 has completed a connection step 2 4 THE STATUS SCREEN Use this screen to discover information about The nature of the upstream and downstream connection between the CGNV2 and the device to which i...

Page 34: ...8 The Cable Status Screen Network Access This displays whether or not your service provider allows you to access the Internet over the CATV connection Permitted displays if you can access the Interne...

Page 35: ...modulation types Signal Strength dBmV This displays the power of the signal of each downstream data channel to which the CGNV2 is connected in dBmV decibels above below 1 millivolt Signal Noise Ratio...

Page 36: ...of the signal of each upstream data channel to which the CGNV2 is connected in dBuV Channel ID This displays the ID number of each channel on which the upstream signal is transmitted Cable Modem IP In...

Page 37: ...o use to log into the CGNV2 Re Enter New Password Password Idle Time Enter the number of minutes of inactivity after which you should be automatically logged out of the CGNV2 Once this period elapses...

Page 38: ...38 HITRON CGNV2 USER S GUIDE CABLE...

Page 39: ...l the computers and other networking devices connected to the LAN 1 2 ports This is your private network in routing mode see Routing Mode on page 28 The LAN is a separate network from the Wide Area Ne...

Page 40: ...m transmission unit MTU of a communications protocol of a layer is the size in bytes of the largest protocol data unit that the layer can pass onwards 3 1 6 DEBUGGING PING AND TRACEROUTE The CGNV2 pro...

Page 41: ...mation WAN Address This field displays the CGNV2 s IP address on the WAN Wide Area Network interface Subnet Mask This field displays the CGNV2 s WAN subnet mask Gateway Address This field displays the...

Page 42: ...IP addresses to devices on the LAN when DHCP is enabled DHCP End IP Use this field to specify the IP address at which the CGNV2 stops assigning IP addresses to devices on the LAN when DHCP is enabled...

Page 43: ...his displays the name of each network device connected on the LAN IP Address This displays the IP address of each network device connected on the LAN MAC Address This displays the Media Access Control...

Page 44: ...s of the network device Static IP Address Use this field to enter the static IP address Comment Use this field to enter your comment Back Click this to return to the previous screen without saving cha...

Page 45: ...Backup Settings Locally Click this to create a backup of all your CGNV2 s settings on your computer Restore Settings Locally Use these fields to return your CGNV2 s settings to those specified in a ba...

Page 46: ...ing screen displays FIGURE 14 The WAN LAN WAN IP Screen The following table describes the labels in this screen TABLE 14 The WAN LAN WAN IP Screen WAN IP Setting Connection Mode Use this field to sele...

Page 47: ...select assign DNS server use this field to enter the primary DNS IP address Secondary DNS This displays the CGNV2 s WAN secondary DNS If you select assign DNS server use this field to enter the second...

Page 48: ...48 HITRON CGNV2 USER S GUIDE WAN LAN...

Page 49: ...puters and other devices you want to allow on the LAN and prevent certain traffic from going from the LAN to the WAN 4 1 2 INTRUSION DETECTION SYSTEM An intrusion detection system monitors network act...

Page 50: ...for a specific computer on the LAN Port forwarding is also commonly used for running a public HTTP server from a private network You can set up a port forwarding rule for each application for which yo...

Page 51: ...oth and occupied by neither NOTE This feature is not available when the DS lite function is enabled 4 2 THE FIREWALL OPTIONS SCREEN Use this screen to turn firewall features on or off and to configure...

Page 52: ...WAN Interface Select Disable to prevent responses to ICMP requests originating from the WAN Deselect Disable to allow responses to ICMP requests originating from the WAN UPnP Function Select Enable t...

Page 53: ...to deny certain devices access NOTE To see a list of all the computers connected to the CGNV2 on the LAN click the Connected Computers button in the Firewall IP Filtering Forwarding Port Triggering or...

Page 54: ...ed to the permitted device Device Name This displays the name you gave to the permitted device MAC Address This displays the MAC address of the permitted device Delete Select a permitted device s radi...

Page 55: ...associate with a network device that you want to permit or deny access to the CGNV2 and the network NOTE This name is arbitrary and does not affect functionality in any way MAC Address Specify the MAC...

Page 56: ...number assigned to the IP filtering rule Application Name This displays the arbitrary name you assigned to the rule when you create it Port Range This displays the start and end values of the ports to...

Page 57: ...filtering rule See Adding or Editing an IP Filtering Rule on page 57 for information on the screen that displays Edit Select an IP filtering rule s radio button and click this to make changes to the r...

Page 58: ...Add Edit Application Name Enter a name for the application that you want to block NOTE This name is arbitrary and does not affect functionality in any way Port Range Use these fields to specify the ta...

Page 59: ...ters IP addresses from which communications should be blocked Enter the start IP address in the first field and the end IP address in the second To specify only a single IP address enter it in both fi...

Page 60: ...o the rule when you created it Port Range These fields display the ports to which the rule applies The Public field displays the incoming port range These are the ports on which the CGNV2 received tra...

Page 61: ...ck this to define a new port forwarding rule See Adding or Editing a Port Forwarding Rule on page 61 for information on the screen that displays Edit Select a port forwarding rule s radio button and c...

Page 62: ...match that specified in the Public Port Range so the CGNV2 completes the second field automatically Protocol Use this field to specify whether the CGNV2 should forward traffic via Transmission Contro...

Page 63: ...io button before clicking Edit or Delete This displays the arbitrary identification number assigned to the port triggering rule Application Name This displays the arbitrary name you assigned to the ru...

Page 64: ...dd New Click this to define a new port triggering rule See Adding or Editing a Port Triggering Rule on page 64 for information on the screen that displays Edit Select a port triggering rule s radio bu...

Page 65: ...ng traffic is forwarded to these ports on the computer connected to the LAN Enter the start port number in the first field and the end port number in the second field To specify only a single port ent...

Page 66: ...66 HITRON CGNV2 USER S GUIDE FIREWALL...

Page 67: ...addresses contain the keywords you specify You can also specify trusted computers which should be exempted from website blocking and you can schedule website blocking so that it is only in effect at...

Page 68: ...enable web site blocking Deselect the checkbox to disable web site blocking New Key Word URL Blocking Use these fields to configure the websites to which users on the LAN are denied access Enter a UR...

Page 69: ...cess Control MAC address and click Add to include it in the trusted computer list Trusted Computer List This displays a list of the computers which are exempt from the website blocking filter identifi...

Page 70: ...lter should be in effect Select All Day to apply the website blocking filter at all times To apply the website blocking filter only at certain times of day deselect All Day Use the Start fields to def...

Page 71: ...following table describes the labels in this screen TABLE 25 The Parental Control Local Logs Screen WAN Activity This field displays information about website blocking filter events in the following f...

Page 72: ...72 HITRON CGNV2 USER S GUIDE PARENTAL CONTROL...

Page 73: ...standard configuration you do not need to read this section The Wireless Screens on page 80 this section provides detailed information on each of the CGNV2 s wireless screens Use this section as a ref...

Page 74: ...a transfer speeds low to high IEEE 802 11b IEEE 802 11g IEEE 802 11n 6 1 2 SERVICE SETS AND SSIDS Each wireless network including all the devices that comprise it is known as a Service Set Each Servic...

Page 75: ...curity on page 78 6 2 WIRELESS TUTORIALS This section walks you through some of the more common wireless networking tasks NOTE For basic wireless network setup please see the Quick Installation Guide...

Page 76: ...orts the WPS PBC Push Button Configuration method Go into the wireless device s configuration utility and look for a WPS or Wi Fi Protected Setup screen This screen should let you know whether the dev...

Page 77: ...on utility and perform a similar procedure to the one you just performed on the CGNV2 unless you are using the WPS PBC method in which case you must press the button within two minutes of pressing the...

Page 78: ...heir signal bear in mind that the strength of a network at the CGNV2 s location is not necessarily the same as at your wireless client s location it may be much stronger there If there are a lot of ne...

Page 79: ...TKIP encryption standard which has been shown to have certain possible weaknesses whereas WPA2 uses the stronger Advanced Encryption Standard AES in the Counter mode with Cipher block chaining Messag...

Page 80: ...such as Internet browsing and FTP transfers you can enable WMM You can also edit the WMM QoS parameters but are disadvised to do so unless you have an extremely good reason to make the changes 6 4 THE...

Page 81: ...e IEEE 802 11b 11G Only use IEEE 802 11g 11N Only use IEEE 802 11n 11G N Mixed use IEEE 802 11g and 802 11N 11B G N Mixed use IEEE 802 11b 802 11g and 802 11N NOTE Only wireless clients that support t...

Page 82: ...ry SSID NOTE You may have additional BSSIDs depending on your contract with your service provider SSID Name Enter the name that you want to use for your wireless network This is the name that identifi...

Page 83: ...in the radio coverage area can access your network Click Wireless Security The following screen displays FIGURE 29 The Wireless Security Screen In Service This field controls whether or not the SSID i...

Page 84: ...select WEP from the Security Mode list WEP Key Length Use this field to specify the length of the security key used to allow wireless devices to join the network The longer the key the more secure it...

Page 85: ...g the challenge messages Select Automatic to have the CGNV2 choose the authentication method WPA_Personal NOTE These fields are only configurable when you select WPA Personal from the Security Mode li...

Page 86: ...your wireless clients in order to allow them to connect to the network Pre Authentication Use this field to allow pre authentication Enable in WPA2 or deny pre authentication requests Disable In preau...

Page 87: ...ering on the wireless network Select Allow All to turn MAC filtering off All devices may access the CGNV2 and the network wirelessly Select Allow to permit only devices with the MAC addresses you set...

Page 88: ...ame This displays the name of each network device that has connected to the CGNV2 on the wireless network MAC Address This displays the MAC address of each network device that has connected to the CGN...

Page 89: ...s the number of the radio channel that the target wireless network is using SSID This field displays the Service Set IDentifier of the target wireless network BSSID This field displays the Basic Servi...

Page 90: ...below the primary control channel NOTE Channel bonding allows an access point to increase data throughput by using two wireless channels simultaneously instead of a single channel When you use channe...

Page 91: ...ion In ad hoc mode wireless devices connect to one another as peers WPS DPID This field displays whether the target network is using WiFi Protected Setup WPS or not If the target network is using WPS...

Page 92: ...gnal Strength Indicator PhMode This displays the WiFi operation mode Speed Mbps This displays current connection speed NO This displays the arbitrary identification number assigned to the WiFi event D...

Page 93: ...ns are read only and are provided for troubleshooting purposes only 7 1 THE STATUS SCREEN Use this screen to see general information about the eMTA module Click eMTA Status The following screen displa...

Page 94: ...displays the type of security used for voice calls through the CGNV2 Telephony TFTP This field displays the status of the remote telephony TFTP server Telephony Registration Complete This field displ...

Page 95: ...derived by DHCP Gateway This displays the IP address of the MTA module s gateway on the WAN Primary DNS This displays the IP address of the MTA module s primary Domain Name System DNS server Secondary...

Page 96: ...96 HITRON CGNV2 USER S GUIDE EMTA...

Page 97: ...of dedicated connections encryption or a combination of the two 8 1 1 IPSEC The Internet Protocol Security IPsec is a technology protocol suite for securing IP communications by authenticating and or...

Page 98: ...hash function that takes an arbitrary block of data and returns a fixed size bit string the cryptographic hash value such that any accidental or intentional change to the data will with very high prob...

Page 99: ...screen to select the VPN pass through mode Click VPN PassThrough The following screen displays NOTE This screen allows to choose which VPN protocols will be supported by CGNV2 in passthrough mode when...

Page 100: ...lays PPTP PassThrough Use this field to select whether the PPTP Pass through be active or not Select Enabled to activate the PPTP Pass through Deselect Enabled to deactivate the PPTP Pass through L2TP...

Page 101: ...t Select Enabled to activate the IPsFec VPN functions Deselect Enabled to deactivate the IPsec VPN functions Apply Click this to save your changes to the fields in this screen Cancel Click this to ret...

Page 102: ...g the tunnel connected Active Type This displays the active type of the VPN tunnel Add Click this to define a new VPN tunnel IPsec VPN Functions must first be set to Enabled See Adding or Editing a VP...

Page 103: ...tranet Configuration Use this field to select which LAN be protected Select Protect Private LAN to protect the private LAN Deselect Protect Public LAN to protect the public LAN Local ID Use this field...

Page 104: ...o use See Cryptographic Hash Function on page 98 for information on the screen that displays MD5 SHA IKE Encryption Use this field to select the type of IKE encryption you want to use See Encryption A...

Page 105: ...NOTE The options that display depend on the IPsec Operation you selected Tunnel Type Use this field to select whether the type of the tunnel is public or private IPsec Life Duration Use this field to...

Page 106: ...e following table describes the labels in this screen TABLE 36 The VPN PPTP Screen PPTP PPTP function Use this field to select whether the PPTP function be active or not Select Disabled to deactivate...

Page 107: ...s field to enter the password for your PPTP Client PPP Encryption MPPE Use this field to select whether the PPP Encryption MPPE be active or not Select Enabled to activate the PPP Encryption MPPE Dese...

Page 108: ...10 HITRON CGNV2 USER S GUIDE VPN...

Page 109: ...ther power source correctly 3 Ensure that the power source is functioning correctly Replace any broken fuses or reset any tripped circuit breakers 4 Disconnect and re connect the power adaptor to the...

Page 110: ...on page 45 Problem I Forgot the CGNV2 s Admin Username or Password 1 The default username is cusadmin and the default password is password 2 If the default username and password do not work you need...

Page 111: ...wireless client s documentation if unsure 2 Ensure that the wireless client is within the CGNV2 s radio coverage area Bear in mind that physical obstructions walls floors trees etc and electrical int...

Page 112: ...112 HITRON CGNV2 USER S GUIDE TROUBLESHOOTING...

Page 113: ...e connection status 32 cable modem 15 CATV 16 25 26 cipher type 85 configuration file 29 connection process 33 connection status cable 32 conventions document 3 Cryptographic Hash Function 98 customer...

Page 114: ...I 15 22 GUI overview 22 H hardware 16 host ID 25 I IANA 25 ICMP 51 IEEE 802 11b g n 16 74 IKE 98 interface user 15 intrusion detection 16 49 51 IP address 20 21 25 39 110 IP address lease 28 IP addres...

Page 115: ...reless 15 O open system authentication 85 overview GUI 22 P parental control 16 67 password 36 110 password and username 22 PBC configuration 79 PIN configuration 16 79 ping 16 40 44 49 51 port forwar...

Page 116: ...ion 29 URL blocking 68 US 20 user interface 15 username 110 username and password 22 V voice enabled cable modem 15 VoIP Voice over IP 16 VPN 97 W WAN 15 26 46 WAN connection 33 website blocking 67 we...

Reviews: