5
Illustrations contained in this document are for representation only.
Chapter 2: Overview
Top Side Panel for WPS
WPS ʹ Indicates the status of the WPS (Wi-Fi Protected SetupTM) functionality.
There is one WPS button on the Top Side Panel of TCG220 and is designed to have multiple function.
This button can be used to:
Securely and Simply Get WiFi Client Connected: WPS button can be used to paring WiFi client
which also supports WPS function. A long press (press more than 2 seconds) on the WPS button
will enable TCG220 scan for any available WPS device. Note: You must ensure that the WiFi client
device supports WPS function in order to use this WPS function on TCG220.
WiFi On/Off Switch: a short press on the button can switch the WiFi Interface ON or OFF
6
Illustrations contained in this document are for representation only.
Chapter 2: Overview
Important Information
zThe cable service to your home supports DOCSIS compliant two-way modem access.
zYour internet account has been set up.
zA cable outlet near your PC and it is ready for cable modem service.
Note: It is important to supply power to the modem at all times. Keeping your modem plugged in will
keep it connected to the Internet. This means that it will always be ready when you are. Your cable
company should always be consulted before installing a new cable outlet. Do not attempt any rewiring
without contacting your cable company first.
7
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Chapter 3: Connections and setup
Connecting the EMTA to Computer
This section explains the way to attach Cable TV wire to EMTA and to connect your EMTA to the
Ethernet port on your personal computer and install the necessary software.
Attaching the Cable TV Wire to EMTA
You may find the Cable TV wire one of the following ways:
zConnected directly to a TV, a Cable TV converter box, or VCR. The line will be connected to the jack
with which should be labeled either IN, CABLE IN, CATV, CATV IN, etc.
zConnected to a wall-mounted cable outlet.
Connect one end of the coaxial cable to the cable connection in the wall, and the other end to the CABLE
jack on the EMTA.
8
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Connection to Computer and Telephone
Make the connections to modem in the following sequence:
zConnect the plug from the AC power supply into the POWER AC ADAPTER jack on the EMTA, and
plug the power supply into an AC outlet in the wall.
zConnect one end of the Ethernet cable to the Ethernet port on the back of your computer, and the
other end to the ETHERNET port on the EMTA.
Note: Use only the power
supply that accompanied this
unit. Using other adapters
may damage the unit.
Fig. 1: How to Setup Your Device
9
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Activating the EMTA
After you install the EMTA and turn it on for the first time (and each time the modem is reconnected to
the power), it goes through several steps before it can be used. Each of these steps is represented by a
different pattern of flashing lights on the front of the modem.
Note: All indicators flash once prior to the initialization sequence.
If all of the lights are flashing sequentially, it means the EMTA is automatically updating its system
software. Please wait for the lights to stop flashing. You cannot use your modem during this time. Do
not remove the power supply or reset the EMTA during this process.
To make sure that you can access the Internet successfully, please check the following first.
1.Make sure the connection (through Ethernet) between the EMTA and your computer is OK.
2.Make sure the TCP/IP protocol is set properly.
3.Subscribe to a Cable Company.
10
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Accessing the Internet
If enabled by your service provider; please proceed as follows:
1.Once your host PC is properly configured.
2.Start your web browser and type the CM IP address on the URL field.
After connecting to the URL, you can see the login page. Please enter the username, password and then
press Login button. The default username is "admin" and password is "password".
Fig. 2: Login Page
Note: If forget your username and password, you may Press "Reset" button on the rear panel more
than 6seconds to restore the username and password to default.
11
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Status Web Page Group
Connection
This page reports current connection status containing startup procedures, downstream and upstream
status, CM online information, and so on. The iŶĨŽƌŵĂƚŝŽŶĐĂŶďĞƵƐĞĨƵůƚŽLJŽƵƌĐĂďůĞĐŽŵƉĂŶLJƐ
ƐƵƉƉŽƌƚƚĞĐŚŶŝĐŝĂŶŝĨLJŽƵƌĞŚĂǀŝŶŐƉƌŽďůĞŵƐ
Fig. 3: Connection Status
12
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Software
The information section shows the hardware and software information about your gateway.
The status section of this page shows how long your gateway has operated since last time being
powered up, and some key information the Cable Modem received during the initialization process with
LJŽƵƌĐĂďůĞĐŽŵƉĂŶLJ/ĨEĞƚǁŽƌŬĐĐĞƐƐƐŚŽǁƐůůŽǁĞĚƚŚĞŶLJŽƵƌĐĂďůĞ company has configured your
gateway to have Internet connectivity. If not, you may not have Internet access, and should contact your
cable company to resolve this.
Fig. 4: Software Status
13
Illustrations contained in this document are for representation only.
IP routes to these LANs to your cable operator, so packets can be routed properly in this situation.
Your cable operator will advise you during installation if any setting changes are required here.
Fig. 19: RIP Setup
29
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Firewall Web Page Group
Basic
This page allows configuration of Firewall features. It is highly recommended that the Firewall is left
enabled at all times for protection against Denial of Service attacks.
Fig. 20: Firewall Basic configuration
30
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Filtering
This page allows the filtering of outbound connections, restricting or granting access to specific MAC
Addresses. Filters with no MAC Address entered will apply to ALL MAC Addresses. The URL field is
intended to be used to block or allow access to specific sites ( cnn.com, google.com, etc. ). Filters with
no ports entered will apply to ALL ports.
Fig. 21: Filtering configuration
31
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Local Log
The gateway builds a log of firewall blocking actions that the firewall has taken. Using the Local Log page
lets you specify an email address to which you want the gateway to email this log. You must also tell the
gateway your outgoing (i.e. SMTP) email seƌǀĞƌƐŶĂŵĞƐŽŝƚĐĂŶĚŝƌĞĐƚƚŚĞĞŵĂŝůƚŽŝƚŶĂďůĞŵĂŝů
Alerts has the gateway forward email notices when Firewall protection events occur. Click E-mail Log to
immediately send the email log. Click Clear Log to clear the table of entries for a fresh start.
The log of these events is also visible on the screen. For each blocking event type that has taken place
since the table was last cleared, the table shows Description, Count, Last Occurrence, Target, and
Source.
Fig. 22: Local Log Configuration
32
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Remote Log
The Remote Log page allows you to specify the IP addresswhere a SysLog server is located on the LAN
Side and select different types of firewall events that may occur. Then, each time such an event occurs,
notification is automatically sent to this log server.
Fig. 23: Remote Log Configuration
33
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Wireless Web Page Group
Radio
To set the basic configuration for the wireless features, click RADIO from the Wireless menu. These must
match the settings you make on your wireless-equipped PC on the LAN side.
Fig. 24: Radio configuration
Wireless Interface:
Choose the wireless interface on the EMTA.
Wireless:
Enable or disable the wireless function.
Country:
Display the country code you currently use.
Output Power:
Choose output power of the device.
802.11 Band:
Choose 2.4 GHz for 802.11 b/g/n, 5 GHz for 802.11a
802.11 N Support Required:
Enable 802.11n support under 802.11 band 2.4 GHz.
34
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Bandwidth:
For wireless signal of this AP
Sideband for Control Channel (40 MHz only):
If Bandwidth is 40 MHz this function will be enabled.
Control channel:
Choose the wireless channel to use.
Regulatory Mode:
802.11d and 802.11h for choose.
OBSS (Overlap Basic Service Set) Coexistence:
Overlapping Basic service set coexistence, enable or disable this function.
STBC Tx:
Spaceʹtime block coding is a technique used in wireless communications to transmit multiple
copies of a data stream across a number of antennas and to exploit the various received versions
of the data to improve the reliability of data-ƚƌĂŶƐĨĞƌĞĨĂƵůƚǁĂƐƵƚŽ
Restore Wireless defaults:
To recover to the default settings, press this button to retrieve the settings then click Apply.
35
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Primary Network
This page allows configuration of the Primary Wireless Network and its security settings. Supports
WPA/WPA2, WPA-PSK/WPA2-PSK, WEP 64-bits, WEP 128-bits and WPS Securities.
Fig. 25: primary Network configuration
36
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
WPA (Wi-Fi Protected Access)/WPA2:
It must be used in connection with an authentication server such as RADIUS to provide
centralized access control and management. It can provide stronger encryption and
authentication solution than none WPA modes. WPA2 is the second generation of WPA security.
There are two types for choose AES and TKIP+AES.
TKIP (Temporal Key Integrity Protocol): Takes the original master key only as a starting point and
derives its encryption keys mathematically from this mater key. Then it regularly changes and
rotates the encryption keys so that the same encryption key will never be used twice.
AES (Advanced Encryption Standard): This Provides security between client workstations
operating in ad hoc mode. It uses a mathematical ciphering algorithm that employs variable key
sizes of 128, 192 or 256 bits.
RADIUS (Remote Authentication Dial In User Service) Server:
a protocol for carrying authentication, authorization, and configuration information between a
Network Access Server which desires to authenticate its links and a shared Authentication Server.
Please key in the IP Address for the RADIUS Server.
RADIUS (Remote Authentication Dial In User Service) Port:
Besides the IP address of the RADIUS Server, you have to enter the port number for the server.
Port 1812 is the reserved RADIUS-authentication port described in RFC 2138. Earlier AP (RADIUS
clients) use port 1945. The default value will be shown on this box. You can keep and use it.
RADIUS (Remote Authentication Dial In User Service) Key:
A RADIUS Key is like a password, which is used between IAS and the specific RADIUS client to
verify identity. Both IAS and the RADIUS client must be use the same RADIUS Key for successful
communication to occur. Enter the RADIUS Key.
Group Key Rotation Interval:
Key in the time for the WAP group key rotation interval. The unit is second. With increasing rekey
interval, user bandwidth requirement is reduced
WPA/WPA2 Re-auth Interval:
When a wireless client has associated with the Wireless Voice Gateway for a period of time
longer than the setting here, it would be disconnected and the authentication will be executed
again. The default value is 3600, you may modify it
WPA-PSK (WPA-Pre-Shared Key) /WPA2-PSK:
Its useful for small places without authentication servers such as the network at home. It allows
the use of manually-entered keys or passwords and is designed to be easily set up for home
users.
Please type the key to be between 8 and 63 characters, or 64 hexadecimal digits. Only the
devices with a matching key that you set here can join this network.
WEP (Wired Equivalent Privacy) Encryption:
There are two types encryption to choose 64-bit or 128-bit. If you choose Disabled, the Network
37
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Keys will not be shown on this page. If selected, the data is encrypted using the key before being
transmitted.
Shared Key Authentication:
Decide whether to set the shared key Optional or Required by selecting from the drop-down
menu.
Network Key 1 to 4:
This allows you to enter four sets of the WEP key. For 64-bit WEP mode, the key length is 5
characters or 10 hexadecimal digits. As for 128-bit WEP mode, the key length is 13 characters or
26 hexadecimal digits
Current Network Key:
Select one set of the network key (from 1 to 4) as the default one
Passphrase:
You can enter ASCII codes into this field. The range is from 8 characters to 64 characters. For
ASCII characters, you can key in 63 characters in this field. If you want to key in 64 characters,
only hexadecimal characters can be used
Generate WEP Keys:
Click this button to generate the Passphrase
38
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Automatic Security Configuration:
Right side on the page, Auto Security Configuration can be enabled with WPS (Wi-Fi Protect
TM
Setup
).
TM
WPS (Wi-Fi Protect Setup
):
Its easy and secure way of configuring and connecting, make the CM is the AP and the connect
PC is STA. When configuring your Wireless Network via WPS, Messages are exchanged between
the STA and AP in order to configure the Security Settings on both devices
Device Name:
Change the factory default to a name of your choice which is up to 32 characters long as like SSID
WPS Setup AP:
UUID (Universally Unique Identifier) to Identifier this device, generate AP PIN for STA to connect.
WPS Add Client:
There are two methods "Push-Button" and "PIN". Select the method you want. But, the default
selection will be "PIN"
Apply:
After proper configuration, click Apply to invoke the settings
39
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
802.11 Advanced
This page allows configuration of data rates and Wi-Fi thresholds.
CAUTION: It is not recommended that these settings be modified without direct knowledge or
instructions to do so. Modifying these settings inappropriately could seriously degrade network
performance.
Fig. 26: 802.11 Advanced Settings
TM
54g
Mode:
Under 802.11n-mode OFF this option to choose 54g mode or force 802.11b only.
TM
XPress
Technology:
Increase aggregate throughput improve by up to 27% in 802.11g-only networks, and up to 75%
in mixed networks comprised of 802.11g and 802.11b standard equipment
802.11n Protection:
This option allow 802.11g and 802.11b devices co-exist in the same network without "speaking"
at the same time.
Short Guard Interval:
For 802.11n added optional to increase data rate. This provides an 11% increase in data rate.
Basic Rate Set:
For all clients to associate with, "Default" or "All" for all 802.11 b/g/n users.
40
Illustrations contained in this document are for representation only.
Chapter 3: Connections and setup
Multicast Set:
For users, in order to connect to the AP, set the baseline level to deliver. Lower multicast rates
mean weaker, farther signals are allowed to connection. Higher multicast rates mean that only
close, strong signals are allowed.
NPHY Rate:
Set Physical Layer rate, only applicable when the 802.11n-mode set as auto.
Legacy Rate:
When AP released to share the band with existing legacy device, 802.11g/b/a devices. It
provided ways of ensuring coexistence between legacy and successor devices.
Beacon Interval:
This is the time interval between beacon transmissions. The measure unit is "time units" (TU) of