TABLE OF CONTENTS
Version 1.0, 02/2015. Copyright 2012 Hitron Technologies
8
Version 1.0, 02/2015. Copyright 2014 Hitron Technologies
8
Hitron CGNVM User’s Guide
4.1.1 Wireless Networking Basics ..................................................... 75
4.1.2 Architecture ............................................................................... 75
4.1.3 Wireless Standards ................................................................... 76
4.1.4 Service Sets and SSIDs ........................................................... 76
4.1.5 Wireless Security ...................................................................... 77
4.1.5.1 WPS ................................................................................. 78
4.2 The Wireless: Basic Settings Screen ................................................ 78
4.2.1 The Wireless: Basic Settings: 2.4G Screen .............................. 79
4.2.2 The Wireless: Basic Settings: 5G Screen ................................. 84
4.2.3 The Wireless: Basic Settings: WPS Screen ............................. 88
4.2.4 The Wireless: Basic Settings: Guest Screen ............................ 90
4.3 The Wireless: Access Control Screen ............................................... 91
Admin .......................................................................................... 94
5.1.1 Debugging (Ping and Traceroute) ............................................ 94
5.2 The Admin: Management Screen ..................................................... 95
5.3 The Admin: Remote Management Screen ........................................ 96
5.4 The Admin: Diagnostics Screen ........................................................ 97
5.5 The Admin: Backup Screen .............................................................. 98
5.6 The USB Storage Screen .................................................................. 99
5.7 The Admin: Device Reset Screen ................................................... 100
Security ...................................................................................... 102
6.1.1 Firewall ................................................................................... 102
6.1.2 Intrusion detection system ...................................................... 103
6.1.3 Device Filtering ....................................................................... 103
6.1.4 Service Filtering ...................................................................... 103
6.2 The Security: Firewall Screen ......................................................... 103
6.3 The Security: Service Filter Screen ................................................. 105
6.3.1 Adding or Editing a Service Filter Rule ................................... 107
6.3.2 Adding or Editing a Service Filter Trusted Device Rule .......... 110
6.4 The Security: Device Filter Screen .................................................. 111