background image

SR804N Cable Modem User Manual 

51 

5.8.1

 

TR-069 client 

Choose 

TR69 > TR-069

 

client

 to display the following page. 

 

 

 

 

 

 

 

 

 

 

Figure 49 TR-069 client configuration 

WAN  Management  Protocol  (TR-069)  allows  a  Auto-Configuration  Server  (ACS)  to 

perform  auto-configuration,  provision,  collection,  and  diagnostics  to  this  device. 

Select  the  desired  values  and  click  'Apply/Save'  to  configure  the  TR-069  client 

options. 

 

5.9 

USB 

Choose 

USB

 and the submenus of 

USB

 are shown as below. 

 

 

 

 

 

 

 

 

 

Figure 50 Submenus of USB 

 

Summary of Contents for SR804n

Page 1: ...SR804n Cable Modem User Manual VER 1 0...

Page 2: ...ware Installation 5 3 2 1 Connecting the Device 5 4 PC Network Configuration and Login 7 4 1 PC Network Configuration 7 4 2 Logging In to the SR804N Cable Modem 9 5 Web Based Management 10 5 1 Status...

Page 3: ...p 33 5 5 2 Basic 34 5 5 3 ToD Filter 35 5 5 4 Local Log 35 5 6 VPN 36 5 6 1 Basic 36 5 6 2 IPsec 36 5 6 3 Event Log 37 5 7 Wireless 38 5 7 1 Radio 38 5 7 2 Primary Network 40 5 7 3 Guest Network 43 5...

Page 4: ...SR804n Cable Modem User Manual iii 6 Q A 56...

Page 5: ...e replace it at once Proper space left for heat dissipation is necessary to avoid any damage caused by overheating to the device The holes on the device are designed for heat dissipation to ensure tha...

Page 6: ...ations The WLAN of the SR804N supports 2T2R 2 1 Application Home gateway SOHOs Small enterprises Higher data rate broadband sharing Audio and video streaming and transfer PC file and application shari...

Page 7: ...r Manual 3 Remote update System statistics and monitoring 2 3 Standards Compatibility and Compliance Support application level gateway ALG DOCSIS EuroDOCSIS3 0 IEEE 802 3 IEEE 802 3u IEEE 802 11b IEEE...

Page 8: ...locked U S frequency Blink CM is range and scan U S frequency Off Device is powered off or CM scan D S frequency Ethernet 1 2 3 4 Green On The Ethernet interface is connected Blink Data is being trans...

Page 9: ...all circular hole on the rear panel If you want to restore the default settings please press the Reset button gently for 1 second with a fine needle inserted into the hole and then release the button...

Page 10: ...User Manual 6 Step2 Connect the Eth port of the CMRG to the network card of the PC via an Ethernet cable Step3 Plug one end of the power adapter to the wall outlet and connect the other end to the Pow...

Page 11: ...s or be instructed to automatically obtain an IP address using the network DHCP server SR804N provides a DHCP server on its LAN and it is recommended to configure your LAN to automatically obtain its...

Page 12: ...oose Start Control Panel Network Connections Step2 Right click the Ethernet connection icon and choose Properties Step3 On the General tab select the Internet Protocol TCP IP component and click Prope...

Page 13: ...computer Step2 Enter http 192 168 100 1 the default IP address of the SR804Ncable modem in the address bar The login page appears Step3 Enter the user name and the password The default Username is adm...

Page 14: ...e Cable Modem which allows you to configure and control all of cable modem residential gateway features and system parameters in a user friendly GUI 5 1 Status Choose Status and the submenus of Status...

Page 15: ...ss serial number system up time and network registration status 5 1 2 Connection Choose Status Connection and the following page appears Figure 5 Connection information This page displays information...

Page 16: ...age appears Figure 6 Security configuration To restore factory defaults select the Yes radio button and click Apply This will cause the device to reset The factory default password is Broadcom and is...

Page 17: ...te allows you to map the network path from the CMRG to a public host Selecting Traceroute from the drop down Utility list will present alternate controls for the traceroute utility To run either utili...

Page 18: ...re 8 Event Log information This page displays the contents of the SNMP event log 5 2 Basic Choose Basic and the submenus of Basic are shown as below Figure 9 Submenus of basic 5 2 1 Setup Choose Basic...

Page 19: ...d Secondary DNS 2 Enter a unicast MAC address in the Spoofed MAC Address field Your ISP may require this to be your PC s MAC address If not you can simply supply the WAN side MAC address of the router...

Page 20: ...t powers up One such setting is changing the Static WAN IP address parameters Any changes to these settings will force the CMRG to reset so that the new configuration can be read from non volatile sto...

Page 21: ...et as the external DHCP server the subnet mask is always 255 255 255 0 or you won t be able to access the CMRG from the LAN The IP address of the CMRG can be set from the Basic Setup page You can also...

Page 22: ...e System Delegated Prefix set the System Delegated Prefix first and press Apply so that the system can calculate its LAN Delegated Prefix 5 2 4 LAN IPv6 Choose Basic LAN IPv6 and the following page ap...

Page 23: ...choose a host name for your server and the dynamic DNS domain to which your host will be assigned You will also be asked for your host s current IP address This is the WAN IP address that has been as...

Page 24: ...from changes you may have made that have had an undesirable effect To backup the current configuration click Backup and follow the prompts To restore a previous configuration click Browse and use the...

Page 25: ...N Cable Modem User Manual 21 5 3 Advanced Choose Advanced and the submenus of Advanced are shown as below Figure 17 Submenus of advanced 5 3 1 Options Choose Advanced Options to display the following...

Page 26: ...MRG s WAN IP address or the PCs behind it are not returned Therefore it will be more difficult for hacker to discover your WAN IP address to begin an attack on your private LAN IpSec and PPTP Point to...

Page 27: ...nfigure the CMRG to prevent local PCs from getting access to the WAN by specifying those IP addresses that should be filtered By entering starting and ending IP address ranges you can configure which...

Page 28: ...ng TCP UDP traffic to the WAN via their MAC address This is useful for the fact that the MAC address of a specific NIC card never changes unlike its IP address which can be assigned via DHCP server or...

Page 29: ...bled box and click Apply 5 3 5 Forwarding Choose Advanced Forwarding to display the following page Figure 22 Forwarding This allows for incoming requests on specific port numbers to reach web servers...

Page 30: ...he CMRG detects outgoing data on a specific IP port number set in the Trigger Range the resulting ports set in the Target Range are opened for incoming or sometimes referred to as bi directional ports...

Page 31: ...lic Internet You may configure one PC to be the DMZ host This setting is generally used for PC s using problem applications that use random port numbers and do not function correctly with specific por...

Page 32: ...match the configuration in the CMRG To enable the CMRG to perform RIP do the following this example uses BRCMV2 as the RIP Authentication Key and 1 as the Key ID 1 To turn on RIP MD5 Authentication c...

Page 33: ...ext step is enable RIP debugging to ensure that the CMTS is receiving and authenticating messages from the residential gateway 7223 debug ip rip RIP protocol debugging is on 7223 term mon The CMTS is...

Page 34: ...0 0 0 10 0 0 0 8 is variably subnetted 3 subnets 2 masks C 10 24 80 0 24 is directly connected Cable2 0 C 10 24 81 0 24 is directly connected Cable2 0 C 10 24 95 16 28 is directly connected FastEthern...

Page 35: ...ut allows access to even fewer services The off setting allows all traffic to pass Block Fragmented IP packets prevents all fragmented IP packets from passing through the firewall Port Scan Detection...

Page 36: ...pply button Individual emails will now be sent to the specified address each time an attack is detected Each attack is also logged in the table on the Event Log page If desired a summary of the Event...

Page 37: ...all desired event types to monitor and enter the last byte of the IP address of the SysLog server Normally the IP address of this SysLog server would be hard coded so that the address will not change...

Page 38: ...ave assigned to him or her Click the Add User and Remove User buttons as appropriate to save changes 5 5 2 Basic Choose Parental Control Basic to display the following page Figure 32 Basic setup Make...

Page 39: ...ontrol ToD Filter and the following page will be shown Figure 33 ToD Filter configuration Create a policy or policies to block all Internet access on certain days and or times of day 5 5 4 Local Log C...

Page 40: ...submenus of VPN are shown as below Figure 35 Submenus of VPN 5 6 1 Basic Choose VPN Basic to display the following page Figure 36 Basic settings This page will show the status of configured tunnels To...

Page 41: ...igure 37 IPsec In this page you are allowed to configure all aspects of the IPSec tunnel 5 6 3 Event Log Choose VPN Event Log to display the following page Figure 38 Event Log information This page al...

Page 42: ...dem User Manual 38 5 7 Wireless Choose Wireless and the submenus of Wireless are shown as below Figure 39 Submenus of Wireless 5 7 1 Radio Choose Wireless Radio to display the following page Figure 40...

Page 43: ...wed Bandwidth 802 11b g channels are only 20 MHz wide but 802 11n channels may be 40 MHz wide There are some backward compatibility issues with 40 MHz channels though These issues are more likely to b...

Page 44: ...oexistence Enable Disable Overlapping BSS Coexisistence OBSS coexistence refers to the ability of the AP to support 20 MHz devices within 40 MHz channels It also allows the AP to better deal with near...

Page 45: ...d Network Name SSID Sets the Network Name also known as SSID of the primary network This is a 1 32 ASCII character string Closed Network The Network Name is not broadcast by the AP in a Closed Network...

Page 46: ...S encryption modes can be set AES provides the strongest encryption while TKIP provides strong encryption with improved backward compatibility The TKIP AES mode allows both TKIP and AES capable client...

Page 47: ...encryption transmit key PassPhrase Sets the text to use for WEP key generation Generate WEP Keys When WEP encryption is enabled this action button converts the passphrase entered to a set of WEP keys...

Page 48: ...N hosts Most of the configuration points on the guest network page are identical to those on the Primary Network page A few extras are explained below DHCP Server Enables the DHCP server to gives out...

Page 49: ...ing page Figure 43 Advanced setting This page allows you to configure advanced wireless settings 54g Mode Sets the network mode Choices are 54g Auto 54g Performance 54g LRS and 802 11b Only 54g Auto a...

Page 50: ...lticast Rate This is the rate at which you send out multicast packets to stations Multicast packets are not acknowledged NPHY Rate Choose 802 11n rate to be applied to all unicast packets Legacy Rate...

Page 51: ...ss clients connected to your access point MAC Restrict Mode Selects whether wireless clients with the specified MAC address are allowed or denied wireless access To allow all clients select Disabled M...

Page 52: ...gure 45 WMM configuration This page allows you to configure WiFi Multi Media WMM WMM is an implementation of Quality of Service Qos which is defined by the IEEE standard 802 11e WMM Support Sets WMM s...

Page 53: ...it Opportunity Limit TXOP Limit There are also two AP specific settings Admission Control and Discard Oldest First Admission control specifies if admission control is enforced for the Access Categorie...

Page 54: ...es or disables wireless bridging Remote Bridges Table of remote bridge MAC addresses authorized to establish a wireless bridge Up to 4 remote bridges may be connected Typically you will also have to e...

Page 55: ...figuration WAN Management Protocol TR 069 allows a Auto Configuration Server ACS to perform auto configuration provision collection and diagnostics to this device Select the desired values and click A...

Page 56: ...age Figure 51 USB Basic setting This page allows you to configure Linux based servers The buttons on the right side of the page are short cuts to the buttons on the left side frame 5 9 2 Approved Devi...

Page 57: ...this page USB storage devices can be safely removed after selecting the Safely Remove Device button The user will be asked which device they want to remove 5 9 3 Storage Basic Choose USB Storage Basic...

Page 58: ...the workgroup name can is configured here The Windows Network and FTP support can be enabled or disabled on this page The IP address displayed in the link field is the Linux IP stack address that sho...

Page 59: ...ng This page allows you to configure the DLNA media server The media server name and the file names that will be scanned on the USB storage devices are configured using this page If desired the media...

Page 60: ...sible for any changes or modifications not expressly approved by the party responsible for compliance Such modifications could void the user s authority to operate the equipment This equipment has bee...

Page 61: ...ng two conditions 1 this device may not cause interference and 2 this device must accept any interference including interference that may cause undesired operation of the device CAN ICES 3 B NMB 3 B L...

Reviews: