background image

Cable Modem/Router   

with Wireless-N 

  U S E R  M A N U A L  

Summary of Contents for 5350

Page 1: ...Cable Modem Router with Wireless N U S E R M A N U A L ...

Page 2: ...ues Warnings SAFETY This equipment is designed with the utmost care for the safety of those who install and use it However special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment All guidelines of this and of the computer manufacture must therefore be allowed at all times to ensure the safe use of the equipment WARNING Risk of e...

Page 3: ...ity Using WEP 18 3 STATUS MENU OPTIONS 25 4 BASIC MENU OPTIONS 33 5 ADVANCED MENU OPTIONS 40 6 FIREWALL MENU OPTIONS 54 7 PARENTAL CONTROL MENU OPTIONS 62 8 WIRELESS MENU OPTIONS 70 9 VPN MENU OPTIONS 88 APPENDIX A HOW TO SET UP A WIRELESS NETWORK 98 APPENDIX B TROUBLESHOOTING TIPS 105 APPENDIX C IF YOU NEED HELP 106 APPENDIX D COMPLIANCE 107 ...

Page 4: ... find Tips for setting up computers and other devices on a wireless network in Appendix A Tips for setting up computers and other devices on a wireless network This appendix supplements chapter 1 If you want to make changes to the default WPA PSK WPA2 PSK security settings please refer to Chapter 2 Setting Wireless Security If you are like most users you don t need to read other chapters in this m...

Page 5: ...VPN protocol and configure IPSec tunnels L2TP and PPTP server options 88 Gaming If you are using your router for gaming you may need to make changes to the router s firewall setting for the game to work This is done by setting up a DMZ or using port triggering so that the cable modem router s firewall won t block the other players from your system during your gaming The main difference between the...

Page 6: ...of your gaming station to set up port triggering Once you ve decided what type of security to use for gaming you can set up that security using the appropriate section of this manual DMZ For instructions on how to set up a DMZ please refer to page 50 Port Triggering For instructions on how to set up port triggering please refer to page 48 Setting up wireless security for the iPhone iPod touch and ...

Page 7: ... provider To use this User Manual you need a computer an iPad or another tablet or a game console If your cable service provider provided a cable modem starter kit please continue below If you don t have or choose not to use the cable modem starter kit from your service provider go to How to connect to a computer if you don t have or choose not to use a cable modem starter kit below If your cable ...

Page 8: ...the Online light stays steady green to signal success Now open your browser and go to a familiar Web site to check that the cable modem router is working If you want to connect the modem router wirelessly to one or more devices see Connecting the Cable Modem Router Wirelessly to Some Device If you want to connect additional computers devices using the modem router s Ethernet LAN ports please see R...

Page 9: ...If you want to connect your computer wirelessly instead see Connecting the Cable Modem Router Wirelessly to Some Device Note Allow 5 to 30 minutes to power up the first time because the cable modem must locate and connect to the appropriate channels for communication You ll see the DS US and or Online modem lights flashing until the Online light stays steady green to signal success Now open your b...

Page 10: ...evices on your LAN Local Area Network such as a computer hub or switch to these ports USB The USB port is for manufacturer s use only RESET Use this button in the unlikely event that you want to restore the default factory settings This button is recessed to prevent accidental resets of your cable modem router Cable Connect your coaxial cable line to this port AC IN Connect the supplied power cord...

Page 11: ...ur devices only supports WEP security please refer to page 18 for instructions on how to configure WEP security Using WPS to set up your wireless network If all the WiFi compatible wireless devices on your network support WPS 1 Press the WPS LED pushbutton on the front panel of the router for 5 seconds The WPS LED should blink green 2 Within 2 minutes before the WPS LED light turns off press the W...

Page 12: ...p 5 5 Your basic setup for local wireless devices is complete Note If you want to change the default SSID and Pre Shared Key please refer to page 15 for instructions Read This Only if You Are Connecting Additional Computers and or Other Devices to the Cable Modem Router s Ethernet LAN ports You can plug up to four computers game consoles or other Ethernet capable devices into the cable modem route...

Page 13: ... http 192 168 0 1 6 Congratulations You have connected an additional device to the Internet You can connect up to 4 Ethernet capable devices to the cable modem router following the instructions above for each device and starting at step 2 of this section If you want to set up a wireless network please refer to Appendix A Setting Up Your Wireless Network Most newer Windows 7 Vista and XP computers ...

Page 14: ...he default SSID or Pre Shared Key go to Changing the Pre Shared Key and SSID from the default settings If you need instructions for setting up a wireless network please refer to Appendix A Setting Up Your Wireless Network Most newer Windows 7 Vista and XP computers with built in wireless networking capabilities do not require the installation of a wireless component If this is the case you should ...

Page 15: ...kely event that you want an unsecured network this is discussed late in this chapter in Disabling Security Note If you have a Radius Server very unlikely for a home network select the WPA WPA2 options without PSK All instances of WPA and or WPA2 that follow refer to WPA PSK and or WPA2 PSK unless noted otherwise You can check to see if all other clients that you plan to put on the network support ...

Page 16: ...ger by typing the following in your Web browser s address bar http 192 168 0 1 2 In the Enter Network Password dialog box type the following User Name and Password in lower case then click OK User Name admin Password admin The User Name and Password entered here are not the same as the User Name and Password that your Internet service provider may have given you 3 Click Wireless on the top menu 4 ...

Page 17: ...click the Wireless Networking icon at the lower right corner of the screen For another device such as an iPhone or iPad you may have to click on something like Settings and then WiFi Skip c and continue with d below c Select the Site Survey or Scan option to see a list of the access points in your area That list should include the SSID ZOOM or the SSID you created d Select ZOOM or the SSID you cre...

Page 18: ...Security Using WEP If any of your network devices DO NOT support WPA or WPA2 you can use WEP to configure network security WEP can be configured two ways 64 bit and 128 bit 128 bit WEP provides more security than 64 bit 1 Open the Zoom Configuration Manager by typing the following in your Web browser s address bar http 192 168 0 1 2 In the Enter Network Password dialog box type the following User ...

Page 19: ... Network Key exactly as you entered it or exactly as it was generated for you on the Cable Modem Router Wireless page Your security setup configuration is now complete Disabling Security If for some reason you need to set up an unsecured network you will need to disable the default security that is currently set up for your cable modem router Follow the instructions below 1 Open the Zoom Configura...

Page 20: ...Survey or Scan option to see a list of the access points in your area That list should include the SSID ZOOM or the SSID you created d Select ZOOM or the SSID you created That s it You have now disabled security If you are like most users you don t need to read further in this manual You do want to read further if you are a network administrator or if you are using the Cable Modem Router with Wire...

Page 21: ...by the cable modem router 40 6 Firewall configure the firewall application to protect the private LAN from attacks from the WAN interface 54 7 Parental Control configure access policies or rules to specific network devices based on the time of day and Internet contents 62 8 Wireless configure and use the wireless features supported by the cable modem router 70 9 VPN enable the VPN protocol and con...

Page 22: ...he following procedure 1 Launch a Web browser Note Your computer does not have to be online to configure your cable modem router 2 In the browser address bar type http 192 168 0 1 and press the Enter key For example The Login screen appears see Figure 1 Figure 1 Login Screen 3 In the Login screen enter default username admin default password admin Both the username and password are case sensitive ...

Page 23: ... with the menu appear in the main area of the interface see Figure 2 If the displayed information exceeds what can be shown in the main area scroll bars appear to the right of the main area so you can scroll up and down through the information Menu Bar Submenu Main Area Figure 2 Main Areas on the Configuration Manager Interface Every menu has submenus associated with it If you click a menu item th...

Page 24: ...ms with the cable modem router 25 Basic make some modifications for more advanced uses 33 Advanced make use of advanced modem router features supported by the cable modem router 40 Firewall configure the firewall application to protect the private LAN from attacks from the WAN interface 54 Parental Control configure access policies or rules to specific network devices based on the time of day and ...

Page 25: ...ooting Software The Software page is a read only screen that shows the cable modem router s current system software version This page appears when you first log in to the Configuration Manager interface You can also display it by clicking Status in the menu bar and then click the Software submenu Figure 4 shows an example of the menu and Table 2 describes the items you can select 25 ...

Page 26: ... and IP address of the Cable modem router Connection The Connection page is a read only screen that shows the status of steps in your cable modem router registration process It also shows your cable modem router s upstream and downstream channel status To access the Connection page click Status in the menu bar and then click the Connection submenu Figure 5 shows an example of the menu 26 ...

Page 27: ...ou to configure access privileges and restore the cable modem router to its factory defaults To access the Security page click Status in the menu bar and then click the Security submenu Figure 6 shows an example of the menu and Table 3 describes the items you can select 27 ...

Page 28: ...t reappear click the Refresh link to log back in to the Configuration Manager Table 3 Security Menu Option Option Description Password Change User ID Enter the new ID for the administrator New Password Enter the new security password Re Enter New password Re enter confirm the new security password Current User ID Password Enter the current ID of the administrator Restore Factory Defaults Allows yo...

Page 29: ...check connectivity between the cable modem router and devices on the LAN while Traceroute allows you to map the network path from the cable modem router to a public host Selecting Traceroute from the drop down Utility list will present alternate controls for the Traceroute utility To access the Diagnostics page click Status in the menu bar and then click the Diagnostics submenu Figure 7 and Figure...

Page 30: ...Table 4 describes the items you can select Figure 7 Example of Diagnostics Ping Page 30 ...

Page 31: ...ge To run either utility 1 Select the utility from the Utility drop down list 2 Make any changes to the default parameters 3 Select Start Test to begin The window will automatically be refreshed as the results are displayed in the Results table 31 ...

Page 32: ...ics Clear Results Click this button to clear the results table Event Log The Event Log page shows the SNMP event log To access the Event Log page click Status in the menu bar and then click the Event Log submenu Figure 9 shows an example of the menu and Table 5 describes the items you can select Figure 9 Event Log Page Table 5 Event Log Menu Option Option Description Time Shows the local time of a...

Page 33: ... service Backup and restore of configuration settings Setup The Setup page allows you to configure the basic features of the cable modem router related to your ISP s connection To access the Setup page click Basic in the menu bar and then click the Setup submenu Figure 10 shows an example of the menu and Table 6 describes the items you can select 33 ...

Page 34: ...fault this is 192 168 0 1 There is normally no need to change this WAN Connection Type Select how your cable modem router obtains an IP address The options are via DHCP or manual configuration of a static IP address Unless you have arranged for a static IP address from your service provider you should leave this setting at its default DHCP 34 ...

Page 35: ...e your cable modem router s DHCP server To access the DHCP page 1 Click Basic in the menu bar 2 Then click the DHCP submenu Figure 11 shows an example of the menu and Table 7 describes the items you can select Figure 11 Example of DHCP Page 35 ...

Page 36: ...sable it Starting Local Address Configure the starting IP address for IP leases available to devices on the LAN Number of CPEs Configure the number of PCs supported on the LAN Lease Time Configure the time a lease will last before it must be renewed Default is 3600 seconds or 1 hour DDNS The DDNS page allows you to make use of a DDNS server Dynamic DNS DDNS allows a dynamic IP address to be aliase...

Page 37: ...also be asked for your host s current IP address This is the WAN IP address that has been assigned to your cable modem router during provisioning See WAN IP Address on the Basic Setup web page 4 Enter your account information on the Basic DDNS web page enable the service by selecting www DynDNS org from the DDNS Service drop down list and click Apply 5 The DDNS client will notify the DDNS service ...

Page 38: ...modem router configuration settings to a local PC You can then later restore these settings if you need restore a particular configuration or to recover from changes you may have made that have had an undesirable effect To backup the current configuration Click Backup and follow the prompts To restore a previous configuration Click Browse and use the navigation window to locate the file Usually ca...

Page 39: ...Figure 13 Example of Backup Page 39 ...

Page 40: ... hosting Configure RIP parameters Options The Options page allows you to configure the cable modem router to operate in different modes that adjust how the device routes IP traffic To access the Options page 1 Log in to the Configuration Manager see page 13 for instructions 2 Click Advanced in the menu bar 3 Then click the Options submenu Figure 14 shows an example of the menu and Table 9 describe...

Page 41: ...Figure 14 Example of Options Page To enable a feature 1 Click the appropriate check box a check mark will appear 2 When you are done with your selections click on the Apply button 41 ...

Page 42: ... port 8080 When enabled navigate to http CMIPAddress 8080 to administer the cable modem router remotely You can find your CM WAN IP address on the Basic Setup page Multicast Enable Allows multicast specific traffic denoted by a multicast specific address to be passed to and from the PCs on the private network behind the cable modem router UPnP Enable Select Enable to enable the UPnP agent in the c...

Page 43: ... LAN By entering starting and ending IP address ranges you can configure which local PCs are denied access to the WAN To access the IP Filtering page 1 Click Advanced in the menu bar 2 Then click the IP Filtering submenu Figure 15 shows an example of the menu and Table 10 describes the items you can select Figure 15 Example of IP Filtering Page 43 ...

Page 44: ...P address are set automatically from the cable modem router IP address Enable To activate the IP address filter you must also check the Enable box and click Apply You can disable this filter while retaining the addresses you entered for later use MAC Filtering The MAC Filtering page allows you to configure MAC address filters in order to block Internet traffic to specific network devices on your L...

Page 45: ...u Option Option Description MAC Address PCs and other devices can be added to the MAC filter table by entering their MAC addresses into the Add MAC Address box and clicking the Add MAC Address button Internet traffic to and from each listed Address will be blocked 45 ...

Page 46: ...nt PCs from sending outgoing TCP UDP traffic to the Internet from specific IP port numbers This can be configured using the Port Filtering page To access the Port Filtering page 1 Click Advanced in the menu bar 2 Then click the Port Filtering submenu Figure 17 shows an example of the menu and Table 12 describes the items you can select Figure 17 Example of Port Filtering Page 46 ...

Page 47: ... Enters the start and end port of the port filter range Protocol Filter either both TCP and UDP traffic or just UDP or just TCP Forwarding The Forwarding page allows you to run a publicly accessible server from your LAN by specifying the mapping of TCP UDP ports to a local PC It allows incoming requests to specific port numbers to reach a web server FTP server mail server etc To access the Forward...

Page 48: ...ly button to activate the forwarding rules Table 13 Forwarding Menu Option Option Description Local IP Address Enter the IP address to which forwarded traffic should be sent Start End Port Enter the range of port numbers start and end port to forward If only a single port is desired enter the same port number in the Start and End locations Protocol Select the protocol s to be forwarded Note You ma...

Page 49: ...time With the port triggering function the cable modem router detects outgoing data on a specific IP port number and opens corresponding target ports for incoming data If no outgoing traffic is detected on the Trigger Range ports for 10 minutes the Target Range ports will close To access the Port Triggers page 1 Click Advanced in the menu bar 2 Then click the Port Triggers submenu Figure 19 shows ...

Page 50: ...rts Protocol Select the protocol for this rule DMZ Host The DMZ De militarized Zone Host page allows you to configure a network device e g a PC to be exposed or visible directly to the Internet This may be used if an application doesn t work with port triggers If you have an application that won t run properly behind the NAT firewall you can configure it for unrestricted two way Internet access by...

Page 51: ...ess RIP Setup The RIP Setup page allows you to configure RIP Router Information Protocol parameters RIP automatically identifies and uses the best known and quickest route to any given destination address to help reduce network congestion and delays RIP is a protocol that requires negotiation from both sides of the network e g both the cable modem router and your service provider s CMTS Cable Mode...

Page 52: ...outer to perform RIP do the following this example uses BRCMV2 as the RIP Authentication Key and 1 as the Key ID To turn on RIP MD5 Authentication and check the Enable box To specify a RIP MD5 Authentication Key String type BRCMV2 for this example key name a string value to match CMTS key name value To specify a RIP MD5 Auth Key ID type 1 key number a number to match the CMTS key number value To c...

Page 53: ...r the set of keys for your interface RIP Authentication Key ID Enter the ID to identify the key used to create the authentication data RIP Reporting Interval Enter the interval at which to update routing table RIP Destination IP Address Enter the destination IP address for RIP RIP Destination IP Subnet Mask Enter the subnet mask for the destination IP address 53 ...

Page 54: ...e Web Filter page allows you to block or exclusively permit different types of data through the cable modem router from the WAN to the LAN To access the Web Filter page 1 Click Firewall in the menu bar 2 Then click the Web Filter submenu Figure 22 shows an example of the menu and Table 16 describes the items you can select 54 ...

Page 55: ...Menu Option Option Description Filter Proxy Check this box to filter proxies Filter cookies Check this box to filter cookies Filter Java Check this box to filter Javas Applets Check this box to filter Applets Filter ActiveX Check this box to filter ActiveX Filter Popup Windows Check this box to filter popup windows Port Scan Detection Detects and blocks port scan activity originating on both the L...

Page 56: ...ails can be sent out automatically each time the firewall is under attack A local log is also stored within the modem and displayed within this page To access the Local Log page 1 Click Firewall in the menu bar 2 Then click the Local Log submenu Figure 23 shows an example of the menu and Table 17 describes the items you can select To enable the automatic email alerts 1 Configure the email address ...

Page 57: ...ts Check to enable sending alert email when an attack is detected Remote Log The Remote Log page allows you to send firewall attack reports to a standard SysLog server It is useful to log volumes of instances over a long period of time Individual attack or configuration items can be selected that will be sent to the SysLog server so that only the items of interest can be monitored Permitted connec...

Page 58: ...escribes the items you can select Figure 24 Example of Remote Log Page Below is a complete list of the capable SysLog server attack notification types and their format The generic format of sysLog messages for traffic or administration related events is MMM DD HH MM SS YYYY SYSLOG 0 Host HostIP Protocol SourceIP SourcePort DestIP DestPort EventText 58 ...

Page 59: ...he Basic Setup page Protocol Can be one of the following TCP UDP ICMP IGMP or OTHER In the case of OTHER the protocol type is displayed in parentheses For ICMP packets the ICMP type is displayed in parentheses SourceIP The IP address of the originator of the session packet SourcePort The source port at the originator DestIP The IP address of the recipient of the session packet DestPort The destina...

Page 60: ...t SUCCESS User interface login An attempt was made to login to the user interface and access was allowed ALLOW User interface access request An HTTP GET or POST request was made by an authenticated user to the user interface DENY Inbound or outbound internet attack name attack A known internet attack was detected attempting to traverse the firewall and was blocked Examples of known internet attack...

Page 61: ...tion process The system time is used by the firewall to timestamp events Public Network Interface up IP address x x x x The firewall successfully obtained an IP address for the public network WAN interface via DHCP This process takes place after the cable modem registration process successfully completes 61 ...

Page 62: ... access will be defined by the policy that you assigned to that user A user profile may optionally be applied to a specific computer so that no login is required for users of that computer Basic This Basic Setup page allows you to configure rules which block certain Internet content and certain Web sites An override password and access duration timer allow user override of the content filter setti...

Page 63: ...Figure 25 Example of Basic Page 63 ...

Page 64: ...ou have created Select the policy you want to define or edit Blocked Domain List Type the domain name and add this domain to be blocked item and tied to a particular rule name Blocked Domain feature can be time constrained to certain parts of the day or night via the settings from the Parental Control ToD Filter page Allowed Domain List Type the domain name and add this domain to be exclusively pa...

Page 65: ...n password To access the User Setup page 1 Click Parental Control in the menu bar 2 Then click the User Setup submenu Figure 26 shows an example of the menu and Table 21 describes the items you can select Note Always remember to click on the appropriate Apply Add or Remote button to store and activate the settings Figure 26 Example of User Setup Page 65 ...

Page 66: ...arental Control Basic page of his her content policy Time Access Rule Select the access time rule for this user The content policy is defined in Parental Control ToD Filter page Session Duration Enter the session duration time to limit this user s Internet access time Inactivity Time Configure the inactivity timeout for this user to re login If there is no Internet activity for the specified amoun...

Page 67: ...lic Internet traffic for entire days or for specific time periods within each day You can combine these policies in any way you want To access the ToD Filter page 1 Click Parental Control in the menu bar 2 Then click the ToD Filter submenu Figure 27 shows an example of the menu and Table 22 describes the items you can select Note Always remember to click on the appropriate Apply Add or Remote butt...

Page 68: ...you may need to create and apply two time policies See example below Example of Time to Block create and apply two time policies to allow access Mon Fri 7 00pm 9 00pm Time Policy Name Days to Block Time to Block Weekday I Mon Fri 12 00am 7 00pm Weekday II Mon Fri 9 00pm 12 00am Select both Weekday I and Weekday II at User Time Access Rule Local Log The Local Log page shows you the events related t...

Page 69: ...To access the Local Log page 1 Click Parental Control in the menu bar 2 Then click the Local Log submenu Figure 28 shows an example of the menu Figure 28 Example of Local Log Page 69 ...

Page 70: ...MM QoS Note Your cable modem router has been preconfigured to support wireless connections without any further configuration Please see page 10 for details Most users will not need to read this chapter Radio The Radio page allows you to modify wireless settings To access the Radio page 1 Click Wireless in the menu bar 2 Then click the Radio submenu Figure 29 shows an example of the menu and Table ...

Page 71: ...Figure 29 Example of Radio Page 71 ...

Page 72: ...annel for AP operation next to the drop down list box The current channel number is displayed The list of detailed control channel and extension channels are shown in the Table below Table 24 Country Extension Channel List Control Channel Sideband for Control Channel Extension Channel US Channel 1 7 Lower Channel Number 4 US Channel 5 11 Upper Channel Number 4 Example 1 If your control channel is ...

Page 73: ...s the network s SSID and WPA Personal security settings It configures a new network only on each new device that is authorized to join the network To access the Primary Network page 1 Click Wireless in the menu bar 2 Then click the Primary Network submenu Figure 30 shows an example of the menu and Table 25 describes the items you can select Figure 30 Example of Primary Network Page 73 ...

Page 74: ...ss here The RADIUS server may be on either public network WAN or private network LAN RADIUS Port Relevant only when the RADIUS server is enabled Enter the UDP port number of the RADIUS server The default port is 1812 RADIUS Key Relevant only when the RADIUS server is enabled Enter the RADIUS Key Group Key Rotation Interval Relevant only when the RADIUS server is enabled When enabled the cable mode...

Page 75: ...mplify the process of configuring security on wireless networks Device Name Enter a name to identify this cable modem router in WPS network WPS Setup AP PIN PIN Personal Identification Number is the number of your PC or game machine When a WPS supported device tries to connect to this cable modem router you have to enter its PIN into the WPS Setup AP s PIN field then click Configure WPS Add Client...

Page 76: ...r SES you must open the window multiple times When the SES window is open the pop up window below indicates the cable modem router is waiting for a SES client Figure 32 SES Configuration Window Waiting Once a SES client successfully connects the pop up window indicates success as shown below Figure 33 SES Configuration Window Success If a SES client does not connect during the 2 minute open window...

Page 77: ...y limits access to any internal intranet Web sites or files Traditionally you needed to use different APs to configure different Basic Service Sets BSSs Your cable modem router supports Multiple SSID which allows you to use the same access point to provide several BSSs simultaneously You can then assign various privileges to different SSIDs and associated networks y Up to four BSSs are allowed on ...

Page 78: ...Figure 36 shows an example of the menu and Table 26 describes the items you can select Figure 36 Example of Guest Network Page 78 ...

Page 79: ...ther public network WAN or private network LAN RADIUS Port Relevant only when the RADIUS server is enabled Enter the UDP port number of the RADIUS server The default port is 1812 RADIUS Key Relevant only when the RADIUS server is enabled Enter the RADIUS Key Group Key Rotation Interval Relevant only when the RADIUS server is enabled When enabled the cable modem router generates the best possible r...

Page 80: ...oy DHCP server for this guest SSID IP Address Enter the IP address to be the default cable modem router address for clients connected this guest network Subnet Mask Enter the subnet mask for this guest network Lease Pool Start Enter the start IP address of this DHCP address pool Lease Pool End Enter the end IP address of this DHCP address pool Lease Time Enter the leased time for DHCP clients DHCP...

Page 81: ...Figure 37 Example of Advanced Page 81 ...

Page 82: ...tdown field informing clients of the next window for listening to broadcast and multicast messages When the router has buffered broadcast or multicast for associated clients it sends the next DTIM with a DTIM Interval value Its clients hear the beacons and awaken to receive the broadcast and multicast message The default value is 1 Fragmentation Threshold This value specifies the maximum size for ...

Page 83: ...eleconferencing videoconferencing and group email are some examples of multicast applications Specifying a high multicast rate may improve performance of multicast features The rates are in Mbps You can select Automatic 1 2 5 5 6 9 11 12 18 24 36 48 and 54 Access Control This page allows you to control which wireless clients can access your wireless network It also provides information about wirel...

Page 84: ...resented The age is the amount of time elapsed since data was transmitted to or received from the client WMM WiFi Multimedia The WMM page allows you to configure WMM WiFi Multimedia feature WMM is a subset of the 802 11e wireless LAN WLAN specification that enhances quality of service QoS on a network by prioritizing data packets according to their categories WMM enhances QoS at the wireless drive...

Page 85: ...Figure 39 Example of WMM Page 85 ...

Page 86: ... settings y Admission Control Specify if admission control is enforced for the Access Categories y Discard Oldest First Specify the discard policy for the queues On discards the oldest first and Off discards the newest first EDCA STA Parameters Specifies the transmit parameters for traffic transmitted from the STA station to the AP for the four Access Categories AC Best Effort AC_BE Background AC_...

Page 87: ...n Wireless Bridging Select to enable or disable wireless bridging Remote Bridges Table of remote bridge MAC addresses authorized to establish a wireless bridge Up to 4 remote bridges may be connected Typically you will also have to enter your AP s MAC address on the remote bridge 87 ...

Page 88: ...ried by open connections or virtual circuits within some larger network e g the Internet as opposed to by physical wires as in a traditional private network A VPN can be used to separate the traffic of different user communities over an underlying network with strong security features To access the Basic page 1 Click VPN in the menu bar 2 Then click the Basic submenu Figure 41 shows an example of ...

Page 89: ...the foundation of an IPSec VPN An SA is built from the authentication provided by the AH and ESP protocols The primary function of key management is to establish and maintain the SA between systems Once the SA is established the transport of data may commence AH Authentication Header Protocol The AH protocol RFC 2402 was designed for integrity authentication sequence integrity replay resistance an...

Page 90: ... access the IPSec page 1 Click VPN in the menu bar 2 Then click the IPSec submenu Figure 42 shows an example of the menu and Table 32 describes the items you can select Figure 42 Example of IPSec Page 90 ...

Page 91: ...tity type Remote Endpoint Settings Record the parameters of the network on which the peer VPN is located Address Group Type Define the local address type Select IP Subnet to protect the whole subnet select Single IP address to protect a single PC select IP address range to protect several PCs Subnet Enter the subnet for address group Mask Enter the subnet mask for address group Identity Type Selec...

Page 92: ...a newer method of data encryption that also uses a secret key This implementation of AES applies a 128 bit key to 128 bit blocks of data AES is faster than 3DES Here you have the choice of AES 128 AES 192 and AES 256 Phase 1 Authentication Select the hash algorithm used to authenticate packet data in the IKE SA SHA1 generally considered stronger than MD5 but it is also slower MD5 Message Digest 5 ...

Page 93: ... it is also slower Phase 2 SA Lifetime In this field define the length of time before an IPSec SA automatically renegotiates This value may range from 120 to 86400 seconds Key Management Select to use IKE ISAKMP or manual key configuration in order to set up a VPN IKE Negotiation Mode Select how Security Association SA will be established for each connection through IKE negotiations Main Mode ensu...

Page 94: ...agement field enter a 16 hexadecimal digits manual encryption key for encryption Manual Authentication Key Enter a 32 hexadecimal digit unique authentication key to be used by IPSec Inbound SPI Enter a unique SPI Security Parameter Index for inbound SPI Outbound SPI Enter a unique SPI Security Parameter Index for outbound SPI L2TP PPTP The L2TP PPTP page allows you to configure server and security...

Page 95: ...Figure 43 Example of L2TP PPTP Page 95 ...

Page 96: ...PPE is used to enhance the confidentiality of PPP encapsulated packets It uses the RSA RC4 encryption algorithm Username Enter the user name for the L2TP or PPTP tunneling Password Enter the password for the L2TP or PPTP tunneling Confirm Password Re enter to confirm the password User List Show the existing user list L2TP Server Preshared Phrase Enter a key Pre Shared key for authentication This k...

Page 97: ...igure 44 Example of Event Log Page Table 34 Event Log Menu Option Option Description Time Shows the local time mapping to a certain log event Description Shows detailed information of a VPN event log 97 ...

Page 98: ...Phone or other cellular phones and the iPod Touch to the Cable Modem Router If you have a non computer wireless device like an iPhone or other cellular phone an iPod Touch or an iPad or other tablet computer see the instructions on page 101 for Connecting a Wireless enabled Computer or Device to the Cable Modem Router Some computers may need a wireless network adapter installed This can be a USB a...

Page 99: ...ocation dialog box where you choose a location If the User Account Control dialog box appears click Continue Click Close to complete the connection procedure Select this option if you are connecting to this network only one time To disconnect from the current network 1 Right click the wireless network icon in the notification area of the Windows taskbar 2 Right click ZOOM and select Disconnect Con...

Page 100: ...lete the connection procedure Select this option if you are connecting to this network only one time To disconnect from the current network 1 From the Start menu select Connect to 2 In the Disconnect or Connect to another network dialog box select the current network and click Disconnect 3 In the Are You Sure message box click Disconnect again 4 In the next dialog box you can connect to another ne...

Page 101: ...e computer or notebook that you set up open your Web browser for instance Internet Explorer or Firefox and try to connect to a familiar Web address If you connect successfully your notebook s wireless capability is configured and you are ready to browse the Web To disconnect from the current network 1 On your Windows desktop click the Start button then click SettingsÆControl Panel 2 Double click t...

Page 102: ...w to access the Wireless Setup page to change the channel 2 When asked for a Passphrase enter the default Pre Shared Key which is zoom where represents the last 4 characters of the Cable MAC address of the unit which can be found on the label on the bottom of the cable modem router or enter the Pre Shared Key you created if you changed it from the default In the unlikely event that you set up WEP ...

Page 103: ...settings check box and then click OK You can then use the software provided with your wireless adapter without interruption from Windows More than one wireless network may appear in the list These are other wireless networks that are within range of your network Your neighbors for instance may be within range of your network Each wireless network has a channel associated with it We recommend there...

Page 104: ...ter that has a wireless adapter find the wireless network connection option similar to the process of adding your computer to the network 2 Click or highlight ZOOM or the SSID you changed it to 3 Select or click on Disconnect or similarly named button 104 ...

Page 105: ...ble signal may be weak or noisy If this is the case call your cable service provider If you are using your PC s Ethernet port check that this port is functioning correctly If you are using wireless check that your wireless connection is functioning correctly Refer to its documentation if necessary Check that your Web browser is configured correctly It should be set to use a network connection this...

Page 106: ...ptions available from Zoom Please go to www zoomtel com techsupport From here you can register your router and or contact our technical support experts and or use our intelligent database SmartFactstm and or get warranty information US 617 753 0963 UK London 44 2033180660 UK Manchester 44 1618840074 106 ...

Page 107: ...ff and on the user is encouraged to try to correct the interference by one of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help The device complies with P...

Page 108: ...pecific channels and or operational frequency bands are country dependent and are firmware programmed at the factory to match the intended destination The firmware setting is not accessible by the end user Note to CATV System Installer This reminder is provided to call the CATV systems installer s attention to Section 820 93 of the National Electric Code which provide guideline for proper groundin...

Reviews: