WARNING: TO PREVENT FIRE OR SHOCK HAZARD, DO NOT EXPOSE THIS PRODUCT TO RAIN OR
MOISTURE. THE UNIT MUST NOT BE EXPOSED TO DRIPPING OR SPLASHING. DO NOT PLACE OBJECTS
FILLED WITH LIQUIDS, SUCH AS VASES, ON THE UNIT.
CAUTION: TO ENSURE REGULATORY AND SAFETY COMPLIANCE, USE ONLY THE PROVIDED POWER
AND INTERFACE CABLES. DO NOT CONNECT THE PLUG INTO AN EXTENSION CORD, RECEPTACLE, OR
OTHER OUTLET UNLESS THE PLUG CAN BE FULLY INSERTED WITH NO PART OF THE BLADES
EXPOSED.
CAUTION: DO NOT OPEN THE UNIT. DO NOT PERFORM ANY SERVICING OTHER THAN THAT CONTAINED
IN THE INSTALLATION AND TROUBLESHOOTING INSTRUCTIONS. REFER ALL SERVICING TO QUALIFIED
SERVICE PERSONNEL.
CAUTION: CHANGES AND MODIFICATIONS NOT EXPRESSLY APPROVED BY MOTOROLA FOR
COMPLIANCE COULD VOID USER’S AUTHORITY TO OPERATE THE EQUIPMENT.
CAUTION: Exposure to Radio Frequency Radiation. To comply with the FCC RF exposure compliance
requirements, the separation distance between the antenna and any person’s body (including hands, wrists, feet
and ankles) must be at least 8 inches (20 cm).
This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This
device may not cause harmful interference, and (2) this device must accept any interference received, including
interference that may cause undesired operation.
Note: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to
part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference
in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not
installed and used in accordance with the instructions, may cause harmful interference to radio communications.
However, there is no guarantee that interference will not occur in a particular installation. If this equipment does
cause harmful interference to radio or television reception, which can be determined by turning the equipment off
and on, the user is encouraged to try to correct the interference by one or more of the following measures:
•Reorient or relocate the receiving antenna.
•Increase the separation between the equipment and receiver.
•Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
•Consult the dealer or an experienced radio/TV technician for help.
This device must be installed and used in strict accordance with the manufacturer’s instructions as described in
the user documentation that comes with the product.
Postpone cable modem installation until there is no risk of thunderstorm or lightning activity in the area.
Do not overload outlets or extension cords, as this can result in a risk of fire or electric shock. Overloaded AC
outlets, extension cords, frayed power cords, damaged or cracked wire insulation, and broken plugs are
dangerous. They may result in a shock or fire hazard.
Route power supply cords so that they are not likely to be walked on or pinched by items placed upon or against
them. Pay particular attention to cords where they are attached to plugs and convenience receptacles, and
examine the point where they exit from the product.
Place this equipment in a location that is close enough to an electrical outlet to accommodate the length of the
power cord.
Be sure that the outside cable system is grounded, so as to provide some protection against voltage surges and
built-up static charges. Article 820-20 of the NEC (Section 54, Part I of the Canadian Electrical Code) provides
guidelines for proper grounding and, in particular, specifies the CATV cable ground shall be connected in the
grounding system of the building, as close to the point of cable entry as practical.
When using this device, basic safety precautions should always be followed to reduce the risk of fire, electric
shock and injury to persons, including the following
:
•Read all of the instructions {listed here and/or in the user manual} before you operate this equipment. Give
particular attention to all safety precautions. Retain the instructions for future reference.
•Comply with all warning and caution statements in the instructions. Observe all warning and caution symbols
that are affixed to this equipment.
•Comply with all instructions that accompany this equipment.
•
Avoid using this product during an electrical storm.
added protection for this product during a lightning storm, or when it is left unattended and unused for long
periods of time, unplug it from the wall outlet, and disconnect the cable system. This will prevent damage to
the product due to lightning and power surges.
There may be a risk of electric shock from lightning. For
•Avoid damaging the cable modem with static by touching the coaxial cable when it is attached to the earth
grounded coaxial cable TV wall outlet.
•Always first touch the coaxial cable connector on the cable modem when disconnecting or re-connecting USB
or Ethernet cable from the cable modem or the user’s PC.
•Operate this product only from the type of power source indicated on the product’s marking label. If you are
not sure of the type of power supplied to your home, consult your dealer or local power company.
•Upon completion of any service or repairs to this product, ask the service technician to perform safety checks
to determine that the product is in safe operating condition.
It is recommended that the customer install an AC surge protector in the AC outlet to which this device is
connected. This is to avoid damaging the equipment by local lightning strikes and other electrical surges.
Different types of cord sets may be used for connections to the main supply circuit. Use only a main line cord that
complies with all applicable product safety requirements of the country of use.
Installation of this product must be in accordance with national wiring codes.
Place unit to allow for easy access when disconnecting the power cord/adapter of the device from the AC wall
outlet.
Wipe the unit with a clean, dry cloth. Never use cleaning fluid or similar chemicals. Do not spray cleaners directly
on the unit or use forced air to remove dust.
This product was qualified under test conditions that included the use of the supplied cables between system
components. To be in compliance with regulations, the user must use these cables and install them properly.
Connect the unit to a grounding type AC wall outlet using the power adapter supplied with the unit.
Do not cover the device, or block the airflow to the device with any other objects. Keep the device away from
excessive heat and humidity and keep the device free from vibration and dust.
Installation must at all times conform to local regulations.
All rights reserved. No part of this publication may be reproduced in any form or by any means or used to make any derivative work (such as
translation, transformation or adaptation) without written permission from Motorola, Inc.
Motorola reserves the right to revise this publication and to make changes in content from time to time without obligation on the part of Motorola
to provide notification of such revision or change. Motorola provides this guide without warranty of any kind, either implied or expressed,
including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Motorola may make improvements or
changes in the product(s) described in this manual at any time.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. Microsoft, Windows, Windows Me, and Windows NT are
registered trademarks and
Microsoft Corporation.
Corporation. Linux is a registered trademark of Linus Torvalds. Acrobat Reader is a registered trademark of Adobe Systems, Inc. Netscape and
Navigator are registered trademarks of
States and other countries. All other
Thank you for purchasing a Motorola® SURFboard® Wireless Cable Modem Gateway SBG900 for your home,
home office, or small business/enterprise. Applications where the SURFboard Gateway (SBG) is especially useful
include:
•Households having multiple computers requiring connection to the Internet and each other
•Small businesses or home offices requiring fast, affordable, and secure Internet access
•Internet gamers desiring easier setup for:
®
— Programs such as DirectX
— Sites such as MSN Games by Zone.com or Battle.net
•Video conferencing
7 or DirectX® 8
®
The features and physical appearance of your SBG900 may differ slightly from the picture.
Home networking enables you to access and move information between two or more computers in your home or
business. Your home network connects to the cable TV system and enables you to connect to the Internet or other
networks connected to the Internet. The SBG900 acts as the
and the Internet. It directs (routes) computer data to the Internet and between your computers. A SURFboard
cable modem in the SBG passes information between your home network computers and the Internet. An
SBG900:
central connection point
between your computers
•Combines a SURFboard cable modem, IEEE 802.11g wireless access point, Ethernet 10/100Base-T
connection, and an advanced firewall into one compact product
•Eliminates the need for four or five separate products, enabling you to maximize the potential of your existing
resources
•Enables you to create a custom network sharing a single broadband connection, files, and other peripherals
like scanners, with or without wires
•Offers enhanced network security for wired and wireless users
•Provides easy setup
•Enables cable operators to add future value-added services
This product is subject to change. Not all features described in this guide are available on all SBG900 models.
For the most recent documentation, visit the Product Documentation page on the Motorola Broadband website
http://broadband.motorola.com/.
Easy Setup
It is much easier to configure a local area network (LAN) using an SBG900 than it is using typical networking
equipment:
•The Installation Assistant application on the
enables easy connection to the cable network.
Motorola SURFboard Wireless Cable Modem Gateway
CD-ROM
•For basic operation, most default settings require no modification.
•The Setup Program provides a graphical user interface (GUI) for easy configuration of necessary wireless,
Ethernet, router, DHCP, and security settings. For a list of issues, see “Basic Configuration”.
Network Connection Types
The SBG900 provides different network connection types for your computers to exchange data. The connection
between your computers and the SBG900 may be with a wireless or a wired connection or a combination of the
two. Your network can use one or any combination of all the following network connections:
•Ethernet local area network (LAN)
•Wireless LAN (IEEE 802.11g that also supports IEEE 802.11b devices)
An SBG900 combines high-speed Internet access, networking, and computer security for a home or small-office
LAN. An SBG900 provides:
•An integrated high-speed SURFboard cable modem for continuous broadband access to the Internet and
other online services, with much faster data transfer than traditional dial-up or ISDN modems
•A single broadband connection for up to 253 computers to surf the web; all computers on the LAN
communicate as if they were connected to the same physical network
•An IEEE 802.11g wireless access pointto enable laptop users to remain connected while moving around the
home or small office or to connect desktop computers without installing network wiring. Depending on
distance, wireless connection speeds can match that of Ethernet.
•A USB connection for a single PC
•A dual-purpose 10/100Base-T Ethernet uplink port supporting half- or full-duplex connections and Auto-MDIX
•Routing for a wireless LAN or a wired Ethernet LAN connected using a hub or switch
•A built-in DHCP server to easily configure a combined wired and/or wireless Class C private LAN
While any IEEE 802.11g or IEEE 802.11b compliant client product will work with the SBG900, Motorola has
wireless adapters available for use with the SBG900.
You can use the Motorola PCC11b wireless card or the USB11b wireless adapter, which comply with the
IEEE 802.11b wireless standard, to connect a PC to the wireless LAN:
USB11b Wireless
Adapter
PCC11b Wireless CardA credit-card sized adapter that connects a laptop to the wireless LAN. You can roam in, or
Connects a desktop, laptop, printer, or other peripheral device to the wireless LAN. It has a
built-in antenna and a six feet (two meter) long cable that connects to the PC USB port.
Its light indicates:
• Off — Not connected to a USB port or not receiving power from the PC
• Yellow — Not installed or initializing
• Green — Installed and operational
• Flashing Green — Receiving data from another wireless LAN device
• Flashing Yellow — Transmitting data to another wireless LAN device
around, the home or small office and remain connected. It fits in a
standard slot on the laptop supporting 3.3 Volt PC card. The PCC11b has also has a
built-in antenna.
PCMCIA Type II
Motorola USB11b Wireless Adapter (left) and PCC11b Wireless Card
For installation instructions, see the documentation provided with each product.
The rear panel provides cabling connectors, status lights, and the power receptacle:
1
2
3
4
5
KeyItemDescription
1
2Use the
3For Windows
4The
5The +12
•
If you experience a problem, you can push this recessed button to restart the SBG900 (see
“Troubleshooting”). To reset all values to their defaults, hold down the button for more than five
seconds
appropriate communications channels.
Ethernet-equipped computer, hub, bridge, or switch.
SBG900 USB port to a Macintosh or UNIX computer.
. Resetting may take 5 to 30 minutes because the SBG900 must find and lock on the
ETHERNET port to connect an Ethernet LAN cable with RJ-45 connectors to an
CABLE port provides a connection to the coaxial cable outlet.
VDCpower connector to the external power supply.
only
, use the USB port for Connecting a PC to the USB Port. You cannot connect the
To receive data service, you need to provide the MAC address marked HFC MAC ID
provider
:
HFC MAC ID
SBG900 LAN Choices
The SBG900 enables connection of up to 253 client computers on a combination of:
•Wireless LAN
•Wired Ethernet LAN
•USB Connection
to your cable service
Each computer needs appropriate network adapter hardware and driver software. The clients on the Ethernet,
wireless, or USB interfaces can share:
•Internet access with a single cable service provider account, subject to cable provider terms and conditions
•Files, printers, storage devices, multi-user software applications, games, and video conferencing
Wireless and wired network connections use Windows networking to share files and peripheral devices such as
printers, CD-ROM drives, floppy disk drives, and Iomega
Wireless communication occurs over radio waves rather than a wire. Like a cordless telephone, a wireless LAN
uses radio signals instead of wires to exchange data. A wireless network eliminates the need for expensive and
intrusive wiring to connect computers throughout the home or office. Mobile users can remain connected to the
network even when carrying their laptop to different locations in the home or office.
Each computer on a wireless LAN requires an adapter described in “Optional Accessories”:
Laptop PCsUse a Motorola PCC11b Wireless Card in the PCMCIA slot.
Desktop PCs Use a Motorola USB11b Wireless Adapter to connect the USB port.
Sample wireless network connections
To set up the SBG900, on a computer wired to the SBG900 over Ethernet or USB, perform the procedures in
“Setting Up the Wireless LAN
To set up each wireless client (station):
1Insert the
PCC11b and USB11b Wireless Adapter
”. Do not attempt to configure the SBG900 over a wireless connection.
CD-ROM in the CD-ROM drive on the client.
2Install the device software from the CD.
3Connect the Motorola PCC11b wireless card or USB11b wireless adapter following the instructions supplied
Each computer on the 10/100Base-T Ethernet LAN requires an Ethernet network interface card (NIC) and driver
software installed. Because the SBG900 Ethernet port supports auto-MDIX, you can use straight-through or
cross-over cable to connect a hub, switch, or computer. Use category 5 cabling for all Ethernet connections.
The physical wiring arrangement has no connection to the logical network allocation of IP addresses.
Sample Ethernet to computer connection
Coaxial
cable
Category 5 Ethernet cable
A wired Ethernet LAN with more than one computer requires one or more hubs or switches. You can connect a
hub or switch to the Ethernet port on the SBG900.
The following illustration is an example of an Ethernet LAN you can set up using the SBG900. Cable the LAN in an
appropriate manner for the site. A complete discussion of Ethernet cabling is beyond the scope of this document.
You can connect a single PC running Windows®98, Windows XP™, Windows Me®, or Windows®2000 to the
SBG900 USB V1.1 port. For cabling instructions, see “Connecting a PC to the USB Port”.
Caution!
Before plugging in the USB cable, be sure the Motorola SURFboard Wireless Cable Modem Gateway
CD-ROM is inserted in the PC CD-ROM drive.
•A firewall to protect the SBG900 LAN from undesired attacks over the Internet
•Security measures to prevent eavesdropping of wireless data
Network Address Translation (NAT) provides some security because the IP addresses of SBG900 LAN computers
are not visible on the Internet.
The logical network diagram does not necessarily correspond to the network cabling. A full discussion of network
security is beyond the scope of this document.
SBG900 security measures shown in a logical network diagram
Internet
SBG900
DMZ computer
Firewall
ComputerComputer
Wired Ethernet LANWireless LAN
Wireless Security:
WEP shared key encryption
MAC access control list
Disable ESSID Broadcast
LaptopComputerPDA
Firewall
The SBG900 firewall protects the SBG900 LAN from undesired attacks and other intrusions from the Internet. It
provides an advanced integrated stateful-inspection firewall supporting intrusion detection, session tracking, and
denial-of-service attack prevention. The firewall:
•Maintains state data for every TCP/IP session on the OSI network and transport layers
•Monitors all incoming and outgoing packets, applies the firewall policy to each one, and screens for improper
packets and intrusion attempts
•Provides comprehensive logging for all:
— User authentications
— Rejected internal and external connection requests
— Session creation and termination
— Outside attacks (intrusion detection)
You can configure the firewall filters to set rules for port usage. For information about choosing a predefined
firewall policy template, see “Setting the Firewall Policy”.
A de-militarized zone (DMZ) is one or more computers logically located outside the firewall between an SBG900
LAN and the Internet. A DMZ prevents direct access by outside users to private data.
For example, you can set up a web serveron a DMZ computer to enable outside users to access your website
without exposing confidential data on your network.
A DMZ can also be useful to play interactive games that may have a problem running through a firewall. You can
leave a computer used for gaming
information, see Gaming Configuration Guidelines.
only
exposed to the Internet while protecting the rest of your network. For more
Port Triggering
When you run a PC application that accesses the Internet, it typically initiates communications with a computer on
the Internet. In some applications, especially gaming, the computer on the Internet also initiates communications
with your PC. Because NAT does not normally allow these incoming connections to occur, the SBG900 supports
port triggering.
The SBG900 is preconfigured with port triggering for common applications. You can also configure additional port
triggers if needed on the Gateway > PORT TRIGGERS — custom Page.
Wireless Security
Because wireless LAN signals are transmitted using radio signals, it may be possible for your neighbor or
someone else you do not want accessing your wireless LAN. You need to limit access to only the intended
persons. To prevent unauthorized eavesdropping of data transmitted over the wireless LAN, you must enable
wireless security.
The default SBG900 settings provide no security for transmitted data.
The SBG900 enables you to use the following wireless security measures:
•Restrict access to computers having the same unique network name as the SBG900
•Encrypt data transmitted over the wireless interface by configuring a Wired Equivalency Privacy (WEP) key
on the SBG900 and wireless LAN clients (stations)
•Define a MAC access control list to restrict wireless LAN access to clients based on the MAC address.
If you disable ESSID broadcasting to enable closed network operation, the SBG900 does not transmit the network
name (ESSID). This provides additional protection because only wireless stations configured with your network
name can communicate with the SBG900. Closed network operation is an enhancement of the IEEE 802.11b
standard.
For information about configuring a wireless security, see “Setting Up the Wireless LAN”.
Port forwarding is the configuration of SBG logical data ports for applications having special network
requirements.
The SBG900 opens logical data ports when a computer on its LAN sends data, such as e-mail messages or web
data, to the Internet. A logical data port is different from a physical port, such as an Ethernet port. Data from a
protocol must go through certain data ports. Here are the data ports used by some protocols:
ProtocolPort
FTP20, 21
HTTP80
NTP123
Secure Shell22
SMTP e-mail25
Teln et23
Some applications, such as games and videoconferencing, require multiple data ports. If you enable NAT, this can
cause problems because NAT assumes that data sent through one port will return to the same port. You may need
to configure port forwarding to run applications with special requirements.
To configure port forwarding, you must specify an inbound (source) port or range of ports. The inbound port opens
only when data is sent to the inbound port and closes again after a specified time elapses with no data sent to it.
You can configure up to 32 port forwarding entries using the Gateway > PORT FORWARDING — config Page.
Virtual Private Net work s
The SBG900 allows multiple tunnel VPN pass-through operation to securely connect remote computers over the
Internet through the SBG900. The SBG900:
•Is compatible with Point to Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP)
•Is fully interoperable with any IPSec client or gateway and ANX certified IPSec stacks
Relate d Documentation
The following documents also provide information you can use with the SBG900:
The following subsections provide information about installing the SBG900 hardware:
•Before You Begin
•Precautions
•Signing Up for Service
•Computer System Requirements
•Connecting the SBG900 to the Cable System
•Cabling the LAN
•Obtaining an IP Address for Ethernet
•Connecting a PC to the USB Port
For information about wireless LAN setup, see “Setting Up the Wireless LAN”.
Before You Begin
Before you begin the installation, check that you received the following items with your SBG900:
ItemDescription
Power adapter
cord
10/100Base-T
Ethernet cable
USB cableConnects to the USB port
Motorola SURFboard
Wireless Cable Modem
Gateway
You will need 75-ohm coaxial cable with F-type connectors to connect the SBG900 to the nearest cable outlet. If a
TV is connected to the cable outlet, you may need a 5 to 900 MHz RF splitter and two additional coaxial cables to
use both the TV and the SBG900.
Determine the connection types you will make to the SBG900. Check that you have the required cables, adapters,
and adapter software. You may need:
Wireless LANW
Wired Ethernet LAN Ethernet cables and network interface cards (NICs) with accompanying installation software
CD-ROM
ireless adapter and driver software for each computer having a wireless connection (see
“Optional Accessories”)
To connect more than one computer to the SBG900, one or more Ethernet hubs or switches
Connects the SBG 900 to the external AC power supply
Connects to the Ethernet port
Contains this
User Guide
and USB drivers
USBA USB cable and the
containing the software for USB installation
Coaxial cable, RF splitters, hubs, and switches are available at consumer electronic stores.
You can connect Microsoft Windows, Macintosh, UNIX, or Linux computers equipped as follows to the
SBG900 LAN:
•
One
of the following:
Ethernet10Base-T or 10/100Base-T Ethernet adapter with proper NIC driver software installed
Wireless
Any IEEE 802.11g or IEEE 802.11b device
For information about the Motorola PCC11b Wireless Card (
USB11b Wireless Adapter, see “Optional Accessories
”.
PCMCIA type II 3.3 V slot) or
•PC with Pentium class or better processor
•Windows
or Linux operating system with operating system CD-ROM available
®
98, Windows® 98 SE, Windows Me®, Windows® 2000, Windows XPTM, Windows NT®, Macintosh,
•Minimum 16 MB RAM recommended
•10 MB available hard disk space
You can use any web browser such as Microsoft® Internet Explorer or Netscape Navigator® with the SBG900.
You can use the USB connection with any PC running Windows 98, Windows 2000, Windows Me, or Windows XP
that has a USB interface. The USB connection requires special USB driver software that is supplied on the
Motorola SURFboard Wireless Cable Modem Gateway
Downloads page http://broadband.motorola.com/noflash/usb_drivers.asp on the Motorola Broadband website.
1Be sure the computer is on and the SBG900 is unplugged.
2Connect one end of the coaxial cable to the cable outlet or splitter.
3Connect the other end of the coaxial cable to the cable connector on the SBG900.
Hand-tighten the connectors to avoid damaging them.
4Insert the
Motorola SURFboard Wireless Cable Modem Gateway
CD-ROM into the CD-ROM drive.
5Plug the power cord into the power connector on the SBG900.
6Connect the external power supply.
7Plug the power cord into the electrical outlet.
not in use. The first time you plug in the SBG900, allow 5 to 30 minutes to find and lock on the appropriate
communications channels.
Step 3
This turns the SBG900 on. You do not need to unplug it when
Step 2
Steps 5 to 7
8Check that the lights on the front panel cycle through this sequence:
POWERTurns on when AC power is connected to the SBG900. Indicates that the power supply is working
properly.
RECEIVEFlashes while scanning for the receive channel. Changes to solid green when the receive channel is
locked.
SENDFlashes while scanning for the send channel. Changes to solid green when the send channel is
locked.
ONLINEFlashes during SBG900 registration and configuration. Changes to solid green when the SBG900 is
registered.
PC/ACTIVITY Flashes when the SBG900 is transmitting or receiving data.
Cabling the LAN
After connecting to the cable system, you can connect your wired Ethernet LAN. Some samples are shown in
“Wired Ethernet LAN”. On each networked computer, you must install proper drivers for the Ethernet NIC.
Detailed information about network cabling is beyond the scope of this document.
5Click Log In to display the SBG900 user configuration and status windows:
ClickTo Perform
CableConfigure and monitor the cable system connection.
GatewayConfigure and monitor the gateway preferences (see Configuring the Gateway).
WirelessConfigure and monitor the wireless interface (see “Setting Up the Wireless LAN”).
FirewallConfigure and monitor the firewall (see “Setting the Firewall Policy”).
AdminChanging the Default Password.
InfoDisplay information about the
RebootRestart the SBG900. It is the same as pressing the reset button on the rear panel for less than five
seconds.
Log OutLog out of the SBG900.
If you have difficulty starting the SBG900 Setup Program, see “Troubleshooting” for information.
Router is a configuration option that may appear on your window but may not be supported.
For some settings, after you edit the field and click Apply, you are warned that you must reboot for your change
to take effect. Rebooting takes 10 to 15 seconds. After rebooting, you must log-in again.
Enabling remote access permits you to access the SBG900 from the Internet. You must know the userid,
password, and public IP address assigned to your SBG900 to obtain access to the configuration pages from the
Internet. Remote access is provided using a Web browser on the remote client, and connecting to the Web server
on the SBG900.
To access the SBG900 remotely:
1On the SBG900 Setup Program screen, click Admin to display the ADMIN — basic page.
2Click advanced to display the ADMIN — advanced page.
3Click the box next to Enable remote access to enable it.
To get help on any underlined item or field, click the text. For example, if you click a field or the help button on the
ADMIN — basic page, the following help is displayed:
This button also displays
help for the window.
You can scroll to browse the help or click another item to display help for that item.
The SBG900 firewall protects the SBG900 LAN from undesired attacks and other intrusions from the Internet. This
section describes using the Firewall > POLICY — basic page to
templates provided with the SBG900.
Caution!
Firewalls are not foolproof. Choose the most secure firewall policy you can. To enable easy network
setup, the default firewall policy is None, which provides no security.
To select a predefined policy for all packets processed by the SBG900 firewall:
1On the SBG900 Setup Program left panel, click Firewall.
2Click POLICY.
3Click basic to display the predefined firewall policy templates:
HighThe safest predefined firewall policy template, providing the highest security.
setting.
Medium A predefined firewall policy template providing a common configuration having modest risk.
LowA predefined firewall policy template providing minimum security, with a higher risk of intrusions.
Custom You may need to create a custom firewall policy on the Firewall > POLICY — advanced Page
create a custom policy unless you have the necessary expertise and the need to do so.
NoneDisables the firewall. To enable easy network setup, it is the default.
High, Medium, or Low to improve your security.
After you set up your network, use
Motorola recommends this
. Do not
5Click Apply to apply your changes.
After you edit some fields and click Apply, you are warned that you must reboot for your change to take effect.
Rebooting takes 10 to 15 seconds. After rebooting, you must log-in again.
If you have the need, you can:
•View the rules for the High, Medium, or Low predefined policy templates or create a custom policy on the
Firewall > POLICY — advanced Page
•Configure a firewall alert on Firewall > ALERT — basic Page and Firewall > ALERT — email Page
•View the firewall logs on the Firewall > LOGS Page
For information about how the firewall can affect gaming, see “Gaming Configuration Guidelines”.
The predefined policies provide outbound Internet access for computers on the SBG900 LAN. The SBG900
firewall uses stateful inspection to allow inbound responses when there already is an outbound session running
corresponding to the data flow. For example, if you use a web browser, outbound HTTP connections are permitted
on port 80. Inbound responses from the Internet are allowed because an outbound session is established.
When required, you can configure the SBG900 firewall to allow inbound packets without first establishing an
outbound session. You also need to configure a port forwarding entry on the
Gateway > PORT FORWARDING — config Page or a DMZ client on the Gateway > LAN — nat config Page.
Do not create a custom firewall policy unless you have the necessary expertise and the need to do so.
select one of the predefined policy templates as described in “Setting the Firewall Policy”.
To create a custom firewall policy, first select Custom and click Apply on the Firewall > POLICY — basic Page.
Then use this page to configure a custom firewall policy:
Instead,
To base the custom policy on a predefined firewall policy template, choose High, Medium, or Low in the Policy Temp la te field and click Apply Policy Template.
Session LogThe Session Log shows data sessions that have occurred and tracked by the Firewall. To
enable logging of sessions, the Enable Session Log option must be selected in the Firewall
Logs Config Page. A firewall policy must be in effect for session events to be generated. If the
firewall policy is set to None then no new session entry will be generated.
The log entries correspond to data sessions that have occurred in the device that are
authorized by the normal firewall filters. Usually, this log shows the history of normal data
traffic. Though a session may be terminated early by the firewall due to policy or session
change, or if the session is later determined by the firewall to be an intrusion attack.
Blocking LogThe Blocking Log shows firewall blocking events. To enable logging of blocking events, the
Enable Blocking Log option must be selected in the Firewall Logs Config Page. A firewall
policy must be in effect for blocking events to be generated. If the firewall policy is set to None
then no new blocking entry will be generated.
The log entries correspond to firewall blocking events that occur when unauthorized inbound
or outbound data packets are detected. Unauthorized data packets are those that use
protocols and/or ports that are not explicitly allowed by the current firewall policy. In addition,
data packets that are determined to be invalid due to session time-outs or reassembly
time-outs are also blocked.
Intrusion LogThe Intrusion Log shows the intrusions attempts that have occurred and stopped by the
firewall. To enable logging of intrusion events, the Enable Intrusion Log option must be
selected in the Firewall Logs Config Page. A firewall policy must be in effect for intrusion
events to be generated. If the firewall policy is set to None then no new intrusion entry will be
generated.
The log entries correspond to intrusion attacks that have been detected and stopped by the
firewall. The firewall is capable of detecting several well-known intrusion tactics that is used to
attack a network device. This log is a history of those intrusion events.
BlacklistThe Blacklist Log shows the IP addresses that have been determined by the firewall to have
breached the firewall policy of the SBG. A firewall policy must be in effect for blacklist entries
to be generated. If the firewall policy is set to None then no new blacklist entry will be
generated.
Once an IP address has been blacklisted, the firewall will block all traffic to and from that IP
address for 24 hours or when the SBG is rebooted. The user can manually clear the blacklist
by pressing the Clear button on the Blacklist Page. Clearing the blacklist table also allows
normal traffic to flow between the SBG and the formerly blacklisted entries
The following subsections provide information about configuring the SBG900 firewall and DMZ for gaming.
Configuring the Firewall for Gaming
By default, the SBG900 firewall is disabled. If, as recommended, you enable the firewall, refer to the game’s
documentation to ensure that the necessary ports are open for use by that game.
The pre-defined SBG firewall policies affect X-Box Live
Low XBox Live data can pass through the firewall. No user action is required.
Medium or high To enable X-Box Live traffic to pass, you must configure:
• Choose Custom on the Firewall > POLICY — basic Page
• UDP 88:88 and UDP/TCP 3074:3074 on the Firewall > POLICY — advanced Page
Configuring Port Triggers
Because the SBG has pre-defined port triggers for games using any of the following applications, no user action is
required to enable them:
•DirectX 7 and DirectX 8
TM
as follows:
•MSN Games by Zone.com
•Battle.net
For a list of games supported by Battle.net, visit http://www.battle.net.
You may need to create custom port triggers to enable other games to operate properly. If you set custom port
triggers and enable the firewall, you must customize the firewall to allow traffic through those ports. To create
custom port triggers, use the Gateway > PORT TRIGGERS — custom Page.
The gaming DMZ host is not protected by the firewall. It is open to communication or hacking from any
computer on the Internet.
Configuration: Basic Gateway TCP/IP Wireless USB
Consider carefully before configuring a device to be in the DMZ.
Some games and game devices require
one
of:
•The use of random ports
•The forwarding of unsolicited traffic
For example, to connect a PlayStation
the ports required vary from game to game. For these games, we recommend configuring the gaming computer or
device as a gaming DMZ device.
To configure a gaming DMZ device, on the Gateway > LAN — dhcp leases Page:
1Reserve a private IP address for the computer or game device MAC address.
2Designate the device as a DMZ device.
You can reserve IP addresses for multiple devices, but only one can be designated as the gaming DMZ at once.
®
2 for PS2® on-line gaming, designate it as the gaming DMZ host because
This section describes the Gateway configuration pages in the SBG900 Setup Program:
•Gateway > STATUS Page
•Gateway > WAN Page
•Gateway > LAN — nat config Page
•Gateway > LAN — dhcp server config Page
•Gateway > LAN — dhcp leases Page
•Gateway > PORT FORWARDING — status Page
•Gateway > PORT FORWARDING — config Page
•Gateway > PORT TRIGGERS — predefined Page
•Gateway > PORT TRIGGERS — custom Page
•Gateway > LOG Page
After you edit some fields and click Apply, you are warned that you must reboot for your change to take effect.
Rebooting takes 10 to 15 seconds. After rebooting, you must log-in again.
This page displays the gateway status information:
These fields display settings that are set on the other Gateway pages. For field descriptions, see the following
subsections that describe the fields on each tab.
Use this page to configure the external (public) wide area network (WAN) interface:
Gateway > WAN page fields
FieldDescription
Host NameIf the cable service provider requires a hostname to access to their network, type the
they provided in this field. The default is None.
Enable DHCP ClientEnabling the DHCP client causes the wireless gateway to automatically obtain the public IP
address, subnet mask, domain name, and DNS server(s). Most commonly, the DHCP client is
enabled if the cable service provider automatically assigns a public IP address from their
DHCP server. Enable DHCP Client is on by default.
Disable DHCP ClientIf the cable service provider does not automatically assign a public IP address using DHCP,
they must provide a static IP address. Select Disable DHCP Client. When you disable the
DHCP client, you must type the static IP address, subnet mask, DNS server(s), and domain
name (if necessary) in the fields provided. Disable DHCP Client is off by default.
Static IP AddressIf Disable DHCP Client is on, type the static IP address provided by the cable service provider
in dotted-decimal format. The default is None.
Static IP Subnet MaskIf Disable DHCP Client is on, type the subnet mask associated with the static IP address in
dotted-decimal format. The default is None.
WAN Default GatewayWhen using a statically assigned IP address from your ISP, enter the default gateway the SBG
DNS IP Address 1
DNS IP Address 2
DNS IP Address 3
TCP Session Wait
Timeout
UDP Session Wait
Timeout
ICMP Session Wait
Timeout
ApplyClick to apply your changes.
The cable service provider DNS server provides name-to-IP address resolution. If the cable
service provider does not automatically assign DNS addresses from their DHCP server, they
must provide at least one DNS server IP address to enter in these fields in dotted-decimal
format. The default is None.
Sets the maximum time in seconds to wait before assuming a TCP session has timed out. The
default is 24 hours.
Sets the maximum time in seconds to wait before assuming a UDP session has timed out. The
default is 300 seconds (5 minutes).
Sets the maximum time in seconds to wait before assuming an ICMP session has timed out.
The default is 300 seconds (5 minutes).
Enable Gaming DMZCheck this box to designate the selected computer or gaming device as the gaming DMZ
host. For more information, see “Configuring a Gaming DMZ Host”. This can be useful if you
have difficulties running certain applications; typically gaming applications.
(Gaming) DMZ HostThe gaming DMZ host is a computer with a reserved IP address designated as the default
DMZ host. Only one gaming DMZ host can be active at once.
The gaming DMZ host is not protected by the firewall. It is open to communication or hacking
Home
from any computer on the Internet.
the DMZ.
The benefit of using a gaming DMZ host instead of a NAT passthrough host is that a gaming
DMZ host does not require a public IP address as does a NAT passthrough host. If the
application requires a public IP address, configure the computer for NAT passthrough on the
Gateway > LAN — nat config Page.
X
ExitPrint
43
Consider carefully before configuring a computer to be in
Gateway > LAN — dhcp leases page fields (continued)
FieldDescription
RESERVE NEW IP
ADDRESS
MAC AddressType the MAC address of the DHCP client for which a reserved IP address is required. The
IP AddressSets the host portion of the reserved IP address for the LAN client having the specified MAC
Host NameIf your ISP requires a hostname to access their network, enter the hostname provided to you
AddClick Add to reserve a new IP address.
CURRENTLY RESERVED
IP ADDRESSES
MAC AddressDisplays the client MAC address.
IP AddressDisplays its reserved IP address
Host NameDisplays its host name.
MethodDisplays dynamic and static lease status. Add or delete dynamic or static lease status in this
DeleteClick this box to remove the reserved IP address for the client.
DeleteClick this button to remove the reserved IP addresses for clients designated by the Delete
You can reserve up to 32 IP addresses assigned by the SBG900 DHCP server for specific
LAN clients. For example, to ensure that they always receive the same private IP address,
you can reserve IP addresses for a private FTP server or gaming DMZ device.
format is 16 hexadecimal numerals.
address. When the LAN client requests an IP address, the SBG900 DHCP server assigns the
client this IP address.
in the Host Name field.
Displays all DHCP clients having reserved IP addresses.
field.
box.
Gatewa y > PORT FORWARDING — sta tus Page
Use this page to display the configured port forwarding entries on the SBG900 LAN. The fields are the same as on
the Gateway > PORT FORWARDING — config Page:
Use this page to configure up to 32 virtual servers:
Gateway > PORT FORWARDING — config page fields
FieldDescription
ADD NEW PORT
FORWARDING ENTRY
Tem pla teIf you select Custom, you must set the Name, Port Start, Port End, and LAN IP Address.
NameType a unique identifier for the custom virtual server. The typical practice is to use the
Port StartSets the LAN internal interface port or the start of a port range. Inbound Internet connection
Port EndIf a range of ports is required, sets the end of the port range.
LAN IP AddressSets the private LAN IP address for the port forwarding page. An Internet user must know the
EnableCheck this box to enable the port forwarding entries to be accessed through NAT.
AddClick to add the virtual server to the PORT FORWARDING list.
PORT FORWARDINGDisplays the configured custom virtual servers.
You can configure up to 32 virtual servers.
If you select a predefined template such as HTTP or FTP, the Name, Port Start, Port End
values are provided. You only need to enter LAN IP Address and change default values only
if necessary.
protocol as a unique identifier (for example “ftp”).
requests are statically mapped to this port.
public IP address to access any port forwarding entry you define on the private LAN.
When you run a PC application that accesses the Internet, it communicates with a computer on the Internet. In
some applications, especially gaming, the computer on the Internet also communicates with your PC. Because
NAT does not normally allow these incoming connections, the SBG900 supports port triggering.
The SBG900 is preconfigured with port triggering for common applications. You can also configure additional port
triggers if needed. Configuring port triggers for an application requires:
•The application transport protocol — TCP or UDP
•The application port number
You can use the default values for the remaining parameters.
Only one PC at a time connected to the SBG900 can use an application requiring port triggering. Use this page to
view predefined port triggers:
Verifying the IP Address in Windows 2 000 or Windows XP
To check the IP address:
1On the Windows Desktop, click Start.
2Select Run. The Run window is displayed.
3Type cmd and click OK to display a command prompt window.
4Type ipconfig and press ENTER to display the IP configuration. A display similar to the following indicates a
normal configuration:
If an Autoconfiguration IP Address is displayed as in the following window, there is an incorrect connection
between the PC and the SBG900 or there are cable network problems. Check the cable connections and
determine if you can view cable-TV channels on your television:
After verifying the cable connections and proper cable-TV operation, renew the IP address.
You can use the SBG900 as an access point for a wireless LAN without changing its default settings.
Caution!
The default SBG900 settings provide no wireless security. After your wireless LAN is operational,
be sure to enable security as described in “Setting Up the Wireless LAN” in the SBG900 User
Guide.
To enable security for your SBG900 wireless LAN, you can do the following on the SBG900:
To
Configure an Extended
Service Set Identifier (ESSID)
and enable closed network
operation
Enable Wired Equivalent
Privacy (WEP) encryption and
configure a WEP key
Restrict access to computers
with known MAC addresses
Perform on the
SBG900
Configuring the Wireless
Network Name on the
SBG900
Configuring WEP on the
SBG900
Configuring a MAC
Access Control List on
the SBG900
AdvantagesDisadvantages
Provides a unique name to
distinguish from other
nearby wireless LANs.
Encrypts wireless dataYou must configure the
No configuration on client
required
No code that can be
broken.
You must configure the
ESSID on each client
computer.
Does not encrypt wireless
data
WEP key on each client
computer.
You must input each client
MAC address on the
SBG900
Does not encrypt wireless
data
Connect at least one computer to the SBG900 Ethernet or USB port to use for performing configuration. Do not
attempt to configure the SBG900 over a wireless connection.
You need to configure each wireless client station to access the SBG900 LAN as described in “Configuring the
Wireless Clients
”
.
Caution!
Never provide the ESSID or WEP key to anyone who is not authorized to use your wireless LAN.
For descriptions of all wireless configuration fields, see “Wireless Pages in the SBG900 Setup Program”.
Another common-sense step to improve wireless security is to place wireless components away from windows.
This decreases the signal strength outside the intended area.
Configuring the Wireless Network Name on the SBG900
If you check Disable ESSID Broadcast on the SBG900 Wireless > SECURITY — advanced Page, you must
configure the same network name (ESSID) on all wireless LAN clients (stations). Never provide the ESSID to
anyone who is not authorized to use your wireless LAN.
To configure the ESSID:
1Start the SBG900 Setup Program as described in “Starting the SBG900 Setup Program”.
2On the left frame, click Wireless.
3Click the NETWORK tab to display:
4In the ESSID field, type a unique
32 characters. The default is “Motorola.”
name
. It can be any alphanumeric, case-sensitive string up to
Do not use the default ESSID.
5Click Save Changes to save your changes.
6To restrict wireless LAN access to clients configured with the same Network Name (ESSID) as the SBG900,
The default settings provide no security for wireless data.
sure to enable Shared Key Authentication and Wired Equivalent Privacy (WEP) encryption. You must
configure the same WEP key on the SBG900 access point and all wireless clients (stations).
After the wireless LAN is operational, be
provide the WEP key to anyone who is not authorized to use the wireless LAN.
To enable WEP and set the key on the SBG900:
1On the SBG900 Setup Program left frame, click Wireless.
2Click the SECURITY tab to display the Wireless > SECURITY — basic page:
Never
3Set the following:
AuthenticationSets whether shared key authentication is enabled to provide data privacy on the wireless LAN:
• Open System — Any wireless LAN client can transmit data to any other client without
authentication.
• Shared Key — All data transmitted over the wireless LAN is encrypted. The SBG900
and transfers data to and from all clients having shared key authentication enabled and an identical
WEP key.
EncryptionUse a WEP key length that is compatible with your wireless client adapters. Choose
• Enable 64-Bit — Use only if you have wireless clients that do not support 128-bit encryption
• Enable 128-Bit — The recommended setting for stronger encryption; supported by the Motorola
PCC11b wireless card, USB11b wireless adapter, and most current wireless adapters
• Disable WEP — Recommended during network setup
Key 1 to Key 4Sets the active WEP key. You can enter up to four 64-bit or 128-bit WEP
non-case-sensitive hexadecimal characters 0 to 9 and A to F. Only
• For 64-bit encryption, set the 10-character long key under Enable 64-Bit.
• For 128-bit encryption, set the 26-character long key under Enable 128-Bit.
For optimal security, we recommend changing the WEP keys frequently. Never provide the WEP key
to anyone who is not authorized to use your wireless LAN.
Open authentication provides no security for transmitted data.
only
keys
containing the
one
key can be active:
It is the default.
4If necessary, click Reset Wireless Defaults to reset the wireless defaults.
For each wireless client computer (station), install the wireless adapter — such as a Motorola PCC11b wireless
card or Motorola USB11b wireless adapter — following the instructions supplied with the adapter.
Configure the card or adapter to obtain an IP address automatically. The Motorola PCC11b wireless card and
Motorola USB11b wireless adapter are supplied with a client configuration program called Wireless Client
Manager, which is installed in the Windows Startup group.
If Wireless Client Manager is running, the icon is displayed on the Windows task bar. Double-click the icon to
launch the utility.
After you correctly set the network name and WEP key on the client computer to match the SBG900, you should
be able to use the computer to surf the Internet.
Configuring a Wireless Client with a Network Name (ESSID)
To distinguish it from other nearby wireless LANs, you can identify your wireless LAN with a unique network name
(also known as a network identifier or ESSID). When prompted for the network identifier, network name, or ESSID,
name
type the
information, see “Configuring the Wireless Network Name on the SBG900”.
After you specify the network name, many wireless cards or adapters automatically scan for anaccess point
as the SBG900 and the proper channel and data rate. If your card requires you to manually start scanning for an
access point, do so following the instructions in the documentation supplied with the card.
set in the ESSID field on the Wireless > NETWORK Page in the SBG900 Setup Program. For more
such
Never provide the ESSID to anyone who is not authorized to use your wireless LAN.
Configuring a Wireless Client for WEP
If shared key Authentication is enabled and a WEP key is set on the SBG900 as described in “Configuring WEP
on the SBG900”, you must enter the same WEP key on the wireless client. The SBG900 cannot authenticate a
client if:
•Shared key Authentication is enabled on the SBG900 but not on the client
•The client WEP key does not match the SBG900 WEP key
Caution!
If shared key authentication is not enabled and no WEP key is set, there is no encryption for wireless
You must configure the same WEP key on the SBG900 and all wireless clients.
data.
the WEP key to anyone who is not authorized to use your wireless LAN.
Use the Wireless pages to control and monitor the wireless interface:
•Wireless > STATUS Page
•Wireless > NETWORK Page
•Wireless > SECURITY — basic Page
•Wireless > SECURITY — advanced Page
•Wireless > STATISTICS page
After you edit some fields and click Apply, you are warned that you must reboot for your change to take effect.
Rebooting takes 10 to 15 seconds. After rebooting, you must log-in again.
Operating ModeSets how the SBG900 communicates with wireless clients (stations):
• 11b/11g Standard — Enables all IEEE 802.11b and IEEE 802.11g clients to work with the
SBG900.
• 11g Enhanced — Choose this option only if all IEEE 802.11g clients on the network support
the performance-enhancing features of the IEEE 11g Enhanced mode. It is not supported by
all IEEE 802.11g stations.
ADVANCED SETUP
We recommend using this default setting in most cases because it is more flexible.
Transmit PowerSets the transmit power on the
mW. The default is 32 mW. Transmit power control is an optional IEEE 802.11b feature.
RTS ThresholdThe Request To Send Threshold sets the packet size at which the access point issues an RTS
before sending the packet. A low RTS can help when many clients are associated with the
SBG900 wireless access point — 1, 2, 5, 10, 25, 50, or 100
SBG900 or when the clients are far apart and can detect the SBG900 but not each other. It
can be 0 to 2347 bytes. The default is 2347.
Fragmentation
Threshold
Beacon PeriodSets the time between beacon frames sent by the SBG900 for wireless network
DTIM PeriodThe delivery traffic indication message (DTIM) period is the number of Beacon Periods that
Sets the size at which packets are fragmented (sent as several packets instead of as one
packet). A low Fragmentation Threshold can help when communication is poor or when there
is a significant interference. It can be 256 to 2346 bytes. The default is 2346.
synchronization. It can be from 1 to 999 ms. The default is 100 ms.
elapse before a wireless client operating in power save mode “listens” for buffered broadcast
or multicast messages from the SBG900. It can be from 1 to 99999. The default is 3.
New StationType the MAC address of the wireless client to add to the MAC access control list. Use
the format
Add StationClick to add the New Station to the MAC access control list.
xx:xx:xx:xx:xx:xx
. The MAC access control list can contain one to 32 clients.
Wireless > STATISTICS page
Use this page to display wireless statistics.
Wireless > STATISTICS page fields
Field or ButtonDescription
Transmitted
Fragment Count
Multicast
Transmitted
Fragment Count
Failed CountThe number of MSDUs not transmitted successfully because the number of transmit attempts
Retry CountThe number of successfully transmitted MSDUs after one or more retransmissions.
Home
The number of acknowledged MAC protocol data units (MPDUs) with an address in the
address 1 field or an MPDU with a multicast address in the address 1 field of type data or
management.
The number of transmitted fragments when the multicast bit is set in the destination MAC
address of a successfully transmitted MAC service data unit (MSDU). When operating as a
STA in an ESS, where these frames are directed to the AP, this implies having received an
acknowledgment to all associated MPDUs.
exceeded the IEEE 802.11b short or long retry limit.
Multiple Retry Count The number of successfully transmitted MSDUs after more than one retransmission.
Frame Duplicate
Count
Request To Send
Success Count
Request To Send
Failure Count
Acknowledge Failed
Count
Received Fragment
Count
Multicast Received
Fragment Count
Frame Check
Sequence Error
Count
Transmitted Frame
Count
WEP Undecryptable
Count
RefreshClick to collect new data.
The number of frames received where the Sequence Control field indicated the frame was a
duplicate.
The number of CTS messages received in response to RTS messages.
The number of CTS messages not received in response to RTS messages.
The number of acknowledgment messages not received when expected from a data
message transmission.
The number of successfully received MPDUs of type Data or Management.
The number of MSDUs received when the multicast bit was set in the destination MAC
address.
The number of FCS errors detected in a received MPDU.
The number of successfully transmitted MSDUs.
This number of frames received with the WEP subfield of the Frame Control field set to one
and the WEP On key value mapped to the client MAC address. This indicates that the frame
should not have been encrypted or was discarded due to the receiving client not having WEP
enabled.
The following subsections describe setting up a USB driver if you connect a PC to the USB port on the SBG900.
Perform one of the following procedures based on your Windows version:
•Setting Up a USB Driver in Windows 98
•Setting Up a USB Driver in Windows 2000
•Setting Up a USB Driver in Windows Me
•Setting Up a USB Driver in Windows XP
The SBG900 USB driver does not support Macintosh or UNIX computers. For those systems, you can connect
only
through Ethernet
Caution!
Be sure the Motorola SURFboard Wireless Cable Modem Gateway CD-ROM is inserted in the
CD-ROM drive before you plug in the USB cable.
If you have a problem setting up the USB driver, remove it by performing
.
one
of the following procedures:
•Removing the USB Driver from Windows 98 or Windows Me
9Select The updated driver... and click Next. If the following window is not displayed, verify that the
SURFboard Wireless Cable Modem Gateway
cannot find the correct driver file, click Cancel to cancel the installation and perform the procedure for
“Removing the USB Driver from Windows 98 or Windows Me”. Then repeat this procedure.
Although your SBG model number may be different than in the images in this guide,
the procedure is the same.
CD-ROM is properly inserted in the CD-ROM drive. If you still
10 After the window shown under step 9 is displayed, click Next.
If a window with the message
drive
letter
(for example, “D:”) and click OK.
Copying Files...
displays and asks for the CD-ROM drive, type the CD-ROM
Motorola
If an Insert Disk window similar to the one below is displayed, Windows 98 system files are needed to
complete the installation. To install the files, insert your Windows 98 CD-ROM in the CD-ROM drive and
click OK.
16 On the Run window, type explorer and click OK to display Windows Explorer:
Windows Explorer may appear different than in the image. There are variations between Windows versions
and you can configure Windows Explorer as you like.
17 Double-click My Computer.
18 Double-click the Motorola SBG900 CD icon (D: in the image).
19 Double-click remove or remove.exe to run the Remove utility from the
Modem Gateway
20
Be sure the USB cable is disconnected.
CD-ROM. The SURFboard Cable Modem USB Driver Removal window is displayed:
Motorola SURFboard Wireless Cable
21 Click Remove Driver.
Informational messages similar to the ones shown are displayed on the SURFboard Cable Modem USB
Driver Removal window.
After you remove the USB driver, re-install it following “Setting Up a USB Driver in Windows 2000”. If you continue
to have problems, contact your cable service provider.