ZyXEL Prestige 964 User Manual

Page 1
Prestige 964
Cable Router
User's Guide
Ver 3.60.08
December, 2003
Page 2
Page 3
Copyright iii
Copyright
Prestige 964 Cable Router
Copyright © 2003 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system,
translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice.
Trademarks
Trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners.
Page 4
iv FCC Statement
Federal Communications Commission (FCC)
Interference Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: This device may not cause harmful interference. This device must accept any interference received, including interference that may cause undesired operations. This equipment has been tested and found to comply with the limits for a CLASS B digital device pursuant to
Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
If this equipment does cause harmful interference to radio/television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment and the receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help.
Notice 1
Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.
Notice 2
Shielded RS-232 cables are required to be used to ensure compliance with FCC Part 15, and it is the responsibility of the user to provide and use shielded RS-232 cables.
Page 5
Canadian Users v
Information for Canadian Users
The Industry Canada label identifies certified equipment. This certification means that the equipment meets certain telecommunications network protective, operation, and safety requirements. The Industry Canada does not guarantee that the equipment will operate to a user's satisfaction.
Before installing this equipment, users should ensure that it is permissible to be connected to the facilities of the local telecommunications company. The equipment must also be installed using an acceptable method of connection. In some cases, the company's inside wiring associated with a single line individual service may be extended by means of a certified connector assembly. The customer should be aware that the compliance with the above conditions may not prevent degradation of service in some situations.
Repairs to certified equipment should be made by an authorized Canadian maintenance facility designated by the supplier. Any repairs or alterations made by the user to this equipment, or equipment malfunctions, may give the telecommunications company cause to request the user to disconnect the equipment.
For their own protection, users should ensure that the electrical ground connections of the power utility, telephone lines, and internal metallic water pipe system, if present, are connected together. This precaution may be particularly important in rural areas.
Caution
Users should not attempt to make such connections themselves, but should contact the appropriate electrical inspection authority, or electrician, as appropriate.
Note
This digital apparatus does not exceed the class A limits for radio noise emissions from digital apparatus set out in the radio interference regulations of Industry Canada.
Page 6
vi Warranty
ZyXEL Limited Warranty
ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product is modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind of character to the purchaser.
To obtain the services of this warranty, contact ZyXEL's Service Center; refer to the separate Warranty Card for your Return Material Authorization number (RMA). Products must be returned Postage Prepaid. It is recommended that the unit be insured when shipped. Any returned products without proof of purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products will be shipped by ZyXEL to the corresponding return address, Postage Paid (USA and territories only). If the customer desires some other return destination beyond the U.S. borders, the customer shall bear the cost of the return shipment. This warranty gives you specific legal rights, and you may also have other rights that vary from state to state.
Page 7
Customer Support vii
Customer Support
When you contact your customer support representative please have the following information ready:
n Prestige Model and serial number. n Warranty Information. n Date you received your Prestige. n Brief description of the problem and the steps you took to solve it.
Method
LOCATION
Worldwide
North America
Denmark
Norway support@zyxel.no
Sweden support@zyxel.se
Shanghai support@zyxel.cn
Germany
e-mail – Support/Sales Telephone/Fax Web Site/FTP Site Regular Mail
support@zyxel.com.tw support@europe.zyxel. com
sales@zyxel.com.tw +886-3-578-2439 ftp.europe.zyxel.com webmaster@zygate.co
m.tw
support@zyxel.com +1-714-632-0882
sales@zyxel.com +1-714-632-0858 ftp.zyxel.com support@zyxel.dk +45-3955-0700 www.zyxel.dk
sales@zyxel.dk +45-3955-0707 ftp.zyxel.dk support@zyxel.com.by +603-795-44-688 www.zyxel.com.my Malaysia
sales@zyxel.com.my +603-795-35-407
sales@zyxel.no
sales@zyxel.se
sales@zyxel.cm
support@zyxel.de +49-2405-6909-0
sales@zyxel.de +49-2405-6909-99 ftp.europe.zyxel.com
+886-3-578-3942 www.zyxel.com
+886-3-480-8163 +886-3-499-3173
800-255-4101
+47-22-80-6180
+47-22-80-6181 +46(0)-31-744-3810 +46(0)-31-744-3811
+86-21-58873264 +86-21-58873316
0180-5213247 Tech Support hotline 0180-5099935 RMA/Repair hotline
www.europe.zyxel.co m
www.zygate.com.tw
ftp.zygate.com.tw
www.zyxel.com
www.zyxel.no ZyXEL Communications A/S
www.zyxel.se ZyXEL Communications A/S
ZyXEL(Shanghai)office
www.zyxel.de
ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, HsinChu, Taiwan.
ZyGATE Communications, Inc., 2F, No.48, Lung-Chin Road, Lung-Tan, Taoyuan, Taiwan. ZyXEL Communications, Inc., 1650 Miraloma Avenue, Placentia, CA 92870, U.S.A.
ZyXEL Communications A/S, Columbusvej 5, 2860 Soeborg, Denmark.
Lot B2-06, PJ Industrial Park, Section 13, Jalan Kemajuan, 46200 Petaling Jaya Selangor Darul Ehasn, Malaysia
Nils Hansens vei 13. N-0667 Oslo, Norway
Anders Carlssons Gata 7417 55 Goteborg Sweden
23/F,B Majesty Building No.138 Pudong Avenue Pudong Area, Shanghai, China ZyXEL Deutschland GmbH., Adenauerstr. 20/A4 D-52146 Wuerselen, Germany.
Page 8
viii Table of Contents
Table of Contents
Copyright.......................................................................................................................................iii
Federal Communications Commission (FCC) Interference Statement......................................iv
Information for Canadian Users...................................................................................................v
ZyXEL Limited Warranty.............................................................................................................. vi
Customer Support......................................................................................................................vii
Table of Contents........................................................................................................................viii
List of Figures............................................................................................................................... x
List of Tables................................................................................................................................ xi
Preface .........................................................................................................................................xii
Chapter 1 Getting to Know Your Prestige.................................................................................1-1
1.1 Overview of the Prestige ..................................................................1-1
1.2 5-Port Switch & USB interface .........................................................1-1
1.3 Operation Mode ...............................................................................1-1
1.3.1 Bridge Mode..............................................................................1-2
1.3.2 IP Sharing Mode .......................................................................1-2
1.3.3 Static IP Mode...........................................................................1-2
1.4 Key Features of the Prestige 964.....................................................1-3
1.5 Product Specifications......................................................................1-4
Chapter 2 Hardware Installation and Initial Setup....................................................................2-1
2.1 Front Panel LEDs and Back Panel Ports .........................................2-1
2.2 Additional Installation Requirements................................................2-3
2.2.1 Setting up Your Windows 95/98/Me Computer..........................2-3
2.2.2 Setting up Your Windows NT/2000/XP Computer.....................2-4
2.2.3 Setting up Your Macintosh Computer........................................2-4
2.3 Factory Default Settings...................................................................2-5
2.4 Initializing the Cable Sharing Gateway.............................................2-5
2.5 Network Configuration of Your Computer.........................................2-6
2.6 Router Configuration........................................................................2-6
2.7 Power On Your Prestige...................................................................2-6
Chapter 3 Web Based Management..........................................................................................3-1
3.1 Introduction ......................................................................................3-1
3.2 Basic Page.......................................................................................3-3
Page 9
Table of Contents ix
3.3 Advanced Page................................................................................3-4
3.3.1 Web Management – Advanced: Options...................................3-5
3.3.2 Web Management – Advanced: IP Filtering..............................3-5
3.3.3 Web Management – Advanced: MAC Filtering .........................3-7
3.3.4 Web Management – Advanced: Port Filtering...........................3-8
3.3.5 Web Management – Advanced: Forwarding.............................3-9
3.3.6 Web Management – Advanced: Port Triggers.........................3-10
Chapter 4 Troubleshooting........................................................................................................4-1
4.1 Problems with Cable Connection .....................................................4-1
4.2 Problems with Internet Access.........................................................4-1
Appendix A Hardware Specifications..........................................................................................A
Appendix B Important Safety Instructions..................................................................................C
Glossary of Terms.........................................................................................................................E
Index..............................................................................................................................................O
Page 10
x List of Figures/Tables
List of Figures
Figure 1-1 Prestige 964 Operation Mode..................................................................................1-2
Figure 2-1 Prestige 964 front panel........................................................................................... 2-1
Figure 2-2 Prestige Rear Panel and Connections.....................................................................2-2
Figure 3-1 Web Management - User Login Page ...................................................................... 3-1
Figure 3-2 Web Management - Status....................................................................................... 3-2
Figure 3-3 Web Management - Basic ........................................................................................3-3
Figure 3-4 Web Management – Advanced: Options................................................................. 3-4
Figure 3-5 Web Management – Advanced: IP Filtering ............................................................ 3-6
Figure 3-6 Web Management – Advanced: MAC Filtering........................................................3-7
Figure 3-7 Web Management – Advanced: Port Filtering.........................................................3-8
Figure 3-8 Web Management – Advanced: Forwarding ........................................................... 3-9
Figure 3-9 Web Management – Advanced: Port Triggers ......................................................3-10
Page 11
List of Figures/Tables xi
List of Tables
Table 1-1 DOCSIS Specifications.............................................................................................. 1-4
Table 1-2 EuroDOCSIS Specifications......................................................................................1-4
Table 1-3 General Specifications..............................................................................................1-5
Table 2-1 Prestige 964 LED Functions......................................................................................2-1
Table 2-2 Prestige factory default.............................................................................................2-5
Table 3-1 Web Management – Advanced: Options...................................................................3-5
Table 4-1 Troubleshooting Cable Connection.......................................................................... 4-1
Table 4-2 Troubleshooting Internet Access..............................................................................4-1
Page 12
xii Preface
Preface
About Your Cable Router
Congratulations on your purchase of the Prestige 964 Cable Router. The Prestige is a broadband cable access modem integrated with IP routing functionality, USB interface,
5-port auto crossover 10/100M auto-negotiating switch and network management features. It is designed for:
n Home offices and small businesses with cable access service via Ethernet port as Internet access media. n Multiple office/department connections. n E-commerce/EDI applications. n Your Prestige is easy to install and to configure.
The feature rich command sets allow you to access and configure your Prestige over a telnet connection.
About This User's Guide
This manual is designed to guide you through the telnet configuration of your Prestige for its various applications.
Regardless of your particular application, it is important that you follow the steps outlined in Chapter 2 to connect your Prestige to your LAN. You can then refer to the appropriate chapters of the manual, depending on your applications.
Related Documentation
Ø Support Disk
More detailed information about the Prestige and examples of its use can be found in our included disk (as well as on the www.zygate.com.tw web site). This disk contains information on configuring your Prestige for Internet Access, a General FAQ, an Advanced FAQ, Applications Notes, Troubleshooting, Commands Sets Reference as well as bundled software.
Ø Read Me First
Our Read Me First is designed to help you get your Prestige up and running right away. It contains a detailed easy to follow connection diagram, Prestige default settings, handy checklists, information on setting up your PC, and information on configuring your Prestige for Internet access.
Ø Packing List Card
Finally, you should have a Packing List Card, which lists all items that should have come with your Prestige.
Ø ZyGATE Web and FTP Server Sites
You can access release notes for firmware upgrades and other information at ZyGATE web and FTP server sites. Refer to the Customer Support page in this User’s Guide for more information.
Page 13
Preface xiii
Syntax Conventions
n For brevity’s sake, we will use “e.g.” as a shorthand for “for instance” and “i.e.” for “that is” or “in other
words” throughout this manual.
n The Prestige 964 may be referred to as the Prestige or the P964 in this user’s guide.
Page 14
Page 15
Prestige 964 Cable Router
Getting to Know Your Prestige 1-1
Chapter 1
Getting to Know Your Prestige
This chapter provides functional overviews, key features, applications and product specifications of
your Prestige
1.1 Overview of the Prestige
The Prestige is a high bandwidth Internet access Cable Modem with integrated router device that connects your home/office LAN to the Internet using the hybrid fiber coaxial (HFC) cable; the same cable that brings television into a cable television (CATV) subscriber’s home. Through 5 Ethernet and 1 USB ports of the Prestige, up to 6 computers can be directly connected to the HFC cable network for high-speed access to the Internet without an external Ethernet hub. It is ideal for cable users with more than one computer and is an excellent alternative to the more expensive leased lines.
Prestige 964 provide 2 models for supporting both the Multimedia Cable Network System (MCNS) Data Over Cable Service Interface Specification (DOCSIS) and EuroDOCSIS specifications in 1.0/1.1/2.0 version. MCNS is a consortium of cable television companies whose goal is to create standards for interoperable data-over-cable systems.
The Prestige operates with one external 9V DC-input power supply.
1.2 5-Port Switch & USB interface
Prestige 964 has integrated 5-port Ethernet switch and one USB 1.1 interfaces concurrently. The 5-port switch provides auto crossover MDI/MDI-x function and is 10/100M bps Ethernet auto-negotiating. The physical user interfaces of P964 provides you with the capability of connecting up to 6 stations without the need of external Ethernet hub/switch. If you have more than 6 computers, to choose a hub/switch can easily expand the number of LAN users.
1.3 Operation Mode
According to DOCSIS/EuroDOCSIS specification, a cable modem is basically a bridge device. It can be configured to serve specific CPEs by provisioning their MAC addresses. Only traffic to/from these CPEs will be forwarded. The others will be filtered. It can also be configured to serve specific numbers of CPEs. However, these services are provided by your cable operator. They have to setup one account for each CPE.
For most Internet users, they have only one access account. If they have two computers' at home and want to share this account for two or more users, they have to add another Internet sharing device, like a router. The Prestige 964 is equivalent to a cable modem plus a router. This is very suitable for SOHO and SME for Internet sharing.
P964 Cable Router has three major operation modes as shown in Figure 1-1.
Page 16
Prestige 964 Cable Router
1-2 Getting to Know Your Prestige
Bridge
IP Sharing
Static IP Dynamic WAN
Static IP with
Static IP with
Static IP w/ NAT
Mode
Mode
Mode
Basic Static IP
Public DHCP
IP
NAT Only
and Private
Figure 1-1 Prestige 964 Operation Mode
1.3.1 Bridge Mode
In Bridge mode, P964 operates just like a normal cable modem. All operation is compliant to DOCSIS/EuroDOCSIS specifications.
1.3.2 IP Sharing Mode
In IP Sharing mode, the P964 operates as a NAT router. It requires one public IP address from MSO’s DHCP pool and provides private IP address space for LAN users. The public IP can be static assigned or dynamically assigned through DHCP.
1.3.3 Static IP Mode
In Static IP mode, P964 provide a routed subnet on its Ethernet interface. A public IP subnet can be assigned at the Ethernet interface such that the end user can have a static assigned subnet. At the same time, the LAN users can also use private IP addresses to get on Internet.
Page 17
Prestige 964 Cable Router
Getting to Know Your Prestige 1-3
1.4 Key Features of the Prestige 964
The following are the key features of the Prestige 964:
DOCSIS/EuroDOCSIS compliant cable modem
Provides interoperability with other DOCSIS compliant cable modems and cable headend equipment.
Peak downstream signaling rates of 43 Mbps and upstream signaling rates of 30 Mbps
Access the Internet with high performance network capability.
DOCSIS/EuroDOCSIS 2.0 cable systems are capable of providing signaling rate of up to 43/55 Mbps and 30 Mbps for downstream and upstream respectively. This bandwidth however, is shared by several subscribers because there are very few computers today that can connect to a network at such high speeds. Hence, typical connection speeds are 5 Mbps downstream and 1 Mbps upstream.
IP routing, TCP, ICMP, ARP, TFTP, RIP1, RIP2 with MD5
Improves network performance through containment of broadcast messages and improves security support for unicast, broadcast and multicast IP packets. The RIP supports key-string encrypted with MD5 for authentication with the CMTS.
5-port Auto-negotiating and Auto MDI/MDI-X 10/100 Mbps Ethernet Switch
The 5-port LAN interface automatically detects if it is on a 10 Mbps or a 100 Mbps Ethernet.
56-bit DES Baseline Privacy Software Remotely Upgradeable
The software and configuration information is downloadable from the cable headend to the Prestige. This eliminates the need for a cable technician's visit to install software upgrades.
Built-in Diagnostic Features
P964 support remote troubleshooting via CMTS-initiated diagnostics, eliminating visit by a technician. The front panel status indicator LEDs and web based status monitoring are also incorporated to easy diagnostics from LAN interfaces.
SNMP
SNMP (Simple Network Management Protocol) is a protocol used for exchanging management information between network devices. SNMP is a member of TCP/IP protocol suite. Your Prestige supports SNMP agent functionality, which allows a manager station to manage and monitor the Prestige through the network. The Prestige supports SNMP version one, two, and three. (SNMP v1, v2 and v3).
Network Address Translation (NAT)
NAT (Network Address Translation - NAT, RFC 1631) allows the translation of an Internet Protocol address used within one network to a different IP address known within another network.
DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol) allows the individual client computers to obtain the TCP/IP configuration at start-up from a centralized DHCP server. The Prestige has built-in DHCP server capability, enabled by default, which means it can assign IP addresses, an IP default gateway and DNS servers to all systems that support the DHCP client.
Page 18
Prestige 964 Cable Router
1-4 Getting to Know Your Prestige
Web based Management & Configuration
The Prestige supports web based management and configuration interface.
Text based configuration file
The Prestige supports text based configuration file download and hence makes router deployment simplified.
TACACS+ server support
The function allows access control to all interfaces for MSO to connect to TACACS+ server for telnet authentication.
1.5 Product Specifications
Table 1-1~Table 1-3 lists the Prestige 964 specifications.
Table 1-1 DOCSIS Specifications
CLASS FEATURES
DOWNSTREAM UPSTREAM Operating Frequency 88MHz ~ 860MHz 5MHz ~ 42MHz Modulation 64/256QAM QPSK or 8*/16/32*/64*/128*QAM Channel Width 6MHz 200/400/800/1600/3200/6400 kHz Input Impedance 75 ohms Nominal 75 ohms Nominal Maximum Data Rates 42.88 Mbps 30 Mbps** Receive Input Level –15 dBmV to +15 dBmV Transmission Output Power A-TDMA:
+8 dBmV ~ +54 dBmV (32/64QAM) +8 dBmV ~ +55 dBmV (8/16 QAM) +8 dBmV ~ +58 dBmV (QPSK) S-CDMA:
+8 dBmV ~ +53 dBmV (all modulation) FEC ITU-T J.83 Annex B Reed Solomon Encoder Encryption 56-bit DES 56-bit DES
* With A-TDMA or S-CDMA enabled CMTS ** Speed of 30Mbps is attainable only with A-TDMA or S-CDMA technology
Table 1-2 EuroDOCSIS Specifications
Page 19
Prestige 964 Cable Router
Getting to Know Your Prestige 1-5
CLASS FEATURES
DOWNSTREAM UPSTREAM
Operating Frequency 108 MHz ~ 862 MHz 5 MHz ~ 65 MHz Modulation 64 QAM and 256 QAM QPSK and 16 QAM Channel Width 8 MHz 200/400/800/1600/3200/6400 KHz Input Impedance 75 ohms Nominal 75 ohms Nominal Maximum Data Rates 55.6 Mbps 30 Mbps** Receive Input Level
+43 dBuV to +73 dBuV (64QAM) +47 dBuV to +77 dBuV (256QAM)
Transmission Output Power A-TDMA:
+68 dBuV ~ +114 dBuV (32/64QAM) +68 dBuV ~ +115 dBuV (8/16 QAM) +68 dBuV ~ +118 dBuV (QPSK) S-CDMA: +68 dBuV ~ +113 dBuV (all modulation)
FEC ITU-T J.83 Annex A Reed Solomon Encoder Encryption 56-bit DES 56-bit DES
* With A-TDMA or S-CDMA enabled CMTS ** Speed of 30Mbps is attainable only with A-TDMA or S-CDMA technology
Table 1-3 General Specifications
Number of LAN users Up to 253 Power Requirements 9 VDC @1.5 Amps Max. Operating Requirements Temperature: 0ºC to 40ºC (32ºF to 104ºF) (Please see NOTE)
Humidity: 5 % to 90 % (non-condensing)
Dimensions 197(W) x 143(D) x 31(H) mm
7.76(W) x 5.63(D) x 1.22(H) inches
Power Adapter 110/220V AC, 50~60 Hz
NOTE: To keep the Prestige operating at optimal internal temperature, keep the bottom, sides and rear of the Prestige clear of obstructions and away from the exhaust of other equipment. Don’t stack the Prestige together in order to assure the safety.
Page 20
Page 21
Prestige 964 Cable Router
Hardware Installation 2-1
Chapter 2
Hardware Installation and Initial Setup
This chapter shows the procedures for installing and starting the Prestige.
2.1 Front Panel LEDs and Back Panel Ports
The Prestige provides LEDs as status indicator for diagnostics purpose. The following figure and table describe the functions of LEDs on the front panel of Prestige:
Figure 2-1 Prestige 964 front panel
Table 2-1 Prestige 964 LED Functions
FUNCTION NAMING COLOR LED DESCRIPTION
Power PWR Green On: Power On
Off: Power Off
System SYS Green
or Orange
LAN link/activity
USB USB Green On: USB link successful
Cable data activity
LAN 1~5 Green (10M)
or Orange (100M)
DATA Green
On (Green): System ready and running successfully On (Orange): System is loading the configuration
Flashing (Green): System rebooting Off: System not ready
On: LAN 1~5 Ethernet port link successful Flashing: LAN 1~5 is Sending or Receiving Off: LAN 1~5 Ethernet port not ready
Flashing: Sending or Receiving Off: USB not ready
Flashing: WAN port (Cable Interface) Tx/Rx
Off: Connection is idle
Page 22
Prestige 964 Cable Router
2-2 Hardware Installation
Cable link status
CABLE Green
On: The Prestige is registered successfully with Cable Modem Terminal System (CMTS)
Slow Flash (2 seconds interval): The Prestige is scanning downstream channel
Fast Flash (1 second interval): The Prestige is locked on to downstream channel and is ranging and registering with CMTS
The SYS LED is always GREEN while system is ready or rebooting. The SYS LED will become ORANGE when the system is loading its configuration. Don’t power off or reset your Prestige during the SYS LED is becoming ORANGE. You can only do so after the SYS LED returns GREEN. Otherwise, your Prestige will not work properly anymore.
The next figure shows the rear panel of your Prestige and the connection diagram.
Figure 2-2 Prestige Rear Panel and Connections
Page 23
Prestige 964 Cable Router
Hardware Installation 2-3
2.2 Additional Installation Requirements
In addition to the contents of your package, there are other hardware and software requirements you need before you can install and use your Prestige. These requirements include:
1. You must have a network interface card (NIC) installed and/or USB interface support on your computer
and configure the TCP/IP protocol stack properly.
2. If using USB connection, you have to install the USB driver. Insert the supporting CD into the CD-ROM
drive before you connect the USB port of Prestige to the USB port on your computer and power on your Prestige at the first time. System may automatically hint you the installation guide for USB driver and specify the directory where USB driver is stored according to the step-by-step instruction after the CD-ROM drive is ready to read. The USB driver supports Windows 98SE, ME, 2000 and XP.
3. An ISP account. Before installing your Prestige, you need to establish an internet access account with
your local cable operator. They might ask for your cable router’s HFC MAC address and model number. Please locate the MAC address at the back of your Prestige.
NOTE: HFC MAC address can be found on the bar code sticker. Use the HFC MAC address when registering with your cable company.
2.2.1 Setting up Your Windows 95/98/Me Computer
Installing TCP/IP Components
1. Click Start, Settings, Control Panel and double-click the Network icon.
2. The Network window Configuration tab displays a list of installed components. To install TCP/IP: a. In the Network window, click Add. b. Select Protocol and then click Add. c. Select Microsoft from the list of manufacturers. d. Select TCP/IP from the list of network protocols and then click OK.
Configuring TCP/IP
1. In the Network window Configuration tab, select your network adapter’s TCP/IP entry and click Properties.
2. Click the IP Address tab. Click Obtain an IP address automatically.
3. Click the DNS Configuration tab. Select Disable DNS.
4. Click the Gateway tab. Highlight any installed gateways and click Remove until there are none listed.
5. Click OK to save and close the TCP/IP Properties window.
6. Click OK to close the Network window.
7. Turn on your Prestige and restart your computer when prompted. Insert the Windows CD if prompted.
Verifying TCP/IP Properties
1. Click Start and then Run. In the Run window, type "winipcfg" and then click OK to open the IP
Page 24
Prestige 964 Cable Router
2-4 Hardware Installation
Configuration window.
2. Select your network adapter. You should see your computer's IP address, subnet mask and default
gateway.
2.2.2 Setting up Your Windows NT/2000/XP Computer
Configuring TCP/IP
1. Click Start, Settings, Network and Dial-up Connections and right-click Local Area Connection or the connection you want to configure and click Properties. For Windows XP, click start, Control Panel, Network and Internet Connections and then Network Connections. Right-click the network connection you want to configure and then click Properties.
2. Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and click Properties.
3. The Internet Protocol TCP/IP Properties window opens. Click Obtain an IP address automatically.
4. Click Obtain DNS server automatically.
5. Click Advanced, IP Settings tab and remove any installed gateways, then click OK.
6. Click OK to save and close the Internet Protocol (TCP/IP) Properties window.
7. Click OK to close the Local Area Connection Properties window.
8. Turn on your Prestige and restart your computer (if prompted).
Verifying TCP/IP Properties
1. Click Start, Programs, Accessories and then Command Prompt.
2. In the Command Prompt window, type "ipconfig" and then press ENTER. The window displays information about your IP address, subnet mask and default gateway.
2.2.3 Setting up Your Macintosh Computer
Configuring TCP/IP Properties
1. Click the Apple menu, Control Panel and double-click TCP/IP to open the TCP/IP Control Panel.
2. Select Ethernet from the Connect via list.
3. Select Using DHCP Server from the Configure list.
4. Close the TCP/IP Control Panel.
5. Click Save if prompted, to save changes to your configuration.
6. Turn on your Prestige and restart your computer (if prompted).
Verifying TCP/IP Properties
Check your TCP/IP properties in the TCP/IP Control Panel.
Page 25
Prestige 964 Cable Router
Hardware Installation 2-5
2.3 Factory Default Settings
The Prestige is configured as a IP sharing router with NAT and DHCP enabled and with following factory default.
Table 2-2 Prestige factory default
Items Settings LAN IP Address 192.168.1.1 Subnet Mask 255.255.255.0 DHCP IP Pool 192.168.1.33 – 192.168.1.64 Web username user Web password 1234
The default might be different from different cable operators. Please consult with your cable Internet service provider for any change.
2.4 Initializing the Cable Sharing Gateway
This section outlines how to connect your Prestige to the LAN and the cable network.
Step 1. Preparing the CATV Coaxial Cable Connection
Locate the coaxial cable at the installation site and move the cable end, or install a two-way splitter as necessary to provide a connection near the Prestige cable modem location.
Step 2. Connecting the Prestige to the Cable System
Connect the Prestige to the cable port using an F-type connector. (If the quality or general condition of the coaxial cable at the installation site is in question, we recommended that you replace the coaxial cable). The cable port on the Prestige is labeled "CABLE”.
Step 3. Connecting Ethernet Cable(s) and/or USB cable to the Prestige
If you do not have an Ethernet interface card (NIC) in your computer, please install one or use the USB connectivity. The Ethernet interface of your Prestige support 10/100M auto-negotiating and auto MDI/MDI-X function. You can use any type of Ethernet cable to connect it to your computer directly or through an external switch/hub.
Step 4. Connecting the Power Adapter to your Prestige
Connect the power adapter to the port labeled POWER on the rear panel of your Prestige.
Step 5. Prestige Initialization
The Prestige is powered on whenever you connect the power adapter to the power outlet. It will initialize the system and start to connect with headend CMTS. When the CABLE LED shines steadily, the Prestige is ready to handle data traffic. The first initialization process might take several minutes because it will scan for the proper downstream and upstream channels. When the P964 is ready, it will memorize the channel attributes. If
Page 26
Prestige 964 Cable Router
2-6 Hardware Installation
you power cycle the P964, the next connection process will be faster.
2.5 Network Configuration of Your Computer
You must have a network interface card installed on your computer and configure the TCP/IP protocol stack properly. For Windows® 95/98/NT/2000, please configure your computer as a DHCP client. The IP address identifies the computer on the network and enables the headend CMTS to route data to and from your computer.
For Windows® 95/98, you can use the following command to verify the TCP/IP configuration.
Winipcfg
For Windows® NT/2000/XP, you can use the following command.
Ipconfig
2.6 Router Configuration
You do not need to ask your cable company for a special configuration. The Prestige can act as a DHCP client to acquire an IP address from the headend. Besides, it can act as a DHCP server at the LAN port and assign an IP address to your computers on the LAN subnet. What you have to do is to configure the LAN port with the proper IP address and netmask. If you already have a DHCP server on your LAN subnet, you can disable the DHCP server in the Prestige but you have to assign an IP address/netmask for the LAN port.
2.7 Power On Your Prestige
At this point, you should have connected at least one of the LAN ports and/or USB port, the cable port and the power port to the appropriate devices or lines. Plug the power adapter into a wall outlet.
When connected, it is powered on, the Prestige executes an automatic installation procedure:
1. Scans and locks on to the service provider’s downstream frequency.
2. Obtains timing, signal, power level, authentication, addressing, and other operational parameters from
the headend CMTS.
3. Downloads its configuration file and is then operational.
During the initialization, the LEDs on the Prestige turns on:
1. The Power LED should be ON.
2. The CABLE LED will be flashing on a 2 seconds on/off cyclic duration while scanning the downstream
channel and then on a 1 second on/off cyclic duration when it has locked on to a downstream channel and is communicating with the headend CMTS. Once the cable connection is complete it will remain ON.
3. The DATA LED flashes when the cable downstream, cable upstream is receiving and transmitting data.
It will turn OFF when the connection is idle.
4. The LAN1 to LAN5 or USB LEDs (depending on the port connected) will be ON if Ethernet/USB link
is successful and flashing while sending/receiving data.
Page 27
Prestige 964 Cable Router
Web Based Management 3-1
Chapter 3
Web Based Management
This chapter describes the web based management & configuration interface.
3.1 Introduction
The Prestige cable router provides users to configure LAN settings including DHCP server IP, netmask, DHCP clients’ start IP address and the number of CPEs. To configure the LAN setting, users use a PC to browse the LAN IP of the cable router. The web functions only open to the LAN, no access from HFC cable is allowed. When browsing stared, the cable router prompts the following windows for user to login.
Figure 3-1 Web Management - User Login Page
After input username/password, click “OK” and the following page will be displayed.
Page 28
Prestige 964 Cable Router
3-2 Web Based Management
Figure 3-2 Web Management - Status
There are three tags “Status”, “Basic”, and “Advanced” as shown in in the web management interface of Prestige. The “Status” tag will show the connection status and software information. “Basic” and “Advanced” tags are for the configuration to LAN interface.
1. “Status” The “Status” tag will show the connection status and software information of your Prestige.
2. “Basic” Click “Basic”, users can set DHCP server IP, netmask, and etc.
3. “Advanced” This function especially for users who wants more control of LAN interface. For example, users can block
Page 29
Prestige 964 Cable Router
Web Based Management 3-3
packet from some CPEs to access the Internet. Users can also open some well known ports or some special port for accessing from Internet.
The “Connection” icon in Figure 3-2 shows the connection status of the cable router. Users can also click the “Software” icon in this page to show the software information of the box.
3.2 Basic Page
When click “Basic” tag, the following page is shown.
Figure 3-3 Web Management - Basic
From the “Basic” page, users can set the DHCP server IP for the LAN as well as the network, netmask, DHCP’s starting IP, and the number of CPEs. User even can set lease time for the CPEs. But to update these above settings may prevent users from accessing Internet. Do not update it unless you can handle it.
Page 30
Prestige 964 Cable Router
3-4 Web Based Management
3.3 Advanced Page
The “Advanced” is a more powerful tool to set more advanced features for the Prestige 964 cable router. When click the “Advanced” tag, the following page “Advanced- Options” is shown.
Figure 3-4 Web Management – Advanced: Options
Page 31
Prestige 964 Cable Router
Web Based Management 3-5
3.3.1 Web Management – Advanced: Options
The “Option” icon allows configuration of advanced features of the Prestige.
Table 3-1 Web Management – Advanced: Options
Function Description
WAN Blocking Do not response to some ICMP’s probing packets, e.g. ping, traceroute and
etc. Ipsec PassThrough Allow users to execute IPSec VPN client in the workstations PPTP PassThrough Allow users to execute PPTP client in the workstations Multicast Enable Allows users to enable or disable multicast IGMP protocol
3.3.2 Web Management – Advanced: IP Filtering
The “IP Filtering” in the “Advanced” page allows configuration of IP address filters in order to block Internet traffic to specific network devices on the LAN. Click “IP Filtering” icon, the screen is displayed.
Page 32
Prestige 964 Cable Router
3-6 Web Based Management
Figure 3-5 Web Management – Advanced: IP Filtering
Users can block specific CPEs to access the Internet. For example, there is a CPE whose IP is 192.168.10.20, users can set it in the above screen and click “apply”. The CPE will no more can access the Internet.
Page 33
Prestige 964 Cable Router
Web Based Management 3-7
3.3.3 Web Management – Advanced: MAC Filtering
“MAC Filtering” allows configuration of MAC address filters in order to block Internet traffic to specific network devices on the LAN. Click “MAC Filtering” icon, the screen is displayed.
Figure 3-6 Web Management – Advanced: MAC Filtering
Users can block specific CPEs to access the Internet. It has the same effect as “IP Filtering” except this function use MAC address instead of IP address.
Page 34
Prestige 964 Cable Router
3-8 Web Based Management
3.3.4 Web Management – Advanced: Port Filtering
“Port Filtering” allows configuration of port filters in order to block specific Internet services to all devices on the LAN. Click “Port Filtering” icon, the screen is displayed.
Figure 3-7 Web Management – Advanced: Port Filtering
The “Port Filtering” control CPEs not to access the Internet to get the services which is provided through the ports.
Page 35
Prestige 964 Cable Router
Web Based Management 3-9
3.3.5 Web Management – Advanced: Forwarding
The “Forwarding” page allows for incoming requests on specific port numbers to reach web servers, FTP servers, mail servers, etc. so they can be accessible from the public Internet. Click “Forwarding” icon, the screen is displayed.
Figure 3-8 Web Management – Advanced: Forwarding
Page 36
Prestige 964 Cable Router
3-10 Web Based Management
3.3.6 Web Management – Advanced: Port Triggers
This “Port Triggers” function allows configuration of dynamic triggers to specific devices on the LAN. This allows for special applications that require specific port numbers with bi-directional traffic to function properly. Applications such as video conferencing, voice, gaming, and some messaging program features may require these special settings.
Figure 3-9 Web Management – Advanced: Port Triggers
Page 37
Prestige 964 Cable Router
Troubleshooting 4-1
Chapter 4
Troubleshooting
This chapter covers the potential problems you may run into and the possible remedies. After each
problem description, some instructions are provided to help you to diagnose.
4.1 Problems with Cable Connection
Table 4-1 Troubleshooting Cable Connection
PROBLEM CORRECTIVE ACTION
The PWR LED is off.
The SYS LED is off. Turn the Prestige’s power off and then on again. LAN (1~5) LED and USB
LED are OFF.
Make sure that the Prestige’s power adaptor is connected to the Prestige and plugged in to an appropriate power source. Check that the power source is turned on.
If the error persists, you may have a hardware problem. In this case, you should contact your cable operator.
Check the LAN/USB LEDs on the front panel. One of these LEDs should be on. If they are all off, check the Ethernet cables between your Prestige and hub/station or the USB cable ace on your station.
4.2 Problems with Internet Access
Table 4-2 Troubleshooting Internet Access
PROBLEM CORRECTIVE ACTION
Cannot access e-mail or Internet Service.
Make sure that the coaxial cable is connected to the Prestige and the Internet. Check with your service provider to see if your account has been activated. Check if your computer’s network configuration is correct. For a dynamic IP address
assignment, you have to activate your computer’s DHCP client. And, you might need to assign a DNS server address. Refer to cable operator’s configuration information.
Check your TCP/IP parameters and verify that you have installed TCP/IP properly. If the problem persists, call your cable service provider to verify that their service is two-way and DOCSIS/EuroDOCSIS-compliant.
Page 38
Prestige 964 Cable Router
4-2 Troubleshooting
All of the LEDs look right, but I still cannot access the Internet.
If the LEDs are right, then your cable router is operating properly. Try shutting down, powering off your computer and then turning it on again. This will cause your computer to re-establish communications.
Check your TCP/IP parameters and verify that you have installed TCP/IP properly.
Launch “192.168.1.1” in your web browser. Enter “user” as user name and “1234” as password to log on for more information.
Page 39
Prestige 964 Cable Router
Hardware Specifications A
Appendix A
Hardware Specifications
Power Specification I/P: AC 110/220, 50/60Hz; O/P: DC 9V Operation Temperature 0º C ~ 40º C Cable Specification for
WAN/Internet Ethernet Specification for LAN 10/100Mbit Half / Full Auto-negotiation and Auto MDI/MDI-X USB Interface Specification USB 1.1
LAN Cable Pin Layout: Straight-Through
Female “F” Type RF Connector
Crossover
(Switch) 1 IRD +
2 IRD - 2 OTD - 2 IRD - 2 IRD ­3 OTD + 3 IRD + 3 OTD + 3 OTD + 6 OTD - 6 IRD - 6 OTD - 6 OTD -
(Adapter) 1 OTD +
(Switch) 1 IRD +
(Switch)
1 IRD +
Page 40
Page 41
Prestige 964 Cable Router
Safety Instructions C
Appendix B
Important Safety Instructions
The following safety instructions apply to the Prestige: Be sure to read and follow all warning notices and instructions. The maximum recommended ambient temperature for the Prestige is 40º(104º). Care must be taken to allow sufficient air circulation or space between units when the Prestige is installed inside a closed rack assembly. The operating ambient temperature of the rack environment might be greater than room temperature. Installation in a rack without sufficient airflow can be unsafe. Racks should safely support the combined weight of all equipment. The connections and equipment that supply power to the Prestige should be capable of operating safely with the maximum power requirements of the Prestige. In case of a power overload, the supply circuits and supply wiring should not become hazardous. The input rating of the Prestige is printed on the nameplate. The AC adapter must plug in to the right supply voltage, i.e. 120VAC adapter for North America and 230VAC adapter for Europe. Make sure that the supplied AC voltage is correct and stable. If the input AC voltage is over 10% lower than the standard may cause the Prestige to malfunction. Installation in restricted access areas must comply with Articles 110-16, 110-17, and 110-18 of the National Electrical Code, ANSI/NFPA 70. Do not allow anything to rest on the power cord of the AC adapter, and do not locate the product where anyone can walk on the power cord. Do not service the product by yourself. Opening or removing covers can expose you to dangerous high voltage points or other risks. Refer all servicing to qualified service personnel. Generally, when installed after the final configuration, the product must comply with the applicable safety standards and regulatory requirements of the country in which it is installed. If necessary, consult the appropriate regulatory agencies and inspection authorities to ensure compliance.
1. A rare condition can create a voltage potential between the earth grounds of two or more buildings. If
products installed in separate building are interconnected, the voltage potential can cause a hazardous condition. Consult a qualified electrical consultant to determine whether or not this phenomenon exists and, if necessary, implement corrective action before interconnecting the products. If the equipment is to be used
with telecommunications circuit, take the following precautions: Never install wiring during a lightning storm. Never install jacks in wet location unless the jack is specially designed for wet location. Never touch uninsulated wires or terminals unless the line has been disconnected at the network interface. Use caution when installing or modifying lines during an electrical storm. There is a remote risk of electric shock from lightning.
Page 42
Page 43
Prestige 964 Cable Router
Glossary E
Glossary of Terms
10BaseT
ARP
Authenticity Proof that the information came from the person or location that reportedly sent it. One example
Back Door A deliberately planned security breach in a program. Back doors allow special access to a
Backbone A high-speed line or series of connections that forms a major pathway within a network. BackOrifice BackOrifice is a remote administration tool which allows a user to control a
Bandwidth This is the capacity on a link usually measured in bits-per-second (bps). Bit (Binary Digit) -- A single digit number in base-2, in other words, either a 1 or a zero. The
Brute Force Hacking A technique used to find passwords or encryption keys. Force Hacking involves trying every
The 10-Mbps baseband Ethernet specification that uses two pairs of twisted-pair cabling (Category 3 or 5): one pair for transmitting data and the other for receiving data.
Address Resolution Protocol is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address that is recognized in the local network.
of authenticating software is through digital signatures.
computer or program. Sometimes back doors can be exploited and allow a cracker unauthorized access to data.
computer across a TCP/IP connection using a simple console or GUI application. BackOrifice is a potentially disastrous Trojan horse since it can provide the user unlimited access to a system.
smallest unit of computerized data.
possible combination of letters, numbers, etc. until the code is broken.
Byte A set of bits that represent a single character. There are 8 bits in a Byte. Cable Modem (CM)
Camping Out Staying in a "safe" place once a hacker has broken into a system. The term
CATV Cable TV system. Can be all coaxial- or HFC- (Hybrid Fiber Coax) based.
CDR Call Detail Record. This is a name used by telephone companies for call related information. Channel
CHAP Challenge Handshake Authentication Protocol is an alternative protocol that avoids sending
A cable modem is a device that enables you to hook up your computer to a local cable TV line and receive data at about 1.5 Mbps. This data rate far exceeds that of the prevalent 28.8 and 56 Kbps telephone modems, and up to 128 Kbps of ISDN that is about the data rate available to subscribers of Digital Subscriber Line (DSL) telephone service. A cable modem can be added to or integrated with a set top box that turns your TV set into an Internet channel. For computer attachment, the cable line must be split so that part of the line goes to the TV set and the other part goes to the cable modem and the computer. A cable modem is more like a network interface card (NIC) than a computer modem. All of the cable modems attached to a cable TV company coaxial cable line communicate with a Cable Modem Termination System (CMTS) at the local cable TV company office. All cable modems can receive only from and send signals to the CMTS, but not to other cable modems on the line.
can be used with a physical location, electronic reference, or an entry point for future attacks.
A specific frequency and bandwidth combination. In the present context, it means TV channels for television services and downstream data for cable modems.
passwords over the wire by using a challenge/response technique.
Page 44
Prestige 944S Cable Sharing Gateway with 4-port Switch
F Glossary
Cipher Text Text that has been scrambled or encrypted so that it cannot be read without deciphering it. See
Encryption
Client A software program that is used to contact and obtain data from a Server software program on
another computer. Each Client program is designed to work with one or more specific kinds of Server programs, and each Server requires a specific kind of Client. A Web Browser is a specific kind of Client.
CMTS
Cookie A string of characters saved by a web browser on the user's hard disk. Many web pages send
Countermeasures Techniques, programs, or other tools that can protect your computer against threats. CPE
Cracker Another term for hackers. Generally, the term cracker refers specifically to a person who
Cracker Tools Programs used to break into computers. Cracker tools are widely
Cracking The act of breaking into computers or cracking encryptions. Crossover Ethernet
cable
Cryptoanalysis The act of analyzing (or breaking into) secure documents or systems that are protected with
CSU/DSU Channel Service Unit/Data Service Unit. CSUs (channel service units) and DSUs (data service
DCE Data Communications Equipment is typically a modem or other type of communication device.
Decryption The act of restoring an encrypted file to its original state. Denial of Service Act of preventing customers, users, clients or other machines from
DHCP Dynamic Host Configuration Protocol automatically assigns IP addresses to clients when they
Cable Modem Termination System. A central device for connecting the cable TV network to a data network like the Internet. Normally it is placed in the headend of the cable TV system.
cookies to track specific user information. Cookies can be used to retain information as the user browses a web site. For example, cookies are used to 'remember' the items a shopper may have in a shopping cart.
Customer Premises Equipment. Used to describe the computer and/or other equipment that the customer may want to connect to the cable modem.
maliciously attempts to break encryption, software locks, or network security.
distributed on the Internet. They include password crackers, Trojans, viruses, war-dialers, and worms.
A cable that wires a pin to its opposite pin, for example, RX+ is wired to TX+. This cable connects two similar devices, for example, two data terminal equipment (DTE) or data communications equipment (DCE) devices.
encryption.
units) are actually two separate devices, but they are used in conjunction and often combined into the same box. The devices are part of the hardware you need to connect computer equipment to digital transmission lines. The Channel Service Unit device connects with the digital communication line and provides a termination for the digital signal. The Data Service Unit device, sometimes called a digital service unit, is the hardware component you need to transmit digital data over the hardware channel. The device converts signals from bridges, routers, and multiplexors into the bipolar digital signals used by the digital lines. Multiplexors mix voice signals and data on the same line.
The DCE sits between the DTE (data terminal equipment) and a transmission circuit such as a phone line.
accessing data on a computer. This is usually accomplished by interrupting or overwhelming the computer with bad or excessive information requests.
Page 45
Prestige 964 Cable Router
Glossary G
log on. DHCP centralizes IP address management on central computers that run the DHCP server program. DHCP leases addresses for a period of time which means that addresses are made available to assign to other systems.
Digital Signature Digital code that authenticates whomever signed the document or software. Software, messages,
Email, and other electronic documents can be signed electronically so that they cannot be altered by anyone else. If someone alters a signed document, the signature is no longer valid. Digital signatures are created when someone generates a hash from a message, then encrypts and sends both the hash and the message to the intended recipient. The recipient decrypts the hash and original message, makes a new hash on the message itself, and compares the new hash with the old one. If the hashes are the same, the recipient knows that the message has not been changed. Also see Public-key encryption.
DNS Domain Name System. A database of domain names and their IP addresses. DNS is the primary
naming system for many distributed networks, including the Internet.
DOCSIS
Domain Name The unique name that identifies an Internet site. Domain Names always have 2 or more parts,
Downstream Downstream
Frequency DRAM Dynamic RAM that stores information in capacitors that must be refreshed periodically.
DTE Originally, the DTE (data terminal equipment) meant a dumb terminal or printer, but today it is a
EMI ElectroMagnetic Interference. The interference by electromagnetic signals that can cause reduced
Encryption The act of substituting numbers and characters in a file so that the file is unreadable until it is
Data over Cable Service Interface Specification. It is the dominating cable modem standard, which defines technical specifications for both cable modem and CMTS.
separated by dots. The part on the left is the most specific, and the part on the right is the most general.
The data flowing from the CMTS to the cable modem.
The frequency used for transmitting data from the CMTS to the cable modem. Normally in the 42/65-850 MHz range depending on the actual cable plant capabilities.
computer, or a bridge or router that interconnects local area networks.
data integrity and increased error rates on transmission channels.
decrypted. Encryption is usually done using a mathematical formula that determines how the file is decrypted.
Ethernet A very common method of networking computers in a LAN. There are a number of adaptations
to the IEEE 802.3 Ethernet standard, including adaptations with data rates of 10 Mbits/sec and 100 Mbits/sec over coaxial cable, twisted-pair cable, and fiber-optic cable. The latest version of Ethernet, Gigabit Ethernet, has a data rate of 1 Gbit/sec.
Events These are network activities. Some activities are direct attacks on your system, while others
might be depending on the circumstances. Therefore, any activity, regardless of severity is called an event. An event may or may not be a direct attack on your system.
FAQ (Frequently Asked Questions) -- FAQs are documents that list and answer the most common
questions on a particular subject.
FCC The FCC (Federal Communications Commission) is in charge of allocating the electromagnetic
spectrum and thus the bandwidth of various communication systems.
Firewall A hardware or software "wall" that restricts access in and out of a network. Firewalls are most
often used to separate an internal LAN or WAN from the Internet.
Page 46
Prestige 944S Cable Sharing Gateway with 4-port Switch
H Glossary
Flash memory The nonvolatile storage that can be electrically erased and reprogrammed so that data can be
stored, booted, and rewritten as necessary.
FTP File Transfer Protocol is an Internet file transfer service that operates on the Internet and over
TCP/IP networks. FTP is basically a client/server protocol in which a system running the FTP server accepts commands from a system running an FTP client. The service allows users to send commands to the server for uploading and downloading files. FTP is popular on the Internet because it allows for speedy transfer of large files between two systems.
Gateway A gateway is a computer system or other device that acts as a translator between two systems
that do not use the same communication protocols, data formatting structures, languages, and/or architecture.
Hacker Generally, a hacker is anyone who enjoys experimenting with technology including computers
and networks. Not all hackers are criminals breaking into systems. Some are legitimate users and hobbyists. Nevertheless, some are dedicated criminals or vandals.
HDLC HDLC (High-level Data Link Control) is a bit-oriented (the data is monitored bit by bit), link
layer protocol for the transmission of data over synchronous networks.
Headend
HFC
Host Any computer on a network that is a repository for services available to other computers on the
HTTP Hyper Text Transfer Protocol. The most common protocol used on the Internet. HTTP is the
Central distribution point for a CATV system. Video signals are received here from satellites and maybe other sources, frequency converted to the appropriate channels combined with locally originated signals and rebroadcast onto the HFC plant. The headend is where the CMTS is normally located.
HFC (hybrid fiber coaxial cable) is a telecommunication technology in which fiber optic cable and coaxial cable are used in different portions of a network to carry broadband content (such as video, data and voice). Typically, a local cable TV company might use fiber optic cable from the cable headend (distribution center) to serving nodes located close to business and residential users and from these nodes use coaxial cable to individual businesses and homes. An advantage of HFC is that some of the characteristics of fiber optic cable (high bandwidth and low noise and interference susceptibility) can be brought close to the user without having to replace the existing coaxial cable that is installed all the way to the home and business.
network. It is quite common to have one host machine provide several services, such as WWW and USENET.
primary protocol used for web sites and web browsers. It is also prone to certain kinds of attacks.
IANA Internet Assigned Number Authority acts as the clearinghouse to assign and coordinate the use of
numerous Internet protocol parameters such as Internet addresses, domain names, protocol numbers, and more. The IANA Web site is at http://www.isi.edu/iana.
ICMP Internet Control Message Protocol is a message control and error-reporting protocol between a
host server and a gateway to the Internet. ICMP uses Internet Protocol (IP) datagrams, but the messages are processed by the TCP/IP software and are not directly apparent to the application user.
Integrity Proof that the data is the same as originally intended. Unauthorized software or people have not
altered the original information.
internet (Lower case i) Any time you connect 2 or more networks together, you have an internet. Internet (Upper case I) The vast collection of inter-connected networks that all use the TCP/IP protocols
Page 47
Prestige 964 Cable Router
Glossary I
and that evolved from the ARPANET of the late 60’s and early 70’s. The Internet now (July
1995) connects roughly 60,000 independent networks into a vast global internet
Internet Worm See Worm. Intranet A private network inside a company or organization that uses the same kinds of software that you
would find on the public Internet, but that is only for internal use.
Intruder Person or software interested in breaking computer security to access, modify, or damage data.
Also see Cracker.
IP Internet Protocol he IP (currently IP version 4, or IPv4), is the underlying protocol for routing
packets on the Internet and other TCP/IP-based networks. IPCP (PPP) IP Control Protocol allows changes to IP parameters such as the IP address. IPX Internetwork Packet eXchange The native NetWare internetworking protocol is IPX
(Internetwork Packet Exchange). Like IP (Internet Protocol), IPX is an internetworking protocol
that provides datagram services. IRC Internet Relay Chat. IRC was developed in the late 1980s as a way for multiple users on a system
to “chat” over the network. Today IRC is a very popular way to “talk” in real time with other
people on the Internet. However, IRC is also one avenue hackers use to get information from you
about your system and your company. Moreover, IRC sessions are prone to numerous attacks
that while not dangerous can cause your system to crash.
ISP Internet Service Providers provide connections into the Internet for home users and businesses.
There are local, regional, national, and global ISPs. You can think of local ISPs as the
gatekeepers into the Internet. LAN Local Area Network is a shared communication system to which many computers are attached.
A LAN, as its name implies, is limited to a local area. This has to do more with the electrical
characteristics of the medium than the fact that many early LANs were designed for departments,
although the latter accurately describes a LAN as well. LANs have different topologies, the most
common being the linear bus and the star configuration. Linux A version of the UNIX operating system designed to run on IBM Compatible computers.
Logic Bomb A virus that only activates itself when certain conditions are met. Logic bombs usually damage
files or cause other serious problems when they are activated. MAC On a local area network (LAN) or other network, the MAC (Media Access Control) address is
your computer's unique hardware number. (On an Ethernet LAN, it's the same as your Ethernet
address.) The MAC layer frames data for transmission over the network, then passes the frame to
the physical layer interface where it is transmitted as a stream of bits. MCNS
MSO
Name Resolution The allocation of an IP address to a host name. See DNS NAT Network Address Translation is the translation of an Internet Protocol address used within one
NDIS Network Driver Interface Specification is a Windows specification for how communication
Multimedia Cable Network System is the consortium behind the DOCSIS standard for cable
modems.
Multiple Service Operators. A cable TV service provider that also provides other services such as
data and/or voice telephony.
network to a different IP address known within another network - see also SUA.
protocol programs (such as TCP/IP) and network device drivers should communicate with each
other.
Page 48
Prestige 944S Cable Sharing Gateway with 4-port Switch
J Glossary
NetBIOS Network Basic Input / Output System. NetBIOS is an extension of the DOS BIOS that enables a
PC to connect to and communicate with a LAN.
Network Any time you connect 2 or more computers together so that they can share resources, you have a
computer network. Connect 2 or more networks together and you have an internet.
NIC Network Interface Card. A board that provides network communication capabilities to and from
a computer system. Also called an adapter.
Node Any single computer connected to a network One-way Cable
Modem PAC The box that calls/answers the phone call and relays the PPP frames to the PNS. A PAC must
Packet Filter A filter that scans packets and decides whether to let them through. PAP Password Authentication Protocol PAP is a security protocol that requires users to enter a
Password Cracker A program that uses a dictionary of words, phrases, names, etc. to guess a password. Password encryption A system of encrypting electronic files using a single key or password. Anyone who knows the
Password Shadowing
Penetration Gaining access to computers or networks by bypassing security programs and passwords. Phreaking Breaking into phone or other communication systems. Phreaking sites on the Internet are popular
Ping Attack An attack that slows down the network until it is unusable. The attacker sends a "ping" command
Pirate Someone who steals or distributes software without paying the legitimate owner for it. This
Pirated Software Software that has been illegally copied, or that is being used in violation of the software's
Plain Text The opposite of Cipher Text, Plain Text is readable by anyone. PNS PPTP Network Server. A PNS must have IP connectivity.
POP Post Office Protocol. This is a common protocol used for sending, receiving, and delivering mail
Port An Internet port refers to a number that is part of a URL, appearing after a colon (:) right after
A one-way Cable Modem uses the TV cable for the downstream (receive) and a telephone modem for upstream (transmit).
have IP and dial-up capability.
password before accessing a secure system. The user’s name and password are sent over the wire to a server, where they are compared with a database of user account names and passwords. This technique is vulnerable to wiretapping (eavesdropping) because the password can be captured and used by someone to log onto the system.
password can decrypt the file. The encrypted password is no visible in the passwd file but stored in a shadow file that is only
readable by root. This prevents brute force attacks on the encrypted field to guess the password. see e.g.: http://whatis.com/shadowpa.htm
among crackers and other criminals
to the network repeatedly to slow it down. See also Denial of Service.
category of computer criminal includes several different types of illegal activities Making copies of software for others to use. Distributing pirated software over the Internet or a Bulletin Board System. Receiving or downloading illegal copies of software in any form.
licensing agreement. Pirated software is often distributed through pirate bulletin boards or on the Internet. In the internet underground it is known as Warez.
messages.
the domain name. Every service on an Internet server listens on a particular port number on that server. Most services have standard port numbers, e.g. Web servers normally listen on port 80.
Page 49
Prestige 964 Cable Router
Glossary K
Port (H/W) An interface on a computer for connecting peripherals or devices to the computer. A printer port,
for example, is an interface that is designed to have a printer connected to it. Ports can be defined
by specific hardware (such as a keyboard port) or through software.
POTS Plain Old Telephone Service is the analog telephone service that runs over copper twisted-pair
wires and is based on the original Bell telephone system. Twisted-pair wires connect homes and
businesses to a neighborhood central office. This is called the local loop. The central office is
connected to other central offices and long-distance facilities. PPP Point to Point Protocol. PPP encapsulates and transmits IP (Internet Protocol) datagrams over
serial point-to-point links. PPP works with other protocols such as IPX (Internetwork Packet
Exchange). The protocol is defined in IETF (Internet Engineering Task Force) RFC 1661 through
1663. PPP provides router-to-router, host-to-router, and host-to-host connections. PPTP Point-to-Point Tunneling Protocol. Promiscuous Packet
Capture
Protocol A “language” for communicating on a network. Protocols are sets of standards or rules used to
Proxy Server A server that performs network operations in lieu of other systems on the network. Proxy Servers
PSTN Public Switched Telephone Network was put into place many years ago as a voice telephone
Public Key Encryption
PVC Permanent Virtual Circuit. A PVC is a logical point-to-point circuit between customer sites.
Ranging
Reconnaissance The finding and observation of potential targets for a cracker to attack. RFC An RFC (Request for Comments) is an Internet formal document or standard that is the result of
Actively capturing packet information from a network. Most computers only collect packets specifically addressed to them. Promiscuous packet capture acquires all network traffic it can regardless of where the packets are addressed.
define, format, and transmit data across a network. There are many different protocols used on networks. For example, most web pages are transmitted using the HTTP protocol.
are most often used as part of a firewall to mask the identity of users inside a corporate network yet still provide access to the Internet. When a user connects to a proxy server, via a web browser or other networked application, he submits commands to the proxy server. The server then submits those same commands to the Internet, yet without revealing any information about the system that originally requested the information. Proxy servers are an ideal way to also have all users on a corporate network channel through one point for all external communications. Proxy servers can be configured to block certain kinds of connections and stop some hacks.
call-switching system. The system transmits voice calls as analog signals across copper twisted cables from homes and businesses to neighborhood COs (central offices); this is often called the local loop. The PSTN is a circuit-switched system, meaning that an end-to-end private circuit is established between caller and callee.
System of encrypting electronic files using a key pair. The key pair contains a public key used during encryption, and a corresponding private key used during decryption.
PVCs are low-delay circuits because routing decisions do not need to be made along the way. Permanent means that the circuit is preprogrammed by the carrier as a path through the network. It does not need to be set up or torn down for each session.
The process of automatically adjusting transmission levels and time offsets of individual modems in order to make sure the bursts coming from different modems line up in the right timeslots and are received at the same power level at the CMTS.
committee drafting and subsequent review by interested parties. Some RFCs are informational in nature. Of those that are intended to become Internet standards, the final version of the RFC
Page 50
Prestige 944S Cable Sharing Gateway with 4-port Switch
L Glossary
becomes the standard and no further comments or changes are permitted. Change can occur, however, through subsequent RFCs.
RIP Routing Information Protocol is an interior or intra-domain routing protocol that uses the
distance-vector routing algorithms. RIP is used on the Internet and is common in the NetWare environment as a method for exchanging routing information between routers.
Router A device that connects two networks together. Routers monitor, direct, and filter information that
passes between these networks. Because of their location, routers are a good place to install traffic or mail filters. Routers are also prone to attacks because they contain a great deal of information about a network.
SAP In NetWare, the SAP (Service Advertising Protocol) broadcasts information about available
services on the network that other network devices can listen to. A server sends out SAP messages every 60 seconds. A server also sends out SAP messages to inform other devices that it is closing down. Workstations use SAP to find services they need on the network.
SATAN A UNIX program that gathers information on networks and stores it in databases. It is helpful in
finding security flaws such as incorrect settings, software bugs and poor policy decisions. It shows network services that are running, the different types of hardware and software on the network, and other information. It was written to help users find security flaws in their network systems.
Server A computer, or a software package, that provides a specific kind of service to client software
Set-Top Box
Shoulder Surfing Looking over someone's shoulder to see the numbers they dial on a phone, or the information
SID (Service ID)
SNMP System Network Management Protocol is a popular management protocol defined by the Internet
Snooping Passively watching a network for information that could be used to a hacker's advantage, such as
SOCKS A protocol that handles TCP traffic through proxy servers. SPAM Unwanted e-mail, usually in the form of advertisements.
A set-top box is a device that enables a television set to become a user interface to the Internet and also enables a television set to receive and decode digital television (DTV) broadcasts.
they enter into a computer. Used in the DOCSIS standard to define a particular mapping between a cable modem (CM) and
the CMTS. The SID is used for the purpose of upstream bandwidth allocation and class-of-service management.
community for TCP/IP networks. It is a communication protocol for collecting information from devices on the network.
passwords. Usually done while Camping Out.
Splitter Spoofing To forge something, such as an IP address. IP Spoofing is a common way for hackers to hide
SSL (Secured Socket Layer)
STP Twisted-pair cable consists of copper-core wires surrounded by an insulator. Two wires are
Straight through A cable that wires a pin to its equivalent pin. This cable connects two dissimilar devices, for
Passive devices that divide the traffic on trunk cables and send it down feeder cables.
their location and identity Technology that allows you to send information that only the server can read. SSL allows servers
and browsers to encrypt data as they communicate with each other. This makes it very difficult for third parties to understand the communications.
twisted together to form a pair, and the pair form a balanced circuit. The twisting prevents interference problems. STP (shielded twisted-pair) provides protection against external crosstalk.
Page 51
Prestige 964 Cable Router
Glossary M
Ethernet cable example, a data terminal equipment (DTE) device and a data communications equipment (DCE)
device. A straight through Ethernet cable is the most common cable used.
SUA Single User Account – The Prestige's SUA (Single User Account) feature allows multiple user
Internet access for the cost of a single ISP account - see also NAT. Subscriber Unit (SU) TCP Transmission Control Protocol handles flow control and packet recovery and IP providing basic
Telnet Telnet is the login and terminal emulation protocol common on the Internet and in UNIX
Tempest Illegal interception of data from computers and video signals. Terminal A device that allows you to send commands to a computer somewhere else. At a minimum, this
Terminal Software Software that pretends to be (emulates) a physical terminal and allows you to type commands to
TFTP Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP (File Transfer
Three-way Cable Modem
Trojan or Trojan Horse
Two-way Cable Modem
UDP UDP is a connectionless transport service that dispenses with the reliability services provided by
UNIX A widely used operating system in large networks. Upstream
Upstream Frequency
URL (Uniform Resource Locator) URL is an object on the Internet or an intranet that resides on a host
VPN Virtual Private Network. These networks use public connections (such as the Internet) to transfer
Vulnerability Point where a system can be attacked. WAN Wide Area Network s link geographically dispersed offices in other cities or around the globe.
An alternate term for cable modem.
addressing and packet-forwarding services.
environments. It operates over TCP/IP networks. Its primary function is to allow users to log into
remote host systems.
usually means a keyboard and a display screen and some simple circuitry.
a computer somewhere else.
Protocol), but it is scaled back in functionality so that it requires fewer resources to run. TFTP
uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol).
A three-way cable modem is a hybrid that can uses either a telephone modem or the TV cable for
the upstream traffic.
Like the fabled gift to the residents of Troy, a Trojan Horse is an application designed to look
innocuous. Yet, when you run the program it installs a virus or memory resident application that
can steal passwords, corrupt data, or provide hackers a back door into your computer. Trojan
applications are particularly dangerous since they can often run exactly as expected without
showing any visible signs of intrusion.
A two-way Cable Modem uses the TV cable for both downstream and upstream traffic.
TCP. UDP gives applications a direct interface with IP and the ability to address a particular
application process running on a host via a port number without setting up a connection session.
The data flowing from the CM to the CMTS.
The frequency used to transmit data from the CM to the CMTS. Normally in the 5 to 42 MHz
range for US systems and 5 to 65 MHz range for European systems.
system. Objects include directories and an assortment of file types, including text files, graphics,
video, and audio. A URL is the address of an object that is normally typed in the Address field of
a Web browser. The URL is basically a pointer to the location of an object.
information. That information is usually encrypted for security purposes.
Page 52
Prestige 944S Cable Sharing Gateway with 4-port Switch
N Glossary
Just about any long-distance communication medium can serve as a WAN link, including switched and permanent telephone circuits, terrestrial radio systems, and satellite systems.
War Dialer A program that automatically dials phone numbers looking for computers on the other end. They
catalog numbers so that hackers can call back and try to break in.
Warez A term that describes Pirated Software on the Internet. Warez include cracked games or other
programs that software pirates distribute on the Internet
Web Configurator This is a web-based router (not all) configurator that includes an Internet Access Wizard,
Advanced.
Wire Tapping Connecting to a network and monitoring all traffic. Most wire tapping features can only monitor
the traffic on their subnet.
Worm A program that seeks access into other computers. Once a worm penetrates another computer it
continues seeking access to other areas. Worms are often equipped with dictionary-based password crackers and other cracker tools that enable them to penetrate more systems. Worms often steal or vandalize computer data.
WWW (World Wide Web) -- Frequently used when referring to "The Internet", WWW has two major
meanings - First, loosely used: the whole constellation of resources that can be accessed using Gopher, FTP, HTTP, telnet, USENET, WAIS and some other tools. Second, the universe of hypertext servers (HTTP servers).
Page 53
Prestige 964 Cable Router
Index O
Index
ARP, 1-3 BackOrifice, E Bridge, 1-1 Broadband Access Security Gateway, xii Brute Force Hacking, E
Cable Router Initialization, 2-5 CATV Coaxial Cable Connection, 2-5
Data Over Cable Service Interface Specification,
1-1
DHCP (Dynamic Host Configuration Protocol), 1-3 DOCSIS, 1-1, 1-3 Domain Name, G
downstream signaling rates, 1-3 Ethernet Cables, 2-5 Hardware Installation, 2-1
HTTP, H, K, N Humidity, 1-5 hybrid fiber coaxial cable, 1-1 ICMP, 1-3 Initial Setup, 2-1 Installation Requirements, 2-3 IP routing, 1-3 IP Spoofing, L LEDs, 2-1, 2-6 MCNS, 1-1 Multimedia Cable Network System, 1-1
Network Address Translation (NAT), 1-3 Network Configuration (computer), 2-6 Overview, 1-1 Packing List Card, xii power adapter, 2-5 power supply, 1-1 Private, M Product Specifications, 1-4, 1-5 Read Me First, xii Related Documentation, xii
Remote Diagnostic, 1-3 RIP1, 1-3 RIP2, 1-3
Routing Mode and Bridge Mode, 1-1 Safety Instructions, C Safety Instructions, C Server, F, K, L SNMP ( Simple Network Management Protocol),
1-3
Software Remotely Upgradeable, 1-3 Support Disk, xii TCP, 1-3 TCP/IP, E, H, I, L, M Temperature, 1-5
TFTP, 1-3 upstream signaling rates, 1-3
Loading...