ZyXEL Prestige 964 cable router User's Guide
Below you will find brief information for Cable Router Prestige 964. The Prestige is a high bandwidth Internet access Cable Modem with integrated router device that connects your home/office LAN to the Internet using the hybrid fiber coaxial (HFC) cable; the same cable that brings television into a cable television (CATV) subscriber's home. It features 5 Ethernet and 1 USB ports, allowing up to 6 computers to connect directly to the HFC cable network for high-speed Internet access without an external Ethernet hub. This makes it ideal for cable users with multiple computers and offers a cost-effective alternative to leased lines.
advertisement
Assistant Bot
Need help? Our chatbot has already read the manual and is ready to assist you. Feel free to ask any questions about the device, but providing details will make the conversation more productive.
Prestige 964
Cable Router
User's Guide
Ver 3.60.08
December, 2003
Prestige 964 Cable Router
Copyright
Prestige 964 Cable Router
Copyright © 2003 by ZyXEL Communications Corporation.
The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications
Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein.
Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice.
Trademarks
Trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners.
Copyright iii
Prestige 964 Cable Router
Federal Communications Commission (FCC)
Interference Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions:
This device may not cause harmful interference.
This device must accept any interference received, including interference that may cause undesired operations.
This equipment has been tested and found to comply with the limits for a CLASS B digital device pursuant to
Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
If this equipment does cause harmful interference to radio/television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and the receiver.
Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
Notice 1
Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.
Notice 2
Shielded RS-232 cables are required to be used to ensure compliance with FCC Part 15, and it is the responsibility of the user to provide and use shielded RS-232 cables. iv FCC Statement
Prestige 964 Cable Router
Information for Canadian Users
The Industry Canada label identifies certified equipment. This certification means that the equipment meets certain telecommunications network protective, operation, and safety requirements. The Industry Canada does not guarantee that the equipment will operate to a user's satisfaction.
Before installing this equipment, users should ensure that it is permissible to be connected to the facilities of the local telecommunications company. The equipment must also be installed using an acceptable method of connection. In some cases, the company's inside wiring associated with a single line individual service may be extended by means of a certified connector assembly. The customer should be aware that the compliance with the above conditions may not prevent degradation of service in some situations.
Repairs to certified equipment should be made by an authorized Canadian maintenance facility designated by the supplier. Any repairs or alterations made by the user to this equipment, or equipment malfunctions, may give the telecommunications company cause to request the user to disconnect the equipment.
For their own protection, users should ensure that the electrical ground connections of the power utility, telephone lines, and internal metallic water pipe system, if present, are connected together. This precaution may be particularly important in rural areas.
Caution
Users should not attempt to make such connections themselves, but should contact the appropriate electrical inspection authority, or electrician, as appropriate.
Note
This digital apparatus does not exceed the class A limits for radio noise emissions from digital apparatus set out in the radio interference regulations of Industry Canada.
Canadian Users v
Prestige 964 Cable Router
ZyXEL Limited Warranty
ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials,
ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product is modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind of character to the purchaser.
To obtain the services of this warranty, contact ZyXEL's Service Center; refer to the separate Warranty Card for your Return Material Authorization number (RMA). Products must be returned Postage Prepaid. It is recommended that the unit be insured when shipped. Any returned products without proof of purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products will be shipped by ZyXEL to the corresponding return address, Postage Paid (USA and territories only). If the customer desires some other return destination beyond the U.S. borders, the customer shall bear the cost of the return shipment. This warranty gives you specific legal rights, and you may also have other rights that vary from state to state. vi Warranty
Prestige 964 Cable Router
Customer Support
When you contact your customer support representative please have the following information ready: n Prestige Model and serial number. n n
Warranty Information.
Date you received your Prestige.
Brief description of the problem and the steps you took to solve it. n
Method
LOCATION
Worldwide e-mail – Support/Sales [email protected] [email protected].
Telephone/Fax
+886-3-578-3942
+886-3-578-2439
Web Site/FTP Site www.zyxel.com www.europe.zyxel.co
m ftp.europe.zyxel.com
Regular Mail
ZyXEL Communications
Corp., 6 Innovation Road II,
Science-Based Industrial Park,
HsinChu, Taiwan.
North America [email protected]
m.tw [email protected] [email protected]
+886-3-480-8163
+886-3-499-3173
+1-714-632-0882
800-255-4101
+1-714-632-0858 www.zygate.com.tw ftp.zygate.com.tw www.zyxel.com ftp.zyxel.com
ZyGATE Communications,
Inc., 2F, No.48, Lung-Chin
Road, Lung-Tan, Taoyuan,
Taiwan.
ZyXEL Communications, Inc.,
1650 Miraloma Avenue,
Placentia, CA 92870, U.S.A.
Denmark
Malaysia
Norway
Sweden
Shanghai
Germany [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected]
+45-3955-0700
+45-3955-0707
+603-795-44-688
+603-795-35-407
+47-22-80-6180
+47-22-80-6181
+46(0)-31-744-3810
+46(0)-31-744-3811
+86-21-58873264
+86-21-58873316 www.zyxel.dk ftp.zyxel.dk www.zyxel.com.my www.zyxel.no www.zyxel.se
+49-2405-6909-0
0180-5213247
Tech Support hotline www.zyxel.de
0180-5099935
RMA/Repair hotline
+49-2405-6909-99 ftp.europe.zyxel.com
ZyXEL Communications A/S,
Columbusvej 5, 2860 Soeborg,
Denmark.
Lot B2-06, PJ Industrial Park,
Section 13, Jalan Kemajuan,
46200 Petaling Jaya Selangor
Darul Ehasn, Malaysia
ZyXEL Communications A/S
Nils Hansens vei 13. N-0667
Oslo, Norway
ZyXEL Communications A/S
Anders Carlssons Gata 7417 55
Goteborg Sweden
ZyXEL(Shanghai)office
23/F,B Majesty Building
No.138 Pudong Avenue
Pudong Area, Shanghai, China
ZyXEL Deutschland GmbH.,
Adenauerstr. 20/A4
D-52146 Wuerselen,
Germany.
Customer Support vii
Prestige 964 Cable Router
Table of Contents
Copyright.......................................................................................................................................iii
Federal Communications Commission (FCC) Interference Statement...................................... iv
Information for Canadian Users ................................................................................................... v
ZyXEL Limited Warranty.............................................................................................................. vi
Customer Support ...................................................................................................................... vii
Table of Contents........................................................................................................................viii
List of Figures............................................................................................................................... x
List of Tables................................................................................................................................ xi
Preface .........................................................................................................................................xii
Chapter 1 Getting to Know Your Prestige................................................................................. 1-1
1.1
1.2
1.3
Overview of the Prestige ..................................................................1-1
5-Port Switch & USB interface .........................................................1-1
Operation Mode ...............................................................................1-1
1.3.1 Bridge Mode..............................................................................1-2
1.3.2 IP Sharing Mode .......................................................................1-2
1.3.3 Static IP Mode...........................................................................1-2
1.4
1.5
Key Features of the Prestige 964.....................................................1-3
Product Specifications......................................................................1-4
Chapter 2 Hardware Installation and Initial Setup.................................................................... 2-1
2.1
2.2
2.3
2.4
2.5
Front Panel LEDs and Back Panel Ports .........................................2-1
Additional Installation Requirements................................................2-3
2.2.1 Setting up Your Windows 95/98/Me Computer..........................2-3
2.2.2 Setting up Your Windows NT/2000/XP Computer.....................2-4
2.2.3 Setting up Your Macintosh Computer........................................2-4
Factory Default Settings...................................................................2-5
Initializing the Cable Sharing Gateway.............................................2-5
Network Configuration of Your Computer.........................................2-6
2.6
2.7
Router Configuration........................................................................2-6
Power On Your Prestige...................................................................2-6
Chapter 3 Web Based Management .......................................................................................... 3-1
3.1
3.2
Introduction ......................................................................................3-1
Basic Page.......................................................................................3-3 viii Table of Contents
Prestige 964 Cable Router
3.3 Advanced Page................................................................................3-4
3.3.1 Web Management – Advanced: Options...................................3-5
3.3.2 Web Management – Advanced: IP Filtering..............................3-5
3.3.3 Web Management – Advanced: MAC Filtering .........................3-7
3.3.4 Web Management – Advanced: Port Filtering...........................3-8
3.3.5 Web Management – Advanced: Forwarding .............................3-9
3.3.6 Web Management – Advanced: Port Triggers.........................3-10
Chapter 4 Troubleshooting........................................................................................................ 4-1
4.1 Problems with Cable Connection .....................................................4-1
4.2 Problems with Internet Access .........................................................4-1
Appendix A Hardware Specifications ..........................................................................................A
Appendix B Important Safety Instructions ..................................................................................C
Glossary of Terms......................................................................................................................... E
Index..............................................................................................................................................O
Table of Contents ix
Prestige 964 Cable Router
List of Figures
Figure 1-1 Prestige 964 Operation Mode .................................................................................. 1-2
Figure 2-1 Prestige 964 front panel........................................................................................... 2-1
Figure 2-2 Prestige Rear Panel and Connections..................................................................... 2-2
Figure 3-1 Web Management - User Login Page ...................................................................... 3-1
Figure 3-2 Web Management - Status ....................................................................................... 3-2
Figure 3-3 Web Management - Basic ........................................................................................ 3-3
Figure 3-4 Web Management – Advanced: Options ................................................................. 3-4
Figure 3-5 Web Management – Advanced: IP Filtering ............................................................ 3-6
Figure 3-6 Web Management – Advanced: MAC Filtering........................................................ 3-7
Figure 3-7 Web Management – Advanced: Port Filtering......................................................... 3-8
Figure 3-8 Web Management – Advanced: Forwarding ........................................................... 3-9
Figure 3-9 Web Management – Advanced: Port Triggers ...................................................... 3-10 x List of Figures/Tables
Prestige 964 Cable Router
List of Tables
Table 1-1 DOCSIS Specifications.............................................................................................. 1-4
Table 1-2 EuroDOCSIS Specifications ...................................................................................... 1-4
Table 1-3 General Specifications .............................................................................................. 1-5
Table 2-1 Prestige 964 LED Functions...................................................................................... 2-1
Table 2-2 Prestige factory default ............................................................................................. 2-5
Table 3-1 Web Management – Advanced: Options................................................................... 3-5
Table 4-1 Troubleshooting Cable Connection.......................................................................... 4-1
Table 4-2 Troubleshooting Internet Access.............................................................................. 4-1
List of Figures/Tables xi
Prestige 964 Cable Router
Preface
About Your Cable Router
Congratulations on your purchase of the Prestige 964 Cable Router.
The Prestige is a broadband cable access modem integrated with IP routing functionality, USB interface,
5-port auto crossover 10/100M auto-negotiating switch and network management features. It is designed for: n n
Home offices and small businesses with cable access service via Ethernet port as Internet access media.
Multiple office/department connections. n E-commerce/EDI applications. n Your Prestige is easy to install and to configure.
The feature rich command sets allow you to access and configure your Prestige over a telnet connection.
About This User's Guide
This manual is designed to guide you through the telnet configuration of your Prestige for its various applications.
Regardless of your particular application, it is important that you follow the steps outlined in Chapter 2 to connect your Prestige to your LAN. You can then refer to the appropriate chapters of the manual, depending on your applications.
Related Documentation
Ø Support Disk
More detailed information about the Prestige and examples of its use can be found in our included disk
(as well as on the www.zygate.com.tw web site). This disk contains information on configuring your
Prestige for Internet Access, a General FAQ, an Advanced FAQ, Applications Notes, Troubleshooting,
Commands Sets Reference as well as bundled software.
Ø Read Me First
Our Read Me First is designed to help you get your Prestige up and running right away. It contains a detailed easy to follow connection diagram, Prestige default settings, handy checklists, information on setting up your PC, and information on configuring your Prestige for Internet access.
Ø Packing List Card
Finally, you should have a Packing List Card, which lists all items that should have come with your
Prestige.
Ø ZyGATE Web and FTP Server Sites
You can access release notes for firmware upgrades and other information at ZyGATE web and FTP server sites. Refer to the Customer Support page in this User’s Guide for more information. xii Preface
Prestige 964 Cable Router
Syntax Conventions n n
For brevity’s sake, we will use “e.g.” as a shorthand for “for instance” and “i.e.” for “that is” or “in other words” throughout this manual.
The Prestige 964 may be referred to as the Prestige or the P964 in this user’s guide.
Preface xiii
Prestige 964 Cable Router
Chapter 1
Getting to Know Your Prestige
This chapter provides functional overviews, key features, applications and product specifications of your Prestige
1.1 Overview of the Prestige
The Prestige is a high bandwidth Internet access Cable Modem with integrated router device that connects your home/office LAN to the Internet using the hybrid fiber coaxial (HFC) cable; the same cable that brings television into a cable television (CATV) subscriber’s home. Through 5 Ethernet and 1 USB ports of the
Prestige, up to 6 computers can be directly connected to the HFC cable network for high-speed access to the
Internet without an external Ethernet hub. It is ideal for cable users with more than one computer and is an excellent alternative to the more expensive leased lines.
Prestige 964 provide 2 models for supporting both the Multimedia Cable Network System (MCNS) Data Over
Cable Service Interface Specification (DOCSIS) and EuroDOCSIS specifications in 1.0/1.1/2.0 version.
MCNS is a consortium of cable television companies whose goal is to create standards for interoperable data-over-cable systems.
The Prestige operates with one external 9V DC-input power supply.
1.2 5-Port Switch & USB interface
Prestige 964 has integrated 5-port Ethernet switch and one USB 1.1 interfaces concurrently. The 5-port switch provides auto crossover MDI/MDI-x function and is 10/100M bps Ethernet auto-negotiating. The physical user interfaces of P964 provides you with the capability of connecting up to 6 stations without the need of external Ethernet hub/switch. If you have more than 6 computers, to choose a hub/switch can easily expand the number of LAN users.
1.3 Operation Mode
According to DOCSIS/EuroDOCSIS specification, a cable modem is basically a bridge device. It can be configured to serve specific CPEs by provisioning their MAC addresses. Only traffic to/from these CPEs will be forwarded. The others will be filtered. It can also be configured to serve specific numbers of CPEs.
However, these services are provided by your cable operator. They have to setup one account for each CPE.
For most Internet users, they have only one access account. If they have two computers' at home and want to share this account for two or more users, they have to add another Internet sharing device, like a router.
The Prestige 964 is equivalent to a cable modem plus a router. This is very suitable for SOHO and SME for
Internet sharing.
P964 Cable Router has three major operation modes as shown in Figure 1-1.
Getting to Know Your Prestige 1-1
Prestige 964 Cable Router
Bridge
Mode
IP Sharing
Mode
Static IP
Mode
Basic Static IP
Dynamic WAN
IP
Static IP with
Public DHCP
Static IP with
NAT Only
Static IP w/ NAT and Private
DHCP
Figure 1-1 Prestige 964 Operation Mode
1.3.1 Bridge Mode
In Bridge mode, P964 operates just like a normal cable modem. All operation is compliant to
DOCSIS/EuroDOCSIS specifications.
1.3.2 IP Sharing Mode
In IP Sharing mode, the P964 operates as a NAT router. It requires one public IP address from MSO’s DHCP pool and provides private IP address space for LAN users. The public IP can be static assigned or dynamically assigned through DHCP.
1.3.3 Static IP Mode
In Static IP mode, P964 provide a routed subnet on its Ethernet interface. A public IP subnet can be assigned at the Ethernet interface such that the end user can have a static assigned subnet. At the same time, the LAN users can also use private IP addresses to get on Internet.
1-2 Getting to Know Your Prestige
Prestige 964 Cable Router
1.4 Key Features of the Prestige 964
The following are the key features of the Prestige 964:
DOCSIS/EuroDOCSIS compliant cable modem
Provides interoperability with other DOCSIS compliant cable modems and cable headend equipment.
Peak downstream signaling rates of 43 Mbps and upstream signaling rates of 30 Mbps
Access the Internet with high performance network capability.
DOCSIS/EuroDOCSIS 2.0 cable systems are capable of providing signaling rate of up to
43/55 Mbps and 30 Mbps for downstream and upstream respectively. This bandwidth however, is shared by several subscribers because there are very few computers today that can connect to a network at such high speeds. Hence, typical connection speeds are 5
Mbps downstream and 1 Mbps upstream.
IP routing, TCP, ICMP, ARP, TFTP, RIP1, RIP2 with MD5
Improves network performance through containment of broadcast messages and improves security support for unicast, broadcast and multicast IP packets. The RIP supports key-string encrypted with MD5 for authentication with the CMTS.
5-port Auto-negotiating and Auto MDI/MDI-X 10/100 Mbps Ethernet Switch
The 5-port LAN interface automatically detects if it is on a 10 Mbps or a 100 Mbps Ethernet.
56-bit DES Baseline Privacy
Software Remotely Upgradeable
The software and configuration information is downloadable from the cable headend to the Prestige. This eliminates the need for a cable technician's visit to install software upgrades.
Built-in Diagnostic Features
P964 support remote troubleshooting via CMTS-initiated diagnostics, eliminating visit by a technician. The front panel status indicator LEDs and web based status monitoring are also incorporated to easy diagnostics from LAN interfaces.
SNMP
SNMP (Simple Network Management Protocol) is a protocol used for exchanging management information between network devices. SNMP is a member of TCP/IP protocol suite. Your Prestige supports SNMP agent functionality, which allows a manager station to manage and monitor the Prestige through the network. The
Prestige supports SNMP version one, two, and three. (SNMP v1, v2 and v3).
Network Address Translation (NAT)
NAT (Network Address Translation - NAT, RFC 1631) allows the translation of an Internet Protocol address used within one network to a different IP address known within another network.
DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol) allows the individual client computers to obtain the TCP/IP configuration at start-up from a centralized DHCP server. The Prestige has built-in DHCP server capability, enabled by default, which means it can assign IP addresses, an IP default gateway and DNS servers to all systems that support the DHCP client.
Getting to Know Your Prestige 1-3
Prestige 964 Cable Router
Web based Management & Configuration
The Prestige supports web based management and configuration interface.
Text based configuration file
The Prestige supports text based configuration file download and hence makes router deployment simplified.
TACACS+ server support
The function allows access control to all interfaces for MSO to connect to TACACS+ server for telnet authentication.
1.5 Product Specifications
Table 1-1 ~ Table 1-3 lists the Prestige 964 specifications.
Table 1-1 DOCSIS Specifications
CLASS
Operating Frequency
Modulation
DOWNSTREAM
88MHz ~ 860MHz
64/256QAM
Channel Width
Input Impedance
Maximum Data Rates
Receive Input Level
Transmission Output Power
6MHz
75 ohms Nominal
42.88 Mbps
–15 dBmV to +15 dBmV
FEATURES
UPSTREAM
5MHz ~ 42MHz
QPSK or 8*/16/32*/64*/128*QAM
200/400/800/1600/3200/6400 kHz
75 ohms Nominal
30 Mbps**
A-TDMA:
+8 dBmV ~ +54 dBmV (32/64QAM)
+8 dBmV ~ +55 dBmV (8/16 QAM)
+8 dBmV ~ +58 dBmV (QPSK)
S-CDMA:
+8 dBmV ~ +53 dBmV (all modulation)
Reed Solomon Encoder FEC ITU-T J.83 Annex B
Encryption 56-bit DES 56-bit DES
* With A-TDMA or S-CDMA enabled CMTS
** Speed of 30Mbps is attainable only with A-TDMA or S-CDMA technology
Table 1-2 EuroDOCSIS Specifications
1-4 Getting to Know Your Prestige
Prestige 964 Cable Router
CLASS
Operating Frequency
Modulation
Channel Width
Input Impedance
Maximum Data Rates
Receive Input Level
FEATURES
DOWNSTREAM UPSTREAM
108 MHz ~ 862 MHz
64 QAM and 256 QAM
8 MHz
75 ohms Nominal
5 MHz ~ 65 MHz
QPSK and 16 QAM
200/400/800/1600/3200/6400 KHz
75 ohms Nominal
55.6 Mbps
+43 dBuV to +73 dBuV (64QAM)
+47 dBuV to +77 dBuV (256QAM)
30 Mbps**
Transmission Output Power A-TDMA:
+68 dBuV ~ +114 dBuV (32/64QAM)
+68 dBuV ~ +115 dBuV (8/16 QAM)
+68 dBuV ~ +118 dBuV (QPSK)
S-CDMA:
+68 dBuV ~ +113 dBuV (all modulation)
FEC
Encryption
ITU-T J.83 Annex A
56-bit DES
Reed Solomon Encoder
56-bit DES
* With A-TDMA or S-CDMA enabled CMTS
** Speed of 30Mbps is attainable only with A-TDMA or S-CDMA technology
Number of LAN users
Power Requirements
Operating Requirements
Dimensions
Power Adapter
Table 1-3 General Specifications
Up to 253
9 VDC @1.5 Amps Max.
Temperature: 0ºC to 40ºC (32ºF to 104ºF) (Please see NOTE)
Humidity: 5 % to 90 % (non-condensing)
197(W) x 143(D) x 31(H) mm
7.76(W) x 5.63(D) x 1.22(H) inches
110/220V AC, 50~60 Hz
NOTE: To keep the Prestige operating at optimal internal temperature, keep the bottom, sides and rear of the Prestige clear of obstructions and away from the exhaust of other equipment. Don’t stack the Prestige together in order to assure the safety.
Getting to Know Your Prestige 1-5
Prestige 964 Cable Router
Chapter 2
Hardware Installation and Initial Setup
This chapter shows the procedures for installing and starting the Prestige.
2.1 Front Panel LEDs and Back Panel Ports
The Prestige provides LEDs as status indicator for diagnostics purpose. The following figure and table describe the functions of LEDs on the front panel of Prestige:
Figure 2-1 Prestige 964 front panel
Table 2-1 Prestige 964 LED Functions
FUNCTION NAMING
Power
System
Cable data activity
PWR
SYS
DATA
COLOR
Green
Green or
Orange
LAN link/activity
USB
LAN 1~5 Green (10M) or
Orange (100M)
USB Green
Green
LED DESCRIPTION
On: Power On
Off: Power Off
On (Green): System ready and running successfully
On (Orange): System is loading the configuration
Flashing (Green): System rebooting
Off: System not ready
On: LAN 1~5 Ethernet port link successful
Flashing: LAN 1~5 is Sending or Receiving
Off: LAN 1~5 Ethernet port not ready
On: USB link successful
Flashing: Sending or Receiving
Off: USB not ready
Flashing: WAN port (Cable Interface) Tx/Rx
Off: Connection is idle
Hardware Installation 2-1
Prestige 964 Cable Router
Cable link status
CABLE Green On: The Prestige is registered successfully with Cable Modem
Terminal System (CMTS)
Slow Flash (2 seconds interval): The Prestige is scanning downstream channel
Fast Flash (1 second interval): The Prestige is locked on to downstream channel and is ranging and registering with CMTS
The SYS LED is always GREEN while system is ready or rebooting. The SYS LED will become
ORANGE when the system is loading its configuration. Don’t power off or reset your Prestige during the SYS LED is becoming ORANGE. You can only do so after the SYS LED returns
GREEN. Otherwise, your Prestige will not work properly anymore.
The next figure shows the rear panel of your Prestige and the connection diagram.
2-2
Figure 2-2 Prestige Rear Panel and Connections
Hardware Installation
Prestige 964 Cable Router
2.2 Additional Installation Requirements
In addition to the contents of your package, there are other hardware and software requirements you need before you can install and use your Prestige. These requirements include:
1. You must have a network interface card (NIC) installed and/or USB interface support on your computer and configure the TCP/IP protocol stack properly.
2. If using USB connection, you have to install the USB driver. Insert the supporting CD into the CD-ROM drive before you connect the USB port of Prestige to the USB port on your computer and power on your
Prestige at the first time. System may automatically hint you the installation guide for USB driver and specify the directory where USB driver is stored according to the step-by-step instruction after the
CD-ROM drive is ready to read. The USB driver supports Windows 98SE, ME, 2000 and XP.
3. An ISP account. Before installing your Prestige, you need to establish an internet access account with your local cable operator. They might ask for your cable router’s HFC MAC address and model number.
Please locate the MAC address at the back of your Prestige.
NOTE: HFC MAC address can be found on the bar code sticker. Use the HFC MAC address when registering with your cable company.
2.2.1 Setting up Your Windows 95/98/Me Computer
Installing TCP/IP Components
1. Click Start, Settings, Control Panel and double-click the Network icon.
2. The Network window Configuration tab displays a list of installed components.
To install TCP/IP: a. In the Network window, click Add. b. Select Protocol and then click Add. c. Select Microsoft from the list of manufacturers. d. Select TCP/IP from the list of network protocols and then click OK.
Configuring TCP/IP
1. In the Network window Configuration tab, select your network adapter’s TCP/IP entry and click
Properties .
2. Click the IP Address tab. Click Obtain an IP address automatically.
3. Click the DNS Configuration tab. Select Disable DNS.
4. Click the Gateway tab. Highlight any installed gateways and click Remove until there are none listed.
5. Click OK to save and close the TCP/IP Properties window.
6. Click OK to close the Network window.
7. Turn on your Prestige and restart your computer when prompted. Insert the Windows CD if prompted.
Verifying TCP/IP Properties
1. Click Start and then Run. In the Run window, type "winipcfg" and then click OK to open the IP
Hardware Installation 2-3
Prestige 964 Cable Router
Configuration window.
2. Select your network adapter. You should see your computer's IP address, subnet mask and default gateway.
2.2.2 Setting up Your Windows NT/2000/XP Computer
Configuring TCP/IP
1. Click Start, Settings, Network and Dial-up Connections and right-click Local Area Connection or the connection you want to configure and click Properties. For Windows XP, click start, Control Panel,
Network and Internet Connections and then Network Connections. Right-click the network connection you want to configure and then click Properties.
2. Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and click Properties.
3. The Internet Protocol TCP/IP Properties window opens. Click Obtain an IP address automatically.
4. Click Obtain DNS server automatically.
5. Click Advanced, IP Settings tab and remove any installed gateways, then click OK.
6. Click OK to save and close the Internet Protocol (TCP/IP) Properties window.
7. Click OK to close the Local Area Connection Properties window.
8. Turn on your Prestige and restart your computer (if prompted).
Verifying TCP/IP Properties
1. Click Start, Programs, Accessories and then Command Prompt.
2. In the Command Prompt window, type "ipconfig" and then press ENTER. The window displays information about your IP address, subnet mask and default gateway.
2.2.3 Setting up Your Macintosh Computer
Configuring TCP/IP Properties
1. Click the Apple menu, Control Panel and double-click TCP/IP to open the TCP/IP Control Panel.
2. Select Ethernet from the Connect via list.
3. Select Using DHCP Server from the Configure list.
4. Close the TCP/IP Control Panel.
5. Click Save if prompted, to save changes to your configuration.
6. Turn on your Prestige and restart your computer (if prompted).
Verifying TCP/IP Properties
Check your TCP/IP properties in the TCP/IP Control Panel.
2-4 Hardware Installation
Prestige 964 Cable Router
2.3 Factory Default Settings
The Prestige is configured as a IP sharing router with NAT and DHCP enabled and with following factory default.
Items
LAN IP Address
Table 2-2 Prestige factory default
Settings
192.168.1.1
Subnet Mask
DHCP IP Pool
Web username
255.255.255.0
192.168.1.33 – 192.168.1.64 user
Web password 1234
The default might be different from different cable operators. Please consult with your cable Internet service provider for any change.
2.4 Initializing the Cable Sharing Gateway
This section outlines how to connect your Prestige to the LAN and the cable network.
Step 1. Preparing the CATV Coaxial Cable Connection
Locate the coaxial cable at the installation site and move the cable end, or install a two-way splitter as necessary to provide a connection near the Prestige cable modem location.
Step 2. Connecting the Prestige to the Cable System
Connect the Prestige to the cable port using an F-type connector. (If the quality or general condition of the coaxial cable at the installation site is in question, we recommended that you replace the coaxial cable). The cable port on the Prestige is labeled "CABLE”.
Step 3. Connecting Ethernet Cable(s) and/or USB cable to the Prestige
If you do not have an Ethernet interface card (NIC) in your computer, please install one or use the USB connectivity. The Ethernet interface of your Prestige support 10/100M auto-negotiating and auto MDI/MDI-X function. You can use any type of Ethernet cable to connect it to your computer directly or through an external switch/hub.
Step 4. Connecting the Power Adapter to your Prestige
Connect the power adapter to the port labeled POWER on the rear panel of your Prestige.
Step 5. Prestige Initialization
The Prestige is powered on whenever you connect the power adapter to the power outlet. It will initialize the system and start to connect with headend CMTS. When the CABLE LED shines steadily, the Prestige is ready to handle data traffic. The first initialization process might take several minutes because it will scan for the proper downstream and upstream channels. When the P964 is ready, it will memorize the channel attributes. If
Hardware Installation 2-5
Prestige 964 Cable Router you power cycle the P964, the next connection process will be faster.
2.5 Network Configuration of Your Computer
You must have a network interface card installed on your computer and configure the TCP/IP protocol stack properly. For Windows® 95/98/NT/2000, please configure your computer as a DHCP client. The IP address identifies the computer on the network and enables the headend CMTS to route data to and from your computer.
For Windows ® 95/98, you can use the following command to verify the TCP/IP configuration.
Winipcfg
For Windows ® NT/2000/XP, you can use the following command.
Ipconfig
2.6 Router Configuration
You do not need to ask your cable company for a special configuration. The Prestige can act as a DHCP client to acquire an IP address from the headend. Besides, it can act as a DHCP server at the LAN port and assign an
IP address to your computers on the LAN subnet. What you have to do is to configure the LAN port with the proper IP address and netmask. If you already have a DHCP server on your LAN subnet, you can disable the
DHCP server in the Prestige but you have to assign an IP address/netmask for the LAN port.
2.7 Power On Your Prestige
At this point, you should have connected at least one of the LAN ports and/or USB port, the cable port and the power port to the appropriate devices or lines. Plug the power adapter into a wall outlet.
When connected, it is powered on, the Prestige executes an automatic installation procedure:
1. Scans and locks on to the service provider’s downstream frequency.
2. Obtains timing, signal, power level, authentication, addressing, and other operational parameters from the headend CMTS.
3. Downloads its configuration file and is then operational.
During the initialization, the LEDs on the Prestige turns on:
1. The Power LED should be ON.
2. The CABLE LED will be flashing on a 2 seconds on/off cyclic duration while scanning the downstream channel and then on a 1 second on/off cyclic duration when it has locked on to a downstream channel and is communicating with the headend CMTS. Once the cable connection is complete it will remain
ON.
3. The DATA LED flashes when the cable downstream, cable upstream is receiving and transmitting data.
It will turn OFF when the connection is idle.
4. The LAN1 to LAN5 or USB LEDs (depending on the port connected) will be ON if Ethernet/USB link is successful and flashing while sending/receiving data.
2-6 Hardware Installation
Prestige 964 Cable Router
Chapter 3
Web Based Management
This chapter describes the web based management & configuration interface.
3.1 Introduction
The Prestige cable router provides users to configure LAN settings including DHCP server IP, netmask, DHCP clients’ start IP address and the number of CPEs. To configure the LAN setting, users use a PC to browse the
LAN IP of the cable router. The web functions only open to the LAN, no access from HFC cable is allowed.
When browsing stared, the cable router prompts the following windows for user to login.
Figure 3-1 Web Management - User Login Page
After input username/password, click “OK” and the following page will be displayed.
Web Based Management 3-1
Prestige 964 Cable Router
Figure 3-2 Web Management - Status
There are three tags “Status”, “Basic”, and “Advanced” as shown in in the web management interface of
Prestige. The “Status” tag will show the connection status and software information. “Basic” and “Advanced” tags are for the configuration to LAN interface.
1. “Status”
The “Status” tag will show the connection status and software information of your Prestige.
2. “Basic”
Click “Basic”, users can set DHCP server IP, netmask, and etc.
3. “Advanced”
This function especially for users who wants more control of LAN interface. For example, users can block
3-2 Web Based Management
Prestige 964 Cable Router packet from some CPEs to access the Internet. Users can also open some well known ports or some special port for accessing from Internet.
The “Connection” icon in Figure 3-2 shows the connection status of the cable router. Users can also click the
“Software” icon in this page to show the software information of the box.
3.2 Basic Page
When click “Basic” tag, the following page is shown.
Figure 3-3 Web Management - Basic
From the “Basic” page, users can set the DHCP server IP for the LAN as well as the network, netmask,
DHCP’s starting IP, and the number of CPEs. User even can set lease time for the CPEs. But to update these above settings may prevent users from accessing Internet. Do not update it unless you can handle it.
Web Based Management 3-3
Prestige 964 Cable Router
3.3 Advanced Page
The “Advanced” is a more powerful tool to set more advanced features for the Prestige 964 cable router. When click the “Advanced” tag, the following page “Advanced- Options” is shown.
3-4
Figure 3-4 Web Management – Advanced: Options
Web Based Management
Prestige 964 Cable Router
3.3.1 Web Management – Advanced: Options
The “Option” icon allows configuration of advanced features of the Prestige.
Function
WAN Blocking
Ipsec PassThrough
PPTP PassThrough
Multicast Enable
Table 3-1 Web Management – Advanced: Options
Description
Do not response to some ICMP’s probing packets, e.g. ping, traceroute and etc.
Allow users to execute IPSec VPN client in the workstations
Allow users to execute PPTP client in the workstations
Allows users to enable or disable multicast IGMP protocol
3.3.2 Web Management – Advanced: IP Filtering
The “IP Filtering” in the “Advanced” page allows configuration of IP address filters in order to block Internet traffic to specific network devices on the LAN. Click “IP Filtering” icon, the screen is displayed.
Web Based Management 3-5
Prestige 964 Cable Router
Figure 3-5 Web Management – Advanced: IP Filtering
Users can block specific CPEs to access the Internet. For example, there is a CPE whose IP is 192.168.10.20, users can set it in the above screen and click “apply”. The CPE will no more can access the Internet.
3-6 Web Based Management
Prestige 964 Cable Router
3.3.3 Web Management – Advanced: MAC Filtering
“MAC Filtering” allows configuration of MAC address filters in order to block Internet traffic to specific network devices on the LAN. Click “MAC Filtering” icon, the screen is displayed.
Figure 3-6 Web Management – Advanced: MAC Filtering
Users can block specific CPEs to access the Internet. It has the same effect as “IP Filtering” except this function use MAC address instead of IP address.
Web Based Management 3-7
Prestige 964 Cable Router
3.3.4 Web Management – Advanced: Port Filtering
“Port Filtering” allows configuration of port filters in order to block specific Internet services to all devices on the LAN. Click “Port Filtering” icon, the screen is displayed.
Figure 3-7 Web Management – Advanced: Port Filtering
The “Port Filtering” control CPEs not to access the Internet to get the services which is provided through the ports.
3-8 Web Based Management
Prestige 964 Cable Router
3.3.5 Web Management – Advanced: Forwarding
The “Forwarding” page allows for incoming requests on specific port numbers to reach web servers, FTP servers, mail servers, etc. so they can be accessible from the public Internet. Click “Forwarding” icon, the screen is displayed.
Figure 3-8 Web Management – Advanced: Forwarding
Web Based Management 3-9
Prestige 964 Cable Router
3.3.6 Web Management – Advanced: Port Triggers
This “Port Triggers” function allows configuration of dynamic triggers to specific devices on the LAN. This allows for special applications that require specific port numbers with bi-directional traffic to function properly.
Applications such as video conferencing, voice, gaming, and some messaging program features may require these special settings.
3-10
Figure 3-9 Web Management – Advanced: Port Triggers
Web Based Management
Prestige 964 Cable Router
Chapter 4
Troubleshooting
This chapter covers the potential problems you may run into and the possible remedies. After each problem description, some instructions are provided to help you to diagnose.
4.1 Problems with Cable Connection
Table 4-1 Troubleshooting Cable Connection
PROBLEM
The PWR LED is off.
The SYS LED is off.
LAN (1~5) LED and USB
LED are OFF.
CORRECTIVE ACTION
Make sure that the Prestige’s power adaptor is connected to the Prestige and plugged in to an appropriate power source. Check that the power source is turned on.
If the error persists, you may have a hardware problem. In this case, you should contact your cable operator.
Turn the Prestige’s power off and then on again.
Check the LAN/USB LEDs on the front panel. One of these LEDs should be on. If they are all off, check the Ethernet cables between your Prestige and hub/station or the USB cable ace on your station.
4.2 Problems with Internet Access
PROBLEM
Cannot access e-mail or Internet Service.
Table 4-2 Troubleshooting Internet Access
CORRECTIVE ACTION
Make sure that the coaxial cable is connected to the Prestige and the Internet.
Check with your service provider to see if your account has been activated.
Check if your computer’s network configuration is correct. For a dynamic IP address assignment, you have to activate your computer’s DHCP client. And, you might need to assign a DNS server address. Refer to cable operator’s configuration information.
Check your TCP/IP parameters and verify that you have installed TCP/IP properly. If the problem persists, call your cable service provider to verify that their service is two-way and DOCSIS/EuroDOCSIS-compliant.
Troubleshooting 4-1
Prestige 964 Cable Router
All of the LEDs look right, but I still cannot access the Internet.
If the LEDs are right, then your cable router is operating properly. Try shutting down, powering off your computer and then turning it on again. This will cause your computer to re-establish communications.
Check your TCP/IP parameters and verify that you have installed TCP/IP properly.
Launch “192.168.1.1” in your web browser. Enter “user” as user name and “1234” as password to log on for more information.
4-2 Troubleshooting
Prestige 964 Cable Router
Appendix A
Hardware Specifications
Power Specification
Operation Temperature
Cable Specification for
WAN/Internet
Ethernet Specification for LAN
USB Interface Specification
LAN Cable Pin Layout:
Straight-Through
(Switch)
1 IRD +
2 IRD -
3 OTD +
6 OTD -
I/P: AC 110/220, 50/60Hz; O/P: DC 9V
0º C ~ 40º C
Female “F” Type RF Connector
10/100Mbit Half / Full Auto-negotiation and Auto MDI/MDI-X
USB 1.1
Crossover
(Adapter)
1 OTD +
(Switch)
1 IRD +
2 OTD - 2 IRD -
3 IRD + 3 OTD +
6 IRD - 6 OTD -
(Switch)
1 IRD +
2 IRD -
3 OTD +
6 OTD -
Hardware Specifications A
Prestige 964 Cable Router
Appendix B
Important Safety Instructions
The following safety instructions apply to the Prestige:
Be sure to read and follow all warning notices and instructions.
The maximum recommended ambient temperature for the Prestige is 40º(104º). Care must be taken to allow sufficient air circulation or space between units when the Prestige is installed inside a closed rack assembly.
The operating ambient temperature of the rack environment might be greater than room temperature.
Installation in a rack without sufficient airflow can be unsafe.
Racks should safely support the combined weight of all equipment.
The connections and equipment that supply power to the Prestige should be capable of operating safely with the maximum power requirements of the Prestige. In case of a power overload, the supply circuits and supply wiring should not become hazardous. The input rating of the Prestige is printed on the nameplate.
The AC adapter must plug in to the right supply voltage, i.e. 120VAC adapter for North America and 230VAC adapter for Europe. Make sure that the supplied AC voltage is correct and stable. If the input AC voltage is over 10% lower than the standard may cause the Prestige to malfunction.
Installation in restricted access areas must comply with Articles 110-16, 110-17, and 110-18 of the National
Electrical Code, ANSI/NFPA 70.
Do not allow anything to rest on the power cord of the AC adapter, and do not locate the product where anyone can walk on the power cord.
Do not service the product by yourself. Opening or removing covers can expose you to dangerous high voltage points or other risks. Refer all servicing to qualified service personnel.
Generally, when installed after the final configuration, the product must comply with the applicable safety standards and regulatory requirements of the country in which it is installed. If necessary, consult the appropriate regulatory agencies and inspection authorities to ensure compliance.
1. A rare condition can create a voltage potential between the earth grounds of two or more buildings. If products installed in separate building are interconnected, the voltage potential can cause a hazardous condition. Consult a qualified electrical consultant to determine whether or not this phenomenon exists and, if necessary, implement corrective action before interconnecting the products. If the equipment is to be used with telecommunications circuit, take the following precautions:
Never install wiring during a lightning storm.
Never install jacks in wet location unless the jack is specially designed for wet location.
Never touch uninsulated wires or terminals unless the line has been disconnected at the network interface.
Use caution when installing or modifying lines during an electrical storm. There is a remote risk of electric shock from lightning.
Safety Instructions C
Prestige 964 Cable Router
10BaseT
ARP
Authenticity
Back Door
Backbone
BackOrifice
Glossary of Terms
The 10-Mbps baseband Ethernet specification that uses two pairs of twisted-pair cabling
(Category 3 or 5): one pair for transmitting data and the other for receiving data.
Address Resolution Protocol is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address that is recognized in the local network.
Proof that the information came from the person or location that reportedly sent it. One example of authenticating software is through digital signatures.
A deliberately planned security breach in a program. Back doors allow special access to a computer or program. Sometimes back doors can be exploited and allow a cracker unauthorized access to data.
A high-speed line or series of connections that forms a major pathway within a network.
BackOrifice is a remote administration tool which allows a user to control a computer across a TCP/IP connection using a simple console or GUI application. BackOrifice is a potentially disastrous Trojan horse since it can provide the user unlimited access to a system.
Bandwidth
Bit
This is the capacity on a link usually measured in bits-per-second (bps).
(Binary Digit) -- A single digit number in base-2, in other words, either a 1 or a zero. The smallest unit of computerized data.
Brute Force Hacking A technique used to find passwords or encryption keys. Force Hacking involves trying every possible combination of letters, numbers, etc. until the code is broken.
Byte
Cable Modem (CM)
Camping Out
CATV
CDR
Channel
CHAP
Glossary
A set of bits that represent a single character. There are 8 bits in a Byte.
A cable modem is a device that enables you to hook up your computer to a local cable TV line and receive data at about 1.5 Mbps. This data rate far exceeds that of the prevalent 28.8 and 56
Kbps telephone modems, and up to 128 Kbps of ISDN that is about the data rate available to subscribers of Digital Subscriber Line (DSL) telephone service. A cable modem can be added to or integrated with a set top box that turns your TV set into an Internet channel. For computer attachment, the cable line must be split so that part of the line goes to the TV set and the other part goes to the cable modem and the computer.
A cable modem is more like a network interface card (NIC) than a computer modem. All of the cable modems attached to a cable TV company coaxial cable line communicate with a Cable
Modem Termination System (CMTS) at the local cable TV company office. All cable modems can receive only from and send signals to the CMTS, but not to other cable modems on the line.
Staying in a "safe" place once a hacker has broken into a system. The term can be used with a physical location, electronic reference, or an entry point for future attacks.
Cable TV system. Can be all coaxial- or HFC- (Hybrid Fiber Coax) based.
Call Detail Record. This is a name used by telephone companies for call related information.
A specific frequency and bandwidth combination. In the present context, it means TV channels for television services and downstream data for cable modems.
Challenge Handshake Authentication Protocol is an alternative protocol that avoids sending passwords over the wire by using a challenge/response technique.
E
Prestige 944S Cable Sharing Gateway with 4-port Switch
Cipher Text
Client
CMTS
Text that has been scrambled or encrypted so that it cannot be read without deciphering it. See
Encryption
A software program that is used to contact and obtain data from a Server software program on another computer. Each Client program is designed to work with one or more specific kinds of
Server programs, and each Server requires a specific kind of Client. A Web Browser is a specific kind of Client.
Cable Modem Termination System. A central device for connecting the cable TV network to a data network like the Internet. Normally it is placed in the headend of the cable TV system.
Cookie
Countermeasures
CPE
Cracker
Cracker Tools
Cracking
Crossover Ethernet cable
Cryptoanalysis
CSU/DSU
DCE
Decryption
Denial of Service
DHCP
F
A string of characters saved by a web browser on the user's hard disk. Many web pages send cookies to track specific user information. Cookies can be used to retain information as the user browses a web site. For example, cookies are used to 'remember' the items a shopper may have in a shopping cart.
Techniques, programs, or other tools that can protect your computer against threats.
Customer Premises Equipment. Used to describe the computer and/or other equipment that the customer may want to connect to the cable modem.
Another term for hackers. Generally, the term cracker refers specifically to a person who maliciously attempts to break encryption, software locks, or network security.
Programs used to break into computers. Cracker tools are widely distributed on the Internet. They include password crackers, Trojans, viruses, war-dialers, and worms.
The act of breaking into computers or cracking encryptions.
A cable that wires a pin to its opposite pin, for example, RX+ is wired to TX+. This cable connects two similar devices, for example, two data terminal equipment (DTE) or data communications equipment (DCE) devices.
The act of analyzing (or breaking into) secure documents or systems that are protected with encryption.
Channel Service Unit/Data Service Unit. CSUs (channel service units) and DSUs (data service units) are actually two separate devices, but they are used in conjunction and often combined into the same box. The devices are part of the hardware you need to connect computer equipment to digital transmission lines. The Channel Service Unit device connects with the digital communication line and provides a termination for the digital signal. The Data Service Unit device, sometimes called a digital service unit, is the hardware component you need to transmit digital data over the hardware channel. The device converts signals from bridges, routers, and multiplexors into the bipolar digital signals used by the digital lines. Multiplexors mix voice signals and data on the same line.
Data Communications Equipment is typically a modem or other type of communication device.
The DCE sits between the DTE (data terminal equipment) and a transmission circuit such as a phone line.
The act of restoring an encrypted file to its original state.
Act of preventing customers, users, clients or other machines from accessing data on a computer. This is usually accomplished by interrupting or overwhelming the computer with bad or excessive information requests.
Dynamic Host Configuration Protocol automatically assigns IP addresses to clients when they
Glossary
Digital Signature
DNS
DOCSIS
Domain Name
Downstream
Downstream
Frequency
DRAM
DTE
EMI
Encryption
Ethernet
Events
FAQ
FCC
Firewall
Glossary
Prestige 964 Cable Router log on. DHCP centralizes IP address management on central computers that run the DHCP server program. DHCP leases addresses for a period of time which means that addresses are made available to assign to other systems.
Digital code that authenticates whomever signed the document or software. Software, messages,
Email, and other electronic documents can be signed electronically so that they cannot be altered by anyone else. If someone alters a signed document, the signature is no longer valid. Digital signatures are created when someone generates a hash from a message, then encrypts and sends both the hash and the message to the intended recipient. The recipient decrypts the hash and original message, makes a new hash on the message itself, and compares the new hash with the old one. If the hashes are the same, the recipient knows that the message has not been changed.
Also see Public-key encryption.
Domain Name System. A database of domain names and their IP addresses. DNS is the primary naming system for many distributed networks, including the Internet.
Data over Cable Service Interface Specification. It is the dominating cable modem standard, which defines technical specifications for both cable modem and CMTS.
The unique name that identifies an Internet site. Domain Names always have 2 or more parts, separated by dots. The part on the left is the most specific, and the part on the right is the most general.
The data flowing from the CMTS to the cable modem.
The frequency used for transmitting data from the CMTS to the cable modem. Normally in the
42/65-850 MHz range depending on the actual cable plant capabilities.
Dynamic RAM that stores information in capacitors that must be refreshed periodically.
Originally, the DTE (data terminal equipment) meant a dumb terminal or printer, but today it is a computer, or a bridge or router that interconnects local area networks.
ElectroMagnetic Interference. The interference by electromagnetic signals that can cause reduced data integrity and increased error rates on transmission channels.
The act of substituting numbers and characters in a file so that the file is unreadable until it is decrypted. Encryption is usually done using a mathematical formula that determines how the file is decrypted.
A very common method of networking computers in a LAN. There are a number of adaptations to the IEEE 802.3 Ethernet standard, including adaptations with data rates of 10 Mbits/sec and
100 Mbits/sec over coaxial cable, twisted-pair cable, and fiber-optic cable. The latest version of
Ethernet, Gigabit Ethernet, has a data rate of 1 Gbit/sec.
These are network activities. Some activities are direct attacks on your system, while others might be depending on the circumstances. Therefore, any activity, regardless of severity is called an event. An event may or may not be a direct attack on your system.
(Frequently Asked Questions) -- FAQs are documents that list and answer the most common questions on a particular subject.
The FCC (Federal Communications Commission) is in charge of allocating the electromagnetic spectrum and thus the bandwidth of various communication systems.
A hardware or software "wall" that restricts access in and out of a network. Firewalls are most often used to separate an internal LAN or WAN from the Internet.
G
Prestige 944S Cable Sharing Gateway with 4-port Switch
Flash memory
FTP
Gateway
Hacker
HDLC
Headend
HFC
Host
HTTP
IANA
ICMP
Integrity internet
Internet
H
The nonvolatile storage that can be electrically erased and reprogrammed so that data can be stored, booted, and rewritten as necessary.
File Transfer Protocol is an Internet file transfer service that operates on the Internet and over
TCP/IP networks. FTP is basically a client/server protocol in which a system running the FTP server accepts commands from a system running an FTP client. The service allows users to send commands to the server for uploading and downloading files. FTP is popular on the Internet because it allows for speedy transfer of large files between two systems.
A gateway is a computer system or other device that acts as a translator between two systems that do not use the same communication protocols, data formatting structures, languages, and/or architecture.
Generally, a hacker is anyone who enjoys experimenting with technology including computers and networks. Not all hackers are criminals breaking into systems. Some are legitimate users and hobbyists. Nevertheless, some are dedicated criminals or vandals.
HDLC (High-level Data Link Control) is a bit-oriented (the data is monitored bit by bit), link layer protocol for the transmission of data over synchronous networks.
Central distribution point for a CATV system. Video signals are received here from satellites and maybe other sources, frequency converted to the appropriate channels combined with locally originated signals and rebroadcast onto the HFC plant. The headend is where the CMTS is normally located.
HFC (hybrid fiber coaxial cable) is a telecommunication technology in which fiber optic cable and coaxial cable are used in different portions of a network to carry broadband content (such as video, data and voice). Typically, a local cable TV company might use fiber optic cable from the cable headend (distribution center) to serving nodes located close to business and residential users and from these nodes use coaxial cable to individual businesses and homes. An advantage of HFC is that some of the characteristics of fiber optic cable (high bandwidth and low noise and interference susceptibility) can be brought close to the user without having to replace the existing coaxial cable that is installed all the way to the home and business.
Any computer on a network that is a repository for services available to other computers on the network. It is quite common to have one host machine provide several services, such as WWW and USENET.
Hyper Text Transfer Protocol. The most common protocol used on the Internet. HTTP is the primary protocol used for web sites and web browsers. It is also prone to certain kinds of attacks.
Internet Assigned Number Authority acts as the clearinghouse to assign and coordinate the use of numerous Internet protocol parameters such as Internet addresses, domain names, protocol numbers, and more. The IANA Web site is at http://www.isi.edu/iana.
Internet Control Message Protocol is a message control and error-reporting protocol between a host server and a gateway to the Internet. ICMP uses Internet Protocol (IP) datagrams, but the messages are processed by the TCP/IP software and are not directly apparent to the application user.
Proof that the data is the same as originally intended. Unauthorized software or people have not altered the original information.
(Lower case i) Any time you connect 2 or more networks together, you have an internet.
(Upper case I) The vast collection of inter-connected networks that all use the TCP/IP protocols
Glossary
Internet Worm
Intranet
Intruder
IP
IPCP (PPP)
IPX
IRC
ISP
LAN
Linux
Logic Bomb
MAC
MCNS
MSO
Name Resolution
NAT
NDIS
Glossary
Prestige 964 Cable Router and that evolved from the ARPANET of the late 60’s and early 70’s. The Internet now (July
1995) connects roughly 60,000 independent networks into a vast global internet
See Worm.
A private network inside a company or organization that uses the same kinds of software that you would find on the public Internet, but that is only for internal use.
Person or software interested in breaking computer security to access, modify, or damage data.
Also see Cracker.
Internet Protocol he IP (currently IP version 4, or IPv4), is the underlying protocol for routing packets on the Internet and other TCP/IP-based networks.
IP Control Protocol allows changes to IP parameters such as the IP address.
Internetwork Packet eXchange The native NetWare internetworking protocol is IPX
(Internetwork Packet Exchange). Like IP (Internet Protocol), IPX is an internetworking protocol that provides datagram services.
Internet Relay Chat. IRC was developed in the late 1980s as a way for multiple users on a system to “chat” over the network. Today IRC is a very popular way to “talk” in real time with other people on the Internet. However, IRC is also one avenue hackers use to get information from you about your system and your company. Moreover, IRC sessions are prone to numerous attacks that while not dangerous can cause your system to crash.
Internet Service Providers provide connections into the Internet for home users and businesses.
There are local, regional, national, and global ISPs. You can think of local ISPs as the gatekeepers into the Internet.
Local Area Network is a shared communication system to which many computers are attached.
A LAN, as its name implies, is limited to a local area. This has to do more with the electrical characteristics of the medium than the fact that many early LANs were designed for departments, although the latter accurately describes a LAN as well. LANs have different topologies, the most common being the linear bus and the star configuration.
A version of the UNIX operating system designed to run on IBM Compatible computers.
A virus that only activates itself when certain conditions are met. Logic bombs usually damage files or cause other serious problems when they are activated.
On a local area network (LAN) or other network, the MAC (Media Access Control) address is your computer's unique hardware number. (On an Ethernet LAN, it's the same as your Ethernet address.) The MAC layer frames data for transmission over the network, then passes the frame to the physical layer interface where it is transmitted as a stream of bits.
Multimedia Cable Network System is the consortium behind the DOCSIS standard for cable modems.
Multiple Service Operators. A cable TV service provider that also provides other services such as data and/or voice telephony.
The allocation of an IP address to a host name. See DNS
Network Address Translation is the translation of an Internet Protocol address used within one network to a different IP address known within another network - see also SUA.
Network Driver Interface Specification is a Windows specification for how communication protocol programs (such as TCP/IP) and network device drivers should communicate with each other.
I
Prestige 944S Cable Sharing Gateway with 4-port Switch
NetBIOS
Network
NIC
Network Basic Input / Output System. NetBIOS is an extension of the DOS BIOS that enables a
PC to connect to and communicate with a LAN.
Any time you connect 2 or more computers together so that they can share resources, you have a computer network. Connect 2 or more networks together and you have an internet.
Network Interface Card. A board that provides network communication capabilities to and from a computer system. Also called an adapter.
Any single computer connected to a network Node
One-way Cable
Modem
PAC
A one-way Cable Modem uses the TV cable for the downstream (receive) and a telephone modem for upstream (transmit).
The box that calls/answers the phone call and relays the PPP frames to the PNS. A PAC must have IP and dial-up capability.
A filter that scans packets and decides whether to let them through. Packet Filter
PAP
Password Cracker
Password Authentication Protocol PAP is a security protocol that requires users to enter a password before accessing a secure system. The user’s name and password are sent over the wire to a server, where they are compared with a database of user account names and passwords. This technique is vulnerable to wiretapping (eavesdropping) because the password can be captured and used by someone to log onto the system.
A program that uses a dictionary of words, phrases, names, etc. to guess a password.
Password encryption A system of encrypting electronic files using a single key or password. Anyone who knows the password can decrypt the file.
Password
Shadowing
Penetration
Phreaking
Ping Attack
Pirate
The encrypted password is no visible in the passwd file but stored in a shadow file that is only readable by root. This prevents brute force attacks on the encrypted field to guess the password. see e.g.: http://whatis.com/shadowpa.htm
Gaining access to computers or networks by bypassing security programs and passwords.
Breaking into phone or other communication systems. Phreaking sites on the Internet are popular among crackers and other criminals
An attack that slows down the network until it is unusable. The attacker sends a "ping" command to the network repeatedly to slow it down. See also Denial of Service.
Someone who steals or distributes software without paying the legitimate owner for it. This category of computer criminal includes several different types of illegal activities Making copies of software for others to use. Distributing pirated software over the Internet or a Bulletin Board
System. Receiving or downloading illegal copies of software in any form.
Pirated Software Software that has been illegally copied, or that is being used in violation of the software's licensing agreement. Pirated software is often distributed through pirate bulletin boards or on the
Internet. In the internet underground it is known as Warez.
Plain Text
PNS
POP
Port
The opposite of Cipher Text, Plain Text is readable by anyone.
PPTP Network Server. A PNS must have IP connectivity.
Post Office Protocol. This is a common protocol used for sending, receiving, and delivering mail messages.
An Internet port refers to a number that is part of a URL, appearing after a colon (:) right after the domain name. Every service on an Internet server listens on a particular port number on that server. Most services have standard port numbers, e.g. Web servers normally listen on port 80.
J Glossary
Prestige 964 Cable Router
Port (H/W)
POTS
PPP
PPTP
Promiscuous Packet
Capture
Protocol
Proxy Server
PSTN
Public Key
Encryption
PVC
Ranging
Reconnaissance
RFC
An interface on a computer for connecting peripherals or devices to the computer. A printer port, for example, is an interface that is designed to have a printer connected to it. Ports can be defined by specific hardware (such as a keyboard port) or through software.
Plain Old Telephone Service is the analog telephone service that runs over copper twisted-pair wires and is based on the original Bell telephone system. Twisted-pair wires connect homes and businesses to a neighborhood central office. This is called the local loop. The central office is connected to other central offices and long-distance facilities.
Point to Point Protocol. PPP encapsulates and transmits IP (Internet Protocol) datagrams over serial point-to-point links. PPP works with other protocols such as IPX (Internetwork Packet
Exchange). The protocol is defined in IETF (Internet Engineering Task Force) RFC 1661 through
1663. PPP provides router-to-router, host-to-router, and host-to-host connections.
Point-to-Point Tunneling Protocol.
Actively capturing packet information from a network. Most computers only collect packets specifically addressed to them. Promiscuous packet capture acquires all network traffic it can regardless of where the packets are addressed.
A “language” for communicating on a network. Protocols are sets of standards or rules used to define, format, and transmit data across a network. There are many different protocols used on networks. For example, most web pages are transmitted using the HTTP protocol.
A server that performs network operations in lieu of other systems on the network. Proxy Servers are most often used as part of a firewall to mask the identity of users inside a corporate network yet still provide access to the Internet. When a user connects to a proxy server, via a web browser or other networked application, he submits commands to the proxy server. The server then submits those same commands to the Internet, yet without revealing any information about the system that originally requested the information. Proxy servers are an ideal way to also have all users on a corporate network channel through one point for all external communications. Proxy servers can be configured to block certain kinds of connections and stop some hacks.
Public Switched Telephone Network was put into place many years ago as a voice telephone call-switching system. The system transmits voice calls as analog signals across copper twisted cables from homes and businesses to neighborhood COs (central offices); this is often called the local loop. The PSTN is a circuit-switched system, meaning that an end-to-end private circuit is established between caller and callee.
System of encrypting electronic files using a key pair. The key pair contains a public key used during encryption, and a corresponding private key used during decryption.
Permanent Virtual Circuit. A PVC is a logical point-to-point circuit between customer sites.
PVCs are low-delay circuits because routing decisions do not need to be made along the way.
Permanent means that the circuit is preprogrammed by the carrier as a path through the network.
It does not need to be set up or torn down for each session.
The process of automatically adjusting transmission levels and time offsets of individual modems in order to make sure the bursts coming from different modems line up in the right timeslots and are received at the same power level at the CMTS.
The finding and observation of potential targets for a cracker to attack.
An RFC (Request for Comments) is an Internet formal document or standard that is the result of committee drafting and subsequent review by interested parties. Some RFCs are informational in nature. Of those that are intended to become Internet standards, the final version of the RFC
Glossary K
Prestige 944S Cable Sharing Gateway with 4-port Switch
RIP
Router
SAP
SATAN
Server
Set-Top Box
Shoulder Surfing
SID (Service ID)
SNMP
Snooping
SOCKS
SPAM
Splitter
Spoofing
SSL (Secured Socket
Layer)
STP
Straight through becomes the standard and no further comments or changes are permitted. Change can occur, however, through subsequent RFCs.
Routing Information Protocol is an interior or intra-domain routing protocol that uses the distance-vector routing algorithms. RIP is used on the Internet and is common in the NetWare environment as a method for exchanging routing information between routers.
A device that connects two networks together. Routers monitor, direct, and filter information that passes between these networks. Because of their location, routers are a good place to install traffic or mail filters. Routers are also prone to attacks because they contain a great deal of information about a network.
In NetWare, the SAP (Service Advertising Protocol) broadcasts information about available services on the network that other network devices can listen to. A server sends out SAP messages every 60 seconds. A server also sends out SAP messages to inform other devices that it is closing down. Workstations use SAP to find services they need on the network.
A UNIX program that gathers information on networks and stores it in databases. It is helpful in finding security flaws such as incorrect settings, software bugs and poor policy decisions. It shows network services that are running, the different types of hardware and software on the network, and other information. It was written to help users find security flaws in their network systems.
A computer, or a software package, that provides a specific kind of service to client software running on other computers.
A set-top box is a device that enables a television set to become a user interface to the Internet and also enables a television set to receive and decode digital television (DTV) broadcasts.
Looking over someone's shoulder to see the numbers they dial on a phone, or the information they enter into a computer.
Used in the DOCSIS standard to define a particular mapping between a cable modem (CM) and the CMTS. The SID is used for the purpose of upstream bandwidth allocation and class-of-service management.
System Network Management Protocol is a popular management protocol defined by the Internet community for TCP/IP networks. It is a communication protocol for collecting information from devices on the network.
Passively watching a network for information that could be used to a hacker's advantage, such as passwords. Usually done while Camping Out.
A protocol that handles TCP traffic through proxy servers.
Unwanted e-mail, usually in the form of advertisements.
Passive devices that divide the traffic on trunk cables and send it down feeder cables.
To forge something, such as an IP address. IP Spoofing is a common way for hackers to hide their location and identity
Technology that allows you to send information that only the server can read. SSL allows servers and browsers to encrypt data as they communicate with each other. This makes it very difficult for third parties to understand the communications.
Twisted-pair cable consists of copper-core wires surrounded by an insulator. Two wires are twisted together to form a pair, and the pair form a balanced circuit. The twisting prevents interference problems. STP (shielded twisted-pair) provides protection against external crosstalk.
A cable that wires a pin to its equivalent pin. This cable connects two dissimilar devices, for
L Glossary
Prestige 964 Cable Router
Ethernet cable
SUA
Subscriber Unit (SU) An alternate term for cable modem.
TCP
Telnet
Tempest
Terminal
Terminal Software
TFTP
Three-way Cable
Modem
Transmission Control Protocol handles flow control and packet recovery and IP providing basic addressing and packet-forwarding services.
Telnet is the login and terminal emulation protocol common on the Internet and in UNIX environments. It operates over TCP/IP networks. Its primary function is to allow users to log into remote host systems.
Illegal interception of data from computers and video signals.
A device that allows you to send commands to a computer somewhere else. At a minimum, this usually means a keyboard and a display screen and some simple circuitry.
Software that pretends to be (emulates) a physical terminal and allows you to type commands to a computer somewhere else.
Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP (File Transfer
Protocol), but it is scaled back in functionality so that it requires fewer resources to run. TFTP uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol).
A three-way cable modem is a hybrid that can uses either a telephone modem or the TV cable for the upstream traffic.
Trojan or Trojan
Horse example, a data terminal equipment (DTE) device and a data communications equipment (DCE) device. A straight through Ethernet cable is the most common cable used.
Single User Account – The Prestige's SUA (Single User Account) feature allows multiple user
Internet access for the cost of a single ISP account - see also NAT.
Like the fabled gift to the residents of Troy, a Trojan Horse is an application designed to look innocuous. Yet, when you run the program it installs a virus or memory resident application that can steal passwords, corrupt data, or provide hackers a back door into your computer. Trojan applications are particularly dangerous since they can often run exactly as expected without showing any visible signs of intrusion.
A two-way Cable Modem uses the TV cable for both downstream and upstream traffic.
Two-way Cable
Modem
UDP
UNIX
Upstream
UDP is a connectionless transport service that dispenses with the reliability services provided by
TCP. UDP gives applications a direct interface with IP and the ability to address a particular application process running on a host via a port number without setting up a connection session.
A widely used operating system in large networks.
The data flowing from the CM to the CMTS.
Upstream Frequency
URL
VPN
Vulnerability
WAN
The frequency used to transmit data from the CM to the CMTS. Normally in the 5 to 42 MHz range for US systems and 5 to 65 MHz range for European systems.
(Uniform Resource Locator) URL is an object on the Internet or an intranet that resides on a host system. Objects include directories and an assortment of file types, including text files, graphics, video, and audio. A URL is the address of an object that is normally typed in the Address field of a Web browser. The URL is basically a pointer to the location of an object.
Virtual Private Network. These networks use public connections (such as the Internet) to transfer information. That information is usually encrypted for security purposes.
Point where a system can be attacked.
Wide Area Network s link geographically dispersed offices in other cities or around the globe.
Glossary M
Prestige 944S Cable Sharing Gateway with 4-port Switch
War Dialer
Warez
Web Configurator
Wire Tapping
Worm
WWW
Just about any long-distance communication medium can serve as a WAN link, including switched and permanent telephone circuits, terrestrial radio systems, and satellite systems.
A program that automatically dials phone numbers looking for computers on the other end. They catalog numbers so that hackers can call back and try to break in.
A term that describes Pirated Software on the Internet. Warez include cracked games or other programs that software pirates distribute on the Internet
This is a web-based router (not all) configurator that includes an Internet Access Wizard,
Advanced.
Connecting to a network and monitoring all traffic. Most wire tapping features can only monitor the traffic on their subnet.
A program that seeks access into other computers. Once a worm penetrates another computer it continues seeking access to other areas. Worms are often equipped with dictionary-based password crackers and other cracker tools that enable them to penetrate more systems. Worms often steal or vandalize computer data.
(World Wide Web) -- Frequently used when referring to "The Internet", WWW has two major meanings - First, loosely used: the whole constellation of resources that can be accessed using
Gopher, FTP, HTTP, telnet, USENET, WAIS and some other tools. Second, the universe of hypertext servers (HTTP servers).
N Glossary
Prestige 964 Cable Router
Index
ARP , 1-3
BackOrifice, E
Bridge, 1-1
Broadband Access Security Gateway, xii
Brute Force Hacking, E
Cable Router Initialization , 2-5
CATV Coaxial Cable Connection
, 2-5
Data Over Cable Service Interface Specification,
1-1
DHCP (Dynamic Host Configuration Protocol) , 1-3
DOCSIS, 1-1 , 1-3
Domain Name, G downstream signaling rates , 1-3
Ethernet Cables
, 2-5
Hardware Installation, 2-1
HTTP, H, K, N
Humidity, 1-5 hybrid fiber coaxial cable,
ICMP
, 1-3
1-1
Initial Setup, 2-1
Installation Requirements, 2-3
IP routing
, 1-3
IP Spoofing, L
LEDs, 2-1 , 2-6
MCNS, 1-1
Multimedia Cable Network System, 1-1
Network Address Translation (NAT) , 1-3
Network Configuration (computer), 2-6
Overview, 1-1
Packing List Card, xii power adapter
, 2-5 power supply, 1-1
Private, M
Product Specifications, 1-4 , 1-5
Read Me First, xii
Related Documentation, xii
Remote Diagnostic
, 1-3
RIP1 , 1-3
RIP2
, 1-3
Routing Mode and Bridge Mode, 1-1
Safety Instructions, C
Safety Instructions, C
Server
, F, K, L
SNMP ( Simple Network Management Protocol),
1-3
Software Remotely Upgradeable , 1-3
Support Disk, xii
TCP , 1-3
TCP/IP, E, H, I, L, M
Temperature, 1-5
TFTP , 1-3 upstream signaling rates , 1-3
Index O
advertisement
Key Features
- DOCSIS/EuroDOCSIS compliant cable modem
- Peak downstream signaling rates of 43 Mbps and upstream signaling rates of 30 Mbps
- IP routing, TCP, ICMP, ARP, TFTP, RIP1, RIP2 with MD5
- 5-port Auto-negotiating and Auto MDI/MDI-X 10/100 Mbps Ethernet Switch
- 56-bit DES Baseline Privacy
- Software Remotely Upgradeable
- Built-in Diagnostic Features
- SNMP
- Network Address Translation (NAT)
- DHCP (Dynamic Host Configuration Protocol)
Frequently Answers and Questions
What are the key features of the Prestige 964?
How do I connect my Prestige 964 to my cable system?
What are the different operation modes of the Prestige 964?
How can I access the web-based management interface of the Prestige 964?
What are the default settings for the Prestige 964?
Related manuals
advertisement
Table of contents
- 34 Figure 1-1 Prestige 964 Operation Mode
- 35 Figure 2-1 Prestige 964 front panel
- 35 Figure 2-2 Prestige Rear Panel and Connections
- 36 Figure 3-1 Web Management - User Login Page
- 36 Figure 3-2 Web Management - Status
- 36 Figure 3-3 Web Management - Basic
- 36 Figure 3-4 Web Management – Advanced: Options
- 36 Figure 3-5 Web Management – Advanced: IP Filtering
- 36 Figure 3-6 Web Management – Advanced: MAC Filtering
- 36 Figure 3-7 Web Management – Advanced: Port Filtering
- 36 Figure 3-8 Web Management – Advanced: Forwarding
- 36 Figure 3-9 Web Management – Advanced: Port Triggers